Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
New Updated 20210810.doc
|
Rich Text Format data, unknown version
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\UPDATED-08102021.PDF[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\name.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{23BF6A28-299E-4B99-A605-44EE5B79BCDD}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E2185495-5638-43A1-A616-4B202C23444A}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhvC767.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x63a10f1a, page size 32768, DirtyShutdown, Windows version 6.1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\holderwb.txt
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\New Updated 20210810.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15
2020, mtime=Wed Aug 26 14:08:15 2020, atime=Tue Aug 10 21:28:35 2021, length=31314, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\pid.txt
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\pidloc.txt
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\Desktop\~$w Updated 20210810.doc
|
data
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\user\AppData\Roaming\name.exe
|
'C:\Users\user\AppData\Roaming\name.exe'
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://b.scorecardresearch.com/beacon.js
|
unknown
|
||
http://ns.adobe.c/s
|
unknown
|
||
http://acdn.adnxs.com/ast/ast.js
|
unknown
|
||
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
|
unknown
|
||
http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
|
unknown
|
||
http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
|
unknown
|
||
https://deff.nelreports.net/api/report?cat=msn
|
unknown
|
||
https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
|
unknown
|
||
http://cache.btrll.com/default/Pix-1x1.gif
|
unknown
|
||
http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://o.aolcdn.com/ads/adswrappermsni.js
|
unknown
|
||
http://cdn.taboola.com/libtrc/msn-home-network/loader.js
|
unknown
|
||
http://www.msn.com/?ocid=iehp
|
unknown
|
||
https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
|
unknown
|
||
http://static.chartbeat.com/js/chartbeat.js
|
unknown
|
||
http://www.msn.com/de-de/?ocid=iehp
|
unknown
|
||
http://whatismyipaddress.com/-
|
unknown
|
||
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
http://www.site.com/logs.php
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
|
unknown
|
||
http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
|
unknown
|
||
http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
|
unknown
|
||
https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
|
unknown
|
||
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
|
unknown
|
||
http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
https://contextual.media.net/8/nrrV73987.js
|
unknown
|
||
http://n.f
|
unknown
|
||
http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
|
unknown
|
||
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
|
unknown
|
||
http://ns.adobede
|
unknown
|
||
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
|
unknown
|
||
http://ftp.badonfashoin.com
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://ns.ao
|
unknown
|
||
https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
|
unknown
|
||
http://cdn.at.atwola.com/_media/uac/msn.html
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
https://policies.yahoo.com/w3c/p3p.xml
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://www.msn.com/advertisement.ad.js
|
unknown
|
||
http://ib.adnxs.com/async_usersync_file
|
unknown
|
There are 48 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
vecvietnam.com.vn
|
103.255.237.180
|
||
ftp.badonfashoin.com
|
45.141.152.18
|
||
64.89.4.0.in-addr.arpa
|
unknown
|
||
www.google.com
|
142.250.185.196
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
103.255.237.180
|
vecvietnam.com.vn
|
Viet Nam
|
||
45.141.152.18
|
ftp.badonfashoin.com
|
Romania
|
||
142.250.185.196
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
Hidden
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
&/6
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
}06
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
%16
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F0934
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F7C41
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F7C41
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
||
C:\Users\user\AppData\Roaming\name.exe
|
EnableFileTracing
|
||
C:\Users\user\AppData\Roaming\name.exe
|
EnableConsoleTracing
|
||
C:\Users\user\AppData\Roaming\name.exe
|
FileTracingMask
|
||
C:\Users\user\AppData\Roaming\name.exe
|
ConsoleTracingMask
|
||
C:\Users\user\AppData\Roaming\name.exe
|
MaxFileSize
|
||
C:\Users\user\AppData\Roaming\name.exe
|
FileDirectory
|
||
C:\Users\user\AppData\Roaming\name.exe
|
EnableFileTracing
|
||
C:\Users\user\AppData\Roaming\name.exe
|
EnableConsoleTracing
|
||
C:\Users\user\AppData\Roaming\name.exe
|
FileTracingMask
|
||
C:\Users\user\AppData\Roaming\name.exe
|
ConsoleTracingMask
|
||
C:\Users\user\AppData\Roaming\name.exe
|
MaxFileSize
|
||
C:\Users\user\AppData\Roaming\name.exe
|
FileDirectory
|
||
C:\Users\user\AppData\Roaming\name.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\name.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\name.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\name.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\name.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\name.exe
|
Blob
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
FontCachePath
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
EnableFileTracing
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
EnableConsoleTracing
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
FileTracingMask
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
ConsoleTracingMask
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
MaxFileSize
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
FileDirectory
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
EnableFileTracing
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
EnableConsoleTracing
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
FileTracingMask
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
ConsoleTracingMask
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
MaxFileSize
|
||
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
|
FileDirectory
|
There are 345 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2331000
|
unkown
|
page read and write
|
||
3F34000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
3331000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
3B98000
|
unkown
|
page read and write
|
||
3CA9000
|
unkown
|
page read and write
|
||
C9000
|
unkown
|
page read and write
|
||
26A5000
|
unkown
|
page read and write
|
||
919B000
|
unkown
|
page read and write
|
||
2590000
|
unkown
|
page read and write
|
||
2440000
|
unkown
|
page read and write
|
||
5E55000
|
heap private
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
26A9000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
681000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page read and write
|
||
577000
|
heap default
|
page read and write
|
||
4CF0000
|
unkown
|
page read and write
|
||
7C0000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
2485000
|
unkown
|
page read and write
|
||
55AD000
|
unkown
|
page read and write
|
||
27B6000
|
unkown
|
page read and write
|
||
275D000
|
unkown
|
page read and write
|
||
500000
|
unkown
|
page read and write
|
||
5590000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
26A2000
|
unkown
|
page read and write
|
||
9334000
|
unkown
|
page read and write
|
||
282F000
|
unkown
|
page read and write
|
||
255C000
|
unkown
|
page read and write
|
||
48F0000
|
unkown
|
page write copy
|
||
6E0000
|
heap private
|
page execute and read and write
|
||
8E40000
|
unkown
|
page read and write
|
||
2402000
|
unkown
|
page read and write
|
||
A10000
|
unkown
|
page read and write
|
||
453E000
|
unkown
|
page read and write
|
||
8C000
|
unkown
|
page read and write
|
||
2750000
|
unkown
|
page read and write
|
||
9113000
|
unkown
|
page read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
1F70000
|
unkown
|
page read and write
|
||
740000
|
heap private
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
858000
|
heap private
|
page read and write
|
||
681C000
|
unkown
|
page read and write
|
||
276F000
|
unkown
|
page read and write
|
||
2421000
|
unkown
|
page read and write
|
||
91AA000
|
unkown
|
page read and write
|
||
26C2000
|
unkown
|
page read and write
|
||
6C6D000
|
unkown
|
page read and write
|
||
67D5000
|
unkown
|
page read and write
|
||
2793000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
6BA3000
|
unkown
|
page read and write
|
||
23ED000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
6CB3000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
6684000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
6815000
|
unkown
|
page read and write
|
||
825E000
|
unkown
|
page read and write
|
||
63C000
|
unkown
|
page read and write
|
||
1FA9000
|
heap private
|
page read and write
|
||
9BE000
|
unkown
|
page read and write
|
||
67BA000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
4CE5000
|
unkown
|
page read and write
|
||
27BE000
|
unkown
|
page read and write
|
||
467000
|
unkown
|
page read and write
|
||
9140000
|
unkown
|
page read and write
|
||
6B74000
|
unkown
|
page read and write
|
||
70D1000
|
unkown
|
page read and write
|
||
279F000
|
unkown
|
page read and write
|
||
5140000
|
heap private
|
page read and write
|
||
5246000
|
unkown
|
page read and write
|
||
250000
|
heap private
|
page read and write
|
||
2549000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
470000
|
heap default
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
6DE5000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
917E000
|
unkown
|
page read and write
|
||
375000
|
unkown image
|
page execute read
|
||
648B000
|
unkown
|
page read and write
|
||
931B000
|
unkown
|
page read and write
|
||
C0000
|
unkown
|
page read and write
|
||
2406000
|
unkown
|
page read and write
|
||
38B000
|
unkown image
|
page execute read
|
||
BD000
|
unkown
|
page execute and read and write
|
||
392000
|
unkown image
|
page execute read
|
||
2526000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page read and write
|
||
A0F000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
27BC000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
589E000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
530000
|
heap default
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
4810000
|
unkown
|
page readonly
|
||
27F3000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
5321000
|
unkown
|
page read and write
|
||
24F5000
|
unkown
|
page read and write
|
||
2434000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
6C04000
|
unkown
|
page read and write
|
||
700000
|
unkown
|
page read and write
|
||
2592000
|
unkown
|
page read and write
|
||
6606000
|
unkown
|
page read and write
|
||
24D0000
|
unkown
|
page read and write
|
||
67CE000
|
unkown
|
page read and write
|
||
607A000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
1E80000
|
unkown
|
page read and write
|
||
2655000
|
unkown
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
4CDF000
|
unkown
|
page read and write
|
||
6D5C000
|
unkown
|
page read and write
|
||
26C0000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
357000
|
unkown image
|
page execute read
|
||
27B2000
|
unkown
|
page read and write
|
||
2417000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
686000
|
unkown
|
page read and write
|
||
654A000
|
unkown
|
page read and write
|
||
2878000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
9147000
|
unkown
|
page read and write
|
||
24EF000
|
unkown
|
page read and write
|
||
90D6000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
2834000
|
unkown
|
page read and write
|
||
9194000
|
unkown
|
page read and write
|
||
4351000
|
unkown
|
page read and write
|
||
23BF000
|
unkown
|
page read and write
|
||
270F000
|
unkown
|
page read and write
|
||
24AF000
|
unkown
|
page read and write
|
||
37C000
|
unkown image
|
page execute read
|
||
482000
|
unkown
|
page execute and read and write
|
||
384000
|
unkown image
|
page execute read
|
||
66E9000
|
unkown
|
page read and write
|
||
B3000
|
unkown
|
page execute and read and write
|
||
254D000
|
unkown
|
page read and write
|
||
9C0000
|
unkown image
|
page readonly
|
||
241D000
|
unkown
|
page read and write
|
||
233E000
|
unkown
|
page read and write | page guard
|
||
620000
|
unkown
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
4CE4000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
1F70000
|
unkown
|
page read and write
|
||
656C000
|
unkown
|
page read and write
|
||
2638000
|
unkown
|
page read and write
|
||
2564000
|
unkown
|
page read and write
|
||
9141000
|
unkown
|
page read and write
|
||
60AB000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
500000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
29F000
|
unkown
|
page read and write
|
||
6DA9000
|
unkown
|
page read and write
|
||
4770000
|
unkown
|
page readonly
|
||
693B000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
6BE5000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
610B000
|
unkown
|
page read and write
|
||
531F000
|
unkown
|
page read and write
|
||
63C000
|
unkown
|
page read and write
|
||
285D000
|
unkown
|
page read and write
|
||
260E000
|
unkown
|
page read and write
|
||
249C000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
916F000
|
unkown
|
page read and write
|
||
2447000
|
unkown
|
page read and write
|
||
7721000
|
unkown
|
page read and write
|
||
6968000
|
unkown
|
page read and write
|
||
800000
|
unkown
|
page read and write
|
||
28B6000
|
unkown
|
page read and write
|
||
4CFF000
|
unkown
|
page read and write
|
||
2427000
|
unkown
|
page read and write
|
||
2874000
|
unkown
|
page read and write
|
||
2575000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
6A7000
|
unkown
|
page read and write
|
||
5321000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page read and write
|
||
42D000
|
unkown
|
page read and write
|
||
2816000
|
unkown
|
page read and write
|
||
8D0000
|
unkown
|
page readonly
|
||
4340000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
930B000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
428000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
540000
|
unkown
|
page read and write
|
||
5232000
|
unkown
|
page read and write
|
||
2825000
|
unkown
|
page read and write
|
||
65A0000
|
unkown
|
page read and write
|
||
5262000
|
unkown
|
page read and write
|
||
6880000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3BF000
|
unkown image
|
page execute read
|
||
4398000
|
unkown
|
page read and write
|
||
8CF3000
|
heap private
|
page read and write
|
||
1F70000
|
unkown
|
page read and write
|
||
26A0000
|
heap private
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
B4000
|
unkown
|
page read and write
|
||
3A9000
|
unkown image
|
page execute read
|
||
9113000
|
unkown
|
page read and write
|
||
31C000
|
unkown image
|
page execute read
|
||
1F70000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
681000
|
unkown
|
page read and write
|
||
25ED000
|
unkown
|
page read and write
|
||
92DE000
|
unkown
|
page read and write
|
||
4CD2000
|
unkown
|
page read and write
|
||
910C000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
934A000
|
unkown
|
page read and write
|
||
2797000
|
unkown
|
page read and write
|
||
572F000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
9314000
|
unkown
|
page read and write
|
||
544D000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
9140000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
23D6000
|
unkown
|
page read and write
|
||
91AA000
|
unkown
|
page read and write
|
||
4CEF000
|
unkown
|
page read and write
|
||
4CFF000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
1F70000
|
unkown
|
page read and write
|
||
57A1000
|
heap private
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
681000
|
unkown
|
page read and write
|
||
1DA000
|
unkown
|
page execute and read and write
|
||
370000
|
heap private
|
page read and write
|
||
21B0000
|
heap private
|
page execute and read and write
|
||
2827000
|
unkown
|
page read and write
|
||
1F10000
|
unkown
|
page read and write
|
||
4CDF000
|
unkown
|
page read and write
|
||
82A0000
|
unkown
|
page readonly
|
||
A10000
|
unkown
|
page read and write
|
||
2568000
|
unkown
|
page read and write
|
||
259E000
|
unkown
|
page read and write
|
||
4CE000
|
unkown
|
page read and write
|
||
3B7000
|
unkown image
|
page execute read
|
||
569E000
|
unkown
|
page read and write
|
||
5180000
|
unkown
|
page read and write
|
||
1B4000
|
unkown
|
page read and write
|
||
610B000
|
unkown
|
page read and write
|
||
1F60000
|
unkown
|
page read and write
|
||
6CA9000
|
unkown
|
page read and write
|
||
752A000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
8A8E000
|
unkown
|
page read and write
|
||
2522000
|
unkown
|
page read and write
|
||
2876000
|
unkown
|
page read and write
|
||
297000
|
unkown
|
page execute and read and write
|
||
39B000
|
unkown image
|
page execute read
|
||
3CD000
|
unkown image
|
page execute read
|
||
4360000
|
unkown
|
page read and write
|
||
23DD000
|
unkown
|
page read and write
|
||
26FC000
|
unkown
|
page read and write
|
||
678E000
|
unkown
|
page read and write
|
||
263E000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
5207000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page execute and read and write
|
||
58E0000
|
heap private
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
24ED000
|
unkown
|
page read and write
|
||
610C000
|
unkown
|
page read and write
|
||
2632000
|
unkown
|
page read and write
|
||
2596000
|
unkown
|
page read and write
|
||
61C0000
|
heap private
|
page read and write
|
||
20AE000
|
unkown
|
page read and write
|
||
6480000
|
unkown
|
page read and write
|
||
23E9000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
2141000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
700000
|
unkown
|
page read and write
|
||
65CF000
|
unkown
|
page read and write
|
||
255E000
|
unkown
|
page read and write
|
||
6B4000
|
unkown
|
page read and write
|
||
1F70000
|
unkown
|
page read and write
|
||
25AF000
|
unkown
|
page read and write
|
||
2533000
|
unkown
|
page read and write
|
||
24CE000
|
unkown
|
page read and write
|
||
24F1000
|
unkown
|
page read and write
|
||
9122000
|
unkown
|
page read and write
|
||
9176000
|
unkown
|
page read and write
|
||
257F000
|
unkown
|
page read and write
|
||
656A000
|
unkown
|
page read and write
|
||
24DD000
|
unkown
|
page read and write
|
||
9F3000
|
unkown
|
page read and write
|
||
6810000
|
unkown
|
page read and write
|
||
830000
|
heap private
|
page read and write
|
||
2419000
|
unkown
|
page read and write
|
||
8CFB000
|
heap private
|
page read and write
|
||
32B000
|
unkown image
|
page execute read
|
||
2752000
|
unkown
|
page read and write
|
||
450000
|
heap private
|
page read and write
|
||
564000
|
heap default
|
page read and write
|
||
1EB8000
|
unkown
|
page read and write
|
||
669C000
|
unkown
|
page read and write
|
||
30E000
|
unkown image
|
page execute read
|
||
5207000
|
unkown
|
page read and write
|
||
9C2000
|
unkown image
|
page execute read
|
||
2566000
|
unkown
|
page read and write
|
||
4CDF000
|
unkown
|
page read and write
|
||
4CDF000
|
unkown
|
page read and write
|
||
1E7000
|
unkown
|
page execute and read and write
|
||
A00000
|
unkown
|
page read and write
|
||
934A000
|
unkown
|
page read and write
|
||
2550000
|
unkown
|
page read and write
|
||
274A000
|
unkown
|
page read and write
|
||
6C30000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
5232000
|
unkown
|
page read and write
|
||
2484000
|
unkown
|
page read and write
|
||
9147000
|
unkown
|
page read and write
|
||
2784000
|
unkown
|
page read and write
|
||
64EE000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
A20000
|
heap private
|
page execute and read and write
|
||
1F13000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
24F3000
|
unkown
|
page read and write
|
||
4CED000
|
unkown
|
page read and write
|
||
520000
|
heap default
|
page read and write
|
||
4CE5000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page read and write
|
||
62A000
|
heap default
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
2598000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page read and write
|
||
4884000
|
heap private
|
page read and write
|
||
527000
|
heap default
|
page read and write
|
||
5790000
|
heap private
|
page read and write
|
||
931B000
|
unkown
|
page read and write
|
||
4B0E000
|
unkown
|
page read and write
|
||
67FC000
|
unkown
|
page read and write
|
||
63C000
|
unkown
|
page read and write
|
||
339000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
90ED000
|
unkown
|
page read and write
|
||
2453000
|
unkown
|
page read and write
|
||
2653000
|
unkown
|
page read and write
|
||
764000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
5348000
|
unkown
|
page read and write
|
||
92E1000
|
unkown
|
page read and write
|
||
6801000
|
unkown
|
page read and write
|
||
1F70000
|
unkown image
|
page readonly
|
||
243F000
|
unkown
|
page read and write
|
||
271B000
|
unkown
|
page read and write
|
||
4DE0000
|
unkown
|
page readonly
|
||
644E000
|
unkown
|
page read and write
|
||
69E8000
|
unkown
|
page read and write
|
||
2812000
|
unkown
|
page read and write
|
||
7D0000
|
heap private
|
page read and write
|
||
1BD000
|
unkown
|
page execute and read and write
|
||
61A000
|
heap default
|
page read and write
|
||
2773000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
2756000
|
unkown
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
1C0000
|
unkown
|
page readonly
|
||
66BF000
|
unkown
|
page read and write
|
||
1F10000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
2432000
|
unkown
|
page read and write
|
||
266E000
|
unkown
|
page read and write
|
||
6847000
|
unkown
|
page read and write
|
||
418000
|
unkown
|
page execute and read and write
|
||
1F20000
|
unkown
|
page read and write
|
||
1E68000
|
unkown
|
page read and write
|
||
91A2000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
26A7000
|
unkown
|
page read and write
|
||
24A4000
|
unkown
|
page read and write
|
||
52D0000
|
heap private
|
page read and write
|
||
2719000
|
unkown
|
page read and write
|
||
6781000
|
unkown
|
page read and write
|
||
918C000
|
unkown
|
page read and write
|
||
6BC2000
|
unkown
|
page read and write
|
||
67B1000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
2547000
|
unkown
|
page read and write
|
||
934A000
|
unkown
|
page read and write
|
||
257D000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
25EF000
|
unkown
|
page read and write
|
||
672000
|
unkown
|
page read and write
|
||
6773000
|
unkown
|
page read and write
|
||
2571000
|
unkown
|
page read and write
|
||
2442000
|
unkown
|
page read and write
|
||
4CBD000
|
unkown
|
page read and write
|
||
2423000
|
unkown
|
page read and write
|
||
27B8000
|
unkown
|
page read and write
|
||
4CFF000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
2846000
|
unkown
|
page read and write
|
||
7087000
|
unkown
|
page read and write
|
||
2545000
|
unkown
|
page read and write
|
||
26AB000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
4D0000
|
unkown
|
page read and write
|
||
2438000
|
unkown
|
page read and write
|
||
7B4000
|
unkown
|
page read and write
|
||
1F90000
|
unkown
|
page read and write
|
||
3BF000
|
unkown image
|
page execute read
|
||
2540000
|
unkown
|
page read and write
|
||
7716000
|
unkown
|
page read and write
|
||
540000
|
heap default
|
page read and write
|
||
219F000
|
unkown
|
page read and write
|
||
2451000
|
unkown
|
page read and write
|
||
188000
|
unkown
|
page read and write
|
||
2657000
|
unkown
|
page read and write
|
||
5AD0000
|
heap private
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
2690000
|
unkown
|
page read and write
|
||
6D8000
|
unkown
|
page read and write
|
||
2608000
|
unkown
|
page read and write
|
||
6077000
|
unkown
|
page read and write
|
||
676A000
|
unkown
|
page read and write
|
||
26F6000
|
unkown
|
page read and write
|
||
686000
|
unkown
|
page read and write
|
||
4C9E000
|
unkown
|
page read and write
|
||
5320000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
6696000
|
unkown
|
page read and write
|
||
66DC000
|
unkown
|
page read and write
|
||
360000
|
unkown
|
page execute and read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
5209000
|
unkown
|
page read and write
|
||
5BC000
|
heap default
|
page read and write
|
||
2641000
|
unkown
|
page read and write
|
||
2818000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
27D1000
|
unkown
|
page read and write
|
||
6630000
|
unkown
|
page read and write
|
||
4CF0000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
54B0000
|
unkown
|
page read and write
|
||
2B0D000
|
unkown
|
page read and write
|
||
9168000
|
unkown
|
page read and write
|
||
324000
|
unkown image
|
page execute read
|
||
6529000
|
unkown
|
page read and write
|
||
6420000
|
unkown
|
page read and write
|
||
268A000
|
unkown
|
page read and write
|
||
84D000
|
unkown
|
page read and write
|
||
9122000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
16D000
|
heap default
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
2865000
|
unkown
|
page read and write
|
||
24D6000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
36E000
|
unkown image
|
page execute read
|
||
62FE000
|
unkown
|
page read and write
|
||
268E000
|
unkown
|
page read and write
|
||
9379000
|
unkown
|
page read and write
|
||
6A42000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
7733000
|
unkown
|
page read and write
|
||
914F000
|
unkown
|
page read and write
|
||
2579000
|
unkown
|
page read and write
|
||
384000
|
unkown image
|
page execute read
|
||
90B7000
|
unkown
|
page read and write
|
||
6C75000
|
unkown
|
page read and write
|
||
3A9000
|
unkown image
|
page execute read
|
||
57D000
|
heap default
|
page read and write
|
||
67B6000
|
unkown
|
page read and write
|
||
2782000
|
unkown
|
page read and write
|
||
25E9000
|
unkown
|
page read and write
|
||
1F10000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
2634000
|
unkown
|
page read and write
|
||
2444000
|
unkown
|
page read and write
|
||
9FA000
|
unkown
|
page read and write
|
||
570000
|
heap default
|
page read and write
|
||
24A6000
|
unkown
|
page read and write
|
||
30E000
|
unkown image
|
page execute read
|
||
90E5000
|
unkown
|
page read and write
|
||
549E000
|
unkown
|
page read and write
|
||
277E000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page read and write
|
||
1C8000
|
unkown
|
page read and write
|
||
60F7000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
8D000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
2814000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
680E000
|
unkown
|
page read and write
|
||
6CC6000
|
unkown
|
page read and write
|
||
5E72000
|
heap private
|
page read and write
|
||
A0000
|
unkown
|
page read and write
|
||
35F000
|
unkown image
|
page execute read
|
||
26C8000
|
unkown
|
page read and write
|
||
4CFF000
|
unkown
|
page read and write
|
||
4CE5000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
26F4000
|
unkown
|
page read and write
|
||
686000
|
unkown
|
page read and write
|
||
1EB000
|
unkown
|
page execute and read and write
|
||
27CD000
|
unkown
|
page read and write
|
||
2543000
|
unkown
|
page read and write
|
||
6E4A000
|
unkown
|
page read and write
|
||
933B000
|
unkown
|
page read and write
|
||
2489000
|
unkown
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
27D3000
|
unkown
|
page read and write
|
||
22A000
|
unkown
|
page read and write
|
||
636E000
|
unkown
|
page read and write
|
||
2863000
|
unkown
|
page read and write
|
||
1F6D000
|
unkown
|
page read and write
|
||
A10000
|
unkown
|
page execute and read and write
|
||
252C000
|
unkown
|
page read and write
|
||
5E5000
|
unkown
|
page read and write
|
||
713F000
|
unkown
|
page read and write
|
||
1E88000
|
unkown
|
page read and write
|
||
23EB000
|
unkown
|
page read and write
|
||
800000
|
unkown
|
page read and write
|
||
2524000
|
unkown
|
page read and write
|
||
74C000
|
unkown
|
page read and write
|
||
244F000
|
unkown
|
page read and write
|
||
2577000
|
unkown
|
page read and write
|
||
3B78000
|
unkown
|
page read and write
|
||
2604000
|
unkown
|
page read and write
|
||
683F000
|
unkown
|
page read and write
|
||
2473000
|
unkown
|
page read and write
|
||
9185000
|
unkown
|
page read and write
|
||
701000
|
unkown
|
page read and write
|
||
65DE000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
2B2000
|
unkown image
|
page execute read
|
||
233F000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
638E000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
5276000
|
unkown
|
page read and write
|
||
90BF000
|
unkown
|
page read and write
|
||
2717000
|
unkown
|
page read and write
|
||
5262000
|
unkown
|
page read and write
|
||
2487000
|
unkown
|
page read and write
|
||
51ED000
|
unkown
|
page read and write
|
||
24D8000
|
unkown
|
page read and write
|
||
2625000
|
unkown
|
page read and write
|
||
1F20000
|
unkown
|
page read and write
|
||
16A000
|
unkown
|
page read and write
|
||
6817000
|
unkown
|
page read and write
|
||
A10000
|
unkown
|
page read and write
|
||
268C000
|
unkown
|
page read and write
|
||
8E3D000
|
unkown
|
page read and write
|
||
70C0000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page readonly
|
||
2161000
|
unkown
|
page read and write
|
||
280C000
|
unkown
|
page read and write
|
||
6804000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
315000
|
unkown image
|
page execute read
|
||
5276000
|
unkown
|
page read and write
|
||
24DA000
|
unkown
|
page read and write
|
||
6B4000
|
unkown
|
page read and write
|
||
8D2D000
|
unkown
|
page read and write
|
||
2090000
|
unkown
|
page readonly
|
||
1C0000
|
unkown
|
page readonly
|
||
9F0000
|
unkown
|
page read and write
|
||
800000
|
unkown
|
page read and write
|
||
610B000
|
unkown
|
page read and write
|
||
90FC000
|
unkown
|
page read and write
|
||
92F6000
|
unkown
|
page read and write
|
||
341000
|
unkown image
|
page execute read
|
||
45E000
|
heap private
|
page read and write
|
||
366000
|
unkown image
|
page execute read
|
||
2765000
|
unkown
|
page read and write
|
||
6C72000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
260C000
|
unkown
|
page read and write
|
||
626000
|
heap default
|
page read and write
|
||
26A3000
|
unkown
|
page read and write
|
||
5320000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
1E2000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
69A000
|
unkown
|
page read and write
|
||
25F4000
|
unkown
|
page read and write
|
||
4CFF000
|
unkown
|
page read and write
|
||
324000
|
unkown image
|
page execute read
|
||
520000
|
unkown
|
page read and write
|
||
457000
|
heap private
|
page read and write
|
||
6C47000
|
unkown
|
page read and write
|
||
2490000
|
unkown
|
page read and write
|
||
2164000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
4B6E000
|
unkown
|
page read and write
|
||
92E7000
|
unkown
|
page read and write
|
||
26AF000
|
unkown
|
page read and write
|
||
4D4E000
|
unkown
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
1F20000
|
unkown
|
page read and write
|
||
5340000
|
unkown
|
page read and write
|
||
610C000
|
unkown
|
page read and write
|
||
9155000
|
unkown
|
page read and write
|
||
246C000
|
unkown
|
page read and write
|
||
676E000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
2141000
|
unkown
|
page read and write
|
||
6303000
|
unkown
|
page read and write
|
||
554000
|
heap default
|
page read and write
|
||
350000
|
unkown image
|
page execute read
|
||
357000
|
unkown image
|
page execute read
|
||
570000
|
heap default
|
page read and write
|
||
685B000
|
unkown
|
page read and write
|
||
9372000
|
unkown
|
page read and write
|
||
9A7F000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
8CFF000
|
heap private
|
page read and write
|
||
260A000
|
unkown
|
page read and write
|
||
243E000
|
unkown
|
page read and write
|
||
63CE000
|
unkown
|
page read and write
|
||
438C000
|
heap private
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
51EC000
|
unkown
|
page read and write
|
||
4ABF000
|
unkown
|
page read and write
|
||
2470000
|
unkown
|
page read and write
|
||
3C6000
|
unkown image
|
page execute read
|
||
253F000
|
unkown
|
page read and write
|
||
6578000
|
unkown
|
page read and write
|
||
293000
|
heap default
|
page read and write
|
||
6BAB000
|
unkown
|
page read and write
|
||
23DF000
|
unkown
|
page read and write
|
||
282000
|
unkown
|
page read and write
|
||
265B000
|
unkown
|
page read and write
|
||
745E000
|
unkown
|
page read and write
|
||
660D000
|
unkown
|
page read and write
|
||
26DB000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
911B000
|
unkown
|
page read and write
|
||
6280000
|
unkown
|
page read and write
|
||
23F7000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
287A000
|
unkown
|
page read and write
|
||
2B2000
|
unkown image
|
page execute read
|
||
44A0000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
51E8000
|
unkown
|
page read and write
|
||
641E000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
51E8000
|
unkown
|
page read and write
|
||
2530000
|
unkown
|
page read and write
|
||
92E0000
|
unkown
|
page read and write
|
||
23CC000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
2400000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
5321000
|
unkown
|
page read and write
|
||
5246000
|
unkown
|
page read and write
|
||
4CDF000
|
unkown
|
page read and write
|
||
6BB5000
|
unkown
|
page read and write
|
||
39B000
|
unkown image
|
page execute read
|
||
1FA0000
|
heap private
|
page read and write
|
||
2B0000
|
unkown image
|
page readonly
|
||
2DF000
|
unkown
|
page read and write
|
||
9380000
|
unkown
|
page read and write
|
||
27C0000
|
unkown
|
page read and write
|
||
678B000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
7080000
|
unkown
|
page read and write
|
||
9176000
|
unkown
|
page read and write
|
||
6BF8000
|
unkown
|
page read and write
|
||
24BD000
|
unkown
|
page read and write
|
||
1F67000
|
unkown
|
page read and write
|
||
936A000
|
unkown
|
page read and write
|
||
6BC4000
|
unkown
|
page read and write
|
||
249C000
|
unkown
|
page read and write
|
||
1F70000
|
unkown
|
page read and write
|
||
6432000
|
unkown
|
page read and write
|
||
25AD000
|
unkown
|
page read and write
|
||
2821000
|
unkown
|
page read and write
|
||
9354000
|
unkown
|
page read and write
|
||
4CC4000
|
unkown
|
page read and write
|
||
682000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
6776000
|
unkown
|
page read and write
|
||
350000
|
heap private
|
page read and write
|
||
67D0000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
5321000
|
unkown
|
page read and write
|
||
2754000
|
unkown
|
page read and write
|
||
537000
|
heap default
|
page read and write
|
||
2540000
|
unkown
|
page read and write
|
||
2619000
|
unkown
|
page read and write
|
||
91AA000
|
unkown
|
page read and write
|
||
90DE000
|
unkown
|
page read and write
|
||
2810000
|
unkown
|
page read and write
|
||
9396000
|
unkown
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
26B2000
|
unkown
|
page read and write
|
||
246E000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
276B000
|
unkown
|
page read and write
|
||
584E000
|
unkown
|
page read and write
|
||
771B000
|
unkown
|
page read and write
|
||
69FC000
|
unkown
|
page read and write
|
||
2857000
|
unkown
|
page read and write
|
||
16E000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
261D000
|
unkown
|
page read and write
|
||
90AE000
|
unkown
|
page read and write
|
||
4E30000
|
unkown
|
page readonly
|
||
2610000
|
unkown
|
page read and write
|
||
4CDD000
|
unkown
|
page read and write
|
||
4CE5000
|
unkown
|
page read and write
|
||
35F000
|
unkown image
|
page execute read
|
||
8CFF000
|
heap private
|
page read and write
|
||
64DA000
|
unkown
|
page read and write
|
||
63D000
|
unkown
|
page read and write
|
||
6600000
|
unkown
|
page read and write
|
||
27A3000
|
unkown
|
page read and write
|
||
23E7000
|
unkown
|
page read and write
|
||
28A000
|
unkown
|
page execute and read and write
|
||
572E000
|
unkown
|
page read and write | page guard
|
||
6855000
|
unkown
|
page read and write
|
||
2562000
|
unkown
|
page read and write
|
||
60FC000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
633E000
|
unkown
|
page read and write
|
||
7C0000
|
unkown
|
page read and write
|
||
249E000
|
unkown
|
page read and write
|
||
9104000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
2B0000
|
unkown image
|
page readonly
|
||
4378000
|
unkown
|
page read and write
|
||
6390000
|
heap private
|
page read and write
|
||
43E4000
|
heap private
|
page read and write
|
||
2C00000
|
unkown
|
page readonly
|
||
60E7000
|
unkown
|
page read and write
|
||
222E000
|
unkown
|
page read and write
|
||
7AD000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
2480000
|
unkown
|
page read and write
|
||
977000
|
heap private
|
page read and write
|
||
513E000
|
unkown
|
page read and write
|
||
23D4000
|
unkown
|
page read and write
|
||
25E7000
|
unkown
|
page read and write
|
||
4CC7000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
27F7000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
4CFF000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
23E3000
|
unkown
|
page read and write
|
||
1F70000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
649F000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
286000
|
unkown
|
page execute and read and write
|
||
266C000
|
unkown
|
page read and write
|
||
51EC000
|
unkown
|
page read and write
|
||
610C000
|
unkown
|
page read and write
|
||
2455000
|
unkown
|
page read and write
|
||
6281000
|
unkown
|
page read and write
|
||
630000
|
heap default
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
2573000
|
unkown
|
page read and write
|
||
997D000
|
unkown
|
page read and write
|
||
6CBB000
|
unkown
|
page read and write
|
||
4DB0000
|
heap private
|
page execute and read and write
|
||
25F1000
|
unkown
|
page read and write
|
||
248D000
|
unkown
|
page read and write
|
||
681000
|
unkown
|
page read and write
|
||
25B1000
|
unkown
|
page read and write
|
||
23E1000
|
unkown
|
page read and write
|
||
63D0000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
1F00000
|
unkown
|
page read and write
|
||
917E000
|
unkown
|
page read and write
|
||
274C000
|
unkown
|
page read and write
|
||
2713000
|
unkown
|
page read and write
|
||
659A000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
2B00000
|
unkown
|
page read and write
|
||
4CF0000
|
unkown
|
page read and write
|
||
9313000
|
unkown
|
page read and write
|
||
3E2000
|
unkown image
|
page readonly
|
||
7C0000
|
unkown
|
page read and write
|
||
349000
|
unkown image
|
page execute read
|
||
4CDF000
|
unkown
|
page read and write
|
||
4CEE000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
27F1000
|
unkown
|
page read and write
|
||
67C7000
|
unkown
|
page read and write
|
||
25B8000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
66F7000
|
unkown
|
page read and write
|
||
4CE5000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
24BF000
|
unkown
|
page read and write
|
||
90D6000
|
unkown
|
page read and write
|
||
706A000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
31C000
|
unkown image
|
page execute read
|
||
4368000
|
unkown
|
page read and write
|
||
43E0000
|
heap private
|
page read and write
|
||
46B000
|
unkown
|
page read and write
|
||
8CFA000
|
heap private
|
page read and write
|
||
4CFF000
|
unkown
|
page read and write
|
||
23D0000
|
unkown
|
page read and write
|
||
701000
|
unkown
|
page read and write
|
||
1F70000
|
unkown
|
page read and write
|
||
2404000
|
unkown
|
page read and write
|
||
4CFF000
|
unkown
|
page read and write
|
||
23F3000
|
unkown
|
page read and write
|
||
2B19000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
9147000
|
unkown
|
page read and write
|
||
800000
|
unkown
|
page read and write
|
||
660A000
|
unkown
|
page read and write
|
||
91A2000
|
unkown
|
page read and write
|
||
51C4000
|
unkown
|
page read and write
|
||
257B000
|
unkown
|
page read and write
|
||
594000
|
heap default
|
page read and write
|
||
375000
|
unkown image
|
page execute read
|
||
2780000
|
unkown
|
page read and write
|
||
24A2000
|
unkown
|
page read and write
|
||
63E2000
|
unkown
|
page read and write
|
||
543E000
|
unkown
|
page read and write
|
||
205E000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
26FF000
|
unkown
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
9388000
|
unkown
|
page read and write
|
||
1FAE000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
26AD000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
596E000
|
unkown
|
page read and write
|
||
68B9000
|
unkown
|
page read and write
|
||
27F5000
|
unkown
|
page read and write
|
||
23EF000
|
unkown
|
page read and write
|
||
83C000
|
heap private
|
page read and write
|
||
685F000
|
unkown
|
page read and write
|
||
2694000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
23F1000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
9344000
|
unkown
|
page read and write
|
||
672000
|
unkown
|
page read and write
|
||
26F8000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
9C8000
|
unkown image
|
page readonly
|
||
69A5000
|
unkown
|
page read and write
|
||
27D5000
|
unkown
|
page read and write
|
||
9390000
|
unkown
|
page read and write
|
||
90FC000
|
unkown
|
page read and write
|
||
634F000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
292000
|
unkown
|
page read and write
|
||
4CF0000
|
unkown
|
page read and write
|
||
26BA000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
6A89000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page read and write
|
||
931F000
|
unkown
|
page read and write
|
||
2528000
|
unkown
|
page read and write
|
||
5232000
|
unkown
|
page read and write
|
||
89FE000
|
unkown
|
page read and write
|
||
681000
|
unkown
|
page read and write
|
||
1F70000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
350000
|
unkown image
|
page execute read
|
||
66F2000
|
unkown
|
page read and write
|
||
25EB000
|
unkown
|
page read and write
|
||
9122000
|
unkown
|
page read and write
|
||
B0000
|
unkown
|
page read and write
|
||
216F000
|
unkown
|
page read and write
|
||
68F0000
|
unkown
|
page read and write
|
||
2771000
|
unkown
|
page read and write
|
||
2436000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page read and write
|
||
27C2000
|
unkown
|
page read and write
|
||
60FC000
|
unkown
|
page read and write
|
||
4CFF000
|
unkown
|
page read and write
|
||
5A4D000
|
unkown
|
page read and write
|
||
1F70000
|
unkown
|
page read and write
|
||
263A000
|
unkown
|
page read and write
|
||
6072000
|
unkown
|
page read and write
|
||
252E000
|
unkown
|
page read and write
|
||
27CF000
|
unkown
|
page read and write
|
||
5A9E000
|
unkown
|
page read and write
|
||
32B000
|
unkown image
|
page execute read
|
||
A00000
|
unkown
|
page read and write
|
||
23E5000
|
unkown
|
page read and write
|
||
916F000
|
unkown
|
page read and write
|
||
333000
|
unkown image
|
page execute read
|
||
4368000
|
unkown
|
page read and write
|
||
279B000
|
unkown
|
page read and write
|
||
6CD000
|
unkown
|
page read and write
|
||
91AA000
|
unkown
|
page read and write
|
||
4540000
|
unkown
|
page readonly
|
||
6571000
|
unkown
|
page read and write
|
||
25B5000
|
unkown
|
page read and write
|
||
1F13000
|
unkown
|
page read and write
|
||
2842000
|
unkown
|
page read and write
|
||
52F0000
|
unkown
|
page read and write
|
||
2606000
|
unkown
|
page read and write
|
||
1FE0000
|
unkown
|
page read and write
|
||
62D7000
|
unkown
|
page read and write
|
||
9C0000
|
unkown image
|
page readonly
|
||
2B39000
|
unkown
|
page read and write
|
||
4CE5000
|
unkown
|
page read and write
|
||
4CDF000
|
unkown
|
page read and write
|
||
60E7000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1F20000
|
unkown
|
page read and write
|
||
68AA000
|
unkown
|
page read and write
|
||
188000
|
unkown
|
page read and write
|
||
6BF0000
|
unkown
|
page read and write
|
||
5223000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
4990000
|
heap private
|
page read and write
|
||
6BEE000
|
unkown
|
page read and write
|
||
931B000
|
unkown
|
page read and write
|
||
6B1B000
|
unkown
|
page read and write
|
||
686000
|
unkown
|
page read and write
|
||
5E50000
|
heap private
|
page read and write
|
||
60C1000
|
unkown
|
page read and write
|
||
4CF0000
|
unkown
|
page read and write
|
||
60F4000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
6C3B000
|
unkown
|
page read and write
|
||
4CDF000
|
unkown
|
page read and write
|
||
1D6000
|
unkown
|
page execute and read and write
|
||
5224000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
60E9000
|
unkown
|
page read and write
|
||
280E000
|
unkown
|
page read and write
|
||
9343000
|
unkown
|
page read and write
|
||
2602000
|
unkown
|
page read and write
|
||
25D9000
|
unkown
|
page read and write
|
||
768C000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
241F000
|
unkown
|
page read and write
|
||
285B000
|
unkown
|
page read and write
|
||
7737000
|
unkown
|
page read and write
|
||
27B4000
|
unkown
|
page read and write
|
||
25D6000
|
unkown
|
page read and write
|
||
2659000
|
unkown
|
page read and write
|
||
6862000
|
unkown
|
page read and write
|
||
26E0000
|
unkown
|
page read and write
|
||
282B000
|
unkown
|
page read and write
|
||
6C6A000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
610B000
|
unkown
|
page read and write
|
||
850000
|
heap private
|
page read and write
|
||
2799000
|
unkown
|
page read and write
|
||
90B0000
|
unkown
|
page read and write
|
||
23DB000
|
unkown
|
page read and write
|
||
4CF0000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
1E98000
|
unkown
|
page read and write
|
||
9155000
|
unkown
|
page read and write
|
||
65A4000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
26CB000
|
unkown
|
page read and write
|
||
1E60000
|
unkown
|
page read and write
|
||
26FA000
|
unkown
|
page read and write
|
||
2141000
|
unkown
|
page read and write
|
||
624E000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
2B13000
|
unkown
|
page read and write
|
||
24A0000
|
unkown
|
page read and write
|
||
67FE000
|
unkown
|
page read and write
|
||
91A3000
|
unkown
|
page read and write
|
||
2540000
|
unkown
|
page read and write
|
||
3345000
|
unkown
|
page read and write
|
||
5ADE000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
27F000
|
unkown
|
page read and write
|
||
4CE5000
|
unkown
|
page read and write
|
||
2855000
|
unkown
|
page read and write
|
||
2700000
|
unkown
|
page read and write
|
||
573E000
|
unkown
|
page read and write
|
||
668F000
|
unkown
|
page read and write
|
||
6040000
|
unkown
|
page read and write
|
||
366000
|
unkown image
|
page execute read
|
||
2880000
|
unkown
|
page read and write
|
||
90DE000
|
unkown
|
page read and write
|
||
26CD000
|
unkown
|
page read and write
|
||
69E000
|
unkown
|
page read and write
|
||
136000
|
heap default
|
page read and write
|
||
61D1000
|
heap private
|
page read and write
|
||
261B000
|
unkown
|
page read and write
|
||
5320000
|
unkown
|
page read and write
|
||
4C1C000
|
unkown
|
page read and write
|
||
500000
|
unkown
|
page read and write
|
||
92EE000
|
unkown
|
page read and write
|
||
8CFA000
|
heap private
|
page read and write
|
||
2594000
|
unkown
|
page read and write
|
||
1F20000
|
unkown
|
page read and write
|
||
919B000
|
unkown
|
page read and write
|
||
910C000
|
unkown
|
page read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
1F90000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
27BA000
|
unkown
|
page read and write
|
||
519D000
|
unkown
|
page read and write
|
||
A10000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
4CE5000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
692C000
|
unkown
|
page read and write
|
||
24A8000
|
unkown
|
page read and write
|
||
8CF0000
|
heap private
|
page read and write
|
||
33A000
|
unkown image
|
page execute read
|
||
4378000
|
unkown
|
page read and write
|
||
349000
|
unkown image
|
page execute read
|
||
25B3000
|
unkown
|
page read and write
|
||
34F000
|
unkown
|
page read and write
|
||
253F000
|
unkown
|
page read and write
|
||
9325000
|
unkown
|
page read and write
|
||
2B0000
|
unkown image
|
page readonly
|
||
2481000
|
unkown
|
page read and write
|
||
3B0000
|
unkown image
|
page execute read
|
||
203E000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
67BD000
|
unkown
|
page read and write
|
||
285F000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
610000
|
heap default
|
page read and write
|
||
2E0000
|
heap default
|
page read and write
|
||
243C000
|
unkown
|
page read and write
|
||
4CFF000
|
unkown
|
page read and write
|
||
65D3000
|
unkown
|
page read and write
|
||
3A1000
|
unkown image
|
page execute read
|
||
4378000
|
unkown
|
page read and write
|
||
4880000
|
heap private
|
page read and write
|
||
1FC6000
|
heap private
|
page read and write
|
||
28AF000
|
unkown
|
page read and write
|
||
1F90000
|
unkown
|
page read and write
|
||
60AF000
|
unkown
|
page read and write
|
||
74B000
|
unkown
|
page read and write
|
||
6581000
|
unkown
|
page read and write
|
||
5246000
|
unkown
|
page read and write
|
||
96FD000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
4CDF000
|
unkown
|
page read and write
|
||
24D2000
|
unkown
|
page read and write
|
||
68FE000
|
unkown
|
page read and write
|
||
1F70000
|
unkown
|
page read and write
|
||
20ED000
|
unkown
|
page read and write
|
||
6BAE000
|
unkown
|
page read and write
|
||
2140000
|
unkown
|
page readonly
|
||
3CD000
|
unkown image
|
page execute read
|
||
4378000
|
unkown
|
page read and write
|
||
5223000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
90F5000
|
unkown
|
page read and write
|
||
4CE5000
|
unkown
|
page read and write
|
||
6C7D000
|
unkown
|
page read and write
|
||
3C6000
|
unkown image
|
page execute read
|
||
43CE000
|
unkown
|
page read and write
|
||
6787000
|
unkown
|
page read and write
|
||
37C000
|
unkown image
|
page execute read
|
||
1F10000
|
unkown
|
page read and write
|
||
67F6000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
6842000
|
unkown
|
page read and write
|
||
90B1000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
280A000
|
unkown
|
page read and write
|
||
547000
|
heap default
|
page read and write
|
||
4CF0000
|
unkown
|
page read and write
|
||
915A000
|
unkown
|
page read and write
|
||
6A2E000
|
unkown
|
page read and write
|
||
4CF0000
|
unkown
|
page read and write
|
||
4CF0000
|
unkown
|
page read and write
|
||
932D000
|
unkown
|
page read and write
|
||
2692000
|
unkown
|
page read and write
|
||
938F000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
90E5000
|
unkown
|
page read and write
|
||
4CDA000
|
unkown
|
page read and write
|
||
449F000
|
unkown
|
page read and write
|
||
935C000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
1FE0000
|
unkown
|
page read and write
|
||
9140000
|
unkown
|
page read and write
|
||
36E000
|
unkown image
|
page execute read
|
||
6634000
|
unkown
|
page read and write
|
||
9155000
|
unkown
|
page read and write
|
||
29B000
|
unkown
|
page execute and read and write
|
||
60F3000
|
unkown
|
page read and write
|
||
701000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
6AC1000
|
unkown
|
page read and write
|
||
8BFD000
|
unkown
|
page read and write
|
||
1F10000
|
unkown
|
page read and write
|
||
25F6000
|
unkown
|
page read and write
|
||
26DD000
|
unkown
|
page read and write
|
||
1F80000
|
unkown
|
page execute and read and write
|
||
229F000
|
unkown
|
page read and write
|
||
52CE000
|
unkown
|
page read and write
|
||
934E000
|
unkown
|
page read and write
|
||
686000
|
unkown
|
page read and write
|
||
3B7000
|
unkown image
|
page execute read
|
||
9194000
|
unkown
|
page read and write
|
||
6C06000
|
unkown
|
page read and write
|
||
526E000
|
unkown
|
page read and write
|
||
90CE000
|
unkown
|
page read and write
|
||
1F70000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
5B0000
|
heap default
|
page read and write
|
||
5B3C000
|
unkown
|
page read and write
|
||
1D2000
|
unkown
|
page read and write
|
||
241B000
|
unkown
|
page read and write
|
||
65D5000
|
unkown
|
page read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
315000
|
unkown image
|
page execute read
|
||
23D8000
|
unkown
|
page read and write
|
||
544000
|
heap default
|
page read and write
|
||
5262000
|
unkown
|
page read and write
|
||
280000
|
heap default
|
page read and write
|
||
4BAF000
|
unkown
|
page read and write
|
||
6C28000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page read and write
|
||
5276000
|
unkown
|
page read and write
|
||
7EF40000
|
unkown
|
page execute and read and write
|
||
65A7000
|
unkown
|
page read and write
|
||
A04000
|
unkown
|
page read and write
|
||
60F3000
|
unkown
|
page read and write
|
||
9115000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
1E70000
|
unkown
|
page readonly
|
||
65CD000
|
unkown
|
page read and write
|
||
248B000
|
unkown
|
page read and write
|
||
283C000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
2861000
|
unkown
|
page read and write
|
||
9363000
|
unkown
|
page read and write
|
||
1DD0000
|
unkown
|
page readonly
|
||
4360000
|
unkown
|
page read and write
|
||
1F70000
|
unkown
|
page read and write
|
||
2651000
|
unkown
|
page read and write
|
||
4DF0000
|
heap private
|
page read and write
|
||
2844000
|
unkown
|
page read and write
|
||
9168000
|
unkown
|
page read and write
|
||
3341000
|
unkown
|
page read and write
|
||
2483000
|
unkown
|
page read and write
|
||
341000
|
unkown image
|
page execute read
|
||
6977000
|
unkown
|
page read and write
|
||
4CDF000
|
unkown
|
page read and write
|
||
6CAB000
|
unkown
|
page read and write
|
||
232F000
|
unkown
|
page read and write
|
||
9304000
|
unkown
|
page read and write
|
||
4CFF000
|
unkown
|
page read and write
|
||
23F5000
|
unkown
|
page read and write
|
||
6C33000
|
unkown
|
page read and write
|
||
27FA000
|
unkown
|
page read and write
|
||
9160000
|
unkown
|
page read and write
|
||
60AF000
|
unkown
|
page read and write
|
||
60B2000
|
unkown
|
page read and write
|
||
23CE000
|
unkown
|
page read and write
|
||
4CF0000
|
unkown
|
page read and write
|
||
92FD000
|
unkown
|
page read and write
|
||
333000
|
unkown image
|
page execute read
|
||
66D8000
|
unkown
|
page read and write
|
||
9147000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
60E7000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
500000
|
unkown
|
page read and write
|
||
564E000
|
unkown
|
page read and write
|
||
2B1D000
|
unkown
|
page read and write
|
||
6789000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
4CFF000
|
unkown
|
page read and write
|
||
25E5000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page readonly
|
||
4368000
|
unkown
|
page read and write
|
||
2767000
|
unkown
|
page read and write
|
||
287E000
|
unkown
|
page read and write
|
||
2449000
|
unkown
|
page read and write
|
||
74C000
|
heap private
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
2490000
|
unkown
|
page read and write
|
||
4CD2000
|
unkown
|
page read and write
|
||
5321000
|
unkown
|
page read and write
|
||
4CDD000
|
unkown
|
page read and write
|
||
2829000
|
unkown
|
page read and write
|
||
52B0000
|
heap private
|
page read and write
|
||
90C6000
|
unkown
|
page read and write
|
||
2341000
|
unkown
|
page read and write
|
||
60EB000
|
unkown
|
page read and write
|
||
259A000
|
unkown
|
page read and write
|
||
2748000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
38B000
|
unkown image
|
page execute read
|
||
4CE5000
|
unkown
|
page read and write
|
||
6F96000
|
unkown
|
page read and write
|
||
23D2000
|
unkown
|
page read and write
|
||
6545000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
2050000
|
heap private
|
page execute and read and write
|
||
970000
|
heap private
|
page read and write
|
||
6575000
|
unkown
|
page read and write
|
||
436E000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
2560000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
4380000
|
heap private
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
213E000
|
unkown
|
page read and write
|
||
4CF0000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
259C000
|
unkown
|
page read and write
|
||
4A3F000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page read and write
|
||
6C88000
|
unkown
|
page read and write
|
||
2636000
|
unkown
|
page read and write
|
||
252A000
|
unkown
|
page read and write
|
||
2468000
|
unkown
|
page read and write
|
||
26C6000
|
unkown
|
page read and write
|
||
1CD000
|
unkown
|
page execute and read and write
|
||
540000
|
unkown
|
page read and write
|
||
23C2000
|
unkown
|
page read and write
|
||
247A000
|
unkown
|
page read and write
|
||
6E25000
|
unkown
|
page read and write
|
||
8CFF000
|
heap private
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
9C8000
|
unkown image
|
page readonly
|
||
3A1000
|
unkown image
|
page execute read
|
||
911B000
|
unkown
|
page read and write
|
||
244D000
|
unkown
|
page read and write
|
||
274E000
|
unkown
|
page read and write
|
||
5C4F000
|
unkown
|
page read and write
|
||
638000
|
unkown
|
page read and write
|
||
90F5000
|
unkown
|
page read and write
|
||
263C000
|
unkown
|
page read and write
|
||
4A50000
|
heap private
|
page read and write
|
||
130000
|
heap default
|
page read and write
|
||
2740000
|
unkown
|
page read and write
|
||
9160000
|
unkown
|
page read and write
|
||
671000
|
unkown
|
page read and write
|
||
64AE000
|
unkown
|
page read and write
|
||
66DE000
|
unkown
|
page read and write
|
||
2540000
|
unkown
|
page read and write
|
||
6C67000
|
unkown
|
page read and write
|
||
560E000
|
unkown
|
page read and write
|
||
66F0000
|
unkown
|
page read and write
|
||
279D000
|
unkown
|
page read and write
|
||
4402000
|
heap private
|
page read and write
|
||
9C2000
|
unkown image
|
page execute read
|
||
629B000
|
unkown
|
page read and write
|
||
392000
|
unkown image
|
page execute read
|
||
20B000
|
unkown
|
page read and write
|
||
1B3000
|
unkown
|
page execute and read and write
|
||
4360000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
27A1000
|
unkown
|
page read and write
|
||
7095000
|
unkown
|
page read and write
|
||
33A000
|
unkown image
|
page execute read
|
||
3347000
|
unkown
|
page read and write
|
||
48C0000
|
unkown
|
page write copy
|
||
880E000
|
unkown
|
page read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
26F2000
|
unkown
|
page read and write
|
||
6CB1000
|
unkown
|
page read and write
|
||
276D000
|
unkown
|
page read and write
|
||
8789000
|
unkown
|
page read and write
|
||
243A000
|
unkown
|
page read and write
|
||
514E000
|
unkown
|
page read and write
|
||
6351000
|
unkown
|
page read and write
|
||
24D4000
|
unkown
|
page read and write
|
||
26F0000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
4DA0000
|
heap private
|
page execute and read and write
|
||
3B0000
|
unkown image
|
page execute read
|
||
282D000
|
unkown
|
page read and write
|
||
675000
|
unkown
|
page read and write
|
||
9104000
|
unkown
|
page read and write
|
||
48A2000
|
heap private
|
page read and write
|
||
4D0000
|
unkown
|
page read and write
|
||
9185000
|
unkown
|
page read and write
|
||
26C4000
|
unkown
|
page read and write
|
||
67F8000
|
unkown
|
page read and write
|
||
29E0000
|
heap private
|
page read and write
|
||
69B8000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
90ED000
|
unkown
|
page read and write
|
||
6462000
|
unkown
|
page read and write
|
||
4CE5000
|
unkown
|
page read and write
|
||
A10000
|
unkown
|
page read and write
|
||
6C1000
|
unkown
|
page read and write
|
||
2143000
|
unkown
|
page read and write
|
||
9C0000
|
unkown image
|
page readonly
|
||
2425000
|
unkown
|
page read and write
|
||
2457000
|
unkown
|
page read and write
|
||
4340000
|
unkown
|
page read and write
|
||
62EF000
|
unkown
|
page read and write
|
||
2711000
|
unkown
|
page read and write
|
||
4360000
|
unkown
|
page read and write
|
||
2408000
|
unkown
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
918C000
|
unkown
|
page read and write
|
||
258E000
|
unkown
|
page read and write
|
||
5D4000
|
heap default
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
124000
|
unkown
|
page read and write
|
||
2859000
|
unkown
|
page read and write
|
||
5D80000
|
heap private
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
2140000
|
unkown
|
page read and write
|
||
6849000
|
unkown
|
page read and write
|
||
CD000
|
unkown
|
page execute and read and write
|
||
4CA0000
|
unkown
|
page read and write
|
||
2795000
|
unkown
|
page read and write
|
||
5C50000
|
unkown
|
page readonly
|
||
4CFF000
|
unkown
|
page read and write
|
||
7044000
|
unkown
|
page read and write
|
||
4368000
|
unkown
|
page read and write
|
||
5B9000
|
heap default
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
4A3E000
|
unkown
|
page read and write | page guard
|
There are 1375 hidden memdumps, click here to show them.