Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PDFixers.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\5IQBCSP1\css2[1].css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\96LGQ1XY\email-decode.min[1].js
|
HTML document, ASCII text, with very long lines (1238)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GO30WR0E\LZ9DK265.htm
|
HTML document, ASCII text, with very long lines (10298), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GO30WR0E\Q33AJR2N.htm
|
HTML document, ASCII text, with very long lines (10298), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NB937L4Q\font[1].eot
|
Embedded OpenType (EOT), Nunito Sans 12pt Light family
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 16:40:54 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 16:40:54 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 16:40:54 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 16:40:54 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 16:40:54 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-settings.txt
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\Desktop\SumatraPDF.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Apr 25 16:39:42
2024, mtime=Thu Apr 25 16:39:42 2024, atime=Wed Oct 25 05:17:54 2023, length=16065496, window=hide
|
dropped
|
||
Chrome Cache Entry: 117
|
ASCII text, with very long lines (1746)
|
downloaded
|
||
Chrome Cache Entry: 118
|
ASCII text, with very long lines (772)
|
downloaded
|
||
Chrome Cache Entry: 119
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 120
|
ASCII text, with very long lines (65531)
|
downloaded
|
||
Chrome Cache Entry: 121
|
ASCII text, with very long lines (3572), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 122
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 123
|
ASCII text, with very long lines (2124)
|
downloaded
|
There are 13 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PDFixers.exe
|
"C:\Users\user\Desktop\PDFixers.exe"
|
||
C:\Users\user\Desktop\PDFixers.exe
|
"C:\Users\user\Desktop\PDFixers.exe"
|
||
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe
|
"C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe"
|
||
C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe
|
"C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-3.5.2-64.exe"
|
||
C:\Windows\System32\notepad.exe
|
notepad.exe "C:\Users\user\AppData\Roaming\SumatraPDF\SumatraPDF-settings.txt"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=1992,i,2968757234271921919,11434174678257635975,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.sumatrapdfreader.org/settings/settings3-5-1.html8.33
|
unknown
|
||
http://www.broofa.com
|
unknown
|
||
https://www.sumatrapdfreader.org/manualArialwebsiteArial
|
unknown
|
||
https://github.com/sumatrapdfreader/sumatrapdf/discussions/2316
|
unknown
|
||
https://scripts.sil.org/OFLNunitoSans12pt-LightVersion
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
https://scripts.sil.org/OFLNunito
|
unknown
|
||
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
|
unknown
|
||
http://docs.oasis-open.org/ns/office/1.2/meta/odf#StylesFile
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.gribuser.ru/xml/fictionbook/2.0
|
unknown
|
||
https://github.com/Fonthausen/NunitoSans))
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-s
|
unknown
|
||
https://pixel.pdfixers.com/5
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js.J
|
unknown
|
||
https://scripts.sil.org/OFL
|
unknown
|
||
https://pixel.pdfixers.com/&T
|
unknown
|
||
https://www.sumatrapdfreader.org/dl/prerel/PRE_RELEASE_VER/SumatraPDF-prerel
|
unknown
|
||
https://www.sumatrapdfreader.org/update-check-rel.txtnotifUpdateCheckInProgress
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
https://www.sumatrapdfreader.org/docs/Keyboard-shortcutssumatrapdfrestrict.inihttps://www.sumatrapdf
|
unknown
|
||
https://pixel.pdfixers.com/#
|
unknown
|
||
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
|
142.251.15.104
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
https://www.sumatrapdfreader.org/dl/rel/SumatraPDF-3.5.2-64.pdb.lzsa%
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.sumatrapdfreader.org/docs/Version-history.html
|
unknown
|
||
https://pixel.pdfixers.com/(
|
unknown
|
||
http://www.daisy.org/z3986/2005/ncx/
|
unknown
|
||
https://pixel.pdfixers.com
|
unknown
|
||
https://pixel.pdfixers.com/-
|
unknown
|
||
http://www.idpf.org/2007/opfapplication/xhtml
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsQ
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsG
|
unknown
|
||
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
|
unknown
|
||
https://github.com/sumatrapdfreader/sumatrapdf/commit/646d1feddcc80b3b51072c5b27a1446487904175)
|
unknown
|
||
http://docs.oasis-open.org/ns/office/1.2/meta/pkg#Document
|
unknown
|
||
https://www.sumatrapdfreader.org/download-free-pdf-viewer-------------
|
unknown
|
||
https://www.sumatrapdfreader.org/settings/settings3-5-1.html
|
unknown
|
||
https://github.com/sumatrapdfreader/sumatrapdf/blob/master/AUTHORShttps://github.com/sumatrapdfreade
|
unknown
|
||
https://pixel.pdfixers.com/6R
|
unknown
|
||
https://www.sumatrapdfreader.org/update-check-rel.txt
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
https://plus.google.com
|
unknown
|
||
https://play.google.com/log?format=json&hasfast=true
|
unknown
|
||
http://www.fontbureau.com/designers/frere-jones.html
|
unknown
|
||
https://pixel.pdfixers.com/#q_
|
unknown
|
||
https://pixel.pdfixers.com/fR
|
unknown
|
||
https://sumatra-website.onrender.com/update-check-rel.txtInstaller64LatestInstaller32InstallerArm64P
|
unknown
|
||
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SCWmpDDGjPk.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo_Pl64J0IIHlj2zBtEJ3ZwdaJC3HA/cb=gapi.loaded_0
|
142.250.105.113
|
||
https://www.sumatrapdfreader.org/docs/Corrupted-installation
|
unknown
|
||
https://www.sumatrapdfreader.org/docs/Submit-crash-report.html
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js.
|
unknown
|
||
https://pixel.pdfixers.com/...
|
unknown
|
||
https://www.sumatrapdfreader.org/URLUpdateInfohttps://www.sumatrapdfreader.org/docs/Version-history.
|
unknown
|
||
https://www.sumatrapdfreader.org/settings/settings3-5-1.htmlH
|
unknown
|
||
https://www.deepl.com/translator#-/$
|
unknown
|
||
https://clients6.google.com
|
unknown
|
||
https://pixel.pdfixers.com/...p
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js%
|
unknown
|
||
https://www.sumatrapdfreader.org/download-free-pdf-viewer
|
unknown
|
||
http://www.idpf.org/2007/opf
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-sail-decode.min.jsnC:
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://docs.oasis-open.org/ns/office/1.2/meta/odf#ContentFile
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
https://github.com/sumatrapdfreader/sumatrapdf/blob/master/AUTHORS
|
unknown
|
||
https://www.sumatrapdfreader.org/docs/Contribute-translation
|
unknown
|
||
http://fontfabrik.com
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsJj
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsy
|
unknown
|
||
https://www.sumatrapdfreader.org/dl/rel/SumatraPDF-3.5.2
|
unknown
|
||
https://www.sumatrapdfreader.org0
|
unknown
|
||
https://www.sumatrapdfreader.org/
|
unknown
|
||
https://csp.withgoogle.com/csp/lcreport/
|
unknown
|
||
https://github.com/Fonthausen/NunitoSans)Thread-0000162c-Id-00000000:SubsetRegularVersion
|
unknown
|
||
https://pixel.pdfixers.com/vRZ
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/l/email-protection
|
unknown
|
||
https://www.sumatrapdfreader.org/dl/rel/SumatraPDF-3.5.2-64.pdb.lzsaM.$
|
unknown
|
||
https://www.sumatrapdfreader.org/docs/Keyboard-shortcuts
|
unknown
|
||
https://://https://translate.google.com/?op=translate&sl=auto&tl=$
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsjs
|
unknown
|
||
https://apis.google.com
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsa
|
unknown
|
||
https://domains.google.com/suggest/flow
|
unknown
|
||
https://pixel.pdfixers.com/cdn-cgi/l/email-protectionO~
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pixel.pdfixers.com
|
172.67.147.142
|
||
plus.l.google.com
|
142.250.105.113
|
||
www.google.com
|
142.251.15.104
|
||
apis.google.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.17
|
unknown
|
unknown
|
||
142.250.105.113
|
plus.l.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
172.67.147.142
|
pixel.pdfixers.com
|
United States
|
||
142.251.15.104
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SumatraPDFUninstall
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SumatraPDFUninstall
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
|
MRUListEx
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
|
1
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
|
NodeSlot
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
|
MRUListEx
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\Shell
|
SniffedFolderType
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe%5Cresources.pri\1d5ad0dfbb57c2e\b258eb92
|
@{microsoft.windows.photos_2019.19071.12548.0_x64__8wekyb3d8bbwe?ms-resource://microsoft.windows.photos/files/assets/photoslogoextensions.png}
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
Mode
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
LogicalViewMode
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
FFlags
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
IconSize
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
Sort
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
ColInfo
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
GroupView
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
GroupByKey:FMTID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
GroupByKey:PID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
GroupByDirection
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
|
2
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\2
|
NodeSlot
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\2
|
MRUListEx
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\Shell
|
SniffedFolderType
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CIDOpen\Modules\GlobalSettings\ProperTreeModuleInner
|
ProperTreeModuleInner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
|
0
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\pdf
|
0
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\pdf
|
MRUListEx
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
|
0
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
|
MRUListEx
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
|
0
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
|
0
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
|
MRUListEx
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
|
Mode
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
|
LogicalViewMode
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
|
FFlags
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
|
IconSize
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
|
Sort
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
|
ColInfo
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
|
GroupView
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
|
GroupByKey:FMTID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
|
GroupByKey:PID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
|
GroupByDirection
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
|
MRUListEx
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
|
MRUListEx
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
|
NodeSlots
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
|
FFlags
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
|
MRUListEx
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
|
NodeSlots
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
|
MRUListEx
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
|
FFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fWindowsOnlyEOL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fPasteOriginalEOL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fReverse
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fWrapAround
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fMatchCase
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
iWindowPosX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
iWindowPosY
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
iWindowPosDX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
iWindowPosDY
|
There are 48 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
261E4E09000
|
heap
|
page read and write
|
||
1E53495F000
|
heap
|
page read and write
|
||
1E1D8A12000
|
heap
|
page read and write
|
||
2A342E7D000
|
trusted library allocation
|
page read and write
|
||
261DF5FF000
|
heap
|
page read and write
|
||
261DF4B2000
|
heap
|
page read and write
|
||
261DF6A6000
|
heap
|
page read and write
|
||
2A3277D5000
|
heap
|
page read and write
|
||
1E1E04F6000
|
heap
|
page read and write
|
||
261DF4F9000
|
heap
|
page read and write
|
||
261DDA58000
|
heap
|
page read and write
|
||
261DDA6F000
|
heap
|
page read and write
|
||
261DF5EE000
|
heap
|
page read and write
|
||
261DF4C1000
|
heap
|
page read and write
|
||
1E1D9A30000
|
heap
|
page read and write
|
||
2AB472BB000
|
heap
|
page read and write
|
||
1D9BB520000
|
heap
|
page read and write
|
||
1E5349E0000
|
heap
|
page read and write
|
||
E16BFFE000
|
stack
|
page read and write
|
||
1E534A60000
|
heap
|
page read and write
|
||
261DF60F000
|
heap
|
page read and write
|
||
261E4E2C000
|
heap
|
page read and write
|
||
261DF611000
|
heap
|
page read and write
|
||
2AB438C0000
|
trusted library allocation
|
page read and write
|
||
7FF9CB5A0000
|
trusted library allocation
|
page read and write
|
||
261DF51E000
|
heap
|
page read and write
|
||
1E53495E000
|
heap
|
page read and write
|
||
261DF70A000
|
heap
|
page read and write
|
||
2A327430000
|
heap
|
page read and write
|
||
2AB49D5E000
|
heap
|
page read and write
|
||
261DDA75000
|
heap
|
page read and write
|
||
261DF5E7000
|
heap
|
page read and write
|
||
261DDA3E000
|
heap
|
page read and write
|
||
261DF4E8000
|
heap
|
page read and write
|
||
1E5349E5000
|
heap
|
page read and write
|
||
7FF9CB470000
|
trusted library allocation
|
page read and write
|
||
1D9B9B0E000
|
heap
|
page read and write
|
||
261DDA7F000
|
heap
|
page read and write
|
||
261DF622000
|
heap
|
page read and write
|
||
2A32928B000
|
trusted library allocation
|
page read and write
|
||
261DDA55000
|
heap
|
page read and write
|
||
1E534750000
|
heap
|
page read and write
|
||
261DF66C000
|
heap
|
page read and write
|
||
1D9B9AD0000
|
heap
|
page read and write
|
||
261DF6D0000
|
heap
|
page read and write
|
||
2AB47560000
|
heap
|
page read and write
|
||
1E532DEF000
|
heap
|
page read and write
|
||
261E33C2000
|
trusted library allocation
|
page read and write
|
||
261DF5E9000
|
heap
|
page read and write
|
||
261DDA4A000
|
heap
|
page read and write
|
||
ADC05FE000
|
stack
|
page read and write
|
||
1E1DB178000
|
trusted library allocation
|
page read and write
|
||
2AB483C8000
|
trusted library allocation
|
page read and write
|
||
2AB4E234000
|
heap
|
page read and write
|
||
1E1E219A000
|
heap
|
page read and write
|
||
1E534A02000
|
heap
|
page read and write
|
||
261DF6B9000
|
heap
|
page read and write
|
||
261DDA61000
|
heap
|
page read and write
|
||
261DF447000
|
heap
|
page read and write
|
||
261E1DAA000
|
heap
|
page read and write
|
||
1E532DA6000
|
heap
|
page read and write
|
||
261DF6FC000
|
heap
|
page read and write
|
||
261DF594000
|
heap
|
page read and write
|
||
7FF9CD450000
|
trusted library allocation
|
page read and write
|
||
261E1D8C000
|
heap
|
page read and write
|
||
261DDAAC000
|
heap
|
page read and write
|
||
261DF5BB000
|
heap
|
page read and write
|
||
261DF4DE000
|
heap
|
page read and write
|
||
22F32E68000
|
heap
|
page read and write
|
||
2AB43930000
|
trusted library allocation
|
page read and write
|
||
261DF598000
|
heap
|
page read and write
|
||
22F347C5000
|
heap
|
page read and write
|
||
2AB48438000
|
trusted library allocation
|
page read and write
|
||
2A32746A000
|
heap
|
page read and write
|
||
261DDA55000
|
heap
|
page read and write
|
||
ADC09FE000
|
stack
|
page read and write
|
||
261DF5B9000
|
heap
|
page read and write
|
||
261DF70E000
|
heap
|
page read and write
|
||
261DF65A000
|
heap
|
page read and write
|
||
1E534940000
|
heap
|
page read and write
|
||
261DDA7F000
|
heap
|
page read and write
|
||
261DF62F000
|
heap
|
page read and write
|
||
2A3419A0000
|
trusted library allocation
|
page read and write
|
||
2A329217000
|
trusted library allocation
|
page read and write
|
||
1E1D9939000
|
heap
|
page read and write
|
||
E16D7FD000
|
stack
|
page read and write
|
||
7FF9CB386000
|
trusted library allocation
|
page read and write
|
||
ADC1DFD000
|
stack
|
page read and write
|
||
2AB48460000
|
trusted library allocation
|
page read and write
|
||
1D9D5C30000
|
trusted library allocation
|
page read and write
|
||
261DDA5E000
|
heap
|
page read and write
|
||
1D9CB631000
|
trusted library allocation
|
page read and write
|
||
7FF9CB2ED000
|
trusted library allocation
|
page execute and read and write
|
||
2A342F3E000
|
trusted library allocation
|
page read and write
|
||
1E1DA130000
|
heap
|
page read and write
|
||
261DD9C4000
|
heap
|
page read and write
|
||
261DDA72000
|
heap
|
page read and write
|
||
261DF66F000
|
heap
|
page read and write
|
||
261DF566000
|
heap
|
page read and write
|
||
2A327499000
|
heap
|
page read and write
|
||
261DF4B9000
|
heap
|
page read and write
|
||
261DDA58000
|
heap
|
page read and write
|
||
1E1D9981000
|
heap
|
page read and write
|
||
261DF4BD000
|
heap
|
page read and write
|
||
2A3273C0000
|
heap
|
page read and write
|
||
2AB49BA4000
|
heap
|
page read and write
|
||
261DF4F2000
|
heap
|
page read and write
|
||
261DF4CD000
|
heap
|
page read and write
|
||
261DF488000
|
heap
|
page read and write
|
||
2AB47015000
|
heap
|
page read and write
|
||
261DDA6C000
|
heap
|
page read and write
|
||
261DF4C4000
|
heap
|
page read and write
|
||
2AB438D1000
|
trusted library allocation
|
page read and write
|
||
7FF4C9B10000
|
trusted library allocation
|
page execute and read and write
|
||
2A341C72000
|
heap
|
page read and write
|
||
261E1DA9000
|
heap
|
page read and write
|
||
261DF470000
|
heap
|
page read and write
|
||
261E1D9A000
|
heap
|
page read and write
|
||
261E1DEE000
|
heap
|
page read and write
|
||
1E534930000
|
heap
|
page read and write
|
||
1E534BDE000
|
heap
|
page read and write
|
||
1E5349ED000
|
heap
|
page read and write
|
||
261DF444000
|
heap
|
page read and write
|
||
261DF4CA000
|
heap
|
page read and write
|
||
2AB49A6A000
|
heap
|
page read and write
|
||
261DF2D0000
|
heap
|
page read and write
|
||
261DF4E0000
|
heap
|
page read and write
|
||
261DD91D000
|
heap
|
page read and write
|
||
261DF42E000
|
heap
|
page read and write
|
||
E16C3FE000
|
stack
|
page read and write
|
||
1E5349CA000
|
heap
|
page read and write
|
||
2A341C0F000
|
heap
|
page read and write
|
||
1E534BDC000
|
heap
|
page read and write
|
||
261DDA99000
|
heap
|
page read and write
|
||
261DF572000
|
heap
|
page read and write
|
||
1E534920000
|
heap
|
page read and write
|
||
261DD910000
|
heap
|
page read and write
|
||
261DF5A0000
|
heap
|
page read and write
|
||
1E1DCE4D000
|
heap
|
page read and write
|
||
7FF9CD18D000
|
trusted library allocation
|
page execute and read and write
|
||
1E1D9A29000
|
heap
|
page read and write
|
||
1E1DCAD2000
|
heap
|
page read and write
|
||
2AB4841C000
|
trusted library allocation
|
page read and write
|
||
1E534A17000
|
heap
|
page read and write
|
||
261DF5EC000
|
heap
|
page read and write
|
||
2AB437B0000
|
heap
|
page execute and read and write
|
||
2AB47226000
|
heap
|
page read and write
|
||
D13D9F8000
|
stack
|
page read and write
|
||
1D9D403B000
|
heap
|
page read and write
|
||
261DF4AA000
|
heap
|
page read and write
|
||
261DD9FF000
|
heap
|
page read and write
|
||
1E1D97F4000
|
heap
|
page read and write
|
||
261DF536000
|
heap
|
page read and write
|
||
1E5349BA000
|
heap
|
page read and write
|
||
7FF9CD300000
|
trusted library allocation
|
page read and write
|
||
22F32ED1000
|
heap
|
page read and write
|
||
2AB46BC2000
|
heap
|
page read and write
|
||
261DF598000
|
heap
|
page read and write
|
||
1E1D8960000
|
heap
|
page read and write
|
||
261DDA98000
|
heap
|
page read and write
|
||
261DF4E6000
|
heap
|
page read and write
|
||
261DF45F000
|
heap
|
page read and write
|
||
261DF54C000
|
heap
|
page read and write
|
||
261E1D8C000
|
heap
|
page read and write
|
||
2AB47AA6000
|
trusted library allocation
|
page read and write
|
||
261DF425000
|
heap
|
page read and write
|
||
1D9D42CD000
|
heap
|
page read and write
|
||
2AB472B3000
|
heap
|
page read and write
|
||
261DF50B000
|
heap
|
page read and write
|
||
261DF66A000
|
heap
|
page read and write
|
||
261DDA89000
|
heap
|
page read and write
|
||
261DF5EC000
|
heap
|
page read and write
|
||
261DF6B1000
|
heap
|
page read and write
|
||
22F32ED3000
|
heap
|
page read and write
|
||
261E1DFD000
|
heap
|
page read and write
|
||
1E1D8A07000
|
heap
|
page read and write
|
||
261DF5CA000
|
heap
|
page read and write
|
||
261DF49F000
|
heap
|
page read and write
|
||
2A341BEB000
|
heap
|
page read and write
|
||
261DDA38000
|
heap
|
page read and write
|
||
261DF47A000
|
heap
|
page read and write
|
||
261E1DA4000
|
heap
|
page read and write
|
||
261DF5D3000
|
heap
|
page read and write
|
||
7FF771700000
|
unkown
|
page readonly
|
||
1E5352DB000
|
heap
|
page read and write
|
||
261DF3D0000
|
unkown
|
page read and write
|
||
1E1D99A5000
|
heap
|
page read and write
|
||
D13DDF8000
|
stack
|
page read and write
|
||
1E5349A1000
|
heap
|
page read and write
|
||
D13D7FA000
|
stack
|
page read and write
|
||
261DDA7F000
|
heap
|
page read and write
|
||
261E1DA3000
|
heap
|
page read and write
|
||
261DF642000
|
heap
|
page read and write
|
||
1E53499C000
|
heap
|
page read and write
|
||
7FF9CD216000
|
trusted library allocation
|
page read and write
|
||
1E532CA0000
|
heap
|
page read and write
|
||
2AB4F673000
|
heap
|
page read and write
|
||
261DF69F000
|
heap
|
page read and write
|
||
261E1DFA000
|
heap
|
page read and write
|
||
261DDA36000
|
heap
|
page read and write
|
||
261DF578000
|
heap
|
page read and write
|
||
261DF4D7000
|
heap
|
page read and write
|
||
1E1E21C8000
|
heap
|
page read and write
|
||
2A3419E6000
|
heap
|
page execute and read and write
|
||
261E4E37000
|
heap
|
page read and write
|
||
1E1D99A7000
|
heap
|
page read and write
|
||
261E1D9F000
|
heap
|
page read and write
|
||
7FF9CB2D4000
|
trusted library allocation
|
page read and write
|
||
261DF679000
|
heap
|
page read and write
|
||
261DF6F8000
|
heap
|
page read and write
|
||
261DF6FC000
|
heap
|
page read and write
|
||
261DF523000
|
heap
|
page read and write
|
||
261E4E36000
|
heap
|
page read and write
|
||
E16C7FD000
|
stack
|
page read and write
|
||
261E1DA2000
|
heap
|
page read and write
|
||
1E1D9BB0000
|
trusted library allocation
|
page read and write
|
||
1E532E21000
|
heap
|
page read and write
|
||
261E31F0000
|
heap
|
page read and write
|
||
2A327497000
|
heap
|
page read and write
|
||
2A3278E0000
|
heap
|
page read and write
|
||
7FF772520000
|
unkown
|
page read and write
|
||
261DDA7C000
|
heap
|
page read and write
|
||
1E1D9929000
|
heap
|
page read and write
|
||
1E1E20C8000
|
heap
|
page read and write
|
||
2AB4F654000
|
heap
|
page read and write
|
||
1E1E2214000
|
heap
|
page read and write
|
||
261DF6C9000
|
heap
|
page read and write
|
||
261DF5C5000
|
heap
|
page read and write
|
||
261DF4BD000
|
heap
|
page read and write
|
||
1D9D5330000
|
heap
|
page read and write
|
||
261DF4AB000
|
heap
|
page read and write
|
||
261E1D8E000
|
heap
|
page read and write
|
||
261E1DA8000
|
heap
|
page read and write
|
||
261DF5CA000
|
heap
|
page read and write
|
||
261DF5E0000
|
heap
|
page read and write
|
||
261E4EB8000
|
heap
|
page read and write
|
||
2AB4714B000
|
heap
|
page read and write
|
||
261DF5F7000
|
heap
|
page read and write
|
||
261DDA77000
|
heap
|
page read and write
|
||
D13E0FE000
|
stack
|
page read and write
|
||
1E1D99D9000
|
heap
|
page read and write
|
||
2AB46BBD000
|
heap
|
page read and write
|
||
7FF9CB390000
|
trusted library allocation
|
page execute and read and write
|
||
261DF5EC000
|
heap
|
page read and write
|
||
261DF6B9000
|
heap
|
page read and write
|
||
261DF6AC000
|
heap
|
page read and write
|
||
1E53496D000
|
heap
|
page read and write
|
||
261DF62A000
|
heap
|
page read and write
|
||
1E534956000
|
heap
|
page read and write
|
||
261DF5F6000
|
heap
|
page read and write
|
||
1E1E0410000
|
heap
|
page read and write
|
||
261DF49E000
|
heap
|
page read and write
|
||
261DDA99000
|
heap
|
page read and write
|
||
E16EFFB000
|
stack
|
page read and write
|
||
261DF4D1000
|
heap
|
page read and write
|
||
261DF55D000
|
heap
|
page read and write
|
||
261DDA62000
|
heap
|
page read and write
|
||
2AB43820000
|
heap
|
page read and write
|
||
1E532D69000
|
heap
|
page read and write
|
||
ADC56EE000
|
stack
|
page read and write
|
||
261DF4E2000
|
heap
|
page read and write
|
||
261DDA5A000
|
heap
|
page read and write
|
||
261DF66F000
|
heap
|
page read and write
|
||
261DF310000
|
heap
|
page read and write
|
||
BC932FE000
|
stack
|
page read and write
|
||
7FF9CD410000
|
trusted library allocation
|
page read and write
|
||
2A341926000
|
heap
|
page read and write
|
||
261DF6E4000
|
heap
|
page read and write
|
||
261DD9B0000
|
heap
|
page read and write
|
||
261DF4CA000
|
heap
|
page read and write
|
||
261DDAA7000
|
heap
|
page read and write
|
||
1E1D9AF7000
|
heap
|
page read and write
|
||
261E1D7E000
|
heap
|
page read and write
|
||
2AB4718E000
|
heap
|
page read and write
|
||
261E1DFE000
|
heap
|
page read and write
|
||
1E534A30000
|
trusted library section
|
page readonly
|
||
261E1D92000
|
heap
|
page read and write
|
||
2A342E70000
|
trusted library allocation
|
page read and write
|
||
1E1E050C000
|
heap
|
page read and write
|
||
1D9D4230000
|
heap
|
page read and write
|
||
1E1D9A18000
|
heap
|
page read and write
|
||
261E4E98000
|
heap
|
page read and write
|
||
22F32EBC000
|
heap
|
page read and write
|
||
261DF618000
|
heap
|
page read and write
|
||
261DF5FE000
|
heap
|
page read and write
|
||
261DF4AA000
|
heap
|
page read and write
|
||
261DF575000
|
heap
|
page read and write
|
||
261DF611000
|
heap
|
page read and write
|
||
1E1D9C6A000
|
trusted library allocation
|
page read and write
|
||
22F34873000
|
heap
|
page read and write
|
||
1E1E0553000
|
heap
|
page read and write
|
||
261DF6BB000
|
heap
|
page read and write
|
||
261E1E07000
|
heap
|
page read and write
|
||
261DF529000
|
heap
|
page read and write
|
||
2A34303A000
|
trusted library allocation
|
page read and write
|
||
2AB47163000
|
heap
|
page read and write
|
||
261DF4DB000
|
heap
|
page read and write
|
||
1E1D99D5000
|
heap
|
page read and write
|
||
261DF5EE000
|
heap
|
page read and write
|
||
1E5349DA000
|
heap
|
page read and write
|
||
261DF45D000
|
heap
|
page read and write
|
||
261E1D9D000
|
heap
|
page read and write
|
||
261DDA6A000
|
heap
|
page read and write
|
||
1D9D3EB8000
|
trusted library allocation
|
page read and write
|
||
2AB475D3000
|
heap
|
page read and write
|
||
2A341B90000
|
heap
|
page read and write
|
||
1E1DCA80000
|
heap
|
page read and write
|
||
2AB470F1000
|
heap
|
page read and write
|
||
ADC3EEE000
|
stack
|
page read and write
|
||
7FF9CB2E2000
|
trusted library allocation
|
page read and write
|
||
E170FFE000
|
stack
|
page read and write
|
||
2AB4716C000
|
heap
|
page read and write
|
||
D13DEFE000
|
stack
|
page read and write
|
||
7FF771E23000
|
unkown
|
page readonly
|
||
261E4EB7000
|
heap
|
page read and write
|
||
2A327910000
|
heap
|
page read and write
|
||
261DDA8D000
|
heap
|
page read and write
|
||
2AB47277000
|
heap
|
page read and write
|
||
2AB438B0000
|
trusted library allocation
|
page read and write
|
||
7FF9CB570000
|
trusted library allocation
|
page read and write
|
||
261DF5F2000
|
heap
|
page read and write
|
||
1E1E20C5000
|
heap
|
page read and write
|
||
261DF4F0000
|
heap
|
page read and write
|
||
1E1E2225000
|
heap
|
page read and write
|
||
261E1DFD000
|
heap
|
page read and write
|
||
1D9BB5F0000
|
heap
|
page execute and read and write
|
||
FAE32FE000
|
stack
|
page read and write
|
||
1D9D5BE8000
|
trusted library allocation
|
page read and write
|
||
261DDA6A000
|
heap
|
page read and write
|
||
261DF4F9000
|
heap
|
page read and write
|
||
2AB4719C000
|
heap
|
page read and write
|
||
261DF4E8000
|
heap
|
page read and write
|
||
261DDA67000
|
heap
|
page read and write
|
||
2A3277B0000
|
trusted library allocation
|
page read and write
|
||
261DF53C000
|
heap
|
page read and write
|
||
E16FBFD000
|
stack
|
page read and write
|
||
261DF448000
|
heap
|
page read and write
|
||
261DF6DD000
|
heap
|
page read and write
|
||
1E5349A7000
|
heap
|
page read and write
|
||
7FF9CB2D2000
|
trusted library allocation
|
page read and write
|
||
261DF6E9000
|
heap
|
page read and write
|
||
1E1DBC4B000
|
trusted library allocation
|
page read and write
|
||
2AB470CC000
|
heap
|
page read and write
|
||
22F32E6A000
|
heap
|
page read and write
|
||
7FF9CD220000
|
trusted library allocation
|
page execute and read and write
|
||
261DF6B9000
|
heap
|
page read and write
|
||
2AB46BC8000
|
heap
|
page read and write
|
||
2AB49AE4000
|
heap
|
page read and write
|
||
7FF9CB38C000
|
trusted library allocation
|
page execute and read and write
|
||
1E1D97A2000
|
heap
|
page read and write
|
||
2AB4E24F000
|
heap
|
page read and write
|
||
2A3291C0000
|
heap
|
page execute and read and write
|
||
2A342E8D000
|
trusted library allocation
|
page read and write
|
||
7FF9CD430000
|
trusted library allocation
|
page read and write
|
||
261DDA8D000
|
heap
|
page read and write
|
||
2A342D81000
|
heap
|
page read and write
|
||
261DF6C2000
|
heap
|
page read and write
|
||
1D9B9AA5000
|
heap
|
page read and write
|
||
1E532E25000
|
heap
|
page read and write
|
||
261E1DF8000
|
heap
|
page read and write
|
||
1E1D99F5000
|
heap
|
page read and write
|
||
261DDA4B000
|
heap
|
page read and write
|
||
261E4E21000
|
heap
|
page read and write
|
||
261DF5F2000
|
heap
|
page read and write
|
||
261DF5F1000
|
heap
|
page read and write
|
||
2A342FCA000
|
trusted library allocation
|
page read and write
|
||
261DF48D000
|
heap
|
page read and write
|
||
261DF57C000
|
heap
|
page read and write
|
||
7FF9CD3FB000
|
trusted library allocation
|
page read and write
|
||
2AB47037000
|
heap
|
page read and write
|
||
261DF5EA000
|
heap
|
page read and write
|
||
261DF57F000
|
heap
|
page read and write
|
||
7FF9CB480000
|
trusted library allocation
|
page execute and read and write
|
||
1D9D40B4000
|
heap
|
page read and write
|
||
1E1E20A0000
|
heap
|
page read and write
|
||
261DF4F1000
|
heap
|
page read and write
|
||
1E1D9AAA000
|
heap
|
page read and write
|
||
261DDA58000
|
heap
|
page read and write
|
||
2AB49E18000
|
heap
|
page read and write
|
||
261DF69F000
|
heap
|
page read and write
|
||
1D9D5C41000
|
trusted library allocation
|
page read and write
|
||
1D9B9AA0000
|
heap
|
page read and write
|
||
1D9B9BCD000
|
heap
|
page read and write
|
||
1E534826000
|
heap
|
page read and write
|
||
7FF9CB2F0000
|
trusted library allocation
|
page read and write
|
||
7FF772549000
|
unkown
|
page read and write
|
||
1E5349CA000
|
heap
|
page read and write
|
||
261DF510000
|
heap
|
page read and write
|
||
E1707FC000
|
stack
|
page read and write
|
||
1E1D5F80000
|
trusted library allocation
|
page read and write
|
||
261DF5CC000
|
heap
|
page read and write
|
||
1D9D404E000
|
heap
|
page read and write
|
||
261DF5EC000
|
heap
|
page read and write
|
||
261DF5A3000
|
heap
|
page read and write
|
||
1E1E20B1000
|
heap
|
page read and write
|
||
22F347F0000
|
heap
|
page read and write
|
||
261E1560000
|
trusted library allocation
|
page read and write
|
||
261DDA53000
|
heap
|
page read and write
|
||
2A3418A7000
|
heap
|
page read and write
|
||
261E4E3F000
|
heap
|
page read and write
|
||
2AB476B5000
|
heap
|
page read and write
|
||
1D9B91EC000
|
unkown
|
page readonly
|
||
261DF632000
|
heap
|
page read and write
|
||
1E532E55000
|
heap
|
page read and write
|
||
261DF507000
|
heap
|
page read and write
|
||
2A329240000
|
trusted library allocation
|
page read and write
|
||
22F32EC8000
|
heap
|
page read and write
|
||
2AB47114000
|
heap
|
page read and write
|
||
2AB492A0000
|
trusted library allocation
|
page read and write
|
||
7FF772543000
|
unkown
|
page read and write
|
||
1E532E53000
|
heap
|
page read and write
|
||
261E1D7A000
|
heap
|
page read and write
|
||
1E1D97D9000
|
heap
|
page read and write
|
||
1D9D3E25000
|
heap
|
page read and write
|
||
1E1D9740000
|
heap
|
page read and write
|
||
7FF9CB380000
|
trusted library allocation
|
page read and write
|
||
261E1DFB000
|
heap
|
page read and write
|
||
261DF5B7000
|
heap
|
page read and write
|
||
2AB483A8000
|
trusted library allocation
|
page read and write
|
||
2A32744B000
|
heap
|
page read and write
|
||
1D9D4288000
|
heap
|
page read and write
|
||
1E5349CC000
|
heap
|
page read and write
|
||
261E1D82000
|
heap
|
page read and write
|
||
261DF4BA000
|
heap
|
page read and write
|
||
1E534972000
|
heap
|
page read and write
|
||
261DF4BD000
|
heap
|
page read and write
|
||
1D9D40D6000
|
heap
|
page read and write
|
||
2AB4712C000
|
heap
|
page read and write
|
||
261DF4C0000
|
heap
|
page read and write
|
||
261DDAA2000
|
heap
|
page read and write
|
||
261DDA55000
|
heap
|
page read and write
|
||
22F32EED000
|
heap
|
page read and write
|
||
261DF4D7000
|
heap
|
page read and write
|
||
261E2140000
|
trusted library section
|
page readonly
|
||
261DF497000
|
heap
|
page read and write
|
||
261DF49D000
|
heap
|
page read and write
|
||
2A341895000
|
heap
|
page read and write
|
||
1E532DB1000
|
heap
|
page read and write
|
||
1D9D5C74000
|
trusted library allocation
|
page read and write
|
||
2A32752E000
|
heap
|
page read and write
|
||
2AB470A8000
|
heap
|
page read and write
|
||
D13D8F8000
|
stack
|
page read and write
|
||
261DF5EE000
|
heap
|
page read and write
|
||
2A3418D8000
|
heap
|
page read and write
|
||
E16CBFF000
|
stack
|
page read and write
|
||
261DF410000
|
heap
|
page read and write
|
||
261DF508000
|
heap
|
page read and write
|
||
261DF5BF000
|
heap
|
page read and write
|
||
1E1D9B9D000
|
trusted library allocation
|
page read and write
|
||
7FF9CB590000
|
trusted library allocation
|
page read and write
|
||
1E534BDE000
|
heap
|
page read and write
|
||
261DF5D6000
|
heap
|
page read and write
|
||
1E53497C000
|
heap
|
page read and write
|
||
261DDA93000
|
heap
|
page read and write
|
||
1D9B91E2000
|
unkown
|
page readonly
|
||
261DF6F1000
|
heap
|
page read and write
|
||
261DD9E3000
|
heap
|
page read and write
|
||
1E1D99FE000
|
heap
|
page read and write
|
||
261DDA79000
|
heap
|
page read and write
|
||
2AB43848000
|
trusted library allocation
|
page read and write
|
||
261DDA56000
|
heap
|
page read and write
|
||
261DF5A0000
|
heap
|
page read and write
|
||
261E1D8E000
|
heap
|
page read and write
|
||
261DF508000
|
heap
|
page read and write
|
||
1E534A20000
|
unkown
|
page read and write
|
||
2AB493C1000
|
trusted library allocation
|
page read and write
|
||
261DDA93000
|
heap
|
page read and write
|
||
261DDAAD000
|
heap
|
page read and write
|
||
261DF6CC000
|
heap
|
page read and write
|
||
261DDA89000
|
heap
|
page read and write
|
||
261E1D9B000
|
heap
|
page read and write
|
||
261DF419000
|
heap
|
page read and write
|
||
261DDA55000
|
heap
|
page read and write
|
||
7FF9CB5B0000
|
trusted library allocation
|
page read and write
|
||
261E3235000
|
heap
|
page read and write
|
||
261DF45D000
|
heap
|
page read and write
|
||
1E1D899F000
|
heap
|
page read and write
|
||
7FF9CD160000
|
trusted library allocation
|
page read and write
|
||
261DF63C000
|
heap
|
page read and write
|
||
261DF507000
|
heap
|
page read and write
|
||
1E1D97A8000
|
heap
|
page read and write
|
||
261DF430000
|
heap
|
page read and write
|
||
261DF4CA000
|
heap
|
page read and write
|
||
1E1DB1AB000
|
trusted library allocation
|
page read and write
|
||
261DF670000
|
heap
|
page read and write
|
||
22F32E94000
|
heap
|
page read and write
|
||
1E1D9B1B000
|
heap
|
page read and write
|
||
1D9B99E2000
|
unkown
|
page readonly
|
||
261DF4C0000
|
heap
|
page read and write
|
||
261DF594000
|
heap
|
page read and write
|
||
261DF631000
|
heap
|
page read and write
|
||
1E532E50000
|
heap
|
page read and write
|
||
261DDA5F000
|
heap
|
page read and write
|
||
261DF61F000
|
heap
|
page read and write
|
||
261DF521000
|
heap
|
page read and write
|
||
261E1D9D000
|
heap
|
page read and write
|
||
7FF7725AF000
|
unkown
|
page readonly
|
||
1D9D5D10000
|
heap
|
page read and write
|
||
261DF4B3000
|
heap
|
page read and write
|
||
261DDA9E000
|
heap
|
page read and write
|
||
D13D6FE000
|
stack
|
page read and write
|
||
1D9B9BCB000
|
heap
|
page read and write
|
||
7FF9CD162000
|
trusted library allocation
|
page read and write
|
||
261E4E0A000
|
heap
|
page read and write
|
||
261DF45F000
|
heap
|
page read and write
|
||
1E1D986B000
|
heap
|
page read and write
|
||
1E534A00000
|
heap
|
page read and write
|
||
E1703FC000
|
stack
|
page read and write
|
||
261E1DF8000
|
heap
|
page read and write
|
||
1D9D5BC8000
|
trusted library allocation
|
page read and write
|
||
1E5349F2000
|
heap
|
page read and write
|
||
261DF2D6000
|
heap
|
page read and write
|
||
2AB476B1000
|
heap
|
page read and write
|
||
261DF6E8000
|
heap
|
page read and write
|
||
2AB47A86000
|
trusted library allocation
|
page read and write
|
||
261DF568000
|
heap
|
page read and write
|
||
261DDA67000
|
heap
|
page read and write
|
||
261DF4F1000
|
heap
|
page read and write
|
||
1E5349EC000
|
heap
|
page read and write
|
||
261DF682000
|
heap
|
page read and write
|
||
2A342D70000
|
heap
|
page read and write
|
||
261DDA5C000
|
heap
|
page read and write
|
||
261E1E03000
|
heap
|
page read and write
|
||
1D9B9B10000
|
heap
|
page read and write
|
||
261DDA97000
|
heap
|
page read and write
|
||
261DF6DB000
|
heap
|
page read and write
|
||
261DF43E000
|
heap
|
page read and write
|
||
1E5349DA000
|
heap
|
page read and write
|
||
261DDA9D000
|
heap
|
page read and write
|
||
261DDA9D000
|
heap
|
page read and write
|
||
261DF50B000
|
heap
|
page read and write
|
||
1E532D9B000
|
heap
|
page read and write
|
||
261E1D87000
|
heap
|
page read and write
|
||
E16ADDE000
|
stack
|
page read and write
|
||
261E1DA0000
|
heap
|
page read and write
|
||
1E532D92000
|
heap
|
page read and write
|
||
ADC19FE000
|
stack
|
page read and write
|
||
261DDA9D000
|
heap
|
page read and write
|
||
1E534950000
|
heap
|
page read and write
|
||
261DF4CD000
|
heap
|
page read and write
|
||
261DDA72000
|
heap
|
page read and write
|
||
1E1E0452000
|
heap
|
page read and write
|
||
261E4EC8000
|
heap
|
page read and write
|
||
7FF772544000
|
unkown
|
page read and write
|
||
1E534B0E000
|
heap
|
page read and write
|
||
261DDA40000
|
heap
|
page read and write
|
||
261E4E28000
|
heap
|
page read and write
|
||
1E5348F0000
|
heap
|
page read and write
|
||
261DDA53000
|
heap
|
page read and write
|
||
261DDA4A000
|
heap
|
page read and write
|
||
261DF59A000
|
heap
|
page read and write
|
||
2AB4721E000
|
heap
|
page read and write
|
||
261DF4A4000
|
heap
|
page read and write
|
||
1D9BB600000
|
heap
|
page read and write
|
||
261DF46C000
|
heap
|
page read and write
|
||
1E534AD0000
|
heap
|
page read and write
|
||
261DF66C000
|
heap
|
page read and write
|
||
1E1E051F000
|
heap
|
page read and write
|
||
261E1E13000
|
heap
|
page read and write
|
||
261DF314000
|
heap
|
page read and write
|
||
1D9D4246000
|
heap
|
page read and write
|
||
261DF61C000
|
heap
|
page read and write
|
||
22F32E98000
|
heap
|
page read and write
|
||
261DF43D000
|
heap
|
page read and write
|
||
D13DFFB000
|
stack
|
page read and write
|
||
261DDA8D000
|
heap
|
page read and write
|
||
261DF436000
|
heap
|
page read and write
|
||
7FF772520000
|
unkown
|
page read and write
|
||
1E532E23000
|
heap
|
page read and write
|
||
2AB49DB2000
|
heap
|
page read and write
|
||
261DF4EA000
|
heap
|
page read and write
|
||
1E1DCE79000
|
heap
|
page read and write
|
||
D13DCF6000
|
stack
|
page read and write
|
||
1E53497A000
|
heap
|
page read and write
|
||
1E1E2254000
|
heap
|
page read and write
|
||
261DF5F2000
|
heap
|
page read and write
|
||
261DF58B000
|
heap
|
page read and write
|
||
261E1DE9000
|
heap
|
page read and write
|
||
2A34197C000
|
heap
|
page read and write
|
||
1E1D8A23000
|
heap
|
page read and write
|
||
261DF6EC000
|
heap
|
page read and write
|
||
2AB49E10000
|
heap
|
page read and write
|
||
261DF3E0000
|
heap
|
page read and write
|
||
1E53495C000
|
heap
|
page read and write
|
||
2A3418AB000
|
heap
|
page read and write
|
||
261DF573000
|
heap
|
page read and write
|
||
22F32EDA000
|
heap
|
page read and write
|
||
261E1D9A000
|
heap
|
page read and write
|
||
1E1E21DC000
|
heap
|
page read and write
|
||
261DF70E000
|
heap
|
page read and write
|
||
261DF4A6000
|
heap
|
page read and write
|
||
ADBF60D000
|
stack
|
page read and write
|
||
261DF5EF000
|
heap
|
page read and write
|
||
261E4E06000
|
heap
|
page read and write
|
||
261DF692000
|
heap
|
page read and write
|
||
E16BBFE000
|
stack
|
page read and write
|
||
1E53499C000
|
heap
|
page read and write
|
||
1E1D9835000
|
heap
|
page read and write
|
||
1E1E20C0000
|
heap
|
page read and write
|
||
1E1D9B93000
|
trusted library allocation
|
page read and write
|
||
261DF5E1000
|
heap
|
page read and write
|
||
2AB4F644000
|
heap
|
page read and write
|
||
2AB473BB000
|
heap
|
page read and write
|
||
1E1D98D1000
|
heap
|
page read and write
|
||
2AB4391D000
|
trusted library allocation
|
page read and write
|
||
261DF550000
|
heap
|
page read and write
|
||
261DDA89000
|
heap
|
page read and write
|
||
7FF9CD420000
|
trusted library allocation
|
page read and write
|
||
261E323A000
|
heap
|
page read and write
|
||
1E534BDC000
|
heap
|
page read and write
|
||
2AB4E1CC000
|
heap
|
page read and write
|
||
261DF671000
|
heap
|
page read and write
|
||
2A3279B5000
|
heap
|
page read and write
|
||
261E4EA0000
|
heap
|
page read and write
|
||
22F347CC000
|
heap
|
page read and write
|
||
261DF4D1000
|
heap
|
page read and write
|
||
261DF5FD000
|
heap
|
page read and write
|
||
2AB47075000
|
heap
|
page read and write
|
||
261DF5F3000
|
heap
|
page read and write
|
||
1E53495C000
|
heap
|
page read and write
|
||
1D9D5BD5000
|
trusted library allocation
|
page read and write
|
||
D13CEF2000
|
stack
|
page read and write
|
||
1E53495F000
|
heap
|
page read and write
|
||
1E534B00000
|
heap
|
page read and write
|
||
261DDA90000
|
heap
|
page read and write
|
||
261DF70A000
|
heap
|
page read and write
|
||
2AB4F75C000
|
heap
|
page read and write
|
||
FAE337F000
|
stack
|
page read and write
|
||
2AB46BE2000
|
heap
|
page read and write
|
||
261DF48D000
|
heap
|
page read and write
|
||
7FF9CD440000
|
trusted library allocation
|
page read and write
|
||
1E1D99E1000
|
heap
|
page read and write
|
||
261DF48C000
|
heap
|
page read and write
|
||
261DF5EE000
|
heap
|
page read and write
|
||
261DF4DE000
|
heap
|
page read and write
|
||
261DDAAA000
|
heap
|
page read and write
|
||
261E1D8B000
|
heap
|
page read and write
|
||
261DF62F000
|
heap
|
page read and write
|
||
1E1D8A8F000
|
heap
|
page read and write
|
||
2A34196E000
|
heap
|
page read and write
|
||
261DF5EE000
|
heap
|
page read and write
|
||
2A3391D8000
|
trusted library allocation
|
page read and write
|
||
261DD9FC000
|
heap
|
page read and write
|
||
22F34870000
|
heap
|
page read and write
|
||
1E5349F0000
|
heap
|
page read and write
|
||
1E5349E0000
|
heap
|
page read and write
|
||
261E4EB4000
|
heap
|
page read and write
|
||
261DF4E2000
|
heap
|
page read and write
|
||
2AB49A20000
|
heap
|
page read and write
|
||
1E1D9B3A000
|
heap
|
page read and write
|
||
7FF9CD16D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF771C9D000
|
unkown
|
page readonly
|
||
1E5349DA000
|
heap
|
page read and write
|
||
261DF480000
|
heap
|
page read and write
|
||
2A341BA0000
|
heap
|
page read and write
|
||
261E4F02000
|
heap
|
page read and write
|
||
261DF4EA000
|
heap
|
page read and write
|
||
261DF54C000
|
heap
|
page read and write
|
||
2A341D60000
|
heap
|
page read and write
|
||
261DDA47000
|
heap
|
page read and write
|
||
2A341933000
|
heap
|
page read and write
|
||
261DF4AA000
|
heap
|
page read and write
|
||
7FF9CB2DD000
|
trusted library allocation
|
page execute and read and write
|
||
1E1D8AB0000
|
heap
|
page read and write
|
||
261DDA62000
|
heap
|
page read and write
|
||
261DF420000
|
heap
|
page read and write
|
||
2AB46B88000
|
heap
|
page read and write
|
||
261DDA6F000
|
heap
|
page read and write
|
||
1E1E2209000
|
heap
|
page read and write
|
||
261DDAA6000
|
heap
|
page read and write
|
||
1E5349B3000
|
heap
|
page read and write
|
||
1E1D9BB5000
|
trusted library allocation
|
page read and write
|
||
261DF4C8000
|
heap
|
page read and write
|
||
261DDA51000
|
heap
|
page read and write
|
||
261DF673000
|
heap
|
page read and write
|
||
1E1DCC10000
|
heap
|
page read and write
|
||
2AB43859000
|
trusted library allocation
|
page read and write
|
||
1E5349B0000
|
heap
|
page read and write
|
||
261DF507000
|
heap
|
page read and write
|
||
22F32E94000
|
heap
|
page read and write
|
||
1E534940000
|
heap
|
page read and write
|
||
261DD800000
|
heap
|
page read and write
|
||
1D9D408E000
|
heap
|
page read and write
|
||
261DF6A4000
|
heap
|
page read and write
|
||
261DDA5D000
|
heap
|
page read and write
|
||
261E1D98000
|
heap
|
page read and write
|
||
261DF4CA000
|
heap
|
page read and write
|
||
7FF9CD21C000
|
trusted library allocation
|
page execute and read and write
|
||
1E53499B000
|
heap
|
page read and write
|
||
261E4E1D000
|
heap
|
page read and write
|
||
261DF62D000
|
heap
|
page read and write
|
||
261DF501000
|
heap
|
page read and write
|
||
7FF771F17000
|
unkown
|
page write copy
|
||
261E4E1C000
|
heap
|
page read and write
|
||
2A341BD8000
|
heap
|
page read and write
|
||
261DF635000
|
heap
|
page read and write
|
||
261DF69F000
|
heap
|
page read and write
|
||
261DF4E0000
|
heap
|
page read and write
|
||
261DF4CA000
|
heap
|
page read and write
|
||
22F32ED4000
|
heap
|
page read and write
|
||
1D9B9B03000
|
heap
|
page read and write
|
||
7FF9CD280000
|
trusted library allocation
|
page execute and read and write
|
||
2A342E73000
|
trusted library allocation
|
page read and write
|
||
FAE2F2E000
|
stack
|
page read and write
|
||
261DDA7A000
|
heap
|
page read and write
|
||
261DF465000
|
heap
|
page read and write
|
||
261DF5FF000
|
heap
|
page read and write
|
||
261DDA8F000
|
heap
|
page read and write
|
||
261DF6DD000
|
heap
|
page read and write
|
||
261DDA58000
|
heap
|
page read and write
|
||
261DDAA2000
|
heap
|
page read and write
|
||
22F32E91000
|
heap
|
page read and write
|
||
261E1D8A000
|
heap
|
page read and write
|
||
261E4E2D000
|
heap
|
page read and write
|
||
261DF5B5000
|
heap
|
page read and write
|
||
2AB4727C000
|
heap
|
page read and write
|
||
261DDA92000
|
heap
|
page read and write
|
||
261DF598000
|
heap
|
page read and write
|
||
2A329253000
|
trusted library allocation
|
page read and write
|
||
261DDA2C000
|
heap
|
page read and write
|
||
2A3277D0000
|
heap
|
page read and write
|
||
2AB4712E000
|
heap
|
page read and write
|
||
22F36FC0000
|
heap
|
page read and write
|
||
1D9B99E7000
|
unkown
|
page readonly
|
||
261E4E12000
|
heap
|
page read and write
|
||
261DF452000
|
heap
|
page read and write
|
||
261DDA55000
|
heap
|
page read and write
|
||
261DF539000
|
heap
|
page read and write
|
||
E171FFF000
|
stack
|
page read and write
|
||
2A34303F000
|
trusted library allocation
|
page read and write
|
||
261DF70C000
|
heap
|
page read and write
|
||
1E5349AC000
|
heap
|
page read and write
|
||
22F32E9D000
|
heap
|
page read and write
|
||
2A3273E0000
|
heap
|
page read and write
|
||
22F32D20000
|
heap
|
page read and write
|
||
1E1D9B50000
|
heap
|
page execute and read and write
|
||
261DF63B000
|
heap
|
page read and write
|
||
2AB48345000
|
trusted library allocation
|
page read and write
|
||
1E5349E9000
|
heap
|
page read and write
|
||
261DF5F2000
|
heap
|
page read and write
|
||
261DDA94000
|
heap
|
page read and write
|
||
261DF5A7000
|
heap
|
page read and write
|
||
261DF636000
|
heap
|
page read and write
|
||
2A3292A6000
|
trusted library allocation
|
page read and write
|
||
261DF646000
|
heap
|
page read and write
|
||
261DD8E0000
|
heap
|
page read and write
|
||
261DF5D8000
|
heap
|
page read and write
|
||
1E53498C000
|
heap
|
page read and write
|
||
2AB46B8C000
|
heap
|
page read and write
|
||
261DF5CD000
|
heap
|
page read and write
|
||
2AB491A9000
|
trusted library allocation
|
page read and write
|
||
1E1DCD18000
|
heap
|
page read and write
|
||
1E534969000
|
heap
|
page read and write
|
||
261DF6C5000
|
heap
|
page read and write
|
||
1D9BB6B3000
|
trusted library allocation
|
page read and write
|
||
1E1D9AAF000
|
heap
|
page read and write
|
||
1E5349F2000
|
heap
|
page read and write
|
||
1D9B9CC0000
|
heap
|
page read and write
|
||
2AB43898000
|
trusted library allocation
|
page read and write
|
||
2AB47A97000
|
trusted library allocation
|
page read and write
|
||
261DDA6F000
|
heap
|
page read and write
|
||
261DF624000
|
heap
|
page read and write
|
||
261E1D9A000
|
heap
|
page read and write
|
||
1E53496F000
|
heap
|
page read and write
|
||
261E4E03000
|
heap
|
page read and write
|
||
261E1D9D000
|
heap
|
page read and write
|
||
261DF544000
|
heap
|
page read and write
|
||
1E532E5E000
|
heap
|
page read and write
|
||
261DF41E000
|
heap
|
page read and write
|
||
261DD9D4000
|
heap
|
page read and write
|
||
7FF77253F000
|
unkown
|
page read and write
|
||
2AB47A89000
|
trusted library allocation
|
page read and write
|
||
261DF59A000
|
heap
|
page read and write
|
||
1E5330DD000
|
heap
|
page read and write
|
||
261DF444000
|
heap
|
page read and write
|
||
1E5352D5000
|
heap
|
page read and write
|
||
2AB47258000
|
heap
|
page read and write
|
||
2A341BB5000
|
heap
|
page read and write
|
||
1E1D99D7000
|
heap
|
page read and write
|
||
1E1DCD48000
|
heap
|
page read and write
|
||
1E534754000
|
heap
|
page read and write
|
||
261E4DF4000
|
heap
|
page read and write
|
||
1E5330D0000
|
heap
|
page read and write
|
||
261DF589000
|
heap
|
page read and write
|
||
2AB4E186000
|
heap
|
page read and write
|
||
1E5349A9000
|
heap
|
page read and write
|
||
261E1DFF000
|
heap
|
page read and write
|
||
1E5372A2000
|
heap
|
page read and write
|
||
1E532E41000
|
heap
|
page read and write
|
||
1E5349F2000
|
heap
|
page read and write
|
||
261DF615000
|
heap
|
page read and write
|
||
2AB46B10000
|
heap
|
page read and write
|
||
1E1D99C9000
|
heap
|
page read and write
|
||
7FF771701000
|
unkown
|
page execute read
|
||
261DDA55000
|
heap
|
page read and write
|
||
261DF5C8000
|
heap
|
page read and write
|
||
261E1D9D000
|
heap
|
page read and write
|
||
1D9D5452000
|
trusted library allocation
|
page read and write
|
||
261DDA5C000
|
heap
|
page read and write
|
||
261E1DAC000
|
heap
|
page read and write
|
||
261DF4C8000
|
heap
|
page read and write
|
||
1E1D9880000
|
heap
|
page read and write
|
||
22F32EEA000
|
heap
|
page read and write
|
||
BC933FE000
|
stack
|
page read and write
|
||
2AB49C5A000
|
heap
|
page read and write
|
||
261DF4F1000
|
heap
|
page read and write
|
||
ADC11FE000
|
stack
|
page read and write
|
||
261E4E07000
|
heap
|
page read and write
|
||
261DF4CA000
|
heap
|
page read and write
|
||
261DF447000
|
heap
|
page read and write
|
||
261DF633000
|
heap
|
page read and write
|
||
261DDA68000
|
heap
|
page read and write
|
||
2AB470BE000
|
heap
|
page read and write
|
||
E16CFFE000
|
stack
|
page read and write
|
||
1E532DEF000
|
heap
|
page read and write
|
||
261DF507000
|
heap
|
page read and write
|
||
261DDA64000
|
heap
|
page read and write
|
||
1E5349B8000
|
heap
|
page read and write
|
||
261DDA94000
|
heap
|
page read and write
|
||
261DF4AA000
|
heap
|
page read and write
|
||
261DF511000
|
heap
|
page read and write
|
||
2AB47066000
|
heap
|
page read and write
|
||
D13DAFB000
|
stack
|
page read and write
|
||
1D9D5BFC000
|
trusted library allocation
|
page read and write
|
||
2AB483B5000
|
trusted library allocation
|
page read and write
|
||
1D9D3E20000
|
heap
|
page read and write
|
||
2A32745E000
|
heap
|
page read and write
|
||
1E1E053A000
|
heap
|
page read and write
|
||
2A32746D000
|
heap
|
page read and write
|
||
2AB4DCD2000
|
trusted library allocation
|
page read and write
|
||
261DDAA2000
|
heap
|
page read and write
|
||
BC934FF000
|
stack
|
page read and write
|
||
261DF5FF000
|
heap
|
page read and write
|
||
261DF4BA000
|
heap
|
page read and write
|
||
261DF673000
|
heap
|
page read and write
|
||
ADBFDFE000
|
stack
|
page read and write
|
||
1E1E052E000
|
heap
|
page read and write
|
||
1D9D3EB0000
|
trusted library allocation
|
page read and write
|
||
1E1DA0A0000
|
heap
|
page read and write
|
||
261DF701000
|
heap
|
page read and write
|
||
2A341890000
|
heap
|
page read and write
|
||
22F32EAA000
|
heap
|
page read and write
|
||
22F32E40000
|
heap
|
page read and write
|
||
1E1E0557000
|
heap
|
page read and write
|
||
261DF462000
|
heap
|
page read and write
|
||
7FF9CB32C000
|
trusted library allocation
|
page execute and read and write
|
||
1E1E20AA000
|
heap
|
page read and write
|
||
1E1DCDCA000
|
heap
|
page read and write
|
||
261DF696000
|
heap
|
page read and write
|
||
1E1D9D3F000
|
trusted library allocation
|
page read and write
|
||
261DF554000
|
heap
|
page read and write
|
||
261DDA55000
|
heap
|
page read and write
|
||
261DF4F4000
|
heap
|
page read and write
|
||
261DF692000
|
heap
|
page read and write
|
||
1D9D4019000
|
heap
|
page read and write
|
||
2AB46C6D000
|
heap
|
page read and write
|
||
FAE33FE000
|
stack
|
page read and write
|
||
1E1D9A37000
|
heap
|
page read and write
|
||
1D9BB6EB000
|
trusted library allocation
|
page read and write
|
||
261DF4E6000
|
heap
|
page read and write
|
||
2A32924C000
|
trusted library allocation
|
page read and write
|
||
2AB46B7C000
|
heap
|
page read and write
|
||
261DF5B7000
|
heap
|
page read and write
|
||
1D9B9B3D000
|
heap
|
page read and write
|
||
2A3291D1000
|
trusted library allocation
|
page read and write
|
||
1E5349B8000
|
heap
|
page read and write
|
||
7FF772549000
|
unkown
|
page read and write
|
||
261DDAA6000
|
heap
|
page read and write
|
||
2AB46C75000
|
heap
|
page read and write
|
||
261DDA49000
|
heap
|
page read and write
|
||
7FF9CD172000
|
trusted library allocation
|
page read and write
|
||
261DF456000
|
heap
|
page read and write
|
||
261DF50B000
|
heap
|
page read and write
|
||
1D9D4240000
|
heap
|
page read and write
|
||
1E532D60000
|
heap
|
page read and write
|
||
261DF5EE000
|
heap
|
page read and write
|
||
1E53497C000
|
heap
|
page read and write
|
||
261DDA53000
|
heap
|
page read and write
|
||
261DF5D6000
|
heap
|
page read and write
|
||
261DF607000
|
heap
|
page read and write
|
||
1D9CB638000
|
trusted library allocation
|
page read and write
|
||
D13D3FE000
|
stack
|
page read and write
|
||
261DF6E3000
|
heap
|
page read and write
|
||
22F32ED8000
|
heap
|
page read and write
|
||
1D9D4003000
|
heap
|
page read and write
|
||
2A3418CC000
|
heap
|
page read and write
|
||
ADC46EF000
|
stack
|
page read and write
|
||
1D9B9AB0000
|
heap
|
page read and write
|
||
261DF41C000
|
heap
|
page read and write
|
||
1E5349EE000
|
heap
|
page read and write
|
||
E170BFE000
|
stack
|
page read and write
|
||
2AB46CD2000
|
heap
|
page read and write
|
||
1E1E04B4000
|
heap
|
page read and write
|
||
2AB49E1E000
|
heap
|
page read and write
|
||
261DF4B8000
|
heap
|
page read and write
|
||
1D9B99F4000
|
unkown
|
page readonly
|
||
261DF49D000
|
heap
|
page read and write
|
||
261E1DF8000
|
heap
|
page read and write
|
||
1E1E20B5000
|
heap
|
page read and write
|
||
1E53497C000
|
heap
|
page read and write
|
||
2A327390000
|
heap
|
page read and write
|
||
2AB47105000
|
heap
|
page read and write
|
||
261E4E4A000
|
heap
|
page read and write
|
||
1E1D9A26000
|
heap
|
page read and write
|
||
261DF4BC000
|
heap
|
page read and write
|
||
2AB48408000
|
trusted library allocation
|
page read and write
|
||
FAE327E000
|
stack
|
page read and write
|
||
1E1DB1A0000
|
trusted library allocation
|
page read and write
|
||
261DDA55000
|
heap
|
page read and write
|
||
1E532D94000
|
heap
|
page read and write
|
||
261DF6AA000
|
heap
|
page read and write
|
||
261DF670000
|
heap
|
page read and write
|
||
1E1D97BA000
|
heap
|
page read and write
|
||
2AB4E144000
|
heap
|
page read and write
|
||
261DDA25000
|
heap
|
page read and write
|
||
1E5349EE000
|
heap
|
page read and write
|
||
1E1DCDDB000
|
heap
|
page read and write
|
||
1E1D9870000
|
heap
|
page read and write
|
||
261DDAA2000
|
heap
|
page read and write
|
||
1E534970000
|
heap
|
page read and write
|
||
2A329285000
|
trusted library allocation
|
page read and write
|
||
261DF56E000
|
heap
|
page read and write
|
||
261DF640000
|
heap
|
page read and write
|
||
1E53492E000
|
heap
|
page read and write
|
||
261E1E00000
|
heap
|
page read and write
|
||
E16F7FE000
|
stack
|
page read and write
|
||
BC937FF000
|
stack
|
page read and write
|
||
1E1DEEA4000
|
trusted library allocation
|
page read and write
|
||
261DDA53000
|
heap
|
page read and write
|
||
2AB4720D000
|
heap
|
page read and write
|
||
261DF5DC000
|
heap
|
page read and write
|
||
2AB470F6000
|
heap
|
page read and write
|
||
2A3418B8000
|
heap
|
page read and write
|
||
261DF44E000
|
heap
|
page read and write
|
||
2AB43855000
|
trusted library allocation
|
page read and write
|
||
1E534976000
|
heap
|
page read and write
|
||
1E1DB1D8000
|
trusted library allocation
|
page read and write
|
||
261E4E41000
|
heap
|
page read and write
|
||
261E4EC4000
|
heap
|
page read and write
|
||
1E532E41000
|
heap
|
page read and write
|
||
1D9BB4D0000
|
trusted library allocation
|
page read and write
|
||
261DDA67000
|
heap
|
page read and write
|
||
1D9D5343000
|
heap
|
page read and write
|
||
261DDA5C000
|
heap
|
page read and write
|
||
261DF6ED000
|
heap
|
page read and write
|
||
1D9D4275000
|
heap
|
page read and write
|
||
261E1E03000
|
heap
|
page read and write
|
||
261E4E9B000
|
heap
|
page read and write
|
||
261DDA9B000
|
heap
|
page read and write
|
||
261DF465000
|
heap
|
page read and write
|
||
261DF48B000
|
heap
|
page read and write
|
||
1E1D9851000
|
heap
|
page read and write
|
||
1D9D402F000
|
heap
|
page read and write
|
||
1E1DB1EC000
|
trusted library allocation
|
page read and write
|
||
261DF5EF000
|
heap
|
page read and write
|
||
261DDA75000
|
heap
|
page read and write
|
||
261DD915000
|
heap
|
page read and write
|
||
1D9BB620000
|
heap
|
page execute and read and write
|
||
ADC52EB000
|
stack
|
page read and write
|
||
261DF5C5000
|
heap
|
page read and write
|
||
261DF622000
|
heap
|
page read and write
|
||
2A342F4A000
|
trusted library allocation
|
page read and write
|
||
261E4DFB000
|
heap
|
page read and write
|
||
261DF627000
|
heap
|
page read and write
|
||
2AB46B95000
|
heap
|
page read and write
|
||
2AB483A0000
|
trusted library allocation
|
page read and write
|
||
261E4EAD000
|
heap
|
page read and write
|
||
1D9D424C000
|
heap
|
page read and write
|
||
261DDA25000
|
heap
|
page read and write
|
||
261E1E13000
|
heap
|
page read and write
|
||
1E537290000
|
heap
|
page read and write
|
||
2A341D64000
|
heap
|
page read and write
|
||
261DDA6F000
|
heap
|
page read and write
|
||
7FF772536000
|
unkown
|
page read and write
|
||
7FF772555000
|
unkown
|
page read and write
|
||
261DF450000
|
heap
|
page read and write
|
||
261DDA68000
|
heap
|
page read and write
|
||
261DDA77000
|
heap
|
page read and write
|
||
261DF52F000
|
heap
|
page read and write
|
||
261E1DEF000
|
heap
|
page read and write
|
||
261E1D90000
|
heap
|
page read and write
|
||
2A341900000
|
heap
|
page read and write
|
||
1E534A11000
|
heap
|
page read and write
|
||
261DF694000
|
heap
|
page read and write
|
||
D13D0FD000
|
stack
|
page read and write
|
||
FAE2EA8000
|
stack
|
page read and write
|
||
261DF5EC000
|
heap
|
page read and write
|
||
261DDA4C000
|
heap
|
page read and write
|
||
1E1E20BA000
|
heap
|
page read and write
|
||
1E5349C9000
|
heap
|
page read and write
|
||
261DF636000
|
heap
|
page read and write
|
||
261DF5D4000
|
heap
|
page read and write
|
||
1E534A12000
|
heap
|
page read and write
|
||
1D9D4054000
|
heap
|
page read and write
|
||
261DF507000
|
heap
|
page read and write
|
||
2A3391D1000
|
trusted library allocation
|
page read and write
|
||
261DF66A000
|
heap
|
page read and write
|
||
261DF5A7000
|
heap
|
page read and write
|
||
2AB47215000
|
heap
|
page read and write
|
||
261DF4B5000
|
heap
|
page read and write
|
||
261DF5A9000
|
heap
|
page read and write
|
||
1E1E054E000
|
heap
|
page read and write
|
||
261DDA4A000
|
heap
|
page read and write
|
||
261DDAA6000
|
heap
|
page read and write
|
||
1D9D3FF0000
|
heap
|
page read and write
|
||
1E1DB199000
|
trusted library allocation
|
page read and write
|
||
261E1D9F000
|
heap
|
page read and write
|
||
1E5349A7000
|
heap
|
page read and write
|
||
1E1DEEB7000
|
trusted library allocation
|
page read and write
|
||
1E1D8B27000
|
heap
|
page read and write
|
||
1E53493E000
|
heap
|
page read and write
|
||
261DF4C0000
|
heap
|
page read and write
|
||
261E4AF0000
|
heap
|
page read and write
|
||
261DF4E8000
|
heap
|
page read and write
|
||
E16B7FE000
|
stack
|
page read and write
|
||
2AB49CBC000
|
heap
|
page read and write
|
||
261E4F02000
|
heap
|
page read and write
|
||
261DF558000
|
heap
|
page read and write
|
||
261DF485000
|
heap
|
page read and write
|
||
261DDA77000
|
heap
|
page read and write
|
||
261E4DF9000
|
heap
|
page read and write
|
||
261DDA4F000
|
heap
|
page read and write
|
||
7FF9CD170000
|
trusted library allocation
|
page read and write
|
||
1D9D3FFE000
|
heap
|
page read and write
|
||
261DF692000
|
heap
|
page read and write
|
||
7FF9CD210000
|
trusted library allocation
|
page read and write
|
||
261DF58B000
|
heap
|
page read and write
|
||
1D9D42B4000
|
heap
|
page read and write
|
||
261E1DA5000
|
heap
|
page read and write
|
||
261DF6A0000
|
heap
|
page read and write
|
||
261DF4BA000
|
heap
|
page read and write
|
||
7FF772538000
|
unkown
|
page read and write
|
||
1E1E20D0000
|
heap
|
page read and write
|
||
1D9D40E3000
|
heap
|
page read and write
|
||
261E4E15000
|
heap
|
page read and write
|
||
E1713FE000
|
stack
|
page read and write
|
||
1E1DA129000
|
heap
|
page read and write
|
||
261DF6BC000
|
heap
|
page read and write
|
||
1E5349CA000
|
heap
|
page read and write
|
||
2AB4F743000
|
heap
|
page read and write
|
||
261DF5A0000
|
heap
|
page read and write
|
||
261DF414000
|
heap
|
page read and write
|
||
261DF4B8000
|
heap
|
page read and write
|
||
2AB4F64D000
|
heap
|
page read and write
|
||
1D9BB4B0000
|
trusted library allocation
|
page read and write
|
||
2AB4716E000
|
heap
|
page read and write
|
||
1E53499D000
|
heap
|
page read and write
|
||
1E534976000
|
heap
|
page read and write
|
||
1E532E21000
|
heap
|
page read and write
|
||
1E1DB1B1000
|
trusted library allocation
|
page read and write
|
||
2AB46D0E000
|
heap
|
page read and write
|
||
2AB46FC0000
|
heap
|
page read and write
|
||
261DF4BD000
|
heap
|
page read and write
|
||
261E4E19000
|
heap
|
page read and write
|
||
1E1D978A000
|
heap
|
page read and write
|
||
1D9D3EE0000
|
heap
|
page read and write
|
||
1D9D42A1000
|
heap
|
page read and write
|
||
1E1D9D54000
|
trusted library allocation
|
page read and write
|
||
261DF629000
|
heap
|
page read and write
|
||
261DF5A3000
|
heap
|
page read and write
|
||
261DDA4A000
|
heap
|
page read and write
|
||
261DF62F000
|
heap
|
page read and write
|
||
261E1DA8000
|
heap
|
page read and write
|
||
1E5349B1000
|
heap
|
page read and write
|
||
1D9D42BD000
|
heap
|
page read and write
|
||
261DDA9F000
|
heap
|
page read and write
|
||
2AB47359000
|
heap
|
page read and write
|
||
261DF494000
|
heap
|
page read and write
|
||
261DF5E3000
|
heap
|
page read and write
|
||
261DDA9D000
|
heap
|
page read and write
|
||
261DF5B4000
|
heap
|
page read and write
|
||
1D9B9B43000
|
heap
|
page read and write
|
||
261DF53C000
|
heap
|
page read and write
|
||
261DDA6A000
|
heap
|
page read and write
|
||
261DF6AA000
|
heap
|
page read and write
|
||
1D9D5430000
|
trusted library allocation
|
page read and write
|
||
1E5349BA000
|
heap
|
page read and write
|
||
22F32E60000
|
heap
|
page read and write
|
||
1E1D9C5E000
|
trusted library allocation
|
page read and write
|
||
1E1D9953000
|
heap
|
page read and write
|
||
1D9B9A80000
|
heap
|
page read and write
|
||
1E1E057A000
|
heap
|
page read and write
|
||
1E1DCE39000
|
heap
|
page read and write
|
||
261DDAA0000
|
heap
|
page read and write
|
||
1E534A17000
|
heap
|
page read and write
|
||
2AB47197000
|
heap
|
page read and write
|
||
1E534820000
|
heap
|
page read and write
|
||
1D9B9BBA000
|
heap
|
page read and write
|
||
1E1D9957000
|
heap
|
page read and write
|
||
D13DBFA000
|
stack
|
page read and write
|
||
1D9D5C19000
|
trusted library allocation
|
page read and write
|
||
1E1E21E0000
|
heap
|
page read and write
|
||
2AB47005000
|
heap
|
page read and write
|
||
1E1D8969000
|
heap
|
page read and write
|
||
261DF48D000
|
heap
|
page read and write
|
||
261DF5D8000
|
heap
|
page read and write
|
||
22F32ECF000
|
heap
|
page read and write
|
||
261DF501000
|
heap
|
page read and write
|
||
261DF48C000
|
heap
|
page read and write
|
||
261E4E0F000
|
heap
|
page read and write
|
||
2AB46C24000
|
heap
|
page read and write
|
||
261DDA77000
|
heap
|
page read and write
|
||
261DF413000
|
heap
|
page read and write
|
||
1D9B9AD6000
|
heap
|
page read and write
|
||
2AB476E2000
|
heap
|
page read and write
|
||
2AB4BF20000
|
trusted library allocation
|
page read and write
|
||
1D9D3EF3000
|
heap
|
page read and write
|
||
261DDA61000
|
heap
|
page read and write
|
||
1E1DA122000
|
heap
|
page read and write
|
||
1E1DA12C000
|
heap
|
page read and write
|
||
1E532C90000
|
heap
|
page read and write
|
||
2A342E90000
|
trusted library allocation
|
page read and write
|
||
261E4E24000
|
heap
|
page read and write
|
||
261DF586000
|
heap
|
page read and write
|
||
1D9D5C51000
|
trusted library allocation
|
page read and write
|
||
2AB4710B000
|
heap
|
page read and write
|
||
7FF9CD460000
|
trusted library allocation
|
page execute and read and write
|
||
2AB47021000
|
heap
|
page read and write
|
||
261DF44F000
|
heap
|
page read and write
|
||
22F32E00000
|
heap
|
page read and write
|
||
261E1E04000
|
heap
|
page read and write
|
||
1E53498A000
|
heap
|
page read and write
|
||
261E4E19000
|
heap
|
page read and write
|
||
261DDA7F000
|
heap
|
page read and write
|
||
7FF772536000
|
unkown
|
page read and write
|
||
261DF47C000
|
heap
|
page read and write
|
||
1E534955000
|
heap
|
page read and write
|
||
7FF9CB2FB000
|
trusted library allocation
|
page execute and read and write
|
||
1E1D9B90000
|
trusted library allocation
|
page read and write
|
||
1E1D99CF000
|
heap
|
page read and write
|
||
1E1D984D000
|
heap
|
page read and write
|
||
7FF9CD394000
|
trusted library allocation
|
page read and write
|
||
1E1E223B000
|
heap
|
page read and write
|
||
ADC15FF000
|
stack
|
page read and write
|
||
261E1DE8000
|
heap
|
page read and write
|
||
1D9D409D000
|
heap
|
page read and write
|
||
261DF63E000
|
heap
|
page read and write
|
||
261DDA53000
|
heap
|
page read and write
|
||
261DF4FE000
|
heap
|
page read and write
|
||
1D9CB654000
|
trusted library allocation
|
page read and write
|
||
2A343014000
|
trusted library allocation
|
page read and write
|
||
1D9D5C05000
|
trusted library allocation
|
page read and write
|
||
1D9D42B9000
|
heap
|
page read and write
|
||
2AB4F640000
|
heap
|
page read and write
|
||
2AB47AB4000
|
trusted library allocation
|
page read and write
|
||
ADC3A9E000
|
stack
|
page read and write
|
||
261DF692000
|
heap
|
page read and write
|
||
7FF9CB2F4000
|
trusted library allocation
|
page read and write
|
||
261DDA75000
|
heap
|
page read and write
|
||
261DF489000
|
heap
|
page read and write
|
||
261DF6DF000
|
heap
|
page read and write
|
||
2A341989000
|
heap
|
page read and write
|
||
261DF529000
|
heap
|
page read and write
|
||
1E53497C000
|
heap
|
page read and write
|
||
261DF464000
|
heap
|
page read and write
|
||
261DDA8D000
|
heap
|
page read and write
|
||
2A32924F000
|
trusted library allocation
|
page read and write
|
||
1E532CC0000
|
heap
|
page read and write
|
||
261DDA6F000
|
heap
|
page read and write
|
||
261DF47C000
|
heap
|
page read and write
|
||
ADC42ED000
|
stack
|
page read and write
|
||
22F32EB8000
|
heap
|
page read and write
|
||
2A342EAC000
|
trusted library allocation
|
page read and write
|
||
D13D1FE000
|
stack
|
page read and write
|
||
261E1DFD000
|
heap
|
page read and write
|
||
1D9B9CE5000
|
heap
|
page read and write
|
||
261E1DA5000
|
heap
|
page read and write
|
||
261DF6CB000
|
heap
|
page read and write
|
||
1E1DCE7E000
|
heap
|
page read and write
|
||
261DDA58000
|
heap
|
page read and write
|
||
1D9D42C3000
|
heap
|
page read and write
|
||
261DF6FC000
|
heap
|
page read and write
|
||
2AB471F0000
|
heap
|
page read and write
|
||
261E1D72000
|
heap
|
page read and write
|
||
1E1D9ABC000
|
heap
|
page read and write
|
||
261DF4E2000
|
heap
|
page read and write
|
||
E16F3FE000
|
stack
|
page read and write
|
||
261DF682000
|
heap
|
page read and write
|
||
1E1D995B000
|
heap
|
page read and write
|
||
261DF44F000
|
heap
|
page read and write
|
||
1E1DB210000
|
trusted library allocation
|
page read and write
|
||
1E1D8ACD000
|
heap
|
page read and write
|
||
1E5349E2000
|
heap
|
page read and write
|
||
261DDA90000
|
heap
|
page read and write
|
||
261DF5EC000
|
heap
|
page read and write
|
||
2A342E95000
|
trusted library allocation
|
page read and write
|
||
1D9D3EF0000
|
heap
|
page read and write
|
||
261DD920000
|
heap
|
page read and write
|
||
1E532E1D000
|
heap
|
page read and write
|
||
1E532E5A000
|
heap
|
page read and write
|
||
1E534958000
|
heap
|
page read and write
|
||
261DF4BB000
|
heap
|
page read and write
|
||
1D9B9CE0000
|
heap
|
page read and write
|
||
261DF686000
|
heap
|
page read and write
|
||
1E1D8B5E000
|
heap
|
page read and write
|
||
261E1DF8000
|
heap
|
page read and write
|
||
261DDA93000
|
heap
|
page read and write
|
||
261E1D60000
|
heap
|
page read and write
|
||
1E1D9B36000
|
heap
|
page read and write
|
||
2A3419E0000
|
heap
|
page execute and read and write
|
||
261E1DF8000
|
heap
|
page read and write
|
||
1D9D4072000
|
heap
|
page read and write
|
||
2A341A43000
|
heap
|
page read and write
|
||
2AB4E102000
|
heap
|
page read and write
|
||
261DF62E000
|
heap
|
page read and write
|
||
261DDA4A000
|
heap
|
page read and write
|
||
261DF4BA000
|
heap
|
page read and write
|
||
261DF5CC000
|
heap
|
page read and write
|
||
BC935FE000
|
stack
|
page read and write
|
||
1E5330D5000
|
heap
|
page read and write
|
||
22F347C0000
|
heap
|
page read and write
|
||
2A329281000
|
trusted library allocation
|
page read and write
|
||
2AB47298000
|
heap
|
page read and write
|
||
261E1E13000
|
heap
|
page read and write
|
||
261E1DF0000
|
heap
|
page read and write
|
||
2AB47136000
|
heap
|
page read and write
|
||
261DF5EC000
|
heap
|
page read and write
|
||
1E5349AE000
|
heap
|
page read and write
|
||
261E4F30000
|
heap
|
page read and write
|
||
1E1DB208000
|
trusted library allocation
|
page read and write
|
||
261E1DB0000
|
heap
|
page read and write
|
||
1D9D42BB000
|
heap
|
page read and write
|
||
261E4DFC000
|
heap
|
page read and write
|
||
7FF9CD246000
|
trusted library allocation
|
page execute and read and write
|
||
1E532E58000
|
heap
|
page read and write
|
||
2AB483D8000
|
trusted library allocation
|
page read and write
|
||
261DF607000
|
heap
|
page read and write
|
||
261DF5EE000
|
heap
|
page read and write
|
||
1E1D9B23000
|
heap
|
page read and write
|
||
1D9BB631000
|
trusted library allocation
|
page read and write
|
||
2AB483F8000
|
trusted library allocation
|
page read and write
|
||
BC931FE000
|
stack
|
page read and write
|
||
261E1DA2000
|
heap
|
page read and write
|
||
1E53496F000
|
heap
|
page read and write
|
||
1E1D97AE000
|
heap
|
page read and write
|
||
261E1DFD000
|
heap
|
page read and write
|
||
261DF531000
|
heap
|
page read and write
|
||
261DDAAE000
|
heap
|
page read and write
|
||
261DF62E000
|
heap
|
page read and write
|
||
261E1D8E000
|
heap
|
page read and write
|
||
261DDA72000
|
heap
|
page read and write
|
||
E16D3FE000
|
stack
|
page read and write
|
||
1E536A90000
|
trusted library allocation
|
page read and write
|
||
261DF6C0000
|
heap
|
page read and write
|
||
261DDA96000
|
heap
|
page read and write
|
||
1D9CB647000
|
trusted library allocation
|
page read and write
|
||
7FF9CD1BC000
|
trusted library allocation
|
page execute and read and write
|
||
1E532D83000
|
heap
|
page read and write
|
||
261DF5EC000
|
heap
|
page read and write
|
||
1E1DB171000
|
trusted library allocation
|
page read and write
|
||
261DF448000
|
heap
|
page read and write
|
||
261DF4E2000
|
heap
|
page read and write
|
||
1E1E00AC000
|
trusted library allocation
|
page read and write
|
||
ADC369B000
|
stack
|
page read and write
|
||
261DF46C000
|
heap
|
page read and write
|
||
261DF4F4000
|
heap
|
page read and write
|
||
261DF5A8000
|
heap
|
page read and write
|
||
261DF5DE000
|
heap
|
page read and write
|
||
261DDA55000
|
heap
|
page read and write
|
||
1D9D400F000
|
heap
|
page read and write
|
||
1E534955000
|
heap
|
page read and write
|
||
261DF5EE000
|
heap
|
page read and write
|
||
2AB472A1000
|
heap
|
page read and write
|
||
261DDA65000
|
heap
|
page read and write
|
||
1E1D979B000
|
heap
|
page read and write
|
||
261DF480000
|
heap
|
page read and write
|
||
261DF5EC000
|
heap
|
page read and write
|
||
2A327970000
|
trusted library allocation
|
page read and write
|
||
2AB4E246000
|
heap
|
page read and write
|
||
261DDA86000
|
heap
|
page read and write
|
||
1E1D9A0E000
|
heap
|
page read and write
|
||
1D9D405C000
|
heap
|
page read and write
|
||
261DF5AD000
|
heap
|
page read and write
|
||
E16B00D000
|
stack
|
page read and write
|
||
261DDA8D000
|
heap
|
page read and write
|
||
1E1E00B4000
|
trusted library allocation
|
page read and write
|
||
261DF4EF000
|
heap
|
page read and write
|
||
1E1D98A0000
|
heap
|
page read and write
|
||
261DFCE0000
|
heap
|
page read and write
|
||
1E5349DA000
|
heap
|
page read and write
|
||
261DF46C000
|
heap
|
page read and write
|
||
1E534954000
|
heap
|
page read and write
|
||
2AB472CF000
|
heap
|
page read and write
|
||
261DF5AB000
|
heap
|
page read and write
|
||
261E4E08000
|
heap
|
page read and write
|
||
261DDAAA000
|
heap
|
page read and write
|
||
D13D2FF000
|
stack
|
page read and write
|
||
261DF50D000
|
heap
|
page read and write
|
||
1D9D426F000
|
heap
|
page read and write
|
||
261DF5F3000
|
heap
|
page read and write
|
||
1E5349EF000
|
heap
|
page read and write
|
||
261DF70A000
|
heap
|
page read and write
|
||
261DDA7A000
|
heap
|
page read and write
|
||
1D9D40AB000
|
heap
|
page read and write
|
||
261DF5C8000
|
heap
|
page read and write
|
||
261DF4F1000
|
heap
|
page read and write
|
||
2A3273A0000
|
heap
|
page read and write
|
||
1E53497A000
|
heap
|
page read and write
|
||
1E1E055E000
|
heap
|
page read and write
|
||
7FF9CD392000
|
trusted library allocation
|
page read and write
|
||
2A341BF2000
|
heap
|
page read and write
|
||
1E1DCE1E000
|
heap
|
page read and write
|
||
7FF9CD400000
|
trusted library allocation
|
page read and write
|
||
261DDA80000
|
heap
|
page read and write
|
||
2A34198E000
|
heap
|
page read and write
|
||
1E532E5A000
|
heap
|
page read and write
|
||
261DF6D2000
|
heap
|
page read and write
|
||
261DF60A000
|
heap
|
page read and write
|
||
ADC21FD000
|
stack
|
page read and write
|
||
261DF518000
|
heap
|
page read and write
|
||
1D9D3FF7000
|
heap
|
page read and write
|
||
1D9D5BD9000
|
trusted library allocation
|
page read and write
|
||
1D9D40DE000
|
heap
|
page read and write
|
||
261DF4A1000
|
heap
|
page read and write
|
||
1E5349DA000
|
heap
|
page read and write
|
||
261DDA6B000
|
heap
|
page read and write
|
||
2A3418EC000
|
heap
|
page read and write
|
||
1E534A17000
|
heap
|
page read and write
|
||
261DDAA7000
|
heap
|
page read and write
|
||
7FF9CB2E0000
|
trusted library allocation
|
page read and write
|
||
ADC3AEE000
|
stack
|
page read and write
|
||
1E1DC0BE000
|
trusted library allocation
|
page read and write
|
||
1E53496F000
|
heap
|
page read and write
|
||
1D9BB6E1000
|
trusted library allocation
|
page read and write
|
||
2AB43850000
|
trusted library allocation
|
page read and write
|
||
1E532E26000
|
heap
|
page read and write
|
||
1E1D9989000
|
heap
|
page read and write
|
||
261DF458000
|
heap
|
page read and write
|
||
7FF9CB3B6000
|
trusted library allocation
|
page execute and read and write
|
||
261DF6A6000
|
heap
|
page read and write
|
||
261DDA62000
|
heap
|
page read and write
|
||
1D9D4013000
|
heap
|
page read and write
|
||
261DF694000
|
heap
|
page read and write
|
||
2A3279B0000
|
heap
|
page read and write
|
||
1E5349DA000
|
heap
|
page read and write
|
||
261DF5C2000
|
heap
|
page read and write
|
||
7FF771C9D000
|
unkown
|
page readonly
|
||
261DF4D4000
|
heap
|
page read and write
|
||
261E1D73000
|
heap
|
page read and write
|
||
BC938FF000
|
stack
|
page read and write
|
||
261DDA53000
|
heap
|
page read and write
|
||
1E1DCCB6000
|
heap
|
page read and write
|
||
261DDAA7000
|
heap
|
page read and write
|
||
1E1E2237000
|
heap
|
page read and write
|
||
261DF4E8000
|
heap
|
page read and write
|
||
7FF772555000
|
unkown
|
page read and write
|
||
261DF666000
|
heap
|
page read and write
|
||
261DF69F000
|
heap
|
page read and write
|
||
1E534A39000
|
trusted library section
|
page readonly
|
||
261E1DA3000
|
heap
|
page read and write
|
||
261DF5DA000
|
heap
|
page read and write
|
||
2AB43838000
|
trusted library allocation
|
page read and write
|
||
2A327790000
|
trusted library allocation
|
page read and write
|
||
22F32EB4000
|
heap
|
page read and write
|
||
261DDA68000
|
heap
|
page read and write
|
||
2AB47A91000
|
trusted library allocation
|
page read and write
|
||
261E1DFD000
|
heap
|
page read and write
|
||
261DF53A000
|
heap
|
page read and write
|
||
2AB472C3000
|
heap
|
page read and write
|
||
1D9BB590000
|
trusted library allocation
|
page read and write
|
||
7FF9CB56B000
|
trusted library allocation
|
page read and write
|
||
261DF5AB000
|
heap
|
page read and write
|
||
261DDAA6000
|
heap
|
page read and write
|
||
261E4DF0000
|
heap
|
page read and write
|
||
261DF5EA000
|
heap
|
page read and write
|
||
1E1DAF2A000
|
trusted library allocation
|
page read and write
|
||
1D9BB5F6000
|
heap
|
page execute and read and write
|
||
261DF671000
|
heap
|
page read and write
|
||
1E53496F000
|
heap
|
page read and write
|
||
7FF9CD42D000
|
trusted library allocation
|
page read and write
|
||
7FF771E21000
|
unkown
|
page readonly
|
||
1E1DCE2D000
|
heap
|
page read and write
|
||
261DF589000
|
heap
|
page read and write
|
||
261DF5BF000
|
heap
|
page read and write
|
||
1E1D8AAA000
|
heap
|
page read and write
|
||
261DF4CA000
|
heap
|
page read and write
|
||
1D9BB550000
|
heap
|
page read and write
|
||
1E1D98C5000
|
heap
|
page read and write
|
||
261DF4C4000
|
heap
|
page read and write
|
||
1E534A17000
|
heap
|
page read and write
|
||
261E1D97000
|
heap
|
page read and write
|
||
1E1D97EE000
|
heap
|
page read and write
|
||
BC936FE000
|
stack
|
page read and write
|
||
22F367C0000
|
trusted library allocation
|
page read and write
|
||
261DDA48000
|
heap
|
page read and write
|
||
261DF5E5000
|
heap
|
page read and write
|
||
1E5349CA000
|
heap
|
page read and write
|
||
261DDA36000
|
heap
|
page read and write
|
||
2AB49BE6000
|
heap
|
page read and write
|
||
261DDA8D000
|
heap
|
page read and write
|
||
261DF5EC000
|
heap
|
page read and write
|
||
1D9B91E0000
|
unkown
|
page readonly
|
||
1E1D9D3A000
|
trusted library allocation
|
page read and write
|
||
261DDA55000
|
heap
|
page read and write
|
||
2AB47348000
|
heap
|
page read and write
|
||
ADC01FE000
|
stack
|
page read and write
|
||
261DF458000
|
heap
|
page read and write
|
||
2A341C02000
|
heap
|
page read and write
|
||
261DF5BB000
|
heap
|
page read and write
|
||
261DF507000
|
heap
|
page read and write
|
||
2AB46C80000
|
heap
|
page read and write
|
||
1E532E28000
|
heap
|
page read and write
|
||
1D9B9CA0000
|
heap
|
page read and write
|
||
7FF9CB2FD000
|
trusted library allocation
|
page execute and read and write
|
||
1E1D9A08000
|
heap
|
page read and write
|
||
261DF48B000
|
heap
|
page read and write
|
||
7FF9CD310000
|
trusted library allocation
|
page execute and read and write
|
||
261DF5B3000
|
heap
|
page read and write
|
||
261DF4BA000
|
heap
|
page read and write
|
||
1E1DCC52000
|
heap
|
page read and write
|
||
261DF514000
|
heap
|
page read and write
|
||
2AB4E0B0000
|
heap
|
page read and write
|
||
261DF5B4000
|
heap
|
page read and write
|
||
261DF5EE000
|
heap
|
page read and write
|
||
261DF6A9000
|
heap
|
page read and write
|
||
261E1DA3000
|
heap
|
page read and write
|
||
261DF5C5000
|
heap
|
page read and write
|
||
261DF473000
|
heap
|
page read and write
|
||
261DF47E000
|
heap
|
page read and write
|
||
1E5349B3000
|
heap
|
page read and write
|
||
261DF631000
|
heap
|
page read and write
|
||
1E1D9BC5000
|
trusted library allocation
|
page read and write
|
||
261E4E15000
|
heap
|
page read and write
|
||
261DF4DF000
|
heap
|
page read and write
|
||
1E1E20AD000
|
heap
|
page read and write
|
||
2AB470D2000
|
heap
|
page read and write
|
||
261DDAA0000
|
heap
|
page read and write
|
||
1E1DB188000
|
trusted library allocation
|
page read and write
|
||
22F32EC2000
|
heap
|
page read and write
|
||
2AB4F679000
|
heap
|
page read and write
|
||
1E1D9CEA000
|
trusted library allocation
|
page read and write
|
||
1E5349CD000
|
heap
|
page read and write
|
||
261DF51D000
|
heap
|
page read and write
|
||
261DF51D000
|
heap
|
page read and write
|
||
2AB4726C000
|
heap
|
page read and write
|
||
261E1DEE000
|
heap
|
page read and write
|
||
BC930F7000
|
stack
|
page read and write
|
||
261DF5EA000
|
heap
|
page read and write
|
||
7FF9CB3F0000
|
trusted library allocation
|
page execute and read and write
|
||
2AB47056000
|
heap
|
page read and write
|
||
261E4E06000
|
heap
|
page read and write
|
||
2AB49080000
|
trusted library allocation
|
page read and write
|
||
261DF4E0000
|
heap
|
page read and write
|
||
1E1D9AB7000
|
heap
|
page read and write
|
||
261DF48C000
|
heap
|
page read and write
|
||
261DF6C5000
|
heap
|
page read and write
|
||
1E1E21AB000
|
heap
|
page read and write
|
||
1E1DC0B5000
|
trusted library allocation
|
page read and write
|
||
1E1DCB0C000
|
heap
|
page read and write
|
||
1E5349DB000
|
heap
|
page read and write
|
||
1E1D9801000
|
heap
|
page read and write
|
||
261E1DF2000
|
heap
|
page read and write
|
||
1E1D8A37000
|
heap
|
page read and write
|
||
261DDA62000
|
heap
|
page read and write
|
||
261DDA58000
|
heap
|
page read and write
|
||
261DDA6C000
|
heap
|
page read and write
|
||
1E5349E2000
|
heap
|
page read and write
|
||
261E4E36000
|
heap
|
page read and write
|
||
1E5349AE000
|
heap
|
page read and write
|
||
2A329180000
|
heap
|
page read and write
|
||
1E5348D0000
|
heap
|
page read and write
|
||
E16DBFD000
|
stack
|
page read and write
|
||
2AB43879000
|
trusted library allocation
|
page read and write
|
||
1E534970000
|
heap
|
page read and write
|
||
1E5352B0000
|
heap
|
page read and write
|
||
261DDA68000
|
heap
|
page read and write
|
||
1E1D9885000
|
heap
|
page read and write
|
||
261DDA91000
|
heap
|
page read and write
|
||
1E532E53000
|
heap
|
page read and write
|
||
7FF771E2E000
|
unkown
|
page readonly
|
||
FAE2FAE000
|
stack
|
page read and write
|
||
261DD960000
|
heap
|
page read and write
|
||
2AB43885000
|
trusted library allocation
|
page read and write
|
||
261E4E12000
|
heap
|
page read and write
|
||
261DDA7E000
|
heap
|
page read and write
|
||
261DF6C0000
|
heap
|
page read and write
|
||
1D9D4064000
|
heap
|
page read and write
|
||
1E5349A7000
|
heap
|
page read and write
|
||
7FF9CB580000
|
trusted library allocation
|
page read and write
|
||
1E1D89E5000
|
heap
|
page read and write
|
||
7FF9CB2D3000
|
trusted library allocation
|
page execute and read and write
|
||
1E53497C000
|
heap
|
page read and write
|
||
7FF9CD17D000
|
trusted library allocation
|
page execute and read and write
|
||
1E53498C000
|
heap
|
page read and write
|
||
261DF440000
|
heap
|
page read and write
|
||
1E5349DD000
|
heap
|
page read and write
|
||
261DF604000
|
heap
|
page read and write
|
||
2A329296000
|
trusted library allocation
|
page read and write
|
||
7FF9CD164000
|
trusted library allocation
|
page read and write
|
||
7FF9CD184000
|
trusted library allocation
|
page read and write
|
||
261DDA91000
|
heap
|
page read and write
|
||
2AB4F756000
|
heap
|
page read and write
|
||
1E532DB8000
|
heap
|
page read and write
|
||
261DF627000
|
heap
|
page read and write
|
||
1E532E25000
|
heap
|
page read and write
|
||
261DF54C000
|
heap
|
page read and write
|
||
261DF6B3000
|
heap
|
page read and write
|
||
261E1DE9000
|
heap
|
page read and write
|
||
1D9D4042000
|
heap
|
page read and write
|
||
261DF441000
|
heap
|
page read and write
|
||
261DDA59000
|
heap
|
page read and write
|
||
1E534A12000
|
heap
|
page read and write
|
||
1E53496A000
|
heap
|
page read and write
|
||
7FF9CD324000
|
trusted library allocation
|
page read and write
|
||
261E1DE9000
|
heap
|
page read and write
|
||
261DF69B000
|
heap
|
page read and write
|
||
261E3210000
|
heap
|
page read and write
|
||
2AB43924000
|
trusted library allocation
|
page read and write
|
||
1E534959000
|
heap
|
page read and write
|
||
1E1D9BAD000
|
trusted library allocation
|
page read and write
|
||
261DDA58000
|
heap
|
page read and write
|
||
2AB46B4A000
|
heap
|
page read and write
|
||
261E4EC1000
|
heap
|
page read and write
|
||
1E1D993E000
|
heap
|
page read and write
|
||
1D9B9B12000
|
heap
|
page read and write
|
||
261DF66F000
|
heap
|
page read and write
|
||
D13D4FE000
|
stack
|
page read and write
|
||
261DF430000
|
heap
|
page read and write
|
||
261DDA62000
|
heap
|
page read and write
|
||
1E53494E000
|
heap
|
page read and write
|
||
261E1DA9000
|
heap
|
page read and write
|
||
261DF604000
|
heap
|
page read and write
|
||
261DF4ED000
|
heap
|
page read and write
|
||
261DF4F4000
|
heap
|
page read and write
|
||
D13CFFE000
|
stack
|
page read and write
|
||
1E534976000
|
heap
|
page read and write
|
||
261DF636000
|
heap
|
page read and write
|
||
261DF56E000
|
heap
|
page read and write
|
||
261E1DA3000
|
heap
|
page read and write
|
||
261E3223000
|
heap
|
page read and write
|
||
1E1D9BCC000
|
trusted library allocation
|
page read and write
|
||
1D9CB641000
|
trusted library allocation
|
page read and write
|
||
2A341A40000
|
heap
|
page read and write
|
||
2AB46C08000
|
heap
|
page read and write
|
||
261DDA5A000
|
heap
|
page read and write
|
||
22F32EA5000
|
heap
|
page read and write
|
||
261DF445000
|
heap
|
page read and write
|
||
261DDA53000
|
heap
|
page read and write
|
||
7FF40F120000
|
trusted library allocation
|
page execute and read and write
|
||
1E1DEFD8000
|
trusted library allocation
|
page read and write
|
||
2AB47129000
|
heap
|
page read and write
|
||
1E53497A000
|
heap
|
page read and write
|
||
1E1D9947000
|
heap
|
page read and write
|
||
7FF9CD163000
|
trusted library allocation
|
page execute and read and write
|
||
1E53497D000
|
heap
|
page read and write
|
||
261DDAA6000
|
heap
|
page read and write
|
||
1E1DEC00000
|
trusted library allocation
|
page read and write
|
||
261E1D87000
|
heap
|
page read and write
|
||
7FF9CD180000
|
trusted library allocation
|
page read and write
|
||
261DF5DF000
|
heap
|
page read and write
|
||
261DDA99000
|
heap
|
page read and write
|
||
261DF5FF000
|
heap
|
page read and write
|
||
1E5349CD000
|
heap
|
page read and write
|
||
1E1DA201000
|
heap
|
page read and write
|
||
1E5349F1000
|
heap
|
page read and write
|
||
261DDA92000
|
heap
|
page read and write
|
||
ADC0DFD000
|
stack
|
page read and write
|
||
1E1DCE16000
|
heap
|
page read and write
|
||
1E53497C000
|
heap
|
page read and write
|
||
261DF5EE000
|
heap
|
page read and write
|
||
261E1D94000
|
heap
|
page read and write
|
||
261DDA62000
|
heap
|
page read and write
|
||
261DDAA2000
|
heap
|
page read and write
|
||
261DF6C9000
|
heap
|
page read and write
|
||
22F32EDE000
|
heap
|
page read and write
|
||
1E534A02000
|
heap
|
page read and write
|
||
2A3391FC000
|
trusted library allocation
|
page read and write
|
||
2A341C57000
|
heap
|
page read and write
|
||
261DF465000
|
heap
|
page read and write
|
||
261DF46B000
|
heap
|
page read and write
|
||
1D9D5BB8000
|
trusted library allocation
|
page read and write
|
||
261E1DFD000
|
heap
|
page read and write
|
||
2A341990000
|
heap
|
page read and write
|
||
261DF4EF000
|
heap
|
page read and write
|
||
1E53499F000
|
heap
|
page read and write
|
||
261E4EC8000
|
heap
|
page read and write
|
||
1E534950000
|
heap
|
page read and write
|
||
261DF596000
|
heap
|
page read and write
|
||
1E1DB1C4000
|
trusted library allocation
|
page read and write
|
||
261DF47C000
|
heap
|
page read and write
|
||
7FF9CD18B000
|
trusted library allocation
|
page execute and read and write
|
||
261DDA9E000
|
heap
|
page read and write
|
||
1E534976000
|
heap
|
page read and write
|
||
2A341981000
|
heap
|
page read and write
|
||
2AB49DC6000
|
heap
|
page read and write
|
||
261DDAA8000
|
heap
|
page read and write
|
||
22F347D0000
|
trusted library allocation
|
page read and write
|
||
261DF4EF000
|
heap
|
page read and write
|
||
E16FFFE000
|
stack
|
page read and write
|
||
261DDA61000
|
heap
|
page read and write
|
||
261E1DB0000
|
heap
|
page read and write
|
||
2A3391E1000
|
trusted library allocation
|
page read and write
|
||
261DF70A000
|
heap
|
page read and write
|
There are 1583 hidden memdumps, click here to show them.