Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PURCHASED ORDER OF ENG091.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PURCHASED ORDER OF ENG091.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PURCHASED ORDER OF ENG091.pif.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PURCHASED ORDER OF ENG091.pif.pif.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PURCHASED ORDER OF ENG091.pif.pif.pif.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.log
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PURCHASED ORDER OF ENG091.exe
|
"C:\Users\user\Desktop\PURCHASED ORDER OF ENG091.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED
ORDER OF ENG091.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED
ORDER OF ENG091.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Desktop\PURCHASED ORDER OF ENG091.exe" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Windows\SysWOW64\cmstp.exe
|
"C:\Windows\SysWOW64\cmstp.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif
|
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED
ORDER OF ENG091.pif.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED
ORDER OF ENG091.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif
|
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED
ORDER OF ENG091.pif.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED
ORDER OF ENG091.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\SysWOW64\msdt.exe
|
"C:\Windows\SysWOW64\msdt.exe"
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif
|
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif" /t REG_SZ /F /D
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED
ORDER OF ENG091.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\SysWOW64\msdt.exe
|
"C:\Windows\SysWOW64\msdt.exe"
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif
|
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif" /t REG_SZ /F /D
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED
ORDER OF ENG091.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
"C:\Windows\SysWOW64\rundll32.exe"
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif
|
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif" /t REG_SZ /F
/D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED
ORDER OF ENG091.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\SysWOW64\wlanext.exe
|
"C:\Windows\SysWOW64\wlanext.exe"
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif
|
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif" /t REG_SZ /F
/D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED
ORDER OF ENG091.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\SysWOW64\msdt.exe
|
"C:\Windows\SysWOW64\msdt.exe"
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif
|
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif.pif" /t REG_SZ
/F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif.pif" /t REG_SZ /F
/D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif" "C:\Users\user\Documents\PURCHASED ORDER
OF ENG091.pif.pif.pif.pif.pif"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\SysWOW64\chkdsk.exe
|
"C:\Windows\SysWOW64\chkdsk.exe"
|
||
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif
|
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif.pif" /t REG_SZ
/F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif.pif" /t REG_SZ /F
/D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif" "C:\Users\user\Documents\PURCHASED ORDER
OF ENG091.pif.pif.pif.pif.pif"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\SysWOW64\netsh.exe
|
"C:\Windows\SysWOW64\netsh.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmmon32.exe
|
"C:\Windows\SysWOW64\cmmon32.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 69 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.emeraldsurrogatefabric.com
|
unknown
|
||
http://www.emeraldsurrogatefabric.com/btrd/www.pure1027.com
|
unknown
|
||
www.cnoszirzbkaqz.com/btrd/
|
|||
http://www.emeraldsurrogatefabric.com/btrd/?8pn=ChvLWF0pZdjL9&orD=G5lr6//zQ7aMiplq1GdUNb9GEJVmzQOhD2w3hHYWxcuiBbLjkdh8uX+W8X62ffIzaE+7zSgsRw==
|
192.243.59.20
|
||
http://www.emeraldsurrogatefabric.com/btrd/
|
unknown
|
||
http://www.anangtoto.com/btrd/?orD=sqRP0a8aV68K6FqJqAk+hHqxgWstkLnSX2TzjpZXqgEq2vKFORbsNIdmsOuhVtdKxSDXL4nXjg==&8pn=ChvLWF0pZdjL9
|
91.195.240.19
|
||
http://www.emeraldsurrogatefabric.comReferer:
|
unknown
|
||
http://www.thecolourgrey.com/btrd/?8pn=ChvLWF0pZdjL9&orD=1hanRQkKsw2EpQWVKCl4LROlWZtcCFpSARtuzqwGSwLi36Og4ncRpLu12qyBMcT+6ho6oQQ/oA==
|
104.21.93.17
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
|
unknown
|
||
https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
|
unknown
|
||
http://www.thebestanglephotography.online
|
unknown
|
||
https://api.msn.com:443/v1/news/Feed/Windows?
|
unknown
|
||
https://word.office.comM
|
unknown
|
||
http://youngonven.com/1485#Re
|
unknown
|
||
http://www.texanboxes.com/btrd/
|
unknown
|
||
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
|
unknown
|
||
https://www.hugedomains.com/domain_profile.cfm?d=pure1027.com
|
unknown
|
||
https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
|
unknown
|
||
http://www.martline.website/btrd/
|
unknown
|
||
http://www.xmentorgroup.com
|
unknown
|
||
http://www.outletivo.com/btrd/
|
unknown
|
||
http://www.rd8.online
|
unknown
|
||
http://www.rd8.online/btrd/
|
unknown
|
||
http://www.0757hunyin.net/btrd/www.texanboxes.com
|
unknown
|
||
https://wns.windows.com/e
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.outletivo.com
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
|
unknown
|
||
http://www.pure1027.comReferer:
|
unknown
|
||
http://www.outletivo.comReferer:
|
unknown
|
||
http://www.anangtoto.comReferer:
|
unknown
|
||
http://www.xmentorgroup.com/btrd/www.outletivo.com
|
unknown
|
||
https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
|
unknown
|
||
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
|
unknown
|
||
http://www.outletivo.com/btrd/www.martline.website
|
unknown
|
||
https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
|
unknown
|
||
http://www.naddafornadda.comReferer:
|
unknown
|
||
http://www.thecolourgrey.com/btrd/www.anangtoto.com
|
unknown
|
||
http://www.researchforhighschool.comReferer:
|
unknown
|
||
http://www.researchforhighschool.com/btrd/www.invest247on.com
|
unknown
|
||
http://www.martline.websiteReferer:
|
unknown
|
||
http://www.invest247on.com/btrd/
|
unknown
|
||
https://android.notify.windows.com/iOS
|
unknown
|
||
http://www.watch2movie.xyz/btrd/
|
unknown
|
||
https://outlook.come
|
unknown
|
||
http://www.thecolourgrey.com/btrd/
|
unknown
|
||
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
|
unknown
|
||
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
|
unknown
|
||
http://www.pure1027.com/btrd/
|
unknown
|
||
http://www.thecolourgrey.comReferer:
|
unknown
|
||
http://www.cnoszirzbkaqz.com/btrd/www.thebestanglephotography.online
|
unknown
|
||
http://www.xmentorgroup.comReferer:
|
unknown
|
||
http://www.anangtoto.com/btrd/
|
unknown
|
||
http://www.invest247on.comReferer:
|
unknown
|
||
https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
|
unknown
|
||
http://www.cnoszirzbkaqz.com
|
unknown
|
||
https://api.msn.com/v1/news/Feed/Windows?
|
unknown
|
||
https://api.msn.com/I
|
unknown
|
||
http://www.texanboxes.com/btrd/www.watch2movie.xyz
|
unknown
|
||
http://www.xmentorgroup.com/btrd/
|
unknown
|
||
http://www.cnoszirzbkaqz.com/btrd/
|
unknown
|
||
http://www.martline.website/btrd/www.naddafornadda.com
|
unknown
|
||
http://www.cnoszirzbkaqz.comReferer:
|
unknown
|
||
http://schemas.micro
|
unknown
|
||
http://www.0757hunyin.net/btrd/
|
unknown
|
||
http://www.watch2movie.xyz
|
unknown
|
||
http://www.0757hunyin.netReferer:
|
unknown
|
||
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
|
unknown
|
||
http://www.texanboxes.com
|
unknown
|
||
http://www.invest247on.com
|
unknown
|
||
http://www.rd8.onlineReferer:
|
unknown
|
||
http://www.pure1027.com/btrd/www.thecolourgrey.com
|
unknown
|
||
https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h
|
unknown
|
||
http://www.researchforhighschool.com/btrd/
|
unknown
|
||
https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
|
unknown
|
||
http://www.rd8.online/btrd/www.researchforhighschool.com
|
unknown
|
||
http://www.naddafornadda.com
|
unknown
|
||
http://www.martline.website
|
unknown
|
||
http://www.pure1027.com
|
unknown
|
||
http://www.0757hunyin.net
|
unknown
|
||
http://www.thecolourgrey.com
|
unknown
|
||
http://www.watch2movie.xyz/btrd/www.cnoszirzbkaqz.com
|
unknown
|
||
http://www.anangtoto.com/btrd/www.0757hunyin.net
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
|
unknown
|
||
https://excel.office.com-
|
unknown
|
||
http://youngonven.com
|
unknown
|
||
http://youngonven.com/1485
|
63.250.38.167
|
||
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
|
unknown
|
||
http://www.naddafornadda.com/btrd/
|
unknown
|
||
https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
|
unknown
|
||
http://www.anangtoto.com
|
unknown
|
||
http://www.invest247on.com/btrd/www.xmentorgroup.com
|
unknown
|
||
https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
|
unknown
|
||
https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
|
unknown
|
||
http://www.thebestanglephotography.onlineReferer:
|
unknown
|
||
https://powerpoint.office.comEMd
|
unknown
|
||
http://www.texanboxes.comReferer:
|
unknown
|
||
http://www.thebestanglephotography.online/btrd/
|
unknown
|
||
https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.thecolourgrey.com
|
104.21.93.17
|
||
parkingpage.namecheap.com
|
91.195.240.19
|
||
texanboxes.com
|
3.33.130.190
|
||
www.emeraldsurrogatefabric.com
|
192.243.59.20
|
||
hdr-nlb7-aebd5d615260636b.elb.us-east-1.amazonaws.com
|
34.205.242.146
|
||
www.pure1027.com
|
unknown
|
||
www.0757hunyin.net
|
unknown
|
||
www.anangtoto.com
|
unknown
|
||
www.texanboxes.com
|
unknown
|
||
youngonven.com
|
63.250.38.167
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.205.242.146
|
hdr-nlb7-aebd5d615260636b.elb.us-east-1.amazonaws.com
|
United States
|
||
192.243.59.20
|
www.emeraldsurrogatefabric.com
|
Dominica
|
||
104.21.93.17
|
www.thecolourgrey.com
|
United States
|
||
91.195.240.19
|
parkingpage.namecheap.com
|
Germany
|
||
63.250.38.167
|
youngonven.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
PURCHASED ORDER OF ENG091
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
PURCHASED ORDER OF ENG091.pif
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
PURCHASED ORDER OF ENG091.pif.pif
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
PURCHASED ORDER OF ENG091.pif.pif.pif
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
PURCHASED ORDER OF ENG091.pif.pif.pif.pif
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001046C
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000002046C
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
b
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030494
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000060486
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
c
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000005048C
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000006046C
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
d
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000070470
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080488
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
e
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000B0486
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000C0490
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
f
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000160026
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000C0494
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.M2V\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
There are 225 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2C00000
|
system
|
page execute and read and write
|
||
EB42000
|
unkown
|
page execute and read and write
|
||
3F49000
|
trusted library allocation
|
page read and write
|
||
389A000
|
trusted library allocation
|
page read and write
|
||
4028000
|
trusted library allocation
|
page read and write
|
||
600000
|
system
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3A5B000
|
trusted library allocation
|
page read and write
|
||
35F9000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
system
|
page execute and read and write
|
||
28B0000
|
system
|
page execute and read and write
|
||
39AB000
|
trusted library allocation
|
page read and write
|
||
39CC000
|
trusted library allocation
|
page read and write
|
||
352B000
|
trusted library allocation
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
4534000
|
trusted library allocation
|
page read and write
|
||
5070000
|
system
|
page execute and read and write
|
||
6E0000
|
system
|
page execute and read and write
|
||
3190000
|
system
|
page execute and read and write
|
||
960000
|
system
|
page execute and read and write
|
||
3BB4000
|
trusted library allocation
|
page read and write
|
||
45B3000
|
trusted library allocation
|
page read and write
|
||
B30000
|
system
|
page execute and read and write
|
||
44F0000
|
unclassified section
|
page execute and read and write
|
||
32AA000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
7FF5DF3D4000
|
unkown
|
page readonly
|
||
11AE0000
|
system
|
page execute and read and write
|
||
552D000
|
stack
|
page read and write
|
||
7FF5DF45A000
|
unkown
|
page readonly
|
||
F48000
|
stack
|
page read and write
|
||
A749000
|
unkown
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
9C1D000
|
stack
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
AC9000
|
stack
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
46C1000
|
heap
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
4E7C000
|
stack
|
page read and write
|
||
7FF5DF207000
|
unkown
|
page readonly
|
||
6380000
|
trusted library allocation
|
page execute and read and write
|
||
56D8000
|
trusted library allocation
|
page read and write
|
||
7FF5DF07D000
|
unkown
|
page readonly
|
||
4CD0000
|
trusted library allocation
|
page read and write
|
||
3EEA000
|
trusted library allocation
|
page read and write
|
||
32BA000
|
trusted library allocation
|
page read and write
|
||
B369000
|
unkown
|
page read and write
|
||
127D000
|
trusted library allocation
|
page execute and read and write
|
||
5F0000
|
heap
|
page read and write
|
||
48E0000
|
unkown
|
page read and write
|
||
3073000
|
heap
|
page read and write
|
||
2904000
|
heap
|
page read and write
|
||
13CB000
|
unclassified section
|
page execute and read and write
|
||
3086000
|
heap
|
page read and write
|
||
EE88000
|
unkown
|
page read and write
|
||
C474000
|
unkown
|
page read and write
|
||
7DF4E67A1000
|
unkown
|
page execute read
|
||
1147000
|
trusted library allocation
|
page execute and read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
trusted library allocation
|
page read and write
|
||
5A10000
|
heap
|
page read and write
|
||
C2E4000
|
unkown
|
page read and write
|
||
2AB3000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
4760000
|
unkown
|
page read and write
|
||
7FF5DF28E000
|
unkown
|
page readonly
|
||
2E3D000
|
stack
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
6357000
|
trusted library allocation
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
50F2000
|
heap
|
page read and write
|
||
35D0000
|
heap
|
page read and write
|
||
7FF5DF43C000
|
unkown
|
page readonly
|
||
9F63000
|
unkown
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
7FF5DF045000
|
unkown
|
page readonly
|
||
73A3000
|
unkown
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
B9000
|
stack
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
5B30000
|
trusted library allocation
|
page execute and read and write
|
||
5640000
|
trusted library allocation
|
page execute and read and write
|
||
33EE000
|
stack
|
page read and write
|
||
50F2000
|
heap
|
page read and write
|
||
7A40000
|
unkown
|
page readonly
|
||
7FF5DF5B0000
|
unkown
|
page readonly
|
||
231B000
|
stack
|
page read and write
|
||
3CA1000
|
trusted library allocation
|
page read and write
|
||
7FF5DF50F000
|
unkown
|
page readonly
|
||
7991000
|
unkown
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
C4C9000
|
unkown
|
page read and write
|
||
AF3000
|
trusted library allocation
|
page read and write
|
||
620D000
|
stack
|
page read and write
|
||
A7C000
|
system
|
page execute and read and write
|
||
2CDF000
|
stack
|
page read and write
|
||
7FF5DF5A3000
|
unkown
|
page readonly
|
||
7B4C000
|
stack
|
page read and write
|
||
2D13000
|
direct allocation
|
page execute and read and write
|
||
97F3000
|
unkown
|
page read and write
|
||
2800000
|
direct allocation
|
page execute and read and write
|
||
8910000
|
unkown
|
page read and write
|
||
28C4000
|
trusted library allocation
|
page read and write
|
||
E4A000
|
heap
|
page read and write
|
||
50F4000
|
heap
|
page read and write
|
||
314B000
|
heap
|
page read and write
|
||
326D000
|
stack
|
page read and write
|
||
2E72000
|
unclassified section
|
page execute and read and write
|
||
3074000
|
heap
|
page read and write
|
||
9AF000
|
stack
|
page read and write
|
||
A0FC000
|
unkown
|
page read and write
|
||
33BE000
|
unkown
|
page read and write
|
||
3E72000
|
direct allocation
|
page execute and read and write
|
||
321E000
|
stack
|
page read and write
|
||
2C54000
|
heap
|
page read and write
|
||
2870000
|
unkown
|
page read and write
|
||
47A2000
|
unkown
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
4C22000
|
trusted library allocation
|
page read and write
|
||
3FCA000
|
trusted library allocation
|
page read and write
|
||
790A000
|
stack
|
page read and write
|
||
74F1000
|
unkown
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
7FF5DF23B000
|
unkown
|
page readonly
|
||
2F50000
|
trusted library allocation
|
page read and write
|
||
7FF5DF584000
|
unkown
|
page readonly
|
||
5C52000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
7FF5DF507000
|
unkown
|
page readonly
|
||
4BA000
|
heap
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
C159000
|
unkown
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
31FB000
|
unclassified section
|
page execute and read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
7FF5DEFF0000
|
unkown
|
page readonly
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
56AE000
|
trusted library allocation
|
page read and write
|
||
4890000
|
unkown
|
page read and write
|
||
9E1E000
|
stack
|
page read and write
|
||
343A000
|
trusted library allocation
|
page read and write
|
||
9A6C000
|
stack
|
page read and write
|
||
312E000
|
unkown
|
page read and write
|
||
4870000
|
unkown
|
page read and write
|
||
97F3000
|
unkown
|
page read and write
|
||
8A36000
|
unkown
|
page read and write
|
||
6D6000
|
trusted library allocation
|
page execute and read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
7FF5DF067000
|
unkown
|
page readonly
|
||
7FF5DF62C000
|
unkown
|
page readonly
|
||
59F4000
|
heap
|
page read and write
|
||
63CE000
|
stack
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
359A000
|
trusted library allocation
|
page read and write
|
||
7FF5DF3BE000
|
unkown
|
page readonly
|
||
100C4000
|
unkown
|
page read and write
|
||
790A000
|
stack
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
C524000
|
unkown
|
page read and write
|
||
10600000
|
unkown
|
page execute and read and write
|
||
4C8F000
|
unclassified section
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
2BED000
|
stack
|
page read and write
|
||
513C000
|
heap
|
page read and write
|
||
51DC000
|
stack
|
page read and write
|
||
577D000
|
stack
|
page read and write
|
||
C1CC000
|
unkown
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
2686000
|
trusted library allocation
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
2FDD000
|
heap
|
page read and write
|
||
76F0000
|
unkown
|
page read and write
|
||
5810000
|
trusted library allocation
|
page read and write
|
||
7FF5DF0CC000
|
unkown
|
page readonly
|
||
2AE0000
|
heap
|
page read and write
|
||
7FF5DF3FC000
|
unkown
|
page readonly
|
||
7FF5DEFAC000
|
unkown
|
page readonly
|
||
5240000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
direct allocation
|
page execute and read and write
|
||
28ED000
|
trusted library allocation
|
page read and write
|
||
7FF5DEF57000
|
unkown
|
page readonly
|
||
307D000
|
stack
|
page read and write
|
||
BF9B000
|
unkown
|
page read and write
|
||
7FF5DF5B3000
|
unkown
|
page readonly
|
||
97B8000
|
unkown
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
7DF4E6770000
|
unkown
|
page readonly
|
||
73A7000
|
unkown
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page execute and read and write
|
||
3B30000
|
direct allocation
|
page execute and read and write
|
||
4890000
|
heap
|
page execute and read and write
|
||
48B0000
|
trusted library allocation
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
C1C4000
|
unkown
|
page read and write
|
||
51B2000
|
direct allocation
|
page execute and read and write
|
||
5260000
|
trusted library allocation
|
page execute and read and write
|
||
52A0000
|
heap
|
page read and write
|
||
1030A000
|
system
|
page execute and read and write
|
||
314B000
|
heap
|
page read and write
|
||
B11C000
|
stack
|
page read and write
|
||
47D9000
|
unkown
|
page read and write
|
||
30FB000
|
stack
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
7830000
|
unkown
|
page read and write
|
||
7FF5DF04D000
|
unkown
|
page readonly
|
||
2F30000
|
heap
|
page read and write
|
||
A08A000
|
unkown
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
A0A7000
|
unkown
|
page read and write
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
7FF5DF549000
|
unkown
|
page readonly
|
||
4860000
|
trusted library allocation
|
page read and write
|
||
503D000
|
stack
|
page read and write
|
||
7FF5DEE43000
|
unkown
|
page readonly
|
||
1730000
|
heap
|
page read and write
|
||
7A30000
|
unkown
|
page read and write
|
||
7FF5DEE5A000
|
unkown
|
page readonly
|
||
4AE1000
|
heap
|
page read and write
|
||
7FF5DF5A3000
|
unkown
|
page readonly
|
||
32D0000
|
heap
|
page read and write
|
||
50ED000
|
trusted library allocation
|
page read and write
|
||
3ACC000
|
trusted library allocation
|
page read and write
|
||
7810000
|
unkown
|
page read and write
|
||
644E000
|
stack
|
page read and write
|
||
258E000
|
stack
|
page read and write
|
||
342E000
|
unkown
|
page read and write
|
||
10084000
|
unkown
|
page read and write
|
||
9F92000
|
unkown
|
page read and write
|
||
38D0000
|
heap
|
page read and write
|
||
60F1000
|
heap
|
page read and write
|
||
627C000
|
stack
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
5DF0000
|
heap
|
page read and write
|
||
50F8000
|
heap
|
page read and write
|
||
7FF5DF25B000
|
unkown
|
page readonly
|
||
9714000
|
unkown
|
page read and write
|
||
437A000
|
trusted library allocation
|
page read and write
|
||
2F95000
|
trusted library allocation
|
page read and write
|
||
143E000
|
stack
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
4E92000
|
trusted library allocation
|
page read and write
|
||
BC7000
|
stack
|
page read and write
|
||
4C63000
|
heap
|
page read and write
|
||
7FF5DF5B0000
|
unkown
|
page readonly
|
||
C183000
|
unkown
|
page read and write
|
||
987C000
|
unkown
|
page read and write
|
||
CF0000
|
trusted library allocation
|
page read and write
|
||
7FF5DF4E3000
|
unkown
|
page readonly
|
||
D14000
|
heap
|
page read and write
|
||
A40000
|
unclassified section
|
page execute and read and write
|
||
479B000
|
unkown
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
5390000
|
heap
|
page read and write
|
||
A60000
|
system
|
page execute and read and write
|
||
FF7000
|
heap
|
page read and write
|
||
5B4D000
|
direct allocation
|
page execute and read and write
|
||
3151000
|
heap
|
page read and write
|
||
178B000
|
trusted library allocation
|
page execute and read and write
|
||
6CD000
|
trusted library allocation
|
page execute and read and write
|
||
971C000
|
unkown
|
page read and write
|
||
7FF5DE9C3000
|
unkown
|
page readonly
|
||
7DF4E6771000
|
unkown
|
page execute read
|
||
B12000
|
trusted library allocation
|
page read and write
|
||
7DF4E6771000
|
unkown
|
page execute read
|
||
6D50000
|
trusted library allocation
|
page read and write
|
||
1145000
|
trusted library allocation
|
page execute and read and write
|
||
69CE000
|
stack
|
page read and write
|
||
2CB2000
|
direct allocation
|
page execute and read and write
|
||
E530000
|
system
|
page execute and read and write
|
||
376A000
|
trusted library allocation
|
page read and write
|
||
7FF5DEE52000
|
unkown
|
page readonly
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
EE75000
|
unkown
|
page read and write
|
||
332E000
|
unkown
|
page read and write
|
||
2880000
|
unclassified section
|
page execute and read and write
|
||
37B1000
|
trusted library allocation
|
page read and write
|
||
7860000
|
unkown
|
page read and write
|
||
614A000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
2FED000
|
direct allocation
|
page execute and read and write
|
||
9718000
|
unkown
|
page read and write
|
||
7DF4E6781000
|
unkown
|
page execute read
|
||
4CC0000
|
heap
|
page read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
73A7000
|
unkown
|
page read and write
|
||
A5B000
|
unclassified section
|
page execute and read and write
|
||
7FF5DF478000
|
unkown
|
page readonly
|
||
9D1F000
|
stack
|
page read and write
|
||
71CC000
|
stack
|
page read and write
|
||
C425000
|
unkown
|
page read and write
|
||
7860000
|
unkown
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
2C54000
|
heap
|
page read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
7FF5DF0D2000
|
unkown
|
page readonly
|
||
6220000
|
trusted library section
|
page read and write
|
||
7FF5DF486000
|
unkown
|
page readonly
|
||
430000
|
heap
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
98A1000
|
unkown
|
page read and write
|
||
6B20000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
2EBD000
|
direct allocation
|
page execute and read and write
|
||
5360000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
BF6D000
|
unkown
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
2FDD000
|
heap
|
page read and write
|
||
1081F000
|
stack
|
page read and write
|
||
2D6D000
|
trusted library allocation
|
page read and write
|
||
32DC000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
2B79000
|
direct allocation
|
page execute and read and write
|
||
970000
|
unkown
|
page readonly
|
||
C1CC000
|
unkown
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
7FF5DF549000
|
unkown
|
page readonly
|
||
4B9E000
|
direct allocation
|
page execute and read and write
|
||
9AE000
|
stack
|
page read and write
|
||
651E000
|
stack
|
page read and write
|
||
7FF5DF21C000
|
unkown
|
page readonly
|
||
5B0000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
707000
|
heap
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
266B000
|
trusted library allocation
|
page read and write
|
||
23C0000
|
heap
|
page read and write
|
||
5161000
|
direct allocation
|
page execute and read and write
|
||
7FF5DEFF8000
|
unkown
|
page readonly
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
5A0C000
|
heap
|
page read and write
|
||
98AD000
|
unkown
|
page read and write
|
||
FEB000
|
unclassified section
|
page execute and read and write
|
||
7FF5DF21B000
|
unkown
|
page readonly
|
||
4C00000
|
heap
|
page read and write
|
||
9F60000
|
unkown
|
page read and write
|
||
51FD000
|
trusted library allocation
|
page read and write
|
||
7FF5DEFB7000
|
unkown
|
page readonly
|
||
6FC000
|
stack
|
page read and write
|
||
2AF0000
|
unclassified section
|
page execute and read and write
|
||
4E31000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
7FF5DF5F6000
|
unkown
|
page readonly
|
||
C034000
|
unkown
|
page read and write
|
||
4C45000
|
trusted library allocation
|
page read and write
|
||
502D000
|
stack
|
page read and write
|
||
7ED000
|
trusted library allocation
|
page execute and read and write
|
||
1470000
|
unclassified section
|
page execute and read and write
|
||
7FF5DF0A5000
|
unkown
|
page readonly
|
||
3C59000
|
direct allocation
|
page execute and read and write
|
||
7FF5DF52D000
|
unkown
|
page readonly
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
978C000
|
unkown
|
page read and write
|
||
7FF5DF606000
|
unkown
|
page readonly
|
||
7B0000
|
heap
|
page read and write
|
||
7FF5DF2FE000
|
unkown
|
page readonly
|
||
2AD0000
|
heap
|
page read and write
|
||
7FF5DEF4B000
|
unkown
|
page readonly
|
||
73B2000
|
unkown
|
page read and write
|
||
74A9000
|
unkown
|
page read and write
|
||
1772000
|
trusted library allocation
|
page read and write
|
||
1AD000
|
stack
|
page read and write
|
||
34C7000
|
trusted library allocation
|
page read and write
|
||
73BC000
|
unkown
|
page read and write
|
||
3362000
|
unkown
|
page read and write
|
||
D1A000
|
trusted library allocation
|
page execute and read and write
|
||
33C0000
|
unkown
|
page readonly
|
||
845000
|
heap
|
page read and write
|
||
5778000
|
trusted library allocation
|
page read and write
|
||
2351000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
unclassified section
|
page execute and read and write
|
||
C01A000
|
unkown
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
108A6000
|
system
|
page read and write
|
||
621E000
|
stack
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
661E000
|
stack
|
page read and write
|
||
1785000
|
trusted library allocation
|
page execute and read and write
|
||
A701000
|
unkown
|
page read and write
|
||
E19000
|
heap
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
AEEE000
|
stack
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
FD0000
|
unclassified section
|
page execute and read and write
|
||
CD0000
|
heap
|
page read and write
|
||
3281000
|
stack
|
page read and write
|
||
320C000
|
stack
|
page read and write
|
||
44AC000
|
trusted library allocation
|
page read and write
|
||
97F3000
|
unkown
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
2B5F000
|
heap
|
page read and write
|
||
481B000
|
trusted library allocation
|
page read and write
|
||
3020000
|
direct allocation
|
page execute and read and write
|
||
EEA3000
|
unkown
|
page read and write
|
||
C0A000
|
heap
|
page read and write
|
||
62FE000
|
stack
|
page read and write
|
||
55E000
|
stack
|
page read and write
|
||
2F9B000
|
trusted library allocation
|
page execute and read and write
|
||
279D000
|
stack
|
page read and write
|
||
60D0000
|
heap
|
page read and write
|
||
7399000
|
unkown
|
page read and write
|
||
3AAA000
|
heap
|
page read and write
|
||
7FF5DF280000
|
unkown
|
page readonly
|
||
2B31000
|
heap
|
page read and write
|
||
C4A3000
|
unkown
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
2940000
|
unclassified section
|
page execute and read and write
|
||
A0F7000
|
unkown
|
page read and write
|
||
4A80000
|
heap
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page execute and read and write
|
||
96F1000
|
unkown
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
BA76000
|
stack
|
page read and write
|
||
BFA5000
|
unkown
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
2BF4000
|
trusted library allocation
|
page read and write
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
5611000
|
trusted library allocation
|
page read and write
|
||
7FF5DF5F0000
|
unkown
|
page readonly
|
||
5120000
|
trusted library allocation
|
page execute and read and write
|
||
3DEA000
|
trusted library allocation
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
B120000
|
unkown
|
page readonly
|
||
B359000
|
stack
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
C159000
|
unkown
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
9E0000
|
unkown
|
page readonly
|
||
980000
|
unkown
|
page readonly
|
||
8DD000
|
stack
|
page read and write
|
||
7FF5DEF06000
|
unkown
|
page readonly
|
||
848E000
|
stack
|
page read and write
|
||
7FF5DF4F7000
|
unkown
|
page readonly
|
||
66B8000
|
heap
|
page read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
337D000
|
direct allocation
|
page execute and read and write
|
||
3374000
|
heap
|
page read and write
|
||
971A000
|
unkown
|
page read and write
|
||
4880000
|
unkown
|
page read and write
|
||
660F000
|
stack
|
page read and write
|
||
2FB4000
|
unclassified section
|
page execute and read and write
|
||
4990000
|
heap
|
page read and write
|
||
4B21000
|
trusted library allocation
|
page read and write
|
||
4C16000
|
trusted library allocation
|
page read and write
|
||
7FF5DF211000
|
unkown
|
page readonly
|
||
35E0000
|
heap
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
8661000
|
unkown
|
page read and write
|
||
7FF5DF4E7000
|
unkown
|
page readonly
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
7FF5DEFC2000
|
unkown
|
page readonly
|
||
2EC0000
|
unkown
|
page readonly
|
||
1040000
|
heap
|
page read and write
|
||
A6EA000
|
unkown
|
page read and write
|
||
1763000
|
trusted library allocation
|
page read and write
|
||
BF9F000
|
unkown
|
page read and write
|
||
5B0F000
|
stack
|
page read and write
|
||
670E000
|
stack
|
page read and write
|
||
7FF5DF045000
|
unkown
|
page readonly
|
||
11374000
|
system
|
page execute and read and write
|
||
7FF5DF038000
|
unkown
|
page readonly
|
||
10464000
|
system
|
page execute and read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
5204000
|
heap
|
page read and write
|
||
5A00000
|
trusted library allocation
|
page execute and read and write
|
||
C39F000
|
unkown
|
page read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
7FF5DF3E4000
|
unkown
|
page readonly
|
||
540000
|
heap
|
page read and write
|
||
C516000
|
unkown
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
4D42000
|
direct allocation
|
page execute and read and write
|
||
9F51000
|
unkown
|
page read and write
|
||
343C000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
28E6000
|
direct allocation
|
page execute and read and write
|
||
7DF4E6760000
|
unkown
|
page readonly
|
||
7FF5DEFBD000
|
unkown
|
page readonly
|
||
357E000
|
unkown
|
page read and write
|
||
A104000
|
unkown
|
page read and write
|
||
7FF5DF366000
|
unkown
|
page readonly
|
||
2FA6000
|
heap
|
page read and write
|
||
4CE0000
|
heap
|
page execute and read and write
|
||
33E0000
|
heap
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
2D5D000
|
stack
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
2C17000
|
trusted library allocation
|
page read and write
|
||
6E2000
|
trusted library allocation
|
page read and write
|
||
5960000
|
heap
|
page execute and read and write
|
||
3A7000
|
stack
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
2AC8000
|
trusted library allocation
|
page read and write
|
||
48C0000
|
trusted library allocation
|
page execute and read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
53DF000
|
stack
|
page read and write
|
||
7FF5DE9CB000
|
unkown
|
page readonly
|
||
7FF5DF3DF000
|
unkown
|
page readonly
|
||
2FD4000
|
heap
|
page read and write
|
||
A6EE000
|
unkown
|
page read and write
|
||
D12000
|
trusted library allocation
|
page read and write
|
||
73BA000
|
unkown
|
page read and write
|
||
73C3000
|
unkown
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
4FB9000
|
direct allocation
|
page execute and read and write
|
||
7FF5DF5E9000
|
unkown
|
page readonly
|
||
1370000
|
heap
|
page read and write
|
||
7A7000
|
stack
|
page read and write
|
||
C013000
|
unkown
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
32AE000
|
unkown
|
page read and write
|
||
4BF4000
|
trusted library allocation
|
page read and write
|
||
C34E000
|
unkown
|
page read and write
|
||
33F7000
|
trusted library allocation
|
page read and write
|
||
5D0E000
|
stack
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
171E000
|
stack
|
page read and write
|
||
7FF5DEE5A000
|
unkown
|
page readonly
|
||
7FF5DEFCB000
|
unkown
|
page readonly
|
||
5ECE000
|
stack
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page execute and read and write
|
||
EE84000
|
unkown
|
page read and write
|
||
3135000
|
heap
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
2AB1000
|
heap
|
page read and write
|
||
2281000
|
trusted library allocation
|
page read and write
|
||
A759000
|
unkown
|
page read and write
|
||
7FF5DF2CB000
|
unkown
|
page readonly
|
||
33AE000
|
unkown
|
page read and write
|
||
4800000
|
trusted library allocation
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
DE8000
|
trusted library allocation
|
page read and write
|
||
7FF5DF398000
|
unkown
|
page readonly
|
||
50CB000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
50C7000
|
heap
|
page read and write
|
||
B45A000
|
stack
|
page read and write
|
||
2D81000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
1770000
|
trusted library allocation
|
page read and write
|
||
C183000
|
unkown
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
6AE0000
|
heap
|
page read and write
|
||
39FA000
|
trusted library allocation
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
2B0C000
|
unclassified section
|
page execute and read and write
|
||
3270000
|
heap
|
page read and write
|
||
A690000
|
unkown
|
page read and write
|
||
28EC000
|
heap
|
page read and write
|
||
885E000
|
stack
|
page read and write
|
||
C516000
|
unkown
|
page read and write
|
||
2E0D000
|
direct allocation
|
page execute and read and write
|
||
2940000
|
heap
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
2981000
|
heap
|
page read and write
|
||
66CE000
|
stack
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
10228000
|
system
|
page execute and read and write
|
||
6115000
|
heap
|
page read and write
|
||
5940000
|
trusted library allocation
|
page read and write
|
||
5B4E000
|
stack
|
page read and write
|
||
8400000
|
heap
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page execute and read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
3166000
|
trusted library allocation
|
page read and write
|
||
B2DC000
|
stack
|
page read and write
|
||
B1C0000
|
unkown
|
page readonly
|
||
28C7000
|
direct allocation
|
page execute and read and write
|
||
328F000
|
heap
|
page read and write
|
||
8E0000
|
trusted library allocation
|
page read and write
|
||
7FF5DF567000
|
unkown
|
page readonly
|
||
52C3000
|
unkown
|
page read and write
|
||
128D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF2CB000
|
unkown
|
page readonly
|
||
4E15000
|
trusted library allocation
|
page read and write
|
||
7870000
|
unkown
|
page read and write
|
||
8A36000
|
unkown
|
page read and write
|
||
5694000
|
trusted library allocation
|
page read and write
|
||
2B35000
|
heap
|
page read and write
|
||
6D1C000
|
stack
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
231C000
|
stack
|
page read and write
|
||
325F000
|
stack
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
284F000
|
unkown
|
page read and write
|
||
297C000
|
stack
|
page read and write
|
||
315D000
|
stack
|
page read and write
|
||
294E000
|
unkown
|
page read and write
|
||
C24C000
|
unkown
|
page read and write
|
||
5D0D000
|
stack
|
page read and write
|
||
A2D000
|
stack
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
6910000
|
heap
|
page read and write
|
||
BF98000
|
unkown
|
page read and write
|
||
60CE000
|
stack
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
B7C000
|
stack
|
page read and write
|
||
4737000
|
heap
|
page read and write
|
||
6B4000
|
trusted library allocation
|
page read and write
|
||
D27000
|
trusted library allocation
|
page execute and read and write
|
||
5FCE000
|
stack
|
page read and write
|
||
812000
|
trusted library allocation
|
page read and write
|
||
7F0D0000
|
trusted library allocation
|
page execute and read and write
|
||
2F86000
|
trusted library allocation
|
page execute and read and write
|
||
4A17000
|
heap
|
page read and write
|
||
7FF5DF58A000
|
unkown
|
page readonly
|
||
78E000
|
stack
|
page read and write
|
||
A74C000
|
unkown
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
1113000
|
trusted library allocation
|
page execute and read and write
|
||
739E000
|
stack
|
page read and write
|
||
140C000
|
heap
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
74F1000
|
unkown
|
page read and write
|
||
13C5000
|
heap
|
page read and write
|
||
7DF4E6781000
|
unkown
|
page execute read
|
||
97B8000
|
unkown
|
page read and write
|
||
7F280000
|
trusted library allocation
|
page execute and read and write
|
||
3005000
|
unclassified section
|
page execute and read and write
|
||
21B8000
|
trusted library allocation
|
page read and write
|
||
53E1000
|
heap
|
page read and write
|
||
A6CF000
|
unkown
|
page read and write
|
||
987C000
|
unkown
|
page read and write
|
||
220000
|
system
|
page execute and read and write
|
||
74F1000
|
unkown
|
page read and write
|
||
148B000
|
unclassified section
|
page execute and read and write
|
||
7FF5DF571000
|
unkown
|
page readonly
|
||
EE7E000
|
unkown
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
B09E000
|
stack
|
page read and write
|
||
4508000
|
heap
|
page read and write
|
||
738E000
|
unkown
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
7FF5DE5CC000
|
unkown
|
page readonly
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
7B60000
|
unkown
|
page readonly
|
||
12B7000
|
heap
|
page read and write
|
||
A6F1000
|
unkown
|
page read and write
|
||
2FCD000
|
stack
|
page read and write
|
||
5E8E000
|
stack
|
page read and write
|
||
A758000
|
unkown
|
page read and write
|
||
C2E4000
|
unkown
|
page read and write
|
||
11BB2000
|
system
|
page execute and read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
30F1000
|
direct allocation
|
page execute and read and write
|
||
2C50000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
3351000
|
trusted library allocation
|
page read and write
|
||
118D000
|
trusted library allocation
|
page execute and read and write
|
||
103C000
|
stack
|
page read and write
|
||
C3EA000
|
unkown
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
7FF5DEF84000
|
unkown
|
page readonly
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
26BB000
|
trusted library allocation
|
page read and write
|
||
2340000
|
heap
|
page execute and read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
973C000
|
unkown
|
page read and write
|
||
A0A7000
|
unkown
|
page read and write
|
||
C18A000
|
unkown
|
page read and write
|
||
7FF5DF3B5000
|
unkown
|
page readonly
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
C34E000
|
unkown
|
page read and write
|
||
2779000
|
trusted library allocation
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
2DA6000
|
direct allocation
|
page execute and read and write
|
||
7DF4E6761000
|
unkown
|
page execute read
|
||
37CF000
|
unkown
|
page read and write
|
||
4836000
|
trusted library allocation
|
page read and write
|
||
64CD000
|
stack
|
page read and write
|
||
3022000
|
direct allocation
|
page execute and read and write
|
||
7FF5DF4BD000
|
unkown
|
page readonly
|
||
620E000
|
stack
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
9F10000
|
unkown
|
page read and write
|
||
B09E000
|
stack
|
page read and write
|
||
349C000
|
trusted library allocation
|
page read and write
|
||
7AF000
|
stack
|
page read and write
|
||
7FF5DF0C3000
|
unkown
|
page readonly
|
||
3375000
|
unkown
|
page read and write
|
||
60CE000
|
stack
|
page read and write
|
||
C1CC000
|
unkown
|
page read and write
|
||
63EE000
|
stack
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page execute and read and write
|
||
5408000
|
heap
|
page read and write
|
||
AFD000
|
trusted library allocation
|
page execute and read and write
|
||
2EA1000
|
direct allocation
|
page execute and read and write
|
||
1337000
|
stack
|
page read and write
|
||
5204000
|
heap
|
page read and write
|
||
275D000
|
stack
|
page read and write
|
||
326E000
|
unkown
|
page read and write
|
||
50FD000
|
heap
|
page read and write
|
||
55AD000
|
stack
|
page read and write
|
||
4C80000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
2DE2000
|
direct allocation
|
page execute and read and write
|
||
BFC3000
|
unkown
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
B589000
|
stack
|
page read and write
|
||
7FF5DF47E000
|
unkown
|
page readonly
|
||
12F7000
|
stack
|
page read and write
|
||
47B6000
|
unkown
|
page read and write
|
||
C087000
|
unkown
|
page read and write
|
||
35D0000
|
heap
|
page read and write
|
||
A6EA000
|
unkown
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
3118000
|
trusted library allocation
|
page read and write
|
||
6C3000
|
trusted library allocation
|
page read and write
|
||
7FF5DF5B5000
|
unkown
|
page readonly
|
||
BF6D000
|
unkown
|
page read and write
|
||
7FF5DF392000
|
unkown
|
page readonly
|
||
2CCF000
|
heap
|
page read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
32E5000
|
heap
|
page read and write
|
||
2905000
|
heap
|
page read and write
|
||
3830000
|
heap
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
4E7C000
|
stack
|
page read and write
|
||
74D6000
|
unkown
|
page read and write
|
||
7FF5DF5FC000
|
unkown
|
page readonly
|
||
49A2000
|
heap
|
page read and write
|
||
C4EB000
|
unkown
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
50E0000
|
heap
|
page read and write
|
||
AC0D000
|
stack
|
page read and write
|
||
7D89000
|
stack
|
page read and write
|
||
1273000
|
trusted library allocation
|
page execute and read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
30A4000
|
trusted library allocation
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
5167000
|
heap
|
page read and write
|
||
7FF5DEE52000
|
unkown
|
page readonly
|
||
647E000
|
stack
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
5F8F000
|
stack
|
page read and write
|
||
5D57000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
1B7000
|
stack
|
page read and write
|
||
13B8000
|
heap
|
page read and write
|
||
7FF5DF2DA000
|
unkown
|
page readonly
|
||
51EE000
|
trusted library allocation
|
page read and write
|
||
83D0000
|
unkown
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
2FAD000
|
direct allocation
|
page execute and read and write
|
||
7FF5DF095000
|
unkown
|
page readonly
|
||
C159000
|
unkown
|
page read and write
|
||
2B5F000
|
heap
|
page read and write
|
||
C013000
|
unkown
|
page read and write
|
||
6930000
|
trusted library allocation
|
page read and write
|
||
7FF5DF443000
|
unkown
|
page readonly
|
||
3394000
|
unkown
|
page read and write
|
||
7FF5DF122000
|
unkown
|
page readonly
|
||
3631000
|
heap
|
page read and write
|
||
848E000
|
stack
|
page read and write
|
||
4311000
|
trusted library allocation
|
page read and write
|
||
7930000
|
unkown
|
page readonly
|
||
3D0A000
|
trusted library allocation
|
page read and write
|
||
3560000
|
direct allocation
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
341A000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page execute and read and write
|
||
C183000
|
unkown
|
page read and write
|
||
65A000
|
heap
|
page read and write
|
||
2D0C000
|
trusted library allocation
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
A08D000
|
unkown
|
page read and write
|
||
7FF5DEF84000
|
unkown
|
page readonly
|
||
AC0D000
|
stack
|
page read and write
|
||
E80000
|
system
|
page execute and read and write
|
||
2C11000
|
trusted library allocation
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
9489000
|
stack
|
page read and write
|
||
2BD4000
|
heap
|
page read and write
|
||
7FF5DF0C9000
|
unkown
|
page readonly
|
||
E3E000
|
stack
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
C35F000
|
unkown
|
page read and write
|
||
BF10000
|
unkown
|
page readonly
|
||
3403000
|
heap
|
page read and write
|
||
5783000
|
heap
|
page read and write
|
||
380F000
|
unkown
|
page read and write
|
||
B4DB000
|
stack
|
page read and write
|
||
C354000
|
unkown
|
page read and write
|
||
B60A000
|
stack
|
page read and write
|
||
51F7000
|
trusted library allocation
|
page read and write
|
||
5B20000
|
trusted library allocation
|
page read and write
|
||
548D000
|
trusted library allocation
|
page read and write
|
||
7FF5DF3C6000
|
unkown
|
page readonly
|
||
268F000
|
stack
|
page read and write
|
||
6920000
|
trusted library allocation
|
page execute and read and write
|
||
8F8000
|
trusted library allocation
|
page read and write
|
||
86C2000
|
heap
|
page read and write
|
||
95EE000
|
stack
|
page read and write
|
||
63EE000
|
stack
|
page read and write
|
||
396A000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
356C000
|
trusted library allocation
|
page read and write
|
||
4815000
|
trusted library allocation
|
page read and write
|
||
7FF5DF2E2000
|
unkown
|
page readonly
|
||
7FF5DF59E000
|
unkown
|
page readonly
|
||
98A1000
|
unkown
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page execute and read and write
|
||
47F1000
|
unkown
|
page read and write
|
||
47EC000
|
unkown
|
page read and write
|
||
1073B000
|
unkown
|
page execute and read and write
|
||
5204000
|
heap
|
page read and write
|
||
327E000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
58F5000
|
trusted library allocation
|
page read and write
|
||
3691000
|
heap
|
page read and write
|
||
7FF5DF396000
|
unkown
|
page readonly
|
||
2F34000
|
heap
|
page read and write
|
||
2E66000
|
direct allocation
|
page execute and read and write
|
||
7FF5DEFC2000
|
unkown
|
page readonly
|
||
313C000
|
stack
|
page read and write
|
||
2E7F000
|
unkown
|
page read and write
|
||
68CE000
|
stack
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
27F0000
|
unkown
|
page readonly
|
||
2F6C000
|
stack
|
page read and write
|
||
10046000
|
unkown
|
page read and write
|
||
AA000
|
stack
|
page read and write
|
||
6EDC000
|
stack
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
350C000
|
trusted library allocation
|
page read and write
|
||
DA6000
|
heap
|
page read and write
|
||
389A000
|
trusted library allocation
|
page read and write
|
||
8FB000
|
trusted library allocation
|
page read and write
|
||
2CAC000
|
trusted library allocation
|
page read and write
|
||
64D0000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
7FF5DF091000
|
unkown
|
page readonly
|
||
268D000
|
stack
|
page read and write
|
||
30C0000
|
unclassified section
|
page execute and read and write
|
||
237D000
|
stack
|
page read and write
|
||
5ED0000
|
heap
|
page read and write
|
||
51EB000
|
trusted library allocation
|
page read and write
|
||
9D1F000
|
stack
|
page read and write
|
||
7FF5DF5D6000
|
unkown
|
page readonly
|
||
4E09000
|
heap
|
page read and write
|
||
7FF5DF3A1000
|
unkown
|
page readonly
|
||
3910000
|
heap
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF3F5000
|
unkown
|
page readonly
|
||
7FF5DF3AA000
|
unkown
|
page readonly
|
||
2370000
|
heap
|
page read and write
|
||
7FF5DF0A2000
|
unkown
|
page readonly
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
35ED000
|
direct allocation
|
page execute and read and write
|
||
ADF000
|
stack
|
page read and write
|
||
34EA000
|
trusted library allocation
|
page read and write
|
||
C298000
|
unkown
|
page read and write
|
||
2B3E000
|
unkown
|
page read and write
|
||
971C000
|
unkown
|
page read and write
|
||
5F3F000
|
stack
|
page read and write
|
||
6758000
|
heap
|
page read and write
|
||
7FF5DF5F0000
|
unkown
|
page readonly
|
||
4BCD000
|
direct allocation
|
page execute and read and write
|
||
5A0E000
|
stack
|
page read and write
|
||
3720000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
7399000
|
unkown
|
page read and write
|
||
7FF5DF1FC000
|
unkown
|
page readonly
|
||
7FF5DF591000
|
unkown
|
page readonly
|
||
5A2F000
|
stack
|
page read and write
|
||
7502000
|
unkown
|
page read and write
|
||
50E1000
|
trusted library allocation
|
page read and write
|
||
3877000
|
trusted library allocation
|
page read and write
|
||
E5A000
|
heap
|
page read and write
|
||
FCC000
|
stack
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
7FF5DF41B000
|
unkown
|
page readonly
|
||
1440000
|
heap
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF398000
|
unkown
|
page readonly
|
||
336C000
|
unkown
|
page read and write
|
||
2B20000
|
heap
|
page execute and read and write
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
83D0000
|
unkown
|
page read and write
|
||
7FF5DF519000
|
unkown
|
page readonly
|
||
26F0000
|
heap
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
117C000
|
stack
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
7499000
|
unkown
|
page read and write
|
||
7FF5DF341000
|
unkown
|
page readonly
|
||
107C000
|
stack
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
AC6000
|
heap
|
page read and write
|
||
C19D000
|
unkown
|
page read and write
|
||
970C000
|
unkown
|
page read and write
|
||
7FF5DF3F5000
|
unkown
|
page readonly
|
||
C298000
|
unkown
|
page read and write
|
||
5AB0000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
BFA1000
|
unkown
|
page read and write
|
||
7FF5DF126000
|
unkown
|
page readonly
|
||
5214000
|
trusted library allocation
|
page read and write
|
||
46C1000
|
heap
|
page read and write
|
||
3210000
|
direct allocation
|
page read and write
|
||
C13D000
|
unkown
|
page read and write
|
||
B81B000
|
stack
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
479B000
|
unkown
|
page read and write
|
||
2E49000
|
direct allocation
|
page execute and read and write
|
||
83B0000
|
unkown
|
page readonly
|
||
3289000
|
heap
|
page read and write
|
||
58C000
|
stack
|
page read and write
|
||
104B000
|
unclassified section
|
page execute and read and write
|
||
7FF5DF0CC000
|
unkown
|
page readonly
|
||
9E9E000
|
stack
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
7F5000
|
heap
|
page read and write
|
||
7FF5DF53F000
|
unkown
|
page readonly
|
||
2955000
|
heap
|
page read and write
|
||
7FF5DE539000
|
unkown
|
page readonly
|
||
619D000
|
heap
|
page read and write
|
||
BFA7000
|
unkown
|
page read and write
|
||
A707000
|
unkown
|
page read and write
|
||
7FF5DF5FC000
|
unkown
|
page readonly
|
||
58E000
|
stack
|
page read and write
|
||
118A000
|
heap
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
165E000
|
stack
|
page read and write
|
||
7FF5DF551000
|
unkown
|
page readonly
|
||
2A20000
|
heap
|
page read and write
|
||
5235000
|
trusted library allocation
|
page read and write
|
||
2C54000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
7FF5DF284000
|
unkown
|
page readonly
|
||
2648000
|
trusted library allocation
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
442A000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
7FF5DF2DA000
|
unkown
|
page readonly
|
||
6E7000
|
trusted library allocation
|
page execute and read and write
|
||
EE74000
|
unkown
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
279D000
|
stack
|
page read and write
|
||
5CF7000
|
heap
|
page read and write
|
||
2C5E000
|
heap
|
page read and write
|
||
73AF000
|
unkown
|
page read and write
|
||
4DF4000
|
trusted library allocation
|
page read and write
|
||
C319000
|
unkown
|
page read and write
|
||
7FF5DF2ED000
|
unkown
|
page readonly
|
||
7C4000
|
heap
|
page read and write
|
||
28E6000
|
trusted library allocation
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
7FF5DF1CD000
|
unkown
|
page readonly
|
||
2F34000
|
heap
|
page read and write
|
||
668E000
|
stack
|
page read and write
|
||
4810000
|
trusted library allocation
|
page read and write
|
||
B4DB000
|
stack
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
6D8C000
|
stack
|
page read and write
|
||
2F40000
|
unclassified section
|
page execute and read and write
|
||
442000
|
unkown
|
page readonly
|
||
B9BF000
|
stack
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
B830000
|
unkown
|
page readonly
|
||
4810000
|
trusted library allocation
|
page read and write
|
||
2942000
|
heap
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
5263000
|
heap
|
page read and write
|
||
7FF5DF4E3000
|
unkown
|
page readonly
|
||
30A6000
|
direct allocation
|
page execute and read and write
|
||
D72000
|
heap
|
page read and write
|
||
88E0000
|
unkown
|
page read and write
|
||
7FF5DF57F000
|
unkown
|
page readonly
|
||
7FF5DEFF0000
|
unkown
|
page readonly
|
||
5BAE000
|
stack
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
11FA000
|
heap
|
page read and write
|
||
2B71000
|
direct allocation
|
page execute and read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
4C6C000
|
heap
|
page read and write
|
||
2DE0000
|
direct allocation
|
page read and write
|
||
5DEE000
|
stack
|
page read and write
|
||
38DC000
|
trusted library allocation
|
page read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
1460000
|
heap
|
page read and write
|
||
3046000
|
direct allocation
|
page execute and read and write
|
||
315E000
|
trusted library allocation
|
page read and write
|
||
314B000
|
heap
|
page read and write
|
||
2A50000
|
direct allocation
|
page execute and read and write
|
||
D50000
|
unkown
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
4CD1000
|
direct allocation
|
page execute and read and write
|
||
28E0000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
1292000
|
trusted library allocation
|
page read and write
|
||
11389000
|
system
|
page execute and read and write
|
||
8920000
|
unkown
|
page read and write
|
||
129A000
|
trusted library allocation
|
page execute and read and write
|
||
7DF5E896A000
|
unkown
|
page readonly
|
||
AF7E000
|
stack
|
page read and write
|
||
7FF5C0B6B000
|
unkown
|
page readonly
|
||
7F050000
|
trusted library allocation
|
page execute and read and write
|
||
D14000
|
heap
|
page read and write
|
||
C19D000
|
unkown
|
page read and write
|
||
BF84000
|
unkown
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page read and write
|
||
4C0B000
|
trusted library allocation
|
page read and write
|
||
7FF5DF3EA000
|
unkown
|
page readonly
|
||
6AD000
|
stack
|
page read and write
|
||
5468000
|
heap
|
page read and write
|
||
12AB000
|
trusted library allocation
|
page execute and read and write
|
||
D2B000
|
trusted library allocation
|
page execute and read and write
|
||
12EE000
|
stack
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page execute and read and write
|
||
2C54000
|
heap
|
page read and write
|
||
E798000
|
system
|
page execute and read and write
|
||
7FF5DF591000
|
unkown
|
page readonly
|
||
5650000
|
heap
|
page read and write
|
||
6A94000
|
heap
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
7FF5DF3F1000
|
unkown
|
page readonly
|
||
308D000
|
stack
|
page read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
169E000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
27BD000
|
stack
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
5C8F000
|
stack
|
page read and write
|
||
7FF5DF095000
|
unkown
|
page readonly
|
||
2D9A000
|
heap
|
page read and write
|
||
4599000
|
heap
|
page read and write
|
||
69EE000
|
stack
|
page read and write
|
||
50F8000
|
heap
|
page read and write
|
||
2C70000
|
direct allocation
|
page execute and read and write
|
||
C13D000
|
unkown
|
page read and write
|
||
100C4000
|
unkown
|
page read and write
|
||
12A2000
|
trusted library allocation
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
7FF5DE4F2000
|
unkown
|
page readonly
|
||
5CAE000
|
stack
|
page read and write
|
||
31AD000
|
unkown
|
page read and write
|
||
1191000
|
heap
|
page read and write
|
||
B830000
|
unkown
|
page readonly
|
||
EE88000
|
unkown
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
7FF5DF081000
|
unkown
|
page readonly
|
||
5110000
|
trusted library allocation
|
page execute and read and write
|
||
60E5000
|
heap
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
354F000
|
unkown
|
page read and write
|
||
6187000
|
heap
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
694E000
|
stack
|
page read and write
|
||
5687000
|
trusted library allocation
|
page read and write
|
||
4788000
|
unkown
|
page read and write
|
||
E800000
|
system
|
page execute and read and write
|
||
C140000
|
unkown
|
page read and write
|
||
179E000
|
stack
|
page read and write
|
||
86C0000
|
heap
|
page read and write
|
||
4F9D000
|
direct allocation
|
page execute and read and write
|
||
26C5000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
26A6000
|
trusted library allocation
|
page read and write
|
||
7940000
|
unkown
|
page readonly
|
||
88E0000
|
unkown
|
page read and write
|
||
7FF5DF36A000
|
unkown
|
page readonly
|
||
7FF5DF349000
|
unkown
|
page readonly
|
||
323E000
|
unkown
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
5FA2000
|
heap
|
page read and write
|
||
9380000
|
unkown
|
page readonly
|
||
3144000
|
trusted library allocation
|
page read and write
|
||
C3A8000
|
unkown
|
page read and write
|
||
3EBC000
|
trusted library allocation
|
page read and write
|
||
A0D000
|
trusted library allocation
|
page execute and read and write
|
||
27B1000
|
trusted library allocation
|
page read and write
|
||
7FF5DF12A000
|
unkown
|
page readonly
|
||
6B46000
|
heap
|
page read and write
|
||
7FF5DF425000
|
unkown
|
page readonly
|
||
5110000
|
unkown
|
page write copy
|
||
62CE000
|
stack
|
page read and write
|
||
B0A000
|
trusted library allocation
|
page execute and read and write
|
||
72E0000
|
trusted library allocation
|
page execute and read and write
|
||
57CF000
|
stack
|
page read and write
|
||
3371000
|
unkown
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
7FF5DF443000
|
unkown
|
page readonly
|
||
2928000
|
heap
|
page read and write
|
||
2AC6000
|
direct allocation
|
page execute and read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
5C5A000
|
heap
|
page read and write
|
||
502E000
|
direct allocation
|
page execute and read and write
|
||
44EC000
|
trusted library allocation
|
page read and write
|
||
7FF5DF18E000
|
unkown
|
page readonly
|
||
112D000
|
trusted library allocation
|
page execute and read and write
|
||
65CE000
|
stack
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
7FF5DF26F000
|
unkown
|
page readonly
|
||
56D5000
|
heap
|
page read and write
|
||
542C000
|
stack
|
page read and write
|
||
577000
|
heap
|
page read and write
|
||
AB7000
|
heap
|
page read and write
|
||
A09A000
|
unkown
|
page read and write
|
||
270000
|
system
|
page execute and read and write
|
||
99AB000
|
unkown
|
page read and write
|
||
4B2D000
|
trusted library allocation
|
page read and write
|
||
DBB000
|
heap
|
page read and write
|
||
A1D000
|
trusted library allocation
|
page execute and read and write
|
||
2A03000
|
heap
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
3290000
|
unkown
|
page readonly
|
||
901B000
|
stack
|
page read and write
|
||
73B2000
|
unkown
|
page read and write
|
||
684E000
|
stack
|
page read and write
|
||
8661000
|
unkown
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
372A000
|
trusted library allocation
|
page read and write
|
||
2FD2000
|
heap
|
page read and write
|
||
7A30000
|
unkown
|
page read and write
|
||
2FED000
|
stack
|
page read and write
|
||
44CC000
|
trusted library allocation
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
AB8D000
|
stack
|
page read and write
|
||
16EB000
|
unclassified section
|
page execute and read and write
|
||
329E000
|
stack
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
987C000
|
unkown
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
7FF5DF156000
|
unkown
|
page readonly
|
||
C516000
|
unkown
|
page read and write
|
||
763E000
|
stack
|
page read and write
|
||
B57000
|
heap
|
page read and write
|
||
C319000
|
unkown
|
page read and write
|
||
C1C4000
|
unkown
|
page read and write
|
||
2EB0000
|
unclassified section
|
page execute and read and write
|
||
7FF5DF5AE000
|
unkown
|
page readonly
|
||
7F5E0000
|
trusted library allocation
|
page execute and read and write
|
||
91D000
|
stack
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
5CA3000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
7FF5DF284000
|
unkown
|
page readonly
|
||
5A6E000
|
stack
|
page read and write
|
||
725C000
|
stack
|
page read and write
|
||
9F3E000
|
unkown
|
page read and write
|
||
32EA000
|
trusted library allocation
|
page read and write
|
||
5210000
|
heap
|
page execute and read and write
|
||
7FF5DEFE8000
|
unkown
|
page readonly
|
||
5AFD000
|
stack
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
2EC6000
|
direct allocation
|
page execute and read and write
|
||
482B000
|
trusted library allocation
|
page read and write
|
||
5951000
|
trusted library allocation
|
page read and write
|
||
7FF5DE5CC000
|
unkown
|
page readonly
|
||
327D000
|
stack
|
page read and write
|
||
577D000
|
stack
|
page read and write
|
||
7FF5DF380000
|
unkown
|
page readonly
|
||
33DE000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
A03000
|
trusted library allocation
|
page execute and read and write
|
||
AB8D000
|
stack
|
page read and write
|
||
16D0000
|
unclassified section
|
page execute and read and write
|
||
A0A5000
|
unkown
|
page read and write
|
||
293E000
|
unkown
|
page read and write
|
||
2D5D000
|
stack
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
2E50000
|
unkown
|
page readonly
|
||
DBE000
|
heap
|
page read and write
|
||
23BE000
|
unkown
|
page read and write
|
||
2885000
|
unclassified section
|
page execute and read and write
|
||
114B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF452000
|
unkown
|
page readonly
|
||
521E000
|
stack
|
page read and write
|
||
C40C000
|
unkown
|
page read and write
|
||
446C000
|
trusted library allocation
|
page read and write
|
||
973000
|
system
|
page readonly
|
||
6CBE000
|
stack
|
page read and write
|
||
57BE000
|
stack
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
361F000
|
heap
|
page read and write
|
||
DBA000
|
heap
|
page read and write
|
||
4E0B000
|
trusted library allocation
|
page read and write
|
||
12A5000
|
trusted library allocation
|
page execute and read and write
|
||
438B000
|
stack
|
page read and write
|
||
7FF5C0B6B000
|
unkown
|
page readonly
|
||
7FF5DF2E5000
|
unkown
|
page readonly
|
||
2B86000
|
direct allocation
|
page execute and read and write
|
||
1720000
|
unclassified section
|
page execute and read and write
|
||
FB0000
|
heap
|
page read and write
|
||
4B43000
|
heap
|
page read and write
|
||
58DF000
|
stack
|
page read and write
|
||
2298000
|
trusted library allocation
|
page read and write
|
||
2ADF000
|
stack
|
page read and write
|
||
2DC0000
|
unkown
|
page read and write
|
||
7DF5E895F000
|
unkown
|
page readonly
|
||
8FC000
|
stack
|
page read and write
|
||
7FF5DF280000
|
unkown
|
page readonly
|
||
96F5000
|
unkown
|
page read and write
|
||
66D000
|
stack
|
page read and write
|
||
9F74000
|
unkown
|
page read and write
|
||
293D000
|
heap
|
page read and write
|
||
4750000
|
unkown
|
page read and write
|
||
2E5C000
|
stack
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
3507000
|
unclassified section
|
page execute and read and write
|
||
6C4F000
|
stack
|
page read and write
|
||
5130000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
4E17000
|
trusted library allocation
|
page read and write
|
||
1114000
|
trusted library allocation
|
page read and write
|
||
7991000
|
unkown
|
page read and write
|
||
7930000
|
unkown
|
page readonly
|
||
B9E0000
|
unkown
|
page read and write
|
||
940C000
|
stack
|
page read and write
|
||
28E1000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
142E000
|
heap
|
page read and write
|
||
320D000
|
unkown
|
page read and write
|
||
28F2000
|
trusted library allocation
|
page read and write
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
7FF5DF01B000
|
unkown
|
page readonly
|
||
7FF5DF169000
|
unkown
|
page readonly
|
||
1195000
|
heap
|
page read and write
|
||
9FA0000
|
unkown
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
EE40000
|
unkown
|
page read and write
|
||
4750000
|
unkown
|
page read and write
|
||
688E000
|
stack
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
7BC000
|
stack
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
A106000
|
unkown
|
page read and write
|
||
3668000
|
direct allocation
|
page execute and read and write
|
||
3364000
|
unkown
|
page read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
C3BD000
|
unkown
|
page read and write
|
||
2D46000
|
direct allocation
|
page execute and read and write
|
||
2C60000
|
heap
|
page read and write
|
||
47D0000
|
trusted library allocation
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
66D9000
|
heap
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
EE72000
|
unkown
|
page read and write
|
||
63CE000
|
stack
|
page read and write
|
||
83B0000
|
unkown
|
page readonly
|
||
9095000
|
stack
|
page read and write
|
||
78D000
|
stack
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
C3BE000
|
unkown
|
page read and write
|
||
28AB000
|
stack
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3373000
|
unkown
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
4802000
|
trusted library allocation
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
5F8E000
|
stack
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
7FF5DEFE2000
|
unkown
|
page readonly
|
||
C13A000
|
unkown
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
336F000
|
unkown
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
4487000
|
trusted library allocation
|
page read and write
|
||
7FF5DF366000
|
unkown
|
page readonly
|
||
5910000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
2946000
|
direct allocation
|
page execute and read and write
|
||
BF9D000
|
unkown
|
page read and write
|
||
7FF5DF53F000
|
unkown
|
page readonly
|
||
4E19000
|
direct allocation
|
page execute and read and write
|
||
F07000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
B15000
|
trusted library allocation
|
page execute and read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
5762000
|
trusted library allocation
|
page read and write
|
||
C474000
|
unkown
|
page read and write
|
||
15C3000
|
trusted library allocation
|
page execute and read and write
|
||
4828000
|
unkown
|
page read and write
|
||
329C000
|
trusted library allocation
|
page read and write
|
||
B259000
|
stack
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
7FF5DE531000
|
unkown
|
page readonly
|
||
3E5C000
|
trusted library allocation
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
99AB000
|
unkown
|
page read and write
|
||
393F000
|
heap
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
7FF5DEFDD000
|
unkown
|
page readonly
|
||
A09A000
|
unkown
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
455A000
|
trusted library allocation
|
page read and write
|
||
7FF5DF195000
|
unkown
|
page readonly
|
||
9F74000
|
unkown
|
page read and write
|
||
43FA000
|
trusted library allocation
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
D0D000
|
trusted library allocation
|
page execute and read and write
|
||
C298000
|
unkown
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
2D65000
|
trusted library allocation
|
page read and write
|
||
EE7D000
|
unkown
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
2B1E000
|
unkown
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
7FF5DF310000
|
unkown
|
page readonly
|
||
5CFB000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
739B000
|
unkown
|
page read and write
|
||
3376000
|
direct allocation
|
page execute and read and write
|
||
7380000
|
unkown
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
59EC000
|
heap
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
2C55000
|
trusted library allocation
|
page read and write
|
||
7FF5DF2ED000
|
unkown
|
page readonly
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
7FF5DF08F000
|
unkown
|
page readonly
|
||
3E7C000
|
trusted library allocation
|
page read and write
|
||
3F3C000
|
trusted library allocation
|
page read and write
|
||
113A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF421000
|
unkown
|
page readonly
|
||
C192000
|
unkown
|
page read and write
|
||
C39F000
|
unkown
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
901B000
|
stack
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
140E000
|
heap
|
page read and write
|
||
7FF5DF067000
|
unkown
|
page readonly
|
||
30BF000
|
stack
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
C1C4000
|
unkown
|
page read and write
|
||
228C000
|
trusted library allocation
|
page read and write
|
||
7FF5DF452000
|
unkown
|
page readonly
|
||
8EA9000
|
stack
|
page read and write
|
||
AEF000
|
stack
|
page read and write
|
||
2701000
|
trusted library allocation
|
page read and write
|
||
7FF5DF5A8000
|
unkown
|
page readonly
|
||
568B000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
unkown
|
page read and write
|
||
6BF000
|
heap
|
page read and write
|
||
EFC000
|
stack
|
page read and write
|
||
9489000
|
stack
|
page read and write
|
||
7FF5DF5BE000
|
unkown
|
page readonly
|
||
6C7000
|
heap
|
page read and write
|
||
314B000
|
heap
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page execute and read and write
|
||
9729000
|
unkown
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
35DC000
|
heap
|
page read and write
|
||
63CE000
|
stack
|
page read and write
|
||
11CB000
|
heap
|
page read and write
|
||
97F3000
|
unkown
|
page read and write
|
||
2E6F000
|
unkown
|
page read and write
|
||
7FF5DF0F1000
|
unkown
|
page readonly
|
||
4AAB000
|
stack
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
624C000
|
stack
|
page read and write
|
||
5E3E000
|
stack
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
7FF5DF310000
|
unkown
|
page readonly
|
||
2FE3000
|
heap
|
page read and write
|
||
72F0000
|
trusted library allocation
|
page read and write
|
||
98AD000
|
unkown
|
page read and write
|
||
73B6000
|
unkown
|
page read and write
|
||
7FF5DEF4B000
|
unkown
|
page readonly
|
||
B010000
|
unkown
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
2ACE000
|
trusted library allocation
|
page read and write
|
||
7FF5DF435000
|
unkown
|
page readonly
|
||
29E3000
|
direct allocation
|
page execute and read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
7FF5DF396000
|
unkown
|
page readonly
|
||
3280000
|
heap
|
page read and write
|
||
2EFF000
|
unkown
|
page read and write
|
||
259A000
|
trusted library allocation
|
page read and write
|
||
A04000
|
trusted library allocation
|
page read and write
|
||
A37000
|
trusted library allocation
|
page execute and read and write
|
||
ADC0000
|
unkown
|
page readonly
|
||
32AE000
|
stack
|
page read and write
|
||
86CA000
|
heap
|
page read and write
|
||
2BDF000
|
unkown
|
page read and write
|
||
48AC000
|
stack
|
page read and write
|
||
8E6000
|
trusted library allocation
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
2690000
|
unclassified section
|
page execute and read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
CF4000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
2911000
|
trusted library allocation
|
page read and write
|
||
5823000
|
heap
|
page read and write
|
||
53E0000
|
heap
|
page read and write
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
52D9000
|
unkown
|
page read and write
|
||
161E000
|
stack
|
page read and write
|
||
EA30000
|
unkown
|
page execute and read and write
|
||
3F9C000
|
trusted library allocation
|
page read and write
|
||
9704000
|
unkown
|
page read and write
|
||
CB1000
|
heap
|
page read and write
|
||
C4D8000
|
unkown
|
page read and write
|
||
5660000
|
trusted library allocation
|
page execute and read and write
|
||
2F63000
|
direct allocation
|
page execute and read and write
|
||
DC0000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
6C8C000
|
stack
|
page read and write
|
||
7FF5DF211000
|
unkown
|
page readonly
|
||
710000
|
trusted library allocation
|
page execute and read and write
|
||
E6F000
|
heap
|
page read and write
|
||
7FF5DF0C1000
|
unkown
|
page readonly
|
||
9F78000
|
unkown
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
5150000
|
heap
|
page execute and read and write
|
||
3291000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page execute and read and write
|
||
D3E000
|
heap
|
page read and write
|
||
B589000
|
stack
|
page read and write
|
||
98A7000
|
unkown
|
page read and write
|
||
4855000
|
unkown
|
page read and write
|
||
2327000
|
trusted library allocation
|
page read and write
|
||
3143000
|
direct allocation
|
page execute and read and write
|
||
E70000
|
unkown
|
page readonly
|
||
5260000
|
heap
|
page read and write
|
||
C1A9000
|
unkown
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
22C2000
|
trusted library allocation
|
page read and write
|
||
279000
|
system
|
page execute and read and write
|
||
2B3F000
|
heap
|
page read and write
|
||
81C000
|
heap
|
page read and write
|
||
907000
|
heap
|
page read and write
|
||
68F000
|
stack
|
page read and write
|
||
95F0000
|
unkown
|
page read and write
|
||
7FF5DF3E4000
|
unkown
|
page readonly
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
AB0D000
|
stack
|
page read and write
|
||
444C000
|
trusted library allocation
|
page read and write
|
||
7FF5DEFA6000
|
unkown
|
page readonly
|
||
5363000
|
heap
|
page read and write
|
||
E8C2000
|
system
|
page execute and read and write
|
||
4C20000
|
trusted library allocation
|
page execute and read and write
|
||
1380000
|
unclassified section
|
page execute and read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
1004B000
|
unkown
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
6690000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
278D000
|
stack
|
page read and write
|
||
5AF000
|
stack
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
58DF000
|
trusted library allocation
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
4DAD000
|
stack
|
page read and write
|
||
437C000
|
stack
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
5F0E000
|
stack
|
page read and write
|
||
C24C000
|
unkown
|
page read and write
|
||
5204000
|
heap
|
page read and write
|
||
7FF5DF06F000
|
unkown
|
page readonly
|
||
11A0000
|
heap
|
page read and write
|
||
86C0000
|
heap
|
page read and write
|
||
700000
|
trusted library allocation
|
page read and write
|
||
22EC000
|
trusted library allocation
|
page read and write
|
||
8590000
|
unkown
|
page readonly
|
||
7FF5DEFAF000
|
unkown
|
page readonly
|
||
BFAF000
|
unkown
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
4E5A000
|
heap
|
page read and write
|
||
C003000
|
unkown
|
page read and write
|
||
5210000
|
trusted library allocation
|
page execute and read and write
|
||
2DBD000
|
stack
|
page read and write
|
||
5C3E000
|
stack
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
B9F0000
|
unkown
|
page read and write
|
||
4A95000
|
trusted library allocation
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
10F8F000
|
system
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
2C9A000
|
stack
|
page read and write
|
||
2CDF000
|
stack
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
590D000
|
stack
|
page read and write
|
||
7DF4E67A1000
|
unkown
|
page execute read
|
||
4788000
|
unkown
|
page read and write
|
||
4E8E000
|
direct allocation
|
page execute and read and write
|
||
1004B000
|
unkown
|
page read and write
|
||
28D3000
|
heap
|
page read and write
|
||
5A0E000
|
stack
|
page read and write
|
||
A2A000
|
trusted library allocation
|
page execute and read and write
|
||
A0FC000
|
unkown
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
3B2C000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
direct allocation
|
page execute and read and write
|
||
9716000
|
unkown
|
page read and write
|
||
578A000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
50FD000
|
heap
|
page read and write
|
||
425000
|
heap
|
page read and write
|
||
497D000
|
heap
|
page read and write
|
||
7FF5DEFF8000
|
unkown
|
page readonly
|
||
5228000
|
trusted library allocation
|
page read and write
|
||
2DF9000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
268D000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
trusted library allocation
|
page read and write
|
||
658F000
|
stack
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page execute and read and write
|
||
31D9000
|
direct allocation
|
page execute and read and write
|
||
83F000
|
heap
|
page read and write
|
||
FE0000
|
unkown
|
page read and write
|
||
5F0F000
|
heap
|
page read and write
|
||
6E5000
|
trusted library allocation
|
page execute and read and write
|
||
3284000
|
heap
|
page read and write
|
||
50FD000
|
heap
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
AC9000
|
heap
|
page read and write
|
||
32EC000
|
stack
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
7FF5DF341000
|
unkown
|
page readonly
|
||
C35C000
|
unkown
|
page read and write
|
||
BF8C000
|
unkown
|
page read and write
|
||
7E3000
|
trusted library allocation
|
page execute and read and write
|
||
9B99000
|
stack
|
page read and write
|
||
2E40000
|
direct allocation
|
page execute and read and write
|
||
48A0000
|
unkown
|
page read and write
|
||
2937000
|
heap
|
page read and write
|
||
2942000
|
heap
|
page read and write
|
||
9F27000
|
unkown
|
page read and write
|
||
BFA5000
|
unkown
|
page read and write
|
||
6D5E000
|
stack
|
page read and write
|
||
114F7000
|
system
|
page execute and read and write
|
||
48B0000
|
unkown
|
page read and write
|
||
7C89000
|
stack
|
page read and write
|
||
A6FE000
|
unkown
|
page read and write
|
||
47EB000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
96ED000
|
unkown
|
page read and write
|
||
4900000
|
heap
|
page read and write
|
||
E80000
|
system
|
page execute and read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
515D000
|
direct allocation
|
page execute and read and write
|
||
1142000
|
trusted library allocation
|
page read and write
|
||
4D6D000
|
direct allocation
|
page execute and read and write
|
||
ADAB000
|
stack
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
E63000
|
heap
|
page read and write
|
||
C23D000
|
unkown
|
page read and write
|
||
5416000
|
heap
|
page read and write
|
||
17A0000
|
trusted library allocation
|
page read and write
|
||
874C000
|
stack
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
3F0A000
|
trusted library allocation
|
page read and write
|
||
914B000
|
stack
|
page read and write
|
||
2982000
|
direct allocation
|
page execute and read and write
|
||
4ABC000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
5B6E000
|
stack
|
page read and write
|
||
7230000
|
unkown
|
page read and write
|
||
5204000
|
heap
|
page read and write
|
||
7DF5E896A000
|
unkown
|
page readonly
|
||
30B0000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
42FA000
|
trusted library allocation
|
page read and write
|
||
E5D000
|
heap
|
page read and write
|
||
363F000
|
heap
|
page read and write
|
||
33BA000
|
trusted library allocation
|
page read and write
|
||
7FF5DF425000
|
unkown
|
page readonly
|
||
48B0000
|
unkown
|
page read and write
|
||
828000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
7FF5DEF90000
|
unkown
|
page readonly
|
||
2A9C000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page execute and read and write
|
||
7FF5DF62C000
|
unkown
|
page readonly
|
||
301F000
|
stack
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
C523000
|
unkown
|
page read and write
|
||
48D0000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
9F7C000
|
unkown
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
C354000
|
unkown
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
7FF5DF0A5000
|
unkown
|
page readonly
|
||
7FF5DF169000
|
unkown
|
page readonly
|
||
7FF5DF3C6000
|
unkown
|
page readonly
|
||
9C1D000
|
stack
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
A35000
|
trusted library allocation
|
page execute and read and write
|
||
23E0000
|
heap
|
page read and write
|
||
B1B000
|
trusted library allocation
|
page execute and read and write
|
||
2664000
|
trusted library allocation
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
BF7E000
|
unkown
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page execute and read and write
|
||
2C54000
|
heap
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page execute and read and write
|
||
7EF20000
|
trusted library allocation
|
page execute and read and write
|
||
8910000
|
unkown
|
page read and write
|
||
9F23000
|
unkown
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
56FA000
|
heap
|
page read and write
|
||
6350000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
C149000
|
unkown
|
page read and write
|
||
1136000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF08B000
|
unkown
|
page readonly
|
||
7FF5DF361000
|
unkown
|
page readonly
|
||
4CE0000
|
trusted library allocation
|
page execute and read and write
|
||
13C0000
|
heap
|
page read and write
|
||
7FF5DF20A000
|
unkown
|
page readonly
|
||
7D0D000
|
stack
|
page read and write
|
||
336D000
|
stack
|
page read and write
|
||
7FF5DF519000
|
unkown
|
page readonly
|
||
6DF7000
|
trusted library allocation
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
7FF5DF429000
|
unkown
|
page readonly
|
||
BF8C000
|
unkown
|
page read and write
|
||
17B0000
|
trusted library allocation
|
page execute and read and write
|
||
E0E000
|
stack
|
page read and write
|
||
711B000
|
stack
|
page read and write
|
||
4803000
|
heap
|
page read and write
|
||
37EA000
|
trusted library allocation
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
293B000
|
heap
|
page read and write
|
||
4AF0000
|
heap
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
28C2000
|
direct allocation
|
page execute and read and write
|
||
36F0000
|
heap
|
page read and write
|
||
517F000
|
unclassified section
|
page read and write
|
||
47B6000
|
unkown
|
page read and write
|
||
44DA000
|
trusted library allocation
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
C23D000
|
unkown
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
4A82000
|
direct allocation
|
page execute and read and write
|
||
A072000
|
unkown
|
page read and write
|
||
28A0000
|
unkown
|
page readonly
|
||
358E000
|
stack
|
page read and write
|
||
7FF5DF09B000
|
unkown
|
page readonly
|
||
2F34000
|
heap
|
page read and write
|
||
815000
|
trusted library allocation
|
page execute and read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
28DF000
|
stack
|
page read and write
|
||
98A1000
|
unkown
|
page read and write
|
||
2681000
|
trusted library allocation
|
page read and write
|
||
283D000
|
stack
|
page read and write
|
||
355F000
|
heap
|
page read and write
|
||
99AB000
|
unkown
|
page read and write
|
||
5BC2000
|
direct allocation
|
page execute and read and write
|
||
C24C000
|
unkown
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
5684000
|
trusted library allocation
|
page read and write
|
||
C18A000
|
unkown
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
7FF5DF488000
|
unkown
|
page readonly
|
||
30A6000
|
trusted library allocation
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
391C000
|
trusted library allocation
|
page read and write
|
||
5A0F000
|
heap
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
C192000
|
unkown
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
2C9A000
|
stack
|
page read and write
|
||
352C000
|
trusted library allocation
|
page read and write
|
||
77F0000
|
unkown
|
page read and write
|
||
7FF5DF4A6000
|
unkown
|
page readonly
|
||
7FF5DF3DF000
|
unkown
|
page readonly
|
||
610000
|
heap
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
3400000
|
unclassified section
|
page execute and read and write
|
||
3172000
|
direct allocation
|
page execute and read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page execute and read and write
|
||
5650000
|
trusted library allocation
|
page execute and read and write
|
||
BFA3000
|
unkown
|
page read and write
|
||
6DA000
|
trusted library allocation
|
page execute and read and write
|
||
A3B000
|
trusted library allocation
|
page execute and read and write
|
||
4850000
|
trusted library allocation
|
page read and write
|
||
5204000
|
heap
|
page read and write
|
||
ED000
|
stack
|
page read and write
|
||
806000
|
trusted library allocation
|
page execute and read and write
|
||
9D9F000
|
stack
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
AE4000
|
trusted library allocation
|
page read and write
|
||
1A7000
|
stack
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
5DCF000
|
stack
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
7FF5DE535000
|
unkown
|
page readonly
|
||
BC0000
|
heap
|
page read and write
|
||
4880000
|
unkown
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
68FC000
|
stack
|
page read and write
|
||
3690000
|
heap
|
page read and write
|
||
9F51000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
281D000
|
trusted library allocation
|
page execute and read and write
|
||
630F000
|
stack
|
page read and write
|
||
C192000
|
unkown
|
page read and write
|
||
5577000
|
trusted library allocation
|
page read and write
|
||
2D63000
|
unkown
|
page read and write
|
||
BFAF000
|
unkown
|
page read and write
|
||
2A21000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
6E97000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
7FF5DF08B000
|
unkown
|
page readonly
|
||
3770000
|
heap
|
page read and write
|
||
9A6C000
|
stack
|
page read and write
|
||
5CCE000
|
stack
|
page read and write
|
||
7FF5DF16B000
|
unkown
|
page readonly
|
||
8400000
|
heap
|
page read and write
|
||
7FF5DF089000
|
unkown
|
page readonly
|
||
259F000
|
stack
|
page read and write
|
||
4AA0000
|
heap
|
page execute and read and write
|
||
56D8000
|
heap
|
page read and write
|
||
2F10000
|
unkown
|
page read and write
|
||
23D0000
|
direct allocation
|
page read and write
|
||
696E000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
667C000
|
stack
|
page read and write
|
||
4E7A000
|
heap
|
page read and write
|
||
73E5000
|
unkown
|
page read and write
|
||
7FF5DF537000
|
unkown
|
page readonly
|
||
3374000
|
heap
|
page read and write
|
||
314B000
|
heap
|
page read and write
|
||
6B3000
|
trusted library allocation
|
page execute and read and write
|
||
C187000
|
unkown
|
page read and write
|
||
2F73000
|
trusted library allocation
|
page read and write
|
||
72CC000
|
stack
|
page read and write
|
||
4550000
|
trusted library allocation
|
page execute and read and write
|
||
4AA0000
|
trusted library allocation
|
page execute and read and write
|
||
2870000
|
unkown
|
page read and write
|
||
2648000
|
unclassified section
|
page execute and read and write
|
||
5770000
|
trusted library allocation
|
page execute and read and write
|
||
307F000
|
stack
|
page read and write
|
||
2981000
|
heap
|
page read and write
|
||
1780000
|
trusted library allocation
|
page read and write
|
||
7FF5DF5F6000
|
unkown
|
page readonly
|
||
D03000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
5529000
|
heap
|
page read and write
|
||
607E000
|
stack
|
page read and write
|
||
81B000
|
trusted library allocation
|
page execute and read and write
|
||
4E40000
|
heap
|
page read and write
|
||
2E6D000
|
stack
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
44FA000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
heap
|
page execute and read and write
|
||
AE6F000
|
stack
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
6AC000
|
stack
|
page read and write
|
||
45F0000
|
trusted library allocation
|
page execute and read and write
|
||
2EFC000
|
stack
|
page read and write
|
||
31EB000
|
stack
|
page read and write
|
||
3289000
|
heap
|
page read and write
|
||
2FD1000
|
direct allocation
|
page execute and read and write
|
||
5CBD000
|
stack
|
page read and write
|
||
BFCE000
|
unkown
|
page read and write
|
||
5110000
|
unkown
|
page write copy
|
||
324F000
|
stack
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
457A000
|
trusted library allocation
|
page read and write
|
||
A0B1000
|
unkown
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
638E000
|
stack
|
page read and write
|
||
BA76000
|
stack
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
7300000
|
heap
|
page read and write
|
||
50F4000
|
heap
|
page read and write
|
||
3050000
|
direct allocation
|
page read and write
|
||
46C6000
|
heap
|
page read and write
|
||
3E17000
|
trusted library allocation
|
page read and write
|
||
3B7A000
|
trusted library allocation
|
page read and write
|
||
7FF5DF584000
|
unkown
|
page readonly
|
||
3375000
|
unkown
|
page read and write
|
||
2BA0000
|
heap
|
page execute and read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
2D8D000
|
stack
|
page read and write
|
||
5103000
|
heap
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
5802000
|
trusted library allocation
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page read and write
|
||
4FED000
|
stack
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
3D8A000
|
trusted library allocation
|
page read and write
|
||
5204000
|
heap
|
page read and write
|
||
4C91000
|
trusted library allocation
|
page read and write
|
||
7DF4E6770000
|
unkown
|
page readonly
|
||
3598000
|
heap
|
page read and write
|
||
77F0000
|
unkown
|
page read and write
|
||
D50000
|
unkown
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
292D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF478000
|
unkown
|
page readonly
|
||
7FF5DF50F000
|
unkown
|
page readonly
|
||
B8E0000
|
system
|
page execute and read and write
|
||
17D0000
|
heap
|
page read and write
|
||
7FF5DF48B000
|
unkown
|
page readonly
|
||
C53B000
|
unkown
|
page read and write
|
||
BEF0000
|
heap
|
page read and write
|
||
30A0000
|
trusted library allocation
|
page read and write
|
||
611E000
|
stack
|
page read and write
|
||
9B99000
|
stack
|
page read and write
|
||
6A0000
|
trusted library allocation
|
page read and write
|
||
3B1F000
|
heap
|
page read and write
|
||
7D89000
|
stack
|
page read and write
|
||
C35C000
|
unkown
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
7FF5DF388000
|
unkown
|
page readonly
|
||
4A0D000
|
direct allocation
|
page execute and read and write
|
||
4BC9000
|
direct allocation
|
page execute and read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
2E47000
|
direct allocation
|
page execute and read and write
|
||
7F8000
|
heap
|
page read and write
|
||
5820000
|
heap
|
page read and write
|
||
2942000
|
heap
|
page read and write
|
||
A0A5000
|
unkown
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
29BC000
|
stack
|
page read and write
|
||
EEA3000
|
unkown
|
page read and write
|
||
2CE2000
|
trusted library allocation
|
page read and write
|
||
7FF5DF361000
|
unkown
|
page readonly
|
||
96F1000
|
unkown
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
2F9F000
|
heap
|
page read and write
|
||
AF7E000
|
stack
|
page read and write
|
||
7FF5DF343000
|
unkown
|
page readonly
|
||
10046000
|
unkown
|
page read and write
|
||
1283000
|
trusted library allocation
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
2D19000
|
direct allocation
|
page execute and read and write
|
||
2CCA000
|
trusted library allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
8E4000
|
trusted library allocation
|
page read and write
|
||
51DB000
|
trusted library allocation
|
page read and write
|
||
6747000
|
heap
|
page read and write
|
||
99AB000
|
unkown
|
page read and write
|
||
34B0000
|
unkown
|
page readonly
|
||
2BF7000
|
direct allocation
|
page execute and read and write
|
||
BF90000
|
unkown
|
page read and write
|
||
7FF5DF24E000
|
unkown
|
page readonly
|
||
BA7000
|
heap
|
page read and write
|
||
64CB000
|
stack
|
page read and write
|
||
B840000
|
system
|
page execute and read and write
|
||
482E000
|
trusted library allocation
|
page read and write
|
||
4860000
|
unkown
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page execute and read and write
|
||
7FF5DEF57000
|
unkown
|
page readonly
|
||
7FF5DF4FB000
|
unkown
|
page readonly
|
||
98A7000
|
unkown
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
3A1A000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page execute and read and write
|
||
7B60000
|
unkown
|
page readonly
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
5D5E000
|
stack
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
C149000
|
unkown
|
page read and write
|
||
4B0F000
|
heap
|
page read and write
|
||
98AD000
|
unkown
|
page read and write
|
||
5E3E000
|
stack
|
page read and write
|
||
BF9B000
|
unkown
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
43F0000
|
heap
|
page read and write
|
||
894000
|
trusted library allocation
|
page read and write
|
||
7870000
|
unkown
|
page read and write
|
||
170D000
|
trusted library allocation
|
page execute and read and write
|
||
2C54000
|
heap
|
page read and write
|
||
5E0E000
|
stack
|
page read and write
|
||
B9BF000
|
stack
|
page read and write
|
||
BEF0000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
5810000
|
trusted library allocation
|
page execute and read and write
|
||
513D000
|
direct allocation
|
page execute and read and write
|
||
987C000
|
unkown
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5146000
|
heap
|
page read and write
|
||
7FF5DF3FC000
|
unkown
|
page readonly
|
||
5B51000
|
direct allocation
|
page execute and read and write
|
||
A3E000
|
stack
|
page read and write
|
||
4C40000
|
trusted library allocation
|
page read and write
|
||
452C000
|
trusted library allocation
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
715E000
|
stack
|
page read and write
|
||
7FF5DF48B000
|
unkown
|
page readonly
|
||
FF1000
|
unkown
|
page readonly
|
||
2B7F000
|
heap
|
page read and write
|
||
BF84000
|
unkown
|
page read and write
|
||
2255000
|
trusted library allocation
|
page read and write
|
||
7FF5DF1F9000
|
unkown
|
page readonly
|
||
2F70000
|
heap
|
page read and write
|
||
28CE000
|
unkown
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
111D000
|
trusted library allocation
|
page execute and read and write
|
||
C1A9000
|
unkown
|
page read and write
|
||
2F97000
|
trusted library allocation
|
page execute and read and write
|
||
3CD000
|
stack
|
page read and write
|
||
72D0000
|
heap
|
page read and write
|
||
4814000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
unclassified section
|
page execute and read and write
|
||
9F63000
|
unkown
|
page read and write
|
||
27D0000
|
unkown
|
page read and write
|
||
7FF5DF25E000
|
unkown
|
page readonly
|
||
7D0D000
|
stack
|
page read and write
|
||
269D000
|
stack
|
page read and write
|
||
66C000
|
stack
|
page read and write
|
||
7FF5DF3B9000
|
unkown
|
page readonly
|
||
35D0000
|
heap
|
page read and write
|
||
4F99000
|
direct allocation
|
page execute and read and write
|
||
CD0000
|
heap
|
page read and write
|
||
35C0000
|
heap
|
page read and write
|
||
3FEA000
|
trusted library allocation
|
page read and write
|
||
EE84000
|
unkown
|
page read and write
|
||
BF40000
|
unkown
|
page read and write
|
||
50D4000
|
heap
|
page read and write
|
||
7840000
|
unkown
|
page read and write
|
||
2DCD000
|
stack
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
47D4000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
648E000
|
stack
|
page read and write
|
||
4831000
|
trusted library allocation
|
page read and write
|
||
9F78000
|
unkown
|
page read and write
|
||
6AB5000
|
heap
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
5F56000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
344D000
|
direct allocation
|
page execute and read and write
|
||
2F40000
|
heap
|
page read and write
|
||
ACAE000
|
stack
|
page read and write
|
||
34EE000
|
unkown
|
page read and write
|
||
7FF5DF2F3000
|
unkown
|
page readonly
|
||
7C89000
|
stack
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
C187000
|
unkown
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
C39F000
|
unkown
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
3185000
|
stack
|
page read and write
|
||
2AD6000
|
direct allocation
|
page execute and read and write
|
||
7B4C000
|
stack
|
page read and write
|
||
59A0000
|
heap
|
page read and write
|
||
5CCE000
|
stack
|
page read and write
|
||
6027000
|
trusted library allocation
|
page read and write
|
||
3CCE000
|
direct allocation
|
page execute and read and write
|
||
CB0000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
5D7000
|
stack
|
page read and write
|
||
19E000
|
unkown
|
page read and write
|
||
3185000
|
stack
|
page read and write
|
||
1482000
|
heap
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page read and write
|
||
28DE000
|
trusted library allocation
|
page read and write
|
||
535F000
|
stack
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
7FF5DF39C000
|
unkown
|
page readonly
|
||
2820000
|
heap
|
page read and write
|
||
A02D000
|
unkown
|
page read and write
|
||
A690000
|
unkown
|
page read and write
|
||
30E8000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
C359000
|
unkown
|
page read and write
|
||
7FF5DEFFC000
|
unkown
|
page readonly
|
||
67EE000
|
stack
|
page read and write
|
||
73B8000
|
unkown
|
page read and write
|
||
7FF5DF18E000
|
unkown
|
page readonly
|
||
63D0000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
98A1000
|
unkown
|
page read and write
|
||
7FF5DF380000
|
unkown
|
page readonly
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
EE7D000
|
unkown
|
page read and write
|
||
2B5E000
|
trusted library allocation
|
page read and write
|
||
4D59000
|
trusted library allocation
|
page read and write
|
||
64CC000
|
stack
|
page read and write
|
||
3352000
|
trusted library allocation
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
7FF5DF3C2000
|
unkown
|
page readonly
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
345C000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page execute and read and write
|
||
5BCE000
|
stack
|
page read and write
|
||
7FF5DF435000
|
unkown
|
page readonly
|
||
92C000
|
stack
|
page read and write
|
||
4740000
|
direct allocation
|
page execute and read and write
|
||
2989000
|
trusted library allocation
|
page read and write
|
||
2789000
|
unclassified section
|
page execute and read and write
|
||
2FA5000
|
heap
|
page read and write
|
||
C1C4000
|
unkown
|
page read and write
|
||
333A000
|
trusted library allocation
|
page read and write
|
||
12A7000
|
trusted library allocation
|
page execute and read and write
|
||
5202000
|
trusted library allocation
|
page read and write
|
||
7FF5DF551000
|
unkown
|
page readonly
|
||
7DF4E6761000
|
unkown
|
page execute read
|
||
2AFD000
|
stack
|
page read and write
|
||
7DF4E6760000
|
unkown
|
page readonly
|
||
59A9000
|
direct allocation
|
page execute and read and write
|
||
2B31000
|
heap
|
page read and write
|
||
C1A9000
|
unkown
|
page read and write
|
||
4B60000
|
trusted library allocation
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
7FF5DF539000
|
unkown
|
page readonly
|
||
36A0000
|
heap
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page execute and read and write
|
||
590E000
|
stack
|
page read and write
|
||
B02000
|
trusted library allocation
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
2CA1000
|
trusted library allocation
|
page read and write
|
||
1459000
|
heap
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
2F63000
|
trusted library allocation
|
page execute and read and write
|
||
4970000
|
heap
|
page read and write
|
||
4DE2000
|
direct allocation
|
page execute and read and write
|
||
C42C000
|
unkown
|
page read and write
|
||
5C97000
|
heap
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page execute and read and write
|
||
703000
|
heap
|
page read and write
|
||
C18A000
|
unkown
|
page read and write
|
||
4CD1000
|
trusted library allocation
|
page read and write
|
||
7FF5DF5CC000
|
unkown
|
page readonly
|
||
38D000
|
stack
|
page read and write
|
||
2D13000
|
heap
|
page read and write
|
||
34BE000
|
direct allocation
|
page execute and read and write
|
||
7FF5DF25E000
|
unkown
|
page readonly
|
||
4E50000
|
trusted library allocation
|
page execute and read and write
|
||
177A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF4F3000
|
unkown
|
page readonly
|
||
6F2D000
|
stack
|
page read and write
|
||
305C000
|
heap
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
6F20000
|
heap
|
page read and write
|
||
96DF000
|
unkown
|
page read and write
|
||
51F1000
|
trusted library allocation
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
5CFE000
|
heap
|
page read and write
|
||
4D71000
|
direct allocation
|
page execute and read and write
|
||
394A000
|
trusted library allocation
|
page read and write
|
||
9F27000
|
unkown
|
page read and write
|
||
2660000
|
trusted library allocation
|
page read and write
|
||
B359000
|
stack
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
370000
|
system
|
page execute and read and write
|
||
7FF5DF488000
|
unkown
|
page readonly
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
120A000
|
heap
|
page read and write
|
||
2C37000
|
heap
|
page read and write
|
||
22AA000
|
trusted library allocation
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
7FF5DF0F1000
|
unkown
|
page readonly
|
||
7FF5DF081000
|
unkown
|
page readonly
|
||
2AC0000
|
heap
|
page read and write
|
||
1DD000
|
stack
|
page read and write
|
||
8DF000
|
stack
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
2CE0000
|
direct allocation
|
page execute and read and write
|
||
8EC000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
7FF5DF0A2000
|
unkown
|
page readonly
|
||
7FF5DF017000
|
unkown
|
page readonly
|
||
7FF5DF4C6000
|
unkown
|
page readonly
|
||
2A4F000
|
unkown
|
page read and write
|
||
63F0000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
2C0E000
|
trusted library allocation
|
page read and write
|
||
29EC000
|
heap
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
B368000
|
unkown
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
26C0000
|
trusted library allocation
|
page read and write
|
||
9E9E000
|
stack
|
page read and write
|
||
DFB000
|
unclassified section
|
page execute and read and write
|
||
BA0000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
7FF5DEE4E000
|
unkown
|
page readonly
|
||
B7E000
|
stack
|
page read and write
|
||
1123000
|
trusted library allocation
|
page read and write
|
||
C192000
|
unkown
|
page read and write
|
||
5880000
|
direct allocation
|
page execute and read and write
|
||
5410000
|
heap
|
page read and write
|
||
6F2E000
|
stack
|
page read and write
|
||
5785000
|
trusted library allocation
|
page read and write
|
||
6BBE000
|
stack
|
page read and write
|
||
2D14000
|
heap
|
page read and write
|
||
1782000
|
trusted library allocation
|
page read and write
|
||
7FF5DF4BD000
|
unkown
|
page readonly
|
||
EE84000
|
unkown
|
page read and write
|
||
7FF5DF0F6000
|
unkown
|
page readonly
|
||
328F000
|
heap
|
page read and write
|
||
C354000
|
unkown
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
CFD000
|
trusted library allocation
|
page execute and read and write
|
||
27C000
|
system
|
page execute and read and write
|
||
2B50000
|
heap
|
page read and write
|
||
A70C000
|
unkown
|
page read and write
|
||
6400000
|
trusted library allocation
|
page execute and read and write
|
||
29F0000
|
heap
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7499000
|
unkown
|
page read and write
|
||
3DAA000
|
trusted library allocation
|
page read and write
|
||
B1C000
|
stack
|
page read and write
|
||
2942000
|
heap
|
page read and write
|
||
971A000
|
unkown
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
2AD0000
|
direct allocation
|
page execute and read and write
|
||
7FF5DEFAF000
|
unkown
|
page readonly
|
||
2F8E000
|
stack
|
page read and write
|
||
5C0F000
|
stack
|
page read and write
|
||
2A05000
|
heap
|
page read and write
|
||
7230000
|
unkown
|
page read and write
|
||
7FF5DF09B000
|
unkown
|
page readonly
|
||
5232000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
unkown
|
page read and write
|
||
2FAA000
|
heap
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
73CD000
|
unkown
|
page read and write
|
||
10290000
|
system
|
page execute and read and write
|
||
5917000
|
trusted library allocation
|
page read and write
|
||
273E000
|
stack
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
2FDD000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
2923000
|
direct allocation
|
page execute and read and write
|
||
2ACC000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
11F0000
|
unclassified section
|
page execute and read and write
|
||
66B0000
|
heap
|
page read and write
|
||
2ADC000
|
heap
|
page read and write
|
||
47DB000
|
trusted library allocation
|
page read and write
|
||
556F000
|
stack
|
page read and write
|
||
FF1000
|
unkown
|
page readonly
|
||
2740000
|
heap
|
page read and write
|
||
5C8C000
|
heap
|
page read and write
|
||
337A000
|
trusted library allocation
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
3580000
|
heap
|
page read and write
|
||
48B2000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
unkown
|
page read and write
|
||
4999000
|
heap
|
page read and write
|
||
BFA1000
|
unkown
|
page read and write
|
||
7FF5DF221000
|
unkown
|
page readonly
|
||
327B000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
5B29000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
2C54000
|
heap
|
page read and write
|
||
83E0000
|
unkown
|
page read and write
|
||
4BA3000
|
heap
|
page read and write
|
||
7FF5DF5BE000
|
unkown
|
page readonly
|
||
30FD000
|
stack
|
page read and write
|
||
268C000
|
heap
|
page read and write
|
||
68B7000
|
trusted library allocation
|
page read and write
|
||
13C6000
|
heap
|
page read and write
|
||
2937000
|
heap
|
page read and write
|
||
305D000
|
stack
|
page read and write
|
||
1729000
|
unclassified section
|
page execute and read and write
|
||
640E000
|
stack
|
page read and write
|
||
2DB6000
|
heap
|
page read and write
|
||
692000
|
heap
|
page read and write
|
||
88DE000
|
stack
|
page read and write
|
||
35D1000
|
direct allocation
|
page execute and read and write
|
||
96F5000
|
unkown
|
page read and write
|
||
729E000
|
stack
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
545B000
|
heap
|
page read and write
|
||
7FF5DF388000
|
unkown
|
page readonly
|
||
34CF000
|
stack
|
page read and write
|
||
7FF5DF5A8000
|
unkown
|
page readonly
|
||
33E0000
|
heap
|
page read and write
|
||
A744000
|
unkown
|
page read and write
|
||
5FCF000
|
stack
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
A705000
|
unkown
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
5204000
|
heap
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
335B000
|
unkown
|
page read and write
|
||
278D000
|
stack
|
page read and write
|
||
2942000
|
heap
|
page read and write
|
||
2D1A000
|
trusted library allocation
|
page read and write
|
||
7FF5DF364000
|
unkown
|
page readonly
|
||
591E000
|
stack
|
page read and write
|
||
3356000
|
unkown
|
page read and write
|
||
6A70000
|
heap
|
page read and write
|
||
606C000
|
stack
|
page read and write
|
||
7F340000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF12A000
|
unkown
|
page readonly
|
||
B17000
|
trusted library allocation
|
page execute and read and write
|
||
32B8000
|
heap
|
page read and write
|
||
BF82000
|
unkown
|
page read and write
|
||
26FF000
|
unkown
|
page read and write
|
||
2DAB000
|
heap
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
7FF5DF59E000
|
unkown
|
page readonly
|
||
14A9000
|
unclassified section
|
page execute and read and write
|
||
3120000
|
heap
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
7FF5DF26F000
|
unkown
|
page readonly
|
||
136E000
|
stack
|
page read and write
|
||
973C000
|
unkown
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
890000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
7FF5DE9C3000
|
unkown
|
page readonly
|
||
1590000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
7FF5DEFE8000
|
unkown
|
page readonly
|
||
79E0000
|
unkown
|
page readonly
|
||
584D000
|
stack
|
page read and write
|
||
3AAA000
|
trusted library allocation
|
page read and write
|
||
A6EE000
|
unkown
|
page read and write
|
||
817000
|
heap
|
page read and write
|
||
619B000
|
heap
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
C187000
|
unkown
|
page read and write
|
||
66EE000
|
stack
|
page read and write
|
||
3289000
|
heap
|
page read and write
|
||
9563000
|
unkown
|
page read and write
|
||
2829000
|
trusted library allocation
|
page read and write
|
||
B010000
|
unkown
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page execute and read and write
|
||
C048000
|
unkown
|
page read and write
|
||
253C000
|
stack
|
page read and write
|
||
A08A000
|
unkown
|
page read and write
|
||
175E000
|
stack
|
page read and write
|
||
1432000
|
heap
|
page read and write
|
||
7FF5DF42F000
|
unkown
|
page readonly
|
||
EE40000
|
unkown
|
page read and write
|
||
2598000
|
trusted library allocation
|
page read and write
|
||
326E000
|
unkown
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
47F3000
|
unkown
|
page read and write
|
||
BFAD000
|
unkown
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
7FF5DF0C3000
|
unkown
|
page readonly
|
||
2FB0000
|
heap
|
page read and write
|
||
30D6000
|
direct allocation
|
page execute and read and write
|
||
3281000
|
trusted library allocation
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
3F5C000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
5200000
|
trusted library allocation
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
7FF5DEFAC000
|
unkown
|
page readonly
|
||
2F90000
|
trusted library allocation
|
page read and write
|
||
47EB000
|
trusted library allocation
|
page read and write
|
||
47FD000
|
trusted library allocation
|
page read and write
|
||
7FF5DF43C000
|
unkown
|
page readonly
|
||
7810000
|
unkown
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
128A000
|
heap
|
page read and write
|
||
14AC000
|
unclassified section
|
page execute and read and write
|
||
4DC9000
|
trusted library allocation
|
page read and write
|
||
CCF000
|
stack
|
page read and write
|
||
E5B000
|
heap
|
page read and write
|
||
A6CF000
|
unkown
|
page read and write
|
||
3027000
|
direct allocation
|
page execute and read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
3304000
|
unkown
|
page read and write
|
||
5438000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
7FF5DEF94000
|
unkown
|
page readonly
|
||
650000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
AEF0000
|
unkown
|
page read and write
|
||
35E4000
|
heap
|
page read and write
|
||
2DB6000
|
heap
|
page read and write
|
||
3161000
|
trusted library allocation
|
page read and write
|
||
4DE5000
|
heap
|
page read and write
|
||
2D63000
|
unkown
|
page read and write
|
||
FCD000
|
trusted library allocation
|
page execute and read and write
|
||
592E000
|
stack
|
page read and write
|
||
176D000
|
trusted library allocation
|
page execute and read and write
|
||
A6D2000
|
unkown
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
3389000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
5CC0000
|
trusted library allocation
|
page read and write
|
||
A098000
|
unkown
|
page read and write
|
||
2AE6000
|
heap
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
962B000
|
unkown
|
page read and write
|
||
8DB9000
|
system
|
page execute and read and write
|
||
7FF5DF36A000
|
unkown
|
page readonly
|
||
A098000
|
unkown
|
page read and write
|
||
9FC3000
|
unkown
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
2FB1000
|
direct allocation
|
page execute and read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
2FE6000
|
direct allocation
|
page execute and read and write
|
||
648E000
|
stack
|
page read and write
|
||
2710000
|
trusted library allocation
|
page execute and read and write
|
||
2B9C000
|
stack
|
page read and write
|
||
95EE000
|
stack
|
page read and write
|
||
5698000
|
trusted library allocation
|
page read and write
|
||
52F5000
|
trusted library allocation
|
page read and write
|
||
C048000
|
unkown
|
page read and write
|
||
3382000
|
unkown
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
7FF5DF229000
|
unkown
|
page readonly
|
||
830F000
|
stack
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
4DA000
|
stack
|
page read and write
|
||
65E000
|
heap
|
page read and write
|
||
962B000
|
unkown
|
page read and write
|
||
7FF5DF25B000
|
unkown
|
page readonly
|
||
379000
|
system
|
page execute and read and write
|
||
336F000
|
unkown
|
page read and write
|
||
52C3000
|
unkown
|
page read and write
|
||
58CE000
|
stack
|
page read and write
|
||
27F0000
|
unkown
|
page readonly
|
||
64EF000
|
stack
|
page read and write
|
||
50EE000
|
heap
|
page read and write
|
||
47F1000
|
unkown
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
891C000
|
unkown
|
page read and write
|
||
7FF5DF2FE000
|
unkown
|
page readonly
|
||
2942000
|
heap
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
9714000
|
unkown
|
page read and write
|
||
7FF5DEE4E000
|
unkown
|
page readonly
|
||
BDC000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
7FF5DF3F7000
|
unkown
|
page readonly
|
||
368E000
|
stack
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
4291000
|
trusted library allocation
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
7FF5DF08F000
|
unkown
|
page readonly
|
||
2FAA000
|
heap
|
page read and write
|
||
B120000
|
unkown
|
page readonly
|
||
FBE000
|
stack
|
page read and write
|
||
73BC000
|
unkown
|
page read and write
|
||
68B0000
|
trusted library allocation
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
6698000
|
heap
|
page read and write
|
||
2DFD000
|
stack
|
page read and write
|
||
47E0000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
2890000
|
unkown
|
page readonly
|
||
263E000
|
stack
|
page read and write
|
||
2695000
|
heap
|
page read and write
|
||
37BF000
|
heap
|
page read and write
|
||
71E000
|
stack
|
page read and write
|
||
32FC000
|
trusted library allocation
|
page read and write
|
||
2E43000
|
direct allocation
|
page execute and read and write
|
||
314B000
|
heap
|
page read and write
|
||
AED000
|
trusted library allocation
|
page execute and read and write
|
||
2FAA000
|
heap
|
page read and write
|
||
227D000
|
stack
|
page read and write
|
||
7FF5DF582000
|
unkown
|
page readonly
|
||
7FF5DEFE2000
|
unkown
|
page readonly
|
||
2D80000
|
heap
|
page read and write
|
||
15CD000
|
trusted library allocation
|
page execute and read and write
|
||
2D01000
|
direct allocation
|
page execute and read and write
|
||
35E6000
|
direct allocation
|
page execute and read and write
|
||
4AEF000
|
heap
|
page read and write
|
||
7FF5DF1D1000
|
unkown
|
page readonly
|
||
2DAB000
|
heap
|
page read and write
|
||
63C0000
|
trusted library allocation
|
page execute and read and write
|
||
47F7000
|
trusted library allocation
|
page read and write
|
||
D69000
|
heap
|
page read and write
|
||
1500000
|
trusted library allocation
|
page execute and read and write
|
||
13D0000
|
heap
|
page read and write
|
||
7FF5DF0C1000
|
unkown
|
page readonly
|
||
2CF0000
|
heap
|
page read and write
|
||
C048000
|
unkown
|
page read and write
|
||
BE84000
|
system
|
page execute and read and write
|
||
49E000
|
stack
|
page read and write
|
||
56AE000
|
stack
|
page read and write
|
||
68FE000
|
stack
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
7FF5DF3BE000
|
unkown
|
page readonly
|
||
2F93000
|
trusted library allocation
|
page read and write
|
||
123A000
|
stack
|
page read and write
|
||
C523000
|
unkown
|
page read and write
|
||
6E3C000
|
stack
|
page read and write
|
||
3285000
|
heap
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page readonly
|
||
C3A0000
|
unkown
|
page read and write
|
||
3054000
|
trusted library allocation
|
page read and write
|
||
7FF5DE531000
|
unkown
|
page readonly
|
||
989F000
|
unkown
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
7FF5DF539000
|
unkown
|
page readonly
|
||
5805000
|
heap
|
page read and write
|
||
989F000
|
unkown
|
page read and write
|
||
73B8000
|
unkown
|
page read and write
|
||
7B50000
|
unkown
|
page readonly
|
||
22F9000
|
trusted library allocation
|
page read and write
|
||
7ACE000
|
stack
|
page read and write
|
||
9F10000
|
unkown
|
page read and write
|
||
265C000
|
stack
|
page read and write
|
||
4855000
|
unkown
|
page read and write
|
||
7395000
|
unkown
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
2692000
|
trusted library allocation
|
page read and write
|
||
7FF5DF4D5000
|
unkown
|
page readonly
|
||
316D000
|
trusted library allocation
|
page read and write
|
||
7FF5DF567000
|
unkown
|
page readonly
|
||
95F0000
|
unkown
|
page read and write
|
||
2C4B000
|
trusted library allocation
|
page read and write
|
||
9FA0000
|
unkown
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
3F1A000
|
trusted library allocation
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
7FF5DEFB7000
|
unkown
|
page readonly
|
||
7FF5DEEEB000
|
unkown
|
page readonly
|
||
7FF5DF429000
|
unkown
|
page readonly
|
||
3200000
|
heap
|
page read and write
|
||
7FF5DF5B5000
|
unkown
|
page readonly
|
||
410000
|
heap
|
page read and write
|
||
7FF5DF58A000
|
unkown
|
page readonly
|
||
61CF000
|
stack
|
page read and write
|
||
13A1000
|
unkown
|
page readonly
|
||
7FD000
|
trusted library allocation
|
page execute and read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
65CC000
|
stack
|
page read and write
|
||
561D000
|
trusted library allocation
|
page read and write
|
||
26B8000
|
trusted library allocation
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
7FF5DF191000
|
unkown
|
page readonly
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
74D6000
|
unkown
|
page read and write
|
||
5830000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
50E8000
|
heap
|
page read and write
|
||
7FF5DF54D000
|
unkown
|
page readonly
|
||
E4F000
|
stack
|
page read and write
|
||
7FF5DF421000
|
unkown
|
page readonly
|
||
A9E000
|
heap
|
page read and write
|
||
692E000
|
stack
|
page read and write
|
||
B500000
|
unkown
|
page readonly
|
||
4DE9000
|
heap
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
935B000
|
stack
|
page read and write
|
||
7FF5DF52D000
|
unkown
|
page readonly
|
||
880000
|
trusted library allocation
|
page read and write
|
||
802000
|
trusted library allocation
|
page read and write
|
||
C01A000
|
unkown
|
page read and write
|
||
BF40000
|
unkown
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
7840000
|
unkown
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
657F000
|
stack
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
BFEF000
|
unkown
|
page read and write
|
||
55F0000
|
trusted library allocation
|
page execute and read and write
|
||
5216000
|
trusted library allocation
|
page read and write
|
||
61A6000
|
heap
|
page read and write
|
||
144A000
|
heap
|
page read and write
|
||
152D000
|
trusted library allocation
|
page execute and read and write
|
||
BFAB000
|
unkown
|
page read and write
|
||
9605000
|
unkown
|
page read and write
|
||
BFA3000
|
unkown
|
page read and write
|
||
2C1D000
|
trusted library allocation
|
page read and write
|
||
2C36000
|
trusted library allocation
|
page read and write
|
||
330A000
|
trusted library allocation
|
page read and write
|
||
3364000
|
unkown
|
page read and write
|
||
9F7C000
|
unkown
|
page read and write
|
||
3D81000
|
trusted library allocation
|
page read and write
|
||
7FF5DF4EC000
|
unkown
|
page readonly
|
||
26DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DE9CB000
|
unkown
|
page readonly
|
||
C159000
|
unkown
|
page read and write
|
||
6ADE000
|
stack
|
page read and write
|
||
6480000
|
heap
|
page read and write
|
||
C75000
|
stack
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
5032000
|
direct allocation
|
page execute and read and write
|
||
CBA000
|
heap
|
page read and write
|
||
C319000
|
unkown
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
7FF5DF486000
|
unkown
|
page readonly
|
||
5420000
|
trusted library allocation
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
2CFC000
|
heap
|
page read and write
|
||
7FF5DF1FC000
|
unkown
|
page readonly
|
||
11E0000
|
heap
|
page read and write
|
||
48C0000
|
trusted library allocation
|
page execute and read and write
|
||
25A0000
|
unclassified section
|
page execute and read and write
|
||
3E6A000
|
trusted library allocation
|
page read and write
|
||
654E000
|
stack
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
3394000
|
unkown
|
page read and write
|
||
43E5000
|
heap
|
page read and write
|
||
A759000
|
unkown
|
page read and write
|
||
3691000
|
heap
|
page read and write
|
||
32B0000
|
unkown
|
page read and write
|
||
808000
|
heap
|
page read and write
|
||
4828000
|
unkown
|
page read and write
|
||
2CFD000
|
stack
|
page read and write
|
||
2E7E000
|
direct allocation
|
page execute and read and write
|
||
914B000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
7FF5DF5AE000
|
unkown
|
page readonly
|
||
63AC000
|
stack
|
page read and write
|
||
32C4000
|
heap
|
page read and write
|
||
4F75000
|
trusted library allocation
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
3337000
|
trusted library allocation
|
page read and write
|
||
148D000
|
trusted library allocation
|
page execute and read and write
|
||
C034000
|
unkown
|
page read and write
|
||
A13000
|
trusted library allocation
|
page read and write
|
||
3128000
|
heap
|
page read and write
|
||
6B43000
|
heap
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
BFCE000
|
unkown
|
page read and write
|
||
9E0000
|
unkown
|
page readonly
|
||
98AD000
|
unkown
|
page read and write
|
||
A08D000
|
unkown
|
page read and write
|
||
48E0000
|
unkown
|
page read and write
|
||
3290000
|
unkown
|
page readonly
|
||
10100000
|
unkown
|
page read and write
|
||
5240000
|
trusted library allocation
|
page execute and read and write
|
||
30B7000
|
direct allocation
|
page execute and read and write
|
||
2A54000
|
heap
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
8A7000
|
heap
|
page read and write
|
||
47F1000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
58F0000
|
trusted library allocation
|
page read and write
|
||
2EFF000
|
heap
|
page read and write
|
||
9FC3000
|
unkown
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
2F9D000
|
trusted library allocation
|
page execute and read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
7FF5DEF06000
|
unkown
|
page readonly
|
||
1B0000
|
direct allocation
|
page read and write
|
||
C8F000
|
stack
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
448000
|
unkown
|
page readonly
|
||
7C4000
|
heap
|
page read and write
|
||
7FF5DEFF5000
|
unkown
|
page readonly
|
||
E06000
|
heap
|
page read and write
|
||
4CBC000
|
heap
|
page read and write
|
||
7FF5DF4A6000
|
unkown
|
page readonly
|
||
C034000
|
unkown
|
page read and write
|
||
C354000
|
unkown
|
page read and write
|
||
7FF5DF41B000
|
unkown
|
page readonly
|
||
59AD000
|
direct allocation
|
page execute and read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
32BC000
|
heap
|
page read and write
|
||
2807000
|
direct allocation
|
page execute and read and write
|
||
3449000
|
direct allocation
|
page execute and read and write
|
||
C40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF39C000
|
unkown
|
page readonly
|
||
67FD000
|
stack
|
page read and write
|
||
830000
|
trusted library allocation
|
page read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
2D1D000
|
direct allocation
|
page execute and read and write
|
||
13B0000
|
unclassified section
|
page execute and read and write
|
||
4E6000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page readonly
|
||
500E000
|
direct allocation
|
page execute and read and write
|
||
118C000
|
heap
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
7502000
|
unkown
|
page read and write
|
||
668F000
|
stack
|
page read and write
|
||
73B4000
|
unkown
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
7FF5DF16B000
|
unkown
|
page readonly
|
||
753E000
|
stack
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
C40C000
|
unkown
|
page read and write
|
||
62C0000
|
trusted library allocation
|
page read and write
|
||
7FF5DF392000
|
unkown
|
page readonly
|
||
32B0000
|
heap
|
page read and write
|
||
397A000
|
trusted library allocation
|
page read and write
|
||
52B2000
|
trusted library allocation
|
page read and write
|
||
265D000
|
stack
|
page read and write
|
||
C523000
|
unkown
|
page read and write
|
||
49F2000
|
heap
|
page read and write
|
||
5E0E000
|
stack
|
page read and write
|
||
7FF5DF0D2000
|
unkown
|
page readonly
|
||
4D7B000
|
stack
|
page read and write
|
||
57FE000
|
stack
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
6AEC000
|
stack
|
page read and write
|
||
DE3000
|
heap
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
838B000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
47D9000
|
unkown
|
page read and write
|
||
989F000
|
unkown
|
page read and write
|
||
5801000
|
heap
|
page read and write
|
||
2A57000
|
direct allocation
|
page execute and read and write
|
||
4D30000
|
trusted library allocation
|
page execute and read and write
|
||
CF3000
|
trusted library allocation
|
page execute and read and write
|
||
13D8000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
5DDE000
|
stack
|
page read and write
|
||
92DC000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
7FF5DF45A000
|
unkown
|
page readonly
|
||
7FF5DF349000
|
unkown
|
page readonly
|
||
2FDD000
|
heap
|
page read and write
|
||
4824000
|
unkown
|
page read and write
|
||
46C8000
|
heap
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
7FF5DF2F3000
|
unkown
|
page readonly
|
||
3480000
|
heap
|
page read and write
|
||
ACAE000
|
stack
|
page read and write
|
||
C319000
|
unkown
|
page read and write
|
||
327E000
|
heap
|
page read and write
|
||
C75000
|
stack
|
page read and write
|
||
4B29000
|
direct allocation
|
page execute and read and write
|
||
D3A000
|
heap
|
page read and write
|
||
5220000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
BFEF000
|
unkown
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
1158000
|
heap
|
page read and write
|
||
2F9F000
|
heap
|
page read and write
|
||
ADC0000
|
unkown
|
page readonly
|
||
3E3A000
|
trusted library allocation
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
7F0A0000
|
trusted library allocation
|
page execute and read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
10180000
|
system
|
page execute and read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
C39F000
|
unkown
|
page read and write
|
||
950F000
|
stack
|
page read and write
|
||
4C12000
|
heap
|
page read and write
|
||
34B0000
|
unkown
|
page readonly
|
||
3362000
|
unkown
|
page read and write
|
||
5550000
|
trusted library allocation
|
page execute and read and write
|
||
5030000
|
trusted library allocation
|
page execute and read and write
|
||
354F000
|
stack
|
page read and write
|
||
37C0000
|
heap
|
page read and write
|
||
C298000
|
unkown
|
page read and write
|
||
7FF5DF582000
|
unkown
|
page readonly
|
||
5E4E000
|
stack
|
page read and write
|
||
32E6000
|
direct allocation
|
page execute and read and write
|
||
4FBD000
|
direct allocation
|
page execute and read and write
|
||
3356000
|
unkown
|
page read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
680E000
|
stack
|
page read and write
|
||
9716000
|
unkown
|
page read and write
|
||
26D0000
|
trusted library allocation
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
3180000
|
heap
|
page execute and read and write
|
||
2C00000
|
heap
|
page read and write
|
||
7FF5C0B65000
|
unkown
|
page readonly
|
||
3151000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
ADC000
|
stack
|
page read and write
|
||
339D000
|
unkown
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
7FF5DF458000
|
unkown
|
page readonly
|
||
4800000
|
heap
|
page read and write
|
||
26F0000
|
unclassified section
|
page execute and read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
31AE000
|
unkown
|
page read and write
|
||
5780000
|
trusted library allocation
|
page execute and read and write
|
||
113C000
|
stack
|
page read and write
|
||
8C28000
|
stack
|
page read and write
|
||
7FF5DF28E000
|
unkown
|
page readonly
|
||
830F000
|
stack
|
page read and write
|
||
6AA000
|
stack
|
page read and write
|
||
50F9000
|
heap
|
page read and write
|
||
7FF5DEF90000
|
unkown
|
page readonly
|
||
6B29000
|
heap
|
page read and write
|
||
9F2A000
|
unkown
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
2D47000
|
trusted library allocation
|
page read and write
|
||
124A000
|
heap
|
page read and write
|
||
9718000
|
unkown
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
531E000
|
stack
|
page read and write
|
||
885A000
|
stack
|
page read and write
|
||
7FF5DEFFC000
|
unkown
|
page readonly
|
||
972000
|
system
|
page execute and read and write
|
||
2D27000
|
direct allocation
|
page execute and read and write
|
||
2FAA000
|
heap
|
page read and write
|
||
C02F000
|
unkown
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
9729000
|
unkown
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
BD80000
|
system
|
page execute and read and write
|
||
5AE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF364000
|
unkown
|
page readonly
|
||
48B2000
|
trusted library allocation
|
page read and write
|
||
2E09000
|
direct allocation
|
page execute and read and write
|
||
32D1000
|
direct allocation
|
page execute and read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
4CCD000
|
direct allocation
|
page execute and read and write
|
||
2EC0000
|
unkown
|
page readonly
|
||
C24C000
|
unkown
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
B9F0000
|
unkown
|
page read and write
|
||
C19D000
|
unkown
|
page read and write
|
||
3EF7000
|
trusted library allocation
|
page read and write
|
||
92DB000
|
stack
|
page read and write
|
||
C4EB000
|
unkown
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
2FAA000
|
heap
|
page read and write
|
||
2D16000
|
direct allocation
|
page execute and read and write
|
||
96ED000
|
unkown
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
3128000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
3551000
|
trusted library allocation
|
page read and write
|
||
7A40000
|
unkown
|
page readonly
|
||
2DB6000
|
heap
|
page read and write
|
||
7FF5DF5D6000
|
unkown
|
page readonly
|
||
7FF5DF248000
|
unkown
|
page readonly
|
||
3289000
|
heap
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
2890000
|
unkown
|
page readonly
|
||
7FF5DF3F1000
|
unkown
|
page readonly
|
||
978C000
|
unkown
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
60BE000
|
stack
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
2952000
|
unclassified section
|
page execute and read and write
|
||
658E000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
4C1D000
|
trusted library allocation
|
page read and write
|
||
5855000
|
trusted library allocation
|
page read and write
|
||
6EDD000
|
stack
|
page read and write
|
||
6DF0000
|
trusted library allocation
|
page read and write
|
||
336C000
|
unkown
|
page read and write
|
||
27D0000
|
unkown
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
28A0000
|
unkown
|
page readonly
|
||
9F2A000
|
unkown
|
page read and write
|
||
A26000
|
trusted library allocation
|
page execute and read and write
|
||
5E4F000
|
stack
|
page read and write
|
||
2C22000
|
trusted library allocation
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
5510000
|
heap
|
page read and write
|
||
77F000
|
stack
|
page read and write
|
||
10003000
|
unkown
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
6EB000
|
trusted library allocation
|
page execute and read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
7FF5DF382000
|
unkown
|
page readonly
|
||
1280000
|
heap
|
page read and write
|
||
73E5000
|
unkown
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
7FF5DF04D000
|
unkown
|
page readonly
|
||
4760000
|
unkown
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
60CE000
|
stack
|
page read and write
|
||
7F8E0000
|
trusted library allocation
|
page execute and read and write
|
||
270E000
|
unkown
|
page read and write
|
||
4FC1000
|
direct allocation
|
page execute and read and write
|
||
1081F000
|
stack
|
page read and write
|
||
BF98000
|
unkown
|
page read and write
|
||
639C000
|
stack
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
637C000
|
stack
|
page read and write
|
||
7FF5DF126000
|
unkown
|
page readonly
|
||
4FD3000
|
heap
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
2F69000
|
direct allocation
|
page execute and read and write
|
||
7FF5DF3EA000
|
unkown
|
page readonly
|
||
28C0000
|
direct allocation
|
page execute and read and write
|
||
C3A000
|
stack
|
page read and write
|
||
7FF5DF4D5000
|
unkown
|
page readonly
|
||
4918000
|
trusted library allocation
|
page read and write
|
||
7FF5DF089000
|
unkown
|
page readonly
|
||
87CA000
|
unkown
|
page read and write
|
||
C34E000
|
unkown
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
7FF5DF5B3000
|
unkown
|
page readonly
|
||
13AE000
|
stack
|
page read and write
|
||
BFB3000
|
unkown
|
page read and write
|
||
7FF5DF60D000
|
unkown
|
page readonly
|
||
739B000
|
unkown
|
page read and write
|
||
2C34000
|
trusted library allocation
|
page read and write
|
||
2F6D000
|
stack
|
page read and write
|
||
4766000
|
unkown
|
page read and write
|
||
7FF5DF191000
|
unkown
|
page readonly
|
||
E06000
|
heap
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
C410000
|
unkown
|
page read and write
|
||
7FF5DF5E9000
|
unkown
|
page readonly
|
||
C4CB000
|
unkown
|
page read and write
|
||
4A92000
|
trusted library allocation
|
page read and write
|
||
3635000
|
heap
|
page read and write
|
||
5B30000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
direct allocation
|
page execute and read and write
|
||
54C0000
|
trusted library allocation
|
page execute and read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
7FF5DF275000
|
unkown
|
page readonly
|
||
2890000
|
heap
|
page read and write
|
||
C438000
|
unkown
|
page read and write
|
||
AE6F000
|
stack
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
318B000
|
stack
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
48A0000
|
unkown
|
page read and write
|
||
2D6E000
|
unkown
|
page read and write
|
||
2FE3000
|
heap
|
page read and write
|
||
A758000
|
unkown
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
2E30000
|
unkown
|
page read and write
|
||
BF90000
|
unkown
|
page read and write
|
||
3C5D000
|
direct allocation
|
page execute and read and write
|
||
C183000
|
unkown
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
124A000
|
heap
|
page read and write
|
||
A22000
|
trusted library allocation
|
page read and write
|
||
7FF5DF4FB000
|
unkown
|
page readonly
|
||
634E000
|
stack
|
page read and write
|
||
1386000
|
unclassified section
|
page execute and read and write
|
||
522B000
|
trusted library allocation
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
2929000
|
direct allocation
|
page execute and read and write
|
||
2EC0000
|
direct allocation
|
page execute and read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
7FF5DEFCB000
|
unkown
|
page readonly
|
||
BFB3000
|
unkown
|
page read and write
|
||
E70000
|
unkown
|
page readonly
|
||
26B0000
|
trusted library allocation
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
EE4C000
|
unkown
|
page read and write
|
||
7FF5DF458000
|
unkown
|
page readonly
|
||
4879000
|
heap
|
page read and write
|
||
2B4E000
|
unkown
|
page read and write
|
||
47EC000
|
unkown
|
page read and write
|
||
7FF5DF3AA000
|
unkown
|
page readonly
|
||
113F0000
|
system
|
page execute and read and write
|
||
E0F000
|
heap
|
page read and write
|
||
29E9000
|
direct allocation
|
page execute and read and write
|
||
1132000
|
trusted library allocation
|
page read and write
|
||
6080000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
C35F000
|
unkown
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
BD7F000
|
stack
|
page read and write
|
||
A6F1000
|
unkown
|
page read and write
|
||
3911000
|
trusted library allocation
|
page read and write
|
||
1810000
|
heap
|
page read and write
|
||
2AAB000
|
unclassified section
|
page execute and read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
50FD000
|
heap
|
page read and write
|
||
860000
|
trusted library allocation
|
page execute and read and write
|
||
3020000
|
heap
|
page read and write
|
||
6D2000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
2A76000
|
direct allocation
|
page execute and read and write
|
||
44AA000
|
trusted library allocation
|
page read and write
|
||
C19D000
|
unkown
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
4C32000
|
heap
|
page read and write
|
||
5777000
|
heap
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
66BE000
|
stack
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
320B000
|
stack
|
page read and write
|
||
7B50000
|
unkown
|
page readonly
|
||
7FF5DF45C000
|
unkown
|
page readonly
|
||
7FF5DF42F000
|
unkown
|
page readonly
|
||
2E9D000
|
stack
|
page read and write
|
||
4E1D000
|
direct allocation
|
page execute and read and write
|
||
B11C000
|
stack
|
page read and write
|
||
595F000
|
stack
|
page read and write
|
||
6E60000
|
trusted library allocation
|
page execute and read and write
|
||
80A000
|
trusted library allocation
|
page execute and read and write
|
||
2C5A000
|
heap
|
page read and write
|
||
9F92000
|
unkown
|
page read and write
|
||
2F88000
|
heap
|
page read and write
|
||
7FF5DF537000
|
unkown
|
page readonly
|
||
4B85000
|
trusted library allocation
|
page read and write
|
||
4CA8000
|
trusted library allocation
|
page read and write
|
||
7FF5DF3B5000
|
unkown
|
page readonly
|
||
7FF5DF2BA000
|
unkown
|
page readonly
|
||
974000
|
system
|
page execute and read and write
|
||
53E1000
|
heap
|
page read and write
|
||
2F95000
|
trusted library allocation
|
page execute and read and write
|
||
2C70000
|
heap
|
page read and write
|
||
2940000
|
direct allocation
|
page execute and read and write
|
||
7FF5DF382000
|
unkown
|
page readonly
|
||
A60000
|
heap
|
page read and write
|
||
56E5000
|
trusted library allocation
|
page read and write
|
||
37DF000
|
heap
|
page read and write
|
||
75F000
|
stack
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
E80000
|
unkown
|
page read and write
|
||
3320000
|
direct allocation
|
page execute and read and write
|
||
86CA000
|
heap
|
page read and write
|
||
73CD000
|
unkown
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
3077000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page execute and read and write
|
||
5ADD000
|
stack
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
7FF5DF229000
|
unkown
|
page readonly
|
||
112EC000
|
stack
|
page read and write
|
||
7FF5DF54D000
|
unkown
|
page readonly
|
||
7FF5DF091000
|
unkown
|
page readonly
|
||
7FF5DF2E2000
|
unkown
|
page readonly
|
||
4D20000
|
trusted library allocation
|
page execute and read and write
|
||
5979000
|
heap
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
30FB000
|
stack
|
page read and write
|
||
628E000
|
stack
|
page read and write
|
||
2F82000
|
trusted library allocation
|
page read and write
|
||
146B000
|
heap
|
page read and write
|
||
37DF000
|
heap
|
page read and write
|
||
4B2D000
|
direct allocation
|
page execute and read and write
|
||
53D5000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
7FF5DEF87000
|
unkown
|
page readonly
|
||
7FF5DF532000
|
unkown
|
page readonly
|
||
46A4000
|
heap
|
page read and write
|
||
AD2B000
|
stack
|
page read and write
|
||
A32000
|
trusted library allocation
|
page read and write
|
||
28D3000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
7DF5E895F000
|
unkown
|
page readonly
|
||
322E000
|
unkown
|
page read and write
|
||
15C4000
|
trusted library allocation
|
page read and write
|
||
7FF5DF3D4000
|
unkown
|
page readonly
|
||
8EA9000
|
stack
|
page read and write
|
||
8D30000
|
system
|
page execute and read and write
|
||
4C38000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
B45A000
|
stack
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
4860000
|
unkown
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
26A0000
|
trusted library allocation
|
page read and write
|
||
2C48000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page readonly
|
||
C1CC000
|
unkown
|
page read and write
|
||
7FF5DF2BA000
|
unkown
|
page readonly
|
||
47A2000
|
unkown
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
328A000
|
heap
|
page read and write
|
||
3418000
|
heap
|
page read and write
|
||
7FF5DF4AB000
|
unkown
|
page readonly
|
||
4E60000
|
trusted library allocation
|
page execute and read and write
|
||
2DA0000
|
direct allocation
|
page execute and read and write
|
||
874C000
|
stack
|
page read and write
|
||
4BD0000
|
trusted library allocation
|
page execute and read and write
|
||
589E000
|
stack
|
page read and write
|
||
7FF5DF20A000
|
unkown
|
page readonly
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
7FF5DF122000
|
unkown
|
page readonly
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
5410000
|
trusted library allocation
|
page read and write
|
||
E80000
|
unkown
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
2C54000
|
heap
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
17C0000
|
trusted library allocation
|
page read and write
|
||
2C76000
|
direct allocation
|
page execute and read and write
|
||
C4EB000
|
unkown
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
9380000
|
unkown
|
page readonly
|
||
7F3000
|
trusted library allocation
|
page read and write
|
||
30C0000
|
direct allocation
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
E660000
|
system
|
page execute and read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
3149000
|
direct allocation
|
page execute and read and write
|
||
A02D000
|
unkown
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
5298000
|
trusted library allocation
|
page read and write
|
||
5900000
|
trusted library allocation
|
page read and write
|
||
5090000
|
trusted library allocation
|
page execute and read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
7FF5DF017000
|
unkown
|
page readonly
|
||
6090000
|
trusted library allocation
|
page execute and read and write
|
||
5768000
|
trusted library allocation
|
page read and write
|
||
3361000
|
direct allocation
|
page execute and read and write
|
||
9B1D000
|
stack
|
page read and write
|
||
D5F000
|
stack
|
page read and write
|
||
4890000
|
unkown
|
page read and write
|
||
6C1E000
|
stack
|
page read and write
|
||
9704000
|
unkown
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
4869000
|
direct allocation
|
page execute and read and write
|
||
112F0000
|
system
|
page execute and read and write
|
||
BFAB000
|
unkown
|
page read and write
|
||
5F78000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
A74C000
|
unkown
|
page read and write
|
||
7FF5DF60D000
|
unkown
|
page readonly
|
||
7FF5DEEEB000
|
unkown
|
page readonly
|
||
3382000
|
unkown
|
page read and write
|
||
102E000
|
stack
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
7FF5DF5FF000
|
unkown
|
page readonly
|
||
D99000
|
heap
|
page read and write
|
||
7FF5DEF87000
|
unkown
|
page readonly
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
7830000
|
unkown
|
page read and write
|
||
4823000
|
heap
|
page read and write
|
||
2BD3000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
24FF000
|
stack
|
page read and write
|
||
2DBC000
|
heap
|
page read and write
|
||
5350000
|
heap
|
page execute and read and write
|
||
D14000
|
heap
|
page read and write
|
||
C23D000
|
unkown
|
page read and write
|
||
27DF000
|
stack
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
FFC4000
|
unkown
|
page read and write
|
||
48DE000
|
direct allocation
|
page execute and read and write
|
||
2C16000
|
direct allocation
|
page execute and read and write
|
||
4842000
|
trusted library allocation
|
page read and write
|
||
A0B1000
|
unkown
|
page read and write
|
||
486D000
|
direct allocation
|
page execute and read and write
|
||
328E000
|
stack
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
7FF5DF1CD000
|
unkown
|
page readonly
|
||
5750000
|
heap
|
page read and write
|
||
9563000
|
unkown
|
page read and write
|
||
48B0000
|
trusted library allocation
|
page read and write
|
||
2FD2000
|
heap
|
page read and write
|
||
960000
|
system
|
page execute and read and write
|
||
C39F000
|
unkown
|
page read and write
|
||
337B000
|
stack
|
page read and write
|
||
3070000
|
unclassified section
|
page execute and read and write
|
||
1550000
|
heap
|
page read and write
|
||
2F92000
|
trusted library allocation
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
BD7F000
|
stack
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
C149000
|
unkown
|
page read and write
|
||
DE0000
|
unclassified section
|
page execute and read and write
|
||
4A80000
|
heap
|
page read and write
|
||
3DFD000
|
direct allocation
|
page execute and read and write
|
||
BFAD000
|
unkown
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
34EA000
|
trusted library allocation
|
page read and write
|
||
6B2D000
|
stack
|
page read and write
|
||
2880000
|
direct allocation
|
page execute and read and write
|
||
11F5000
|
unclassified section
|
page execute and read and write
|
||
7FF5DF49C000
|
unkown
|
page readonly
|
||
7FF5C0B65000
|
unkown
|
page readonly
|
||
6B17000
|
heap
|
page read and write
|
||
E91000
|
unkown
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
4A96000
|
unclassified section
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
28CB000
|
trusted library allocation
|
page read and write
|
||
5762000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
FF5000
|
heap
|
page read and write
|
||
3304000
|
unkown
|
page read and write
|
||
7FF5DF45C000
|
unkown
|
page readonly
|
||
4CD2000
|
trusted library allocation
|
page read and write
|
||
10084000
|
unkown
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
B88000
|
trusted library allocation
|
page read and write
|
||
6740000
|
heap
|
page read and write
|
||
26CF000
|
stack
|
page read and write
|
||
393A000
|
trusted library allocation
|
page read and write
|
||
69AE000
|
stack
|
page read and write
|
||
2B10000
|
trusted library allocation
|
page execute and read and write
|
||
27AE000
|
stack
|
page read and write
|
||
35BA000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
unkown
|
page readonly
|
||
7DF4E6791000
|
unkown
|
page execute read
|
||
73BA000
|
unkown
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
335B000
|
unkown
|
page read and write
|
||
56CF000
|
stack
|
page read and write
|
||
6E5F000
|
stack
|
page read and write
|
||
342F000
|
unkown
|
page read and write
|
||
8C26000
|
stack
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
564C000
|
heap
|
page read and write
|
||
32ED000
|
direct allocation
|
page execute and read and write
|
||
4C0E000
|
trusted library allocation
|
page read and write
|
||
C23D000
|
unkown
|
page read and write
|
||
47EE000
|
trusted library allocation
|
page read and write
|
||
6C0000
|
trusted library allocation
|
page read and write
|
||
3AAE000
|
heap
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
1760000
|
trusted library allocation
|
page read and write
|
||
51DC000
|
stack
|
page read and write
|
||
9605000
|
unkown
|
page read and write
|
||
483D000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page execute and read and write
|
||
2EB0000
|
unkown
|
page readonly
|
||
3240000
|
heap
|
page read and write
|
||
DF3000
|
heap
|
page read and write
|
||
A0F7000
|
unkown
|
page read and write
|
||
7800000
|
unkown
|
page read and write
|
||
3349000
|
unkown
|
page read and write
|
||
A744000
|
unkown
|
page read and write
|
||
970C000
|
unkown
|
page read and write
|
||
2DB6000
|
heap
|
page read and write
|
||
B81B000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
4407000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
7FF5DEE56000
|
unkown
|
page readonly
|
||
A6D2000
|
unkown
|
page read and write
|
||
7FF5DF5FF000
|
unkown
|
page readonly
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
2F02000
|
direct allocation
|
page execute and read and write
|
||
BFA7000
|
unkown
|
page read and write
|
||
5CE5000
|
heap
|
page read and write
|
||
3902000
|
heap
|
page read and write
|
||
13A0000
|
unkown
|
page readonly
|
||
28DF000
|
stack
|
page read and write
|
||
ADAB000
|
stack
|
page read and write
|
||
7FF5DF55A000
|
unkown
|
page readonly
|
||
C2E4000
|
unkown
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
9D9F000
|
stack
|
page read and write
|
||
3311000
|
trusted library allocation
|
page read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
7FF5DF55A000
|
unkown
|
page readonly
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
68AC000
|
stack
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
A6FF000
|
unkown
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
A104000
|
unkown
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
FFC4000
|
unkown
|
page read and write
|
||
3130000
|
direct allocation
|
page execute and read and write
|
||
7FF5DF57F000
|
unkown
|
page readonly
|
||
7FF5DEFA6000
|
unkown
|
page readonly
|
||
32D2000
|
trusted library allocation
|
page read and write
|
||
4C1D000
|
stack
|
page read and write
|
||
838B000
|
stack
|
page read and write
|
||
6E50000
|
heap
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
6410000
|
trusted library allocation
|
page read and write
|
||
940C000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
7DF4E6791000
|
unkown
|
page execute read
|
||
4CE1000
|
heap
|
page read and write
|
||
7FF5DF49C000
|
unkown
|
page readonly
|
||
2EB6000
|
direct allocation
|
page execute and read and write
|
||
228E000
|
stack
|
page read and write
|
||
34CF000
|
unkown
|
page read and write
|
||
2903000
|
heap
|
page read and write
|
||
67BC000
|
stack
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
BF82000
|
unkown
|
page read and write
|
||
314B000
|
trusted library allocation
|
page read and write
|
||
98A7000
|
unkown
|
page read and write
|
||
2DC0000
|
unkown
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
2C54000
|
heap
|
page read and write
|
||
BFDF000
|
unkown
|
page read and write
|
||
B9E0000
|
unkown
|
page read and write
|
||
A79000
|
system
|
page execute and read and write
|
||
356E000
|
stack
|
page read and write
|
||
2ABE000
|
unkown
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
26A4000
|
trusted library allocation
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
2D28000
|
heap
|
page read and write
|
||
47C7000
|
heap
|
page read and write
|
||
3107000
|
stack
|
page read and write
|
||
35EF000
|
heap
|
page read and write
|
||
C149000
|
unkown
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
52D9000
|
unkown
|
page read and write
|
||
9F3E000
|
unkown
|
page read and write
|
||
7FF5DF029000
|
unkown
|
page readonly
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
B60A000
|
stack
|
page read and write
|
||
1540000
|
unclassified section
|
page execute and read and write
|
||
3460000
|
heap
|
page read and write
|
||
5141000
|
direct allocation
|
page execute and read and write
|
||
6A86000
|
heap
|
page read and write
|
||
98A7000
|
unkown
|
page read and write
|
||
4E05000
|
heap
|
page read and write
|
||
A106000
|
unkown
|
page read and write
|
||
2DA0000
|
unclassified section
|
page execute and read and write
|
||
4F4000
|
heap
|
page read and write
|
||
73B6000
|
unkown
|
page read and write
|
||
3701000
|
trusted library allocation
|
page read and write
|
||
C39F000
|
unkown
|
page read and write
|
||
3371000
|
unkown
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
7395000
|
unkown
|
page read and write
|
||
597F000
|
heap
|
page read and write
|
||
7FF5DF221000
|
unkown
|
page readonly
|
||
7FF5DF1D1000
|
unkown
|
page readonly
|
||
83F0000
|
unkown
|
page read and write
|
||
7FF5DE535000
|
unkown
|
page readonly
|
||
9CE000
|
stack
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
7FF5DF21F000
|
unkown
|
page readonly
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
1776000
|
trusted library allocation
|
page execute and read and write
|
||
92E000
|
stack
|
page read and write
|
||
293B000
|
stack
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
57EE000
|
stack
|
page read and write
|
||
2F6D000
|
trusted library allocation
|
page execute and read and write
|
||
2910000
|
heap
|
page read and write
|
||
32DC000
|
heap
|
page read and write
|
||
31D3000
|
direct allocation
|
page execute and read and write
|
||
159A000
|
heap
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
7FF5DEE56000
|
unkown
|
page readonly
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
7FF5DEE43000
|
unkown
|
page readonly
|
||
7FF5DF606000
|
unkown
|
page readonly
|
||
7FF5DF532000
|
unkown
|
page readonly
|
||
B80000
|
heap
|
page read and write
|
||
74A9000
|
unkown
|
page read and write
|
||
5103000
|
heap
|
page read and write
|
||
5F7E000
|
stack
|
page read and write
|
||
2BED000
|
stack
|
page read and write
|
||
73D000
|
heap
|
page read and write
|
||
51E9000
|
trusted library allocation
|
page read and write
|
||
62D0000
|
heap
|
page read and write
|
||
9095000
|
stack
|
page read and write
|
||
7FF5DF3B9000
|
unkown
|
page readonly
|
||
A072000
|
unkown
|
page read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
4BFB000
|
trusted library allocation
|
page read and write
|
||
5D9D000
|
stack
|
page read and write
|
||
6B0E000
|
stack
|
page read and write
|
||
A74C000
|
unkown
|
page read and write
|
||
433A000
|
trusted library allocation
|
page read and write
|
||
2700000
|
unclassified section
|
page execute and read and write
|
||
7FF5DF571000
|
unkown
|
page readonly
|
||
BF9D000
|
unkown
|
page read and write
|
||
3A87000
|
trusted library allocation
|
page read and write
|
||
2E8F000
|
stack
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
2FC7000
|
heap
|
page read and write
|
||
2C8F000
|
unkown
|
page read and write
|
||
2985000
|
heap
|
page read and write
|
||
4854000
|
heap
|
page read and write
|
||
B259000
|
stack
|
page read and write
|
||
50DA000
|
heap
|
page read and write
|
||
11364000
|
system
|
page execute and read and write
|
||
7FF5DEFBD000
|
unkown
|
page readonly
|
||
7FF5DF577000
|
unkown
|
page readonly
|
||
5C40000
|
heap
|
page read and write
|
||
3981000
|
heap
|
page read and write
|
||
69E0000
|
heap
|
page read and write
|
||
3633000
|
heap
|
page read and write
|
||
7FF5DF623000
|
unkown
|
page readonly
|
||
14ED000
|
trusted library allocation
|
page execute and read and write
|
||
38BC000
|
trusted library allocation
|
page read and write
|
||
2B12000
|
direct allocation
|
page execute and read and write
|
||
331C000
|
trusted library allocation
|
page read and write
|
||
B500000
|
unkown
|
page readonly
|
||
6BD000
|
trusted library allocation
|
page execute and read and write
|
||
678F000
|
stack
|
page read and write
|
||
7FF5DF156000
|
unkown
|
page readonly
|
||
13FA000
|
heap
|
page read and write
|
||
EB7F000
|
unkown
|
page execute and read and write
|
||
7FF5DF343000
|
unkown
|
page readonly
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
23C9000
|
trusted library allocation
|
page read and write
|
||
4C3E000
|
direct allocation
|
page execute and read and write
|
||
C003000
|
unkown
|
page read and write
|
||
74E5000
|
unkown
|
page read and write
|
||
7FF5DF207000
|
unkown
|
page readonly
|
||
34C0000
|
unkown
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
7FF5DEFDD000
|
unkown
|
page readonly
|
||
26F0000
|
heap
|
page execute and read and write
|
||
C140000
|
unkown
|
page read and write
|
||
4870000
|
unkown
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page execute and read and write
|
||
6BA000
|
heap
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
7380000
|
unkown
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
C3A0000
|
unkown
|
page read and write
|
||
50A9000
|
heap
|
page read and write
|
||
7FF5DF4AB000
|
unkown
|
page readonly
|
||
2BFB000
|
trusted library allocation
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
61FE000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
7FF5DE539000
|
unkown
|
page readonly
|
||
7FF5DF4F7000
|
unkown
|
page readonly
|
||
32A0000
|
heap
|
page read and write
|
||
7FF5DF4E7000
|
unkown
|
page readonly
|
||
5241000
|
unkown
|
page read and write
|
||
2DBC000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
B2DC000
|
stack
|
page read and write
|
||
7FF5DF3F7000
|
unkown
|
page readonly
|
||
33E8000
|
heap
|
page read and write
|
||
4AE1000
|
heap
|
page read and write
|
||
26AB000
|
unclassified section
|
page execute and read and write
|
||
5A90000
|
trusted library allocation
|
page execute and read and write
|
||
2BBC000
|
heap
|
page read and write
|
||
13CF000
|
unclassified section
|
page execute and read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
293D000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
7800000
|
unkown
|
page read and write
|
||
7FF5DF01B000
|
unkown
|
page readonly
|
||
32F0000
|
trusted library allocation
|
page execute and read and write
|
||
4E08000
|
trusted library allocation
|
page read and write
|
||
3136000
|
direct allocation
|
page execute and read and write
|
||
2D20000
|
heap
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
AEF0000
|
unkown
|
page read and write
|
||
30E2000
|
direct allocation
|
page execute and read and write
|
||
A700000
|
unkown
|
page read and write
|
||
660E000
|
stack
|
page read and write
|
||
5130000
|
trusted library allocation
|
page execute and read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
2F8A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF1EC000
|
unkown
|
page readonly
|
||
2AB1000
|
direct allocation
|
page execute and read and write
|
||
3142000
|
heap
|
page read and write
|
||
EE88000
|
unkown
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
47F3000
|
unkown
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
73D000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
8590000
|
unkown
|
page readonly
|
||
5F3E000
|
stack
|
page read and write
|
||
2B09000
|
unclassified section
|
page execute and read and write
|
||
920000
|
heap
|
page read and write
|
||
9B1E000
|
stack
|
page read and write
|
||
448C000
|
stack
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
4CC0000
|
heap
|
page read and write
|
||
2B8D000
|
direct allocation
|
page execute and read and write
|
||
50A0000
|
heap
|
page read and write
|
||
7FF5DF4C6000
|
unkown
|
page readonly
|
||
7940000
|
unkown
|
page readonly
|
||
2C54000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
2E50000
|
unkown
|
page readonly
|
||
3107000
|
stack
|
page read and write
|
||
4DB5000
|
trusted library allocation
|
page read and write
|
||
7FF5DF06F000
|
unkown
|
page readonly
|
||
6696000
|
heap
|
page read and write
|
||
7FF5DF626000
|
unkown
|
page readonly
|
||
6A8C000
|
stack
|
page read and write
|
||
7ACE000
|
stack
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
525D000
|
stack
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
286F000
|
stack
|
page read and write
|
||
6B8000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
15B1000
|
heap
|
page read and write
|
||
2330000
|
trusted library allocation
|
page read and write
|
||
7FF5DF24E000
|
unkown
|
page readonly
|
||
664E000
|
stack
|
page read and write
|
||
5EDF000
|
heap
|
page read and write
|
||
312C000
|
heap
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
28FC000
|
heap
|
page read and write
|
||
7FF5DF248000
|
unkown
|
page readonly
|
||
BFD0000
|
unkown
|
page read and write
|
||
5204000
|
heap
|
page read and write
|
||
7FF5DF623000
|
unkown
|
page readonly
|
||
28F0000
|
heap
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
5A1E000
|
direct allocation
|
page execute and read and write
|
||
2FA1000
|
heap
|
page read and write
|
||
AB0D000
|
stack
|
page read and write
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
567000
|
heap
|
page read and write
|
||
CB1000
|
heap
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
stack
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
2F64000
|
trusted library allocation
|
page read and write
|
||
C2E4000
|
unkown
|
page read and write
|
||
EBC000
|
stack
|
page read and write
|
||
650F000
|
stack
|
page read and write
|
||
2FAA000
|
heap
|
page read and write
|
||
7FF5DF0F6000
|
unkown
|
page readonly
|
||
2B1B000
|
heap
|
page read and write
|
||
7FF5DF038000
|
unkown
|
page readonly
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
21AF000
|
stack
|
page read and write
|
||
58D1000
|
trusted library allocation
|
page read and write
|
||
5BD0000
|
trusted library allocation
|
page execute and read and write
|
||
5241000
|
unkown
|
page read and write
|
||
7FF5DF07D000
|
unkown
|
page readonly
|
||
C431000
|
unkown
|
page read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
595D000
|
trusted library allocation
|
page read and write
|
||
9C99000
|
stack
|
page read and write
|
||
D25000
|
trusted library allocation
|
page execute and read and write
|
||
800000
|
trusted library allocation
|
page read and write
|
||
AFFC000
|
stack
|
page read and write
|
||
61BE000
|
stack
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page execute and read and write
|
||
520000
|
heap
|
page read and write
|
||
650D000
|
stack
|
page read and write
|
||
3373000
|
unkown
|
page read and write
|
||
896000
|
trusted library allocation
|
page read and write
|
||
44F0000
|
trusted library allocation
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
51D4000
|
trusted library allocation
|
page read and write
|
||
3B5A000
|
trusted library allocation
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
2E30000
|
unkown
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
6C2F000
|
stack
|
page read and write
|
||
C13A000
|
unkown
|
page read and write
|
||
3CCA000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
heap
|
page execute and read and write
|
||
560000
|
heap
|
page read and write
|
||
C34E000
|
unkown
|
page read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
42BA000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
5876000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
10A9F000
|
system
|
page read and write
|
||
46C0000
|
heap
|
page read and write
|
||
C1A9000
|
unkown
|
page read and write
|
||
89C000
|
stack
|
page read and write
|
||
50FD000
|
heap
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
2B73000
|
direct allocation
|
page execute and read and write
|
||
F7A000
|
stack
|
page read and write
|
||
AE3000
|
trusted library allocation
|
page execute and read and write
|
||
46C2000
|
heap
|
page read and write
|
||
2886000
|
direct allocation
|
page execute and read and write
|
||
2F40000
|
heap
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
391F000
|
heap
|
page read and write
|
||
569E000
|
trusted library allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
E5F5000
|
system
|
page execute and read and write
|
||
3220000
|
heap
|
page read and write
|
||
2FAD000
|
stack
|
page read and write
|
||
B06000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF47E000
|
unkown
|
page readonly
|
||
361C000
|
heap
|
page read and write
|
||
2FDD000
|
heap
|
page read and write
|
||
3289000
|
heap
|
page read and write
|
||
73A3000
|
unkown
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
56A7000
|
trusted library allocation
|
page read and write
|
||
7FF5DF577000
|
unkown
|
page readonly
|
||
EFC000
|
stack
|
page read and write
|
||
136000
|
system
|
page execute and read and write
|
||
283C000
|
stack
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
2AA000
|
stack
|
page read and write
|
||
5730000
|
trusted library allocation
|
page execute and read and write
|
||
9E1E000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
7FF5DF195000
|
unkown
|
page readonly
|
||
F48000
|
stack
|
page read and write
|
||
AD2B000
|
stack
|
page read and write
|
||
7DF4E6780000
|
unkown
|
page readonly
|
||
2D20000
|
direct allocation
|
page execute and read and write
|
||
34F0000
|
heap
|
page read and write
|
||
4824000
|
unkown
|
page read and write
|
||
4766000
|
unkown
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
1030000
|
unclassified section
|
page execute and read and write
|
||
1296000
|
trusted library allocation
|
page execute and read and write
|
||
608E000
|
stack
|
page read and write
|
||
73B4000
|
unkown
|
page read and write
|
||
4AA0000
|
direct allocation
|
page execute and read and write
|
||
2826000
|
direct allocation
|
page execute and read and write
|
||
617F000
|
heap
|
page read and write
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
6D8E000
|
stack
|
page read and write
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
96DF000
|
unkown
|
page read and write
|
||
7DF4E6780000
|
unkown
|
page readonly
|
||
10003000
|
unkown
|
page read and write
|
||
6D59000
|
trusted library allocation
|
page read and write
|
||
3AEC000
|
trusted library allocation
|
page read and write
|
||
935C000
|
stack
|
page read and write
|
||
7FF5DF0C9000
|
unkown
|
page readonly
|
||
218E000
|
stack
|
page read and write
|
||
3106000
|
direct allocation
|
page execute and read and write
|
||
1390000
|
heap
|
page read and write
|
||
360F000
|
heap
|
page read and write
|
||
E80000
|
system
|
page execute and read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
6BDC000
|
stack
|
page read and write
|
||
86C2000
|
heap
|
page read and write
|
||
D16000
|
trusted library allocation
|
page execute and read and write
|
||
83F000
|
heap
|
page read and write
|
||
670E000
|
stack
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
5691000
|
trusted library allocation
|
page read and write
|
||
989F000
|
unkown
|
page read and write
|
||
6B1E000
|
heap
|
page read and write
|
||
512D000
|
stack
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
3281000
|
stack
|
page read and write
|
||
73C3000
|
unkown
|
page read and write
|
||
2F7D000
|
trusted library allocation
|
page execute and read and write
|
||
73AF000
|
unkown
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
3E01000
|
direct allocation
|
page execute and read and write
|
||
7910000
|
unkown
|
page readonly
|
||
10D0000
|
heap
|
page read and write
|
||
267E000
|
trusted library allocation
|
page read and write
|
||
7FF5DF507000
|
unkown
|
page readonly
|
||
49A6000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
61CC000
|
stack
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
287C000
|
stack
|
page read and write
|
||
10FA000
|
unclassified section
|
page execute and read and write
|
||
1274000
|
trusted library allocation
|
page read and write
|
||
1787000
|
trusted library allocation
|
page execute and read and write
|
||
EE71000
|
unkown
|
page read and write
|
||
2CCF000
|
unkown
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page execute and read and write
|
||
5448000
|
heap
|
page read and write
|
||
337C000
|
trusted library allocation
|
page read and write
|
||
A80000
|
trusted library allocation
|
page execute and read and write
|
||
CCE000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
C359000
|
unkown
|
page read and write
|
||
BFDF000
|
unkown
|
page read and write
|
||
7FF5DEFF5000
|
unkown
|
page readonly
|
||
A744000
|
unkown
|
page read and write
|
||
A758000
|
unkown
|
page read and write
|
||
3028000
|
heap
|
page read and write
|
||
7DE000
|
heap
|
page read and write
|
||
51D2000
|
direct allocation
|
page execute and read and write
|
||
10370000
|
system
|
page execute and read and write
|
||
2F80000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
4DF6000
|
trusted library allocation
|
page read and write
|
||
6080000
|
heap
|
page read and write
|
||
C18A000
|
unkown
|
page read and write
|
||
2FA5000
|
heap
|
page read and write
|
||
D22000
|
trusted library allocation
|
page read and write
|
||
682E000
|
stack
|
page read and write
|
||
437A000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
unkown
|
page read and write
|
||
2FDD000
|
heap
|
page read and write
|
||
7910000
|
unkown
|
page readonly
|
||
B1C0000
|
unkown
|
page readonly
|
||
4DFD000
|
stack
|
page read and write
|
||
4AD5000
|
trusted library allocation
|
page read and write
|
||
AEEE000
|
stack
|
page read and write
|
||
310D000
|
direct allocation
|
page execute and read and write
|
||
63B0000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
2A01000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
7FF5DE4F2000
|
unkown
|
page readonly
|
||
2AB5000
|
heap
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
BF9F000
|
unkown
|
page read and write
|
||
A00000
|
trusted library allocation
|
page read and write
|
||
4CDC000
|
heap
|
page read and write
|
||
BF7E000
|
unkown
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
EE71000
|
unkown
|
page read and write
|
||
34CA000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
7FF5DF3A1000
|
unkown
|
page readonly
|
||
7FF5DF626000
|
unkown
|
page readonly
|
||
7FBE0000
|
trusted library allocation
|
page execute and read and write
|
||
3147000
|
heap
|
page read and write
|
||
5D9C000
|
stack
|
page read and write
|
||
BFC3000
|
unkown
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
BF10000
|
unkown
|
page readonly
|
||
83E0000
|
unkown
|
page read and write
|
||
6BF000
|
heap
|
page read and write
|
||
7FF5DEF94000
|
unkown
|
page readonly
|
||
7FF5DF4EC000
|
unkown
|
page readonly
|
||
1080000
|
unclassified section
|
page execute and read and write
|
||
9F0000
|
heap
|
page read and write
|
||
65EF000
|
stack
|
page read and write
|
||
9F23000
|
unkown
|
page read and write
|
||
5A4E000
|
stack
|
page read and write
|
||
7FF5DF4F3000
|
unkown
|
page readonly
|
||
7FF5DF2E5000
|
unkown
|
page readonly
|
||
9F60000
|
unkown
|
page read and write
|
||
7FF5DF5CC000
|
unkown
|
page readonly
|
||
2EAE000
|
stack
|
page read and write
|
||
7FF5DF029000
|
unkown
|
page readonly
|
||
7FF5DF3C2000
|
unkown
|
page readonly
|
||
3590000
|
heap
|
page read and write
|
||
130000
|
system
|
page execute and read and write
|
||
34E0000
|
trusted library allocation
|
page read and write
|
||
2ACD000
|
direct allocation
|
page execute and read and write
|
||
D10000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
AFFC000
|
stack
|
page read and write
|
||
C187000
|
unkown
|
page read and write
|
||
30B0000
|
direct allocation
|
page execute and read and write
|
||
3164000
|
unclassified section
|
page execute and read and write
|
||
34C0000
|
unkown
|
page read and write
|
||
D37000
|
stack
|
page read and write
|
||
ABC000
|
stack
|
page read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
50FD000
|
heap
|
page read and write
|
||
5F4E000
|
stack
|
page read and write
|
||
817000
|
trusted library allocation
|
page execute and read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
trusted library allocation
|
page execute and read and write
|
There are 3764 hidden memdumps, click here to show them.