Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
QUOTATION1100630004R2.doc
|
Rich Text Format data, unknown version
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\princedanx[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\princedan85671.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\princedan85671.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{23BE6748-299E-4B99-A605-44EE5B79BCDD}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9B83DDB5-D064-451A-A615-F9D5A3E063B2}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E2185495-5638-43A1-A616-4B202C23444A}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\QUOTATION1100630004R2.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:16
2020, mtime=Wed Aug 26 14:08:16 2020, atime=Thu Jul 22 20:20:35 2021, length=56031, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$OTATION1100630004R2.doc
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\user\AppData\Roaming\princedan85671.exe
|
C:\Users\user\AppData\Roaming\princedan85671.exe
|
||
C:\Users\user\AppData\Local\Temp\princedan85671.exe
|
C:\Users\user\AppData\Local\Temp\princedan85671.exe vgyjnbhui
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Windows\SysWOW64\netsh.exe
|
C:\Windows\SysWOW64\netsh.exe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\SysWOW64\cmd.exe
|
/c del 'C:\Users\user\AppData\Local\Temp\princedan85671.exe'
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://topv.xyz/princedanx.exe
|
185.239.243.112
|
||
http://www.google.com.br/
|
unknown
|
||
http://search.chol.com/favicon.ico
|
unknown
|
||
http://www.mercadolivre.com.br/
|
unknown
|
||
http://www.merlin.com.pl/favicon.ico
|
unknown
|
||
http://search.ebay.de/
|
unknown
|
||
http://www.mtv.com/
|
unknown
|
||
http://www.rambler.ru/
|
unknown
|
||
http://www.nifty.com/favicon.ico
|
unknown
|
||
http://www.dailymail.co.uk/
|
unknown
|
||
http://www3.fnac.com/favicon.ico
|
unknown
|
||
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
|
unknown
|
||
http://buscar.ya.com/
|
unknown
|
||
http://search.yahoo.com/favicon.ico
|
unknown
|
||
http://www.iis.fhg.de/audioPA
|
unknown
|
||
http://www.sogou.com/favicon.ico
|
unknown
|
||
http://asp.usatoday.com/
|
unknown
|
||
http://fr.search.yahoo.com/
|
unknown
|
||
http://rover.ebay.com
|
unknown
|
||
http://in.search.yahoo.com/
|
unknown
|
||
http://img.shopzilla.com/shopzilla/shopzilla.ico
|
unknown
|
||
http://www.msn.com/de-de/?ocid=iehpL
|
unknown
|
||
http://search.ebay.in/
|
unknown
|
||
http://image.excite.co.jp/jp/favicon/lep.ico
|
unknown
|
||
http://%s.com
|
unknown
|
||
http://msk.afisha.ru/
|
unknown
|
||
http://busca.igbusca.com.br//app/static/images/favicon.ico
|
unknown
|
||
http://www.google.com.tw/
|
unknown
|
||
http://search.rediff.com/
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://www.ya.com/favicon.ico
|
unknown
|
||
http://www.etmall.com.tw/favicon.ico
|
unknown
|
||
http://it.search.dada.net/favicon.ico
|
unknown
|
||
http://search.naver.com/
|
unknown
|
||
http://www.google.ru/
|
unknown
|
||
http://search.hanafos.com/favicon.ico
|
unknown
|
||
http://cgi.search.biglobe.ne.jp/favicon.ico
|
unknown
|
||
http://www.abril.com.br/favicon.ico
|
unknown
|
||
http://search.daum.net/
|
unknown
|
||
http://search.naver.com/favicon.ico
|
unknown
|
||
http://search.msn.co.jp/results.aspx?q=
|
unknown
|
||
http://www.clarin.com/favicon.ico
|
unknown
|
||
http://buscar.ozu.es/
|
unknown
|
||
http://kr.search.yahoo.com/
|
unknown
|
||
http://search.about.com/
|
unknown
|
||
http://busca.igbusca.com.br/
|
unknown
|
||
http://www.microsofttranslator.com/BVPrev.aspx?ref=IE8Activity
|
unknown
|
||
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
|
unknown
|
||
http://www.ask.com/
|
unknown
|
||
http://www.priceminister.com/favicon.ico
|
unknown
|
||
http://www.cjmall.com/
|
unknown
|
||
http://search.centrum.cz/
|
unknown
|
||
http://suche.t-online.de/
|
unknown
|
||
http://www.google.it/
|
unknown
|
||
http://search.auction.co.kr/
|
unknown
|
||
http://www.ceneo.pl/
|
unknown
|
||
http://www.amazon.de/
|
unknown
|
||
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
|
unknown
|
||
http://sads.myspace.com/
|
unknown
|
||
http://busca.buscape.com.br/favicon.ico
|
unknown
|
||
http://www.pchome.com.tw/favicon.ico
|
unknown
|
||
http://browse.guardian.co.uk/favicon.ico
|
unknown
|
||
http://google.pchome.com.tw/
|
unknown
|
||
http://list.taobao.com/browse/search_visual.htm?n=15&q=
|
unknown
|
||
http://www.rambler.ru/favicon.ico
|
unknown
|
||
http://uk.search.yahoo.com/
|
unknown
|
||
http://espanol.search.yahoo.com/
|
unknown
|
||
http://www.ozu.es/favicon.ico
|
unknown
|
||
http://search.sify.com/
|
unknown
|
||
http://openimage.interpark.com/interpark.ico
|
unknown
|
||
http://search.yahoo.co.jp/favicon.ico
|
unknown
|
||
http://search.ebay.com/
|
unknown
|
||
http://www.gmarket.co.kr/
|
unknown
|
||
http://search.nifty.com/
|
unknown
|
||
http://searchresults.news.com.au/
|
unknown
|
||
http://www.google.si/
|
unknown
|
||
http://www.google.cz/
|
unknown
|
||
http://www.soso.com/
|
unknown
|
||
http://www.univision.com/
|
unknown
|
||
http://search.ebay.it/
|
unknown
|
||
http://images.joins.com/ui_c/fvc_joins.ico
|
unknown
|
||
http://www.asharqalawsat.com/
|
unknown
|
||
http://busca.orange.es/
|
unknown
|
||
http://cnweb.search.live.com/results.aspx?q=
|
unknown
|
||
http://auto.search.msn.com/response.asp?MT=
|
unknown
|
||
http://search.yahoo.co.jp
|
unknown
|
||
http://www.target.com/
|
unknown
|
||
http://buscador.terra.es/
|
unknown
|
||
http://search.orange.co.uk/favicon.ico
|
unknown
|
||
http://www.iask.com/
|
unknown
|
||
http://www.tesco.com/
|
unknown
|
||
http://cgi.search.biglobe.ne.jp/
|
unknown
|
||
http://search.seznam.cz/favicon.ico
|
unknown
|
||
http://suche.freenet.de/favicon.ico
|
unknown
|
||
http://search.interpark.com/
|
unknown
|
||
http://clients5.google.com/complete/search?hl=
|
unknown
|
||
http://search.ipop.co.kr/favicon.ico
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
http://search.espn.go.com/
|
unknown
|
||
http://www.myspace.com/favicon.ico
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.anandsharmah.com
|
45.64.105.11
|
||
topv.xyz
|
185.239.243.112
|
||
www.klimareporter.com
|
81.88.63.46
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.239.243.112
|
topv.xyz
|
Moldova Republic of
|
||
45.64.105.11
|
www.anandsharmah.com
|
India
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
d39
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
;49
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'69
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ED25C
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F4089
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F4089
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
||
C:\Users\user\AppData\Roaming\princedan85671.exe
|
FontCachePath
|
There are 314 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
260000
|
unkown
|
page read and write
|
||
3596000
|
unkown
|
page read and write
|
||
34FC000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
F0000
|
unkown
|
page execute and read and write
|
||
2D0000
|
unkown
|
page execute and read and write
|
||
80000
|
unkown
|
page execute and read and write
|
||
3459000
|
unkown
|
page read and write
|
||
8280000
|
heap private
|
page read and write
|
||
480000
|
unkown
|
page read and write
|
||
49B2000
|
heap private
|
page read and write
|
||
690000
|
unkown
|
page execute and read and write
|
||
5480000
|
unkown
|
page readonly
|
||
460000
|
unkown
|
page read and write
|
||
124000
|
unkown
|
page read and write
|
||
52F0000
|
unkown
|
page read and write
|
||
5B52000
|
unkown
|
page readonly
|
||
92C000
|
unkown image
|
page readonly
|
||
34F4000
|
unkown
|
page readonly
|
||
6050000
|
unkown
|
page read and write
|
||
2510000
|
unkown
|
page write copy
|
||
6AC1000
|
unkown
|
page read and write
|
||
4090000
|
heap private
|
page read and write
|
||
52F0000
|
unkown
|
page read and write
|
||
67C7000
|
unkown
|
page read and write
|
||
3C40000
|
unkown
|
page readonly
|
||
5370000
|
unkown
|
page write copy
|
||
2E70000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
24C0000
|
unkown
|
page read and write
|
||
4970000
|
unkown
|
page read and write
|
||
510000
|
heap default
|
page read and write
|
||
96F4000
|
unkown
|
page readonly
|
||
1C13000
|
heap private
|
page read and write
|
||
4790000
|
unkown
|
page read and write
|
||
19B000
|
unkown
|
page execute and read and write
|
||
67FC000
|
unkown
|
page read and write
|
||
A330000
|
unkown
|
page write copy
|
||
170000
|
unkown
|
page readonly
|
||
42B3000
|
unkown
|
page read and write
|
||
2EE0000
|
unkown
|
page readonly
|
||
517000
|
heap default
|
page read and write
|
||
3B30000
|
unkown
|
page read and write
|
||
2BC0000
|
unkown
|
page write copy
|
||
5277000
|
unkown
|
page read and write
|
||
5B82000
|
unkown
|
page readonly
|
||
348000
|
unkown
|
page read and write
|
||
4994000
|
heap private
|
page read and write
|
||
659A000
|
unkown
|
page read and write
|
||
6BF0000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
490000
|
heap private
|
page read and write
|
||
260000
|
heap default
|
page read and write
|
||
38A0000
|
unkown
|
page readonly
|
||
966B000
|
unkown
|
page readonly
|
||
26B0000
|
unkown
|
page readonly
|
||
6977000
|
unkown
|
page read and write
|
||
25D000
|
heap default
|
page read and write
|
||
5090000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
5B09000
|
unkown
|
page readonly
|
||
2BE0000
|
unkown
|
page readonly
|
||
6B1B000
|
unkown
|
page read and write
|
||
62F2000
|
unkown
|
page readonly
|
||
6462000
|
unkown
|
page read and write
|
||
1300000
|
unkown
|
page execute and read and write
|
||
35F6000
|
unkown
|
page readonly
|
||
4B4E000
|
unkown
|
page read and write
|
||
6773000
|
unkown
|
page read and write
|
||
7716000
|
unkown
|
page read and write
|
||
66F2000
|
unkown
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
152000
|
unkown image
|
page execute read
|
||
5B75000
|
unkown
|
page readonly
|
||
4960000
|
unkown
|
page read and write
|
||
52D2000
|
unkown
|
page read and write
|
||
68B9000
|
unkown
|
page read and write
|
||
70D1000
|
unkown
|
page read and write
|
||
C616000
|
unkown
|
page read and write
|
||
7040000
|
heap private
|
page read and write
|
||
5D0000
|
unkown
|
page read and write
|
||
4226000
|
unkown
|
page read and write
|
||
1DC000
|
unkown image
|
page readonly
|
||
7AB9000
|
unkown
|
page read and write
|
||
BE1000
|
unkown
|
page read and write
|
||
D77000
|
unkown
|
page execute and read and write
|
||
2710000
|
unkown
|
page readonly
|
||
4A0000
|
unkown
|
page read and write
|
||
8662000
|
unkown
|
page read and write
|
||
2DBF000
|
unkown
|
page read and write
|
||
6BF8000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
839E000
|
unkown
|
page read and write | page guard
|
||
4F30000
|
unkown
|
page readonly
|
||
8BCD000
|
unkown
|
page readonly
|
||
2D20000
|
unkown
|
page execute read
|
||
160000
|
unkown
|
page read and write
|
||
150000
|
unkown image
|
page readonly
|
||
676A000
|
unkown
|
page read and write
|
||
FAF000
|
unkown
|
page read and write
|
||
6862000
|
unkown
|
page read and write
|
||
4980000
|
unkown
|
page read and write
|
||
4A40000
|
unkown
|
page read and write
|
||
D74000
|
unkown
|
page execute and read and write
|
||
1319000
|
unkown
|
page execute and read and write
|
||
1C70000
|
unkown
|
page readonly
|
||
450000
|
unkown
|
page read and write
|
||
825F000
|
unkown
|
page read and write
|
||
AE0000
|
unkown
|
page execute and read and write
|
||
2BB000
|
heap default
|
page read and write
|
||
6CBB000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
2D30000
|
unkown
|
page read and write
|
||
654A000
|
unkown
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
51BE000
|
unkown
|
page read and write
|
||
1B5A000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
1BC0000
|
unkown
|
page read and write
|
||
64C000
|
heap default
|
page read and write
|
||
5B0000
|
unkown
|
page read and write
|
||
2ED0000
|
unkown
|
page readonly
|
||
67F8000
|
unkown
|
page read and write
|
||
676E000
|
unkown
|
page read and write
|
||
6CB1000
|
unkown
|
page read and write
|
||
2A90000
|
unkown
|
page read and write
|
||
1BB0000
|
unkown
|
page readonly
|
||
2B80000
|
unkown
|
page read and write
|
||
790000
|
unkown
|
page readonly
|
||
4A40000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
67CE000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
5F0000
|
heap default
|
page read and write
|
||
54A000
|
heap default
|
page read and write
|
||
52B6000
|
unkown
|
page read and write
|
||
614000
|
heap default
|
page read and write
|
||
270000
|
unkown
|
page execute and read and write
|
||
CE84000
|
unkown
|
page read and write
|
||
7F0000
|
heap private
|
page read and write
|
||
6BE5000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
2AF0000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
9475000
|
unkown
|
page readonly
|
||
B2C3000
|
heap private
|
page read and write
|
||
6571000
|
unkown
|
page read and write
|
||
6C04000
|
unkown
|
page read and write
|
||
179000
|
unkown
|
page read and write
|
||
73B000
|
unkown
|
page read and write
|
||
6968000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
3665000
|
unkown
|
page readonly
|
||
62D7000
|
unkown
|
page read and write
|
||
4960000
|
unkown
|
page read and write
|
||
5B89000
|
unkown
|
page readonly
|
||
5B22000
|
unkown
|
page readonly
|
||
2A0000
|
heap default
|
page read and write
|
||
480000
|
unkown
|
page read and write
|
||
10000
|
heap private
|
page read and write
|
||
4500000
|
unkown
|
page readonly
|
||
3412000
|
unkown
|
page readonly
|
||
2100000
|
unkown
|
page readonly
|
||
3AEF000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page read and write
|
||
34D4000
|
unkown
|
page readonly
|
||
1E9000
|
heap default
|
page read and write
|
||
8398000
|
unkown
|
page read and write
|
||
66F7000
|
unkown
|
page read and write
|
||
C30000
|
unkown
|
page read and write
|
||
525C000
|
unkown
|
page read and write
|
||
6EA000
|
heap default
|
page read and write
|
||
2550000
|
unkown
|
page read and write
|
||
6776000
|
unkown
|
page read and write
|
||
6C3B000
|
unkown
|
page read and write
|
||
2690000
|
unkown
|
page readonly
|
||
C30000
|
unkown
|
page read and write
|
||
890000
|
unkown
|
page read and write
|
||
224000
|
heap private
|
page read and write
|
||
30D000
|
unkown
|
page read and write
|
||
68AA000
|
unkown
|
page read and write
|
||
5822000
|
unkown
|
page readonly
|
||
F60000
|
unkown
|
page execute and read and write
|
||
4560000
|
unkown
|
page read and write
|
||
6DEF000
|
unkown
|
page readonly
|
||
4800000
|
heap private
|
page read and write
|
||
C51000
|
unkown
|
page execute and read and write
|
||
5A1E000
|
unkown
|
page read and write
|
||
6855000
|
unkown
|
page read and write
|
||
2370000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
2060000
|
unkown
|
page readonly
|
||
C54000
|
unkown
|
page execute and read and write
|
||
684A000
|
unkown
|
page read and write
|
||
6BC2000
|
unkown
|
page read and write
|
||
5DB0000
|
unkown
|
page read and write
|
||
73EE000
|
unkown
|
page read and write
|
||
CD0000
|
unkown
|
page execute and read and write
|
||
886000
|
unkown
|
page read and write
|
||
6581000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
5AB0000
|
unkown
|
page readonly
|
||
2830000
|
unkown
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
3E0000
|
unkown
|
page readonly
|
||
4294000
|
unkown
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
3679000
|
unkown
|
page readonly
|
||
890000
|
unkown
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
25A0000
|
unkown
|
page readonly
|
||
2CC0000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
941000
|
unkown
|
page read and write
|
||
58AF000
|
unkown
|
page read and write
|
||
63D0000
|
unkown
|
page read and write
|
||
2A71000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page execute and read and write
|
||
4263000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
EF1000
|
unkown
|
page execute and read and write
|
||
6B74000
|
unkown
|
page read and write
|
||
2240000
|
unkown
|
page read and write
|
||
4AC7000
|
unkown
|
page read and write
|
||
1B9A000
|
unkown
|
page read and write
|
||
2520000
|
unkown
|
page readonly
|
||
649F000
|
unkown
|
page read and write
|
||
4610000
|
unkown
|
page read and write
|
||
457000
|
unkown
|
page read and write
|
||
3642000
|
unkown
|
page readonly
|
||
142000
|
unkown
|
page read and write
|
||
771B000
|
unkown
|
page read and write
|
||
2EF9000
|
heap private
|
page read and write
|
||
8FA000
|
unkown
|
page execute and read and write
|
||
57B000
|
unkown
|
page read and write
|
||
3940000
|
unkown
|
page read and write
|
||
35B5000
|
unkown
|
page readonly
|
||
5AC5000
|
unkown
|
page readonly
|
||
8A2000
|
unkown image
|
page execute read
|
||
5B0D000
|
unkown
|
page readonly
|
||
DE0000
|
unkown
|
page execute and read and write
|
||
65A0000
|
unkown
|
page read and write
|
||
C40000
|
unkown
|
page read and write
|
||
2C90000
|
unkown
|
page read and write
|
||
AD7000
|
unkown
|
page execute and read and write
|
||
2220000
|
unkown
|
page read and write
|
||
B7F000
|
unkown
|
page read and write
|
||
5EE0000
|
unkown
|
page read and write
|
||
63CE000
|
unkown
|
page read and write
|
||
26B0000
|
unkown
|
page readonly
|
||
82D0000
|
unkown
|
page read and write
|
||
6BAE000
|
unkown
|
page read and write
|
||
3880000
|
unkown
|
page readonly
|
||
1C0000
|
unkown
|
page readonly
|
||
51D0000
|
unkown
|
page read and write
|
||
2E2E000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
4470000
|
unkown
|
page readonly
|
||
2A50000
|
unkown
|
page readonly
|
||
1BE0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2379000
|
unkown
|
page read and write
|
||
52F0000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page write copy
|
||
5C0000
|
unkown
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
B10000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
6842000
|
unkown
|
page read and write
|
||
2EE0000
|
unkown
|
page readonly
|
||
46E0000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
123000
|
unkown
|
page execute and read and write
|
||
4B5E000
|
unkown
|
page read and write
|
||
2C90000
|
unkown
|
page read and write
|
||
6575000
|
unkown
|
page read and write
|
||
6696000
|
unkown
|
page read and write
|
||
21E0000
|
unkown
|
page readonly
|
||
B5F000
|
unkown
|
page read and write
|
||
7721000
|
unkown
|
page read and write
|
||
456000
|
unkown
|
page read and write
|
||
46C000
|
unkown
|
page read and write
|
||
2700000
|
unkown
|
page readonly
|
||
26D0000
|
unkown
|
page readonly
|
||
48B0000
|
heap private
|
page read and write
|
||
26A0000
|
unkown
|
page readonly
|
||
8632000
|
unkown
|
page read and write
|
||
C40000
|
unkown
|
page read and write
|
||
9BF0000
|
unkown
|
page read and write
|
||
F70000
|
unkown
|
page execute and read and write
|
||
2380000
|
unkown
|
page read and write
|
||
70F000
|
unkown
|
page read and write
|
||
5828000
|
unkown
|
page readonly
|
||
2410000
|
heap private
|
page read and write
|
||
52A2000
|
unkown
|
page read and write
|
||
5B06000
|
unkown
|
page readonly
|
||
82FD000
|
unkown
|
page read and write
|
||
5AA6000
|
unkown
|
page readonly
|
||
4060000
|
unkown
|
page read and write
|
||
469000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page readonly
|
||
548000
|
unkown
|
page read and write
|
||
6781000
|
unkown
|
page read and write
|
||
693B000
|
unkown
|
page read and write
|
||
842E000
|
unkown
|
page read and write
|
||
AB50000
|
heap private
|
page read and write
|
||
6303000
|
unkown
|
page read and write
|
||
66EF000
|
unkown
|
page readonly
|
||
5E40000
|
unkown
|
page read and write
|
||
7150000
|
heap private
|
page read and write
|
||
67D0000
|
unkown
|
page read and write
|
||
393E000
|
unkown
|
page read and write
|
||
6C6A000
|
unkown
|
page read and write
|
||
BEE000
|
unkown
|
page read and write
|
||
8951000
|
unkown
|
page readonly
|
||
123F000
|
unkown
|
page read and write
|
||
5440000
|
heap private
|
page read and write
|
||
6A2E000
|
unkown
|
page read and write
|
||
2E50000
|
unkown
|
page read and write
|
||
6988000
|
unkown
|
page readonly
|
||
6C28000
|
unkown
|
page read and write
|
||
CDC2000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
48F0000
|
unkown
|
page read and write
|
||
5AB2000
|
unkown
|
page readonly
|
||
1300000
|
unkown
|
page execute and read and write
|
||
1BF5000
|
heap private
|
page read and write
|
||
5F7000
|
heap default
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
67B1000
|
unkown
|
page read and write
|
||
66D8000
|
unkown
|
page read and write
|
||
597A000
|
unkown
|
page read and write
|
||
967E000
|
unkown
|
page readonly
|
||
230000
|
heap private
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
81BB000
|
unkown
|
page read and write
|
||
2D30000
|
unkown
|
page read and write
|
||
5829000
|
unkown
|
page read and write
|
||
890000
|
unkown
|
page read and write
|
||
39F4000
|
unkown
|
page read and write
|
||
5B0000
|
unkown
|
page read and write
|
||
5F8E000
|
unkown
|
page read and write
|
||
62C5000
|
unkown
|
page readonly
|
||
6D5C000
|
unkown
|
page read and write
|
||
544B000
|
heap private
|
page read and write
|
||
4616000
|
unkown
|
page read and write
|
||
3F5000
|
unkown
|
page read and write
|
||
2540000
|
unkown
|
page read and write
|
||
2CE0000
|
unkown
|
page read and write
|
||
67BD000
|
unkown
|
page read and write
|
||
5922000
|
unkown
|
page readonly
|
||
59E2000
|
unkown
|
page readonly
|
||
2B80000
|
unkown
|
page read and write
|
||
23F0000
|
unkown
|
page read and write
|
||
3619000
|
unkown
|
page readonly
|
||
44C0000
|
unkown
|
page read and write
|
||
3318000
|
unkown
|
page readonly
|
||
4FA0000
|
unkown
|
page read and write
|
||
69B8000
|
unkown
|
page read and write
|
||
8313000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
856E000
|
unkown
|
page read and write
|
||
75E000
|
unkown
|
page read and write
|
||
52A2000
|
unkown
|
page read and write
|
||
52E6000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
2E60000
|
unkown
|
page readonly
|
||
76C0000
|
heap private
|
page read and write
|
||
39E0000
|
unkown
|
page read and write
|
||
26C0000
|
unkown
|
page readonly
|
||
F80000
|
unkown
|
page execute and read and write
|
||
1E9000
|
heap default
|
page read and write
|
||
5B0000
|
unkown
|
page execute and read and write
|
||
2520000
|
unkown
|
page readonly
|
||
414D000
|
unkown
|
page read and write
|
||
92C000
|
unkown image
|
page readonly
|
||
3312000
|
unkown
|
page readonly
|
||
16E000
|
unkown
|
page read and write
|
||
7AC0000
|
heap private
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
A53E000
|
unkown
|
page read and write
|
||
1D0000
|
heap default
|
page read and write
|
||
150000
|
unkown image
|
page readonly
|
||
4E40000
|
unkown
|
page read and write
|
||
480000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
66DE000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page execute and read and write
|
||
72F0000
|
heap private
|
page read and write
|
||
2370000
|
unkown
|
page read and write
|
||
6F94000
|
heap private
|
page read and write
|
||
52F0000
|
unkown
|
page read and write
|
||
2C70000
|
unkown
|
page read and write
|
||
226E000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
5444000
|
heap private
|
page read and write
|
||
4568000
|
unkown
|
page read and write
|
||
6480000
|
unkown
|
page read and write
|
||
668F000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
C40000
|
unkown
|
page read and write
|
||
2CA0000
|
unkown
|
page read and write
|
||
1D7000
|
heap default
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
7B40000
|
unkown
|
page read and write
|
||
840000
|
unkown
|
page read and write
|
||
28EF000
|
unkown
|
page read and write
|
||
2EFE000
|
heap private
|
page read and write
|
||
8A0000
|
unkown image
|
page readonly
|
||
B320000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page read and write
|
||
1C13000
|
heap private
|
page read and write
|
||
82DC000
|
unkown
|
page read and write
|
||
AD0000
|
unkown
|
page readonly
|
||
2BB000
|
heap default
|
page read and write
|
||
6801000
|
unkown
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
5A20000
|
heap private
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
3412000
|
unkown
|
page readonly
|
||
59E4000
|
unkown
|
page readonly
|
||
68FE000
|
unkown
|
page read and write
|
||
685B000
|
unkown
|
page read and write
|
||
5AF5000
|
unkown
|
page readonly
|
||
2E0F000
|
unkown
|
page read and write
|
||
5D90000
|
unkown
|
page readonly
|
||
683F000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
35F9000
|
unkown
|
page readonly
|
||
13D000
|
unkown
|
page execute and read and write
|
||
6A7000
|
heap default
|
page read and write
|
||
4440000
|
unkown
|
page read and write
|
||
B0A000
|
unkown
|
page read and write
|
||
2587000
|
unkown
|
page readonly
|
||
2EF0000
|
heap private
|
page read and write
|
||
5B0000
|
unkown
|
page read and write
|
||
94CF000
|
unkown
|
page readonly
|
||
5DD0000
|
unkown
|
page read and write
|
||
2B40000
|
unkown
|
page readonly
|
||
80000
|
unkown
|
page readonly
|
||
550000
|
unkown
|
page readonly
|
||
1BD0000
|
unkown
|
page read and write
|
||
52A2000
|
unkown
|
page read and write
|
||
7733000
|
unkown
|
page read and write
|
||
8654000
|
unkown
|
page read and write
|
||
6F70000
|
unkown
|
page read and write
|
||
5680000
|
heap private
|
page read and write
|
||
944000
|
unkown
|
page read and write
|
||
6C4000
|
heap default
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
49D0000
|
unkown
|
page read and write
|
||
2C2000
|
heap default
|
page read and write
|
||
8040000
|
unkown
|
page read and write
|
||
6684000
|
unkown
|
page read and write
|
||
10000
|
heap private
|
page read and write
|
||
8A2000
|
unkown image
|
page execute read
|
||
6CA9000
|
unkown
|
page read and write
|
||
3840000
|
unkown
|
page readonly
|
||
25E000
|
unkown
|
page read and write
|
||
3635000
|
unkown
|
page readonly
|
||
1BF5000
|
heap private
|
page read and write
|
||
5B59000
|
unkown
|
page readonly
|
||
2BE0000
|
unkown
|
page readonly
|
||
2B30000
|
unkown
|
page readonly
|
||
23D0000
|
unkown
|
page read and write
|
||
20FF000
|
unkown
|
page read and write
|
||
24B0000
|
unkown
|
page write copy
|
||
364F000
|
unkown
|
page read and write
|
||
3514000
|
unkown
|
page readonly
|
||
990000
|
unkown
|
page execute and read and write
|
||
880000
|
unkown
|
page read and write
|
||
525D000
|
unkown
|
page read and write
|
||
48EE000
|
unkown
|
page read and write
|
||
5ED0000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page readonly
|
||
5AE2000
|
unkown
|
page readonly
|
||
152000
|
unkown image
|
page execute read
|
||
428F000
|
unkown
|
page read and write
|
||
890000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
3512000
|
unkown
|
page readonly
|
||
B50000
|
unkown
|
page execute and read and write
|
||
AE0000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
947000
|
unkown
|
page read and write
|
||
660A000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
70FE000
|
unkown
|
page read and write
|
||
631000
|
heap default
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
2E40000
|
unkown
|
page read and write
|
||
3649000
|
unkown
|
page readonly
|
||
77F0000
|
unkown
|
page read and write
|
||
2A20000
|
unkown
|
page readonly
|
||
428C000
|
unkown
|
page read and write
|
||
2E38000
|
unkown
|
page read and write
|
||
8666000
|
unkown
|
page read and write
|
||
2380000
|
unkown
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
641E000
|
unkown
|
page read and write
|
||
8285000
|
heap private
|
page read and write
|
||
6CAB000
|
unkown
|
page read and write
|
||
768C000
|
unkown
|
page read and write
|
||
2700000
|
unkown
|
page readonly
|
||
1FC000
|
unkown
|
page read and write
|
||
6C88000
|
unkown
|
page read and write
|
||
39F0000
|
unkown
|
page read and write
|
||
146000
|
unkown
|
page execute and read and write
|
||
52D2000
|
unkown
|
page read and write
|
||
930000
|
unkown
|
page read and write
|
||
2438000
|
heap private
|
page read and write
|
||
745E000
|
unkown
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
A329000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
14D000
|
unkown
|
page read and write
|
||
6C33000
|
unkown
|
page read and write
|
||
2550000
|
unkown
|
page read and write
|
||
8C2A000
|
unkown
|
page readonly
|
||
2100000
|
unkown
|
page readonly
|
||
8A0000
|
unkown image
|
page readonly
|
||
231000
|
heap default
|
page read and write
|
||
6373000
|
unkown
|
page read and write
|
||
47A0000
|
unkown
|
page read and write
|
||
633E000
|
unkown
|
page read and write
|
||
B10000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
2390000
|
heap private
|
page execute and read and write
|
||
689E000
|
unkown
|
page readonly
|
||
53D000
|
unkown
|
page read and write
|
||
25F2000
|
unkown
|
page read and write
|
||
3B70000
|
unkown
|
page read and write
|
||
F00000
|
unkown
|
page execute and read and write
|
||
54A0000
|
unkown
|
page readonly
|
||
65D3000
|
unkown
|
page read and write
|
||
3542000
|
unkown
|
page readonly
|
||
A3DA000
|
unkown
|
page write copy
|
||
5258000
|
unkown
|
page read and write
|
||
5DE0000
|
unkown
|
page read and write
|
||
CFC0000
|
unkown
|
page read and write
|
||
231000
|
heap default
|
page read and write
|
||
B60000
|
unkown
|
page execute and read and write
|
||
64DA000
|
unkown
|
page read and write
|
||
4253000
|
unkown
|
page read and write
|
||
4520000
|
unkown
|
page readonly
|
||
740000
|
unkown
|
page read and write
|
||
480000
|
unkown
|
page read and write
|
||
7737000
|
unkown
|
page read and write
|
||
480000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
51C0000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
5C0000
|
unkown
|
page read and write
|
||
C60000
|
unkown
|
page execute and read and write
|
||
179000
|
unkown
|
page read and write
|
||
1320000
|
unkown
|
page readonly
|
||
49FD000
|
unkown
|
page read and write
|
||
2220000
|
unkown
|
page read and write
|
||
6C47000
|
unkown
|
page read and write
|
||
340000
|
heap default
|
page read and write
|
||
26F0000
|
unkown
|
page readonly
|
||
6606000
|
unkown
|
page read and write
|
||
2BC0000
|
unkown
|
page write copy
|
||
48AF000
|
unkown
|
page read and write
|
||
5A65000
|
unkown
|
page readonly
|
||
2666000
|
unkown
|
page read and write
|
||
4297000
|
unkown
|
page read and write
|
||
70C0000
|
unkown
|
page read and write
|
||
C6D8000
|
unkown
|
page read and write
|
||
C40000
|
unkown
|
page execute and read and write
|
||
A3E9000
|
unkown
|
page write copy
|
||
4510000
|
unkown
|
page execute and read and write
|
||
4588000
|
unkown
|
page read and write
|
||
EF7000
|
unkown
|
page execute and read and write
|
||
6804000
|
unkown
|
page read and write
|
||
2E38000
|
unkown
|
page read and write
|
||
C50000
|
unkown
|
page read and write
|
||
67F6000
|
unkown
|
page read and write
|
||
890000
|
unkown
|
page read and write
|
||
236D000
|
unkown
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
35E5000
|
unkown
|
page readonly
|
||
888E000
|
unkown
|
page read and write
|
||
47A0000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
2720000
|
unkown
|
page read and write
|
||
6040000
|
unkown
|
page read and write
|
||
AB55000
|
heap private
|
page read and write
|
||
9D0000
|
unkown
|
page execute and read and write
|
||
64EE000
|
unkown
|
page read and write
|
||
7410000
|
heap private
|
page read and write
|
||
338000
|
unkown
|
page read and write
|
||
6E0000
|
heap default
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
66F0000
|
unkown
|
page read and write
|
||
A320000
|
unkown
|
page read and write
|
||
89F000
|
unkown
|
page read and write
|
||
AB73000
|
heap private
|
page read and write
|
||
2CD0000
|
unkown
|
page write copy
|
||
6F90000
|
heap private
|
page read and write
|
||
D60000
|
unkown
|
page execute and read and write
|
||
6281000
|
unkown
|
page read and write
|
||
6432000
|
unkown
|
page read and write
|
||
8555000
|
unkown
|
page read and write
|
||
656A000
|
unkown
|
page read and write
|
||
3585000
|
unkown
|
page readonly
|
||
BF0000
|
unkown
|
page read and write
|
||
3C13000
|
unkown
|
page read and write
|
||
30D000
|
unkown
|
page read and write
|
||
2E40000
|
unkown
|
page read and write
|
||
26A0000
|
unkown
|
page readonly
|
||
150000
|
unkown
|
page readonly
|
||
2F90000
|
unkown
|
page readonly
|
||
4A0000
|
unkown
|
page read and write
|
||
6BEE000
|
unkown
|
page read and write
|
||
52F0000
|
unkown
|
page read and write
|
||
2CF0000
|
unkown
|
page read and write
|
||
54E000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
2A0000
|
heap default
|
page read and write
|
||
9B0000
|
unkown
|
page read and write
|
||
579E000
|
unkown
|
page read and write
|
||
66E9000
|
unkown
|
page read and write
|
||
7044000
|
unkown
|
page read and write
|
||
4196000
|
unkown
|
page read and write
|
||
66BF000
|
unkown
|
page read and write
|
||
A3B9000
|
unkown
|
page write copy
|
||
2070000
|
unkown
|
page readonly
|
||
5B29000
|
unkown
|
page readonly
|
||
3F0000
|
unkown
|
page read and write
|
||
90D2000
|
unkown
|
page readonly
|
||
2710000
|
unkown
|
page readonly
|
||
90A5000
|
unkown
|
page readonly
|
||
25F2000
|
unkown
|
page read and write
|
||
4AA000
|
unkown
|
page read and write
|
||
26D0000
|
unkown
|
page readonly
|
||
20FF000
|
unkown
|
page read and write
|
||
FB0000
|
unkown
|
page readonly
|
||
4450000
|
unkown
|
page readonly
|
||
3860000
|
unkown
|
page readonly
|
||
C60F000
|
unkown
|
page read and write
|
||
6787000
|
unkown
|
page read and write
|
||
150000
|
unkown image
|
page readonly
|
||
534000
|
heap default
|
page read and write
|
||
1A0000
|
unkown
|
page read and write
|
||
53E000
|
unkown
|
page read and write
|
||
35D2000
|
unkown
|
page readonly
|
||
5A04000
|
unkown
|
page readonly
|
||
2AB4000
|
unkown
|
page read and write
|
||
4AC2000
|
unkown
|
page read and write
|
||
625E000
|
unkown
|
page read and write
|
||
B10000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
2260000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
BE4000
|
unkown
|
page read and write
|
||
5D1000
|
unkown
|
page read and write
|
||
3566000
|
unkown
|
page readonly
|
||
6C30000
|
unkown
|
page read and write
|
||
4A50000
|
unkown
|
page read and write
|
||
549000
|
unkown
|
page read and write
|
||
4FC0000
|
unkown
|
page read and write
|
||
2451000
|
unkown
|
page read and write
|
||
2CB0000
|
unkown
|
page read and write
|
||
C50000
|
heap private
|
page execute and read and write
|
||
6C72000
|
unkown
|
page read and write
|
||
850000
|
unkown
|
page read and write
|
||
1C70000
|
unkown
|
page readonly
|
||
69FC000
|
unkown
|
page read and write
|
||
4B50000
|
unkown
|
page readonly
|
||
2E80000
|
unkown
|
page read and write
|
||
5230000
|
unkown
|
page read and write
|
||
1B5A000
|
unkown
|
page read and write
|
||
291F000
|
unkown
|
page read and write
|
||
4ABF000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
3596000
|
unkown
|
page readonly
|
||
6880000
|
unkown
|
page read and write
|
||
43D0000
|
unkown
|
page write copy
|
||
5F9000
|
unkown
|
page read and write
|
||
9BCF000
|
unkown
|
page readonly
|
||
6420000
|
unkown
|
page read and write
|
||
950000
|
unkown
|
page read and write
|
||
C30000
|
unkown
|
page read and write
|
||
1DD000
|
heap default
|
page read and write
|
||
53F000
|
unkown
|
page read and write
|
||
51EC000
|
heap private
|
page read and write
|
||
51F0000
|
unkown
|
page read and write
|
||
3318000
|
unkown
|
page readonly
|
||
CD83000
|
unkown
|
page read and write
|
||
3802000
|
unkown
|
page readonly
|
||
48C000
|
unkown
|
page read and write
|
||
2B50000
|
unkown
|
page readonly
|
||
5B45000
|
unkown
|
page readonly
|
||
4720000
|
unkown
|
page read and write
|
||
81AF000
|
unkown
|
page read and write
|
||
2400000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
63F000
|
unkown
|
page read and write
|
||
5448000
|
heap private
|
page read and write
|
||
2DBF000
|
unkown
|
page read and write
|
||
476000
|
unkown
|
page read and write
|
||
2F70000
|
unkown
|
page readonly
|
||
52B6000
|
unkown
|
page read and write
|
||
9768000
|
unkown
|
page readonly
|
||
6815000
|
unkown
|
page read and write
|
||
4530000
|
heap private
|
page read and write
|
||
B148000
|
unkown
|
page read and write
|
||
1B80000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
26F000
|
unkown
|
page read and write
|
||
5293000
|
unkown
|
page read and write
|
||
DDF000
|
unkown
|
page read and write
|
||
748000
|
unkown
|
page read and write
|
||
DF0000
|
unkown
|
page execute and read and write
|
||
CF80000
|
unkown
|
page read and write
|
||
726D000
|
unkown
|
page read and write
|
||
2A50000
|
unkown
|
page readonly
|
||
669C000
|
unkown
|
page read and write
|
||
B0000
|
unkown
|
page readonly
|
||
839F000
|
unkown
|
page read and write
|
||
6BB5000
|
unkown
|
page read and write
|
||
65CF000
|
unkown
|
page read and write
|
||
A6D000
|
unkown
|
page read and write
|
||
41AD000
|
unkown
|
page read and write
|
||
2AB4000
|
unkown
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
4051000
|
unkown
|
page read and write
|
||
44B0000
|
unkown
|
page write copy
|
||
2230000
|
unkown
|
page read and write
|
||
8A0000
|
unkown image
|
page readonly
|
||
2250000
|
unkown
|
page read and write
|
||
6545000
|
unkown
|
page read and write
|
||
2B20000
|
unkown
|
page readonly
|
||
28EF000
|
unkown
|
page read and write
|
||
2D20000
|
unkown
|
page execute read
|
||
450000
|
unkown
|
page read and write
|
||
3572000
|
unkown
|
page readonly
|
||
2B50000
|
unkown
|
page readonly
|
||
5D70000
|
unkown
|
page readonly
|
||
D4000
|
heap private
|
page read and write
|
||
5AE000
|
unkown
|
page read and write
|
||
2E50000
|
unkown
|
page read and write
|
||
2EF5000
|
heap private
|
page read and write
|
||
6914000
|
unkown
|
page readonly
|
||
4450000
|
unkown
|
page readonly
|
||
120000
|
unkown
|
page write copy
|
||
38B0000
|
unkown
|
page read and write
|
||
968E000
|
unkown
|
page readonly
|
||
3646000
|
unkown
|
page read and write
|
||
6BC4000
|
unkown
|
page read and write
|
||
2EC0000
|
unkown
|
page readonly
|
||
2E2E000
|
unkown
|
page read and write
|
||
3B80000
|
unkown
|
page readonly
|
||
68AE000
|
unkown
|
page readonly
|
||
6280000
|
unkown
|
page read and write
|
||
3695000
|
unkown
|
page readonly
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
D80000
|
unkown
|
page execute and read and write
|
||
6578000
|
unkown
|
page read and write
|
||
66DC000
|
unkown
|
page read and write
|
||
2220000
|
unkown
|
page read and write
|
||
AC0000
|
unkown
|
page execute and read and write
|
||
2240000
|
unkown
|
page read and write
|
||
3D6000
|
unkown
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
47A0000
|
unkown
|
page read and write
|
||
30B000
|
unkown
|
page read and write
|
||
5FF000
|
unkown
|
page read and write
|
||
2712000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page read and write
|
||
C1F000
|
unkown
|
page read and write
|
||
C80000
|
unkown
|
page execute and read and write
|
||
890000
|
unkown
|
page read and write
|
||
52E6000
|
unkown
|
page read and write
|
||
2B20000
|
unkown
|
page readonly
|
||
34D2000
|
unkown
|
page readonly
|
||
1B0000
|
unkown
|
page read and write
|
||
6695000
|
unkown
|
page readonly
|
||
197000
|
unkown
|
page execute and read and write
|
||
6888000
|
unkown
|
page readonly
|
||
6F77000
|
unkown
|
page read and write
|
||
5FEE000
|
unkown
|
page read and write
|
||
43BC000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
545000
|
heap default
|
page read and write
|
||
44E0000
|
unkown
|
page read and write
|
||
525C000
|
unkown
|
page read and write
|
||
548000
|
unkown
|
page read and write
|
||
2EF5000
|
heap private
|
page read and write
|
||
2EB0000
|
unkown
|
page read and write
|
||
AD0000
|
unkown
|
page execute and read and write
|
||
1F5000
|
heap default
|
page read and write
|
||
69A5000
|
unkown
|
page read and write
|
||
480000
|
unkown
|
page read and write
|
||
3312000
|
unkown
|
page readonly
|
||
1E3000
|
heap default
|
page read and write
|
||
61E000
|
unkown
|
page read and write
|
||
2570000
|
unkown
|
page readonly
|
||
5FE000
|
unkown
|
page read and write
|
||
6C06000
|
unkown
|
page read and write
|
||
7095000
|
unkown
|
page read and write
|
||
CEC6000
|
unkown
|
page read and write
|
||
65CD000
|
unkown
|
page read and write
|
||
3E27000
|
unkown
|
page readonly
|
||
2900000
|
unkown
|
page read and write
|
||
4790000
|
unkown
|
page read and write
|
||
2060000
|
unkown
|
page readonly
|
||
77F9000
|
unkown
|
page read and write
|
||
6630000
|
unkown
|
page read and write
|
||
7CA000
|
unkown
|
page read and write
|
||
5A24000
|
unkown
|
page readonly
|
||
1BC0000
|
unkown
|
page read and write
|
||
72B000
|
heap default
|
page read and write
|
||
B334000
|
unkown
|
page read and write
|
||
1E3000
|
heap default
|
page read and write
|
||
5A95000
|
unkown
|
page readonly
|
||
BE7000
|
unkown
|
page read and write
|
||
65A4000
|
unkown
|
page read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
5CE2000
|
unkown
|
page readonly
|
||
2E90000
|
unkown
|
page read and write
|
||
58B6000
|
unkown
|
page read and write
|
||
2AF0000
|
unkown
|
page read and write
|
||
2ED0000
|
unkown
|
page readonly
|
||
2CC000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
8890000
|
unkown
|
page readonly
|
||
1B9A000
|
unkown
|
page read and write
|
||
46B0000
|
unkown
|
page read and write
|
||
2CF0000
|
unkown
|
page read and write
|
||
6000000
|
unkown
|
page read and write
|
||
2A80000
|
unkown
|
page read and write
|
||
678E000
|
unkown
|
page read and write
|
||
30B000
|
unkown
|
page read and write
|
||
4F20000
|
unkown
|
page read and write
|
||
71D000
|
heap default
|
page read and write
|
||
660D000
|
unkown
|
page read and write
|
||
26F0000
|
unkown
|
page readonly
|
||
680E000
|
unkown
|
page read and write
|
||
2EF0000
|
heap private
|
page read and write
|
||
5DC000
|
unkown
|
page read and write
|
||
65D5000
|
unkown
|
page read and write
|
||
A3DF000
|
unkown
|
page write copy
|
||
629B000
|
unkown
|
page read and write
|
||
83EF000
|
unkown
|
page read and write
|
||
47A5000
|
unkown
|
page read and write
|
||
D003000
|
unkown
|
page read and write
|
||
220000
|
heap private
|
page read and write
|
||
2CB0000
|
unkown
|
page read and write
|
||
265C000
|
unkown
|
page read and write
|
||
2E70000
|
unkown
|
page read and write
|
||
3672000
|
unkown
|
page readonly
|
||
5E4A000
|
unkown
|
page readonly
|
||
480A000
|
heap private
|
page read and write
|
||
1BE0000
|
unkown
|
page read and write
|
||
419A000
|
unkown
|
page read and write
|
||
3C08000
|
unkown
|
page read and write
|
||
67BA000
|
unkown
|
page read and write
|
||
26C0000
|
unkown
|
page readonly
|
||
5EC0000
|
unkown
|
page read and write
|
||
AD4000
|
unkown
|
page execute and read and write
|
||
656C000
|
unkown
|
page read and write
|
||
2E6000
|
heap default
|
page read and write
|
||
25D000
|
heap default
|
page read and write
|
||
5258000
|
unkown
|
page read and write
|
||
6351000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
65A7000
|
unkown
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
9668000
|
unkown
|
page readonly
|
||
47A6000
|
unkown
|
page read and write
|
||
2900000
|
unkown
|
page read and write
|
||
85BE000
|
unkown
|
page read and write
|
||
37FC000
|
unkown
|
page read and write
|
||
189000
|
unkown
|
page read and write
|
||
890000
|
unkown
|
page read and write
|
||
6A42000
|
unkown
|
page read and write
|
||
6FB3000
|
heap private
|
page read and write
|
||
5DED000
|
unkown
|
page readonly
|
||
2E60000
|
unkown
|
page readonly
|
||
2CA0000
|
unkown
|
page read and write
|
||
5DF0000
|
unkown
|
page read and write
|
||
5020000
|
unkown
|
page read and write
|
||
1BD0000
|
unkown
|
page read and write
|
||
3555000
|
unkown
|
page readonly
|
||
2EE000
|
unkown
|
page read and write
|
||
6634000
|
unkown
|
page read and write
|
||
E6E000
|
unkown
|
page read and write
|
||
6C67000
|
unkown
|
page read and write
|
||
6A0000
|
heap default
|
page read and write
|
||
4FD0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
648B000
|
unkown
|
page read and write
|
||
6789000
|
unkown
|
page read and write
|
||
241A000
|
heap private
|
page read and write
|
||
6810000
|
unkown
|
page read and write
|
||
AE0000
|
heap private
|
page read and write
|
||
A3E4000
|
unkown
|
page write copy
|
||
24DC000
|
unkown
|
page read and write
|
||
12D000
|
unkown
|
page execute and read and write
|
||
6E25000
|
unkown
|
page read and write
|
||
C1E000
|
unkown
|
page read and write | page guard
|
||
2D0000
|
unkown
|
page read and write
|
||
5A22000
|
unkown
|
page readonly
|
||
880000
|
unkown
|
page read and write
|
||
4990000
|
heap private
|
page read and write
|
||
1DD000
|
heap default
|
page read and write
|
||
67FE000
|
unkown
|
page read and write
|
||
36F8000
|
unkown
|
page read and write
|
||
D0000
|
heap private
|
page read and write
|
||
35C6000
|
unkown
|
page readonly
|
||
3B20000
|
unkown
|
page read and write
|
||
6030000
|
unkown
|
page read and write
|
||
23D0000
|
unkown
|
page read and write
|
||
2F70000
|
unkown
|
page readonly
|
||
5FF0000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
710B000
|
unkown
|
page read and write
|
||
2230000
|
unkown
|
page read and write
|
||
5293000
|
unkown
|
page read and write
|
||
1BB0000
|
unkown
|
page readonly
|
||
A6A000
|
unkown
|
page read and write
|
||
C6E000
|
unkown
|
page read and write
|
||
7CD000
|
unkown
|
page read and write
|
||
1B40000
|
unkown
|
page readonly
|
||
7080000
|
unkown
|
page read and write
|
||
B2A4000
|
heap private
|
page read and write
|
||
52B6000
|
unkown
|
page read and write
|
||
6DE5000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
2EE000
|
unkown
|
page read and write
|
||
C70000
|
unkown
|
page execute and read and write
|
||
B10000
|
unkown
|
page read and write
|
||
854C000
|
unkown
|
page read and write
|
||
2587000
|
unkown
|
page readonly
|
||
886000
|
unkown
|
page read and write
|
||
23F9000
|
unkown
|
page read and write
|
||
52E6000
|
unkown
|
page read and write
|
||
5D50000
|
unkown
|
page readonly
|
||
CE40000
|
unkown
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
3AF0000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page write copy
|
||
895000
|
unkown
|
page read and write
|
||
2540000
|
unkown
|
page read and write
|
||
692C000
|
unkown
|
page read and write
|
||
5234000
|
unkown
|
page read and write
|
||
2DD000
|
heap default
|
page read and write
|
||
4FB0000
|
unkown
|
page read and write
|
||
882000
|
unkown
|
page read and write
|
||
685F000
|
unkown
|
page read and write
|
||
6CC6000
|
unkown
|
page read and write
|
||
1B80000
|
unkown
|
page read and write
|
||
1DC000
|
unkown image
|
page readonly
|
||
24B0000
|
unkown
|
page write copy
|
||
2250000
|
unkown
|
page read and write
|
||
23E0000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page read and write
|
||
5A82000
|
unkown
|
page readonly
|
||
690000
|
unkown
|
page read and write
|
||
67D5000
|
unkown
|
page read and write
|
||
6529000
|
unkown
|
page read and write
|
||
4234000
|
unkown
|
page read and write
|
||
A3BE000
|
unkown
|
page write copy
|
||
C57000
|
unkown
|
page execute and read and write
|
||
2A80000
|
unkown
|
page read and write
|
||
5B71000
|
unkown
|
page readonly
|
||
2570000
|
unkown
|
page readonly
|
||
5A02000
|
unkown
|
page readonly
|
||
C20000
|
unkown
|
page read and write
|
||
636E000
|
unkown
|
page read and write
|
||
62FE000
|
unkown
|
page read and write
|
||
6C7D000
|
unkown
|
page read and write
|
||
582B000
|
unkown
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
D0000
|
heap private
|
page read and write
|
||
B40000
|
unkown
|
page execute and read and write
|
||
21E0000
|
unkown
|
page readonly
|
||
B10000
|
unkown
|
page read and write
|
||
50B0000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
5430000
|
unkown
|
page read and write
|
||
BD0000
|
unkown
|
page read and write
|
||
2F90000
|
unkown
|
page readonly
|
||
1B40000
|
unkown
|
page readonly
|
||
4A0000
|
unkown
|
page read and write
|
||
768000
|
unkown
|
page read and write
|
||
457000
|
unkown
|
page read and write
|
||
4130000
|
unkown
|
page read and write
|
||
2B30000
|
unkown
|
page readonly
|
||
453000
|
unkown
|
page read and write
|
||
6010000
|
unkown
|
page read and write
|
||
678B000
|
unkown
|
page read and write
|
||
21C000
|
unkown
|
page read and write
|
||
6C75000
|
unkown
|
page read and write
|
||
2510000
|
unkown
|
page write copy
|
||
1BF0000
|
heap private
|
page read and write
|
||
2CC0000
|
unkown
|
page read and write
|
||
25A0000
|
unkown
|
page readonly
|
||
6BAB000
|
unkown
|
page read and write
|
||
6600000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page write copy
|
||
63E2000
|
unkown
|
page read and write
|
||
4A50000
|
unkown
|
page read and write
|
||
67B6000
|
unkown
|
page read and write
|
||
CF00000
|
unkown
|
page read and write
|
||
35FD000
|
unkown
|
page readonly
|
||
4460000
|
unkown
|
page read and write
|
||
5DC0000
|
unkown
|
page read and write
|
||
713F000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
1BF0000
|
heap private
|
page read and write
|
||
52F0000
|
unkown
|
page read and write
|
||
2A71000
|
unkown
|
page read and write
|
||
C83E000
|
unkown
|
page read and write
|
||
1F5000
|
heap default
|
page read and write
|
||
289000
|
unkown
|
page execute and read and write
|
||
5A76000
|
unkown
|
page readonly
|
||
990000
|
unkown
|
page read and write
|
||
9CF0000
|
unkown
|
page read and write
|
||
2070000
|
unkown
|
page readonly
|
||
2C2000
|
heap default
|
page read and write
|
||
6CB3000
|
unkown
|
page read and write
|
||
46B8000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
2726000
|
unkown
|
page read and write
|
||
39EB000
|
unkown
|
page read and write
|
||
2EB000
|
heap default
|
page read and write
|
||
56C000
|
unkown
|
page read and write
|
||
890000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
5279000
|
unkown
|
page read and write
|
||
4291000
|
unkown
|
page read and write
|
||
7087000
|
unkown
|
page read and write
|
||
8AC2000
|
unkown
|
page readonly
|
||
2CD0000
|
unkown
|
page write copy
|
||
7E0000
|
unkown
|
page readonly
|
||
5DB5000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
4070000
|
unkown
|
page readonly
|
||
4A0000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
4B0000
|
heap default
|
page read and write
|
||
6020000
|
unkown
|
page execute and read and write
|
||
E00000
|
unkown
|
page execute and read and write
|
||
2A20000
|
unkown
|
page readonly
|
||
6ED000
|
heap default
|
page read and write
|
||
6847000
|
unkown
|
page read and write
|
||
706A000
|
unkown
|
page read and write
|
||
BCF0000
|
heap private
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
2EF9000
|
heap private
|
page read and write
|
||
35A2000
|
unkown
|
page readonly
|
||
265C000
|
unkown
|
page read and write
|
||
69E8000
|
unkown
|
page read and write
|
||
364000
|
unkown
|
page read and write
|
||
5277000
|
unkown
|
page read and write
|
||
BCA9000
|
unkown
|
page read and write
|
||
2AC0000
|
unkown
|
page read and write
|
||
23E0000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
2690000
|
unkown
|
page readonly
|
||
5BA5000
|
unkown
|
page readonly
|
||
520D000
|
unkown
|
page read and write
|
||
1319000
|
unkown
|
page execute and read and write
|
||
2A60000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
861C000
|
unkown
|
page read and write
|
||
51E0000
|
heap private
|
page read and write
|
||
2EB0000
|
unkown
|
page read and write
|
||
688B000
|
unkown
|
page readonly
|
||
6C6D000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
1D7000
|
heap default
|
page read and write
|
||
86B0000
|
unkown
|
page read and write
|
||
681C000
|
unkown
|
page read and write
|
||
6E4A000
|
unkown
|
page read and write
|
||
EF4000
|
unkown
|
page execute and read and write
|
||
4FE0000
|
heap private
|
page execute and read and write
|
||
D4000
|
heap private
|
page read and write
|
||
4110000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
2230000
|
unkown
|
page read and write
|
||
5294000
|
unkown
|
page read and write
|
||
6A89000
|
unkown
|
page read and write
|
||
2B40000
|
unkown
|
page readonly
|
||
CF42000
|
unkown
|
page read and write
|
||
78EE000
|
unkown
|
page read and write
|
||
6F96000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
2A7000
|
heap default
|
page read and write
|
||
CE03000
|
unkown
|
page read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
192000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
5AD6000
|
unkown
|
page readonly
|
||
3D0000
|
unkown
|
page readonly
|
||
62EF000
|
unkown
|
page read and write
|
||
4F90000
|
unkown
|
page read and write
|
||
2CE0000
|
unkown
|
page read and write
|
||
2533000
|
unkown
|
page read and write
|
||
5A52000
|
unkown
|
page readonly
|
||
6DA9000
|
unkown
|
page read and write
|
||
3451000
|
unkown
|
page read and write
|
||
14A000
|
unkown
|
page execute and read and write
|
||
5DB0000
|
unkown image
|
page readonly
|
||
7490000
|
unkown
|
page write copy
|
||
23F0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
892000
|
unkown
|
page read and write
|
||
2400000
|
unkown
|
page read and write
|
||
53D000
|
unkown
|
page read and write
|
||
1D0000
|
heap default
|
page read and write
|
||
2533000
|
unkown
|
page read and write
|
||
3612000
|
unkown
|
page readonly
|
||
B00000
|
unkown
|
page read and write
|
||
752A000
|
unkown
|
page read and write
|
||
2666000
|
unkown
|
page read and write
|
||
2A60000
|
unkown
|
page read and write
|
||
D70000
|
unkown
|
page execute and read and write
|
||
52D2000
|
unkown
|
page read and write
|
||
880000
|
unkown
|
page read and write
|
||
4A9000
|
unkown
|
page read and write
|
||
480000
|
unkown
|
page execute and read and write
|
||
220000
|
unkown
|
page read and write
|
||
1AF0000
|
unkown
|
page read and write
|
||
11EF000
|
unkown
|
page read and write
|
||
6817000
|
unkown
|
page read and write
|
||
54E000
|
unkown
|
page read and write
|
||
5D12000
|
unkown
|
page readonly
|
||
7A0000
|
heap private
|
page read and write
|
||
EE0000
|
unkown
|
page execute and read and write
|
||
82B0000
|
unkown
|
page read and write
|
||
34F2000
|
unkown
|
page readonly
|
||
B2A0000
|
heap private
|
page read and write
|
||
1AF0000
|
unkown
|
page read and write
|
||
596F000
|
unkown
|
page read and write
|
||
CC0000
|
unkown
|
page execute and read and write
|
||
6BA3000
|
unkown
|
page read and write
|
||
68F0000
|
unkown
|
page read and write
|
||
1130000
|
unkown
|
page readonly
|
||
260000
|
heap default
|
page read and write
|
||
2EFE000
|
heap private
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
4F90000
|
unkown
|
page read and write
|
||
364000
|
unkown
|
page read and write
|
||
7A0000
|
unkown
|
page readonly
|
||
9E0000
|
unkown
|
page execute and read and write
|
||
2EC0000
|
unkown
|
page readonly
|
There are 1156 hidden memdumps, click here to show them.