Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\huge[1].dat
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\53FF.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7719.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\96C7.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nsn3C59.tmp\liteFirewall.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsz7739.tmp\blowfish.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Del.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\svgbeht
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\svgbeht:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsaC2D3.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsu7719.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsz7739.tmp\INetC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsz7739.tmp\nsProcess.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\start.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
|
MSVC program database ver 7.00, 512*4023 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
There are 106 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Users\user\AppData\Roaming\svgbeht
|
C:\Users\user\AppData\Roaming\svgbeht
|
||
C:\Users\user\AppData\Local\Temp\53FF.exe
|
C:\Users\user\AppData\Local\Temp\53FF.exe
|
||
C:\Users\user\AppData\Local\Temp\7719.exe
|
C:\Users\user\AppData\Local\Temp\7719.exe
|
||
C:\Users\user\AppData\Local\Temp\96C7.exe
|
C:\Users\user\AppData\Local\Temp\96C7.exe
|
||
C:\Users\user\AppData\Roaming\svgbeht
|
C:\Users\user\AppData\Roaming\svgbeht
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
"C:\Users\user\AppData\Local\Temp\setup.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0
(Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.127 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3924 --field-trial-handle=3932,i,15479230681103079642,970092008260029416,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US
--service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/126.0.6478.127 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=2972 --field-trial-handle=3932,i,15479230681103079642,970092008260029416,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/126.0.6478.127 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=2260 --field-trial-handle=3932,i,15479230681103079642,970092008260029416,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux;
Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.127 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1
--num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719957786566967
--launch-time-ticks=6521213265 --mojo-platform-channel-handle=4044 --field-trial-handle=3932,i,15479230681103079642,970092008260029416,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux;
Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.127 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2
--enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719957786566967 --launch-time-ticks=6521380179
--mojo-platform-channel-handle=4056 --field-trial-handle=3932,i,15479230681103079642,970092008260029416,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
There are 25 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://gebeus.ru/tmp/index.php
|
|||
http://cx5519.com/tmp/index.php
|
|||
contintnetksows.shop
|
|||
http://evilos.cc/tmp/index.php
|
|||
ellaboratepwsz.xyz
|
|||
swellfrrgwwos.xyz
|
|||
foodypannyjsud.shop
|
|||
pedestriankodwu.xyz
|
|||
towerxxuytwi.xyz
|
|||
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://foodypannyjsud.shop/q
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://foodypannyjsud.shop/s
|
unknown
|
||
https://foodypannyjsud.shop/t
|
unknown
|
||
https://support.google.com/chrome/answer/6098869
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
|
unknown
|
||
https://excel.office.com
|
unknown
|
||
https://foodypannyjsud.shop/-%
|
unknown
|
||
http://crbug.com/510270
|
unknown
|
||
https://foodypannyjsud.shop/g
|
unknown
|
||
https://foodypannyjsud.shop/h
|
unknown
|
||
https://go.protekt2day.com/go/1c68c94b-6319-4e81-a7cf-3041c0161b9b?cost=0.180000&visitor_id=83180631
|
unknown
|
||
https://chrome.google.com/webstore?hl=urCtrl$2
|
unknown
|
||
https://foodypannyjsud.shop/m
|
unknown
|
||
https://foodypannyjsud.shop/O
|
unknown
|
||
http://crbug.com/378067
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
|
unknown
|
||
https://passwords.google.com
|
unknown
|
||
https://go.protekt2day.com/go/1c68c94b-6319-4e81-a7cf-3041c0161b9b?cost=0.180000
|
unknown
|
||
https://aui-cdn.atlassian.com/
|
unknown
|
||
http://www.iana.org/assignments/multicast-addresses
|
unknown
|
||
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
|
unknown
|
||
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
|
unknown
|
||
https://foodypannyjsud.shop/D
|
unknown
|
||
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://bageyou.xyz
|
unknown
|
||
http://crbug.com/642141
|
unknown
|
||
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://bitbucket.org/
|
unknown
|
||
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
http://www.connectionstrings.com/
|
unknown
|
||
https://chromewebstore.google.com/declarativeNetRequestWithHostAccessds=2-1719957786566967id5app.win
|
unknown
|
||
https://support.google.com/chromebook?p=app_intent
|
unknown
|
||
http://crbug.com/957772
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://foodypannyjsud.shop/apit
|
unknown
|
||
https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html&
|
unknown
|
||
http://logging.apache.org/log4j
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlT&r
|
unknown
|
||
https://foodypannyjsud.shop/apif
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://xiexie.wf/22_551/huge.dat
|
unknown
|
||
http://crbug.com/819404
|
unknown
|
||
https://outlook.com
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://foodypannyjsud.shop/apiP
|
unknown
|
||
https://chrome.google.com/webstore?hl=ukCtrl$1
|
unknown
|
||
https://android.notify.windows.com/iOS
|
unknown
|
||
http://api.install-stat.debug.world/clients/installs
|
unknown
|
||
https://cdn.cookielaw.org/
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://support.google.com/chrome/a/answer/9122284
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-CNCtrl$1
|
unknown
|
||
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
|
unknown
|
||
https://word.office.comon
|
unknown
|
||
http://www.unicode.org/copyright.html
|
unknown
|
||
https://powerpoint.office.comcember
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
|
unknown
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
http://crbug.com/1352358
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://bageyou.xyz/c/g
|
unknown
|
||
http://schemas.micro
|
unknown
|
||
https://crbug.com/1201800
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-TWCtrl$1
|
unknown
|
||
https://foodypannyjsud.shop/op
|
unknown
|
||
http://www.apache.org/).
|
unknown
|
||
https://foodypannyjsud.shop/api
|
unknown
|
||
https://myactivity.google.com/
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
190.159.30.35
|
unknown
|
Colombia
|
||
141.8.192.126
|
unknown
|
Russian Federation
|
||
188.114.96.3
|
unknown
|
European Union
|
||
185.68.16.7
|
unknown
|
Ukraine
|
||
127.0.0.127
|
unknown
|
unknown
|
||
146.70.169.164
|
unknown
|
United Kingdom
|
||
104.192.141.1
|
unknown
|
United States
|
||
104.21.45.251
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020434
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000E028A
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Sid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Pid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GamePall
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
|
DontShowUI
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
tmp_uid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
reg
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
uid
|
||
HKEY_CURRENT_USER\Control Panel\Cursors
|
AppStarting
|
There are 207 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4271000
|
unclassified section
|
page read and write
|
||
4371000
|
unclassified section
|
page read and write
|
||
4350000
|
direct allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
4250000
|
direct allocation
|
page read and write
|
||
D9D000
|
heap
|
page read and write
|
||
4371000
|
unclassified section
|
page read and write
|
||
36E0000
|
direct allocation
|
page execute and read and write
|
||
BB10000
|
heap
|
page read and write
|
||
A184000
|
heap
|
page read and write
|
||
6AAF000
|
unkown
|
page readonly
|
||
3C290000
|
direct allocation
|
page read and write
|
||
DE9000
|
heap
|
page read and write
|
||
7FF5D6A4B000
|
unkown
|
page readonly
|
||
7AC0000
|
unkown
|
page read and write
|
||
7FF5D7705000
|
unkown
|
page readonly
|
||
A7BA000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
9F5F000
|
heap
|
page read and write
|
||
A0DC000
|
heap
|
page read and write
|
||
3693000
|
trusted library allocation
|
page read and write
|
||
7C31000
|
unkown
|
page read and write
|
||
12C7000
|
trusted library allocation
|
page execute and read and write
|
||
3692000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
2A6F000
|
stack
|
page read and write
|
||
3739000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
A13F000
|
heap
|
page read and write
|
||
A3F7000
|
heap
|
page read and write
|
||
3C25C000
|
direct allocation
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
7C80000
|
unkown
|
page read and write
|
||
A361000
|
heap
|
page read and write
|
||
50C5000
|
trusted library allocation
|
page read and write
|
||
770D000
|
unkown
|
page readonly
|
||
A1C000
|
heap
|
page read and write
|
||
363F000
|
trusted library allocation
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
3662000
|
trusted library allocation
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
A220000
|
unkown
|
page read and write
|
||
A401000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
A4E0000
|
heap
|
page read and write
|
||
9ABD000
|
unkown
|
page read and write
|
||
3360000
|
unkown
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
A497000
|
heap
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
9EBC000
|
heap
|
page read and write
|
||
BE90000
|
unkown
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
A616000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
460000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
A1AC000
|
heap
|
page read and write
|
||
23B8000
|
trusted library allocation
|
page read and write
|
||
A1A3000
|
heap
|
page read and write
|
||
5330000
|
unkown
|
page write copy
|
||
49C2000
|
unkown
|
page read and write
|
||
A935000
|
heap
|
page read and write
|
||
A40E000
|
unkown
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
27E40000
|
direct allocation
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
F44F000
|
unkown
|
page read and write
|
||
C46F000
|
unkown
|
page read and write
|
||
762D000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
367B000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
9E7C000
|
heap
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
7FF5D77D2000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D7808000
|
unkown
|
page readonly
|
||
A380000
|
heap
|
page read and write
|
||
A4B2000
|
heap
|
page read and write
|
||
A720000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
3590000
|
remote allocation
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
838000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
6A0A000
|
unkown
|
page readonly
|
||
7FF5D72D3000
|
unkown
|
page readonly
|
||
3673000
|
trusted library allocation
|
page read and write
|
||
6F2000
|
heap
|
page read and write
|
||
5479000
|
unkown
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
B950000
|
unkown
|
page readonly
|
||
8B70000
|
unkown
|
page read and write
|
||
7FF5D766E000
|
unkown
|
page readonly
|
||
24FE000
|
stack
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
3505000
|
trusted library allocation
|
page read and write
|
||
AA01000
|
unkown
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
6CD4000
|
unkown
|
page readonly
|
||
73E000
|
heap
|
page read and write
|
||
AA0C000
|
unkown
|
page read and write
|
||
A1AA000
|
heap
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
7FF5D7523000
|
unkown
|
page readonly
|
||
3360000
|
unkown
|
page read and write
|
||
6A779000
|
unkown
|
page read and write
|
||
3633000
|
trusted library allocation
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
A1A1000
|
heap
|
page read and write
|
||
B8DB000
|
stack
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
7FF5D76F5000
|
unkown
|
page readonly
|
||
FF5000
|
unkown
|
page execute read
|
||
5E6A000
|
unkown
|
page readonly
|
||
A1BD000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
A1A2000
|
heap
|
page read and write
|
||
9A94000
|
unkown
|
page read and write
|
||
280E000
|
heap
|
page read and write
|
||
7FF5D72D7000
|
unkown
|
page readonly
|
||
A6D7000
|
heap
|
page read and write
|
||
A8F4000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A8B2000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
2DFD000
|
stack
|
page read and write
|
||
727000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
27E88000
|
direct allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
99B000
|
trusted library allocation
|
page execute and read and write
|
||
CC0000
|
unkown
|
page readonly
|
||
4DF6000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
C908000
|
unkown
|
page read and write
|
||
ECA000
|
unkown
|
page write copy
|
||
9E85000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
297A000
|
heap
|
page read and write
|
||
727F000
|
unkown
|
page readonly
|
||
716000
|
heap
|
page read and write
|
||
A35A000
|
heap
|
page read and write
|
||
C20000
|
remote allocation
|
page read and write
|
||
71ED000
|
unkown
|
page readonly
|
||
A4E8000
|
heap
|
page read and write
|
||
A377000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
7691000
|
unkown
|
page read and write
|
||
7B60000
|
unkown
|
page readonly
|
||
7631000
|
unkown
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
1120000
|
unkown
|
page read and write
|
||
6F2000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
886000
|
heap
|
page read and write
|
||
696A000
|
unkown
|
page readonly
|
||
27BE000
|
stack
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
850000
|
trusted library allocation
|
page execute and read and write
|
||
3140000
|
heap
|
page read and write
|
||
4C40000
|
heap
|
page read and write
|
||
7FF5D7752000
|
unkown
|
page readonly
|
||
A42C000
|
heap
|
page read and write
|
||
6BA2000
|
unkown
|
page readonly
|
||
8B70000
|
unkown
|
page read and write
|
||
A1AB000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
9F89000
|
heap
|
page read and write
|
||
7FF5D76DA000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
6D57000
|
unkown
|
page readonly
|
||
75A000
|
heap
|
page read and write
|
||
760F000
|
unkown
|
page read and write
|
||
2390000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
8C39000
|
stack
|
page read and write
|
||
9A90000
|
unkown
|
page read and write
|
||
7FF5D74C3000
|
unkown
|
page readonly
|
||
D30000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
5880000
|
heap
|
page execute and read and write
|
||
A17B000
|
heap
|
page read and write
|
||
2B40000
|
trusted library allocation
|
page execute and read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
365D000
|
trusted library allocation
|
page read and write
|
||
1120000
|
unkown
|
page read and write
|
||
6DE4000
|
unkown
|
page readonly
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
71C000
|
heap
|
page read and write
|
||
36E3000
|
trusted library allocation
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
697B000
|
unkown
|
page readonly
|
||
8FD9000
|
stack
|
page read and write
|
||
248E000
|
stack
|
page read and write
|
||
3656000
|
trusted library allocation
|
page read and write
|
||
2385000
|
trusted library allocation
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
3672000
|
trusted library allocation
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
A825000
|
heap
|
page read and write
|
||
1111E000
|
unkown
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page execute and read and write
|
||
C80000
|
trusted library allocation
|
page execute and read and write
|
||
8D3C000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
A580000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
A0A8000
|
heap
|
page read and write
|
||
3634000
|
trusted library allocation
|
page read and write
|
||
2CE1000
|
trusted library allocation
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
A77D000
|
heap
|
page read and write
|
||
27E24000
|
direct allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
4A16000
|
unkown
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
73E000
|
heap
|
page read and write
|
||
4DF4000
|
trusted library allocation
|
page read and write
|
||
A4CD000
|
heap
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
9F63000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
E1A000
|
heap
|
page read and write
|
||
5110000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
75C2000
|
unkown
|
page readonly
|
||
8A70000
|
unkown
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
DAF000
|
stack
|
page read and write
|
||
3140000
|
unkown
|
page read and write
|
||
11265000
|
unkown
|
page read and write
|
||
2720000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
110DF000
|
unkown
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
2784000
|
heap
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
6FB000
|
heap
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
71C000
|
heap
|
page read and write
|
||
2570000
|
trusted library allocation
|
page read and write
|
||
73B2000
|
unkown
|
page readonly
|
||
BB0C000
|
stack
|
page read and write
|
||
A1C6000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
96FE000
|
stack
|
page read and write
|
||
A6F2000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
72DF000
|
unkown
|
page readonly
|
||
10D0000
|
heap
|
page read and write
|
||
2FE1000
|
heap
|
page read and write
|
||
364A000
|
trusted library allocation
|
page read and write
|
||
1363000
|
trusted library allocation
|
page execute and read and write
|
||
329C000
|
stack
|
page read and write
|
||
A6C4000
|
heap
|
page read and write
|
||
A736000
|
heap
|
page read and write
|
||
A0C7000
|
heap
|
page read and write
|
||
1100000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
99B0000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
724E000
|
unkown
|
page readonly
|
||
70E0000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
B980000
|
unkown
|
page readonly
|
||
A33F000
|
unkown
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
1270000
|
unkown
|
page read and write
|
||
A678000
|
heap
|
page read and write
|
||
4DFE000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A75A000
|
heap
|
page read and write
|
||
A638000
|
heap
|
page read and write
|
||
3654000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
3B6A8000
|
direct allocation
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
A9FD000
|
unkown
|
page read and write
|
||
36E3000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
7F4000
|
trusted library allocation
|
page read and write
|
||
9AAC000
|
unkown
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
6981000
|
unkown
|
page readonly
|
||
A195000
|
heap
|
page read and write
|
||
A44B000
|
heap
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
F56B000
|
stack
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
7FF5D7267000
|
unkown
|
page readonly
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
A8C2000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
40CA000
|
trusted library allocation
|
page read and write
|
||
A80F000
|
heap
|
page read and write
|
||
4E17000
|
trusted library allocation
|
page read and write
|
||
68D000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
986000
|
stack
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
9F79000
|
heap
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
A1A4000
|
heap
|
page read and write
|
||
BDB000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D7604000
|
unkown
|
page readonly
|
||
A754000
|
heap
|
page read and write
|
||
3659000
|
trusted library allocation
|
page read and write
|
||
7FF5D774A000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
7FF5D7360000
|
unkown
|
page readonly
|
||
73E000
|
heap
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
2B87000
|
trusted library allocation
|
page read and write
|
||
532E000
|
stack
|
page read and write
|
||
A86B000
|
heap
|
page read and write
|
||
A1A5000
|
heap
|
page read and write
|
||
36AA000
|
trusted library allocation
|
page read and write
|
||
A82A000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
A2F5000
|
heap
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
A17D000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
6F4000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
4400000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
36C4000
|
trusted library allocation
|
page read and write
|
||
3160000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
9D80000
|
heap
|
page read and write
|
||
5A60000
|
heap
|
page execute and read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
6E30000
|
unkown
|
page readonly
|
||
A6BE000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5693000
|
heap
|
page execute and read and write
|
||
3380000
|
unkown
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
86F000
|
heap
|
page read and write
|
||
A946000
|
heap
|
page read and write
|
||
5A4A000
|
trusted library allocation
|
page read and write
|
||
1114E000
|
unkown
|
page read and write
|
||
A44F000
|
heap
|
page read and write
|
||
7DF4F2470000
|
unkown
|
page readonly
|
||
A46A000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
DC3000
|
trusted library allocation
|
page execute and read and write
|
||
627000
|
heap
|
page read and write
|
||
A94C000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
2C31000
|
trusted library allocation
|
page read and write
|
||
2C51000
|
trusted library allocation
|
page read and write
|
||
A5AD000
|
heap
|
page read and write
|
||
A3C3000
|
unkown
|
page read and write
|
||
950000
|
trusted library allocation
|
page read and write
|
||
AFBE000
|
stack
|
page read and write
|
||
366F000
|
trusted library allocation
|
page read and write
|
||
7FF5D77F0000
|
unkown
|
page readonly
|
||
6A03000
|
unkown
|
page readonly
|
||
2A02000
|
trusted library allocation
|
page read and write
|
||
7B10000
|
unkown
|
page read and write
|
||
15D4000
|
unkown
|
page readonly
|
||
722000
|
heap
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
698000
|
heap
|
page read and write
|
||
764F000
|
unkown
|
page readonly
|
||
388E000
|
stack
|
page read and write
|
||
704E000
|
unkown
|
page readonly
|
||
6FB000
|
heap
|
page read and write
|
||
13B5000
|
heap
|
page read and write
|
||
7FF5D7385000
|
unkown
|
page readonly
|
||
367B000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
1129C000
|
unkown
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
367B000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
A600000
|
heap
|
page read and write
|
||
A1AF000
|
heap
|
page read and write
|
||
B03B000
|
stack
|
page read and write
|
||
A6F4000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
A4D8000
|
heap
|
page read and write
|
||
A3A0000
|
heap
|
page read and write
|
||
6E7C000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
4350000
|
direct allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
55AE000
|
trusted library allocation
|
page read and write
|
||
29FB000
|
trusted library allocation
|
page execute and read and write
|
||
68D000
|
heap
|
page read and write
|
||
B85A000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
3B05000
|
trusted library allocation
|
page read and write
|
||
110F8000
|
unkown
|
page read and write
|
||
368A000
|
trusted library allocation
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
10634000
|
unkown
|
page read and write
|
||
3B09000
|
trusted library allocation
|
page read and write
|
||
A48B000
|
heap
|
page read and write
|
||
4D8F000
|
stack
|
page read and write
|
||
7FF5D76CD000
|
unkown
|
page readonly
|
||
281B000
|
heap
|
page execute and read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
3C51000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
A12F000
|
stack
|
page read and write
|
||
A7C6000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A1A2000
|
heap
|
page read and write
|
||
7FF5D720F000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
49FA000
|
unkown
|
page read and write
|
||
A622000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
F42D000
|
unkown
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
A41A000
|
heap
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
51E0000
|
heap
|
page execute and read and write
|
||
2CFC000
|
stack
|
page read and write
|
||
7FF5D77FD000
|
unkown
|
page readonly
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
68B4000
|
unkown
|
page readonly
|
||
3662000
|
trusted library allocation
|
page read and write
|
||
A738000
|
heap
|
page read and write
|
||
27E68000
|
direct allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
C83000
|
trusted library allocation
|
page execute and read and write
|
||
6DA000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
7DF4F2481000
|
unkown
|
page execute read
|
||
29F2000
|
trusted library allocation
|
page read and write
|
||
10FB8000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
C669000
|
unkown
|
page read and write
|
||
54BF000
|
stack
|
page read and write
|
||
832000
|
heap
|
page read and write
|
||
7FF5D7691000
|
unkown
|
page readonly
|
||
AA04000
|
unkown
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
A0D0000
|
heap
|
page read and write
|
||
364A000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
3687000
|
trusted library allocation
|
page read and write
|
||
9B41000
|
unkown
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
D53000
|
trusted library allocation
|
page read and write
|
||
3B618000
|
direct allocation
|
page read and write
|
||
71C000
|
heap
|
page read and write
|
||
2480000
|
heap
|
page read and write
|
||
110CB000
|
unkown
|
page read and write
|
||
A3E9000
|
heap
|
page read and write
|
||
98F000
|
stack
|
page read and write
|
||
10FB1000
|
unkown
|
page read and write
|
||
2EA1000
|
unkown
|
page read and write
|
||
867000
|
trusted library allocation
|
page read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
3674000
|
trusted library allocation
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
A3C5000
|
heap
|
page read and write
|
||
A84A000
|
heap
|
page read and write
|
||
7FF5D7407000
|
unkown
|
page readonly
|
||
A5A5000
|
heap
|
page read and write
|
||
5135000
|
trusted library allocation
|
page read and write
|
||
4360000
|
unclassified section
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
4390000
|
heap
|
page read and write
|
||
10FB1000
|
unkown
|
page read and write
|
||
1223000
|
trusted library allocation
|
page execute and read and write
|
||
A7DC000
|
heap
|
page read and write
|
||
36A4000
|
trusted library allocation
|
page read and write
|
||
A586000
|
heap
|
page read and write
|
||
3B60C000
|
direct allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
BC8000
|
trusted library allocation
|
page read and write
|
||
A364000
|
heap
|
page read and write
|
||
9F37000
|
heap
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
712F000
|
unkown
|
page readonly
|
||
7FF5D77DA000
|
unkown
|
page readonly
|
||
7423000
|
unkown
|
page readonly
|
||
3656000
|
trusted library allocation
|
page read and write
|
||
A488000
|
heap
|
page read and write
|
||
110F000
|
stack
|
page read and write
|
||
3C27C000
|
direct allocation
|
page read and write
|
||
363A000
|
trusted library allocation
|
page read and write
|
||
41B000
|
unkown
|
page read and write
|
||
3678000
|
trusted library allocation
|
page read and write
|
||
364A000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
881E000
|
stack
|
page read and write
|
||
AB02000
|
heap
|
page read and write
|
||
A1C2000
|
heap
|
page read and write
|
||
A3E7000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
A513000
|
heap
|
page read and write
|
||
1AB000
|
stack
|
page read and write
|
||
A1AD000
|
heap
|
page read and write
|
||
7440000
|
unkown
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
5341000
|
trusted library allocation
|
page read and write
|
||
C61D000
|
unkown
|
page read and write
|
||
364A000
|
trusted library allocation
|
page read and write
|
||
2FF9000
|
stack
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
7605000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
4DB0000
|
heap
|
page execute and read and write
|
||
627000
|
heap
|
page read and write
|
||
A184000
|
heap
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
C8B1000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
53E1000
|
unkown
|
page read and write
|
||
2B10000
|
trusted library allocation
|
page execute and read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
7FF5D77B9000
|
unkown
|
page readonly
|
||
10004000
|
unkown
|
page readonly
|
||
110C3000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
6B35000
|
unkown
|
page readonly
|
||
A266000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
B330000
|
unkown
|
page read and write
|
||
23A0000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
A0AA000
|
heap
|
page read and write
|
||
A0A0000
|
heap
|
page read and write
|
||
13BC000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
230D000
|
stack
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
A7BE000
|
heap
|
page read and write
|
||
6EEE000
|
unkown
|
page readonly
|
||
A991000
|
heap
|
page read and write
|
||
5ADE000
|
stack
|
page read and write
|
||
55C5000
|
trusted library allocation
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
2790000
|
direct allocation
|
page execute and read and write
|
||
367E000
|
trusted library allocation
|
page read and write
|
||
7FF5D74B8000
|
unkown
|
page readonly
|
||
800000
|
trusted library allocation
|
page read and write
|
||
366C000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
A1AB000
|
heap
|
page read and write
|
||
365C000
|
trusted library allocation
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
3679000
|
trusted library allocation
|
page read and write
|
||
A13C000
|
heap
|
page read and write
|
||
5596000
|
trusted library allocation
|
page read and write
|
||
A1BF000
|
heap
|
page read and write
|
||
366B000
|
trusted library allocation
|
page read and write
|
||
A7E1000
|
heap
|
page read and write
|
||
7DBC000
|
stack
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
36B3000
|
trusted library allocation
|
page read and write
|
||
85BE000
|
stack
|
page read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
A711000
|
heap
|
page read and write
|
||
A02E000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
71EE000
|
unkown
|
page readonly
|
||
1120C000
|
unkown
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
C8D000
|
trusted library allocation
|
page execute and read and write
|
||
71C000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A7EA000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
6A70E000
|
unkown
|
page write copy
|
||
9E77000
|
heap
|
page read and write
|
||
C8B4000
|
unkown
|
page read and write
|
||
12F6000
|
stack
|
page read and write
|
||
A578000
|
heap
|
page read and write
|
||
7FF5D71BF000
|
unkown
|
page readonly
|
||
34DF000
|
stack
|
page read and write
|
||
A4E5000
|
heap
|
page read and write
|
||
7FF5D7065000
|
unkown
|
page readonly
|
||
A893000
|
heap
|
page read and write
|
||
A9DF000
|
unkown
|
page read and write
|
||
4401000
|
heap
|
page read and write
|
||
A69C000
|
heap
|
page read and write
|
||
A81E000
|
heap
|
page read and write
|
||
A183000
|
heap
|
page read and write
|
||
2A95000
|
trusted library allocation
|
page read and write
|
||
35C3000
|
unkown
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
A842000
|
heap
|
page read and write
|
||
6FB000
|
heap
|
page read and write
|
||
6A6ED000
|
unkown
|
page write copy
|
||
2950000
|
heap
|
page read and write
|
||
7FF5D7398000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
386F000
|
trusted library allocation
|
page read and write
|
||
A19D000
|
heap
|
page read and write
|
||
23AE000
|
trusted library allocation
|
page read and write
|
||
11134000
|
unkown
|
page read and write
|
||
760D000
|
unkown
|
page read and write
|
||
4A0E000
|
unkown
|
page read and write
|
||
10FB1000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
A85C000
|
heap
|
page read and write
|
||
3C228000
|
direct allocation
|
page read and write
|
||
27A7000
|
trusted library allocation
|
page read and write
|
||
4980000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
9E60000
|
heap
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
A5A3000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3B64C000
|
direct allocation
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
A5F7000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
A952000
|
heap
|
page read and write
|
||
35C9000
|
unkown
|
page read and write
|
||
3669000
|
trusted library allocation
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
4DC9000
|
trusted library allocation
|
page read and write
|
||
A391000
|
unkown
|
page read and write
|
||
7FF5D7639000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
5146000
|
trusted library allocation
|
page read and write
|
||
258F000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
9A6A000
|
unkown
|
page read and write
|
||
A244000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
69A1000
|
unkown
|
page readonly
|
||
8B70000
|
unkown
|
page read and write
|
||
3C240000
|
direct allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
A65B000
|
heap
|
page read and write
|
||
4DFB000
|
trusted library allocation
|
page read and write
|
||
A1C4000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
A176000
|
heap
|
page read and write
|
||
5549000
|
trusted library allocation
|
page read and write
|
||
A176000
|
heap
|
page read and write
|
||
5106000
|
trusted library allocation
|
page read and write
|
||
10FBF000
|
unkown
|
page read and write
|
||
7693000
|
unkown
|
page read and write
|
||
27EE4000
|
direct allocation
|
page read and write
|
||
1386000
|
trusted library allocation
|
page execute and read and write
|
||
627000
|
heap
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
1F7000
|
heap
|
page read and write
|
||
A6AE000
|
heap
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
B08000
|
heap
|
page read and write
|
||
23A4000
|
trusted library allocation
|
page read and write
|
||
531F000
|
stack
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
7FF5D7682000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
27E9C000
|
direct allocation
|
page read and write
|
||
A338000
|
heap
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
A588000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
7FF5D781A000
|
unkown
|
page readonly
|
||
10FB8000
|
unkown
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A35E000
|
heap
|
page read and write
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
A0EB000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
A868000
|
heap
|
page read and write
|
||
3C2F8000
|
direct allocation
|
page read and write
|
||
27EC4000
|
direct allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D7077000
|
unkown
|
page readonly
|
||
620000
|
heap
|
page read and write
|
||
7FF5D72CE000
|
unkown
|
page readonly
|
||
4E7E000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A19C000
|
heap
|
page read and write
|
||
5A4C000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
10FBD000
|
unkown
|
page read and write
|
||
7FF5D66E8000
|
unkown
|
page readonly
|
||
3290000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
26DE000
|
stack
|
page read and write
|
||
104F000
|
stack
|
page read and write
|
||
C625000
|
unkown
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
17A0000
|
heap
|
page read and write
|
||
ECA000
|
unkown
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
A808000
|
heap
|
page read and write
|
||
A481000
|
heap
|
page read and write
|
||
3656000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A19F000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
A174000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3730000
|
heap
|
page read and write
|
||
9D8F000
|
heap
|
page read and write
|
||
7823000
|
unkown
|
page readonly
|
||
7FF5D71DA000
|
unkown
|
page readonly
|
||
9EAD000
|
stack
|
page read and write
|
||
469D000
|
stack
|
page read and write
|
||
A17F000
|
heap
|
page read and write
|
||
A19F000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
77A2000
|
unkown
|
page read and write
|
||
7D3E000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
82B000
|
trusted library allocation
|
page execute and read and write
|
||
6777000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
9895000
|
heap
|
page read and write
|
||
942D000
|
stack
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
unkown
|
page read and write
|
||
A779000
|
heap
|
page read and write
|
||
A446000
|
heap
|
page read and write
|
||
A397000
|
heap
|
page read and write
|
||
A356000
|
heap
|
page read and write
|
||
6A776000
|
unkown
|
page read and write
|
||
7FF5D717C000
|
unkown
|
page readonly
|
||
EB9000
|
unkown
|
page readonly
|
||
6B1000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
7FF5D706E000
|
unkown
|
page readonly
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
unclassified section
|
page read and write
|
||
6D6B000
|
unkown
|
page readonly
|
||
1400000
|
heap
|
page read and write
|
||
A7CA000
|
heap
|
page read and write
|
||
A0F9000
|
heap
|
page read and write
|
||
7FF5D7795000
|
unkown
|
page readonly
|
||
713000
|
heap
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
9F72000
|
heap
|
page read and write
|
||
9579000
|
stack
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
3835000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
7FF5D72BF000
|
unkown
|
page readonly
|
||
A5ED000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
779000
|
heap
|
page read and write
|
||
A836000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
73B4000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
1293000
|
trusted library allocation
|
page execute and read and write
|
||
627000
|
heap
|
page read and write
|
||
A4EB000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
36E3000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
11140000
|
unkown
|
page read and write
|
||
747000
|
heap
|
page read and write
|
||
ECC000
|
unkown
|
page readonly
|
||
85B000
|
heap
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
36B3000
|
trusted library allocation
|
page read and write
|
||
9E7B000
|
heap
|
page read and write
|
||
365B000
|
trusted library allocation
|
page read and write
|
||
A3AA000
|
unkown
|
page read and write
|
||
299A000
|
heap
|
page read and write
|
||
5613000
|
trusted library allocation
|
page read and write
|
||
8DD0000
|
stack
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
3C234000
|
direct allocation
|
page read and write
|
||
91F0000
|
unkown
|
page readonly
|
||
422000
|
unkown
|
page read and write
|
||
3674000
|
trusted library allocation
|
page read and write
|
||
2731000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
3A53000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
3B6B4000
|
direct allocation
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
A4EF000
|
heap
|
page read and write
|
||
A6E5000
|
heap
|
page read and write
|
||
362A000
|
unkown
|
page read and write
|
||
9E90000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
A91B000
|
heap
|
page read and write
|
||
749D000
|
unkown
|
page readonly
|
||
380000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
7FF5D778A000
|
unkown
|
page readonly
|
||
367F000
|
trusted library allocation
|
page read and write
|
||
D7F000
|
heap
|
page read and write
|
||
A669000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
1FFE000
|
stack
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
A770000
|
heap
|
page read and write
|
||
71C000
|
heap
|
page read and write
|
||
6A6F8000
|
unkown
|
page write copy
|
||
A191000
|
heap
|
page read and write
|
||
9E2E000
|
stack
|
page read and write
|
||
72F000
|
heap
|
page read and write
|
||
A773000
|
heap
|
page read and write
|
||
364A000
|
trusted library allocation
|
page read and write
|
||
36EB000
|
trusted library allocation
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
A495000
|
heap
|
page read and write
|
||
6D68000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
11110000
|
unkown
|
page read and write
|
||
27BD000
|
heap
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
6D4F000
|
unkown
|
page readonly
|
||
E5E000
|
heap
|
page read and write
|
||
A2A2000
|
unkown
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
BD5000
|
trusted library allocation
|
page read and write
|
||
6B31000
|
unkown
|
page readonly
|
||
A0BB000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
4E7C000
|
trusted library allocation
|
page read and write
|
||
7FF5D74F2000
|
unkown
|
page readonly
|
||
3005000
|
trusted library allocation
|
page read and write
|
||
365C000
|
trusted library allocation
|
page read and write
|
||
5A3F000
|
stack
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
1100000
|
unkown
|
page read and write
|
||
7FF5D772C000
|
unkown
|
page readonly
|
||
A845000
|
heap
|
page read and write
|
||
A9A0000
|
unkown
|
page read and write
|
||
E92000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
F0C000
|
heap
|
page read and write
|
||
1110E000
|
unkown
|
page read and write
|
||
986000
|
trusted library allocation
|
page execute and read and write
|
||
50F5000
|
trusted library allocation
|
page read and write
|
||
6EF4000
|
unkown
|
page readonly
|
||
7FF5D723C000
|
unkown
|
page readonly
|
||
16F7000
|
trusted library allocation
|
page read and write
|
||
45DA000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
unkown
|
page readonly
|
||
6DA000
|
heap
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
B6D000
|
stack
|
page read and write
|
||
7421000
|
unkown
|
page readonly
|
||
A11000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
11DF000
|
stack
|
page read and write
|
||
7FF5D77A8000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
559B000
|
trusted library allocation
|
page read and write
|
||
A959000
|
heap
|
page read and write
|
||
2839000
|
heap
|
page read and write
|
||
10FBB000
|
unkown
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
2560000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
3B648000
|
direct allocation
|
page read and write
|
||
725F000
|
unkown
|
page readonly
|
||
2B3D000
|
stack
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
3772000
|
trusted library allocation
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
239E000
|
trusted library allocation
|
page read and write
|
||
7435000
|
stack
|
page read and write
|
||
760B000
|
unkown
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
C65E000
|
unkown
|
page read and write
|
||
3777000
|
trusted library allocation
|
page read and write
|
||
9AB2000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
4FBF000
|
stack
|
page read and write
|
||
AD77000
|
heap
|
page read and write
|
||
A1A8000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
747D000
|
unkown
|
page readonly
|
||
1F5F000
|
stack
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
3590000
|
remote allocation
|
page read and write
|
||
8DCB000
|
stack
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
368C000
|
trusted library allocation
|
page read and write
|
||
A570000
|
heap
|
page read and write
|
||
297E000
|
heap
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
234E000
|
stack
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
35D5000
|
trusted library allocation
|
page read and write
|
||
7FF5D6BDB000
|
unkown
|
page readonly
|
||
10CCF000
|
unkown
|
page read and write
|
||
87F000
|
stack
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
A620000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
3C254000
|
direct allocation
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
27EF0000
|
direct allocation
|
page read and write
|
||
3B698000
|
direct allocation
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
A6FA000
|
heap
|
page read and write
|
||
AA92000
|
unkown
|
page read and write
|
||
23C5000
|
trusted library allocation
|
page read and write
|
||
A694000
|
heap
|
page read and write
|
||
A8D5000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
490D000
|
stack
|
page read and write
|
||
533C000
|
trusted library allocation
|
page read and write
|
||
7FF5D7438000
|
unkown
|
page readonly
|
||
10002000
|
unkown
|
page readonly
|
||
BA4000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
9AF9000
|
unkown
|
page read and write
|
||
A3B9000
|
unkown
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
9EB0000
|
unkown
|
page readonly
|
||
A6D1000
|
heap
|
page read and write
|
||
A923000
|
heap
|
page read and write
|
||
A185000
|
heap
|
page read and write
|
||
A1A2000
|
heap
|
page read and write
|
||
70B000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
3C20C000
|
direct allocation
|
page read and write
|
||
A12B000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
23EE000
|
stack
|
page read and write
|
||
7FF5D744E000
|
unkown
|
page readonly
|
||
563E000
|
stack
|
page read and write
|
||
A24F000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
18E0000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
366D000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
27D0000
|
direct allocation
|
page execute and read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
ECB000
|
unkown
|
page execute and read and write
|
||
73E000
|
heap
|
page read and write
|
||
2396000
|
trusted library allocation
|
page read and write
|
||
363D000
|
trusted library allocation
|
page read and write
|
||
A3DB000
|
heap
|
page read and write
|
||
37DC000
|
trusted library allocation
|
page read and write
|
||
3C2B8000
|
direct allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A25C000
|
heap
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
1340000
|
unkown
|
page read and write
|
||
372C000
|
stack
|
page read and write
|
||
A382000
|
heap
|
page read and write
|
||
BCA000
|
trusted library allocation
|
page execute and read and write
|
||
627000
|
heap
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
10FB6000
|
unkown
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page execute and read and write
|
||
68D000
|
heap
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
9E73000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
A7C000
|
stack
|
page read and write
|
||
3B6C4000
|
direct allocation
|
page read and write
|
||
A4AA000
|
heap
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
7DF4F2461000
|
unkown
|
page execute read
|
||
27F29000
|
direct allocation
|
page read and write
|
||
110D9000
|
unkown
|
page read and write
|
||
A674000
|
heap
|
page read and write
|
||
366D000
|
trusted library allocation
|
page read and write
|
||
3646000
|
trusted library allocation
|
page read and write
|
||
E46000
|
trusted library allocation
|
page execute and read and write
|
||
C800000
|
unkown
|
page read and write
|
||
A19D000
|
heap
|
page read and write
|
||
5536000
|
trusted library allocation
|
page read and write
|
||
7FF5D75FF000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
71F7000
|
unkown
|
page readonly
|
||
7FF5D6ABD000
|
unkown
|
page readonly
|
||
8B70000
|
unkown
|
page read and write
|
||
3626000
|
unkown
|
page read and write
|
||
1294000
|
trusted library allocation
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
10E0000
|
unkown
|
page read and write
|
||
7686000
|
unkown
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
A4AD000
|
heap
|
page read and write
|
||
7FF5D7289000
|
unkown
|
page readonly
|
||
4D9C000
|
trusted library allocation
|
page read and write
|
||
363D000
|
trusted library allocation
|
page read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
4AE24000
|
direct allocation
|
page read and write
|
||
5511000
|
trusted library allocation
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
A198000
|
heap
|
page read and write
|
||
A47C000
|
heap
|
page read and write
|
||
C642000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
1120000
|
unkown
|
page read and write
|
||
84BB000
|
stack
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
7FF5D7202000
|
unkown
|
page readonly
|
||
1120000
|
unkown
|
page read and write
|
||
2750000
|
heap
|
page execute and read and write
|
||
367B000
|
trusted library allocation
|
page read and write
|
||
6FA000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
B1F000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
E41000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
366B000
|
trusted library allocation
|
page read and write
|
||
6CE5000
|
unkown
|
page readonly
|
||
A31A000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
BFB8000
|
stack
|
page read and write
|
||
25CF000
|
stack
|
page read and write
|
||
6D00000
|
unkown
|
page readonly
|
||
A1A9000
|
heap
|
page read and write
|
||
9E70000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
7FF5D74A6000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
7A3000
|
heap
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
7FF5D75A6000
|
unkown
|
page readonly
|
||
A412000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
42F0000
|
heap
|
page read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
7FF5D7452000
|
unkown
|
page readonly
|
||
43A1000
|
heap
|
page read and write
|
||
4DB4000
|
trusted library allocation
|
page read and write
|
||
4A12000
|
unkown
|
page read and write
|
||
114F000
|
stack
|
page read and write
|
||
3659000
|
trusted library allocation
|
page read and write
|
||
7FF5D729E000
|
unkown
|
page readonly
|
||
A1A8000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
36A5000
|
trusted library allocation
|
page read and write
|
||
7609000
|
unkown
|
page read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
105B3000
|
unkown
|
page read and write
|
||
6EF2000
|
unkown
|
page readonly
|
||
A19C000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
2D07000
|
trusted library allocation
|
page read and write
|
||
A195000
|
heap
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
712D000
|
unkown
|
page readonly
|
||
A45E000
|
heap
|
page read and write
|
||
6D53000
|
unkown
|
page readonly
|
||
E41000
|
unkown
|
page execute read
|
||
6A6CC000
|
unkown
|
page read and write
|
||
9E74000
|
heap
|
page read and write
|
||
7FF5D75C1000
|
unkown
|
page readonly
|
||
D55000
|
heap
|
page read and write
|
||
7FF5D71EF000
|
unkown
|
page readonly
|
||
73E000
|
heap
|
page read and write
|
||
7FF5D7309000
|
unkown
|
page readonly
|
||
71A000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
4FA000
|
stack
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
279F000
|
trusted library allocation
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
27E01000
|
direct allocation
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
49FD000
|
unkown
|
page read and write
|
||
73B000
|
heap
|
page read and write
|
||
C62D000
|
unkown
|
page read and write
|
||
A8CE000
|
heap
|
page read and write
|
||
3666000
|
trusted library allocation
|
page read and write
|
||
A8FC000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
6A5E000
|
unkown
|
page readonly
|
||
35C1000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
2CE7000
|
trusted library allocation
|
page read and write
|
||
828000
|
heap
|
page read and write
|
||
734000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
7FF5D7792000
|
unkown
|
page readonly
|
||
4AE14000
|
direct allocation
|
page read and write
|
||
3741000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
7FF5D7764000
|
unkown
|
page readonly
|
||
AD80000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
A0AF000
|
heap
|
page read and write
|
||
2AA4000
|
trusted library allocation
|
page read and write
|
||
7FF5D7546000
|
unkown
|
page readonly
|
||
A1A2000
|
heap
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
111D8000
|
unkown
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
6D51000
|
unkown
|
page readonly
|
||
A1A8000
|
heap
|
page read and write
|
||
3656000
|
trusted library allocation
|
page read and write
|
||
1110E000
|
unkown
|
page read and write
|
||
C653000
|
unkown
|
page read and write
|
||
C0BA000
|
stack
|
page read and write
|
||
6A77B000
|
unkown
|
page read and write
|
||
A1A0000
|
heap
|
page read and write
|
||
A761000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
A7F1000
|
heap
|
page read and write
|
||
A080000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
A4B0000
|
heap
|
page read and write
|
||
A509000
|
heap
|
page read and write
|
||
3639000
|
trusted library allocation
|
page read and write
|
||
AD7F000
|
heap
|
page read and write
|
||
4AE34000
|
direct allocation
|
page read and write
|
||
6A6EC000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
7FF5D758D000
|
unkown
|
page readonly
|
||
2775000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
B2F000
|
stack
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
12BA000
|
trusted library allocation
|
page execute and read and write
|
||
A26A000
|
heap
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
3682000
|
trusted library allocation
|
page read and write
|
||
1100000
|
unkown
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
2CB5000
|
trusted library allocation
|
page read and write
|
||
A278000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
A3C2000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
5463000
|
unkown
|
page read and write
|
||
71C000
|
heap
|
page read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
964000
|
trusted library allocation
|
page read and write
|
||
363F000
|
trusted library allocation
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
769A000
|
unkown
|
page read and write
|
||
94F4000
|
unkown
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
16F1000
|
trusted library allocation
|
page read and write
|
||
8870000
|
unkown
|
page readonly
|
||
9C000
|
stack
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
70F4000
|
unkown
|
page readonly
|
||
A43A000
|
heap
|
page read and write
|
||
362D000
|
unkown
|
page read and write
|
||
1160000
|
unkown
|
page read and write
|
||
A1AA000
|
heap
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
A7D3000
|
heap
|
page read and write
|
||
89DA000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
36B1000
|
trusted library allocation
|
page read and write
|
||
6A6FD000
|
unkown
|
page read and write
|
||
3663000
|
trusted library allocation
|
page read and write
|
||
711000
|
heap
|
page read and write
|
||
7C90000
|
unkown
|
page read and write
|
||
7FF5D76C8000
|
unkown
|
page readonly
|
||
43C0000
|
heap
|
page read and write
|
||
9A6000
|
stack
|
page read and write
|
||
3669000
|
trusted library allocation
|
page read and write
|
||
3651000
|
trusted library allocation
|
page read and write
|
||
C035000
|
stack
|
page read and write
|
||
A19A000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
BD7000
|
trusted library allocation
|
page execute and read and write
|
||
10FB3000
|
unkown
|
page read and write
|
||
A194000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
C5FA000
|
unkown
|
page read and write
|
||
61B0000
|
unkown
|
page readonly
|
||
82F000
|
heap
|
page read and write
|
||
A57C000
|
heap
|
page read and write
|
||
1114A000
|
unkown
|
page read and write
|
||
9A98000
|
unkown
|
page read and write
|
||
7684000
|
unkown
|
page readonly
|
||
373B000
|
trusted library allocation
|
page read and write
|
||
A231000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
8A46000
|
unkown
|
page read and write
|
||
7FF5D75D6000
|
unkown
|
page readonly
|
||
3642000
|
trusted library allocation
|
page read and write
|
||
A6C7000
|
heap
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
1224000
|
trusted library allocation
|
page read and write
|
||
A3E5000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
382C000
|
stack
|
page read and write
|
||
364E000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3687000
|
trusted library allocation
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
7418000
|
unkown
|
page readonly
|
||
D68000
|
heap
|
page read and write
|
||
7FF5D777A000
|
unkown
|
page readonly
|
||
A26D000
|
heap
|
page read and write
|
||
C05000
|
heap
|
page read and write
|
||
A1A3000
|
heap
|
page read and write
|
||
A913000
|
heap
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
C496000
|
unkown
|
page read and write
|
||
3663000
|
trusted library allocation
|
page read and write
|
||
4260000
|
unclassified section
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
A60B000
|
heap
|
page read and write
|
||
39CC000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
A6EC000
|
heap
|
page read and write
|
||
BE4000
|
trusted library allocation
|
page read and write
|
||
6C50000
|
unkown
|
page readonly
|
||
E42000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
10FB6000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D77E9000
|
unkown
|
page readonly
|
||
68F000
|
heap
|
page read and write
|
||
36B3000
|
trusted library allocation
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
727000
|
heap
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
364C000
|
trusted library allocation
|
page read and write
|
||
C450000
|
unkown
|
page read and write
|
||
3637000
|
trusted library allocation
|
page read and write
|
||
368A000
|
trusted library allocation
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
1123F000
|
unkown
|
page read and write
|
||
49D6000
|
unkown
|
page read and write
|
||
3694000
|
trusted library allocation
|
page read and write
|
||
68F000
|
heap
|
page read and write
|
||
7FF5D7820000
|
unkown
|
page readonly
|
||
2430000
|
heap
|
page read and write
|
||
9EAC000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
6F14000
|
unkown
|
page readonly
|
||
89D2000
|
heap
|
page read and write
|
||
6D4D000
|
unkown
|
page readonly
|
||
418000
|
unkown
|
page readonly
|
||
D1E000
|
stack
|
page read and write
|
||
A76C000
|
heap
|
page read and write
|
||
7FF5D75DF000
|
unkown
|
page readonly
|
||
710000
|
heap
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
6DF1000
|
unkown
|
page readonly
|
||
DAE000
|
stack
|
page read and write
|
||
DCD000
|
trusted library allocation
|
page execute and read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
7502000
|
unkown
|
page readonly
|
||
C5FD000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
A1C0000
|
heap
|
page read and write
|
||
110DE000
|
unkown
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
7FF5D7450000
|
unkown
|
page readonly
|
||
9E81000
|
heap
|
page read and write
|
||
A6B4000
|
heap
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
256A000
|
trusted library allocation
|
page execute and read and write
|
||
752D000
|
unkown
|
page readonly
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
A262000
|
heap
|
page read and write
|
||
A768000
|
heap
|
page read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
68F000
|
heap
|
page read and write
|
||
C24E000
|
stack
|
page read and write
|
||
A716000
|
heap
|
page read and write
|
||
1120000
|
unkown
|
page read and write
|
||
7AF1000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
7FF5D7458000
|
unkown
|
page readonly
|
||
7FF5D745B000
|
unkown
|
page readonly
|
||
A4C0000
|
heap
|
page read and write
|
||
7FF5D748C000
|
unkown
|
page readonly
|
||
7FF5D7669000
|
unkown
|
page readonly
|
||
7FF5D7073000
|
unkown
|
page readonly
|
||
6A73D000
|
unkown
|
page read and write
|
||
5690000
|
heap
|
page execute and read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7553000
|
unkown
|
page readonly
|
||
9F7C000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
4CCC000
|
trusted library allocation
|
page read and write
|
||
7FF5D7075000
|
unkown
|
page readonly
|
||
A177000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
A862000
|
heap
|
page read and write
|
||
1350000
|
unkown
|
page readonly
|
||
ADC8000
|
heap
|
page read and write
|
||
6BFD000
|
unkown
|
page readonly
|
||
A1A8000
|
heap
|
page read and write
|
||
3B604000
|
direct allocation
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
239B000
|
trusted library allocation
|
page read and write
|
||
A62B000
|
heap
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
763E000
|
unkown
|
page readonly
|
||
27EF4000
|
direct allocation
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
3675000
|
trusted library allocation
|
page read and write
|
||
272F000
|
stack
|
page read and write
|
||
A594000
|
heap
|
page read and write
|
||
FF5000
|
unkown
|
page execute read
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
A30D000
|
heap
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
7850000
|
unclassified section
|
page readonly
|
||
A8AF000
|
heap
|
page read and write
|
||
364A000
|
trusted library allocation
|
page read and write
|
||
363B000
|
trusted library allocation
|
page read and write
|
||
4AE2C000
|
direct allocation
|
page read and write
|
||
A4A3000
|
heap
|
page read and write
|
||
DCB000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
5353000
|
trusted library allocation
|
page read and write
|
||
7B80000
|
unkown
|
page readonly
|
||
A81C000
|
heap
|
page read and write
|
||
3680000
|
trusted library allocation
|
page read and write
|
||
6EEC000
|
unkown
|
page readonly
|
||
73E000
|
heap
|
page read and write
|
||
A889000
|
heap
|
page read and write
|
||
A6E3000
|
heap
|
page read and write
|
||
35B0000
|
unkown
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
3C57000
|
trusted library allocation
|
page read and write
|
||
54F6000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
A36B000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A7AC000
|
heap
|
page read and write
|
||
7FF5D762F000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
A726000
|
heap
|
page read and write
|
||
9A92000
|
unkown
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
A84F000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
7B20000
|
unkown
|
page read and write
|
||
A39D000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
9A9E000
|
unkown
|
page read and write
|
||
6FB000
|
heap
|
page read and write
|
||
A89A000
|
heap
|
page read and write
|
||
11C1000
|
unkown
|
page read and write
|
||
4C15000
|
trusted library allocation
|
page read and write
|
||
4E81000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
3486000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
7FF5D7745000
|
unkown
|
page readonly
|
||
73E000
|
heap
|
page read and write
|
||
992000
|
trusted library allocation
|
page read and write
|
||
27E60000
|
direct allocation
|
page read and write
|
||
9FBB000
|
heap
|
page read and write
|
||
27F20000
|
direct allocation
|
page read and write
|
||
7FF5D71D7000
|
unkown
|
page readonly
|
||
A4D5000
|
heap
|
page read and write
|
||
C5F8000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
A74A000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A17000
|
trusted library allocation
|
page read and write
|
||
7FF5D7284000
|
unkown
|
page readonly
|
||
1360000
|
unkown
|
page readonly
|
||
41B000
|
unkown
|
page write copy
|
||
166B000
|
trusted library allocation
|
page execute and read and write
|
||
A3AC000
|
unkown
|
page read and write
|
||
10FB5000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
C7C6000
|
unkown
|
page read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
3C2A4000
|
direct allocation
|
page read and write
|
||
3380000
|
unkown
|
page read and write
|
||
4E0E000
|
trusted library allocation
|
page read and write
|
||
A4D3000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
A19C000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page execute and read and write
|
||
27E4C000
|
direct allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
7FF5D75CB000
|
unkown
|
page readonly
|
||
AD76000
|
heap
|
page read and write
|
||
7D2000
|
unkown
|
page readonly
|
||
137D000
|
trusted library allocation
|
page execute and read and write
|
||
10FBE000
|
unkown
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
27E78000
|
direct allocation
|
page read and write
|
||
3663000
|
trusted library allocation
|
page read and write
|
||
7FF5D72FB000
|
unkown
|
page readonly
|
||
A460000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
A671000
|
heap
|
page read and write
|
||
A584000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
6B91000
|
unkown
|
page readonly
|
||
A186000
|
heap
|
page read and write
|
||
B37000
|
heap
|
page read and write
|
||
3672000
|
trusted library allocation
|
page read and write
|
||
7FF5D7272000
|
unkown
|
page readonly
|
||
963000
|
trusted library allocation
|
page execute and read and write
|
||
4E11000
|
trusted library allocation
|
page read and write
|
||
29F6000
|
trusted library allocation
|
page execute and read and write
|
||
35CD000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
2FE3000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
6F2000
|
heap
|
page read and write
|
||
C615000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
29F5000
|
trusted library allocation
|
page execute and read and write
|
||
A17B000
|
heap
|
page read and write
|
||
C78A000
|
unkown
|
page read and write
|
||
A6EF000
|
heap
|
page read and write
|
||
C7BE000
|
unkown
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
6FA000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
12C2000
|
trusted library allocation
|
page read and write
|
||
364A000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
122D000
|
trusted library allocation
|
page execute and read and write
|
||
A1A1000
|
heap
|
page read and write
|
||
7FF5D770A000
|
unkown
|
page readonly
|
||
A0E0000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
7FF5D720A000
|
unkown
|
page readonly
|
||
A386000
|
heap
|
page read and write
|
||
B4D0000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
129D000
|
trusted library allocation
|
page execute and read and write
|
||
727000
|
heap
|
page read and write
|
||
A39C000
|
unkown
|
page read and write
|
||
574F000
|
stack
|
page read and write
|
||
A3D1000
|
heap
|
page read and write
|
||
E40000
|
unkown
|
page readonly
|
||
3B674000
|
direct allocation
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
36B0000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
BE70000
|
unkown
|
page readonly
|
||
7FF5D71C4000
|
unkown
|
page readonly
|
||
8B70000
|
unkown
|
page read and write
|
||
3731000
|
heap
|
page read and write
|
||
927C000
|
stack
|
page read and write
|
||
366A000
|
trusted library allocation
|
page read and write
|
||
9F56000
|
heap
|
page read and write
|
||
9A96000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
70BE000
|
unkown
|
page readonly
|
||
7FF5D710B000
|
unkown
|
page readonly
|
||
9AB4000
|
unkown
|
page read and write
|
||
3637000
|
trusted library allocation
|
page read and write
|
||
86D0000
|
unkown
|
page readonly
|
||
D47000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
5A4E000
|
trusted library allocation
|
page read and write
|
||
A4FD000
|
heap
|
page read and write
|
||
A607000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
A1AA000
|
heap
|
page read and write
|
||
A313000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
89D0000
|
heap
|
page read and write
|
||
3B624000
|
direct allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
A479000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
7460000
|
unkown
|
page read and write
|
||
4A71000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
9AC3000
|
unkown
|
page read and write
|
||
10FB2000
|
unkown
|
page read and write
|
||
7315000
|
unkown
|
page readonly
|
||
54FB000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
997000
|
trusted library allocation
|
page execute and read and write
|
||
70CF000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
A707000
|
heap
|
page read and write
|
||
375A000
|
trusted library allocation
|
page read and write
|
||
7FF5D77F7000
|
unkown
|
page readonly
|
||
27D0000
|
heap
|
page read and write
|
||
1220000
|
trusted library allocation
|
page read and write
|
||
AD88000
|
heap
|
page read and write
|
||
A410000
|
heap
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
714A000
|
unkown
|
page readonly
|
||
4690000
|
heap
|
page read and write
|
||
71C000
|
heap
|
page read and write
|
||
C621000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
30FB000
|
stack
|
page read and write
|
||
510B000
|
trusted library allocation
|
page read and write
|
||
986000
|
stack
|
page read and write
|
||
7FF5D719C000
|
unkown
|
page readonly
|
||
A62F000
|
heap
|
page read and write
|
||
A174000
|
heap
|
page read and write
|
||
148C000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
3663000
|
trusted library allocation
|
page read and write
|
||
599F000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
BC1000
|
trusted library allocation
|
page read and write
|
||
3663000
|
trusted library allocation
|
page read and write
|
||
5144000
|
trusted library allocation
|
page read and write
|
||
1731000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
9F5C000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
62E000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
A2F0000
|
heap
|
page read and write
|
||
7FF5D6AB6000
|
unkown
|
page readonly
|
||
454000
|
unkown
|
page readonly
|
||
3DE000
|
stack
|
page read and write
|
||
EB9000
|
unkown
|
page readonly
|
||
10674000
|
unkown
|
page read and write
|
||
367B000
|
trusted library allocation
|
page read and write
|
||
D00000
|
unkown
|
page read and write
|
||
7FF5D7648000
|
unkown
|
page readonly
|
||
86E0000
|
unkown
|
page readonly
|
||
365D000
|
trusted library allocation
|
page read and write
|
||
779E000
|
unkown
|
page read and write
|
||
A2FC000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
7201000
|
unkown
|
page readonly
|
||
418000
|
unkown
|
page readonly
|
||
75F8000
|
unkown
|
page read and write
|
||
3C204000
|
direct allocation
|
page read and write
|
||
33B0000
|
unkown
|
page readonly
|
||
716000
|
heap
|
page read and write
|
||
A1C4000
|
heap
|
page read and write
|
||
29AB000
|
heap
|
page read and write
|
||
D41000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3662000
|
trusted library allocation
|
page read and write
|
||
30D1000
|
trusted library allocation
|
page read and write
|
||
A131000
|
heap
|
page read and write
|
||
7FF5D771A000
|
unkown
|
page readonly
|
||
C20000
|
remote allocation
|
page read and write
|
||
A3F4000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
747A000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
7FF5D774C000
|
unkown
|
page readonly
|
||
1499000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
105F000
|
stack
|
page read and write
|
||
75FD000
|
unkown
|
page read and write
|
||
368F000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
12D0000
|
unkown
|
page readonly
|
||
27E7C000
|
direct allocation
|
page read and write
|
||
B7DC000
|
stack
|
page read and write
|
||
3116000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
4E25000
|
trusted library allocation
|
page read and write
|
||
77DB000
|
unkown
|
page read and write
|
||
A3BB000
|
heap
|
page read and write
|
||
A179000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
9F99000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
9F4F000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
BB9E000
|
stack
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
7FF5D7244000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
4AE04000
|
direct allocation
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
BEA0000
|
unkown
|
page readonly
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
7FF5D77E0000
|
unkown
|
page readonly
|
||
9E0000
|
heap
|
page read and write
|
||
8360000
|
unkown
|
page read and write
|
||
A5D3000
|
heap
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
2FE9000
|
trusted library allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
A144000
|
heap
|
page read and write
|
||
2960000
|
direct allocation
|
page execute and read and write
|
||
B559000
|
stack
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
A1A5000
|
heap
|
page read and write
|
||
503D000
|
stack
|
page read and write
|
||
33F0000
|
unkown
|
page read and write
|
||
75D1000
|
unkown
|
page readonly
|
||
A00000
|
trusted library allocation
|
page execute and read and write
|
||
3682000
|
trusted library allocation
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
76CC000
|
unkown
|
page readonly
|
||
555000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
F3B000
|
stack
|
page read and write
|
||
A7EF000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
A939000
|
heap
|
page read and write
|
||
960000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
unkown
|
page readonly
|
||
3B668000
|
direct allocation
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
364E000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
4B60000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3689000
|
trusted library allocation
|
page read and write
|
||
27A7000
|
heap
|
page read and write
|
||
A7C2000
|
heap
|
page read and write
|
||
A905000
|
heap
|
page read and write
|
||
7FF5D7391000
|
unkown
|
page readonly
|
||
2F7E000
|
stack
|
page read and write
|
||
A3F2000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
A170000
|
heap
|
page read and write
|
||
A59E000
|
heap
|
page read and write
|
||
A658000
|
heap
|
page read and write
|
||
44F0000
|
heap
|
page read and write
|
||
3690000
|
trusted library allocation
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
A5B2000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
363D000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2770000
|
heap
|
page read and write
|
||
A812000
|
heap
|
page read and write
|
||
363B000
|
trusted library allocation
|
page read and write
|
||
A666000
|
heap
|
page read and write
|
||
280A000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
12B6000
|
trusted library allocation
|
page execute and read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
27E6C000
|
direct allocation
|
page read and write
|
||
E4A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D76D5000
|
unkown
|
page readonly
|
||
A10000
|
heap
|
page read and write
|
||
3669000
|
trusted library allocation
|
page read and write
|
||
9A76000
|
unkown
|
page read and write
|
||
A590000
|
heap
|
page read and write
|
||
10FB9000
|
unkown
|
page read and write
|
||
27AF000
|
heap
|
page execute and read and write
|
||
2708000
|
unkown
|
page readonly
|
||
39C5000
|
trusted library allocation
|
page read and write
|
||
C7CB000
|
unkown
|
page read and write
|
||
A3B6000
|
unkown
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
7FF5D71C8000
|
unkown
|
page readonly
|
||
718000
|
heap
|
page read and write
|
||
3120000
|
trusted library allocation
|
page read and write
|
||
A326000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
98FD000
|
stack
|
page read and write
|
||
3792000
|
trusted library allocation
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
A185000
|
heap
|
page read and write
|
||
AA1000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
5550000
|
trusted library allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
9FAF000
|
stack
|
page read and write
|
||
7FF5D77A4000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
12CB000
|
trusted library allocation
|
page execute and read and write
|
||
F421000
|
unkown
|
page read and write
|
||
A416000
|
unkown
|
page read and write
|
||
3641000
|
trusted library allocation
|
page read and write
|
||
A910000
|
heap
|
page read and write
|
||
A709000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
A903000
|
heap
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
10FB6000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
6FE6000
|
unkown
|
page readonly
|
||
A458000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
560E000
|
stack
|
page read and write
|
||
3B01000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
A1C5000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
A17D000
|
heap
|
page read and write
|
||
3689000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
7FF5D760B000
|
unkown
|
page readonly
|
||
9F82000
|
heap
|
page read and write
|
||
9FFD000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
761E000
|
unkown
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
18D0000
|
heap
|
page execute and read and write
|
||
96D000
|
trusted library allocation
|
page execute and read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
4CC2000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
4AA0000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A1BD000
|
heap
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A3FB000
|
heap
|
page read and write
|
||
10574000
|
unkown
|
page read and write
|
||
A3B8000
|
heap
|
page read and write
|
||
1113D000
|
unkown
|
page read and write
|
||
11112000
|
unkown
|
page read and write
|
||
10534000
|
unkown
|
page read and write
|
||
BF3E000
|
stack
|
page read and write
|
||
9FB1000
|
heap
|
page read and write
|
||
C47F000
|
unkown
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
7AB0000
|
unkown
|
page read and write
|
||
6A6FE000
|
unkown
|
page write copy
|
||
7D0000
|
unkown
|
page readonly
|
||
A795000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
7DF4F2471000
|
unkown
|
page execute read
|
||
7F3000
|
trusted library allocation
|
page execute and read and write
|
||
A1A0000
|
heap
|
page read and write
|
||
10BB1000
|
unkown
|
page read and write
|
||
7FF5D7703000
|
unkown
|
page readonly
|
||
3699000
|
trusted library allocation
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
7FF5D6BE4000
|
unkown
|
page readonly
|
||
A3ED000
|
heap
|
page read and write
|
||
3002000
|
trusted library allocation
|
page read and write
|
||
10FB2000
|
unkown
|
page read and write
|
||
15D4000
|
unkown
|
page readonly
|
||
9A84000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D72C8000
|
unkown
|
page readonly
|
||
A467000
|
heap
|
page read and write
|
||
27EAC000
|
direct allocation
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
7FF5D764F000
|
unkown
|
page readonly
|
||
A6FC000
|
heap
|
page read and write
|
||
A882000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
A332000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
A369000
|
heap
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
5332000
|
trusted library allocation
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
381A000
|
trusted library allocation
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
30D7000
|
trusted library allocation
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
35CF000
|
unkown
|
page read and write
|
||
7148000
|
unkown
|
page readonly
|
||
3659000
|
trusted library allocation
|
page read and write
|
||
35D3000
|
unkown
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
A6CD000
|
heap
|
page read and write
|
||
A28D000
|
unkown
|
page read and write
|
||
A31C000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
7CB0000
|
unkown
|
page readonly
|
||
75E0000
|
unkown
|
page read and write
|
||
50D0000
|
heap
|
page execute and read and write
|
||
50C2000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
A5DA000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
5594000
|
trusted library allocation
|
page read and write
|
||
110F0000
|
unkown
|
page read and write
|
||
A834000
|
heap
|
page read and write
|
||
7FF5D775C000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
1120000
|
unkown
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
98A000
|
trusted library allocation
|
page execute and read and write
|
||
123E000
|
stack
|
page read and write
|
||
2AA6000
|
trusted library allocation
|
page read and write
|
||
2FF2000
|
trusted library allocation
|
page read and write
|
||
EB5000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
7FF5D705D000
|
unkown
|
page readonly
|
||
A8E7000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
2C0A000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
stack
|
page read and write
|
||
41B000
|
unkown
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
A6A7000
|
heap
|
page read and write
|
||
2380000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
368B000
|
trusted library allocation
|
page read and write
|
||
6F0A000
|
unkown
|
page readonly
|
||
758F000
|
unkown
|
page readonly
|
||
A33A000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
7E58000
|
stack
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
ADB8000
|
heap
|
page read and write
|
||
7FF5D7482000
|
unkown
|
page readonly
|
||
713000
|
heap
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
112CF000
|
unkown
|
page read and write
|
||
7FF5D769E000
|
unkown
|
page readonly
|
||
3658000
|
trusted library allocation
|
page read and write
|
||
3129000
|
trusted library allocation
|
page read and write
|
||
1450000
|
trusted library allocation
|
page execute and read and write
|
||
C00000
|
heap
|
page read and write
|
||
7FF5D748A000
|
unkown
|
page readonly
|
||
9AAA000
|
unkown
|
page read and write
|
||
B4BF000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
11146000
|
unkown
|
page read and write
|
||
A8BF000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
E00000
|
unkown
|
page readonly
|
||
7FF5D6BEF000
|
unkown
|
page readonly
|
||
418000
|
unkown
|
page readonly
|
||
D13000
|
unkown
|
page execute read
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
7B00000
|
unkown
|
page readonly
|
||
7FF5D7262000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
7FF5D71CC000
|
unkown
|
page readonly
|
||
56E3000
|
trusted library allocation
|
page read and write
|
||
C605000
|
unkown
|
page read and write
|
||
A5E1000
|
heap
|
page read and write
|
||
2FE6000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
9F1D000
|
heap
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
3500000
|
stack
|
page read and write
|
||
37E2000
|
trusted library allocation
|
page read and write
|
||
3F07000
|
trusted library allocation
|
page read and write
|
||
7FF5D7507000
|
unkown
|
page readonly
|
||
561A000
|
trusted library allocation
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
56E5000
|
trusted library allocation
|
page read and write
|
||
7FF5D765F000
|
unkown
|
page readonly
|
||
50C0000
|
unkown
|
page readonly
|
||
9EB1000
|
heap
|
page read and write
|
||
ADB0000
|
heap
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
29FA000
|
trusted library allocation
|
page execute and read and write
|
||
B66000
|
heap
|
page read and write
|
||
99B8000
|
unkown
|
page read and write
|
||
A4FF000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
A65E000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
A1F4000
|
heap
|
page read and write
|
||
3B688000
|
direct allocation
|
page read and write
|
||
DC4000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3812000
|
trusted library allocation
|
page read and write
|
||
7611000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
7FF5D71A6000
|
unkown
|
page readonly
|
||
7FF5D7643000
|
unkown
|
page readonly
|
||
4CD1000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
3380000
|
unkown
|
page read and write
|
||
9DB000
|
stack
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
16DE000
|
stack
|
page read and write
|
||
3641000
|
trusted library allocation
|
page read and write
|
||
7FF5D7336000
|
unkown
|
page readonly
|
||
ADAB000
|
heap
|
page read and write
|
||
A598000
|
heap
|
page read and write
|
||
69EE000
|
unkown
|
page readonly
|
||
2F01000
|
trusted library allocation
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
A346000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
3662000
|
trusted library allocation
|
page read and write
|
||
7FF5D743F000
|
unkown
|
page readonly
|
||
1000000
|
heap
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
A2BA000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
A803000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
559E000
|
trusted library allocation
|
page read and write
|
||
9E95000
|
heap
|
page read and write
|
||
369B000
|
trusted library allocation
|
page read and write
|
||
367B000
|
trusted library allocation
|
page read and write
|
||
35B3000
|
unkown
|
page read and write
|
||
A19C000
|
heap
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
1250000
|
unkown
|
page read and write
|
||
368A000
|
trusted library allocation
|
page read and write
|
||
A63F000
|
heap
|
page read and write
|
||
A8BC000
|
heap
|
page read and write
|
||
86F000
|
heap
|
page read and write
|
||
A5E5000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
6A784000
|
unkown
|
page read and write
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
3630000
|
unkown
|
page readonly
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
739E000
|
unkown
|
page readonly
|
||
9A80000
|
unkown
|
page read and write
|
||
A697000
|
heap
|
page read and write
|
||
3685000
|
trusted library allocation
|
page read and write
|
||
A1A7000
|
heap
|
page read and write
|
||
4E72000
|
trusted library allocation
|
page read and write
|
||
A1A1000
|
heap
|
page read and write
|
||
3310000
|
unkown
|
page read and write
|
||
35BD000
|
unkown
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
691000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
A83A000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
970000
|
trusted library allocation
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
70C000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
DB8000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
4D92000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3FE000
|
stack
|
page read and write
|
||
A17D000
|
heap
|
page read and write
|
||
3280000
|
unkown
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
C806000
|
unkown
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
1F90000
|
heap
|
page read and write
|
||
C81C000
|
unkown
|
page read and write
|
||
2B05000
|
trusted library allocation
|
page read and write
|
||
6A6B1000
|
unkown
|
page write copy
|
||
3B694000
|
direct allocation
|
page read and write
|
||
AD7B000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
BE49000
|
stack
|
page read and write
|
||
A79B000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
180E000
|
stack
|
page read and write
|
||
9D67000
|
unkown
|
page read and write
|
||
A909000
|
heap
|
page read and write
|
||
74E0000
|
unkown
|
page readonly
|
||
10FBD000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
9F58000
|
heap
|
page read and write
|
||
363A000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
7361000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
A5FD000
|
heap
|
page read and write
|
||
6A964000
|
unkown
|
page readonly
|
||
303F000
|
stack
|
page read and write
|
||
110E4000
|
unkown
|
page read and write
|
||
5114000
|
trusted library allocation
|
page read and write
|
||
3B07000
|
trusted library allocation
|
page read and write
|
||
1281000
|
unkown
|
page readonly
|
||
FEE000
|
stack
|
page read and write
|
||
3662000
|
trusted library allocation
|
page read and write
|
||
A67E000
|
heap
|
page read and write
|
||
672000
|
heap
|
page read and write
|
||
A1A4000
|
heap
|
page read and write
|
||
AE1D000
|
stack
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
13A0000
|
unkown
|
page readonly
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
7FF5D72E9000
|
unkown
|
page readonly
|
||
9F8000
|
heap
|
page read and write
|
||
7654000
|
unkown
|
page read and write
|
||
A0A9000
|
stack
|
page read and write
|
||
4151000
|
trusted library allocation
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
A919000
|
heap
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
68D000
|
heap
|
page read and write
|
||
7FF5D77CD000
|
unkown
|
page readonly
|
||
110D9000
|
unkown
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
49BB000
|
unkown
|
page read and write
|
||
8F49000
|
stack
|
page read and write
|
||
3BB0000
|
heap
|
page read and write
|
||
1690000
|
heap
|
page execute and read and write
|
||
2740000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A179000
|
heap
|
page read and write
|
||
7803000
|
unkown
|
page readonly
|
||
A1A9000
|
heap
|
page read and write
|
||
A4D1000
|
heap
|
page read and write
|
||
8E4E000
|
stack
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
CC0000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
7FF5D7641000
|
unkown
|
page readonly
|
||
7FF5D7694000
|
unkown
|
page readonly
|
||
716000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
3639000
|
trusted library allocation
|
page read and write
|
||
3634000
|
trusted library allocation
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
35D5000
|
unkown
|
page read and write
|
||
7FF5D71F9000
|
unkown
|
page readonly
|
||
AD7F000
|
heap
|
page read and write
|
||
A792000
|
heap
|
page read and write
|
||
10F6000
|
stack
|
page read and write
|
||
A57D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6EF6000
|
unkown
|
page readonly
|
||
625000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
6B8F000
|
unkown
|
page readonly
|
||
7637000
|
unkown
|
page read and write
|
||
363F000
|
trusted library allocation
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
2394000
|
trusted library allocation
|
page read and write
|
||
9A72000
|
unkown
|
page read and write
|
||
A4C3000
|
heap
|
page read and write
|
||
8890000
|
unkown
|
page readonly
|
||
7FF5D7442000
|
unkown
|
page readonly
|
||
40A000
|
unkown
|
page read and write
|
||
2774000
|
heap
|
page read and write
|
||
6BFF000
|
unkown
|
page readonly
|
||
9B0B000
|
unkown
|
page read and write
|
||
363F000
|
trusted library allocation
|
page read and write
|
||
365F000
|
trusted library allocation
|
page read and write
|
||
A17D000
|
heap
|
page read and write
|
||
3B628000
|
direct allocation
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
827000
|
trusted library allocation
|
page execute and read and write
|
||
627000
|
heap
|
page read and write
|
||
A1AC000
|
heap
|
page read and write
|
||
27A1000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
A233000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
6A6F1000
|
unkown
|
page read and write
|
||
A17F000
|
heap
|
page read and write
|
||
A581000
|
heap
|
page read and write
|
||
7182000
|
unkown
|
page readonly
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
A32E000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
561F000
|
trusted library allocation
|
page read and write
|
||
35FA000
|
unkown
|
page read and write
|
||
9F6B000
|
heap
|
page read and write
|
||
3C280000
|
direct allocation
|
page read and write
|
||
124F000
|
stack
|
page read and write
|
||
1121B000
|
unkown
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
A729000
|
heap
|
page read and write
|
||
A732000
|
heap
|
page read and write
|
||
997C000
|
stack
|
page read and write
|
||
A661000
|
heap
|
page read and write
|
||
739000
|
heap
|
page read and write
|
||
7FF5D728E000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
C460000
|
unkown
|
page read and write
|
||
2FE1000
|
heap
|
page read and write
|
||
D3E000
|
heap
|
page read and write
|
||
74B9000
|
unkown
|
page readonly
|
||
42E000
|
unkown
|
page readonly
|
||
7FF5D75F6000
|
unkown
|
page readonly
|
||
43FF000
|
stack
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
7FF5D751F000
|
unkown
|
page readonly
|
||
A1AB000
|
heap
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
A872000
|
heap
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
3671000
|
trusted library allocation
|
page read and write
|
||
7FF5D7429000
|
unkown
|
page readonly
|
||
53EF000
|
stack
|
page read and write
|
||
7FF5D7591000
|
unkown
|
page readonly
|
||
35E4000
|
unkown
|
page read and write
|
||
7FF5D776D000
|
unkown
|
page readonly
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
36EB000
|
trusted library allocation
|
page read and write
|
||
7FF5D7292000
|
unkown
|
page readonly
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
C96B000
|
unkown
|
page read and write
|
||
A88C000
|
heap
|
page read and write
|
||
3663000
|
trusted library allocation
|
page read and write
|
||
3C201000
|
direct allocation
|
page read and write
|
||
F438000
|
unkown
|
page read and write
|
||
6A703000
|
unkown
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
1100000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
A6DF000
|
heap
|
page read and write
|
||
7FF5D779E000
|
unkown
|
page readonly
|
||
6FF000
|
heap
|
page read and write
|
||
A1BD000
|
heap
|
page read and write
|
||
A1A2000
|
heap
|
page read and write
|
||
10FB9000
|
unkown
|
page read and write
|
||
A80C000
|
heap
|
page read and write
|
||
A389000
|
heap
|
page read and write
|
||
A196000
|
heap
|
page read and write
|
||
36AE000
|
trusted library allocation
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
A1A2000
|
heap
|
page read and write
|
||
110F7000
|
unkown
|
page read and write
|
||
A17B000
|
heap
|
page read and write
|
||
7B1000
|
heap
|
page read and write
|
||
74AE000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
A19E000
|
heap
|
page read and write
|
||
35B5000
|
unkown
|
page read and write
|
||
27D7000
|
heap
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
B2B000
|
heap
|
page read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
A2D7000
|
unkown
|
page read and write
|
||
A17C000
|
heap
|
page read and write
|
||
7FF5D7396000
|
unkown
|
page readonly
|
||
A4CA000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
C4C6000
|
unkown
|
page read and write
|
||
363B000
|
trusted library allocation
|
page read and write
|
||
476D000
|
stack
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
7FF5D7558000
|
unkown
|
page readonly
|
||
4250000
|
direct allocation
|
page read and write
|
||
C9A7000
|
unkown
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
9E7F000
|
heap
|
page read and write
|
||
BA6000
|
trusted library allocation
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
F5F000
|
stack
|
page read and write
|
||
9AA8000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
A776000
|
heap
|
page read and write
|
||
A1A5000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
7FD000
|
trusted library allocation
|
page execute and read and write
|
||
16E0000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
A9E9000
|
unkown
|
page read and write
|
||
A17B000
|
heap
|
page read and write
|
||
7FF5D75F9000
|
unkown
|
page readonly
|
||
C483000
|
unkown
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
A1C3000
|
heap
|
page read and write
|
||
E3B000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
3C55000
|
trusted library allocation
|
page read and write
|
||
3683000
|
trusted library allocation
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
3668000
|
trusted library allocation
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
A314000
|
heap
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
5640000
|
heap
|
page read and write
|
||
A40B000
|
heap
|
page read and write
|
||
A700000
|
heap
|
page read and write
|
||
7FF5D76D7000
|
unkown
|
page readonly
|
||
99C0000
|
unkown
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
7FF5D77C7000
|
unkown
|
page readonly
|
||
DB0000
|
heap
|
page read and write
|
||
B0BD000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
7114000
|
unkown
|
page readonly
|
||
7FF5D738E000
|
unkown
|
page readonly
|
||
667000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page read and write
|
||
BDC0000
|
unkown
|
page read and write
|
||
71FF000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
7AA0000
|
unkown
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
8ECC000
|
stack
|
page read and write
|
||
A237000
|
unkown
|
page read and write
|
||
C4BD000
|
unkown
|
page read and write
|
||
3679000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
3590000
|
remote allocation
|
page read and write
|
||
504F000
|
stack
|
page read and write
|
||
7293000
|
unkown
|
page readonly
|
||
AB2000
|
heap
|
page read and write
|
||
3B658000
|
direct allocation
|
page read and write
|
||
FF4000
|
unkown
|
page read and write
|
||
A646000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
8A00000
|
unkown
|
page read and write
|
||
7FF5D75BF000
|
unkown
|
page readonly
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
105FB000
|
unkown
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
6FA000
|
heap
|
page read and write
|
||
364A000
|
trusted library allocation
|
page read and write
|
||
3C2B0000
|
direct allocation
|
page read and write
|
||
7FF5D7799000
|
unkown
|
page readonly
|
||
6EF8000
|
unkown
|
page readonly
|
||
FA0000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
9EF3000
|
heap
|
page read and write
|
||
C3CE000
|
stack
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
A198000
|
heap
|
page read and write
|
||
364A000
|
trusted library allocation
|
page read and write
|
||
3C2FC000
|
direct allocation
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
C609000
|
unkown
|
page read and write
|
||
3679000
|
trusted library allocation
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A1B4000
|
heap
|
page read and write
|
||
A579000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
A41E000
|
heap
|
page read and write
|
||
C4DC000
|
unkown
|
page read and write
|
||
35D1000
|
unkown
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3679000
|
trusted library allocation
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
27E8C000
|
direct allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
7FF5D77EB000
|
unkown
|
page readonly
|
||
C1CC000
|
stack
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
55B7000
|
trusted library allocation
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
B0E0000
|
unkown
|
page readonly
|
||
A93F000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
363B000
|
trusted library allocation
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
5525000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
trusted library allocation
|
page read and write
|
||
7FF5D72D0000
|
unkown
|
page readonly
|
||
7FF5D71EA000
|
unkown
|
page readonly
|
||
A765000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7730000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
3520000
|
unkown
|
page readonly
|
||
A7AE000
|
heap
|
page read and write
|
||
A71D000
|
heap
|
page read and write
|
||
10FB1000
|
unkown
|
page read and write
|
||
27EB0000
|
direct allocation
|
page read and write
|
||
B220000
|
unkown
|
page read and write
|
||
4AB0000
|
unkown
|
page read and write
|
||
E40000
|
unkown
|
page readonly
|
||
4A44000
|
unkown
|
page read and write
|
||
A19C000
|
heap
|
page read and write
|
||
70F2000
|
unkown
|
page readonly
|
||
9B2C000
|
unkown
|
page read and write
|
||
7FF5D75D9000
|
unkown
|
page readonly
|
||
7FF5D73F5000
|
unkown
|
page readonly
|
||
7DF4F24A1000
|
unkown
|
page execute read
|
||
A586000
|
heap
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
3B638000
|
direct allocation
|
page read and write
|
||
A251000
|
unkown
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
A286000
|
unkown
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
F436000
|
unkown
|
page read and write
|
||
A1BF000
|
heap
|
page read and write
|
||
1120000
|
unkown
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
721000
|
heap
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
72E9000
|
unkown
|
page readonly
|
||
8390000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D783B000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
2572000
|
trusted library allocation
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
4ED6000
|
unkown
|
page readonly
|
||
7FF5D7700000
|
unkown
|
page readonly
|
||
6A6F3000
|
unkown
|
page write copy
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
3B640000
|
direct allocation
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
A2B5000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7810000
|
unkown
|
page read and write
|
||
8880000
|
unkown
|
page readonly
|
||
105F6000
|
unkown
|
page read and write
|
||
3120000
|
unkown
|
page read and write
|
||
1112D000
|
unkown
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
1667000
|
trusted library allocation
|
page execute and read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
A1B6000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
36BC000
|
trusted library allocation
|
page read and write
|
||
364A000
|
trusted library allocation
|
page read and write
|
||
23D2000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
9A8C000
|
unkown
|
page read and write
|
||
35D7000
|
trusted library allocation
|
page read and write
|
||
ECC000
|
unkown
|
page readonly
|
||
A070000
|
heap
|
page read and write
|
||
7FF5D77C2000
|
unkown
|
page readonly
|
||
4C8E000
|
stack
|
page read and write
|
||
C5F4000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
F434000
|
unkown
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
9F74000
|
heap
|
page read and write
|
||
7FF5D7784000
|
unkown
|
page readonly
|
||
4DB6000
|
trusted library allocation
|
page read and write
|
||
44D0000
|
heap
|
page read and write
|
||
A1AE000
|
heap
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
4AE40000
|
direct allocation
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
A101000
|
heap
|
page read and write
|
||
A88E000
|
heap
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
3668000
|
trusted library allocation
|
page read and write
|
||
A50C000
|
heap
|
page read and write
|
||
71C000
|
heap
|
page read and write
|
||
7DF4F2480000
|
unkown
|
page readonly
|
||
6DA000
|
heap
|
page read and write
|
||
68D000
|
heap
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
3530000
|
unkown
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
7125000
|
unkown
|
page readonly
|
||
4AF3000
|
trusted library allocation
|
page read and write
|
||
A1BB000
|
heap
|
page read and write
|
||
A784000
|
heap
|
page read and write
|
||
2C37000
|
trusted library allocation
|
page read and write
|
||
27E14000
|
direct allocation
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
A66C000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
10FBB000
|
unkown
|
page read and write
|
||
A5DC000
|
heap
|
page read and write
|
||
A408000
|
unkown
|
page read and write
|
||
12F6000
|
heap
|
page read and write
|
||
A3C8000
|
heap
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
3682000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
A236000
|
heap
|
page read and write
|
||
A415000
|
heap
|
page read and write
|
||
5360000
|
heap
|
page execute and read and write
|
||
1120000
|
heap
|
page read and write
|
||
A0B8000
|
heap
|
page read and write
|
||
A8EF000
|
heap
|
page read and write
|
||
FCF000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
85E000
|
heap
|
page read and write
|
||
A19F000
|
heap
|
page read and write
|
||
3B620000
|
direct allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
3682000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
70B3000
|
unkown
|
page readonly
|
||
A586000
|
heap
|
page read and write
|
||
3C26C000
|
direct allocation
|
page read and write
|
||
81A000
|
trusted library allocation
|
page execute and read and write
|
||
2501000
|
trusted library allocation
|
page read and write
|
||
7FF5D75B3000
|
unkown
|
page readonly
|
||
C5F0000
|
unkown
|
page read and write
|
||
A3AD000
|
heap
|
page read and write
|
||
3B650000
|
direct allocation
|
page read and write
|
||
55A4000
|
trusted library allocation
|
page read and write
|
||
A24C000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
10FB8000
|
unkown
|
page read and write
|
||
AA40000
|
unkown
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
A714000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
7FF5D71E0000
|
unkown
|
page readonly
|
||
3691000
|
trusted library allocation
|
page read and write
|
||
A172000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
A93000
|
heap
|
page read and write
|
||
4460000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
35B000
|
stack
|
page read and write
|
||
7FF5D69BB000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
A197000
|
heap
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
9F85000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
1790000
|
trusted library allocation
|
page execute and read and write
|
||
76F8000
|
unkown
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
12B0000
|
unkown
|
page read and write
|
||
6A6F7000
|
unkown
|
page read and write
|
||
A87D000
|
heap
|
page read and write
|
||
A39F000
|
unkown
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
5121000
|
trusted library allocation
|
page read and write
|
||
A193000
|
heap
|
page read and write
|
||
11132000
|
unkown
|
page read and write
|
||
7FF5CE343000
|
unkown
|
page readonly
|
||
A199000
|
heap
|
page read and write
|
||
A5B9000
|
heap
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
7FF5D723F000
|
unkown
|
page readonly
|
||
A3E1000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
A432000
|
heap
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
A091000
|
heap
|
page read and write
|
||
1364000
|
trusted library allocation
|
page read and write
|
||
A1B2000
|
heap
|
page read and write
|
||
2566000
|
trusted library allocation
|
page execute and read and write
|
||
D84000
|
heap
|
page read and write
|
||
7618000
|
unkown
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
C7D000
|
stack
|
page read and write
|
||
2737000
|
trusted library allocation
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
29F7000
|
trusted library allocation
|
page execute and read and write
|
||
4E04000
|
trusted library allocation
|
page read and write
|
||
A1A6000
|
heap
|
page read and write
|
||
7FF5D776F000
|
unkown
|
page readonly
|
||
4E40000
|
heap
|
page execute and read and write
|
||
C3E000
|
stack
|
page read and write
|
||
3C270000
|
direct allocation
|
page read and write
|
||
AAA8000
|
unkown
|
page read and write
|
||
11277000
|
unkown
|
page read and write
|
||
4E92000
|
unkown
|
page readonly
|
||
8989000
|
unkown
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
A74F000
|
heap
|
page read and write
|
||
A34F000
|
heap
|
page read and write
|
||
9E88000
|
heap
|
page read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
35D1000
|
trusted library allocation
|
page read and write
|
||
D7D000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D768B000
|
unkown
|
page readonly
|
||
7FF5D74FA000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
4DA1000
|
trusted library allocation
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
A5BF000
|
heap
|
page read and write
|
||
10BE000
|
stack
|
page read and write
|
||
A856000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
7AE0000
|
unkown
|
page read and write
|
||
44E0000
|
heap
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
3662000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
10FBF000
|
unkown
|
page read and write
|
||
6A740000
|
unkown
|
page read and write
|
||
7FF5D7462000
|
unkown
|
page readonly
|
||
A5B7000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page readonly
|
||
53BE000
|
stack
|
page read and write
|
||
A8B4000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
7FF5D75B8000
|
unkown
|
page readonly
|
||
540000
|
heap
|
page read and write
|
||
3360000
|
unkown
|
page read and write
|
||
A8DE000
|
heap
|
page read and write
|
||
3630000
|
trusted library allocation
|
page read and write
|
||
FF4000
|
unkown
|
page write copy
|
||
855000
|
heap
|
page read and write
|
||
A139000
|
heap
|
page read and write
|
||
23B1000
|
trusted library allocation
|
page read and write
|
||
6A6BA000
|
unkown
|
page write copy
|
||
A5CF000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7608000
|
unkown
|
page readonly
|
||
7FF5D72BD000
|
unkown
|
page readonly
|
||
69C000
|
heap
|
page read and write
|
||
A5A9000
|
heap
|
page read and write
|
||
CC1000
|
unkown
|
page execute read
|
||
A742000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
3689000
|
trusted library allocation
|
page read and write
|
||
3360000
|
unkown
|
page read and write
|
||
9F9B000
|
heap
|
page read and write
|
||
7DF4F2491000
|
unkown
|
page execute read
|
||
8B70000
|
unkown
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page execute and read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
24CE000
|
stack
|
page read and write
|
||
BA3000
|
trusted library allocation
|
page execute and read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
3C2A0000
|
direct allocation
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
A574000
|
heap
|
page read and write
|
||
9A8E000
|
unkown
|
page read and write
|
||
A406000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
A949000
|
heap
|
page read and write
|
||
1360000
|
trusted library allocation
|
page read and write
|
||
7FF5D7797000
|
unkown
|
page readonly
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
D3A000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
7FF5D7760000
|
unkown
|
page readonly
|
||
C472000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
3675000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
4F3D000
|
stack
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
A57D000
|
heap
|
page read and write
|
||
69F0000
|
unkown
|
page readonly
|
||
9E81000
|
heap
|
page read and write
|
||
7CE000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
3B6E0000
|
direct allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A264000
|
unkown
|
page read and write
|
||
A17A000
|
heap
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
C663000
|
unkown
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
7FF5D7593000
|
unkown
|
page readonly
|
||
4AE44000
|
direct allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
7FF5D7722000
|
unkown
|
page readonly
|
||
424E000
|
stack
|
page read and write
|
||
E2D000
|
trusted library allocation
|
page execute and read and write
|
||
A186000
|
heap
|
page read and write
|
||
2577000
|
trusted library allocation
|
page execute and read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
3110000
|
unkown
|
page readonly
|
||
1170000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
95FB000
|
stack
|
page read and write
|
||
7FF5D7425000
|
unkown
|
page readonly
|
||
A7B3000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
A8DC000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
A180000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
BF9000
|
trusted library allocation
|
page read and write
|
||
A1A3000
|
heap
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
4AE01000
|
direct allocation
|
page read and write
|
||
768E000
|
unkown
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
50C3000
|
trusted library allocation
|
page read and write
|
||
E86000
|
heap
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3105000
|
trusted library allocation
|
page read and write
|
||
A335000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
25D1000
|
trusted library allocation
|
page read and write
|
||
A182000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
9F65000
|
heap
|
page read and write
|
||
12AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D7740000
|
unkown
|
page readonly
|
||
3114000
|
trusted library allocation
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
heap
|
page execute and read and write
|
||
A1A5000
|
heap
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
3775000
|
trusted library allocation
|
page read and write
|
||
A78D000
|
heap
|
page read and write
|
||
94AE000
|
stack
|
page read and write
|
||
A198000
|
heap
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
366A000
|
trusted library allocation
|
page read and write
|
||
C84000
|
trusted library allocation
|
page read and write
|
||
7FF5D7230000
|
unkown
|
page readonly
|
||
6F4000
|
heap
|
page read and write
|
||
A852000
|
heap
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
3694000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
F3F0000
|
unkown
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
816000
|
trusted library allocation
|
page execute and read and write
|
||
62E000
|
heap
|
page read and write
|
||
4E90000
|
unkown
|
page readonly
|
||
F86000
|
heap
|
page read and write
|
||
9679000
|
stack
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
A384000
|
unkown
|
page read and write
|
||
2CDF000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
7E60000
|
unkown
|
page read and write
|
||
70AD000
|
unkown
|
page readonly
|
||
CBE000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3771000
|
trusted library allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
4AF5000
|
trusted library allocation
|
page read and write
|
||
A170000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
583E000
|
stack
|
page read and write
|
||
4C13000
|
trusted library allocation
|
page read and write
|
||
B71000
|
stack
|
page read and write
|
||
A33E000
|
heap
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
8B70000
|
unkown
|
page read and write
|
||
870000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
A2A000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A8CA000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
3689000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
A5F4000
|
heap
|
page read and write
|
||
36CA000
|
trusted library allocation
|
page read and write
|
||
A77B000
|
heap
|
page read and write
|
||
88B000
|
stack
|
page read and write
|
||
A1AF000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
35DC000
|
unkown
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
165F000
|
stack
|
page read and write
|
||
36B0000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
27ED4000
|
direct allocation
|
page read and write
|
||
5633000
|
trusted library allocation
|
page read and write
|
||
27E04000
|
direct allocation
|
page read and write
|
||
38AA000
|
trusted library allocation
|
page read and write
|
||
6D55000
|
unkown
|
page readonly
|
||
9F9F000
|
heap
|
page read and write
|
||
C20000
|
remote allocation
|
page read and write
|
||
7FF5D71AF000
|
unkown
|
page readonly
|
||
721000
|
heap
|
page read and write
|
||
3F01000
|
trusted library allocation
|
page read and write
|
||
7FF5D7488000
|
unkown
|
page readonly
|
||
A174000
|
heap
|
page read and write
|
||
27E50000
|
direct allocation
|
page read and write
|
||
365F000
|
trusted library allocation
|
page read and write
|
||
ADAF000
|
heap
|
page read and write
|
||
DDC000
|
heap
|
page read and write
|
||
B85000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
C48B000
|
unkown
|
page read and write
|
||
A121000
|
heap
|
page read and write
|
||
A93C000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
3653000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
E37000
|
heap
|
page read and write
|
||
A404000
|
heap
|
page read and write
|
||
82A000
|
heap
|
page read and write
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
7058000
|
unkown
|
page readonly
|
||
1110A000
|
unkown
|
page read and write
|
||
35F4000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
7291000
|
unkown
|
page readonly
|
||
A0C0000
|
heap
|
page read and write
|
||
5615000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
A69A000
|
heap
|
page read and write
|
||
C73E000
|
unkown
|
page read and write
|
||
7FF5D7236000
|
unkown
|
page readonly
|
||
27C7000
|
trusted library allocation
|
page read and write
|
||
7FF5D7215000
|
unkown
|
page readonly
|
||
6A35000
|
unkown
|
page readonly
|
||
731000
|
heap
|
page read and write
|
||
A8E9000
|
heap
|
page read and write
|
||
3B601000
|
direct allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
107F000
|
stack
|
page read and write
|
||
6DB000
|
heap
|
page read and write
|
||
3687000
|
trusted library allocation
|
page read and write
|
||
A43D000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
7FF5D732D000
|
unkown
|
page readonly
|
||
2780000
|
heap
|
page read and write
|
||
A82000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
511F000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
3662000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
ACD000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
843F000
|
stack
|
page read and write
|
||
7FF5D66E3000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
A273000
|
unkown
|
page read and write
|
||
C617000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
2A07000
|
trusted library allocation
|
page execute and read and write
|
||
627000
|
heap
|
page read and write
|
||
2A0B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D7404000
|
unkown
|
page readonly
|
||
A1A7000
|
heap
|
page read and write
|
||
7FF5D76AF000
|
unkown
|
page readonly
|
||
7FF5D71E6000
|
unkown
|
page readonly
|
||
A92D000
|
heap
|
page read and write
|
||
A7E6000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
3B684000
|
direct allocation
|
page read and write
|
||
36EB000
|
trusted library allocation
|
page read and write
|
||
853B000
|
stack
|
page read and write
|
||
A23A000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
71C000
|
heap
|
page read and write
|
||
3693000
|
trusted library allocation
|
page read and write
|
||
7673000
|
unkown
|
page readonly
|
||
3501000
|
trusted library allocation
|
page read and write
|
||
7FF5D75AF000
|
unkown
|
page readonly
|
||
A38F000
|
heap
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
7FF5D7589000
|
unkown
|
page readonly
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
8CB8000
|
stack
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
7DF4F2460000
|
unkown
|
page readonly
|
||
BE0000
|
heap
|
page read and write
|
||
23D6000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
A570000
|
heap
|
page read and write
|
||
A36E000
|
heap
|
page read and write
|
||
7FF5D76E8000
|
unkown
|
page readonly
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
7BC000
|
heap
|
page read and write
|
||
A034000
|
heap
|
page read and write
|
||
A4F3000
|
heap
|
page read and write
|
||
31B000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
9ADB000
|
unkown
|
page read and write
|
||
4A90000
|
unkown
|
page read and write
|
||
A1B1000
|
heap
|
page read and write
|
||
3151000
|
trusted library allocation
|
page read and write
|
||
7FF5D7455000
|
unkown
|
page readonly
|
||
8AA000
|
stack
|
page read and write
|
||
699000
|
heap
|
page read and write
|
||
2829000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
A23A000
|
unkown
|
page read and write
|
||
C44F000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
A800000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
295F000
|
stack
|
page read and write
|
||
319D000
|
stack
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
A465000
|
heap
|
page read and write
|
||
A198000
|
heap
|
page read and write
|
||
A19A000
|
heap
|
page read and write
|
||
136D000
|
trusted library allocation
|
page execute and read and write
|
||
4986000
|
unkown
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
4157000
|
trusted library allocation
|
page read and write
|
||
6BF8000
|
unkown
|
page readonly
|
||
8979000
|
stack
|
page read and write
|
||
702E000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
A491000
|
heap
|
page read and write
|
||
A577000
|
heap
|
page read and write
|
||
AD72000
|
heap
|
page read and write
|
||
6A72F000
|
unkown
|
page read and write
|
||
6D90000
|
unkown
|
page readonly
|
||
692000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
367B000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF5D7280000
|
unkown
|
page readonly
|
||
3100000
|
unkown
|
page read and write
|
||
BC7000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D72DF000
|
unkown
|
page readonly
|
||
138A000
|
trusted library allocation
|
page execute and read and write
|
||
9F4D000
|
heap
|
page read and write
|
||
A628000
|
heap
|
page read and write
|
||
366D000
|
trusted library allocation
|
page read and write
|
||
3659000
|
trusted library allocation
|
page read and write
|
||
3634000
|
trusted library allocation
|
page read and write
|
||
3C260000
|
direct allocation
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
3668000
|
trusted library allocation
|
page read and write
|
||
A172000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
CFD000
|
unkown
|
page readonly
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
A30A000
|
heap
|
page read and write
|
||
822000
|
trusted library allocation
|
page read and write
|
||
7FF5D75E9000
|
unkown
|
page readonly
|
||
5BDE000
|
stack
|
page read and write
|
||
A0A2000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
6A01000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
4A40000
|
unkown
|
page read and write
|
||
A58C000
|
heap
|
page read and write
|
||
A7A5000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
7989000
|
stack
|
page read and write
|
||
3C214000
|
direct allocation
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
72A4000
|
unkown
|
page readonly
|
||
5890000
|
heap
|
page execute and read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
6B1A000
|
unkown
|
page readonly
|
||
6A704000
|
unkown
|
page write copy
|
||
27F34000
|
direct allocation
|
page read and write
|
||
BE6000
|
trusted library allocation
|
page read and write
|
||
BB4000
|
trusted library allocation
|
page read and write
|
||
1468000
|
heap
|
page read and write
|
||
72B5000
|
unkown
|
page readonly
|
||
7FF5D747F000
|
unkown
|
page readonly
|
||
A2F7000
|
heap
|
page read and write
|
||
7FF5D7534000
|
unkown
|
page readonly
|
||
7FF5D77E3000
|
unkown
|
page readonly
|
||
6F9000
|
heap
|
page read and write
|
||
4ADF000
|
stack
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
6B6F000
|
unkown
|
page readonly
|
||
7FF5D7837000
|
unkown
|
page readonly
|
||
A7CC000
|
heap
|
page read and write
|
||
7FF5D770F000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
A636000
|
heap
|
page read and write
|
||
AA9D000
|
unkown
|
page read and write
|
||
86F000
|
heap
|
page read and write
|
||
7FF5D752F000
|
unkown
|
page readonly
|
||
6DA000
|
heap
|
page read and write
|
||
BAB000
|
trusted library allocation
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
55B1000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
9F45000
|
heap
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
795000
|
heap
|
page read and write
|
||
1662000
|
trusted library allocation
|
page read and write
|
||
6A6B8000
|
unkown
|
page read and write
|
||
7291000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
3C224000
|
direct allocation
|
page read and write
|
||
3647000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
7FF5D77DD000
|
unkown
|
page readonly
|
||
A8D8000
|
heap
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
2EC0000
|
unkown
|
page readonly
|
||
4D4E000
|
stack
|
page read and write
|
||
2FF5000
|
trusted library allocation
|
page read and write
|
||
271E000
|
stack
|
page read and write
|
||
27E2C000
|
direct allocation
|
page read and write
|
||
257B000
|
trusted library allocation
|
page execute and read and write
|
||
19D000
|
stack
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
27EBC000
|
direct allocation
|
page read and write
|
||
A371000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
363D000
|
trusted library allocation
|
page read and write
|
||
7FF5CE33D000
|
unkown
|
page readonly
|
||
5640000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
A17D000
|
heap
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
363B000
|
trusted library allocation
|
page read and write
|
||
7FF5D7485000
|
unkown
|
page readonly
|
||
3C324000
|
direct allocation
|
page read and write
|
||
7FF5D749B000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
BB4000
|
trusted library allocation
|
page read and write
|
||
768C000
|
unkown
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
6BA4000
|
unkown
|
page readonly
|
||
7FF5D75F2000
|
unkown
|
page readonly
|
||
72CC000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
C61B000
|
unkown
|
page read and write
|
||
A3D4000
|
heap
|
page read and write
|
||
7FF5D7394000
|
unkown
|
page readonly
|
||
627000
|
heap
|
page read and write
|
||
298C000
|
heap
|
page execute and read and write
|
||
673000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
7FF5D77B6000
|
unkown
|
page readonly
|
||
62E000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
364D000
|
trusted library allocation
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
6EF0000
|
unkown
|
page readonly
|
||
366D000
|
trusted library allocation
|
page read and write
|
||
7FF5D716B000
|
unkown
|
page readonly
|
||
2F1E000
|
stack
|
page read and write
|
||
5893000
|
heap
|
page execute and read and write
|
||
627000
|
heap
|
page read and write
|
||
3331000
|
unkown
|
page read and write
|
||
A46E000
|
heap
|
page read and write
|
||
4AC0000
|
unkown
|
page read and write
|
||
49A8000
|
unkown
|
page read and write
|
||
A072000
|
heap
|
page read and write
|
||
5159000
|
trusted library allocation
|
page read and write
|
||
A82C000
|
heap
|
page read and write
|
||
88B000
|
stack
|
page read and write
|
||
A31E000
|
heap
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
6F2000
|
heap
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
7FF5D7376000
|
unkown
|
page readonly
|
||
72CE000
|
unkown
|
page readonly
|
||
1FA0000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
7FF5D75EE000
|
unkown
|
page readonly
|
||
6F9000
|
heap
|
page read and write
|
||
6A6D2000
|
unkown
|
page write copy
|
||
41B000
|
unkown
|
page write copy
|
||
A7EC000
|
heap
|
page read and write
|
||
E41000
|
unkown
|
page execute read
|
||
E6D1000
|
unkown
|
page read and write
|
||
7FF5D7257000
|
unkown
|
page readonly
|
||
8B70000
|
unkown
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
380A000
|
trusted library allocation
|
page read and write
|
||
861000
|
trusted library allocation
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
6AD9000
|
unkown
|
page readonly
|
||
10FB3000
|
unkown
|
page read and write
|
There are 3255 hidden memdumps, click here to show them.