Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
NhWAWEhCi7.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\huge[1].dat
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9FC5.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\D57C.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nsk862A.tmp\liteFirewall.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nslCBA9.tmp\blowfish.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Del.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\bbehcjh
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\bbehcjh:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nslCBA9.tmp\INetC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nslCBA9.tmp\nsProcess.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw1781.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\start.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
|
MSVC program database ver 7.00, 512*4023 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
There are 104 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\NhWAWEhCi7.exe
|
"C:\Users\user\Desktop\NhWAWEhCi7.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Users\user\AppData\Roaming\bbehcjh
|
C:\Users\user\AppData\Roaming\bbehcjh
|
||
C:\Users\user\AppData\Local\Temp\9FC5.exe
|
C:\Users\user\AppData\Local\Temp\9FC5.exe
|
||
C:\Users\user\AppData\Local\Temp\D57C.exe
|
C:\Users\user\AppData\Local\Temp\D57C.exe
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
"C:\Users\user\AppData\Local\Temp\setup.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0
(Macintosh; CPU OS 17_5_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.5.1 Mobile/15E148 Safari/604.1"
--lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3176 --field-trial-handle=3180,i,14998134109693806898,1323138317393721428,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US
--service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Macintosh; CPU OS 17_5_1 like
Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.5.1 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3420 --field-trial-handle=3180,i,14998134109693806898,1323138317393721428,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Macintosh; CPU OS 17_5_1 like Mac
OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.5.1 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3784 --field-trial-handle=3180,i,14998134109693806898,1323138317393721428,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Macintosh;
CPU OS 17_5_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.5.1 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1
--num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719821616869761
--launch-time-ticks=6013536112 --mojo-platform-channel-handle=4012 --field-trial-handle=3180,i,14998134109693806898,1323138317393721428,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Macintosh;
CPU OS 17_5_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.5.1 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2
--enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719821616869761 --launch-time-ticks=6013552940
--mojo-platform-channel-handle=4092 --field-trial-handle=3180,i,14998134109693806898,1323138317393721428,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
There are 26 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://cx5519.com/tmp/index.php
|
|||
http://evilos.cc/tmp/index.php
|
|||
ellaboratepwsz.xyz
|
|||
swellfrrgwwos.xyz
|
|||
foodypannyjsud.shop
|
|||
https://anglebug.com/4674
|
unknown
|
||
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlA&judaGestionat
|
unknown
|
||
https://aka.ms/odirmr
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
|
unknown
|
||
http://anglebug.com/8280enableTranslatedShaderSubstitutionCheck
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity.0
|
unknown
|
||
https://support.google.com/chrome/answer/6098869
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlP&al
|
unknown
|
||
https://api.msn.com:443/v1/news/Feed/Windows?
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
|
unknown
|
||
http://crbug.com/550292
|
unknown
|
||
https://chrome.google.com/webstore?hl=urCtrl$2
|
unknown
|
||
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
|
unknown
|
||
http://crbug.com/883276
|
unknown
|
||
https://foodypannyjsud.shop/api)
|
unknown
|
||
https://foodypannyjsud.shop/w5
|
unknown
|
||
https://crbug.com/1356053
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
https://anglebug.com/5536
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
|
unknown
|
||
https://foodypannyjsud.shop/pii
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
|
unknown
|
||
https://crbug.com/705865
|
unknown
|
||
http://crbug.com/110263
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
https://foodypannyjsud.shop:443/apiuY
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://bageyou.xyz
|
unknown
|
||
http://logging.apache.org/log4ne
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://foodypannyjsud.shop/apim
|
unknown
|
||
https://wns.windows.com/L
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://chrome.google.com/webstore?hl=arCtrl$1
|
unknown
|
||
https://crbug.com/593024
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
|
unknown
|
||
https://crbug.com/1137851
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
|
unknown
|
||
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://foodypannyjsud.shop/apib
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html&
|
unknown
|
||
http://anglebug.com/2152skipVSConstantRegisterZeroIn
|
unknown
|
||
https://crbug.com/1300575
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlT&r
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
|
unknown
|
||
http://xiexie.wf/22_551/huge.dat
|
unknown
|
||
https://crbug.com/710443
|
unknown
|
||
https://crbug.com/1042393
|
unknown
|
||
https://rouonixon.com/4/4284489/?ymid=831224434781065217&var=4284488&price=
|
unknown
|
||
https://crbug.com/1060012
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/3246allowClearForRobustResourceInitSome
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
https://chrome.google.com/webstore?hl=ukCtrl$1
|
unknown
|
||
https://www.rd.com/list/polite-habits-campers-dislike/
|
unknown
|
||
http://anglebug.com/3997
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
http://crbug.com/642605
|
unknown
|
||
http://anglebug.com/1452
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://support.google.com/chrome/a/answer/9122284
|
unknown
|
||
https://foodypannyjsud.shop/F9
|
unknown
|
||
https://outlook.com_
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://chrome.google.com/webstore?hl=caCtrl$1
|
unknown
|
||
https://foodypannyjsud.shop/apiD
|
unknown
|
||
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
|
unknown
|
||
https://crbug.com/650547callClearTwiceUsing
|
unknown
|
||
https://chrome.google.com/webstore?hl=teCtrl$1
|
unknown
|
||
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
|
unknown
|
||
http://crbug.com/1420130
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
unknown
|
European Union
|
||
141.8.192.6
|
unknown
|
Russian Federation
|
||
189.61.54.32
|
unknown
|
Brazil
|
||
127.0.0.127
|
unknown
|
unknown
|
||
139.45.197.238
|
unknown
|
Netherlands
|
||
1.1.1.1
|
unknown
|
Australia
|
||
172.67.221.174
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@explorerframe.dll,-13137
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@explorerframe.dll,-13138
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000003029E
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000050548
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Sid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Pid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GamePall
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
|
DontShowUI
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
tmp_uid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
reg
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
uid
|
||
HKEY_CURRENT_USER\Control Panel\Cursors
|
AppStarting
|
There are 209 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2E80000
|
direct allocation
|
page read and write
|
||
2EA1000
|
unclassified section
|
page read and write
|
||
4851000
|
unclassified section
|
page read and write
|
||
4820000
|
direct allocation
|
page read and write
|
||
C89A000
|
unkown
|
page read and write
|
||
2F44000
|
trusted library allocation
|
page read and write
|
||
968B000
|
unkown
|
page read and write
|
||
C964000
|
unkown
|
page read and write
|
||
5CC0000
|
trusted library allocation
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
34E9000
|
stack
|
page read and write
|
||
7FF5ED1FA000
|
unkown
|
page readonly
|
||
8740000
|
unkown
|
page read and write
|
||
A37B000
|
unkown
|
page read and write
|
||
2EED000
|
heap
|
page execute and read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
FFC000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3160000
|
unkown
|
page read and write
|
||
15CD000
|
trusted library allocation
|
page execute and read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
4C34000
|
unkown
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
397D000
|
trusted library allocation
|
page read and write
|
||
7FF5ED97A000
|
unkown
|
page readonly
|
||
2BE4000
|
unkown
|
page readonly
|
||
125F000
|
heap
|
page read and write
|
||
C6C1000
|
unkown
|
page read and write
|
||
61D0000
|
heap
|
page read and write
|
||
8108000
|
stack
|
page read and write
|
||
7FF5ED800000
|
unkown
|
page readonly
|
||
97A9000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
FA2000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
37AE000
|
unkown
|
page read and write
|
||
C6C9000
|
unkown
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
518E000
|
trusted library allocation
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
1235000
|
heap
|
page read and write
|
||
7FF5ED2A9000
|
unkown
|
page readonly
|
||
11CD000
|
heap
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
B140000
|
unkown
|
page readonly
|
||
3935000
|
trusted library allocation
|
page read and write
|
||
CE4000
|
unkown
|
page readonly
|
||
2F03000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
2471000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
C6D8000
|
unkown
|
page read and write
|
||
7FF5ED64F000
|
unkown
|
page readonly
|
||
2EDA000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
11B3000
|
heap
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
4EA4000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
2DA4000
|
heap
|
page read and write
|
||
7FF5ED986000
|
unkown
|
page readonly
|
||
53C000
|
stack
|
page read and write
|
||
12B1000
|
trusted library allocation
|
page read and write
|
||
125D000
|
trusted library allocation
|
page execute and read and write
|
||
51D5000
|
trusted library allocation
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
2D94000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
302A000
|
trusted library allocation
|
page execute and read and write
|
||
13FA000
|
heap
|
page read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
7A34000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
3900000
|
trusted library allocation
|
page read and write
|
||
C563000
|
unkown
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5D1CD4000
|
unkown
|
page readonly
|
||
392C000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
5FF1000
|
heap
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
1263000
|
heap
|
page read and write
|
||
3153000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
48F6000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
2BE4000
|
unkown
|
page readonly
|
||
3910000
|
trusted library allocation
|
page read and write
|
||
5765000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
8EF0000
|
unkown
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
3914000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
unkown
|
page readonly
|
||
8740000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
E52000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
BC9B000
|
stack
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
FE6000
|
stack
|
page read and write
|
||
7DF4F3040000
|
unkown
|
page readonly
|
||
FA4000
|
trusted library allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
10C0000
|
unkown
|
page readonly
|
||
408000
|
unkown
|
page readonly
|
||
7F50000
|
unkown
|
page read and write
|
||
3939000
|
trusted library allocation
|
page read and write
|
||
390E000
|
trusted library allocation
|
page read and write
|
||
7FF5ED43A000
|
unkown
|
page readonly
|
||
1249000
|
heap
|
page read and write
|
||
2F67000
|
trusted library allocation
|
page read and write
|
||
5CA1000
|
trusted library allocation
|
page read and write
|
||
2B16000
|
trusted library allocation
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
2C26000
|
trusted library allocation
|
page read and write
|
||
10F1F000
|
unkown
|
page read and write
|
||
BDD0000
|
unkown
|
page readonly
|
||
8EF0000
|
unkown
|
page read and write
|
||
A4A1000
|
unkown
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
395A000
|
trusted library allocation
|
page read and write
|
||
C557000
|
unkown
|
page read and write
|
||
5CBC000
|
stack
|
page read and write
|
||
123B000
|
stack
|
page read and write
|
||
CAEC000
|
unkown
|
page read and write
|
||
BA4C000
|
stack
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
5160000
|
heap
|
page execute and read and write
|
||
896000
|
trusted library allocation
|
page execute and read and write
|
||
2B25000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page execute and read and write
|
||
AB49000
|
unkown
|
page read and write
|
||
6220000
|
trusted library allocation
|
page execute and read and write
|
||
3946000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
2D28000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
4E3D000
|
stack
|
page read and write
|
||
3914000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
B18000
|
heap
|
page read and write
|
||
9879000
|
unkown
|
page read and write
|
||
FBD0000
|
unkown
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
56C3000
|
unkown
|
page read and write
|
||
30B5000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
7FF5ED8C1000
|
unkown
|
page readonly
|
||
154A000
|
heap
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
3AC0000
|
trusted library allocation
|
page read and write
|
||
61C0000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
38F8000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
5774000
|
trusted library allocation
|
page read and write
|
||
4BDC000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
A37D000
|
unkown
|
page read and write
|
||
392C000
|
trusted library allocation
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
7FF5ED714000
|
unkown
|
page readonly
|
||
2AF6000
|
trusted library allocation
|
page read and write
|
||
A502000
|
unkown
|
page read and write
|
||
7FF5ED40D000
|
unkown
|
page readonly
|
||
390F000
|
trusted library allocation
|
page read and write
|
||
126F000
|
heap
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3580000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED349000
|
unkown
|
page readonly
|
||
CE0000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
1095000
|
stack
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
7FF5ED5F7000
|
unkown
|
page readonly
|
||
106E000
|
heap
|
page read and write
|
||
CBB6000
|
unkown
|
page read and write
|
||
89A000
|
trusted library allocation
|
page execute and read and write
|
||
122A000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
923E000
|
stack
|
page read and write
|
||
3CB0000
|
heap
|
page read and write
|
||
1247000
|
heap
|
page read and write
|
||
5776000
|
trusted library allocation
|
page read and write
|
||
2B4F000
|
trusted library allocation
|
page read and write
|
||
392C000
|
trusted library allocation
|
page read and write
|
||
547C000
|
stack
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
41C3000
|
trusted library allocation
|
page read and write
|
||
1508000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
4E7E000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
9792000
|
unkown
|
page read and write
|
||
7FF5ED7C4000
|
unkown
|
page readonly
|
||
7DD0000
|
unkown
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
6230000
|
heap
|
page execute and read and write
|
||
7852000
|
unkown
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
7FF5ED46A000
|
unkown
|
page readonly
|
||
B5AE000
|
stack
|
page read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
direct allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
5FC4000
|
heap
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
C54000
|
trusted library allocation
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
124C000
|
heap
|
page read and write
|
||
1147000
|
heap
|
page read and write
|
||
DF7000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
7FF5EDA11000
|
unkown
|
page readonly
|
||
51B5000
|
trusted library allocation
|
page read and write
|
||
1263000
|
heap
|
page read and write
|
||
1272000
|
trusted library allocation
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
3930000
|
trusted library allocation
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
2F54000
|
trusted library allocation
|
page read and write
|
||
A39B000
|
unkown
|
page read and write
|
||
572D000
|
unkown
|
page readonly
|
||
7A0000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
831000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FF5ED4BB000
|
unkown
|
page readonly
|
||
38EF000
|
trusted library allocation
|
page read and write
|
||
1810000
|
heap
|
page read and write
|
||
3471000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
11CF000
|
stack
|
page read and write
|
||
4C5000
|
heap
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
1336000
|
stack
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
2D18000
|
trusted library allocation
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
7FF5ED42B000
|
unkown
|
page readonly
|
||
C962000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
E26000
|
heap
|
page read and write
|
||
5776000
|
trusted library allocation
|
page read and write
|
||
E46000
|
trusted library allocation
|
page execute and read and write
|
||
4C53000
|
heap
|
page execute and read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
4900000
|
trusted library allocation
|
page read and write
|
||
38F8000
|
trusted library allocation
|
page read and write
|
||
2967000
|
trusted library allocation
|
page read and write
|
||
391E000
|
trusted library allocation
|
page read and write
|
||
29CC000
|
stack
|
page read and write
|
||
11C6000
|
trusted library allocation
|
page execute and read and write
|
||
38EA000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
1263000
|
heap
|
page read and write
|
||
3954000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
2B4D000
|
trusted library allocation
|
page read and write
|
||
3A3A000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
38E1000
|
trusted library allocation
|
page read and write
|
||
9F1E000
|
stack
|
page read and write
|
||
7FFE000
|
stack
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
8750000
|
unkown
|
page read and write
|
||
FA54000
|
unkown
|
page read and write
|
||
FBD8000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
3985000
|
trusted library allocation
|
page read and write
|
||
15C4000
|
trusted library allocation
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
AB5B000
|
unkown
|
page read and write
|
||
4B60000
|
heap
|
page read and write
|
||
7FF5EDA31000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED5C9000
|
unkown
|
page readonly
|
||
2F75000
|
trusted library allocation
|
page read and write
|
||
3915000
|
trusted library allocation
|
page read and write
|
||
124A000
|
heap
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
2270000
|
heap
|
page execute and read and write
|
||
38F0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED847000
|
unkown
|
page readonly
|
||
A9F000
|
stack
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
C49E000
|
stack
|
page read and write
|
||
7FF5ED1D6000
|
unkown
|
page readonly
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
5B80000
|
heap
|
page read and write
|
||
7FF5ED7FD000
|
unkown
|
page readonly
|
||
E26000
|
heap
|
page read and write
|
||
9877000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
FBDB000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
FC8000
|
heap
|
page read and write
|
||
5B4E000
|
stack
|
page read and write
|
||
100F000
|
stack
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
76A0000
|
unkown
|
page read and write
|
||
3915000
|
trusted library allocation
|
page read and write
|
||
123E000
|
heap
|
page read and write
|
||
7FF5ED4DF000
|
unkown
|
page readonly
|
||
3290000
|
unkown
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
7FF5ED85F000
|
unkown
|
page readonly
|
||
7FF5ED670000
|
unkown
|
page readonly
|
||
7DD0000
|
unkown
|
page read and write
|
||
15C3000
|
trusted library allocation
|
page execute and read and write
|
||
124A000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
978E000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
11C0000
|
unkown
|
page readonly
|
||
38FB000
|
trusted library allocation
|
page read and write
|
||
289F000
|
stack
|
page read and write
|
||
8860000
|
unkown
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
E23000
|
trusted library allocation
|
page execute and read and write
|
||
4C18000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
C54A000
|
unkown
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9A6000
|
unkown
|
page readonly
|
||
7FF5ED449000
|
unkown
|
page readonly
|
||
7FF5EDA0D000
|
unkown
|
page readonly
|
||
3943000
|
trusted library allocation
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
41F000
|
unkown
|
page readonly
|
||
2F50000
|
trusted library allocation
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
4C1E000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
124D000
|
trusted library allocation
|
page execute and read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
590E000
|
stack
|
page read and write
|
||
3942000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
828000
|
heap
|
page read and write
|
||
38F4000
|
trusted library allocation
|
page read and write
|
||
28E1000
|
trusted library allocation
|
page read and write
|
||
1246000
|
heap
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
FD40000
|
unkown
|
page read and write
|
||
9B60000
|
unkown
|
page readonly
|
||
3032000
|
trusted library allocation
|
page read and write
|
||
38E8000
|
trusted library allocation
|
page read and write
|
||
2C6A000
|
heap
|
page read and write
|
||
11B3000
|
heap
|
page read and write
|
||
2355000
|
trusted library allocation
|
page read and write
|
||
124B000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
7FF5ED6B9000
|
unkown
|
page readonly
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
300D000
|
trusted library allocation
|
page execute and read and write
|
||
A323000
|
unkown
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
7CD0000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
9550000
|
unkown
|
page readonly
|
||
281E000
|
stack
|
page read and write
|
||
7FF5ED7E0000
|
unkown
|
page readonly
|
||
11D2000
|
trusted library allocation
|
page read and write
|
||
390D000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
7EB000
|
heap
|
page read and write
|
||
11207000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
21FE000
|
stack
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
1200000
|
trusted library allocation
|
page execute and read and write
|
||
8740000
|
unkown
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
F74000
|
trusted library allocation
|
page read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
FD9F000
|
unkown
|
page read and write
|
||
3927000
|
trusted library allocation
|
page read and write
|
||
8750000
|
unkown
|
page read and write
|
||
A494000
|
unkown
|
page read and write
|
||
1475000
|
trusted library allocation
|
page read and write
|
||
48B6000
|
trusted library allocation
|
page read and write
|
||
7FF5ED814000
|
unkown
|
page readonly
|
||
33FF000
|
trusted library allocation
|
page read and write
|
||
B650000
|
unkown
|
page read and write
|
||
563E000
|
trusted library allocation
|
page read and write
|
||
88D000
|
trusted library allocation
|
page execute and read and write
|
||
3160000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
3210000
|
unkown
|
page read and write
|
||
B7A5000
|
stack
|
page read and write
|
||
7FF5ED793000
|
unkown
|
page readonly
|
||
391D000
|
trusted library allocation
|
page read and write
|
||
DFB000
|
stack
|
page read and write
|
||
2B41000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
977A000
|
unkown
|
page read and write
|
||
7FF5ED3A7000
|
unkown
|
page readonly
|
||
8740000
|
unkown
|
page read and write
|
||
E8D000
|
trusted library allocation
|
page execute and read and write
|
||
8740000
|
unkown
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
8A2000
|
trusted library allocation
|
page read and write
|
||
1610000
|
trusted library allocation
|
page read and write
|
||
1350000
|
unkown
|
page readonly
|
||
1259000
|
heap
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
40F5000
|
trusted library allocation
|
page read and write
|
||
4B8B000
|
unkown
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
C8E1000
|
unkown
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
11F6000
|
heap
|
page read and write
|
||
E08000
|
heap
|
page read and write
|
||
49E0000
|
heap
|
page read and write
|
||
B8B0000
|
unkown
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
95DA000
|
stack
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED915000
|
unkown
|
page readonly
|
||
987D000
|
unkown
|
page read and write
|
||
5744000
|
trusted library allocation
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
393B000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
8780000
|
unkown
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
896B000
|
stack
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
3950000
|
trusted library allocation
|
page read and write
|
||
AAFF000
|
unkown
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
2B45000
|
trusted library allocation
|
page read and write
|
||
169E000
|
stack
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
18A0000
|
unkown
|
page readonly
|
||
89A0000
|
unkown
|
page read and write
|
||
C846000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
A19F000
|
stack
|
page read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
3020000
|
unkown
|
page read and write
|
||
7E50000
|
unkown
|
page readonly
|
||
C857000
|
unkown
|
page read and write
|
||
E83000
|
trusted library allocation
|
page execute and read and write
|
||
C516000
|
unkown
|
page read and write
|
||
7FF5ED6A5000
|
unkown
|
page readonly
|
||
7DD0000
|
unkown
|
page read and write
|
||
1120000
|
trusted library allocation
|
page execute and read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
9F9B000
|
stack
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
518B000
|
trusted library allocation
|
page read and write
|
||
38EC000
|
trusted library allocation
|
page read and write
|
||
AADB000
|
unkown
|
page read and write
|
||
7FF5ED3EA000
|
unkown
|
page readonly
|
||
33C0000
|
unkown
|
page read and write
|
||
79D3000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3659000
|
stack
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
3962000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
trusted library allocation
|
page read and write
|
||
7FF5ED426000
|
unkown
|
page readonly
|
||
7FF5ED80C000
|
unkown
|
page readonly
|
||
7FF5ED697000
|
unkown
|
page readonly
|
||
3A01000
|
trusted library allocation
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
7FF5ED669000
|
unkown
|
page readonly
|
||
A49E000
|
unkown
|
page read and write
|
||
3590000
|
unkown
|
page read and write
|
||
4B90000
|
unkown
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page execute and read and write
|
||
E9D000
|
trusted library allocation
|
page execute and read and write
|
||
2D09000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
B629000
|
stack
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
38F4000
|
trusted library allocation
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED337000
|
unkown
|
page readonly
|
||
4B56000
|
unkown
|
page read and write
|
||
8FB9000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
5FC0000
|
heap
|
page read and write
|
||
774000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3004000
|
trusted library allocation
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
392B000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
9885000
|
unkown
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
1443000
|
trusted library allocation
|
page execute and read and write
|
||
8780000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED4F3000
|
unkown
|
page readonly
|
||
310E000
|
stack
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
704000
|
unkown
|
page write copy
|
||
FBD8000
|
unkown
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
8EC6000
|
unkown
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
2FDE000
|
trusted library allocation
|
page read and write
|
||
FBD8000
|
unkown
|
page read and write
|
||
38F4000
|
trusted library allocation
|
page read and write
|
||
5FBC000
|
stack
|
page read and write
|
||
DB8000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
38F4000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
705000
|
unkown
|
page execute read
|
||
3001000
|
trusted library allocation
|
page read and write
|
||
4001000
|
trusted library allocation
|
page read and write
|
||
2950000
|
trusted library allocation
|
page execute and read and write
|
||
391D000
|
trusted library allocation
|
page read and write
|
||
FBDC000
|
unkown
|
page read and write
|
||
11B3000
|
heap
|
page read and write
|
||
3A18000
|
trusted library allocation
|
page read and write
|
||
785D000
|
unkown
|
page read and write
|
||
78AD000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED507000
|
unkown
|
page readonly
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
511F000
|
stack
|
page read and write
|
||
8750000
|
unkown
|
page read and write
|
||
38F0000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
38F2000
|
trusted library allocation
|
page read and write
|
||
3127000
|
trusted library allocation
|
page read and write
|
||
3977000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page execute and read and write
|
||
14A8000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
E95000
|
heap
|
page read and write
|
||
1505000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
7FF5ED743000
|
unkown
|
page readonly
|
||
F9D3000
|
unkown
|
page read and write
|
||
FBD5000
|
unkown
|
page read and write
|
||
9A5B000
|
unkown
|
page read and write
|
||
7FF5ED519000
|
unkown
|
page readonly
|
||
38F0000
|
trusted library allocation
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
3797000
|
unkown
|
page read and write
|
||
BDA0000
|
unkown
|
page readonly
|
||
DE0000
|
unkown
|
page readonly
|
||
306E000
|
stack
|
page read and write
|
||
F7D000
|
trusted library allocation
|
page execute and read and write
|
||
880000
|
trusted library allocation
|
page read and write
|
||
FD82000
|
unkown
|
page read and write
|
||
3A88000
|
trusted library allocation
|
page read and write
|
||
3922000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
AB51000
|
unkown
|
page read and write
|
||
2BC1000
|
trusted library allocation
|
page read and write
|
||
4E86000
|
trusted library allocation
|
page read and write
|
||
70F000
|
heap
|
page read and write
|
||
71B000
|
stack
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
1244000
|
trusted library allocation
|
page read and write
|
||
15E6000
|
trusted library allocation
|
page execute and read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
3911000
|
trusted library allocation
|
page read and write
|
||
787C000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
9871000
|
unkown
|
page read and write
|
||
7FF5ED755000
|
unkown
|
page readonly
|
||
3918000
|
trusted library allocation
|
page read and write
|
||
7FF5ED1D8000
|
unkown
|
page readonly
|
||
BD98000
|
stack
|
page read and write
|
||
2F5E000
|
trusted library allocation
|
page read and write
|
||
1175000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
8780000
|
unkown
|
page read and write
|
||
8EF0000
|
unkown
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
7FF5ED864000
|
unkown
|
page readonly
|
||
3900000
|
trusted library allocation
|
page read and write
|
||
17AE000
|
stack
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
3900000
|
trusted library allocation
|
page read and write
|
||
3E69000
|
trusted library allocation
|
page read and write
|
||
7863000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
5765000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
7FF5ED872000
|
unkown
|
page readonly
|
||
1130000
|
heap
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
88EE000
|
stack
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
C88B000
|
unkown
|
page read and write
|
||
38EE000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
8EF0000
|
unkown
|
page read and write
|
||
8DA0000
|
unkown
|
page read and write
|
||
8AB000
|
trusted library allocation
|
page execute and read and write
|
||
14CC000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
FA7000
|
trusted library allocation
|
page execute and read and write
|
||
93BE000
|
stack
|
page read and write
|
||
2D11000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
7FF5ED5C1000
|
unkown
|
page readonly
|
||
C7B000
|
stack
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
7FF5ED65C000
|
unkown
|
page readonly
|
||
1231000
|
heap
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
E24000
|
trusted library allocation
|
page read and write
|
||
4A43000
|
trusted library allocation
|
page read and write
|
||
7FF5ED980000
|
unkown
|
page readonly
|
||
8740000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
9660000
|
unkown
|
page read and write
|
||
1266000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
7DF4F3050000
|
unkown
|
page readonly
|
||
393E000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page write copy
|
||
7FF5ED41C000
|
unkown
|
page readonly
|
||
FAD000
|
trusted library allocation
|
page execute and read and write
|
||
9893000
|
unkown
|
page read and write
|
||
2D1B000
|
trusted library allocation
|
page read and write
|
||
2251000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
391E000
|
trusted library allocation
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
30C4000
|
trusted library allocation
|
page read and write
|
||
A361000
|
unkown
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
7FF5ED9D2000
|
unkown
|
page readonly
|
||
8740000
|
unkown
|
page read and write
|
||
4E8D000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
33D5000
|
trusted library allocation
|
page read and write
|
||
9869000
|
unkown
|
page read and write
|
||
5C8F000
|
stack
|
page read and write
|
||
123A000
|
heap
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
7FF5ED445000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
15F2000
|
trusted library allocation
|
page read and write
|
||
3922000
|
trusted library allocation
|
page read and write
|
||
1385000
|
heap
|
page read and write
|
||
7FF5ED71E000
|
unkown
|
page readonly
|
||
5184000
|
trusted library allocation
|
page read and write
|
||
1490000
|
unkown
|
page read and write
|
||
48C4000
|
trusted library allocation
|
page read and write
|
||
148F000
|
stack
|
page read and write
|
||
4CD0000
|
unkown
|
page read and write
|
||
3948000
|
trusted library allocation
|
page read and write
|
||
13C8000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
12B7000
|
trusted library allocation
|
page read and write
|
||
11CF000
|
heap
|
page read and write
|
||
38EC000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
5736000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
10C8000
|
heap
|
page read and write
|
||
7FF5ED961000
|
unkown
|
page readonly
|
||
11B3000
|
heap
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
1263000
|
heap
|
page read and write
|
||
FF1000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
38EC000
|
trusted library allocation
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
43D5000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
A391000
|
unkown
|
page read and write
|
||
F66000
|
heap
|
page read and write
|
||
7D6C000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7A0000
|
heap
|
page read and write
|
||
38EC000
|
trusted library allocation
|
page read and write
|
||
126F000
|
heap
|
page read and write
|
||
392C000
|
trusted library allocation
|
page read and write
|
||
58D0000
|
unkown
|
page readonly
|
||
C82000
|
trusted library allocation
|
page read and write
|
||
3791000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
11B3000
|
heap
|
page read and write
|
||
37A0000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
7FF5ED3CE000
|
unkown
|
page readonly
|
||
C80000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
4E6B000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
1257000
|
heap
|
page read and write
|
||
C700000
|
unkown
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
61BC000
|
stack
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
126A000
|
trusted library allocation
|
page execute and read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
7FF5ED644000
|
unkown
|
page readonly
|
||
7FF5ED8A4000
|
unkown
|
page readonly
|
||
8740000
|
unkown
|
page read and write
|
||
2BA0000
|
heap
|
page execute and read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
7FF5ED556000
|
unkown
|
page readonly
|
||
97B5000
|
unkown
|
page read and write
|
||
7FF5EDA53000
|
unkown
|
page readonly
|
||
38EA000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
7FF5ED495000
|
unkown
|
page readonly
|
||
33C0000
|
unkown
|
page read and write
|
||
122F000
|
heap
|
page read and write
|
||
1247000
|
heap
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
7FF5ED9ED000
|
unkown
|
page readonly
|
||
7FF5ED4FD000
|
unkown
|
page readonly
|
||
53E0000
|
trusted library allocation
|
page execute and read and write
|
||
680000
|
unkown
|
page readonly
|
||
13C0000
|
heap
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
5C92000
|
trusted library allocation
|
page read and write
|
||
48E5000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
4E88000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
FD7D000
|
unkown
|
page read and write
|
||
EC6000
|
heap
|
page read and write
|
||
BD1D000
|
stack
|
page read and write
|
||
2CE4000
|
heap
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
1631000
|
trusted library allocation
|
page read and write
|
||
78A0000
|
unkown
|
page read and write
|
||
3756000
|
unkown
|
page read and write
|
||
4E66000
|
trusted library allocation
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
379E000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7E60000
|
unkown
|
page read and write
|
||
3026000
|
trusted library allocation
|
page execute and read and write
|
||
695000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
4BE3000
|
unkown
|
page read and write
|
||
4909000
|
trusted library allocation
|
page read and write
|
||
FAB000
|
trusted library allocation
|
page execute and read and write
|
||
8740000
|
unkown
|
page read and write
|
||
6220000
|
unkown
|
page readonly
|
||
9DED000
|
stack
|
page read and write
|
||
1138000
|
heap
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
2FDF000
|
stack
|
page read and write
|
||
FBD4000
|
unkown
|
page read and write
|
||
5B90000
|
heap
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
79B1000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
96DF000
|
unkown
|
page read and write
|
||
3209000
|
stack
|
page read and write
|
||
3962000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
7CA0000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
2AFE000
|
trusted library allocation
|
page read and write
|
||
C5AA000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
||
3915000
|
trusted library allocation
|
page read and write
|
||
118E000
|
heap
|
page read and write
|
||
4E6E000
|
trusted library allocation
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
38FC000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
FD8A000
|
unkown
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
EAA000
|
trusted library allocation
|
page execute and read and write
|
||
E5E000
|
heap
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
11208000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
A4FC000
|
unkown
|
page read and write
|
||
100B000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
AAF9000
|
unkown
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
C5A3000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
573B000
|
trusted library allocation
|
page read and write
|
||
2C24000
|
trusted library allocation
|
page read and write
|
||
3800000
|
unkown
|
page readonly
|
||
7FF5ED68F000
|
unkown
|
page readonly
|
||
2B3E000
|
stack
|
page read and write
|
||
7FF5ED3D0000
|
unkown
|
page readonly
|
||
223D000
|
stack
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
C56F000
|
unkown
|
page read and write
|
||
2D14000
|
trusted library allocation
|
page read and write
|
||
705000
|
unkown
|
page execute read
|
||
9795000
|
unkown
|
page read and write
|
||
9873000
|
unkown
|
page read and write
|
||
122F000
|
heap
|
page read and write
|
||
2C92000
|
heap
|
page read and write
|
||
F994000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
DDF000
|
stack
|
page read and write
|
||
CA02000
|
unkown
|
page read and write
|
||
C507000
|
unkown
|
page read and write
|
||
7FF5EDA47000
|
unkown
|
page readonly
|
||
7FF5ED516000
|
unkown
|
page readonly
|
||
28DC000
|
stack
|
page read and write
|
||
58D2000
|
unkown
|
page readonly
|
||
1483000
|
heap
|
page read and write
|
||
519E000
|
trusted library allocation
|
page read and write
|
||
B8C0000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
393D000
|
trusted library allocation
|
page read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
CC5000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
423000
|
unkown
|
page execute read
|
||
122F000
|
heap
|
page read and write
|
||
5B7E000
|
stack
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
37AC000
|
unkown
|
page read and write
|
||
2789000
|
heap
|
page read and write
|
||
AB05000
|
unkown
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7953000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7E11000
|
unkown
|
page read and write
|
||
5EBB000
|
stack
|
page read and write
|
||
36D5000
|
stack
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
123B000
|
stack
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
11CF000
|
heap
|
page read and write
|
||
4B78000
|
unkown
|
page read and write
|
||
41F000
|
unkown
|
page readonly
|
||
2FF0000
|
heap
|
page execute and read and write
|
||
1094000
|
heap
|
page read and write
|
||
965C000
|
stack
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
38F4000
|
trusted library allocation
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
3147000
|
trusted library allocation
|
page read and write
|
||
1216000
|
heap
|
page read and write
|
||
25CF000
|
stack
|
page read and write
|
||
5800000
|
heap
|
page execute and read and write
|
||
14BC000
|
heap
|
page read and write
|
||
1637000
|
trusted library allocation
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
DE6000
|
heap
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
346D000
|
stack
|
page read and write
|
||
3900000
|
trusted library allocation
|
page read and write
|
||
C5D000
|
trusted library allocation
|
page execute and read and write
|
||
1177000
|
heap
|
page read and write
|
||
38EA000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
unkown
|
page read and write
|
||
43D7000
|
trusted library allocation
|
page read and write
|
||
31F1000
|
trusted library allocation
|
page read and write
|
||
7FF5ED92C000
|
unkown
|
page readonly
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
578D000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
7FF5EDA38000
|
unkown
|
page readonly
|
||
7DD0000
|
unkown
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
C95000
|
heap
|
page read and write
|
||
7FF5ED94A000
|
unkown
|
page readonly
|
||
7FF5EDA2A000
|
unkown
|
page readonly
|
||
7FF5ED9A1000
|
unkown
|
page readonly
|
||
3D0000
|
unkown
|
page readonly
|
||
10E01000
|
unkown
|
page read and write
|
||
7FF5ED810000
|
unkown
|
page readonly
|
||
7FF5ED853000
|
unkown
|
page readonly
|
||
1337000
|
stack
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
311F000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
29CE000
|
stack
|
page read and write
|
||
4BFC000
|
trusted library allocation
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
14F8000
|
heap
|
page read and write
|
||
8780000
|
unkown
|
page read and write
|
||
1259000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
3900000
|
trusted library allocation
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
303B000
|
trusted library allocation
|
page execute and read and write
|
||
124D000
|
heap
|
page read and write
|
||
7FF5ED3F3000
|
unkown
|
page readonly
|
||
11D7000
|
trusted library allocation
|
page execute and read and write
|
||
13B0000
|
heap
|
page read and write
|
||
134A000
|
heap
|
page read and write
|
||
7FF5ED4B4000
|
unkown
|
page readonly
|
||
2E50000
|
remote allocation
|
page read and write
|
||
3911000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
5725000
|
trusted library allocation
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
4007000
|
trusted library allocation
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
5492000
|
unkown
|
page readonly
|
||
390D000
|
trusted library allocation
|
page read and write
|
||
127B000
|
trusted library allocation
|
page execute and read and write
|
||
39E1000
|
heap
|
page read and write
|
||
37DE000
|
stack
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
E7B000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
3941000
|
trusted library allocation
|
page read and write
|
||
126F000
|
heap
|
page read and write
|
||
7FF5ED3D6000
|
unkown
|
page readonly
|
||
38E5000
|
trusted library allocation
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
42A5000
|
trusted library allocation
|
page read and write
|
||
142E000
|
stack
|
page read and write
|
||
37BD000
|
unkown
|
page read and write
|
||
7FF5ED76D000
|
unkown
|
page readonly
|
||
C87000
|
trusted library allocation
|
page execute and read and write
|
||
57D0000
|
heap
|
page execute and read and write
|
||
4CB0000
|
unkown
|
page read and write
|
||
7FF5ED286000
|
unkown
|
page readonly
|
||
C53000
|
trusted library allocation
|
page execute and read and write
|
||
31EE000
|
stack
|
page read and write
|
||
FBDB000
|
unkown
|
page read and write
|
||
1257000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
2B51000
|
trusted library allocation
|
page read and write
|
||
2E38000
|
trusted library allocation
|
page read and write
|
||
15FB000
|
trusted library allocation
|
page execute and read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
8750000
|
unkown
|
page read and write
|
||
FFE000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
1266000
|
trusted library allocation
|
page execute and read and write
|
||
38E5000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
11201000
|
unkown
|
page read and write
|
||
7FF5ED8E7000
|
unkown
|
page readonly
|
||
9FF000
|
stack
|
page read and write
|
||
F7B000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
FA16000
|
unkown
|
page read and write
|
||
7FF5ED4E8000
|
unkown
|
page readonly
|
||
5641000
|
unkown
|
page read and write
|
||
390B000
|
trusted library allocation
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3063000
|
trusted library allocation
|
page read and write
|
||
3933000
|
trusted library allocation
|
page read and write
|
||
D53000
|
stack
|
page read and write
|
||
4820000
|
direct allocation
|
page read and write
|
||
1440000
|
unkown
|
page read and write
|
||
11B3000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
7900000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3906000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
F2C000
|
heap
|
page read and write
|
||
B10D000
|
stack
|
page read and write
|
||
FBDC000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
C811000
|
unkown
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
5786000
|
trusted library allocation
|
page read and write
|
||
3477000
|
trusted library allocation
|
page read and write
|
||
272F000
|
stack
|
page read and write
|
||
4BFE000
|
trusted library allocation
|
page read and write
|
||
42A9000
|
trusted library allocation
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
48E0000
|
heap
|
page read and write
|
||
EBC000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
FBD5000
|
unkown
|
page read and write
|
||
7FF5ED26E000
|
unkown
|
page readonly
|
||
24CE000
|
stack
|
page read and write
|
||
1271000
|
heap
|
page read and write
|
||
48BB000
|
trusted library allocation
|
page read and write
|
||
38E6000
|
trusted library allocation
|
page read and write
|
||
1243000
|
trusted library allocation
|
page execute and read and write
|
||
38F8000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
52DD000
|
stack
|
page read and write
|
||
3D1000
|
unkown
|
page execute read
|
||
1120E000
|
unkown
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
573E000
|
trusted library allocation
|
page read and write
|
||
1505000
|
heap
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
55BD000
|
stack
|
page read and write
|
||
18B000
|
stack
|
page read and write
|
||
279E000
|
stack
|
page read and write
|
||
F8D000
|
trusted library allocation
|
page execute and read and write
|
||
C7A000
|
trusted library allocation
|
page execute and read and write
|
||
EA6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED9B8000
|
unkown
|
page readonly
|
||
11B8000
|
heap
|
page read and write
|
||
AAF2000
|
unkown
|
page read and write
|
||
E84000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3037000
|
trusted library allocation
|
page execute and read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
2AF4000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
FBD7000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
8B60000
|
unkown
|
page readonly
|
||
8740000
|
unkown
|
page read and write
|
||
2734000
|
heap
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
3943000
|
trusted library allocation
|
page read and write
|
||
CA42000
|
unkown
|
page read and write
|
||
51B5000
|
trusted library allocation
|
page read and write
|
||
9D64000
|
unkown
|
page read and write
|
||
A4B8000
|
unkown
|
page read and write
|
||
30F1000
|
trusted library allocation
|
page read and write
|
||
C7C5000
|
unkown
|
page read and write
|
||
30F5000
|
trusted library allocation
|
page read and write
|
||
38E9000
|
trusted library allocation
|
page read and write
|
||
3950000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
4B50000
|
unkown
|
page read and write
|
||
2E50000
|
remote allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
3929000
|
trusted library allocation
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
40D000
|
unkown
|
page readonly
|
||
4BE1000
|
unkown
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
38F9000
|
trusted library allocation
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
3401000
|
trusted library allocation
|
page read and write
|
||
C8B000
|
trusted library allocation
|
page execute and read and write
|
||
9B000
|
stack
|
page read and write
|
||
818E000
|
stack
|
page read and write
|
||
10AF000
|
stack
|
page read and write
|
||
38E0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED28E000
|
unkown
|
page readonly
|
||
8740000
|
unkown
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
A21E000
|
stack
|
page read and write
|
||
39E0000
|
heap
|
page read and write
|
||
FDAE000
|
unkown
|
page read and write
|
||
89E0000
|
unkown
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3160000
|
unkown
|
page read and write
|
||
5C9C000
|
trusted library allocation
|
page read and write
|
||
40F1000
|
trusted library allocation
|
page read and write
|
||
6011000
|
heap
|
page read and write
|
||
4B93000
|
unkown
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
48F4000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
4F6000
|
stack
|
page read and write
|
||
526F000
|
stack
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
4BC9000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
38EC000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
3918000
|
trusted library allocation
|
page read and write
|
||
7FF5ED77E000
|
unkown
|
page readonly
|
||
704000
|
unkown
|
page read and write
|
||
392E000
|
trusted library allocation
|
page read and write
|
||
C50A000
|
unkown
|
page read and write
|
||
FE1000
|
heap
|
page read and write
|
||
7FF5ED68C000
|
unkown
|
page readonly
|
||
76C0000
|
unkown
|
page read and write
|
||
14DA000
|
heap
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
2F6D000
|
stack
|
page read and write
|
||
7D53000
|
unkown
|
page read and write
|
||
662000
|
unkown
|
page readonly
|
||
3200000
|
heap
|
page read and write
|
||
7FF5ED52F000
|
unkown
|
page readonly
|
||
48F0000
|
trusted library allocation
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
42A000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
11DB000
|
trusted library allocation
|
page execute and read and write
|
||
2C50000
|
direct allocation
|
page execute and read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
42D000
|
unkown
|
page read and write
|
||
1130000
|
heap
|
page execute and read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
9875000
|
unkown
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
FA94000
|
unkown
|
page read and write
|
||
1256000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
41F000
|
unkown
|
page readonly
|
||
38F5000
|
trusted library allocation
|
page read and write
|
||
57BF000
|
stack
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
48D1000
|
trusted library allocation
|
page read and write
|
||
F06000
|
heap
|
page read and write
|
||
15EA000
|
trusted library allocation
|
page execute and read and write
|
||
3910000
|
trusted library allocation
|
page read and write
|
||
39D1000
|
trusted library allocation
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
2B43000
|
trusted library allocation
|
page read and write
|
||
35A0000
|
unkown
|
page readonly
|
||
3D47000
|
trusted library allocation
|
page read and write
|
||
CB6E000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
4E95000
|
trusted library allocation
|
page read and write
|
||
36F0000
|
unkown
|
page readonly
|
||
9C000
|
stack
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
5789000
|
trusted library allocation
|
page read and write
|
||
7847000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
1272000
|
heap
|
page read and write
|
||
D4B000
|
stack
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
7FF5ED803000
|
unkown
|
page readonly
|
||
563C000
|
trusted library allocation
|
page read and write
|
||
2B1D000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
7FF5ED6DB000
|
unkown
|
page readonly
|
||
786B000
|
unkown
|
page read and write
|
||
10F6000
|
stack
|
page read and write
|
||
30D9000
|
trusted library allocation
|
page read and write
|
||
123A000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3A38000
|
trusted library allocation
|
page read and write
|
||
124C000
|
heap
|
page read and write
|
||
2FDC000
|
trusted library allocation
|
page read and write
|
||
1390000
|
unkown
|
page read and write
|
||
5590000
|
unkown
|
page write copy
|
||
7FF5EDA69000
|
unkown
|
page readonly
|
||
38FB000
|
trusted library allocation
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
2D06000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
A01B000
|
stack
|
page read and write
|
||
1257000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
C6E3000
|
unkown
|
page read and write
|
||
7FF5ED7E9000
|
unkown
|
page readonly
|
||
7FF5ED418000
|
unkown
|
page readonly
|
||
2E70000
|
direct allocation
|
page execute and read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
8000000
|
unkown
|
page read and write
|
||
7D20000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED451000
|
unkown
|
page readonly
|
||
1500000
|
heap
|
page read and write
|
||
EC8000
|
heap
|
page read and write
|
||
C503000
|
unkown
|
page read and write
|
||
EA2000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED850000
|
unkown
|
page readonly
|
||
3943000
|
trusted library allocation
|
page read and write
|
||
5651000
|
trusted library allocation
|
page read and write
|
||
5FE0000
|
heap
|
page read and write
|
||
4BA6000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
FBDC000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
1058000
|
heap
|
page read and write
|
||
37F6000
|
unkown
|
page read and write
|
||
B82A000
|
stack
|
page read and write
|
||
390B000
|
trusted library allocation
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
9AB0000
|
heap
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
AF8D000
|
stack
|
page read and write
|
||
7FF5ED674000
|
unkown
|
page readonly
|
||
4BFA000
|
trusted library allocation
|
page read and write
|
||
8780000
|
unkown
|
page read and write
|
||
7A8000
|
heap
|
page read and write
|
||
11203000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
987B000
|
unkown
|
page read and write
|
||
7FF5ED818000
|
unkown
|
page readonly
|
||
A433000
|
unkown
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
3070000
|
heap
|
page execute and read and write
|
||
391D000
|
trusted library allocation
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
3AB0000
|
trusted library allocation
|
page read and write
|
||
11202000
|
unkown
|
page read and write
|
||
986F000
|
unkown
|
page read and write
|
||
A5B000
|
stack
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
B190000
|
unkown
|
page read and write
|
||
7FF5EDA70000
|
unkown
|
page readonly
|
||
4C50000
|
heap
|
page execute and read and write
|
||
176F000
|
stack
|
page read and write
|
||
2EDE000
|
heap
|
page read and write
|
||
38ED000
|
trusted library allocation
|
page read and write
|
||
7FF5ED1BC000
|
unkown
|
page readonly
|
||
8EF0000
|
unkown
|
page read and write
|
||
4E55000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
8EF0000
|
unkown
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
FBD0000
|
unkown
|
page read and write
|
||
A375000
|
unkown
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
1246000
|
heap
|
page read and write
|
||
7FF5ED928000
|
unkown
|
page readonly
|
||
E57000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED4B0000
|
unkown
|
page readonly
|
||
19A000
|
stack
|
page read and write
|
||
2B22000
|
trusted library allocation
|
page read and write
|
||
1247000
|
heap
|
page read and write
|
||
7FF5EDA08000
|
unkown
|
page readonly
|
||
1255000
|
heap
|
page read and write
|
||
7FF5ED93B000
|
unkown
|
page readonly
|
||
A3BE000
|
unkown
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
5490000
|
unkown
|
page readonly
|
||
636000
|
heap
|
page read and write
|
||
7DF4F3031000
|
unkown
|
page execute read
|
||
1801000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
7865000
|
unkown
|
page read and write
|
||
1120F000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
3911000
|
trusted library allocation
|
page read and write
|
||
91B9000
|
stack
|
page read and write
|
||
11202000
|
unkown
|
page read and write
|
||
EBB000
|
trusted library allocation
|
page execute and read and write
|
||
CA63000
|
unkown
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
39E1000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
7FF5ED9FF000
|
unkown
|
page readonly
|
||
7F50000
|
unkown
|
page read and write
|
||
7FF5ED975000
|
unkown
|
page readonly
|
||
F9A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED295000
|
unkown
|
page readonly
|
||
B150000
|
unkown
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
C08A000
|
stack
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
3003000
|
trusted library allocation
|
page execute and read and write
|
||
F26000
|
heap
|
page read and write
|
||
C561000
|
unkown
|
page read and write
|
||
38E5000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
391B000
|
trusted library allocation
|
page read and write
|
||
51A1000
|
trusted library allocation
|
page read and write
|
||
C41F000
|
stack
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
FBD000
|
trusted library allocation
|
page execute and read and write
|
||
19D000
|
stack
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
FA3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED33F000
|
unkown
|
page readonly
|
||
2AE5000
|
trusted library allocation
|
page read and write
|
||
3010000
|
stack
|
page read and write
|
||
4E5F000
|
stack
|
page read and write
|
||
5557000
|
stack
|
page read and write
|
||
59EE000
|
stack
|
page read and write
|
||
BDC0000
|
unkown
|
page readonly
|
||
56D9000
|
unkown
|
page readonly
|
||
7FF5ED735000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
AA90000
|
unkown
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
11202000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED4EF000
|
unkown
|
page readonly
|
||
8780000
|
unkown
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
7FF5ED279000
|
unkown
|
page readonly
|
||
4E92000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3160000
|
unkown
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
CA7C000
|
unkown
|
page read and write
|
||
2F4E000
|
trusted library allocation
|
page read and write
|
||
9E6C000
|
stack
|
page read and write
|
||
7FF5ED39E000
|
unkown
|
page readonly
|
||
3911000
|
trusted library allocation
|
page read and write
|
||
7FF5ED97E000
|
unkown
|
page readonly
|
||
1255000
|
heap
|
page read and write
|
||
21B0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED1CB000
|
unkown
|
page readonly
|
||
7D00000
|
unkown
|
page readonly
|
||
11B8000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
87BB000
|
stack
|
page read and write
|
||
39E7000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
46D2000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
38F4000
|
trusted library allocation
|
page read and write
|
||
1120C000
|
unkown
|
page read and write
|
||
7FF5ED505000
|
unkown
|
page readonly
|
||
621E000
|
stack
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
4E81000
|
trusted library allocation
|
page read and write
|
||
1696000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
1232000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
7FF5ED9CA000
|
unkown
|
page readonly
|
||
7FF5ED5CE000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED5C5000
|
unkown
|
page readonly
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED8FF000
|
unkown
|
page readonly
|
||
3915000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3935000
|
trusted library allocation
|
page read and write
|
||
5194000
|
trusted library allocation
|
page read and write
|
||
CA20000
|
unkown
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
A479000
|
unkown
|
page read and write
|
||
97D4000
|
unkown
|
page read and write
|
||
C6CF000
|
unkown
|
page read and write
|
||
38E8000
|
trusted library allocation
|
page read and write
|
||
122F000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
3936000
|
trusted library allocation
|
page read and write
|
||
5803000
|
heap
|
page execute and read and write
|
||
670000
|
heap
|
page read and write
|
||
97C3000
|
unkown
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
7FF5ED62F000
|
unkown
|
page readonly
|
||
19D000
|
stack
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
4870000
|
heap
|
page read and write
|
||
2C7C000
|
heap
|
page execute and read and write
|
||
7FF5ED471000
|
unkown
|
page readonly
|
||
7F40000
|
unkown
|
page readonly
|
||
7FF5ED5A8000
|
unkown
|
page readonly
|
||
7FF5ED8C6000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9C8000
|
unkown
|
page readonly
|
||
A50B000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
7FF5ED692000
|
unkown
|
page readonly
|
||
158F000
|
stack
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
FD8C000
|
unkown
|
page read and write
|
||
4C10000
|
heap
|
page execute and read and write
|
||
8780000
|
unkown
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
30E0000
|
heap
|
page execute and read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7CC0000
|
unkown
|
page readonly
|
||
7DF4F3051000
|
unkown
|
page execute read
|
||
7FF5ED1CF000
|
unkown
|
page readonly
|
||
494E000
|
stack
|
page read and write
|
||
7FF5ED9D9000
|
unkown
|
page readonly
|
||
7FF5ED59E000
|
unkown
|
page readonly
|
||
72E000
|
stack
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
FBD3000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
FD86000
|
unkown
|
page read and write
|
||
BAF9000
|
stack
|
page read and write
|
||
8BF0000
|
unkown
|
page readonly
|
||
7FF5ED933000
|
unkown
|
page readonly
|
||
33C0000
|
unkown
|
page read and write
|
||
987F000
|
unkown
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
1247000
|
heap
|
page read and write
|
||
51C1000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9C6000
|
unkown
|
page readonly
|
||
3928000
|
trusted library allocation
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
F96000
|
trusted library allocation
|
page execute and read and write
|
||
392B000
|
trusted library allocation
|
page read and write
|
||
9A10000
|
unkown
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
7FF5ED86B000
|
unkown
|
page readonly
|
||
773000
|
trusted library allocation
|
page execute and read and write
|
||
1150000
|
heap
|
page read and write
|
||
38EA000
|
trusted library allocation
|
page read and write
|
||
7FF5ED781000
|
unkown
|
page readonly
|
||
3D41000
|
trusted library allocation
|
page read and write
|
||
7FF5ED942000
|
unkown
|
page readonly
|
||
329F000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
7FF5ED342000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
3935000
|
trusted library allocation
|
page read and write
|
||
3CB7000
|
trusted library allocation
|
page read and write
|
||
38FB000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
37A8000
|
unkown
|
page read and write
|
||
37D2000
|
unkown
|
page read and write
|
||
739000
|
stack
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
2D2B000
|
trusted library allocation
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
11B3000
|
heap
|
page read and write
|
||
AAFC000
|
unkown
|
page read and write
|
||
3160000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7CE0000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
2B04000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
B6A0000
|
heap
|
page read and write
|
||
6B9000
|
heap
|
page read and write
|
||
7FF5ED8E2000
|
unkown
|
page readonly
|
||
38E5000
|
trusted library allocation
|
page read and write
|
||
9138000
|
stack
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
392C000
|
trusted library allocation
|
page read and write
|
||
7DF4F3071000
|
unkown
|
page execute read
|
||
CA7000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
A29E000
|
stack
|
page read and write
|
||
15DF000
|
stack
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
6261000
|
unkown
|
page readonly
|
||
2ED0000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page execute and read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
29D5000
|
trusted library allocation
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
C84D000
|
unkown
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
7FF5ED87D000
|
unkown
|
page readonly
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
37B0000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
B1E000
|
heap
|
page read and write
|
||
1444000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
DEF000
|
stack
|
page read and write
|
||
2B08000
|
trusted library allocation
|
page read and write
|
||
7FF5ED602000
|
unkown
|
page readonly
|
||
11CA000
|
trusted library allocation
|
page execute and read and write
|
||
8740000
|
unkown
|
page read and write
|
||
3923000
|
trusted library allocation
|
page read and write
|
||
784A000
|
unkown
|
page read and write
|
||
7FF5ED476000
|
unkown
|
page readonly
|
||
760000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
3900000
|
trusted library allocation
|
page read and write
|
||
124C000
|
heap
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
7FF5ED4C2000
|
unkown
|
page readonly
|
||
3B50000
|
trusted library allocation
|
page read and write
|
||
A33E000
|
unkown
|
page read and write
|
||
C4D0000
|
unkown
|
page read and write
|
||
564E000
|
trusted library allocation
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
9881000
|
unkown
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
3961000
|
trusted library allocation
|
page read and write
|
||
7FF5ED50A000
|
unkown
|
page readonly
|
||
8710000
|
unkown
|
page readonly
|
||
1620000
|
trusted library allocation
|
page execute and read and write
|
||
1498000
|
heap
|
page read and write
|
||
DD0000
|
unkown
|
page readonly
|
||
7FF5ED74A000
|
unkown
|
page readonly
|
||
7FF5ED821000
|
unkown
|
page readonly
|
||
B60000
|
heap
|
page read and write
|
||
574E000
|
trusted library allocation
|
page read and write
|
||
37F2000
|
unkown
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
8730000
|
unkown
|
page read and write
|
||
8A7000
|
trusted library allocation
|
page execute and read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
7F30000
|
unkown
|
page read and write
|
||
125B000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
38E8000
|
trusted library allocation
|
page read and write
|
||
42D000
|
unkown
|
page read and write
|
||
C6F8000
|
unkown
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
B48000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
553F000
|
stack
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
2961000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
56AE000
|
stack
|
page read and write
|
||
7FF5ED409000
|
unkown
|
page readonly
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
395A000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
51E6000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED779000
|
unkown
|
page readonly
|
||
8740000
|
unkown
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
heap
|
page execute and read and write
|
||
C0E000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
38E1000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
7FF5ED433000
|
unkown
|
page readonly
|
||
7FF5ED5EB000
|
unkown
|
page readonly
|
||
7FF5ED81B000
|
unkown
|
page readonly
|
||
C89C000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
73F000
|
stack
|
page read and write
|
||
1220000
|
unkown
|
page readonly
|
||
3407000
|
trusted library allocation
|
page read and write
|
||
7FF5EDA76000
|
unkown
|
page readonly
|
||
8EF0000
|
unkown
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
4F23000
|
trusted library allocation
|
page read and write
|
||
9815000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
3795000
|
unkown
|
page read and write
|
||
7FF5ED695000
|
unkown
|
page readonly
|
||
391D000
|
trusted library allocation
|
page read and write
|
||
5870000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
7FF5ED9CC000
|
unkown
|
page readonly
|
||
1244000
|
heap
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
3917000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
9977000
|
unkown
|
page read and write
|
||
7FF5ED867000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
A4AE000
|
unkown
|
page read and write
|
||
AAD1000
|
unkown
|
page read and write
|
||
7FF5ED7D6000
|
unkown
|
page readonly
|
||
FAF000
|
stack
|
page read and write
|
||
608E000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
797D000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
2F46000
|
trusted library allocation
|
page read and write
|
||
38EA000
|
trusted library allocation
|
page read and write
|
||
785B000
|
unkown
|
page read and write
|
||
7869000
|
unkown
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
1210000
|
unkown
|
page readonly
|
||
40A000
|
unkown
|
page write copy
|
||
13EE000
|
stack
|
page read and write
|
||
38F9000
|
trusted library allocation
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
391B000
|
trusted library allocation
|
page read and write
|
||
7857000
|
unkown
|
page read and write
|
||
3700000
|
unkown
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
7FF5ED9AE000
|
unkown
|
page readonly
|
||
40F7000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
8720000
|
unkown
|
page readonly
|
||
C90000
|
heap
|
page read and write
|
||
38FA000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
5BD0000
|
unkown
|
page readonly
|
||
EF6000
|
trusted library allocation
|
page read and write
|
||
7FF5ED39B000
|
unkown
|
page readonly
|
||
750000
|
trusted library allocation
|
page read and write
|
||
1257000
|
heap
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
1510000
|
unkown
|
page readonly
|
||
F00000
|
heap
|
page read and write
|
||
3748000
|
unkown
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
A379000
|
unkown
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
392A000
|
trusted library allocation
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
53BC000
|
trusted library allocation
|
page read and write
|
||
8780000
|
unkown
|
page read and write
|
||
3961000
|
trusted library allocation
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3427000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
1259000
|
heap
|
page read and write
|
||
38FC000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
391B000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
remote allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7884000
|
unkown
|
page read and write
|
||
14C4000
|
heap
|
page read and write
|
||
E66000
|
heap
|
page read and write
|
||
125B000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
38EA000
|
trusted library allocation
|
page read and write
|
||
C893000
|
unkown
|
page read and write
|
||
C52C000
|
unkown
|
page read and write
|
||
906E000
|
stack
|
page read and write
|
||
33C0000
|
heap
|
page execute and read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
41F000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
393F000
|
trusted library allocation
|
page read and write
|
||
31F7000
|
trusted library allocation
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
51A7000
|
trusted library allocation
|
page read and write
|
||
2B68000
|
trusted library allocation
|
page read and write
|
||
FA1B000
|
unkown
|
page read and write
|
||
1271000
|
heap
|
page read and write
|
||
98A8000
|
unkown
|
page read and write
|
||
394B000
|
trusted library allocation
|
page read and write
|
||
D72000
|
stack
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
982D000
|
unkown
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED412000
|
unkown
|
page readonly
|
||
33C0000
|
unkown
|
page read and write
|
||
C6F2000
|
unkown
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
883E000
|
stack
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
7FF5ED46E000
|
unkown
|
page readonly
|
||
8750000
|
unkown
|
page read and write
|
||
14C8000
|
heap
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
EB2000
|
trusted library allocation
|
page read and write
|
||
5751000
|
trusted library allocation
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
51E4000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
C57F000
|
unkown
|
page read and write
|
||
C51E000
|
unkown
|
page read and write
|
||
29D1000
|
trusted library allocation
|
page read and write
|
||
1120B000
|
unkown
|
page read and write
|
||
7FF5ED8AC000
|
unkown
|
page readonly
|
||
153A000
|
heap
|
page read and write
|
||
4ED4000
|
heap
|
page read and write
|
||
3965000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
unkown
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
FDA4000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
8780000
|
unkown
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
8750000
|
unkown
|
page read and write
|
||
125B000
|
heap
|
page read and write
|
||
7D40000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED7F1000
|
unkown
|
page readonly
|
||
7DD0000
|
unkown
|
page read and write
|
||
A11F000
|
stack
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
97AD000
|
unkown
|
page read and write
|
||
8EF0000
|
unkown
|
page read and write
|
||
4A45000
|
trusted library allocation
|
page read and write
|
||
10FA000
|
stack
|
page read and write
|
||
3900000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
2257000
|
trusted library allocation
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
390C000
|
trusted library allocation
|
page read and write
|
||
2BE4000
|
unkown
|
page readonly
|
||
770000
|
trusted library allocation
|
page read and write
|
||
BA8000
|
heap
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
2C6E000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
5A0E000
|
stack
|
page read and write
|
||
15F7000
|
trusted library allocation
|
page execute and read and write
|
||
36D3000
|
stack
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
7FF5ED404000
|
unkown
|
page readonly
|
||
2FDA000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
124C000
|
heap
|
page read and write
|
||
3A00000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
C92D000
|
unkown
|
page read and write
|
||
11E6000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
EB7000
|
trusted library allocation
|
page execute and read and write
|
||
3738000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
4E64000
|
trusted library allocation
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
33B0000
|
trusted library allocation
|
page read and write
|
||
79FB000
|
unkown
|
page read and write
|
||
1694000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
C76000
|
trusted library allocation
|
page execute and read and write
|
||
11207000
|
unkown
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
5734000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7DF4F3061000
|
unkown
|
page execute read
|
||
7E70000
|
unkown
|
page read and write
|
||
A364000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
DDC000
|
heap
|
page read and write
|
||
7978000
|
unkown
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
7FF5ED8F9000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
8208000
|
stack
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
7FF5ED844000
|
unkown
|
page readonly
|
||
C5B000
|
stack
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
1454000
|
trusted library allocation
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
1451000
|
unkown
|
page readonly
|
||
33C0000
|
unkown
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
979C000
|
unkown
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
392A000
|
trusted library allocation
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
1083000
|
heap
|
page read and write
|
||
4C60000
|
unkown
|
page read and write
|
||
7FF5D1CCD000
|
unkown
|
page readonly
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
125C000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
2E2D000
|
stack
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
395A000
|
trusted library allocation
|
page read and write
|
||
7FF5ED2A4000
|
unkown
|
page readonly
|
||
A327000
|
unkown
|
page read and write
|
||
33B9000
|
stack
|
page read and write
|
||
7FF5ED8B4000
|
unkown
|
page readonly
|
||
32A1000
|
trusted library allocation
|
page read and write
|
||
943E000
|
stack
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
38DE000
|
stack
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
A491000
|
unkown
|
page read and write
|
||
27D0000
|
heap
|
page execute and read and write
|
||
147B000
|
trusted library allocation
|
page execute and read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
C60000
|
trusted library allocation
|
page read and write
|
||
7FF5ED48A000
|
unkown
|
page readonly
|
||
5163000
|
heap
|
page execute and read and write
|
||
11200000
|
unkown
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
5186000
|
trusted library allocation
|
page read and write
|
||
390B000
|
trusted library allocation
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
3D5D000
|
trusted library allocation
|
page read and write
|
||
7FF5ED4C6000
|
unkown
|
page readonly
|
||
785F000
|
unkown
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
1120D000
|
unkown
|
page read and write
|
||
B08D000
|
stack
|
page read and write
|
||
4F25000
|
trusted library allocation
|
page read and write
|
||
1342000
|
heap
|
page read and write
|
||
5916000
|
unkown
|
page readonly
|
||
1246000
|
heap
|
page read and write
|
||
3978000
|
trusted library allocation
|
page read and write
|
||
10C01000
|
unkown
|
page read and write
|
||
EB5000
|
trusted library allocation
|
page execute and read and write
|
||
99F000
|
stack
|
page read and write
|
||
3962000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED77C000
|
unkown
|
page readonly
|
||
2901000
|
trusted library allocation
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
8780000
|
unkown
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
246F000
|
stack
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7F2E000
|
stack
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
7FF5ED534000
|
unkown
|
page readonly
|
||
C512000
|
unkown
|
page read and write
|
||
7FF5ED937000
|
unkown
|
page readonly
|
||
7DD0000
|
unkown
|
page read and write
|
||
E4A000
|
trusted library allocation
|
page execute and read and write
|
||
168E000
|
stack
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
7FF5ED1F4000
|
unkown
|
page readonly
|
||
308A000
|
stack
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
125C000
|
heap
|
page read and write
|
||
38E5000
|
trusted library allocation
|
page read and write
|
||
118A000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
7C90000
|
unkown
|
page read and write
|
||
2F4B000
|
trusted library allocation
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
392C000
|
trusted library allocation
|
page read and write
|
||
AF0B000
|
stack
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
CE4000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page read and write
|
||
390C000
|
trusted library allocation
|
page read and write
|
||
394B000
|
trusted library allocation
|
page read and write
|
||
392F000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED849000
|
unkown
|
page readonly
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9F2000
|
unkown
|
page readonly
|
||
143B000
|
stack
|
page read and write
|
||
AAF6000
|
unkown
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
11B2000
|
heap
|
page read and write
|
||
390B000
|
trusted library allocation
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
126F000
|
heap
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
C544000
|
unkown
|
page read and write
|
||
17B0000
|
trusted library allocation
|
page execute and read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
4E78000
|
trusted library allocation
|
page read and write
|
||
9883000
|
unkown
|
page read and write
|
||
28E7000
|
trusted library allocation
|
page read and write
|
||
89C0000
|
unkown
|
page read and write
|
||
7FF5ED9E1000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
7AD000
|
heap
|
page read and write
|
||
7FF5ED956000
|
unkown
|
page readonly
|
||
5A70000
|
heap
|
page execute and read and write
|
||
390C000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
43C000
|
stack
|
page read and write
|
||
7FF5ED939000
|
unkown
|
page readonly
|
||
8740000
|
unkown
|
page read and write
|
||
4E74000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
FBD0000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
7FF5ED586000
|
unkown
|
page readonly
|
||
2BE4000
|
unkown
|
page readonly
|
||
F73000
|
trusted library allocation
|
page execute and read and write
|
||
8EF0000
|
unkown
|
page read and write
|
||
7695000
|
stack
|
page read and write
|
||
7FF5ED71B000
|
unkown
|
page readonly
|
||
3955000
|
trusted library allocation
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
3758000
|
unkown
|
page read and write
|
||
390F000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
135F000
|
stack
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
1248000
|
heap
|
page read and write
|
||
FD71000
|
unkown
|
page read and write
|
||
3932000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
C4A0000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
3928000
|
trusted library allocation
|
page read and write
|
||
1211000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
9798000
|
unkown
|
page read and write
|
||
7950000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
7FF5ED91A000
|
unkown
|
page readonly
|
||
7DD0000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
8D0E000
|
stack
|
page read and write
|
||
3928000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
1807000
|
trusted library allocation
|
page read and write
|
||
35D0000
|
unkown
|
page read and write
|
||
3943000
|
trusted library allocation
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
5CE0000
|
trusted library allocation
|
page execute and read and write
|
||
30C6000
|
trusted library allocation
|
page read and write
|
||
3AB8000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
7FF5ED660000
|
unkown
|
page readonly
|
||
38FB000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED3DA000
|
unkown
|
page readonly
|
||
395A000
|
trusted library allocation
|
page read and write
|
||
2B0E000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9BE000
|
unkown
|
page readonly
|
||
7FF5ED73D000
|
unkown
|
page readonly
|
||
7FF5ED750000
|
unkown
|
page readonly
|
||
5A00000
|
heap
|
page execute and read and write
|
||
11B8000
|
heap
|
page read and write
|
||
1277000
|
trusted library allocation
|
page execute and read and write
|
||
E5B000
|
trusted library allocation
|
page execute and read and write
|
||
1232000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
2789000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
38FB000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
7867000
|
unkown
|
page read and write
|
||
4A0D000
|
stack
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED996000
|
unkown
|
page readonly
|
||
B640000
|
unkown
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
7FF5EDA0B000
|
unkown
|
page readonly
|
||
7861000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
394B000
|
trusted library allocation
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
2240000
|
trusted library allocation
|
page execute and read and write
|
||
986B000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
EEB000
|
stack
|
page read and write
|
||
A310000
|
unkown
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
8210000
|
unkown
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
1217000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
B22B000
|
stack
|
page read and write
|
||
422000
|
unkown
|
page write copy
|
||
C10A000
|
stack
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
2F61000
|
trusted library allocation
|
page read and write
|
||
116A000
|
heap
|
page read and write
|
||
7FF5ED625000
|
unkown
|
page readonly
|
||
33C0000
|
unkown
|
page read and write
|
||
7FF5ED7CF000
|
unkown
|
page readonly
|
||
7B80000
|
unkown
|
page read and write
|
||
1231000
|
heap
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
2D41000
|
trusted library allocation
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
7DC1000
|
unkown
|
page read and write
|
||
7FF5ED4A1000
|
unkown
|
page readonly
|
||
12D6000
|
heap
|
page read and write
|
||
B8AB000
|
stack
|
page read and write
|
||
A4AB000
|
unkown
|
page read and write
|
||
4C4B000
|
unkown
|
page read and write
|
||
33D0000
|
unkown
|
page readonly
|
||
7FF5ED7DB000
|
unkown
|
page readonly
|
||
8740000
|
unkown
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
38F4000
|
trusted library allocation
|
page read and write
|
||
4C50000
|
unkown
|
page read and write
|
||
7FF5ED55F000
|
unkown
|
page readonly
|
||
33C0000
|
unkown
|
page read and write
|
||
7FF5ED9D6000
|
unkown
|
page readonly
|
||
7FF5ED806000
|
unkown
|
page readonly
|
||
5195000
|
trusted library allocation
|
page read and write
|
||
7C80000
|
unkown
|
page read and write
|
||
2AFB000
|
trusted library allocation
|
page read and write
|
||
7DF4F3030000
|
unkown
|
page readonly
|
||
115D000
|
heap
|
page read and write
|
||
7FF5ED93E000
|
unkown
|
page readonly
|
||
5789000
|
trusted library allocation
|
page read and write
|
||
C6BF000
|
unkown
|
page read and write
|
||
3CC2000
|
trusted library allocation
|
page read and write
|
||
3935000
|
trusted library allocation
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
B728000
|
stack
|
page read and write
|
||
7FF5ED503000
|
unkown
|
page readonly
|
||
8D10000
|
unkown
|
page read and write
|
||
2C15000
|
trusted library allocation
|
page read and write
|
||
3918000
|
trusted library allocation
|
page read and write
|
||
393D000
|
trusted library allocation
|
page read and write
|
||
17FE000
|
stack
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
A32A000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
B56000
|
stack
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
7FF5ED265000
|
unkown
|
page readonly
|
||
37F9000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page readonly
|
||
53AE000
|
stack
|
page read and write
|
||
3962000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
trusted library allocation
|
page read and write
|
||
8BEE000
|
stack
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
B170000
|
unkown
|
page readonly
|
||
7FF5EDA14000
|
unkown
|
page readonly
|
||
5A4E000
|
stack
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
8A6E000
|
stack
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
11206000
|
unkown
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
C6F4000
|
unkown
|
page read and write
|
||
58BE000
|
stack
|
page read and write
|
||
1259000
|
heap
|
page read and write
|
||
4830000
|
unclassified section
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
124D000
|
stack
|
page read and write
|
||
31E0000
|
trusted library allocation
|
page execute and read and write
|
||
48C0000
|
trusted library allocation
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
C5A0000
|
unkown
|
page read and write
|
||
11EC000
|
heap
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
7FF5ED990000
|
unkown
|
page readonly
|
||
B54000
|
heap
|
page read and write
|
||
3160000
|
unkown
|
page read and write
|
||
3CB1000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
125B000
|
heap
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
53BE000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
38FC000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
unkown
|
page readonly
|
||
309E000
|
stack
|
page read and write
|
||
8740000
|
unkown
|
page read and write
|
||
38FC000
|
trusted library allocation
|
page read and write
|
||
3319000
|
stack
|
page read and write
|
||
7859000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
562F000
|
stack
|
page read and write
|
||
8D10000
|
unkown
|
page read and write
|
||
D18000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
unclassified section
|
page read and write
|
||
7DF4F3041000
|
unkown
|
page execute read
|
||
8740000
|
unkown
|
page read and write
|
||
16DF000
|
stack
|
page read and write
|
||
38EA000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2BC7000
|
trusted library allocation
|
page read and write
|
There are 2295 hidden memdumps, click here to show them.