Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
NEW ORDER Ref PO-298721.doc
|
Rich Text Format data, unknown version
|
initial sample
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\catx[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\tmp60E5.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\cat464923.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B4C37CD3-97C0-4A14-814E-1968BCE52029}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{FDB545E2-A1F4-4D0B-9DE9-98A3C665B689}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp4F5A.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\catalog.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\task.dat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\NEW ORDER Ref PO-298721.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:16
2020, mtime=Wed Aug 26 14:08:16 2020, atime=Wed Jun 9 13:47:34 2021, length=9110, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$W ORDER Ref PO-298721.doc
|
data
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\user\AppData\Roaming\cat464923.exe
|
C:\Users\user\AppData\Roaming\cat464923.exe
|
||
C:\Users\user\AppData\Roaming\cat464923.exe
|
{path}
|
||
C:\Windows\SysWOW64\schtasks.exe
|
'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp60E5.tmp'
|
||
C:\Windows\SysWOW64\schtasks.exe
|
'schtasks.exe' /create /f /tn 'SMTP Service Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp4F5A.tmp'
|
||
C:\Users\user\AppData\Roaming\cat464923.exe
|
C:\Users\user\AppData\Roaming\cat464923.exe 0
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' 0
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
{path}
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
{path}
|
||
C:\Users\user\AppData\Roaming\cat464923.exe
|
{path}
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
{path}
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
{path}
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\taskeng.exe
|
taskeng.exe {C1636649-2706-44BF-BD6B-15CC427FB25D} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
tzitziklishop.ddns.net
|
|||
http://carbinz.gq/modex/catx.exe
|
185.239.243.112
|
||
http://www.%s.comPA
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
carbinz.gq
|
185.239.243.112
|
||
tzitziklishop.ddns.net
|
103.133.106.117
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.239.243.112
|
carbinz.gq
|
Moldova Republic of
|
||
103.133.106.117
|
tzitziklishop.ddns.net
|
Viet Nam
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
!5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
w'5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
m$5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ED098
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F4089
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F4089
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
||
C:\Users\user\AppData\Roaming\cat464923.exe
|
FontCachePath
|
||
C:\Users\user\AppData\Roaming\cat464923.exe
|
SMTP Service
|
||
C:\Windows\System32\taskeng.exe
|
data
|
There are 316 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
240A000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
3359000
|
unkown
|
page read and write
|
||
2491000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
3309000
|
unkown
|
page read and write
|
||
3585000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
3525000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
23AC000
|
unkown
|
page read and write
|
||
34D9000
|
unkown
|
page read and write
|
||
33E5000
|
unkown
|
page read and write
|
||
3379000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
33D9000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
2281000
|
unkown
|
page read and write
|
||
3289000
|
unkown
|
page read and write
|
||
2301000
|
unkown
|
page read and write
|
||
2351000
|
unkown
|
page read and write
|
||
30A9000
|
unkown
|
page read and write
|
||
20DC000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
3239000
|
unkown
|
page read and write
|
||
226A000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
3255000
|
unkown
|
page read and write
|
||
79C000
|
heap default
|
page read and write
|
||
540C000
|
heap private
|
page read and write
|
||
4110000
|
unkown
|
page read and write
|
||
4B82000
|
heap private
|
page read and write
|
||
146000
|
unkown image
|
page readonly
|
||
460000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page execute and read and write
|
||
4770000
|
unkown
|
page readonly
|
||
248F000
|
unkown
|
page read and write
|
||
64CE000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
146000
|
unkown image
|
page readonly
|
||
197000
|
unkown
|
page execute and read and write
|
||
50E0000
|
unkown
|
page read and write
|
||
380000
|
heap default
|
page read and write
|
||
5D00000
|
unkown
|
page readonly
|
||
19A000
|
unkown
|
page execute and read and write
|
||
146000
|
unkown image
|
page readonly
|
||
4FD0000
|
heap private
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
4EC0000
|
unkown
|
page read and write
|
||
1DE0000
|
unkown
|
page read and write
|
||
6B99000
|
unkown
|
page read and write
|
||
537C000
|
heap private
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
112000
|
unkown
|
page read and write
|
||
5580000
|
unkown
|
page read and write
|
||
20CD000
|
unkown
|
page read and write
|
||
5F59000
|
unkown
|
page readonly
|
||
2740000
|
unkown
|
page readonly
|
||
3E0000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
63F0000
|
unkown
|
page read and write
|
||
57FC000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
6361000
|
unkown
|
page read and write
|
||
460000
|
heap private
|
page execute and read and write
|
||
66EE000
|
unkown
|
page read and write
|
||
204000
|
heap private
|
page read and write
|
||
4F64000
|
unkown
|
page read and write
|
||
6040000
|
unkown
|
page readonly
|
||
20CF000
|
unkown
|
page read and write
|
||
5ED6000
|
unkown
|
page readonly
|
||
5DA2000
|
unkown
|
page readonly
|
||
986000
|
unkown image
|
page readonly
|
||
662F000
|
unkown
|
page read and write
|
||
5C54000
|
unkown
|
page readonly
|
||
4CA000
|
unkown
|
page execute and read and write
|
||
6394000
|
unkown
|
page read and write
|
||
146000
|
unkown image
|
page readonly
|
||
450E000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
47B0000
|
heap private
|
page read and write
|
||
23FD000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
63FD000
|
unkown
|
page read and write
|
||
6A6000
|
unkown
|
page read and write
|
||
146000
|
unkown image
|
page readonly
|
||
2B0000
|
unkown
|
page execute and read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
1CB0000
|
unkown
|
page readonly
|
||
3A0000
|
unkown
|
page read and write
|
||
750B000
|
unkown
|
page read and write
|
||
655E000
|
unkown
|
page read and write
|
||
4AEE000
|
unkown
|
page read and write
|
||
65EE000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
724000
|
heap default
|
page read and write
|
||
90000
|
unkown image
|
page readonly
|
||
5C52000
|
unkown
|
page readonly
|
||
5E79000
|
unkown
|
page readonly
|
||
53F4000
|
heap private
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
6A5A000
|
unkown
|
page read and write
|
||
27B000
|
unkown
|
page execute and read and write
|
||
4E61000
|
unkown
|
page read and write
|
||
10D000
|
unkown
|
page execute and read and write
|
||
57E000
|
unkown
|
page read and write
|
||
7506000
|
unkown
|
page read and write
|
||
53A0000
|
unkown
|
page read and write
|
||
4316000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page readonly
|
||
67D8000
|
unkown
|
page read and write
|
||
5D2C000
|
unkown
|
page read and write
|
||
62DE000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
69B4000
|
unkown
|
page read and write
|
||
8D2000
|
unkown image
|
page execute read
|
||
2A60000
|
heap private
|
page read and write
|
||
236E000
|
unkown
|
page read and write | page guard
|
||
6600000
|
unkown
|
page read and write
|
||
61C000
|
heap default
|
page read and write
|
||
20D7000
|
heap private
|
page read and write
|
||
4AEE000
|
unkown
|
page read and write
|
||
5FEC000
|
unkown
|
page read and write
|
||
314000
|
heap default
|
page read and write
|
||
690B000
|
unkown
|
page read and write
|
||
3E6000
|
unkown
|
page read and write
|
||
DB3E000
|
unkown
|
page read and write | page guard
|
||
5CF6000
|
unkown
|
page readonly
|
||
5F60000
|
unkown
|
page read and write
|
||
69E000
|
unkown
|
page read and write
|
||
21B0000
|
heap private
|
page read and write
|
||
236E000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
5411000
|
heap private
|
page read and write
|
||
5D95000
|
unkown
|
page readonly
|
||
6A7000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page read and write
|
||
146000
|
unkown image
|
page readonly
|
||
4D80000
|
unkown
|
page read and write
|
||
6140000
|
heap private
|
page read and write
|
||
5E35000
|
unkown
|
page readonly
|
||
4A2E000
|
unkown
|
page read and write
|
||
B3000
|
unkown
|
page execute and read and write
|
||
5AD5000
|
unkown
|
page readonly
|
||
5880000
|
unkown
|
page readonly
|
||
19A000
|
unkown
|
page execute and read and write
|
||
600000
|
unkown
|
page read and write
|
||
5D55000
|
unkown
|
page readonly
|
||
1FB0000
|
unkown
|
page readonly
|
||
54D0000
|
heap private
|
page read and write
|
||
4E4D000
|
unkown
|
page read and write
|
||
5E95000
|
unkown
|
page readonly
|
||
65E6000
|
unkown
|
page read and write
|
||
53A1000
|
unkown
|
page read and write
|
||
4A9E000
|
unkown
|
page read and write
|
||
324000
|
heap default
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
986000
|
unkown image
|
page readonly
|
||
5D7000
|
heap default
|
page read and write
|
||
146000
|
unkown image
|
page readonly
|
||
6A9D000
|
unkown
|
page read and write
|
||
5F2000
|
heap default
|
page read and write
|
||
446F000
|
unkown
|
page read and write
|
||
55D000
|
heap default
|
page read and write
|
||
53EF000
|
heap private
|
page read and write
|
||
5DA000
|
heap default
|
page read and write
|
||
4100000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
6A7000
|
unkown
|
page read and write
|
||
659F000
|
unkown
|
page read and write
|
||
50CC000
|
unkown
|
page read and write
|
||
1E7000
|
unkown
|
page execute and read and write
|
||
330000
|
unkown
|
page read and write
|
||
353000
|
heap default
|
page read and write
|
||
6645000
|
unkown
|
page read and write
|
||
5368000
|
heap private
|
page read and write
|
||
340000
|
heap default
|
page read and write
|
||
5260000
|
unkown
|
page read and write
|
||
615E000
|
unkown
|
page read and write
|
||
6EC000
|
unkown
|
page read and write
|
||
5FE0000
|
unkown
|
page readonly
|
||
1DE0000
|
unkown
|
page read and write
|
||
636E000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
53D8000
|
heap private
|
page read and write
|
||
2E7000
|
unkown
|
page read and write
|
||
5F61000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
69D5000
|
unkown
|
page read and write
|
||
544E000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
63BF000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
628000
|
unkown
|
page read and write
|
||
4F2C000
|
unkown
|
page read and write
|
||
3AE000
|
unkown
|
page read and write
|
||
6424000
|
unkown
|
page read and write
|
||
296000
|
unkown
|
page read and write
|
||
6566000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
6A37000
|
unkown
|
page read and write
|
||
34C000
|
heap default
|
page read and write
|
||
3281000
|
unkown
|
page read and write
|
||
222F000
|
unkown
|
page read and write
|
||
350000
|
unkown
|
page read and write
|
||
5F62000
|
unkown
|
page readonly
|
||
6A0000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
90000
|
unkown image
|
page readonly
|
||
5BC000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
6639000
|
unkown
|
page read and write
|
||
6420000
|
unkown
|
page read and write
|
||
627B000
|
unkown
|
page read and write
|
||
496E000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
1FE0000
|
unkown
|
page readonly
|
||
779000
|
heap private
|
page read and write
|
||
8D0000
|
unkown image
|
page readonly
|
||
584000
|
heap private
|
page read and write
|
||
718000
|
heap private
|
page read and write
|
||
92000
|
unkown image
|
page execute read
|
||
5CE5000
|
unkown
|
page readonly
|
||
5A72000
|
unkown
|
page readonly
|
||
243000
|
unkown
|
page execute and read and write
|
||
A9F000
|
unkown
|
page read and write
|
||
AD0000
|
unkown
|
page read and write
|
||
375F000
|
unkown
|
page read and write
|
||
1F50000
|
unkown
|
page readonly
|
||
8D2000
|
unkown image
|
page execute read
|
||
5CF2000
|
unkown
|
page readonly
|
||
5E9D000
|
unkown
|
page read and write
|
||
4C5000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page read and write
|
||
51E0000
|
heap private
|
page execute and read and write
|
||
5E42000
|
unkown
|
page readonly
|
||
580000
|
heap private
|
page read and write
|
||
6C8E000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
405000
|
heap default
|
page read and write
|
||
699B000
|
unkown
|
page read and write
|
||
1DDF000
|
unkown
|
page read and write
|
||
521F000
|
unkown
|
page read and write
|
||
3600000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
90000
|
unkown image
|
page readonly
|
||
4A06000
|
unkown
|
page read and write
|
||
1A7000
|
unkown
|
page execute and read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
5EC5000
|
unkown
|
page readonly
|
||
500000
|
unkown
|
page readonly
|
||
731A000
|
unkown
|
page read and write
|
||
990000
|
unkown
|
page read and write
|
||
5A36000
|
unkown
|
page readonly
|
||
600000
|
unkown
|
page read and write
|
||
3499000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
5DA9000
|
unkown
|
page readonly
|
||
5CE0000
|
unkown
|
page readonly
|
||
65C5000
|
unkown
|
page read and write
|
||
511E000
|
unkown
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
40FE000
|
unkown
|
page read and write
|
||
44FE000
|
unkown
|
page read and write
|
||
8D2000
|
unkown image
|
page execute read
|
||
986000
|
unkown image
|
page readonly
|
||
4E0000
|
unkown
|
page read and write
|
||
5D14000
|
unkown
|
page readonly
|
||
84E000
|
unkown
|
page read and write
|
||
492E000
|
unkown
|
page read and write
|
||
8060000
|
unkown
|
page read and write
|
||
5E0000
|
heap private
|
page read and write
|
||
810000
|
unkown
|
page readonly
|
||
6B0000
|
unkown
|
page execute and read and write
|
||
21AE000
|
unkown
|
page read and write
|
||
204C000
|
unkown
|
page read and write
|
||
350000
|
unkown
|
page read and write
|
||
760000
|
heap private
|
page execute and read and write
|
||
6F2F000
|
unkown
|
page read and write
|
||
5DD2000
|
unkown
|
page readonly
|
||
7527000
|
unkown
|
page read and write
|
||
507000
|
heap default
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
4C7000
|
unkown
|
page execute and read and write
|
||
5DC6000
|
unkown
|
page readonly
|
||
5D5D000
|
unkown
|
page readonly
|
||
710000
|
unkown
|
page readonly
|
||
724E000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
C0000
|
heap default
|
page read and write
|
||
5DB5000
|
unkown
|
page readonly
|
||
5D42000
|
unkown
|
page readonly
|
||
5381000
|
heap private
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
480000
|
unkown
|
page read and write
|
||
990000
|
unkown
|
page readonly
|
||
420000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
446000
|
unkown
|
page read and write
|
||
3C0000
|
heap default
|
page read and write
|
||
1FA0000
|
unkown
|
page read and write
|
||
4D6000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
146000
|
unkown image
|
page readonly
|
||
2E0000
|
unkown
|
page execute and read and write
|
||
146000
|
unkown image
|
page readonly
|
||
360000
|
unkown
|
page read and write
|
||
4230000
|
unkown
|
page readonly
|
||
4934000
|
heap private
|
page read and write
|
||
5D15000
|
unkown
|
page readonly
|
||
4E36000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
90000
|
unkown image
|
page readonly
|
||
4D0000
|
unkown
|
page read and write
|
||
60EE000
|
unkown
|
page read and write
|
||
990000
|
unkown
|
page readonly
|
||
92000
|
unkown image
|
page execute read
|
||
372F000
|
unkown
|
page read and write
|
||
500E000
|
unkown
|
page read and write
|
||
490000
|
heap default
|
page read and write
|
||
297000
|
unkown
|
page execute and read and write
|
||
92000
|
unkown image
|
page execute read
|
||
749000
|
heap private
|
page read and write
|
||
6832000
|
unkown
|
page read and write
|
||
428C000
|
unkown
|
page read and write
|
||
B50000
|
unkown
|
page read and write
|
||
234F000
|
unkown
|
page read and write
|
||
53BE000
|
unkown
|
page read and write
|
||
560000
|
heap default
|
page read and write
|
||
90000
|
unkown image
|
page readonly
|
||
690000
|
unkown
|
page write copy
|
||
61B0000
|
unkown
|
page read and write
|
||
5E72000
|
unkown
|
page readonly
|
||
672B000
|
unkown
|
page read and write
|
||
5F1E000
|
unkown
|
page read and write
|
||
69F000
|
unkown
|
page read and write
|
||
513E000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
5DA2000
|
unkown
|
page readonly
|
||
3D11000
|
unkown
|
page read and write
|
||
24D000
|
unkown
|
page execute and read and write
|
||
7511000
|
unkown
|
page read and write
|
||
640000
|
unkown
|
page read and write
|
||
220E000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
29C2000
|
unkown
|
page read and write
|
||
64E0000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page execute and read and write
|
||
92000
|
unkown image
|
page execute read
|
||
450000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page read and write
|
||
2050000
|
unkown
|
page read and write
|
||
320000
|
unkown
|
page readonly
|
||
4E7C000
|
unkown
|
page read and write
|
||
986000
|
unkown image
|
page readonly
|
||
4B7E000
|
unkown
|
page read and write
|
||
5CA2000
|
unkown
|
page readonly
|
||
5010000
|
unkown
|
page read and write
|
||
350000
|
unkown
|
page readonly
|
||
4A4F000
|
unkown
|
page read and write
|
||
65E8000
|
unkown
|
page read and write
|
||
146000
|
unkown image
|
page readonly
|
||
1DF0000
|
unkown
|
page read and write
|
||
803000
|
unkown
|
page read and write
|
||
54EF000
|
heap private
|
page read and write
|
||
2A7000
|
unkown
|
page execute and read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
1DE8000
|
unkown
|
page read and write
|
||
4326000
|
unkown
|
page read and write
|
||
6637000
|
unkown
|
page read and write
|
||
4D0000
|
unkown
|
page read and write
|
||
433D000
|
unkown
|
page read and write
|
||
60C7000
|
unkown
|
page read and write
|
||
FA000
|
unkown
|
page read and write
|
||
4E29000
|
unkown
|
page read and write
|
||
6371000
|
unkown
|
page read and write
|
||
4C0000
|
heap private
|
page read and write
|
||
5F0D000
|
unkown
|
page readonly
|
||
230000
|
unkown
|
page readonly
|
||
90000
|
unkown image
|
page readonly
|
||
64AE000
|
unkown
|
page read and write
|
||
360000
|
heap default
|
page read and write
|
||
5A06000
|
unkown
|
page readonly
|
||
4700000
|
heap private
|
page execute and read and write
|
||
740000
|
unkown
|
page read and write
|
||
49EE000
|
unkown
|
page read and write
|
||
1FA0000
|
unkown
|
page read and write
|
||
2CE000
|
heap default
|
page read and write
|
||
6FED000
|
unkown
|
page read and write
|
||
4AF0000
|
unkown
|
page readonly
|
||
5B35000
|
unkown
|
page readonly
|
||
4C90000
|
heap private
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
1FA0000
|
unkown
|
page read and write
|
||
2180000
|
unkown
|
page read and write
|
||
92000
|
unkown image
|
page execute read
|
||
2240000
|
heap private
|
page read and write
|
||
4B5F000
|
unkown
|
page read and write
|
||
B70000
|
unkown
|
page readonly
|
||
6A6000
|
unkown
|
page read and write
|
||
63BD000
|
unkown
|
page read and write
|
||
A9E000
|
unkown
|
page read and write | page guard
|
||
20B0000
|
unkown
|
page readonly
|
||
2D0000
|
unkown
|
page execute and read and write
|
||
5DD9000
|
unkown
|
page readonly
|
||
65C0000
|
unkown
|
page read and write
|
||
890000
|
heap private
|
page execute and read and write
|
||
5F4000
|
heap default
|
page read and write
|
||
355000
|
unkown
|
page read and write
|
||
1C8000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
1F10000
|
heap private
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
65F1000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
5C0000
|
heap private
|
page read and write
|
||
448E000
|
unkown
|
page read and write
|
||
4D6000
|
unkown
|
page read and write
|
||
4952000
|
heap private
|
page read and write
|
||
4D0000
|
unkown
|
page read and write
|
||
200000
|
heap private
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
60EC000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
58B2000
|
unkown
|
page readonly
|
||
466000
|
unkown
|
page read and write
|
||
B4000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
90000
|
unkown image
|
page readonly
|
||
458000
|
unkown
|
page read and write
|
||
62DF000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
92000
|
unkown image
|
page execute read
|
||
986000
|
unkown image
|
page readonly
|
||
1FA0000
|
unkown
|
page read and write
|
||
8AC000
|
unkown
|
page read and write
|
||
5C32000
|
unkown
|
page readonly
|
||
5EA6000
|
unkown
|
page readonly
|
||
42F4000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
BDDE000
|
unkown
|
page read and write | page guard
|
||
54BC000
|
unkown
|
page read and write
|
||
587000
|
heap private
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
4EB0000
|
heap private
|
page read and write
|
||
3491000
|
unkown
|
page read and write
|
||
5D45000
|
unkown
|
page readonly
|
||
4DE0000
|
unkown
|
page readonly
|
||
5D02000
|
unkown
|
page readonly
|
||
A0000
|
unkown
|
page read and write
|
||
36B8000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
990000
|
unkown
|
page readonly
|
||
8D2000
|
unkown image
|
page execute read
|
||
850000
|
unkown
|
page readonly
|
||
66A9000
|
unkown
|
page read and write
|
||
44B0000
|
unkown
|
page readonly
|
||
740000
|
heap default
|
page read and write
|
||
633A000
|
unkown
|
page read and write
|
||
524000
|
heap default
|
page read and write
|
||
6A62000
|
unkown
|
page read and write
|
||
6C2000
|
unkown
|
page read and write
|
||
5150000
|
heap private
|
page read and write
|
||
4A8000
|
unkown
|
page read and write
|
||
1F50000
|
unkown
|
page read and write
|
||
59B2000
|
unkown
|
page readonly
|
||
5430000
|
unkown
|
page read and write
|
||
745000
|
unkown
|
page read and write
|
||
4D8000
|
unkown
|
page read and write
|
||
5972000
|
unkown
|
page readonly
|
||
4FA2000
|
unkown
|
page read and write
|
||
917000
|
heap private
|
page read and write
|
||
2D0000
|
unkown
|
page execute and read and write
|
||
1FC5000
|
heap private
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
92000
|
unkown image
|
page execute read
|
||
6B0000
|
unkown
|
page read and write
|
||
5FC6000
|
unkown
|
page read and write
|
||
4B90000
|
heap private
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
4970000
|
unkown
|
page read and write
|
||
4F72000
|
unkown
|
page read and write
|
||
50BD000
|
unkown
|
page read and write
|
||
487E000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
63C3000
|
unkown
|
page read and write
|
||
AA0000
|
unkown
|
page execute and read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
3A7000
|
heap default
|
page read and write
|
||
4AE2000
|
heap private
|
page read and write
|
||
49F9000
|
unkown
|
page read and write
|
||
20F5000
|
heap private
|
page read and write
|
||
1DA000
|
unkown
|
page execute and read and write
|
||
5570000
|
unkown
|
page read and write
|
||
146000
|
unkown image
|
page readonly
|
||
5D0000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
5E65000
|
unkown
|
page readonly
|
||
450000
|
unkown
|
page read and write
|
||
AA0000
|
unkown
|
page read and write
|
||
60F3000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
6E5A000
|
unkown
|
page read and write
|
||
544C000
|
unkown
|
page read and write
|
||
1E7000
|
unkown
|
page execute and read and write
|
||
BD000
|
unkown
|
page execute and read and write
|
||
64CC000
|
unkown
|
page read and write
|
||
4A7E000
|
unkown
|
page read and write
|
||
66E0000
|
unkown
|
page read and write
|
||
47AE000
|
unkown
|
page read and write
|
||
6FE000
|
unkown
|
page read and write
|
||
20A1000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
B40000
|
unkown
|
page read and write
|
||
8CE000
|
unkown
|
page read and write
|
||
456000
|
unkown
|
page read and write
|
||
4EFE000
|
unkown
|
page read and write
|
||
805E000
|
unkown
|
page read and write
|
||
4900000
|
heap private
|
page read and write
|
||
340000
|
unkown
|
page read and write
|
||
28E5000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page readonly
|
||
63F6000
|
unkown
|
page read and write
|
||
5FA5000
|
unkown
|
page readonly
|
||
6210000
|
unkown
|
page read and write
|
||
5D56000
|
unkown
|
page readonly
|
||
6579000
|
unkown
|
page read and write
|
||
53F0000
|
heap private
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
4D0000
|
heap default
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
6632000
|
unkown
|
page read and write
|
||
6AB6000
|
unkown
|
page read and write
|
||
5992000
|
unkown
|
page readonly
|
||
6A99000
|
unkown
|
page read and write
|
||
4100000
|
unkown
|
page read and write
|
||
AA8000
|
unkown
|
page read and write
|
||
3371000
|
unkown
|
page read and write
|
||
4F28000
|
unkown
|
page read and write
|
||
43D0000
|
unkown
|
page readonly
|
||
6AAB000
|
unkown
|
page read and write
|
||
445000
|
unkown
|
page read and write
|
||
6795000
|
unkown
|
page read and write
|
||
669A000
|
unkown
|
page read and write
|
||
5D72000
|
unkown
|
page readonly
|
||
21D5000
|
heap private
|
page read and write
|
||
4AB0000
|
heap private
|
page read and write
|
||
6071000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
6C0000
|
unkown
|
page read and write
|
||
745000
|
unkown
|
page read and write
|
||
3521000
|
unkown
|
page read and write
|
||
457000
|
unkown
|
page read and write
|
||
1EF0000
|
unkown
|
page read and write
|
||
51DF000
|
unkown
|
page read and write
|
||
770000
|
heap private
|
page read and write
|
||
376F000
|
unkown
|
page read and write
|
||
690000
|
heap private
|
page execute and read and write
|
||
36A8000
|
unkown
|
page read and write
|
||
17D000
|
unkown
|
page execute and read and write
|
||
4D0000
|
unkown
|
page read and write
|
||
5DC5000
|
unkown
|
page readonly
|
||
4D0000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
146000
|
unkown image
|
page readonly
|
||
5364000
|
heap private
|
page read and write
|
||
4AE000
|
unkown
|
page read and write
|
||
6A5D000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
2D0000
|
unkown
|
page read and write
|
||
4BD0000
|
unkown
|
page readonly
|
||
5A72000
|
unkown
|
page readonly
|
||
40B0000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
2140000
|
heap private
|
page read and write
|
||
4C0000
|
unkown
|
page write copy
|
||
310000
|
unkown
|
page read and write
|
||
4BA0000
|
unkown
|
page readonly
|
||
8D0000
|
unkown image
|
page readonly
|
||
638A000
|
unkown
|
page read and write
|
||
790000
|
heap default
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
5A42000
|
unkown
|
page readonly
|
||
560000
|
unkown
|
page read and write
|
||
5CB5000
|
unkown
|
page readonly
|
||
986000
|
unkown image
|
page readonly
|
||
4BE0000
|
heap private
|
page read and write
|
||
4100000
|
unkown
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
2F0000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page execute and read and write
|
||
9E0000
|
heap private
|
page read and write
|
||
8799000
|
unkown
|
page read and write
|
||
5CD2000
|
unkown
|
page readonly
|
||
72C000
|
unkown
|
page read and write
|
||
50DE000
|
unkown
|
page read and write
|
||
671C000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
364000
|
heap default
|
page read and write
|
||
1F32000
|
heap private
|
page read and write
|
||
6652000
|
unkown
|
page read and write
|
||
25D000
|
unkown
|
page execute and read and write
|
||
90000
|
unkown image
|
page readonly
|
||
5140000
|
unkown
|
page read and write
|
||
3620000
|
unkown
|
page read and write
|
||
5D96000
|
unkown
|
page readonly
|
||
5F45000
|
unkown
|
page readonly
|
||
5DE4000
|
unkown
|
page readonly
|
||
6A0000
|
unkown
|
page read and write
|
||
4E26000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
4A37000
|
unkown
|
page read and write
|
||
6060000
|
unkown
|
page readonly
|
||
62D0000
|
unkown
|
page read and write
|
||
5F06000
|
unkown
|
page readonly
|
||
62CA000
|
unkown
|
page read and write
|
||
54EC000
|
heap private
|
page read and write
|
||
6E70000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
1E80000
|
heap private
|
page read and write
|
||
2F0000
|
heap private
|
page read and write
|
||
53D4000
|
heap private
|
page read and write
|
||
320000
|
unkown
|
page readonly
|
||
2200000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
4F47000
|
unkown
|
page read and write
|
||
B3000
|
unkown
|
page execute and read and write
|
||
5790000
|
unkown
|
page readonly
|
||
90000
|
unkown image
|
page readonly
|
||
160000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
35A9000
|
unkown
|
page read and write
|
||
69E8000
|
unkown
|
page read and write
|
||
173000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
2945000
|
unkown
|
page read and write
|
||
5C28000
|
unkown
|
page readonly
|
||
7EFA3000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
5AB9000
|
unkown
|
page readonly
|
||
5D72000
|
unkown
|
page readonly
|
||
657E000
|
unkown
|
page read and write
|
||
532E000
|
unkown
|
page read and write | page guard
|
||
5E76000
|
unkown
|
page readonly
|
||
750000
|
heap private
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
8D0000
|
unkown image
|
page readonly
|
||
1AB000
|
unkown
|
page execute and read and write
|
||
4930000
|
heap private
|
page read and write
|
||
1F20000
|
unkown
|
page readonly
|
||
3630000
|
unkown
|
page read and write
|
||
56F0000
|
unkown
|
page readonly
|
||
3E8000
|
unkown
|
page read and write
|
||
13C000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
4AA0000
|
unkown
|
page readonly
|
||
460000
|
unkown
|
page read and write
|
||
4DDE000
|
unkown
|
page read and write
|
||
2C8000
|
unkown
|
page read and write
|
||
65EE000
|
unkown
|
page read and write
|
||
117000
|
unkown
|
page execute and read and write
|
||
2A65000
|
heap private
|
page read and write
|
||
5A25000
|
unkown
|
page readonly
|
||
3F0000
|
unkown
|
page read and write
|
||
4B00000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page execute and read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
20B0000
|
unkown
|
page read and write
|
||
517D000
|
unkown
|
page read and write
|
||
350000
|
heap private
|
page read and write
|
||
286000
|
unkown
|
page execute and read and write
|
||
4100000
|
unkown
|
page read and write
|
||
215E000
|
unkown
|
page read and write
|
||
1AB000
|
unkown
|
page execute and read and write
|
||
600000
|
unkown
|
page read and write
|
||
415000
|
unkown
|
page read and write
|
||
146000
|
unkown image
|
page readonly
|
||
4F86000
|
unkown
|
page read and write
|
||
3C6000
|
unkown
|
page read and write
|
||
501E000
|
unkown
|
page read and write | page guard
|
||
5A85000
|
unkown
|
page readonly
|
||
310000
|
unkown
|
page readonly
|
||
18D000
|
unkown
|
page execute and read and write
|
||
910000
|
heap private
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
5F5E000
|
unkown
|
page read and write
|
||
55FE000
|
unkown
|
page read and write
|
||
22FF000
|
unkown
|
page read and write
|
||
5A9D000
|
unkown
|
page readonly
|
||
90000
|
unkown image
|
page readonly
|
||
5C72000
|
unkown
|
page readonly
|
||
550000
|
heap private
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
5A96000
|
unkown
|
page readonly
|
||
2F0000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page execute and read and write
|
||
120000
|
heap default
|
page read and write
|
||
620000
|
unkown
|
page read and write
|
||
AA0000
|
unkown
|
page read and write
|
||
5A0000
|
heap private
|
page read and write
|
||
39E000
|
heap default
|
page read and write
|
||
28A9000
|
unkown
|
page read and write
|
||
5F9F000
|
unkown
|
page read and write
|
||
664000
|
heap default
|
page read and write
|
||
1EC0000
|
unkown
|
page read and write
|
||
4351000
|
unkown
|
page read and write
|
||
4490000
|
unkown
|
page readonly
|
||
2470000
|
unkown
|
page readonly
|
||
664B000
|
unkown
|
page read and write
|
||
615A000
|
unkown
|
page read and write
|
||
5CC000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
1D7000
|
unkown
|
page execute and read and write
|
||
1E10000
|
unkown
|
page read and write
|
||
80F0000
|
unkown
|
page read and write
|
||
5F82000
|
unkown
|
page readonly
|
||
5B12000
|
unkown
|
page readonly
|
||
4922000
|
heap private
|
page read and write
|
||
8D0000
|
unkown image
|
page readonly
|
||
63C5000
|
unkown
|
page read and write
|
||
4FB6000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
5B12000
|
unkown
|
page readonly
|
||
450000
|
unkown
|
page readonly
|
||
6112000
|
unkown
|
page readonly
|
||
6365000
|
unkown
|
page read and write
|
||
3C0000
|
heap private
|
page execute and read and write
|
||
54D0000
|
unkown
|
page read and write
|
||
5D22000
|
unkown
|
page readonly
|
||
20D0000
|
heap private
|
page read and write
|
||
70000
|
unkown
|
page read and write
|
||
69DE000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
5D32000
|
unkown
|
page readonly
|
||
266000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
210000
|
heap private
|
page read and write
|
||
6670000
|
unkown
|
page read and write
|
||
5E22000
|
unkown
|
page readonly
|
||
600000
|
unkown
|
page read and write
|
||
6758000
|
unkown
|
page read and write
|
||
4DC000
|
heap default
|
page read and write
|
||
5A55000
|
unkown
|
page readonly
|
||
8D0000
|
unkown image
|
page readonly
|
||
53E000
|
unkown
|
page read and write
|
||
5FC0000
|
unkown
|
page readonly
|
||
227F000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
6605000
|
unkown
|
page read and write
|
||
6563000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page read and write
|
||
5E1000
|
heap default
|
page read and write
|
||
5FA0000
|
unkown
|
page readonly
|
||
50A0000
|
unkown
|
page read and write
|
||
476F000
|
unkown
|
page read and write
|
||
67EC000
|
unkown
|
page read and write
|
||
45CE000
|
unkown
|
page read and write
|
||
BD000
|
unkown
|
page execute and read and write
|
||
92000
|
unkown image
|
page execute read
|
||
64E7000
|
unkown
|
page read and write
|
||
4357000
|
unkown
|
page read and write
|
||
20D3000
|
unkown
|
page read and write
|
||
3A4000
|
heap default
|
page read and write
|
||
8D0000
|
unkown image
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
780000
|
unkown
|
page readonly
|
||
448E000
|
unkown
|
page read and write
|
||
26A000
|
unkown
|
page execute and read and write
|
||
980000
|
heap private
|
page read and write
|
||
6A57000
|
unkown
|
page read and write
|
||
660C000
|
unkown
|
page read and write
|
||
36C8000
|
unkown
|
page read and write
|
||
655A000
|
unkown
|
page read and write
|
||
6EC1000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
230000
|
unkown
|
page read and write
|
||
1B4000
|
unkown
|
page read and write
|
||
5CC6000
|
unkown
|
page readonly
|
||
4F86000
|
unkown
|
page read and write
|
||
5410000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page execute and read and write
|
||
4A4C000
|
unkown
|
page read and write
|
||
1FC0000
|
heap private
|
page read and write
|
||
7F5E000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
635A000
|
unkown
|
page read and write
|
||
8D2000
|
unkown image
|
page execute read
|
||
986000
|
unkown image
|
page readonly
|
||
6335000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
53F8000
|
heap private
|
page read and write
|
||
6002000
|
unkown
|
page readonly
|
||
6993000
|
unkown
|
page read and write
|
||
DB3F000
|
unkown
|
page read and write
|
||
5F09000
|
unkown
|
page readonly
|
||
2F0000
|
unkown
|
page read and write
|
||
3589000
|
unkown
|
page read and write
|
||
5360000
|
heap private
|
page read and write
|
||
6B4C000
|
unkown
|
page read and write
|
||
5B18000
|
unkown
|
page readonly
|
||
6A65000
|
unkown
|
page read and write
|
||
8D0000
|
unkown image
|
page readonly
|
||
27A5000
|
unkown
|
page read and write
|
||
6319000
|
unkown
|
page read and write
|
||
1F7E000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
6BD5000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
5E04000
|
unkown
|
page readonly
|
||
6A0000
|
unkown
|
page read and write
|
||
8D0000
|
unkown image
|
page readonly
|
||
20000
|
unkown
|
page read and write
|
||
5E02000
|
unkown
|
page readonly
|
||
4B4000
|
heap default
|
page read and write
|
||
51A0000
|
unkown
|
page read and write
|
||
239F000
|
unkown
|
page read and write
|
||
5250000
|
unkown
|
page read and write
|
||
3A7000
|
heap default
|
page read and write
|
||
6A2000
|
unkown
|
page read and write
|
||
53BE000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page readonly
|
||
6390000
|
unkown
|
page read and write
|
||
408000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page readonly
|
||
14D000
|
unkown
|
page execute and read and write
|
||
8D2000
|
unkown image
|
page execute read
|
||
435E000
|
unkown
|
page read and write
|
||
5C34000
|
unkown
|
page readonly
|
||
267000
|
unkown
|
page execute and read and write
|
||
6A9B000
|
unkown
|
page read and write
|
||
4F90000
|
unkown
|
page read and write
|
||
2769000
|
unkown
|
page read and write
|
||
2C0000
|
heap default
|
page read and write
|
||
4B64000
|
heap private
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page read and write
|
||
8D0000
|
unkown image
|
page readonly
|
||
4BD000
|
unkown
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
25D9000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
53FC000
|
unkown
|
page read and write
|
||
5430000
|
unkown
|
page readonly
|
||
2000000
|
heap private
|
page execute and read and write
|
||
290000
|
heap default
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
4630000
|
unkown
|
page readonly
|
||
47D2000
|
heap private
|
page read and write
|
||
1DF0000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
5EF5000
|
unkown
|
page readonly
|
||
5E65000
|
unkown
|
page readonly
|
||
600000
|
unkown
|
page execute and read and write
|
||
460000
|
unkown
|
page read and write
|
||
550000
|
heap private
|
page execute and read and write
|
||
58D000
|
heap default
|
page read and write
|
||
2A9B000
|
heap private
|
page read and write
|
||
6A6D000
|
unkown
|
page read and write
|
||
2B6000
|
unkown
|
page read and write
|
||
49A8000
|
unkown
|
page read and write
|
||
935000
|
heap private
|
page read and write
|
||
5D0000
|
heap default
|
page read and write
|
||
68B1000
|
unkown
|
page read and write
|
||
537F000
|
heap private
|
page read and write
|
||
4120000
|
unkown
|
page read and write
|
||
320000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page execute and read and write
|
||
6170000
|
unkown
|
page readonly
|
||
5D12000
|
unkown
|
page readonly
|
||
53DF000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
1CA000
|
unkown
|
page read and write
|
||
42DE000
|
unkown
|
page read and write
|
||
64AF000
|
unkown
|
page read and write
|
||
6B0000
|
unkown
|
page read and write
|
||
5D30000
|
heap private
|
page read and write
|
||
92000
|
unkown image
|
page execute read
|
||
320000
|
unkown
|
page execute and read and write
|
||
6190000
|
unkown
|
page readonly
|
||
11A000
|
unkown
|
page execute and read and write
|
||
B4000
|
unkown
|
page read and write
|
||
4B94000
|
heap private
|
page read and write
|
||
69F4000
|
unkown
|
page read and write
|
||
5240000
|
unkown
|
page read and write
|
||
5600000
|
unkown
|
page read and write
|
||
244000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
5DF9000
|
unkown
|
page readonly
|
||
4AE000
|
unkown
|
page read and write
|
||
2AB000
|
unkown
|
page execute and read and write
|
||
4D9F000
|
unkown
|
page read and write
|
||
59E2000
|
unkown
|
page readonly
|
||
1A7000
|
unkown
|
page execute and read and write
|
||
92000
|
unkown image
|
page execute read
|
||
5DFD000
|
unkown
|
page readonly
|
||
6B0000
|
unkown
|
page read and write
|
||
1BD000
|
unkown
|
page execute and read and write
|
||
43CE000
|
unkown
|
page read and write
|
||
CD000
|
unkown
|
page execute and read and write
|
||
29B000
|
unkown
|
page execute and read and write
|
||
6252000
|
unkown
|
page read and write
|
||
350000
|
unkown
|
page read and write
|
||
8D0000
|
unkown image
|
page readonly
|
||
590000
|
unkown
|
page execute and read and write
|
||
700000
|
heap default
|
page read and write
|
||
65AA000
|
unkown
|
page read and write
|
||
4AEC000
|
unkown
|
page read and write
|
||
197000
|
unkown
|
page execute and read and write
|
||
2AB000
|
unkown
|
page execute and read and write
|
||
225D000
|
unkown
|
page read and write
|
||
27D000
|
unkown
|
page execute and read and write
|
||
4740000
|
unkown
|
page readonly
|
||
730000
|
unkown
|
page readonly
|
||
8D0000
|
unkown image
|
page readonly
|
||
5A12000
|
unkown
|
page readonly
|
||
4D0000
|
unkown
|
page read and write
|
||
316000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page readonly
|
||
90000
|
unkown image
|
page readonly
|
||
140000
|
unkown
|
page readonly
|
||
AB0000
|
unkown
|
page read and write
|
||
6A8000
|
unkown
|
page read and write
|
||
986000
|
unkown image
|
page readonly
|
||
450000
|
unkown
|
page read and write
|
||
313000
|
heap default
|
page read and write
|
||
410000
|
heap default
|
page read and write
|
||
2100000
|
heap private
|
page execute and read and write
|
||
2615000
|
unkown
|
page read and write
|
||
66EA000
|
unkown
|
page read and write
|
||
1DE0000
|
unkown
|
page read and write
|
||
4EAE000
|
unkown
|
page read and write
|
||
494F000
|
unkown
|
page read and write
|
||
523E000
|
unkown
|
page read and write
|
||
5D79000
|
unkown
|
page readonly
|
||
6070000
|
unkown
|
page read and write
|
||
986000
|
unkown image
|
page readonly
|
||
390000
|
unkown
|
page read and write
|
||
5251000
|
unkown
|
page read and write
|
||
5AE2000
|
unkown
|
page readonly
|
||
4110000
|
unkown
|
page read and write
|
||
A0000
|
unkown
|
page read and write
|
||
5DF6000
|
unkown
|
page readonly
|
||
340000
|
heap default
|
page read and write
|
||
42C8000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
757000
|
heap default
|
page read and write
|
||
4F63000
|
unkown
|
page read and write
|
||
74C000
|
unkown
|
page read and write
|
||
30A000
|
unkown
|
page read and write
|
||
4A3D000
|
unkown
|
page read and write
|
||
61D2000
|
unkown
|
page read and write
|
||
40A0000
|
unkown
|
page read and write
|
||
608000
|
unkown
|
page read and write
|
||
54C000
|
heap default
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
378F000
|
unkown
|
page read and write
|
||
5F4000
|
heap default
|
page read and write
|
||
2A7000
|
unkown
|
page execute and read and write
|
||
4D0000
|
unkown
|
page read and write
|
||
4DB000
|
unkown
|
page execute and read and write
|
||
648C000
|
unkown
|
page read and write
|
||
986000
|
unkown image
|
page readonly
|
||
6D86000
|
unkown
|
page read and write
|
||
B60000
|
heap private
|
page execute and read and write
|
||
6E5E000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page execute and read and write
|
||
440000
|
unkown
|
page read and write
|
||
57B2000
|
unkown
|
page readonly
|
||
4FB6000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
330000
|
heap default
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
445000
|
unkown
|
page read and write
|
||
1FA0000
|
unkown
|
page read and write
|
||
347000
|
heap default
|
page read and write
|
||
501F000
|
unkown
|
page read and write
|
||
FB000
|
unkown
|
page read and write
|
||
67E000
|
heap default
|
page read and write
|
||
49C0000
|
unkown
|
page readonly
|
||
69A5000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
4F0000
|
unkown
|
page read and write
|
||
51DE000
|
unkown
|
page read and write | page guard
|
||
236F000
|
unkown
|
page read and write
|
||
22F0000
|
unkown
|
page read and write
|
||
500000
|
heap default
|
page read and write
|
||
6571000
|
unkown
|
page read and write
|
||
24E1000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
88E000
|
unkown
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
4A1D000
|
unkown
|
page read and write
|
||
35A9000
|
unkown
|
page read and write
|
||
740000
|
heap private
|
page read and write
|
||
4EDD000
|
unkown
|
page read and write
|
||
69B2000
|
unkown
|
page read and write
|
||
4F3E000
|
unkown
|
page read and write
|
||
5406000
|
unkown
|
page read and write
|
||
65B7000
|
unkown
|
page read and write
|
||
2B8000
|
unkown
|
page read and write
|
||
2C0000
|
unkown
|
page read and write
|
||
65EC000
|
unkown
|
page read and write
|
||
460000
|
heap private
|
page execute and read and write
|
||
5800000
|
unkown
|
page readonly
|
||
219000
|
heap private
|
page read and write
|
||
234E000
|
unkown
|
page read and write | page guard
|
||
608B000
|
unkown
|
page read and write
|
||
36D8000
|
unkown
|
page read and write
|
||
4F04000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
58A0000
|
unkown
|
page readonly
|
||
4D0000
|
unkown
|
page read and write
|
||
69E000
|
heap default
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
230E000
|
unkown
|
page read and write
|
||
4110000
|
unkown
|
page read and write
|
||
4CCE000
|
unkown
|
page read and write
|
||
21D0000
|
unkown
|
page read and write
|
||
146000
|
unkown image
|
page readonly
|
||
5690000
|
unkown
|
page read and write
|
||
6B0000
|
unkown
|
page read and write
|
||
4100000
|
unkown
|
page read and write
|
||
4A20000
|
unkown
|
page read and write
|
||
90000
|
unkown image
|
page readonly
|
||
600000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
1F60000
|
unkown
|
page read and write
|
||
1FDE000
|
unkown
|
page read and write
|
||
4100000
|
unkown
|
page read and write
|
||
92000
|
unkown image
|
page execute read
|
||
1B3000
|
unkown
|
page execute and read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
487E000
|
unkown
|
page read and write
|
||
1ED0000
|
unkown
|
page read and write
|
||
4E67000
|
unkown
|
page read and write
|
||
8D0000
|
unkown image
|
page readonly
|
||
460000
|
unkown
|
page read and write
|
||
5D20000
|
unkown
|
page readonly
|
||
1F14000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
456000
|
unkown
|
page read and write
|
||
212F000
|
unkown
|
page read and write
|
||
60FE000
|
unkown
|
page read and write
|
||
6A2B000
|
unkown
|
page read and write
|
||
6A23000
|
unkown
|
page read and write
|
||
62CE000
|
unkown
|
page read and write
|
||
57B8000
|
unkown
|
page readonly
|
||
4100000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
5A66000
|
unkown
|
page readonly
|
||
4E6D000
|
unkown
|
page read and write
|
||
4FA2000
|
unkown
|
page read and write
|
||
44CE000
|
unkown
|
page read and write
|
||
3351000
|
unkown
|
page read and write
|
||
29D4000
|
unkown
|
page read and write
|
||
292000
|
unkown
|
page read and write
|
||
1FA0000
|
unkown
|
page read and write
|
||
2A23000
|
unkown
|
page read and write
|
||
4DD8000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
248E000
|
unkown
|
page read and write | page guard
|
||
8D2000
|
unkown image
|
page execute read
|
||
49D4000
|
unkown
|
page read and write
|
||
4BB2000
|
heap private
|
page read and write
|
||
377F000
|
unkown
|
page read and write
|
||
455000
|
unkown
|
page read and write
|
||
22FE000
|
unkown
|
page read and write | page guard
|
||
4DFD000
|
unkown
|
page read and write
|
||
4B60000
|
heap private
|
page read and write
|
||
8A000
|
unkown
|
page read and write
|
||
986000
|
unkown image
|
page readonly
|
||
3589000
|
unkown
|
page read and write
|
||
5450000
|
unkown
|
page read and write
|
||
5EBE000
|
unkown
|
page read and write
|
||
54D4000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
540000
|
heap default
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
540F000
|
unkown
|
page read and write
|
||
55FC000
|
unkown
|
page read and write
|
||
47B4000
|
heap private
|
page read and write
|
||
710000
|
heap private
|
page read and write
|
||
52B6000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
90F000
|
unkown
|
page read and write
|
||
48CE000
|
unkown
|
page read and write
|
||
2231000
|
unkown
|
page read and write
|
||
5CA2000
|
unkown
|
page readonly
|
||
90000
|
unkown image
|
page readonly
|
||
8B0000
|
unkown
|
page readonly
|
||
90000
|
unkown image
|
page readonly
|
||
30D000
|
heap default
|
page read and write
|
||
65A1000
|
unkown
|
page read and write
|
||
5E49000
|
unkown
|
page readonly
|
||
5994000
|
unkown
|
page readonly
|
||
6D0000
|
heap private
|
page execute and read and write
|
||
6222000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
7BC000
|
heap default
|
page read and write
|
||
239D000
|
unkown
|
page read and write
|
||
6E77000
|
unkown
|
page read and write
|
||
B0000
|
unkown
|
page read and write
|
||
4290000
|
unkown
|
page read and write
|
||
4AB5000
|
heap private
|
page read and write
|
||
3599000
|
unkown
|
page read and write
|
||
647E000
|
unkown
|
page read and write
|
||
64D9000
|
unkown
|
page read and write
|
||
4F63000
|
unkown
|
page read and write
|
||
69A000
|
heap default
|
page read and write
|
||
635C000
|
unkown
|
page read and write
|
||
3F5000
|
unkown
|
page read and write
|
||
61DE000
|
unkown
|
page read and write
|
||
6EB0000
|
unkown
|
page read and write
|
||
860000
|
unkown
|
page read and write
|
||
488F000
|
unkown
|
page read and write
|
||
8D2000
|
unkown image
|
page execute read
|
||
51F0000
|
heap private
|
page execute and read and write
|
||
174000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
647F000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
5E52000
|
unkown
|
page readonly
|
||
3F0000
|
unkown
|
page read and write
|
||
5B19000
|
unkown
|
page readonly
|
||
2310000
|
unkown
|
page readonly
|
||
628F000
|
unkown
|
page read and write
|
||
6607000
|
unkown
|
page read and write
|
||
88C9000
|
unkown
|
page read and write
|
||
90000
|
unkown image
|
page readonly
|
||
CB0000
|
unkown
|
page readonly
|
||
4D0000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
6879000
|
unkown
|
page read and write
|
||
8D0000
|
unkown image
|
page readonly
|
||
220000
|
heap private
|
page read and write
|
||
808000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
6080000
|
unkown
|
page readonly
|
||
307000
|
heap default
|
page read and write
|
||
5AB2000
|
unkown
|
page readonly
|
||
4C8E000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
1AB000
|
unkown
|
page read and write
|
||
540F000
|
heap private
|
page read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
4FB6000
|
unkown
|
page read and write
|
||
515D000
|
unkown
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
6A0000
|
unkown
|
page read and write
|
||
53AE000
|
unkown
|
page read and write
|
||
4FAE000
|
unkown
|
page read and write
|
||
92000
|
unkown image
|
page execute read
|
||
5060000
|
heap private
|
page execute and read and write
|
||
22EF000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page execute and read and write
|
||
600000
|
unkown
|
page read and write
|
||
6A18000
|
unkown
|
page read and write
|
||
6141000
|
unkown
|
page read and write
|
||
4B8000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
1EB000
|
unkown
|
page execute and read and write
|
||
4D0000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
146000
|
unkown image
|
page readonly
|
||
436E000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
700000
|
heap private
|
page execute and read and write
|
||
262000
|
unkown
|
page read and write
|
||
2060000
|
heap private
|
page execute and read and write
|
||
350000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page execute and read and write
|
||
44E0000
|
unkown
|
page readonly
|
||
59B4000
|
unkown
|
page readonly
|
||
300000
|
heap default
|
page read and write
|
||
61BE000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
532F000
|
unkown
|
page read and write
|
||
5A5000
|
heap private
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
4500000
|
unkown
|
page readonly
|
||
806000
|
unkown
|
page read and write
|
||
54F000
|
unkown
|
page read and write
|
||
3640000
|
unkown
|
page read and write
|
||
AB0000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
500000
|
heap private
|
page execute and read and write
|
||
880A000
|
unkown
|
page read and write
|
||
3301000
|
unkown
|
page read and write
|
||
580000
|
heap private
|
page read and write
|
||
AA0000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
6964000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
466000
|
unkown
|
page read and write
|
||
174000
|
unkown
|
page read and write
|
||
747C000
|
unkown
|
page read and write
|
||
750000
|
heap private
|
page read and write
|
||
5DE2000
|
unkown
|
page readonly
|
||
497000
|
heap default
|
page read and write
|
||
5160000
|
unkown
|
page read and write
|
||
5B05000
|
unkown
|
page readonly
|
||
44AE000
|
unkown
|
page read and write
|
||
1DE0000
|
unkown
|
page read and write
|
||
1FA0000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
5974000
|
unkown
|
page readonly
|
||
4319000
|
unkown
|
page read and write
|
||
612E000
|
unkown
|
page read and write
|
||
44DE000
|
unkown
|
page read and write
|
||
4E04000
|
unkown
|
page read and write
|
||
4BAF000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
6767000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
B50000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
5EE2000
|
unkown
|
page readonly
|
||
3698000
|
unkown
|
page read and write
|
||
4F72000
|
unkown
|
page read and write
|
||
54F1000
|
heap private
|
page read and write
|
||
4F28000
|
unkown
|
page read and write
|
||
4D0000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
6270000
|
unkown
|
page read and write
|
||
1FA0000
|
unkown
|
page read and write
|
||
33D1000
|
unkown
|
page read and write
|
||
2909000
|
unkown
|
page read and write
|
||
69F6000
|
unkown
|
page read and write
|
||
4100000
|
unkown
|
page read and write
|
||
657B000
|
unkown
|
page read and write
|
||
90000
|
unkown image
|
page readonly
|
||
3599000
|
unkown
|
page read and write
|
||
990000
|
unkown
|
page read and write
|
||
499F000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
173000
|
unkown
|
page execute and read and write
|
||
1DE0000
|
unkown
|
page execute and read and write
|
||
70D000
|
unkown
|
page read and write
|
||
4D0000
|
heap private
|
page read and write
|
||
47B0000
|
unkown
|
page read and write
|
||
5F29000
|
unkown
|
page readonly
|
||
6397000
|
unkown
|
page read and write
|
||
774000
|
heap default
|
page read and write
|
||
2050000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page readonly
|
||
64C000
|
unkown
|
page read and write
|
||
5F52000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page read and write
|
||
4F49000
|
unkown
|
page read and write
|
||
5CED000
|
unkown
|
page read and write
|
||
1DDE000
|
unkown
|
page read and write | page guard
|
||
53F1000
|
heap private
|
page read and write
|
||
5F22000
|
unkown
|
page readonly
|
||
2522000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
34A9000
|
unkown
|
page read and write
|
||
61C0000
|
unkown
|
page read and write
|
||
4904000
|
heap private
|
page read and write
|
||
66E0000
|
unkown
|
page read and write
|
||
5F75000
|
unkown
|
page readonly
|
||
65A6000
|
unkown
|
page read and write
|
||
90000
|
unkown image
|
page readonly
|
||
610000
|
heap private
|
page read and write
|
||
5040000
|
heap private
|
page read and write
|
||
222E000
|
unkown
|
page read and write | page guard
|
||
18A000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
5E82000
|
unkown
|
page readonly
|
||
4F2C000
|
unkown
|
page read and write
|
||
5CF4000
|
unkown
|
page readonly
|
||
436C000
|
unkown
|
page read and write
|
||
5D66000
|
unkown
|
page readonly
|
||
800000
|
heap default
|
page read and write
|
||
5E12000
|
unkown
|
page readonly
|
||
8D2000
|
unkown image
|
page execute read
|
||
4BF0000
|
unkown
|
page read and write
|
||
5DF5000
|
unkown
|
page readonly
|
||
3E6000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page execute and read and write
|
||
685C000
|
unkown
|
page read and write
|
||
2F0000
|
heap default
|
page read and write
|
||
8D0000
|
unkown image
|
page readonly
|
||
4AC0000
|
heap private
|
page read and write
|
||
8D2000
|
unkown image
|
page execute read
|
||
3D0000
|
unkown
|
page write copy
|
||
6C0000
|
unkown
|
page read and write
|
||
699E000
|
unkown
|
page read and write
|
||
80E000
|
unkown
|
page read and write
|
||
5E24000
|
unkown
|
page readonly
|
||
3F0000
|
unkown
|
page read and write
|
||
4D7000
|
unkown
|
page execute and read and write
|
||
63AE000
|
unkown
|
page read and write
|
||
54D8000
|
heap private
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
92000
|
unkown image
|
page execute read
|
||
4AC4000
|
heap private
|
page read and write
|
||
360000
|
unkown
|
page read and write
|
||
B4000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
5770000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
4F47000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
B3000
|
unkown
|
page execute and read and write
|
||
2371000
|
unkown
|
page read and write
|
||
25C2000
|
unkown
|
page read and write
|
||
22B000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
6150000
|
unkown
|
page readonly
|
||
1FC0000
|
unkown
|
page read and write
|
||
4C2000
|
unkown
|
page read and write
|
||
4CD0000
|
unkown
|
page readonly
|
||
6E85000
|
unkown
|
page read and write
|
||
5070000
|
heap private
|
page execute and read and write
|
||
9E0000
|
heap private
|
page execute and read and write
|
||
90000
|
unkown image
|
page readonly
|
||
6AA1000
|
unkown
|
page read and write
|
||
2090000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
69E0000
|
unkown
|
page read and write
|
||
90000
|
unkown image
|
page readonly
|
||
297000
|
heap default
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
4470000
|
unkown
|
page readonly
|
||
33C000
|
heap default
|
page read and write
|
||
200D000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page write copy
|
||
440000
|
unkown
|
page read and write
|
||
4EBC000
|
heap private
|
page read and write
|
||
BD000
|
unkown
|
page execute and read and write
|
||
40B0000
|
unkown
|
page read and write
|
||
C4000
|
unkown
|
page read and write
|
||
52E000
|
unkown
|
page read and write
|
||
5AE9000
|
unkown
|
page readonly
|
||
6577000
|
unkown
|
page read and write
|
||
6486000
|
unkown
|
page read and write
|
||
374F000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
4D0000
|
unkown
|
page read and write
|
||
53D0000
|
heap private
|
page read and write
|
||
2010000
|
unkown
|
page readonly
|
||
4B80000
|
heap private
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
53EC000
|
heap private
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
445000
|
unkown
|
page read and write
|
||
5E19000
|
unkown
|
page readonly
|
||
422000
|
unkown
|
page execute and read and write
|
||
C3000
|
unkown
|
page execute and read and write
|
||
620000
|
unkown
|
page read and write
|
||
1EA000
|
unkown
|
page execute and read and write
|
||
63FA000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
3531000
|
unkown
|
page read and write
|
||
8D0000
|
unkown image
|
page readonly
|
||
2F8000
|
heap private
|
page read and write
|
||
AC0000
|
unkown
|
page read and write
|
||
1E2000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page execute and read and write
|
||
BDDF000
|
unkown
|
page read and write
|
||
691D000
|
unkown
|
page read and write
|
||
6474000
|
unkown
|
page read and write
|
||
4A0000
|
heap private
|
page execute and read and write
|
||
2390000
|
heap private
|
page execute and read and write
|
||
590000
|
unkown
|
page readonly
|
||
630000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
90000
|
unkown image
|
page readonly
|
||
440000
|
unkown
|
page read and write
|
||
18D000
|
unkown
|
page execute and read and write
|
||
1EE0000
|
unkown
|
page readonly
|
||
3E0000
|
unkown
|
page read and write
|
||
373F000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
23A3000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
5D85000
|
unkown
|
page readonly
|
||
740000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
641E000
|
unkown
|
page read and write
|
||
67A8000
|
unkown
|
page read and write
|
||
5CE000
|
unkown
|
page read and write
|
||
620E000
|
unkown
|
page read and write
|
||
49BF000
|
unkown
|
page read and write
|
||
707000
|
heap default
|
page read and write
|
||
65F4000
|
unkown
|
page read and write
|
||
330000
|
heap private
|
page read and write
|
||
30A1000
|
unkown
|
page read and write
|
||
225E000
|
unkown
|
page read and write
|
||
21B7000
|
heap private
|
page read and write
|
||
5E95000
|
unkown
|
page readonly
|
||
4FA2000
|
unkown
|
page read and write
|
||
BD0F000
|
unkown
|
page read and write
|
||
47AC000
|
unkown
|
page read and write
|
||
65AD000
|
unkown
|
page read and write
|
||
5B72000
|
unkown
|
page readonly
|
||
BC8F000
|
unkown
|
page read and write
|
||
6CF000
|
unkown
|
page read and write
|
||
6A20000
|
unkown
|
page read and write
|
||
4F50000
|
heap private
|
page execute and read and write
|
||
3231000
|
unkown
|
page read and write
|
||
56D0000
|
unkown
|
page readonly
|
||
92000
|
unkown image
|
page execute read
|
||
1E00000
|
unkown
|
page read and write
|
||
5EB2000
|
unkown
|
page readonly
|
||
4A31000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
5CD2000
|
unkown
|
page readonly
|
||
4DA0000
|
unkown
|
page read and write
|
||
81CE000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
90000
|
unkown image
|
page readonly
|
||
213C000
|
unkown
|
page read and write
|
||
4A4E000
|
unkown
|
page read and write | page guard
|
||
315000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
615E000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
23D1000
|
unkown
|
page read and write
|
||
462F000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
92000
|
unkown image
|
page execute read
|
||
8D2000
|
unkown image
|
page execute read
|
||
6C15000
|
unkown
|
page read and write
|
||
986000
|
unkown image
|
page readonly
|
||
53BC000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
524E000
|
unkown
|
page read and write
|
||
681E000
|
unkown
|
page read and write
|
||
59F5000
|
unkown
|
page readonly
|
||
651000
|
heap default
|
page read and write
|
||
5CD4000
|
unkown
|
page readonly
|
||
4C4000
|
heap private
|
page read and write
|
||
6368000
|
unkown
|
page read and write
|
||
6E34000
|
unkown
|
page read and write
|
||
4BB0000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page execute and read and write
|
||
4FB0000
|
unkown
|
page read and write
|
||
1DD000
|
unkown
|
page execute and read and write
|
||
2190000
|
heap private
|
page read and write
|
||
92000
|
unkown image
|
page execute read
|
||
650000
|
heap private
|
page execute and read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
4310000
|
unkown
|
page read and write
|
||
64E2000
|
unkown
|
page read and write
|
||
4B6E000
|
unkown
|
page read and write
|
||
6AA3000
|
unkown
|
page read and write
|
||
5680000
|
unkown
|
page read and write
|
||
2F7000
|
heap default
|
page read and write
|
||
4F86000
|
unkown
|
page read and write
|
||
53D000
|
heap default
|
page read and write
|
||
5A78000
|
unkown
|
page readonly
|
||
4A3E000
|
unkown
|
page read and write
|
||
422E000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
28A000
|
unkown
|
page execute and read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
5C12000
|
unkown
|
page readonly
|
||
610000
|
heap default
|
page read and write
|
||
B40000
|
unkown
|
page read and write
|
||
330000
|
heap default
|
page read and write
|
||
5D59000
|
unkown
|
page readonly
|
||
17D000
|
unkown
|
page execute and read and write
|
||
570000
|
heap default
|
page read and write
|
||
6C3A000
|
unkown
|
page read and write
|
||
435D000
|
unkown
|
page read and write
|
||
40A0000
|
unkown
|
page read and write
|
||
5DD2000
|
unkown
|
page readonly
|
||
277000
|
unkown
|
page execute and read and write
|
||
4F72000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
1EF0000
|
unkown
|
page read and write
|
||
80D000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
800000
|
heap private
|
page read and write
|
||
A0000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
74C000
|
heap default
|
page read and write
|
||
6A78000
|
unkown
|
page read and write
|
||
49F6000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
34B9000
|
unkown
|
page read and write
|
||
5DE5000
|
unkown
|
page readonly
|
||
21DF000
|
unkown
|
page read and write
|
||
83BF000
|
unkown
|
page read and write
|
||
5D26000
|
unkown
|
page readonly
|
||
9D0000
|
unkown
|
page readonly
|
||
23B000
|
heap private
|
page read and write
|
||
664F000
|
unkown
|
page read and write
|
||
750000
|
heap default
|
page read and write
|
||
468000
|
unkown
|
page read and write
|
||
6C5000
|
unkown
|
page read and write
|
||
5A99000
|
unkown
|
page readonly
|
||
64C0000
|
unkown
|
page read and write
|
||
4DE0000
|
unkown
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
65BE000
|
unkown
|
page read and write
|
||
8D0000
|
unkown image
|
page readonly
|
||
27A7000
|
unkown
|
page read and write
|
||
90000
|
unkown image
|
page readonly
|
||
4F2D000
|
unkown
|
page read and write
|
||
146000
|
unkown image
|
page readonly
|
||
730000
|
unkown
|
page read and write
|
||
4E2000
|
heap private
|
page read and write
|
||
755000
|
heap private
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
5C74000
|
unkown
|
page readonly
|
||
65FE000
|
unkown
|
page read and write
|
||
8D2000
|
unkown image
|
page execute read
|
||
5C22000
|
unkown
|
page readonly
|
||
7523000
|
unkown
|
page read and write
|
||
5F89000
|
unkown
|
page readonly
|
||
54E0000
|
unkown
|
page read and write
|
||
38C000
|
heap default
|
page read and write
|
||
60DF000
|
unkown
|
page read and write
|
||
AA0000
|
unkown
|
page read and write
|
There are 1534 hidden memdumps, click here to show them.