Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\huge[1].dat
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\898.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\A817.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\D91B.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsdB435.tmp\liteFirewall.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsgD880.tmp\blowfish.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Del.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\ihuhfti
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\ihuhfti:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsgD880.tmp\INetC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsgD880.tmp\nsProcess.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsqD86F.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsu2BAB.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\start.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
|
MSVC program database ver 7.00, 512*4023 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
There are 106 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Users\user\AppData\Roaming\ihuhfti
|
C:\Users\user\AppData\Roaming\ihuhfti
|
||
C:\Users\user\AppData\Local\Temp\A817.exe
|
C:\Users\user\AppData\Local\Temp\A817.exe
|
||
C:\Users\user\AppData\Local\Temp\D91B.exe
|
C:\Users\user\AppData\Local\Temp\D91B.exe
|
||
C:\Users\user\AppData\Local\Temp\898.exe
|
C:\Users\user\AppData\Local\Temp\898.exe
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
"C:\Users\user\AppData\Local\Temp\setup.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0
(Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3616 --field-trial-handle=3608,i,5322583597789313851,6405145499234275535,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US
--service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0)
Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log"
--mojo-platform-channel-handle=3824 --field-trial-handle=3608,i,5322583597789313851,6405145499234275535,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0
Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log"
--mojo-platform-channel-handle=3812 --field-trial-handle=3608,i,5322583597789313851,6405145499234275535,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android
13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process
--no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2
--enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719942231320003 --launch-time-ticks=6813093635
--mojo-platform-channel-handle=4168 --field-trial-handle=3608,i,5322583597789313851,6405145499234275535,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android
13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox
--log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2
--enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719942231320003 --launch-time-ticks=6813175347
--mojo-platform-channel-handle=4216 --field-trial-handle=3608,i,5322583597789313851,6405145499234275535,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
There are 26 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://gebeus.ru/tmp/index.php
|
|||
http://cx5519.com/tmp/index.php
|
|||
contintnetksows.shop
|
|||
http://evilos.cc/tmp/index.php
|
|||
ellaboratepwsz.xyz
|
|||
swellfrrgwwos.xyz
|
|||
foodypannyjsud.shop
|
|||
pedestriankodwu.xyz
|
|||
towerxxuytwi.xyz
|
|||
http://office-techs.biz/tmp/index.php
|
|||
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://foodypannyjsud.shop/s
|
unknown
|
||
https://support.google.com/chrome/answer/6098869
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlP&al
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
|
unknown
|
||
https://excel.office.com
|
unknown
|
||
https://chrome.google.com/webstore?hl=urCtrl$2
|
unknown
|
||
https://chrome.google.com/webstore?hl=te&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://foodypannyjsud.shop/pik
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
|
unknown
|
||
https://passwords.google.com
|
unknown
|
||
https://aui-cdn.atlassian.com/
|
unknown
|
||
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
|
unknown
|
||
https://java.coA
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity=4p
|
unknown
|
||
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
|
unknown
|
||
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
|
unknown
|
||
http://bageyou.xyz
|
unknown
|
||
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://bitbucket.org/
|
unknown
|
||
https://foodypannyjsud.shop/op8
|
unknown
|
||
http://xiexie.wf/22_551/huge.datll
|
unknown
|
||
https://support.google.com/chromebook?p=app_intent
|
unknown
|
||
https://foodypannyjsud.shop/$p
|
unknown
|
||
https://foodypannyjsud.shop/piO
|
unknown
|
||
https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://xiexie.wf/22_551/huge.dat2c2e-da81-46d0-b6b6-535557bcc5fa
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html&
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlT&r
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://xiexie.wf/22_551/huge.dat
|
unknown
|
||
https://foodypannyjsud.shop/apie
|
unknown
|
||
https://foodypannyjsud.shop/oi
|
unknown
|
||
https://foodypannyjsud.shop/pi8
|
unknown
|
||
https://outlook.com
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://go.mic
|
unknown
|
||
https://foodypannyjsud.shop/apiU8
|
unknown
|
||
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chrome.google.com/webstore?hl=ukCtrl$1
|
unknown
|
||
https://chrome.google.com/webstore?hl=lvCtrl$1
|
unknown
|
||
https://foodypannyjsud.shop/apiT
|
unknown
|
||
https://android.notify.windows.com/iOS
|
unknown
|
||
http://api.install-stat.debug.world/clients/installs
|
unknown
|
||
https://cdn.cookielaw.org/
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://support.google.com/chrome/a/answer/9122284
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity=4
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
|
unknown
|
||
https://chrome.google.com/webstore?hl=teCtrl$1
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-CNCtrl$1
|
unknown
|
||
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
|
unknown
|
||
https://word.office.comon
|
unknown
|
||
http://www.unicode.org/copyright.html
|
unknown
|
||
https://powerpoint.office.comcember
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://schemas.micro
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity
|
unknown
|
||
https://foodypannyjsud.shop/s.
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-TWCtrl$1
|
unknown
|
||
http://www.apache.org/).
|
unknown
|
||
https://foodypannyjsud.shop/api
|
unknown
|
||
https://myactivity.google.com/
|
unknown
|
||
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
https://d301sr5gafysq2.cloudfront.net/
|
unknown
|
||
https://foodypannyjsud.shop/pi
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://wns.windows.com/)s
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
186.233.231.45
|
unknown
|
Brazil
|
||
188.114.97.3
|
unknown
|
European Union
|
||
141.8.192.126
|
unknown
|
Russian Federation
|
||
185.68.16.7
|
unknown
|
Ukraine
|
||
127.0.0.127
|
unknown
|
unknown
|
||
146.70.169.164
|
unknown
|
United Kingdom
|
||
123.212.43.225
|
unknown
|
Korea Republic of
|
||
104.192.141.1
|
unknown
|
United States
|
||
172.67.221.174
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000004047A
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Sid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Pid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GamePall
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
|
DontShowUI
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
tmp_uid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
reg
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
uid
|
||
HKEY_CURRENT_USER\Control Panel\Cursors
|
AppStarting
|
There are 177 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
28D0000
|
direct allocation
|
page read and write
|
||
3520000
|
direct allocation
|
page execute and read and write
|
||
4391000
|
unclassified section
|
page read and write
|
||
4271000
|
unclassified section
|
page read and write
|
||
C3D000
|
heap
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
AA0C000
|
unkown
|
page read and write
|
||
9C60000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
363A000
|
trusted library allocation
|
page read and write
|
||
894A000
|
unkown
|
page read and write
|
||
7FF5D7534000
|
unkown
|
page readonly
|
||
1B0000
|
heap
|
page read and write
|
||
4D7E000
|
trusted library allocation
|
page read and write
|
||
AA08000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
A5D4000
|
heap
|
page read and write
|
||
367D000
|
heap
|
page read and write
|
||
A00E000
|
heap
|
page read and write
|
||
41CAC000
|
direct allocation
|
page read and write
|
||
A660000
|
heap
|
page read and write
|
||
A24C000
|
heap
|
page read and write
|
||
106A6000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
7FF5D7391000
|
unkown
|
page readonly
|
||
4EB5000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
36F9000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
7FF5D768B000
|
unkown
|
page readonly
|
||
4D76000
|
trusted library allocation
|
page read and write
|
||
87E0000
|
unkown
|
page read and write
|
||
C6B000
|
heap
|
page read and write
|
||
7FF5D774A000
|
unkown
|
page readonly
|
||
261000
|
unkown
|
page execute read
|
||
2E80000
|
unkown
|
page read and write
|
||
A4CC000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
39F3000
|
trusted library allocation
|
page read and write
|
||
9E6C000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
64D21000
|
unkown
|
page execute read
|
||
9D37000
|
heap
|
page read and write
|
||
9E2B000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
9E8D000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
53A000
|
trusted library allocation
|
page execute and read and write
|
||
9E9A000
|
heap
|
page read and write
|
||
9E73000
|
heap
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
A54E000
|
heap
|
page read and write
|
||
2A05000
|
trusted library allocation
|
page read and write
|
||
7FF5D72D3000
|
unkown
|
page readonly
|
||
52D000
|
trusted library allocation
|
page execute and read and write
|
||
51A000
|
stack
|
page read and write
|
||
594000
|
unkown
|
page write copy
|
||
51E000
|
heap
|
page read and write
|
||
A146000
|
heap
|
page read and write
|
||
3608000
|
trusted library allocation
|
page read and write
|
||
2FC60000
|
direct allocation
|
page read and write
|
||
A3A6000
|
heap
|
page read and write
|
||
997C000
|
stack
|
page read and write
|
||
F66000
|
heap
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
F35000
|
heap
|
page read and write
|
||
9E71000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
277E000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
A507000
|
heap
|
page read and write
|
||
7FF5D77B6000
|
unkown
|
page readonly
|
||
2D4E000
|
stack
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
9E8C000
|
heap
|
page read and write
|
||
9E8D000
|
heap
|
page read and write
|
||
3500000
|
stack
|
page read and write
|
||
1021B000
|
unkown
|
page read and write
|
||
7AF1000
|
unkown
|
page read and write
|
||
F03000
|
heap
|
page read and write
|
||
F42000
|
heap
|
page read and write
|
||
F3B000
|
heap
|
page read and write
|
||
106F000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
A358000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
A266000
|
heap
|
page read and write
|
||
9E84000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3477000
|
trusted library allocation
|
page read and write
|
||
F37000
|
heap
|
page read and write
|
||
2A31000
|
trusted library allocation
|
page read and write
|
||
A592000
|
heap
|
page read and write
|
||
C4B000
|
heap
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
41C0C000
|
direct allocation
|
page read and write
|
||
B7D000
|
trusted library allocation
|
page execute and read and write
|
||
F30000
|
heap
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
51EE000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
A8C5000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
A408000
|
unkown
|
page read and write
|
||
363A000
|
trusted library allocation
|
page read and write
|
||
7FF5D783B000
|
unkown
|
page readonly
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
7FF5D7795000
|
unkown
|
page readonly
|
||
2ADD000
|
stack
|
page read and write
|
||
5201000
|
trusted library allocation
|
page read and write
|
||
25ED000
|
stack
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
A50F000
|
heap
|
page read and write
|
||
9A90000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
A2C3000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
48F3000
|
trusted library allocation
|
page read and write
|
||
7FF5D732D000
|
unkown
|
page readonly
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
9E86000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
7FF5D72E9000
|
unkown
|
page readonly
|
||
9E65000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
41C14000
|
direct allocation
|
page read and write
|
||
7FF5D76DA000
|
unkown
|
page readonly
|
||
4403000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
A588000
|
heap
|
page read and write
|
||
A276000
|
heap
|
page read and write
|
||
35CF000
|
unkown
|
page read and write
|
||
26FE000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A3DC000
|
heap
|
page read and write
|
||
C5F0000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
37B1000
|
trusted library allocation
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
AED000
|
stack
|
page read and write
|
||
4862C000
|
direct allocation
|
page read and write
|
||
39E0000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7FF5D75CB000
|
unkown
|
page readonly
|
||
35FA000
|
unkown
|
page read and write
|
||
4360000
|
unclassified section
|
page read and write
|
||
3BB7000
|
trusted library allocation
|
page read and write
|
||
A39A000
|
heap
|
page read and write
|
||
9EB8000
|
heap
|
page read and write
|
||
EF7000
|
heap
|
page read and write
|
||
A336000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
9FF0000
|
heap
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
A644000
|
heap
|
page read and write
|
||
AC91000
|
heap
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
C7BE000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
25AE000
|
stack
|
page read and write
|
||
F14000
|
heap
|
page read and write
|
||
A4E8000
|
heap
|
page read and write
|
||
35DF000
|
trusted library allocation
|
page read and write
|
||
5420000
|
trusted library allocation
|
page read and write
|
||
106A8000
|
unkown
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
41C40000
|
direct allocation
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
9CFE000
|
heap
|
page read and write
|
||
17D0000
|
trusted library allocation
|
page read and write
|
||
A609000
|
heap
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
C7C000
|
heap
|
page read and write
|
||
C9B000
|
stack
|
page read and write
|
||
10AB8000
|
unkown
|
page read and write
|
||
9579000
|
stack
|
page read and write
|
||
A70D000
|
heap
|
page read and write
|
||
3607000
|
trusted library allocation
|
page read and write
|
||
9F8B000
|
heap
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
3530000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
7637000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A7DE000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
A731000
|
heap
|
page read and write
|
||
9E63000
|
heap
|
page read and write
|
||
A7A2000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
9C59000
|
heap
|
page read and write
|
||
2FC9C000
|
direct allocation
|
page read and write
|
||
361A000
|
trusted library allocation
|
page read and write
|
||
A849000
|
heap
|
page read and write
|
||
A3B6000
|
unkown
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
BFB8000
|
stack
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
2791000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
A351000
|
heap
|
page read and write
|
||
A402000
|
heap
|
page read and write
|
||
AE1D000
|
stack
|
page read and write
|
||
35EC000
|
trusted library allocation
|
page read and write
|
||
A79C000
|
heap
|
page read and write
|
||
106A6000
|
unkown
|
page read and write
|
||
2FC6C000
|
direct allocation
|
page read and write
|
||
7FF5D75D9000
|
unkown
|
page readonly
|
||
6053A000
|
unkown
|
page read and write
|
||
4D97000
|
trusted library allocation
|
page read and write
|
||
7FF5D762F000
|
unkown
|
page readonly
|
||
17D6000
|
trusted library allocation
|
page execute and read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
2945000
|
trusted library allocation
|
page read and write
|
||
7FF5D7452000
|
unkown
|
page readonly
|
||
7FF5D7262000
|
unkown
|
page readonly
|
||
2C00000
|
heap
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
360A000
|
trusted library allocation
|
page read and write
|
||
2FDD000
|
stack
|
page read and write
|
||
41C88000
|
direct allocation
|
page read and write
|
||
FE7000
|
trusted library allocation
|
page execute and read and write
|
||
10AB3000
|
unkown
|
page read and write
|
||
7FF5D7488000
|
unkown
|
page readonly
|
||
4E8D000
|
stack
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
C806000
|
unkown
|
page read and write
|
||
F33000
|
heap
|
page read and write
|
||
6C3000
|
trusted library allocation
|
page execute and read and write
|
||
51E000
|
heap
|
page read and write
|
||
35E8000
|
trusted library allocation
|
page read and write
|
||
B23000
|
trusted library allocation
|
page execute and read and write
|
||
8510000
|
unkown
|
page read and write
|
||
7FF5D71F9000
|
unkown
|
page readonly
|
||
9E9A000
|
heap
|
page read and write
|
||
2670000
|
trusted library allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
27C9000
|
heap
|
page read and write
|
||
9E8F000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
9E8B000
|
heap
|
page read and write
|
||
A059000
|
heap
|
page read and write
|
||
A5FC000
|
heap
|
page read and write
|
||
35D8000
|
trusted library allocation
|
page read and write
|
||
A282000
|
heap
|
page read and write
|
||
5380000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
1495000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
A5F1000
|
heap
|
page read and write
|
||
C33000
|
trusted library allocation
|
page execute and read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
E93000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
F3F000
|
heap
|
page read and write
|
||
10E4000
|
trusted library allocation
|
page read and write
|
||
F1E000
|
heap
|
page read and write
|
||
7FF5D769E000
|
unkown
|
page readonly
|
||
7FF5D774C000
|
unkown
|
page readonly
|
||
A512000
|
heap
|
page read and write
|
||
4AEF000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
A373000
|
heap
|
page read and write
|
||
7FF5D76E8000
|
unkown
|
page readonly
|
||
392F000
|
stack
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7FF5CE343000
|
unkown
|
page readonly
|
||
A662000
|
heap
|
page read and write
|
||
56C000
|
heap
|
page read and write
|
||
60556000
|
unkown
|
page read and write
|
||
12D0000
|
unkown
|
page readonly
|
||
106A4000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
A29B000
|
heap
|
page read and write
|
||
106AC000
|
unkown
|
page read and write
|
||
1DC000
|
unkown
|
page readonly
|
||
9D3A000
|
heap
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
FCD000
|
trusted library allocation
|
page execute and read and write
|
||
8500000
|
unkown
|
page read and write
|
||
B7DF000
|
stack
|
page read and write
|
||
7AE0000
|
unkown
|
page read and write
|
||
A5FA000
|
heap
|
page read and write
|
||
A831000
|
heap
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
7FF5D7764000
|
unkown
|
page readonly
|
||
A818000
|
heap
|
page read and write
|
||
48618000
|
direct allocation
|
page read and write
|
||
8F49000
|
stack
|
page read and write
|
||
3627000
|
trusted library allocation
|
page read and write
|
||
8520000
|
unkown
|
page read and write
|
||
5340000
|
heap
|
page execute and read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
41CB0000
|
direct allocation
|
page read and write
|
||
7FF5D7438000
|
unkown
|
page readonly
|
||
517000
|
heap
|
page read and write
|
||
35C1000
|
unkown
|
page read and write
|
||
C62D000
|
unkown
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
515000
|
heap
|
page read and write
|
||
5315000
|
trusted library allocation
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
9E25000
|
heap
|
page read and write
|
||
760B000
|
unkown
|
page read and write
|
||
77A2000
|
unkown
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
B950000
|
unkown
|
page readonly
|
||
6C6000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
514000
|
trusted library allocation
|
page read and write
|
||
A06B000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
C035000
|
stack
|
page read and write
|
||
A5E9000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page readonly
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
9EB0000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
48F0000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
35D1000
|
trusted library allocation
|
page read and write
|
||
B5B000
|
trusted library allocation
|
page execute and read and write
|
||
34BE000
|
stack
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
A7C3000
|
heap
|
page read and write
|
||
2434000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
31AE000
|
stack
|
page read and write
|
||
1250000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
FD6000
|
trusted library allocation
|
page execute and read and write
|
||
86E0000
|
unkown
|
page readonly
|
||
160000
|
heap
|
page read and write
|
||
486AC000
|
direct allocation
|
page read and write
|
||
A6FA000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
106AD000
|
unkown
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
EB35000
|
unkown
|
page read and write
|
||
7FF5D7289000
|
unkown
|
page readonly
|
||
A6DF000
|
heap
|
page read and write
|
||
7691000
|
unkown
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
A25A000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
2660000
|
trusted library allocation
|
page read and write
|
||
9FCB000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
8946000
|
unkown
|
page read and write
|
||
9E81000
|
heap
|
page read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
C35000
|
heap
|
page read and write
|
||
A740000
|
heap
|
page read and write
|
||
A6C6000
|
heap
|
page read and write
|
||
A39D000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
2745000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
F03000
|
heap
|
page read and write
|
||
277A000
|
heap
|
page read and write
|
||
9D1B000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
1F0000
|
heap
|
page read and write
|
||
A84C000
|
heap
|
page read and write
|
||
8510000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
7618000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
9D20000
|
heap
|
page read and write
|
||
6053A000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
2400000
|
trusted library allocation
|
page read and write
|
||
A555000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page execute and read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
2A3D000
|
trusted library allocation
|
page read and write
|
||
51F4000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
75F8000
|
unkown
|
page read and write
|
||
9D2D000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
A7E6000
|
heap
|
page read and write
|
||
5226000
|
trusted library allocation
|
page read and write
|
||
A4AC000
|
heap
|
page read and write
|
||
9D67000
|
unkown
|
page read and write
|
||
51D5000
|
trusted library allocation
|
page read and write
|
||
1860000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
A846000
|
heap
|
page read and write
|
||
7DF4F2481000
|
unkown
|
page execute read
|
||
400000
|
unkown
|
page readonly
|
||
A0A9000
|
stack
|
page read and write
|
||
C3CC000
|
stack
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
5FD0000
|
unkown
|
page readonly
|
||
F85000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
C5F4000
|
unkown
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
C4C6000
|
unkown
|
page read and write
|
||
7686000
|
unkown
|
page read and write
|
||
3613000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
BE49000
|
stack
|
page read and write
|
||
F33000
|
heap
|
page read and write
|
||
A3C3000
|
unkown
|
page read and write
|
||
36D1000
|
heap
|
page read and write
|
||
10254000
|
unkown
|
page read and write
|
||
106AF000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
2A71000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
C9B000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
7FF5D76CD000
|
unkown
|
page readonly
|
||
7609000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
B46000
|
trusted library allocation
|
page execute and read and write
|
||
F44000
|
heap
|
page read and write
|
||
A30B000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
A6B4000
|
heap
|
page read and write
|
||
A706000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
2A39000
|
trusted library allocation
|
page read and write
|
||
106AA000
|
unkown
|
page read and write
|
||
A88A000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
2A36000
|
trusted library allocation
|
page read and write
|
||
1019B000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
361D000
|
trusted library allocation
|
page read and write
|
||
EFD000
|
stack
|
page read and write
|
||
8510000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
9E55000
|
heap
|
page read and write
|
||
A4E6000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3621000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
7FF5D723F000
|
unkown
|
page readonly
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
C483000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
F08C000
|
stack
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
C3D000
|
trusted library allocation
|
page execute and read and write
|
||
A14A000
|
heap
|
page read and write
|
||
10216000
|
unkown
|
page read and write
|
||
99B6000
|
unkown
|
page read and write
|
||
7FF5D7752000
|
unkown
|
page readonly
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
49E50000
|
direct allocation
|
page read and write
|
||
769A000
|
unkown
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
4D91000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
35F4000
|
trusted library allocation
|
page read and write
|
||
C617000
|
unkown
|
page read and write
|
||
4D74000
|
trusted library allocation
|
page read and write
|
||
17EB000
|
trusted library allocation
|
page execute and read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
7FF5D72FB000
|
unkown
|
page readonly
|
||
517000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
B980000
|
unkown
|
page readonly
|
||
F33000
|
heap
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
remote allocation
|
page read and write
|
||
7CB0000
|
unkown
|
page readonly
|
||
9E35000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
86D0000
|
unkown
|
page readonly
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
A4B9000
|
heap
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
A828000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
9D06000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
F07000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
9379000
|
stack
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
360A000
|
trusted library allocation
|
page read and write
|
||
35D1000
|
trusted library allocation
|
page read and write
|
||
760F000
|
unkown
|
page read and write
|
||
2754000
|
trusted library allocation
|
page read and write
|
||
34834000
|
direct allocation
|
page read and write
|
||
A7AB000
|
heap
|
page read and write
|
||
1584000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
48658000
|
direct allocation
|
page read and write
|
||
7FF5D743F000
|
unkown
|
page readonly
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
9E6D000
|
heap
|
page read and write
|
||
9D63000
|
heap
|
page read and write
|
||
1687000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page execute and read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
3619000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
7FF5D75BF000
|
unkown
|
page readonly
|
||
B6F000
|
stack
|
page read and write
|
||
2654000
|
trusted library allocation
|
page read and write
|
||
594000
|
unkown
|
page read and write
|
||
4F6000
|
stack
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
34804000
|
direct allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
5240000
|
trusted library allocation
|
page read and write
|
||
B57000
|
trusted library allocation
|
page execute and read and write
|
||
6056D000
|
unkown
|
page execute read
|
||
9E96000
|
heap
|
page read and write
|
||
27F8000
|
trusted library allocation
|
page read and write
|
||
9E6D000
|
heap
|
page read and write
|
||
35EC000
|
trusted library allocation
|
page read and write
|
||
9E9E000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
41C9C000
|
direct allocation
|
page read and write
|
||
3641000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
A74E000
|
heap
|
page read and write
|
||
513000
|
trusted library allocation
|
page execute and read and write
|
||
A39F000
|
unkown
|
page read and write
|
||
A83A000
|
heap
|
page read and write
|
||
9E6C000
|
heap
|
page read and write
|
||
21A0000
|
trusted library allocation
|
page read and write
|
||
7FF5D7792000
|
unkown
|
page readonly
|
||
6053C000
|
unkown
|
page write copy
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
BD8000
|
heap
|
page read and write
|
||
9E94000
|
heap
|
page read and write
|
||
9F80000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
7FF5D7202000
|
unkown
|
page readonly
|
||
A6A4000
|
heap
|
page read and write
|
||
35E7000
|
trusted library allocation
|
page read and write
|
||
A6ED000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
A7A0000
|
heap
|
page read and write
|
||
2FC2C000
|
direct allocation
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
9FB0000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
B74000
|
unkown
|
page readonly
|
||
3648000
|
trusted library allocation
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
A55A000
|
heap
|
page read and write
|
||
F33000
|
heap
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
||
F27000
|
heap
|
page read and write
|
||
101D3000
|
unkown
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F36000
|
stack
|
page read and write
|
||
520000
|
trusted library allocation
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
35E2000
|
trusted library allocation
|
page read and write
|
||
10AB5000
|
unkown
|
page read and write
|
||
A714000
|
heap
|
page read and write
|
||
A637000
|
heap
|
page read and write
|
||
55860000
|
direct allocation
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
7FF5D75F2000
|
unkown
|
page readonly
|
||
4FCD000
|
stack
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
BD5000
|
trusted library allocation
|
page read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
41CBC000
|
direct allocation
|
page read and write
|
||
76B000
|
stack
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
C6B000
|
trusted library allocation
|
page execute and read and write
|
||
F13000
|
heap
|
page read and write
|
||
BB10000
|
heap
|
page read and write
|
||
A733000
|
heap
|
page read and write
|
||
34814000
|
direct allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
5770000
|
heap
|
page execute and read and write
|
||
A6E4000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
8931000
|
unkown
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
9AB4000
|
unkown
|
page read and write
|
||
E3B000
|
stack
|
page read and write
|
||
E2E000
|
stack
|
page read and write
|
||
3100000
|
unkown
|
page read and write
|
||
2F6C000
|
trusted library allocation
|
page read and write
|
||
8FD8000
|
stack
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
A21D000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
9CED000
|
heap
|
page read and write
|
||
3679000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
C1D000
|
heap
|
page read and write
|
||
C56000
|
trusted library allocation
|
page execute and read and write
|
||
3600000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
1599000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
49C2000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F37000
|
heap
|
page read and write
|
||
9E91000
|
heap
|
page read and write
|
||
7FF5D73F5000
|
unkown
|
page readonly
|
||
4600000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
21A7000
|
trusted library allocation
|
page execute and read and write
|
||
4590000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
338B000
|
stack
|
page read and write
|
||
9D34000
|
heap
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
9E78000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
7FF5D7799000
|
unkown
|
page readonly
|
||
305C000
|
stack
|
page read and write
|
||
9E92000
|
heap
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
C48B000
|
unkown
|
page read and write
|
||
9E61000
|
heap
|
page read and write
|
||
EB6000
|
heap
|
page read and write
|
||
8510000
|
unkown
|
page read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
A384000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
9FB2000
|
heap
|
page read and write
|
||
3487C000
|
direct allocation
|
page read and write
|
||
7FF5D7398000
|
unkown
|
page readonly
|
||
6D0000
|
heap
|
page read and write
|
||
CA9000
|
heap
|
page read and write
|
||
4AA0000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A3C3000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
35F7000
|
trusted library allocation
|
page read and write
|
||
4D8D000
|
stack
|
page read and write
|
||
69D000
|
heap
|
page read and write
|
||
A708000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
A084000
|
heap
|
page read and write
|
||
9C2E000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
49E6C000
|
direct allocation
|
page read and write
|
||
6C0000
|
trusted library allocation
|
page read and write
|
||
23D5000
|
trusted library allocation
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
1457000
|
heap
|
page read and write
|
||
49E8C000
|
direct allocation
|
page read and write
|
||
9EA5000
|
heap
|
page read and write
|
||
A4EF000
|
heap
|
page read and write
|
||
29D000
|
unkown
|
page readonly
|
||
8963000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
2A25000
|
trusted library allocation
|
page read and write
|
||
EB37000
|
unkown
|
page read and write
|
||
F1E000
|
heap
|
page read and write
|
||
41D00000
|
direct allocation
|
page read and write
|
||
A484000
|
heap
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
A3B1000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
41C4C000
|
direct allocation
|
page read and write
|
||
35F8000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
106AF000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
F1A000
|
heap
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
7E58000
|
stack
|
page read and write
|
||
A4DA000
|
heap
|
page read and write
|
||
9E63000
|
heap
|
page read and write
|
||
B73000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4F2460000
|
unkown
|
page readonly
|
||
A030000
|
heap
|
page read and write
|
||
76F8000
|
unkown
|
page read and write
|
||
9CA2000
|
heap
|
page read and write
|
||
363A000
|
trusted library allocation
|
page read and write
|
||
BE8000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
5EF2000
|
unkown
|
page readonly
|
||
F54000
|
heap
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
30DC000
|
stack
|
page read and write
|
||
55814000
|
direct allocation
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
A3D4000
|
heap
|
page read and write
|
||
4D7F000
|
stack
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
A6BC000
|
heap
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
50A000
|
heap
|
page read and write
|
||
A76B000
|
heap
|
page read and write
|
||
35FA000
|
trusted library allocation
|
page read and write
|
||
1575000
|
trusted library allocation
|
page read and write
|
||
A2E5000
|
heap
|
page read and write
|
||
BF3D000
|
stack
|
page read and write
|
||
9E67000
|
heap
|
page read and write
|
||
8A46000
|
unkown
|
page read and write
|
||
B0E0000
|
unkown
|
page readonly
|
||
A797000
|
heap
|
page read and write
|
||
9E9A000
|
heap
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
1400000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D749B000
|
unkown
|
page readonly
|
||
8500000
|
unkown
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
8870000
|
unkown
|
page readonly
|
||
C46F000
|
unkown
|
page read and write
|
||
3617000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
unkown
|
page readonly
|
||
10114000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
51E000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
F03000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
548000
|
heap
|
page read and write
|
||
4D8E000
|
trusted library allocation
|
page read and write
|
||
A63D000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
30FB000
|
stack
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
7FF5D7280000
|
unkown
|
page readonly
|
||
B74000
|
unkown
|
page readonly
|
||
F13000
|
heap
|
page read and write
|
||
1131000
|
heap
|
page read and write
|
||
24A000
|
stack
|
page read and write
|
||
9EA3000
|
heap
|
page read and write
|
||
A417000
|
heap
|
page read and write
|
||
23F9000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
A338000
|
heap
|
page read and write
|
||
3605000
|
trusted library allocation
|
page read and write
|
||
5424000
|
trusted library allocation
|
page read and write
|
||
2FC01000
|
direct allocation
|
page read and write
|
||
10AB9000
|
unkown
|
page read and write
|
||
87E0000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
2F6E000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
trusted library allocation
|
page execute and read and write
|
||
37A9000
|
trusted library allocation
|
page read and write
|
||
348A0000
|
direct allocation
|
page read and write
|
||
7FF5D7669000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
7FF5D72BF000
|
unkown
|
page readonly
|
||
9E78000
|
heap
|
page read and write
|
||
6CD000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
EAC000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page execute and read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
9E76000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
A27A000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
10AB3000
|
unkown
|
page read and write
|
||
3617000
|
trusted library allocation
|
page read and write
|
||
35D7000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
7FF5D7589000
|
unkown
|
page readonly
|
||
F22000
|
heap
|
page read and write
|
||
2424000
|
trusted library allocation
|
page read and write
|
||
7FF5D74A6000
|
unkown
|
page readonly
|
||
7FF5D706E000
|
unkown
|
page readonly
|
||
51E000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A4A3000
|
heap
|
page read and write
|
||
35E4000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
9B0B000
|
unkown
|
page read and write
|
||
7FF5D7682000
|
unkown
|
page readonly
|
||
51E000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
7FF5D758D000
|
unkown
|
page readonly
|
||
99B0000
|
unkown
|
page read and write
|
||
9E94000
|
heap
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
heap
|
page execute and read and write
|
||
2FC68000
|
direct allocation
|
page read and write
|
||
732E000
|
stack
|
page read and write
|
||
49E40000
|
direct allocation
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
CC7000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
1117000
|
trusted library allocation
|
page execute and read and write
|
||
F33000
|
heap
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
6EA000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
C908000
|
unkown
|
page read and write
|
||
A624000
|
heap
|
page read and write
|
||
A3C7000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
3791000
|
trusted library allocation
|
page read and write
|
||
28EF000
|
heap
|
page read and write
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
3614000
|
trusted library allocation
|
page read and write
|
||
51E6000
|
trusted library allocation
|
page read and write
|
||
61121000
|
unkown
|
page execute read
|
||
C496000
|
unkown
|
page read and write
|
||
A7AD000
|
heap
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
A815000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
AF8000
|
stack
|
page read and write
|
||
2A54000
|
trusted library allocation
|
page read and write
|
||
2471000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
35EA000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
9E70000
|
heap
|
page read and write
|
||
A766000
|
heap
|
page read and write
|
||
A40D000
|
heap
|
page read and write
|
||
5720000
|
heap
|
page execute and read and write
|
||
F50000
|
heap
|
page read and write
|
||
9FC3000
|
heap
|
page read and write
|
||
A4D3000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
4290000
|
heap
|
page read and write
|
||
48664000
|
direct allocation
|
page read and write
|
||
A678000
|
heap
|
page read and write
|
||
3731000
|
trusted library allocation
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
35EA000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
7FF5D717C000
|
unkown
|
page readonly
|
||
41C2C000
|
direct allocation
|
page read and write
|
||
9EB8000
|
heap
|
page read and write
|
||
91F0000
|
unkown
|
page readonly
|
||
7FF5D7639000
|
unkown
|
page readonly
|
||
F54000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
A3BA000
|
heap
|
page read and write
|
||
60721000
|
unkown
|
page execute read
|
||
825000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
CC2000
|
heap
|
page read and write
|
||
3660000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
DEF000
|
stack
|
page read and write
|
||
4DF3000
|
trusted library allocation
|
page read and write
|
||
B4BD000
|
stack
|
page read and write
|
||
C472000
|
unkown
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
35D8000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
260000
|
unkown
|
page readonly
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
9E76000
|
heap
|
page read and write
|
||
A5B1000
|
heap
|
page read and write
|
||
2EC0000
|
unkown
|
page readonly
|
||
28E1000
|
heap
|
page execute and read and write
|
||
DCE000
|
stack
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
D68000
|
heap
|
page read and write
|
||
7FF5D7784000
|
unkown
|
page readonly
|
||
C65000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
2B3000
|
unkown
|
page execute read
|
||
9CEA000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
FBD000
|
trusted library allocation
|
page execute and read and write
|
||
A6FD000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
23E6000
|
trusted library allocation
|
page read and write
|
||
A672000
|
heap
|
page read and write
|
||
BA8000
|
heap
|
page read and write
|
||
9C49000
|
heap
|
page read and write
|
||
7330000
|
unclassified section
|
page readonly
|
||
517000
|
heap
|
page read and write
|
||
5410000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
9FE3000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
A20B000
|
heap
|
page read and write
|
||
16AF000
|
stack
|
page read and write
|
||
7FF5D75EE000
|
unkown
|
page readonly
|
||
22CE000
|
stack
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
4980000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
103CC000
|
stack
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
41C04000
|
direct allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
7FF5D778A000
|
unkown
|
page readonly
|
||
2669000
|
trusted library allocation
|
page read and write
|
||
2BDD000
|
stack
|
page read and write
|
||
9E2F000
|
heap
|
page read and write
|
||
41CC4000
|
direct allocation
|
page read and write
|
||
10AB0000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7FF5D710B000
|
unkown
|
page readonly
|
||
49FA000
|
unkown
|
page read and write
|
||
34880000
|
direct allocation
|
page read and write
|
||
9A80000
|
unkown
|
page read and write
|
||
647000
|
trusted library allocation
|
page execute and read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
9E70000
|
heap
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
A612000
|
heap
|
page read and write
|
||
7611000
|
unkown
|
page read and write
|
||
7FF5D72CE000
|
unkown
|
page readonly
|
||
C1CC000
|
stack
|
page read and write
|
||
1C9000
|
unkown
|
page readonly
|
||
3BFA000
|
trusted library allocation
|
page read and write
|
||
49E14000
|
direct allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
49D6000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
C4DC000
|
unkown
|
page read and write
|
||
7FF5D77A8000
|
unkown
|
page readonly
|
||
36D0000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
64321000
|
unkown
|
page execute read
|
||
49EBC000
|
direct allocation
|
page read and write
|
||
561000
|
heap
|
page read and write
|
||
C24E000
|
stack
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
E72D000
|
stack
|
page read and write
|
||
A12F000
|
stack
|
page read and write
|
||
9C29000
|
heap
|
page read and write
|
||
2756000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
9E8A000
|
heap
|
page read and write
|
||
3619000
|
trusted library allocation
|
page read and write
|
||
360A000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
2700000
|
trusted library allocation
|
page execute and read and write
|
||
136D000
|
trusted library allocation
|
page execute and read and write
|
||
517000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
A341000
|
heap
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
BDC0000
|
unkown
|
page read and write
|
||
597E000
|
stack
|
page read and write
|
||
1159000
|
heap
|
page read and write
|
||
699000
|
heap
|
page read and write
|
||
A6EA000
|
heap
|
page read and write
|
||
A3EF000
|
heap
|
page read and write
|
||
35E8000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
7FF5D775C000
|
unkown
|
page readonly
|
||
F54000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
A5D7000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
99B3000
|
unkown
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
10AB8000
|
unkown
|
page read and write
|
||
41D28000
|
direct allocation
|
page read and write
|
||
A39F000
|
heap
|
page read and write
|
||
F3B000
|
heap
|
page read and write
|
||
486D0000
|
direct allocation
|
page read and write
|
||
9D6C000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
A7C0000
|
heap
|
page read and write
|
||
3612000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
2381000
|
trusted library allocation
|
page read and write
|
||
F0E000
|
heap
|
page read and write
|
||
1386000
|
trusted library allocation
|
page execute and read and write
|
||
A8A9000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
A49B000
|
heap
|
page read and write
|
||
7FF5D777A000
|
unkown
|
page readonly
|
||
7DF4F2470000
|
unkown
|
page readonly
|
||
ACC1000
|
heap
|
page read and write
|
||
35D2000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
A7C5000
|
heap
|
page read and write
|
||
231F000
|
stack
|
page read and write
|
||
7FF5D71E0000
|
unkown
|
page readonly
|
||
F44000
|
heap
|
page read and write
|
||
A5E3000
|
heap
|
page read and write
|
||
BA2000
|
trusted library allocation
|
page read and write
|
||
A626000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
9A96000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
7FF5D723C000
|
unkown
|
page readonly
|
||
436000
|
unkown
|
page readonly
|
||
E60000
|
heap
|
page read and write
|
||
A380000
|
heap
|
page read and write
|
||
364C000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
unkown
|
page read and write
|
||
9E8F000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
9E50000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3607000
|
trusted library allocation
|
page read and write
|
||
49EAC000
|
direct allocation
|
page read and write
|
||
9C25000
|
heap
|
page read and write
|
||
7DF4F2471000
|
unkown
|
page execute read
|
||
A3BF000
|
heap
|
page read and write
|
||
A38A000
|
heap
|
page read and write
|
||
9E4D000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
363A000
|
trusted library allocation
|
page read and write
|
||
A813000
|
heap
|
page read and write
|
||
9E67000
|
heap
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
6A6000
|
heap
|
page read and write
|
||
36DD000
|
trusted library allocation
|
page read and write
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
27EF000
|
stack
|
page read and write
|
||
BDE000
|
heap
|
page read and write
|
||
A3E4000
|
heap
|
page read and write
|
||
7FF5D7215000
|
unkown
|
page readonly
|
||
87B0000
|
unkown
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
49E60000
|
direct allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
27F4000
|
heap
|
page read and write
|
||
35FB000
|
trusted library allocation
|
page read and write
|
||
378D000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
A68D000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
9E95000
|
heap
|
page read and write
|
||
360C000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
2FF9000
|
stack
|
page read and write
|
||
2901000
|
trusted library allocation
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
A85F000
|
heap
|
page read and write
|
||
106A9000
|
unkown
|
page read and write
|
||
B97000
|
trusted library allocation
|
page read and write
|
||
A2FD000
|
heap
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
49E01000
|
direct allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
442000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
8510000
|
unkown
|
page read and write
|
||
2650000
|
trusted library allocation
|
page read and write
|
||
A683000
|
heap
|
page read and write
|
||
A2F3000
|
heap
|
page read and write
|
||
A820000
|
heap
|
page read and write
|
||
F55000
|
heap
|
page read and write
|
||
B24000
|
trusted library allocation
|
page read and write
|
||
7FF5D751F000
|
unkown
|
page readonly
|
||
34890000
|
direct allocation
|
page read and write
|
||
6FC000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
3606000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
5479000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
49E9C000
|
direct allocation
|
page read and write
|
||
10ABF000
|
unkown
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
CA2A000
|
unkown
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
228E000
|
stack
|
page read and write
|
||
BEF000
|
stack
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
9679000
|
stack
|
page read and write
|
||
F25000
|
heap
|
page read and write
|
||
F33000
|
heap
|
page read and write
|
||
768C000
|
unkown
|
page read and write
|
||
A694000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
15A8000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
A066000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
492F000
|
stack
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
C5A000
|
trusted library allocation
|
page execute and read and write
|
||
51E000
|
heap
|
page read and write
|
||
A7F4000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
A2AB000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
1427000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
9C20000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
2907000
|
trusted library allocation
|
page read and write
|
||
EAC000
|
heap
|
page read and write
|
||
A332000
|
heap
|
page read and write
|
||
41C7C000
|
direct allocation
|
page read and write
|
||
184E000
|
stack
|
page read and write
|
||
17B0000
|
trusted library allocation
|
page read and write
|
||
A248000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
A9FD000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
525F000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3630000
|
trusted library allocation
|
page read and write
|
||
7FF5D6AB6000
|
unkown
|
page readonly
|
||
3603000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page execute and read and write
|
||
F3D000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
33D0000
|
remote allocation
|
page read and write
|
||
9A94000
|
unkown
|
page read and write
|
||
28DC000
|
stack
|
page read and write
|
||
35F2000
|
trusted library allocation
|
page read and write
|
||
106A8000
|
unkown
|
page read and write
|
||
5584C000
|
direct allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
A487000
|
heap
|
page read and write
|
||
3625000
|
trusted library allocation
|
page read and write
|
||
7FF5D72D7000
|
unkown
|
page readonly
|
||
9EA5000
|
heap
|
page read and write
|
||
4461000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
11F0000
|
unkown
|
page read and write
|
||
BAB000
|
trusted library allocation
|
page execute and read and write
|
||
A227000
|
heap
|
page read and write
|
||
7DF4F2461000
|
unkown
|
page execute read
|
||
55850000
|
direct allocation
|
page read and write
|
||
35E8000
|
trusted library allocation
|
page read and write
|
||
A701000
|
heap
|
page read and write
|
||
60720000
|
unkown
|
page readonly
|
||
3609000
|
trusted library allocation
|
page read and write
|
||
4D85000
|
trusted library allocation
|
page read and write
|
||
A7B3000
|
heap
|
page read and write
|
||
7FF5D75B3000
|
unkown
|
page readonly
|
||
7FF5D7740000
|
unkown
|
page readonly
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
7FF5D75E9000
|
unkown
|
page readonly
|
||
656000
|
heap
|
page read and write
|
||
A231000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
A409000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
C5FA000
|
unkown
|
page read and write
|
||
35D3000
|
unkown
|
page read and write
|
||
DDF000
|
stack
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
A78A000
|
heap
|
page read and write
|
||
21C0000
|
trusted library allocation
|
page read and write
|
||
A620000
|
heap
|
page read and write
|
||
151000
|
unkown
|
page execute read
|
||
A23F000
|
heap
|
page read and write
|
||
F42000
|
heap
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
936000
|
stack
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
9D51000
|
heap
|
page read and write
|
||
F02000
|
heap
|
page read and write
|
||
49EE0000
|
direct allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
7FF5D776F000
|
unkown
|
page readonly
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
7FF5D77E9000
|
unkown
|
page readonly
|
||
9E6F000
|
heap
|
page read and write
|
||
110F000
|
stack
|
page read and write
|
||
ABB000
|
stack
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
9E70000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
AF1000
|
stack
|
page read and write
|
||
6054C000
|
unkown
|
page write copy
|
||
6A6000
|
heap
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
1870000
|
heap
|
page read and write
|
||
C605000
|
unkown
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
9AAA000
|
unkown
|
page read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
C4BD000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
7440000
|
unkown
|
page read and write
|
||
35D0000
|
trusted library allocation
|
page read and write
|
||
3619000
|
trusted library allocation
|
page read and write
|
||
9A98000
|
unkown
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
A4FE000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
709000
|
heap
|
page read and write
|
||
9EA000
|
trusted library allocation
|
page execute and read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
A520000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
1107000
|
heap
|
page read and write
|
||
7DF4F2480000
|
unkown
|
page readonly
|
||
A2C7000
|
heap
|
page read and write
|
||
34870000
|
direct allocation
|
page read and write
|
||
61B21000
|
unkown
|
page execute read
|
||
A2A4000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
106AF000
|
unkown
|
page read and write
|
||
360A000
|
trusted library allocation
|
page read and write
|
||
A6B9000
|
heap
|
page read and write
|
||
AA5000
|
heap
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
CFC000
|
stack
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
56C000
|
heap
|
page read and write
|
||
A213000
|
heap
|
page read and write
|
||
3627000
|
trusted library allocation
|
page read and write
|
||
7AA0000
|
unkown
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
9E6000
|
trusted library allocation
|
page execute and read and write
|
||
A65000
|
heap
|
page read and write
|
||
9E98000
|
heap
|
page read and write
|
||
7FF5D75DF000
|
unkown
|
page readonly
|
||
9E6B000
|
heap
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
49E24000
|
direct allocation
|
page read and write
|
||
23F0000
|
trusted library allocation
|
page read and write
|
||
A7BA000
|
heap
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
74C000
|
stack
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
1363000
|
trusted library allocation
|
page execute and read and write
|
||
7B80000
|
unkown
|
page readonly
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
7FF5D76D5000
|
unkown
|
page readonly
|
||
A769000
|
heap
|
page read and write
|
||
EE7000
|
trusted library allocation
|
page read and write
|
||
A40F000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
10B000
|
stack
|
page read and write
|
||
A250000
|
heap
|
page read and write
|
||
3617000
|
trusted library allocation
|
page read and write
|
||
75FD000
|
unkown
|
page read and write
|
||
10AB8000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
D7F000
|
heap
|
page read and write
|
||
9E70000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
9E8A000
|
heap
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
9ADB000
|
unkown
|
page read and write
|
||
107B000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
6C4000
|
trusted library allocation
|
page read and write
|
||
7FF5D7760000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
1106000
|
trusted library allocation
|
page execute and read and write
|
||
F42000
|
heap
|
page read and write
|
||
F42000
|
heap
|
page read and write
|
||
E8AD000
|
stack
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
B00000
|
heap
|
page read and write
|
||
363C000
|
trusted library allocation
|
page read and write
|
||
17A0000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
7FF5D7450000
|
unkown
|
page readonly
|
||
517000
|
heap
|
page read and write
|
||
51D000
|
trusted library allocation
|
page execute and read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A16000
|
heap
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
10ABD000
|
unkown
|
page read and write
|
||
9E88000
|
heap
|
page read and write
|
||
7FF5D7236000
|
unkown
|
page readonly
|
||
A492000
|
heap
|
page read and write
|
||
587F000
|
stack
|
page read and write
|
||
2FD1000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
C5F8000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
A718000
|
heap
|
page read and write
|
||
35DF000
|
trusted library allocation
|
page read and write
|
||
7FF5D716B000
|
unkown
|
page readonly
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
106A1000
|
unkown
|
page read and write
|
||
9F96000
|
heap
|
page read and write
|
||
A050000
|
heap
|
page read and write
|
||
49E78000
|
direct allocation
|
page read and write
|
||
7FF5D760B000
|
unkown
|
page readonly
|
||
7FF5D77DD000
|
unkown
|
page readonly
|
||
226D000
|
stack
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
A590000
|
heap
|
page read and write
|
||
4D84000
|
trusted library allocation
|
page read and write
|
||
A2C0000
|
heap
|
page read and write
|
||
4D7B000
|
trusted library allocation
|
page read and write
|
||
A4A5000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
364E000
|
trusted library allocation
|
page read and write
|
||
F10C000
|
stack
|
page read and write
|
||
2F91000
|
trusted library allocation
|
page read and write
|
||
A292000
|
heap
|
page read and write
|
||
1DA000
|
unkown
|
page write copy
|
||
48604000
|
direct allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
B8DB000
|
stack
|
page read and write
|
||
E6F000
|
stack
|
page read and write
|
||
35E9000
|
trusted library allocation
|
page read and write
|
||
3630000
|
trusted library allocation
|
page read and write
|
||
FEB000
|
trusted library allocation
|
page execute and read and write
|
||
A778000
|
heap
|
page read and write
|
||
ECA000
|
heap
|
page read and write
|
||
9E9B000
|
heap
|
page read and write
|
||
8880000
|
unkown
|
page readonly
|
||
A75C000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
FE7000
|
trusted library allocation
|
page execute and read and write
|
||
1058000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
510F000
|
stack
|
page read and write
|
||
4B00000
|
unkown
|
page read and write
|
||
9D2B000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
9E2E000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
2FC88000
|
direct allocation
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
7FF5D74FA000
|
unkown
|
page readonly
|
||
7FF5D7808000
|
unkown
|
page readonly
|
||
A9DF000
|
unkown
|
page read and write
|
||
53E0000
|
unkown
|
page readonly
|
||
1C9000
|
unkown
|
page readonly
|
||
7631000
|
unkown
|
page read and write
|
||
7C70000
|
unkown
|
page readonly
|
||
2420000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
5586C000
|
direct allocation
|
page read and write
|
||
237E000
|
stack
|
page read and write
|
||
A6BE000
|
heap
|
page read and write
|
||
7FF5D7360000
|
unkown
|
page readonly
|
||
48688000
|
direct allocation
|
page read and write
|
||
A3F6000
|
heap
|
page read and write
|
||
7FF5D66E3000
|
unkown
|
page readonly
|
||
51E000
|
heap
|
page read and write
|
||
E4CC000
|
stack
|
page read and write
|
||
41C01000
|
direct allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
1138000
|
heap
|
page read and write
|
||
23E1000
|
trusted library allocation
|
page read and write
|
||
768E000
|
unkown
|
page read and write
|
||
5261000
|
trusted library allocation
|
page read and write
|
||
2A8E000
|
trusted library allocation
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
A606000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
936000
|
stack
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
7DBC000
|
stack
|
page read and write
|
||
272F000
|
stack
|
page read and write
|
||
7FF5D77B9000
|
unkown
|
page readonly
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
7FF5D752F000
|
unkown
|
page readonly
|
||
7FF5D720A000
|
unkown
|
page readonly
|
||
3120000
|
unkown
|
page read and write
|
||
106AF000
|
unkown
|
page read and write
|
||
AA01000
|
unkown
|
page read and write
|
||
9E3E000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
8DCB000
|
stack
|
page read and write
|
||
9A8E000
|
unkown
|
page read and write
|
||
7FF5D7523000
|
unkown
|
page readonly
|
||
D96000
|
stack
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
21A2000
|
trusted library allocation
|
page read and write
|
||
7D3E000
|
stack
|
page read and write
|
||
3485C000
|
direct allocation
|
page read and write
|
||
510000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
41C50000
|
direct allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
A4F4000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
A2D4000
|
heap
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
87E0000
|
unkown
|
page read and write
|
||
F07000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
7FF5D7426000
|
unkown
|
page readonly
|
||
D47000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
2FC78000
|
direct allocation
|
page read and write
|
||
2FD0000
|
remote allocation
|
page read and write
|
||
7FF5D748A000
|
unkown
|
page readonly
|
||
2F50000
|
trusted library allocation
|
page read and write
|
||
41C24000
|
direct allocation
|
page read and write
|
||
3634000
|
trusted library allocation
|
page read and write
|
||
B2D000
|
trusted library allocation
|
page execute and read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
20CF000
|
stack
|
page read and write
|
||
1DC000
|
unkown
|
page readonly
|
||
35EA000
|
trusted library allocation
|
page read and write
|
||
41C68000
|
direct allocation
|
page read and write
|
||
EB6000
|
heap
|
page read and write
|
||
F36000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
A7EC000
|
heap
|
page read and write
|
||
9C69000
|
heap
|
page read and write
|
||
2A42000
|
trusted library allocation
|
page read and write
|
||
17DA000
|
trusted library allocation
|
page execute and read and write
|
||
49E68000
|
direct allocation
|
page read and write
|
||
1586000
|
trusted library allocation
|
page read and write
|
||
108C000
|
stack
|
page read and write
|
||
17C0000
|
trusted library allocation
|
page read and write
|
||
A7FB000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
A2A2000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
A104000
|
heap
|
page read and write
|
||
4EB3000
|
trusted library allocation
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
9E59000
|
heap
|
page read and write
|
||
5215000
|
trusted library allocation
|
page read and write
|
||
41B000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
2A45000
|
trusted library allocation
|
page read and write
|
||
2A7F000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
7FF5D6BDB000
|
unkown
|
page readonly
|
||
51E000
|
heap
|
page read and write
|
||
7FF5D77CD000
|
unkown
|
page readonly
|
||
9AF9000
|
unkown
|
page read and write
|
||
3641000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
A203000
|
heap
|
page read and write
|
||
A055000
|
heap
|
page read and write
|
||
9D29000
|
heap
|
page read and write
|
||
9B41000
|
unkown
|
page read and write
|
||
F07000
|
heap
|
page read and write
|
||
B74000
|
trusted library allocation
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
9C35000
|
heap
|
page read and write
|
||
7C90000
|
unkown
|
page read and write
|
||
F27000
|
heap
|
page read and write
|
||
3660000
|
trusted library allocation
|
page read and write
|
||
C609000
|
unkown
|
page read and write
|
||
9E82000
|
heap
|
page read and write
|
||
9E31000
|
heap
|
page read and write
|
||
9E4A000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7FF5D75C1000
|
unkown
|
page readonly
|
||
4864C000
|
direct allocation
|
page read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
10E8F000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
remote allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
A23A000
|
unkown
|
page read and write
|
||
9B2C000
|
unkown
|
page read and write
|
||
C61D000
|
unkown
|
page read and write
|
||
7FF5D7257000
|
unkown
|
page readonly
|
||
69E000
|
stack
|
page read and write
|
||
3632000
|
trusted library allocation
|
page read and write
|
||
7FF5D7292000
|
unkown
|
page readonly
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
E62C000
|
stack
|
page read and write
|
||
2441000
|
trusted library allocation
|
page read and write
|
||
1360000
|
trusted library allocation
|
page read and write
|
||
35D6000
|
trusted library allocation
|
page read and write
|
||
FDA000
|
trusted library allocation
|
page execute and read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
1392000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
9FBE000
|
heap
|
page read and write
|
||
8890000
|
unkown
|
page readonly
|
||
3641000
|
trusted library allocation
|
page read and write
|
||
49E2C000
|
direct allocation
|
page read and write
|
||
221E000
|
stack
|
page read and write
|
||
5773000
|
heap
|
page execute and read and write
|
||
7FF5D772C000
|
unkown
|
page readonly
|
||
1270000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
F03000
|
heap
|
page read and write
|
||
2A75000
|
trusted library allocation
|
page read and write
|
||
9E75000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
1103000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
2447000
|
trusted library allocation
|
page read and write
|
||
114C000
|
heap
|
page read and write
|
||
35F4000
|
unkown
|
page read and write
|
||
65721000
|
unkown
|
page execute read
|
||
2848000
|
trusted library allocation
|
page read and write
|
||
9E67000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F27000
|
heap
|
page read and write
|
||
7FF5D766E000
|
unkown
|
page readonly
|
||
517000
|
heap
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
4AF3000
|
heap
|
page execute and read and write
|
||
9E9B000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
12C7000
|
trusted library allocation
|
page read and write
|
||
7FF5D7641000
|
unkown
|
page readonly
|
||
9E66000
|
heap
|
page read and write
|
||
66121000
|
unkown
|
page execute read
|
||
14B000
|
stack
|
page read and write
|
||
7FF5D728E000
|
unkown
|
page readonly
|
||
2E80000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
35F7000
|
trusted library allocation
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
6A10000
|
unkown
|
page readonly
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
2FC8C000
|
direct allocation
|
page read and write
|
||
F0E000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
C7CB000
|
unkown
|
page read and write
|
||
35D5000
|
unkown
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
163E000
|
heap
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
FBF000
|
stack
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
9E22000
|
heap
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
FE2000
|
trusted library allocation
|
page read and write
|
||
E931000
|
unkown
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
F43000
|
heap
|
page read and write
|
||
8A70000
|
unkown
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
A25E000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
ECB000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
FEB000
|
trusted library allocation
|
page execute and read and write
|
||
3170000
|
unkown
|
page read and write
|
||
5343000
|
heap
|
page execute and read and write
|
||
51E000
|
heap
|
page read and write
|
||
1096000
|
heap
|
page read and write
|
||
8520000
|
unkown
|
page read and write
|
||
7FF5D77E0000
|
unkown
|
page readonly
|
||
34824000
|
direct allocation
|
page read and write
|
||
A35F000
|
heap
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
2E40000
|
heap
|
page execute and read and write
|
||
A67D000
|
heap
|
page read and write
|
||
3C85000
|
trusted library allocation
|
page read and write
|
||
A3AC000
|
unkown
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
A08D000
|
heap
|
page read and write
|
||
362A000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
9E63000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
48698000
|
direct allocation
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
A571000
|
heap
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
517000
|
heap
|
page read and write
|
||
A4C6000
|
heap
|
page read and write
|
||
A6D3000
|
heap
|
page read and write
|
||
7654000
|
unkown
|
page read and write
|
||
9E8E000
|
heap
|
page read and write
|
||
4869C000
|
direct allocation
|
page read and write
|
||
30A0000
|
heap
|
page execute and read and write
|
||
3F97000
|
trusted library allocation
|
page read and write
|
||
F12000
|
heap
|
page read and write
|
||
A3CB000
|
heap
|
page read and write
|
||
C8F000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
B91000
|
trusted library allocation
|
page read and write
|
||
2FC40000
|
direct allocation
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
E35000
|
heap
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
9E59000
|
heap
|
page read and write
|
||
60519000
|
unkown
|
page readonly
|
||
1360000
|
unkown
|
page readonly
|
||
A71E000
|
heap
|
page read and write
|
||
A5A6000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
A822000
|
heap
|
page read and write
|
||
FDA000
|
trusted library allocation
|
page execute and read and write
|
||
340E000
|
stack
|
page read and write
|
||
C625000
|
unkown
|
page read and write
|
||
363A000
|
trusted library allocation
|
page read and write
|
||
138A000
|
trusted library allocation
|
page execute and read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
361E000
|
trusted library allocation
|
page read and write
|
||
3486C000
|
direct allocation
|
page read and write
|
||
9EB5000
|
heap
|
page read and write
|
||
28A0000
|
direct allocation
|
page execute and read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
unkown
|
page read and write
|
||
35FA000
|
trusted library allocation
|
page read and write
|
||
7FF5D76D7000
|
unkown
|
page readonly
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
A6CC000
|
heap
|
page read and write
|
||
F03000
|
heap
|
page read and write
|
||
A65C000
|
heap
|
page read and write
|
||
119C000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
F21000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
A68F000
|
heap
|
page read and write
|
||
2EA1000
|
unkown
|
page read and write
|
||
7FF5D7075000
|
unkown
|
page readonly
|
||
1150000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
35F4000
|
trusted library allocation
|
page read and write
|
||
C0BA000
|
stack
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
9E9C000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
EA4000
|
trusted library allocation
|
page read and write
|
||
363C000
|
trusted library allocation
|
page read and write
|
||
2FC14000
|
direct allocation
|
page read and write
|
||
2717000
|
trusted library allocation
|
page read and write
|
||
260000
|
unkown
|
page readonly
|
||
51E000
|
heap
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
A546000
|
heap
|
page read and write
|
||
5330000
|
unkown
|
page write copy
|
||
4C0000
|
heap
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
7FF5D71EF000
|
unkown
|
page readonly
|
||
E50000
|
heap
|
page read and write
|
||
9EAD000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
17B3000
|
trusted library allocation
|
page execute and read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
3051000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
A14D000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
A6C8000
|
heap
|
page read and write
|
||
7FF5D720F000
|
unkown
|
page readonly
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
9E7D000
|
heap
|
page read and write
|
||
C5EC000
|
unkown
|
page read and write
|
||
8360000
|
unkown
|
page read and write
|
||
A538000
|
heap
|
page read and write
|
||
7FF5D7745000
|
unkown
|
page readonly
|
||
9EAD000
|
heap
|
page read and write
|
||
7FF5D7077000
|
unkown
|
page readonly
|
||
B03B000
|
stack
|
page read and write
|
||
A286000
|
unkown
|
page read and write
|
||
A29D000
|
heap
|
page read and write
|
||
49E4C000
|
direct allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
10AB7000
|
unkown
|
page read and write
|
||
A3AA000
|
unkown
|
page read and write
|
||
F0E000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
A74B000
|
heap
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
7FF5D77EB000
|
unkown
|
page readonly
|
||
9D4D000
|
heap
|
page read and write
|
||
7FF5D7604000
|
unkown
|
page readonly
|
||
7FF5D72C8000
|
unkown
|
page readonly
|
||
10E1000
|
heap
|
page read and write
|
||
7FF5D7691000
|
unkown
|
page readonly
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
41D34000
|
direct allocation
|
page read and write
|
||
A6AE000
|
heap
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
A656000
|
heap
|
page read and write
|
||
55824000
|
direct allocation
|
page read and write
|
||
9E68000
|
heap
|
page read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
C7C6000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
9E87000
|
heap
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
F50000
|
heap
|
page read and write
|
||
F3B000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
A2EB000
|
heap
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
3609000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
7FF5D75F9000
|
unkown
|
page readonly
|
||
51E000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
E82000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
9E33000
|
heap
|
page read and write
|
||
9E67000
|
heap
|
page read and write
|
||
1397000
|
trusted library allocation
|
page execute and read and write
|
||
EAD000
|
trusted library allocation
|
page execute and read and write
|
||
51E000
|
heap
|
page read and write
|
||
B05000
|
heap
|
page read and write
|
||
106A3000
|
unkown
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
35B5000
|
unkown
|
page read and write
|
||
84BB000
|
stack
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
2656000
|
trusted library allocation
|
page read and write
|
||
10ABA000
|
unkown
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
6C6000
|
heap
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
A2F6000
|
heap
|
page read and write
|
||
106A5000
|
unkown
|
page read and write
|
||
A273000
|
heap
|
page read and write
|
||
A754000
|
heap
|
page read and write
|
||
2FCAC000
|
direct allocation
|
page read and write
|
||
F1A000
|
heap
|
page read and write
|
||
3601000
|
trusted library allocation
|
page read and write
|
||
7FF5D7396000
|
unkown
|
page readonly
|
||
60565000
|
unkown
|
page read and write
|
||
12BE000
|
stack
|
page read and write
|
||
362D000
|
unkown
|
page read and write
|
||
9EAF000
|
heap
|
page read and write
|
||
9FD8000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F43000
|
heap
|
page read and write
|
||
77DB000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
7FF5D71C4000
|
unkown
|
page readonly
|
||
49BB000
|
unkown
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
A652000
|
heap
|
page read and write
|
||
9AC3000
|
unkown
|
page read and write
|
||
A2BD000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
BE70000
|
unkown
|
page readonly
|
||
F33000
|
heap
|
page read and write
|
||
7FF5D6BE4000
|
unkown
|
page readonly
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page execute and read and write
|
||
35C3000
|
unkown
|
page read and write
|
||
7FF5D771A000
|
unkown
|
page readonly
|
||
7FF5D7394000
|
unkown
|
page readonly
|
||
139B000
|
trusted library allocation
|
page execute and read and write
|
||
2A80000
|
heap
|
page read and write
|
||
2FC7C000
|
direct allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
F3F000
|
heap
|
page read and write
|
||
7FF5D7272000
|
unkown
|
page readonly
|
||
4A90000
|
unkown
|
page read and write
|
||
A757000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
A4CF000
|
heap
|
page read and write
|
||
3622000
|
trusted library allocation
|
page read and write
|
||
7FF5D7591000
|
unkown
|
page readonly
|
||
363A000
|
trusted library allocation
|
page read and write
|
||
4380000
|
heap
|
page read and write
|
||
3795000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
49EC8000
|
direct allocation
|
page read and write
|
||
35D1000
|
unkown
|
page read and write
|
||
9E97000
|
heap
|
page read and write
|
||
9E8E000
|
heap
|
page read and write
|
||
60556000
|
unkown
|
page read and write
|
||
7FF5D7458000
|
unkown
|
page readonly
|
||
7FF5D72D0000
|
unkown
|
page readonly
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
41CFD000
|
direct allocation
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
34854000
|
direct allocation
|
page read and write
|
||
7FF5D7837000
|
unkown
|
page readonly
|
||
95FB000
|
stack
|
page read and write
|
||
9E91000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
BDA000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
60565000
|
unkown
|
page read and write
|
||
3633000
|
trusted library allocation
|
page read and write
|
||
5463000
|
unkown
|
page read and write
|
||
106A7000
|
unkown
|
page read and write
|
||
7FF5D7485000
|
unkown
|
page readonly
|
||
360A000
|
trusted library allocation
|
page read and write
|
||
9C2D000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
2426000
|
trusted library allocation
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
11F0000
|
unkown
|
page read and write
|
||
54E3000
|
trusted library allocation
|
page read and write
|
||
3661000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
35E2000
|
trusted library allocation
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
35E8000
|
trusted library allocation
|
page read and write
|
||
EA3000
|
trusted library allocation
|
page execute and read and write
|
||
7605000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
AFBE000
|
stack
|
page read and write
|
||
F3B000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
EAC000
|
heap
|
page read and write
|
||
3825000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
9E5E000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
36DA000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
9E8F000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
9A92000
|
unkown
|
page read and write
|
||
A40E000
|
unkown
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
9EB0000
|
heap
|
page read and write
|
||
7FF5D6ABD000
|
unkown
|
page readonly
|
||
3280000
|
unkown
|
page read and write
|
||
A207000
|
heap
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
5416000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
2A28000
|
trusted library allocation
|
page read and write
|
||
9EB1000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
A22B000
|
heap
|
page read and write
|
||
9E2A000
|
heap
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
A843000
|
heap
|
page read and write
|
||
1410000
|
trusted library allocation
|
page execute and read and write
|
||
9CF2000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
10AB000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A319000
|
heap
|
page read and write
|
||
C34000
|
trusted library allocation
|
page read and write
|
||
9E95000
|
heap
|
page read and write
|
||
8510000
|
unkown
|
page read and write
|
||
7FF5D76C8000
|
unkown
|
page readonly
|
||
4AB0000
|
unkown
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
BE90000
|
unkown
|
page read and write
|
||
F27000
|
heap
|
page read and write
|
||
7FF5CE33D000
|
unkown
|
page readonly
|
||
9E88000
|
heap
|
page read and write
|
||
7FF5D74F2000
|
unkown
|
page readonly
|
||
9E29000
|
heap
|
page read and write
|
||
F36000
|
heap
|
page read and write
|
||
A010000
|
heap
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
39F7000
|
trusted library allocation
|
page read and write
|
||
F36000
|
heap
|
page read and write
|
||
106AF000
|
unkown
|
page read and write
|
||
3849000
|
trusted library allocation
|
page read and write
|
||
A2BB000
|
heap
|
page read and write
|
||
A5AA000
|
heap
|
page read and write
|
||
7FF5D7385000
|
unkown
|
page readonly
|
||
41CD0000
|
direct allocation
|
page read and write
|
||
A3DF000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F0C000
|
heap
|
page read and write
|
||
175F000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
41C8C000
|
direct allocation
|
page read and write
|
||
7FF5D6A4B000
|
unkown
|
page readonly
|
||
7FF5D7065000
|
unkown
|
page readonly
|
||
48674000
|
direct allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
942E000
|
stack
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
35FA000
|
trusted library allocation
|
page read and write
|
||
363A000
|
trusted library allocation
|
page read and write
|
||
B96000
|
trusted library allocation
|
page execute and read and write
|
||
9E89000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
E6A000
|
heap
|
page read and write
|
||
10AB9000
|
unkown
|
page read and write
|
||
A7B5000
|
heap
|
page read and write
|
||
5426000
|
unkown
|
page readonly
|
||
A4EF000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
2FD0000
|
remote allocation
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
A2B5000
|
unkown
|
page read and write
|
||
2AC7000
|
trusted library allocation
|
page read and write
|
||
F33000
|
heap
|
page read and write
|
||
3663000
|
trusted library allocation
|
page read and write
|
||
1281000
|
unkown
|
page readonly
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
3606000
|
trusted library allocation
|
page read and write
|
||
1AE000
|
stack
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7FF5D764F000
|
unkown
|
page readonly
|
||
A84E000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
94AB000
|
stack
|
page read and write
|
||
7FF5D77C2000
|
unkown
|
page readonly
|
||
5587C000
|
direct allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
41CE0000
|
direct allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
10002000
|
unkown
|
page readonly
|
||
517000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A316000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
2FC50000
|
direct allocation
|
page read and write
|
||
A7F0000
|
heap
|
page read and write
|
||
8510000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
B80000
|
trusted library allocation
|
page execute and read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
35F3000
|
trusted library allocation
|
page read and write
|
||
541E000
|
trusted library allocation
|
page read and write
|
||
F42000
|
heap
|
page read and write
|
||
A28D000
|
unkown
|
page read and write
|
||
F07000
|
heap
|
page read and write
|
||
2FC38000
|
direct allocation
|
page read and write
|
||
23E4000
|
trusted library allocation
|
page read and write
|
||
843F000
|
stack
|
page read and write
|
||
1731000
|
unkown
|
page readonly
|
||
FB4000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
BDE000
|
heap
|
page read and write
|
||
A3AD000
|
heap
|
page read and write
|
||
27AC000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
9E65000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
7FF5D71D7000
|
unkown
|
page readonly
|
||
B4A000
|
trusted library allocation
|
page execute and read and write
|
||
361E000
|
trusted library allocation
|
page read and write
|
||
E92000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
A573000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
2390000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
7FF5D71AF000
|
unkown
|
page readonly
|
||
35E8000
|
trusted library allocation
|
page read and write
|
||
A313000
|
unkown
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
2FD5000
|
heap
|
page read and write
|
||
9FAF000
|
stack
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
365B000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
7FF5D738E000
|
unkown
|
page readonly
|
||
7FF5D72DF000
|
unkown
|
page readonly
|
||
A561000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
F3F000
|
heap
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
E00000
|
unkown
|
page readonly
|
||
1340000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
362A000
|
unkown
|
page read and write
|
||
A7D0000
|
heap
|
page read and write
|
||
2F65000
|
trusted library allocation
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
9E6F000
|
heap
|
page read and write
|
||
28E4000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
2791000
|
heap
|
page execute and read and write
|
||
8500000
|
unkown
|
page read and write
|
||
9C20000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
4A71000
|
unkown
|
page read and write
|
||
33B0000
|
unkown
|
page readonly
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
A482000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
9E36000
|
heap
|
page read and write
|
||
9E9C000
|
heap
|
page read and write
|
||
9EB6000
|
heap
|
page read and write
|
||
218E000
|
stack
|
page read and write
|
||
51EB000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
F55000
|
heap
|
page read and write
|
||
A416000
|
unkown
|
page read and write
|
||
B52000
|
trusted library allocation
|
page read and write
|
||
10ABE000
|
unkown
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
A5AC000
|
heap
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
A7E4000
|
heap
|
page read and write
|
||
A5DD000
|
heap
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
2460000
|
heap
|
page execute and read and write
|
||
25FE000
|
stack
|
page read and write
|
||
4A44000
|
unkown
|
page read and write
|
||
15D7000
|
heap
|
page read and write
|
||
9E98000
|
heap
|
page read and write
|
||
7FF5D7376000
|
unkown
|
page readonly
|
||
E98000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
7B00000
|
unkown
|
page readonly
|
||
B220000
|
unkown
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
F170000
|
heap
|
page read and write
|
||
23D0000
|
heap
|
page execute and read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
62521000
|
unkown
|
page execute read
|
||
51E000
|
heap
|
page read and write
|
||
7FF5D7722000
|
unkown
|
page readonly
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
1043000
|
trusted library allocation
|
page execute and read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
4A5000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
C653000
|
unkown
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
8C39000
|
stack
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
39F0000
|
trusted library allocation
|
page read and write
|
||
1877000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
9CFB000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
7FF5D719C000
|
unkown
|
page readonly
|
||
7FF5D7593000
|
unkown
|
page readonly
|
||
7FF5D770F000
|
unkown
|
page readonly
|
||
35D1000
|
trusted library allocation
|
page read and write
|
||
35FA000
|
trusted library allocation
|
page read and write
|
||
5582C000
|
direct allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
B85A000
|
stack
|
page read and write
|
||
9EAB000
|
heap
|
page read and write
|
||
A20E000
|
heap
|
page read and write
|
||
A859000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
A298000
|
heap
|
page read and write
|
||
A480000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
500000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
direct allocation
|
page execute and read and write
|
||
9E8A000
|
heap
|
page read and write
|
||
1138000
|
heap
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
A785000
|
heap
|
page read and write
|
||
5490000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
106A2000
|
unkown
|
page read and write
|
||
360D000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
25BE000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
B8D000
|
trusted library allocation
|
page execute and read and write
|
||
F2E000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
53E1000
|
unkown
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
7FF5D747F000
|
unkown
|
page readonly
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
7FF5D77F0000
|
unkown
|
page readonly
|
||
2708000
|
unkown
|
page readonly
|
||
51E000
|
heap
|
page read and write
|
||
366C000
|
stack
|
page read and write
|
||
23B0000
|
trusted library allocation
|
page read and write
|
||
9E62000
|
heap
|
page read and write
|
||
E92C000
|
stack
|
page read and write
|
||
9E9D000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
F1E000
|
heap
|
page read and write
|
||
A862000
|
heap
|
page read and write
|
||
94F4000
|
unkown
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
1000000
|
heap
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
7FF5D76F5000
|
unkown
|
page readonly
|
||
258F000
|
stack
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
2455000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
99B9000
|
unkown
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
35B3000
|
unkown
|
page read and write
|
||
F55000
|
heap
|
page read and write
|
||
AAA7000
|
unkown
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
7FF5D745B000
|
unkown
|
page readonly
|
||
542E000
|
trusted library allocation
|
page read and write
|
||
A046000
|
heap
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
49A8000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
102F000
|
stack
|
page read and write
|
||
1220000
|
trusted library allocation
|
page execute and read and write
|
||
8500000
|
unkown
|
page read and write
|
||
BD7000
|
heap
|
page read and write
|
||
39F1000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
F33000
|
heap
|
page read and write
|
||
A3F2000
|
heap
|
page read and write
|
||
1169000
|
heap
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
9E28000
|
heap
|
page read and write
|
||
9E9C000
|
heap
|
page read and write
|
||
5445000
|
trusted library allocation
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
EB6000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
A06C000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
A82B000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
A67B000
|
heap
|
page read and write
|
||
60562000
|
unkown
|
page read and write
|
||
A7F6000
|
heap
|
page read and write
|
||
10ED000
|
trusted library allocation
|
page execute and read and write
|
||
118F000
|
stack
|
page read and write
|
||
A5C8000
|
heap
|
page read and write
|
||
9FD0000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
A368000
|
heap
|
page read and write
|
||
4260000
|
unclassified section
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
9AB2000
|
unkown
|
page read and write
|
||
BA5000
|
trusted library allocation
|
page execute and read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3622000
|
trusted library allocation
|
page read and write
|
||
4860C000
|
direct allocation
|
page read and write
|
||
48634000
|
direct allocation
|
page read and write
|
||
84C7000
|
unkown
|
page read and write
|
||
AA40000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
35DD000
|
trusted library allocation
|
page read and write
|
||
C62000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
A215000
|
heap
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
C44F000
|
stack
|
page read and write
|
||
D1F000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
F39000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
CBC000
|
heap
|
page read and write
|
||
7FF5D77C7000
|
unkown
|
page readonly
|
||
A9A0000
|
unkown
|
page read and write
|
||
3F91000
|
trusted library allocation
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
7FF5D7422000
|
unkown
|
page readonly
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
51E000
|
heap
|
page read and write
|
||
3471000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7B20000
|
unkown
|
page read and write
|
||
AA9E000
|
unkown
|
page read and write
|
||
4A12000
|
unkown
|
page read and write
|
||
5414000
|
trusted library allocation
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
A0C3000
|
heap
|
page read and write
|
||
A288000
|
heap
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
9E2E000
|
stack
|
page read and write
|
||
9E32000
|
heap
|
page read and write
|
||
A27D000
|
heap
|
page read and write
|
||
F37000
|
heap
|
page read and write
|
||
2A56000
|
trusted library allocation
|
page read and write
|
||
3797000
|
trusted library allocation
|
page read and write
|
||
17E7000
|
trusted library allocation
|
page execute and read and write
|
||
460000
|
heap
|
page read and write
|
||
9F93000
|
heap
|
page read and write
|
||
9EB8000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
A535000
|
heap
|
page read and write
|
||
6EA000
|
heap
|
page read and write
|
||
A6A1000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
A219000
|
heap
|
page read and write
|
||
35BD000
|
unkown
|
page read and write
|
||
7FF5D69BB000
|
unkown
|
page readonly
|
||
3110000
|
unkown
|
page readonly
|
||
2E80000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
1DB000
|
unkown
|
page execute and read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
7FF5D7558000
|
unkown
|
page readonly
|
||
2956000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
9E38000
|
heap
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
7FF5D7244000
|
unkown
|
page readonly
|
||
7DF4F24A1000
|
unkown
|
page execute read
|
||
8500000
|
unkown
|
page read and write
|
||
2710000
|
trusted library allocation
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
9FBB000
|
heap
|
page read and write
|
||
34840000
|
direct allocation
|
page read and write
|
||
7FF5D7705000
|
unkown
|
page readonly
|
||
106A1000
|
unkown
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
9EA0000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
F44000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
7989000
|
stack
|
page read and write
|
||
3625000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
BEA0000
|
unkown
|
page readonly
|
||
A15A000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
10FD000
|
trusted library allocation
|
page execute and read and write
|
||
CBB000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
4D4F000
|
stack
|
page read and write
|
||
9E97000
|
heap
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
3630000
|
trusted library allocation
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
63921000
|
unkown
|
page execute read
|
||
9FE1000
|
heap
|
page read and write
|
||
FB3000
|
trusted library allocation
|
page execute and read and write
|
||
8500000
|
unkown
|
page read and write
|
||
760D000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
A53B000
|
heap
|
page read and write
|
||
A854000
|
heap
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
418000
|
unkown
|
page readonly
|
||
9E97000
|
heap
|
page read and write
|
||
7FF5D7429000
|
unkown
|
page readonly
|
||
A168000
|
heap
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
A2FB000
|
heap
|
page read and write
|
||
A15D000
|
heap
|
page read and write
|
||
3D9D000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
9E68000
|
heap
|
page read and write
|
||
A56B000
|
heap
|
page read and write
|
||
A565000
|
heap
|
page read and write
|
||
A26B000
|
heap
|
page read and write
|
||
9F8E000
|
heap
|
page read and write
|
||
7FF5D765F000
|
unkown
|
page readonly
|
||
9E85000
|
heap
|
page read and write
|
||
A3AA000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
10AB3000
|
unkown
|
page read and write
|
||
7FF5D7284000
|
unkown
|
page readonly
|
||
12C1000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
7FF5D7700000
|
unkown
|
page readonly
|
||
9AAC000
|
unkown
|
page read and write
|
||
1411000
|
trusted library allocation
|
page read and write
|
||
55878000
|
direct allocation
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
106AD000
|
unkown
|
page read and write
|
||
101A9000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
17E2000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
unkown
|
page readonly
|
||
51E000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
1421000
|
trusted library allocation
|
page read and write
|
||
112F000
|
unkown
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
242E000
|
trusted library allocation
|
page read and write
|
||
7FF5D71EA000
|
unkown
|
page readonly
|
||
7CF000
|
stack
|
page read and write
|
||
A2DF000
|
heap
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
10E3000
|
trusted library allocation
|
page execute and read and write
|
||
517000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
F03000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7C31000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
7FF5D71A6000
|
unkown
|
page readonly
|
||
A4F2000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
C78000
|
heap
|
page read and write
|
||
9E8B000
|
heap
|
page read and write
|
||
C663000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
7FF5D71CC000
|
unkown
|
page readonly
|
||
1364000
|
trusted library allocation
|
page read and write
|
||
9E90000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
6CA000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
3619000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3EFB000
|
trusted library allocation
|
page read and write
|
||
35E5000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
51E000
|
heap
|
page read and write
|
||
2FC4C000
|
direct allocation
|
page read and write
|
||
4460000
|
heap
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
C17000
|
heap
|
page read and write
|
||
35DF000
|
trusted library allocation
|
page read and write
|
||
1850000
|
trusted library allocation
|
page execute and read and write
|
||
3633000
|
trusted library allocation
|
page read and write
|
||
17BD000
|
trusted library allocation
|
page execute and read and write
|
||
DCF000
|
stack
|
page read and write
|
||
7FF5D75F6000
|
unkown
|
page readonly
|
||
592E000
|
stack
|
page read and write
|
||
A2D7000
|
unkown
|
page read and write
|
||
A347000
|
heap
|
page read and write
|
||
A75A000
|
heap
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A4B6000
|
heap
|
page read and write
|
||
A78E000
|
heap
|
page read and write
|
||
AC88000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
48620000
|
direct allocation
|
page read and write
|
||
15BF000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
10AB3000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
AA92000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
A61A000
|
heap
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
A2D8000
|
heap
|
page read and write
|
||
C67000
|
trusted library allocation
|
page execute and read and write
|
||
8500000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A3EC000
|
heap
|
page read and write
|
||
9A8C000
|
unkown
|
page read and write
|
||
10154000
|
unkown
|
page read and write
|
||
4A0E000
|
unkown
|
page read and write
|
||
BB6000
|
stack
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
7FF5D7820000
|
unkown
|
page readonly
|
||
F03000
|
heap
|
page read and write
|
||
A4C2000
|
heap
|
page read and write
|
||
A3F4000
|
heap
|
page read and write
|
||
96E6000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
7FF5D7267000
|
unkown
|
page readonly
|
||
1430000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
48F5000
|
trusted library allocation
|
page read and write
|
||
A52D000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
356C000
|
stack
|
page read and write
|
||
3BB1000
|
trusted library allocation
|
page read and write
|
||
9C10000
|
heap
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
75E0000
|
unkown
|
page read and write
|
||
7FF5D71E6000
|
unkown
|
page readonly
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
4450000
|
heap
|
page read and write
|
||
3711000
|
trusted library allocation
|
page read and write
|
||
A72D000
|
heap
|
page read and write
|
||
35DC000
|
trusted library allocation
|
page read and write
|
||
9F90000
|
heap
|
page read and write
|
||
2430000
|
trusted library allocation
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
E82E000
|
stack
|
page read and write
|
||
9E85000
|
heap
|
page read and write
|
||
A3B9000
|
unkown
|
page read and write
|
||
51E4000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
3603000
|
trusted library allocation
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
9E6F000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
EAC000
|
heap
|
page read and write
|
||
FD6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D75B8000
|
unkown
|
page readonly
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
7FF5D71BF000
|
unkown
|
page readonly
|
||
893D000
|
unkown
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
3619000
|
trusted library allocation
|
page read and write
|
||
66B21000
|
unkown
|
page execute read
|
||
8500000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
9D55000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
BCB000
|
heap
|
page read and write
|
||
9E25000
|
heap
|
page read and write
|
||
35DC000
|
unkown
|
page read and write
|
||
9DAE000
|
heap
|
page read and write
|
||
4E01000
|
trusted library allocation
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
A51D000
|
heap
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
9E5B000
|
heap
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
E37000
|
heap
|
page read and write
|
||
A71C000
|
heap
|
page read and write
|
||
5AD000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
15FD000
|
heap
|
page read and write
|
||
A295000
|
heap
|
page read and write
|
||
7FF5D781A000
|
unkown
|
page readonly
|
||
60554000
|
unkown
|
page write copy
|
||
F172000
|
heap
|
page read and write
|
||
106A5000
|
unkown
|
page read and write
|
||
A73E000
|
heap
|
page read and write
|
||
7AC0000
|
unkown
|
page read and write
|
||
363A000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
9EA3000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F37000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
F36000
|
heap
|
page read and write
|
||
10294000
|
unkown
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
A2AF000
|
heap
|
page read and write
|
||
10AB2000
|
unkown
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
A6D1000
|
heap
|
page read and write
|
||
9E90000
|
heap
|
page read and write
|
||
9FFF000
|
heap
|
page read and write
|
||
28CA000
|
heap
|
page read and write
|
||
A391000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
F1FC000
|
stack
|
page read and write
|
||
9C40000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A1AF000
|
stack
|
page read and write
|
||
9E90000
|
heap
|
page read and write
|
||
3641000
|
trusted library allocation
|
page read and write
|
||
A251000
|
unkown
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
85BE000
|
stack
|
page read and write
|
||
6CD000
|
trusted library allocation
|
page execute and read and write
|
||
35EA000
|
trusted library allocation
|
page read and write
|
||
55868000
|
direct allocation
|
page read and write
|
||
9E78000
|
heap
|
page read and write
|
||
A5D0000
|
heap
|
page read and write
|
||
9EB0000
|
heap
|
page read and write
|
||
A640000
|
heap
|
page read and write
|
||
7FF5D748C000
|
unkown
|
page readonly
|
||
8500000
|
unkown
|
page read and write
|
||
593F000
|
trusted library allocation
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
2750000
|
trusted library allocation
|
page read and write
|
||
9EA2000
|
heap
|
page read and write
|
||
A59F000
|
heap
|
page read and write
|
||
62F21000
|
unkown
|
page execute read
|
||
9E64000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
B0BD000
|
stack
|
page read and write
|
||
27BD000
|
stack
|
page read and write
|
||
17B4000
|
trusted library allocation
|
page read and write
|
||
9A9E000
|
unkown
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
64B000
|
trusted library allocation
|
page execute and read and write
|
||
9E4C000
|
heap
|
page read and write
|
||
A52A000
|
heap
|
page read and write
|
||
9C31000
|
heap
|
page read and write
|
||
41C78000
|
direct allocation
|
page read and write
|
||
F27000
|
heap
|
page read and write
|
||
2A1E000
|
trusted library allocation
|
page read and write
|
||
348BC000
|
direct allocation
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
7FF5D75AF000
|
unkown
|
page readonly
|
||
A77B000
|
heap
|
page read and write
|
||
BA7000
|
trusted library allocation
|
page execute and read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
17B000
|
stack
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
C460000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
9E23000
|
heap
|
page read and write
|
||
7FF5D7546000
|
unkown
|
page readonly
|
||
8A00000
|
unkown
|
page read and write
|
||
A9E9000
|
unkown
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
28D0000
|
direct allocation
|
page read and write
|
||
12E0000
|
heap
|
page execute and read and write
|
||
F27000
|
heap
|
page read and write
|
||
3140000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
9E9C000
|
heap
|
page read and write
|
||
10192000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7FF5D7482000
|
unkown
|
page readonly
|
||
60441000
|
unkown
|
page execute read
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
C05000
|
heap
|
page read and write
|
||
F32000
|
heap
|
page read and write
|
||
35EC000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
A7A7000
|
heap
|
page read and write
|
||
7FF5D729E000
|
unkown
|
page readonly
|
||
2ABF000
|
stack
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
7B10000
|
unkown
|
page read and write
|
||
A721000
|
heap
|
page read and write
|
||
7FF5D7648000
|
unkown
|
page readonly
|
||
D98000
|
heap
|
page read and write
|
||
3660000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
34801000
|
direct allocation
|
page read and write
|
||
2A2E000
|
trusted library allocation
|
page read and write
|
||
2A98000
|
trusted library allocation
|
page read and write
|
||
525A000
|
trusted library allocation
|
page read and write
|
||
7FF5D76AF000
|
unkown
|
page readonly
|
||
9E29000
|
heap
|
page read and write
|
||
2FCB0000
|
direct allocation
|
page read and write
|
||
A504000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
41B000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
A610000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
35F5000
|
trusted library allocation
|
page read and write
|
||
B4D0000
|
unkown
|
page readonly
|
||
A384000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
7B60000
|
unkown
|
page readonly
|
||
9E89000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
7FF5D75D6000
|
unkown
|
page readonly
|
||
87B0000
|
unkown
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
9E83000
|
heap
|
page read and write
|
||
4986000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
9E20000
|
heap
|
page read and write
|
||
761E000
|
unkown
|
page read and write
|
||
7FF5D74C3000
|
unkown
|
page readonly
|
||
9CF000
|
stack
|
page read and write
|
||
7FF5D779E000
|
unkown
|
page readonly
|
||
3608000
|
trusted library allocation
|
page read and write
|
||
EB3B000
|
unkown
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
4340000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
A392000
|
heap
|
page read and write
|
||
9E99000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
A57E000
|
heap
|
page read and write
|
||
363A000
|
trusted library allocation
|
page read and write
|
||
2C4D000
|
stack
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
9EB0000
|
unkown
|
page readonly
|
||
6E0000
|
heap
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
A871000
|
heap
|
page read and write
|
||
7FF5D7309000
|
unkown
|
page readonly
|
||
60440000
|
unkown
|
page readonly
|
||
A308000
|
heap
|
page read and write
|
||
9E69000
|
heap
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
5860000
|
unkown
|
page readonly
|
||
9DE5000
|
heap
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
1DA000
|
unkown
|
page read and write
|
||
3613000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
7FF5D7643000
|
unkown
|
page readonly
|
||
41CF0000
|
direct allocation
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
A03A000
|
heap
|
page read and write
|
||
4EE000
|
stack
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
unkown
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
10AB9000
|
unkown
|
page read and write
|
||
6597000
|
unkown
|
page readonly
|
||
3607000
|
trusted library allocation
|
page read and write
|
||
3630000
|
unkown
|
page readonly
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
4AF0000
|
heap
|
page execute and read and write
|
||
9E99000
|
heap
|
page read and write
|
||
6CB000
|
heap
|
page read and write
|
||
A18A000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
9E60000
|
heap
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
7FF5D77E3000
|
unkown
|
page readonly
|
||
517000
|
heap
|
page read and write
|
||
EB5000
|
stack
|
page read and write
|
||
3660000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
A312000
|
heap
|
page read and write
|
||
60562000
|
unkown
|
page read and write
|
||
348D0000
|
direct allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
98FD000
|
stack
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3617000
|
trusted library allocation
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
A808000
|
heap
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
10ABC000
|
unkown
|
page read and write
|
||
9CE5000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
A7BE000
|
heap
|
page read and write
|
||
7AB0000
|
unkown
|
page read and write
|
||
6E58000
|
unkown
|
page readonly
|
||
51FE000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
A237000
|
unkown
|
page read and write
|
||
7FF5D7442000
|
unkown
|
page readonly
|
||
87B0000
|
unkown
|
page read and write
|
||
9E2C000
|
heap
|
page read and write
|
||
4868C000
|
direct allocation
|
page read and write
|
||
9CA6000
|
heap
|
page read and write
|
||
34844000
|
direct allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
A5CE000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
49FD000
|
unkown
|
page read and write
|
||
3626000
|
unkown
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
A156000
|
heap
|
page read and write
|
||
A697000
|
heap
|
page read and write
|
||
2F6A000
|
trusted library allocation
|
page read and write
|
||
F43000
|
heap
|
page read and write
|
||
A738000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
EE1000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7FF5D77F7000
|
unkown
|
page readonly
|
||
7FF5D7407000
|
unkown
|
page readonly
|
||
7FF5D74B8000
|
unkown
|
page readonly
|
||
2E80000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
9EAC000
|
heap
|
page read and write
|
||
7FF5D7797000
|
unkown
|
page readonly
|
||
348A4000
|
direct allocation
|
page read and write
|
||
A48F000
|
heap
|
page read and write
|
||
3617000
|
trusted library allocation
|
page read and write
|
||
2FD1000
|
heap
|
page read and write
|
||
7FF5D71DA000
|
unkown
|
page readonly
|
||
C65E000
|
unkown
|
page read and write
|
||
A833000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
9E6D000
|
heap
|
page read and write
|
||
9EAE000
|
stack
|
page read and write
|
||
7460000
|
unkown
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
248E000
|
stack
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
A668000
|
heap
|
page read and write
|
||
35D1000
|
trusted library allocation
|
page read and write
|
||
99C0000
|
unkown
|
page read and write
|
||
49EB0000
|
direct allocation
|
page read and write
|
||
48630000
|
direct allocation
|
page read and write
|
||
2640000
|
heap
|
page execute and read and write
|
||
9E9D000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
10ABE000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
106AA000
|
unkown
|
page read and write
|
||
50CD000
|
stack
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
2E51000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
B559000
|
stack
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
A63A000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
8520000
|
unkown
|
page read and write
|
||
A5E5000
|
heap
|
page read and write
|
||
A330000
|
heap
|
page read and write
|
||
3520000
|
unkown
|
page readonly
|
||
1150000
|
unkown
|
page read and write
|
||
7FF5D776D000
|
unkown
|
page readonly
|
||
7810000
|
unkown
|
page read and write
|
||
A0C2000
|
heap
|
page read and write
|
||
7435000
|
stack
|
page read and write
|
||
17E0000
|
trusted library allocation
|
page read and write
|
||
1800000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
9CF0000
|
heap
|
page read and write
|
||
106A7000
|
unkown
|
page read and write
|
||
4A16000
|
unkown
|
page read and write
|
||
A69A000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
7FF5D77DA000
|
unkown
|
page readonly
|
||
278E000
|
stack
|
page read and write
|
||
2E3C000
|
stack
|
page read and write
|
||
5320000
|
heap
|
page execute and read and write
|
||
99BD000
|
unkown
|
page read and write
|
||
1417000
|
trusted library allocation
|
page read and write
|
||
7693000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
3602000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
A82F000
|
heap
|
page read and write
|
||
7FF5D7455000
|
unkown
|
page readonly
|
||
A238000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
C800000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
9E20000
|
heap
|
page read and write
|
||
36E0000
|
trusted library allocation
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
111B000
|
trusted library allocation
|
page execute and read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
7FF5D7507000
|
unkown
|
page readonly
|
||
EB32000
|
unkown
|
page read and write
|
||
7FF5D75A6000
|
unkown
|
page readonly
|
||
EF0000
|
heap
|
page read and write
|
||
9E6D000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
F36000
|
heap
|
page read and write
|
||
3661000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
11A6000
|
stack
|
page read and write
|
||
7FF5D7404000
|
unkown
|
page readonly
|
||
4A2E000
|
stack
|
page read and write
|
||
10AB3000
|
unkown
|
page read and write
|
||
A320000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
7FF5D744E000
|
unkown
|
page readonly
|
||
1D0000
|
heap
|
page read and write
|
||
9A84000
|
unkown
|
page read and write
|
||
486E0000
|
direct allocation
|
page read and write
|
||
A211000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
1112000
|
trusted library allocation
|
page read and write
|
||
C61B000
|
unkown
|
page read and write
|
||
179F000
|
stack
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
595000
|
unkown
|
page execute read
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
A1CC000
|
heap
|
page read and write
|
||
55801000
|
direct allocation
|
page read and write
|
||
A632000
|
heap
|
page read and write
|
||
A790000
|
heap
|
page read and write
|
||
C73E000
|
unkown
|
page read and write
|
||
1160000
|
unkown
|
page read and write
|
||
A85C000
|
heap
|
page read and write
|
||
110A000
|
trusted library allocation
|
page execute and read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A264000
|
unkown
|
page read and write
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
A53D000
|
heap
|
page read and write
|
||
1154000
|
heap
|
page read and write
|
||
7FF5D7230000
|
unkown
|
page readonly
|
||
87B0000
|
unkown
|
page read and write
|
||
2720000
|
trusted library allocation
|
page read and write
|
||
5255000
|
trusted library allocation
|
page read and write
|
||
C78A000
|
unkown
|
page read and write
|
||
7FF5D6BEF000
|
unkown
|
page readonly
|
||
4DA0000
|
heap
|
page execute and read and write
|
||
51E000
|
heap
|
page read and write
|
||
F42000
|
heap
|
page read and write
|
||
C450000
|
unkown
|
page read and write
|
||
49E7C000
|
direct allocation
|
page read and write
|
||
7FF5D770A000
|
unkown
|
page readonly
|
||
7FF5D77FD000
|
unkown
|
page readonly
|
||
3603000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
41C6C000
|
direct allocation
|
page read and write
|
||
106AF000
|
unkown
|
page read and write
|
||
9D3D000
|
heap
|
page read and write
|
||
151000
|
unkown
|
page execute read
|
||
517000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
3618000
|
trusted library allocation
|
page read and write
|
||
9E92000
|
heap
|
page read and write
|
||
3611000
|
trusted library allocation
|
page read and write
|
||
779E000
|
unkown
|
page read and write
|
||
361E000
|
trusted library allocation
|
page read and write
|
||
A220000
|
unkown
|
page read and write
|
||
C615000
|
unkown
|
page read and write
|
||
A233000
|
unkown
|
page read and write
|
||
7FF5D71C8000
|
unkown
|
page readonly
|
||
E10000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
C9D1000
|
unkown
|
page read and write
|
||
1656000
|
heap
|
page read and write
|
||
48684000
|
direct allocation
|
page read and write
|
||
8520000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
7DF4F2491000
|
unkown
|
page execute read
|
||
1087000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
242B000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
106A7000
|
unkown
|
page read and write
|
||
3633000
|
trusted library allocation
|
page read and write
|
||
71F0000
|
unkown
|
page readonly
|
||
41C60000
|
direct allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
6056E000
|
unkown
|
page readonly
|
||
486A8000
|
direct allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
A2D1000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
A6D6000
|
heap
|
page read and write
|
||
F03000
|
heap
|
page read and write
|
||
BB0D000
|
stack
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
C81C000
|
unkown
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
9A76000
|
unkown
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
106AF000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
B05D000
|
heap
|
page read and write
|
||
9E81000
|
heap
|
page read and write
|
||
A5F7000
|
heap
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
7FF5D77A4000
|
unkown
|
page readonly
|
||
7FF5D77D2000
|
unkown
|
page readonly
|
||
7FF5D72BD000
|
unkown
|
page readonly
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
A48B000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
A568000
|
heap
|
page read and write
|
||
2A6F000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
A425000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
96FE000
|
stack
|
page read and write
|
||
33D0000
|
remote allocation
|
page read and write
|
||
F33000
|
heap
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
35EF000
|
trusted library allocation
|
page read and write
|
||
9E8D000
|
heap
|
page read and write
|
||
9E9E000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
A0BA000
|
heap
|
page read and write
|
||
28CE000
|
heap
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
C669000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
EB3C000
|
unkown
|
page read and write
|
||
9C35000
|
heap
|
page read and write
|
||
A62F000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
D5E000
|
heap
|
page read and write
|
||
9E83000
|
heap
|
page read and write
|
||
42C0000
|
heap
|
page read and write
|
||
9D03000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
9E29000
|
heap
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
279F000
|
heap
|
page read and write
|
||
9A72000
|
unkown
|
page read and write
|
||
35B0000
|
unkown
|
page read and write
|
||
A36E000
|
heap
|
page read and write
|
||
9E78000
|
heap
|
page read and write
|
||
486C0000
|
direct allocation
|
page read and write
|
||
3160000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
1350000
|
unkown
|
page readonly
|
||
A224000
|
heap
|
page read and write
|
||
A04A000
|
heap
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
7FF5D7336000
|
unkown
|
page readonly
|
||
51E000
|
heap
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
C9CB000
|
unkown
|
page read and write
|
||
4D8A000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
A38E000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
A5F5000
|
heap
|
page read and write
|
||
111B000
|
heap
|
page read and write
|
||
2FC24000
|
direct allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
2910000
|
heap
|
page execute and read and write
|
||
3619000
|
trusted library allocation
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
9AA8000
|
unkown
|
page read and write
|
||
C20000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
51E000
|
heap
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
C621000
|
unkown
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
A3FA000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
21AB000
|
trusted library allocation
|
page execute and read and write
|
||
8500000
|
unkown
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
7C80000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
243E000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
2387000
|
trusted library allocation
|
page read and write
|
||
E6E000
|
heap
|
page read and write
|
||
A325000
|
heap
|
page read and write
|
||
7FF5D75FF000
|
unkown
|
page readonly
|
||
F54000
|
heap
|
page read and write
|
||
35D5000
|
trusted library allocation
|
page read and write
|
||
9E97000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
B054000
|
heap
|
page read and write
|
||
53E2000
|
unkown
|
page readonly
|
||
BD0000
|
heap
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
A2B3000
|
heap
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
2A73000
|
trusted library allocation
|
page read and write
|
||
9E8A000
|
heap
|
page read and write
|
||
3489000
|
stack
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
C642000
|
unkown
|
page read and write
|
||
87E0000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
7FF5D7073000
|
unkown
|
page readonly
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
37B9000
|
trusted library allocation
|
page read and write
|
||
2A12000
|
trusted library allocation
|
page read and write
|
||
A648000
|
heap
|
page read and write
|
||
525C000
|
trusted library allocation
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
A597000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
20E0000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
4F6000
|
stack
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
8F6000
|
stack
|
page read and write
|
||
87B0000
|
unkown
|
page read and write
|
||
A17C000
|
heap
|
page read and write
|
||
10D71000
|
unkown
|
page read and write
|
||
4D8C000
|
trusted library allocation
|
page read and write
|
||
5EF0000
|
unkown
|
page readonly
|
||
1034D000
|
stack
|
page read and write
|
||
F17A000
|
heap
|
page read and write
|
||
7FF5D7694000
|
unkown
|
page readonly
|
||
11E8000
|
stack
|
page read and write
|
||
48601000
|
direct allocation
|
page read and write
|
||
C47F000
|
unkown
|
page read and write
|
||
96C000
|
stack
|
page read and write
|
||
35E8000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
EB3F000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
595000
|
unkown
|
page execute read
|
||
9E2C000
|
heap
|
page read and write
|
||
A2DC000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
642000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
A273000
|
unkown
|
page read and write
|
||
8510000
|
unkown
|
page read and write
|
||
35CD000
|
unkown
|
page read and write
|
||
536000
|
trusted library allocation
|
page execute and read and write
|
||
56AE000
|
stack
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A080000
|
heap
|
page read and write
|
||
2A7D000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
AA04000
|
unkown
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
7FF5D705D000
|
unkown
|
page readonly
|
||
35DA000
|
trusted library allocation
|
page read and write
|
||
9E91000
|
heap
|
page read and write
|
||
BBF000
|
heap
|
page read and write
|
||
A016000
|
heap
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
A3D9000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
A39C000
|
unkown
|
page read and write
|
||
C5FD000
|
unkown
|
page read and write
|
||
2E80000
|
unkown
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
B9A000
|
trusted library allocation
|
page execute and read and write
|
||
A525000
|
heap
|
page read and write
|
||
E6AC000
|
stack
|
page read and write
|
||
49E88000
|
direct allocation
|
page read and write
|
||
3659000
|
trusted library allocation
|
page read and write
|
||
360A000
|
trusted library allocation
|
page read and write
|
||
35F2000
|
trusted library allocation
|
page read and write
|
||
9E64000
|
heap
|
page read and write
|
||
A02E000
|
stack
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
55840000
|
direct allocation
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
273F000
|
heap
|
page read and write
|
||
15CB000
|
heap
|
page read and write
|
||
B92000
|
trusted library allocation
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
4867C000
|
direct allocation
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
7FF5D7703000
|
unkown
|
page readonly
|
||
9E2D000
|
heap
|
page read and write
|
||
ECB000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
5313000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
3781000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
35D1000
|
trusted library allocation
|
page read and write
|
||
7E60000
|
unkown
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
9EB0000
|
heap
|
page read and write
|
||
A33F000
|
unkown
|
page read and write
|
||
8510000
|
unkown
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
FE2000
|
trusted library allocation
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
51E000
|
heap
|
page read and write
|
||
8948000
|
unkown
|
page read and write
|
||
2954000
|
trusted library allocation
|
page read and write
|
||
34860000
|
direct allocation
|
page read and write
|
||
23C0000
|
trusted library allocation
|
page execute and read and write
|
||
A551000
|
heap
|
page read and write
|
||
9E9B000
|
heap
|
page read and write
|
||
9A6A000
|
unkown
|
page read and write
|
||
48644000
|
direct allocation
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
35C9000
|
unkown
|
page read and write
|
||
9ABD000
|
unkown
|
page read and write
|
||
A56E000
|
heap
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
3630000
|
trusted library allocation
|
page read and write
|
||
595000
|
unkown
|
page execute read
|
||
F50000
|
heap
|
page read and write
|
||
35D1000
|
trusted library allocation
|
page read and write
|
||
C9A7000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
7FF5D66E8000
|
unkown
|
page readonly
|
||
9E6F000
|
heap
|
page read and write
|
There are 3421 hidden memdumps, click here to show them.