Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
QUOTATIONs44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.doc
|
Rich Text Format data, unknown version
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\wREzo[1].txt
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\tmp9445.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
|
data
|
dropped
|
||
C:\Users\user\subfolder1\filename1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\Public\69577.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 59134 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\2ZKf4aq[1].htm
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0863C5D3-5908-4917-8F28-8909E0160183}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{24864F90-30CA-4646-ACFF-79FC9E14ADCB}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C2D3EB9C-AB70-4784-8852-5C03B64EE05D}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CabBF0C.tmp
|
Microsoft Cabinet archive data, 59134 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TarBF0D.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp80F5.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\catalog.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\QUOTATIONs44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13
2020, mtime=Wed Aug 26 14:08:13 2020, atime=Thu Feb 25 14:28:30 2021, length=967360, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\LIP8714C.txt
|
ASCII text
|
downloaded
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Y5D8BEZV.txt
|
ASCII text
|
downloaded
|
||
C:\Users\user\Desktop\~$OTATIONs44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.doc
|
data
|
dropped
|
There are 16 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\Public\69577.exe
|
C:\Users\Public\69577.exe
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
|
C:\Users\Public\69577.exe
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
|
C:\Users\Public\69577.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp9445.tmp'
|
||
C:\Windows\SysWOW64\schtasks.exe
|
'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp80F5.tmp'
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 0
|
||
C:\Users\user\subfolder1\filename1.exe
|
'C:\Users\user\subfolder1\filename1.exe'
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\taskeng.exe
|
taskeng.exe {DA6299CA-95CA-4E9D-8945-2CC05321254C} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
194.5.98.202
|
|||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
https://onedrive.live.com/E
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
https://u.teknik.io/wREzo.txt
|
unknown
|
||
https://ibkebw.dm.files.1drv.com/y
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
https://ibkebw.dm.files.1drv.com/
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
https://onedrive.live.com/download?cid=802AC8A73EEC8C8E&resid=802AC8A73EEC8C8E%21110&authkey=AK1w6-P
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
https://ibkebw.dm.files.1drv.com/y4mkt1ePYl5p-A97ciot0bQ59hcBfLkczVR077g5LVTnsSoRxe1bs39ErOjDRD_qmHQ
|
unknown
|
||
http://bit.ly/2ZKf4aq
|
67.199.248.10
|
||
https://onedrive.live.com/
|
unknown
|
There are 10 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bit.ly
|
67.199.248.11
|
||
teknik.io
|
5.79.72.163
|
||
onedrive.live.com
|
unknown
|
||
ibkebw.dm.files.1drv.com
|
unknown
|
||
u.teknik.io
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
67.199.248.10
|
unknown
|
United States
|
unknown
|
||
194.5.98.202
|
unknown
|
Netherlands
|
unknown
|
||
5.79.72.163
|
unknown
|
Netherlands
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
zj6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
tk6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
;m6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EC581
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1096C3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1096C3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
|
Startup key
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
|
SMTP Service
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
|
SavedLegacySettings
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
|
Blob
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
|
Blob
|
||
C:\Windows\System32\taskeng.exe
|
data
|
There are 325 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
140000
|
unkown
|
page read and write
|
||
282000
|
unkown
|
page execute and read and write
|
||
1F3FF000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
2170000
|
heap private
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
3680000
|
unkown
|
page read and write
|
||
AF0000
|
heap private
|
page execute and read and write
|
||
1F5A6000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
1F6C6000
|
unkown
|
page read and write
|
||
1B5000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
1F46F000
|
unkown
|
page read and write
|
||
D90000
|
unkown image
|
page readonly
|
||
3680000
|
unkown
|
page read and write
|
||
757000
|
unkown
|
page readonly
|
||
5D0000
|
heap private
|
page read and write
|
||
1F6A6000
|
unkown
|
page read and write
|
||
670000
|
heap default
|
page read and write
|
||
E6F000
|
unkown
|
page read and write
|
||
32B000
|
unkown
|
page readonly
|
||
ED0000
|
heap private
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
356000
|
unkown
|
page read and write
|
||
2F0000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
D90000
|
unkown image
|
page readonly
|
||
170000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
420000
|
heap default
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
642000
|
unkown
|
page execute and read and write
|
||
2750000
|
heap private
|
page read and write
|
||
3F6000
|
unkown
|
page read and write
|
||
D9C000
|
unkown image
|
page readonly
|
||
3750000
|
unkown
|
page read and write
|
||
3790000
|
unkown
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
20BCD000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3FE000
|
unkown
|
page read and write
|
||
3750000
|
unkown
|
page read and write
|
||
3730000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
2174000
|
heap private
|
page read and write
|
||
7E6000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3740000
|
unkown
|
page read and write
|
||
509000
|
unkown
|
page read and write
|
||
2114B000
|
unkown
|
page read and write
|
||
3810000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3710000
|
unkown
|
page read and write
|
||
3750000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
1DFBE000
|
unkown
|
page read and write
|
||
CB0000
|
heap private
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
4D3F000
|
stack
|
page read and write
|
||
F20000
|
heap private
|
page read and write
|
||
3760000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
1F52F000
|
unkown
|
page read and write
|
||
800000
|
heap default
|
page read and write
|
||
3710000
|
unkown
|
page read and write
|
||
1F6E6000
|
unkown
|
page read and write
|
||
3720000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
532000
|
unkown
|
page read and write
|
||
26B000
|
unkown
|
page read and write
|
||
1F5E6000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page readonly
|
||
3690000
|
unkown
|
page read and write
|
||
3740000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
3870000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
1DC3E000
|
unkown
|
page read and write
|
||
838000
|
heap default
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
87E000
|
unkown
|
page read and write
|
||
1F6A6000
|
unkown
|
page read and write
|
||
83D000
|
heap default
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
21A0000
|
unkown
|
page readonly
|
||
3690000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page readonly
|
||
160000
|
unkown
|
page read and write
|
||
5CE000
|
unkown
|
page read and write
|
||
203B0000
|
unkown
|
page read and write
|
||
1F666000
|
unkown
|
page read and write
|
||
3730000
|
unkown
|
page read and write
|
||
570000
|
heap private
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
2072D000
|
unkown
|
page read and write
|
||
1240000
|
unkown image
|
page readonly
|
||
1F686000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
20BF000
|
unkown
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
630000
|
heap default
|
page read and write
|
||
1E7000
|
unkown
|
page execute and read and write
|
||
3680000
|
unkown
|
page read and write
|
||
7F0000
|
unkown
|
page read and write
|
||
2FD000
|
heap default
|
page read and write
|
||
ACF000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page readonly
|
||
5F0000
|
heap private
|
page execute and read and write
|
||
3750000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
1D62D000
|
unkown
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
4FB000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
824000
|
heap default
|
page read and write
|
||
580000
|
unkown
|
page read and write
|
||
21B000
|
unkown
|
page execute and read and write
|
||
520000
|
unkown
|
page read and write
|
||
1F666000
|
unkown
|
page read and write
|
||
295E000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
D9C000
|
unkown image
|
page readonly
|
||
3690000
|
unkown
|
page read and write
|
||
3730000
|
unkown
|
page read and write
|
||
EE2000
|
heap private
|
page read and write
|
||
4DB000
|
unkown
|
page read and write
|
||
5BB000
|
unkown
|
page execute and read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
A00000
|
heap private
|
page execute and read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
120000
|
heap private
|
page execute and read and write
|
||
3651000
|
unkown
|
page read and write
|
||
3740000
|
unkown
|
page read and write
|
||
7EF20000
|
unkown
|
page execute and read and write
|
||
1D49C000
|
unkown
|
page read and write
|
||
7E4000
|
unkown
|
page read and write
|
||
1F5C6000
|
unkown
|
page read and write
|
||
202000
|
unkown
|
page execute and read and write
|
||
7E7000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
66A000
|
unkown
|
page execute and read and write
|
||
240000
|
unkown
|
page readonly
|
||
7E7000
|
unkown
|
page read and write
|
||
1DA000
|
unkown
|
page execute and read and write
|
||
3790000
|
unkown
|
page read and write
|
||
1E2000
|
unkown
|
page execute and read and write
|
||
2471000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
73E000
|
unkown
|
page read and write
|
||
B40000
|
heap private
|
page read and write
|
||
1E6000
|
unkown
|
page read and write
|
||
1F44F000
|
unkown
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
1F4EF000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
1EB000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
780000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
537000
|
unkown
|
page readonly
|
||
3690000
|
unkown
|
page read and write
|
||
3CA000
|
heap default
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3730000
|
unkown
|
page read and write
|
||
8CA000
|
heap default
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
2F0000
|
unkown
|
page read and write
|
||
1D00E000
|
unkown
|
page read and write
|
||
582000
|
unkown
|
page execute and read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
990000
|
heap private
|
page execute and read and write
|
||
217000
|
unkown
|
page execute and read and write
|
||
22C000
|
unkown
|
page read and write
|
||
92F000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
1D44E000
|
unkown
|
page read and write
|
||
2A7B000
|
heap private
|
page read and write
|
||
3730000
|
unkown
|
page read and write
|
||
26FE000
|
unkown
|
page read and write
|
||
F47000
|
heap private
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
A1F000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page readonly
|
||
1E4ED000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3740000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
6F2000
|
unkown
|
page read and write
|
||
1EB000
|
unkown
|
page execute and read and write
|
||
7A0000
|
heap private
|
page read and write
|
||
167000
|
unkown
|
page read and write
|
||
D2E000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
6E0000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
1E44F000
|
unkown
|
page read and write
|
||
3740000
|
unkown
|
page read and write
|
||
33E000
|
heap default
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
1F666000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
900000
|
unkown
|
page read and write
|
||
3820000
|
unkown
|
page read and write
|
||
1F606000
|
unkown
|
page read and write
|
||
13D000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page execute and read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
1D13C000
|
unkown
|
page readonly
|
||
165000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
100000
|
heap private
|
page read and write
|
||
A58000
|
heap private
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
5E0000
|
unkown
|
page readonly
|
||
85A000
|
heap default
|
page read and write
|
||
26BE000
|
unkown
|
page read and write
|
||
5AA000
|
unkown
|
page execute and read and write
|
||
780000
|
unkown
|
page read and write
|
||
2B80000
|
unkown
|
page read and write
|
||
58C000
|
unkown
|
page execute and read and write
|
||
3730000
|
unkown
|
page read and write
|
||
1F4AF000
|
unkown
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
22C000
|
unkown
|
page read and write
|
||
74E000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
1A0000
|
heap private
|
page read and write
|
||
417000
|
unkown image
|
page readonly
|
||
3730000
|
unkown
|
page read and write
|
||
1D94B000
|
unkown
|
page read and write
|
||
580000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
3690000
|
unkown
|
page read and write
|
||
1F46F000
|
unkown
|
page read and write
|
||
EAE000
|
unkown
|
page read and write
|
||
3820000
|
unkown
|
page read and write
|
||
3720000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page read and write
|
||
1F5A6000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
2062E000
|
unkown
|
page read and write
|
||
2F2000
|
unkown
|
page read and write
|
||
1F4CF000
|
unkown
|
page read and write
|
||
1F606000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
1DA000
|
unkown
|
page execute and read and write
|
||
7F0000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page read and write
|
||
8CC000
|
heap default
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
1F546000
|
unkown
|
page read and write
|
||
1F48F000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page execute and read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
3491000
|
unkown
|
page read and write
|
||
1F686000
|
unkown
|
page read and write
|
||
7F8000
|
unkown
|
page read and write
|
||
D80000
|
unkown
|
page readonly
|
||
2C7000
|
heap default
|
page read and write
|
||
89A000
|
heap default
|
page read and write
|
||
3481000
|
unkown
|
page read and write
|
||
3730000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
1DC80000
|
unkown
|
page read and write
|
||
790000
|
unkown
|
page execute and read and write
|
||
3740000
|
unkown
|
page read and write
|
||
3750000
|
unkown
|
page read and write
|
||
137000
|
unkown
|
page read and write
|
||
1F450000
|
unkown
|
page read and write
|
||
700000
|
unkown
|
page read and write
|
||
290000
|
unkown
|
page read and write
|
||
192000
|
unkown
|
page execute and read and write
|
||
39A000
|
stack
|
page read and write
|
||
3730000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
B46000
|
heap private
|
page read and write
|
||
880000
|
heap default
|
page read and write
|
||
3760000
|
unkown
|
page read and write
|
||
7C0000
|
heap private
|
page read and write
|
||
662000
|
unkown
|
page execute and read and write
|
||
37F0000
|
unkown
|
page read and write
|
||
1DCBD000
|
unkown
|
page read and write
|
||
572000
|
unkown
|
page execute and read and write
|
||
3720000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
64C000
|
unkown
|
page execute and read and write
|
||
560000
|
unkown
|
page read and write
|
||
780000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
7E6000
|
unkown
|
page read and write
|
||
3760000
|
unkown
|
page read and write
|
||
203CD000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3740000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
1D15B000
|
unkown
|
page readonly
|
||
6F0000
|
unkown
|
page readonly
|
||
530000
|
unkown
|
page readonly
|
||
D90000
|
unkown image
|
page readonly
|
||
C0000
|
unkown
|
page read and write
|
||
1D2AD000
|
unkown
|
page read and write
|
||
2BC1000
|
unkown
|
page read and write
|
||
A24000
|
heap private
|
page execute and read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
75C000
|
unkown
|
page readonly
|
||
1B0000
|
unkown
|
page read and write
|
||
1240000
|
unkown image
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
1F50F000
|
unkown
|
page read and write
|
||
1E4F1000
|
unkown
|
page read and write
|
||
1DC40000
|
unkown
|
page read and write
|
||
656000
|
unkown
|
page execute and read and write
|
||
233F000
|
unkown
|
page read and write
|
||
1D51D000
|
unkown
|
page read and write
|
||
1F606000
|
unkown
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
1E177000
|
unkown
|
page read and write
|
||
124C000
|
unkown image
|
page readonly
|
||
1F5C6000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
1D2000
|
unkown
|
page execute and read and write
|
||
3710000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
C00000
|
unkown
|
page readonly
|
||
3770000
|
unkown
|
page read and write
|
||
3860000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
529000
|
unkown
|
page read and write
|
||
77B000
|
unkown
|
page readonly
|
||
1CC80000
|
unkown
|
page readonly
|
||
3750000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
1F626000
|
unkown
|
page read and write
|
||
306000
|
heap default
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
3780000
|
unkown
|
page read and write
|
||
E2F000
|
unkown
|
page read and write
|
||
1F586000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
652000
|
unkown
|
page read and write
|
||
2BD000
|
unkown
|
page read and write
|
||
3850000
|
unkown
|
page read and write
|
||
1F4AF000
|
unkown
|
page read and write
|
||
3730000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
1F6E6000
|
unkown
|
page read and write
|
||
45A000
|
stack
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3750000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
7E5000
|
unkown
|
page read and write
|
||
2095F000
|
unkown
|
page read and write
|
||
1242000
|
unkown image
|
page execute read
|
||
1D2000
|
unkown
|
page execute and read and write
|
||
55B000
|
unkown
|
page readonly
|
||
3740000
|
unkown
|
page read and write
|
||
1D75E000
|
unkown
|
page read and write
|
||
2FE000
|
heap default
|
page read and write
|
||
1D40C000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3720000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page read and write
|
||
748000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
5B7000
|
unkown
|
page execute and read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
5A0000
|
heap private
|
page execute and read and write
|
||
3740000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
1F6F6000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
7A0000
|
unkown
|
page read and write
|
||
3760000
|
unkown
|
page read and write
|
||
168000
|
unkown
|
page read and write
|
||
BE0000
|
unkown
|
page readonly
|
||
3680000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
1D89D000
|
unkown
|
page read and write
|
||
3720000
|
unkown
|
page read and write
|
||
37A0000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
3720000
|
unkown
|
page read and write
|
||
702000
|
unkown
|
page read and write
|
||
1B9000
|
unkown
|
page read and write
|
||
200000
|
heap private
|
page execute and read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
1F626000
|
unkown
|
page read and write
|
||
522000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
3730000
|
unkown
|
page read and write
|
||
3740000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
887000
|
heap default
|
page read and write
|
||
352A000
|
unkown
|
page read and write
|
||
1F450000
|
unkown
|
page read and write
|
||
3780000
|
unkown
|
page read and write
|
||
2710000
|
unkown
|
page readonly
|
||
D92000
|
unkown image
|
page execute read
|
||
7E6000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
20D1E000
|
unkown
|
page read and write
|
||
24C0000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
39E000
|
heap default
|
page read and write
|
||
7EC000
|
unkown
|
page read and write
|
||
20D6D000
|
unkown
|
page read and write
|
||
A10000
|
unkown
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
3760000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
1242000
|
unkown image
|
page execute read
|
||
780000
|
unkown
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
469000
|
heap default
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
1DE1C000
|
unkown
|
page read and write
|
||
3790000
|
unkown
|
page read and write
|
||
3720000
|
unkown
|
page read and write
|
||
1F4EF000
|
unkown
|
page read and write
|
||
884000
|
heap default
|
page read and write
|
||
7E6000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
1E176000
|
unkown
|
page read and write | page guard
|
||
3690000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page readonly
|
||
444000
|
heap default
|
page read and write
|
||
1F526000
|
unkown
|
page read and write
|
||
1F646000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
A2E000
|
unkown
|
page read and write
|
||
AD0000
|
heap private
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
1F46F000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3760000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
384000
|
heap default
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
28BC000
|
unkown
|
page read and write
|
||
1DDDD000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
3760000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
20B8D000
|
unkown
|
page read and write
|
||
3740000
|
unkown
|
page read and write
|
||
552000
|
unkown
|
page read and write
|
||
1E404000
|
unkown
|
page read and write
|
||
3750000
|
unkown
|
page read and write
|
||
100000
|
heap default
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
1F5A6000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
1F450000
|
unkown
|
page read and write
|
||
1E5AE000
|
unkown
|
page read and write
|
||
B9E000
|
unkown
|
page read and write
|
||
37E0000
|
unkown
|
page read and write
|
||
B0000
|
unkown
|
page read and write
|
||
3700000
|
unkown
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
270000
|
unkown
|
page readonly
|
||
3690000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
1E44B000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
30C000
|
unkown
|
page readonly
|
||
C5000
|
unkown
|
page read and write
|
||
5E0000
|
unkown
|
page read and write
|
||
1DE30000
|
heap private
|
page read and write
|
||
A50000
|
heap private
|
page read and write
|
||
A0000
|
unkown
|
page readonly
|
||
181000
|
unkown
|
page read and write
|
||
3720000
|
unkown
|
page read and write
|
||
2340000
|
unkown
|
page read and write
|
||
124C000
|
unkown image
|
page readonly
|
||
D92000
|
unkown image
|
page execute read
|
||
1F646000
|
unkown
|
page read and write
|
||
3720000
|
unkown
|
page read and write
|
||
7E5000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
307000
|
unkown
|
page readonly
|
||
A07000
|
heap private
|
page execute and read and write
|
||
170000
|
unkown
|
page read and write
|
||
1F5E6000
|
unkown
|
page read and write
|
||
3720000
|
unkown
|
page read and write
|
||
3750000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3790000
|
unkown
|
page read and write
|
||
20960000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
104000
|
heap private
|
page read and write
|
||
90000
|
heap default
|
page read and write
|
||
2740000
|
heap private
|
page read and write
|
||
417000
|
unkown image
|
page readonly
|
||
462E000
|
stack
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
70000
|
heap private
|
page read and write
|
||
F9D000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
6FB000
|
unkown
|
page execute and read and write
|
||
1F52F000
|
unkown
|
page read and write
|
||
213FD000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3710000
|
unkown
|
page read and write
|
||
3780000
|
unkown
|
page read and write
|
||
100000
|
heap private
|
page read and write
|
||
3780000
|
unkown
|
page read and write
|
||
3760000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
640000
|
unkown
|
page read and write
|
||
1EC000
|
unkown
|
page execute and read and write
|
||
1E4BF000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page readonly
|
||
690000
|
unkown
|
page readonly
|
||
53C000
|
unkown
|
page readonly
|
||
367000
|
heap default
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
1A0000
|
heap private
|
page read and write
|
||
C3F000
|
unkown
|
page read and write
|
||
3720000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
212BD000
|
unkown
|
page read and write
|
||
6F2000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
1F5C6000
|
unkown
|
page read and write
|
||
456000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
1F646000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
3720000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3710000
|
unkown
|
page read and write
|
||
3720000
|
unkown
|
page read and write
|
||
3760000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
3381000
|
unkown
|
page read and write
|
||
807000
|
heap default
|
page read and write
|
||
D5000
|
unkown
|
page read and write
|
||
20A000
|
unkown
|
page execute and read and write
|
||
7D6000
|
heap private
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
632000
|
unkown
|
page execute and read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
3740000
|
unkown
|
page read and write
|
||
177000
|
unkown
|
page read and write
|
||
1F4CF000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
3710000
|
unkown
|
page read and write
|
||
E2E000
|
unkown
|
page read and write | page guard
|
||
390000
|
unkown
|
page readonly
|
||
3780000
|
unkown
|
page read and write
|
||
2500000
|
unkown
|
page readonly
|
||
3740000
|
unkown
|
page read and write
|
||
2103E000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3750000
|
unkown
|
page read and write
|
||
398000
|
heap default
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
780000
|
unkown
|
page read and write
|
||
1E370000
|
heap private
|
page execute and read and write
|
||
7D0000
|
heap private
|
page read and write
|
||
1D4A0000
|
heap private
|
page read and write
|
||
A60000
|
heap private
|
page read and write
|
||
3780000
|
unkown
|
page read and write
|
||
1BE0000
|
unkown
|
page readonly
|
||
3750000
|
unkown
|
page read and write
|
||
68E000
|
unkown
|
page read and write
|
||
28F0000
|
unkown
|
page readonly
|
||
6B0000
|
unkown
|
page execute and read and write
|
||
93F000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
270000
|
unkown
|
page execute and read and write
|
||
D6D000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
7E6000
|
unkown
|
page read and write
|
||
5E0000
|
heap private
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
1D130000
|
unkown
|
page readonly
|
||
160000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
C3E000
|
unkown
|
page read and write | page guard
|
||
3730000
|
unkown
|
page read and write
|
||
57A000
|
unkown
|
page execute and read and write
|
||
130000
|
unkown
|
page read and write
|
||
5EF000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
2C0000
|
heap default
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
785000
|
unkown
|
page read and write
|
||
1DCAD000
|
unkown
|
page read and write
|
||
A1E000
|
unkown
|
page read and write | page guard
|
||
1D90E000
|
unkown
|
page read and write
|
||
7C0000
|
heap private
|
page execute and read and write
|
||
7A0000
|
unkown
|
page write copy
|
||
400000
|
unkown image
|
page readonly
|
||
3760000
|
unkown
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
780000
|
unkown
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
20E8D000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
3680000
|
unkown
|
page read and write
|
||
3750000
|
unkown
|
page read and write
|
||
3730000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3710000
|
unkown
|
page read and write
|
||
1DA7E000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
74000
|
heap private
|
page read and write
|
||
1F686000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
2B82000
|
unkown
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
576000
|
heap private
|
page read and write
|
||
3730000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
2790000
|
unkown
|
page readonly
|
||
3680000
|
unkown
|
page read and write
|
||
87C000
|
heap default
|
page read and write
|
||
1F586000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
19A000
|
unkown
|
page execute and read and write
|
||
1F626000
|
unkown
|
page read and write
|
||
37B0000
|
unkown
|
page read and write
|
||
2772000
|
heap private
|
page read and write
|
||
2601000
|
unkown
|
page read and write
|
||
7F0000
|
unkown
|
page read and write
|
||
1F5E6000
|
unkown
|
page read and write
|
||
3750000
|
unkown
|
page read and write
|
||
3790000
|
unkown
|
page read and write
|
||
3760000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
3690000
|
unkown
|
page read and write
|
||
1F50F000
|
unkown
|
page read and write
|
||
3780000
|
unkown
|
page read and write
|
||
1E5B0000
|
unkown
|
page read and write
|
||
1E28F000
|
unkown
|
page read and write
|
||
1BC000
|
unkown
|
page execute and read and write
|
||
2651000
|
unkown
|
page read and write
|
||
5A2000
|
unkown
|
page execute and read and write
|
||
308000
|
heap default
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
166000
|
unkown
|
page read and write
|
||
881000
|
heap default
|
page read and write
|
||
1F6A6000
|
unkown
|
page read and write
|
||
1DA88000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page readonly
|
||
3780000
|
unkown
|
page read and write
|
||
2748000
|
heap private
|
page read and write
|
||
C0000
|
unkown
|
page execute and read and write
|
||
3720000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page read and write
|
||
6F7000
|
unkown
|
page execute and read and write
|
||
65A000
|
unkown
|
page execute and read and write
|
||
520000
|
unkown
|
page read and write
|
||
3750000
|
unkown
|
page read and write
|
||
1240000
|
unkown image
|
page readonly
|
||
3740000
|
unkown
|
page read and write
|
||
1F566000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
1D137000
|
unkown
|
page readonly
|
||
1B2000
|
unkown
|
page execute and read and write
|
||
2C7000
|
heap default
|
page read and write
|
||
2A40000
|
heap private
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
2440000
|
unkown
|
page readonly
|
||
1F3B1000
|
unkown
|
page read and write
|
||
1E3B1000
|
unkown
|
page read and write
|
||
20730000
|
unkown
|
page read and write
|
||
3790000
|
unkown
|
page read and write
|
||
66C000
|
unkown
|
page execute and read and write
|
||
3760000
|
unkown
|
page read and write
|
||
944000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
7E6000
|
unkown
|
page read and write
|
||
396000
|
unkown
|
page read and write
|
||
63A000
|
unkown
|
page execute and read and write
|
||
3790000
|
unkown
|
page read and write
|
||
91D000
|
unkown
|
page read and write
|
||
2C0000
|
heap default
|
page read and write
|
||
1E2CE000
|
unkown
|
page read and write
|
||
1F6C6000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3790000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
18C000
|
unkown
|
page read and write
|
||
1D12E000
|
unkown
|
page read and write
|
||
37E0000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
37A0000
|
unkown
|
page read and write
|
||
3740000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
3780000
|
unkown
|
page read and write
|
||
2EE000
|
unkown
|
page read and write
|
||
3790000
|
unkown
|
page read and write
|
||
3760000
|
unkown
|
page read and write
|
||
427000
|
heap default
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
1F3D6000
|
unkown
|
page read and write
|
||
3471000
|
unkown
|
page read and write
|
||
3860000
|
unkown
|
page read and write
|
||
3BC1000
|
unkown
|
page read and write
|
||
401000
|
unkown image
|
page execute read
|
||
240000
|
unkown
|
page execute and read and write
|
||
21AB000
|
heap private
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
166000
|
unkown
|
page read and write
|
||
1F6E6000
|
unkown
|
page read and write
|
||
1F48F000
|
unkown
|
page read and write
|
||
1E28E000
|
unkown
|
page read and write | page guard
|
||
3710000
|
unkown
|
page read and write
|
||
F29000
|
heap private
|
page read and write
|
||
C00000
|
unkown
|
page readonly
|
||
7E0000
|
unkown
|
page read and write
|
||
3780000
|
unkown
|
page read and write
|
||
2A45000
|
heap private
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
3730000
|
unkown
|
page read and write
|
||
ADE000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3780000
|
unkown
|
page read and write
|
||
580000
|
unkown
|
page read and write
|
||
3770000
|
unkown
|
page read and write
|
||
1EA000
|
unkown
|
page execute and read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
582000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
1F6C6000
|
unkown
|
page read and write
|
||
C0000
|
unkown
|
page read and write
|
||
3780000
|
unkown
|
page read and write
|
||
35A000
|
stack
|
page read and write
|
||
3720000
|
unkown
|
page read and write
|
||
3750000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
267F000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
C0000
|
unkown
|
page read and write
|
||
360000
|
heap default
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
1180000
|
unkown
|
page readonly
|
||
3830000
|
unkown
|
page read and write
|
||
3780000
|
unkown
|
page read and write
|
||
700000
|
unkown
|
page read and write
|
||
1F586000
|
unkown
|
page read and write
|
||
3760000
|
unkown
|
page read and write
|
||
37D0000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
3780000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
1F4AF000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
273E000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
351A000
|
unkown
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
344000
|
heap default
|
page read and write
|
||
89000
|
unkown
|
page read and write
|
||
1CFCE000
|
unkown
|
page read and write
|
||
58A000
|
unkown
|
page execute and read and write
|
||
3690000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page read and write
|
||
3680000
|
unkown
|
page read and write
|
||
8A4000
|
heap default
|
page read and write
|
||
3760000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
3690000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
2095E000
|
unkown
|
page read and write | page guard
|
||
2754000
|
heap private
|
page read and write
|
||
1F576000
|
unkown
|
page read and write
|
||
1F48F000
|
unkown
|
page read and write
|
||
7E6000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
There are 838 hidden memdumps, click here to show them.