Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RFQ ..doc
|
Rich Text Format data, unknown version
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\ZhIOjFmINIXbKXm[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\tmpBFD6.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\cAFIUeWyVQPJe.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 58596 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{73207C3D-FA20-48C4-87C4-17800DB89026}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{EC948C2F-5218-4A38-A66D-F6FECB16C1E9}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CabCA24.tmp
|
Microsoft Cabinet archive data, 58596 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TarCA25.tmp
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\RFQ ..LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:18
2020, mtime=Wed Aug 26 14:08:18 2020, atime=Mon Apr 12 20:22:35 2021, length=762054, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$RFQ ..doc
|
data
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\cAFIUeWyVQPJe' /XML 'C:\Users\user\AppData\Local\Temp\tmpBFD6.tmp'
|
||
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://rotronics.com.ph/docxxx/dec/ZhIOjFmINIXbKXm.exe
|
203.167.7.88
|
||
http://www.certicamara.com/certicamaraca.crl0
|
unknown
|
||
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
|
unknown
|
||
http://127.0.0.1:HTTP/1.1
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
|
unknown
|
||
http://DynDns.comDynDNS
|
unknown
|
||
http://www.e-me.lv/repository0
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://www.acabogacia.org/doc0
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://WWI0qtWzJvCpYcgDStzT.orgDL
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://www.ancert.com/cps0
|
unknown
|
||
http://www.dnie.es/dpc0
|
unknown
|
||
http://www.acabogacia.org0
|
unknown
|
||
https://rca.e-szigno.hu/ocsp0-
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
http://repository.swisssign.com/0
|
unknown
|
||
http://crl.lt/root-c/cacrl.crl0
|
unknown
|
||
http://mail.privateemail.com
|
unknown
|
||
http://WWI0qtWzJvCpYcgDStzT.org
|
unknown
|
||
https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://www.certicamara.com/certicamaraca.crl0;
|
unknown
|
||
http://www.e-szigno.hu/RootCA.crt0
|
unknown
|
||
http://www.sk.ee/cps/0
|
unknown
|
||
http://www.e-szigno.hu/SZSZ/0
|
unknown
|
||
http://www.quovadis.bm0
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://ZAGYny.com
|
unknown
|
||
http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAII.crl0
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
https://www.netlock.net/docs
|
unknown
|
||
http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
|
unknown
|
||
http://servername/isapibackend.dll
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://www.e-trust.be/CPS/QNcerts
|
unknown
|
There are 34 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
rotronics.com.ph
|
203.167.7.88
|
||
mail.privateemail.com
|
198.54.122.60
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
203.167.7.88
|
rotronics.com.ph
|
Philippines
|
||
198.54.122.60
|
mail.privateemail.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
zp0
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
sq0
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
:s0
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ED662
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F692F
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductNonBootFilesIntl_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F692F
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F692F
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F692F
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductNonBootFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
||
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
FontCachePath
|
||
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\rghbyjuyktyjrthbgvfsfhytrrgfsd.exe
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
There are 367 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
39FD000
|
unkown
|
page read and write
|
||
285E000
|
unkown
|
page read and write
|
||
2BBE000
|
unkown
|
page read and write
|
||
2821000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
43BC000
|
unkown
|
page read and write
|
||
1130000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
4F39000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
6597000
|
unkown
|
page read and write
|
||
19A000
|
heap default
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
F80000
|
unkown
|
page readonly
|
||
6B6C000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
B688000
|
unkown
|
page read and write
|
||
6F4F000
|
unkown
|
page read and write
|
||
60FF000
|
unkown
|
page read and write
|
||
72CE000
|
unkown
|
page read and write
|
||
1360000
|
unkown image
|
page readonly
|
||
520000
|
heap private
|
page read and write
|
||
A060000
|
unkown
|
page read and write
|
||
8C5E000
|
unkown
|
page read and write
|
||
DDC000
|
unkown
|
page read and write
|
||
6652000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
1412000
|
unkown image
|
page readonly
|
||
6A08000
|
unkown
|
page read and write
|
||
2A83000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page readonly
|
||
6D0000
|
unkown
|
page read and write
|
||
E00000
|
heap private
|
page execute and read and write
|
||
450000
|
unkown
|
page execute and read and write
|
||
305000
|
unkown
|
page read and write
|
||
5C0000
|
heap private
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
CE5F000
|
unkown
|
page read and write
|
||
D85F000
|
unkown
|
page read and write
|
||
4F62000
|
unkown
|
page read and write
|
||
63E3000
|
unkown
|
page read and write
|
||
B6B2000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
5B0000
|
heap default
|
page read and write
|
||
6657000
|
unkown
|
page read and write
|
||
4A00000
|
unkown
|
page read and write
|
||
32D000
|
heap default
|
page read and write
|
||
5A1000
|
unkown
|
page read and write
|
||
56DE000
|
unkown
|
page read and write
|
||
5680000
|
unkown
|
page read and write
|
||
6445000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
BF8D000
|
unkown
|
page read and write
|
||
E22B000
|
unkown
|
page read and write
|
||
6A57000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
C485000
|
unkown
|
page read and write
|
||
295A000
|
unkown
|
page read and write
|
||
CE82000
|
unkown
|
page read and write
|
||
6C5A000
|
unkown
|
page read and write
|
||
A30000
|
unkown
|
page read and write
|
||
AFA1000
|
unkown
|
page read and write
|
||
5C4000
|
unkown
|
page read and write
|
||
41B000
|
unkown
|
page execute and read and write
|
||
6416000
|
unkown
|
page read and write
|
||
59D000
|
unkown
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
E25A000
|
unkown
|
page read and write
|
||
3F1000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
6672000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
E261000
|
unkown
|
page read and write
|
||
CE26000
|
unkown
|
page read and write
|
||
B960000
|
unkown
|
page read and write
|
||
B6AB000
|
unkown
|
page read and write
|
||
4A00000
|
heap private
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
294C000
|
unkown
|
page read and write
|
||
B412000
|
unkown
|
page read and write
|
||
465000
|
unkown
|
page read and write
|
||
666F000
|
unkown
|
page read and write
|
||
6EE1000
|
unkown
|
page read and write
|
||
30B000
|
unkown
|
page read and write
|
||
A5A1000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
BE12000
|
unkown
|
page read and write
|
||
C453000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
62C6000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
C906000
|
unkown
|
page read and write
|
||
C1E0000
|
unkown
|
page read and write
|
||
DF92000
|
unkown
|
page read and write
|
||
C60000
|
unkown
|
page readonly
|
||
4F92000
|
unkown
|
page read and write
|
||
D826000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
415000
|
unkown
|
page execute and read and write
|
||
674B000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
4E0000
|
heap private
|
page read and write
|
||
308000
|
unkown
|
page read and write
|
||
65C1000
|
unkown
|
page read and write
|
||
4F76000
|
unkown
|
page read and write
|
||
3E3000
|
unkown
|
page execute and read and write
|
||
460000
|
unkown
|
page read and write
|
||
B6AD000
|
unkown
|
page read and write
|
||
4EB0000
|
unkown
|
page read and write
|
||
726E000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
D834000
|
unkown
|
page read and write
|
||
449000
|
unkown
|
page read and write
|
||
298A000
|
unkown
|
page read and write
|
||
51B000
|
unkown
|
page read and write
|
||
A6D000
|
unkown
|
page read and write
|
||
1362000
|
unkown image
|
page execute read
|
||
B6D8000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
B700000
|
unkown
|
page read and write
|
||
A30000
|
unkown
|
page read and write
|
||
71F000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
47C000
|
unkown
|
page read and write
|
||
29B000
|
unkown
|
page execute and read and write
|
||
9E0000
|
unkown
|
page read and write
|
||
6210000
|
unkown
|
page read and write
|
||
63B4000
|
unkown
|
page read and write
|
||
6583000
|
unkown
|
page read and write
|
||
AD0000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
5C4000
|
heap private
|
page read and write
|
||
12BD000
|
unkown
|
page read and write
|
||
B49E000
|
unkown
|
page read and write
|
||
B6DA000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page readonly
|
||
67D0000
|
unkown
|
page read and write
|
||
E22D000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
2AFE000
|
unkown
|
page read and write
|
||
D82B000
|
unkown
|
page read and write
|
||
533C000
|
unkown
|
page read and write
|
||
6D12000
|
unkown
|
page read and write
|
||
2910000
|
unkown
|
page read and write
|
||
6A40000
|
unkown
|
page read and write
|
||
B4A1000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
B6DF000
|
unkown
|
page read and write
|
||
B6A8000
|
unkown
|
page read and write
|
||
780000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
D40000
|
unkown
|
page read and write
|
||
61DE000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
63B0000
|
unkown
|
page read and write
|
||
E23C000
|
unkown
|
page read and write
|
||
E255000
|
unkown
|
page read and write
|
||
4F18000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
6A38000
|
unkown
|
page read and write
|
||
6984000
|
unkown
|
page read and write
|
||
6BF5000
|
unkown
|
page read and write
|
||
64AC000
|
unkown
|
page read and write
|
||
E282000
|
unkown
|
page read and write
|
||
5B8E000
|
unkown
|
page read and write
|
||
6BB9000
|
unkown
|
page read and write
|
||
263000
|
unkown
|
page execute and read and write
|
||
661E000
|
unkown
|
page read and write
|
||
62D0000
|
unkown
|
page read and write
|
||
635A000
|
unkown
|
page read and write
|
||
6614000
|
unkown
|
page read and write
|
||
790000
|
unkown
|
page read and write
|
||
7420000
|
heap private
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
E521000
|
unkown
|
page read and write
|
||
96A1000
|
unkown
|
page read and write
|
||
6778000
|
unkown
|
page read and write
|
||
69B3000
|
unkown
|
page read and write
|
||
445000
|
unkown
|
page read and write
|
||
659B000
|
unkown
|
page read and write
|
||
D832000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
6113000
|
unkown
|
page read and write
|
||
56E0000
|
unkown
|
page read and write
|
||
7830000
|
unkown
|
page read and write
|
||
4FAE000
|
unkown
|
page read and write
|
||
2F0000
|
heap default
|
page read and write
|
||
A78000
|
heap private
|
page read and write
|
||
62C3000
|
unkown
|
page read and write
|
||
2A6E000
|
unkown
|
page read and write
|
||
DD08000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
6627000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
4F54000
|
unkown
|
page read and write
|
||
4B90000
|
heap private
|
page execute and read and write
|
||
500000
|
unkown
|
page read and write
|
||
5520000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
CE58000
|
unkown
|
page read and write
|
||
E208000
|
unkown
|
page read and write
|
||
1412000
|
unkown image
|
page readonly
|
||
660E000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
E234000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
E237000
|
unkown
|
page read and write
|
||
ACD3000
|
unkown
|
page read and write
|
||
83BB000
|
unkown
|
page read and write
|
||
E285000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
B20000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
562C000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
E021000
|
unkown
|
page read and write
|
||
4F1D000
|
unkown
|
page read and write
|
||
444000
|
unkown
|
page read and write
|
||
F7F000
|
unkown
|
page read and write
|
||
6591000
|
unkown
|
page read and write
|
||
4B4C000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
C4E000
|
unkown
|
page read and write | page guard
|
||
3F0000
|
unkown
|
page read and write
|
||
66C9000
|
unkown
|
page read and write
|
||
6599000
|
unkown
|
page read and write
|
||
9B12000
|
unkown
|
page read and write
|
||
4AB0000
|
heap private
|
page read and write
|
||
295F000
|
unkown
|
page read and write
|
||
27D000
|
unkown
|
page execute and read and write
|
||
E51E000
|
unkown
|
page read and write
|
||
286000
|
unkown
|
page execute and read and write
|
||
D121000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
300000
|
unkown
|
page read and write
|
||
B6B7000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
6500000
|
unkown
|
page read and write
|
||
C42D000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
E280000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
B705000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
63AA000
|
unkown
|
page read and write
|
||
190000
|
heap default
|
page read and write
|
||
81E2000
|
unkown
|
page read and write
|
||
69BB000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
733A000
|
unkown
|
page read and write
|
||
62C6000
|
unkown
|
page read and write
|
||
620000
|
heap private
|
page execute and read and write
|
||
516000
|
unkown
|
page read and write
|
||
6230000
|
unkown
|
page read and write
|
||
B40000
|
unkown
|
page read and write
|
||
6E7A000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
67F8000
|
unkown
|
page read and write
|
||
6A16000
|
unkown
|
page read and write
|
||
6A8D000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
7CE2000
|
unkown
|
page read and write
|
||
683E000
|
unkown
|
page read and write
|
||
445000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
B6E1000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
69D2000
|
unkown
|
page read and write
|
||
6A77000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
5810000
|
heap private
|
page read and write
|
||
61E0000
|
unkown
|
page read and write
|
||
AD0000
|
unkown
|
page readonly
|
||
D837000
|
unkown
|
page read and write
|
||
445000
|
unkown
|
page read and write
|
||
6391000
|
unkown
|
page read and write
|
||
D7E000
|
unkown
|
page read and write
|
||
ACAD000
|
unkown
|
page read and write
|
||
D85D000
|
unkown
|
page read and write
|
||
768C000
|
unkown
|
page read and write
|
||
65E5000
|
unkown
|
page read and write
|
||
C42F000
|
unkown
|
page read and write
|
||
D880000
|
unkown
|
page read and write
|
||
C721000
|
unkown
|
page read and write
|
||
65F0000
|
unkown
|
page readonly
|
||
E5D000
|
stack
|
page read and write
|
||
4F76000
|
unkown
|
page read and write
|
||
3829000
|
unkown
|
page read and write
|
||
BB86000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
1412000
|
unkown image
|
page readonly
|
||
730000
|
unkown
|
page read and write
|
||
407000
|
unkown
|
page execute and read and write
|
||
634C000
|
heap private
|
page read and write
|
||
4C70000
|
unkown
|
page readonly
|
||
495E000
|
unkown
|
page read and write
|
||
2F7000
|
heap default
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
511D000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
4EE000
|
unkown
|
page read and write
|
||
445000
|
unkown
|
page read and write
|
||
336000
|
heap default
|
page read and write
|
||
A59E000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
A560000
|
unkown
|
page read and write
|
||
7D6F000
|
unkown
|
page read and write
|
||
6161000
|
unkown
|
page read and write
|
||
ACE1000
|
unkown
|
page read and write
|
||
7D30000
|
unkown
|
page read and write
|
||
C221000
|
unkown
|
page read and write
|
||
4F37000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
CE39000
|
unkown
|
page read and write
|
||
AF60000
|
unkown
|
page read and write
|
||
8370000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
13A000
|
unkown
|
page read and write
|
||
6625000
|
unkown
|
page read and write
|
||
725000
|
unkown
|
page read and write
|
||
786F000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
D308000
|
unkown
|
page read and write
|
||
ACBC000
|
unkown
|
page read and write
|
||
E706000
|
unkown
|
page read and write
|
||
26D000
|
unkown
|
page execute and read and write
|
||
569D000
|
unkown
|
page read and write
|
||
445000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
1360000
|
unkown image
|
page readonly
|
||
E492000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
B6F000
|
unkown
|
page read and write
|
||
D850000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
5100000
|
unkown
|
page read and write
|
||
91A1000
|
unkown
|
page read and write
|
||
A09E000
|
unkown
|
page read and write
|
||
60E7000
|
unkown
|
page read and write
|
||
8720000
|
unkown
|
page readonly
|
||
7D72000
|
unkown
|
page read and write
|
||
6494000
|
unkown
|
page read and write
|
||
80000
|
heap default
|
page read and write
|
||
61F2000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
62D0000
|
unkown
|
page read and write
|
||
B460000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
E239000
|
unkown
|
page read and write
|
||
4C30000
|
heap private
|
page execute and read and write
|
||
3E4000
|
unkown
|
page read and write
|
||
DAE0000
|
unkown
|
page read and write
|
||
7EF58000
|
unkown
|
page execute and read and write
|
||
D853000
|
unkown
|
page read and write
|
||
D855000
|
unkown
|
page read and write
|
||
7543000
|
unkown
|
page read and write
|
||
CE28000
|
unkown
|
page read and write
|
||
BB88000
|
unkown
|
page read and write
|
||
4A04000
|
heap private
|
page read and write
|
||
28AA000
|
unkown
|
page read and write
|
||
CE7D000
|
unkown
|
page read and write
|
||
9660000
|
unkown
|
page read and write
|
||
B6A6000
|
unkown
|
page read and write
|
||
417000
|
unkown
|
page execute and read and write
|
||
49F0000
|
heap private
|
page read and write
|
||
C692000
|
unkown
|
page read and write
|
||
63E5000
|
unkown
|
page read and write
|
||
56F9000
|
unkown
|
page read and write
|
||
28A000
|
unkown
|
page execute and read and write
|
||
4BD0000
|
unkown
|
page readonly
|
||
752B000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
6272000
|
unkown
|
page read and write
|
||
65DE000
|
unkown
|
page read and write
|
||
1360000
|
unkown image
|
page readonly
|
||
4D0000
|
unkown
|
page read and write
|
||
AD05000
|
unkown
|
page read and write
|
||
445000
|
unkown
|
page read and write
|
||
513000
|
unkown
|
page read and write
|
||
71E000
|
unkown
|
page read and write | page guard
|
||
7E0000
|
unkown
|
page readonly
|
||
CE08000
|
unkown
|
page read and write
|
||
62D6000
|
unkown
|
page read and write
|
||
12E4000
|
heap private
|
page read and write
|
||
58AC000
|
unkown
|
page read and write
|
||
6620000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
65CA000
|
unkown
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
E258000
|
unkown
|
page read and write
|
||
C4F000
|
unkown
|
page read and write
|
||
4EF4000
|
unkown
|
page read and write
|
||
5E20000
|
unkown
|
page readonly
|
||
300000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
A30000
|
unkown
|
page read and write
|
||
285C000
|
unkown
|
page read and write
|
||
1F3000
|
heap default
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
D861000
|
unkown
|
page read and write
|
||
442000
|
unkown
|
page read and write
|
||
680C000
|
unkown
|
page read and write
|
||
E232000
|
unkown
|
page read and write
|
||
DB21000
|
unkown
|
page read and write
|
||
4F37000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
CE80000
|
unkown
|
page read and write
|
||
6C35000
|
unkown
|
page read and write
|
||
969E000
|
unkown
|
page read and write
|
||
59EE000
|
unkown
|
page read and write
|
||
412000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
790000
|
unkown
|
page read and write
|
||
D5BE000
|
stack
|
page read and write
|
||
29E3000
|
unkown
|
page read and write
|
||
66BA000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
5AB000
|
unkown
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
62D0000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
AD0000
|
unkown
|
page read and write
|
||
6787000
|
unkown
|
page read and write
|
||
150000
|
heap default
|
page read and write
|
||
CE50000
|
unkown
|
page read and write
|
||
614E000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
292000
|
unkown
|
page read and write
|
||
6339000
|
unkown
|
page read and write
|
||
D5C0000
|
unkown
|
page read and write
|
||
B702000
|
unkown
|
page read and write
|
||
5815000
|
heap private
|
page read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
725000
|
unkown
|
page read and write
|
||
CE55000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
F80000
|
unkown
|
page readonly
|
||
DD06000
|
unkown
|
page read and write
|
||
2CAE000
|
unkown
|
page read and write
|
||
65EE000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
56EF000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
D592000
|
unkown
|
page read and write
|
||
B6DD000
|
unkown
|
page read and write
|
||
7C4000
|
heap default
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
2C06000
|
unkown
|
page read and write
|
||
6690000
|
unkown
|
page read and write
|
||
1362000
|
unkown image
|
page execute read
|
||
ACA6000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page execute and read and write
|
||
305000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
F7E000
|
unkown
|
page read and write | page guard
|
||
3F0000
|
unkown
|
page read and write
|
||
664F000
|
unkown
|
page read and write
|
||
491F000
|
unkown
|
page read and write
|
||
67B5000
|
unkown
|
page read and write
|
||
CE85000
|
unkown
|
page read and write
|
||
D882000
|
unkown
|
page read and write
|
||
610E000
|
unkown
|
page read and write
|
||
DA92000
|
unkown
|
page read and write
|
||
174000
|
heap default
|
page read and write
|
||
4A22000
|
heap private
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
6A14000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
6502000
|
unkown
|
page read and write
|
||
6388000
|
unkown
|
page read and write
|
||
D40000
|
unkown
|
page read and write
|
||
C6E0000
|
unkown
|
page read and write
|
||
28E8000
|
unkown
|
page read and write
|
||
2B11000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
6DA6000
|
unkown
|
page read and write
|
||
2C4E000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
2CBA000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
69FE000
|
unkown
|
page read and write
|
||
3889000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
38A9000
|
unkown
|
page read and write
|
||
D5C0000
|
unkown
|
page read and write
|
||
C42B000
|
unkown
|
page read and write
|
||
2C4C000
|
unkown
|
page read and write
|
||
8C9E000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
6812000
|
unkown
|
page read and write
|
||
C437000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
8CA1000
|
unkown
|
page read and write
|
||
77E000
|
unkown
|
page read and write
|
||
ACDA000
|
unkown
|
page read and write
|
||
C432000
|
unkown
|
page read and write
|
||
4F62000
|
unkown
|
page read and write
|
||
C434000
|
unkown
|
page read and write
|
||
83BA000
|
unkown
|
page read and write
|
||
78B0000
|
unkown
|
page read and write
|
||
62F4000
|
unkown
|
page read and write
|
||
6EA5000
|
unkown
|
page read and write
|
||
5B0000
|
unkown
|
page read and write
|
||
65CD000
|
unkown
|
page read and write
|
||
C45D000
|
unkown
|
page read and write
|
||
ACB2000
|
unkown
|
page read and write
|
||
1540000
|
heap private
|
page read and write
|
||
567E000
|
unkown
|
page read and write
|
||
5200000
|
unkown
|
page read and write
|
||
657F000
|
unkown
|
page read and write
|
||
9612000
|
unkown
|
page read and write
|
||
9B9E000
|
unkown
|
page read and write
|
||
4F8000
|
unkown
|
page read and write
|
||
604D000
|
unkown
|
page read and write
|
||
20B000
|
heap default
|
page read and write
|
||
69C5000
|
unkown
|
page read and write
|
||
445000
|
unkown
|
page read and write
|
||
7526000
|
unkown
|
page read and write
|
||
6340000
|
heap private
|
page read and write
|
||
569C000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page readonly
|
||
6ACB000
|
unkown
|
page read and write
|
||
9112000
|
unkown
|
page read and write
|
||
C57000
|
heap private
|
page read and write
|
||
D82D000
|
unkown
|
page read and write
|
||
53C6000
|
heap private
|
page read and write
|
||
D0AD000
|
stack
|
page read and write
|
||
D828000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
CE3C000
|
unkown
|
page read and write
|
||
ACB7000
|
unkown
|
page read and write
|
||
7EE000
|
heap default
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
ACAB000
|
unkown
|
page read and write
|
||
649F000
|
unkown
|
page read and write
|
||
794000
|
unkown
|
page read and write
|
||
1412000
|
unkown image
|
page readonly
|
||
DB1E000
|
unkown
|
page read and write
|
||
6242000
|
unkown
|
page read and write
|
||
CE37000
|
unkown
|
page read and write
|
||
C408000
|
unkown
|
page read and write
|
||
63DD000
|
unkown
|
page read and write
|
||
A30000
|
unkown
|
page read and write
|
||
2C7C000
|
unkown
|
page read and write
|
||
AD0000
|
unkown
|
page read and write
|
||
C47D000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
ACB9000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
6A4B000
|
unkown
|
page read and write
|
||
A31000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
6A7A000
|
unkown
|
page read and write
|
||
3849000
|
unkown
|
page read and write
|
||
666B000
|
unkown
|
page read and write
|
||
919E000
|
unkown
|
page read and write
|
||
242000
|
unkown
|
page read and write
|
||
649D000
|
unkown
|
page read and write
|
||
D858000
|
unkown
|
page read and write
|
||
CE34000
|
unkown
|
page read and write
|
||
63B7000
|
unkown
|
page read and write
|
||
541E000
|
unkown
|
page read and write
|
||
CE53000
|
unkown
|
page read and write
|
||
6ABB000
|
unkown
|
page read and write
|
||
A0A1000
|
unkown
|
page read and write
|
||
B99E000
|
unkown
|
page read and write
|
||
62D6000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
CEEE000
|
unkown
|
page read and write
|
||
4FA6000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
6AB9000
|
unkown
|
page read and write
|
||
4F92000
|
unkown
|
page read and write
|
||
D6BE000
|
unkown
|
page read and write
|
||
1302000
|
heap private
|
page read and write
|
||
D839000
|
unkown
|
page read and write
|
||
B6D5000
|
unkown
|
page read and write
|
||
6E97000
|
unkown
|
page read and write
|
||
A2E000
|
unkown
|
page read and write
|
||
C45F000
|
unkown
|
page read and write
|
||
4B9E000
|
unkown
|
page read and write
|
||
79B000
|
unkown
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
56E1000
|
unkown
|
page read and write
|
||
AF12000
|
unkown
|
page read and write
|
||
8371000
|
unkown
|
page read and write
|
||
D67E000
|
unkown
|
page read and write
|
||
6381000
|
unkown
|
page read and write
|
||
D82F000
|
unkown
|
page read and write
|
||
63DF000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
C439000
|
unkown
|
page read and write
|
||
62D0000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
6385000
|
unkown
|
page read and write
|
||
DADD000
|
stack
|
page read and write
|
||
62C6000
|
unkown
|
page read and write
|
||
4AEE000
|
unkown
|
page read and write
|
||
56E2000
|
unkown
|
page read and write
|
||
CB92000
|
unkown
|
page read and write
|
||
1F0000
|
heap default
|
page read and write
|
||
6ED0000
|
unkown
|
page read and write
|
||
4ABC000
|
heap private
|
page read and write
|
||
5147000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
1360000
|
unkown image
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
D092000
|
unkown
|
page read and write
|
||
782C000
|
unkown
|
page read and write
|
||
6608000
|
unkown
|
page read and write
|
||
264000
|
unkown
|
page read and write
|
||
9BC000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
5470000
|
unkown
|
page read and write
|
||
571F000
|
unkown
|
page read and write
|
||
1130000
|
unkown
|
page read and write
|
||
622E000
|
unkown
|
page read and write
|
||
ACDD000
|
unkown
|
page read and write
|
||
659E000
|
unkown
|
page read and write
|
||
EADE000
|
unkown
|
page read and write
|
||
B20000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
B9A1000
|
unkown
|
page read and write
|
||
83DE000
|
unkown
|
page read and write
|
||
2CE2000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
12E0000
|
heap private
|
page read and write
|
||
8404000
|
unkown
|
page read and write
|
||
E992000
|
unkown
|
page read and write
|
||
ACDF000
|
unkown
|
page read and write
|
||
69BE000
|
unkown
|
page read and write
|
||
580E000
|
unkown
|
page read and write
|
||
C426000
|
unkown
|
page read and write
|
||
ACAF000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page execute and read and write
|
||
D0000
|
unkown
|
page readonly
|
||
510000
|
unkown
|
page read and write
|
||
9BA1000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
6223000
|
unkown
|
page read and write
|
||
6C82000
|
unkown
|
page read and write
|
||
1420000
|
unkown
|
page readonly
|
||
546E000
|
unkown
|
page read and write | page guard
|
||
7460000
|
unkown
|
page read and write
|
||
64EE000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
6A43000
|
unkown
|
page read and write
|
||
AC88000
|
unkown
|
page read and write
|
||
38E9000
|
unkown
|
page read and write
|
||
ACA8000
|
unkown
|
page read and write
|
||
E250000
|
unkown
|
page read and write
|
||
AAA1000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
E27D000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
50D000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
6700000
|
unkown
|
page read and write
|
||
62F4000
|
unkown
|
page read and write
|
||
6665000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
6586000
|
unkown
|
page read and write
|
||
C1DE000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
9E0000
|
unkown
|
page read and write
|
||
780000
|
unkown
|
page read and write
|
||
D9AE000
|
stack
|
page read and write
|
||
780000
|
unkown
|
page read and write
|
||
D0B0000
|
unkown
|
page readonly
|
||
440000
|
unkown
|
page read and write
|
||
7182000
|
unkown
|
page read and write
|
||
5E60000
|
unkown
|
page readonly
|
||
72A000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page read and write
|
||
662C000
|
unkown
|
page read and write
|
||
CC1E000
|
unkown
|
page read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page execute and read and write
|
||
B6B9000
|
unkown
|
page read and write
|
||
749C000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
CE32000
|
unkown
|
page read and write
|
||
673C000
|
unkown
|
page read and write
|
||
3D2000
|
unkown
|
page read and write
|
||
657A000
|
unkown
|
page read and write
|
||
AA9E000
|
unkown
|
page read and write
|
||
AF9E000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
D11E000
|
unkown
|
page read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
480000
|
heap private
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
282000
|
unkown
|
page read and write
|
||
DC0E000
|
stack
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
D885000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
6AD6000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
5E1B000
|
unkown
|
page read and write
|
||
445000
|
unkown
|
page read and write
|
||
CBE0000
|
unkown
|
page read and write
|
||
6507000
|
unkown
|
page read and write
|
||
2956000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
ADF000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
62C9000
|
unkown
|
page read and write
|
||
1360000
|
unkown image
|
page readonly
|
||
3821000
|
unkown
|
page read and write
|
||
441000
|
unkown
|
page read and write
|
||
62F4000
|
unkown
|
page read and write
|
||
52C0000
|
unkown
|
page read and write
|
||
7872000
|
unkown
|
page read and write
|
||
62FE000
|
unkown
|
page read and write
|
||
637A000
|
unkown
|
page read and write
|
||
64F9000
|
unkown
|
page read and write
|
||
C45A000
|
unkown
|
page read and write
|
||
A50000
|
heap private
|
page execute and read and write
|
||
53A0000
|
heap private
|
page read and write
|
||
3AD8000
|
unkown
|
page read and write
|
||
297000
|
unkown
|
page execute and read and write
|
||
300000
|
unkown
|
page read and write
|
||
ACFD000
|
unkown
|
page read and write
|
||
4C2C000
|
unkown
|
page read and write
|
||
5A50000
|
heap private
|
page read and write
|
||
442000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
B6D3000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
6A82000
|
unkown
|
page read and write
|
||
C428000
|
unkown
|
page read and write
|
||
86ED000
|
unkown
|
page read and write
|
||
C5F000
|
unkown
|
page read and write
|
||
5BD0000
|
unkown
|
page read and write
|
||
D0E0000
|
unkown
|
page read and write
|
||
52EE000
|
unkown
|
page read and write
|
||
B6FD000
|
unkown
|
page read and write
|
||
54FE000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
4F1C000
|
unkown
|
page read and write
|
||
ACD0000
|
unkown
|
page read and write
|
||
125F000
|
stack
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
D61E000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
72D0000
|
unkown
|
page read and write
|
||
C908000
|
unkown
|
page read and write
|
||
DFE0000
|
unkown
|
page read and write
|
||
9160000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
50ED000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
2B8C000
|
unkown
|
page read and write
|
||
B188000
|
unkown
|
page read and write
|
||
50F0000
|
unkown
|
page write copy
|
||
6611000
|
unkown
|
page read and write
|
||
4F62000
|
unkown
|
page read and write
|
||
E253000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
D50000
|
unkown
|
page execute and read and write
|
||
64EC000
|
unkown
|
page read and write
|
||
B912000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
D621000
|
unkown
|
page read and write
|
||
C455000
|
unkown
|
page read and write
|
||
6440000
|
unkown
|
page read and write
|
||
D808000
|
unkown
|
page read and write
|
||
659E000
|
unkown
|
page read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
38C9000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
6A85000
|
unkown
|
page read and write
|
||
257000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
1360000
|
unkown image
|
page readonly
|
||
445000
|
unkown
|
page read and write
|
||
ACE000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
512000
|
unkown
|
page read and write
|
||
7A0000
|
heap default
|
page read and write
|
||
515000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
A50000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
692B000
|
unkown
|
page read and write
|
||
D30000
|
unkown
|
page read and write
|
||
D85A000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
CE61000
|
unkown
|
page read and write
|
||
637C000
|
unkown
|
page read and write
|
||
E60000
|
unkown
|
page readonly
|
||
305000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
E228000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
5832000
|
heap private
|
page read and write
|
||
7531000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
65D7000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
60AB000
|
unkown
|
page read and write
|
||
836E000
|
unkown
|
page read and write
|
||
53A8000
|
heap private
|
page read and write
|
||
CC21000
|
unkown
|
page read and write
|
||
1250000
|
unkown
|
page readonly
|
||
AA12000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
3FD000
|
unkown
|
page execute and read and write
|
||
CE2B000
|
unkown
|
page read and write
|
||
1BD000
|
unkown
|
page read and write
|
||
E25D000
|
unkown
|
page read and write
|
||
2C04000
|
unkown
|
page read and write
|
||
6A00000
|
unkown
|
page read and write
|
||
6090000
|
unkown
|
page read and write
|
||
6E90000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
62C3000
|
unkown
|
page read and write
|
||
629B000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
AD00000
|
unkown
|
page read and write
|
||
641A000
|
unkown
|
page read and write
|
||
29EB000
|
unkown
|
page read and write
|
||
B6BC000
|
unkown
|
page read and write
|
||
6410000
|
unkown
|
page read and write
|
||
29AB000
|
unkown
|
page read and write
|
||
4F53000
|
unkown
|
page read and write
|
||
4950000
|
unkown
|
page readonly
|
||
69F5000
|
unkown
|
page read and write
|
||
62AF000
|
unkown
|
page read and write
|
||
D40000
|
unkown
|
page read and write
|
||
6659000
|
unkown
|
page read and write
|
||
4FA6000
|
unkown
|
page read and write
|
||
1F6000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
CE9E000
|
unkown
|
page read and write
|
||
A512000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
D5E0000
|
unkown
|
page read and write
|
||
5E0000
|
heap private
|
page read and write
|
||
ACB4000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page read and write
|
||
DE0000
|
unkown
|
page readonly
|
||
C21E000
|
unkown
|
page read and write
|
||
5B4D000
|
unkown
|
page read and write
|
||
69D4000
|
unkown
|
page read and write
|
||
AD0000
|
unkown
|
page read and write
|
||
287D000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
382C000
|
unkown
|
page read and write
|
||
A012000
|
unkown
|
page read and write
|
||
9B60000
|
unkown
|
page read and write
|
||
4F76000
|
unkown
|
page read and write
|
||
67C8000
|
unkown
|
page read and write
|
||
4AC0000
|
unkown
|
page read and write
|
||
9D0000
|
unkown
|
page read and write
|
||
7EF40000
|
unkown
|
page execute and read and write
|
||
DD7E000
|
unkown
|
page read and write | page guard
|
||
1C0000
|
unkown
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
6A7D000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
4F53000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
E01E000
|
unkown
|
page read and write
|
||
4F1C000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
4A70000
|
heap private
|
page read and write
|
||
A70000
|
heap private
|
page read and write
|
||
4AD000
|
unkown
|
page read and write
|
||
C482000
|
unkown
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
C461000
|
unkown
|
page read and write
|
||
ACD5000
|
unkown
|
page read and write
|
||
83F1000
|
unkown
|
page read and write
|
||
2D15000
|
unkown
|
page read and write
|
||
3869000
|
unkown
|
page read and write
|
||
660C000
|
unkown
|
page read and write
|
||
5AF3000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
C458000
|
unkown
|
page read and write
|
||
6275000
|
unkown
|
page read and write
|
||
56F1000
|
unkown
|
page read and write
|
||
85A000
|
heap default
|
page read and write
|
||
6852000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
65E0000
|
unkown
|
page read and write
|
||
29F3000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
1362000
|
unkown image
|
page execute read
|
||
29A8000
|
unkown
|
page read and write
|
||
56A4000
|
unkown
|
page read and write
|
||
CE5A000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
2821000
|
unkown
|
page read and write
|
||
445000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
600E000
|
stack
|
page read and write
|
||
B186000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
4F18000
|
unkown
|
page read and write
|
||
641D000
|
unkown
|
page read and write
|
||
889000
|
heap default
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
540000
|
unkown
|
page readonly
|
||
CE5D000
|
unkown
|
page read and write
|
||
D87D000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
E25F000
|
unkown
|
page read and write
|
||
CE2D000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
28FC000
|
unkown
|
page read and write
|
||
83AC000
|
unkown
|
page read and write
|
||
500000
|
unkown
|
page read and write
|
||
B6B4000
|
unkown
|
page read and write
|
||
40A000
|
unkown
|
page execute and read and write
|
||
AD02000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
7547000
|
unkown
|
page read and write
|
||
6AC3000
|
unkown
|
page read and write
|
||
7A7000
|
heap default
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
A30000
|
unkown
|
page read and write
|
||
3821000
|
unkown
|
page read and write
|
||
617A000
|
unkown
|
page read and write
|
||
83BA000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
CF5E000
|
unkown
|
page read and write
|
||
4FA6000
|
unkown
|
page read and write
|
||
E708000
|
unkown
|
page read and write
|
||
6091000
|
unkown
|
page read and write
|
||
D5C0000
|
unkown
|
page read and write
|
||
6A98000
|
unkown
|
page read and write
|
||
AA60000
|
unkown
|
page read and write
|
||
65C6000
|
unkown
|
page read and write
|
||
546F000
|
unkown
|
page read and write
|
||
C43C000
|
unkown
|
page read and write
|
||
445000
|
unkown
|
page read and write
|
||
3D5000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
7E0000
|
heap default
|
page read and write
|
||
D83C000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
C71E000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
68D1000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page readonly
|
||
460000
|
unkown
|
page read and write
|
||
6606000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
293A000
|
unkown
|
page read and write
|
||
340000
|
heap private
|
page execute and read and write
|
||
445000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
4ECD000
|
unkown
|
page read and write
|
||
14A000
|
unkown
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
489000
|
heap private
|
page read and write
|
||
B1C000
|
unkown
|
page read and write
|
||
AD0000
|
unkown
|
page read and write
|
||
617E000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
62E7000
|
unkown
|
page read and write
|
||
6E54000
|
unkown
|
page read and write
|
||
D306000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
670E000
|
unkown
|
page read and write
|
||
C480000
|
unkown
|
page read and write
|
||
29E7000
|
unkown
|
page read and write
|
||
8C60000
|
unkown
|
page read and write
|
||
B6AF000
|
unkown
|
page read and write
|
||
368000
|
stack
|
page read and write
|
||
308000
|
unkown
|
page read and write
|
||
1140000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
157000
|
heap default
|
page read and write
|
||
64CF000
|
unkown
|
page read and write
|
||
C450000
|
unkown
|
page read and write
|
||
6290000
|
unkown
|
page read and write
|
||
305000
|
unkown
|
page read and write
|
||
445000
|
unkown
|
page read and write
|
||
ACD8000
|
unkown
|
page read and write
|
||
DD7F000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
6899000
|
unkown
|
page read and write
|
||
B24000
|
unkown
|
page read and write
|
||
E226000
|
unkown
|
page read and write
|
||
6AC1000
|
unkown
|
page read and write
|
||
4F92000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page readonly
|
||
553C000
|
unkown
|
page read and write
|
||
67CE000
|
unkown
|
page read and write
|
||
64A6000
|
unkown
|
page read and write
|
||
62BE000
|
unkown
|
page read and write
|
||
1362000
|
unkown image
|
page execute read
|
||
E4E0000
|
unkown
|
page read and write
|
||
C50000
|
heap private
|
page read and write
|
||
E22F000
|
unkown
|
page read and write
|
||
6355000
|
unkown
|
page read and write
|
||
19D000
|
heap default
|
page read and write
|
||
62EA000
|
unkown
|
page read and write
|
||
6CD0000
|
unkown
|
page read and write
|
||
C50000
|
unkown
|
page readonly
|
||
49EC000
|
unkown
|
page read and write
|
||
CE2F000
|
unkown
|
page read and write
|
||
3ED000
|
unkown
|
page execute and read and write
|
||
D81E000
|
stack
|
page read and write
|
||
287B000
|
unkown
|
page read and write
|
||
2C0000
|
unkown
|
page read and write
|
There are 1041 hidden memdumps, click here to show them.