Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\2D42.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8EC7.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\EF14.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedLumma\g2m.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedLumma\lm.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedVenom\g2m.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedVenom\runvm.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedVenom\vm.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rentry-script.ps1
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyStartupScript.vbs
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\adjijwj
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\adjijwj:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_lm.exe_ed6b1a814e4ec1e6e89791b3995c66bc9bb83_5fe582ea_8fc838e2-163f-4116-9bba-412c9028ec49\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_vm.exe_12b9a62f7c411e90f74ee59af3dcf249dad3f7e8_19c5d0bb_9c16da23-e6dd-4840-9566-709d498b9789\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER250C.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sat Jul 27 05:44:51 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER26A3.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER26D3.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3FC8.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Jul 27 05:44:58 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER40B3.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER40D3.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\2D42.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vm.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\NotifyIcon\Microsoft.Explorer.Notification.{137FF6BE-F11F-34B5-03D0-7AC7965D6722}.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedLumma\data.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedLumma\run.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedVenom\data.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ht3mp5vg.n4w.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nsyrnlld.nv3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nw4qc1el.vi5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_syfdm4hx.npq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tvmp1poy.ugs.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v5c42fyb.j3w.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lumma.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\venom.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{0580D43B-F688-43D3-96A9-BC3E3DB7707D}.png
|
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{508BF163-DE27-4996-B66D-947C52BD324B}.png
|
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{8A51086A-8CE2-4D7B-9262-7AED61F7272B}.png
|
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{A02B2518-0C82-48B8-9014-35CF372AF3DC}.png
|
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{AADB895B-BE9E-45D9-AC69-B81D7027CD73}.png
|
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{BCC0B1E6-22C5-4252-9A19-34A345219150}.png
|
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{E1132966-F788-475E-BA3B-8A61AD4B6C1A}.png
|
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Roaming\MyData\DataLogs.conf
|
ASCII text
|
modified
|
||
\Device\Null
|
ASCII text
|
dropped
|
There are 35 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exe
|
"C:\Users\user\Desktop\e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Users\user\AppData\Roaming\adjijwj
|
C:\Users\user\AppData\Roaming\adjijwj
|
||
C:\Users\user\AppData\Local\Temp\8EC7.exe
|
C:\Users\user\AppData\Local\Temp\8EC7.exe
|
||
C:\Users\user\AppData\Local\Temp\EF14.exe
|
C:\Users\user\AppData\Local\Temp\EF14.exe
|
||
C:\Users\user\AppData\Local\Temp\2D42.exe
|
C:\Users\user\AppData\Local\Temp\2D42.exe
|
||
C:\Users\user\AppData\Local\Temp\2D42.exe
|
"C:\Users\user\AppData\Local\Temp\2D42.exe" -HOSTRUNAS
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\Users\user\AppData\Local\Temp\rentry-script.ps1"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
||
C:\Users\user\AppData\Local\Temp\ExtractedVenom\vm.exe
|
"vm.exe"
|
||
C:\Users\user\AppData\Local\Temp\ExtractedLumma\lm.exe
|
"lm.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyStartupScript.vbs"
|
||
C:\Users\user\AppData\Local\Temp\ExtractedVenom\vm.exe
|
"vm.exe"
|
||
C:\Users\user\AppData\Local\Temp\8EC7.exe
|
"C:\Users\user\AppData\Local\Temp\8EC7.exe"
|
||
C:\Users\user\AppData\Local\Temp\8EC7.exe
|
"C:\Users\user\AppData\Local\Temp\8EC7.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\ExtractedVenom\runvm.bat
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\ExtractedLumma\run.bat
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ExtractedVenom\runvm.bat" "
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 1092
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5724 -s 1680
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 15 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://liernessfornicsa.shop/)
|
unknown
|
||
http://100xmargin.com/tmp/index.php
|
|||
http://olinsw.ws/tmp/index.php
|
|||
https://callosallsaospz.shop/apiple-sto:s
|
unknown
|
||
https://callosallsaospz.shop/ly3$
|
unknown
|
||
http://mzxn.ru/tmp/index.php
|
|||
https://liernessfornicsa.shop/E
|
unknown
|
||
callosallsaospz.shop
|
|||
https://liernessfornicsa.shop:443/apiCLSID
|
unknown
|
||
liernessfornicsa.shop
|
|||
https://107.173.160.139/
|
107.173.160.139
|
||
https://liernessfornicsa.shop/api_
|
unknown
|
||
https://liernessfornicsa.shop/t
|
unknown
|
||
shepherdlyopzc.shop
|
|||
upknittsoappz.shop
|
|||
https://mussangroup.com/wp-content/images/pic1.jpg
|
185.149.100.242
|
||
https://liernessfornicsa.shop/N
|
unknown
|
||
https://liernessfornicsa.shop/T
|
unknown
|
||
https://liernessfornicsa.shop/V
|
unknown
|
||
unseaffarignsk.shop
|
|||
https://liernessfornicsa.shop/a
|
unknown
|
||
https://liernessfornicsa.shop/f
|
unknown
|
||
http://wgdnb4rc.xyz/tmp/index.php
|
|||
https://aka.ms/odirmr
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
|
unknown
|
||
https://api.msn.com:443/v1/news/Feed/Windows?
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
https://excel.office.com
|
unknown
|
||
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
|
unknown
|
||
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
|
unknown
|
||
https://store4.gofile.io/download/direct/0656c5cf-51b4-4fa4-ae48-8ee5ed3d142e/lm.zip
|
31.14.70.245
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://callosallsaospz.shop/api5
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
https://callosallsaospz.shop/api-
|
unknown
|
||
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
|
unknown
|
||
https://callosallsaospz.shop/api1
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://rentry.co
|
unknown
|
||
http://www.oberhumer.com
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
|
unknown
|
||
https://wns.windows.com/L
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
https://word.office.com
|
unknown
|
||
https://callosallsaospz.shop/d3
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://store4.gofile.io
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
|
unknown
|
||
http://schemas.micr
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
https://callosallsaospz.shop:443/api
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
|
unknown
|
||
https://www.rd.com/list/polite-habits-campers-dislike/
|
unknown
|
||
https://android.notify.windows.com/iOS
|
unknown
|
||
https://store4.gofile.io/download/direct/6b24ec97-2a8d-468d-a24d-c8081cda1dab/vm.zip
|
31.14.70.245
|
||
https://support.microsof
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
|
unknown
|
||
https://outlook.com_
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
|
unknown
|
||
https://callosallsaospz.shop/
|
unknown
|
||
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
https://callosallsaospz.shop/api
|
188.114.97.3
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://schemas.mi
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
https://callosallsaospz.shop/apidows
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
funrecipebooks.com
|
162.0.235.84
|
||
rentry.co
|
104.26.2.16
|
||
mzxn.ru
|
186.145.236.93
|
||
liernessfornicsa.shop
|
172.67.213.85
|
||
mussangroup.com
|
185.149.100.242
|
||
callosallsaospz.shop
|
188.114.97.3
|
||
store4.gofile.io
|
31.14.70.245
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
77.221.157.163
|
unknown
|
Russian Federation
|
||
107.173.160.139
|
unknown
|
United States
|
||
107.173.160.137
|
unknown
|
United States
|
||
172.67.213.85
|
liernessfornicsa.shop
|
United States
|
||
162.0.235.84
|
funrecipebooks.com
|
Canada
|
||
109.172.114.212
|
unknown
|
Russian Federation
|
||
64.190.113.113
|
unknown
|
United States
|
||
94.156.79.190
|
unknown
|
Bulgaria
|
||
186.145.236.93
|
mzxn.ru
|
Colombia
|
||
188.114.97.3
|
callosallsaospz.shop
|
European Union
|
||
104.26.2.16
|
rentry.co
|
United States
|
||
167.235.128.153
|
unknown
|
United States
|
||
193.222.96.24
|
unknown
|
Germany
|
||
154.144.253.197
|
unknown
|
Morocco
|
||
185.149.100.242
|
mussangroup.com
|
Turkey
|
||
31.14.70.245
|
store4.gofile.io
|
Virgin Islands (BRITISH)
|
There are 6 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
|
Update#5685_8yUscnjrUY
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000A0252
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000070262
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000602A6
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000008008E
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{9E04CAB2-CC14-11DF-BB8C-A2F1DED72085}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{FA99DFC7-6AC2-453A-A5E2-5E2AFF4507BD}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CAA59E3C-4792-41A5-9909-6A6A8D32490E}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{A3D53349-6E61-4557-8FC7-0028EDCEEBF6}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F2A1CB5A-E3CC-4A2E-AF9D-505A7009D442}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{BCB48336-4DDD-48FF-BB0B-D3190DACB3E2}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
|
VBSFile
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@C:\Windows\System32\wshext.dll,-4511
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\JFpevcg.rkr
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithList
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithList
|
MRUList
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@explorerframe.dll,-13137
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@explorerframe.dll,-13138
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030266
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\8RP7.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
b
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030426
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000070422
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000001C0070
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Trgfgnegrq_8jrxlo3q8oojr!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.JvaqbjfSrrqonpxUho_8jrxlo3q8oojr!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.JvaqbjfZncf_8jrxlo3q8oojr!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Crbcyr_8jrxlo3q8oojr!k4p7n3o7ql2188l46q4ln362l19np5n5805r5k
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.ZvpebfbsgFgvpxlAbgrf_8jrxlo3q8oojr!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\FavccvatGbby.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.JvaqbjfPnyphyngbe_8jrxlo3q8oojr!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\zfcnvag.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.PybhqRkcrevraprUbfg_pj5a1u2gklrjl!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.FuryyRkcrevraprUbfg_pj5a1u2gklrjl!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
ZFRqtr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.PbagebyCnary
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Rkcybere
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Frnepu_pj5a1u2gklrjl!PbegnanHV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Puebzr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
jvaqbjf.vzzrefvirpbagebycnary_pj5a1u2gklrjl!zvpebfbsg.jvaqbjf.vzzrefvirpbagebycnary
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
308046O0NS4N39PO
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{6Q809377-6NS0-444O-8957-N3773S02200R}\Nqbor\Npebong QP\Npebong\Npebong.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\BcraJvgu.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.FgnegZrahRkcrevraprUbfg_pj5a1u2gklrjl!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\pzq.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\Qrfxgbc\BssvprFrghc.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{6Q809377-6NS0-444O-8957-N3773S02200R}\Pbzzba Svyrf\zvpebfbsg funerq\PyvpxGbEha\BssvprPyvpxGbEha.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{6Q809377-6NS0-444O-8957-N3773S02200R}\Pbzzba Svyrf\zvpebfbsg funerq\PyvpxGbEha\BssvprP2EPyvrag.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Bssvpr.RKPRY.RKR.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
R:\Frghc.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
R:\Bssvpr\Frghc32.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
\\192.168.2.1\nyy\bssvprqrcyblzraggbby_16731-20290.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
\\192.168.2.1\nyy\bssvpr2016ibyhzryvprafrcnpx_4324-1002_ra-hf_k86.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{Q65231O0-O2S1-4857-N4PR-N8R7P6RN7Q27}\pfpevcg.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.FrpUrnyguHV_pj5a1u2gklrjl!FrpUrnyguHV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{6Q809377-6NS0-444O-8957-N3773S02200R}\7-Mvc\7mSZ.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\abgrcnq.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\NhgbVg3\NhgbVg3.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.TrgUryc_8jrxlo3q8oojr!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.KobkTnzvatBireynl_8jrxlo3q8oojr!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{Q65231O0-O2S1-4857-N4PR-N8R7P6RN7Q27}\JvaqbjfCbjreFuryy\i1.0\cbjrefuryy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
\\192.168.2.1\nyy\cngputhneq-qvfnoyre-nyy-irefvbaf.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
{0139Q44R-6NSR-49S2-8690-3QNSPNR6SSO8}\Npprffbevrf\Favccvat Gbby.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
{0139Q44R-6NSR-49S2-8690-3QNSPNR6SSO8}\Npprffbevrf\Cnvag.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
{N77S5Q77-2R2O-44P3-N6N2-NON601054N51}\Flfgrz Gbbyf\Pbageby Cnary.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
P:\Hfref\Choyvp\Qrfxgbc\Tbbtyr Puebzr.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
P:\Hfref\Choyvp\Qrfxgbc\Sversbk.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
P:\Hfref\Choyvp\Qrfxgbc\Nqbor Npebong.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
{9R3995NO-1S9P-4S13-O827-48O24O6P7174}\GnfxOne\Svyr Rkcybere.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
{0139Q44R-6NSR-49S2-8690-3QNSPNR6SSO8}\Rkpry.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
P:\Hfref\wbarf\Qrfxgbc\Rkpry 2016.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
P:\Hfref\wbarf\Qrfxgbc\Rkpry.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
{N77S5Q77-2R2O-44P3-N6N2-NON601054N51}\Flfgrz Gbbyf\Pbzznaq Cebzcg.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\8RP7.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\8RP7.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\8RP7.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\8RP7.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 341 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FF71C180000
|
unkown
|
page readonly
|
||
1D1000
|
unclassified section
|
page read and write
|
||
7FF71C180000
|
unkown
|
page readonly
|
||
1A0000
|
direct allocation
|
page read and write
|
||
4E1000
|
unclassified section
|
page read and write
|
||
4E40000
|
trusted library section
|
page read and write
|
||
4E30000
|
trusted library section
|
page read and write
|
||
1E0000
|
direct allocation
|
page read and write
|
||
3BCC3FE000
|
stack
|
page read and write
|
||
1B9B8950000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
9C80000
|
unkown
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
607D000
|
stack
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
E87DB7B000
|
stack
|
page read and write
|
||
C00024E000
|
direct allocation
|
page read and write
|
||
60000
|
direct allocation
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
66F000
|
heap
|
page read and write
|
||
320E000
|
trusted library allocation
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
54F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC12000
|
trusted library allocation
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
965C000
|
stack
|
page read and write
|
||
7FAEEFE000
|
stack
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF5ED295000
|
unkown
|
page readonly
|
||
7DB0000
|
unkown
|
page read and write
|
||
3572000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2B4D000
|
trusted library allocation
|
page read and write
|
||
14CA4730000
|
heap
|
page read and write
|
||
340C000
|
heap
|
page read and write
|
||
E7000
|
trusted library allocation
|
page execute and read and write
|
||
FB000
|
trusted library allocation
|
page execute and read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
1A27FE000
|
stack
|
page read and write
|
||
17A3DFB0000
|
heap
|
page read and write
|
||
55F1000
|
heap
|
page read and write
|
||
7FF5ED942000
|
unkown
|
page readonly
|
||
7FF71C15E000
|
unkown
|
page write copy
|
||
7FFD9BA60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED714000
|
unkown
|
page readonly
|
||
4EA6000
|
trusted library allocation
|
page read and write
|
||
2AB5000
|
trusted library allocation
|
page read and write
|
||
1B9B8930000
|
trusted library allocation
|
page read and write
|
||
9560000
|
unkown
|
page read and write
|
||
C000152000
|
direct allocation
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
1E0003B2000
|
unkown
|
page readonly
|
||
54CD000
|
trusted library allocation
|
page read and write
|
||
2ABA000
|
trusted library allocation
|
page read and write
|
||
7FAFFCD000
|
stack
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
B3000
|
trusted library allocation
|
page execute and read and write
|
||
978E000
|
unkown
|
page read and write
|
||
2B8F000
|
trusted library allocation
|
page read and write
|
||
6C90B000
|
unkown
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
54F3000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
7FF5ED2A9000
|
unkown
|
page readonly
|
||
818E000
|
stack
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
B150000
|
unkown
|
page read and write
|
||
514000
|
heap
|
page read and write
|
||
3BCB7F5000
|
stack
|
page read and write
|
||
5502000
|
trusted library allocation
|
page read and write
|
||
8720000
|
unkown
|
page readonly
|
||
3107000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF71C0E1000
|
unkown
|
page write copy
|
||
400000
|
unkown
|
page readonly
|
||
7DA0000
|
unkown
|
page read and write
|
||
14E000
|
stack
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3129000
|
trusted library allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
2A89000
|
trusted library allocation
|
page read and write
|
||
C000248000
|
direct allocation
|
page read and write
|
||
5524000
|
trusted library allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
1B9B8F61000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
unkown
|
page readonly
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
1B9C8FCB000
|
trusted library allocation
|
page read and write
|
||
29C8000
|
trusted library allocation
|
page read and write
|
||
C84D000
|
unkown
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
33ED000
|
heap
|
page read and write
|
||
2A96000
|
trusted library allocation
|
page read and write
|
||
7FF5ED74A000
|
unkown
|
page readonly
|
||
54AA000
|
trusted library allocation
|
page read and write
|
||
2AA3000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1A2BFF000
|
stack
|
page read and write
|
||
5E3E000
|
stack
|
page read and write
|
||
1F556FF000
|
unkown
|
page read and write
|
||
15F3A555000
|
heap
|
page read and write
|
||
340C000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
4EB5000
|
trusted library allocation
|
page read and write
|
||
312C000
|
trusted library allocation
|
page read and write
|
||
33DA000
|
heap
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
unkown
|
page read and write
|
||
4C60000
|
unkown
|
page read and write
|
||
1B9D15A0000
|
heap
|
page read and write
|
||
3901000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
15F3BFE0000
|
heap
|
page execute and read and write
|
||
3BCE7FE000
|
stack
|
page read and write
|
||
1E0026D4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page execute and read and write
|
||
3400000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
23AF000
|
stack
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
3107000
|
trusted library allocation
|
page read and write
|
||
ED198F9000
|
stack
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
5505000
|
trusted library allocation
|
page read and write
|
||
21AE000
|
stack
|
page read and write
|
||
216F000
|
stack
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
3BCBBFE000
|
stack
|
page read and write
|
||
7FF71C162000
|
unkown
|
page read and write
|
||
316F000
|
trusted library allocation
|
page read and write
|
||
29B4000
|
trusted library allocation
|
page read and write
|
||
9F9B000
|
stack
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
A433000
|
unkown
|
page read and write
|
||
C50A000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
2B73000
|
trusted library allocation
|
page read and write
|
||
1E0006F0000
|
trusted library allocation
|
page read and write
|
||
61D000
|
trusted library allocation
|
page execute and read and write
|
||
7FAFF4E000
|
stack
|
page read and write
|
||
B3000
|
trusted library allocation
|
page execute and read and write
|
||
54A5000
|
trusted library allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
29CA000
|
trusted library allocation
|
page read and write
|
||
9F1E000
|
stack
|
page read and write
|
||
7FF5ED9BE000
|
unkown
|
page readonly
|
||
184DB7C0000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
A4AB000
|
unkown
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
14CA465A000
|
heap
|
page read and write
|
||
18AD6FF000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
C0000
|
trusted library allocation
|
page read and write
|
||
987D000
|
unkown
|
page read and write
|
||
3173000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
1FBFFEF0000
|
direct allocation
|
page read and write
|
||
2A62000
|
trusted library allocation
|
page read and write
|
||
184D9CC0000
|
heap
|
page read and write
|
||
7FE08000
|
trusted library allocation
|
page execute and read and write
|
||
33D7000
|
heap
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
1E002064000
|
trusted library section
|
page readonly
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
1E0021C3000
|
heap
|
page read and write
|
||
3139000
|
trusted library allocation
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
55F8000
|
heap
|
page read and write
|
||
7DF4F3030000
|
unkown
|
page readonly
|
||
2A43000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7FF5ED519000
|
unkown
|
page readonly
|
||
54E000
|
heap
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
5D7000
|
heap
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
17A3DECC000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
B8B0000
|
unkown
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
7FF5ED9CC000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
33F2000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7FF6416E2000
|
unkown
|
page write copy
|
||
7CA0000
|
unkown
|
page read and write
|
||
315C000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
390A000
|
trusted library allocation
|
page read and write
|
||
2BAD000
|
trusted library allocation
|
page read and write
|
||
1B9BA954000
|
trusted library allocation
|
page read and write
|
||
1B9B8F10000
|
heap
|
page execute and read and write
|
||
610000
|
trusted library allocation
|
page read and write
|
||
5D01000
|
heap
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
785D000
|
unkown
|
page read and write
|
||
4CE0000
|
unkown
|
page read and write
|
||
CB60000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
405000
|
unkown
|
page execute and read and write
|
||
2BC4000
|
trusted library allocation
|
page read and write
|
||
C41F000
|
stack
|
page read and write
|
||
55A1000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
29D5000
|
trusted library allocation
|
page read and write
|
||
3179000
|
trusted library allocation
|
page read and write
|
||
7FF5ED77C000
|
unkown
|
page readonly
|
||
3157000
|
trusted library allocation
|
page read and write
|
||
7FF5ED97A000
|
unkown
|
page readonly
|
||
7DA0000
|
unkown
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
2AAC000
|
trusted library allocation
|
page read and write
|
||
8108000
|
stack
|
page read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
29ED000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
977A000
|
unkown
|
page read and write
|
||
7FF5ED5A8000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
1FBFFC26000
|
direct allocation
|
page read and write
|
||
33FE000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
5511000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
316B000
|
trusted library allocation
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
||
573F000
|
stack
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
3409000
|
trusted library allocation
|
page read and write
|
||
7FF71C7B7000
|
unkown
|
page write copy
|
||
7FFD9B9EC000
|
trusted library allocation
|
page execute and read and write
|
||
9550000
|
unkown
|
page readonly
|
||
1E01C1EA000
|
heap
|
page read and write
|
||
14CA4750000
|
heap
|
page read and write
|
||
3700000
|
unkown
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF71C7AE000
|
unkown
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
37AE000
|
unkown
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
2A95000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
316B000
|
trusted library allocation
|
page read and write
|
||
7FF5ED821000
|
unkown
|
page readonly
|
||
14B0000
|
unkown
|
page readonly
|
||
54F4000
|
trusted library allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
BD1D000
|
stack
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
3112000
|
trusted library allocation
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
55FE000
|
heap
|
page read and write
|
||
15F56080000
|
heap
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
54C6000
|
trusted library allocation
|
page read and write
|
||
7FF71C17E000
|
unkown
|
page write copy
|
||
3010000
|
unkown
|
page read and write
|
||
3BCDFFE000
|
stack
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
56C3000
|
unkown
|
page read and write
|
||
1350000
|
unkown
|
page readonly
|
||
2B97000
|
trusted library allocation
|
page read and write
|
||
200179F8000
|
heap
|
page read and write
|
||
C563000
|
unkown
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
33EE000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
29A6000
|
trusted library allocation
|
page read and write
|
||
4A9E000
|
stack
|
page read and write
|
||
3BD158E000
|
stack
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
5505000
|
trusted library allocation
|
page read and write
|
||
7FF71C178000
|
unkown
|
page write copy
|
||
2A32000
|
trusted library allocation
|
page read and write
|
||
F8DD000
|
unkown
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
89E0000
|
unkown
|
page read and write
|
||
3103000
|
trusted library allocation
|
page read and write
|
||
A0000
|
trusted library allocation
|
page read and write
|
||
2B76000
|
trusted library allocation
|
page read and write
|
||
7FF71C15D000
|
unkown
|
page read and write
|
||
1E000740000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
C000372000
|
direct allocation
|
page read and write
|
||
311A000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2E49F8D4000
|
heap
|
page read and write
|
||
2A6A000
|
trusted library allocation
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
311B000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
97AD000
|
unkown
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
4E9E000
|
trusted library allocation
|
page read and write
|
||
33F6000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
98A8000
|
unkown
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
33EA000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1E0006D0000
|
trusted library allocation
|
page read and write
|
||
1E0026B8000
|
trusted library allocation
|
page read and write
|
||
29C5000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
9C80000
|
unkown
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
2A0D000
|
trusted library allocation
|
page read and write
|
||
2B3F000
|
trusted library allocation
|
page read and write
|
||
7FF71C0DC000
|
unkown
|
page read and write
|
||
7950000
|
unkown
|
page read and write
|
||
C88B000
|
unkown
|
page read and write
|
||
3451000
|
unkown
|
page read and write
|
||
95DC000
|
stack
|
page read and write
|
||
1E0004CE000
|
heap
|
page read and write
|
||
30FA000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
54CD000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2E49F8DC000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
2B78000
|
trusted library allocation
|
page read and write
|
||
6C90C000
|
unkown
|
page write copy
|
||
7FFD9BA56000
|
trusted library allocation
|
page read and write
|
||
313C000
|
trusted library allocation
|
page read and write
|
||
6C8F8000
|
unkown
|
page readonly
|
||
2A548710000
|
heap
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7FAF4FB000
|
stack
|
page read and write
|
||
3107000
|
trusted library allocation
|
page read and write
|
||
2A11000
|
trusted library allocation
|
page read and write
|
||
7FF71C0D4000
|
unkown
|
page write copy
|
||
20017A57000
|
heap
|
page read and write
|
||
7FDF0000
|
trusted library allocation
|
page execute and read and write
|
||
1370000
|
unkown
|
page read and write
|
||
31A0000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7FF5ED670000
|
unkown
|
page readonly
|
||
9B20000
|
unkown
|
page read and write
|
||
2A92000
|
trusted library allocation
|
page read and write
|
||
15F3A5F0000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1E0025A8000
|
trusted library allocation
|
page read and write
|
||
1E002628000
|
trusted library allocation
|
page read and write
|
||
3580000
|
unkown
|
page readonly
|
||
54E000
|
heap
|
page read and write
|
||
4F16000
|
trusted library allocation
|
page read and write
|
||
299B000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
33D3000
|
heap
|
page read and write
|
||
3BCDBFE000
|
stack
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
3229000
|
trusted library allocation
|
page read and write
|
||
365F000
|
stack
|
page read and write
|
||
C0003C2000
|
direct allocation
|
page read and write
|
||
2A44000
|
trusted library allocation
|
page read and write
|
||
7857000
|
unkown
|
page read and write
|
||
1B9B8D00000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
3188000
|
trusted library allocation
|
page read and write
|
||
2E4A1111000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
1210000
|
unkown
|
page readonly
|
||
66F000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
310F000
|
trusted library allocation
|
page read and write
|
||
7FF5ED1D6000
|
unkown
|
page readonly
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
6C90B000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3422000
|
trusted library allocation
|
page read and write
|
||
785F000
|
unkown
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
7FF5ED7E9000
|
unkown
|
page readonly
|
||
A9F000
|
stack
|
page read and write
|
||
3905000
|
trusted library allocation
|
page read and write
|
||
3800000
|
unkown
|
page readonly
|
||
2AE8000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
13A0000
|
unkown
|
page read and write
|
||
3137000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
9590000
|
unkown
|
page read and write
|
||
1FBFFD0A000
|
direct allocation
|
page read and write
|
||
1B9BA7A6000
|
trusted library allocation
|
page read and write
|
||
33FA000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF5ED433000
|
unkown
|
page readonly
|
||
2B38000
|
trusted library allocation
|
page read and write
|
||
55F2000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7FF5EDA47000
|
unkown
|
page readonly
|
||
54BA000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
66F000
|
heap
|
page read and write
|
||
C00004B000
|
direct allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
9ADE000
|
stack
|
page read and write
|
||
7FFD9BD03000
|
trusted library allocation
|
page read and write
|
||
29B7000
|
trusted library allocation
|
page read and write
|
||
1FBFEF40000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
33FE000
|
heap
|
page read and write
|
||
6C89B000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
55F2000
|
heap
|
page read and write
|
||
2A9B000
|
trusted library allocation
|
page read and write
|
||
1380000
|
unkown
|
page read and write
|
||
C544000
|
unkown
|
page read and write
|
||
3206000
|
trusted library allocation
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
2A17000
|
trusted library allocation
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
14CA48C4000
|
heap
|
page read and write
|
||
7FF5ED426000
|
unkown
|
page readonly
|
||
1FBFF130000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
unkown
|
page read and write
|
||
1E000490000
|
heap
|
page read and write
|
||
7FAF57B000
|
stack
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
A50B000
|
unkown
|
page read and write
|
||
7FF5ED755000
|
unkown
|
page readonly
|
||
335E000
|
heap
|
page read and write
|
||
3206000
|
trusted library allocation
|
page read and write
|
||
7FF5EDA53000
|
unkown
|
page readonly
|
||
A379000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
C6C1000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
2A77000
|
trusted library allocation
|
page read and write
|
||
29B8000
|
trusted library allocation
|
page read and write
|
||
7FF6415F0000
|
unkown
|
page readonly
|
||
2A01000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3BD298B000
|
stack
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
3402000
|
heap
|
page read and write
|
||
C000142000
|
direct allocation
|
page read and write
|
||
FA40000
|
heap
|
page read and write
|
||
C5A0000
|
unkown
|
page read and write
|
||
15F54A70000
|
heap
|
page execute and read and write
|
||
7FF6415F0000
|
unkown
|
page readonly
|
||
7FF5ED3CE000
|
unkown
|
page readonly
|
||
2241000
|
heap
|
page read and write
|
||
7FF5ED803000
|
unkown
|
page readonly
|
||
3BCF3FE000
|
stack
|
page read and write
|
||
7FFD9BE00000
|
trusted library allocation
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
1E012291000
|
trusted library allocation
|
page read and write
|
||
404000
|
unkown
|
page execute and write copy
|
||
3128000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
C6C9000
|
unkown
|
page read and write
|
||
C00018A000
|
direct allocation
|
page read and write
|
||
C962000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
299D000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
2A48000
|
trusted library allocation
|
page read and write
|
||
66F000
|
heap
|
page read and write
|
||
3174000
|
trusted library allocation
|
page read and write
|
||
1FBFFD19000
|
direct allocation
|
page read and write
|
||
7FF5ED471000
|
unkown
|
page readonly
|
||
37CE000
|
stack
|
page read and write
|
||
C811000
|
unkown
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
3010000
|
unkown
|
page read and write
|
||
54D6000
|
trusted library allocation
|
page read and write
|
||
7FF5ED7DB000
|
unkown
|
page readonly
|
||
7FF5ED556000
|
unkown
|
page readonly
|
||
7FF5ED80C000
|
unkown
|
page readonly
|
||
402000
|
unkown
|
page readonly
|
||
54E3000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
2A64000
|
trusted library allocation
|
page read and write
|
||
7FAF179000
|
stack
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
31A5000
|
heap
|
page read and write
|
||
9D64000
|
unkown
|
page read and write
|
||
2B14000
|
trusted library allocation
|
page read and write
|
||
2B81000
|
trusted library allocation
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7D53000
|
unkown
|
page read and write
|
||
4F10000
|
remote allocation
|
page read and write
|
||
15F3A6B0000
|
trusted library section
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
5DDF000
|
stack
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
5716000
|
heap
|
page read and write
|
||
5503000
|
trusted library allocation
|
page read and write
|
||
5D00000
|
heap
|
page read and write
|
||
33CF000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
6C8F8000
|
unkown
|
page readonly
|
||
30F5000
|
trusted library allocation
|
page read and write
|
||
2B87000
|
trusted library allocation
|
page read and write
|
||
2A4E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9EC000
|
trusted library allocation
|
page execute and read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
6C8AE000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
787C000
|
unkown
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
6020000
|
direct allocation
|
page execute and read and write
|
||
49E000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2B35000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
15F3A785000
|
heap
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page execute and read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
remote allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
7FF5EDA38000
|
unkown
|
page readonly
|
||
13A0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
2B66000
|
trusted library allocation
|
page read and write
|
||
1B9B70F0000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2A42000
|
trusted library allocation
|
page read and write
|
||
C51E000
|
unkown
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
B4000
|
trusted library allocation
|
page read and write
|
||
7D40000
|
unkown
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
8860000
|
unkown
|
page read and write
|
||
4FE0000
|
heap
|
page execute and read and write
|
||
2BA3000
|
trusted library allocation
|
page read and write
|
||
54E9000
|
trusted library allocation
|
page read and write
|
||
6C91E000
|
unkown
|
page read and write
|
||
C89C000
|
unkown
|
page read and write
|
||
1B9B6F12000
|
heap
|
page read and write
|
||
C0003D0000
|
direct allocation
|
page read and write
|
||
1505000
|
heap
|
page read and write
|
||
321E000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9D2000
|
unkown
|
page readonly
|
||
315A000
|
trusted library allocation
|
page read and write
|
||
37A0000
|
unkown
|
page read and write
|
||
A361000
|
unkown
|
page read and write
|
||
1B9D1317000
|
heap
|
page read and write
|
||
F8D1000
|
unkown
|
page read and write
|
||
1E01DC10000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
2E4A1315000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
7FF71C0D5000
|
unkown
|
page write copy
|
||
30EF000
|
stack
|
page read and write
|
||
15F3A4F9000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3BD258C000
|
stack
|
page read and write
|
||
36F0000
|
unkown
|
page readonly
|
||
7FF71C0DB000
|
unkown
|
page write copy
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
697000
|
heap
|
page read and write
|
||
15F56082000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF6415F0000
|
unkown
|
page readonly
|
||
1B9B9DF3000
|
trusted library allocation
|
page read and write
|
||
6C8C1000
|
unkown
|
page execute read
|
||
54E000
|
heap
|
page read and write
|
||
9873000
|
unkown
|
page read and write
|
||
3112000
|
trusted library allocation
|
page read and write
|
||
71F000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
2A5487D5000
|
heap
|
page read and write
|
||
2AB7000
|
trusted library allocation
|
page read and write
|
||
7FF5ED3EA000
|
unkown
|
page readonly
|
||
7DC0000
|
unkown
|
page read and write
|
||
1B9B9A79000
|
trusted library allocation
|
page read and write
|
||
B4D0000
|
unkown
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
2B32000
|
trusted library allocation
|
page read and write
|
||
54D1000
|
trusted library allocation
|
page read and write
|
||
2BA5000
|
trusted library allocation
|
page read and write
|
||
987F000
|
unkown
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
1A1FFE000
|
stack
|
page read and write
|
||
2AED000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
54EF000
|
trusted library allocation
|
page read and write
|
||
5C9000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED505000
|
unkown
|
page readonly
|
||
2856000
|
trusted library allocation
|
page execute and read and write
|
||
20017C60000
|
heap
|
page read and write
|
||
D0000
|
heap
|
page read and write
|
||
1B9D1066000
|
heap
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
55A1000
|
trusted library allocation
|
page read and write
|
||
7FF5ED3A7000
|
unkown
|
page readonly
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
1380000
|
unkown
|
page read and write
|
||
3319000
|
stack
|
page read and write
|
||
15F3BFD5000
|
heap
|
page read and write
|
||
2AFA000
|
trusted library allocation
|
page read and write
|
||
7FF64167D000
|
unkown
|
page readonly
|
||
7FF71C175000
|
unkown
|
page read and write
|
||
3F0D000
|
stack
|
page read and write
|
||
28AC000
|
stack
|
page read and write
|
||
314A000
|
trusted library allocation
|
page read and write
|
||
90000
|
trusted library section
|
page read and write
|
||
6C89C000
|
unkown
|
page write copy
|
||
7FF5D1CD4000
|
unkown
|
page readonly
|
||
1E0025BF000
|
trusted library allocation
|
page read and write
|
||
312F000
|
trusted library allocation
|
page read and write
|
||
6CA000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
54FF000
|
trusted library allocation
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
5F3D000
|
stack
|
page read and write
|
||
279E000
|
unclassified section
|
page readonly
|
||
340C000
|
heap
|
page read and write
|
||
7FF5ECED2000
|
unkown
|
page readonly
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
7FF6415F1000
|
unkown
|
page execute read
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
3212000
|
trusted library allocation
|
page read and write
|
||
514000
|
heap
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
90819FF000
|
stack
|
page read and write
|
||
B4000
|
trusted library allocation
|
page read and write
|
||
1B9D106B000
|
heap
|
page read and write
|
||
30F8000
|
trusted library allocation
|
page read and write
|
||
4F27000
|
trusted library allocation
|
page read and write
|
||
2BAE000
|
trusted library allocation
|
page read and write
|
||
1FBFFCAA000
|
direct allocation
|
page read and write
|
||
7FF4B80F0000
|
trusted library allocation
|
page execute and read and write
|
||
534000
|
heap
|
page read and write
|
||
79FB000
|
unkown
|
page read and write
|
||
8EC6000
|
unkown
|
page read and write
|
||
7FF5ED986000
|
unkown
|
page readonly
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
2B17000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD29000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF5ED9F2000
|
unkown
|
page readonly
|
||
90809FD000
|
stack
|
page read and write
|
||
320B000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
33F6000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
2A1D000
|
trusted library allocation
|
page read and write
|
||
1E01C1ED000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
2B1D000
|
trusted library allocation
|
page read and write
|
||
335E000
|
heap
|
page read and write
|
||
7FF5ED9A1000
|
unkown
|
page readonly
|
||
1E000705000
|
heap
|
page read and write
|
||
1FBFFE50000
|
direct allocation
|
page read and write
|
||
1FBFFC05000
|
direct allocation
|
page read and write
|
||
27B1000
|
unclassified section
|
page readonly
|
||
1370000
|
unkown
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
5502000
|
trusted library allocation
|
page read and write
|
||
3188000
|
trusted library allocation
|
page read and write
|
||
2A548780000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
FA4A000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
54BA000
|
trusted library allocation
|
page read and write
|
||
87BB000
|
stack
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
3BCEFFB000
|
stack
|
page read and write
|
||
2B77000
|
trusted library allocation
|
page read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3234000
|
trusted library allocation
|
page read and write
|
||
7FF5ED586000
|
unkown
|
page readonly
|
||
7DF4C2060000
|
trusted library allocation
|
page execute and read and write
|
||
15F3A665000
|
heap
|
page read and write
|
||
1436000
|
stack
|
page read and write
|
||
13A0000
|
unkown
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
54AA000
|
trusted library allocation
|
page read and write
|
||
14CA4630000
|
heap
|
page read and write
|
||
1B9D13AF000
|
heap
|
page read and write
|
||
1B9BA797000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
3117000
|
trusted library allocation
|
page read and write
|
||
3758000
|
unkown
|
page read and write
|
||
7FF6416E2000
|
unkown
|
page read and write
|
||
CA7C000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7FF5ED4E8000
|
unkown
|
page readonly
|
||
7DA0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
784A000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2ACC000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
7FF71C0E2000
|
unkown
|
page read and write
|
||
29F6000
|
trusted library allocation
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
29E5000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
7FF5ED337000
|
unkown
|
page readonly
|
||
3400000
|
unkown
|
page read and write
|
||
7FF5ED85F000
|
unkown
|
page readonly
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
3179000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1F0000
|
unclassified section
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB72000
|
trusted library allocation
|
page read and write
|
||
2728000
|
stack
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
88EE000
|
stack
|
page read and write
|
||
33E7000
|
heap
|
page read and write
|
||
3158000
|
trusted library allocation
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1B9D10AB000
|
heap
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
2BA8000
|
trusted library allocation
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7FF5ED8F9000
|
unkown
|
page readonly
|
||
2A23000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
1B9C8F91000
|
trusted library allocation
|
page read and write
|
||
3119000
|
trusted library allocation
|
page read and write
|
||
F8EC000
|
unkown
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
54D9000
|
trusted library allocation
|
page read and write
|
||
15F3A58D000
|
heap
|
page read and write
|
||
3243000
|
trusted library allocation
|
page read and write
|
||
A4A1000
|
unkown
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
2B92000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED76D000
|
unkown
|
page readonly
|
||
923E000
|
stack
|
page read and write
|
||
33E8000
|
heap
|
page read and write
|
||
321E000
|
trusted library allocation
|
page read and write
|
||
681000
|
heap
|
page read and write
|
||
521000
|
heap
|
page read and write
|
||
3219000
|
trusted library allocation
|
page read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
7FF5ED71B000
|
unkown
|
page readonly
|
||
7DA0000
|
unkown
|
page read and write
|
||
2E49F8DD000
|
heap
|
page read and write
|
||
1B9BA745000
|
trusted library allocation
|
page read and write
|
||
1A23FE000
|
stack
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
DD000
|
stack
|
page read and write
|
||
7FFD9BD38000
|
trusted library allocation
|
page read and write
|
||
55F2000
|
heap
|
page read and write
|
||
29D8000
|
trusted library allocation
|
page read and write
|
||
7FF5ED86B000
|
unkown
|
page readonly
|
||
7FF5ED4A1000
|
unkown
|
page readonly
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
7FF5ED695000
|
unkown
|
page readonly
|
||
53F000
|
heap
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
29A4000
|
trusted library allocation
|
page read and write
|
||
2A65000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
1E002080000
|
heap
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
14E000
|
stack
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
315C000
|
trusted library allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
1095000
|
stack
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
CA42000
|
unkown
|
page read and write
|
||
33FE000
|
heap
|
page read and write
|
||
2B5C000
|
trusted library allocation
|
page read and write
|
||
7FF5D1CCD000
|
unkown
|
page readonly
|
||
B10D000
|
stack
|
page read and write
|
||
2A33000
|
trusted library allocation
|
page read and write
|
||
54A8000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
4F10000
|
remote allocation
|
page read and write
|
||
906E000
|
stack
|
page read and write
|
||
C0002E2000
|
direct allocation
|
page read and write
|
||
15F3A460000
|
heap
|
page read and write
|
||
7FF5ED77E000
|
unkown
|
page readonly
|
||
299A000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
97B5000
|
unkown
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
C5A3000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
3109000
|
trusted library allocation
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1E01A960000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3142000
|
trusted library allocation
|
page read and write
|
||
2B3C000
|
trusted library allocation
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
7FF71C71D000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
29FD000
|
stack
|
page read and write
|
||
2A08000
|
trusted library allocation
|
page read and write
|
||
8DA0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
54A5000
|
trusted library allocation
|
page read and write
|
||
3157000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
3215000
|
trusted library allocation
|
page read and write
|
||
2E4A1319000
|
heap
|
page read and write
|
||
7FF6415F0000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
2B89000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page execute and read and write
|
||
2A13000
|
trusted library allocation
|
page read and write
|
||
C10A000
|
stack
|
page read and write
|
||
299F000
|
trusted library allocation
|
page read and write
|
||
A29E000
|
stack
|
page read and write
|
||
33E9000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
379E000
|
unkown
|
page read and write
|
||
2998000
|
trusted library allocation
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
A4AE000
|
unkown
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
313B000
|
trusted library allocation
|
page read and write
|
||
340C000
|
heap
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
15F3A660000
|
heap
|
page read and write
|
||
9560000
|
unkown
|
page read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
71F000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
3590000
|
unkown
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
8730000
|
unkown
|
page read and write
|
||
33EF000
|
heap
|
page read and write
|
||
2E49F8CE000
|
heap
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7C90000
|
unkown
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7FF5ED71E000
|
unkown
|
page readonly
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
47E000
|
stack
|
page read and write
|
||
20017A25000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
93BE000
|
stack
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
2A18000
|
trusted library allocation
|
page read and write
|
||
54ED000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
2BAA000
|
trusted library allocation
|
page read and write
|
||
33D3000
|
heap
|
page read and write
|
||
5A60000
|
heap
|
page read and write
|
||
3157000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3107000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
1E0026AB000
|
trusted library allocation
|
page read and write
|
||
54DC000
|
trusted library allocation
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7FF5ED39B000
|
unkown
|
page readonly
|
||
4E84000
|
trusted library allocation
|
page read and write
|
||
2B9F000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
B728000
|
stack
|
page read and write
|
||
1451000
|
unkown
|
page readonly
|
||
534000
|
heap
|
page read and write
|
||
7FF6415F0000
|
unkown
|
page readonly
|
||
1B9BA7A0000
|
trusted library allocation
|
page read and write
|
||
29C2000
|
trusted library allocation
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
2A06000
|
trusted library allocation
|
page read and write
|
||
7FF5ED6A5000
|
unkown
|
page readonly
|
||
7FF5ED93E000
|
unkown
|
page readonly
|
||
7FF5ED404000
|
unkown
|
page readonly
|
||
1B9C8F81000
|
trusted library allocation
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
7FF5ED4B4000
|
unkown
|
page readonly
|
||
1B9B9FE8000
|
trusted library allocation
|
page read and write
|
||
9560000
|
unkown
|
page read and write
|
||
33E8000
|
heap
|
page read and write
|
||
2A68000
|
trusted library allocation
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
C4000
|
trusted library allocation
|
page read and write
|
||
31A7000
|
trusted library allocation
|
page read and write
|
||
254A000
|
stack
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
7FF5EDA69000
|
unkown
|
page readonly
|
||
2B1C000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9E1000
|
unkown
|
page readonly
|
||
3400000
|
unkown
|
page read and write
|
||
7865000
|
unkown
|
page read and write
|
||
15F3A580000
|
heap
|
page read and write
|
||
3212000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7DF4F3051000
|
unkown
|
page execute read
|
||
7DC0000
|
unkown
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
7FB010E000
|
stack
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
33EF000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7DF4F3050000
|
unkown
|
page readonly
|
||
7953000
|
unkown
|
page read and write
|
||
C000150000
|
direct allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
7FFD9B9A2000
|
trusted library allocation
|
page read and write
|
||
2B72000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
remote allocation
|
page read and write
|
||
1B9BA61B000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
unkown
|
page read and write
|
||
90811FF000
|
stack
|
page read and write
|
||
C000303000
|
direct allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
15F3A6F0000
|
heap
|
page read and write
|
||
7FF5EDA2A000
|
unkown
|
page readonly
|
||
1B9B6F49000
|
heap
|
page read and write
|
||
C000038000
|
direct allocation
|
page read and write
|
||
4F30000
|
heap
|
page execute and read and write
|
||
80000
|
trusted library section
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
89A0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
A4B8000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
14CA465A000
|
heap
|
page read and write
|
||
7FF5ED915000
|
unkown
|
page readonly
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
4EC6000
|
trusted library allocation
|
page read and write
|
||
29D7000
|
trusted library allocation
|
page read and write
|
||
1E01D889000
|
heap
|
page read and write
|
||
37F6000
|
unkown
|
page read and write
|
||
315E000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
2B31000
|
trusted library allocation
|
page read and write
|
||
2B53000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2A56000
|
trusted library allocation
|
page read and write
|
||
1B9B8900000
|
trusted library section
|
page read and write
|
||
7FF5ED4DF000
|
unkown
|
page readonly
|
||
C5AA000
|
unkown
|
page read and write
|
||
7FF5ED4FD000
|
unkown
|
page readonly
|
||
15F548D0000
|
heap
|
page read and write
|
||
C0000FA000
|
direct allocation
|
page read and write
|
||
3112000
|
trusted library allocation
|
page read and write
|
||
1B9B6F08000
|
heap
|
page read and write
|
||
320A000
|
trusted library allocation
|
page read and write
|
||
7B80000
|
unkown
|
page read and write
|
||
2E49F870000
|
heap
|
page read and write
|
||
33E5000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF64167D000
|
unkown
|
page readonly
|
||
87C0000
|
unkown
|
page read and write
|
||
310F000
|
trusted library allocation
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
17A3E1B0000
|
heap
|
page read and write
|
||
54CE000
|
trusted library allocation
|
page read and write
|
||
BC9B000
|
stack
|
page read and write
|
||
2901000
|
trusted library allocation
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
7FF71BC41000
|
unkown
|
page execute read
|
||
9C80000
|
unkown
|
page read and write
|
||
29BE000
|
trusted library allocation
|
page read and write
|
||
2901000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
1E0026B6000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
3234000
|
trusted library allocation
|
page read and write
|
||
1B9D1260000
|
heap
|
page read and write
|
||
2AE6000
|
trusted library allocation
|
page read and write
|
||
2A0A000
|
trusted library allocation
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
C0003A4000
|
direct allocation
|
page read and write
|
||
3BCD7FE000
|
stack
|
page read and write
|
||
14CA4540000
|
heap
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7FF5ED52F000
|
unkown
|
page readonly
|
||
C0002A8000
|
direct allocation
|
page read and write
|
||
20017BC0000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
2B55000
|
trusted library allocation
|
page read and write
|
||
54C3000
|
trusted library allocation
|
page read and write
|
||
6C90C000
|
unkown
|
page write copy
|
||
EB000
|
trusted library allocation
|
page execute and read and write
|
||
A3BE000
|
unkown
|
page read and write
|
||
C000128000
|
direct allocation
|
page read and write
|
||
570000
|
trusted library allocation
|
page execute and read and write
|
||
2E4A1230000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
1B9BA5F8000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
33FC000
|
heap
|
page read and write
|
||
3118000
|
trusted library allocation
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
1E01C1C5000
|
heap
|
page read and write
|
||
C6F2000
|
unkown
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
2A9F000
|
trusted library allocation
|
page read and write
|
||
7FF71BC40000
|
unkown
|
page readonly
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
3163000
|
trusted library allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
B0000
|
trusted library allocation
|
page read and write
|
||
3188000
|
trusted library allocation
|
page read and write
|
||
4A9E000
|
stack
|
page read and write
|
||
1E01C21C000
|
heap
|
page read and write
|
||
27A1000
|
unclassified section
|
page write copy
|
||
2B96000
|
trusted library allocation
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
314A000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2ADB000
|
trusted library allocation
|
page read and write
|
||
2AD3000
|
trusted library allocation
|
page read and write
|
||
340D000
|
heap
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
C0003B6000
|
direct allocation
|
page read and write
|
||
2120000
|
heap
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
7FF5ED867000
|
unkown
|
page readonly
|
||
3BCB19F000
|
stack
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
2A71000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7E11000
|
unkown
|
page read and write
|
||
A310000
|
unkown
|
page read and write
|
||
7FF6416E2000
|
unkown
|
page write copy
|
||
8740000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
C000800000
|
direct allocation
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
2870000
|
heap
|
page execute and read and write
|
||
511000
|
heap
|
page read and write
|
||
B4D0000
|
unkown
|
page read and write
|
||
C00028A000
|
direct allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
54AA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7FF5ED65C000
|
unkown
|
page readonly
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
55E000
|
stack
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1FBFFC23000
|
direct allocation
|
page read and write
|
||
7FF6415F0000
|
unkown
|
page readonly
|
||
54E000
|
heap
|
page read and write
|
||
2B15000
|
trusted library allocation
|
page read and write
|
||
5CC000
|
trusted library allocation
|
page execute and read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
DE0000
|
unkown
|
page readonly
|
||
54CD000
|
trusted library allocation
|
page read and write
|
||
2B36000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
33EB000
|
heap
|
page read and write
|
||
550000
|
direct allocation
|
page execute and read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
1E000460000
|
heap
|
page read and write
|
||
3117000
|
trusted library allocation
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
34E2000
|
trusted library allocation
|
page read and write
|
||
7FF5EDA70000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
3209000
|
stack
|
page read and write
|
||
2AC8000
|
trusted library allocation
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
5678000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3219000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
79D3000
|
unkown
|
page read and write
|
||
943E000
|
stack
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1FBFFBD0000
|
direct allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3128000
|
trusted library allocation
|
page read and write
|
||
15E000
|
stack
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7867000
|
unkown
|
page read and write
|
||
312C000
|
trusted library allocation
|
page read and write
|
||
1B9B961B000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1DE000
|
stack
|
page read and write
|
||
9798000
|
unkown
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
3142000
|
trusted library allocation
|
page read and write
|
||
54D1000
|
trusted library allocation
|
page read and write
|
||
1B9BA18D000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
405000
|
unkown
|
page execute and read and write
|
||
7FF5ED3F3000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
68A000
|
heap
|
page read and write
|
||
4B56000
|
unkown
|
page read and write
|
||
3403000
|
heap
|
page read and write
|
||
14CA465A000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
312B000
|
trusted library allocation
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
7FF5ED7E0000
|
unkown
|
page readonly
|
||
2AC7000
|
trusted library allocation
|
page read and write
|
||
2B93000
|
trusted library allocation
|
page read and write
|
||
3152000
|
trusted library allocation
|
page read and write
|
||
4F25000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
F644000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3FB1000
|
unclassified section
|
page write copy
|
||
C000064000
|
direct allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
5590000
|
unkown
|
page write copy
|
||
5B9F000
|
stack
|
page read and write
|
||
9080BFF000
|
stack
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
2AF7000
|
trusted library allocation
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
A33E000
|
unkown
|
page read and write
|
||
80000
|
trusted library section
|
page read and write
|
||
33FA000
|
heap
|
page read and write
|
||
2B0F000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
54D4000
|
trusted library allocation
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
9792000
|
unkown
|
page read and write
|
||
C0003CD000
|
direct allocation
|
page read and write
|
||
3377000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
54A7000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
unkown
|
page read and write
|
||
2A1F000
|
trusted library allocation
|
page read and write
|
||
312F000
|
trusted library allocation
|
page read and write
|
||
7FF5ED4C2000
|
unkown
|
page readonly
|
||
7FF5ED980000
|
unkown
|
page readonly
|
||
1B9D129C000
|
heap
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
7FF5ED849000
|
unkown
|
page readonly
|
||
54E000
|
heap
|
page read and write
|
||
7FFD9BDF0000
|
trusted library allocation
|
page execute and read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
1B9D135E000
|
heap
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
C503000
|
unkown
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
1B9B934E000
|
trusted library allocation
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
3179000
|
trusted library allocation
|
page read and write
|
||
308A000
|
stack
|
page read and write
|
||
2E49F8F8000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
303A000
|
stack
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
4908000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3200000
|
trusted library allocation
|
page read and write
|
||
3112000
|
trusted library allocation
|
page read and write
|
||
33F6000
|
heap
|
page read and write
|
||
29A2000
|
trusted library allocation
|
page read and write
|
||
2B1E000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
2850000
|
trusted library allocation
|
page read and write
|
||
1E002B2E000
|
trusted library allocation
|
page read and write
|
||
3BCFBFE000
|
stack
|
page read and write
|
||
29F4000
|
trusted library allocation
|
page read and write
|
||
CB53000
|
unkown
|
page read and write
|
||
37F9000
|
unkown
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
33E5000
|
heap
|
page read and write
|
||
54A9000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
7FF5ED5EB000
|
unkown
|
page readonly
|
||
1E01A98C000
|
heap
|
page read and write
|
||
7DF4F3031000
|
unkown
|
page execute read
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
2B22000
|
trusted library allocation
|
page read and write
|
||
1B9B938D000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
6C850000
|
unkown
|
page readonly
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
A09D000
|
stack
|
page read and write
|
||
190000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
29B6000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
29BB000
|
trusted library allocation
|
page read and write
|
||
2AA5000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
33FC000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FF71C7E6000
|
unkown
|
page readonly
|
||
F682000
|
unkown
|
page read and write
|
||
7FF64167D000
|
unkown
|
page readonly
|
||
2B3B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD60000
|
trusted library allocation
|
page read and write
|
||
9885000
|
unkown
|
page read and write
|
||
1B9B7125000
|
heap
|
page read and write
|
||
29B1000
|
trusted library allocation
|
page read and write
|
||
AB5B000
|
unkown
|
page read and write
|
||
7FF64167D000
|
unkown
|
page readonly
|
||
7FF71C0E0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3125000
|
trusted library allocation
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
65B000
|
heap
|
page read and write
|
||
9590000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
24BF000
|
stack
|
page read and write
|
||
896B000
|
stack
|
page read and write
|
||
5BDE000
|
stack
|
page read and write
|
||
4C4B000
|
unkown
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
7FF5ED92C000
|
unkown
|
page readonly
|
||
17A3DEAA000
|
heap
|
page read and write
|
||
7FF64167D000
|
unkown
|
page readonly
|
||
7DA0000
|
unkown
|
page read and write
|
||
2A9C000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
58B8000
|
trusted library allocation
|
page read and write
|
||
4BE3000
|
unkown
|
page read and write
|
||
C0001A4000
|
direct allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
54DE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
20E05FD000
|
stack
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
7FF5ED503000
|
unkown
|
page readonly
|
||
20017A35000
|
heap
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
A391000
|
unkown
|
page read and write
|
||
315E000
|
trusted library allocation
|
page read and write
|
||
968B000
|
unkown
|
page read and write
|
||
7FF5ED59E000
|
unkown
|
page readonly
|
||
2E4A11E2000
|
heap
|
page read and write
|
||
7FF5ED7F1000
|
unkown
|
page readonly
|
||
7FFD9BD70000
|
trusted library allocation
|
page read and write
|
||
3791000
|
unkown
|
page read and write
|
||
1B9D110D000
|
heap
|
page read and write
|
||
C00003D000
|
direct allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
8208000
|
stack
|
page read and write
|
||
1E002BB2000
|
trusted library allocation
|
page read and write
|
||
7FF5ED40D000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
3219000
|
trusted library allocation
|
page read and write
|
||
3C70000
|
direct allocation
|
page execute and read and write
|
||
7FF6416E2000
|
unkown
|
page write copy
|
||
3124000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
BAF9000
|
stack
|
page read and write
|
||
24EF000
|
stack
|
page read and write
|
||
3184000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
445000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
FA42000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
55F2000
|
heap
|
page read and write
|
||
76C0000
|
unkown
|
page read and write
|
||
F8EA000
|
unkown
|
page read and write
|
||
1380000
|
unkown
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
54A5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1B9B9334000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7FF5ED286000
|
unkown
|
page readonly
|
||
15F3A4CC000
|
heap
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
1E0028C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
C00017E000
|
direct allocation
|
page read and write
|
||
785B000
|
unkown
|
page read and write
|
||
369C000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
2B33000
|
trusted library allocation
|
page read and write
|
||
180000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
316F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1A13FE000
|
stack
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
2AFC000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7FF5EDA76000
|
unkown
|
page readonly
|
||
404000
|
unkown
|
page execute and write copy
|
||
2A97000
|
trusted library allocation
|
page read and write
|
||
C54A000
|
unkown
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
3401000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
3163000
|
trusted library allocation
|
page read and write
|
||
7FF5ED73D000
|
unkown
|
page readonly
|
||
3400000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
31A4000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
55F2000
|
heap
|
page read and write
|
||
ED19DFE000
|
stack
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF71C7BA000
|
unkown
|
page write copy
|
||
2A51000
|
trusted library allocation
|
page read and write
|
||
1FBFFC77000
|
direct allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
319D000
|
trusted library allocation
|
page read and write
|
||
7FF5ED800000
|
unkown
|
page readonly
|
||
2E49F800000
|
heap
|
page read and write
|
||
7FF71C0DE000
|
unkown
|
page write copy
|
||
C0002E0000
|
direct allocation
|
page read and write
|
||
2B8B000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
9C80000
|
unkown
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2AC1000
|
trusted library allocation
|
page read and write
|
||
61B000
|
heap
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
2B22000
|
trusted library allocation
|
page read and write
|
||
1A17FD000
|
stack
|
page read and write
|
||
2B6C000
|
trusted library allocation
|
page read and write
|
||
9C80000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1FBFFEB0000
|
direct allocation
|
page read and write
|
||
66F000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
7FFD9BD50000
|
trusted library allocation
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
54FC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
319A000
|
trusted library allocation
|
page read and write
|
||
3184000
|
trusted library allocation
|
page read and write
|
||
1B9B9FAA000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
3403000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2AEA000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2A75000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
54EC000
|
trusted library allocation
|
page read and write
|
||
7FF5ED62F000
|
unkown
|
page readonly
|
||
321B000
|
trusted library allocation
|
page read and write
|
||
340D000
|
heap
|
page read and write
|
||
1380000
|
unkown
|
page read and write
|
||
1380000
|
unkown
|
page read and write
|
||
2AFB000
|
trusted library allocation
|
page read and write
|
||
8210000
|
unkown
|
page read and write
|
||
1B9B932A000
|
trusted library allocation
|
page read and write
|
||
2AE2000
|
trusted library allocation
|
page read and write
|
||
C000380000
|
direct allocation
|
page read and write
|
||
548F000
|
stack
|
page read and write
|
||
1E00269E000
|
trusted library allocation
|
page read and write
|
||
7FF5ED850000
|
unkown
|
page readonly
|
||
1B9B8FE5000
|
trusted library allocation
|
page read and write
|
||
1E0026A2000
|
trusted library allocation
|
page read and write
|
||
8BEE000
|
stack
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7FF5ED5C5000
|
unkown
|
page readonly
|
||
7DA0000
|
unkown
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
4E86000
|
trusted library allocation
|
page read and write
|
||
29FD000
|
trusted library allocation
|
page read and write
|
||
9875000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3147000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7FFD9BE50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute and write copy
|
||
3400000
|
unkown
|
page read and write
|
||
55A1000
|
heap
|
page read and write
|
||
2B91000
|
trusted library allocation
|
page read and write
|
||
282F000
|
stack
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
29EF000
|
trusted library allocation
|
page read and write
|
||
2AB3000
|
trusted library allocation
|
page read and write
|
||
9881000
|
unkown
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
30FB000
|
trusted library allocation
|
page read and write
|
||
ED19CFF000
|
stack
|
page read and write
|
||
A11F000
|
stack
|
page read and write
|
||
7FF6415F1000
|
unkown
|
page execute read
|
||
7FF5ED853000
|
unkown
|
page readonly
|
||
1B9D0FE0000
|
trusted library allocation
|
page read and write
|
||
F6D0DFE000
|
stack
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7FF5ED418000
|
unkown
|
page readonly
|
||
53F000
|
heap
|
page read and write
|
||
7FF71C173000
|
unkown
|
page write copy
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
392C000
|
trusted library allocation
|
page read and write
|
||
311B000
|
trusted library allocation
|
page read and write
|
||
7FF5ED697000
|
unkown
|
page readonly
|
||
1B9C9254000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
B190000
|
unkown
|
page read and write
|
||
B629000
|
stack
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
1E000470000
|
heap
|
page read and write
|
||
726000
|
heap
|
page read and write
|
||
184D9C90000
|
heap
|
page read and write
|
||
315B000
|
trusted library allocation
|
page read and write
|
||
E2000
|
trusted library allocation
|
page read and write
|
||
339B000
|
heap
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
321F000
|
trusted library allocation
|
page read and write
|
||
1E0026DD000
|
trusted library allocation
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
1FBFF170000
|
direct allocation
|
page read and write
|
||
200179B0000
|
heap
|
page read and write
|
||
2B18000
|
trusted library allocation
|
page read and write
|
||
7FF5ED8B4000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3157000
|
trusted library allocation
|
page read and write
|
||
3207000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
311B000
|
trusted library allocation
|
page read and write
|
||
2E4A1231000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3FC1000
|
unclassified section
|
page readonly
|
||
C000122000
|
direct allocation
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
2A7D000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
C92D000
|
unkown
|
page read and write
|
||
7FAEB23000
|
stack
|
page read and write
|
||
C0000
|
trusted library allocation
|
page read and write
|
||
2A61000
|
trusted library allocation
|
page read and write
|
||
4E8B000
|
trusted library allocation
|
page read and write
|
||
1B9D1057000
|
heap
|
page execute and read and write
|
||
2AF4000
|
trusted library allocation
|
page read and write
|
||
7DF4C2050000
|
trusted library allocation
|
page execute and read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
9E6C000
|
stack
|
page read and write
|
||
2A9A000
|
trusted library allocation
|
page read and write
|
||
200179F0000
|
heap
|
page read and write
|
||
3184000
|
trusted library allocation
|
page read and write
|
||
1FBFFBF0000
|
direct allocation
|
page read and write
|
||
1B9B88D0000
|
heap
|
page read and write
|
||
7FF5ED674000
|
unkown
|
page readonly
|
||
37BD000
|
unkown
|
page read and write
|
||
54E3000
|
trusted library allocation
|
page read and write
|
||
2121000
|
heap
|
page read and write
|
||
2AAD000
|
trusted library allocation
|
page read and write
|
||
C6CF000
|
unkown
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
7FFD9B9CB000
|
trusted library allocation
|
page execute and read and write
|
||
2B1F000
|
trusted library allocation
|
page read and write
|
||
3114000
|
trusted library allocation
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
2BC6000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
unkown
|
page readonly
|
||
2B8C000
|
trusted library allocation
|
page read and write
|
||
1E002280000
|
heap
|
page execute and read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
17A3DEA0000
|
heap
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
C0000F4000
|
direct allocation
|
page read and write
|
||
3201000
|
trusted library allocation
|
page read and write
|
||
7FB018C000
|
stack
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
1E01D8F8000
|
heap
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
C000026000
|
direct allocation
|
page read and write
|
||
3377000
|
heap
|
page read and write
|
||
3147000
|
trusted library allocation
|
page read and write
|
||
340C000
|
heap
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
1B9B6F41000
|
heap
|
page read and write
|
||
7FF64167D000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
2B83000
|
trusted library allocation
|
page read and write
|
||
2B6D000
|
trusted library allocation
|
page read and write
|
||
9590000
|
unkown
|
page read and write
|
||
4FE0000
|
remote allocation
|
page read and write
|
||
2E49F8CC000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2B8A000
|
trusted library allocation
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
3137000
|
trusted library allocation
|
page read and write
|
||
1E01BEFF000
|
heap
|
page read and write
|
||
1E0021D0000
|
heap
|
page read and write
|
||
2A0F000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
1B9D1072000
|
heap
|
page read and write
|
||
2853000
|
trusted library allocation
|
page read and write
|
||
1E000660000
|
heap
|
page read and write
|
||
4C1E000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2AB4000
|
trusted library allocation
|
page read and write
|
||
522000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7900000
|
unkown
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
6C851000
|
unkown
|
page execute read
|
||
7FF5ED7C4000
|
unkown
|
page readonly
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
320B000
|
trusted library allocation
|
page read and write
|
||
2B75000
|
trusted library allocation
|
page read and write
|
||
33D3000
|
heap
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
2E49F7D0000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
1380000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
312C000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
55A7000
|
trusted library allocation
|
page read and write
|
||
C000036000
|
direct allocation
|
page read and write
|
||
552D000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1B9BA748000
|
trusted library allocation
|
page read and write
|
||
3229000
|
trusted library allocation
|
page read and write
|
||
1B9D13AC000
|
heap
|
page read and write
|
||
7FF5ED8E2000
|
unkown
|
page readonly
|
||
521000
|
heap
|
page read and write
|
||
2B37000
|
trusted library allocation
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
33D5000
|
heap
|
page read and write
|
||
1B9B88F0000
|
trusted library section
|
page read and write
|
||
9977000
|
unkown
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
1E000572000
|
heap
|
page read and write
|
||
29A6000
|
trusted library allocation
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
13A0000
|
unkown
|
page read and write
|
||
2A02000
|
trusted library allocation
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
5BEC000
|
stack
|
page read and write
|
||
7FF5ED265000
|
unkown
|
page readonly
|
||
29EA000
|
trusted library allocation
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
2A77000
|
trusted library allocation
|
page read and write
|
||
34D2000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1FBFFF00000
|
direct allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
54D9000
|
trusted library allocation
|
page read and write
|
||
6C8C0000
|
unkown
|
page readonly
|
||
7FFD9BE20000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FAF1F6000
|
stack
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
2BA1000
|
trusted library allocation
|
page read and write
|
||
54F7000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
54CD000
|
trusted library allocation
|
page read and write
|
||
29F3000
|
trusted library allocation
|
page read and write
|
||
1B9D1360000
|
heap
|
page read and write
|
||
7FFD9BE90000
|
trusted library allocation
|
page execute and read and write
|
||
1E01C1A3000
|
heap
|
page read and write
|
||
2E49F87C000
|
heap
|
page read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
7FF5ED48A000
|
unkown
|
page readonly
|
||
9B20000
|
unkown
|
page read and write
|
||
522000
|
heap
|
page read and write
|
||
7FF5ED975000
|
unkown
|
page readonly
|
||
3151000
|
unkown
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
7FAF37F000
|
stack
|
page read and write
|
||
1FBFFEA1000
|
direct allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
7FFD9BED0000
|
trusted library allocation
|
page read and write
|
||
55F2000
|
heap
|
page read and write
|
||
C000185000
|
direct allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
4E84000
|
trusted library allocation
|
page read and write
|
||
C0000F6000
|
direct allocation
|
page read and write
|
||
3BCBFFE000
|
stack
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1380000
|
unkown
|
page read and write
|
||
340C000
|
heap
|
page read and write
|
||
1E0020B0000
|
heap
|
page read and write
|
||
7FF5ED55F000
|
unkown
|
page readonly
|
||
C000059000
|
direct allocation
|
page read and write
|
||
6CD000
|
heap
|
page read and write
|
||
AF8D000
|
stack
|
page read and write
|
||
7DF4F3040000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
3377000
|
heap
|
page read and write
|
||
3117000
|
trusted library allocation
|
page read and write
|
||
33D3000
|
heap
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
unclassified section
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
3BCF7FD000
|
stack
|
page read and write
|
||
C00035A000
|
direct allocation
|
page read and write
|
||
A491000
|
unkown
|
page read and write
|
||
4BC9000
|
unkown
|
page read and write
|
||
2A49000
|
trusted library allocation
|
page read and write
|
||
2A79000
|
trusted library allocation
|
page read and write
|
||
1E01C1FA000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
29A0000
|
trusted library allocation
|
page read and write
|
||
29B9000
|
trusted library allocation
|
page read and write
|
||
3385000
|
heap
|
page read and write
|
||
3403000
|
heap
|
page read and write
|
||
2AE4000
|
trusted library allocation
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
7FF5ED885000
|
unkown
|
page readonly
|
||
7FFD9BEC0000
|
trusted library allocation
|
page read and write
|
||
1B9B9DB0000
|
trusted library allocation
|
page read and write
|
||
C00036C000
|
direct allocation
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
7FF6415F1000
|
unkown
|
page execute read
|
||
7DA0000
|
unkown
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
7FF5ED872000
|
unkown
|
page readonly
|
||
17A3DEC5000
|
heap
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
1E01A98E000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
A323000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3905000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
8EFA000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3213000
|
trusted library allocation
|
page read and write
|
||
33FC000
|
heap
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
2A5F000
|
trusted library allocation
|
page read and write
|
||
C0002EA000
|
direct allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9D9000
|
unkown
|
page readonly
|
||
255C000
|
stack
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1B9BA785000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
1E002250000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
15F3BFD0000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
1E002291000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7863000
|
unkown
|
page read and write
|
||
7884000
|
unkown
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1380000
|
unkown
|
page read and write
|
||
C000346000
|
direct allocation
|
page read and write
|
||
C000292000
|
direct allocation
|
page read and write
|
||
7FF5ED9D6000
|
unkown
|
page readonly
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
3147000
|
trusted library allocation
|
page read and write
|
||
334B000
|
heap
|
page read and write
|
||
7FFD9BD50000
|
trusted library allocation
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
15F55A80000
|
heap
|
page read and write
|
||
3391000
|
heap
|
page read and write
|
||
2A548630000
|
heap
|
page read and write
|
||
7EF000
|
stack
|
page read and write
|
||
4EA1000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9AE000
|
unkown
|
page readonly
|
||
2A83000
|
trusted library allocation
|
page read and write
|
||
315E000
|
trusted library allocation
|
page read and write
|
||
56FE000
|
stack
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
C0004DE000
|
direct allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
3129000
|
trusted library allocation
|
page read and write
|
||
15F4BFF1000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
1E01230A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB6B000
|
trusted library allocation
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
C08A000
|
stack
|
page read and write
|
||
1FBFEF48000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2B20000
|
trusted library allocation
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
51E000
|
stack
|
page read and write
|
||
3103000
|
trusted library allocation
|
page read and write
|
||
F746000
|
unkown
|
page read and write
|
||
184D9D95000
|
heap
|
page read and write
|
||
7FF71C7B6000
|
unkown
|
page read and write
|
||
C557000
|
unkown
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
299C000
|
trusted library allocation
|
page read and write
|
||
2A9F000
|
trusted library allocation
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
9A5B000
|
unkown
|
page read and write
|
||
2B16000
|
trusted library allocation
|
page read and write
|
||
33FA000
|
heap
|
page read and write
|
||
7FF71C7BA000
|
unkown
|
page write copy
|
||
9883000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3402000
|
heap
|
page read and write
|
||
3157000
|
trusted library allocation
|
page read and write
|
||
7FF5ED68C000
|
unkown
|
page readonly
|
||
53F000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
6C8C0000
|
unkown
|
page readonly
|
||
1370000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1B9D13C9000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
ED1A3FB000
|
stack
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
6481000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
7FF5ED5C1000
|
unkown
|
page readonly
|
||
7DF4F3061000
|
unkown
|
page execute read
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
7D00000
|
unkown
|
page readonly
|
||
691000
|
heap
|
page read and write
|
||
3229000
|
trusted library allocation
|
page read and write
|
||
5514000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
312A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF00000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
1E0026D2000
|
trusted library allocation
|
page read and write
|
||
1FBFEF30000
|
heap
|
page read and write
|
||
C0005DC000
|
direct allocation
|
page read and write
|
||
7FF5ED9ED000
|
unkown
|
page readonly
|
||
1B9B8DF0000
|
heap
|
page read and write
|
||
9C80000
|
unkown
|
page read and write
|
||
1380000
|
unkown
|
page read and write
|
||
A37B000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
3237000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
F2000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
1B9C9263000
|
trusted library allocation
|
page read and write
|
||
1E002A5C000
|
trusted library allocation
|
page read and write
|
||
5D01000
|
heap
|
page read and write
|
||
7FF5ED933000
|
unkown
|
page readonly
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
15F3A4FD000
|
heap
|
page read and write
|
||
54D6000
|
trusted library allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7FF5ED42B000
|
unkown
|
page readonly
|
||
1B9BA862000
|
trusted library allocation
|
page read and write
|
||
7FF5ED2A4000
|
unkown
|
page readonly
|
||
3901000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD20000
|
trusted library allocation
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
1380000
|
unkown
|
page read and write
|
||
31A7000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
54B3000
|
trusted library allocation
|
page read and write
|
||
7FF5ED5F7000
|
unkown
|
page readonly
|
||
30F6000
|
trusted library allocation
|
page read and write
|
||
7FF6415F1000
|
unkown
|
page execute read
|
||
CA20000
|
unkown
|
page read and write
|
||
1FBFFD44000
|
direct allocation
|
page read and write
|
||
2B02000
|
trusted library allocation
|
page read and write
|
||
C000138000
|
direct allocation
|
page read and write
|
||
55A1000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
4C34000
|
unkown
|
page read and write
|
||
599F000
|
stack
|
page read and write
|
||
C7C5000
|
unkown
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7FF5ED4B0000
|
unkown
|
page readonly
|
||
7FF5ED4BB000
|
unkown
|
page readonly
|
||
17A3E090000
|
heap
|
page read and write
|
||
C49E000
|
stack
|
page read and write
|
||
29C2000
|
trusted library allocation
|
page read and write
|
||
1E0004CC000
|
heap
|
page read and write
|
||
33ED000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
2C40000
|
remote allocation
|
page read and write
|
||
7FF5ED844000
|
unkown
|
page readonly
|
||
1B9B6F87000
|
heap
|
page read and write
|
||
2B4F000
|
trusted library allocation
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
2B4A000
|
trusted library allocation
|
page read and write
|
||
2AB9000
|
trusted library allocation
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
2AD2000
|
trusted library allocation
|
page read and write
|
||
7FF5ED97E000
|
unkown
|
page readonly
|
||
33FA000
|
heap
|
page read and write
|
||
C000168000
|
direct allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
315A000
|
trusted library allocation
|
page read and write
|
||
1FBFF110000
|
heap
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
7FF5ED669000
|
unkown
|
page readonly
|
||
7DA0000
|
unkown
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
90813FF000
|
stack
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
7FF71C160000
|
unkown
|
page write copy
|
||
A502000
|
unkown
|
page read and write
|
||
7FF5ED279000
|
unkown
|
page readonly
|
||
160000
|
heap
|
page execute and read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
7FF5ED5CE000
|
unkown
|
page readonly
|
||
1380000
|
unkown
|
page read and write
|
||
2B57000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
20017C85000
|
heap
|
page read and write
|
||
B170000
|
unkown
|
page readonly
|
||
786B000
|
unkown
|
page read and write
|
||
2B63000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
9877000
|
unkown
|
page read and write
|
||
1E01D886000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
4E1F000
|
stack
|
page read and write
|
||
2ADF000
|
trusted library allocation
|
page read and write
|
||
1E0026DA000
|
trusted library allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
5F7E000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED7CF000
|
unkown
|
page readonly
|
||
4EB2000
|
trusted library allocation
|
page read and write
|
||
8FB9000
|
stack
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
7FF5ED26E000
|
unkown
|
page readonly
|
||
7FFD9BD77000
|
trusted library allocation
|
page read and write
|
||
33FC000
|
heap
|
page read and write
|
||
B140000
|
unkown
|
page readonly
|
||
7859000
|
unkown
|
page read and write
|
||
1A0FFE000
|
stack
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
2A19000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF5ED349000
|
unkown
|
page readonly
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
1B9BA6FE000
|
trusted library allocation
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7FF5ED91A000
|
unkown
|
page readonly
|
||
C000000000
|
direct allocation
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
2AF9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1E0026BF000
|
trusted library allocation
|
page read and write
|
||
78A0000
|
unkown
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
51D000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
322B000
|
trusted library allocation
|
page read and write
|
||
310F000
|
trusted library allocation
|
page read and write
|
||
7FF5ED28E000
|
unkown
|
page readonly
|
||
1E0029E9000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
340D000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
61A0000
|
heap
|
page read and write
|
||
7FFD9BB4A000
|
trusted library allocation
|
page read and write
|
||
3159000
|
trusted library allocation
|
page read and write
|
||
C512000
|
unkown
|
page read and write
|
||
1E0021C0000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
AF0C000
|
stack
|
page read and write
|
||
2A91000
|
trusted library allocation
|
page read and write
|
||
4E1F000
|
stack
|
page read and write
|
||
2A98000
|
trusted library allocation
|
page read and write
|
||
37AC000
|
unkown
|
page read and write
|
||
14CA463A000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
1B9D1050000
|
heap
|
page execute and read and write
|
||
7FF5ED64F000
|
unkown
|
page readonly
|
||
200179C0000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
3179000
|
trusted library allocation
|
page read and write
|
||
285C000
|
trusted library allocation
|
page execute and read and write
|
||
208F000
|
stack
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
33D4000
|
heap
|
page read and write
|
||
3BCEBFC000
|
stack
|
page read and write
|
||
3835000
|
trusted library allocation
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
54D1000
|
trusted library allocation
|
page read and write
|
||
7FAEF7D000
|
stack
|
page read and write
|
||
55A1000
|
heap
|
page read and write
|
||
2B5E000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7FF5ED342000
|
unkown
|
page readonly
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
34E9000
|
stack
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
627C000
|
stack
|
page read and write
|
||
60000
|
direct allocation
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
9660000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
30FF000
|
trusted library allocation
|
page read and write
|
||
1B9D111D000
|
heap
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
13A0000
|
unkown
|
page read and write
|
||
5945000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
29BF000
|
trusted library allocation
|
page read and write
|
||
15F3A780000
|
heap
|
page read and write
|
||
7FF5ED810000
|
unkown
|
page readonly
|
||
2E49F8D9000
|
heap
|
page read and write
|
||
7FF5ED3D6000
|
unkown
|
page readonly
|
||
7FFD9BE70000
|
trusted library allocation
|
page read and write
|
||
4C18000
|
unkown
|
page read and write
|
||
33E3000
|
heap
|
page read and write
|
||
340C000
|
heap
|
page read and write
|
||
C000309000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2B74000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED68F000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
B22B000
|
stack
|
page read and write
|
||
CBB9000
|
unkown
|
page read and write
|
||
2BA4000
|
trusted library allocation
|
page read and write
|
||
3184000
|
trusted library allocation
|
page read and write
|
||
1490000
|
unkown
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
9929000
|
unkown
|
page read and write
|
||
1E000680000
|
heap
|
page read and write
|
||
55B000
|
heap
|
page read and write
|
||
7FF5ED33F000
|
unkown
|
page readonly
|
||
7FFE000
|
stack
|
page read and write
|
||
F8E0000
|
unkown
|
page read and write
|
||
7FF5ED4EF000
|
unkown
|
page readonly
|
||
1C0000
|
heap
|
page read and write
|
||
2BA6000
|
trusted library allocation
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3210000
|
unkown
|
page read and write
|
||
15F3A4CE000
|
heap
|
page read and write
|
||
2BBC000
|
trusted library allocation
|
page read and write
|
||
340D000
|
heap
|
page read and write
|
||
54ED000
|
trusted library allocation
|
page read and write
|
||
33E5000
|
heap
|
page read and write
|
||
1FBFF17D000
|
direct allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3460000
|
unkown
|
page read and write
|
||
3402000
|
heap
|
page read and write
|
||
1E01C180000
|
heap
|
page read and write
|
||
C8E1000
|
unkown
|
page read and write
|
||
1FBFFDC0000
|
direct allocation
|
page read and write
|
||
7FF5ED205000
|
unkown
|
page readonly
|
||
C0003AC000
|
direct allocation
|
page read and write
|
||
4908000
|
trusted library allocation
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
2B71000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
33EA000
|
heap
|
page read and write
|
||
4B78000
|
unkown
|
page read and write
|
||
7FF5ED781000
|
unkown
|
page readonly
|
||
BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED4F3000
|
unkown
|
page readonly
|
||
7847000
|
unkown
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
1B9BA58A000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2A3B000
|
trusted library allocation
|
page read and write
|
||
33FA000
|
heap
|
page read and write
|
||
2B48000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
275A000
|
stack
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
7A34000
|
unkown
|
page read and write
|
||
2A75000
|
trusted library allocation
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
5648000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7FF5ED928000
|
unkown
|
page readonly
|
||
2AFF000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
7FF5ED1FF000
|
unkown
|
page readonly
|
||
F74B000
|
unkown
|
page read and write
|
||
5514000
|
trusted library allocation
|
page read and write
|
||
33EB000
|
heap
|
page read and write
|
||
7FF71BC40000
|
unkown
|
page readonly
|
||
54E000
|
heap
|
page read and write
|
||
3BD0D8E000
|
stack
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
C6D8000
|
unkown
|
page read and write
|
||
1B9B8E0B000
|
heap
|
page read and write
|
||
5641000
|
unkown
|
page read and write
|
||
1B9B9188000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
6C920000
|
unkown
|
page readonly
|
||
340C000
|
heap
|
page read and write
|
||
54FE000
|
trusted library allocation
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7FB020B000
|
stack
|
page read and write
|
||
1FBFFD3E000
|
direct allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
321E000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
29D2000
|
trusted library allocation
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
55F0000
|
heap
|
page read and write
|
||
15F3A53A000
|
heap
|
page read and write
|
||
7FF5ED495000
|
unkown
|
page readonly
|
||
54E000
|
heap
|
page read and write
|
||
1B9B9391000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
7FF5ED625000
|
unkown
|
page readonly
|
||
7FF5ED779000
|
unkown
|
page readonly
|
||
2A2E000
|
trusted library allocation
|
page read and write
|
||
7FF71C15F000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3188000
|
trusted library allocation
|
page read and write
|
||
4ECD000
|
stack
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
2E49F6F0000
|
heap
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
321E000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3157000
|
trusted library allocation
|
page read and write
|
||
1A0BFE000
|
stack
|
page read and write
|
||
9590000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2AF8000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
unkown
|
page read and write
|
||
3BCC7FE000
|
stack
|
page read and write
|
||
ED19AFF000
|
stack
|
page read and write
|
||
1E000733000
|
heap
|
page execute and read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
2A54A0A0000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
534000
|
heap
|
page read and write
|
||
37F2000
|
unkown
|
page read and write
|
||
7FF5ED644000
|
unkown
|
page readonly
|
||
BD000
|
trusted library allocation
|
page execute and read and write
|
||
2BA7000
|
trusted library allocation
|
page read and write
|
||
7FF5ED735000
|
unkown
|
page readonly
|
||
E4A0000
|
unkown
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
96DF000
|
unkown
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
F8E4000
|
unkown
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
1E01D880000
|
heap
|
page read and write
|
||
C57F000
|
unkown
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
7FFD9B9BB000
|
trusted library allocation
|
page execute and read and write
|
||
1FBFF174000
|
direct allocation
|
page read and write
|
||
982D000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
7FF5ED5C9000
|
unkown
|
page readonly
|
||
3417000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
C000024000
|
direct allocation
|
page read and write
|
||
ED1A2FE000
|
stack
|
page read and write
|
||
2E4A1310000
|
heap
|
page read and write
|
||
1FBFF155000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
4B8B000
|
unkown
|
page read and write
|
||
C00005D000
|
direct allocation
|
page read and write
|
||
7FF71C73B000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
2A0C000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2A31000
|
trusted library allocation
|
page read and write
|
||
1FBFFCF0000
|
direct allocation
|
page read and write
|
||
54F4000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
534000
|
heap
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
2B06000
|
trusted library allocation
|
page read and write
|
||
54E9000
|
trusted library allocation
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
55F2000
|
heap
|
page read and write
|
||
313C000
|
trusted library allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
6C8C1000
|
unkown
|
page execute read
|
||
54EC000
|
trusted library allocation
|
page read and write
|
||
2B7A000
|
trusted library allocation
|
page read and write
|
||
5535000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
339A000
|
heap
|
page read and write
|
||
7FF5ED692000
|
unkown
|
page readonly
|
||
5525000
|
trusted library allocation
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
29DC000
|
trusted library allocation
|
page read and write
|
||
7E50000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
3BCCBFA000
|
stack
|
page read and write
|
||
7FF5ED41C000
|
unkown
|
page readonly
|
||
7FF5ED9CA000
|
unkown
|
page readonly
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
1B9B9338000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FFD9BD3C000
|
trusted library allocation
|
page read and write
|
||
37A8000
|
unkown
|
page read and write
|
||
7FFD9BEB0000
|
trusted library allocation
|
page read and write
|
||
6040000
|
trusted library allocation
|
page read and write
|
||
7FF5EDA14000
|
unkown
|
page readonly
|
||
7FF5ED9C6000
|
unkown
|
page readonly
|
||
53F000
|
heap
|
page read and write
|
||
B650000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
7FAEBAE000
|
stack
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
14CA4770000
|
heap
|
page read and write
|
||
1FBFFD15000
|
direct allocation
|
page read and write
|
||
315A000
|
trusted library allocation
|
page read and write
|
||
3118000
|
trusted library allocation
|
page read and write
|
||
29F1000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2A54878B000
|
heap
|
page read and write
|
||
2A2A000
|
trusted library allocation
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
7FFD9BDE2000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
15F54906000
|
heap
|
page read and write
|
||
15F3A6D0000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
9560000
|
unkown
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
3147000
|
trusted library allocation
|
page read and write
|
||
340C000
|
heap
|
page read and write
|
||
A479000
|
unkown
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
90815FF000
|
stack
|
page read and write
|
||
691000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2BA9000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
2ACF000
|
trusted library allocation
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
29A3000
|
trusted library allocation
|
page read and write
|
||
23EE000
|
stack
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
2B95000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1E01C20E000
|
heap
|
page read and write
|
||
2A4A000
|
trusted library allocation
|
page read and write
|
||
2E49F8CE000
|
heap
|
page read and write
|
||
14CA48C0000
|
heap
|
page read and write
|
||
2E49F8EB000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
9C80000
|
unkown
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
C52C000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
551D000
|
trusted library allocation
|
page read and write
|
||
312A000
|
trusted library allocation
|
page read and write
|
||
7FAF07E000
|
stack
|
page read and write
|
||
F703000
|
unkown
|
page read and write
|
||
30FF000
|
trusted library allocation
|
page read and write
|
||
1FBFFBFC000
|
direct allocation
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
3220000
|
unkown
|
page readonly
|
||
7FF5ED39E000
|
unkown
|
page readonly
|
||
C6BF000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2B67000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
unkown
|
page read and write
|
||
3237000
|
trusted library allocation
|
page read and write
|
||
29D3000
|
trusted library allocation
|
page read and write
|
||
1FBFFC21000
|
direct allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3966000
|
trusted library allocation
|
page read and write
|
||
1B9B6F85000
|
heap
|
page read and write
|
||
33FC000
|
heap
|
page read and write
|
||
ED199FE000
|
stack
|
page read and write
|
||
1B9B6EE0000
|
heap
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
7DF4F3041000
|
unkown
|
page execute read
|
||
3010000
|
unkown
|
page read and write
|
||
A327000
|
unkown
|
page read and write
|
||
2AFE000
|
trusted library allocation
|
page read and write
|
||
1B9BA5AC000
|
trusted library allocation
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
3210000
|
trusted library allocation
|
page read and write
|
||
7FF5ED3D0000
|
unkown
|
page readonly
|
||
7FFD9BEA0000
|
trusted library allocation
|
page read and write
|
||
331D000
|
stack
|
page read and write
|
||
AAF2000
|
unkown
|
page read and write
|
||
2A9D000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9C8000
|
unkown
|
page readonly
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
4B93000
|
unkown
|
page read and write
|
||
2B05000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
2E49F8CC000
|
heap
|
page read and write
|
||
1B9BAF00000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
90817FF000
|
stack
|
page read and write
|
||
13A0000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
ED1A0FE000
|
stack
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
550C000
|
trusted library allocation
|
page read and write
|
||
C6F8000
|
unkown
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
1E002060000
|
trusted library section
|
page readonly
|
||
A364000
|
unkown
|
page read and write
|
||
5D01000
|
heap
|
page read and write
|
||
37D2000
|
unkown
|
page read and write
|
||
1E0026D6000
|
trusted library allocation
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
55F2000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
A494000
|
unkown
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
3118000
|
trusted library allocation
|
page read and write
|
||
33CE000
|
heap
|
page read and write
|
||
2B39000
|
trusted library allocation
|
page read and write
|
||
2BC2000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2A7F000
|
trusted library allocation
|
page read and write
|
||
C0002A4000
|
direct allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF5ED534000
|
unkown
|
page readonly
|
||
7FFD9BEF0000
|
trusted library allocation
|
page execute and read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
C000392000
|
direct allocation
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
7FF5ED847000
|
unkown
|
page readonly
|
||
9B20000
|
unkown
|
page read and write
|
||
533000
|
heap
|
page read and write
|
||
7CD0000
|
unkown
|
page read and write
|
||
3403000
|
heap
|
page read and write
|
||
C0008E6000
|
direct allocation
|
page read and write
|
||
4BA6000
|
unkown
|
page read and write
|
||
7FF5ED87D000
|
unkown
|
page readonly
|
||
5A0000
|
direct allocation
|
page execute and read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
1B9B8DE0000
|
trusted library allocation
|
page read and write
|
||
30F7000
|
trusted library allocation
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
313B000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
1E0122A9000
|
trusted library allocation
|
page read and write
|
||
2E49F8B6000
|
heap
|
page read and write
|
||
50B000
|
heap
|
page read and write
|
||
9871000
|
unkown
|
page read and write
|
||
1380000
|
unkown
|
page read and write
|
||
3239000
|
trusted library allocation
|
page read and write
|
||
2B08000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
3365000
|
heap
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF71C7B6000
|
unkown
|
page write copy
|
||
A37D000
|
unkown
|
page read and write
|
||
AAD1000
|
unkown
|
page read and write
|
||
7FF5ED4C6000
|
unkown
|
page readonly
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
2B24000
|
trusted library allocation
|
page read and write
|
||
694000
|
heap
|
page read and write
|
||
1A07F5000
|
stack
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
7FF5ED1CB000
|
unkown
|
page readonly
|
||
1440000
|
unkown
|
page read and write
|
||
7FF5ED451000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
2A04000
|
trusted library allocation
|
page read and write
|
||
C00023A000
|
direct allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3129000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
2A4D000
|
trusted library allocation
|
page read and write
|
||
6C888000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
1E01A2C0000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
314A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD40000
|
trusted library allocation
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
55D8000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
5557000
|
stack
|
page read and write
|
||
2A4B000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7FFD9BE4B000
|
trusted library allocation
|
page read and write
|
||
C0003C4000
|
direct allocation
|
page read and write
|
||
54BD000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
29B5000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
unkown
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
C00095A000
|
direct allocation
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
7FF5ED449000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
5CEB000
|
stack
|
page read and write
|
||
17A3E1A4000
|
heap
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
7FF5ED7FD000
|
unkown
|
page readonly
|
||
C561000
|
unkown
|
page read and write
|
||
3219000
|
trusted library allocation
|
page read and write
|
||
3152000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
2AB2000
|
trusted library allocation
|
page read and write
|
||
4246000
|
trusted library allocation
|
page read and write
|
||
2A548740000
|
heap
|
page read and write
|
||
2AC9000
|
trusted library allocation
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
2B51000
|
trusted library allocation
|
page read and write
|
||
7FF5EDA0D000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
C6E3000
|
unkown
|
page read and write
|
||
9590000
|
unkown
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
C0003B8000
|
direct allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FB030E000
|
stack
|
page read and write
|
||
9139000
|
stack
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
7FF5ED3DA000
|
unkown
|
page readonly
|
||
355E000
|
stack
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7FF5EDA31000
|
unkown
|
page readonly
|
||
7FF5ED818000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
29EE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
C507000
|
unkown
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
2A2F000
|
trusted library allocation
|
page read and write
|
||
4E84000
|
trusted library allocation
|
page read and write
|
||
54DC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDE4000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
15F3A610000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C4000
|
trusted library allocation
|
page read and write
|
||
7FF5ED7D6000
|
unkown
|
page readonly
|
||
36D3000
|
stack
|
page read and write
|
||
7978000
|
unkown
|
page read and write
|
||
7FF5EDA11000
|
unkown
|
page readonly
|
||
4E50000
|
trusted library allocation
|
page execute and read and write
|
||
29C7000
|
trusted library allocation
|
page read and write
|
||
1B9B8940000
|
heap
|
page readonly
|
||
1E01D900000
|
heap
|
page read and write
|
||
7FAF0FD000
|
stack
|
page read and write
|
||
8740000
|
stack
|
page read and write
|
||
F902000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page read and write
|
||
2748000
|
stack
|
page read and write
|
||
1380000
|
unkown
|
page read and write
|
||
1B9B9654000
|
trusted library allocation
|
page read and write
|
||
3748000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
54C3000
|
trusted library allocation
|
page read and write
|
||
C857000
|
unkown
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
184D9D40000
|
heap
|
page read and write
|
||
7F30000
|
unkown
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
2DDB000
|
stack
|
page read and write
|
||
184D9D4B000
|
heap
|
page read and write
|
||
F784000
|
unkown
|
page read and write
|
||
1B9B8CD0000
|
trusted library allocation
|
page read and write
|
||
54FC000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
3403000
|
heap
|
page read and write
|
||
321D000
|
trusted library allocation
|
page read and write
|
||
8710000
|
unkown
|
page readonly
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
7FF5ED445000
|
unkown
|
page readonly
|
||
7DC0000
|
unkown
|
page read and write
|
||
1B9B6F5D000
|
heap
|
page read and write
|
||
1B9B6F8A000
|
heap
|
page read and write
|
||
33DF000
|
heap
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
36D5000
|
stack
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
311A000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
remote allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD30000
|
trusted library allocation
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
33F6000
|
heap
|
page read and write
|
||
3117000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7FFD9BB41000
|
trusted library allocation
|
page read and write
|
||
312F000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
7FAFEFF000
|
stack
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
F7000
|
trusted library allocation
|
page execute and read and write
|
||
320D000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
6C91E000
|
unkown
|
page read and write
|
||
2B8E000
|
trusted library allocation
|
page read and write
|
||
1E01BED0000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
6C8B0000
|
unkown
|
page readonly
|
||
7FFD9BD40000
|
trusted library allocation
|
page read and write
|
||
BDD0000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
1FBFF150000
|
heap
|
page read and write
|
||
7FF71C0D6000
|
unkown
|
page read and write
|
||
311C000
|
trusted library allocation
|
page read and write
|
||
B08D000
|
stack
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
34DA000
|
trusted library allocation
|
page read and write
|
||
9560000
|
unkown
|
page read and write
|
||
3229000
|
trusted library allocation
|
page read and write
|
||
7FF5ED750000
|
unkown
|
page readonly
|
||
B82A000
|
stack
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
299E000
|
trusted library allocation
|
page read and write
|
||
2E4A1110000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
9C80000
|
unkown
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
7FF5ED793000
|
unkown
|
page readonly
|
||
2B03000
|
trusted library allocation
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
7FF5ED956000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
2C40000
|
remote allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
2761000
|
unclassified section
|
page execute read
|
||
2A21000
|
trusted library allocation
|
page read and write
|
||
3820000
|
heap
|
page read and write
|
||
620000
|
trusted library allocation
|
page read and write
|
||
310D000
|
trusted library allocation
|
page read and write
|
||
1B9B933C000
|
trusted library allocation
|
page read and write
|
||
2A94000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7FF6415F1000
|
unkown
|
page execute read
|
||
54D6000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7FAEE7F000
|
stack
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
1B9B9E90000
|
trusted library allocation
|
page read and write
|
||
B5AE000
|
stack
|
page read and write
|
||
54EA000
|
trusted library allocation
|
page read and write
|
||
C000031000
|
direct allocation
|
page read and write
|
||
A19F000
|
stack
|
page read and write
|
||
7869000
|
unkown
|
page read and write
|
||
2A12000
|
trusted library allocation
|
page read and write
|
||
1B9B70D0000
|
heap
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
unkown
|
page read and write
|
||
7FF71C7E6000
|
unkown
|
page readonly
|
||
2B88000
|
trusted library allocation
|
page read and write
|
||
7FF71C0D4000
|
unkown
|
page read and write
|
||
33ED000
|
heap
|
page read and write
|
||
23CF000
|
stack
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7CC0000
|
unkown
|
page readonly
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B992000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3050000
|
remote allocation
|
page execute and read and write
|
||
534000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
A0000
|
trusted library allocation
|
page read and write
|
||
78AD000
|
unkown
|
page read and write
|
||
C0003C6000
|
direct allocation
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
97D4000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
54EC000
|
trusted library allocation
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
3123000
|
trusted library allocation
|
page read and write
|
||
B8C0000
|
unkown
|
page readonly
|
||
2AAE000
|
trusted library allocation
|
page read and write
|
||
2E4A1220000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7FF5ED8C6000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
321D000
|
trusted library allocation
|
page read and write
|
||
315A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7FFD9BDD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9FC000
|
trusted library allocation
|
page execute and read and write
|
||
2850000
|
trusted library allocation
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
22BE000
|
stack
|
page read and write
|
||
3124000
|
trusted library allocation
|
page read and write
|
||
2A5E000
|
trusted library allocation
|
page read and write
|
||
1B9D1180000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
7FF5ED8FF000
|
unkown
|
page readonly
|
||
7DB0000
|
unkown
|
page read and write
|
||
5566000
|
heap
|
page read and write
|
||
24C0000
|
direct allocation
|
page execute and read and write
|
||
1B9C9261000
|
trusted library allocation
|
page read and write
|
||
54FA000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
AADB000
|
unkown
|
page read and write
|
||
2999000
|
trusted library allocation
|
page read and write
|
||
9893000
|
unkown
|
page read and write
|
||
15F3BF30000
|
heap
|
page read and write
|
||
1E01C214000
|
heap
|
page read and write
|
||
29B3000
|
trusted library allocation
|
page read and write
|
||
33FF000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3118000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
1E002707000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
13A0000
|
unkown
|
page read and write
|
||
311B000
|
trusted library allocation
|
page read and write
|
||
7FF5ED806000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
9869000
|
unkown
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
1B9B931C000
|
trusted library allocation
|
page read and write
|
||
6CB000
|
heap
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
15F3A499000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2A7E000
|
trusted library allocation
|
page read and write
|
||
7CE0000
|
unkown
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
9C80000
|
unkown
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
2B19000
|
trusted library allocation
|
page read and write
|
||
54DC000
|
trusted library allocation
|
page read and write
|
||
1E0020A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD60000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
4E84000
|
trusted library allocation
|
page read and write
|
||
7FF5ED8A4000
|
unkown
|
page readonly
|
||
7FB028C000
|
stack
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
3212000
|
trusted library allocation
|
page read and write
|
||
15F3A590000
|
heap
|
page read and write
|
||
9A10000
|
unkown
|
page read and write
|
||
1B9B8985000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
ED1A1FF000
|
stack
|
page read and write
|
||
1B9D1060000
|
heap
|
page read and write
|
||
1380000
|
unkown
|
page read and write
|
||
1B9D13B8000
|
heap
|
page read and write
|
||
7FAF47F000
|
stack
|
page read and write
|
||
7FF5ED9B8000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD20000
|
trusted library allocation
|
page read and write
|
||
C0002F6000
|
direct allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
55F2000
|
heap
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
29E2000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
29F5000
|
trusted library allocation
|
page read and write
|
||
55F2000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
3738000
|
unkown
|
page read and write
|
||
231F000
|
stack
|
page read and write
|
||
7FF5ED81B000
|
unkown
|
page readonly
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
3D0C000
|
stack
|
page read and write
|
||
7C80000
|
unkown
|
page read and write
|
||
7FF5ED990000
|
unkown
|
page readonly
|
||
534000
|
heap
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
1E0025C4000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
7FF5ED814000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
3212000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
C4D0000
|
unkown
|
page read and write
|
||
75F000
|
stack
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
5A9F000
|
stack
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
1483000
|
heap
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
3229000
|
trusted library allocation
|
page read and write
|
||
DD000
|
stack
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page execute and read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
7E60000
|
unkown
|
page read and write
|
||
29BA000
|
trusted library allocation
|
page read and write
|
||
B8AB000
|
stack
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
184D9BB0000
|
heap
|
page read and write
|
||
B640000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
17A3E1A0000
|
heap
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
3338000
|
heap
|
page read and write
|
||
340C000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
1B9BA850000
|
trusted library allocation
|
page read and write
|
||
3365000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7FF5ED93B000
|
unkown
|
page readonly
|
||
1B9C9259000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
7FF5ED8C1000
|
unkown
|
page readonly
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
29A1000
|
trusted library allocation
|
page read and write
|
||
29BD000
|
trusted library allocation
|
page read and write
|
||
7FAF279000
|
stack
|
page read and write
|
||
54ED000
|
trusted library allocation
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7FAF2F8000
|
stack
|
page read and write
|
||
54F4000
|
trusted library allocation
|
page read and write
|
||
521000
|
heap
|
page read and write
|
||
2A93000
|
trusted library allocation
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
2B1A000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3439000
|
stack
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
F7C4000
|
unkown
|
page read and write
|
||
7FDF0000
|
trusted library allocation
|
page execute and read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
3659000
|
stack
|
page read and write
|
||
15F3BFC0000
|
trusted library allocation
|
page read and write
|
||
1A1BFD000
|
stack
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF71C17C000
|
unkown
|
page read and write
|
||
2E49F8EA000
|
heap
|
page read and write
|
||
3141000
|
trusted library allocation
|
page read and write
|
||
7FF5ED602000
|
unkown
|
page readonly
|
||
190000
|
heap
|
page read and write
|
||
1E000730000
|
heap
|
page execute and read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page readonly
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
311A000
|
trusted library allocation
|
page read and write
|
||
2A7C000
|
trusted library allocation
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page read and write
|
||
33E5000
|
heap
|
page read and write
|
||
15F548D3000
|
heap
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEE0000
|
trusted library allocation
|
page read and write
|
||
9080DFE000
|
stack
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
2A2C000
|
trusted library allocation
|
page read and write
|
||
AAFC000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2ACB000
|
trusted library allocation
|
page read and write
|
||
2A29000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
55F1000
|
heap
|
page read and write
|
||
30A1000
|
remote allocation
|
page execute and read and write
|
||
C846000
|
unkown
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
heap
|
page read and write
|
||
3385000
|
heap
|
page read and write
|
||
1E01C1C7000
|
heap
|
page read and write
|
||
3184000
|
trusted library allocation
|
page read and write
|
||
3BCD3FF000
|
stack
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page execute and read and write
|
||
3420000
|
unkown
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
33FA000
|
heap
|
page read and write
|
||
97A9000
|
unkown
|
page read and write
|
||
3124000
|
trusted library allocation
|
page read and write
|
||
2B8D000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2ACA000
|
trusted library allocation
|
page read and write
|
||
C000057000
|
direct allocation
|
page read and write
|
||
312B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
686000
|
heap
|
page read and write
|
||
7FF5ED46A000
|
unkown
|
page readonly
|
||
7FF5ED409000
|
unkown
|
page readonly
|
||
4B90000
|
unkown
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
3385000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1D5000
|
heap
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF5ED412000
|
unkown
|
page readonly
|
||
2B6E000
|
trusted library allocation
|
page read and write
|
||
1B9B8F50000
|
heap
|
page execute and read and write
|
||
60000
|
direct allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
AB49000
|
unkown
|
page read and write
|
||
C0000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
3797000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2AD5000
|
trusted library allocation
|
page read and write
|
||
2AFD000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
1E01A950000
|
heap
|
page read and write
|
||
AA90000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
79B1000
|
unkown
|
page read and write
|
||
A21E000
|
stack
|
page read and write
|
||
7FFD9BB89000
|
trusted library allocation
|
page read and write
|
||
BDC0000
|
unkown
|
page readonly
|
||
339A000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page execute and read and write
|
||
3125000
|
trusted library allocation
|
page read and write
|
||
29F8000
|
trusted library allocation
|
page read and write
|
||
2A15000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
4BE1000
|
unkown
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
54CD000
|
trusted library allocation
|
page read and write
|
||
33E2000
|
heap
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
AAF6000
|
unkown
|
page read and write
|
||
15F3BFF1000
|
trusted library allocation
|
page read and write
|
||
7D20000
|
unkown
|
page readonly
|
||
7F40000
|
unkown
|
page readonly
|
||
2A28000
|
trusted library allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
97C3000
|
unkown
|
page read and write
|
||
986F000
|
unkown
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
312B000
|
trusted library allocation
|
page read and write
|
||
1FBFFCB2000
|
direct allocation
|
page read and write
|
||
C0003B2000
|
direct allocation
|
page read and write
|
||
3FB7000
|
unclassified section
|
page read and write
|
||
2BC3000
|
trusted library allocation
|
page read and write
|
||
4C50000
|
unkown
|
page read and write
|
||
14CA4655000
|
heap
|
page read and write
|
||
33FC000
|
heap
|
page read and write
|
||
2A83000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
C000307000
|
direct allocation
|
page read and write
|
||
5526000
|
trusted library allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
8000000
|
unkown
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
90000
|
trusted library section
|
page read and write
|
||
3206000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
9815000
|
unkown
|
page read and write
|
||
7FF5ED94A000
|
unkown
|
page readonly
|
||
311B000
|
trusted library allocation
|
page read and write
|
||
34AA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
A32A000
|
unkown
|
page read and write
|
||
2A4C000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
1E0026CE000
|
trusted library allocation
|
page read and write
|
||
3176000
|
trusted library allocation
|
page read and write
|
||
29DB000
|
trusted library allocation
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
15F3A5B0000
|
heap
|
page read and write
|
||
7FF5ED43A000
|
unkown
|
page readonly
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
remote allocation
|
page read and write
|
||
33FC000
|
heap
|
page read and write
|
||
3365000
|
heap
|
page read and write
|
||
7FF5ED50A000
|
unkown
|
page readonly
|
||
310E000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1FBFFD80000
|
direct allocation
|
page read and write
|
||
1E01BAF2000
|
trusted library allocation
|
page read and write
|
||
3F10000
|
direct allocation
|
page read and write
|
||
11C0000
|
unkown
|
page readonly
|
||
987B000
|
unkown
|
page read and write
|
||
7FF5ED8AC000
|
unkown
|
page readonly
|
||
7DC0000
|
unkown
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
1D7000
|
heap
|
page read and write
|
||
2A63000
|
trusted library allocation
|
page read and write
|
||
2B53000
|
trusted library allocation
|
page read and write
|
||
1B9B6F3D000
|
heap
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
3F71000
|
unclassified section
|
page execute read
|
||
33D2000
|
heap
|
page read and write
|
||
7FF5ED6B9000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
15F3C09A000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3208000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
5C3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
7852000
|
unkown
|
page read and write
|
||
2A7B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
unkown
|
page read and write
|
||
C0000F8000
|
direct allocation
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
1B9BA741000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
C00027C000
|
direct allocation
|
page read and write
|
||
3209000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
7FFD9BF10000
|
trusted library allocation
|
page read and write
|
||
7FF5ED476000
|
unkown
|
page readonly
|
||
7DD0000
|
unkown
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
7FFD9BD74000
|
trusted library allocation
|
page read and write
|
||
7FB000E000
|
stack
|
page read and write
|
||
3117000
|
trusted library allocation
|
page read and write
|
||
BD98000
|
stack
|
page read and write
|
||
340C000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
20017C80000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
C4000
|
trusted library allocation
|
page read and write
|
||
15F3A490000
|
heap
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
2A35000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
20019A00000
|
heap
|
page read and write
|
||
7FF5ED507000
|
unkown
|
page readonly
|
||
7DC0000
|
unkown
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
7695000
|
stack
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
1E001EFE000
|
heap
|
page read and write
|
||
15F548F0000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
AAF9000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1E01BAD0000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
7FF5ED939000
|
unkown
|
page readonly
|
||
33CE000
|
heap
|
page read and write
|
||
1E00074E000
|
heap
|
page read and write
|
||
3206000
|
trusted library allocation
|
page read and write
|
||
33B9000
|
stack
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
C0003BA000
|
direct allocation
|
page read and write
|
||
1B9B8DE3000
|
trusted library allocation
|
page read and write
|
||
29EB000
|
trusted library allocation
|
page read and write
|
||
3229000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
unkown
|
page read and write
|
||
27A7000
|
unclassified section
|
page read and write
|
||
2A99000
|
trusted library allocation
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
284F000
|
stack
|
page read and write
|
||
2E49F8D0000
|
heap
|
page read and write
|
||
7DF4F3071000
|
unkown
|
page execute read
|
||
7DA0000
|
unkown
|
page read and write
|
||
3403000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
979C000
|
unkown
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
C000260000
|
direct allocation
|
page read and write
|
||
310F000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
1B9B8910000
|
trusted library allocation
|
page read and write
|
||
2A03000
|
trusted library allocation
|
page read and write
|
||
2A2B000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
1E0004F8000
|
heap
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
C0000EC000
|
direct allocation
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
2B5A000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
577E000
|
stack
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
1B9BA3C3000
|
trusted library allocation
|
page read and write
|
||
883B000
|
stack
|
page read and write
|
||
1E01D94A000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
2A7A000
|
trusted library allocation
|
page read and write
|
||
1E002796000
|
trusted library allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
29BC000
|
trusted library allocation
|
page read and write
|
||
9C80000
|
unkown
|
page read and write
|
||
7FF71C7A9000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
4E8E000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7DF4C2070000
|
trusted library allocation
|
page execute and read and write
|
||
3165000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
33FE000
|
heap
|
page read and write
|
||
3691000
|
trusted library allocation
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
3FAE000
|
unclassified section
|
page readonly
|
||
2B4E000
|
trusted library allocation
|
page read and write
|
||
2A16000
|
trusted library allocation
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
2A5D000
|
trusted library allocation
|
page read and write
|
||
CA63000
|
unkown
|
page read and write
|
||
1E00231E000
|
trusted library allocation
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7DC0000
|
unkown
|
page read and write
|
||
C964000
|
unkown
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
C000068000
|
direct allocation
|
page read and write
|
||
A375000
|
unkown
|
page read and write
|
||
312F000
|
trusted library allocation
|
page read and write
|
||
76A0000
|
unkown
|
page read and write
|
||
3D3E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page read and write
|
||
3756000
|
unkown
|
page read and write
|
||
3BCE3FE000
|
stack
|
page read and write
|
||
4BDC000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
9B20000
|
unkown
|
page read and write
|
||
2997000
|
trusted library allocation
|
page read and write
|
||
C0000D0000
|
direct allocation
|
page read and write
|
||
15F3A380000
|
heap
|
page read and write
|
||
797D000
|
unkown
|
page read and write
|
||
1B9C9246000
|
trusted library allocation
|
page read and write
|
||
C000172000
|
direct allocation
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
315A000
|
trusted library allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
7FF5ED516000
|
unkown
|
page readonly
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
3141000
|
trusted library allocation
|
page read and write
|
||
1F557FF000
|
stack
|
page read and write
|
||
35A0000
|
unkown
|
page readonly
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
7FFD9BD30000
|
trusted library allocation
|
page read and write
|
||
7FF5ED996000
|
unkown
|
page readonly
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
A01C000
|
stack
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
7FE08000
|
trusted library allocation
|
page execute and read and write
|
||
420000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
C0003BE000
|
direct allocation
|
page read and write
|
||
320C000
|
trusted library allocation
|
page read and write
|
||
2BAC000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3403000
|
heap
|
page read and write
|
||
F68B000
|
unkown
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
313C000
|
trusted library allocation
|
page read and write
|
||
2A0B000
|
trusted library allocation
|
page read and write
|
||
C4A0000
|
unkown
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
2B1B000
|
trusted library allocation
|
page read and write
|
||
ED19FFD000
|
stack
|
page read and write
|
||
C0000D2000
|
direct allocation
|
page read and write
|
||
2B4B000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
1E012357000
|
trusted library allocation
|
page read and write
|
||
C00030C000
|
direct allocation
|
page read and write
|
||
33FE000
|
heap
|
page read and write
|
||
7FF5EDA08000
|
unkown
|
page readonly
|
||
534000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3158000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
unkown
|
page read and write
|
||
7FF6416E2000
|
unkown
|
page read and write
|
||
C893000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
A39B000
|
unkown
|
page read and write
|
||
7FF71BC41000
|
unkown
|
page execute read
|
||
87C0000
|
unkown
|
page read and write
|
||
5514000
|
trusted library allocation
|
page read and write
|
||
3239000
|
trusted library allocation
|
page read and write
|
||
1E000700000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3BCB15F000
|
stack
|
page read and write
|
||
3199000
|
trusted library allocation
|
page read and write
|
||
AB01000
|
unkown
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
3157000
|
trusted library allocation
|
page read and write
|
||
3165000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7FF5ED1CF000
|
unkown
|
page readonly
|
||
1370000
|
unkown
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
345A000
|
trusted library allocation
|
page read and write
|
||
7861000
|
unkown
|
page read and write
|
||
BDA0000
|
unkown
|
page readonly
|
||
3118000
|
trusted library allocation
|
page read and write
|
||
33D6000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
33F2000
|
heap
|
page read and write
|
||
3141000
|
trusted library allocation
|
page read and write
|
||
C516000
|
unkown
|
page read and write
|
||
3117000
|
trusted library allocation
|
page read and write
|
||
3157000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
3112000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
C00026F000
|
direct allocation
|
page read and write
|
||
2B6F000
|
trusted library allocation
|
page read and write
|
||
2E4A1318000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
C700000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
2BBF000
|
trusted library allocation
|
page read and write
|
||
15F3A4FF000
|
heap
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
B0000
|
trusted library allocation
|
page read and write
|
||
15F4BFF7000
|
trusted library allocation
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF5ED8E7000
|
unkown
|
page readonly
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
2BCC000
|
trusted library allocation
|
page read and write
|
||
9B60000
|
unkown
|
page readonly
|
||
C89A000
|
unkown
|
page read and write
|
||
1B9C925B000
|
trusted library allocation
|
page read and write
|
||
55F8000
|
trusted library allocation
|
page read and write
|
||
2BBE000
|
trusted library allocation
|
page read and write
|
||
17A3E0B0000
|
heap
|
page read and write
|
||
3BD118D000
|
stack
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
3159000
|
trusted library allocation
|
page read and write
|
||
2E49F879000
|
heap
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
A49E000
|
unkown
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
986B000
|
unkown
|
page read and write
|
||
49A000
|
heap
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
3128000
|
trusted library allocation
|
page read and write
|
||
6C920000
|
unkown
|
page readonly
|
||
7FF5ED46E000
|
unkown
|
page readonly
|
||
1370000
|
unkown
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD24000
|
trusted library allocation
|
page read and write
|
||
33D3000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
1E0003B0000
|
unkown
|
page readonly
|
||
1B9B6F00000
|
heap
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
3157000
|
trusted library allocation
|
page read and write
|
||
7FF5ED6DB000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
9590000
|
unkown
|
page read and write
|
||
18AD7FF000
|
stack
|
page read and write
|
||
2A36000
|
trusted library allocation
|
page read and write
|
||
18A0000
|
unkown
|
page readonly
|
||
7FF5ED937000
|
unkown
|
page readonly
|
||
C000164000
|
direct allocation
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
ED19EF7000
|
stack
|
page read and write
|
||
F699000
|
unkown
|
page read and write
|
||
F8A0000
|
unkown
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
2B79000
|
trusted library allocation
|
page read and write
|
||
1B9D136B000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
33EF000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
1B9B8980000
|
heap
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
312C000
|
trusted library allocation
|
page read and write
|
||
9879000
|
unkown
|
page read and write
|
||
91B8000
|
stack
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1FBFF178000
|
direct allocation
|
page read and write
|
||
B6A0000
|
heap
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
7FF5EDA0B000
|
unkown
|
page readonly
|
||
3206000
|
trusted library allocation
|
page read and write
|
||
343A000
|
trusted library allocation
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
15F548E0000
|
heap
|
page read and write
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
7FF5ED961000
|
unkown
|
page readonly
|
||
3795000
|
unkown
|
page read and write
|
||
3402000
|
heap
|
page read and write
|
||
1E0024F7000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
3162000
|
trusted library allocation
|
page read and write
|
||
2A2D000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7FF5ED9FF000
|
unkown
|
page readonly
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
21CF000
|
stack
|
page read and write
|
||
B510000
|
heap
|
page read and write
|
||
252C000
|
stack
|
page read and write
|
||
7F2E000
|
stack
|
page read and write
|
||
3BD2D8B000
|
stack
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
33FA000
|
heap
|
page read and write
|
||
1E000745000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7FF5ED9A6000
|
unkown
|
page readonly
|
||
1370000
|
unkown
|
page read and write
|
||
1B9B6F45000
|
heap
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
15F3A560000
|
heap
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
2AD4000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
5E1E000
|
stack
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
8BF0000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
3107000
|
trusted library allocation
|
page read and write
|
||
7FF5ED743000
|
unkown
|
page readonly
|
||
1B9C8F61000
|
trusted library allocation
|
page read and write
|
||
7FAEFFF000
|
stack
|
page read and write
|
||
1E01D890000
|
heap
|
page read and write
|
||
4E92000
|
trusted library allocation
|
page read and write
|
||
C000190000
|
direct allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7FF71C17E000
|
unkown
|
page write copy
|
||
2B3E000
|
stack
|
page read and write
|
||
2ACE000
|
trusted library allocation
|
page read and write
|
||
585000
|
heap
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
2B2F000
|
trusted library allocation
|
page read and write
|
||
3112000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDE0000
|
trusted library allocation
|
page read and write
|
||
A4FC000
|
unkown
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FFD9BB4E000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
54E9000
|
trusted library allocation
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3205000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
9795000
|
unkown
|
page read and write
|
||
170000
|
trusted library allocation
|
page execute and read and write
|
||
3BCCFFD000
|
stack
|
page read and write
|
||
33F6000
|
heap
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
18AD32B000
|
stack
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
28BD000
|
stack
|
page read and write
|
||
7FF5ED660000
|
unkown
|
page readonly
|
||
3403000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
7FAF3FE000
|
stack
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7FF5ED1BC000
|
unkown
|
page readonly
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
7FF5ED864000
|
unkown
|
page readonly
|
||
534000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
35D0000
|
unkown
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
20017C8E000
|
heap
|
page read and write
|
||
54F1000
|
heap
|
page read and write
|
||
2BC5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE80000
|
trusted library allocation
|
page read and write
|
||
89C0000
|
unkown
|
page read and write
|
||
29EC000
|
trusted library allocation
|
page read and write
|
||
33E2000
|
heap
|
page read and write
|
||
7FF71C0E3000
|
unkown
|
page write copy
|
||
9C80000
|
unkown
|
page read and write
|
||
7FFD9BE60000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
7FFD9BA5C000
|
trusted library allocation
|
page execute and read and write
|
||
534000
|
heap
|
page read and write
|
||
C0003D4000
|
direct allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
7FF6415F1000
|
unkown
|
page execute read
|
||
1220000
|
unkown
|
page readonly
|
||
322A000
|
trusted library allocation
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
2859000
|
trusted library allocation
|
page execute and read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
601F000
|
stack
|
page read and write
|
||
8A6E000
|
stack
|
page read and write
|
||
C6F4000
|
unkown
|
page read and write
|
||
2B0D000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
1510000
|
unkown
|
page readonly
|
||
4E20000
|
heap
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
9081BFC000
|
stack
|
page read and write
|
||
F6C4000
|
unkown
|
page read and write
|
||
1E01A9A7000
|
heap
|
page read and write
|
||
1E002254000
|
heap
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
29D9000
|
trusted library allocation
|
page read and write
|
||
2A27000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
unkown
|
page read and write
|
||
7FB008E000
|
stack
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
7CF000
|
stack
|
page read and write
|
||
1F5532B000
|
stack
|
page read and write
|
||
9080FFF000
|
stack
|
page read and write
|
||
3165000
|
trusted library allocation
|
page read and write
|
||
9DED000
|
stack
|
page read and write
|
||
1B9B7120000
|
heap
|
page read and write
|
||
7FFD9B992000
|
trusted library allocation
|
page read and write
|
||
2A0E000
|
trusted library allocation
|
page read and write
|
||
4FCD000
|
stack
|
page read and write
|
||
7FF6416E2000
|
unkown
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
1E002220000
|
heap
|
page execute and read and write
|
||
37B0000
|
unkown
|
page read and write
|
||
C0000DA000
|
direct allocation
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
33CE000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
3187000
|
trusted library allocation
|
page read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
There are 3669 hidden memdumps, click here to show them.