Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Export Shipment Documents 72335.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_fe8167436d6db6c6d2c4bed5d6f2d2c06e142845_f78a65ed_688ef81c-3112-4aa5-919d-bbcba7e35c47\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE45D.tmp.dmp
|
Mini DuMP crash report, 17 streams, Mon Oct 28 13:13:34 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREA4A.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREA8A.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000012.db
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000013.db
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\Windows[2].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\parters
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Export Shipment Documents 72335.exe
|
"C:\Users\user\Desktop\Export Shipment Documents 72335.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\Desktop\Export Shipment Documents 72335.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Windows\SysWOW64\help.exe
|
"C:\Windows\SysWOW64\help.exe"
|
||
C:\Windows\explorer.exe
|
explorer.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
/c del "C:\Windows\SysWOW64\svchost.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 4084 -s 7096
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.yzwj-she.xyzReferer:
|
unknown
|
||
http://www.ixiaopu.top
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13glsK-dark
|
unknown
|
||
https://powerpoint.office.comer
|
unknown
|
||
https://android.notify.windows.com/iOSA4
|
unknown
|
||
http://www.rilseguloseheating.shop
|
unknown
|
||
http://www.uiejosdarksumdauts.shop/ms84/
|
unknown
|
||
http://www.mployee-jkmmz.xyz/ms84/
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
|
unknown
|
||
http://www.erform-tgap.xyzReferer:
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2C0-dark
|
unknown
|
||
https://www.msn.com/en-us/health/other/say-goodbye-to-the-covid-19-vaccination-card/ar-AA1hHYLu
|
unknown
|
||
https://www.msn.com/en-us/news/politics/judge-erupts-at-trump-s-lawyers-for-wasting-time-with-ridicu
|
unknown
|
||
https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
|
unknown
|
||
http://www.taff-ltpugj.xyzReferer:
|
unknown
|
||
https://api.msn.com:443/v1/news/Feed/Windows?
|
unknown
|
||
https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13D4or-dark
|
unknown
|
||
http://www.rilseguloseheating.shop/ms84/
|
unknown
|
||
http://www.unwaleheathyhibbing.cfd/ms84/
|
unknown
|
||
http://www.764.xyz/ms84/
|
unknown
|
||
http://www.elieve-nrrv.xyzReferer:
|
unknown
|
||
https://excel.office.com
|
unknown
|
||
https://www.msn.com/en-us/money/personalfinance/the-big-3-mistakes-financial-advisors-say-that-the-1
|
unknown
|
||
http://www.aby-qwjqlg.xyzReferer:
|
unknown
|
||
http://www.oco188rtp.xyz/ms84/
|
unknown
|
||
http://www.duxrib.xyzReferer:
|
unknown
|
||
http://www.oco188rtp.xyz/ms84/www.uiejosdarksumdauts.shop
|
unknown
|
||
http://www.outh-kejj.xyzReferer:
|
unknown
|
||
http://www.ikigorakos.net/ms84/
|
unknown
|
||
http://www.taff-ltpugj.xyz/ms84/
|
unknown
|
||
http://www.ridging-solutions-llc.net/ms84/
|
unknown
|
||
http://www.unwaleheathyhibbing.cfdReferer:
|
unknown
|
||
http://www.ecurity-ukgaxq.xyz/ms84/
|
unknown
|
||
http://www.unwaleheathyhibbing.cfd
|
unknown
|
||
http://www.764.xyzReferer:
|
unknown
|
||
http://www.elieve-nrrv.xyz
|
unknown
|
||
http://www.yzwj-she.xyz
|
unknown
|
||
http://www.vqq-national.xyz
|
unknown
|
||
http://www.unwaleheathyhibbing.cfd/ms84/www.oco188rtp.xyz
|
unknown
|
||
http://www.rilseguloseheating.shop/ms84/www.erform-tgap.xyz
|
unknown
|
||
https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zeal
|
unknown
|
||
http://www.764.xyz
|
unknown
|
||
http://www.uhy-key.xyz/ms84/www.ecurity-ukgaxq.xyz
|
unknown
|
||
http://www.5syp.xyzReferer:
|
unknown
|
||
http://www.microsoft.c
|
unknown
|
||
http://www.ixiaopu.top/ms84/www.vqq-national.xyz
|
unknown
|
||
https://word.office.comT;=
|
unknown
|
||
https://android.notify.windows.com/iOSd
|
unknown
|
||
http://www.duxrib.xyz/ms84/www.hlut-government.xyz
|
unknown
|
||
http://www.emesiartwork.netReferer:
|
unknown
|
||
http://www.xfetchbesnowsblacher.shop
|
unknown
|
||
http://www.vqq-national.xyz/ms84/
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
|
unknown
|
||
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
http://www.erform-tgap.xyz
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13glsK
|
unknown
|
||
http://www.erform-tgap.xyz/ms84/
|
unknown
|
||
http://www.ridging-solutions-llc.net/ms84/www.uhy-key.xyz
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gAVf-dark
|
unknown
|
||
http://ns.adobe.c
|
unknown
|
||
http://www.xfetchbesnowsblacher.shop/ms84/www.5syp.xyz
|
unknown
|
||
http://www.taff-ltpugj.xyz/ms84/www.yzwj-she.xyz
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2C0
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
|
unknown
|
||
http://www.emesiartwork.net/ms84/www.risiddivinayaka.net
|
unknown
|
||
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
|
unknown
|
||
http://www.emesiartwork.net
|
unknown
|
||
http://www.rilseguloseheating.shopReferer:
|
unknown
|
||
http://www.outh-kejj.xyz
|
unknown
|
||
https://outlook.com
|
unknown
|
||
https://outlook.comng
|
unknown
|
||
http://www.uhy-key.xyzReferer:
|
unknown
|
||
http://www.aby-qwjqlg.xyz
|
unknown
|
||
http://www.kn510v1.top
|
unknown
|
||
http://www.agieworld.xyz
|
unknown
|
||
http://www.elieve-nrrv.xyz/ms84/
|
unknown
|
||
https://android.notify.windows.com/iOS
|
unknown
|
||
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
|
unknown
|
||
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
|
unknown
|
||
http://www.xcoy-product.xyz/ms84/
|
unknown
|
||
http://www.xfetchbesnowsblacher.shop/ms84/
|
unknown
|
||
http://www.oco188rtp.xyzReferer:
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA
|
unknown
|
||
http://www.mployee-jkmmz.xyz
|
unknown
|
||
https://www.msn.com/en-us/money/news/11-things-you-should-not-do-in-retirement/vi-AA1hH9Jz
|
unknown
|
||
http://www.risiddivinayaka.net/ms84/www.uhy-key.xyz
|
unknown
|
||
https://www.msn.com/en-us/sports/other/washington-state-ad-asks-ncaa-for-compassion-and-understandin
|
unknown
|
||
http://www.ridging-solutions-llc.netReferer:
|
unknown
|
||
http://www.elieve-nrrv.xyz/ms84/www.outh-kejj.xyz
|
unknown
|
||
http://www.duxrib.xyz/ms84/
|
unknown
|
||
http://www.vqq-national.xyzReferer:
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gAVf
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k-dark
|
unknown
|
||
http://www.5syp.xyz/ms84/
|
unknown
|
||
https://api.msn.com/v1/news/Feed/Windows?
|
unknown
|
||
http://www.vqq-national.xyz/ms84/www.xfetchbesnowsblacher.shop
|
unknown
|
||
https://cdn.query.prod.cms.
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.764.xyz
|
13.248.252.114
|
||
www.unwaleheathyhibbing.cfd
|
unknown
|
||
www.ikigorakos.net
|
unknown
|
||
www.oco188rtp.xyz
|
unknown
|
||
api.msn.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
13.248.252.114
|
www.764.xyz
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR
|
KGLToGCSUpdatedRevision
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsStore_8wekyb3d8bbwe\ApplicationFrame\Microsoft.WindowsStore_8wekyb3d8bbwe!App
|
PreferredMinSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}
|
DriveNumber
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
TotalBytes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
FreeBytes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
Blank Disc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
Can Close
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
Media Type
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
Imapi Media State
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
IsImapiDataBurnSupported
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
IsImapiEraseSupported
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
Live FS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
Disc Label
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\BackupReminder
|
BackupReminderToastCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\DiskSpaceChecking
|
LastInstallTimeLowStorageNotify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\BackupReminder
|
LastTimeBackupReminderNotify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
|
Generation
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}
|
Generation
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}
|
Generation
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{a33c736e-61ca-11ee-8c18-806e6f6e6963}
|
Generation
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
|
TraySearchBoxVisible
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
|
TraySearchBoxVisible
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
|
InstalledWin32AppsRevision
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010420
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020416
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001040C
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010400
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103F8
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000303EA
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103AC
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000302AC
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
|
InstalledWin32AppsRevision
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
|
PastIconsStream
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
|
IconStreams
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
There are 186 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2B20000
|
unclassified section
|
page execute and read and write
|
||
3670000
|
unclassified section
|
page execute and read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
2490000
|
system
|
page execute and read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
3640000
|
unclassified section
|
page execute and read and write
|
||
400000
|
system
|
page execute and read and write
|
||
BCF7000
|
heap
|
page read and write
|
||
7FF50331B000
|
unkown
|
page readonly
|
||
3AD1000
|
direct allocation
|
page execute and read and write
|
||
7FF5030AA000
|
unkown
|
page readonly
|
||
D189000
|
heap
|
page read and write
|
||
D2E4000
|
heap
|
page read and write
|
||
CDB0000
|
heap
|
page read and write
|
||
D642000
|
system
|
page execute and read and write
|
||
7FF5032F2000
|
unkown
|
page readonly
|
||
B67E000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
3F5F000
|
heap
|
page read and write
|
||
7FF502D8F000
|
unkown
|
page readonly
|
||
8BD6000
|
heap
|
page read and write
|
||
D372000
|
heap
|
page read and write
|
||
9330000
|
unkown
|
page read and write
|
||
D343000
|
heap
|
page read and write
|
||
9CF6000
|
unkown
|
page read and write
|
||
7FF502F6A000
|
unkown
|
page readonly
|
||
D300000
|
heap
|
page read and write
|
||
6ECB000
|
unkown
|
page read and write
|
||
10D75000
|
system
|
page execute and read and write
|
||
E30000
|
unkown
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
396F000
|
heap
|
page read and write
|
||
D476000
|
heap
|
page read and write
|
||
2F54000
|
heap
|
page read and write
|
||
D0A8000
|
heap
|
page read and write
|
||
7D2C000
|
heap
|
page read and write
|
||
7D02000
|
heap
|
page read and write
|
||
C640000
|
trusted library allocation
|
page read and write
|
||
BD15000
|
heap
|
page read and write
|
||
B505000
|
heap
|
page read and write
|
||
10655000
|
heap
|
page read and write
|
||
7FF5030A3000
|
unkown
|
page readonly
|
||
D176000
|
heap
|
page read and write
|
||
7FF502E03000
|
unkown
|
page readonly
|
||
3971000
|
heap
|
page read and write
|
||
BD4C000
|
heap
|
page read and write
|
||
7B78000
|
heap
|
page read and write
|
||
7FF503055000
|
unkown
|
page readonly
|
||
7CE5000
|
heap
|
page read and write
|
||
32AF000
|
unclassified section
|
page read and write
|
||
D159000
|
heap
|
page read and write
|
||
3088000
|
unkown
|
page read and write
|
||
BC80000
|
unkown
|
page read and write
|
||
7CE5000
|
heap
|
page read and write
|
||
D232000
|
heap
|
page read and write
|
||
BE1C000
|
unkown
|
page read and write
|
||
51FF000
|
heap
|
page read and write
|
||
CF43000
|
heap
|
page read and write
|
||
7FF50316E000
|
unkown
|
page readonly
|
||
24E4000
|
heap
|
page read and write
|
||
7FF502B55000
|
unkown
|
page readonly
|
||
BDF0000
|
unkown
|
page read and write
|
||
D364000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
D4C7000
|
heap
|
page read and write
|
||
D38A000
|
heap
|
page read and write
|
||
7FF502FB4000
|
unkown
|
page readonly
|
||
D101000
|
heap
|
page read and write
|
||
D37C000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page execute and read and write
|
||
7D4A000
|
heap
|
page read and write
|
||
7FF502DBC000
|
unkown
|
page readonly
|
||
321F000
|
heap
|
page read and write
|
||
10729000
|
heap
|
page read and write
|
||
8BC1000
|
heap
|
page read and write
|
||
D378000
|
heap
|
page read and write
|
||
D055000
|
heap
|
page read and write
|
||
10701000
|
heap
|
page read and write
|
||
7FF502F96000
|
unkown
|
page readonly
|
||
10320000
|
heap
|
page read and write
|
||
8AF6000
|
heap
|
page read and write
|
||
D189000
|
heap
|
page read and write
|
||
E8FC000
|
stack
|
page read and write
|
||
D368000
|
heap
|
page read and write
|
||
D11C000
|
heap
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
11603000
|
trusted library allocation
|
page read and write
|
||
CDD9000
|
heap
|
page read and write
|
||
7FF502D6B000
|
unkown
|
page readonly
|
||
CF0E000
|
heap
|
page read and write
|
||
964E000
|
stack
|
page read and write
|
||
115F3000
|
trusted library allocation
|
page read and write
|
||
831E000
|
stack
|
page read and write
|
||
BC78000
|
heap
|
page read and write
|
||
4431000
|
unkown
|
page read and write
|
||
6EF3000
|
unkown
|
page read and write
|
||
D0AB000
|
heap
|
page read and write
|
||
10455000
|
heap
|
page read and write
|
||
D374000
|
heap
|
page read and write
|
||
B624000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
10714000
|
heap
|
page read and write
|
||
29E1000
|
heap
|
page read and write
|
||
B613000
|
heap
|
page read and write
|
||
3FE0000
|
heap
|
page read and write
|
||
7FF502E3F000
|
unkown
|
page readonly
|
||
24E4000
|
heap
|
page read and write
|
||
7C0E000
|
heap
|
page read and write
|
||
7FF5030DE000
|
unkown
|
page readonly
|
||
D1B3000
|
heap
|
page read and write
|
||
7D3B000
|
heap
|
page read and write
|
||
BCC8000
|
heap
|
page read and write
|
||
8B5000
|
stack
|
page read and write
|
||
8B5000
|
stack
|
page read and write
|
||
C5B0000
|
trusted library allocation
|
page read and write
|
||
D06F000
|
heap
|
page read and write
|
||
7FF502C4B000
|
unkown
|
page readonly
|
||
353E000
|
stack
|
page read and write
|
||
B617000
|
heap
|
page read and write
|
||
C0FD000
|
stack
|
page read and write
|
||
105C0000
|
heap
|
page read and write
|
||
1068A000
|
heap
|
page read and write
|
||
7FF502CF5000
|
unkown
|
page readonly
|
||
103A2000
|
heap
|
page read and write
|
||
7CAB000
|
heap
|
page read and write
|
||
80C0000
|
unkown
|
page readonly
|
||
8CE1000
|
heap
|
page read and write
|
||
D4C7000
|
heap
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
D4EA000
|
heap
|
page read and write
|
||
36B0000
|
unclassified section
|
page execute and read and write
|
||
7FF5030A3000
|
unkown
|
page readonly
|
||
7FF502D04000
|
unkown
|
page readonly
|
||
10598000
|
heap
|
page read and write
|
||
D2D8000
|
heap
|
page read and write
|
||
105BF000
|
heap
|
page read and write
|
||
BEAF000
|
unkown
|
page read and write
|
||
1054E000
|
heap
|
page read and write
|
||
989E000
|
stack
|
page read and write
|
||
3935000
|
heap
|
page read and write
|
||
10392000
|
heap
|
page read and write
|
||
48EE000
|
direct allocation
|
page read and write
|
||
B617000
|
heap
|
page read and write
|
||
7FF502F9F000
|
unkown
|
page readonly
|
||
1044D000
|
heap
|
page read and write
|
||
4D00000
|
unkown
|
page write copy
|
||
7FF503051000
|
unkown
|
page readonly
|
||
7FF502F88000
|
unkown
|
page readonly
|
||
3965000
|
heap
|
page read and write
|
||
10449000
|
heap
|
page read and write
|
||
C600000
|
trusted library allocation
|
page read and write
|
||
9D58000
|
unkown
|
page read and write
|
||
FD53000
|
unkown
|
page read and write
|
||
C72A000
|
stack
|
page read and write
|
||
D180000
|
heap
|
page read and write
|
||
D2E9000
|
heap
|
page read and write
|
||
7DF411EF1000
|
unkown
|
page execute read
|
||
B62E000
|
heap
|
page read and write
|
||
B63B000
|
heap
|
page read and write
|
||
B589000
|
heap
|
page read and write
|
||
3013000
|
heap
|
page read and write
|
||
105C2000
|
heap
|
page read and write
|
||
1045F000
|
heap
|
page read and write
|
||
9BDE000
|
unkown
|
page read and write
|
||
3E29000
|
heap
|
page read and write
|
||
1070C000
|
heap
|
page read and write
|
||
7B91000
|
heap
|
page read and write
|
||
1045B000
|
heap
|
page read and write
|
||
2D0B000
|
stack
|
page read and write
|
||
D169000
|
heap
|
page read and write
|
||
B63B000
|
heap
|
page read and write
|
||
7BA0000
|
heap
|
page read and write
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
D560000
|
heap
|
page read and write
|
||
2E89000
|
direct allocation
|
page execute and read and write
|
||
9FD0000
|
trusted library allocation
|
page read and write
|
||
B5B5000
|
heap
|
page read and write
|
||
8E4F000
|
stack
|
page read and write
|
||
E248000
|
stack
|
page read and write
|
||
B607000
|
heap
|
page read and write
|
||
8D3F000
|
heap
|
page read and write
|
||
7720000
|
unkown
|
page readonly
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
7710000
|
unkown
|
page readonly
|
||
10701000
|
heap
|
page read and write
|
||
7FF502DAD000
|
unkown
|
page readonly
|
||
10587000
|
heap
|
page read and write
|
||
8D95000
|
heap
|
page read and write
|
||
D4B3000
|
heap
|
page read and write
|
||
6FDA000
|
unkown
|
page read and write
|
||
D126000
|
heap
|
page read and write
|
||
7FF502DD1000
|
unkown
|
page readonly
|
||
10729000
|
heap
|
page read and write
|
||
D0AC000
|
heap
|
page read and write
|
||
8C08000
|
heap
|
page read and write
|
||
3523000
|
heap
|
page read and write
|
||
B560000
|
unkown
|
page read and write
|
||
2D55000
|
heap
|
page read and write
|
||
D343000
|
heap
|
page read and write
|
||
10455000
|
heap
|
page read and write
|
||
8A37000
|
heap
|
page read and write
|
||
B20F000
|
stack
|
page read and write
|
||
D327000
|
heap
|
page read and write
|
||
B498000
|
heap
|
page read and write
|
||
7FF503167000
|
unkown
|
page readonly
|
||
871B000
|
stack
|
page read and write
|
||
7FF502E43000
|
unkown
|
page readonly
|
||
7FF502E53000
|
unkown
|
page readonly
|
||
B613000
|
heap
|
page read and write
|
||
C7E0000
|
trusted library allocation
|
page read and write
|
||
7BE0000
|
heap
|
page read and write
|
||
9B70000
|
unkown
|
page read and write
|
||
D36E000
|
heap
|
page read and write
|
||
89FB000
|
heap
|
page read and write
|
||
A346000
|
unkown
|
page read and write
|
||
8AF6000
|
heap
|
page read and write
|
||
10453000
|
heap
|
page read and write
|
||
1044F000
|
heap
|
page read and write
|
||
1042E000
|
heap
|
page read and write
|
||
BC9C000
|
heap
|
page read and write
|
||
C7AB000
|
stack
|
page read and write
|
||
D15E000
|
heap
|
page read and write
|
||
7FF5030A5000
|
unkown
|
page readonly
|
||
BD6C000
|
unkown
|
page read and write
|
||
7BCE000
|
heap
|
page read and write
|
||
B630000
|
heap
|
page read and write
|
||
D36A000
|
heap
|
page read and write
|
||
E4B3000
|
trusted library allocation
|
page read and write
|
||
7DF4C3511000
|
trusted library allocation
|
page execute read
|
||
7FF503161000
|
unkown
|
page readonly
|
||
7FF502B7F000
|
unkown
|
page readonly
|
||
106CC000
|
heap
|
page read and write
|
||
D1F1000
|
heap
|
page read and write
|
||
7FF503129000
|
unkown
|
page readonly
|
||
A86C000
|
stack
|
page read and write
|
||
91A7000
|
unkown
|
page read and write
|
||
7FF502F9F000
|
unkown
|
page readonly
|
||
10383000
|
heap
|
page read and write
|
||
B630000
|
heap
|
page read and write
|
||
D374000
|
heap
|
page read and write
|
||
8889000
|
stack
|
page read and write
|
||
8C7E000
|
heap
|
page read and write
|
||
4879000
|
direct allocation
|
page read and write
|
||
105B1000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
D477000
|
heap
|
page read and write
|
||
8BB3000
|
heap
|
page read and write
|
||
D3F4000
|
heap
|
page read and write
|
||
B28E000
|
stack
|
page read and write
|
||
D382000
|
heap
|
page read and write
|
||
D011000
|
heap
|
page read and write
|
||
7FF503347000
|
unkown
|
page readonly
|
||
D392000
|
heap
|
page read and write
|
||
7BF1000
|
heap
|
page read and write
|
||
B495000
|
heap
|
page read and write
|
||
AE0D000
|
stack
|
page read and write
|
||
CFC5000
|
heap
|
page read and write
|
||
3D6C000
|
heap
|
page read and write
|
||
D362000
|
heap
|
page read and write
|
||
CDF4000
|
heap
|
page read and write
|
||
CF0E000
|
heap
|
page read and write
|
||
7FF502EB7000
|
unkown
|
page readonly
|
||
8BD6000
|
heap
|
page read and write
|
||
D370000
|
heap
|
page read and write
|
||
8AF6000
|
heap
|
page read and write
|
||
D2F5000
|
heap
|
page read and write
|
||
B51E000
|
heap
|
page read and write
|
||
7FF50326B000
|
unkown
|
page readonly
|
||
B63B000
|
heap
|
page read and write
|
||
8BD6000
|
heap
|
page read and write
|
||
8BC1000
|
heap
|
page read and write
|
||
D57C000
|
heap
|
page read and write
|
||
7BD9000
|
heap
|
page read and write
|
||
8D6E000
|
heap
|
page read and write
|
||
D34F000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
8B2B000
|
heap
|
page read and write
|
||
CF7D000
|
heap
|
page read and write
|
||
439B000
|
unkown
|
page read and write
|
||
8BEE000
|
heap
|
page read and write
|
||
7FF502F8A000
|
unkown
|
page readonly
|
||
10440000
|
heap
|
page read and write
|
||
10377000
|
heap
|
page read and write
|
||
CBAC000
|
stack
|
page read and write
|
||
BD1A000
|
heap
|
page read and write
|
||
91DE000
|
unkown
|
page read and write
|
||
7C22000
|
heap
|
page read and write
|
||
7C96000
|
heap
|
page read and write
|
||
B607000
|
heap
|
page read and write
|
||
7FF503206000
|
unkown
|
page readonly
|
||
10592000
|
heap
|
page read and write
|
||
E990000
|
heap
|
page read and write
|
||
BBE8000
|
unkown
|
page read and write
|
||
B589000
|
heap
|
page read and write
|
||
3339000
|
stack
|
page read and write
|
||
8A09000
|
heap
|
page read and write
|
||
D4BC000
|
heap
|
page read and write
|
||
2AC0000
|
unkown
|
page readonly
|
||
30CD000
|
unkown
|
page read and write
|
||
3FF1000
|
heap
|
page read and write
|
||
D2E1000
|
heap
|
page read and write
|
||
8D1A000
|
heap
|
page read and write
|
||
C01000
|
unkown
|
page read and write
|
||
C6AD000
|
stack
|
page read and write
|
||
D2F5000
|
heap
|
page read and write
|
||
7FF503126000
|
unkown
|
page readonly
|
||
D189000
|
heap
|
page read and write
|
||
1058B000
|
heap
|
page read and write
|
||
7DF4C35B1000
|
trusted library allocation
|
page execute read
|
||
29E8000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FF50332C000
|
unkown
|
page readonly
|
||
9BE6000
|
unkown
|
page read and write
|
||
8BF0000
|
heap
|
page read and write
|
||
D35C000
|
heap
|
page read and write
|
||
8ADC000
|
heap
|
page read and write
|
||
7FF503114000
|
unkown
|
page readonly
|
||
7FF503020000
|
unkown
|
page readonly
|
||
120000
|
heap
|
page read and write
|
||
1044F000
|
heap
|
page read and write
|
||
10451000
|
heap
|
page read and write
|
||
7FF5030C9000
|
unkown
|
page readonly
|
||
7FF502CF2000
|
unkown
|
page readonly
|
||
7DF411F01000
|
unkown
|
page execute read
|
||
8B2B000
|
heap
|
page read and write
|
||
7FF503110000
|
unkown
|
page readonly
|
||
8BD0000
|
heap
|
page read and write
|
||
1045F000
|
heap
|
page read and write
|
||
D2EE000
|
heap
|
page read and write
|
||
EC90000
|
unkown
|
page execute and read and write
|
||
D04C000
|
heap
|
page read and write
|
||
C1B3000
|
unkown
|
page read and write
|
||
1059B000
|
heap
|
page read and write
|
||
C178000
|
unkown
|
page read and write
|
||
8BC9000
|
heap
|
page read and write
|
||
7FF5032A5000
|
unkown
|
page readonly
|
||
987C000
|
stack
|
page read and write
|
||
8BB3000
|
heap
|
page read and write
|
||
8100000
|
trusted library allocation
|
page read and write
|
||
8B4F000
|
stack
|
page read and write
|
||
8BDE000
|
heap
|
page read and write
|
||
D16D000
|
heap
|
page read and write
|
||
BDE0000
|
unkown
|
page read and write
|
||
D35E000
|
heap
|
page read and write
|
||
6EE6000
|
unkown
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
A36B000
|
unkown
|
page read and write
|
||
74C2000
|
unkown
|
page read and write
|
||
7FF502D91000
|
unkown
|
page readonly
|
||
1043D000
|
heap
|
page read and write
|
||
10372000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
6FDA000
|
unkown
|
page read and write
|
||
B607000
|
heap
|
page read and write
|
||
7A60000
|
unkown
|
page read and write
|
||
9366000
|
unkown
|
page read and write
|
||
7BD7000
|
heap
|
page read and write
|
||
BCFB000
|
heap
|
page read and write
|
||
D360000
|
heap
|
page read and write
|
||
6E99000
|
stack
|
page read and write
|
||
1059B000
|
heap
|
page read and write
|
||
B5FA000
|
heap
|
page read and write
|
||
BC19000
|
unkown
|
page read and write
|
||
9191000
|
unkown
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
C31B000
|
stack
|
page read and write
|
||
1070C000
|
heap
|
page read and write
|
||
A3B8000
|
stack
|
page read and write
|
||
B5F0000
|
unkown
|
page readonly
|
||
7FF502F94000
|
unkown
|
page readonly
|
||
D372000
|
heap
|
page read and write
|
||
2B58000
|
stack
|
page read and write
|
||
4879000
|
direct allocation
|
page read and write
|
||
B44F000
|
stack
|
page read and write
|
||
7FF503175000
|
unkown
|
page readonly
|
||
2DE0000
|
unkown
|
page read and write
|
||
8C04000
|
heap
|
page read and write
|
||
7CE5000
|
heap
|
page read and write
|
||
7560000
|
unkown
|
page readonly
|
||
10390000
|
heap
|
page read and write
|
||
B607000
|
heap
|
page read and write
|
||
E980000
|
trusted library allocation
|
page read and write
|
||
37F0000
|
heap
|
page read and write
|
||
8A0C000
|
heap
|
page read and write
|
||
10383000
|
heap
|
page read and write
|
||
BC58000
|
heap
|
page read and write
|
||
9D0000
|
unkown
|
page read and write
|
||
C5F0000
|
trusted library allocation
|
page read and write
|
||
7FF5030C9000
|
unkown
|
page readonly
|
||
24E4000
|
heap
|
page read and write
|
||
1044D000
|
heap
|
page read and write
|
||
3002000
|
heap
|
page read and write
|
||
B33A000
|
stack
|
page read and write
|
||
C00A000
|
unkown
|
page read and write
|
||
B537000
|
heap
|
page read and write
|
||
B4EB000
|
heap
|
page read and write
|
||
7FF502D84000
|
unkown
|
page readonly
|
||
105C6000
|
heap
|
page read and write
|
||
8BC9000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
7FF502E0D000
|
unkown
|
page readonly
|
||
7FF5026FF000
|
unkown
|
page readonly
|
||
4750000
|
direct allocation
|
page read and write
|
||
51AE000
|
heap
|
page read and write
|
||
7FF502D10000
|
unkown
|
page readonly
|
||
9364000
|
unkown
|
page read and write
|
||
D2F5000
|
heap
|
page read and write
|
||
BC55000
|
unkown
|
page read and write
|
||
125000
|
heap
|
page read and write
|
||
702D000
|
unkown
|
page read and write
|
||
9B8A000
|
unkown
|
page read and write
|
||
6EE6000
|
unkown
|
page read and write
|
||
D120000
|
heap
|
page read and write
|
||
B53E000
|
heap
|
page read and write
|
||
80B0000
|
unkown
|
page read and write
|
||
52C0000
|
trusted library section
|
page read and write
|
||
B5B5000
|
heap
|
page read and write
|
||
8A37000
|
heap
|
page read and write
|
||
D376000
|
heap
|
page read and write
|
||
ECD5000
|
unkown
|
page execute and read and write
|
||
BBE8000
|
unkown
|
page read and write
|
||
D1EF000
|
heap
|
page read and write
|
||
105B1000
|
heap
|
page read and write
|
||
977E000
|
stack
|
page read and write
|
||
B555000
|
heap
|
page read and write
|
||
3973000
|
heap
|
page read and write
|
||
9BE3000
|
unkown
|
page read and write
|
||
D3DC000
|
heap
|
page read and write
|
||
8B2D000
|
heap
|
page read and write
|
||
44D0000
|
unkown
|
page read and write
|
||
D57C000
|
heap
|
page read and write
|
||
7FF4ECBF5000
|
unkown
|
page readonly
|
||
BC7F000
|
heap
|
page read and write
|
||
D3B1000
|
heap
|
page read and write
|
||
10585000
|
heap
|
page read and write
|
||
7FF503368000
|
unkown
|
page readonly
|
||
7BE0000
|
heap
|
page read and write
|
||
2880000
|
trusted library allocation
|
page read and write
|
||
2EF2000
|
stack
|
page read and write
|
||
D357000
|
heap
|
page read and write
|
||
A34D000
|
unkown
|
page read and write
|
||
D4E3000
|
heap
|
page read and write
|
||
D388000
|
heap
|
page read and write
|
||
7FF502EF7000
|
unkown
|
page readonly
|
||
B62E000
|
heap
|
page read and write
|
||
8440000
|
unkown
|
page read and write
|
||
7FF503270000
|
unkown
|
page readonly
|
||
7DF4C3581000
|
trusted library allocation
|
page execute read
|
||
11DE000
|
stack
|
page read and write
|
||
7FF5032AF000
|
unkown
|
page readonly
|
||
D2EE000
|
heap
|
page read and write
|
||
B630000
|
heap
|
page read and write
|
||
2C80000
|
unkown
|
page readonly
|
||
10451000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
8D8E000
|
heap
|
page read and write
|
||
8D4B000
|
heap
|
page read and write
|
||
800000
|
unkown
|
page readonly
|
||
8D1A000
|
heap
|
page read and write
|
||
8BC9000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
8100000
|
unkown
|
page readonly
|
||
9A000
|
stack
|
page read and write
|
||
D362000
|
heap
|
page read and write
|
||
E4C0000
|
trusted library allocation
|
page read and write
|
||
7720000
|
unkown
|
page readonly
|
||
D32A000
|
heap
|
page read and write
|
||
D366000
|
heap
|
page read and write
|
||
B5D0000
|
unkown
|
page readonly
|
||
D13D000
|
heap
|
page read and write
|
||
7CAB000
|
heap
|
page read and write
|
||
D3D1000
|
heap
|
page read and write
|
||
9B8A000
|
unkown
|
page read and write
|
||
8BC9000
|
stack
|
page read and write
|
||
3F2B000
|
heap
|
page read and write
|
||
30A2000
|
direct allocation
|
page execute and read and write
|
||
A2B0000
|
trusted library allocation
|
page read and write
|
||
7FF502D1B000
|
unkown
|
page readonly
|
||
D05A000
|
heap
|
page read and write
|
||
B621000
|
heap
|
page read and write
|
||
7FF503365000
|
unkown
|
page readonly
|
||
B67E000
|
heap
|
page read and write
|
||
B5B5000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
7FF5032C0000
|
unkown
|
page readonly
|
||
7FF502E5E000
|
unkown
|
page readonly
|
||
10422000
|
heap
|
page read and write
|
||
30A5000
|
unkown
|
page read and write
|
||
E34E000
|
stack
|
page read and write
|
||
D38E000
|
heap
|
page read and write
|
||
DF4C000
|
stack
|
page read and write
|
||
B63B000
|
heap
|
page read and write
|
||
B51E000
|
heap
|
page read and write
|
||
9191000
|
unkown
|
page read and write
|
||
7D4C000
|
heap
|
page read and write
|
||
7FF4ECBEF000
|
unkown
|
page readonly
|
||
B617000
|
heap
|
page read and write
|
||
29D9000
|
stack
|
page read and write
|
||
D34F000
|
heap
|
page read and write
|
||
8F3D000
|
stack
|
page read and write
|
||
D32A000
|
heap
|
page read and write
|
||
7FF502FAC000
|
unkown
|
page readonly
|
||
D474000
|
heap
|
page read and write
|
||
D098000
|
heap
|
page read and write
|
||
BCFD000
|
heap
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
10585000
|
heap
|
page read and write
|
||
BBB0000
|
unkown
|
page read and write
|
||
98FC000
|
stack
|
page read and write
|
||
D4B1000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
7FF502E60000
|
unkown
|
page readonly
|
||
B09B000
|
stack
|
page read and write
|
||
520F000
|
heap
|
page read and write
|
||
309D000
|
unkown
|
page read and write
|
||
10598000
|
heap
|
page read and write
|
||
7D3B000
|
heap
|
page read and write
|
||
B552000
|
heap
|
page read and write
|
||
30B6000
|
unclassified section
|
page read and write
|
||
10701000
|
heap
|
page read and write
|
||
1090000
|
unkown
|
page readonly
|
||
D308000
|
heap
|
page read and write
|
||
BFB4000
|
unkown
|
page read and write
|
||
8BD6000
|
heap
|
page read and write
|
||
8DBD000
|
heap
|
page read and write
|
||
A17000
|
heap
|
page read and write
|
||
8EBE000
|
stack
|
page read and write
|
||
7FF50335D000
|
unkown
|
page readonly
|
||
8BD2000
|
heap
|
page read and write
|
||
88AB000
|
stack
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
D2D8000
|
heap
|
page read and write
|
||
7FF50326B000
|
unkown
|
page readonly
|
||
8C06000
|
heap
|
page read and write
|
||
7FF5030E6000
|
unkown
|
page readonly
|
||
6ED7000
|
unkown
|
page read and write
|
||
D3BA000
|
heap
|
page read and write
|
||
104AE000
|
heap
|
page read and write
|
||
D58D000
|
heap
|
page read and write
|
||
10457000
|
heap
|
page read and write
|
||
3013000
|
heap
|
page read and write
|
||
7FF502E0A000
|
unkown
|
page readonly
|
||
D36A000
|
heap
|
page read and write
|
||
7FF50301B000
|
unkown
|
page readonly
|
||
B62E000
|
heap
|
page read and write
|
||
E980000
|
trusted library allocation
|
page read and write
|
||
B53E000
|
heap
|
page read and write
|
||
10453000
|
heap
|
page read and write
|
||
8DA9000
|
heap
|
page read and write
|
||
7FF502F22000
|
unkown
|
page readonly
|
||
D16A000
|
heap
|
page read and write
|
||
10587000
|
heap
|
page read and write
|
||
BDC7000
|
unkown
|
page read and write
|
||
2DF3000
|
heap
|
page read and write
|
||
B709000
|
stack
|
page read and write
|
||
30A5000
|
unkown
|
page read and write
|
||
10453000
|
heap
|
page read and write
|
||
A32F000
|
unkown
|
page read and write
|
||
D57E000
|
heap
|
page read and write
|
||
B549000
|
stack
|
page read and write
|
||
44D0000
|
unkown
|
page read and write
|
||
CF43000
|
heap
|
page read and write
|
||
D376000
|
heap
|
page read and write
|
||
BD4F000
|
heap
|
page read and write
|
||
1041C000
|
heap
|
page read and write
|
||
D357000
|
heap
|
page read and write
|
||
7620000
|
unkown
|
page readonly
|
||
B617000
|
heap
|
page read and write
|
||
CEC2000
|
heap
|
page read and write
|
||
D1CA000
|
heap
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
4435000
|
unkown
|
page read and write
|
||
8BB3000
|
heap
|
page read and write
|
||
6E99000
|
stack
|
page read and write
|
||
A1F0000
|
heap
|
page read and write
|
||
1041C000
|
heap
|
page read and write
|
||
B624000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
A020000
|
trusted library allocation
|
page read and write
|
||
4750000
|
direct allocation
|
page read and write
|
||
7CA4000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
8BF0000
|
heap
|
page read and write
|
||
BEA3000
|
unkown
|
page read and write
|
||
BD6C000
|
unkown
|
page read and write
|
||
8C1D000
|
heap
|
page read and write
|
||
8D46000
|
heap
|
page read and write
|
||
8B2D000
|
heap
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
7FF503275000
|
unkown
|
page readonly
|
||
C610000
|
trusted library allocation
|
page read and write
|
||
BD48000
|
heap
|
page read and write
|
||
10440000
|
heap
|
page read and write
|
||
B50F000
|
heap
|
page read and write
|
||
7FF502EB7000
|
unkown
|
page readonly
|
||
D327000
|
heap
|
page read and write
|
||
9B83000
|
unkown
|
page read and write
|
||
105C2000
|
heap
|
page read and write
|
||
8D6E000
|
heap
|
page read and write
|
||
7550000
|
unkown
|
page read and write
|
||
D0FC000
|
heap
|
page read and write
|
||
1059B000
|
heap
|
page read and write
|
||
7FF5031BC000
|
unkown
|
page readonly
|
||
D4BC000
|
heap
|
page read and write
|
||
2F10000
|
unkown
|
page readonly
|
||
B624000
|
heap
|
page read and write
|
||
D47D000
|
heap
|
page read and write
|
||
CDD6000
|
heap
|
page read and write
|
||
7D27000
|
heap
|
page read and write
|
||
8DBD000
|
heap
|
page read and write
|
||
C1D0000
|
remote allocation
|
page read and write
|
||
BC30000
|
unkown
|
page read and write
|
||
2F20000
|
unkown
|
page readonly
|
||
C60000
|
unkown
|
page readonly
|
||
6FBF000
|
unkown
|
page read and write
|
||
BFB9000
|
unkown
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
D107000
|
heap
|
page read and write
|
||
BF2E000
|
unkown
|
page read and write
|
||
BD17000
|
heap
|
page read and write
|
||
D14A000
|
heap
|
page read and write
|
||
9BF7000
|
unkown
|
page read and write
|
||
7630000
|
unkown
|
page readonly
|
||
105BF000
|
heap
|
page read and write
|
||
255A000
|
stack
|
page read and write
|
||
7FF502E8F000
|
unkown
|
page readonly
|
||
300F000
|
stack
|
page read and write
|
||
7370000
|
unkown
|
page read and write
|
||
7FF5030C4000
|
unkown
|
page readonly
|
||
8FE000
|
stack
|
page read and write
|
||
819F000
|
stack
|
page read and write
|
||
8D3E000
|
heap
|
page read and write
|
||
1037F000
|
heap
|
page read and write
|
||
FD9B000
|
unkown
|
page read and write
|
||
7FF503347000
|
unkown
|
page readonly
|
||
7BFD000
|
heap
|
page read and write
|
||
7FF502F96000
|
unkown
|
page readonly
|
||
D3D8000
|
heap
|
page read and write
|
||
9D01000
|
unkown
|
page read and write
|
||
EB9C000
|
unkown
|
page read and write
|
||
B4AF000
|
heap
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
8A28000
|
heap
|
page read and write
|
||
E7FF000
|
stack
|
page read and write
|
||
EBF3000
|
unkown
|
page read and write
|
||
B5FA000
|
heap
|
page read and write
|
||
4402000
|
unkown
|
page read and write
|
||
7651000
|
unkown
|
page read and write
|
||
521A000
|
heap
|
page read and write
|
||
10443000
|
heap
|
page read and write
|
||
BBFA000
|
unkown
|
page read and write
|
||
D180000
|
heap
|
page read and write
|
||
BC60000
|
heap
|
page read and write
|
||
7BA0000
|
heap
|
page read and write
|
||
8C0C000
|
heap
|
page read and write
|
||
BD17000
|
heap
|
page read and write
|
||
D25F000
|
heap
|
page read and write
|
||
3205000
|
heap
|
page read and write
|
||
D378000
|
heap
|
page read and write
|
||
6EE4000
|
unkown
|
page read and write
|
||
308F000
|
unkown
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
8BD0000
|
heap
|
page read and write
|
||
2EF2000
|
stack
|
page read and write
|
||
7FF502DD3000
|
unkown
|
page readonly
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
8D6E000
|
heap
|
page read and write
|
||
AAA0000
|
unkown
|
page readonly
|
||
3EFA000
|
heap
|
page read and write
|
||
8BF0000
|
heap
|
page read and write
|
||
D357000
|
heap
|
page read and write
|
||
B5B5000
|
heap
|
page read and write
|
||
D17F000
|
heap
|
page read and write
|
||
7FF502DC0000
|
unkown
|
page readonly
|
||
8BEC000
|
heap
|
page read and write
|
||
9B70000
|
unkown
|
page read and write
|
||
B62E000
|
heap
|
page read and write
|
||
BC08000
|
unkown
|
page read and write
|
||
936E000
|
unkown
|
page read and write
|
||
7FF5032DF000
|
unkown
|
page readonly
|
||
9C2C000
|
unkown
|
page read and write
|
||
D394000
|
heap
|
page read and write
|
||
7FF503126000
|
unkown
|
page readonly
|
||
90DA000
|
unkown
|
page read and write
|
||
7FF502E60000
|
unkown
|
page readonly
|
||
7FF5032D7000
|
unkown
|
page readonly
|
||
24E4000
|
heap
|
page read and write
|
||
D386000
|
heap
|
page read and write
|
||
7FF502D68000
|
unkown
|
page readonly
|
||
B5FA000
|
heap
|
page read and write
|
||
D31A000
|
heap
|
page read and write
|
||
BCDC000
|
heap
|
page read and write
|
||
7C89000
|
heap
|
page read and write
|
||
7FF502C8C000
|
unkown
|
page readonly
|
||
D4D4000
|
heap
|
page read and write
|
||
8C08000
|
heap
|
page read and write
|
||
2C80000
|
unkown
|
page readonly
|
||
BFB9000
|
unkown
|
page read and write
|
||
B624000
|
heap
|
page read and write
|
||
9237000
|
unkown
|
page read and write
|
||
7FF502D29000
|
unkown
|
page readonly
|
||
6ED9000
|
unkown
|
page read and write
|
||
D18C000
|
heap
|
page read and write
|
||
B556000
|
heap
|
page read and write
|
||
B519000
|
heap
|
page read and write
|
||
D654000
|
system
|
page execute and read and write
|
||
7490000
|
unkown
|
page read and write
|
||
1044D000
|
heap
|
page read and write
|
||
10466000
|
heap
|
page read and write
|
||
1044F000
|
heap
|
page read and write
|
||
CDAC000
|
heap
|
page read and write
|
||
3091000
|
unkown
|
page read and write
|
||
7FF503270000
|
unkown
|
page readonly
|
||
7BCE000
|
heap
|
page read and write
|
||
7FF502D25000
|
unkown
|
page readonly
|
||
D2F5000
|
heap
|
page read and write
|
||
D161000
|
heap
|
page read and write
|
||
7FF502B93000
|
unkown
|
page readonly
|
||
C90C000
|
stack
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
74B0000
|
unkown
|
page read and write
|
||
7D4A000
|
heap
|
page read and write
|
||
B555000
|
heap
|
page read and write
|
||
105A9000
|
heap
|
page read and write
|
||
D097000
|
heap
|
page read and write
|
||
7BD9000
|
heap
|
page read and write
|
||
2C04000
|
unkown
|
page read and write
|
||
B515000
|
heap
|
page read and write
|
||
105B1000
|
heap
|
page read and write
|
||
3088000
|
unkown
|
page read and write
|
||
D151000
|
heap
|
page read and write
|
||
D357000
|
heap
|
page read and write
|
||
B630000
|
heap
|
page read and write
|
||
A05B000
|
heap
|
page read and write
|
||
8BD2000
|
heap
|
page read and write
|
||
7FF5030B4000
|
unkown
|
page readonly
|
||
7FF503114000
|
unkown
|
page readonly
|
||
1042E000
|
heap
|
page read and write
|
||
3099000
|
unkown
|
page read and write
|
||
3800000
|
direct allocation
|
page execute and read and write
|
||
8D1C000
|
heap
|
page read and write
|
||
8AF6000
|
heap
|
page read and write
|
||
B607000
|
heap
|
page read and write
|
||
BC30000
|
unkown
|
page read and write
|
||
D362000
|
heap
|
page read and write
|
||
7C0E000
|
heap
|
page read and write
|
||
B54E000
|
heap
|
page read and write
|
||
D560000
|
heap
|
page read and write
|
||
7FF503326000
|
unkown
|
page readonly
|
||
D370000
|
heap
|
page read and write
|
||
7BD9000
|
heap
|
page read and write
|
||
8A91000
|
heap
|
page read and write
|
||
6F09000
|
unkown
|
page read and write
|
||
7FF502B7F000
|
unkown
|
page readonly
|
||
D1C3000
|
heap
|
page read and write
|
||
D0FC000
|
heap
|
page read and write
|
||
7FF503185000
|
unkown
|
page readonly
|
||
7FF502B6F000
|
unkown
|
page readonly
|
||
7620000
|
unkown
|
page readonly
|
||
7DF4C3590000
|
trusted library allocation
|
page readonly
|
||
D58D000
|
heap
|
page read and write
|
||
7BEA000
|
heap
|
page read and write
|
||
A16A000
|
heap
|
page read and write
|
||
D4B3000
|
heap
|
page read and write
|
||
D0E1000
|
heap
|
page read and write
|
||
8D1A000
|
heap
|
page read and write
|
||
7FF502D70000
|
unkown
|
page readonly
|
||
7FF5030AA000
|
unkown
|
page readonly
|
||
8CEB000
|
heap
|
page read and write
|
||
D4E2000
|
heap
|
page read and write
|
||
D04C000
|
heap
|
page read and write
|
||
B5B5000
|
heap
|
page read and write
|
||
80C0000
|
unkown
|
page readonly
|
||
D11C000
|
heap
|
page read and write
|
||
7FF50328F000
|
unkown
|
page readonly
|
||
105C6000
|
heap
|
page read and write
|
||
7BD9000
|
heap
|
page read and write
|
||
D37C000
|
heap
|
page read and write
|
||
1075000
|
stack
|
page read and write
|
||
7FF502C30000
|
unkown
|
page readonly
|
||
D1F1000
|
heap
|
page read and write
|
||
7FF502CDD000
|
unkown
|
page readonly
|
||
24E4000
|
heap
|
page read and write
|
||
7FF503195000
|
unkown
|
page readonly
|
||
D3BA000
|
heap
|
page read and write
|
||
B624000
|
heap
|
page read and write
|
||
9BE3000
|
unkown
|
page read and write
|
||
35A0000
|
stack
|
page read and write
|
||
D58D000
|
heap
|
page read and write
|
||
D13D000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
8C0C000
|
heap
|
page read and write
|
||
105C6000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
D126000
|
heap
|
page read and write
|
||
8CDE000
|
heap
|
page read and write
|
||
7FF502E9C000
|
unkown
|
page readonly
|
||
BD58000
|
heap
|
page read and write
|
||
BDCB000
|
unkown
|
page read and write
|
||
10592000
|
heap
|
page read and write
|
||
A346000
|
unkown
|
page read and write
|
||
9050000
|
unkown
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
B5FA000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
9D0D000
|
unkown
|
page read and write
|
||
FD14000
|
unkown
|
page read and write
|
||
7FF502F86000
|
unkown
|
page readonly
|
||
ED14000
|
unkown
|
page execute and read and write
|
||
8C02000
|
heap
|
page read and write
|
||
D05A000
|
heap
|
page read and write
|
||
8C00000
|
heap
|
page read and write
|
||
8BD8000
|
heap
|
page read and write
|
||
7DF4C3500000
|
trusted library allocation
|
page readonly
|
||
40C000
|
stack
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
D3AC000
|
heap
|
page read and write
|
||
7DF4C35A1000
|
trusted library allocation
|
page execute read
|
||
D57C000
|
heap
|
page read and write
|
||
B4B1000
|
heap
|
page read and write
|
||
7FF5031B7000
|
unkown
|
page readonly
|
||
7BFD000
|
heap
|
page read and write
|
||
7BD7000
|
heap
|
page read and write
|
||
D474000
|
heap
|
page read and write
|
||
E14D000
|
stack
|
page read and write
|
||
D259000
|
heap
|
page read and write
|
||
6ED9000
|
unkown
|
page read and write
|
||
819F000
|
stack
|
page read and write
|
||
D34B000
|
heap
|
page read and write
|
||
B590000
|
heap
|
page read and write
|
||
D062000
|
heap
|
page read and write
|
||
3217000
|
heap
|
page read and write
|
||
D390000
|
heap
|
page read and write
|
||
D1E2000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
8C06000
|
heap
|
page read and write
|
||
10466000
|
heap
|
page read and write
|
||
D4B1000
|
heap
|
page read and write
|
||
8A09000
|
heap
|
page read and write
|
||
2D0B000
|
stack
|
page read and write
|
||
7FF502CCE000
|
unkown
|
page readonly
|
||
2BF4000
|
unkown
|
page read and write
|
||
10587000
|
heap
|
page read and write
|
||
7FF502CD4000
|
unkown
|
page readonly
|
||
CDEC000
|
heap
|
page read and write
|
||
10451000
|
heap
|
page read and write
|
||
7630000
|
unkown
|
page readonly
|
||
105C2000
|
heap
|
page read and write
|
||
379E000
|
heap
|
page read and write
|
||
6EE1000
|
unkown
|
page read and write
|
||
D388000
|
heap
|
page read and write
|
||
D360000
|
heap
|
page read and write
|
||
7DF4C3581000
|
trusted library allocation
|
page execute read
|
||
7FF502B88000
|
unkown
|
page readonly
|
||
8A49000
|
stack
|
page read and write
|
||
B237000
|
stack
|
page read and write
|
||
7C8F000
|
heap
|
page read and write
|
||
7FF503335000
|
unkown
|
page readonly
|
||
7FF502DC8000
|
unkown
|
page readonly
|
||
D31C000
|
heap
|
page read and write
|
||
10457000
|
heap
|
page read and write
|
||
8BD8000
|
heap
|
page read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
8BD6000
|
heap
|
page read and write
|
||
BC21000
|
unkown
|
page read and write
|
||
B5FA000
|
heap
|
page read and write
|
||
BEE6000
|
unkown
|
page read and write
|
||
8250000
|
trusted library section
|
page readonly
|
||
7FF502FA2000
|
unkown
|
page readonly
|
||
24E4000
|
heap
|
page read and write
|
||
C1D0000
|
remote allocation
|
page read and write
|
||
7DF4C3571000
|
trusted library allocation
|
page execute read
|
||
11610000
|
trusted library allocation
|
page read and write
|
||
7F70000
|
unkown
|
page readonly
|
||
8BEE000
|
heap
|
page read and write
|
||
3929000
|
direct allocation
|
page execute and read and write
|
||
D15E000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
7DF4C34E1000
|
trusted library allocation
|
page execute read
|
||
1045D000
|
heap
|
page read and write
|
||
D590000
|
system
|
page execute and read and write
|
||
10455000
|
heap
|
page read and write
|
||
B580000
|
unkown
|
page read and write
|
||
2B58000
|
stack
|
page read and write
|
||
D2E9000
|
heap
|
page read and write
|
||
7D32000
|
heap
|
page read and write
|
||
B62E000
|
heap
|
page read and write
|
||
3205000
|
heap
|
page read and write
|
||
8BDC000
|
heap
|
page read and write
|
||
10443000
|
heap
|
page read and write
|
||
B481000
|
heap
|
page read and write
|
||
7DE8000
|
stack
|
page read and write
|
||
7FF5032FE000
|
unkown
|
page readonly
|
||
BCC9000
|
heap
|
page read and write
|
||
D18E000
|
heap
|
page read and write
|
||
B2BA000
|
stack
|
page read and write
|
||
BD34000
|
heap
|
page read and write
|
||
2BC1000
|
trusted library allocation
|
page execute and read and write
|
||
7FF502F4B000
|
unkown
|
page readonly
|
||
BD00000
|
heap
|
page read and write
|
||
7FF502D25000
|
unkown
|
page readonly
|
||
44A0000
|
unkown
|
page read and write
|
||
D1BE000
|
heap
|
page read and write
|
||
1058B000
|
heap
|
page read and write
|
||
7FF50316E000
|
unkown
|
page readonly
|
||
8AF6000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
3734000
|
unclassified section
|
page execute and read and write
|
||
D562000
|
heap
|
page read and write
|
||
3EFA000
|
heap
|
page read and write
|
||
96CC000
|
stack
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
D306000
|
heap
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
10598000
|
heap
|
page read and write
|
||
C0DE000
|
unkown
|
page read and write
|
||
A020000
|
trusted library allocation
|
page read and write
|
||
7DF411F01000
|
unkown
|
page execute read
|
||
D1F1000
|
heap
|
page read and write
|
||
BBB0000
|
unkown
|
page read and write
|
||
D35E000
|
heap
|
page read and write
|
||
D16D000
|
heap
|
page read and write
|
||
8BFC000
|
heap
|
page read and write
|
||
C04E000
|
unkown
|
page read and write
|
||
104C4000
|
heap
|
page read and write
|
||
9255000
|
unkown
|
page read and write
|
||
2EFE000
|
direct allocation
|
page execute and read and write
|
||
7D4A000
|
heap
|
page read and write
|
||
D1E6000
|
heap
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
BEA9000
|
unkown
|
page read and write
|
||
7FF503185000
|
unkown
|
page readonly
|
||
89D7000
|
heap
|
page read and write
|
||
1045B000
|
heap
|
page read and write
|
||
10714000
|
heap
|
page read and write
|
||
D1E4000
|
heap
|
page read and write
|
||
6EC0000
|
unkown
|
page read and write
|
||
38CF000
|
heap
|
page read and write
|
||
7FF503360000
|
unkown
|
page readonly
|
||
D364000
|
heap
|
page read and write
|
||
7FF503051000
|
unkown
|
page readonly
|
||
7C8D000
|
heap
|
page read and write
|
||
7FF502D33000
|
unkown
|
page readonly
|
||
2AA0000
|
unkown
|
page read and write
|
||
B67E000
|
heap
|
page read and write
|
||
7FF503354000
|
unkown
|
page readonly
|
||
4463000
|
unkown
|
page read and write
|
||
7FF503130000
|
unkown
|
page readonly
|
||
C633000
|
trusted library allocation
|
page read and write
|
||
8A16000
|
heap
|
page read and write
|
||
4879000
|
direct allocation
|
page read and write
|
||
BD4F000
|
heap
|
page read and write
|
||
B624000
|
heap
|
page read and write
|
||
9330000
|
unkown
|
page read and write
|
||
D1BE000
|
heap
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
BE99000
|
unkown
|
page read and write
|
||
BCC8000
|
heap
|
page read and write
|
||
D1C5000
|
heap
|
page read and write
|
||
D376000
|
heap
|
page read and write
|
||
10714000
|
heap
|
page read and write
|
||
BC0C000
|
unkown
|
page read and write
|
||
7FF502EBB000
|
unkown
|
page readonly
|
||
105BF000
|
heap
|
page read and write
|
||
1044F000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
104C9000
|
heap
|
page read and write
|
||
10358000
|
heap
|
page read and write
|
||
BCE0000
|
heap
|
page read and write
|
||
8BC9000
|
heap
|
page read and write
|
||
46D3000
|
direct allocation
|
page read and write
|
||
BC9E000
|
heap
|
page read and write
|
||
D07F000
|
heap
|
page read and write
|
||
A34D000
|
unkown
|
page read and write
|
||
3CE1000
|
heap
|
page read and write
|
||
7FF5032BD000
|
unkown
|
page readonly
|
||
7FF502CCE000
|
unkown
|
page readonly
|
||
D055000
|
heap
|
page read and write
|
||
D468000
|
heap
|
page read and write
|
||
B617000
|
heap
|
page read and write
|
||
7FF502E03000
|
unkown
|
page readonly
|
||
BCFB000
|
heap
|
page read and write
|
||
AA8D000
|
stack
|
page read and write
|
||
BDCB000
|
unkown
|
page read and write
|
||
7DF4C3591000
|
trusted library allocation
|
page execute read
|
||
7FF5030EF000
|
unkown
|
page readonly
|
||
9D03000
|
unkown
|
page read and write
|
||
7DF4C3540000
|
trusted library allocation
|
page readonly
|
||
D259000
|
heap
|
page read and write
|
||
D3D8000
|
heap
|
page read and write
|
||
8BB9000
|
heap
|
page read and write
|
||
D180000
|
heap
|
page read and write
|
||
A7ED000
|
stack
|
page read and write
|
||
BD34000
|
heap
|
page read and write
|
||
7DF4C34E0000
|
trusted library allocation
|
page readonly
|
||
4879000
|
direct allocation
|
page read and write
|
||
1041C000
|
heap
|
page read and write
|
||
7FF502D41000
|
unkown
|
page readonly
|
||
7C93000
|
heap
|
page read and write
|
||
9C8A000
|
unkown
|
page read and write
|
||
BEF6000
|
unkown
|
page read and write
|
||
1044F000
|
heap
|
page read and write
|
||
8BDC000
|
heap
|
page read and write
|
||
1040F000
|
heap
|
page read and write
|
||
D2EE000
|
heap
|
page read and write
|
||
307E000
|
unkown
|
page read and write
|
||
8AF6000
|
heap
|
page read and write
|
||
7490000
|
unkown
|
page read and write
|
||
DD5C000
|
stack
|
page read and write
|
||
8D6E000
|
heap
|
page read and write
|
||
D468000
|
heap
|
page read and write
|
||
1004F000
|
system
|
page read and write
|
||
7FF502E5E000
|
unkown
|
page readonly
|
||
2BCE000
|
unkown
|
page read and write
|
||
1044F000
|
heap
|
page read and write
|
||
7580000
|
unkown
|
page read and write
|
||
7FF503231000
|
unkown
|
page readonly
|
||
7FF502CF2000
|
unkown
|
page readonly
|
||
5164000
|
heap
|
page read and write
|
||
7F70000
|
unkown
|
page readonly
|
||
24E4000
|
heap
|
page read and write
|
||
BC60000
|
heap
|
page read and write
|
||
8BD0000
|
heap
|
page read and write
|
||
7BE0000
|
heap
|
page read and write
|
||
10447000
|
heap
|
page read and write
|
||
7FF5032C2000
|
unkown
|
page readonly
|
||
7FF502EBB000
|
unkown
|
page readonly
|
||
8BD4000
|
heap
|
page read and write
|
||
10587000
|
heap
|
page read and write
|
||
B590000
|
heap
|
page read and write
|
||
EB90000
|
unkown
|
page read and write
|
||
C178000
|
stack
|
page read and write
|
||
8AF6000
|
heap
|
page read and write
|
||
10464000
|
heap
|
page read and write
|
||
10443000
|
heap
|
page read and write
|
||
A020000
|
trusted library allocation
|
page read and write
|
||
A388000
|
unkown
|
page read and write
|
||
7FF503110000
|
unkown
|
page readonly
|
||
B5FA000
|
heap
|
page read and write
|
||
C5E3000
|
trusted library allocation
|
page read and write
|
||
104C4000
|
heap
|
page read and write
|
||
124D000
|
heap
|
page read and write
|
||
BD48000
|
heap
|
page read and write
|
||
10729000
|
heap
|
page read and write
|
||
8ADC000
|
heap
|
page read and write
|
||
EBD2000
|
unkown
|
page read and write
|
||
11600000
|
trusted library allocation
|
page read and write
|
||
1054D000
|
heap
|
page read and write
|
||
3013000
|
heap
|
page read and write
|
||
D468000
|
heap
|
page read and write
|
||
D374000
|
heap
|
page read and write
|
||
105BF000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
BD4C000
|
heap
|
page read and write
|
||
7DF4C3591000
|
trusted library allocation
|
page execute read
|
||
2DA7000
|
stack
|
page read and write
|
||
D1C4000
|
heap
|
page read and write
|
||
B630000
|
heap
|
page read and write
|
||
7CE7000
|
heap
|
page read and write
|
||
3E44000
|
heap
|
page read and write
|
||
B1B000
|
heap
|
page read and write
|
||
7FF502291000
|
unkown
|
page readonly
|
||
7DF4C3551000
|
trusted library allocation
|
page execute read
|
||
D3DC000
|
heap
|
page read and write
|
||
1045B000
|
heap
|
page read and write
|
||
D364000
|
heap
|
page read and write
|
||
8BFA000
|
heap
|
page read and write
|
||
B505000
|
heap
|
page read and write
|
||
1045D000
|
heap
|
page read and write
|
||
7FF5030EF000
|
unkown
|
page readonly
|
||
7B73000
|
heap
|
page read and write
|
||
DD4E000
|
stack
|
page read and write
|
||
BC7B000
|
heap
|
page read and write
|
||
B67E000
|
heap
|
page read and write
|
||
BD15000
|
heap
|
page read and write
|
||
D3F4000
|
heap
|
page read and write
|
||
D06F000
|
heap
|
page read and write
|
||
A8EA000
|
stack
|
page read and write
|
||
105C6000
|
heap
|
page read and write
|
||
2A90000
|
unkown
|
page readonly
|
||
B5B5000
|
heap
|
page read and write
|
||
6ECE000
|
unkown
|
page read and write
|
||
6ECE000
|
unkown
|
page read and write
|
||
977E000
|
stack
|
page read and write
|
||
7370000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5218000
|
heap
|
page read and write
|
||
5177000
|
heap
|
page read and write
|
||
8D3F000
|
heap
|
page read and write
|
||
1070C000
|
heap
|
page read and write
|
||
7FF503287000
|
unkown
|
page readonly
|
||
1036C000
|
heap
|
page read and write
|
||
7CAB000
|
heap
|
page read and write
|
||
10455000
|
heap
|
page read and write
|
||
D327000
|
heap
|
page read and write
|
||
7FF502FB7000
|
unkown
|
page readonly
|
||
2BA0000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
C86F000
|
stack
|
page read and write
|
||
105BF000
|
heap
|
page read and write
|
||
8AF6000
|
heap
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
8C00000
|
heap
|
page read and write
|
||
7FF502D1B000
|
unkown
|
page readonly
|
||
B546000
|
heap
|
page read and write
|
||
851E000
|
stack
|
page read and write
|
||
43EA000
|
unkown
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
8D1C000
|
heap
|
page read and write
|
||
474000
|
system
|
page execute and read and write
|
||
105A9000
|
heap
|
page read and write
|
||
7FF503227000
|
unkown
|
page readonly
|
||
DA4D000
|
stack
|
page read and write
|
||
EBD2000
|
unkown
|
page read and write
|
||
8BEE000
|
heap
|
page read and write
|
||
7FF5030E4000
|
unkown
|
page readonly
|
||
3ACD000
|
direct allocation
|
page execute and read and write
|
||
7FF50324D000
|
unkown
|
page readonly
|
||
10356000
|
heap
|
page read and write
|
||
308F000
|
unkown
|
page read and write
|
||
8A37000
|
heap
|
page read and write
|
||
D4B3000
|
heap
|
page read and write
|
||
99FF000
|
stack
|
page read and write
|
||
3FE1000
|
heap
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
B5FA000
|
heap
|
page read and write
|
||
D468000
|
heap
|
page read and write
|
||
7FF50327C000
|
unkown
|
page readonly
|
||
8C97000
|
heap
|
page read and write
|
||
8B2D000
|
heap
|
page read and write
|
||
7FF50335D000
|
unkown
|
page readonly
|
||
D0FC000
|
heap
|
page read and write
|
||
7609000
|
stack
|
page read and write
|
||
7FF503216000
|
unkown
|
page readonly
|
||
D4C7000
|
heap
|
page read and write
|
||
104C4000
|
heap
|
page read and write
|
||
E353000
|
trusted library allocation
|
page read and write
|
||
D58D000
|
heap
|
page read and write
|
||
D34F000
|
heap
|
page read and write
|
||
1045B000
|
heap
|
page read and write
|
||
3217000
|
heap
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
10430000
|
heap
|
page read and write
|
||
9B87000
|
unkown
|
page read and write
|
||
BB0E000
|
stack
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
28EA000
|
heap
|
page read and write
|
||
E3B0000
|
trusted library allocation
|
page read and write
|
||
D4DB000
|
heap
|
page read and write
|
||
7FF503298000
|
unkown
|
page readonly
|
||
9193000
|
unkown
|
page read and write
|
||
D4EA000
|
heap
|
page read and write
|
||
10585000
|
heap
|
page read and write
|
||
B621000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
9D03000
|
unkown
|
page read and write
|
||
9EE000
|
heap
|
page read and write
|
||
10392000
|
heap
|
page read and write
|
||
7FF503130000
|
unkown
|
page readonly
|
||
3F5F000
|
heap
|
page read and write
|
||
7FF503235000
|
unkown
|
page readonly
|
||
1044D000
|
heap
|
page read and write
|
||
7DF411F11000
|
unkown
|
page execute read
|
||
1043D000
|
heap
|
page read and write
|
||
842A000
|
stack
|
page read and write
|
||
8BC1000
|
heap
|
page read and write
|
||
A32F000
|
unkown
|
page read and write
|
||
B515000
|
heap
|
page read and write
|
||
919C000
|
unkown
|
page read and write
|
||
BC15000
|
unkown
|
page read and write
|
||
D3AB000
|
heap
|
page read and write
|
||
7FF50302D000
|
unkown
|
page readonly
|
||
B607000
|
heap
|
page read and write
|
||
11600000
|
trusted library allocation
|
page read and write
|
||
56DF000
|
stack
|
page read and write
|
||
7BF1000
|
heap
|
page read and write
|
||
B589000
|
heap
|
page read and write
|
||
D1C5000
|
heap
|
page read and write
|
||
1029E000
|
stack
|
page read and write
|
||
B5FA000
|
heap
|
page read and write
|
||
7FF50323B000
|
unkown
|
page readonly
|
||
B580000
|
unkown
|
page read and write
|
||
D380000
|
heap
|
page read and write
|
||
7D4A000
|
heap
|
page read and write
|
||
D4BC000
|
heap
|
page read and write
|
||
7FF502D33000
|
unkown
|
page readonly
|
||
2903000
|
heap
|
page read and write
|
||
BD48000
|
heap
|
page read and write
|
||
BC52000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
105C6000
|
heap
|
page read and write
|
||
B009000
|
stack
|
page read and write
|
||
A2F0000
|
unkown
|
page read and write
|
||
10440000
|
heap
|
page read and write
|
||
A98F000
|
stack
|
page read and write
|
||
8BC1000
|
heap
|
page read and write
|
||
10587000
|
heap
|
page read and write
|
||
D300000
|
heap
|
page read and write
|
||
8C45000
|
heap
|
page read and write
|
||
11640000
|
trusted library allocation
|
page read and write
|
||
1068C000
|
heap
|
page read and write
|
||
8A69000
|
heap
|
page read and write
|
||
D4CF000
|
heap
|
page read and write
|
||
7FF502FAF000
|
unkown
|
page readonly
|
||
7FF503032000
|
unkown
|
page readonly
|
||
106CC000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
1070C000
|
heap
|
page read and write
|
||
7FF502EE3000
|
unkown
|
page readonly
|
||
7FF502FAC000
|
unkown
|
page readonly
|
||
395B000
|
heap
|
page read and write
|
||
B009000
|
stack
|
page read and write
|
||
D94D000
|
stack
|
page read and write
|
||
7FF502DC3000
|
unkown
|
page readonly
|
||
9D58000
|
unkown
|
page read and write
|
||
D166000
|
heap
|
page read and write
|
||
D13D000
|
heap
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
D392000
|
heap
|
page read and write
|
||
7FF503161000
|
unkown
|
page readonly
|
||
7D3B000
|
heap
|
page read and write
|
||
8BC9000
|
heap
|
page read and write
|
||
9F1000
|
unkown
|
page readonly
|
||
A000000
|
trusted library allocation
|
page read and write
|
||
7CE5000
|
heap
|
page read and write
|
||
7FF503129000
|
unkown
|
page readonly
|
||
7FF503151000
|
unkown
|
page readonly
|
||
1044D000
|
heap
|
page read and write
|
||
AF80000
|
unkown
|
page read and write
|
||
997F000
|
stack
|
page read and write
|
||
104A3000
|
heap
|
page read and write
|
||
D2EE000
|
heap
|
page read and write
|
||
BC8B000
|
heap
|
page read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
B617000
|
heap
|
page read and write
|
||
D180000
|
heap
|
page read and write
|
||
1043D000
|
heap
|
page read and write
|
||
3D4D000
|
heap
|
page read and write
|
||
B613000
|
heap
|
page read and write
|
||
BA8B000
|
stack
|
page read and write
|
||
10449000
|
heap
|
page read and write
|
||
43C7000
|
unkown
|
page read and write
|
||
7FF502D91000
|
unkown
|
page readonly
|
||
8610000
|
unkown
|
page read and write
|
||
7CA4000
|
heap
|
page read and write
|
||
104D8000
|
heap
|
page read and write
|
||
7FF503257000
|
unkown
|
page readonly
|
||
D3D8000
|
heap
|
page read and write
|
||
10583000
|
heap
|
page read and write
|
||
7FF502D84000
|
unkown
|
page readonly
|
||
6EB0000
|
unkown
|
page read and write
|
||
7FF502F2C000
|
unkown
|
page readonly
|
||
7FF503189000
|
unkown
|
page readonly
|
||
6ED0000
|
unkown
|
page read and write
|
||
D392000
|
heap
|
page read and write
|
||
7FF503223000
|
unkown
|
page readonly
|
||
10583000
|
heap
|
page read and write
|
||
32B6000
|
stack
|
page read and write
|
||
1064F000
|
heap
|
page read and write
|
||
8D1A000
|
heap
|
page read and write
|
||
D191000
|
heap
|
page read and write
|
||
D189000
|
heap
|
page read and write
|
||
7FF5026F7000
|
unkown
|
page readonly
|
||
7FF502DCF000
|
unkown
|
page readonly
|
||
D560000
|
heap
|
page read and write
|
||
D14A000
|
heap
|
page read and write
|
||
4E33000
|
unkown
|
page read and write
|
||
487D000
|
direct allocation
|
page read and write
|
||
C04E000
|
unkown
|
page read and write
|
||
7FF5032CF000
|
unkown
|
page readonly
|
||
309F000
|
unkown
|
page read and write
|
||
10430000
|
heap
|
page read and write
|
||
515C000
|
heap
|
page read and write
|
||
B62E000
|
heap
|
page read and write
|
||
7FF502D61000
|
unkown
|
page readonly
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
7FF502D9D000
|
unkown
|
page readonly
|
||
B5FA000
|
heap
|
page read and write
|
||
6FD7000
|
unkown
|
page read and write
|
||
104AE000
|
heap
|
page read and write
|
||
8922000
|
stack
|
page read and write
|
||
105A9000
|
heap
|
page read and write
|
||
7FF502DF9000
|
unkown
|
page readonly
|
||
7FF5031B7000
|
unkown
|
page readonly
|
||
BD56000
|
heap
|
page read and write
|
||
B5B5000
|
heap
|
page read and write
|
||
1040E000
|
heap
|
page read and write
|
||
91FB000
|
unkown
|
page read and write
|
||
B607000
|
heap
|
page read and write
|
||
8BEE000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
7FF5030E4000
|
unkown
|
page readonly
|
||
B5B5000
|
heap
|
page read and write
|
||
BD11000
|
heap
|
page read and write
|
||
105A5000
|
heap
|
page read and write
|
||
2E1C000
|
heap
|
page read and write
|
||
10583000
|
heap
|
page read and write
|
||
30CD000
|
unkown
|
page read and write
|
||
8BB3000
|
heap
|
page read and write
|
||
575F000
|
stack
|
page read and write
|
||
D562000
|
heap
|
page read and write
|
||
7FF502D00000
|
unkown
|
page readonly
|
||
2F80000
|
heap
|
page readonly
|
||
1045D000
|
heap
|
page read and write
|
||
BCC0000
|
heap
|
page read and write
|
||
B607000
|
heap
|
page read and write
|
||
D35A000
|
heap
|
page read and write
|
||
7FF503108000
|
unkown
|
page readonly
|
||
302D000
|
direct allocation
|
page execute and read and write
|
||
7FF503277000
|
unkown
|
page readonly
|
||
309D000
|
unkown
|
page read and write
|
||
B5D0000
|
unkown
|
page readonly
|
||
7DF4C3501000
|
trusted library allocation
|
page execute read
|
||
7B70000
|
heap
|
page read and write
|
||
7FF5030E6000
|
unkown
|
page readonly
|
||
8D9C000
|
heap
|
page read and write
|
||
7D4A000
|
heap
|
page read and write
|
||
BDCD000
|
unkown
|
page read and write
|
||
10453000
|
heap
|
page read and write
|
||
3FE7000
|
heap
|
page read and write
|
||
BC08000
|
unkown
|
page read and write
|
||
CD90000
|
heap
|
page read and write
|
||
10358000
|
heap
|
page read and write
|
||
7FF502D45000
|
unkown
|
page readonly
|
||
395D000
|
heap
|
page read and write
|
||
3429000
|
stack
|
page read and write
|
||
7FF50310B000
|
unkown
|
page readonly
|
||
2E8D000
|
direct allocation
|
page execute and read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
B630000
|
heap
|
page read and write
|
||
7FF503187000
|
unkown
|
page readonly
|
||
A5BF000
|
system
|
page read and write
|
||
D16C000
|
heap
|
page read and write
|
||
A030000
|
trusted library allocation
|
page read and write
|
||
D32A000
|
heap
|
page read and write
|
||
2C31000
|
unkown
|
page read and write
|
||
C5B0000
|
trusted library allocation
|
page read and write
|
||
104AE000
|
heap
|
page read and write
|
||
B624000
|
heap
|
page read and write
|
||
D3A4000
|
heap
|
page read and write
|
||
10449000
|
heap
|
page read and write
|
||
7FF502F47000
|
unkown
|
page readonly
|
||
8C2F000
|
heap
|
page read and write
|
||
8460000
|
unkown
|
page readonly
|
||
7FF5032A5000
|
unkown
|
page readonly
|
||
3FE3000
|
heap
|
page execute and read and write
|
||
3E4F000
|
heap
|
page read and write
|
||
EBD4000
|
unkown
|
page read and write
|
||
A388000
|
unkown
|
page read and write
|
||
8BDC000
|
heap
|
page read and write
|
||
EBD4000
|
unkown
|
page read and write
|
||
BC5C000
|
unkown
|
page read and write
|
||
7710000
|
unkown
|
page readonly
|
||
964E000
|
stack
|
page read and write
|
||
BDF0000
|
unkown
|
page read and write
|
||
9AFF000
|
stack
|
page read and write
|
||
B549000
|
stack
|
page read and write
|
||
8D45000
|
stack
|
page read and write
|
||
7FF5032B5000
|
unkown
|
page readonly
|
||
7FF50303F000
|
unkown
|
page readonly
|
||
D2D8000
|
heap
|
page read and write
|
||
8BD6000
|
heap
|
page read and write
|
||
DE4A000
|
stack
|
page read and write
|
||
AE8E000
|
stack
|
page read and write
|
||
7FF503006000
|
unkown
|
page readonly
|
||
105BF000
|
heap
|
page read and write
|
||
B539000
|
heap
|
page read and write
|
||
4D00000
|
unkown
|
page write copy
|
||
8B2B000
|
heap
|
page read and write
|
||
CF48000
|
heap
|
page read and write
|
||
8110000
|
unkown
|
page read and write
|
||
29D9000
|
stack
|
page read and write
|
||
8A37000
|
heap
|
page read and write
|
||
D58D000
|
heap
|
page read and write
|
||
4405000
|
unkown
|
page read and write
|
||
D38C000
|
heap
|
page read and write
|
||
BC19000
|
unkown
|
page read and write
|
||
8460000
|
unkown
|
page readonly
|
||
8BB3000
|
heap
|
page read and write
|
||
7FF502D20000
|
unkown
|
page readonly
|
||
D388000
|
heap
|
page read and write
|
||
1037F000
|
heap
|
page read and write
|
||
B63B000
|
heap
|
page read and write
|
||
BB0E000
|
stack
|
page read and write
|
||
A2B0000
|
trusted library allocation
|
page read and write
|
||
7FF502D6B000
|
unkown
|
page readonly
|
||
10420000
|
heap
|
page read and write
|
||
2BDA000
|
stack
|
page read and write
|
||
8AF6000
|
heap
|
page read and write
|
||
7DF411EF0000
|
unkown
|
page readonly
|
||
3099000
|
unkown
|
page read and write
|
||
28EF000
|
heap
|
page read and write
|
||
8D1A000
|
heap
|
page read and write
|
||
8A8B000
|
heap
|
page read and write
|
||
10457000
|
heap
|
page read and write
|
||
7FF50312D000
|
unkown
|
page readonly
|
||
D36E000
|
heap
|
page read and write
|
||
BDF5000
|
unkown
|
page read and write
|
||
D4B3000
|
heap
|
page read and write
|
||
400D000
|
heap
|
page read and write
|
||
D35E000
|
heap
|
page read and write
|
||
10592000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
B5E0000
|
unkown
|
page read and write
|
||
8A8B000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
7FF5031E8000
|
unkown
|
page readonly
|
||
CEC2000
|
heap
|
page read and write
|
||
B5FA000
|
heap
|
page read and write
|
||
7BFD000
|
heap
|
page read and write
|
||
9416000
|
unkown
|
page read and write
|
||
D366000
|
heap
|
page read and write
|
||
10655000
|
heap
|
page read and write
|
||
E360000
|
trusted library allocation
|
page read and write
|
||
B617000
|
heap
|
page read and write
|
||
388B000
|
stack
|
page read and write
|
||
B630000
|
heap
|
page read and write
|
||
B556000
|
heap
|
page read and write
|
||
E6EE000
|
stack
|
page read and write
|
||
93F6000
|
unkown
|
page read and write
|
||
3013000
|
heap
|
page read and write
|
||
104D8000
|
heap
|
page read and write
|
||
A34A000
|
unkown
|
page read and write
|
||
D560000
|
heap
|
page read and write
|
||
7FF502F66000
|
unkown
|
page readonly
|
||
E04F000
|
stack
|
page read and write
|
||
7FF502F22000
|
unkown
|
page readonly
|
||
3CE0000
|
heap
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
7FF502FAF000
|
unkown
|
page readonly
|
||
7FF50318B000
|
unkown
|
page readonly
|
||
7FF50317C000
|
unkown
|
page readonly
|
||
D3C7000
|
heap
|
page read and write
|
||
A38F000
|
unkown
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
B63B000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
7DF411EE1000
|
unkown
|
page execute read
|
||
BCF7000
|
heap
|
page read and write
|
||
10390000
|
heap
|
page read and write
|
||
D2FD000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
D4CF000
|
heap
|
page read and write
|
||
8600000
|
heap
|
page read and write
|
||
9BAA000
|
unkown
|
page read and write
|
||
B624000
|
heap
|
page read and write
|
||
10449000
|
heap
|
page read and write
|
||
5127000
|
heap
|
page read and write
|
||
DFCD000
|
stack
|
page read and write
|
||
BCAD000
|
heap
|
page read and write
|
||
B624000
|
heap
|
page read and write
|
||
A160000
|
heap
|
page read and write
|
||
8BC1000
|
heap
|
page read and write
|
||
A33B000
|
stack
|
page read and write
|
||
3BB8000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
104C4000
|
heap
|
page read and write
|
||
BFAE000
|
unkown
|
page read and write
|
||
7FF50331B000
|
unkown
|
page readonly
|
||
9CEA000
|
unkown
|
page read and write
|
||
D567000
|
heap
|
page read and write
|
||
C3A0000
|
unkown
|
page readonly
|
||
7FF502D15000
|
unkown
|
page readonly
|
||
2CAA000
|
stack
|
page read and write
|
||
1045B000
|
heap
|
page read and write
|
||
51FB000
|
heap
|
page read and write
|
||
7DF4C3560000
|
trusted library allocation
|
page readonly
|
||
7CE5000
|
heap
|
page read and write
|
||
7FF502DB8000
|
unkown
|
page readonly
|
||
7610000
|
unkown
|
page readonly
|
||
30B4000
|
unkown
|
page read and write
|
||
BD4C000
|
heap
|
page read and write
|
||
6F09000
|
unkown
|
page read and write
|
||
D9CA000
|
stack
|
page read and write
|
||
7FF502E3F000
|
unkown
|
page readonly
|
||
D2F8000
|
heap
|
page read and write
|
||
9237000
|
unkown
|
page read and write
|
||
10583000
|
heap
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
7FF5031AD000
|
unkown
|
page readonly
|
||
490000
|
unkown
|
page write copy
|
||
B570000
|
unkown
|
page read and write
|
||
105C2000
|
heap
|
page read and write
|
||
7FF502F5F000
|
unkown
|
page readonly
|
||
3E41000
|
heap
|
page read and write
|
||
D0F8000
|
heap
|
page read and write
|
||
C600000
|
trusted library allocation
|
page read and write
|
||
B613000
|
heap
|
page read and write
|
||
D4D3000
|
heap
|
page read and write
|
||
1042E000
|
heap
|
page read and write
|
||
10598000
|
heap
|
page read and write
|
||
D4DB000
|
heap
|
page read and write
|
||
7BD4000
|
heap
|
page read and write
|
||
E85000
|
heap
|
page read and write
|
||
83AC000
|
stack
|
page read and write
|
||
105B1000
|
heap
|
page read and write
|
||
8600000
|
heap
|
page read and write
|
||
D31C000
|
heap
|
page read and write
|
||
439B000
|
unkown
|
page read and write
|
||
D13D000
|
heap
|
page read and write
|
||
7FF502C4B000
|
unkown
|
page readonly
|
||
7FF5032BD000
|
unkown
|
page readonly
|
||
1054D000
|
heap
|
page read and write
|
||
8D1A000
|
heap
|
page read and write
|
||
7C22000
|
heap
|
page read and write
|
||
7FF503231000
|
unkown
|
page readonly
|
||
10457000
|
heap
|
page read and write
|
||
940A000
|
stack
|
page read and write
|
||
7FF502CDD000
|
unkown
|
page readonly
|
||
8D0F000
|
heap
|
page read and write
|
||
7FF503187000
|
unkown
|
page readonly
|
||
D253000
|
heap
|
page read and write
|
||
9EA000
|
heap
|
page read and write
|
||
487D000
|
direct allocation
|
page read and write
|
||
7FF502FB7000
|
unkown
|
page readonly
|
||
997F000
|
stack
|
page read and write
|
||
3C01000
|
heap
|
page read and write
|
||
28E8000
|
heap
|
page read and write
|
||
9D01000
|
unkown
|
page read and write
|
||
D045000
|
heap
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
7CA4000
|
heap
|
page read and write
|
||
7548000
|
stack
|
page read and write
|
||
D34B000
|
heap
|
page read and write
|
||
8BC9000
|
heap
|
page read and write
|
||
B621000
|
heap
|
page read and write
|
||
4370000
|
unkown
|
page read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
D37C000
|
heap
|
page read and write
|
||
D4EA000
|
heap
|
page read and write
|
||
7DF4C3580000
|
trusted library allocation
|
page readonly
|
||
7FF503082000
|
unkown
|
page readonly
|
||
B621000
|
heap
|
page read and write
|
||
7FF503216000
|
unkown
|
page readonly
|
||
24E4000
|
heap
|
page read and write
|
||
B621000
|
heap
|
page read and write
|
||
7B87000
|
heap
|
page read and write
|
||
E85000
|
heap
|
page read and write
|
||
10398000
|
heap
|
page read and write
|
||
7FF5031AD000
|
unkown
|
page readonly
|
||
7BEA000
|
heap
|
page read and write
|
||
8C86000
|
heap
|
page read and write
|
||
7FF502D3E000
|
unkown
|
page readonly
|
||
10729000
|
heap
|
page read and write
|
||
4435000
|
unkown
|
page read and write
|
||
7FF503010000
|
unkown
|
page readonly
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
7FF5030CE000
|
unkown
|
page readonly
|
||
9CF4000
|
unkown
|
page read and write
|
||
7FF50328F000
|
unkown
|
page readonly
|
||
2FE0000
|
trusted library allocation
|
page execute and read and write
|
||
D34B000
|
heap
|
page read and write
|
||
A040000
|
heap
|
page read and write
|
||
D38E000
|
heap
|
page read and write
|
||
10585000
|
heap
|
page read and write
|
||
7470000
|
unkown
|
page read and write
|
||
C630000
|
trusted library allocation
|
page read and write
|
||
46D3000
|
direct allocation
|
page read and write
|
||
9C09000
|
unkown
|
page read and write
|
||
80D0000
|
heap
|
page read and write
|
||
76A0000
|
unkown
|
page readonly
|
||
24E4000
|
heap
|
page read and write
|
||
8100000
|
unkown
|
page readonly
|
||
7FF502B9A000
|
unkown
|
page readonly
|
||
8BD0000
|
heap
|
page read and write
|
||
3FEF000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
10440000
|
heap
|
page read and write
|
||
1054E000
|
heap
|
page read and write
|
||
7FF503239000
|
unkown
|
page readonly
|
||
D308000
|
heap
|
page read and write
|
||
10457000
|
heap
|
page read and write
|
||
B5B5000
|
heap
|
page read and write
|
||
9CEA000
|
unkown
|
page read and write
|
||
3EBB000
|
heap
|
page read and write
|
||
9366000
|
unkown
|
page read and write
|
||
391F000
|
heap
|
page read and write
|
||
43B0000
|
unkown
|
page read and write
|
||
7FF50327C000
|
unkown
|
page readonly
|
||
3BAF000
|
stack
|
page read and write
|
||
C5E0000
|
trusted library allocation
|
page read and write
|
||
90BD000
|
unkown
|
page read and write
|
||
10587000
|
heap
|
page read and write
|
||
D25F000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
4002000
|
heap
|
page read and write
|
||
D386000
|
heap
|
page read and write
|
||
1058B000
|
heap
|
page read and write
|
||
1045B000
|
heap
|
page read and write
|
||
2AA0000
|
unkown
|
page read and write
|
||
BBFA000
|
unkown
|
page read and write
|
||
3EEC000
|
heap
|
page read and write
|
||
10729000
|
heap
|
page read and write
|
||
7FF502F4B000
|
unkown
|
page readonly
|
||
D1E6000
|
heap
|
page read and write
|
||
7C92000
|
heap
|
page read and write
|
||
7FF502DB3000
|
unkown
|
page readonly
|
||
8CAD000
|
heap
|
page read and write
|
||
51E6000
|
heap
|
page read and write
|
||
1041C000
|
heap
|
page read and write
|
||
8BDE000
|
heap
|
page read and write
|
||
BE14000
|
unkown
|
page read and write
|
||
1043D000
|
heap
|
page read and write
|
||
29E1000
|
heap
|
page read and write
|
||
7FF503227000
|
unkown
|
page readonly
|
||
7FF50328B000
|
unkown
|
page readonly
|
||
7FF503167000
|
unkown
|
page readonly
|
||
2EF0000
|
stack
|
page read and write
|
||
A1EF000
|
stack
|
page read and write
|
||
ABCB000
|
stack
|
page read and write
|
||
7FF502B9A000
|
unkown
|
page readonly
|
||
B613000
|
heap
|
page read and write
|
||
D562000
|
heap
|
page read and write
|
||
36C8000
|
stack
|
page read and write
|
||
BD34000
|
heap
|
page read and write
|
||
D343000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
D4E2000
|
heap
|
page read and write
|
||
39AB000
|
heap
|
page read and write
|
||
104C4000
|
heap
|
page read and write
|
||
9050000
|
unkown
|
page read and write
|
||
D308000
|
heap
|
page read and write
|
||
D1BE000
|
heap
|
page read and write
|
||
B621000
|
heap
|
page read and write
|
||
104AE000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
6EF3000
|
unkown
|
page read and write
|
||
10453000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
7FF5032EB000
|
unkown
|
page readonly
|
||
7FF502D65000
|
unkown
|
page readonly
|
||
7FF502D20000
|
unkown
|
page readonly
|
||
9D60000
|
unkown
|
page read and write
|
||
9B87000
|
unkown
|
page read and write
|
||
104C4000
|
heap
|
page read and write
|
||
E4B0000
|
trusted library allocation
|
page read and write
|
||
7D6A000
|
heap
|
page read and write
|
||
8450000
|
unkown
|
page read and write
|
||
A2F0000
|
unkown
|
page read and write
|
||
E3A0000
|
trusted library allocation
|
page read and write
|
||
B522000
|
heap
|
page read and write
|
||
4405000
|
unkown
|
page read and write
|
||
BEE6000
|
unkown
|
page read and write
|
||
C0DE000
|
unkown
|
page read and write
|
||
D15E000
|
heap
|
page read and write
|
||
C5E0000
|
trusted library allocation
|
page read and write
|
||
D3F4000
|
heap
|
page read and write
|
||
E390000
|
trusted library allocation
|
page read and write
|
||
104A8000
|
heap
|
page read and write
|
||
EBC1000
|
unkown
|
page read and write
|
||
80D0000
|
trusted library allocation
|
page read and write
|
||
3067000
|
unkown
|
page read and write
|
||
7D3B000
|
heap
|
page read and write
|
||
D4D3000
|
heap
|
page read and write
|
||
B50F000
|
heap
|
page read and write
|
||
8C04000
|
heap
|
page read and write
|
||
7FF503287000
|
unkown
|
page readonly
|
||
104AB000
|
heap
|
page read and write
|
||
795D000
|
stack
|
page read and write
|
||
D306000
|
heap
|
page read and write
|
||
1045F000
|
heap
|
page read and write
|
||
D308000
|
heap
|
page read and write
|
||
919F000
|
unkown
|
page read and write
|
||
B589000
|
heap
|
page read and write
|
||
7FF50308A000
|
unkown
|
page readonly
|
||
2C20000
|
heap
|
page read and write
|
||
7DF4C3591000
|
trusted library allocation
|
page execute read
|
||
29E1000
|
heap
|
page read and write
|
||
B617000
|
heap
|
page read and write
|
||
7FF502DC8000
|
unkown
|
page readonly
|
||
44B0000
|
unkown
|
page read and write
|
||
BD31000
|
heap
|
page read and write
|
||
7FF503206000
|
unkown
|
page readonly
|
||
D36C000
|
heap
|
page read and write
|
||
7FF5031FF000
|
unkown
|
page readonly
|
||
7FF502D70000
|
unkown
|
page readonly
|
||
8A37000
|
heap
|
page read and write
|
||
D38C000
|
heap
|
page read and write
|
||
7FF503118000
|
unkown
|
page readonly
|
||
D107000
|
heap
|
page read and write
|
||
D2E9000
|
heap
|
page read and write
|
||
8BD8000
|
heap
|
page read and write
|
||
10587000
|
heap
|
page read and write
|
||
B78F000
|
stack
|
page read and write
|
||
CE70000
|
heap
|
page read and write
|
||
8BEE000
|
heap
|
page read and write
|
||
7FF502FCD000
|
unkown
|
page readonly
|
||
D25F000
|
heap
|
page read and write
|
||
B67E000
|
heap
|
page read and write
|
||
8BDA000
|
heap
|
page read and write
|
||
7FF4ECBEF000
|
unkown
|
page readonly
|
||
2DC0000
|
unkown
|
page read and write
|
||
7FF5031DA000
|
unkown
|
page readonly
|
||
10455000
|
heap
|
page read and write
|
||
8BFA000
|
heap
|
page read and write
|
||
8BB3000
|
heap
|
page read and write
|
||
3E1A000
|
heap
|
page read and write
|
||
7DF4C3581000
|
trusted library allocation
|
page execute read
|
||
E47A000
|
stack
|
page read and write
|
||
C5E3000
|
trusted library allocation
|
page read and write
|
||
105A5000
|
heap
|
page read and write
|
||
7DF4C3580000
|
trusted library allocation
|
page readonly
|
||
7FF502DD3000
|
unkown
|
page readonly
|
||
10701000
|
heap
|
page read and write
|
||
1045D000
|
heap
|
page read and write
|
||
D378000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
BD4F000
|
heap
|
page read and write
|
||
B570000
|
unkown
|
page read and write
|
||
C07D000
|
stack
|
page read and write
|
||
7FF502DAD000
|
unkown
|
page readonly
|
||
8C10000
|
heap
|
page read and write
|
||
BEF6000
|
unkown
|
page read and write
|
||
BFEE000
|
unkown
|
page read and write
|
||
D0FC000
|
heap
|
page read and write
|
||
10714000
|
heap
|
page read and write
|
||
7FF503151000
|
unkown
|
page readonly
|
||
487D000
|
direct allocation
|
page read and write
|
||
3969000
|
heap
|
page read and write
|
||
7FF503108000
|
unkown
|
page readonly
|
||
93E000
|
stack
|
page read and write
|
||
702D000
|
unkown
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
52B0000
|
trusted library section
|
page read and write
|
||
7FF50322D000
|
unkown
|
page readonly
|
||
B62E000
|
heap
|
page read and write
|
||
FDD4000
|
unkown
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
E668000
|
stack
|
page read and write
|
||
8D1A000
|
heap
|
page read and write
|
||
C0FD000
|
unkown
|
page read and write
|
||
10354000
|
heap
|
page read and write
|
||
7FF503235000
|
unkown
|
page readonly
|
||
D36C000
|
heap
|
page read and write
|
||
8B2D000
|
heap
|
page read and write
|
||
7FF503239000
|
unkown
|
page readonly
|
||
7FF5032C8000
|
unkown
|
page readonly
|
||
BD34000
|
heap
|
page read and write
|
||
7FF502D10000
|
unkown
|
page readonly
|
||
9CCF000
|
unkown
|
page read and write
|
||
7D4A000
|
heap
|
page read and write
|
||
9416000
|
unkown
|
page read and write
|
||
2DA0000
|
unkown
|
page readonly
|
||
36F5000
|
unclassified section
|
page execute and read and write
|
||
7FF4ECBF5000
|
unkown
|
page readonly
|
||
D1C5000
|
heap
|
page read and write
|
||
9C09000
|
unkown
|
page read and write
|
||
10714000
|
heap
|
page read and write
|
||
10729000
|
heap
|
page read and write
|
||
D4CF000
|
heap
|
page read and write
|
||
89F4000
|
heap
|
page read and write
|
||
8BD4000
|
heap
|
page read and write
|
||
D33F000
|
heap
|
page read and write
|
||
D332000
|
heap
|
page read and write
|
||
8BFC000
|
heap
|
page read and write
|
||
8A89000
|
heap
|
page read and write
|
||
B624000
|
heap
|
page read and write
|
||
7FF50308A000
|
unkown
|
page readonly
|
||
BC74000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
C43E000
|
stack
|
page read and write
|
||
7BD7000
|
heap
|
page read and write
|
||
B560000
|
unkown
|
page read and write
|
||
D30E000
|
heap
|
page read and write
|
||
2593000
|
heap
|
page read and write
|
||
7C93000
|
heap
|
page read and write
|
||
B67E000
|
heap
|
page read and write
|
||
8CEB000
|
heap
|
page read and write
|
||
9A7F000
|
stack
|
page read and write
|
||
8BF8000
|
heap
|
page read and write
|
||
8C0A000
|
heap
|
page read and write
|
||
9F1000
|
unkown
|
page readonly
|
||
10356000
|
heap
|
page read and write
|
||
105C6000
|
heap
|
page read and write
|
||
CCAA000
|
stack
|
page read and write
|
||
7FF502EE3000
|
unkown
|
page readonly
|
||
B51E000
|
heap
|
page read and write
|
||
7FF502C9D000
|
unkown
|
page readonly
|
||
8C7E000
|
heap
|
page read and write
|
||
487D000
|
direct allocation
|
page read and write
|
||
7FF502B8B000
|
unkown
|
page readonly
|
||
D38C000
|
heap
|
page read and write
|
||
6EE4000
|
unkown
|
page read and write
|
||
8DBD000
|
heap
|
page read and write
|
||
D08C000
|
heap
|
page read and write
|
||
105A5000
|
heap
|
page read and write
|
||
7FF5026FF000
|
unkown
|
page readonly
|
||
28F0000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
7FF502B88000
|
unkown
|
page readonly
|
||
396D000
|
heap
|
page read and write
|
||
EBCD000
|
unkown
|
page read and write
|
||
D370000
|
heap
|
page read and write
|
||
B09B000
|
stack
|
page read and write
|
||
7FF503006000
|
unkown
|
page readonly
|
||
BFF4000
|
unkown
|
page read and write
|
||
8602000
|
heap
|
page read and write
|
||
D16D000
|
heap
|
page read and write
|
||
CDC2000
|
heap
|
page read and write
|
||
2CE4000
|
heap
|
page read and write
|
||
8D73000
|
heap
|
page read and write
|
||
8BB3000
|
heap
|
page read and write
|
||
7FF502EC2000
|
unkown
|
page readonly
|
||
BC21000
|
unkown
|
page read and write
|
||
10372000
|
heap
|
page read and write
|
||
BD31000
|
heap
|
page read and write
|
||
B589000
|
heap
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
7B87000
|
heap
|
page read and write
|
||
44B000
|
stack
|
page read and write
|
||
7FF502B50000
|
unkown
|
page readonly
|
||
D1A5000
|
heap
|
page read and write
|
||
D4E2000
|
heap
|
page read and write
|
||
D380000
|
heap
|
page read and write
|
||
D3D1000
|
heap
|
page read and write
|
||
35A2000
|
stack
|
page read and write
|
||
4750000
|
direct allocation
|
page read and write
|
||
2DA0000
|
unkown
|
page readonly
|
||
A030000
|
trusted library allocation
|
page read and write
|
||
10592000
|
heap
|
page read and write
|
||
10455000
|
heap
|
page read and write
|
||
D332000
|
heap
|
page read and write
|
||
7FF5032DB000
|
unkown
|
page readonly
|
||
51B6000
|
heap
|
page read and write
|
||
B78F000
|
stack
|
page read and write
|
||
7BE0000
|
heap
|
page read and write
|
||
BC27000
|
unkown
|
page read and write
|
||
8D78000
|
heap
|
page read and write
|
||
CDA0000
|
heap
|
page read and write
|
||
9AFF000
|
stack
|
page read and write
|
||
8610000
|
unkown
|
page read and write
|
||
7C93000
|
heap
|
page read and write
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
7D61000
|
heap
|
page read and write
|
||
8CE1000
|
heap
|
page read and write
|
||
D38E000
|
heap
|
page read and write
|
||
7FF5030FF000
|
unkown
|
page readonly
|
||
8D46000
|
heap
|
page read and write
|
||
D4CF000
|
heap
|
page read and write
|
||
AF7F000
|
stack
|
page read and write
|
||
AA0B000
|
stack
|
page read and write
|
||
8CD2000
|
heap
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
B613000
|
heap
|
page read and write
|
||
8D1C000
|
heap
|
page read and write
|
||
2C61000
|
trusted library allocation
|
page execute and read and write
|
||
8BF0000
|
heap
|
page read and write
|
||
7FF503087000
|
unkown
|
page readonly
|
||
3013000
|
heap
|
page read and write
|
||
7FF502EC2000
|
unkown
|
page readonly
|
||
BC9C000
|
heap
|
page read and write
|
||
B630000
|
heap
|
page read and write
|
||
8596000
|
unkown
|
page read and write
|
||
7DF4C3580000
|
trusted library allocation
|
page readonly
|
||
B5E0000
|
unkown
|
page read and write
|
||
7FF503223000
|
unkown
|
page readonly
|
||
10D87000
|
system
|
page execute and read and write
|
||
10655000
|
heap
|
page read and write
|
||
8BDE000
|
heap
|
page read and write
|
||
1045F000
|
heap
|
page read and write
|
||
D259000
|
heap
|
page read and write
|
||
1037F000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
D394000
|
heap
|
page read and write
|
||
2593000
|
heap
|
page read and write
|
||
4402000
|
unkown
|
page read and write
|
||
BE96000
|
unkown
|
page read and write
|
||
8CDD000
|
heap
|
page read and write
|
||
D30E000
|
heap
|
page read and write
|
||
BD56000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
1044D000
|
heap
|
page read and write
|
||
B5FA000
|
heap
|
page read and write
|
||
A7ED000
|
stack
|
page read and write
|
||
7FF502C9D000
|
unkown
|
page readonly
|
||
E5ED000
|
stack
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
D3A4000
|
heap
|
page read and write
|
||
7FF502E43000
|
unkown
|
page readonly
|
||
B30E000
|
stack
|
page read and write
|
||
8BF0000
|
heap
|
page read and write
|
||
10714000
|
heap
|
page read and write
|
||
B63B000
|
heap
|
page read and write
|
||
7DF411ED0000
|
unkown
|
page readonly
|
||
46D3000
|
direct allocation
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
1045B000
|
heap
|
page read and write
|
||
BD2B000
|
heap
|
page read and write
|
||
D36C000
|
heap
|
page read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
1040F000
|
heap
|
page read and write
|
||
6ED000
|
stack
|
page read and write
|
||
10701000
|
heap
|
page read and write
|
||
B621000
|
heap
|
page read and write
|
||
D562000
|
heap
|
page read and write
|
||
1044D000
|
heap
|
page read and write
|
||
36A4000
|
unclassified section
|
page execute and read and write
|
||
7FF502E07000
|
unkown
|
page readonly
|
||
30AC000
|
unkown
|
page read and write
|
||
C399000
|
stack
|
page read and write
|
||
7FF502D00000
|
unkown
|
page readonly
|
||
8B2D000
|
heap
|
page read and write
|
||
D3F4000
|
heap
|
page read and write
|
||
10451000
|
heap
|
page read and write
|
||
7FF502F86000
|
unkown
|
page readonly
|
||
392D000
|
direct allocation
|
page execute and read and write
|
||
7FF50317C000
|
unkown
|
page readonly
|
||
6E15000
|
stack
|
page read and write
|
||
8C41000
|
heap
|
page read and write
|
||
309F000
|
unkown
|
page read and write
|
||
8D1C000
|
heap
|
page read and write
|
||
D35C000
|
heap
|
page read and write
|
||
EBF3000
|
unkown
|
page read and write
|
||
7FF503082000
|
unkown
|
page readonly
|
||
B4D3000
|
heap
|
page read and write
|
||
D151000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
D0AB000
|
heap
|
page read and write
|
||
104B2000
|
heap
|
page read and write
|
||
CF7D000
|
heap
|
page read and write
|
||
7BD7000
|
heap
|
page read and write
|
||
7DF411ED1000
|
unkown
|
page execute read
|
||
D644000
|
system
|
page execute and read and write
|
||
AE90000
|
heap
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
D2CE000
|
heap
|
page read and write
|
||
B237000
|
stack
|
page read and write
|
||
D08A000
|
heap
|
page read and write
|
||
7FF5030A5000
|
unkown
|
page readonly
|
||
6E15000
|
stack
|
page read and write
|
||
7FF502EF3000
|
unkown
|
page readonly
|
||
10440000
|
heap
|
page read and write
|
||
8A38000
|
heap
|
page read and write
|
||
B5B5000
|
heap
|
page read and write
|
||
8D7D000
|
heap
|
page read and write
|
||
B613000
|
heap
|
page read and write
|
||
B5FA000
|
heap
|
page read and write
|
||
105D7000
|
heap
|
page read and write
|
||
10443000
|
heap
|
page read and write
|
||
D13D000
|
heap
|
page read and write
|
||
BDE0000
|
unkown
|
page read and write
|
||
89F4000
|
heap
|
page read and write
|
||
D366000
|
heap
|
page read and write
|
||
43B4000
|
unkown
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
6ECB000
|
unkown
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
BDCD000
|
unkown
|
page read and write
|
||
AF80000
|
unkown
|
page read and write
|
||
106C1000
|
heap
|
page read and write
|
||
B556000
|
heap
|
page read and write
|
||
7FF502F8A000
|
unkown
|
page readonly
|
||
7CAB000
|
heap
|
page read and write
|
||
30A3000
|
unkown
|
page read and write
|
||
6FD7000
|
unkown
|
page read and write
|
||
30A3000
|
unkown
|
page read and write
|
||
B589000
|
heap
|
page read and write
|
||
D05B000
|
heap
|
page read and write
|
||
7FF502F7A000
|
unkown
|
page readonly
|
||
E87E000
|
stack
|
page read and write
|
||
7FF503368000
|
unkown
|
page readonly
|
||
10449000
|
heap
|
page read and write
|
||
919F000
|
unkown
|
page read and write
|
||
D57E000
|
heap
|
page read and write
|
||
BD11000
|
heap
|
page read and write
|
||
2D2E000
|
unkown
|
page read and write
|
||
C538000
|
stack
|
page read and write
|
||
8BC1000
|
heap
|
page read and write
|
||
9092000
|
unkown
|
page read and write
|
||
ABD0000
|
unkown
|
page read and write
|
||
7FF503333000
|
unkown
|
page readonly
|
||
1045D000
|
heap
|
page read and write
|
||
7BD4000
|
heap
|
page read and write
|
||
8D48000
|
stack
|
page read and write
|
||
105C2000
|
heap
|
page read and write
|
||
8BFE000
|
heap
|
page read and write
|
||
2A60000
|
unkown
|
page readonly
|
||
43FD000
|
unkown
|
page read and write
|
||
E30000
|
unkown
|
page read and write
|
||
7BD4000
|
heap
|
page read and write
|
||
10449000
|
heap
|
page read and write
|
||
7FF502EF7000
|
unkown
|
page readonly
|
||
BDC7000
|
unkown
|
page read and write
|
||
104D8000
|
heap
|
page read and write
|
||
E350000
|
trusted library allocation
|
page read and write
|
||
B613000
|
heap
|
page read and write
|
||
B630000
|
heap
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
28E5000
|
heap
|
page read and write
|
||
E0CB000
|
stack
|
page read and write
|
||
701D000
|
unkown
|
page read and write
|
||
2560000
|
unkown
|
page read and write
|
||
832A000
|
stack
|
page read and write
|
||
BCE3000
|
heap
|
page read and write
|
||
7FF502B8B000
|
unkown
|
page readonly
|
||
105A5000
|
heap
|
page read and write
|
||
D364000
|
heap
|
page read and write
|
||
8D1C000
|
heap
|
page read and write
|
||
30B4000
|
unkown
|
page read and write
|
||
4879000
|
direct allocation
|
page read and write
|
||
E50000
|
unkown
|
page readonly
|
||
2E79000
|
stack
|
page read and write
|
||
FE56000
|
system
|
page read and write
|
||
D74D000
|
stack
|
page read and write
|
||
7D4A000
|
heap
|
page read and write
|
||
9BAA000
|
unkown
|
page read and write
|
||
BEA9000
|
unkown
|
page read and write
|
||
CDCA000
|
heap
|
page read and write
|
||
B617000
|
heap
|
page read and write
|
||
BC27000
|
unkown
|
page read and write
|
||
DDCC000
|
stack
|
page read and write
|
||
D4BC000
|
heap
|
page read and write
|
||
5149000
|
heap
|
page read and write
|
||
810000
|
unkown
|
page readonly
|
||
10655000
|
heap
|
page read and write
|
||
C1D0000
|
remote allocation
|
page read and write
|
||
BDF5000
|
unkown
|
page read and write
|
||
D4B1000
|
heap
|
page read and write
|
||
10583000
|
heap
|
page read and write
|
||
E3A3000
|
trusted library allocation
|
page read and write
|
||
D18A000
|
heap
|
page read and write
|
||
3940000
|
heap
|
page read and write
|
||
C0CB000
|
unkown
|
page read and write
|
||
1041C000
|
heap
|
page read and write
|
||
BA6000
|
stack
|
page read and write
|
||
795D000
|
stack
|
page read and write
|
||
B67E000
|
heap
|
page read and write
|
||
D189000
|
heap
|
page read and write
|
||
7FF5030C4000
|
unkown
|
page readonly
|
||
8D1C000
|
heap
|
page read and write
|
||
52D0000
|
trusted library section
|
page read and write
|
||
B550000
|
heap
|
page read and write
|
||
9255000
|
unkown
|
page read and write
|
||
1037F000
|
heap
|
page read and write
|
||
4E49000
|
unkown
|
page read and write
|
||
7FF502F7A000
|
unkown
|
page readonly
|
||
B62E000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
8D73000
|
heap
|
page read and write
|
||
C1D3000
|
trusted library allocation
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
D4DB000
|
heap
|
page read and write
|
||
D3D8000
|
heap
|
page read and write
|
||
D0EC000
|
heap
|
page read and write
|
||
30AC000
|
unkown
|
page read and write
|
||
8BD6000
|
heap
|
page read and write
|
||
104A3000
|
heap
|
page read and write
|
||
9C2C000
|
unkown
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
B624000
|
heap
|
page read and write
|
||
D374000
|
heap
|
page read and write
|
||
7FF503245000
|
unkown
|
page readonly
|
||
9E0000
|
unkown
|
page read and write
|
||
BEE8000
|
unkown
|
page read and write
|
||
B613000
|
heap
|
page read and write
|
||
D4B1000
|
heap
|
page read and write
|
||
D36A000
|
heap
|
page read and write
|
||
89E3000
|
heap
|
page read and write
|
||
7D3B000
|
heap
|
page read and write
|
||
A38F000
|
unkown
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
3977000
|
heap
|
page read and write
|
||
1064C000
|
heap
|
page read and write
|
||
D264000
|
heap
|
page read and write
|
||
7D02000
|
heap
|
page read and write
|
||
104C4000
|
heap
|
page read and write
|
||
8D38000
|
heap
|
page read and write
|
||
D57C000
|
heap
|
page read and write
|
||
4DB1000
|
unkown
|
page read and write
|
||
95C4000
|
unkown
|
page read and write
|
||
7FF502C2E000
|
unkown
|
page readonly
|
||
8D1C000
|
heap
|
page read and write
|
||
9BCB000
|
unkown
|
page read and write
|
||
3525000
|
stack
|
page read and write
|
||
B63B000
|
heap
|
page read and write
|
||
8BD2000
|
heap
|
page read and write
|
||
7FF502E1A000
|
unkown
|
page readonly
|
||
7FF502F47000
|
unkown
|
page readonly
|
||
7FF503010000
|
unkown
|
page readonly
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
48EE000
|
direct allocation
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
10583000
|
heap
|
page read and write
|
||
D3AB000
|
heap
|
page read and write
|
||
D380000
|
heap
|
page read and write
|
||
2F10000
|
unkown
|
page readonly
|
||
8AD6000
|
heap
|
page read and write
|
||
2560000
|
unkown
|
page read and write
|
||
D36E000
|
heap
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
7FF502D04000
|
unkown
|
page readonly
|
||
D1F1000
|
heap
|
page read and write
|
||
7FF502D15000
|
unkown
|
page readonly
|
||
D257000
|
heap
|
page read and write
|
||
A3C6000
|
system
|
page read and write
|
||
7FF502E0D000
|
unkown
|
page readonly
|
||
B617000
|
heap
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
918D000
|
unkown
|
page read and write
|
||
7FF5031E8000
|
unkown
|
page readonly
|
||
1485000
|
heap
|
page read and write
|
||
D3C9000
|
heap
|
page read and write
|
||
B5F0000
|
unkown
|
page readonly
|
||
8BB3000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
7FF502FA9000
|
unkown
|
page readonly
|
||
BCE4000
|
heap
|
page read and write
|
||
7FF503326000
|
unkown
|
page readonly
|
||
7DF4C3531000
|
trusted library allocation
|
page execute read
|
||
48EE000
|
direct allocation
|
page read and write
|
||
8BDA000
|
heap
|
page read and write
|
||
831E000
|
stack
|
page read and write
|
||
2D60000
|
direct allocation
|
page execute and read and write
|
||
7FF503275000
|
unkown
|
page readonly
|
||
2DF0000
|
unkown
|
page read and write
|
||
B51E000
|
heap
|
page read and write
|
||
1068A000
|
heap
|
page read and write
|
||
D05D000
|
heap
|
page read and write
|
||
7FF502C30000
|
unkown
|
page readonly
|
||
8A16000
|
heap
|
page read and write
|
||
B51E000
|
heap
|
page read and write
|
||
7FF50334D000
|
unkown
|
page readonly
|
||
8F0000
|
heap
|
page read and write
|
||
7DF4C3561000
|
trusted library allocation
|
page execute read
|
||
4431000
|
unkown
|
page read and write
|
||
7FF5030FF000
|
unkown
|
page readonly
|
||
4750000
|
direct allocation
|
page read and write
|
||
7DF4C3591000
|
trusted library allocation
|
page execute read
|
||
D386000
|
heap
|
page read and write
|
||
D17F000
|
heap
|
page read and write
|
||
7FF502D41000
|
unkown
|
page readonly
|
||
D2E9000
|
heap
|
page read and write
|
||
7FF5032F7000
|
unkown
|
page readonly
|
||
C00A000
|
unkown
|
page read and write
|
||
7CA4000
|
heap
|
page read and write
|
||
7480000
|
unkown
|
page read and write
|
||
D1F1000
|
heap
|
page read and write
|
||
2DF0000
|
unkown
|
page read and write
|
||
7FF502E62000
|
unkown
|
page readonly
|
||
7C93000
|
heap
|
page read and write
|
||
860A000
|
heap
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page execute and read and write
|
||
7DF411EE0000
|
unkown
|
page readonly
|
||
15DF000
|
stack
|
page read and write
|
||
10D77000
|
system
|
page execute and read and write
|
||
3975000
|
heap
|
page read and write
|
||
10378000
|
heap
|
page read and write
|
||
105B1000
|
heap
|
page read and write
|
||
7FF503157000
|
unkown
|
page readonly
|
||
B10E000
|
stack
|
page read and write
|
||
3086000
|
unkown
|
page read and write
|
||
D313000
|
heap
|
page read and write
|
||
7FF503195000
|
unkown
|
page readonly
|
||
ABCB000
|
stack
|
page read and write
|
||
A030000
|
trusted library allocation
|
page read and write
|
||
D13D000
|
heap
|
page read and write
|
||
B00F000
|
stack
|
page read and write
|
||
BCFD000
|
heap
|
page read and write
|
||
7DF4C3591000
|
trusted library allocation
|
page execute read
|
||
D16D000
|
heap
|
page read and write
|
||
10585000
|
heap
|
page read and write
|
||
10656000
|
heap
|
page read and write
|
||
1045F000
|
heap
|
page read and write
|
||
D1AC000
|
heap
|
page read and write
|
||
D35A000
|
heap
|
page read and write
|
||
104BC000
|
heap
|
page read and write
|
||
B607000
|
heap
|
page read and write
|
||
24E0000
|
heap
|
page read and write
|
||
9193000
|
unkown
|
page read and write
|
||
1070C000
|
heap
|
page read and write
|
||
105C6000
|
heap
|
page read and write
|
||
37B1000
|
trusted library allocation
|
page execute and read and write
|
||
7FF502B50000
|
unkown
|
page readonly
|
||
7FF5032C2000
|
unkown
|
page readonly
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
unkown
|
page read and write
|
||
D468000
|
heap
|
page read and write
|
||
7FF502E07000
|
unkown
|
page readonly
|
||
89AA000
|
stack
|
page read and write
|
||
7FF5031FF000
|
unkown
|
page readonly
|
||
800000
|
unkown
|
page readonly
|
||
B010000
|
unkown
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
8BD8000
|
heap
|
page read and write
|
||
B630000
|
heap
|
page read and write
|
||
BD48000
|
heap
|
page read and write
|
||
7D1B000
|
heap
|
page read and write
|
||
7610000
|
unkown
|
page readonly
|
||
C0CB000
|
unkown
|
page read and write
|
||
E4A0000
|
trusted library allocation
|
page read and write
|
||
3670000
|
trusted library allocation
|
page read and write
|
||
B3AB000
|
stack
|
page read and write
|
||
1064C000
|
heap
|
page read and write
|
||
D264000
|
heap
|
page read and write
|
||
7840000
|
unkown
|
page read and write
|
||
D472000
|
heap
|
page read and write
|
||
7DF411EF1000
|
unkown
|
page execute read
|
||
7BF1000
|
heap
|
page read and write
|
||
D257000
|
heap
|
page read and write
|
||
A38A000
|
unkown
|
page read and write
|
||
D011000
|
heap
|
page read and write
|
||
38B0000
|
heap
|
page read and write
|
||
D071000
|
heap
|
page read and write
|
||
9450000
|
unkown
|
page readonly
|
||
10451000
|
heap
|
page read and write
|
||
99FF000
|
stack
|
page read and write
|
||
51DA000
|
heap
|
page read and write
|
||
1043D000
|
heap
|
page read and write
|
||
10D20000
|
system
|
page execute and read and write
|
||
D58D000
|
heap
|
page read and write
|
||
D38A000
|
heap
|
page read and write
|
||
B621000
|
heap
|
page read and write
|
||
7FF502D48000
|
unkown
|
page readonly
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
B62E000
|
heap
|
page read and write
|
||
1045F000
|
heap
|
page read and write
|
||
8A16000
|
heap
|
page read and write
|
||
D189000
|
heap
|
page read and write
|
||
B63B000
|
heap
|
page read and write
|
||
7FF502DC0000
|
unkown
|
page readonly
|
||
BC48000
|
heap
|
page read and write
|
||
B62E000
|
heap
|
page read and write
|
||
7BCE000
|
heap
|
page read and write
|
||
105C6000
|
heap
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
105AA000
|
heap
|
page read and write
|
||
7FF5032B5000
|
unkown
|
page readonly
|
||
1042E000
|
heap
|
page read and write
|
||
D3F9000
|
heap
|
page read and write
|
||
7FF503157000
|
unkown
|
page readonly
|
||
30A1000
|
unkown
|
page read and write
|
||
3013000
|
heap
|
page read and write
|
||
7FF502FA9000
|
unkown
|
page readonly
|
||
BC8E000
|
heap
|
page read and write
|
||
D330000
|
heap
|
page read and write
|
||
7FF502DB8000
|
unkown
|
page readonly
|
||
E90000
|
unkown
|
page readonly
|
||
7FF5032AF000
|
unkown
|
page readonly
|
||
E3CF000
|
stack
|
page read and write
|
||
7FF5031C3000
|
unkown
|
page readonly
|
||
7FF502DCF000
|
unkown
|
page readonly
|
||
91FB000
|
unkown
|
page read and write
|
||
10585000
|
heap
|
page read and write
|
||
10451000
|
heap
|
page read and write
|
||
2DB0000
|
unkown
|
page read and write
|
||
7470000
|
unkown
|
page read and write
|
||
97F9000
|
stack
|
page read and write
|
||
BD31000
|
heap
|
page read and write
|
||
1058B000
|
heap
|
page read and write
|
||
7D3E000
|
heap
|
page read and write
|
||
7FF503087000
|
unkown
|
page readonly
|
||
C7E0000
|
trusted library allocation
|
page read and write
|
||
104B2000
|
heap
|
page read and write
|
||
89D7000
|
heap
|
page read and write
|
||
7FF503257000
|
unkown
|
page readonly
|
||
6F0F000
|
unkown
|
page read and write
|
||
D366000
|
heap
|
page read and write
|
||
1054D000
|
heap
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
D0E0000
|
heap
|
page read and write
|
||
89C2000
|
heap
|
page read and write
|
||
D3BC000
|
heap
|
page read and write
|
||
D0B2000
|
heap
|
page read and write
|
||
D392000
|
heap
|
page read and write
|
||
BF2E000
|
unkown
|
page read and write
|
||
9A7F000
|
stack
|
page read and write
|
||
103A3000
|
heap
|
page read and write
|
||
BF7A000
|
unkown
|
page read and write
|
||
7DF411ED0000
|
unkown
|
page readonly
|
||
7FF5031DA000
|
unkown
|
page readonly
|
||
43B4000
|
unkown
|
page read and write
|
||
B67E000
|
heap
|
page read and write
|
||
D313000
|
heap
|
page read and write
|
||
B63B000
|
heap
|
page read and write
|
||
8BDC000
|
heap
|
page read and write
|
||
6FE3000
|
unkown
|
page read and write
|
||
7DF4C35A0000
|
trusted library allocation
|
page readonly
|
||
D84D000
|
stack
|
page read and write
|
||
7FF50302D000
|
unkown
|
page readonly
|
||
D2F5000
|
heap
|
page read and write
|
||
7FF502B53000
|
unkown
|
page readonly
|
||
105D1000
|
heap
|
page read and write
|
||
C090000
|
unkown
|
page read and write
|
||
B1B000
|
heap
|
page read and write
|
||
A36B000
|
unkown
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
7FF5030B4000
|
unkown
|
page readonly
|
||
7DF4C35C1000
|
trusted library allocation
|
page execute read
|
||
2E79000
|
stack
|
page read and write
|
||
A8EA000
|
stack
|
page read and write
|
||
D189000
|
heap
|
page read and write
|
||
104A8000
|
heap
|
page read and write
|
||
10449000
|
heap
|
page read and write
|
||
7FF502E0A000
|
unkown
|
page readonly
|
||
7FF503189000
|
unkown
|
page readonly
|
||
9BCB000
|
unkown
|
page read and write
|
||
EBC1000
|
unkown
|
page read and write
|
||
10440000
|
heap
|
page read and write
|
||
43C7000
|
unkown
|
page read and write
|
||
BC92000
|
heap
|
page read and write
|
||
7FF502E8F000
|
unkown
|
page readonly
|
||
7FF50312D000
|
unkown
|
page readonly
|
||
9C8A000
|
unkown
|
page read and write
|
||
7BFD000
|
heap
|
page read and write
|
||
D560000
|
heap
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
BFB4000
|
unkown
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
3EBD000
|
stack
|
page read and write
|
||
7FF503298000
|
unkown
|
page readonly
|
||
D2EE000
|
heap
|
page read and write
|
||
D23B000
|
heap
|
page read and write
|
||
B63B000
|
heap
|
page read and write
|
||
3082000
|
unkown
|
page read and write
|
||
E97B000
|
stack
|
page read and write
|
||
9D54000
|
unkown
|
page read and write
|
||
A033000
|
trusted library allocation
|
page read and write
|
||
7CAB000
|
heap
|
page read and write
|
||
7FF502EC9000
|
unkown
|
page readonly
|
||
D669000
|
system
|
page execute and read and write
|
||
D1B5000
|
heap
|
page read and write
|
||
821B000
|
stack
|
page read and write
|
||
105BB000
|
heap
|
page read and write
|
||
8CEB000
|
heap
|
page read and write
|
||
B607000
|
heap
|
page read and write
|
||
A020000
|
trusted library allocation
|
page read and write
|
||
79DD000
|
stack
|
page read and write
|
||
D2E9000
|
heap
|
page read and write
|
||
D17F000
|
heap
|
page read and write
|
||
10457000
|
heap
|
page read and write
|
||
9FE0000
|
heap
|
page read and write
|
||
D15E000
|
heap
|
page read and write
|
||
7FF502D65000
|
unkown
|
page readonly
|
||
B589000
|
heap
|
page read and write
|
||
9CCF000
|
unkown
|
page read and write
|
||
D2F8000
|
heap
|
page read and write
|
||
3EDF000
|
heap
|
page read and write
|
||
D240000
|
heap
|
page read and write
|
||
7BEA000
|
heap
|
page read and write
|
||
46D3000
|
direct allocation
|
page read and write
|
||
7DF411EF0000
|
unkown
|
page readonly
|
||
8CD2000
|
heap
|
page read and write
|
||
D4C7000
|
heap
|
page read and write
|
||
7840000
|
unkown
|
page read and write
|
||
7FF502D45000
|
unkown
|
page readonly
|
||
10585000
|
heap
|
page read and write
|
||
7FF5032EE000
|
unkown
|
page readonly
|
||
D13D000
|
heap
|
page read and write
|
||
D33F000
|
heap
|
page read and write
|
||
6ED0000
|
unkown
|
page read and write
|
||
9BE6000
|
unkown
|
page read and write
|
||
105C2000
|
heap
|
page read and write
|
||
8BC9000
|
heap
|
page read and write
|
||
BC0C000
|
unkown
|
page read and write
|
||
8AF6000
|
heap
|
page read and write
|
||
D159000
|
heap
|
page read and write
|
||
D1C5000
|
heap
|
page read and write
|
||
7FF503333000
|
unkown
|
page readonly
|
||
D11C000
|
heap
|
page read and write
|
||
307E000
|
unkown
|
page read and write
|
||
D390000
|
heap
|
page read and write
|
||
8A98000
|
heap
|
page read and write
|
||
1059B000
|
heap
|
page read and write
|
||
93F6000
|
unkown
|
page read and write
|
||
A38A000
|
unkown
|
page read and write
|
||
B556000
|
heap
|
page read and write
|
||
D0E6000
|
heap
|
page read and write
|
||
B630000
|
heap
|
page read and write
|
||
7EC000
|
stack
|
page read and write
|
||
B4AD000
|
heap
|
page read and write
|
||
8A16000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
7CAB000
|
heap
|
page read and write
|
||
7DF4C34D1000
|
trusted library allocation
|
page execute read
|
||
7FF50331F000
|
unkown
|
page readonly
|
||
1058B000
|
heap
|
page read and write
|
||
9D0000
|
unkown
|
page read and write
|
||
7FF503245000
|
unkown
|
page readonly
|
||
7FF502DC3000
|
unkown
|
page readonly
|
||
8BD4000
|
heap
|
page read and write
|
||
BDD5000
|
unkown
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
BC57000
|
heap
|
page read and write
|
||
7FF50301B000
|
unkown
|
page readonly
|
||
6ED7000
|
unkown
|
page read and write
|
||
7609000
|
stack
|
page read and write
|
||
7BEA000
|
heap
|
page read and write
|
||
BC5C000
|
unkown
|
page read and write
|
||
3065000
|
heap
|
page read and write
|
||
7FF502F94000
|
unkown
|
page readonly
|
||
DECD000
|
stack
|
page read and write
|
||
918D000
|
unkown
|
page read and write
|
||
8D6E000
|
heap
|
page read and write
|
||
5204000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
7DF4C3520000
|
trusted library allocation
|
page readonly
|
||
7DF4C35D1000
|
trusted library allocation
|
page execute read
|
||
D35C000
|
heap
|
page read and write
|
||
7FF503365000
|
unkown
|
page readonly
|
||
9FD3000
|
trusted library allocation
|
page read and write
|
||
7FF5030D9000
|
unkown
|
page readonly
|
||
EBDC000
|
unkown
|
page read and write
|
||
9D54000
|
unkown
|
page read and write
|
||
C1E0000
|
trusted library allocation
|
page read and write
|
||
CC2E000
|
stack
|
page read and write
|
||
8BD6000
|
heap
|
page read and write
|
||
8D7F000
|
heap
|
page read and write
|
||
7FF503354000
|
unkown
|
page readonly
|
||
7FF50334D000
|
unkown
|
page readonly
|
||
D372000
|
heap
|
page read and write
|
||
4463000
|
unkown
|
page read and write
|
||
8D1A000
|
heap
|
page read and write
|
||
10443000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
91DE000
|
unkown
|
page read and write
|
||
7FF502D9D000
|
unkown
|
page readonly
|
||
B67E000
|
heap
|
page read and write
|
||
8A37000
|
heap
|
page read and write
|
||
A140000
|
trusted library allocation
|
page read and write
|
||
D32A000
|
heap
|
page read and write
|
||
7DF411ED1000
|
unkown
|
page execute read
|
||
7CA4000
|
heap
|
page read and write
|
||
C60000
|
unkown
|
page readonly
|
||
7FF5032CF000
|
unkown
|
page readonly
|
||
B613000
|
heap
|
page read and write
|
||
96CC000
|
stack
|
page read and write
|
||
B607000
|
heap
|
page read and write
|
||
8DA9000
|
heap
|
page read and write
|
||
106C0000
|
heap
|
page read and write
|
||
C1D0000
|
trusted library allocation
|
page read and write
|
||
862B000
|
stack
|
page read and write
|
||
BD2F000
|
heap
|
page read and write
|
||
B589000
|
heap
|
page read and write
|
||
B613000
|
heap
|
page read and write
|
||
BD56000
|
heap
|
page read and write
|
||
D368000
|
heap
|
page read and write
|
||
7FF5030DE000
|
unkown
|
page readonly
|
||
105B1000
|
heap
|
page read and write
|
||
8BC1000
|
heap
|
page read and write
|
||
8D3F000
|
heap
|
page read and write
|
||
8A16000
|
heap
|
page read and write
|
||
E2CB000
|
stack
|
page read and write
|
||
8BFE000
|
heap
|
page read and write
|
||
106C0000
|
heap
|
page read and write
|
||
8E0000
|
unkown
|
page readonly
|
||
10701000
|
heap
|
page read and write
|
||
BF7A000
|
unkown
|
page read and write
|
||
8D46000
|
heap
|
page read and write
|
||
7FF502D18000
|
unkown
|
page readonly
|
||
2BDA000
|
stack
|
page read and write
|
||
B33A000
|
stack
|
page read and write
|
||
BFAE000
|
unkown
|
page read and write
|
||
7B87000
|
heap
|
page read and write
|
||
BDA9000
|
unkown
|
page read and write
|
||
8A24000
|
heap
|
page read and write
|
||
7FF502D8F000
|
unkown
|
page readonly
|
||
8BD0000
|
heap
|
page read and write
|
||
10360000
|
heap
|
page read and write
|
||
AAA0000
|
unkown
|
page readonly
|
||
D13E000
|
heap
|
page read and write
|
||
B621000
|
heap
|
page read and write
|
||
D382000
|
heap
|
page read and write
|
||
76A0000
|
unkown
|
page readonly
|
||
BDA9000
|
unkown
|
page read and write
|
||
A033000
|
trusted library allocation
|
page read and write
|
||
B617000
|
heap
|
page read and write
|
||
7FF5032F2000
|
unkown
|
page readonly
|
||
CD6D000
|
stack
|
page read and write
|
||
2C0C000
|
unkown
|
page read and write
|
||
7FF502FA2000
|
unkown
|
page readonly
|
||
24E4000
|
heap
|
page read and write
|
||
7FF502CD4000
|
unkown
|
page readonly
|
||
D36E000
|
heap
|
page read and write
|
||
B62E000
|
heap
|
page read and write
|
||
8BDA000
|
heap
|
page read and write
|
||
D394000
|
heap
|
page read and write
|
||
7FF502B93000
|
unkown
|
page readonly
|
||
B589000
|
heap
|
page read and write
|
||
10457000
|
heap
|
page read and write
|
||
7FF503360000
|
unkown
|
page readonly
|
||
3948000
|
heap
|
page read and write
|
||
10372000
|
heap
|
page read and write
|
||
3DE0000
|
heap
|
page read and write
|
||
B589000
|
heap
|
page read and write
|
||
A140000
|
trusted library allocation
|
page read and write
|
||
7FF502D61000
|
unkown
|
page readonly
|
||
24E4000
|
heap
|
page read and write
|
||
9BDE000
|
unkown
|
page read and write
|
||
3E2D000
|
heap
|
page read and write
|
||
D4D3000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
C5C0000
|
heap
|
page readonly
|
||
7FF502D3E000
|
unkown
|
page readonly
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
8A11000
|
heap
|
page read and write
|
||
7FF502E1A000
|
unkown
|
page readonly
|
||
1059D000
|
heap
|
page read and write
|
||
CDBF000
|
heap
|
page read and write
|
||
7D0B000
|
heap
|
page read and write
|
||
8A35000
|
heap
|
page read and write
|
||
A38D000
|
unkown
|
page read and write
|
||
9CF2000
|
unkown
|
page read and write
|
||
D573000
|
heap
|
page read and write
|
||
D372000
|
heap
|
page read and write
|
||
3301000
|
heap
|
page read and write
|
||
46D3000
|
direct allocation
|
page read and write
|
||
4750000
|
direct allocation
|
page read and write
|
||
7FF502E62000
|
unkown
|
page readonly
|
||
EB90000
|
unkown
|
page read and write
|
||
2A60000
|
unkown
|
page readonly
|
||
8BB3000
|
heap
|
page read and write
|
||
7FF5031B0000
|
unkown
|
page readonly
|
||
7C0E000
|
heap
|
page read and write
|
||
8CA2000
|
heap
|
page read and write
|
||
BD56000
|
heap
|
page read and write
|
||
396B000
|
heap
|
page read and write
|
||
9CF2000
|
unkown
|
page read and write
|
||
372D000
|
heap
|
page read and write
|
||
B4EF000
|
heap
|
page read and write
|
||
7FF503335000
|
unkown
|
page readonly
|
||
8889000
|
stack
|
page read and write
|
||
701D000
|
unkown
|
page read and write
|
||
11D9000
|
stack
|
page read and write
|
||
106CC000
|
heap
|
page read and write
|
||
7FF50310B000
|
unkown
|
page readonly
|
||
D1F1000
|
heap
|
page read and write
|
||
43AC000
|
unkown
|
page read and write
|
||
1058B000
|
heap
|
page read and write
|
||
CFC5000
|
heap
|
page read and write
|
||
D2D8000
|
heap
|
page read and write
|
||
7FF5032DB000
|
unkown
|
page readonly
|
||
C620000
|
heap
|
page read and write
|
||
9312000
|
unkown
|
page read and write
|
||
2B0B000
|
heap
|
page read and write
|
||
E390000
|
trusted library allocation
|
page read and write
|
||
9D6B000
|
unkown
|
page read and write
|
||
10587000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
D18A000
|
heap
|
page read and write
|
||
7C93000
|
heap
|
page read and write
|
||
919C000
|
unkown
|
page read and write
|
||
D360000
|
heap
|
page read and write
|
||
30A1000
|
unkown
|
page read and write
|
||
3FE1000
|
heap
|
page read and write
|
||
D4DB000
|
heap
|
page read and write
|
||
8BC1000
|
heap
|
page read and write
|
||
D13D000
|
heap
|
page read and write
|
||
2DC0000
|
unkown
|
page read and write
|
||
7FF503032000
|
unkown
|
page readonly
|
||
7D3E000
|
heap
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
2A90000
|
unkown
|
page readonly
|
||
CF80000
|
heap
|
page read and write
|
||
7FF50303F000
|
unkown
|
page readonly
|
||
8C97000
|
heap
|
page read and write
|
||
8B13000
|
heap
|
page read and write
|
||
7FF50270A000
|
unkown
|
page readonly
|
||
105C3000
|
heap
|
page read and write
|
||
821B000
|
stack
|
page read and write
|
||
48EE000
|
direct allocation
|
page read and write
|
||
9D6B000
|
unkown
|
page read and write
|
||
7FF502CFA000
|
unkown
|
page readonly
|
||
4370000
|
unkown
|
page read and write
|
||
D223000
|
heap
|
page read and write
|
||
8A98000
|
heap
|
page read and write
|
||
D180000
|
heap
|
page read and write
|
||
9D0D000
|
unkown
|
page read and write
|
||
A98F000
|
stack
|
page read and write
|
||
3086000
|
unkown
|
page read and write
|
||
C0FD000
|
unkown
|
page read and write
|
||
104B2000
|
heap
|
page read and write
|
||
470000
|
system
|
page execute and read and write
|
||
1041C000
|
heap
|
page read and write
|
||
8BD2000
|
heap
|
page read and write
|
||
CE75000
|
heap
|
page read and write
|
||
D327000
|
heap
|
page read and write
|
||
7FF5032C8000
|
unkown
|
page readonly
|
||
2AB0000
|
heap
|
page read and write
|
||
B515000
|
heap
|
page read and write
|
||
D16D000
|
heap
|
page read and write
|
||
487D000
|
direct allocation
|
page read and write
|
||
D394000
|
heap
|
page read and write
|
||
520B000
|
heap
|
page read and write
|
||
B5B5000
|
heap
|
page read and write
|
||
CF80000
|
heap
|
page read and write
|
||
D8CD000
|
stack
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
7B93000
|
heap
|
page read and write
|
||
5215000
|
heap
|
page read and write
|
||
105D1000
|
heap
|
page read and write
|
||
D378000
|
heap
|
page read and write
|
||
7D3E000
|
heap
|
page read and write
|
||
BA6000
|
stack
|
page read and write
|
||
1070C000
|
heap
|
page read and write
|
||
8BC9000
|
stack
|
page read and write
|
||
C4BB000
|
stack
|
page read and write
|
||
D35A000
|
heap
|
page read and write
|
||
B5A1000
|
unkown
|
page read and write
|
||
E3CF000
|
stack
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
2DB0000
|
unkown
|
page read and write
|
||
1045D000
|
heap
|
page read and write
|
||
8BDA000
|
heap
|
page read and write
|
||
7FF50331F000
|
unkown
|
page readonly
|
||
7BC5000
|
heap
|
page read and write
|
||
BCAE000
|
heap
|
page read and write
|
||
D065000
|
heap
|
page read and write
|
||
B62E000
|
heap
|
page read and write
|
||
D38A000
|
heap
|
page read and write
|
||
7B78000
|
heap
|
page read and write
|
||
7FF502F6A000
|
unkown
|
page readonly
|
||
B4DA000
|
heap
|
page read and write
|
||
7DF411EE0000
|
unkown
|
page readonly
|
||
10383000
|
heap
|
page read and write
|
||
7FF502FCD000
|
unkown
|
page readonly
|
||
48EE000
|
direct allocation
|
page read and write
|
||
B08E000
|
stack
|
page read and write
|
||
C570000
|
trusted library allocation
|
page read and write
|
||
105C6000
|
heap
|
page read and write
|
||
2EF0000
|
stack
|
page read and write
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
B550000
|
heap
|
page read and write
|
||
104B9000
|
heap
|
page read and write
|
||
D13D000
|
heap
|
page read and write
|
||
A020000
|
trusted library allocation
|
page read and write
|
||
B617000
|
heap
|
page read and write
|
||
80E0000
|
trusted library allocation
|
page read and write
|
||
8D38000
|
heap
|
page read and write
|
||
C600000
|
trusted library allocation
|
page read and write
|
||
7A58000
|
stack
|
page read and write
|
||
BD37000
|
heap
|
page read and write
|
||
8C5A000
|
heap
|
page read and write
|
||
D35E000
|
heap
|
page read and write
|
||
AB4E000
|
stack
|
page read and write
|
||
1064F000
|
heap
|
page read and write
|
||
7FF5030D9000
|
unkown
|
page readonly
|
||
1058B000
|
heap
|
page read and write
|
||
D189000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2C70000
|
unkown
|
page readonly
|
||
1043D000
|
heap
|
page read and write
|
||
34A8000
|
stack
|
page read and write
|
||
7FFB000
|
stack
|
page read and write
|
||
8A49000
|
stack
|
page read and write
|
||
3082000
|
unkown
|
page read and write
|
||
10642000
|
heap
|
page read and write
|
||
8BD6000
|
heap
|
page read and write
|
||
D382000
|
heap
|
page read and write
|
||
9BF7000
|
unkown
|
page read and write
|
||
7548000
|
stack
|
page read and write
|
||
7FF5031C3000
|
unkown
|
page readonly
|
||
D05E000
|
heap
|
page read and write
|
||
7FF5032FE000
|
unkown
|
page readonly
|
||
10585000
|
heap
|
page read and write
|
||
7FF503175000
|
unkown
|
page readonly
|
||
2500000
|
heap
|
page read and write
|
||
43B0000
|
unkown
|
page read and write
|
||
7BC0000
|
heap
|
page read and write
|
||
7FF50323B000
|
unkown
|
page readonly
|
||
B67E000
|
heap
|
page read and write
|
||
76E0000
|
unkown
|
page readonly
|
||
BE96000
|
unkown
|
page read and write
|
||
FE50000
|
unkown
|
page read and write
|
||
B1BF000
|
stack
|
page read and write
|
||
7BD4000
|
heap
|
page read and write
|
||
7FF5032EB000
|
unkown
|
page readonly
|
||
76E0000
|
unkown
|
page readonly
|
||
7FF502D18000
|
unkown
|
page readonly
|
||
8BC9000
|
heap
|
page read and write
|
||
B621000
|
heap
|
page read and write
|
||
7FF50270A000
|
unkown
|
page readonly
|
||
D58E000
|
heap
|
page read and write
|
||
3729000
|
heap
|
page read and write
|
||
D368000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
BEAF000
|
unkown
|
page read and write
|
||
D4DB000
|
heap
|
page read and write
|
||
3967000
|
heap
|
page read and write
|
||
A162000
|
heap
|
page read and write
|
||
37A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF502EF3000
|
unkown
|
page readonly
|
||
D562000
|
heap
|
page read and write
|
||
3067000
|
unkown
|
page read and write
|
||
9450000
|
unkown
|
page readonly
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
8A38000
|
heap
|
page read and write
|
||
A34A000
|
unkown
|
page read and write
|
||
115F0000
|
trusted library allocation
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
D370000
|
heap
|
page read and write
|
||
98FB000
|
stack
|
page read and write
|
||
B556000
|
heap
|
page read and write
|
||
7FF502B53000
|
unkown
|
page readonly
|
||
1043D000
|
heap
|
page read and write
|
||
7DF411F11000
|
unkown
|
page execute read
|
||
9364000
|
unkown
|
page read and write
|
||
7FF5032DF000
|
unkown
|
page readonly
|
||
BDD5000
|
unkown
|
page read and write
|
||
C1AB000
|
unkown
|
page read and write
|
||
3FE4000
|
heap
|
page read and write
|
||
BC54000
|
heap
|
page read and write
|
||
8E39000
|
stack
|
page read and write
|
||
BCAD000
|
heap
|
page read and write
|
||
B621000
|
heap
|
page read and write
|
||
5120000
|
heap
|
page read and write
|
||
AE92000
|
heap
|
page read and write
|
||
B630000
|
heap
|
page read and write
|
||
D3DC000
|
heap
|
page read and write
|
||
7BE2000
|
heap
|
page read and write
|
||
8A16000
|
heap
|
page read and write
|
||
829B000
|
stack
|
page read and write
|
||
D2F5000
|
heap
|
page read and write
|
||
B607000
|
heap
|
page read and write
|
||
87AA000
|
stack
|
page read and write
|
||
B556000
|
heap
|
page read and write
|
||
BD4C000
|
heap
|
page read and write
|
||
936E000
|
unkown
|
page read and write
|
||
BEA3000
|
unkown
|
page read and write
|
||
7FF502E9C000
|
unkown
|
page readonly
|
||
8CD3000
|
heap
|
page read and write
|
||
8BD2000
|
heap
|
page read and write
|
||
2AC0000
|
unkown
|
page readonly
|
||
E90000
|
unkown
|
page readonly
|
||
AA0B000
|
stack
|
page read and write
|
||
860A000
|
heap
|
page read and write
|
||
A020000
|
trusted library allocation
|
page read and write
|
||
3212000
|
heap
|
page read and write
|
||
D300000
|
heap
|
page read and write
|
||
D376000
|
heap
|
page read and write
|
||
10443000
|
heap
|
page read and write
|
||
D36C000
|
heap
|
page read and write
|
||
D330000
|
heap
|
page read and write
|
||
105B1000
|
heap
|
page read and write
|
||
D16D000
|
heap
|
page read and write
|
||
7FF502E53000
|
unkown
|
page readonly
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
105BF000
|
heap
|
page read and write
|
||
BE99000
|
unkown
|
page read and write
|
||
BE1C000
|
unkown
|
page read and write
|
||
7FF503020000
|
unkown
|
page readonly
|
||
FE14000
|
unkown
|
page read and write
|
||
1068C000
|
heap
|
page read and write
|
||
104B2000
|
heap
|
page read and write
|
||
7DF411EE1000
|
unkown
|
page execute read
|
||
7FF503055000
|
unkown
|
page readonly
|
||
D386000
|
heap
|
page read and write
|
||
7D3E000
|
heap
|
page read and write
|
||
10729000
|
heap
|
page read and write
|
||
395F000
|
heap
|
page read and write
|
||
51E6000
|
heap
|
page read and write
|
||
7FF502C8C000
|
unkown
|
page readonly
|
||
7BE2000
|
heap
|
page read and write
|
||
8C97000
|
heap
|
page read and write
|
||
487D000
|
direct allocation
|
page read and write
|
||
D368000
|
heap
|
page read and write
|
||
B63B000
|
heap
|
page read and write
|
||
7FF50322D000
|
unkown
|
page readonly
|
||
399E000
|
direct allocation
|
page execute and read and write
|
||
89F4000
|
heap
|
page read and write
|
||
BFEE000
|
unkown
|
page read and write
|
||
7FF5032D7000
|
unkown
|
page readonly
|
||
7FF502B6F000
|
unkown
|
page readonly
|
||
3963000
|
heap
|
page read and write
|
||
7FF502EC9000
|
unkown
|
page readonly
|
||
8A91000
|
heap
|
page read and write
|
||
E56B000
|
stack
|
page read and write
|
||
2E3B000
|
stack
|
page read and write
|
||
D38E000
|
heap
|
page read and write
|
||
43ED000
|
heap
|
page read and write
|
||
7FF502DF9000
|
unkown
|
page readonly
|
||
BA8B000
|
stack
|
page read and write
|
||
A86E000
|
stack
|
page read and write
|
||
6FE3000
|
unkown
|
page read and write
|
||
97F9000
|
stack
|
page read and write
|
||
8D40000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
7C22000
|
heap
|
page read and write
|
||
B555000
|
heap
|
page read and write
|
||
7FF502DBC000
|
unkown
|
page readonly
|
||
3031000
|
direct allocation
|
page execute and read and write
|
||
E1C8000
|
stack
|
page read and write
|
||
10451000
|
heap
|
page read and write
|
||
BC55000
|
unkown
|
page read and write
|
||
362A000
|
stack
|
page read and write
|
||
D4B3000
|
heap
|
page read and write
|
||
7FF502D68000
|
unkown
|
page readonly
|
||
91A7000
|
unkown
|
page read and write
|
||
3091000
|
unkown
|
page read and write
|
||
D388000
|
heap
|
page read and write
|
||
8A38000
|
heap
|
page read and write
|
||
48EE000
|
direct allocation
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
3013000
|
heap
|
page read and write
|
||
105A9000
|
heap
|
page read and write
|
||
D7CD000
|
stack
|
page read and write
|
||
31B9000
|
stack
|
page read and write
|
||
10383000
|
heap
|
page read and write
|
||
D362000
|
heap
|
page read and write
|
||
7DF4C3541000
|
trusted library allocation
|
page execute read
|
||
7FF50318B000
|
unkown
|
page readonly
|
||
BCE6000
|
heap
|
page read and write
|
||
D06A000
|
heap
|
page read and write
|
||
8BD4000
|
heap
|
page read and write
|
||
7FF5031BC000
|
unkown
|
page readonly
|
||
A020000
|
trusted library allocation
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
D107000
|
heap
|
page read and write
|
||
8D38000
|
heap
|
page read and write
|
||
B63B000
|
heap
|
page read and write
|
||
36A0000
|
unclassified section
|
page execute and read and write
|
||
7B93000
|
heap
|
page read and write
|
||
B613000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
9092000
|
unkown
|
page read and write
|
||
D35C000
|
heap
|
page read and write
|
||
D332000
|
heap
|
page read and write
|
||
6F0F000
|
unkown
|
page read and write
|
||
B621000
|
heap
|
page read and write
|
||
D045000
|
heap
|
page read and write
|
||
B4E7000
|
heap
|
page read and write
|
||
8B2B000
|
heap
|
page read and write
|
||
BFF4000
|
unkown
|
page read and write
|
||
1038A000
|
heap
|
page read and write
|
||
B67E000
|
heap
|
page read and write
|
||
2A59000
|
stack
|
page read and write
|
||
3B42000
|
direct allocation
|
page execute and read and write
|
||
105C2000
|
heap
|
page read and write
|
||
4879000
|
direct allocation
|
page read and write
|
||
2BB7000
|
heap
|
page read and write
|
||
6EE1000
|
unkown
|
page read and write
|
||
B67E000
|
heap
|
page read and write
|
||
90BD000
|
unkown
|
page read and write
|
||
D57C000
|
heap
|
page read and write
|
||
7FF5032F7000
|
unkown
|
page readonly
|
||
D253000
|
heap
|
page read and write
|
||
BCC0000
|
heap
|
page read and write
|
||
8BC9000
|
heap
|
page read and write
|
||
8CD6000
|
heap
|
page read and write
|
||
7A58000
|
stack
|
page read and write
|
||
B62E000
|
heap
|
page read and write
|
||
D390000
|
heap
|
page read and write
|
||
E4A0000
|
trusted library allocation
|
page read and write
|
||
9CF4000
|
unkown
|
page read and write
|
||
8BD6000
|
heap
|
page read and write
|
||
D2E9000
|
heap
|
page read and write
|
||
8BDE000
|
heap
|
page read and write
|
||
EBDC000
|
unkown
|
page read and write
|
||
7FF50332C000
|
unkown
|
page readonly
|
||
8BDC000
|
heap
|
page read and write
|
||
10443000
|
heap
|
page read and write
|
||
CAB8000
|
stack
|
page read and write
|
||
BE14000
|
unkown
|
page read and write
|
||
B621000
|
heap
|
page read and write
|
||
85CB000
|
unkown
|
page read and write
|
||
43EA000
|
unkown
|
page read and write
|
||
B630000
|
heap
|
page read and write
|
||
D180000
|
heap
|
page read and write
|
||
13AA000
|
stack
|
page read and write
|
||
D390000
|
heap
|
page read and write
|
||
8BDA000
|
heap
|
page read and write
|
||
7C0E000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
D3AB000
|
heap
|
page read and write
|
||
D37C000
|
heap
|
page read and write
|
||
7FF502DB3000
|
unkown
|
page readonly
|
||
5206000
|
heap
|
page read and write
|
||
8D46000
|
heap
|
page read and write
|
||
7FF502B55000
|
unkown
|
page readonly
|
||
8AD6000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
8BD8000
|
heap
|
page read and write
|
||
B617000
|
heap
|
page read and write
|
||
B589000
|
heap
|
page read and write
|
||
3E60000
|
heap
|
page read and write
|
||
7FF502DDC000
|
unkown
|
page readonly
|
||
2DF0000
|
heap
|
page read and write
|
||
7FF502B61000
|
unkown
|
page readonly
|
||
105A5000
|
heap
|
page read and write
|
||
8C0A000
|
heap
|
page read and write
|
||
8DBD000
|
heap
|
page read and write
|
||
B67E000
|
heap
|
page read and write
|
||
8CF4000
|
heap
|
page read and write
|
||
90DA000
|
unkown
|
page read and write
|
||
10453000
|
heap
|
page read and write
|
||
829B000
|
stack
|
page read and write
|
||
B607000
|
heap
|
page read and write
|
||
D38A000
|
heap
|
page read and write
|
||
BCE3000
|
heap
|
page read and write
|
||
B546000
|
heap
|
page read and write
|
||
9B83000
|
unkown
|
page read and write
|
||
8C02000
|
heap
|
page read and write
|
||
D0F0000
|
heap
|
page read and write
|
||
D4E2000
|
heap
|
page read and write
|
||
5219000
|
heap
|
page read and write
|
||
10372000
|
heap
|
page read and write
|
||
7D61000
|
heap
|
page read and write
|
||
46D3000
|
direct allocation
|
page read and write
|
||
C5D0000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
unkown
|
page readonly
|
||
B613000
|
heap
|
page read and write
|
||
3961000
|
heap
|
page read and write
|
||
7FF5032EE000
|
unkown
|
page readonly
|
||
8BC9000
|
heap
|
page read and write
|
||
B4A9000
|
heap
|
page read and write
|
||
B541000
|
heap
|
page read and write
|
||
7480000
|
unkown
|
page read and write
|
||
B1BF000
|
stack
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
DACD000
|
stack
|
page read and write
|
||
80D0000
|
heap
|
page read and write
|
||
7FF502DDC000
|
unkown
|
page readonly
|
||
D58D000
|
heap
|
page read and write
|
||
3950000
|
heap
|
page read and write
|
||
3013000
|
heap
|
page read and write
|
||
1054D000
|
heap
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
D2EE000
|
heap
|
page read and write
|
||
D382000
|
heap
|
page read and write
|
||
BD4F000
|
heap
|
page read and write
|
||
3980000
|
heap
|
page read and write
|
||
519B000
|
heap
|
page read and write
|
||
BC00000
|
heap
|
page read and write
|
||
8DBD000
|
heap
|
page read and write
|
||
D360000
|
heap
|
page read and write
|
||
1038A000
|
heap
|
page read and write
|
||
B5B5000
|
heap
|
page read and write
|
||
10583000
|
heap
|
page read and write
|
||
8529000
|
stack
|
page read and write
|
||
9E0000
|
unkown
|
page read and write
|
||
2A59000
|
stack
|
page read and write
|
||
44AC000
|
heap
|
page read and write
|
||
7FF502CF5000
|
unkown
|
page readonly
|
||
EBCD000
|
unkown
|
page read and write
|
||
4750000
|
direct allocation
|
page read and write
|
||
7FF5026F7000
|
unkown
|
page readonly
|
||
D3CB000
|
heap
|
page read and write
|
||
7FF503277000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
810000
|
unkown
|
page readonly
|
||
D38C000
|
heap
|
page read and write
|
||
10462000
|
heap
|
page read and write
|
||
2F20000
|
unkown
|
page readonly
|
||
B624000
|
heap
|
page read and write
|
||
84AA000
|
stack
|
page read and write
|
||
7BA0000
|
heap
|
page read and write
|
||
2BDC000
|
stack
|
page read and write
|
||
7FF50328B000
|
unkown
|
page readonly
|
||
D12A000
|
heap
|
page read and write
|
||
3E54000
|
heap
|
page read and write
|
||
CF48000
|
heap
|
page read and write
|
||
8DB0000
|
heap
|
page read and write
|
||
B589000
|
heap
|
page read and write
|
||
24E4000
|
heap
|
page read and write
|
||
7CE5000
|
heap
|
page read and write
|
||
D16D000
|
heap
|
page read and write
|
||
BD18000
|
heap
|
page read and write
|
||
1045D000
|
heap
|
page read and write
|
||
7FF502D29000
|
unkown
|
page readonly
|
||
BCE6000
|
heap
|
page read and write
|
||
D33A000
|
heap
|
page read and write
|
||
8BD4000
|
heap
|
page read and write
|
||
7FF5032C0000
|
unkown
|
page readonly
|
||
132B000
|
heap
|
page read and write
|
||
8DA9000
|
heap
|
page read and write
|
||
7FF502FB4000
|
unkown
|
page readonly
|
||
6FBF000
|
unkown
|
page read and write
|
||
D562000
|
heap
|
page read and write
|
||
10455000
|
heap
|
page read and write
|
||
BCC8000
|
heap
|
page read and write
|
||
398D000
|
heap
|
page read and write
|
||
D259000
|
heap
|
page read and write
|
||
B550000
|
heap
|
page read and write
|
||
10440000
|
heap
|
page read and write
|
||
BC7C000
|
heap
|
page read and write
|
||
9D60000
|
unkown
|
page read and write
|
||
AF7F000
|
stack
|
page read and write
|
||
7FF502F66000
|
unkown
|
page readonly
|
||
7DF4C34F1000
|
trusted library allocation
|
page execute read
|
||
D3F4000
|
heap
|
page read and write
|
||
10468000
|
heap
|
page read and write
|
||
E50000
|
unkown
|
page readonly
|
||
16C0000
|
heap
|
page read and write
|
||
43FD000
|
unkown
|
page read and write
|
||
7FF502D48000
|
unkown
|
page readonly
|
||
B2BA000
|
stack
|
page read and write
|
||
B5B5000
|
heap
|
page read and write
|
||
8D3F000
|
heap
|
page read and write
|
||
10592000
|
heap
|
page read and write
|
||
D1AF000
|
heap
|
page read and write
|
||
BD00000
|
heap
|
page read and write
|
||
7BF1000
|
heap
|
page read and write
|
||
8D1C000
|
heap
|
page read and write
|
||
43AC000
|
unkown
|
page read and write
|
||
D07D000
|
heap
|
page read and write
|
||
104C4000
|
heap
|
page read and write
|
||
1045F000
|
heap
|
page read and write
|
||
D57C000
|
heap
|
page read and write
|
||
D180000
|
heap
|
page read and write
|
||
7FF502C2E000
|
unkown
|
page readonly
|
||
1058B000
|
heap
|
page read and write
|
||
D332000
|
heap
|
page read and write
|
||
B589000
|
heap
|
page read and write
|
||
8BC1000
|
heap
|
page read and write
|
||
D31C000
|
heap
|
page read and write
|
||
BC43000
|
heap
|
page read and write
|
||
D35A000
|
heap
|
page read and write
|
||
10430000
|
heap
|
page read and write
|
||
1044F000
|
heap
|
page read and write
|
||
7560000
|
unkown
|
page readonly
|
||
D25F000
|
heap
|
page read and write
|
||
8602000
|
heap
|
page read and write
|
||
10453000
|
heap
|
page read and write
|
||
D380000
|
heap
|
page read and write
|
||
B51E000
|
heap
|
page read and write
|
||
B5FA000
|
heap
|
page read and write
|
||
2BE4000
|
unkown
|
page read and write
|
||
7FF50324D000
|
unkown
|
page readonly
|
||
BEE8000
|
unkown
|
page read and write
|
||
80B0000
|
unkown
|
page read and write
|
||
D3BF000
|
heap
|
page read and write
|
||
8CE2000
|
heap
|
page read and write
|
||
D0B0000
|
heap
|
page read and write
|
||
10377000
|
heap
|
page read and write
|
||
8BDE000
|
heap
|
page read and write
|
||
2C70000
|
unkown
|
page readonly
|
||
D1B3000
|
heap
|
page read and write
|
||
7FF5031B0000
|
unkown
|
page readonly
|
||
8BC1000
|
heap
|
page read and write
|
||
D16D000
|
heap
|
page read and write
|
||
B556000
|
heap
|
page read and write
|
||
AA8D000
|
stack
|
page read and write
|
||
1064C000
|
heap
|
page read and write
|
||
1036C000
|
heap
|
page read and write
|
||
10398000
|
heap
|
page read and write
|
||
FD96000
|
unkown
|
page read and write
|
||
BC15000
|
unkown
|
page read and write
|
||
9CF6000
|
unkown
|
page read and write
|
||
7FF502F88000
|
unkown
|
page readonly
|
||
8B2B000
|
heap
|
page read and write
|
||
7FF502F2C000
|
unkown
|
page readonly
|
||
D36A000
|
heap
|
page read and write
|
||
161E000
|
stack
|
page read and write
|
||
7DF4C35C0000
|
trusted library allocation
|
page readonly
|
||
ABE0000
|
unkown
|
page read and write
|
||
2FF1000
|
trusted library allocation
|
page execute and read and write
|
||
10360000
|
heap
|
page read and write
|
||
7DF4C35B0000
|
trusted library allocation
|
page readonly
|
||
7BE2000
|
heap
|
page read and write
|
||
7FF503118000
|
unkown
|
page readonly
|
||
7FF502CFA000
|
unkown
|
page readonly
|
||
B624000
|
heap
|
page read and write
|
||
7D35000
|
heap
|
page read and write
|
||
BC80000
|
unkown
|
page read and write
|
||
D1B3000
|
heap
|
page read and write
|
||
BC50000
|
heap
|
page read and write
|
||
B51E000
|
heap
|
page read and write
|
||
7BE2000
|
heap
|
page read and write
|
||
104C4000
|
heap
|
page read and write
|
||
10708000
|
heap
|
page read and write
|
||
8CEB000
|
heap
|
page read and write
|
||
79DD000
|
stack
|
page read and write
|
||
8D61000
|
heap
|
page read and write
|
||
105C2000
|
heap
|
page read and write
|
||
89F2000
|
heap
|
page read and write
|
||
7DF4C3521000
|
trusted library allocation
|
page execute read
|
||
8440000
|
unkown
|
page read and write
|
||
7FF5030CE000
|
unkown
|
page readonly
|
There are 3061 hidden memdumps, click here to show them.