Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
OBbrO5rwew.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\huge[1].dat
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2391.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4CC4.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\77CD.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nsc1466.tmp\liteFirewall.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsm4B00.tmp\blowfish.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Del.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\deetubv
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\deetubv:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsm4B00.tmp\INetC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsm4B00.tmp\nsProcess.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nstA4F2.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsx4AF0.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\start.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
|
MSVC program database ver 7.00, 512*4023 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
There are 106 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\OBbrO5rwew.exe
|
"C:\Users\user\Desktop\OBbrO5rwew.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Users\user\AppData\Roaming\deetubv
|
C:\Users\user\AppData\Roaming\deetubv
|
||
C:\Users\user\AppData\Local\Temp\2391.exe
|
C:\Users\user\AppData\Local\Temp\2391.exe
|
||
C:\Users\user\AppData\Local\Temp\4CC4.exe
|
C:\Users\user\AppData\Local\Temp\4CC4.exe
|
||
C:\Users\user\AppData\Local\Temp\77CD.exe
|
C:\Users\user\AppData\Local\Temp\77CD.exe
|
||
C:\Users\user\AppData\Roaming\deetubv
|
C:\Users\user\AppData\Roaming\deetubv
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
"C:\Users\user\AppData\Local\Temp\setup.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0
(Linux; Android 9; SM-J730G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.122 Mobile Safari/537.36" --lang=en-US
--user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3400 --field-trial-handle=3412,i,12963406170679374430,9093183945598996200,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US
--service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 9; SM-J730G)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.122 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3976 --field-trial-handle=3412,i,12963406170679374430,9093183945598996200,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 9; SM-J730G) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/126.0.6478.122 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4012 --field-trial-handle=3412,i,12963406170679374430,9093183945598996200,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux;
Android 9; SM-J730G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.122 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1
--num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719944520561396
--launch-time-ticks=5329031925 --mojo-platform-channel-handle=4048 --field-trial-handle=3412,i,12963406170679374430,9093183945598996200,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux;
Android 9; SM-J730G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.122 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2
--enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719944520561396 --launch-time-ticks=5329056479
--mojo-platform-channel-handle=4108 --field-trial-handle=3412,i,12963406170679374430,9093183945598996200,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
There are 25 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://gebeus.ru/tmp/index.php
|
|||
http://cx5519.com/tmp/index.php
|
|||
contintnetksows.shop
|
|||
http://evilos.cc/tmp/index.php
|
|||
ellaboratepwsz.xyz
|
|||
swellfrrgwwos.xyz
|
|||
foodypannyjsud.shop
|
|||
pedestriankodwu.xyz
|
|||
towerxxuytwi.xyz
|
|||
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://foodypannyjsud.shop/s
|
unknown
|
||
https://support.google.com/chrome/answer/6098869
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html
|
unknown
|
||
https://foodypannyjsud.shop/api8
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity=4P
|
unknown
|
||
http://api.install-stat.debug.world/clients/activitynep
|
unknown
|
||
https://excel.office.com
|
unknown
|
||
http://crbug.com/510270
|
unknown
|
||
https://chrome.google.com/webstore?hl=urCtrl$2
|
unknown
|
||
https://foodypannyjsud.shop/api(
|
unknown
|
||
http://crbug.com/378067
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
|
unknown
|
||
https://www.google.com/cloudprint
|
unknown
|
||
https://passwords.google.com
|
unknown
|
||
http://crbug.com/497301
|
unknown
|
||
https://github.com/JamesNK/Newtonsoft.Json/issues/652
|
unknown
|
||
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
|
unknown
|
||
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
|
unknown
|
||
https://foodypannyjsud.shop/piD;
|
unknown
|
||
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
|
unknown
|
||
https://foodypannyjsud.shop/H
|
unknown
|
||
http://bageyou.xyz
|
unknown
|
||
http://crbug.com/642141
|
unknown
|
||
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://bitbucket.org/
|
unknown
|
||
https://foodypannyjsud.shop//
|
unknown
|
||
https://foodypannyjsud.shop/piS
|
unknown
|
||
https://foodypannyjsud.shop/4
|
unknown
|
||
https://support.google.com/chromebook?p=app_intent
|
unknown
|
||
http://crbug.com/717501
|
unknown
|
||
http://crbug.com/957772
|
unknown
|
||
http://crbug.com/839189
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://foodypannyjsud.shop/6C
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html&
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlT&r
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://xiexie.wf/22_551/huge.dat
|
unknown
|
||
http://crbug.com/819404
|
unknown
|
||
https://outlook.com
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://crbug.com/514696
|
unknown
|
||
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
|
unknown
|
||
https://foodypannyjsud.shop/apiK
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chrome.google.com/webstore?hl=ukCtrl$1
|
unknown
|
||
https://foodypannyjsud.shop/pi6;
|
unknown
|
||
https://android.notify.windows.com/iOS
|
unknown
|
||
http://api.install-stat.debug.world/clients/installs
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://support.google.com/chrome/a/answer/9122284
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://chrome.google.com/webstore/
|
unknown
|
||
https://foodypannyjsud.shop/ng
|
unknown
|
||
https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity=4
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-CNCtrl$1
|
unknown
|
||
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
|
unknown
|
||
https://word.office.comon
|
unknown
|
||
http://xiexie.wf/
|
unknown
|
||
https://foodypannyjsud.shop:443/apicrosoft
|
unknown
|
||
https://support.google.com/chrome/answer/6258784
|
unknown
|
||
https://powerpoint.office.comcember
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
|
unknown
|
||
http://crbug.com/775961
|
unknown
|
||
https://foodypannyjsud.shop/(((
|
unknown
|
||
https://support.google.com/chrome/?p=plugin_flash
|
unknown
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://codereview.chromium.org/25305002).
|
unknown
|
||
http://schemas.micro
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-TWCtrl$1
|
unknown
|
||
http://www.apache.org/).
|
unknown
|
||
https://foodypannyjsud.shop/api
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
186.233.231.45
|
unknown
|
Brazil
|
||
188.114.97.3
|
unknown
|
European Union
|
||
141.8.192.126
|
unknown
|
Russian Federation
|
||
188.55.174.170
|
unknown
|
Saudi Arabia
|
||
185.68.16.7
|
unknown
|
Ukraine
|
||
127.0.0.127
|
unknown
|
unknown
|
||
146.70.169.164
|
unknown
|
United Kingdom
|
||
104.192.141.1
|
unknown
|
United States
|
||
104.21.45.251
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@explorerframe.dll,-13137
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@explorerframe.dll,-13138
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000B0236
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000D0018
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Sid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Pid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GamePall
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
|
DontShowUI
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
tmp_uid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
reg
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
uid
|
||
HKEY_CURRENT_USER\Control Panel\Cursors
|
AppStarting
|
There are 200 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
28B0000
|
direct allocation
|
page read and write
|
||
28D1000
|
unclassified section
|
page read and write
|
||
2801000
|
unclassified section
|
page read and write
|
||
1338000
|
heap
|
page read and write
|
||
38D0000
|
direct allocation
|
page execute and read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
4FF1000
|
trusted library allocation
|
page read and write
|
||
7FF5D75F9000
|
unkown
|
page readonly
|
||
4EF6000
|
trusted library allocation
|
page read and write
|
||
11527000
|
unkown
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
9FC6000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
D07000
|
trusted library allocation
|
page execute and read and write
|
||
2A84000
|
trusted library allocation
|
page read and write
|
||
9FAF000
|
heap
|
page read and write
|
||
ACEB000
|
heap
|
page read and write
|
||
C3CB000
|
stack
|
page read and write
|
||
9FA4000
|
heap
|
page read and write
|
||
7DF4F24A1000
|
unkown
|
page execute read
|
||
1C2F000
|
heap
|
page read and write
|
||
5330000
|
unkown
|
page write copy
|
||
A9D9000
|
heap
|
page read and write
|
||
A857000
|
heap
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
134B000
|
heap
|
page read and write
|
||
3070000
|
unkown
|
page read and write
|
||
35C9000
|
unkown
|
page read and write
|
||
1C54000
|
heap
|
page read and write
|
||
A69E000
|
heap
|
page read and write
|
||
D3B000
|
heap
|
page read and write
|
||
12A4000
|
trusted library allocation
|
page read and write
|
||
87B000
|
trusted library allocation
|
page execute and read and write
|
||
42EA000
|
trusted library allocation
|
page read and write
|
||
11FB000
|
trusted library allocation
|
page execute and read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4FDE000
|
trusted library allocation
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page readonly
|
||
AFE000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
7FF5D72E9000
|
unkown
|
page readonly
|
||
1366000
|
heap
|
page read and write
|
||
2773000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
A339000
|
heap
|
page read and write
|
||
A969000
|
heap
|
page read and write
|
||
F4B000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
7FF5D723C000
|
unkown
|
page readonly
|
||
A85F000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
9AB4000
|
unkown
|
page read and write
|
||
A47000
|
trusted library allocation
|
page execute and read and write
|
||
11404000
|
unkown
|
page read and write
|
||
7FF5D76D7000
|
unkown
|
page readonly
|
||
43B000
|
stack
|
page read and write
|
||
9F8F000
|
heap
|
page read and write
|
||
1BB8000
|
heap
|
page read and write
|
||
1B7E000
|
stack
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
4B0000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
9B4000
|
trusted library allocation
|
page read and write
|
||
7FF5D72DF000
|
unkown
|
page readonly
|
||
434B000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
21E0000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
unkown
|
page readonly
|
||
1C29000
|
heap
|
page read and write
|
||
54EC000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
BFB000
|
heap
|
page read and write
|
||
432C000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
7FF5D72FB000
|
unkown
|
page readonly
|
||
2AEE000
|
stack
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
9F8D000
|
heap
|
page read and write
|
||
7FF5D752F000
|
unkown
|
page readonly
|
||
AABE000
|
heap
|
page read and write
|
||
A0A9000
|
stack
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
1BB4000
|
heap
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
26B0000
|
trusted library allocation
|
page read and write
|
||
7FF5D7488000
|
unkown
|
page readonly
|
||
10B0000
|
heap
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1C3E000
|
heap
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
3070000
|
unkown
|
page read and write
|
||
4CC9000
|
trusted library allocation
|
page read and write
|
||
42F3000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
B950000
|
unkown
|
page readonly
|
||
324F000
|
stack
|
page read and write
|
||
7FD000
|
heap
|
page read and write
|
||
2971000
|
heap
|
page execute and read and write
|
||
DEE000
|
stack
|
page read and write
|
||
A2C0000
|
heap
|
page read and write
|
||
7FF5D7534000
|
unkown
|
page readonly
|
||
334F000
|
stack
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
1129A000
|
unkown
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
A33D000
|
heap
|
page read and write
|
||
A2EA000
|
heap
|
page read and write
|
||
AD02000
|
heap
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
AD08000
|
heap
|
page read and write
|
||
10D5000
|
heap
|
page read and write
|
||
AB5F000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
2890000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
stack
|
page read and write
|
||
7FF5D7691000
|
unkown
|
page readonly
|
||
AC03000
|
heap
|
page read and write
|
||
C09000
|
heap
|
page read and write
|
||
ABA4000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
AC4F000
|
heap
|
page read and write
|
||
2935000
|
trusted library allocation
|
page read and write
|
||
5565000
|
trusted library allocation
|
page read and write
|
||
7FF5D75F2000
|
unkown
|
page readonly
|
||
1BB2000
|
heap
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
148F000
|
stack
|
page read and write
|
||
7D4000
|
trusted library allocation
|
page read and write
|
||
FEA000
|
trusted library allocation
|
page execute and read and write
|
||
4BE000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
A74A000
|
heap
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
4421000
|
heap
|
page read and write
|
||
7FF5D7722000
|
unkown
|
page readonly
|
||
7FF5D7398000
|
unkown
|
page readonly
|
||
A554000
|
heap
|
page read and write
|
||
ABC0000
|
heap
|
page read and write
|
||
3370000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
4FE4000
|
trusted library allocation
|
page read and write
|
||
AB33000
|
heap
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page execute and read and write
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
A33F000
|
unkown
|
page read and write
|
||
26C0000
|
heap
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
BF3E000
|
stack
|
page read and write
|
||
7CB0000
|
unkown
|
page readonly
|
||
1BCC000
|
heap
|
page read and write
|
||
A342000
|
heap
|
page read and write
|
||
26AF000
|
stack
|
page read and write
|
||
3F6000
|
stack
|
page read and write
|
||
7FF5D6BE4000
|
unkown
|
page readonly
|
||
A35C000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
AC79000
|
heap
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
62F000
|
heap
|
page read and write
|
||
1577000
|
trusted library allocation
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
7FF5D77F7000
|
unkown
|
page readonly
|
||
422000
|
unkown
|
page read and write
|
||
DE5000
|
trusted library allocation
|
page execute and read and write
|
||
A92D000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
2720000
|
trusted library allocation
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
ACAE000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A24A000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
9F8A000
|
heap
|
page read and write
|
||
A83D000
|
heap
|
page read and write
|
||
42A2000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
872000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
768C000
|
unkown
|
page read and write
|
||
E5B000
|
heap
|
page read and write
|
||
A6D8000
|
heap
|
page read and write
|
||
42BA000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
EFC000
|
heap
|
page read and write
|
||
618000
|
heap
|
page read and write
|
||
38B0000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1270000
|
unkown
|
page read and write
|
||
7FF5D77C2000
|
unkown
|
page readonly
|
||
40A000
|
unkown
|
page write copy
|
||
F6B000
|
heap
|
page read and write
|
||
CD0000
|
trusted library allocation
|
page read and write
|
||
7FF5D7589000
|
unkown
|
page readonly
|
||
2547000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
1129E000
|
unkown
|
page read and write
|
||
7FF5D7546000
|
unkown
|
page readonly
|
||
BE7000
|
trusted library allocation
|
page read and write
|
||
4F73000
|
trusted library allocation
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
7FF5D716B000
|
unkown
|
page readonly
|
||
A313000
|
unkown
|
page read and write
|
||
1160000
|
unkown
|
page read and write
|
||
7611000
|
unkown
|
page read and write
|
||
7FF5D6AB6000
|
unkown
|
page readonly
|
||
2400000
|
trusted library allocation
|
page read and write
|
||
AB7F000
|
heap
|
page read and write
|
||
7FF5D7376000
|
unkown
|
page readonly
|
||
9B8000
|
heap
|
page read and write
|
||
8880000
|
unkown
|
page readonly
|
||
11A0000
|
heap
|
page read and write
|
||
1C48000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
42AB000
|
trusted library allocation
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
DD6000
|
trusted library allocation
|
page execute and read and write
|
||
63D000
|
heap
|
page read and write
|
||
7FF5D7795000
|
unkown
|
page readonly
|
||
C7CB000
|
unkown
|
page read and write
|
||
A51C000
|
heap
|
page read and write
|
||
A348000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A318000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
A24A000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
A797000
|
heap
|
page read and write
|
||
AE4000
|
trusted library allocation
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
A348000
|
heap
|
page read and write
|
||
C44F000
|
stack
|
page read and write
|
||
4A0E000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
A3AC000
|
unkown
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
42D3000
|
trusted library allocation
|
page read and write
|
||
2DD4000
|
trusted library allocation
|
page read and write
|
||
8FD9000
|
stack
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
7FF5D77B6000
|
unkown
|
page readonly
|
||
E9D000
|
stack
|
page read and write
|
||
35E4000
|
unkown
|
page read and write
|
||
AA0E000
|
unkown
|
page read and write
|
||
9A94000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
113C8000
|
unkown
|
page read and write
|
||
429C000
|
trusted library allocation
|
page read and write
|
||
3140000
|
unkown
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
2D37000
|
trusted library allocation
|
page execute and read and write
|
||
110E000
|
stack
|
page read and write
|
||
1350000
|
unkown
|
page readonly
|
||
1570000
|
heap
|
page read and write
|
||
A60D000
|
heap
|
page read and write
|
||
A2DD000
|
heap
|
page read and write
|
||
42D1000
|
trusted library allocation
|
page read and write
|
||
AD3A000
|
heap
|
page read and write
|
||
ABE7000
|
heap
|
page read and write
|
||
B5F000
|
stack
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
113C0000
|
unkown
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
D0B000
|
trusted library allocation
|
page execute and read and write
|
||
A935000
|
heap
|
page read and write
|
||
2739000
|
heap
|
page read and write
|
||
132A000
|
heap
|
page read and write
|
||
A346000
|
heap
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
1C5E000
|
heap
|
page read and write
|
||
A31E000
|
heap
|
page read and write
|
||
7435000
|
stack
|
page read and write
|
||
7FF5D774A000
|
unkown
|
page readonly
|
||
877000
|
trusted library allocation
|
page execute and read and write
|
||
C65E000
|
unkown
|
page read and write
|
||
7FF5D751F000
|
unkown
|
page readonly
|
||
AC6F000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
63D000
|
heap
|
page read and write
|
||
7FF5D769E000
|
unkown
|
page readonly
|
||
62A000
|
heap
|
page read and write
|
||
42C2000
|
trusted library allocation
|
page read and write
|
||
1571000
|
trusted library allocation
|
page read and write
|
||
7FF5D7507000
|
unkown
|
page readonly
|
||
A324000
|
heap
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
7FF5D7336000
|
unkown
|
page readonly
|
||
A313000
|
heap
|
page read and write
|
||
9B79000
|
unkown
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
283E000
|
heap
|
page read and write
|
||
A81B000
|
heap
|
page read and write
|
||
42DE000
|
trusted library allocation
|
page read and write
|
||
42A2000
|
trusted library allocation
|
page read and write
|
||
AA14000
|
heap
|
page read and write
|
||
11297000
|
unkown
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
117A000
|
trusted library allocation
|
page execute and read and write
|
||
3C90000
|
remote allocation
|
page read and write
|
||
9AAA000
|
unkown
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
7FF5D77C7000
|
unkown
|
page readonly
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
5574000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
ACE0000
|
heap
|
page read and write
|
||
D5B000
|
stack
|
page read and write
|
||
A9EC000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
1C59000
|
heap
|
page read and write
|
||
1BB8000
|
heap
|
page read and write
|
||
A3E3000
|
heap
|
page read and write
|
||
A9D3000
|
heap
|
page read and write
|
||
ABCA000
|
heap
|
page read and write
|
||
B980000
|
unkown
|
page readonly
|
||
4B7000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
7FF5D76C8000
|
unkown
|
page readonly
|
||
9FBF000
|
heap
|
page read and write
|
||
63B000
|
stack
|
page read and write
|
||
D5C000
|
stack
|
page read and write
|
||
C642000
|
unkown
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
2904000
|
trusted library allocation
|
page read and write
|
||
A3B6000
|
unkown
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
A31C000
|
heap
|
page read and write
|
||
844000
|
trusted library allocation
|
page read and write
|
||
135B000
|
heap
|
page read and write
|
||
AC99000
|
heap
|
page read and write
|
||
8F7000
|
heap
|
page read and write
|
||
A391000
|
unkown
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
42EB000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
11295000
|
unkown
|
page read and write
|
||
252D000
|
stack
|
page read and write
|
||
4420000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
BE90000
|
unkown
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
3AB1000
|
trusted library allocation
|
page read and write
|
||
17C7000
|
trusted library allocation
|
page read and write
|
||
AA69000
|
heap
|
page read and write
|
||
1027000
|
heap
|
page read and write
|
||
2F18000
|
trusted library allocation
|
page read and write
|
||
1C67000
|
heap
|
page read and write
|
||
272C000
|
trusted library allocation
|
page read and write
|
||
2D32000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
1085000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
4A44000
|
unkown
|
page read and write
|
||
2600000
|
trusted library allocation
|
page read and write
|
||
7FF5D7485000
|
unkown
|
page readonly
|
||
42C5000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
429A000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
A212000
|
heap
|
page read and write
|
||
1C56000
|
heap
|
page read and write
|
||
A6A7000
|
heap
|
page read and write
|
||
8DE000
|
stack
|
page read and write
|
||
9B0000
|
trusted library allocation
|
page read and write
|
||
11294000
|
unkown
|
page read and write
|
||
1C37000
|
heap
|
page read and write
|
||
1281000
|
unkown
|
page readonly
|
||
2FC0000
|
heap
|
page execute and read and write
|
||
3370000
|
unkown
|
page read and write
|
||
2458000
|
trusted library allocation
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
3060000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A8A7000
|
heap
|
page read and write
|
||
DDA000
|
trusted library allocation
|
page execute and read and write
|
||
A249000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
BE49000
|
stack
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
3EB000
|
stack
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
42B7000
|
trusted library allocation
|
page read and write
|
||
42A4000
|
trusted library allocation
|
page read and write
|
||
18DE000
|
stack
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
AAFB000
|
heap
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
A82E000
|
heap
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
42DB000
|
trusted library allocation
|
page read and write
|
||
F57000
|
heap
|
page read and write
|
||
9B3000
|
trusted library allocation
|
page execute and read and write
|
||
1291000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
462E000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
A711000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
910000
|
trusted library allocation
|
page read and write
|
||
135D000
|
heap
|
page read and write
|
||
7DF4F2491000
|
unkown
|
page execute read
|
||
11427000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
EB7000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
51DC000
|
trusted library allocation
|
page read and write
|
||
7E60000
|
unkown
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
9A90000
|
unkown
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
26EE000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
2910000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
A343000
|
heap
|
page read and write
|
||
11296000
|
unkown
|
page read and write
|
||
2170000
|
heap
|
page read and write
|
||
7FF5D7682000
|
unkown
|
page readonly
|
||
F42D000
|
unkown
|
page read and write
|
||
A79E000
|
heap
|
page read and write
|
||
7810000
|
unkown
|
page read and write
|
||
7FF5D71C4000
|
unkown
|
page readonly
|
||
4B7000
|
heap
|
page read and write
|
||
AACA000
|
heap
|
page read and write
|
||
A6E6000
|
heap
|
page read and write
|
||
1731000
|
unkown
|
page readonly
|
||
AD3D000
|
heap
|
page read and write
|
||
1C59000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
AC29000
|
heap
|
page read and write
|
||
A91A000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
1C59000
|
heap
|
page read and write
|
||
7FF5D71AF000
|
unkown
|
page readonly
|
||
10CD000
|
trusted library allocation
|
page execute and read and write
|
||
A310000
|
heap
|
page read and write
|
||
114F8000
|
unkown
|
page read and write
|
||
A75F000
|
heap
|
page read and write
|
||
A49F000
|
heap
|
page read and write
|
||
42B0000
|
trusted library allocation
|
page read and write
|
||
AA52000
|
heap
|
page read and write
|
||
26B1000
|
trusted library allocation
|
page read and write
|
||
1C4D000
|
heap
|
page read and write
|
||
2A76000
|
trusted library allocation
|
page read and write
|
||
5FB000
|
stack
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1C3B000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
A78C000
|
heap
|
page read and write
|
||
72F000
|
heap
|
page read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
162F000
|
heap
|
page read and write
|
||
8380000
|
unkown
|
page read and write
|
||
9DA000
|
trusted library allocation
|
page execute and read and write
|
||
C605000
|
unkown
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
7DF4F2470000
|
unkown
|
page readonly
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
A346000
|
heap
|
page read and write
|
||
9F89000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
1C2E000
|
heap
|
page read and write
|
||
27DC000
|
stack
|
page read and write
|
||
1C59000
|
heap
|
page read and write
|
||
558E000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
AB92000
|
heap
|
page read and write
|
||
7FF5D7065000
|
unkown
|
page readonly
|
||
8500000
|
unkown
|
page read and write
|
||
A8F000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
1380000
|
heap
|
page read and write
|
||
295E000
|
heap
|
page read and write
|
||
AD2A000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
231E000
|
stack
|
page read and write
|
||
42A2000
|
trusted library allocation
|
page read and write
|
||
156A000
|
trusted library allocation
|
page execute and read and write
|
||
49A8000
|
unkown
|
page read and write
|
||
73C000
|
heap
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
A619000
|
heap
|
page read and write
|
||
C5C000
|
unkown
|
page readonly
|
||
1383000
|
heap
|
page read and write
|
||
20E0000
|
heap
|
page read and write
|
||
4B8D000
|
stack
|
page read and write
|
||
95FB000
|
stack
|
page read and write
|
||
B33000
|
heap
|
page read and write
|
||
5EA000
|
heap
|
page read and write
|
||
C4BD000
|
unkown
|
page read and write
|
||
A88000
|
heap
|
page read and write
|
||
42AA000
|
trusted library allocation
|
page read and write
|
||
3310000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
429A000
|
trusted library allocation
|
page read and write
|
||
8380000
|
unkown
|
page read and write
|
||
1550000
|
trusted library allocation
|
page execute and read and write
|
||
42B2000
|
trusted library allocation
|
page read and write
|
||
1C5D000
|
heap
|
page read and write
|
||
AA97000
|
heap
|
page read and write
|
||
585000
|
heap
|
page read and write
|
||
DC7000
|
heap
|
page read and write
|
||
502F000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
A349000
|
heap
|
page read and write
|
||
AB88000
|
heap
|
page read and write
|
||
F78000
|
heap
|
page read and write
|
||
42B4000
|
trusted library allocation
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
7FF5D77DD000
|
unkown
|
page readonly
|
||
C60000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
7FF5D75D9000
|
unkown
|
page readonly
|
||
42C5000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
1102000
|
trusted library allocation
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
A886000
|
heap
|
page read and write
|
||
146B000
|
trusted library allocation
|
page execute and read and write
|
||
8890000
|
unkown
|
page readonly
|
||
8A70000
|
unkown
|
page read and write
|
||
AA04000
|
unkown
|
page read and write
|
||
42CB000
|
trusted library allocation
|
page read and write
|
||
C5F8000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
37FD000
|
stack
|
page read and write
|
||
1182000
|
trusted library allocation
|
page read and write
|
||
A65C000
|
heap
|
page read and write
|
||
A315000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2606000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
A71F000
|
heap
|
page read and write
|
||
33B0000
|
unkown
|
page readonly
|
||
3060000
|
unkown
|
page read and write
|
||
7FF5D7764000
|
unkown
|
page readonly
|
||
A510000
|
heap
|
page read and write
|
||
5522000
|
trusted library allocation
|
page read and write
|
||
26B4000
|
trusted library allocation
|
page read and write
|
||
7FF5D77F0000
|
unkown
|
page readonly
|
||
42B0000
|
trusted library allocation
|
page read and write
|
||
7FF5D77E0000
|
unkown
|
page readonly
|
||
DB4000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1156000
|
stack
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
7FF5D775C000
|
unkown
|
page readonly
|
||
2EA1000
|
unkown
|
page read and write
|
||
A39C000
|
unkown
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
CAA000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
1337000
|
heap
|
page read and write
|
||
7FF5D7837000
|
unkown
|
page readonly
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
A2E000
|
heap
|
page read and write
|
||
1C2E000
|
heap
|
page read and write
|
||
49FA000
|
unkown
|
page read and write
|
||
10C3000
|
trusted library allocation
|
page execute and read and write
|
||
35CF000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A5B000
|
stack
|
page read and write
|
||
A41A000
|
heap
|
page read and write
|
||
244E000
|
stack
|
page read and write
|
||
A280000
|
heap
|
page read and write
|
||
26D0000
|
trusted library allocation
|
page read and write
|
||
73C000
|
heap
|
page read and write
|
||
A31F000
|
heap
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
73B000
|
heap
|
page read and write
|
||
FC4000
|
trusted library allocation
|
page read and write
|
||
9A72000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
7FF5D705D000
|
unkown
|
page readonly
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
A343000
|
heap
|
page read and write
|
||
3537000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page read and write
|
||
A6B7000
|
heap
|
page read and write
|
||
9A98000
|
unkown
|
page read and write
|
||
A3C3000
|
unkown
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
unkown
|
page read and write
|
||
A853000
|
heap
|
page read and write
|
||
F08000
|
heap
|
page read and write
|
||
A33C000
|
heap
|
page read and write
|
||
5479000
|
unkown
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
2531000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
A23A000
|
unkown
|
page read and write
|
||
42B5000
|
trusted library allocation
|
page read and write
|
||
A321000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
1C48000
|
heap
|
page read and write
|
||
A220000
|
heap
|
page read and write
|
||
51C2000
|
trusted library allocation
|
page read and write
|
||
7FF5D7792000
|
unkown
|
page readonly
|
||
2EB0000
|
heap
|
page execute and read and write
|
||
2A97000
|
trusted library allocation
|
page read and write
|
||
60B000
|
heap
|
page read and write
|
||
AA12000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
1408000
|
heap
|
page read and write
|
||
2511000
|
trusted library allocation
|
page read and write
|
||
10DC000
|
heap
|
page read and write
|
||
2C01000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
B07000
|
heap
|
page read and write
|
||
AA40000
|
unkown
|
page read and write
|
||
C8A000
|
trusted library allocation
|
page execute and read and write
|
||
4B7000
|
heap
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
143D000
|
trusted library allocation
|
page execute and read and write
|
||
11292000
|
unkown
|
page read and write
|
||
1C4A000
|
heap
|
page read and write
|
||
35D5000
|
unkown
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
7FF5D717C000
|
unkown
|
page readonly
|
||
418000
|
unkown
|
page readonly
|
||
8380000
|
unkown
|
page read and write
|
||
3EF5000
|
trusted library allocation
|
page read and write
|
||
55E3000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
26B0000
|
trusted library allocation
|
page read and write
|
||
A7B1000
|
heap
|
page read and write
|
||
A893000
|
heap
|
page read and write
|
||
7D3000
|
trusted library allocation
|
page execute and read and write
|
||
A3C4000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A3DB000
|
heap
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
A888000
|
heap
|
page read and write
|
||
AB19000
|
heap
|
page read and write
|
||
1340000
|
unkown
|
page read and write
|
||
A248000
|
heap
|
page read and write
|
||
7609000
|
unkown
|
page read and write
|
||
AC89000
|
heap
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
779E000
|
unkown
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
A735000
|
heap
|
page read and write
|
||
A347000
|
heap
|
page read and write
|
||
1433000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D77CD000
|
unkown
|
page readonly
|
||
2790000
|
heap
|
page read and write
|
||
A6EF000
|
heap
|
page read and write
|
||
42A2000
|
trusted library allocation
|
page read and write
|
||
EAF000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
42BA000
|
trusted library allocation
|
page read and write
|
||
C5F0000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
3626000
|
unkown
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
10B4000
|
unkown
|
page write copy
|
||
A325000
|
heap
|
page read and write
|
||
A7D7000
|
heap
|
page read and write
|
||
3630000
|
unkown
|
page readonly
|
||
B220000
|
unkown
|
page read and write
|
||
26E5000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
AA09000
|
heap
|
page read and write
|
||
170A000
|
heap
|
page read and write
|
||
35DC000
|
unkown
|
page read and write
|
||
9A6A000
|
unkown
|
page read and write
|
||
42B4000
|
trusted library allocation
|
page read and write
|
||
A339000
|
heap
|
page read and write
|
||
A91D000
|
heap
|
page read and write
|
||
F1F000
|
heap
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
C983000
|
unkown
|
page read and write
|
||
7FF5D7452000
|
unkown
|
page readonly
|
||
4BE000
|
heap
|
page read and write
|
||
42B7000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
9A0000
|
trusted library allocation
|
page read and write
|
||
536000
|
stack
|
page read and write
|
||
1359000
|
heap
|
page read and write
|
||
26C5000
|
trusted library allocation
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7FF5D7462000
|
unkown
|
page readonly
|
||
1378000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
158B000
|
trusted library allocation
|
page execute and read and write
|
||
42DB000
|
trusted library allocation
|
page read and write
|
||
4297000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
A341000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A806000
|
heap
|
page read and write
|
||
7FF5D6ABD000
|
unkown
|
page readonly
|
||
D30000
|
trusted library allocation
|
page execute and read and write
|
||
49FD000
|
unkown
|
page read and write
|
||
10B4000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
9C0000
|
trusted library allocation
|
page read and write
|
||
42DB000
|
trusted library allocation
|
page read and write
|
||
42AA000
|
trusted library allocation
|
page read and write
|
||
7FF5D7523000
|
unkown
|
page readonly
|
||
A228000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
434B000
|
trusted library allocation
|
page read and write
|
||
A223000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
3370000
|
unkown
|
page read and write
|
||
1270000
|
trusted library allocation
|
page execute and read and write
|
||
A98C000
|
heap
|
page read and write
|
||
2F81000
|
heap
|
page read and write
|
||
1C5E000
|
heap
|
page read and write
|
||
1C3B000
|
heap
|
page read and write
|
||
4323000
|
trusted library allocation
|
page read and write
|
||
1C2E000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page execute and read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
heap
|
page execute and read and write
|
||
C86000
|
trusted library allocation
|
page execute and read and write
|
||
4B00000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
F43000
|
trusted library allocation
|
page execute and read and write
|
||
5591000
|
trusted library allocation
|
page read and write
|
||
C22000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
25BF000
|
stack
|
page read and write
|
||
A52000
|
trusted library allocation
|
page read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
7FF5D72C8000
|
unkown
|
page readonly
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
ABBD000
|
heap
|
page read and write
|
||
113A2000
|
unkown
|
page read and write
|
||
3AB5000
|
trusted library allocation
|
page read and write
|
||
C2B000
|
trusted library allocation
|
page execute and read and write
|
||
7EB000
|
heap
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
A5F8000
|
heap
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
7FF5D7262000
|
unkown
|
page readonly
|
||
960000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
A2FD000
|
heap
|
page read and write
|
||
5260000
|
heap
|
page read and write
|
||
1C64000
|
heap
|
page read and write
|
||
1433000
|
trusted library allocation
|
page execute and read and write
|
||
2794000
|
heap
|
page read and write
|
||
AA72000
|
heap
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
9FD2000
|
heap
|
page read and write
|
||
4330000
|
trusted library allocation
|
page read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
A91F000
|
heap
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
unkown
|
page read and write
|
||
EFA000
|
trusted library allocation
|
page execute and read and write
|
||
B56000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
A6F8000
|
heap
|
page read and write
|
||
7FF5D7639000
|
unkown
|
page readonly
|
||
7FF5D71BF000
|
unkown
|
page readonly
|
||
A31F000
|
heap
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
543E000
|
stack
|
page read and write
|
||
362A000
|
unkown
|
page read and write
|
||
BB0E000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
162F000
|
stack
|
page read and write
|
||
1220000
|
trusted library allocation
|
page read and write
|
||
2805000
|
trusted library allocation
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
7FF5D748A000
|
unkown
|
page readonly
|
||
4EFB000
|
trusted library allocation
|
page read and write
|
||
A868000
|
heap
|
page read and write
|
||
7FF5D72D7000
|
unkown
|
page readonly
|
||
42A2000
|
trusted library allocation
|
page read and write
|
||
1456000
|
trusted library allocation
|
page execute and read and write
|
||
4BE000
|
heap
|
page read and write
|
||
35BD000
|
unkown
|
page read and write
|
||
D80000
|
unkown
|
page readonly
|
||
C621000
|
unkown
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
A6B4000
|
heap
|
page read and write
|
||
7FF5D771A000
|
unkown
|
page readonly
|
||
42B0000
|
trusted library allocation
|
page read and write
|
||
4397000
|
trusted library allocation
|
page read and write
|
||
7FF5D7593000
|
unkown
|
page readonly
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
293F000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
10CB000
|
heap
|
page read and write
|
||
2931000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1C5A000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
4980000
|
unkown
|
page read and write
|
||
47B0000
|
heap
|
page read and write
|
||
42AA000
|
trusted library allocation
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
9F84000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
26E4000
|
trusted library allocation
|
page read and write
|
||
1C36000
|
heap
|
page read and write
|
||
2FB3000
|
trusted library allocation
|
page read and write
|
||
A246000
|
heap
|
page read and write
|
||
8A0000
|
trusted library allocation
|
page execute and read and write
|
||
27EE000
|
trusted library allocation
|
page read and write
|
||
2FB5000
|
trusted library allocation
|
page read and write
|
||
94AB000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
2B02000
|
unkown
|
page readonly
|
||
430E000
|
trusted library allocation
|
page read and write
|
||
A769000
|
heap
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
CFA000
|
trusted library allocation
|
page execute and read and write
|
||
BDE000
|
heap
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
C81C000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
274D000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
unkown
|
page read and write
|
||
AB67000
|
heap
|
page read and write
|
||
42AA000
|
trusted library allocation
|
page read and write
|
||
DF2000
|
trusted library allocation
|
page read and write
|
||
F76000
|
trusted library allocation
|
page execute and read and write
|
||
4BE000
|
heap
|
page read and write
|
||
AA05000
|
heap
|
page read and write
|
||
A7DC000
|
heap
|
page read and write
|
||
4FEE000
|
trusted library allocation
|
page read and write
|
||
84F000
|
heap
|
page read and write
|
||
258E000
|
stack
|
page read and write
|
||
A242000
|
heap
|
page read and write
|
||
BD8000
|
heap
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C61000
|
heap
|
page read and write
|
||
AAD9000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
10534000
|
unkown
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
26A5000
|
trusted library allocation
|
page read and write
|
||
23AD000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
127F000
|
stack
|
page read and write
|
||
4432000
|
trusted library allocation
|
page read and write
|
||
42A2000
|
trusted library allocation
|
page read and write
|
||
F0C000
|
heap
|
page read and write
|
||
25C1000
|
trusted library allocation
|
page read and write
|
||
7FF5D719C000
|
unkown
|
page readonly
|
||
FF0000
|
heap
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
843000
|
trusted library allocation
|
page execute and read and write
|
||
1694000
|
unkown
|
page readonly
|
||
4BE000
|
heap
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
42C6000
|
trusted library allocation
|
page read and write
|
||
A33E000
|
heap
|
page read and write
|
||
23F0000
|
trusted library allocation
|
page read and write
|
||
1618000
|
heap
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
7FF5D7455000
|
unkown
|
page readonly
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
296C000
|
trusted library allocation
|
page read and write
|
||
A513000
|
heap
|
page read and write
|
||
A34D000
|
heap
|
page read and write
|
||
959000
|
heap
|
page read and write
|
||
A33E000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
7FF5D75CB000
|
unkown
|
page readonly
|
||
A595000
|
heap
|
page read and write
|
||
26D6000
|
trusted library allocation
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
94F4000
|
unkown
|
page read and write
|
||
4C8D000
|
stack
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
E50000
|
trusted library allocation
|
page execute and read and write
|
||
A824000
|
heap
|
page read and write
|
||
C5A000
|
unkown
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
BEA0000
|
unkown
|
page readonly
|
||
A384000
|
unkown
|
page read and write
|
||
5E9000
|
heap
|
page read and write
|
||
C73E000
|
unkown
|
page read and write
|
||
9F92000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
12EF000
|
heap
|
page read and write
|
||
7FF5D7244000
|
unkown
|
page readonly
|
||
75F8000
|
unkown
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
4B7000
|
heap
|
page read and write
|
||
AD32000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
12F6000
|
stack
|
page read and write
|
||
4295000
|
trusted library allocation
|
page read and write
|
||
7FF5D732D000
|
unkown
|
page readonly
|
||
2220000
|
heap
|
page read and write
|
||
1C4A000
|
heap
|
page read and write
|
||
A6FE000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
B4D0000
|
unkown
|
page readonly
|
||
AA92000
|
unkown
|
page read and write
|
||
7FF5D77A4000
|
unkown
|
page readonly
|
||
3060000
|
unkown
|
page read and write
|
||
8380000
|
unkown
|
page read and write
|
||
A365000
|
heap
|
page read and write
|
||
113B1000
|
unkown
|
page read and write
|
||
C48B000
|
unkown
|
page read and write
|
||
A237000
|
unkown
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
843F000
|
stack
|
page read and write
|
||
ABF7000
|
heap
|
page read and write
|
||
11298000
|
unkown
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
35CD000
|
stack
|
page read and write
|
||
A339000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
113F8000
|
unkown
|
page read and write
|
||
2A95000
|
trusted library allocation
|
page read and write
|
||
A2A6000
|
heap
|
page read and write
|
||
7FF5D7458000
|
unkown
|
page readonly
|
||
7FF5D72BF000
|
unkown
|
page readonly
|
||
42DB000
|
trusted library allocation
|
page read and write
|
||
BBD000
|
trusted library allocation
|
page execute and read and write
|
||
A365000
|
heap
|
page read and write
|
||
42AA000
|
trusted library allocation
|
page read and write
|
||
9FBA000
|
heap
|
page read and write
|
||
9F85000
|
heap
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
84BB000
|
stack
|
page read and write
|
||
C615000
|
unkown
|
page read and write
|
||
12AD000
|
trusted library allocation
|
page execute and read and write
|
||
2320000
|
trusted library allocation
|
page read and write
|
||
113E7000
|
unkown
|
page read and write
|
||
2D81000
|
trusted library allocation
|
page read and write
|
||
42CF000
|
trusted library allocation
|
page read and write
|
||
7FF5D770A000
|
unkown
|
page readonly
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
9B2C000
|
unkown
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
A264000
|
unkown
|
page read and write
|
||
7FF5D762F000
|
unkown
|
page readonly
|
||
55E5000
|
trusted library allocation
|
page read and write
|
||
7B20000
|
unkown
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
101B000
|
heap
|
page read and write
|
||
226C000
|
stack
|
page read and write
|
||
1129A000
|
unkown
|
page read and write
|
||
B85A000
|
stack
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
DBD000
|
unkown
|
page readonly
|
||
7FF5D72D3000
|
unkown
|
page readonly
|
||
8EB000
|
trusted library allocation
|
page execute and read and write
|
||
610000
|
heap
|
page read and write
|
||
AC74000
|
heap
|
page read and write
|
||
1388000
|
heap
|
page read and write
|
||
769A000
|
unkown
|
page read and write
|
||
BD0000
|
unkown
|
page readonly
|
||
4610000
|
heap
|
page read and write
|
||
BAF000
|
stack
|
page read and write
|
||
A964000
|
heap
|
page read and write
|
||
2F81000
|
heap
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
2EC0000
|
unkown
|
page readonly
|
||
84CC000
|
unkown
|
page read and write
|
||
C472000
|
unkown
|
page read and write
|
||
5D6000
|
stack
|
page read and write
|
||
35C3000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
C46F000
|
unkown
|
page read and write
|
||
A3E9000
|
heap
|
page read and write
|
||
B76000
|
stack
|
page read and write
|
||
49C2000
|
unkown
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
A33E000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
55C3000
|
unkown
|
page readonly
|
||
9C000
|
stack
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
D9D000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
AA63000
|
heap
|
page read and write
|
||
10634000
|
unkown
|
page read and write
|
||
1649000
|
heap
|
page read and write
|
||
A260000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
239E000
|
stack
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
55E0000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
BCD000
|
trusted library allocation
|
page execute and read and write
|
||
1129C000
|
unkown
|
page read and write
|
||
1C61000
|
heap
|
page read and write
|
||
7FF5D7396000
|
unkown
|
page readonly
|
||
F54000
|
trusted library allocation
|
page read and write
|
||
42A2000
|
trusted library allocation
|
page read and write
|
||
4470000
|
trusted library allocation
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
F36000
|
heap
|
page read and write
|
||
429F000
|
trusted library allocation
|
page read and write
|
||
5531000
|
trusted library allocation
|
page read and write
|
||
63B000
|
heap
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
2AA5000
|
trusted library allocation
|
page read and write
|
||
C97000
|
trusted library allocation
|
page execute and read and write
|
||
10EA000
|
heap
|
page read and write
|
||
62A000
|
heap
|
page read and write
|
||
A222000
|
heap
|
page read and write
|
||
1C48000
|
heap
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
C5FD000
|
unkown
|
page read and write
|
||
9F81000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
2A8C000
|
stack
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
3331000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
A408000
|
unkown
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
ACBA000
|
heap
|
page read and write
|
||
A42E000
|
heap
|
page read and write
|
||
1C4B000
|
heap
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
A9A3000
|
heap
|
page read and write
|
||
43C8000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A88E000
|
heap
|
page read and write
|
||
7FF5D7284000
|
unkown
|
page readonly
|
||
576E000
|
stack
|
page read and write
|
||
AA90000
|
heap
|
page read and write
|
||
2DE1000
|
trusted library allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
51E3000
|
trusted library allocation
|
page read and write
|
||
35F4000
|
unkown
|
page read and write
|
||
2906000
|
trusted library allocation
|
page read and write
|
||
35DC000
|
trusted library allocation
|
page read and write
|
||
ABA9000
|
heap
|
page read and write
|
||
9E7000
|
heap
|
page read and write
|
||
4347000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
1C67000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
A349000
|
heap
|
page read and write
|
||
A952000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
4291000
|
trusted library allocation
|
page read and write
|
||
3780000
|
remote allocation
|
page read and write
|
||
F3F0000
|
unkown
|
page read and write
|
||
9EB0000
|
unkown
|
page readonly
|
||
D51000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
2404000
|
trusted library allocation
|
page read and write
|
||
A250000
|
heap
|
page read and write
|
||
12C5000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
1C36000
|
heap
|
page read and write
|
||
13B9000
|
heap
|
page read and write
|
||
42D9000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
C5C000
|
unkown
|
page readonly
|
||
ACDB000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1094000
|
trusted library allocation
|
page read and write
|
||
7FF5D7404000
|
unkown
|
page readonly
|
||
5F6000
|
heap
|
page read and write
|
||
586E000
|
stack
|
page read and write
|
||
F41000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
EF6000
|
stack
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
CDD000
|
trusted library allocation
|
page execute and read and write
|
||
4BE000
|
heap
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
4310000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
254D000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
unkown
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
A23F000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
7FF5D77D2000
|
unkown
|
page readonly
|
||
AC3000
|
heap
|
page read and write
|
||
3C90000
|
remote allocation
|
page read and write
|
||
2A90000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
9ABD000
|
unkown
|
page read and write
|
||
A7BE000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
2A8B000
|
trusted library allocation
|
page execute and read and write
|
||
881B000
|
stack
|
page read and write
|
||
1C32000
|
heap
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
11293000
|
unkown
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
1207000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D7391000
|
unkown
|
page readonly
|
||
A738000
|
heap
|
page read and write
|
||
A342000
|
heap
|
page read and write
|
||
A758000
|
heap
|
page read and write
|
||
42C3000
|
trusted library allocation
|
page read and write
|
||
2270000
|
heap
|
page execute and read and write
|
||
4A90000
|
unkown
|
page read and write
|
||
915000
|
heap
|
page read and write
|
||
A315000
|
heap
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
A9FD000
|
unkown
|
page read and write
|
||
7FF5D776D000
|
unkown
|
page readonly
|
||
3060000
|
unkown
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
A325000
|
heap
|
page read and write
|
||
1C3E000
|
heap
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A333000
|
heap
|
page read and write
|
||
44CF000
|
trusted library allocation
|
page read and write
|
||
AC11000
|
heap
|
page read and write
|
||
53E1000
|
unkown
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
A833000
|
heap
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
BFB8000
|
stack
|
page read and write
|
||
E671000
|
unkown
|
page read and write
|
||
EF6000
|
trusted library allocation
|
page execute and read and write
|
||
42CC000
|
trusted library allocation
|
page read and write
|
||
A0D000
|
trusted library allocation
|
page execute and read and write
|
||
3170000
|
unkown
|
page read and write
|
||
B03B000
|
stack
|
page read and write
|
||
9A84000
|
unkown
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
13CA000
|
heap
|
page read and write
|
||
A21A000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
1270000
|
trusted library allocation
|
page execute and read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
113F000
|
stack
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
8DCB000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2CDE000
|
stack
|
page read and write
|
||
86D0000
|
unkown
|
page readonly
|
||
A818000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
AA2D000
|
heap
|
page read and write
|
||
7B00000
|
unkown
|
page readonly
|
||
4BE000
|
heap
|
page read and write
|
||
25F0000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
A02E000
|
stack
|
page read and write
|
||
2BE6000
|
trusted library allocation
|
page read and write
|
||
56CE000
|
stack
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
55A5000
|
trusted library allocation
|
page read and write
|
||
AA7F000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
AA43000
|
heap
|
page read and write
|
||
AC83000
|
heap
|
page read and write
|
||
42AA000
|
trusted library allocation
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
9FCD000
|
heap
|
page read and write
|
||
BD6000
|
heap
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
24B8000
|
trusted library allocation
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
9F8B000
|
heap
|
page read and write
|
||
7460000
|
unkown
|
page read and write
|
||
5D5000
|
heap
|
page read and write
|
||
222E000
|
stack
|
page read and write
|
||
A728000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
75FD000
|
unkown
|
page read and write
|
||
1462000
|
trusted library allocation
|
page read and write
|
||
A24D000
|
heap
|
page read and write
|
||
7FF5D758D000
|
unkown
|
page readonly
|
||
9F8D000
|
heap
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
DF7000
|
trusted library allocation
|
page execute and read and write
|
||
AB25000
|
heap
|
page read and write
|
||
42AE000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
A6C1000
|
heap
|
page read and write
|
||
7FF5D7360000
|
unkown
|
page readonly
|
||
A9F2000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
D56000
|
trusted library allocation
|
page execute and read and write
|
||
A882000
|
heap
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
1C65000
|
heap
|
page read and write
|
||
2705000
|
trusted library allocation
|
page read and write
|
||
12D8000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
C16000
|
trusted library allocation
|
page execute and read and write
|
||
285F000
|
heap
|
page read and write
|
||
4F11000
|
trusted library allocation
|
page read and write
|
||
42AF000
|
trusted library allocation
|
page read and write
|
||
2358000
|
trusted library allocation
|
page read and write
|
||
DDA000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
9FB000
|
stack
|
page read and write
|
||
26A0000
|
trusted library allocation
|
page read and write
|
||
105B000
|
stack
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
A4B000
|
trusted library allocation
|
page execute and read and write
|
||
4B7000
|
heap
|
page read and write
|
||
25A0000
|
heap
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
1142D000
|
unkown
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
7FF5D781A000
|
unkown
|
page readonly
|
||
4BE000
|
heap
|
page read and write
|
||
AA01000
|
unkown
|
page read and write
|
||
1369000
|
heap
|
page read and write
|
||
1281000
|
trusted library allocation
|
page read and write
|
||
9FAF000
|
stack
|
page read and write
|
||
588000
|
heap
|
page read and write
|
||
2433000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
1C5C000
|
heap
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page execute and read and write
|
||
7DD000
|
trusted library allocation
|
page execute and read and write
|
||
1C59000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
BF4000
|
trusted library allocation
|
page read and write
|
||
D5F000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
ACB7000
|
heap
|
page read and write
|
||
4EF4000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
805000
|
heap
|
page read and write
|
||
C78A000
|
unkown
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
4F04000
|
trusted library allocation
|
page read and write
|
||
12D8000
|
heap
|
page read and write
|
||
3100000
|
unkown
|
page read and write
|
||
B115000
|
heap
|
page read and write
|
||
AA4C000
|
heap
|
page read and write
|
||
1B80000
|
heap
|
page read and write
|
||
27F0000
|
unclassified section
|
page read and write
|
||
AC46000
|
heap
|
page read and write
|
||
42D9000
|
trusted library allocation
|
page read and write
|
||
AA02000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
1297000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
7FF5D76AF000
|
unkown
|
page readonly
|
||
C54A000
|
unkown
|
page read and write
|
||
7FF5D7075000
|
unkown
|
page readonly
|
||
3489000
|
stack
|
page read and write
|
||
C49000
|
unkown
|
page readonly
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
9FBF000
|
heap
|
page read and write
|
||
113FA000
|
unkown
|
page read and write
|
||
42AE000
|
trusted library allocation
|
page read and write
|
||
16FD000
|
heap
|
page read and write
|
||
4294000
|
trusted library allocation
|
page read and write
|
||
A979000
|
heap
|
page read and write
|
||
7FF5D760B000
|
unkown
|
page readonly
|
||
A00000
|
trusted library allocation
|
page read and write
|
||
A552000
|
heap
|
page read and write
|
||
4500000
|
trusted library allocation
|
page read and write
|
||
C78000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
4347000
|
trusted library allocation
|
page read and write
|
||
913000
|
trusted library allocation
|
page execute and read and write
|
||
1C66000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
9FC0000
|
heap
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
A6ED000
|
heap
|
page read and write
|
||
113E3000
|
unkown
|
page read and write
|
||
7FF5D75AF000
|
unkown
|
page readonly
|
||
5445000
|
trusted library allocation
|
page read and write
|
||
3780000
|
remote allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
113DA000
|
unkown
|
page read and write
|
||
26F4000
|
trusted library allocation
|
page read and write
|
||
AA18000
|
heap
|
page read and write
|
||
25C7000
|
trusted library allocation
|
page read and write
|
||
1C59000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
AE3000
|
trusted library allocation
|
page execute and read and write
|
||
FEE000
|
stack
|
page read and write
|
||
28C0000
|
unclassified section
|
page read and write
|
||
9AAC000
|
unkown
|
page read and write
|
||
A6EA000
|
heap
|
page read and write
|
||
AAE2000
|
heap
|
page read and write
|
||
1158B000
|
unkown
|
page read and write
|
||
EB5000
|
stack
|
page read and write
|
||
25A7000
|
trusted library allocation
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
8F6000
|
stack
|
page read and write
|
||
CB5000
|
heap
|
page read and write
|
||
3070000
|
unkown
|
page read and write
|
||
23A1000
|
trusted library allocation
|
page read and write
|
||
3780000
|
remote allocation
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
7FF5D71F9000
|
unkown
|
page readonly
|
||
AA07000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
7FF5D7236000
|
unkown
|
page readonly
|
||
7FF5CE33D000
|
unkown
|
page readonly
|
||
8500000
|
unkown
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
A335000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A6F5000
|
heap
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
12A3000
|
trusted library allocation
|
page execute and read and write
|
||
27BE000
|
stack
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
ACBE000
|
heap
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
42AC000
|
trusted library allocation
|
page read and write
|
||
A4A000
|
trusted library allocation
|
page execute and read and write
|
||
F20000
|
heap
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
434B000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
1C3F000
|
heap
|
page read and write
|
||
B11E000
|
heap
|
page read and write
|
||
A6B9000
|
heap
|
page read and write
|
||
A251000
|
unkown
|
page read and write
|
||
26DD000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
9E2000
|
trusted library allocation
|
page read and write
|
||
A7E8000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
2A35000
|
trusted library allocation
|
page read and write
|
||
115D000
|
trusted library allocation
|
page execute and read and write
|
||
4F0E000
|
trusted library allocation
|
page read and write
|
||
A35E000
|
heap
|
page read and write
|
||
7FF5D77DA000
|
unkown
|
page readonly
|
||
A9D7000
|
heap
|
page read and write
|
||
A7FF000
|
heap
|
page read and write
|
||
A240000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
117E000
|
stack
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
A7CA000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
B67000
|
trusted library allocation
|
page execute and read and write
|
||
413F000
|
stack
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
287F000
|
trusted library allocation
|
page read and write
|
||
A340000
|
heap
|
page read and write
|
||
10FAF000
|
unkown
|
page read and write
|
||
4294000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
7FF5D706E000
|
unkown
|
page readonly
|
||
9F94000
|
heap
|
page read and write
|
||
FC1000
|
trusted library allocation
|
page read and write
|
||
C61D000
|
unkown
|
page read and write
|
||
C9E6000
|
unkown
|
page read and write
|
||
4468000
|
trusted library allocation
|
page read and write
|
||
42E2000
|
trusted library allocation
|
page read and write
|
||
7FF5D723F000
|
unkown
|
page readonly
|
||
A6FB000
|
heap
|
page read and write
|
||
6242000
|
unkown
|
page readonly
|
||
A99F000
|
heap
|
page read and write
|
||
A2A0000
|
heap
|
page read and write
|
||
A2D7000
|
unkown
|
page read and write
|
||
7FF5D7591000
|
unkown
|
page readonly
|
||
1FDE000
|
stack
|
page read and write
|
||
C0BA000
|
stack
|
page read and write
|
||
A3DF000
|
heap
|
page read and write
|
||
ADA3000
|
heap
|
page read and write
|
||
A785000
|
heap
|
page read and write
|
||
1C32000
|
heap
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
26E2000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
4A71000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
7FF5D74C3000
|
unkown
|
page readonly
|
||
1587000
|
trusted library allocation
|
page execute and read and write
|
||
11291000
|
unkown
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
59FE000
|
stack
|
page read and write
|
||
42BB000
|
trusted library allocation
|
page read and write
|
||
1C2C000
|
heap
|
page read and write
|
||
A7F8000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4410000
|
heap
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page execute and read and write
|
||
3530000
|
unkown
|
page read and write
|
||
1C56000
|
heap
|
page read and write
|
||
897E000
|
stack
|
page read and write
|
||
FC7000
|
trusted library allocation
|
page read and write
|
||
1605000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
9F92000
|
heap
|
page read and write
|
||
2F93000
|
heap
|
page read and write
|
||
F2B000
|
heap
|
page read and write
|
||
A93A000
|
heap
|
page read and write
|
||
AC1000
|
trusted library allocation
|
page read and write
|
||
1376000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A28B000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
A41C000
|
heap
|
page read and write
|
||
A23000
|
trusted library allocation
|
page execute and read and write
|
||
4B7000
|
heap
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
10F6000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
1553000
|
trusted library allocation
|
page execute and read and write
|
||
4BE000
|
heap
|
page read and write
|
||
805000
|
heap
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
3DE7000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
26D6000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A913000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
7FF5D729E000
|
unkown
|
page readonly
|
||
42A2000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
1202000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
unkown
|
page readonly
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
2D3B000
|
trusted library allocation
|
page execute and read and write
|
||
AA41000
|
heap
|
page read and write
|
||
F3F000
|
stack
|
page read and write
|
||
42F6000
|
trusted library allocation
|
page read and write
|
||
1129D000
|
unkown
|
page read and write
|
||
BD1000
|
unkown
|
page execute read
|
||
F52A000
|
heap
|
page read and write
|
||
360D000
|
stack
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
A33E000
|
heap
|
page read and write
|
||
A24000
|
trusted library allocation
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
DDA000
|
trusted library allocation
|
page execute and read and write
|
||
A94B000
|
heap
|
page read and write
|
||
F37000
|
heap
|
page read and write
|
||
7631000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
430C000
|
trusted library allocation
|
page read and write
|
||
7FF5D7202000
|
unkown
|
page readonly
|
||
A55000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page execute and read and write
|
||
9A9E000
|
unkown
|
page read and write
|
||
F43C000
|
unkown
|
page read and write
|
||
B48000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
429F000
|
trusted library allocation
|
page read and write
|
||
A876000
|
heap
|
page read and write
|
||
2EC1000
|
trusted library allocation
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
5005000
|
trusted library allocation
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
105B3000
|
unkown
|
page read and write
|
||
7FF5D75C1000
|
unkown
|
page readonly
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
4FF7000
|
trusted library allocation
|
page read and write
|
||
2801000
|
trusted library allocation
|
page read and write
|
||
7FF5D77A8000
|
unkown
|
page readonly
|
||
4FD6000
|
trusted library allocation
|
page read and write
|
||
7DF4F2471000
|
unkown
|
page execute read
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
434B000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
B559000
|
stack
|
page read and write
|
||
AA66000
|
heap
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
2A6F000
|
stack
|
page read and write
|
||
42CC000
|
trusted library allocation
|
page read and write
|
||
A880000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
BC7000
|
heap
|
page read and write
|
||
2406000
|
trusted library allocation
|
page read and write
|
||
26CA000
|
trusted library allocation
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
A753000
|
heap
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
297F000
|
heap
|
page read and write
|
||
11299000
|
unkown
|
page read and write
|
||
A82A000
|
heap
|
page read and write
|
||
F2E000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page execute and read and write
|
||
DE2000
|
trusted library allocation
|
page read and write
|
||
283A000
|
heap
|
page read and write
|
||
42A4000
|
trusted library allocation
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
9820000
|
unkown
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
7FF5D75B3000
|
unkown
|
page readonly
|
||
2670000
|
trusted library allocation
|
page read and write
|
||
1129F000
|
unkown
|
page read and write
|
||
42B4000
|
trusted library allocation
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
CD4000
|
trusted library allocation
|
page read and write
|
||
ABFC000
|
heap
|
page read and write
|
||
7FF5D7752000
|
unkown
|
page readonly
|
||
A981000
|
heap
|
page read and write
|
||
A344000
|
heap
|
page read and write
|
||
A263000
|
heap
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
7FF5D7267000
|
unkown
|
page readonly
|
||
1560000
|
heap
|
page read and write
|
||
7FF5D744E000
|
unkown
|
page readonly
|
||
800000
|
heap
|
page read and write
|
||
C669000
|
unkown
|
page read and write
|
||
1153000
|
trusted library allocation
|
page execute and read and write
|
||
650000
|
heap
|
page read and write
|
||
EF6000
|
stack
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
11C1000
|
unkown
|
page read and write
|
||
243D000
|
trusted library allocation
|
page read and write
|
||
379D000
|
stack
|
page read and write
|
||
42DB000
|
trusted library allocation
|
page read and write
|
||
EB1000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
42FB000
|
trusted library allocation
|
page read and write
|
||
4986000
|
unkown
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
A8A2000
|
heap
|
page read and write
|
||
25F5000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
9AC3000
|
unkown
|
page read and write
|
||
AC3B000
|
heap
|
page read and write
|
||
3110000
|
unkown
|
page readonly
|
||
1C63000
|
heap
|
page read and write
|
||
C460000
|
unkown
|
page read and write
|
||
AC56000
|
heap
|
page read and write
|
||
A3AA000
|
unkown
|
page read and write
|
||
25CE000
|
stack
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
A9CD000
|
heap
|
page read and write
|
||
8ECC000
|
stack
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
AA5E000
|
heap
|
page read and write
|
||
A3EE000
|
heap
|
page read and write
|
||
54E2000
|
trusted library allocation
|
page read and write
|
||
CCC000
|
stack
|
page read and write
|
||
11293000
|
unkown
|
page read and write
|
||
7FF5D76D5000
|
unkown
|
page readonly
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A219000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3070000
|
unkown
|
page read and write
|
||
CEE000
|
stack
|
page read and write
|
||
7AC0000
|
unkown
|
page read and write
|
||
A34C000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
A44C000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
9FB3000
|
heap
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
9F86000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
2435000
|
trusted library allocation
|
page read and write
|
||
A86C000
|
heap
|
page read and write
|
||
942C000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4BE000
|
heap
|
page read and write
|
||
391B000
|
stack
|
page read and write
|
||
1C5C000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A3B9000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FF5D779E000
|
unkown
|
page readonly
|
||
4BE000
|
heap
|
page read and write
|
||
7FF5D7694000
|
unkown
|
page readonly
|
||
A33C000
|
heap
|
page read and write
|
||
AB8D000
|
heap
|
page read and write
|
||
A342000
|
heap
|
page read and write
|
||
ACA7000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
42E5000
|
trusted library allocation
|
page read and write
|
||
42CA000
|
trusted library allocation
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
2887000
|
trusted library allocation
|
page read and write
|
||
15B0000
|
trusted library allocation
|
page execute and read and write
|
||
3060000
|
unkown
|
page read and write
|
||
11D5000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
A8B5000
|
heap
|
page read and write
|
||
A24D000
|
heap
|
page read and write
|
||
9F81000
|
heap
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1298000
|
heap
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
26D4000
|
trusted library allocation
|
page read and write
|
||
1287000
|
heap
|
page read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
A548000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
1C2F000
|
heap
|
page read and write
|
||
7FF5D7438000
|
unkown
|
page readonly
|
||
4BE000
|
heap
|
page read and write
|
||
A987000
|
heap
|
page read and write
|
||
760F000
|
unkown
|
page read and write
|
||
63D000
|
heap
|
page read and write
|
||
A253000
|
heap
|
page read and write
|
||
9F97000
|
heap
|
page read and write
|
||
7FF5D7289000
|
unkown
|
page readonly
|
||
A210000
|
heap
|
page read and write
|
||
A7CD000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
760B000
|
unkown
|
page read and write
|
||
AC1A000
|
heap
|
page read and write
|
||
C92000
|
trusted library allocation
|
page read and write
|
||
134F000
|
heap
|
page read and write
|
||
B4BF000
|
stack
|
page read and write
|
||
42D2000
|
trusted library allocation
|
page read and write
|
||
10BC000
|
heap
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
E00000
|
unkown
|
page readonly
|
||
4BE000
|
heap
|
page read and write
|
||
8C2000
|
heap
|
page read and write
|
||
7FF5D6A4B000
|
unkown
|
page readonly
|
||
4B7000
|
heap
|
page read and write
|
||
AC0C000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
51D2000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
ACB000
|
stack
|
page read and write
|
||
AC21000
|
heap
|
page read and write
|
||
11296000
|
unkown
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
AE1D000
|
stack
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
AC42000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
8500000
|
unkown
|
page read and write
|
||
14CF000
|
stack
|
page read and write
|
||
8A0000
|
trusted library allocation
|
page read and write
|
||
5DC000
|
heap
|
page read and write
|
||
25B7000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
7FF5D76DA000
|
unkown
|
page readonly
|
||
A33E000
|
heap
|
page read and write
|
||
26B3000
|
trusted library allocation
|
page read and write
|
||
7DF4F2461000
|
unkown
|
page execute read
|
||
A942000
|
heap
|
page read and write
|
||
114E6000
|
unkown
|
page read and write
|
||
7FF5D7073000
|
unkown
|
page readonly
|
||
A9E9000
|
heap
|
page read and write
|
||
F434000
|
unkown
|
page read and write
|
||
1C51000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
4293000
|
trusted library allocation
|
page read and write
|
||
D58000
|
stack
|
page read and write
|
||
3AB000
|
stack
|
page read and write
|
||
F438000
|
unkown
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7B80000
|
unkown
|
page readonly
|
||
1C63000
|
heap
|
page read and write
|
||
7FF5D768B000
|
unkown
|
page readonly
|
||
4B7000
|
heap
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
3310000
|
unkown
|
page read and write
|
||
42DC000
|
trusted library allocation
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
3AB7000
|
trusted library allocation
|
page read and write
|
||
7FF5D75FF000
|
unkown
|
page readonly
|
||
26DE000
|
trusted library allocation
|
page read and write
|
||
AED000
|
trusted library allocation
|
page execute and read and write
|
||
69F000
|
heap
|
page read and write
|
||
A21B000
|
heap
|
page read and write
|
||
26FF000
|
stack
|
page read and write
|
||
C36000
|
heap
|
page read and write
|
||
42C2000
|
trusted library allocation
|
page read and write
|
||
429E000
|
trusted library allocation
|
page read and write
|
||
60B000
|
heap
|
page read and write
|
||
12FB000
|
heap
|
page read and write
|
||
10B5000
|
unkown
|
page execute read
|
||
45EF000
|
stack
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
79B000
|
stack
|
page read and write
|
||
10574000
|
unkown
|
page read and write
|
||
A6F1000
|
heap
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
35B0000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
11293000
|
unkown
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page read and write
|
||
2625000
|
trusted library allocation
|
page read and write
|
||
A416000
|
unkown
|
page read and write
|
||
C617000
|
unkown
|
page read and write
|
||
7FF5D75E9000
|
unkown
|
page readonly
|
||
7FF5D71C8000
|
unkown
|
page readonly
|
||
A95A000
|
heap
|
page read and write
|
||
F82000
|
trusted library allocation
|
page read and write
|
||
13B6000
|
heap
|
page read and write
|
||
DA6000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
1C3D000
|
heap
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
3531000
|
trusted library allocation
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
7DF4F2481000
|
unkown
|
page execute read
|
||
A40000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
1C58000
|
heap
|
page read and write
|
||
49D6000
|
unkown
|
page read and write
|
||
85B000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
2420000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
AA0D000
|
heap
|
page read and write
|
||
A26A000
|
heap
|
page read and write
|
||
105B000
|
stack
|
page read and write
|
||
1338000
|
heap
|
page read and write
|
||
C4C6000
|
unkown
|
page read and write
|
||
1180000
|
trusted library allocation
|
page read and write
|
||
7FF5CE343000
|
unkown
|
page readonly
|
||
4B7000
|
heap
|
page read and write
|
||
113BF000
|
unkown
|
page read and write
|
||
A36000
|
trusted library allocation
|
page execute and read and write
|
||
1C4A000
|
heap
|
page read and write
|
||
F87000
|
trusted library allocation
|
page execute and read and write
|
||
57A000
|
stack
|
page read and write
|
||
7FF5D75EE000
|
unkown
|
page readonly
|
||
8500000
|
unkown
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
AB0B000
|
heap
|
page read and write
|
||
F8B000
|
trusted library allocation
|
page execute and read and write
|
||
8D3D000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
D20000
|
trusted library allocation
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
1287000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
747000
|
heap
|
page read and write
|
||
25FE000
|
stack
|
page read and write
|
||
429F000
|
trusted library allocation
|
page read and write
|
||
47C3000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
A994000
|
heap
|
page read and write
|
||
7FF5D6BEF000
|
unkown
|
page readonly
|
||
12CE000
|
stack
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
52FF000
|
stack
|
page read and write
|
||
CF6000
|
trusted library allocation
|
page execute and read and write
|
||
A722000
|
heap
|
page read and write
|
||
26F6000
|
trusted library allocation
|
page read and write
|
||
ABCD000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
7FF5D74F2000
|
unkown
|
page readonly
|
||
8500000
|
unkown
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
25BE000
|
stack
|
page read and write
|
||
A44A000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
42AA000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
4600000
|
heap
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
431C000
|
trusted library allocation
|
page read and write
|
||
2958000
|
trusted library allocation
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
A2E6000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
AAB8000
|
heap
|
page read and write
|
||
7AF1000
|
unkown
|
page read and write
|
||
3120000
|
unkown
|
page read and write
|
||
49BB000
|
unkown
|
page read and write
|
||
11297000
|
unkown
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
C483000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
C5B000
|
stack
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
362D000
|
unkown
|
page read and write
|
||
62A000
|
heap
|
page read and write
|
||
DD6000
|
trusted library allocation
|
page execute and read and write
|
||
504E000
|
stack
|
page read and write
|
||
F31000
|
trusted library allocation
|
page read and write
|
||
155D000
|
trusted library allocation
|
page execute and read and write
|
||
2550000
|
trusted library allocation
|
page read and write
|
||
12BE000
|
stack
|
page read and write
|
||
2FB000
|
stack
|
page read and write
|
||
1C64000
|
heap
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
C653000
|
unkown
|
page read and write
|
||
1C3D000
|
heap
|
page read and write
|
||
1C24000
|
heap
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
A778000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
9B41000
|
unkown
|
page read and write
|
||
A7B6000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
2606000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
2431000
|
trusted library allocation
|
page read and write
|
||
1440000
|
trusted library allocation
|
page read and write
|
||
2A8E000
|
trusted library allocation
|
page read and write
|
||
11B6000
|
heap
|
page read and write
|
||
3A23000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7FF5D720A000
|
unkown
|
page readonly
|
||
154F000
|
stack
|
page read and write
|
||
7FF5D71EF000
|
unkown
|
page readonly
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
AB4E000
|
heap
|
page read and write
|
||
C5A000
|
unkown
|
page write copy
|
||
C90000
|
trusted library allocation
|
page execute and read and write
|
||
1C31000
|
heap
|
page read and write
|
||
8A00000
|
unkown
|
page read and write
|
||
42DA000
|
trusted library allocation
|
page read and write
|
||
1187000
|
trusted library allocation
|
page execute and read and write
|
||
A79B000
|
heap
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
CB3000
|
heap
|
page read and write
|
||
293D000
|
trusted library allocation
|
page read and write
|
||
C4DC000
|
unkown
|
page read and write
|
||
42CC000
|
trusted library allocation
|
page read and write
|
||
60B000
|
heap
|
page read and write
|
||
1C5E000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
283D000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
25A1000
|
trusted library allocation
|
page read and write
|
||
7FA000
|
trusted library allocation
|
page execute and read and write
|
||
9F96000
|
heap
|
page read and write
|
||
2B6D000
|
stack
|
page read and write
|
||
12CE000
|
heap
|
page read and write
|
||
AA8C000
|
heap
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
BEF000
|
heap
|
page read and write
|
||
AB21000
|
heap
|
page read and write
|
||
2828000
|
trusted library allocation
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
10672000
|
unkown
|
page read and write
|
||
12FC000
|
heap
|
page read and write
|
||
137B000
|
heap
|
page read and write
|
||
7FF5D7808000
|
unkown
|
page readonly
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
359D000
|
trusted library allocation
|
page read and write
|
||
23DC000
|
trusted library allocation
|
page read and write
|
||
2A7B000
|
trusted library allocation
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
700000
|
trusted library allocation
|
page read and write
|
||
A733000
|
heap
|
page read and write
|
||
259E000
|
stack
|
page read and write
|
||
1C5E000
|
heap
|
page read and write
|
||
A8AB000
|
heap
|
page read and write
|
||
1BCC000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
42F3000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
A916000
|
heap
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
1176000
|
trusted library allocation
|
page execute and read and write
|
||
10A0000
|
heap
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
F0B000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
AB08000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
1C4A000
|
heap
|
page read and write
|
||
A273000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
145A000
|
trusted library allocation
|
page execute and read and write
|
||
D34000
|
trusted library allocation
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
D67000
|
trusted library allocation
|
page execute and read and write
|
||
E70000
|
heap
|
page read and write
|
||
7FF5D7641000
|
unkown
|
page readonly
|
||
A346000
|
heap
|
page read and write
|
||
2A87000
|
trusted library allocation
|
page execute and read and write
|
||
D6E000
|
stack
|
page read and write
|
||
914000
|
trusted library allocation
|
page read and write
|
||
ABAE000
|
heap
|
page read and write
|
||
6CF000
|
stack
|
page read and write
|
||
F421000
|
unkown
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
9F96000
|
heap
|
page read and write
|
||
8B3000
|
trusted library allocation
|
page execute and read and write
|
||
AA08000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
588C000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
2621000
|
trusted library allocation
|
page read and write
|
||
8F5000
|
heap
|
page read and write
|
||
997C000
|
stack
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
A98F000
|
heap
|
page read and write
|
||
1BD1000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
4FDB000
|
trusted library allocation
|
page read and write
|
||
E35000
|
heap
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A74D000
|
heap
|
page read and write
|
||
C29000
|
heap
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
A6AA000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
C27000
|
trusted library allocation
|
page execute and read and write
|
||
10002000
|
unkown
|
page readonly
|
||
26FD000
|
trusted library allocation
|
page read and write
|
||
B62000
|
trusted library allocation
|
page read and write
|
||
A8A0000
|
heap
|
page read and write
|
||
2661000
|
trusted library allocation
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A241000
|
heap
|
page read and write
|
||
15C1000
|
trusted library allocation
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
2AD8000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
heap
|
page read and write
|
||
A9A0000
|
unkown
|
page read and write
|
||
D6B000
|
heap
|
page read and write
|
||
7FF5D7703000
|
unkown
|
page readonly
|
||
1096000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
BF3000
|
trusted library allocation
|
page execute and read and write
|
||
8B4000
|
trusted library allocation
|
page read and write
|
||
552C000
|
trusted library allocation
|
page read and write
|
||
AC5E000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
1BCF000
|
heap
|
page read and write
|
||
3A71000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
26CE000
|
trusted library allocation
|
page read and write
|
||
1467000
|
trusted library allocation
|
page execute and read and write
|
||
D90000
|
trusted library allocation
|
page execute and read and write
|
||
3A77000
|
trusted library allocation
|
page read and write
|
||
1049000
|
heap
|
page read and write
|
||
BC6000
|
stack
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
2AB5000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
5336000
|
trusted library allocation
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
2280000
|
trusted library allocation
|
page execute and read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
A910000
|
heap
|
page read and write
|
||
42A9000
|
trusted library allocation
|
page read and write
|
||
7FF5D7784000
|
unkown
|
page readonly
|
||
3060000
|
unkown
|
page read and write
|
||
AA00000
|
heap
|
page read and write
|
||
105FB000
|
unkown
|
page read and write
|
||
1154000
|
trusted library allocation
|
page read and write
|
||
5349000
|
trusted library allocation
|
page read and write
|
||
3DE5000
|
trusted library allocation
|
page read and write
|
||
C9B000
|
trusted library allocation
|
page execute and read and write
|
||
AC81000
|
heap
|
page read and write
|
||
760D000
|
unkown
|
page read and write
|
||
7FF5D77E9000
|
unkown
|
page readonly
|
||
1BED000
|
heap
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A724000
|
heap
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
1C2A000
|
heap
|
page read and write
|
||
30B000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
C800000
|
unkown
|
page read and write
|
||
A5B000
|
trusted library allocation
|
page execute and read and write
|
||
9B76000
|
unkown
|
page read and write
|
||
3A1C000
|
stack
|
page read and write
|
||
5DF000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
ACC9000
|
heap
|
page read and write
|
||
4F75000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
2A71000
|
trusted library allocation
|
page read and write
|
||
A34A000
|
heap
|
page read and write
|
||
42CC000
|
trusted library allocation
|
page read and write
|
||
1AF9000
|
stack
|
page read and write
|
||
D6B000
|
trusted library allocation
|
page execute and read and write
|
||
A46000
|
heap
|
page read and write
|
||
A242000
|
heap
|
page read and write
|
||
51CC000
|
trusted library allocation
|
page read and write
|
||
A349000
|
heap
|
page read and write
|
||
7FF5D7309000
|
unkown
|
page readonly
|
||
7E5000
|
heap
|
page read and write
|
||
A42000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
4298000
|
trusted library allocation
|
page read and write
|
||
100F000
|
heap
|
page read and write
|
||
51D1000
|
trusted library allocation
|
page read and write
|
||
A2DF000
|
heap
|
page read and write
|
||
60E000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
9A8C000
|
unkown
|
page read and write
|
||
429F000
|
trusted library allocation
|
page read and write
|
||
11A7000
|
trusted library allocation
|
page read and write
|
||
113D1000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
7FF5D747F000
|
unkown
|
page readonly
|
||
E4F000
|
heap
|
page read and write
|
||
7FF5D71EA000
|
unkown
|
page readonly
|
||
9FB8000
|
heap
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
A845000
|
heap
|
page read and write
|
||
C5B000
|
unkown
|
page execute and read and write
|
||
1C59000
|
heap
|
page read and write
|
||
1C6F000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
C47F000
|
unkown
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1C6F000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
A45D000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
42C3000
|
trusted library allocation
|
page read and write
|
||
26D8000
|
trusted library allocation
|
page read and write
|
||
977E000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
557E000
|
trusted library allocation
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
A47000
|
trusted library allocation
|
page execute and read and write
|
||
AB01000
|
heap
|
page read and write
|
||
430C000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
FE6000
|
trusted library allocation
|
page execute and read and write
|
||
AB98000
|
heap
|
page read and write
|
||
A350000
|
heap
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D7280000
|
unkown
|
page readonly
|
||
A03000
|
trusted library allocation
|
page execute and read and write
|
||
E7E000
|
stack
|
page read and write
|
||
BBB000
|
stack
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
1250000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
9EAE000
|
stack
|
page read and write
|
||
A93E000
|
heap
|
page read and write
|
||
A31C000
|
heap
|
page read and write
|
||
7FF5D74FA000
|
unkown
|
page readonly
|
||
55B6000
|
trusted library allocation
|
page read and write
|
||
1434000
|
trusted library allocation
|
page read and write
|
||
1C64000
|
heap
|
page read and write
|
||
3740000
|
heap
|
page read and write
|
||
AD22000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1BB2000
|
heap
|
page read and write
|
||
A7EE000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
42C6000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
4EFE000
|
trusted library allocation
|
page read and write
|
||
7FF5D749B000
|
unkown
|
page readonly
|
||
42F4000
|
trusted library allocation
|
page read and write
|
||
42C6000
|
trusted library allocation
|
page read and write
|
||
4A16000
|
unkown
|
page read and write
|
||
2680000
|
trusted library allocation
|
page read and write
|
||
A436000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
8BD000
|
trusted library allocation
|
page execute and read and write
|
||
F21000
|
trusted library allocation
|
page read and write
|
||
1C5C000
|
heap
|
page read and write
|
||
1BA7000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
7FF5D748C000
|
unkown
|
page readonly
|
||
A5D7000
|
heap
|
page read and write
|
||
2500000
|
heap
|
page execute and read and write
|
||
7FF5D7272000
|
unkown
|
page readonly
|
||
B14E000
|
heap
|
page read and write
|
||
51D4000
|
trusted library allocation
|
page read and write
|
||
8C39000
|
stack
|
page read and write
|
||
A9DF000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
55C0000
|
unkown
|
page readonly
|
||
C496000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
AB94000
|
heap
|
page read and write
|
||
927D000
|
stack
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
1085000
|
trusted library allocation
|
page read and write
|
||
C22000
|
trusted library allocation
|
page read and write
|
||
7FF5D71E0000
|
unkown
|
page readonly
|
||
7FF5D778A000
|
unkown
|
page readonly
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
7FF5D75BF000
|
unkown
|
page readonly
|
||
4B7000
|
heap
|
page read and write
|
||
A2CC000
|
heap
|
page read and write
|
||
7FF5D7745000
|
unkown
|
page readonly
|
||
114BA000
|
unkown
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
130D000
|
heap
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
2710000
|
heap
|
page execute and read and write
|
||
7FF5D7077000
|
unkown
|
page readonly
|
||
761E000
|
unkown
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
9FBD000
|
heap
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
9F90000
|
heap
|
page read and write
|
||
A3F8000
|
heap
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
1C67000
|
heap
|
page read and write
|
||
7FF5D71A6000
|
unkown
|
page readonly
|
||
D0E000
|
stack
|
page read and write
|
||
8A46000
|
unkown
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
4303000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
5AFF000
|
stack
|
page read and write
|
||
ACE4000
|
heap
|
page read and write
|
||
9FA6000
|
heap
|
page read and write
|
||
84D000
|
trusted library allocation
|
page execute and read and write
|
||
BAC000
|
stack
|
page read and write
|
||
113A3000
|
unkown
|
page read and write
|
||
7FF5D7700000
|
unkown
|
page readonly
|
||
A772000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
42BC000
|
trusted library allocation
|
page read and write
|
||
2A74000
|
trusted library allocation
|
page read and write
|
||
7FF5D71DA000
|
unkown
|
page readonly
|
||
4BE000
|
heap
|
page read and write
|
||
7FF5D774C000
|
unkown
|
page readonly
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
9A92000
|
unkown
|
page read and write
|
||
4A2000
|
unkown
|
page readonly
|
||
8500000
|
unkown
|
page read and write
|
||
35D1000
|
unkown
|
page read and write
|
||
A318000
|
heap
|
page read and write
|
||
280F000
|
trusted library allocation
|
page read and write
|
||
A859000
|
heap
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
C625000
|
unkown
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page execute and read and write
|
||
5891000
|
trusted library allocation
|
page read and write
|
||
1129D000
|
unkown
|
page read and write
|
||
A9E4000
|
heap
|
page read and write
|
||
A9D6000
|
heap
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
11A1000
|
trusted library allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
8E4E000
|
stack
|
page read and write
|
||
A6C3000
|
heap
|
page read and write
|
||
A24D000
|
heap
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
A44E000
|
heap
|
page read and write
|
||
A31B000
|
heap
|
page read and write
|
||
9F94000
|
heap
|
page read and write
|
||
2708000
|
trusted library allocation
|
page read and write
|
||
27D4000
|
heap
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
1107000
|
trusted library allocation
|
page execute and read and write
|
||
12C7000
|
heap
|
page read and write
|
||
1C28000
|
heap
|
page read and write
|
||
A316000
|
heap
|
page read and write
|
||
42D9000
|
trusted library allocation
|
page read and write
|
||
D26000
|
heap
|
page read and write
|
||
AB6A000
|
heap
|
page read and write
|
||
17F7000
|
heap
|
page read and write
|
||
A286000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A7F1000
|
heap
|
page read and write
|
||
ACAB000
|
heap
|
page read and write
|
||
9FC2000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
A7C6000
|
heap
|
page read and write
|
||
2FD1000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
35D3000
|
unkown
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
AB17000
|
heap
|
page read and write
|
||
2DD6000
|
trusted library allocation
|
page read and write
|
||
42A2000
|
trusted library allocation
|
page read and write
|
||
7C31000
|
unkown
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
23AF000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
44C0000
|
heap
|
page read and write
|
||
ABE2000
|
heap
|
page read and write
|
||
5560000
|
heap
|
page execute and read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
7FF5D76CD000
|
unkown
|
page readonly
|
||
AADD000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
23C8000
|
trusted library allocation
|
page read and write
|
||
2442000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
9FC4000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
91F0000
|
unkown
|
page readonly
|
||
35FA000
|
unkown
|
page read and write
|
||
AAA0000
|
heap
|
page read and write
|
||
A9B000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
7FF5D7799000
|
unkown
|
page readonly
|
||
590000
|
heap
|
page read and write
|
||
C450000
|
unkown
|
page read and write
|
||
1153D000
|
unkown
|
page read and write
|
||
4347000
|
trusted library allocation
|
page read and write
|
||
76F8000
|
unkown
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
7FF5D770F000
|
unkown
|
page readonly
|
||
4B7000
|
heap
|
page read and write
|
||
85BE000
|
stack
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
1C59000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
255E000
|
stack
|
page read and write
|
||
42F3000
|
trusted library allocation
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
7FF5D77E3000
|
unkown
|
page readonly
|
||
A00000
|
heap
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
1C5E000
|
heap
|
page read and write
|
||
5584000
|
trusted library allocation
|
page read and write
|
||
A233000
|
unkown
|
page read and write
|
||
4297000
|
trusted library allocation
|
page read and write
|
||
C24E000
|
stack
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
DE7000
|
trusted library allocation
|
page execute and read and write
|
||
2710000
|
trusted library allocation
|
page read and write
|
||
8E2000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
unkown
|
page read and write
|
||
42C8000
|
trusted library allocation
|
page read and write
|
||
1C5C000
|
heap
|
page read and write
|
||
A3A000
|
trusted library allocation
|
page execute and read and write
|
||
138D000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page read and write
|
||
AC01000
|
heap
|
page read and write
|
||
4293000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
551E000
|
stack
|
page read and write
|
||
2941000
|
trusted library allocation
|
page read and write
|
||
9FD4000
|
heap
|
page read and write
|
||
1C27000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
8F6000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
16DE000
|
heap
|
page read and write
|
||
35CD000
|
unkown
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
16EB000
|
heap
|
page read and write
|
||
DDF000
|
stack
|
page read and write
|
||
A3D6000
|
heap
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
10D7000
|
heap
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
89F9000
|
stack
|
page read and write
|
||
AC14000
|
heap
|
page read and write
|
||
7FF5D7482000
|
unkown
|
page readonly
|
||
4BE000
|
heap
|
page read and write
|
||
249F000
|
stack
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
768E000
|
unkown
|
page read and write
|
||
A928000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
ABC2000
|
heap
|
page read and write
|
||
BD0000
|
unkown
|
page readonly
|
||
3DE1000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
B0E0000
|
unkown
|
page readonly
|
||
3EF7000
|
trusted library allocation
|
page read and write
|
||
A764000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
35B3000
|
unkown
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
A342000
|
heap
|
page read and write
|
||
9D6000
|
trusted library allocation
|
page execute and read and write
|
||
D3D000
|
trusted library allocation
|
page execute and read and write
|
||
DA0000
|
heap
|
page read and write
|
||
A31A000
|
heap
|
page read and write
|
||
A84D000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
96FE000
|
stack
|
page read and write
|
||
A325000
|
heap
|
page read and write
|
||
A316000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
2702000
|
trusted library allocation
|
page read and write
|
||
43E8000
|
trusted library allocation
|
page read and write
|
||
F10000
|
trusted library allocation
|
page execute and read and write
|
||
C2B000
|
trusted library allocation
|
page execute and read and write
|
||
A95F000
|
heap
|
page read and write
|
||
1C4A000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
A31C000
|
heap
|
page read and write
|
||
1156A000
|
unkown
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
26B7000
|
trusted library allocation
|
page read and write
|
||
11DF000
|
stack
|
page read and write
|
||
910000
|
trusted library allocation
|
page read and write
|
||
7FF5D7407000
|
unkown
|
page readonly
|
||
44EE000
|
stack
|
page read and write
|
||
830000
|
trusted library allocation
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
AA78000
|
heap
|
page read and write
|
||
D02000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
23F0000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
272E000
|
trusted library allocation
|
page read and write
|
||
1C56000
|
heap
|
page read and write
|
||
AC9C000
|
heap
|
page read and write
|
||
42AA000
|
trusted library allocation
|
page read and write
|
||
1BCC000
|
heap
|
page read and write
|
||
AC0E000
|
heap
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
C27000
|
trusted library allocation
|
page execute and read and write
|
||
1C5F000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
AB31000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
A95C000
|
heap
|
page read and write
|
||
B0A000
|
trusted library allocation
|
page execute and read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
AAFD000
|
heap
|
page read and write
|
||
4293000
|
trusted library allocation
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
A421000
|
heap
|
page read and write
|
||
120B000
|
trusted library allocation
|
page execute and read and write
|
||
C61B000
|
unkown
|
page read and write
|
||
9F8A000
|
heap
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
1B8A000
|
heap
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
1157A000
|
unkown
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
B6B000
|
trusted library allocation
|
page execute and read and write
|
||
7E58000
|
stack
|
page read and write
|
||
20DF000
|
stack
|
page read and write
|
||
A237000
|
heap
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
A9DF000
|
unkown
|
page read and write
|
||
3280000
|
unkown
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
22FC000
|
stack
|
page read and write
|
||
80B000
|
trusted library allocation
|
page execute and read and write
|
||
ABDD000
|
heap
|
page read and write
|
||
C7BE000
|
unkown
|
page read and write
|
||
A944000
|
heap
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
9F8D000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
ACC1000
|
heap
|
page read and write
|
||
3561000
|
trusted library allocation
|
page read and write
|
||
3520000
|
unkown
|
page readonly
|
||
9FCA000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
ABE5000
|
heap
|
page read and write
|
||
9A96000
|
unkown
|
page read and write
|
||
C63000
|
trusted library allocation
|
page execute and read and write
|
||
3060000
|
unkown
|
page read and write
|
||
A7FD000
|
heap
|
page read and write
|
||
7686000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
DF9000
|
heap
|
page read and write
|
||
429C000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
trusted library allocation
|
page read and write
|
||
AC7000
|
trusted library allocation
|
page read and write
|
||
7C80000
|
unkown
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
44D0000
|
heap
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
42A2000
|
trusted library allocation
|
page read and write
|
||
1BED000
|
heap
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
AA8E000
|
heap
|
page read and write
|
||
A33B000
|
heap
|
page read and write
|
||
1BCE000
|
heap
|
page read and write
|
||
106F000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
113A8000
|
unkown
|
page read and write
|
||
9F81000
|
heap
|
page read and write
|
||
4290000
|
trusted library allocation
|
page read and write
|
||
26B5000
|
trusted library allocation
|
page read and write
|
||
ACC3000
|
heap
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
BB9E000
|
stack
|
page read and write
|
||
A35A000
|
heap
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
AC38000
|
heap
|
page read and write
|
||
27FF000
|
stack
|
page read and write
|
||
42E0000
|
trusted library allocation
|
page read and write
|
||
A3A000
|
heap
|
page read and write
|
||
3500000
|
stack
|
page read and write
|
||
2A91000
|
trusted library allocation
|
page read and write
|
||
7FF5D760E000
|
unkown
|
page readonly
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
3070000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
3C67000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
ACF000
|
stack
|
page read and write
|
||
A246000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
AC53000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
9DF000
|
stack
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
A742000
|
heap
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
F45E000
|
unkown
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
unkown
|
page readonly
|
||
2DDF000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
C035000
|
stack
|
page read and write
|
||
42C6000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
unkown
|
page read and write
|
||
7FF5D7385000
|
unkown
|
page readonly
|
||
AB0E000
|
heap
|
page read and write
|
||
AB42000
|
heap
|
page read and write
|
||
BB4000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
heap
|
page execute and read and write
|
||
7FF5D77EB000
|
unkown
|
page readonly
|
||
FC3000
|
trusted library allocation
|
page execute and read and write
|
||
1C61000
|
heap
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
1C39000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
14CC000
|
stack
|
page read and write
|
||
F520000
|
heap
|
page read and write
|
||
14CF000
|
stack
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
1566000
|
trusted library allocation
|
page execute and read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1307000
|
heap
|
page read and write
|
||
AB45000
|
heap
|
page read and write
|
||
A89B000
|
heap
|
page read and write
|
||
A230000
|
heap
|
page read and write
|
||
AB3D000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
B8DB000
|
stack
|
page read and write
|
||
28A7000
|
trusted library allocation
|
page read and write
|
||
9AB2000
|
unkown
|
page read and write
|
||
7D3E000
|
stack
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
E85000
|
heap
|
page read and write
|
||
374D000
|
trusted library allocation
|
page read and write
|
||
14BF000
|
stack
|
page read and write
|
||
866000
|
trusted library allocation
|
page execute and read and write
|
||
4AB0000
|
unkown
|
page read and write
|
||
58B0000
|
heap
|
page execute and read and write
|
||
2FF9000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
7440000
|
unkown
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page execute and read and write
|
||
838000
|
heap
|
page read and write
|
||
3070000
|
unkown
|
page read and write
|
||
9D67000
|
unkown
|
page read and write
|
||
C7C6000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
1BCE000
|
heap
|
page read and write
|
||
2B46000
|
unkown
|
page readonly
|
||
7FF5D75DF000
|
unkown
|
page readonly
|
||
42C7000
|
trusted library allocation
|
page read and write
|
||
A100000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
2441000
|
trusted library allocation
|
page read and write
|
||
ACC6000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
7FF5D7257000
|
unkown
|
page readonly
|
||
4BE000
|
heap
|
page read and write
|
||
802000
|
trusted library allocation
|
page read and write
|
||
7FF5D777A000
|
unkown
|
page readonly
|
||
26D1000
|
trusted library allocation
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
9EB000
|
trusted library allocation
|
page execute and read and write
|
||
2530000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D7820000
|
unkown
|
page readonly
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
AD40000
|
heap
|
page read and write
|
||
2410000
|
trusted library allocation
|
page read and write
|
||
DE9000
|
heap
|
page read and write
|
||
7FF5D75B8000
|
unkown
|
page readonly
|
||
ACB4000
|
heap
|
page read and write
|
||
27C0000
|
direct allocation
|
page execute and read and write
|
||
4BE000
|
heap
|
page read and write
|
||
130A000
|
heap
|
page read and write
|
||
103C000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
1C58000
|
heap
|
page read and write
|
||
3070000
|
unkown
|
page read and write
|
||
D81000
|
unkown
|
page execute read
|
||
62B9000
|
unkown
|
page readonly
|
||
7FF5D783B000
|
unkown
|
page readonly
|
||
D62000
|
trusted library allocation
|
page read and write
|
||
867000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
1B20000
|
heap
|
page read and write
|
||
A28D000
|
unkown
|
page read and write
|
||
2A76000
|
trusted library allocation
|
page execute and read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
AFBE000
|
stack
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A976000
|
heap
|
page read and write
|
||
9B0B000
|
unkown
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
1C58000
|
heap
|
page read and write
|
||
7FF5D77FD000
|
unkown
|
page readonly
|
||
BFF000
|
stack
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
3060000
|
unkown
|
page read and write
|
||
17E7000
|
heap
|
page read and write
|
||
296E000
|
stack
|
page read and write
|
||
278E000
|
stack
|
page read and write
|
||
56D0000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
7FF5D72D0000
|
unkown
|
page readonly
|
||
A415000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
7DF4F2460000
|
unkown
|
page readonly
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
9E5000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
7DF4F2480000
|
unkown
|
page readonly
|
||
13A6000
|
heap
|
page read and write
|
||
2A80000
|
heap
|
page execute and read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
1C31000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
42BB000
|
trusted library allocation
|
page read and write
|
||
7FF5D71D7000
|
unkown
|
page readonly
|
||
243E000
|
stack
|
page read and write
|
||
42C7000
|
trusted library allocation
|
page read and write
|
||
A672000
|
heap
|
page read and write
|
||
17C1000
|
trusted library allocation
|
page read and write
|
||
9DB000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
9F9F000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
9679000
|
stack
|
page read and write
|
||
B7DD000
|
stack
|
page read and write
|
||
FCD000
|
trusted library allocation
|
page execute and read and write
|
||
ABF3000
|
heap
|
page read and write
|
||
D5A000
|
trusted library allocation
|
page execute and read and write
|
||
ABB9000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
AC2D000
|
heap
|
page read and write
|
||
7FF5D7760000
|
unkown
|
page readonly
|
||
5882000
|
trusted library allocation
|
page read and write
|
||
2C05000
|
trusted library allocation
|
page read and write
|
||
11F2000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
A41E000
|
heap
|
page read and write
|
||
42D7000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A9B8000
|
heap
|
page read and write
|
||
42A2000
|
trusted library allocation
|
page read and write
|
||
105F6000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
42D0000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
2FD6000
|
trusted library allocation
|
page read and write
|
||
3C90000
|
remote allocation
|
page read and write
|
||
9F87000
|
heap
|
page read and write
|
||
9FBA000
|
heap
|
page read and write
|
||
2740000
|
heap
|
page execute and read and write
|
||
4AA0000
|
unkown
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
1C54000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
2A6F000
|
stack
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
42EE000
|
trusted library allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
F3F000
|
stack
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
55C9000
|
trusted library allocation
|
page read and write
|
||
587F000
|
stack
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
2340000
|
heap
|
page execute and read and write
|
||
4BE000
|
heap
|
page read and write
|
||
A80C000
|
heap
|
page read and write
|
||
51E5000
|
trusted library allocation
|
page read and write
|
||
A1AF000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
E69000
|
heap
|
page read and write
|
||
1C2C000
|
heap
|
page read and write
|
||
42BA000
|
trusted library allocation
|
page read and write
|
||
ABB2000
|
heap
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
91D000
|
trusted library allocation
|
page execute and read and write
|
||
25C8000
|
trusted library allocation
|
page read and write
|
||
C8B0000
|
unkown
|
page read and write
|
||
7FF5D76E8000
|
unkown
|
page readonly
|
||
1C4A000
|
heap
|
page read and write
|
||
1C54000
|
heap
|
page read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A891000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
BAB000
|
stack
|
page read and write
|
||
A3F1000
|
heap
|
page read and write
|
||
7618000
|
unkown
|
page read and write
|
||
1E4E000
|
stack
|
page read and write
|
||
AAE9000
|
heap
|
page read and write
|
||
A31B000
|
heap
|
page read and write
|
||
9A8D000
|
heap
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
A219000
|
heap
|
page read and write
|
||
7FF5D75A6000
|
unkown
|
page readonly
|
||
12BB000
|
heap
|
page read and write
|
||
7B60000
|
unkown
|
page readonly
|
||
3060000
|
unkown
|
page read and write
|
||
F37000
|
trusted library allocation
|
page read and write
|
||
9ADB000
|
unkown
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
A9E9000
|
unkown
|
page read and write
|
||
C64000
|
trusted library allocation
|
page read and write
|
||
9F89000
|
heap
|
page read and write
|
||
1C4C000
|
heap
|
page read and write
|
||
2EC7000
|
trusted library allocation
|
page read and write
|
||
7FF5D7705000
|
unkown
|
page readonly
|
||
C806000
|
unkown
|
page read and write
|
||
26B4000
|
trusted library allocation
|
page read and write
|
||
AD02000
|
heap
|
page read and write
|
||
7FF5D69BB000
|
unkown
|
page readonly
|
||
4B7000
|
heap
|
page read and write
|
||
7FF5D7215000
|
unkown
|
page readonly
|
||
3070000
|
unkown
|
page read and write
|
||
A99C000
|
heap
|
page read and write
|
||
A251000
|
heap
|
page read and write
|
||
7DBD000
|
stack
|
page read and write
|
||
C62D000
|
unkown
|
page read and write
|
||
7E5000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
BE1000
|
trusted library allocation
|
page read and write
|
||
A766000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
7989000
|
stack
|
page read and write
|
||
11FA000
|
trusted library allocation
|
page execute and read and write
|
||
3310000
|
unkown
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
7FF5D772C000
|
unkown
|
page readonly
|
||
A872000
|
heap
|
page read and write
|
||
285E000
|
heap
|
page read and write
|
||
AEE000
|
heap
|
page read and write
|
||
DB3000
|
trusted library allocation
|
page execute and read and write
|
||
C85000
|
heap
|
page read and write
|
||
4391000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
A341000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
850000
|
trusted library allocation
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
9E7000
|
trusted library allocation
|
page execute and read and write
|
||
1C29000
|
heap
|
page read and write
|
||
4297000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
A816000
|
heap
|
page read and write
|
||
42E2000
|
trusted library allocation
|
page read and write
|
||
30FB000
|
stack
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page execute and read and write
|
||
370000
|
heap
|
page read and write
|
||
4460000
|
trusted library allocation
|
page read and write
|
||
7FF5D7450000
|
unkown
|
page readonly
|
||
A1F000
|
heap
|
page read and write
|
||
5325000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
C8C000
|
stack
|
page read and write
|
||
BF8000
|
heap
|
page read and write
|
||
7FF5D7558000
|
unkown
|
page readonly
|
||
2A82000
|
trusted library allocation
|
page read and write
|
||
2A7A000
|
trusted library allocation
|
page execute and read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
8F49000
|
stack
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
17AB000
|
stack
|
page read and write
|
||
9CF000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
A268000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
A6BC000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
AC4000
|
heap
|
page read and write
|
||
2919000
|
trusted library allocation
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
1BD0000
|
heap
|
page read and write
|
||
26DB000
|
trusted library allocation
|
page read and write
|
||
A7B000
|
stack
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
1175000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
8DA000
|
trusted library allocation
|
page execute and read and write
|
||
2290000
|
heap
|
page read and write
|
||
11CF000
|
stack
|
page read and write
|
||
AAA9000
|
unkown
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
7FF5D77B9000
|
unkown
|
page readonly
|
||
42D6000
|
trusted library allocation
|
page read and write
|
||
A32B000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
A25B000
|
heap
|
page read and write
|
||
42F3000
|
trusted library allocation
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
3310000
|
unkown
|
page read and write
|
||
CAF000
|
heap
|
page read and write
|
||
A841000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A4A000
|
trusted library allocation
|
page execute and read and write
|
||
A789000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
1554000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A40E000
|
unkown
|
page read and write
|
||
1C4C000
|
heap
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
AAF5000
|
heap
|
page read and write
|
||
2458000
|
trusted library allocation
|
page read and write
|
||
AEA000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
3CB000
|
stack
|
page read and write
|
||
7FF5D7604000
|
unkown
|
page readonly
|
||
DD2000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
17E5000
|
heap
|
page read and write
|
||
3310000
|
unkown
|
page read and write
|
||
A7A6000
|
heap
|
page read and write
|
||
AC8D000
|
heap
|
page read and write
|
||
F522000
|
heap
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
||
10BB000
|
heap
|
page read and write
|
||
11428000
|
unkown
|
page read and write
|
||
A262000
|
heap
|
page read and write
|
||
A323000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
ACCE000
|
heap
|
page read and write
|
||
2A7E000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
1C27000
|
heap
|
page read and write
|
||
7C0000
|
trusted library allocation
|
page read and write
|
||
ABEB000
|
heap
|
page read and write
|
||
2610000
|
heap
|
page execute and read and write
|
||
3060000
|
unkown
|
page read and write
|
||
2448000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
DFB000
|
trusted library allocation
|
page execute and read and write
|
||
280D000
|
trusted library allocation
|
page read and write
|
||
9FBD000
|
heap
|
page read and write
|
||
A33D000
|
heap
|
page read and write
|
||
86E0000
|
unkown
|
page readonly
|
||
1120000
|
heap
|
page read and write
|
||
1BB8000
|
heap
|
page read and write
|
||
A2E1000
|
heap
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
AD1A000
|
heap
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
AB59000
|
heap
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
4B7000
|
heap
|
page read and write
|
||
ACF3000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
AC63000
|
heap
|
page read and write
|
||
26E8000
|
trusted library allocation
|
page read and write
|
||
A719000
|
heap
|
page read and write
|
||
BB10000
|
heap
|
page read and write
|
||
2BE4000
|
trusted library allocation
|
page read and write
|
||
75B000
|
stack
|
page read and write
|
||
CD7000
|
heap
|
page read and write
|
||
F44F000
|
unkown
|
page read and write
|
||
2B00000
|
unkown
|
page readonly
|
||
4BE000
|
heap
|
page read and write
|
||
F53000
|
trusted library allocation
|
page execute and read and write
|
||
4B7000
|
heap
|
page read and write
|
||
7FF5D7429000
|
unkown
|
page readonly
|
||
4B7000
|
heap
|
page read and write
|
||
F5D000
|
trusted library allocation
|
page execute and read and write
|
||
27F0000
|
heap
|
page execute and read and write
|
||
E97000
|
heap
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
7C90000
|
unkown
|
page read and write
|
||
1C48000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
5443000
|
trusted library allocation
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
113DB000
|
unkown
|
page read and write
|
||
A2A2000
|
unkown
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
979000
|
heap
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
B3B000
|
heap
|
page read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2A46000
|
trusted library allocation
|
page read and write
|
||
A341000
|
heap
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
FF8000
|
heap
|
page read and write
|
||
7FF5D766E000
|
unkown
|
page readonly
|
||
1C63000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
DD3000
|
unkown
|
page execute read
|
||
7605000
|
unkown
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
3C61000
|
trusted library allocation
|
page read and write
|
||
1BEE000
|
heap
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
23A3000
|
trusted library allocation
|
page read and write
|
||
AB9B000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
2C61000
|
trusted library allocation
|
page read and write
|
||
1025000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
9A76000
|
unkown
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
A247000
|
heap
|
page read and write
|
||
9F92000
|
heap
|
page read and write
|
||
C49000
|
unkown
|
page readonly
|
||
2541000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
trusted library allocation
|
page read and write
|
||
A7CF000
|
heap
|
page read and write
|
||
A9C0000
|
heap
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
8500000
|
unkown
|
page read and write
|
||
A85B000
|
heap
|
page read and write
|
||
11298000
|
unkown
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
79E000
|
heap
|
page read and write
|
||
1B8E000
|
heap
|
page read and write
|
||
42DA000
|
trusted library allocation
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
429D000
|
trusted library allocation
|
page read and write
|
||
8930000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
11F6000
|
trusted library allocation
|
page execute and read and write
|
||
3060000
|
unkown
|
page read and write
|
||
A361000
|
heap
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
2E08000
|
trusted library allocation
|
page read and write
|
||
1C59000
|
heap
|
page read and write
|
||
9F8A000
|
heap
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
2650000
|
trusted library allocation
|
page execute and read and write
|
||
7AB0000
|
unkown
|
page read and write
|
||
3C65000
|
trusted library allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
243F000
|
trusted library allocation
|
page read and write
|
||
7FF5D73F5000
|
unkown
|
page readonly
|
||
A33E000
|
heap
|
page read and write
|
||
4F25000
|
trusted library allocation
|
page read and write
|
||
9FAA000
|
heap
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
42DB000
|
trusted library allocation
|
page read and write
|
||
7FF5D7643000
|
unkown
|
page readonly
|
||
A2B5000
|
unkown
|
page read and write
|
||
118B000
|
trusted library allocation
|
page execute and read and write
|
||
3060000
|
unkown
|
page read and write
|
||
C9C000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
F93000
|
heap
|
page read and write
|
||
26C8000
|
trusted library allocation
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
C663000
|
unkown
|
page read and write
|
||
42C9000
|
trusted library allocation
|
page read and write
|
||
1142B000
|
unkown
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
42CA000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
1582000
|
trusted library allocation
|
page read and write
|
||
10E91000
|
unkown
|
page read and write
|
||
2D26000
|
trusted library allocation
|
page execute and read and write
|
||
4B7000
|
heap
|
page read and write
|
||
24E0000
|
heap
|
page execute and read and write
|
||
560000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
A212000
|
heap
|
page read and write
|
||
39FD000
|
stack
|
page read and write
|
||
ED4000
|
trusted library allocation
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
9F99000
|
heap
|
page read and write
|
||
A86E000
|
heap
|
page read and write
|
||
110B000
|
trusted library allocation
|
page execute and read and write
|
||
12A0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2623000
|
trusted library allocation
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
A393000
|
heap
|
page read and write
|
||
43B0000
|
trusted library allocation
|
page read and write
|
||
AC34000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2EF1000
|
trusted library allocation
|
page read and write
|
||
1C62000
|
heap
|
page read and write
|
||
B06000
|
trusted library allocation
|
page execute and read and write
|
||
1C63000
|
heap
|
page read and write
|
||
A12F000
|
stack
|
page read and write
|
||
AB7B000
|
heap
|
page read and write
|
||
7FF5D738E000
|
unkown
|
page readonly
|
||
8CB8000
|
stack
|
page read and write
|
||
C5FA000
|
unkown
|
page read and write
|
||
D80000
|
unkown
|
page readonly
|
||
10C4000
|
trusted library allocation
|
page read and write
|
||
7FF5D7648000
|
unkown
|
page readonly
|
||
A6E0000
|
heap
|
page read and write
|
||
98FD000
|
stack
|
page read and write
|
||
42A2000
|
trusted library allocation
|
page read and write
|
||
431F000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
AC49000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A60A000
|
heap
|
page read and write
|
||
22DC000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A4D000
|
stack
|
page read and write
|
||
2604000
|
trusted library allocation
|
page read and write
|
||
252E000
|
stack
|
page read and write
|
||
8E7000
|
trusted library allocation
|
page execute and read and write
|
||
2667000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
7654000
|
unkown
|
page read and write
|
||
9AF9000
|
unkown
|
page read and write
|
||
9A80000
|
unkown
|
page read and write
|
||
2933000
|
trusted library allocation
|
page read and write
|
||
1018000
|
heap
|
page read and write
|
||
3A75000
|
trusted library allocation
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
A08000
|
heap
|
page read and write
|
||
9F8B000
|
heap
|
page read and write
|
||
8D6000
|
trusted library allocation
|
page execute and read and write
|
||
CC0000
|
trusted library allocation
|
page execute and read and write
|
||
42CB000
|
trusted library allocation
|
page read and write
|
||
AC8F000
|
heap
|
page read and write
|
||
23A5000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D7394000
|
unkown
|
page readonly
|
||
7FF5D6BDB000
|
unkown
|
page readonly
|
||
A33B000
|
heap
|
page read and write
|
||
3070000
|
unkown
|
page read and write
|
||
C865000
|
unkown
|
page read and write
|
||
1C65000
|
heap
|
page read and write
|
||
2DC5000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
trusted library allocation
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
A344000
|
heap
|
page read and write
|
||
A35F000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
42BC000
|
trusted library allocation
|
page read and write
|
||
1C61000
|
heap
|
page read and write
|
||
23B1000
|
trusted library allocation
|
page read and write
|
||
A3F3000
|
heap
|
page read and write
|
||
AB84000
|
heap
|
page read and write
|
||
42C3000
|
trusted library allocation
|
page read and write
|
||
ABD4000
|
heap
|
page read and write
|
||
A364000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1C54000
|
heap
|
page read and write
|
||
1C32000
|
heap
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
D33000
|
trusted library allocation
|
page execute and read and write
|
||
26B6000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
26BE000
|
trusted library allocation
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
539F000
|
stack
|
page read and write
|
||
2A93000
|
trusted library allocation
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1C69000
|
heap
|
page read and write
|
||
7FF5D72BD000
|
unkown
|
page readonly
|
||
348F000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
8B1000
|
trusted library allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
A339000
|
heap
|
page read and write
|
||
47B0000
|
heap
|
page read and write
|
||
8360000
|
unkown
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page execute and read and write
|
||
4B7000
|
heap
|
page read and write
|
||
CD3000
|
trusted library allocation
|
page execute and read and write
|
||
1090000
|
heap
|
page read and write
|
||
3070000
|
unkown
|
page read and write
|
||
7FF5D7425000
|
unkown
|
page readonly
|
||
1C30000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
9BD000
|
trusted library allocation
|
page execute and read and write
|
||
1C4D000
|
heap
|
page read and write
|
||
3310000
|
unkown
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
B5F000
|
stack
|
page read and write
|
||
F27000
|
trusted library allocation
|
page read and write
|
||
7FF5D72CE000
|
unkown
|
page readonly
|
||
E5E000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
A75C000
|
heap
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
113FB000
|
unkown
|
page read and write
|
||
860000
|
trusted library allocation
|
page read and write
|
||
1129D000
|
unkown
|
page read and write
|
||
1360000
|
unkown
|
page readonly
|
||
AC25000
|
heap
|
page read and write
|
||
11F7000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D745B000
|
unkown
|
page readonly
|
||
7FF5D764F000
|
unkown
|
page readonly
|
||
7693000
|
unkown
|
page read and write
|
||
A04000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
1C56000
|
heap
|
page read and write
|
||
7FF5D7292000
|
unkown
|
page readonly
|
||
F80000
|
heap
|
page read and write
|
||
213E000
|
stack
|
page read and write
|
||
7FF5D776F000
|
unkown
|
page readonly
|
||
2F80000
|
heap
|
page read and write
|
||
2FFB000
|
trusted library allocation
|
page read and write
|
||
370C000
|
stack
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
124F000
|
stack
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
4299000
|
trusted library allocation
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
BB3000
|
trusted library allocation
|
page execute and read and write
|
||
4347000
|
trusted library allocation
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
25B8000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
4390000
|
heap
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
AA5A000
|
heap
|
page read and write
|
||
1C29000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
59BE000
|
stack
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
ED8000
|
heap
|
page read and write
|
||
A39F000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
7FF5D71CC000
|
unkown
|
page readonly
|
||
12D0000
|
heap
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
163B000
|
heap
|
page read and write
|
||
7FF5D75D6000
|
unkown
|
page readonly
|
||
1C4A000
|
heap
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
3370000
|
unkown
|
page read and write
|
||
BD1000
|
unkown
|
page execute read
|
||
3060000
|
unkown
|
page read and write
|
||
7FF5D71E6000
|
unkown
|
page readonly
|
||
3160000
|
unkown
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
C0F000
|
stack
|
page read and write
|
||
2850000
|
heap
|
page execute and read and write
|
||
1C48000
|
heap
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
A955000
|
heap
|
page read and write
|
||
AB51000
|
heap
|
page read and write
|
||
7B10000
|
unkown
|
page read and write
|
||
11294000
|
unkown
|
page read and write
|
||
1190000
|
trusted library allocation
|
page execute and read and write
|
||
A34C000
|
heap
|
page read and write
|
||
7FF5D7230000
|
unkown
|
page readonly
|
||
1694000
|
unkown
|
page readonly
|
||
1C67000
|
heap
|
page read and write
|
||
A967000
|
heap
|
page read and write
|
||
42C2000
|
trusted library allocation
|
page read and write
|
||
AC86000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
4A12000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
A225000
|
heap
|
page read and write
|
||
E77000
|
trusted library allocation
|
page read and write
|
||
AC5C000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
4DB000
|
stack
|
page read and write
|
||
C6D000
|
trusted library allocation
|
page execute and read and write
|
||
A607000
|
heap
|
page read and write
|
||
F69000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A5EF000
|
heap
|
page read and write
|
||
4AAD000
|
stack
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
4BE000
|
heap
|
page read and write
|
||
ED3000
|
trusted library allocation
|
page execute and read and write
|
||
A220000
|
unkown
|
page read and write
|
||
C908000
|
unkown
|
page read and write
|
||
2855000
|
trusted library allocation
|
page read and write
|
||
A67B000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
7FF5D743F000
|
unkown
|
page readonly
|
||
7FF5D74A6000
|
unkown
|
page readonly
|
||
AB76000
|
heap
|
page read and write
|
||
418D000
|
stack
|
page read and write
|
||
AA7000
|
heap
|
page read and write
|
||
7FF5D66E3000
|
unkown
|
page readonly
|
||
1389000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
3310000
|
unkown
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
B15000
|
heap
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
9579000
|
stack
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
7CC000
|
heap
|
page read and write
|
||
4438000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
8870000
|
unkown
|
page readonly
|
||
DA0000
|
heap
|
page read and write
|
||
9A8E000
|
unkown
|
page read and write
|
||
143D000
|
trusted library allocation
|
page execute and read and write
|
||
77DB000
|
unkown
|
page read and write
|
||
7FF5D7740000
|
unkown
|
page readonly
|
||
A330000
|
heap
|
page read and write
|
||
1646000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
35C1000
|
unkown
|
page read and write
|
||
4FD4000
|
trusted library allocation
|
page read and write
|
||
A57000
|
trusted library allocation
|
page execute and read and write
|
||
A78000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
42A000
|
unkown
|
page read and write
|
||
1C5D000
|
heap
|
page read and write
|
||
B0BD000
|
stack
|
page read and write
|
||
462B000
|
trusted library allocation
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
unkown
|
page read and write
|
||
F47000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
A2D000
|
trusted library allocation
|
page execute and read and write
|
||
2AA0000
|
heap
|
page execute and read and write
|
||
4B7000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
A740000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
A311000
|
heap
|
page read and write
|
||
EDD000
|
trusted library allocation
|
page execute and read and write
|
||
890000
|
trusted library allocation
|
page read and write
|
||
BFD000
|
trusted library allocation
|
page execute and read and write
|
||
97FF000
|
stack
|
page read and write
|
||
A240000
|
heap
|
page read and write
|
||
4F17000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
7FF5D710B000
|
unkown
|
page readonly
|
||
4B7000
|
heap
|
page read and write
|
||
26F1000
|
trusted library allocation
|
page read and write
|
||
DBD000
|
trusted library allocation
|
page execute and read and write
|
||
8B7000
|
trusted library allocation
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
F7A000
|
trusted library allocation
|
page execute and read and write
|
||
10B5000
|
unkown
|
page execute read
|
||
1C4C000
|
heap
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
2881000
|
trusted library allocation
|
page read and write
|
||
AA92000
|
heap
|
page read and write
|
||
1434000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
C609000
|
unkown
|
page read and write
|
||
CA7000
|
heap
|
page read and write
|
||
1C65000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
1096000
|
heap
|
page read and write
|
||
736000
|
stack
|
page read and write
|
||
2780000
|
direct allocation
|
page execute and read and write
|
||
7FF5D7797000
|
unkown
|
page readonly
|
||
4391000
|
trusted library allocation
|
page read and write
|
||
42A2000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
AE9000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
2B20000
|
heap
|
page execute and read and write
|
||
DEB000
|
trusted library allocation
|
page execute and read and write
|
||
AAE000
|
stack
|
page read and write
|
||
AA9C000
|
unkown
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
8F6000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
42AC000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
9AA8000
|
unkown
|
page read and write
|
||
C9A7000
|
unkown
|
page read and write
|
||
3370000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
4294000
|
trusted library allocation
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
A9C7000
|
heap
|
page read and write
|
||
ABA2000
|
heap
|
page read and write
|
||
3DE000
|
stack
|
page read and write
|
||
A7A8000
|
heap
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
99B0000
|
unkown
|
page read and write
|
||
1C5D000
|
heap
|
page read and write
|
||
4293000
|
trusted library allocation
|
page read and write
|
||
7FF5D765F000
|
unkown
|
page readonly
|
||
A330000
|
heap
|
page read and write
|
||
7FF5D74B8000
|
unkown
|
page readonly
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
11299000
|
unkown
|
page read and write
|
||
12AF000
|
heap
|
page read and write
|
||
10689000
|
unkown
|
page read and write
|
||
AAEF000
|
heap
|
page read and write
|
||
AD04000
|
heap
|
page read and write
|
||
807000
|
trusted library allocation
|
page execute and read and write
|
||
BDC0000
|
unkown
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
9F89000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
ABFA000
|
heap
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
A6BF000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A3E6000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
11406000
|
unkown
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
113F0000
|
unkown
|
page read and write
|
||
A35F000
|
heap
|
page read and write
|
||
C5F4000
|
unkown
|
page read and write
|
||
2803000
|
trusted library allocation
|
page read and write
|
||
A92B000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
7FF5D76F5000
|
unkown
|
page readonly
|
||
AB05000
|
heap
|
page read and write
|
||
8DD0000
|
stack
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
26FE000
|
stack
|
page read and write
|
||
5463000
|
unkown
|
page read and write
|
||
C1CC000
|
stack
|
page read and write
|
||
5210000
|
heap
|
page execute and read and write
|
||
42E7000
|
trusted library allocation
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
23F5000
|
trusted library allocation
|
page read and write
|
||
557B000
|
trusted library allocation
|
page read and write
|
||
A327000
|
heap
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
12CA000
|
heap
|
page read and write
|
||
ACB1000
|
heap
|
page read and write
|
||
54F1000
|
trusted library allocation
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
1C59000
|
heap
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
1156000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
52E5000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
A46000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D7442000
|
unkown
|
page readonly
|
||
428E000
|
stack
|
page read and write
|
||
BE70000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
ACD3000
|
heap
|
page read and write
|
||
77A2000
|
unkown
|
page read and write
|
||
A837000
|
heap
|
page read and write
|
||
AB2B000
|
heap
|
page read and write
|
||
9AC000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1321000
|
heap
|
page read and write
|
||
A33A000
|
heap
|
page read and write
|
||
1C63000
|
heap
|
page read and write
|
||
35B5000
|
unkown
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
42A7000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
99C0000
|
unkown
|
page read and write
|
||
A2F7000
|
heap
|
page read and write
|
||
A6C7000
|
heap
|
page read and write
|
||
A27D000
|
heap
|
page read and write
|
||
2D2A000
|
trusted library allocation
|
page execute and read and write
|
||
A450000
|
heap
|
page read and write
|
||
2AEE000
|
stack
|
page read and write
|
||
2B17000
|
trusted library allocation
|
page read and write
|
||
A9CB000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
AC7F000
|
heap
|
page read and write
|
||
C5EC000
|
unkown
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
1C67000
|
heap
|
page read and write
|
||
A9FD000
|
heap
|
page read and write
|
||
AA3C000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
1B10000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
1140C000
|
unkown
|
page read and write
|
||
53B000
|
stack
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
151E000
|
stack
|
page read and write
|
||
7FF5D75F6000
|
unkown
|
page readonly
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
1C69000
|
heap
|
page read and write
|
||
1C59000
|
heap
|
page read and write
|
||
86A000
|
trusted library allocation
|
page execute and read and write
|
||
A27A000
|
heap
|
page read and write
|
||
7691000
|
unkown
|
page read and write
|
||
7637000
|
unkown
|
page read and write
|
||
15C7000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
A9AB000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
8C9000
|
heap
|
page read and write
|
||
7F6000
|
trusted library allocation
|
page execute and read and write
|
||
2960000
|
heap
|
page execute and read and write
|
||
AB79000
|
heap
|
page read and write
|
||
7FF5D728E000
|
unkown
|
page readonly
|
||
3060000
|
unkown
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
7FF5D7669000
|
unkown
|
page readonly
|
||
A76F000
|
heap
|
page read and write
|
||
395000
|
heap
|
page read and write
|
||
7AA0000
|
unkown
|
page read and write
|
||
C1A000
|
trusted library allocation
|
page execute and read and write
|
||
ACFE000
|
heap
|
page read and write
|
||
7FF5D66E8000
|
unkown
|
page readonly
|
||
1C48000
|
heap
|
page read and write
|
||
1067B000
|
unkown
|
page read and write
|
||
2FE1000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
9FB5000
|
heap
|
page read and write
|
||
AAAC000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
1C58000
|
heap
|
page read and write
|
||
D48000
|
heap
|
page read and write
|
||
A896000
|
heap
|
page read and write
|
||
8500000
|
unkown
|
page read and write
|
||
A94F000
|
heap
|
page read and write
|
||
A23A000
|
heap
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
3EF1000
|
trusted library allocation
|
page read and write
|
||
2851000
|
trusted library allocation
|
page read and write
|
||
9E2E000
|
stack
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
2920000
|
heap
|
page execute and read and write
|
||
4B7000
|
heap
|
page read and write
|
||
BD8000
|
heap
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
7FF5D720F000
|
unkown
|
page readonly
|
||
BBF000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
2BD5000
|
trusted library allocation
|
page read and write
|
There are 3681 hidden memdumps, click here to show them.