Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\3530.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6E8A.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7C81.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rentry-script.ps1
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\sashibt
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\sashibt:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\6E8A.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iphtavot.cdr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jeqrphl1.chf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v21r2jvc.u1m.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zmwgc4wp.1qc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lumma.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\venom.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Users\user\AppData\Roaming\sashibt
|
C:\Users\user\AppData\Roaming\sashibt
|
||
C:\Users\user\AppData\Roaming\sashibt
|
C:\Users\user\AppData\Roaming\sashibt
|
||
C:\Users\user\AppData\Local\Temp\3530.exe
|
C:\Users\user\AppData\Local\Temp\3530.exe
|
||
C:\Users\user\AppData\Local\Temp\7C81.exe
|
C:\Users\user\AppData\Local\Temp\7C81.exe
|
||
C:\Users\user\AppData\Local\Temp\6E8A.exe
|
C:\Users\user\AppData\Local\Temp\6E8A.exe
|
||
C:\Users\user\AppData\Local\Temp\6E8A.exe
|
"C:\Users\user\AppData\Local\Temp\6E8A.exe" -HOSTRUNAS
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\Users\user\AppData\Local\Temp\rentry-script.ps1"
|
||
C:\Users\user\AppData\Local\Temp\3530.exe
|
"C:\Users\user\AppData\Local\Temp\3530.exe"
|
||
C:\Users\user\AppData\Local\Temp\3530.exe
|
"C:\Users\user\AppData\Local\Temp\3530.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://100xmargin.com/tmp/index.php
|
|||
http://olinsw.ws/tmp/index.php
|
|||
http://wgdnb4rc.xyz/tmp/index.php
|
|||
https://107.173.160.137/
|
107.173.160.137
|
||
http://mzxn.ru/tmp/index.php
|
125.7.253.10
|
||
lariatedzugspd.shop
|
|||
callosallsaospz.shop
|
|||
https://167.235.128.153/
|
167.235.128.153
|
||
https://funrecipebooks.com/setups.exe
|
162.0.235.84
|
||
liernessfornicsa.shop
|
|||
https://107.173.160.139/
|
107.173.160.139
|
||
shepherdlyopzc.shop
|
|||
upknittsoappz.shop
|
|||
https://mussangroup.com/wp-content/images/pic1.jpg
|
185.149.100.242
|
||
outpointsozp.shop
|
|||
unseaffarignsk.shop
|
|||
https://word.office.comon
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://callosallsaospz.shop/api
|
188.114.96.3
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://callosallsaospz.shop/apicnmamaa
|
unknown
|
||
https://powerpoint.office.comcember
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://rentry.co/microgods/raw
|
104.26.3.16
|
||
http://ocsps.ssl.com0?
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
|
unknown
|
||
http://ocsps.ssl.com0
|
unknown
|
||
http://store4.gofile.io
|
unknown
|
||
http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
|
unknown
|
||
https://excel.office.com
|
unknown
|
||
http://.css
|
unknown
|
||
http://schemas.micro
|
unknown
|
||
https://store4.gofile.io/download/direct/0656c5cf-51b4-4fa4-ae48-8ee5ed3d142e/lm.zip
|
31.14.70.245
|
||
http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0
|
unknown
|
||
https://callosallsaospz.shop/bO
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://callosallsaospz.shop/e
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://www.ssl.com/repository0
|
unknown
|
||
http://ocsps.ssl.com0_
|
unknown
|
||
https://callosallsaospz.shop/b
|
unknown
|
||
https://callosallsaospz.shop/apioro
|
unknown
|
||
https://callosallsaospz.shop/m
|
unknown
|
||
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
|
unknown
|
||
https://callosallsaospz.shop/h
|
unknown
|
||
https://callosallsaospz.shop/i
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://rentry.co
|
unknown
|
||
http://www.oberhumer.com
|
unknown
|
||
https://callosallsaospz.shop/o
|
unknown
|
||
https://wns.windows.com/)s
|
unknown
|
||
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://callosallsaospz.shop/D
|
unknown
|
||
https://store4.gofile.io
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://callosallsaospz.shop/apiQbd
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://callosallsaospz.shop/apisF
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://callosallsaospz.shop/apiem
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://callosallsaospz.shop///
|
unknown
|
||
https://callosallsaospz.shop/apiyy
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://outlook.com
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://android.notify.windows.com/iOS
|
unknown
|
||
https://store4.gofile.io/download/direct/6b24ec97-2a8d-468d-a24d-c8081cda1dab/vm.zip
|
31.14.70.245
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
http://rentry.co
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://api.msn.com/
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0
|
unknown
|
||
http://crl.v
|
unknown
|
||
https://callosallsaospz.shop/
|
unknown
|
||
https://callosallsaospz.shop/0
|
unknown
|
There are 86 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
funrecipebooks.com
|
162.0.235.84
|
||
rentry.co
|
104.26.3.16
|
||
mzxn.ru
|
186.145.236.93
|
||
liernessfornicsa.shop
|
172.67.213.85
|
||
mussangroup.com
|
185.149.100.242
|
||
callosallsaospz.shop
|
188.114.96.3
|
||
206.23.85.13.in-addr.arpa
|
unknown
|
||
store4.gofile.io
|
31.14.70.245
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
77.221.157.163
|
unknown
|
Russian Federation
|
||
107.173.160.139
|
unknown
|
United States
|
||
107.173.160.137
|
unknown
|
United States
|
||
162.0.235.84
|
funrecipebooks.com
|
Canada
|
||
109.172.114.212
|
unknown
|
Russian Federation
|
||
64.190.113.113
|
unknown
|
United States
|
||
125.7.253.10
|
unknown
|
Korea Republic of
|
||
177.222.41.236
|
unknown
|
Bolivia
|
||
186.145.236.93
|
mzxn.ru
|
Colombia
|
||
104.26.3.16
|
rentry.co
|
United States
|
||
167.235.128.153
|
unknown
|
United States
|
||
188.114.96.3
|
callosallsaospz.shop
|
European Union
|
||
185.149.100.242
|
mussangroup.com
|
Turkey
|
||
31.14.70.245
|
store4.gofile.io
|
Virgin Islands (BRITISH)
|
There are 4 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
|
Update#7936_8yUscnjrUY
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000050246
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020474
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000B006E
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@explorerframe.dll,-13137
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@explorerframe.dll,-13138
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080472
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\nysbaf\NccQngn\Ybpny\Grzc\3530.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020488
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000003047E
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030492
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\nysbaf\NccQngn\Ybpny\Grzc\3530.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\6E8A_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\6E8A_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\6E8A_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\6E8A_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\6E8A_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\6E8A_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\6E8A_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\6E8A_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\6E8A_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\6E8A_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\6E8A_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\6E8A_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\6E8A_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\6E8A_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 245 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2600000
|
direct allocation
|
page read and write
|
||
C00065C000
|
direct allocation
|
page read and write
|
||
7FF7D5140000
|
unkown
|
page readonly
|
||
40C1000
|
unclassified section
|
page read and write
|
||
2621000
|
unclassified section
|
page read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
7FF7D5140000
|
unkown
|
page readonly
|
||
40B1000
|
unclassified section
|
page read and write
|
||
25F0000
|
direct allocation
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
AE1D000
|
stack
|
page read and write
|
||
68B2D85000
|
stack
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
99C0000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
87E1000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
C44F000
|
stack
|
page read and write
|
||
A39C000
|
unkown
|
page read and write
|
||
21FA302D000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF5D75FF000
|
unkown
|
page readonly
|
||
237821A0000
|
heap
|
page read and write
|
||
2598E690000
|
heap
|
page read and write
|
||
22A4D2C0000
|
heap
|
page read and write
|
||
4D69000
|
trusted library allocation
|
page read and write
|
||
85C000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7FF5D7458000
|
unkown
|
page readonly
|
||
263D000
|
heap
|
page execute and read and write
|
||
4B3A000
|
trusted library allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF5D76C8000
|
unkown
|
page readonly
|
||
768E000
|
unkown
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
7FF848DED000
|
trusted library allocation
|
page execute and read and write
|
||
CDBE5FE000
|
stack
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
76F8000
|
unkown
|
page read and write
|
||
4B3A000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7FF5D7396000
|
unkown
|
page readonly
|
||
9700000
|
unkown
|
page read and write
|
||
C0003B4000
|
direct allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
21FA3037000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
7FF5D76CD000
|
unkown
|
page readonly
|
||
1230000
|
unkown
|
page read and write
|
||
F66D000
|
stack
|
page read and write
|
||
7FF5D7292000
|
unkown
|
page readonly
|
||
21FA14D4000
|
heap
|
page read and write
|
||
2A985CE000
|
stack
|
page read and write
|
||
C16FFFE000
|
stack
|
page read and write
|
||
5479000
|
unkown
|
page read and write
|
||
3090000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
C669000
|
unkown
|
page read and write
|
||
21F85E13000
|
heap
|
page execute and read and write
|
||
3080000
|
unkown
|
page read and write
|
||
4AAF000
|
trusted library allocation
|
page read and write
|
||
7FF5D776D000
|
unkown
|
page readonly
|
||
1170000
|
unkown
|
page read and write
|
||
94AB000
|
stack
|
page read and write
|
||
4AB2000
|
trusted library allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
21F87C6B000
|
trusted library allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
A8F000
|
stack
|
page read and write
|
||
7FF5D75D6000
|
unkown
|
page readonly
|
||
8A00000
|
unkown
|
page read and write
|
||
C0000D4000
|
direct allocation
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
3270000
|
unkown
|
page read and write
|
||
7FF5D7691000
|
unkown
|
page readonly
|
||
7FF5D7404000
|
unkown
|
page readonly
|
||
E4CC000
|
stack
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
C0000F4000
|
direct allocation
|
page read and write
|
||
7FF5D71CC000
|
unkown
|
page readonly
|
||
7FF5D7797000
|
unkown
|
page readonly
|
||
9820000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
8850000
|
unkown
|
page read and write
|
||
86E0000
|
unkown
|
page readonly
|
||
3230000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
7FF5D7065000
|
unkown
|
page readonly
|
||
4BA1000
|
trusted library allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
26EE000
|
stack
|
page read and write
|
||
7FF848FC6000
|
trusted library allocation
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
42B0000
|
heap
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
22A36822000
|
trusted library allocation
|
page read and write
|
||
C0001DE000
|
direct allocation
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
859000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
21F87C4D000
|
trusted library allocation
|
page read and write
|
||
86B000
|
heap
|
page read and write
|
||
294F000
|
stack
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
7631000
|
unkown
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
22A33200000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
4AB0000
|
unkown
|
page read and write
|
||
35BD000
|
unkown
|
page read and write
|
||
2598CDB0000
|
heap
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
3489000
|
stack
|
page read and write
|
||
9B2C000
|
unkown
|
page read and write
|
||
22A332EA000
|
heap
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
7FF5D6A4B000
|
unkown
|
page readonly
|
||
C000050000
|
direct allocation
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
21F87821000
|
trusted library allocation
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
22ADEC62000
|
direct allocation
|
page read and write
|
||
A384000
|
unkown
|
page read and write
|
||
C81C000
|
unkown
|
page read and write
|
||
2A973FE000
|
stack
|
page read and write
|
||
7FF5D77D2000
|
unkown
|
page readonly
|
||
7FF5D781A000
|
unkown
|
page readonly
|
||
88E000
|
heap
|
page read and write
|
||
C0003F0000
|
direct allocation
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
35C1000
|
unkown
|
page read and write
|
||
4AC9000
|
trusted library allocation
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
C0003BE000
|
direct allocation
|
page read and write
|
||
21FA3140000
|
heap
|
page read and write
|
||
C9B9000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
25F0000
|
direct allocation
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
C16E7F5000
|
stack
|
page read and write
|
||
7FF5D7289000
|
unkown
|
page readonly
|
||
9B0B000
|
unkown
|
page read and write
|
||
4ACF000
|
trusted library allocation
|
page read and write
|
||
7FF5D76AF000
|
unkown
|
page readonly
|
||
21F85EB5000
|
heap
|
page read and write
|
||
4ACD000
|
trusted library allocation
|
page read and write
|
||
C000026000
|
direct allocation
|
page read and write
|
||
C000192000
|
direct allocation
|
page read and write
|
||
A3C3000
|
unkown
|
page read and write
|
||
7FF7D5096000
|
unkown
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
F6C0000
|
heap
|
page read and write
|
||
7FF5D7394000
|
unkown
|
page readonly
|
||
21F85E60000
|
heap
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
2598E710000
|
heap
|
page read and write
|
||
9A90000
|
unkown
|
page read and write
|
||
7FF5D75D9000
|
unkown
|
page readonly
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
D8D000
|
stack
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
C000428000
|
direct allocation
|
page read and write
|
||
7FF7A0A1D000
|
unkown
|
page readonly
|
||
C000146000
|
direct allocation
|
page read and write
|
||
21F87C33000
|
trusted library allocation
|
page read and write
|
||
7FF5D74B8000
|
unkown
|
page readonly
|
||
7FF5D738E000
|
unkown
|
page readonly
|
||
9780000
|
unkown
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
99B4000
|
unkown
|
page read and write
|
||
21FA301E000
|
heap
|
page read and write
|
||
8DD0000
|
unkown
|
page read and write
|
||
DC808FD000
|
stack
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
C000338000
|
direct allocation
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
7FF5D7236000
|
unkown
|
page readonly
|
||
3530000
|
unkown
|
page read and write
|
||
7FF5D7360000
|
unkown
|
page readonly
|
||
C000124000
|
direct allocation
|
page read and write
|
||
22AE3F60000
|
direct allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
35CD000
|
unkown
|
page read and write
|
||
AA1A000
|
unkown
|
page read and write
|
||
4B32000
|
trusted library allocation
|
page read and write
|
||
7FF5D749B000
|
unkown
|
page readonly
|
||
10E0000
|
stack
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
7FF5D7534000
|
unkown
|
page readonly
|
||
7FF5D7284000
|
unkown
|
page readonly
|
||
22A332AA000
|
heap
|
page read and write
|
||
C00042F000
|
direct allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
C0002C6000
|
direct allocation
|
page read and write
|
||
AA04000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7FF7D509C000
|
unkown
|
page read and write
|
||
22A4D460000
|
heap
|
page execute and read and write
|
||
33B0000
|
unkown
|
page readonly
|
||
82E000
|
heap
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
35C9000
|
unkown
|
page read and write
|
||
C0000D2000
|
direct allocation
|
page read and write
|
||
21F87DDD000
|
trusted library allocation
|
page read and write
|
||
C00005D000
|
direct allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
21FA3079000
|
heap
|
page read and write
|
||
35E4000
|
unkown
|
page read and write
|
||
C000416000
|
direct allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
21F85BA2000
|
heap
|
page read and write
|
||
4AC3000
|
trusted library allocation
|
page read and write
|
||
22A4D490000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
4AE5000
|
trusted library allocation
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
C000286000
|
direct allocation
|
page read and write
|
||
4AFE000
|
trusted library allocation
|
page read and write
|
||
4AE5000
|
trusted library allocation
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
4A9B000
|
trusted library allocation
|
page read and write
|
||
22ADEC70000
|
direct allocation
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
2598E620000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
7FF5D7604000
|
unkown
|
page readonly
|
||
259A9AB0000
|
heap
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
4AA0000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
8360000
|
unkown
|
page read and write
|
||
3090000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7FF5D751F000
|
unkown
|
page readonly
|
||
7FF5D7398000
|
unkown
|
page readonly
|
||
22ADE930000
|
heap
|
page read and write
|
||
C7C6000
|
unkown
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
C0000B0000
|
direct allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
C65E000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
841000
|
heap
|
page read and write
|
||
49C2000
|
unkown
|
page read and write
|
||
853E000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7DF4F2480000
|
unkown
|
page readonly
|
||
3230000
|
unkown
|
page read and write
|
||
22A4534E000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
21F85B2E000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF5D743F000
|
unkown
|
page readonly
|
||
7FF5D7452000
|
unkown
|
page readonly
|
||
7FF5D7764000
|
unkown
|
page readonly
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
4A9F000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
22ADEC5F000
|
direct allocation
|
page read and write
|
||
7AA0000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
85D000
|
heap
|
page read and write
|
||
21F87663000
|
heap
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
A0A9000
|
stack
|
page read and write
|
||
7FF5D7407000
|
unkown
|
page readonly
|
||
22A34CB0000
|
trusted library allocation
|
page read and write
|
||
C0000F2000
|
direct allocation
|
page read and write
|
||
CDBE9FE000
|
stack
|
page read and write
|
||
21F87C5C000
|
trusted library allocation
|
page read and write
|
||
22A36A8C000
|
trusted library allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
7FF5D72D3000
|
unkown
|
page readonly
|
||
864000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
7FF5D772C000
|
unkown
|
page readonly
|
||
1B961138000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
2EB1000
|
unkown
|
page read and write
|
||
7FF849242000
|
trusted library allocation
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
98FD000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FF7D50A3000
|
unkown
|
page write copy
|
||
9430000
|
unkown
|
page read and write
|
||
4AC5000
|
trusted library allocation
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
4AB5000
|
trusted library allocation
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
7FF7D4C01000
|
unkown
|
page execute read
|
||
9780000
|
unkown
|
page read and write
|
||
4AE5000
|
trusted library allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
7FF5D7391000
|
unkown
|
page readonly
|
||
9580000
|
unkown
|
page read and write
|
||
8DD0000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
9AAC000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
C48B000
|
unkown
|
page read and write
|
||
7FF848DE3000
|
trusted library allocation
|
page execute and read and write
|
||
3260000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
68B13FB000
|
stack
|
page read and write
|
||
C0009DA000
|
direct allocation
|
page read and write
|
||
2448000
|
unkown
|
page readonly
|
||
3250000
|
unkown
|
page read and write
|
||
C0002A4000
|
direct allocation
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
4AB4000
|
trusted library allocation
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
E6CD000
|
stack
|
page read and write
|
||
9579000
|
stack
|
page read and write
|
||
4AAF000
|
trusted library allocation
|
page read and write
|
||
A28D000
|
unkown
|
page read and write
|
||
C00012E000
|
direct allocation
|
page read and write
|
||
13A0000
|
unkown
|
page readonly
|
||
9279000
|
stack
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
22A332A4000
|
heap
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
4A9D000
|
trusted library allocation
|
page read and write
|
||
BEA0000
|
unkown
|
page readonly
|
||
3230000
|
unkown
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
A408000
|
unkown
|
page read and write
|
||
10634000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
3220000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
21FA126F000
|
heap
|
page read and write
|
||
1281000
|
unkown
|
page readonly
|
||
3220000
|
unkown
|
page read and write
|
||
7FF5D716B000
|
unkown
|
page readonly
|
||
3230000
|
unkown
|
page read and write
|
||
7FF848E96000
|
trusted library allocation
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
879000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
8946000
|
unkown
|
page read and write
|
||
C1707FE000
|
stack
|
page read and write
|
||
C000426000
|
direct allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF5D748A000
|
unkown
|
page readonly
|
||
22A34DE0000
|
heap
|
page read and write
|
||
7FF5D7799000
|
unkown
|
page readonly
|
||
10774000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
9A96000
|
unkown
|
page read and write
|
||
C000382000
|
direct allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
22A4D695000
|
heap
|
page read and write
|
||
7FF7D4C00000
|
unkown
|
page readonly
|
||
3500000
|
stack
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
C0BA000
|
stack
|
page read and write
|
||
841000
|
heap
|
page read and write
|
||
C8C2000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
25E0000
|
direct allocation
|
page execute and read and write
|
||
4A71000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D723F000
|
unkown
|
page readonly
|
||
C16EBFF000
|
stack
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7DF4F2470000
|
unkown
|
page readonly
|
||
4A40000
|
unkown
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E9C000
|
trusted library allocation
|
page execute and read and write
|
||
87C000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
4B02000
|
trusted library allocation
|
page read and write
|
||
E84D000
|
stack
|
page read and write
|
||
3120000
|
unkown
|
page read and write
|
||
22A34CB3000
|
trusted library allocation
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
22AE3FC0000
|
direct allocation
|
page read and write
|
||
21FA17F4000
|
heap
|
page read and write
|
||
7FF415C80000
|
trusted library allocation
|
page execute and read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
7FF5D769E000
|
unkown
|
page readonly
|
||
F56D000
|
stack
|
page read and write
|
||
C000059000
|
direct allocation
|
page read and write
|
||
4B2B000
|
trusted library allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
7FF5D7722000
|
unkown
|
page readonly
|
||
3220000
|
unkown
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
7FF7D511D000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
1B962AE1000
|
heap
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
21F85B59000
|
heap
|
page read and write
|
||
3270000
|
unkown
|
page read and write
|
||
A9E9000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
259A7140000
|
heap
|
page read and write
|
||
1B962AE0000
|
heap
|
page read and write
|
||
259A9AB2000
|
heap
|
page read and write
|
||
7FF5D705D000
|
unkown
|
page readonly
|
||
3250000
|
unkown
|
page read and write
|
||
7FF5D776F000
|
unkown
|
page readonly
|
||
9430000
|
unkown
|
page read and write
|
||
58E6000
|
trusted library allocation
|
page read and write
|
||
7FF5D77B9000
|
unkown
|
page readonly
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
7FF5D77DA000
|
unkown
|
page readonly
|
||
3080000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
F5EE000
|
stack
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
7FF7D5776000
|
unkown
|
page write copy
|
||
3290000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
30A0000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
22A36A74000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
5463000
|
unkown
|
page read and write
|
||
3270000
|
unkown
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
21F87B38000
|
trusted library allocation
|
page read and write
|
||
848000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
22A4D686000
|
heap
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
4A16000
|
unkown
|
page read and write
|
||
9580000
|
unkown
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
C0003F6000
|
direct allocation
|
page read and write
|
||
7FF7A0990000
|
unkown
|
page readonly
|
||
9820000
|
unkown
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
9580000
|
unkown
|
page read and write
|
||
7FF7A0A82000
|
unkown
|
page write copy
|
||
4AC6000
|
trusted library allocation
|
page read and write
|
||
68AF3FD000
|
stack
|
page read and write
|
||
7FF7D50A1000
|
unkown
|
page write copy
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
7FF7D511F000
|
unkown
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
2598CBD0000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
A9DF000
|
unkown
|
page read and write
|
||
7FF7D576E000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
7FF7A0A1D000
|
unkown
|
page readonly
|
||
21FA0040000
|
trusted library section
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
4ADE000
|
trusted library allocation
|
page read and write
|
||
9470000
|
unkown
|
page read and write
|
||
A39F000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
C460000
|
unkown
|
page read and write
|
||
7AC0000
|
unkown
|
page read and write
|
||
7FF5D7593000
|
unkown
|
page readonly
|
||
9700000
|
unkown
|
page read and write
|
||
362D000
|
unkown
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
22A4D376000
|
heap
|
page read and write
|
||
7FF5D7591000
|
unkown
|
page readonly
|
||
1170000
|
unkown
|
page read and write
|
||
DB0000
|
remote allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
7FF5D71DA000
|
unkown
|
page readonly
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
41F000
|
unkown
|
page readonly
|
||
22A36E78000
|
trusted library allocation
|
page read and write
|
||
7FF7D5776000
|
unkown
|
page read and write
|
||
3260000
|
unkown
|
page read and write
|
||
22A36A14000
|
trusted library allocation
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
7FF5D75F9000
|
unkown
|
page readonly
|
||
3220000
|
unkown
|
page read and write
|
||
68AEFFC000
|
stack
|
page read and write
|
||
7FF7D513E000
|
unkown
|
page write copy
|
||
21FA14D1000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
9470000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
BE90000
|
unkown
|
page read and write
|
||
4C7A000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
22A34E50000
|
heap
|
page read and write
|
||
35B0000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
7DF4F24A1000
|
unkown
|
page execute read
|
||
49D6000
|
unkown
|
page read and write
|
||
7FF849300000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
21F87D25000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
1B961070000
|
heap
|
page read and write
|
||
C5F8000
|
unkown
|
page read and write
|
||
8DD0000
|
unkown
|
page read and write
|
||
9470000
|
unkown
|
page read and write
|
||
7FF5D72DF000
|
unkown
|
page readonly
|
||
7FF5D770F000
|
unkown
|
page readonly
|
||
9470000
|
unkown
|
page read and write
|
||
8942000
|
unkown
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
22A4D650000
|
heap
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
7FF5D6BEF000
|
unkown
|
page readonly
|
||
7FF5D706E000
|
unkown
|
page readonly
|
||
45B000
|
stack
|
page read and write
|
||
21F87C62000
|
trusted library allocation
|
page read and write
|
||
1B96112B000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
10734000
|
unkown
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
C653000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
BE70000
|
unkown
|
page readonly
|
||
2598CD00000
|
heap
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
B220000
|
unkown
|
page read and write
|
||
C000148000
|
direct allocation
|
page read and write
|
||
22A33272000
|
heap
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
22A33230000
|
heap
|
page read and write
|
||
21FA0122000
|
heap
|
page read and write
|
||
C000057000
|
direct allocation
|
page read and write
|
||
7DF4F2461000
|
unkown
|
page execute read
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
AA40000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
BE49000
|
stack
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
7FF7A0991000
|
unkown
|
page execute read
|
||
B980000
|
unkown
|
page readonly
|
||
7FF7A0A82000
|
unkown
|
page read and write
|
||
A313000
|
unkown
|
page read and write
|
||
4AAF000
|
trusted library allocation
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
7FF5D69BB000
|
unkown
|
page readonly
|
||
41F000
|
unkown
|
page readonly
|
||
9430000
|
unkown
|
page read and write
|
||
7FF5D7784000
|
unkown
|
page readonly
|
||
C0002AE000
|
direct allocation
|
page read and write
|
||
53DA000
|
trusted library allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
7FF5D744E000
|
unkown
|
page readonly
|
||
7FF5D7837000
|
unkown
|
page readonly
|
||
7FF5D77F0000
|
unkown
|
page readonly
|
||
9430000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
C000385000
|
direct allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
257E000
|
stack
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
9A6A000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
22ADEC57000
|
direct allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
2723000
|
heap
|
page read and write
|
||
4CD9000
|
trusted library allocation
|
page read and write
|
||
2598CB00000
|
heap
|
page read and write
|
||
4A95000
|
trusted library allocation
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
8C39000
|
stack
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
8380000
|
unkown
|
page read and write
|
||
21FA00B0000
|
heap
|
page read and write
|
||
7FF7A0A82000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
C0000E4000
|
direct allocation
|
page read and write
|
||
7FF5D764F000
|
unkown
|
page readonly
|
||
8E4E000
|
stack
|
page read and write
|
||
85D000
|
heap
|
page read and write
|
||
4ADA000
|
unkown
|
page read and write
|
||
4B02000
|
trusted library allocation
|
page read and write
|
||
2660000
|
heap
|
page execute and read and write
|
||
7A6000
|
heap
|
page read and write
|
||
8810000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
22ADEC30000
|
direct allocation
|
page read and write
|
||
C16EFFF000
|
stack
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
7FF7D5777000
|
unkown
|
page write copy
|
||
88E000
|
heap
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page execute and read and write
|
||
4AEA000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
4986000
|
unkown
|
page read and write
|
||
7FF849244000
|
trusted library allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
9A8E000
|
unkown
|
page read and write
|
||
21FA1480000
|
heap
|
page read and write
|
||
406F4B000
|
stack
|
page read and write
|
||
2A976BF000
|
stack
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
7FF5D72D7000
|
unkown
|
page readonly
|
||
88E000
|
heap
|
page read and write
|
||
4AE3000
|
trusted library allocation
|
page read and write
|
||
2598E715000
|
heap
|
page read and write
|
||
B950000
|
unkown
|
page readonly
|
||
3220000
|
unkown
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
C5FA000
|
unkown
|
page read and write
|
||
7FF7A0A82000
|
unkown
|
page write copy
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
AFBE000
|
stack
|
page read and write
|
||
7FF5D7641000
|
unkown
|
page readonly
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
4AB3000
|
trusted library allocation
|
page read and write
|
||
4B01000
|
trusted library allocation
|
page read and write
|
||
9430000
|
stack
|
page read and write
|
||
7FF5D6BDB000
|
unkown
|
page readonly
|
||
9700000
|
stack
|
page read and write
|
||
7FF5D7425000
|
unkown
|
page readonly
|
||
4A90000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
2598CB77000
|
heap
|
page read and write
|
||
338B000
|
stack
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
875000
|
heap
|
page read and write
|
||
7FF7D5135000
|
unkown
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
2A97ABB000
|
stack
|
page read and write
|
||
30A0000
|
unkown
|
page read and write
|
||
2A9874D000
|
stack
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
833000
|
heap
|
page read and write
|
||
9A72000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
C605000
|
unkown
|
page read and write
|
||
41F000
|
unkown
|
page readonly
|
||
1B9610B0000
|
heap
|
page read and write
|
||
1270000
|
unkown
|
page read and write
|
||
7FF7D5095000
|
unkown
|
page write copy
|
||
262A000
|
heap
|
page read and write
|
||
22A36824000
|
trusted library allocation
|
page read and write
|
||
3090000
|
unkown
|
page read and write
|
||
7FF5D66E8000
|
unkown
|
page readonly
|
||
83A000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
C000344000
|
direct allocation
|
page read and write
|
||
7FF7D5133000
|
unkown
|
page write copy
|
||
9430000
|
unkown
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
4AF5000
|
trusted library allocation
|
page read and write
|
||
7FF5D752F000
|
unkown
|
page readonly
|
||
4A97000
|
trusted library allocation
|
page read and write
|
||
7FF5D74F2000
|
unkown
|
page readonly
|
||
9820000
|
unkown
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
22A34DB0000
|
trusted library allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
C00029A000
|
direct allocation
|
page read and write
|
||
C0001C2000
|
direct allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
4B2B000
|
trusted library allocation
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF5D6AB6000
|
unkown
|
page readonly
|
||
1170000
|
unkown
|
page read and write
|
||
C615000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
A220000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
68AEBFF000
|
stack
|
page read and write
|
||
B7DC000
|
stack
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
1000000
|
heap
|
page read and write
|
||
7B80000
|
unkown
|
page readonly
|
||
35F4000
|
unkown
|
page read and write
|
||
7FF7A0991000
|
unkown
|
page execute read
|
||
4ABC000
|
trusted library allocation
|
page read and write
|
||
22A4D678000
|
heap
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
7FF848F9A000
|
trusted library allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
7FF5D7703000
|
unkown
|
page readonly
|
||
7FF5D71F9000
|
unkown
|
page readonly
|
||
84BB000
|
stack
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
852000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
21FA0230000
|
heap
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
2A97A3B000
|
stack
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
4380000
|
heap
|
page read and write
|
||
22A36989000
|
trusted library allocation
|
page read and write
|
||
7FF5D7760000
|
unkown
|
page readonly
|
||
22A36A95000
|
trusted library allocation
|
page read and write
|
||
22A4D317000
|
heap
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
94F4000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
3110000
|
unkown
|
page readonly
|
||
E8CD000
|
stack
|
page read and write
|
||
75F8000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
C0001E4000
|
direct allocation
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7FF5D728E000
|
unkown
|
page readonly
|
||
7FF5D75A6000
|
unkown
|
page readonly
|
||
8DD0000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7C70000
|
unkown
|
page readonly
|
||
2A986CC000
|
stack
|
page read and write
|
||
C000420000
|
direct allocation
|
page read and write
|
||
7FF5D71EF000
|
unkown
|
page readonly
|
||
1170000
|
unkown
|
page read and write
|
||
A12F000
|
stack
|
page read and write
|
||
7FF5D778A000
|
unkown
|
page readonly
|
||
7FF5D72D0000
|
unkown
|
page readonly
|
||
C000002000
|
direct allocation
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
7FF5D7682000
|
unkown
|
page readonly
|
||
A9FD000
|
unkown
|
page read and write
|
||
7E60000
|
unkown
|
page read and write
|
||
49FD000
|
unkown
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
8D3B000
|
stack
|
page read and write
|
||
7FF5D723C000
|
unkown
|
page readonly
|
||
1170000
|
unkown
|
page read and write
|
||
942E000
|
stack
|
page read and write
|
||
12D0000
|
unkown
|
page readonly
|
||
423000
|
unkown
|
page write copy
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
852000
|
heap
|
page read and write
|
||
21F87C40000
|
trusted library allocation
|
page read and write
|
||
7FF5D77A8000
|
unkown
|
page readonly
|
||
41F000
|
unkown
|
page readonly
|
||
C0000F0000
|
direct allocation
|
page read and write
|
||
7FF7D5094000
|
unkown
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
9679000
|
stack
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
7460000
|
unkown
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
4A95000
|
trusted library allocation
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
7FF849320000
|
trusted library allocation
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
7FF7A0991000
|
unkown
|
page execute read
|
||
7FF8492B0000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7FF5D76F5000
|
unkown
|
page readonly
|
||
CA47000
|
unkown
|
page read and write
|
||
4C6A000
|
trusted library allocation
|
page read and write
|
||
4D0A000
|
trusted library allocation
|
page read and write
|
||
8E30000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
C472000
|
unkown
|
page read and write
|
||
7FF7D5122000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
C00032E000
|
direct allocation
|
page read and write
|
||
4ABA000
|
trusted library allocation
|
page read and write
|
||
695000
|
heap
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF5D77E3000
|
unkown
|
page readonly
|
||
3230000
|
unkown
|
page read and write
|
||
7FA000
|
heap
|
page read and write
|
||
7FF7A0990000
|
unkown
|
page readonly
|
||
1170000
|
unkown
|
page read and write
|
||
22ADEC95000
|
heap
|
page read and write
|
||
B85A000
|
stack
|
page read and write
|
||
9470000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF5D774A000
|
unkown
|
page readonly
|
||
3240000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
3090000
|
unkown
|
page read and write
|
||
7FF7A0A82000
|
unkown
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page execute and read and write
|
||
9B41000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
2598CB4B000
|
heap
|
page read and write
|
||
C61D000
|
unkown
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
8380000
|
unkown
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
C000024000
|
direct allocation
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
7FF849340000
|
trusted library allocation
|
page read and write
|
||
4A9F000
|
trusted library allocation
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
21F85D40000
|
trusted library allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7FF5D7077000
|
unkown
|
page readonly
|
||
9820000
|
unkown
|
page read and write
|
||
C0002CE000
|
direct allocation
|
page read and write
|
||
CDBE3FC000
|
stack
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF8492AB000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
9470000
|
unkown
|
page read and write
|
||
4381000
|
heap
|
page read and write
|
||
A33F000
|
unkown
|
page read and write
|
||
7FF7A0990000
|
unkown
|
page readonly
|
||
1170000
|
unkown
|
page read and write
|
||
9D67000
|
unkown
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21F87C96000
|
trusted library allocation
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
423000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
41C1000
|
heap
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
7FF5D729E000
|
unkown
|
page readonly
|
||
9780000
|
unkown
|
page read and write
|
||
C5F0000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
4AFA000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
7B60000
|
unkown
|
page readonly
|
||
22A36808000
|
trusted library allocation
|
page read and write
|
||
21F85AF0000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
C0002E2000
|
direct allocation
|
page read and write
|
||
26FE000
|
heap
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7FF5D74A6000
|
unkown
|
page readonly
|
||
7FF5D71BF000
|
unkown
|
page readonly
|
||
21F87810000
|
heap
|
page read and write
|
||
1360000
|
unkown
|
page readonly
|
||
21FA0235000
|
heap
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
4AE5000
|
trusted library allocation
|
page read and write
|
||
7FF5D7792000
|
unkown
|
page readonly
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7FF5D7450000
|
unkown
|
page readonly
|
||
7FF5D77A4000
|
unkown
|
page readonly
|
||
281F000
|
stack
|
page read and write
|
||
7609000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
4B00000
|
unkown
|
page read and write
|
||
A9A0000
|
unkown
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
9470000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
22A4D6CF000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
2A9757D000
|
stack
|
page read and write
|
||
7693000
|
unkown
|
page read and write
|
||
259A7143000
|
heap
|
page read and write
|
||
21F85A20000
|
unkown
|
page readonly
|
||
3250000
|
unkown
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
7FF5D76DA000
|
unkown
|
page readonly
|
||
7FF5D71E0000
|
unkown
|
page readonly
|
||
1B961154000
|
heap
|
page read and write
|
||
9470000
|
unkown
|
page read and write
|
||
4AE2000
|
trusted library allocation
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
30A0000
|
unkown
|
page read and write
|
||
7FF848DE2000
|
trusted library allocation
|
page read and write
|
||
7FF5D71E6000
|
unkown
|
page readonly
|
||
87D000
|
heap
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
22A3329E000
|
heap
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
C000068000
|
direct allocation
|
page read and write
|
||
A2B5000
|
unkown
|
page read and write
|
||
4D65000
|
trusted library allocation
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
22A369AC000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
22A33460000
|
trusted library section
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
1C200B50000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
C0001AA000
|
direct allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
423000
|
unkown
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
7FF5D6ABD000
|
unkown
|
page readonly
|
||
1170000
|
unkown
|
page read and write
|
||
41F000
|
unkown
|
page readonly
|
||
4ED4000
|
trusted library allocation
|
page read and write
|
||
C9E9000
|
unkown
|
page read and write
|
||
22AE3DA1000
|
direct allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
4AAA000
|
trusted library allocation
|
page read and write
|
||
1B962CC0000
|
heap
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
21F85E40000
|
heap
|
page read and write
|
||
22AE3E70000
|
direct allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
2598CCE0000
|
heap
|
page read and write
|
||
7FF849072000
|
trusted library allocation
|
page read and write
|
||
2A974FF000
|
stack
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
8F49000
|
stack
|
page read and write
|
||
21F85D00000
|
heap
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
21F87C46000
|
trusted library allocation
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
unkown
|
page readonly
|
||
2448000
|
unkown
|
page readonly
|
||
3220000
|
unkown
|
page read and write
|
||
7FF7D513E000
|
unkown
|
page write copy
|
||
2550000
|
direct allocation
|
page execute and read and write
|
||
9430000
|
unkown
|
page read and write
|
||
30C0000
|
unkown
|
page read and write
|
||
4AC1000
|
trusted library allocation
|
page read and write
|
||
9E2E000
|
stack
|
page read and write
|
||
7FF7D50A2000
|
unkown
|
page read and write
|
||
1B9610D0000
|
heap
|
page read and write
|
||
1160000
|
unkown
|
page read and write
|
||
7FF5D77E9000
|
unkown
|
page readonly
|
||
1230000
|
unkown
|
page read and write
|
||
7FF5D732D000
|
unkown
|
page readonly
|
||
7B00000
|
unkown
|
page readonly
|
||
9430000
|
unkown
|
page read and write
|
||
4AAE000
|
trusted library allocation
|
page read and write
|
||
C0001CC000
|
direct allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
86B000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
2448000
|
unkown
|
page readonly
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
22A332E5000
|
heap
|
page read and write
|
||
21F85B2C000
|
heap
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
68B318E000
|
stack
|
page read and write
|
||
259A7160000
|
heap
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
85D000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
3260000
|
unkown
|
page read and write
|
||
7FF5D75EE000
|
unkown
|
page readonly
|
||
9820000
|
unkown
|
page read and write
|
||
85D000
|
heap
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
7FF7D57A6000
|
unkown
|
page readonly
|
||
7DF4F2471000
|
unkown
|
page execute read
|
||
3080000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
7FF7A0991000
|
unkown
|
page execute read
|
||
C00038B000
|
direct allocation
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
86B000
|
heap
|
page read and write
|
||
22ADE890000
|
heap
|
page read and write
|
||
7FF5D7215000
|
unkown
|
page readonly
|
||
4AB9000
|
trusted library allocation
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
3090000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
3090000
|
unkown
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
22A334C0000
|
trusted library allocation
|
page read and write
|
||
35B5000
|
unkown
|
page read and write
|
||
A1AF000
|
stack
|
page read and write
|
||
C000422000
|
direct allocation
|
page read and write
|
||
2448000
|
unkown
|
page readonly
|
||
7FF5D7740000
|
unkown
|
page readonly
|
||
22A35229000
|
trusted library allocation
|
page read and write
|
||
9A76000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
7FF7D56DD000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
4ABB000
|
trusted library allocation
|
page read and write
|
||
22A451B0000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
1B96112D000
|
heap
|
page read and write
|
||
21F877F0000
|
heap
|
page execute and read and write
|
||
1395000
|
heap
|
page read and write
|
||
BF3E000
|
stack
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
22AE3DF9000
|
direct allocation
|
page read and write
|
||
1250000
|
unkown
|
page read and write
|
||
9470000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
1C200C8B000
|
heap
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
4ADA000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
852000
|
heap
|
page read and write
|
||
866000
|
heap
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
AAA9000
|
unkown
|
page read and write
|
||
7FF5D762F000
|
unkown
|
page readonly
|
||
68B3D8D000
|
stack
|
page read and write
|
||
4ACB000
|
trusted library allocation
|
page read and write
|
||
2448000
|
unkown
|
page readonly
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
7FF5D7272000
|
unkown
|
page readonly
|
||
2598CBB8000
|
heap
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
C00034A000
|
direct allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
22AE4000000
|
direct allocation
|
page read and write
|
||
8CB8000
|
stack
|
page read and write
|
||
B03B000
|
stack
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
23780830000
|
heap
|
page read and write
|
||
7637000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
7FF5D7429000
|
unkown
|
page readonly
|
||
C000074000
|
direct allocation
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
2564000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
831000
|
heap
|
page read and write
|
||
21F9789A000
|
trusted library allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
7FF5D7639000
|
unkown
|
page readonly
|
||
4B19000
|
trusted library allocation
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
91F0000
|
unkown
|
page readonly
|
||
7FF7A0990000
|
unkown
|
page readonly
|
||
4AB4000
|
trusted library allocation
|
page read and write
|
||
2650000
|
heap
|
page read and write
|
||
21FA1533000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
9A92000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
22A33440000
|
heap
|
page read and write
|
||
22A334A0000
|
trusted library allocation
|
page read and write
|
||
21F85BD6000
|
heap
|
page read and write
|
||
4A9F000
|
trusted library allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
C496000
|
unkown
|
page read and write
|
||
7DF4F2491000
|
unkown
|
page execute read
|
||
C170BFE000
|
stack
|
page read and write
|
||
E54D000
|
stack
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
C000800000
|
direct allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page readonly
|
||
9780000
|
unkown
|
page read and write
|
||
B4BF000
|
stack
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
75E0000
|
unkown
|
page read and write
|
||
7FF5D75CB000
|
unkown
|
page readonly
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
21FA16A0000
|
heap
|
page read and write
|
||
3090000
|
unkown
|
page read and write
|
||
7FF5D7262000
|
unkown
|
page readonly
|
||
4AB3000
|
trusted library allocation
|
page read and write
|
||
2A9864B000
|
stack
|
page read and write
|
||
7FF5D7488000
|
unkown
|
page readonly
|
||
874000
|
heap
|
page read and write
|
||
494F000
|
stack
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
4A9F000
|
trusted library allocation
|
page read and write
|
||
7FF5D758D000
|
unkown
|
page readonly
|
||
4AC1000
|
trusted library allocation
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
8ECE000
|
stack
|
page read and write
|
||
A02E000
|
stack
|
page read and write
|
||
7FF5D770A000
|
unkown
|
page readonly
|
||
9820000
|
unkown
|
page read and write
|
||
4B2B000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
7DF4F2481000
|
unkown
|
page execute read
|
||
2610000
|
unclassified section
|
page read and write
|
||
7FF5D779E000
|
unkown
|
page readonly
|
||
4150000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
C47F000
|
unkown
|
page read and write
|
||
22A34DB3000
|
trusted library allocation
|
page read and write
|
||
95FB000
|
stack
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
4AB5000
|
trusted library allocation
|
page read and write
|
||
259A7176000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
22AE3E06000
|
direct allocation
|
page read and write
|
||
C46F000
|
unkown
|
page read and write
|
||
A2D7000
|
unkown
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
4AE7000
|
trusted library allocation
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
84D000
|
heap
|
page read and write
|
||
4100000
|
heap
|
page read and write
|
||
4AC3000
|
trusted library allocation
|
page read and write
|
||
35D1000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
35FA000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
C977000
|
unkown
|
page read and write
|
||
1B961155000
|
heap
|
page read and write
|
||
2598CB4E000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
7FF5D774C000
|
unkown
|
page readonly
|
||
2598CB35000
|
heap
|
page read and write
|
||
7FF5D7257000
|
unkown
|
page readonly
|
||
7C6000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
259A7150000
|
heap
|
page read and write
|
||
DB0000
|
remote allocation
|
page read and write
|
||
9470000
|
unkown
|
page read and write
|
||
8931000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
7FF5D719C000
|
unkown
|
page readonly
|
||
1B96114A000
|
heap
|
page read and write
|
||
C0001F2000
|
direct allocation
|
page read and write
|
||
B0BD000
|
stack
|
page read and write
|
||
259E000
|
stack
|
page read and write
|
||
74D000
|
stack
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
E74D000
|
stack
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
4A91000
|
trusted library allocation
|
page read and write
|
||
C000134000
|
direct allocation
|
page read and write
|
||
2598CB18000
|
heap
|
page read and write
|
||
2620000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
F0C000
|
heap
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
21F85B0B000
|
heap
|
page read and write
|
||
859000
|
heap
|
page read and write
|
||
C7CB000
|
unkown
|
page read and write
|
||
C3CD000
|
stack
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF5D72CE000
|
unkown
|
page readonly
|
||
884000
|
heap
|
page read and write
|
||
7FF848FCB000
|
trusted library allocation
|
page read and write
|
||
259A8250000
|
heap
|
page read and write
|
||
C000480000
|
direct allocation
|
page read and write
|
||
21FA1537000
|
heap
|
page read and write
|
||
C16F7FD000
|
stack
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
C00014C000
|
direct allocation
|
page read and write
|
||
8DD0000
|
unkown
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
C0003FE000
|
direct allocation
|
page read and write
|
||
8B79000
|
unkown
|
page read and write
|
||
C000412000
|
direct allocation
|
page read and write
|
||
8870000
|
unkown
|
page readonly
|
||
7FF5D7385000
|
unkown
|
page readonly
|
||
21FA0101000
|
heap
|
page read and write
|
||
8E30000
|
unkown
|
page read and write
|
||
7FF5D76E8000
|
unkown
|
page readonly
|
||
C0002EC000
|
direct allocation
|
page read and write
|
||
85D000
|
heap
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
85BE000
|
stack
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
A233000
|
unkown
|
page read and write
|
||
1B962CC9000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
22ADE880000
|
heap
|
page read and write
|
||
C0001C4000
|
direct allocation
|
page read and write
|
||
35D3000
|
unkown
|
page read and write
|
||
1B962BE1000
|
heap
|
page read and write
|
||
22A34DC0000
|
heap
|
page execute and read and write
|
||
7FF5D76D7000
|
unkown
|
page readonly
|
||
1E4000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
22A36A8F000
|
trusted library allocation
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
7FF7D5094000
|
unkown
|
page write copy
|
||
4B19000
|
trusted library allocation
|
page read and write
|
||
9470000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
C00019A000
|
direct allocation
|
page read and write
|
||
7FF5D6BE4000
|
unkown
|
page readonly
|
||
68AF7F4000
|
stack
|
page read and write
|
||
22ADE8B0000
|
heap
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
9A80000
|
unkown
|
page read and write
|
||
4B0D000
|
trusted library allocation
|
page read and write
|
||
7FF5D72BD000
|
unkown
|
page readonly
|
||
88E000
|
heap
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
22A34E54000
|
heap
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
25E0000
|
direct allocation
|
page execute and read and write
|
||
7FF7A0A1D000
|
unkown
|
page readonly
|
||
AA10000
|
unkown
|
page read and write
|
||
8FD9000
|
stack
|
page read and write
|
||
23782000000
|
heap
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
30C0000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
C0003C8000
|
direct allocation
|
page read and write
|
||
7E3000
|
heap
|
page read and write
|
||
858000
|
heap
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
2A9793E000
|
stack
|
page read and write
|
||
2598E640000
|
trusted library allocation
|
page read and write
|
||
2448000
|
unkown
|
page readonly
|
||
49FA000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
852000
|
heap
|
page read and write
|
||
1B96113D000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
7C31000
|
unkown
|
page read and write
|
||
7FF7A0A1D000
|
unkown
|
page readonly
|
||
3220000
|
unkown
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
85D000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
4B46000
|
trusted library allocation
|
page read and write
|
||
7C6000
|
heap
|
page read and write
|
||
423000
|
unkown
|
page write copy
|
||
423000
|
unkown
|
page write copy
|
||
22A367D2000
|
trusted library allocation
|
page read and write
|
||
22A33470000
|
trusted library section
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
C97B000
|
unkown
|
page read and write
|
||
4A9B000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
C16F3FF000
|
stack
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
9430000
|
unkown
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
21FA16A4000
|
heap
|
page read and write
|
||
7E58000
|
stack
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
2598CD70000
|
trusted library allocation
|
page read and write
|
||
C00028E000
|
direct allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
2A9783C000
|
stack
|
page read and write
|
||
879000
|
heap
|
page read and write
|
||
3260000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
7CB0000
|
unkown
|
page readonly
|
||
7FF7D509E000
|
unkown
|
page write copy
|
||
7AE0000
|
unkown
|
page read and write
|
||
AAA0000
|
unkown
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
761E000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
9580000
|
unkown
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
4AC5000
|
trusted library allocation
|
page read and write
|
||
3260000
|
unkown
|
page read and write
|
||
2599E787000
|
trusted library allocation
|
page read and write
|
||
4AED000
|
trusted library allocation
|
page read and write
|
||
21F87C30000
|
trusted library allocation
|
page read and write
|
||
7FF5D75AF000
|
unkown
|
page readonly
|
||
3080000
|
unkown
|
page read and write
|
||
C000036000
|
direct allocation
|
page read and write
|
||
7FF5D7230000
|
unkown
|
page readonly
|
||
E7CD000
|
stack
|
page read and write
|
||
7FF5D7482000
|
unkown
|
page readonly
|
||
7FF5D74FA000
|
unkown
|
page readonly
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
4B92000
|
trusted library allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
22A353D2000
|
trusted library allocation
|
page read and write
|
||
2580000
|
heap
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
7C90000
|
unkown
|
page read and write
|
||
30C0000
|
unkown
|
page read and write
|
||
A286000
|
unkown
|
page read and write
|
||
7FF5D7669000
|
unkown
|
page readonly
|
||
1E0000
|
heap
|
page read and write
|
||
7605000
|
unkown
|
page read and write
|
||
21FA14D9000
|
heap
|
page read and write
|
||
7DF4F2460000
|
unkown
|
page readonly
|
||
7FF5D75DF000
|
unkown
|
page readonly
|
||
4A9B000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
C000184000
|
direct allocation
|
page read and write
|
||
21F85A22000
|
unkown
|
page readonly
|
||
8890000
|
unkown
|
page readonly
|
||
1170000
|
unkown
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
7FF7D509B000
|
unkown
|
page write copy
|
||
1230000
|
unkown
|
page read and write
|
||
7FF5D77CD000
|
unkown
|
page readonly
|
||
3250000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
2A97679000
|
stack
|
page read and write
|
||
E00000
|
unkown
|
page readonly
|
||
1230000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
C621000
|
unkown
|
page read and write
|
||
25AE000
|
stack
|
page read and write
|
||
21F85D65000
|
heap
|
page read and write
|
||
7FF5D7438000
|
unkown
|
page readonly
|
||
AA97000
|
unkown
|
page read and write
|
||
8A46000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
7618000
|
unkown
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
106F6000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
C035000
|
stack
|
page read and write
|
||
22ADEC37000
|
direct allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
2A97273000
|
stack
|
page read and write
|
||
893D000
|
unkown
|
page read and write
|
||
33F0000
|
unkown
|
page read and write
|
||
4AB7000
|
trusted library allocation
|
page read and write
|
||
4A91000
|
trusted library allocation
|
page read and write
|
||
21FA00D0000
|
heap
|
page read and write
|
||
22A3698B000
|
trusted library allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
68B03FE000
|
stack
|
page read and write
|
||
4A95000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
C908000
|
unkown
|
page read and write
|
||
21F85AD0000
|
heap
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
1067B000
|
unkown
|
page read and write
|
||
7FF5D720F000
|
unkown
|
page readonly
|
||
21FA151A000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF5D77F7000
|
unkown
|
page readonly
|
||
4ADE000
|
trusted library allocation
|
page read and write
|
||
7FF5D71EA000
|
unkown
|
page readonly
|
||
9430000
|
unkown
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
4AD4000
|
trusted library allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
7FF5D72FB000
|
unkown
|
page readonly
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF5D71D7000
|
unkown
|
page readonly
|
||
107B0000
|
unkown
|
page read and write
|
||
7FF848FE9000
|
trusted library allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
22ADE8E8000
|
direct allocation
|
page read and write
|
||
C5F4000
|
unkown
|
page read and write
|
||
21F85D60000
|
heap
|
page read and write
|
||
84C000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
2FF9000
|
stack
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
C0000EC000
|
direct allocation
|
page read and write
|
||
C000196000
|
direct allocation
|
page read and write
|
||
A40E000
|
unkown
|
page read and write
|
||
4160000
|
heap
|
page read and write
|
||
7FF5D7462000
|
unkown
|
page readonly
|
||
2598CD90000
|
trusted library allocation
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
84A000
|
heap
|
page read and write
|
||
7FF5D7523000
|
unkown
|
page readonly
|
||
40BF000
|
stack
|
page read and write
|
||
7FA000
|
heap
|
page read and write
|
||
22ADE920000
|
direct allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
697000
|
heap
|
page read and write
|
||
8963000
|
unkown
|
page read and write
|
||
7FF5D75B3000
|
unkown
|
page readonly
|
||
2530000
|
heap
|
page read and write
|
||
760F000
|
unkown
|
page read and write
|
||
1B96112F000
|
heap
|
page read and write
|
||
4ACC000
|
trusted library allocation
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
84C000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
7FF5D75C1000
|
unkown
|
page readonly
|
||
9700000
|
unkown
|
page read and write
|
||
22A36A89000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7FF5D765F000
|
unkown
|
page readonly
|
||
3240000
|
unkown
|
page read and write
|
||
7FF5D7336000
|
unkown
|
page readonly
|
||
4AB5000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
22AE3DFB000
|
direct allocation
|
page read and write
|
||
C0002B9000
|
direct allocation
|
page read and write
|
||
22ADE8E4000
|
direct allocation
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
C24E000
|
stack
|
page read and write
|
||
7FF5D7808000
|
unkown
|
page readonly
|
||
7AB0000
|
unkown
|
page read and write
|
||
22A332BE000
|
heap
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
8DD0000
|
unkown
|
page read and write
|
||
C00037E000
|
direct allocation
|
page read and write
|
||
7FF5D720A000
|
unkown
|
page readonly
|
||
9470000
|
unkown
|
page read and write
|
||
BDC0000
|
unkown
|
page read and write
|
||
A251000
|
unkown
|
page read and write
|
||
35CF000
|
unkown
|
page read and write
|
||
22ADEC6C000
|
direct allocation
|
page read and write
|
||
768C000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
21FA00C0000
|
heap
|
page read and write
|
||
4A9E000
|
trusted library allocation
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
22A334D4000
|
heap
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
22A36836000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
87C000
|
heap
|
page read and write
|
||
3140000
|
unkown
|
page read and write
|
||
4BD2000
|
trusted library allocation
|
page read and write
|
||
8380000
|
unkown
|
page read and write
|
||
9A8C000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
22A36A98000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF7D577A000
|
unkown
|
page write copy
|
||
9AA8000
|
unkown
|
page read and write
|
||
84D000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
2A9747D000
|
stack
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
41B0000
|
heap
|
page read and write
|
||
7C80000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
4A12000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
CDBEFFF000
|
stack
|
page read and write
|
||
7FF5D75F2000
|
unkown
|
page readonly
|
||
4B1E000
|
trusted library allocation
|
page read and write
|
||
8E30000
|
unkown
|
page read and write
|
||
362A000
|
unkown
|
page read and write
|
||
7FF5D710B000
|
unkown
|
page readonly
|
||
2A9854F000
|
stack
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
C0001C8000
|
direct allocation
|
page read and write
|
||
7FF5D7700000
|
unkown
|
page readonly
|
||
4AB7000
|
trusted library allocation
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
2598E770000
|
heap
|
page execute and read and write
|
||
3250000
|
unkown
|
page read and write
|
||
DB0000
|
remote allocation
|
page read and write
|
||
7FF5D7795000
|
unkown
|
page readonly
|
||
C0003C2000
|
direct allocation
|
page read and write
|
||
22A4D467000
|
heap
|
page execute and read and write
|
||
6DE000
|
stack
|
page read and write
|
||
879000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
96FE000
|
stack
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
22A36DB2000
|
trusted library allocation
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
7B20000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
7FF849310000
|
trusted library allocation
|
page read and write
|
||
7FF5D7244000
|
unkown
|
page readonly
|
||
7435000
|
stack
|
page read and write
|
||
22A36B30000
|
trusted library allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
2A9848E000
|
stack
|
page read and write
|
||
C1CC000
|
stack
|
page read and write
|
||
262E000
|
heap
|
page read and write
|
||
779E000
|
unkown
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7FF5D71AF000
|
unkown
|
page readonly
|
||
1B962CC8000
|
heap
|
page read and write
|
||
7FF5D73F5000
|
unkown
|
page readonly
|
||
9430000
|
unkown
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
2378073B000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
22ADE8E0000
|
direct allocation
|
page read and write
|
||
760D000
|
unkown
|
page read and write
|
||
2653000
|
heap
|
page read and write
|
||
7FF7D57A6000
|
unkown
|
page readonly
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
C806000
|
unkown
|
page read and write
|
||
4AE4000
|
trusted library allocation
|
page read and write
|
||
106FB000
|
unkown
|
page read and write
|
||
7FF5D7558000
|
unkown
|
page readonly
|
||
3250000
|
unkown
|
page read and write
|
||
9AC3000
|
unkown
|
page read and write
|
||
C483000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
C0001A8000
|
direct allocation
|
page read and write
|
||
21F87A87000
|
trusted library allocation
|
page read and write
|
||
35D5000
|
unkown
|
page read and write
|
||
7FF848DFB000
|
trusted library allocation
|
page read and write
|
||
879000
|
heap
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
C5FD000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
7FF7A0991000
|
unkown
|
page execute read
|
||
1C200C60000
|
heap
|
page read and write
|
||
7FF7A0A1D000
|
unkown
|
page readonly
|
||
7FF7D511E000
|
unkown
|
page write copy
|
||
3080000
|
unkown
|
page read and write
|
||
22AE4010000
|
direct allocation
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
21FA14AF000
|
heap
|
page read and write
|
||
7FF5D75F6000
|
unkown
|
page readonly
|
||
1230000
|
unkown
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
1C2026E0000
|
heap
|
page read and write
|
||
22A369B1000
|
trusted library allocation
|
page read and write
|
||
7DBC000
|
stack
|
page read and write
|
||
22ADE938000
|
heap
|
page read and write
|
||
7FF5D777A000
|
unkown
|
page readonly
|
||
22ADEC80000
|
direct allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
C9E6000
|
unkown
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D77EB000
|
unkown
|
page readonly
|
||
4B15000
|
trusted library allocation
|
page read and write
|
||
7FF5D745B000
|
unkown
|
page readonly
|
||
CDBE7FF000
|
stack
|
page read and write
|
||
25CE000
|
stack
|
page read and write
|
||
C00055E000
|
direct allocation
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
21F85D70000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
21F85CE0000
|
heap
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
49A8000
|
unkown
|
page read and write
|
||
BFB8000
|
stack
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
C000130000
|
direct allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7FF7D4C01000
|
unkown
|
page execute read
|
||
9780000
|
unkown
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
1B962AD0000
|
heap
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
21FA17FD000
|
heap
|
page read and write
|
||
4BF2000
|
trusted library allocation
|
page read and write
|
||
511000
|
remote allocation
|
page execute and read and write
|
||
1170000
|
unkown
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
5330000
|
unkown
|
page write copy
|
||
1170000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
21F87BB9000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
BB10000
|
heap
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
7E3000
|
heap
|
page read and write
|
||
C62D000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
10689000
|
unkown
|
page read and write
|
||
8DCB000
|
stack
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
2598CE40000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page execute and read and write
|
||
3250000
|
unkown
|
page read and write
|
||
8E30000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
8DD0000
|
unkown
|
page read and write
|
||
9EAC000
|
stack
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
7FF5D7267000
|
unkown
|
page readonly
|
||
4AEE000
|
trusted library allocation
|
page read and write
|
||
7FF5D77C7000
|
unkown
|
page readonly
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
8880000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
1B9610D9000
|
heap
|
page read and write
|
||
3260000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
4B9B000
|
trusted library allocation
|
page read and write
|
||
A2A2000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
4190000
|
heap
|
page read and write
|
||
7FF5D74C3000
|
unkown
|
page readonly
|
||
98F000
|
stack
|
page read and write
|
||
1B961080000
|
heap
|
page read and write
|
||
C4BD000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
22A33480000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
7FF5D7648000
|
unkown
|
page readonly
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
21F85D80000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
A3AC000
|
unkown
|
page read and write
|
||
7FF5D717C000
|
unkown
|
page readonly
|
||
7686000
|
unkown
|
page read and write
|
||
7FF5D75BF000
|
unkown
|
page readonly
|
||
86B000
|
heap
|
page read and write
|
||
C642000
|
unkown
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
4B0E000
|
trusted library allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF7D56FB000
|
unkown
|
page read and write
|
||
A3B9000
|
unkown
|
page read and write
|
||
4ABC000
|
trusted library allocation
|
page read and write
|
||
22A33210000
|
heap
|
page read and write
|
||
7FF5D71A6000
|
unkown
|
page readonly
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
22AE3DCD000
|
direct allocation
|
page read and write
|
||
3260000
|
unkown
|
page read and write
|
||
7FF8492E0000
|
trusted library allocation
|
page read and write
|
||
21F97839000
|
trusted library allocation
|
page read and write
|
||
22A36834000
|
trusted library allocation
|
page read and write
|
||
7FF5D7280000
|
unkown
|
page readonly
|
||
3280000
|
unkown
|
page read and write
|
||
9FAF000
|
stack
|
page read and write
|
||
97FF000
|
stack
|
page read and write
|
||
C609000
|
unkown
|
page read and write
|
||
21FA2F80000
|
heap
|
page read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
C0001D9000
|
direct allocation
|
page read and write
|
||
30C0000
|
unkown
|
page read and write
|
||
A3AA000
|
unkown
|
page read and write
|
||
1350000
|
unkown
|
page readonly
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
9ABD000
|
unkown
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
3260000
|
unkown
|
page read and write
|
||
7FF5D7507000
|
unkown
|
page readonly
|
||
1170000
|
unkown
|
page read and write
|
||
22A4D2C7000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
22AE3E21000
|
direct allocation
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
2A97737000
|
stack
|
page read and write
|
||
4C42000
|
trusted library allocation
|
page read and write
|
||
22A369AF000
|
trusted library allocation
|
page read and write
|
||
7FF5D7694000
|
unkown
|
page readonly
|
||
9AAA000
|
unkown
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
7FF5D760B000
|
unkown
|
page readonly
|
||
84F000
|
heap
|
page read and write
|
||
22A4D2C5000
|
heap
|
page read and write
|
||
1B96112D000
|
heap
|
page read and write
|
||
3260000
|
unkown
|
page read and write
|
||
7FF5D75B8000
|
unkown
|
page readonly
|
||
68B398F000
|
stack
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
21F85D83000
|
trusted library allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
22A33268000
|
heap
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
3100000
|
unkown
|
page read and write
|
||
22A451A1000
|
trusted library allocation
|
page read and write
|
||
21F878AE000
|
trusted library allocation
|
page read and write
|
||
2598CE45000
|
heap
|
page read and write
|
||
3270000
|
unkown
|
page read and write
|
||
2679000
|
heap
|
page read and write
|
||
C663000
|
unkown
|
page read and write
|
||
832000
|
heap
|
page read and write
|
||
7FF7A0A82000
|
unkown
|
page write copy
|
||
9820000
|
unkown
|
page read and write
|
||
7FF5D66E3000
|
unkown
|
page readonly
|
||
3220000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
4BBA000
|
trusted library allocation
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
22A36985000
|
trusted library allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
1B961148000
|
heap
|
page read and write
|
||
49BB000
|
unkown
|
page read and write
|
||
68ADBF4000
|
stack
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
C73E000
|
unkown
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
22A4D393000
|
heap
|
page read and write
|
||
35C3000
|
unkown
|
page read and write
|
||
C000154000
|
direct allocation
|
page read and write
|
||
B4D0000
|
unkown
|
page readonly
|
||
1230000
|
unkown
|
page read and write
|
||
1B962CC8000
|
heap
|
page read and write
|
||
9AB4000
|
unkown
|
page read and write
|
||
C000389000
|
direct allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
21F85B2A000
|
heap
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
26AF000
|
stack
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
22ADEC90000
|
heap
|
page read and write
|
||
7FF5D775C000
|
unkown
|
page readonly
|
||
21F87C69000
|
trusted library allocation
|
page read and write
|
||
21F85E10000
|
heap
|
page execute and read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1B961115000
|
heap
|
page read and write
|
||
4161000
|
heap
|
page read and write
|
||
7440000
|
unkown
|
page read and write
|
||
848000
|
heap
|
page read and write
|
||
7FF5D748C000
|
unkown
|
page readonly
|
||
7FF5D7589000
|
unkown
|
page readonly
|
||
7FF7D513C000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7FF5D77DD000
|
unkown
|
page readonly
|
||
9580000
|
stack
|
page read and write
|
||
7FF5D7820000
|
unkown
|
page readonly
|
||
9430000
|
unkown
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
843F000
|
stack
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
7FF5D766E000
|
unkown
|
page readonly
|
||
C0000D8000
|
direct allocation
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
4320000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
4ADC000
|
trusted library allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
4AAD000
|
trusted library allocation
|
page read and write
|
||
4AC6000
|
trusted library allocation
|
page read and write
|
||
7810000
|
unkown
|
page read and write
|
||
1B96112B000
|
heap
|
page read and write
|
||
2598E600000
|
heap
|
page read and write
|
||
7FF848DE4000
|
trusted library allocation
|
page read and write
|
||
78D000
|
stack
|
page read and write
|
||
7FF7D577A000
|
unkown
|
page write copy
|
||
7FF7A0991000
|
unkown
|
page execute read
|
||
99B0000
|
unkown
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
BB9C000
|
stack
|
page read and write
|
||
21F87B56000
|
trusted library allocation
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
3260000
|
unkown
|
page read and write
|
||
7FF5D7376000
|
unkown
|
page readonly
|
||
9820000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
22A36806000
|
trusted library allocation
|
page read and write
|
||
86B000
|
heap
|
page read and write
|
||
2A975FE000
|
stack
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
68AFBFE000
|
stack
|
page read and write
|
||
C000076000
|
direct allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
21FA1942000
|
trusted library allocation
|
page read and write
|
||
85C000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7B10000
|
unkown
|
page read and write
|
||
7FF7A0990000
|
unkown
|
page readonly
|
||
3250000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
7989000
|
stack
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
22AE3FB1000
|
direct allocation
|
page read and write
|
||
21F9F850000
|
trusted library allocation
|
page read and write
|
||
284F000
|
stack
|
page read and write
|
||
41C0000
|
heap
|
page read and write
|
||
A264000
|
unkown
|
page read and write
|
||
22A36A92000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
270D000
|
heap
|
page execute and read and write
|
||
3230000
|
unkown
|
page read and write
|
||
AA01000
|
unkown
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
1C200C30000
|
heap
|
page read and write
|
||
A416000
|
unkown
|
page read and write
|
||
C0001A4000
|
direct allocation
|
page read and write
|
||
A391000
|
unkown
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
7FF5D77FD000
|
unkown
|
page readonly
|
||
25F0000
|
direct allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
22ADEC3A000
|
direct allocation
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page execute and read and write
|
||
3220000
|
unkown
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
760B000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
C00041E000
|
direct allocation
|
page read and write
|
||
423000
|
unkown
|
page read and write
|
||
21FA00F3000
|
heap
|
page read and write
|
||
22A4D315000
|
heap
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
C0003DE000
|
direct allocation
|
page read and write
|
||
7691000
|
unkown
|
page read and write
|
||
4B44000
|
trusted library allocation
|
page read and write
|
||
2A978BE000
|
stack
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
22A332A6000
|
heap
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
9A84000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
7FF8492F0000
|
trusted library allocation
|
page execute and read and write
|
||
2A98443000
|
stack
|
page read and write
|
||
7FF5D7442000
|
unkown
|
page readonly
|
||
9820000
|
unkown
|
page read and write
|
||
35B3000
|
unkown
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
4B91000
|
heap
|
page read and write
|
||
1C200C80000
|
heap
|
page read and write
|
||
7FF5D75E9000
|
unkown
|
page readonly
|
||
C78A000
|
unkown
|
page read and write
|
||
F6CA000
|
heap
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
86B000
|
heap
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
22A3682C000
|
trusted library allocation
|
page read and write
|
||
2598E82A000
|
trusted library allocation
|
page read and write
|
||
106B3000
|
unkown
|
page read and write
|
||
F6C2000
|
heap
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
4D2F000
|
stack
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
C8C4000
|
unkown
|
page read and write
|
||
4C72000
|
trusted library allocation
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
21F85E80000
|
trusted library allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
3260000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
7FF5D7202000
|
unkown
|
page readonly
|
||
9700000
|
unkown
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
2A979BE000
|
stack
|
page read and write
|
||
7FF5D7643000
|
unkown
|
page readonly
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
C450000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
22A34DF0000
|
heap
|
page execute and read and write
|
||
1170000
|
unkown
|
page read and write
|
||
4AA2000
|
trusted library allocation
|
page read and write
|
||
4B3A000
|
trusted library allocation
|
page read and write
|
||
7FF5D76D5000
|
unkown
|
page readonly
|
||
3230000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
49A000
|
stack
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
21FA307C000
|
heap
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
4B0C000
|
trusted library allocation
|
page read and write
|
||
B0E0000
|
unkown
|
page readonly
|
||
9780000
|
unkown
|
page read and write
|
||
22A36830000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
7FF5D72C8000
|
unkown
|
page readonly
|
||
C7BE000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
4ACF000
|
trusted library allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
8A70000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
C800000
|
unkown
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page execute and read and write
|
||
21FA14E8000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
4AD3000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
C1703FE000
|
stack
|
page read and write
|
||
C16FBFD000
|
stack
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
7FF849330000
|
trusted library allocation
|
page read and write
|
||
CDBEDFF000
|
stack
|
page read and write
|
||
B559000
|
stack
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
41C0000
|
heap
|
page read and write
|
||
2598CE30000
|
trusted library section
|
page readonly
|
||
3240000
|
unkown
|
page read and write
|
||
22A4D1AF000
|
heap
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
22A3693F000
|
trusted library allocation
|
page read and write
|
||
2657000
|
heap
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
7FF8492C0000
|
trusted library allocation
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
7FF5D71C8000
|
unkown
|
page readonly
|
||
95C0000
|
stack
|
page read and write
|
||
2530000
|
heap
|
page read and write
|
||
C000424000
|
direct allocation
|
page read and write
|
||
AA0B000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
A23A000
|
unkown
|
page read and write
|
||
E94E000
|
stack
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
C0000E2000
|
direct allocation
|
page read and write
|
||
22A36999000
|
trusted library allocation
|
page read and write
|
||
A273000
|
unkown
|
page read and write
|
||
2598CB10000
|
heap
|
page read and write
|
||
77A2000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
7FF5D768B000
|
unkown
|
page readonly
|
||
4B11000
|
trusted library allocation
|
page read and write
|
||
4AE5000
|
trusted library allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
2598CBB0000
|
heap
|
page read and write
|
||
22A35DD2000
|
trusted library allocation
|
page read and write
|
||
7FF848F91000
|
trusted library allocation
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
4B02000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
22A36E7C000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
unkown
|
page read and write
|
||
21F85CC0000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
259A9AD4000
|
heap
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
2600000
|
unclassified section
|
page read and write
|
||
22A3698D000
|
trusted library allocation
|
page read and write
|
||
41F000
|
unkown
|
page readonly
|
||
3626000
|
unkown
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
88D000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page execute and read and write
|
||
21F87C60000
|
trusted library allocation
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
A237000
|
unkown
|
page read and write
|
||
C0000CA000
|
direct allocation
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
7FF5D7546000
|
unkown
|
page readonly
|
||
9820000
|
unkown
|
page read and write
|
||
22A4520C000
|
trusted library allocation
|
page read and write
|
||
21F87C64000
|
trusted library allocation
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
1B962BB2000
|
heap
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
4980000
|
unkown
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
9430000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
C9C9000
|
unkown
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
53E1000
|
unkown
|
page read and write
|
||
7FF5D7745000
|
unkown
|
page readonly
|
||
4C0000
|
remote allocation
|
page execute and read and write
|
||
7FF7A0990000
|
unkown
|
page readonly
|
||
30C0000
|
unkown
|
page read and write
|
||
1B961145000
|
heap
|
page read and write
|
||
4C3E000
|
trusted library allocation
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
7FF5D7075000
|
unkown
|
page readonly
|
||
4AE6000
|
trusted library allocation
|
page read and write
|
||
9470000
|
unkown
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
9A98000
|
unkown
|
page read and write
|
||
7FF7D4C00000
|
unkown
|
page readonly
|
||
88E000
|
heap
|
page read and write
|
||
21FA00B3000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
C4C6000
|
unkown
|
page read and write
|
||
40A0000
|
unclassified section
|
page read and write
|
||
7FF5D72E9000
|
unkown
|
page readonly
|
||
88E000
|
heap
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
C00004B000
|
direct allocation
|
page read and write
|
||
7FF8491D4000
|
trusted library allocation
|
page read and write
|
||
22A334B0000
|
heap
|
page readonly
|
||
C000031000
|
direct allocation
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
3090000
|
unkown
|
page read and write
|
||
7FF7D5769000
|
unkown
|
page read and write
|
||
2598CDB5000
|
heap
|
page read and write
|
||
2598CBFB000
|
heap
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
7FF8492D0000
|
trusted library allocation
|
page read and write
|
||
C0000DC000
|
direct allocation
|
page read and write
|
||
7FF7D50A0000
|
unkown
|
page read and write
|
||
42D0000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
7FF5D7705000
|
unkown
|
page readonly
|
||
C000022000
|
direct allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF5D71C4000
|
unkown
|
page readonly
|
||
9430000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
997C000
|
stack
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
9A9E000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
4B2B000
|
trusted library allocation
|
page read and write
|
||
2599E781000
|
trusted library allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
259A70F0000
|
heap
|
page execute and read and write
|
||
86D0000
|
unkown
|
page readonly
|
||
1B9610DC000
|
heap
|
page read and write
|
||
21F85DC0000
|
heap
|
page execute and read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
1B962CC5000
|
heap
|
page read and write
|
||
4ACB000
|
trusted library allocation
|
page read and write
|
||
23780730000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
C4DC000
|
unkown
|
page read and write
|
||
26FA000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
84D000
|
heap
|
page read and write
|
||
1B961133000
|
heap
|
page read and write
|
||
C00019E000
|
direct allocation
|
page read and write
|
||
30FB000
|
stack
|
page read and write
|
||
3630000
|
unkown
|
page readonly
|
||
3250000
|
unkown
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
7FF5D72BF000
|
unkown
|
page readonly
|
||
7FF5D7752000
|
unkown
|
page readonly
|
||
3220000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
1731000
|
unkown
|
page readonly
|
||
10672000
|
unkown
|
page read and write
|
||
3260000
|
unkown
|
page read and write
|
||
77DB000
|
unkown
|
page read and write
|
||
21F85EB0000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
4B3A000
|
trusted library allocation
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
7654000
|
unkown
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
858000
|
heap
|
page read and write
|
||
8DD0000
|
unkown
|
page read and write
|
||
88D000
|
heap
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
B8DB000
|
stack
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
21F97821000
|
trusted library allocation
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
1B96113B000
|
heap
|
page read and write
|
||
9430000
|
unkown
|
page read and write
|
||
3260000
|
unkown
|
page read and write
|
||
9ADB000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
2A977B8000
|
stack
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
21F85E20000
|
trusted library section
|
page readonly
|
||
2A9850D000
|
stack
|
page read and write
|
||
4ACD000
|
trusted library allocation
|
page read and write
|
||
7AF1000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FF5D747F000
|
unkown
|
page readonly
|
||
4A0E000
|
unkown
|
page read and write
|
||
C000070000
|
direct allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
BB0C000
|
stack
|
page read and write
|
||
21FA3011000
|
heap
|
page read and write
|
||
4AC0000
|
unkown
|
page read and write
|
||
22A334D0000
|
heap
|
page read and write
|
||
68AD4BF000
|
stack
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
44CD000
|
stack
|
page read and write
|
||
4A44000
|
unkown
|
page read and write
|
||
2598E781000
|
trusted library allocation
|
page read and write
|
||
C61B000
|
unkown
|
page read and write
|
||
7FF5D77E0000
|
unkown
|
page readonly
|
||
3250000
|
unkown
|
page read and write
|
||
7D3E000
|
stack
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
22A33260000
|
heap
|
page read and write
|
||
4B02000
|
trusted library allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
3160000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
C625000
|
unkown
|
page read and write
|
||
7FF5D77B6000
|
unkown
|
page readonly
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
977E000
|
stack
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
4A97000
|
trusted library allocation
|
page read and write
|
||
7611000
|
unkown
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
21FA17F0000
|
heap
|
page read and write
|
||
22AE3E79000
|
direct allocation
|
page read and write
|
||
22A4D660000
|
heap
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
7FF7A0A1D000
|
unkown
|
page readonly
|
||
7A2000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
C0002DA000
|
direct allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
769A000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
4ADF000
|
trusted library allocation
|
page read and write
|
||
7FF5D7073000
|
unkown
|
page readonly
|
||
7FF5D7309000
|
unkown
|
page readonly
|
||
1340000
|
unkown
|
page read and write
|
||
7FF5D7455000
|
unkown
|
page readonly
|
||
40B000
|
unkown
|
page execute read
|
||
4B45000
|
trusted library allocation
|
page read and write
|
||
29EB9FE000
|
stack
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
7FF5D771A000
|
unkown
|
page readonly
|
||
877000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
4B02000
|
trusted library allocation
|
page read and write
|
||
9EB0000
|
unkown
|
page readonly
|
||
3230000
|
unkown
|
page read and write
|
||
7FF7D5138000
|
unkown
|
page write copy
|
||
831000
|
heap
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
3220000
|
unkown
|
page read and write
|
||
C0002FC000
|
direct allocation
|
page read and write
|
||
4A9F000
|
trusted library allocation
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
A3B6000
|
unkown
|
page read and write
|
||
9A94000
|
unkown
|
page read and write
|
||
4AED000
|
trusted library allocation
|
page read and write
|
||
7FF848FAE000
|
trusted library allocation
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
CDBEBFE000
|
stack
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
75FD000
|
unkown
|
page read and write
|
||
C00003B000
|
direct allocation
|
page read and write
|
||
35DC000
|
unkown
|
page read and write
|
||
866000
|
heap
|
page read and write
|
||
9AF9000
|
unkown
|
page read and write
|
||
7FF5D77C2000
|
unkown
|
page readonly
|
||
9430000
|
unkown
|
page read and write
|
||
2554000
|
heap
|
page read and write
|
||
9AB2000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
7FF5D7485000
|
unkown
|
page readonly
|
||
7FF5CE343000
|
unkown
|
page readonly
|
||
33C0000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
21FA16B9000
|
heap
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
C000966000
|
direct allocation
|
page read and write
|
||
EB5000
|
stack
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
8DD0000
|
unkown
|
page read and write
|
||
7FF5D783B000
|
unkown
|
page readonly
|
||
4A95000
|
trusted library allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
3520000
|
unkown
|
page readonly
|
||
9780000
|
unkown
|
page read and write
|
||
2676000
|
heap
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
22A351A1000
|
trusted library allocation
|
page read and write
|
||
21FA1240000
|
heap
|
page read and write
|
||
7FF5CE33D000
|
unkown
|
page readonly
|
||
2598CD20000
|
heap
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
C617000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
7FF7D5120000
|
unkown
|
page write copy
|
||
23780650000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
C000038000
|
direct allocation
|
page read and write
|
There are 2417 hidden memdumps, click here to show them.