Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Updated Order COA.doc
|
Rich Text Format data, unknown version
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\PC[1].txt
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\RegAsm.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp7790.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
|
ISO-8859 text, with no line terminators
|
dropped
|
||
C:\Users\Public\098765.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 60080 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\2TE7JJq[1].htm
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0863C5D3-5908-4917-8F28-8909E0160183}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{248C44A0-30CA-4646-ACFF-79FC9E14ADCB}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C2D3EB9C-AB70-4784-8852-5C03B64EE05D}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CabAEF5.tmp
|
Microsoft Cabinet archive data, 60080 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TarAEF6.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\task.dat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Updated Order COA.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:16
2020, mtime=Wed Aug 26 14:08:16 2020, atime=Wed Jun 16 18:01:33 2021, length=2676268, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\WG4KTJBM.txt
|
ASCII text
|
downloaded
|
||
C:\Users\user\Desktop\~$dated Order COA.doc
|
data
|
dropped
|
There are 13 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\Public\098765.exe
|
C:\Users\Public\098765.exe
|
||
C:\Users\user\AppData\Local\Temp\RegAsm.exe
|
C:\Users\user\AppData\Local\Temp\RegAsm.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
'schtasks.exe' /create /f /tn 'SMTP Service' /xml 'C:\Users\user\AppData\Local\Temp\tmp7790.tmp'
|
||
C:\Users\user\AppData\Local\Temp\RegAsm.exe
|
C:\Users\user\AppData\Local\Temp\RegAsm.exe 0
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\taskeng.exe
|
taskeng.exe {6204476F-CB6D-41BF-A018-07A92169AAA2} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
185.140.53.154
|
|||
wealthybillionaire.ddns.net
|
|||
http://ns.adobe.c/s
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://ns.ao
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://go.microsoft.
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
http://n.f
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://schema.org/WebPage
|
unknown
|
||
https://offlineclubz.com/PC.txt
|
unknown
|
||
http://ns.adobede
|
unknown
|
There are 10 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
wealthybillionaire.ddns.net
|
185.140.53.154
|
||
bit.ly
|
67.199.248.10
|
||
offlineclubz.com
|
82.221.105.125
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.140.53.154
|
wealthybillionaire.ddns.net
|
Sweden
|
||
82.221.105.125
|
offlineclubz.com
|
Iceland
|
||
67.199.248.10
|
bit.ly
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
3,6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
<-6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
d.6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ED97E
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F780D
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F780D
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
Blob
|
||
C:\Users\Public\098765.exe
|
EnableFileTracing
|
||
C:\Users\Public\098765.exe
|
EnableConsoleTracing
|
||
C:\Users\Public\098765.exe
|
FileTracingMask
|
||
C:\Users\Public\098765.exe
|
ConsoleTracingMask
|
||
C:\Users\Public\098765.exe
|
MaxFileSize
|
||
C:\Users\Public\098765.exe
|
FileDirectory
|
||
C:\Users\Public\098765.exe
|
EnableFileTracing
|
||
C:\Users\Public\098765.exe
|
EnableConsoleTracing
|
||
C:\Users\Public\098765.exe
|
FileTracingMask
|
||
C:\Users\Public\098765.exe
|
ConsoleTracingMask
|
||
C:\Users\Public\098765.exe
|
MaxFileSize
|
||
C:\Users\Public\098765.exe
|
FileDirectory
|
||
C:\Users\Public\098765.exe
|
Blob
|
||
C:\Users\Public\098765.exe
|
Blob
|
||
C:\Windows\System32\taskeng.exe
|
data
|
There are 334 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3329000
|
unkown
|
page read and write
|
||
3939000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
28F1000
|
unkown
|
page read and write
|
||
33D8000
|
unkown
|
page read and write
|
||
34D6000
|
unkown
|
page read and write
|
||
148000
|
unkown
|
page read and write
|
||
2422000
|
unkown
|
page read and write
|
||
A50000
|
unkown
|
page read and write
|
||
2493000
|
unkown
|
page read and write
|
||
2403000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
38F1000
|
unkown
|
page read and write
|
||
2412000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
83E000
|
unkown
|
page read and write
|
||
27F0000
|
unkown
|
page read and write
|
||
27B5000
|
unkown
|
page read and write
|
||
243D000
|
unkown
|
page read and write
|
||
2E76000
|
unkown
|
page read and write
|
||
2080000
|
heap private
|
page read and write
|
||
32E8000
|
unkown
|
page read and write
|
||
63E0000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
4F5E000
|
unkown
|
page read and write
|
||
260B000
|
unkown
|
page read and write
|
||
2F8000
|
heap private
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
2730000
|
unkown
|
page read and write
|
||
26D000
|
unkown
|
page execute and read and write
|
||
23FF000
|
unkown
|
page read and write
|
||
5E62000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
6E8000
|
heap default
|
page read and write
|
||
8CFC000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
CD0000
|
unkown
|
page read and write
|
||
238A000
|
unkown
|
page read and write
|
||
28F5000
|
heap private
|
page read and write
|
||
65DF000
|
unkown
|
page read and write
|
||
7FE000
|
unkown
|
page read and write
|
||
244C000
|
unkown
|
page read and write
|
||
2783000
|
unkown
|
page read and write
|
||
27B9000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
27B3000
|
unkown
|
page read and write
|
||
28AC000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
4B0F000
|
unkown
|
page read and write
|
||
255E000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
6668000
|
unkown
|
page read and write
|
||
280D000
|
unkown
|
page read and write
|
||
38B000
|
heap private
|
page read and write
|
||
CC0000
|
unkown
|
page read and write
|
||
3F0000
|
heap private
|
page read and write
|
||
24FE000
|
unkown
|
page read and write
|
||
65CE000
|
unkown
|
page read and write
|
||
28A8000
|
unkown
|
page read and write
|
||
CD0000
|
unkown
|
page read and write
|
||
26C3000
|
unkown
|
page read and write
|
||
B3E000
|
unkown
|
page read and write
|
||
24D8000
|
unkown
|
page read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
4B15000
|
unkown
|
page read and write
|
||
2536000
|
unkown
|
page read and write
|
||
23FB000
|
unkown
|
page read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
2747000
|
unkown
|
page read and write
|
||
26E000
|
unkown
|
page read and write
|
||
517F000
|
unkown
|
page read and write
|
||
26BB000
|
unkown
|
page read and write
|
||
5E0000
|
heap private
|
page read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
4B4B000
|
unkown
|
page read and write
|
||
25DB000
|
unkown
|
page read and write
|
||
260D000
|
unkown
|
page read and write
|
||
2879000
|
unkown
|
page read and write
|
||
24F7000
|
unkown
|
page read and write
|
||
255C000
|
unkown
|
page read and write
|
||
94E000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
2080000
|
unkown
|
page read and write
|
||
5E2D000
|
unkown
|
page read and write
|
||
4CD0000
|
unkown
|
page readonly
|
||
6C5000
|
unkown
|
page read and write
|
||
4B47000
|
unkown
|
page read and write
|
||
2762000
|
unkown
|
page read and write
|
||
4B3A000
|
unkown
|
page read and write
|
||
5A0000
|
heap private
|
page execute and read and write
|
||
2798000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
3C0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
E32000
|
unkown image
|
page execute read
|
||
CD0000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
522E000
|
unkown
|
page read and write
|
||
593C000
|
unkown
|
page read and write
|
||
53DE000
|
unkown
|
page read and write
|
||
2877000
|
unkown
|
page read and write
|
||
23EA000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
A50000
|
unkown
|
page read and write
|
||
50E000
|
heap default
|
page read and write
|
||
696000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
660B000
|
unkown
|
page read and write
|
||
540000
|
heap default
|
page read and write
|
||
2861000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
2796000
|
unkown
|
page read and write
|
||
26DC000
|
unkown
|
page read and write
|
||
60EE000
|
unkown
|
page read and write
|
||
58DD000
|
unkown
|
page read and write
|
||
2080000
|
unkown
|
page read and write
|
||
280F000
|
unkown
|
page read and write
|
||
A70000
|
unkown
|
page execute and read and write
|
||
4CC0000
|
unkown
|
page readonly
|
||
4FED000
|
unkown
|
page read and write
|
||
24C1000
|
unkown
|
page read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
26D4000
|
unkown
|
page read and write
|
||
26AC000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page read and write
|
||
2420000
|
unkown
|
page read and write
|
||
4A2D000
|
unkown
|
page read and write
|
||
2424000
|
unkown
|
page read and write
|
||
26AE000
|
unkown
|
page read and write
|
||
2102000
|
heap private
|
page read and write
|
||
2080000
|
unkown
|
page read and write
|
||
60FC000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page execute and read and write
|
||
24DE000
|
unkown
|
page read and write
|
||
776000
|
unkown
|
page read and write
|
||
28B2000
|
unkown
|
page read and write
|
||
2754000
|
unkown
|
page read and write
|
||
360000
|
unkown
|
page read and write
|
||
257D000
|
unkown
|
page read and write
|
||
661B000
|
unkown
|
page read and write
|
||
27B1000
|
unkown
|
page read and write
|
||
531E000
|
unkown
|
page read and write
|
||
286F000
|
unkown
|
page read and write
|
||
283D000
|
unkown
|
page read and write
|
||
2080000
|
unkown
|
page read and write
|
||
52DC000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
66BA000
|
unkown
|
page read and write
|
||
4B3A000
|
unkown
|
page read and write
|
||
6970000
|
heap private
|
page read and write
|
||
27BE000
|
unkown
|
page read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
24F1000
|
unkown
|
page read and write
|
||
C70000
|
unkown
|
page read and write
|
||
2850000
|
heap private
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
2807000
|
unkown
|
page read and write
|
||
282A000
|
unkown
|
page read and write
|
||
1EB000
|
unkown
|
page execute and read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
24A4000
|
unkown
|
page read and write
|
||
264000
|
unkown
|
page read and write
|
||
1E0000
|
heap private
|
page read and write
|
||
25D1000
|
unkown
|
page read and write
|
||
24E2000
|
unkown
|
page read and write
|
||
241C000
|
unkown
|
page read and write
|
||
110000
|
heap default
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
4B54000
|
unkown
|
page read and write
|
||
24BF000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
263F000
|
unkown
|
page read and write
|
||
576E000
|
unkown
|
page read and write | page guard
|
||
500000
|
unkown
|
page readonly
|
||
407000
|
heap default
|
page read and write
|
||
488000
|
heap default
|
page read and write
|
||
66F8000
|
unkown
|
page read and write
|
||
190000
|
unkown image
|
page readonly
|
||
23DC000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
2060000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
2585000
|
unkown
|
page read and write
|
||
2F0000
|
heap private
|
page read and write
|
||
2437000
|
unkown
|
page read and write
|
||
241E000
|
unkown
|
page read and write
|
||
26D2000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page execute and read and write
|
||
501E000
|
unkown
|
page read and write | page guard
|
||
2060000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
243B000
|
unkown
|
page read and write
|
||
26DA000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
580000
|
unkown
|
page read and write
|
||
342000
|
heap private
|
page read and write
|
||
25D5000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
65FC000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
279A000
|
unkown
|
page read and write
|
||
24ED000
|
unkown
|
page read and write
|
||
28EE000
|
unkown
|
page read and write | page guard
|
||
53D000
|
unkown
|
page read and write
|
||
2587000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page execute and read and write
|
||
26A8000
|
unkown
|
page read and write
|
||
640000
|
heap private
|
page read and write
|
||
2080000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
28AE000
|
unkown
|
page read and write
|
||
8A0000
|
unkown
|
page read and write
|
||
28C3000
|
unkown
|
page read and write
|
||
65FE000
|
unkown
|
page read and write
|
||
2749000
|
unkown
|
page read and write
|
||
4B3A000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
565F000
|
unkown
|
page read and write
|
||
2794000
|
unkown
|
page read and write
|
||
2479000
|
unkown
|
page read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
C6F000
|
unkown
|
page read and write
|
||
3A000
|
unkown
|
page read and write
|
||
4B4F000
|
unkown
|
page read and write
|
||
2C0000
|
unkown
|
page read and write
|
||
AC0000
|
unkown
|
page readonly
|
||
286000
|
unkown
|
page execute and read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
697E000
|
unkown
|
page read and write
|
||
26F9000
|
unkown
|
page read and write
|
||
2841000
|
unkown
|
page read and write
|
||
6670000
|
unkown
|
page read and write
|
||
4B54000
|
unkown
|
page read and write
|
||
25F2000
|
unkown
|
page read and write
|
||
2942000
|
unkown
|
page read and write
|
||
297000
|
unkown
|
page execute and read and write
|
||
18D000
|
unkown
|
page read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
A70000
|
unkown
|
page read and write
|
||
C70000
|
unkown
|
page read and write
|
||
4F90000
|
unkown
|
page readonly
|
||
2A0000
|
unkown
|
page read and write
|
||
4B42000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
925000
|
unkown
|
page read and write
|
||
67CD000
|
unkown
|
page read and write
|
||
257F000
|
unkown
|
page read and write
|
||
268D000
|
unkown
|
page read and write
|
||
A30000
|
unkown
|
page read and write
|
||
AC0000
|
heap private
|
page execute and read and write
|
||
26C5000
|
unkown
|
page read and write
|
||
669A000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
4B43000
|
unkown
|
page read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
645000
|
heap private
|
page read and write
|
||
25A0000
|
unkown
|
page read and write
|
||
27EA000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
2618000
|
unkown
|
page read and write
|
||
249E000
|
unkown
|
page read and write
|
||
2386000
|
unkown
|
page read and write
|
||
23FD000
|
unkown
|
page read and write
|
||
4E5000
|
heap default
|
page read and write
|
||
5230000
|
heap private
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
26FB000
|
unkown
|
page read and write
|
||
2622000
|
unkown
|
page read and write
|
||
547E000
|
unkown
|
page read and write
|
||
25CF000
|
unkown
|
page read and write
|
||
3A9000
|
heap private
|
page read and write
|
||
5E4C000
|
unkown
|
page read and write
|
||
464F000
|
unkown
|
page read and write
|
||
2220000
|
unkown
|
page readonly
|
||
C70000
|
unkown
|
page read and write
|
||
515E000
|
unkown
|
page read and write
|
||
CF0000
|
unkown
|
page read and write
|
||
4B13000
|
unkown
|
page read and write
|
||
2060000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
D40000
|
unkown
|
page readonly
|
||
5501000
|
heap private
|
page read and write
|
||
654E000
|
unkown
|
page read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
82E000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
6B3E000
|
unkown
|
page read and write
|
||
66D0000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
2620000
|
unkown
|
page read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
58DC000
|
unkown
|
page read and write
|
||
A60000
|
unkown
|
page read and write
|
||
2589000
|
unkown
|
page read and write
|
||
A50000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
5E9E000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
251D000
|
unkown
|
page read and write
|
||
5E36000
|
unkown
|
page read and write
|
||
620F000
|
heap private
|
page read and write
|
||
26F5000
|
unkown
|
page read and write
|
||
274D000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
274F000
|
unkown
|
page read and write
|
||
372000
|
heap default
|
page read and write
|
||
2641000
|
unkown
|
page read and write
|
||
E30000
|
unkown image
|
page readonly
|
||
24D6000
|
unkown
|
page read and write
|
||
24DA000
|
unkown
|
page read and write
|
||
234F000
|
unkown
|
page read and write
|
||
436000
|
unkown
|
page read and write
|
||
46D000
|
heap default
|
page read and write
|
||
66FC000
|
unkown
|
page read and write
|
||
2858000
|
unkown
|
page read and write
|
||
2450000
|
unkown
|
page read and write
|
||
A50000
|
unkown
|
page read and write
|
||
22E1000
|
unkown
|
page read and write
|
||
650000
|
heap default
|
page read and write
|
||
2439000
|
unkown
|
page read and write
|
||
777000
|
unkown
|
page read and write
|
||
2495000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
1B4000
|
unkown
|
page read and write
|
||
C60000
|
unkown
|
page readonly
|
||
26F7000
|
unkown
|
page read and write
|
||
24B9000
|
unkown
|
page read and write
|
||
2626000
|
unkown
|
page read and write
|
||
2693000
|
unkown
|
page read and write
|
||
400000
|
heap default
|
page read and write
|
||
20E0000
|
heap private
|
page read and write
|
||
424000
|
heap default
|
page read and write
|
||
698000
|
unkown
|
page read and write
|
||
2579000
|
unkown
|
page read and write
|
||
A70000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
4B3A000
|
unkown
|
page read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
2414000
|
unkown
|
page read and write
|
||
2489000
|
unkown
|
page read and write
|
||
5E9E000
|
unkown
|
page read and write
|
||
66BA000
|
unkown
|
page read and write
|
||
4650000
|
unkown
|
page readonly
|
||
3861000
|
unkown
|
page read and write
|
||
614E000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
283B000
|
unkown
|
page read and write
|
||
4AF0000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
285C000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
277000
|
unkown
|
page read and write
|
||
2070000
|
unkown
|
page read and write
|
||
1E6000
|
heap private
|
page read and write
|
||
2080000
|
unkown
|
page read and write
|
||
26DE000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
2689000
|
unkown
|
page read and write
|
||
E20000
|
unkown
|
page read and write
|
||
54F0000
|
heap private
|
page read and write
|
||
1B3000
|
unkown
|
page execute and read and write
|
||
2710000
|
unkown
|
page read and write
|
||
A60000
|
unkown
|
page read and write
|
||
7BD000
|
unkown
|
page read and write
|
||
27D000
|
unkown
|
page execute and read and write
|
||
24F5000
|
unkown
|
page read and write
|
||
24D0000
|
unkown
|
page read and write
|
||
5E2D000
|
unkown
|
page read and write
|
||
24E0000
|
unkown
|
page read and write
|
||
2330000
|
heap private
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
26D8000
|
unkown
|
page read and write
|
||
2550000
|
unkown
|
page read and write
|
||
292B000
|
heap private
|
page read and write
|
||
292000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page read and write
|
||
44AD000
|
unkown
|
page read and write
|
||
2532000
|
unkown
|
page read and write
|
||
2538000
|
unkown
|
page read and write
|
||
D3D000
|
unkown
|
page read and write
|
||
474000
|
heap default
|
page read and write
|
||
4BF0000
|
heap private
|
page execute and read and write
|
||
2335000
|
unkown
|
page read and write
|
||
5C2D000
|
unkown
|
page read and write
|
||
CF0000
|
unkown
|
page read and write
|
||
576E000
|
unkown
|
page read and write
|
||
253A000
|
unkown
|
page read and write
|
||
5480000
|
unkown
|
page readonly
|
||
5E3A000
|
unkown
|
page read and write
|
||
C24D000
|
unkown
|
page read and write
|
||
1BD000
|
unkown
|
page execute and read and write
|
||
29D000
|
unkown
|
page execute and read and write
|
||
690000
|
unkown
|
page read and write
|
||
460000
|
heap default
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
29B000
|
unkown
|
page execute and read and write
|
||
60AE000
|
unkown
|
page read and write
|
||
283F000
|
unkown
|
page read and write
|
||
28B0000
|
unkown
|
page read and write
|
||
5C8E000
|
unkown
|
page read and write
|
||
24FB000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
2564000
|
unkown
|
page read and write
|
||
2485000
|
unkown
|
page read and write
|
||
A70000
|
heap private
|
page read and write
|
||
A2F000
|
unkown
|
page read and write
|
||
938000
|
unkown
|
page read and write
|
||
2603000
|
unkown
|
page read and write
|
||
840000
|
unkown
|
page readonly
|
||
457000
|
heap default
|
page read and write
|
||
2639000
|
unkown
|
page read and write
|
||
66BA000
|
unkown
|
page read and write
|
||
268F000
|
unkown
|
page read and write
|
||
27EE000
|
unkown
|
page read and write
|
||
2792000
|
unkown
|
page read and write
|
||
21A0000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
2751000
|
unkown
|
page read and write
|
||
274B000
|
unkown
|
page read and write
|
||
A70000
|
unkown
|
page read and write
|
||
2637000
|
unkown
|
page read and write
|
||
1FE000
|
unkown image
|
page readonly
|
||
241A000
|
unkown
|
page read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
5E62000
|
unkown
|
page read and write
|
||
2583000
|
unkown
|
page read and write
|
||
324000
|
heap private
|
page read and write
|
||
4B10000
|
unkown
|
page read and write
|
||
5644000
|
unkown
|
page read and write
|
||
6A1E000
|
unkown
|
page read and write
|
||
24C4000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
A60000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page read and write
|
||
307000
|
heap default
|
page read and write
|
||
2745000
|
unkown
|
page read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
2712000
|
unkown
|
page read and write
|
||
25D7000
|
unkown
|
page read and write
|
||
6B0000
|
unkown
|
page read and write
|
||
6B0000
|
unkown
|
page read and write
|
||
A2E000
|
unkown
|
page read and write | page guard
|
||
A76000
|
heap private
|
page read and write
|
||
5648000
|
unkown
|
page read and write
|
||
43E000
|
heap default
|
page read and write
|
||
501F000
|
unkown
|
page read and write
|
||
25D9000
|
unkown
|
page read and write
|
||
8A0000
|
unkown
|
page read and write
|
||
2431000
|
unkown
|
page read and write
|
||
A70000
|
unkown
|
page read and write
|
||
A60000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
4A0E000
|
unkown
|
page read and write
|
||
2448000
|
unkown
|
page read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
5DF0000
|
unkown
|
page read and write
|
||
775000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
617000
|
heap default
|
page read and write
|
||
5E6A000
|
unkown
|
page read and write
|
||
92E000
|
unkown
|
page read and write
|
||
2470000
|
unkown
|
page read and write
|
||
505E000
|
unkown
|
page read and write
|
||
627000
|
heap private
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
636F000
|
unkown
|
page read and write
|
||
246E000
|
unkown
|
page read and write
|
||
2320000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
24DC000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
24B3000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
2854000
|
unkown
|
page read and write
|
||
20E4000
|
heap private
|
page read and write
|
||
25EA000
|
unkown
|
page read and write
|
||
634000
|
heap default
|
page read and write
|
||
4B54000
|
unkown
|
page read and write
|
||
4B4A000
|
unkown
|
page read and write
|
||
C6E000
|
unkown
|
page read and write | page guard
|
||
24E7000
|
unkown
|
page read and write
|
||
2418000
|
unkown
|
page read and write
|
||
20D0000
|
unkown
|
page read and write
|
||
CE0000
|
unkown image
|
page readonly
|
||
277D000
|
unkown
|
page read and write
|
||
6704000
|
unkown
|
page read and write
|
||
6200000
|
heap private
|
page read and write
|
||
5E5E000
|
unkown
|
page read and write
|
||
5E4F000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page read and write
|
||
5F20000
|
heap private
|
page read and write
|
||
2060000
|
unkown
|
page read and write
|
||
65FC000
|
unkown
|
page read and write
|
||
4171000
|
unkown
|
page read and write
|
||
2581000
|
unkown
|
page read and write
|
||
2852000
|
unkown
|
page read and write
|
||
248F000
|
unkown
|
page read and write
|
||
4B54000
|
unkown
|
page read and write
|
||
2714000
|
unkown
|
page read and write
|
||
720000
|
heap private
|
page execute and read and write
|
||
24D4000
|
unkown
|
page read and write
|
||
25F0000
|
unkown
|
page read and write
|
||
2658000
|
unkown
|
page read and write
|
||
320000
|
heap private
|
page read and write
|
||
65D0000
|
unkown
|
page read and write
|
||
265A000
|
unkown
|
page read and write
|
||
263000
|
unkown
|
page execute and read and write
|
||
442E000
|
unkown
|
page read and write
|
||
2B68000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
4B3A000
|
unkown
|
page read and write
|
||
27E8000
|
unkown
|
page read and write
|
||
2779000
|
unkown
|
page read and write
|
||
3C2000
|
unkown
|
page read and write
|
||
2B0000
|
unkown
|
page execute and read and write
|
||
A50000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
778000
|
unkown
|
page read and write
|
||
2809000
|
unkown
|
page read and write
|
||
285A000
|
unkown
|
page read and write
|
||
4B64000
|
unkown
|
page read and write
|
||
4B30000
|
heap private
|
page execute and read and write
|
||
282000
|
unkown
|
page read and write
|
||
2474000
|
unkown
|
page read and write
|
||
263B000
|
unkown
|
page read and write
|
||
2AD000
|
unkown
|
page execute and read and write
|
||
24C8000
|
unkown
|
page read and write
|
||
380000
|
heap private
|
page read and write
|
||
2350000
|
unkown
|
page readonly
|
||
2596000
|
unkown
|
page read and write
|
||
2062000
|
unkown
|
page read and write
|
||
254B000
|
unkown
|
page read and write
|
||
2070000
|
unkown
|
page execute and read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
3C7000
|
unkown
|
page execute and read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
66AE000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
580000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
1F2000
|
unkown image
|
page execute read
|
||
8A0000
|
unkown
|
page read and write
|
||
27F2000
|
unkown
|
page read and write
|
||
256A000
|
unkown
|
page read and write
|
||
27BD000
|
unkown
|
page read and write
|
||
C00000
|
unkown
|
page readonly
|
||
A80000
|
unkown
|
page readonly
|
||
66F0000
|
unkown
|
page read and write
|
||
244E000
|
unkown
|
page read and write
|
||
23EE000
|
unkown
|
page read and write
|
||
666B000
|
unkown
|
page read and write
|
||
4510000
|
heap private
|
page read and write
|
||
287B000
|
unkown
|
page read and write
|
||
27A0000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
2605000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
930000
|
unkown
|
page read and write
|
||
2080000
|
unkown
|
page read and write
|
||
4B66000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
25EE000
|
unkown
|
page read and write
|
||
27F5000
|
unkown
|
page read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
663C000
|
unkown
|
page read and write
|
||
2687000
|
unkown
|
page read and write
|
||
A70000
|
unkown
|
page read and write
|
||
2734000
|
unkown
|
page read and write
|
||
24E5000
|
unkown
|
page read and write
|
||
90000
|
heap private
|
page execute and read and write
|
||
5E46000
|
unkown
|
page read and write
|
||
24D2000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page read and write
|
||
4CBF000
|
unkown
|
page read and write
|
||
24CC000
|
unkown
|
page read and write
|
||
28EF000
|
unkown
|
page read and write
|
||
12A000
|
unkown
|
page read and write
|
||
610000
|
heap default
|
page read and write
|
||
2568000
|
unkown
|
page read and write
|
||
558000
|
unkown
|
page read and write
|
||
2314000
|
unkown
|
page read and write
|
||
2652000
|
unkown
|
page read and write
|
||
635D000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
618E000
|
unkown
|
page read and write
|
||
4B3A000
|
unkown
|
page read and write
|
||
4A30000
|
unkown
|
page write copy
|
||
4B43000
|
unkown
|
page read and write
|
||
2472000
|
unkown
|
page read and write
|
||
24F3000
|
unkown
|
page read and write
|
||
2D4000
|
unkown
|
page read and write
|
||
ED4000
|
unkown image
|
page readonly
|
||
2871000
|
unkown
|
page read and write
|
||
2435000
|
unkown
|
page read and write
|
||
23E6000
|
unkown
|
page read and write
|
||
2487000
|
unkown
|
page read and write
|
||
A60000
|
unkown
|
page read and write
|
||
274000
|
heap private
|
page read and write
|
||
65D1000
|
unkown
|
page read and write
|
||
2601000
|
unkown
|
page read and write
|
||
3BA000
|
unkown
|
page execute and read and write
|
||
22B000
|
unkown
|
page read and write
|
||
2777000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
2732000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
268B000
|
unkown
|
page read and write
|
||
5A8D000
|
unkown
|
page read and write
|
||
279C000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
277B000
|
unkown
|
page read and write
|
||
2820000
|
unkown
|
page read and write
|
||
4B31000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
1F0000
|
unkown image
|
page readonly
|
||
432E000
|
unkown
|
page read and write
|
||
20CE000
|
unkown
|
page read and write
|
||
6693000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
293000
|
unkown
|
page execute and read and write
|
||
6B6000
|
unkown
|
page read and write
|
||
274F000
|
unkown
|
page read and write
|
||
2594000
|
unkown
|
page read and write
|
||
25F7000
|
unkown
|
page read and write
|
||
2311000
|
unkown
|
page read and write
|
||
3919000
|
unkown
|
page read and write
|
||
5A3C000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
4BD000
|
heap default
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
620000
|
heap private
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
543E000
|
unkown
|
page read and write
|
||
48D000
|
heap default
|
page read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
2477000
|
unkown
|
page read and write
|
||
2624000
|
unkown
|
page read and write
|
||
59FF000
|
unkown
|
page read and write
|
||
2811000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page read and write
|
||
5620000
|
unkown
|
page read and write
|
||
E20000
|
unkown
|
page read and write
|
||
4B13000
|
unkown
|
page read and write
|
||
580000
|
unkown
|
page read and write
|
||
2416000
|
unkown
|
page read and write
|
||
E32000
|
unkown image
|
page execute read
|
||
5A00000
|
unkown
|
page readonly
|
||
6203000
|
heap private
|
page read and write
|
||
1C20000
|
unkown
|
page readonly
|
||
5DFF000
|
unkown
|
page read and write
|
||
44B0000
|
heap private
|
page read and write
|
||
26E0000
|
unkown
|
page read and write
|
||
2643000
|
unkown
|
page read and write
|
||
2645000
|
unkown
|
page read and write
|
||
2813000
|
unkown
|
page read and write
|
||
65DF000
|
unkown
|
page read and write
|
||
52DF000
|
unkown
|
page read and write
|
||
2856000
|
unkown
|
page read and write
|
||
4B0D000
|
unkown
|
page read and write
|
||
A50000
|
unkown
|
page read and write
|
||
1F0000
|
unkown image
|
page readonly
|
||
24AC000
|
unkown
|
page read and write
|
||
2691000
|
unkown
|
page read and write
|
||
BFF0000
|
unkown
|
page read and write
|
||
27CA000
|
unkown
|
page read and write
|
||
1F0000
|
unkown image
|
page readonly
|
||
6C0000
|
heap default
|
page read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
491000
|
heap default
|
page read and write
|
||
CF0000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
3B6000
|
unkown
|
page execute and read and write
|
||
C4BE000
|
unkown
|
page read and write
|
||
284D000
|
unkown
|
page read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
2508000
|
unkown
|
page read and write
|
||
670000
|
unkown
|
page write copy
|
||
27B7000
|
unkown
|
page read and write
|
||
285E000
|
unkown
|
page read and write
|
||
2070000
|
unkown
|
page read and write
|
||
25CD000
|
unkown
|
page read and write
|
||
6B0000
|
unkown
|
page read and write
|
||
24F9000
|
unkown
|
page read and write
|
||
26C7000
|
unkown
|
page read and write
|
||
4B54000
|
unkown
|
page read and write
|
||
4C30000
|
unkown
|
page readonly
|
||
66BF000
|
unkown
|
page read and write
|
||
33E000
|
heap default
|
page read and write
|
||
1F2000
|
unkown image
|
page execute read
|
||
2370000
|
unkown
|
page readonly
|
||
450000
|
heap default
|
page read and write
|
||
2324000
|
unkown
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
2607000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
1FE000
|
unkown image
|
page readonly
|
||
4B64000
|
unkown
|
page read and write
|
||
2875000
|
unkown
|
page read and write
|
||
588E000
|
unkown
|
page read and write
|
||
213D000
|
unkown
|
page read and write
|
||
252C000
|
unkown
|
page read and write
|
||
6B0000
|
unkown
|
page read and write
|
||
2805000
|
unkown
|
page read and write
|
||
940000
|
unkown
|
page readonly
|
||
760000
|
unkown
|
page read and write
|
||
4FCE000
|
unkown
|
page read and write
|
||
300000
|
heap default
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
294000
|
unkown
|
page read and write
|
||
820000
|
unkown
|
page readonly
|
||
5FB0000
|
heap private
|
page read and write
|
||
98E000
|
unkown
|
page read and write
|
||
2491000
|
unkown
|
page read and write
|
||
663C000
|
unkown
|
page read and write
|
||
27EC000
|
unkown
|
page read and write
|
||
26FD000
|
unkown
|
page read and write
|
||
4A00000
|
unkown
|
page readonly
|
||
140000
|
heap default
|
page read and write
|
||
4B21000
|
unkown
|
page read and write
|
||
37A000
|
unkown
|
page read and write
|
||
3CB000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown image
|
page readonly
|
||
6B5000
|
unkown
|
page read and write
|
||
A70000
|
unkown
|
page read and write
|
||
2566000
|
unkown
|
page read and write
|
||
26D0000
|
unkown
|
page readonly
|
||
252E000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
4B20000
|
unkown
|
page read and write
|
||
696000
|
unkown
|
page read and write
|
||
25F4000
|
unkown
|
page read and write
|
||
1FE000
|
unkown image
|
page readonly
|
||
660000
|
unkown
|
page read and write
|
||
6A0000
|
unkown
|
page read and write
|
||
5340000
|
heap private
|
page execute and read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
249C000
|
unkown
|
page read and write
|
||
57CC000
|
unkown
|
page read and write
|
||
5EA0000
|
heap private
|
page read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
2433000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
2562000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
A0000
|
unkown
|
page readonly
|
||
26A4000
|
unkown
|
page read and write
|
||
26C1000
|
unkown
|
page read and write
|
||
E30000
|
unkown image
|
page readonly
|
||
4B54000
|
unkown
|
page read and write
|
||
A50000
|
unkown
|
page read and write
|
||
ABE000
|
unkown
|
page read and write
|
||
6668000
|
unkown
|
page read and write
|
||
242F000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
28B4000
|
unkown
|
page read and write
|
||
3E0000
|
heap default
|
page read and write
|
||
257B000
|
unkown
|
page read and write
|
||
2518000
|
unkown
|
page read and write
|
||
248D000
|
unkown
|
page read and write
|
||
CBE000
|
unkown
|
page read and write
|
||
219F000
|
unkown
|
page read and write
|
||
261E000
|
unkown
|
page read and write
|
||
246C000
|
unkown
|
page read and write
|
||
4B14000
|
unkown
|
page read and write
|
||
21A0000
|
unkown
|
page read and write
|
||
254D000
|
unkown
|
page read and write
|
||
26D6000
|
unkown
|
page read and write
|
||
1F2000
|
unkown image
|
page execute read
|
||
665000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
EB000
|
unkown
|
page read and write
|
||
65FD000
|
unkown
|
page read and write
|
||
24A2000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
6B3E000
|
unkown
|
page read and write
|
||
32E1000
|
unkown
|
page read and write
|
||
26E3000
|
unkown
|
page read and write
|
||
54F0000
|
unkown
|
page write copy
|
||
66C0000
|
unkown
|
page read and write
|
||
C5EE000
|
unkown
|
page read and write | page guard
|
||
265D000
|
unkown
|
page read and write
|
||
2530000
|
unkown
|
page read and write
|
||
A50000
|
unkown
|
page read and write
|
||
6B0000
|
unkown
|
page read and write
|
||
540000
|
heap private
|
page execute and read and write
|
||
6C6000
|
heap default
|
page read and write
|
||
240E000
|
unkown
|
page read and write
|
||
4B31000
|
unkown
|
page read and write
|
||
2678000
|
unkown
|
page read and write
|
||
2860000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
28AA000
|
unkown
|
page read and write
|
||
998000
|
unkown
|
page read and write
|
||
2307000
|
unkown
|
page read and write
|
||
279E000
|
unkown
|
page read and write
|
||
20BB000
|
heap private
|
page read and write
|
||
28A000
|
unkown
|
page execute and read and write
|
||
261A000
|
unkown
|
page read and write
|
||
2768000
|
unkown
|
page read and write
|
||
C70000
|
unkown
|
page read and write
|
||
4B64000
|
unkown
|
page read and write
|
||
26A6000
|
unkown
|
page read and write
|
||
23E8000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
A40000
|
unkown
|
page execute and read and write
|
||
26BF000
|
unkown
|
page read and write
|
||
3DC000
|
unkown
|
page read and write
|
||
26BD000
|
unkown
|
page read and write
|
||
1FE000
|
unkown image
|
page readonly
|
||
770000
|
unkown
|
page read and write
|
||
25D3000
|
unkown
|
page read and write
|
||
28A6000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page read and write
|
||
2598000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
1F2000
|
unkown image
|
page execute read
|
||
280B000
|
unkown
|
page read and write
|
||
24AA000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
54AE000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
26F3000
|
unkown
|
page read and write
|
||
2401000
|
unkown
|
page read and write
|
||
259A000
|
unkown
|
page read and write
|
||
231C000
|
unkown
|
page read and write
|
||
248B000
|
unkown
|
page read and write
|
||
438000
|
heap default
|
page read and write
|
||
ED4000
|
unkown image
|
page readonly
|
||
1E7000
|
unkown
|
page execute and read and write
|
||
2850000
|
unkown
|
page read and write
|
||
2766000
|
unkown
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
2440000
|
unkown
|
page read and write
|
||
8A0000
|
unkown
|
page read and write
|
||
1F0000
|
unkown image
|
page readonly
|
||
3A5000
|
unkown
|
page read and write
|
||
2696000
|
unkown
|
page read and write
|
||
5E48000
|
unkown
|
page read and write
|
||
263D000
|
unkown
|
page read and write
|
||
4B43000
|
unkown
|
page read and write
|
||
4B4E000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
5628000
|
unkown
|
page read and write
|
||
27CC000
|
unkown
|
page read and write
|
||
4B31000
|
unkown
|
page read and write
|
||
2560000
|
unkown
|
page read and write
|
||
261C000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
1F0000
|
unkown image
|
page readonly
|
||
8D0000
|
heap private
|
page execute and read and write
|
||
A60000
|
unkown
|
page read and write
|
||
E30000
|
unkown image
|
page readonly
|
||
2609000
|
unkown
|
page read and write
|
||
C5EF000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
930000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page read and write
|
||
4DB000
|
heap default
|
page read and write
|
||
23EC000
|
unkown
|
page read and write
|
||
2120000
|
unkown
|
page read and write
|
||
2452000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
270000
|
heap private
|
page read and write
|
||
251B000
|
unkown
|
page read and write
|
||
576F000
|
unkown
|
page read and write
|
||
7DE000
|
unkown
|
page read and write
|
||
28F0000
|
heap private
|
page read and write
|
||
242B000
|
unkown
|
page read and write
|
||
65C000
|
heap default
|
page read and write
|
||
49FE000
|
unkown
|
page read and write
|
||
26AA000
|
unkown
|
page read and write
|
||
2084000
|
heap private
|
page read and write
|
||
4B31000
|
unkown
|
page read and write
|
||
CD0000
|
unkown
|
page read and write
|
||
776000
|
unkown
|
page read and write
|
||
6B0000
|
unkown
|
page readonly
|
||
2737000
|
unkown
|
page read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
2764000
|
unkown
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
There are 902 hidden memdumps, click here to show them.