Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RF_IMG_7510.doc
|
Rich Text Format data, unknown version
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RF_IMG_7510[1].jpg
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\Public\69577.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\2MrI2J8[1].htm
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{3E742551-7EEA-4C35-8799-54095299238F}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{43BDFCF0-FFD8-4816-B513-C2DC6937B540}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9312A5BA-14BB-458B-BB2D-5B313121AE89}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\RF_IMG_7510.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:17
2020, mtime=Wed Aug 26 14:08:17 2020, atime=Thu Feb 25 18:39:34 2021, length=934282, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\WYBYWM6N.txt
|
ASCII text
|
downloaded
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\T7PO5EQ31SVDWZPIQNM6.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YYU32XDMX6X5FS37H4KQ.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$_IMG_7510.doc
|
data
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\Public\69577.exe
|
C:\Users\Public\69577.exe
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
'Powershell.exe' -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Public\69577.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup\Drivers.exe'
|
||
C:\Users\Public\69577.exe
|
C:\Users\Public\69577.exe
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe
|
'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
'Powershell.exe' -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe
|
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://ofpDdlcDvB.net
|
|||
http://127.0.0.1:HTTP/1.1
|
unknown
|
||
http://DynDns.comDynDNS
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
|
unknown
|
||
http://nobettwo.xyz
|
unknown
|
||
http://ofpDdlcDvB.nett;
|
unknown
|
||
http://oVNzXy.com
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://qadir.tickfa.ir/I4/RF_IMG_7510.jpg
|
188.253.2.221
|
||
http://java.c
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
https://api.ipify.org%GETMozilla/5.0
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
https://api.ipify.org%
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://bit.ly/2MrI2J8
|
67.199.248.10
|
||
http://blog.naver.com/cubemit314Ghttp://projectofsonagi.tistory.com/
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
http://www.piriform.com/ccleaner
|
unknown
|
There are 16 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
nobettwo.xyz
|
198.54.126.101
|
||
qadir.tickfa.ir
|
188.253.2.221
|
||
bit.ly
|
67.199.248.10
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
198.54.126.101
|
unknown
|
United States
|
unknown
|
||
188.253.2.221
|
unknown
|
Australia
|
unknown
|
||
67.199.248.10
|
unknown
|
United States
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
mg7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
6h7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
,j7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ED3B4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FAA34
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FAA34
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
There are 313 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B10000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
24F1000
|
unkown
|
page read and write
|
||
23C1000
|
unkown
|
page read and write
|
||
CD0000
|
unkown
|
page read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
3289000
|
unkown
|
page read and write
|
||
34F9000
|
unkown
|
page read and write
|
||
841000
|
unkown
|
page read and write
|
||
244A000
|
unkown
|
page read and write
|
||
257A000
|
unkown
|
page read and write
|
||
52F0000
|
unkown
|
page read and write
|
||
4BB000
|
unkown
|
page read and write
|
||
B50000
|
unkown
|
page read and write
|
||
1052000
|
unkown image
|
page execute read
|
||
7EFDF000
|
unkown
|
page read and write
|
||
40B7000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page execute and read and write
|
||
27EE000
|
unkown
|
page read and write
|
||
400000
|
heap default
|
page read and write
|
||
219000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
790000
|
unkown
|
page read and write
|
||
4972000
|
heap private
|
page read and write
|
||
220000
|
heap private
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
4990000
|
unkown
|
page readonly
|
||
375000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
1D50000
|
heap private
|
page execute and read and write
|
||
10D000
|
unkown
|
page execute and read and write
|
||
2A70000
|
heap private
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page execute and read and write
|
||
117000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
1EA4000
|
heap private
|
page read and write
|
||
42E000
|
stack
|
page read and write
|
||
AC0000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
B50000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
541000
|
unkown
|
page read and write
|
||
543000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
B0000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
1D6A000
|
unkown
|
page execute and read and write
|
||
F0000
|
unkown
|
page read and write
|
||
2A5F000
|
unkown
|
page read and write
|
||
350000
|
unkown
|
page read and write
|
||
2FA0000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
5324000
|
unkown
|
page read and write
|
||
4D50000
|
unkown
|
page readonly
|
||
4EF0000
|
unkown
|
page read and write
|
||
2FE0000
|
heap private
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
441000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
48C000
|
unkown
|
page read and write
|
||
AD0000
|
unkown
|
page readonly
|
||
251D000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
1E9D000
|
unkown
|
page read and write
|
||
15B000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
721000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
AC0000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
25A0000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
670000
|
heap default
|
page read and write
|
||
760000
|
heap private
|
page execute and read and write
|
||
36B4000
|
unkown
|
page read and write
|
||
1BD000
|
unkown
|
page execute and read and write
|
||
720000
|
heap private
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
720000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
AC0000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page readonly
|
||
A10000
|
unkown
|
page read and write
|
||
38E1000
|
unkown
|
page read and write
|
||
AE0000
|
unkown
|
page read and write
|
||
1050000
|
unkown image
|
page readonly
|
||
D00000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
24B5000
|
unkown
|
page execute and read and write
|
||
610000
|
unkown
|
page read and write
|
||
47E000
|
unkown
|
page read and write
|
||
4B30000
|
heap private
|
page execute and read and write
|
||
4D6000
|
heap default
|
page read and write
|
||
CCF000
|
unkown
|
page read and write
|
||
630000
|
heap default
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
28E8000
|
unkown
|
page read and write
|
||
C63000
|
unkown image
|
page readonly
|
||
450000
|
unkown
|
page execute and read and write
|
||
B50000
|
unkown
|
page read and write
|
||
342C000
|
unkown
|
page read and write
|
||
134000
|
unkown
|
page read and write
|
||
545000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
447000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
432000
|
unkown
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
1DA000
|
unkown
|
page execute and read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
542000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
4C9000
|
heap default
|
page read and write
|
||
24A0000
|
unkown
|
page read and write
|
||
2170000
|
unkown
|
page read and write
|
||
2500000
|
unkown
|
page read and write
|
||
3761000
|
unkown
|
page read and write
|
||
C4C000
|
unkown image
|
page readonly
|
||
BE2000
|
unkown image
|
page execute read
|
||
2A8000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
310000
|
heap private
|
page read and write
|
||
1A2000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
34D2000
|
unkown
|
page read and write
|
||
1C20000
|
unkown
|
page readonly
|
||
49CD000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
724000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
534000
|
heap default
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
375000
|
unkown
|
page read and write
|
||
83F000
|
unkown
|
page read and write
|
||
4C7E000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
26C0000
|
heap private
|
page execute and read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
50BE000
|
unkown
|
page read and write
|
||
464000
|
heap default
|
page read and write
|
||
1050000
|
unkown image
|
page readonly
|
||
520000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page execute and read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
230000
|
heap default
|
page read and write
|
||
4C9000
|
unkown
|
page read and write
|
||
CBE000
|
unkown
|
page read and write | page guard
|
||
2A0000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
37DE000
|
unkown
|
page read and write
|
||
38E8000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
D40000
|
unkown
|
page read and write
|
||
25E2000
|
unkown
|
page read and write
|
||
221E000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
375000
|
unkown
|
page read and write
|
||
48C000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
7E0000
|
heap default
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
330000
|
unkown
|
page read and write
|
||
618000
|
unkown
|
page read and write
|
||
637E000
|
unkown
|
page read and write | page guard
|
||
68D0000
|
heap private
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
57A000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
379000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
340000
|
unkown
|
page readonly
|
||
565000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
2A8000
|
unkown
|
page read and write
|
||
23BF000
|
unkown
|
page read and write
|
||
BA1000
|
unkown
|
page read and write
|
||
BE2000
|
unkown image
|
page execute read
|
||
540000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
2600000
|
unkown
|
page read and write
|
||
110000
|
heap private
|
page read and write
|
||
BA0000
|
unkown
|
page read and write
|
||
545000
|
unkown
|
page read and write
|
||
375000
|
unkown
|
page read and write
|
||
375000
|
unkown
|
page read and write
|
||
32F4000
|
unkown
|
page read and write
|
||
248C000
|
unkown
|
page execute and read and write
|
||
790000
|
unkown
|
page read and write
|
||
1E5000
|
unkown
|
page execute and read and write
|
||
3AF000
|
unkown
|
page read and write
|
||
43D0000
|
unkown
|
page read and write
|
||
A5E000
|
unkown
|
page read and write
|
||
290000
|
unkown
|
page write copy
|
||
350000
|
unkown
|
page read and write
|
||
1A6000
|
unkown
|
page execute and read and write
|
||
9B7000
|
heap private
|
page read and write
|
||
350000
|
unkown
|
page read and write
|
||
542000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
1050000
|
unkown image
|
page readonly
|
||
540000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
137000
|
unkown
|
page execute and read and write
|
||
471E000
|
unkown
|
page read and write
|
||
BC0000
|
unkown
|
page read and write
|
||
AC0000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
6C40000
|
heap private
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
1AA000
|
unkown
|
page execute and read and write
|
||
265000
|
unkown
|
page read and write
|
||
545000
|
unkown
|
page read and write
|
||
1DFB000
|
unkown
|
page readonly
|
||
3C2000
|
unkown
|
page execute and read and write
|
||
720000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page read and write
|
||
BB4000
|
unkown
|
page read and write
|
||
2632000
|
unkown
|
page read and write
|
||
2600000
|
unkown
|
page write copy
|
||
BA0000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page read and write
|
||
A80000
|
heap private
|
page read and write
|
||
437000
|
unkown
|
page execute and read and write
|
||
260000
|
unkown
|
page read and write
|
||
2480000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
60BE000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
53A0000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
2660000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page readonly
|
||
AF0000
|
unkown
|
page read and write
|
||
546000
|
unkown
|
page read and write
|
||
479000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
560E000
|
unkown
|
page read and write | page guard
|
||
710000
|
unkown
|
page read and write
|
||
67E000
|
heap default
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
270000
|
unkown
|
page read and write
|
||
67D000
|
heap default
|
page read and write
|
||
395000
|
unkown
|
page read and write
|
||
134000
|
unkown
|
page read and write
|
||
EBE000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
120000
|
unkown
|
page read and write
|
||
23B000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page readonly
|
||
D50000
|
unkown
|
page readonly
|
||
D05000
|
unkown
|
page read and write
|
||
2511000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
1DB0000
|
heap private
|
page read and write
|
||
24B7000
|
unkown
|
page execute and read and write
|
||
5ACF000
|
unkown
|
page read and write
|
||
5030000
|
unkown
|
page read and write
|
||
24F1000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
10C3000
|
unkown image
|
page readonly
|
||
64EE000
|
unkown
|
page read and write
|
||
4D10000
|
heap private
|
page execute and read and write
|
||
4A8000
|
unkown
|
page read and write
|
||
BB0000
|
unkown
|
page read and write
|
||
B51000
|
unkown
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
2760000
|
heap private
|
page execute and read and write
|
||
570000
|
unkown
|
page read and write
|
||
65B000
|
heap default
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
488000
|
heap default
|
page read and write
|
||
57E0000
|
heap private
|
page read and write
|
||
3656000
|
unkown
|
page read and write
|
||
2A80000
|
unkown
|
page readonly
|
||
540000
|
unkown
|
page read and write
|
||
AA2000
|
heap private
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
B50000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page readonly
|
||
370000
|
unkown
|
page read and write
|
||
33BB000
|
unkown
|
page read and write
|
||
375000
|
unkown
|
page read and write
|
||
10F0000
|
unkown
|
page readonly
|
||
3E95000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
731000
|
unkown
|
page read and write
|
||
4290000
|
unkown
|
page read and write
|
||
3F78000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
496F000
|
unkown
|
page read and write
|
||
33EB000
|
unkown
|
page read and write
|
||
3A2000
|
heap private
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
424000
|
heap default
|
page read and write
|
||
3287000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
376000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
2504000
|
unkown
|
page read and write
|
||
BE0000
|
unkown image
|
page readonly
|
||
49D000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
1F0000
|
heap private
|
page read and write
|
||
140000
|
heap private
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
837000
|
unkown
|
page read and write
|
||
550000
|
heap default
|
page read and write
|
||
700000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
7A0000
|
unkown
|
page read and write
|
||
43CF000
|
stack
|
page read and write
|
||
5D0000
|
heap private
|
page execute and read and write
|
||
5C70000
|
unkown
|
page readonly
|
||
265000
|
unkown
|
page read and write
|
||
D4D000
|
unkown
|
page read and write
|
||
147000
|
unkown
|
page read and write
|
||
5150000
|
unkown
|
page write copy
|
||
4E50000
|
unkown
|
page write copy
|
||
217C000
|
unkown
|
page read and write
|
||
620E000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
4F7F000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
2810000
|
unkown
|
page execute and read and write
|
||
36E3000
|
unkown
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
DFE000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page execute and read and write
|
||
3098000
|
unkown
|
page read and write
|
||
490F000
|
stack
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
3970000
|
unkown
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
4CB000
|
heap default
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
34F7000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
19A000
|
unkown
|
page read and write
|
||
66D000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
568F000
|
unkown
|
page read and write
|
||
520000
|
heap default
|
page read and write
|
||
24FC000
|
unkown
|
page read and write
|
||
5730000
|
unkown
|
page read and write
|
||
2281000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
43E0000
|
unkown
|
page read and write
|
||
34F1000
|
unkown
|
page read and write
|
||
247000
|
stack
|
page read and write
|
||
2EEE000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
2980000
|
unkown
|
page execute and read and write
|
||
1D2000
|
unkown
|
page read and write
|
||
AD0000
|
heap private
|
page execute and read and write
|
||
4158000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
227E000
|
unkown
|
page read and write | page guard
|
||
540000
|
unkown
|
page read and write
|
||
463000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
530000
|
unkown
|
page read and write
|
||
545000
|
unkown
|
page read and write
|
||
1052000
|
unkown image
|
page execute read
|
||
501F000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
463000
|
unkown
|
page read and write
|
||
3218000
|
unkown
|
page read and write
|
||
AD3000
|
unkown
|
page read and write
|
||
EC0000
|
unkown
|
page readonly
|
||
2C77000
|
unkown
|
page readonly
|
||
AF5000
|
unkown
|
page read and write
|
||
2C37000
|
unkown
|
page readonly
|
||
530000
|
unkown
|
page read and write
|
||
560F000
|
unkown
|
page read and write
|
||
BA0000
|
unkown
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
A62000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
2740000
|
unkown
|
page readonly
|
||
2A0E000
|
unkown
|
page read and write
|
||
1052000
|
unkown image
|
page execute read
|
||
3570000
|
unkown
|
page read and write
|
||
4EAE000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
1EC2000
|
heap private
|
page read and write
|
||
5830000
|
unkown
|
page execute and read and write
|
||
370000
|
unkown
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
2E9000
|
stack
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
2A10000
|
unkown
|
page execute and read and write
|
||
44F0000
|
unkown
|
page readonly
|
||
5690000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
B0000
|
unkown
|
page read and write
|
||
463000
|
unkown
|
page read and write
|
||
5760000
|
unkown
|
page execute and read and write
|
||
3FF1000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
650000
|
heap default
|
page read and write
|
||
49E2000
|
unkown
|
page read and write
|
||
2830000
|
unkown
|
page execute and read and write
|
||
2660000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
4D8000
|
heap default
|
page read and write
|
||
1B3000
|
unkown
|
page execute and read and write
|
||
42B0000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
FB4000
|
heap private
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
54A0000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
654000
|
heap default
|
page read and write
|
||
482F000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
24A2000
|
unkown
|
page execute and read and write
|
||
FF0000
|
unkown
|
page read and write
|
||
6C5000
|
unkown
|
page read and write
|
||
5E0000
|
unkown
|
page read and write
|
||
B54000
|
unkown
|
page read and write
|
||
53F000
|
heap default
|
page read and write
|
||
375000
|
unkown
|
page read and write
|
||
4D0E000
|
unkown
|
page read and write
|
||
BE0000
|
unkown image
|
page readonly
|
||
BE0000
|
unkown image
|
page readonly
|
||
837000
|
unkown
|
page read and write
|
||
10D3000
|
unkown image
|
page readonly
|
||
530000
|
unkown
|
page read and write
|
||
52DE000
|
unkown
|
page read and write
|
||
5810000
|
unkown
|
page execute and read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
480000
|
heap default
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
97000
|
heap private
|
page read and write
|
||
25BD000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page execute and read and write
|
||
1B5000
|
unkown
|
page execute and read and write
|
||
508000
|
unkown
|
page read and write
|
||
FA0000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page execute and read and write
|
||
AD0000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
BE0000
|
unkown image
|
page readonly
|
||
3F0000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
48C2000
|
heap private
|
page read and write
|
||
D00000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
2980000
|
unkown
|
page execute and read and write
|
||
200000
|
unkown
|
page read and write
|
||
3033000
|
unkown
|
page read and write
|
||
360000
|
unkown
|
page read and write
|
||
1D6000
|
unkown
|
page execute and read and write
|
||
4CCE000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
442E000
|
unkown
|
page read and write
|
||
4C3000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
133000
|
unkown
|
page execute and read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
A85000
|
heap private
|
page read and write
|
||
643000
|
heap default
|
page read and write
|
||
FD2000
|
heap private
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
13D000
|
unkown
|
page execute and read and write
|
||
B50000
|
unkown
|
page read and write
|
||
545000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
2516000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
4A8E000
|
unkown
|
page read and write
|
||
2710000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
3594000
|
unkown
|
page read and write
|
||
10BC000
|
unkown image
|
page readonly
|
||
2A0000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page execute and read and write
|
||
4B6000
|
unkown
|
page read and write
|
||
492000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
1C70000
|
unkown
|
page readonly
|
||
370000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
BC2000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
1050000
|
unkown image
|
page readonly
|
||
370000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
545000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
3FE000
|
unkown
|
page read and write
|
||
535D000
|
unkown
|
page read and write
|
||
367000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
51E0000
|
heap private
|
page read and write
|
||
287000
|
unkown
|
page read and write | page guard
|
||
33B6000
|
unkown
|
page read and write
|
||
40F8000
|
unkown
|
page read and write
|
||
44F0000
|
unkown
|
page readonly
|
||
26A0000
|
unkown
|
page read and write
|
||
5750000
|
unkown
|
page execute and read and write
|
||
435000
|
unkown
|
page execute and read and write
|
||
FB0000
|
heap private
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
29D0000
|
unkown
|
page readonly
|
||
6A4E000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
474000
|
heap default
|
page read and write
|
||
1B7000
|
unkown
|
page execute and read and write
|
||
265000
|
unkown
|
page read and write
|
||
1E5E000
|
stack
|
page read and write
|
||
2E90000
|
unkown
|
page execute and read and write
|
||
2E80000
|
unkown
|
page execute and read and write
|
||
1E2000
|
unkown
|
page read and write
|
||
BA0000
|
unkown
|
page read and write
|
||
D60000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
AC0000
|
unkown
|
page read and write
|
||
372000
|
unkown
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
4A0000
|
heap default
|
page read and write
|
||
587000
|
heap default
|
page read and write
|
||
545000
|
unkown
|
page read and write
|
||
7C4000
|
heap default
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
2FB0000
|
unkown
|
page readonly
|
||
3B0000
|
heap private
|
page read and write
|
||
13B000
|
unkown
|
page execute and read and write
|
||
400000
|
heap default
|
page read and write
|
||
1010000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
380000
|
heap private
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
1D10000
|
unkown
|
page read and write
|
||
1DD0000
|
unkown
|
page readonly
|
||
200000
|
unkown
|
page read and write
|
||
5B0C000
|
unkown
|
page read and write
|
||
78E000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
BBF000
|
unkown
|
page read and write
|
||
1DC0000
|
heap private
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
407000
|
heap default
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
26A0000
|
unkown
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
38A9000
|
unkown
|
page read and write
|
||
375000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
570E000
|
unkown
|
page read and write
|
||
AB0000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
5512000
|
heap private
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
23E000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
49C7000
|
unkown
|
page read and write
|
||
67E000
|
unkown
|
page read and write
|
||
3B2000
|
unkown
|
page execute and read and write
|
||
28E8000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
528000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
350000
|
unkown
|
page read and write
|
||
BE0000
|
unkown image
|
page readonly
|
||
4B7F000
|
unkown
|
page read and write
|
||
5C6C000
|
unkown
|
page read and write
|
||
49C0000
|
unkown
|
page read and write
|
||
25E5000
|
unkown
|
page read and write
|
||
723000
|
unkown
|
page read and write
|
||
597E000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
5820000
|
unkown
|
page execute and read and write
|
||
68AF000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
36F0000
|
unkown
|
page read and write
|
||
481E000
|
unkown
|
page read and write
|
||
AAD000
|
unkown
|
page read and write
|
||
371000
|
unkown
|
page read and write
|
||
6C5000
|
unkown
|
page read and write
|
||
2E6000
|
unkown
|
page read and write
|
||
D80000
|
heap private
|
page execute and read and write
|
||
3CC000
|
unkown
|
page execute and read and write
|
||
848000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
C63000
|
unkown image
|
page readonly
|
||
570000
|
unkown
|
page read and write
|
||
4C4000
|
heap default
|
page read and write
|
||
612E000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
B50000
|
unkown
|
page read and write
|
||
350000
|
unkown
|
page read and write
|
||
350000
|
unkown
|
page read and write
|
||
620000
|
heap private
|
page read and write
|
||
289F000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
4FDE000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
605E000
|
unkown
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
2A50000
|
unkown
|
page readonly
|
||
730000
|
unkown
|
page read and write
|
||
16B000
|
unkown
|
page execute and read and write
|
||
32F0000
|
unkown
|
page read and write
|
||
4970000
|
unkown
|
page read and write
|
||
10BC000
|
unkown image
|
page readonly
|
||
545000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page readonly
|
||
29DC000
|
unkown
|
page readonly
|
||
26A0000
|
unkown
|
page read and write
|
||
839000
|
heap default
|
page read and write
|
||
21B0000
|
unkown
|
page readonly
|
||
260000
|
unkown
|
page read and write
|
||
24B2000
|
unkown
|
page read and write
|
||
133000
|
unkown
|
page execute and read and write
|
||
677E000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
BA0000
|
unkown
|
page read and write
|
||
4F0000
|
heap default
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
AC0000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
2FF1000
|
unkown
|
page read and write
|
||
42C0000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
59E0000
|
heap private
|
page read and write
|
||
BB0000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
C63000
|
unkown image
|
page readonly
|
||
AC0000
|
unkown
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
586D000
|
unkown
|
page read and write
|
||
340000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
840000
|
unkown
|
page readonly
|
||
2660000
|
unkown
|
page read and write
|
||
586E000
|
unkown
|
page read and write
|
||
450000
|
heap default
|
page read and write
|
||
384000
|
heap private
|
page read and write
|
||
CCE000
|
unkown
|
page read and write | page guard
|
||
4F40000
|
heap private
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
57B000
|
unkown
|
page read and write
|
||
470000
|
heap private
|
page read and write
|
||
167000
|
unkown
|
page execute and read and write
|
||
1E7000
|
unkown
|
page execute and read and write
|
||
542000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
990000
|
unkown
|
page readonly
|
||
AC0000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
498000
|
unkown
|
page read and write
|
||
4B70000
|
unkown
|
page readonly
|
||
370000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page write copy
|
||
545000
|
unkown
|
page read and write
|
||
2090000
|
unkown
|
page readonly
|
||
24B0000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
320000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
7EC000
|
heap default
|
page read and write
|
||
3D0000
|
heap private
|
page read and write
|
||
3EC000
|
unkown
|
page execute and read and write
|
||
3E0000
|
unkown
|
page readonly
|
||
540000
|
unkown
|
page read and write
|
||
2A60000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
545000
|
unkown
|
page read and write
|
||
90000
|
heap default
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
200000
|
heap private
|
page read and write
|
||
2F90000
|
unkown
|
page execute and read and write
|
||
10BC000
|
unkown image
|
page readonly
|
||
260000
|
unkown
|
page read and write
|
||
4BB000
|
heap default
|
page read and write
|
||
AD1000
|
unkown
|
page read and write
|
||
BD0000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
1DD7000
|
unkown
|
page readonly
|
||
48A0000
|
heap private
|
page read and write
|
||
32AA000
|
unkown
|
page read and write
|
||
1BB000
|
unkown
|
page execute and read and write
|
||
380000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
103000
|
unkown
|
page execute and read and write
|
||
24B4000
|
unkown
|
page read and write
|
||
329000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
48A4000
|
heap private
|
page read and write
|
||
33B9000
|
unkown
|
page read and write
|
||
1D90000
|
unkown
|
page readonly
|
||
730000
|
unkown
|
page read and write
|
||
440000
|
heap default
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
4FD000
|
heap default
|
page read and write
|
||
545000
|
unkown
|
page read and write
|
||
3D4000
|
heap private
|
page read and write
|
||
637000
|
heap default
|
page read and write
|
||
9A0000
|
unkown
|
page read and write
|
||
CFD000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
D00000
|
unkown
|
page read and write
|
||
678000
|
heap default
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
AE0000
|
unkown
|
page read and write
|
||
2080000
|
unkown
|
page readonly
|
||
2660000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
4B6000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
D00000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
2EF0000
|
unkown
|
page readonly
|
||
B00000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
53B0000
|
heap private
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
278F000
|
stack
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
AD0000
|
unkown
|
page read and write
|
||
1D62000
|
unkown
|
page execute and read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
4E2000
|
unkown
|
page read and write
|
||
71C000
|
unkown
|
page read and write
|
||
5F3E000
|
unkown
|
page read and write
|
||
637F000
|
unkown
|
page read and write
|
||
9B0000
|
heap private
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
550000
|
unkown
|
page read and write
|
||
541000
|
unkown
|
page read and write
|
||
463000
|
heap default
|
page read and write
|
||
11B000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
1050000
|
unkown image
|
page readonly
|
||
AF0000
|
unkown
|
page read and write
|
||
6890000
|
heap private
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
54AD000
|
unkown
|
page read and write
|
||
371E000
|
unkown
|
page read and write
|
||
48AE000
|
unkown
|
page read and write
|
||
3685000
|
unkown
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
2A5000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page readonly
|
||
390000
|
unkown
|
page execute and read and write
|
||
AD0000
|
unkown
|
page read and write
|
||
AC0000
|
unkown
|
page read and write
|
||
4954000
|
heap private
|
page read and write
|
||
B50000
|
unkown
|
page read and write
|
||
510000
|
heap default
|
page read and write
|
||
1F7000
|
heap private
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
13D000
|
unkown
|
page execute and read and write
|
||
1CB000
|
unkown
|
page read and write
|
||
2EB0000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
549000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
28DE000
|
stack
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
290000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
4F7E000
|
unkown
|
page read and write | page guard
|
||
1D70000
|
heap private
|
page execute and read and write
|
||
720000
|
unkown
|
page read and write
|
||
1B4000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
C4C000
|
unkown image
|
page readonly
|
||
2660000
|
unkown
|
page read and write
|
||
7A0000
|
heap default
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
63AE000
|
unkown
|
page read and write
|
||
1B2000
|
unkown
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
540000
|
unkown
|
page read and write
|
||
3BA000
|
unkown
|
page execute and read and write
|
||
558D000
|
unkown
|
page read and write
|
||
2F8E000
|
unkown
|
page read and write
|
||
750000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
617000
|
heap default
|
page read and write
|
||
24BB000
|
unkown
|
page execute and read and write
|
||
227F000
|
unkown
|
page read and write
|
||
8C0000
|
heap private
|
page execute and read and write
|
||
4F5000
|
unkown
|
page read and write
|
||
C53000
|
unkown image
|
page readonly
|
||
10D3000
|
unkown image
|
page readonly
|
||
2660000
|
unkown
|
page read and write
|
||
53B000
|
heap default
|
page read and write
|
||
AD0000
|
unkown
|
page read and write
|
||
4237000
|
unkown
|
page read and write
|
||
15A000
|
unkown
|
page execute and read and write
|
||
2600000
|
unkown
|
page read and write
|
||
10C3000
|
unkown image
|
page readonly
|
||
10D3000
|
unkown image
|
page readonly
|
||
49D4000
|
unkown
|
page read and write
|
||
AE0000
|
unkown
|
page read and write
|
||
BE0000
|
unkown image
|
page readonly
|
||
289000
|
stack
|
page read and write
|
||
12A000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
520000
|
unkown
|
page read and write
|
||
7C0000
|
unkown
|
page read and write
|
||
375000
|
unkown
|
page read and write
|
||
43C0000
|
unkown
|
page readonly
|
||
80000
|
unkown
|
page read and write
|
||
810000
|
unkown
|
page readonly
|
||
265000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
28DE000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
570000
|
unkown
|
page read and write
|
||
375000
|
unkown
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
3169000
|
unkown
|
page read and write
|
||
4E70000
|
unkown
|
page readonly
|
||
1050000
|
unkown image
|
page readonly
|
||
370000
|
unkown
|
page read and write
|
||
3E71000
|
unkown
|
page read and write
|
||
4298000
|
unkown
|
page read and write
|
||
5B10000
|
unkown
|
page readonly
|
||
2660000
|
unkown
|
page read and write
|
||
287E000
|
unkown
|
page read and write
|
||
360000
|
unkown
|
page execute and read and write
|
||
36D1000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
2FD5000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
B9F000
|
unkown
|
page read and write
|
||
545000
|
unkown
|
page read and write
|
||
27C0000
|
unkown
|
page read and write
|
||
1020000
|
unkown
|
page read and write
|
||
1D5C000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
10C3000
|
unkown image
|
page readonly
|
||
B50000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
457000
|
heap default
|
page read and write
|
||
54F0000
|
heap private
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
375000
|
unkown
|
page read and write
|
||
503E000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
375000
|
unkown
|
page read and write
|
||
447000
|
heap default
|
page read and write
|
||
83B000
|
unkown
|
page read and write
|
||
10C3000
|
unkown image
|
page readonly
|
||
BE2000
|
unkown image
|
page execute read
|
||
B10000
|
heap private
|
page read and write
|
||
372000
|
unkown
|
page read and write
|
||
23BE000
|
unkown
|
page read and write | page guard
|
||
1DB0000
|
unkown
|
page readonly
|
||
2A5E000
|
unkown
|
page read and write | page guard
|
||
43C000
|
unkown
|
page read and write
|
||
29C0000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
4950000
|
heap private
|
page read and write
|
||
372000
|
unkown
|
page read and write
|
||
3FD8000
|
unkown
|
page read and write
|
||
5800000
|
unkown
|
page read and write
|
||
2790000
|
unkown
|
page execute and read and write
|
||
C53000
|
unkown image
|
page readonly
|
||
52E0000
|
heap private
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
530000
|
heap default
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
2250000
|
heap private
|
page execute and read and write
|
||
44A000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page read and write
|
||
360000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
B0A000
|
unkown
|
page read and write
|
||
10BC000
|
unkown image
|
page readonly
|
||
100000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
53F0000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
C53000
|
unkown image
|
page readonly
|
||
487000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
5970000
|
heap private
|
page read and write
|
||
317B000
|
unkown
|
page read and write
|
||
545000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
498D000
|
unkown
|
page read and write
|
||
2FD0000
|
unkown
|
page readonly
|
||
43B000
|
unkown
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
6E2000
|
unkown
|
page read and write
|
||
24B6000
|
unkown
|
page read and write
|
||
48E0000
|
unkown
|
page readonly
|
||
B00000
|
unkown
|
page read and write
|
||
65BE000
|
unkown
|
page read and write
|
||
104000
|
unkown
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
34F1000
|
unkown
|
page read and write
|
||
33E000
|
stack
|
page read and write
|
||
AC0000
|
unkown
|
page read and write
|
||
377000
|
stack
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
1DC0000
|
unkown
|
page readonly
|
||
744000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
488E000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
15D000
|
unkown
|
page execute and read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
FB000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page read and write
|
||
48D0000
|
heap private
|
page execute and read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
2160000
|
unkown
|
page read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
260000
|
unkown
|
page read and write
|
||
3981000
|
unkown
|
page read and write
|
||
4C9000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
515E000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
529000
|
heap default
|
page read and write
|
||
3281000
|
unkown
|
page read and write
|
||
54F5000
|
heap private
|
page read and write
|
||
565000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
A0000
|
unkown
|
page write copy
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2E71000
|
unkown
|
page read and write
|
||
27B0000
|
unkown
|
page execute and read and write
|
||
542000
|
unkown
|
page read and write
|
||
10D3000
|
unkown image
|
page readonly
|
||
29A0000
|
unkown
|
page execute and read and write
|
||
2482000
|
unkown
|
page execute and read and write
|
||
5230000
|
unkown
|
page write copy
|
||
1CD000
|
unkown
|
page execute and read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
580000
|
heap default
|
page read and write
|
||
66DE000
|
unkown
|
page read and write
|
||
580000
|
heap private
|
page execute and read and write
|
||
450000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
4B90000
|
unkown
|
page readonly
|
||
1000000
|
unkown
|
page read and write
|
||
B53000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
1052000
|
unkown image
|
page execute read
|
||
49B000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
C4C000
|
unkown image
|
page readonly
|
||
570000
|
unkown
|
page execute and read and write
|
||
48C000
|
heap default
|
page read and write
|
||
553E000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
63E000
|
unkown
|
page read and write
|
||
64AE000
|
unkown
|
page read and write
|
||
2990000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
26B000
|
unkown
|
page read and write
|
||
BB0000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
2628000
|
unkown
|
page read and write
|
||
32F2000
|
unkown
|
page read and write
|
||
29D7000
|
unkown
|
page readonly
|
||
BE2000
|
unkown image
|
page execute read
|
||
3D0000
|
unkown
|
page readonly
|
||
3D0000
|
unkown
|
page readonly
|
||
6BA0000
|
heap private
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
795000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
CBF000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
1DDC000
|
unkown
|
page readonly
|
||
BAE000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
5A4000
|
heap default
|
page read and write
|
||
4540000
|
unkown
|
page readonly
|
||
52E0000
|
unkown
|
page write copy
|
||
C53000
|
unkown image
|
page readonly
|
||
720000
|
unkown
|
page read and write
|
||
33C1000
|
unkown
|
page read and write
|
||
B50000
|
unkown
|
page read and write
|
||
24FA000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
680000
|
heap private
|
page execute and read and write
|
||
27A0000
|
unkown
|
page readonly
|
||
4DA000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
565000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
330000
|
heap default
|
page read and write
|
||
90000
|
heap private
|
page read and write
|
||
289E000
|
unkown
|
page read and write | page guard
|
||
7D0000
|
heap private
|
page execute and read and write
|
||
260000
|
unkown
|
page read and write
|
||
4B6000
|
heap default
|
page read and write
|
||
3F2000
|
heap private
|
page read and write
|
||
44E000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
1EA0000
|
heap private
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
2A0000
|
unkown
|
page read and write
|
||
4015000
|
unkown
|
page read and write
|
||
395000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
790000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
BA0000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page execute and read and write
|
||
4EE0000
|
unkown
|
page readonly
|
||
1EB000
|
unkown
|
page execute and read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
2546000
|
unkown
|
page read and write
|
||
B50000
|
unkown
|
page read and write
|
||
375000
|
unkown
|
page read and write
|
||
3061000
|
unkown
|
page read and write
|
||
268000
|
unkown
|
page read and write
|
||
4280000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
3A7000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
5340000
|
unkown
|
page read and write
|
||
493000
|
heap default
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
29FB000
|
unkown
|
page readonly
|
||
B0B000
|
unkown
|
page read and write
|
||
3BE000
|
unkown
|
page read and write
|
||
71E000
|
unkown
|
page read and write
|
||
4118000
|
unkown
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
5C0000
|
heap default
|
page read and write
|
||
2600000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
790000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
3E2000
|
unkown
|
page execute and read and write
|
||
2A40000
|
unkown
|
page read and write
|
||
262C000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
5CD000
|
heap default
|
page read and write
|
||
282E000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
2660000
|
unkown
|
page read and write
|
||
320000
|
unkown
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
5F0000
|
heap private
|
page read and write
|
||
AC0000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
260000
|
unkown
|
page read and write
|
||
268000
|
unkown
|
page read and write
|
||
D50000
|
unkown
|
page read and write
|
||
FA0000
|
unkown
|
page read and write
|
||
1EE0000
|
unkown
|
page readonly
|
||
3C0000
|
unkown
|
page read and write
|
||
2080000
|
unkown
|
page readonly
|
||
26A0000
|
unkown
|
page read and write
|
||
24FE000
|
stack
|
page read and write
|
||
286000
|
unkown
|
page read and write
|
||
265000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
5049000
|
unkown
|
page read and write
|
||
2A90000
|
unkown
|
page readonly
|
||
570000
|
unkown
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
29CE000
|
unkown
|
page read and write
|
||
42A0000
|
unkown
|
page read and write
|
||
BB0000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
2AB000
|
unkown
|
page read and write
|
||
7A7000
|
heap default
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
C4C000
|
unkown image
|
page readonly
|
||
29B0000
|
unkown
|
page execute and read and write
|
||
57CE000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page read and write
|
||
7A0000
|
unkown
|
page read and write
|
||
2F0000
|
unkown
|
page read and write
|
||
31E1000
|
unkown
|
page read and write
|
||
117000
|
heap private
|
page read and write
|
||
C63000
|
unkown image
|
page readonly
|
||
320000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
501E000
|
unkown
|
page read and write | page guard
|
||
560000
|
unkown
|
page read and write
|
||
50D000
|
unkown
|
page read and write
|
||
6C00000
|
heap private
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
There are 1233 hidden memdumps, click here to show them.