Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
6IMo1kM9CC.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\huge[1].dat
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\218A.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\500D.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\F817.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nshE60F.tmp\liteFirewall.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\blowfish.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Del.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\feuiuvb
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\feuiuvb:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\INetC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\nsProcess.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsq70FD.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsx1F86.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\start.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
|
MSVC program database ver 7.00, 512*4023 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
There are 106 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\6IMo1kM9CC.exe
|
"C:\Users\user\Desktop\6IMo1kM9CC.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Users\user\AppData\Roaming\feuiuvb
|
C:\Users\user\AppData\Roaming\feuiuvb
|
||
C:\Users\user\AppData\Local\Temp\F817.exe
|
C:\Users\user\AppData\Local\Temp\F817.exe
|
||
C:\Users\user\AppData\Local\Temp\218A.exe
|
C:\Users\user\AppData\Local\Temp\218A.exe
|
||
C:\Users\user\AppData\Local\Temp\500D.exe
|
C:\Users\user\AppData\Local\Temp\500D.exe
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
"C:\Users\user\AppData\Local\Temp\setup.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0
(iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1"
--lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3388 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US
--service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like
Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3548 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like
Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3692 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (iPhone;
CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1
--num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719981540330969
--launch-time-ticks=4728010167 --mojo-platform-channel-handle=4152 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (iPhone;
CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2
--enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728172431
--mojo-platform-channel-handle=4208 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
There are 25 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://cx5519.com/tmp/index.php
|
|||
http://evilos.cc/tmp/index.php
|
|||
ellaboratepwsz.xyz
|
|||
swellfrrgwwos.xyz
|
|||
foodypannyjsud.shop
|
|||
146.70.169.164:2227
|
|||
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://aka.ms/odirmr
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://chrome.google.com/webstore?hl=hiCtrl$1
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity.0
|
unknown
|
||
https://support.google.com/chrome/answer/6098869
|
unknown
|
||
https://foodypannyjsud.shop/api3
|
unknown
|
||
https://api.msn.com:443/v1/news/Feed/Windows?
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
|
unknown
|
||
http://crbug.com/510270
|
unknown
|
||
https://chrome.google.com/webstore?hl=urCtrl$2
|
unknown
|
||
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
|
unknown
|
||
http://crbug.com/378067
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
|
unknown
|
||
https://foodypannyjsud.shop/ta
|
unknown
|
||
http://www.iana.org/assignments/multicast-addresses
|
unknown
|
||
http://crbug.com/497301
|
unknown
|
||
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
|
unknown
|
||
http://bageyou.xyz
|
unknown
|
||
http://crbug.com/642141
|
unknown
|
||
https://foodypannyjsud.shop/piL4
|
unknown
|
||
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
https://wns.windows.com/L
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
|
unknown
|
||
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html&
|
unknown
|
||
http://logging.apache.org/log4j
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlT&r
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
|
unknown
|
||
http://xiexie.wf/22_551/huge.dat
|
unknown
|
||
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://crbug.com/1446731
|
unknown
|
||
https://chrome.google.com/webstore?hl=ukCtrl$1
|
unknown
|
||
https://www.rd.com/list/polite-habits-campers-dislike/
|
unknown
|
||
https://foodypannyjsud.shop/apiX
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://support.google.com/chrome/a/answer/9122284
|
unknown
|
||
https://outlook.com_
|
unknown
|
||
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupeewP
|
unknown
|
||
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
|
unknown
|
||
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
|
unknown
|
||
http://xiexie.wf/
|
unknown
|
||
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
|
unknown
|
||
http://www.unicode.org/copyright.html
|
unknown
|
||
http://crbug.com/775961
|
unknown
|
||
https://codereview.chromium.org/25305002).
|
unknown
|
||
http://schemas.micro
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-TWCtrl$1
|
unknown
|
||
http://www.apache.org/).
|
unknown
|
||
http://crbug.com/275944
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
|
unknown
|
||
http://xiexie.wf/b6e4-4079-b30a-7368302a1ad4
|
unknown
|
||
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
|
unknown
|
||
https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
|
unknown
|
||
http://logging.apache.org/log4net/schemas/log4net-events-1.2>
|
unknown
|
||
https://foodypannyjsud.shop/api##
|
unknown
|
||
https://foodypannyjsud.shop/HH
|
unknown
|
||
https://chrome.google.com/webstore/category/extensions
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://passwords.google.comT
|
unknown
|
||
https://web-security-reports.services.atlassian.com/csp-report/bb-website
|
unknown
|
||
https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
|
unknown
|
||
https://d136azpfpnge1l.cloudfront.net/;
|
unknown
|
||
http://crbug.com/672186).
|
unknown
|
||
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupeetP
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherUseIeSitelist
|
unknown
|
||
https://chrome.google.com/webstore?hl=enCtrl$1
|
unknown
|
||
https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlYar&d
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
unknown
|
European Union
|
||
190.98.23.157
|
unknown
|
Suriname
|
||
141.8.192.126
|
unknown
|
Russian Federation
|
||
185.68.16.7
|
unknown
|
Ukraine
|
||
127.0.0.127
|
unknown
|
unknown
|
||
146.70.169.164
|
unknown
|
United Kingdom
|
||
104.192.141.1
|
unknown
|
United States
|
||
188.114.96.3
|
unknown
|
European Union
|
||
172.67.221.174
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@explorerframe.dll,-13137
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@explorerframe.dll,-13138
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000050278
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080328
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Sid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Pid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GamePall
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
|
DontShowUI
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
tmp_uid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
reg
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
uid
|
||
HKEY_CURRENT_USER\Control Panel\Cursors
|
AppStarting
|
There are 231 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4381000
|
unclassified section
|
page read and write
|
||
12BD000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
3950000
|
direct allocation
|
page execute and read and write
|
||
4381000
|
unclassified section
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
133B000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
259E000
|
stack
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
D04000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
A947000
|
heap
|
page read and write
|
||
A85B000
|
heap
|
page read and write
|
||
A7DE000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
123A000
|
heap
|
page read and write
|
||
243000
|
unkown
|
page execute read
|
||
3160000
|
unkown
|
page readonly
|
||
F95B000
|
unkown
|
page read and write
|
||
18A0000
|
unkown
|
page readonly
|
||
2708000
|
unkown
|
page readonly
|
||
A515000
|
heap
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
535000
|
heap
|
page read and write
|
||
A802000
|
heap
|
page read and write
|
||
6752000
|
unkown
|
page readonly
|
||
7FF5ED4BB000
|
unkown
|
page readonly
|
||
A09E000
|
stack
|
page read and write
|
||
F958000
|
unkown
|
page read and write
|
||
A569000
|
heap
|
page read and write
|
||
2313000
|
trusted library allocation
|
page execute and read and write
|
||
53E000
|
heap
|
page read and write
|
||
3579000
|
trusted library allocation
|
page read and write
|
||
2456000
|
trusted library allocation
|
page read and write
|
||
515000
|
heap
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
355D000
|
trusted library allocation
|
page read and write
|
||
7884000
|
unkown
|
page read and write
|
||
7FF5ED849000
|
unkown
|
page readonly
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A2FF000
|
heap
|
page read and write
|
||
33B3000
|
trusted library allocation
|
page read and write
|
||
36D3000
|
stack
|
page read and write
|
||
A9B6000
|
heap
|
page read and write
|
||
4CD0000
|
unkown
|
page read and write
|
||
C57F000
|
unkown
|
page read and write
|
||
18D7000
|
trusted library allocation
|
page read and write
|
||
7FF5ED80C000
|
unkown
|
page readonly
|
||
A491000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
F95F000
|
unkown
|
page read and write
|
||
3568000
|
trusted library allocation
|
page read and write
|
||
1107000
|
trusted library allocation
|
page execute and read and write
|
||
A3C9000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
63DA000
|
unkown
|
page readonly
|
||
A3CE000
|
heap
|
page read and write
|
||
A5C5000
|
heap
|
page read and write
|
||
35A0000
|
unkown
|
page readonly
|
||
1220000
|
unkown
|
page read and write
|
||
2342000
|
trusted library allocation
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
132B000
|
heap
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
10E7000
|
trusted library allocation
|
page execute and read and write
|
||
3F72000
|
trusted library allocation
|
page read and write
|
||
339C000
|
trusted library allocation
|
page read and write
|
||
A84B000
|
heap
|
page read and write
|
||
F97000
|
heap
|
page read and write
|
||
943D000
|
stack
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A69C000
|
heap
|
page read and write
|
||
9795000
|
unkown
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
C561000
|
unkown
|
page read and write
|
||
5710000
|
heap
|
page execute and read and write
|
||
7FF5ED4C2000
|
unkown
|
page readonly
|
||
A49E000
|
unkown
|
page read and write
|
||
A857000
|
heap
|
page read and write
|
||
1123000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
339E000
|
trusted library allocation
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
67C000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
F7F000
|
heap
|
page read and write
|
||
10DA000
|
trusted library allocation
|
page execute and read and write
|
||
F958000
|
unkown
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
7FF5ED939000
|
unkown
|
page readonly
|
||
6697000
|
unkown
|
page readonly
|
||
A140000
|
heap
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
A1D3000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
124F000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FF5ED7E0000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
1518000
|
heap
|
page read and write
|
||
25D7000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9F2000
|
unkown
|
page readonly
|
||
A3A4000
|
heap
|
page read and write
|
||
40C1000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
97D000
|
heap
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
A3CB000
|
heap
|
page read and write
|
||
7C90000
|
unkown
|
page read and write
|
||
F794000
|
unkown
|
page read and write
|
||
A66B000
|
heap
|
page read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
133B000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
368A000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
trusted library allocation
|
page read and write
|
||
12A8000
|
heap
|
page read and write
|
||
A906000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
56C5000
|
trusted library allocation
|
page read and write
|
||
AA31000
|
heap
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
D66000
|
stack
|
page read and write
|
||
7DF4F3051000
|
unkown
|
page execute read
|
||
49B000
|
unkown
|
page execute and read and write
|
||
A883000
|
heap
|
page read and write
|
||
A655000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
F38000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
FEF000
|
stack
|
page read and write
|
||
3556000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
A5E6000
|
heap
|
page read and write
|
||
A092000
|
heap
|
page read and write
|
||
A3CC000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
AA0E000
|
heap
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
4CC0000
|
unkown
|
page read and write
|
||
1406000
|
heap
|
page read and write
|
||
7FF5ED495000
|
unkown
|
page readonly
|
||
1481000
|
heap
|
page read and write
|
||
5807000
|
trusted library allocation
|
page read and write
|
||
A736000
|
heap
|
page read and write
|
||
65C9000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
7861000
|
unkown
|
page read and write
|
||
1153000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
7FF5ED695000
|
unkown
|
page readonly
|
||
67DC000
|
unkown
|
page readonly
|
||
114E000
|
stack
|
page read and write
|
||
A3C4000
|
heap
|
page read and write
|
||
AF0C000
|
stack
|
page read and write
|
||
97AD000
|
unkown
|
page read and write
|
||
7863000
|
unkown
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
A479000
|
unkown
|
page read and write
|
||
A8FE000
|
heap
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
1121000
|
heap
|
page read and write
|
||
133D000
|
trusted library allocation
|
page execute and read and write
|
||
537000
|
heap
|
page read and write
|
||
2F02000
|
trusted library allocation
|
page read and write
|
||
10DA000
|
heap
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
18A0000
|
heap
|
page read and write
|
||
35B7000
|
trusted library allocation
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
A4EC000
|
heap
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
7977000
|
unkown
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
139B000
|
heap
|
page read and write
|
||
14C6000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page execute and read and write
|
||
14B7000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
7FF5ED77E000
|
unkown
|
page readonly
|
||
3A70000
|
trusted library allocation
|
page read and write
|
||
31D5000
|
trusted library allocation
|
page read and write
|
||
A891000
|
heap
|
page read and write
|
||
5315000
|
trusted library allocation
|
page read and write
|
||
A623000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
3565000
|
trusted library allocation
|
page read and write
|
||
355E000
|
trusted library allocation
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
353E000
|
trusted library allocation
|
page read and write
|
||
3A9C000
|
stack
|
page read and write
|
||
2B10000
|
remote allocation
|
page read and write
|
||
35CB000
|
trusted library allocation
|
page read and write
|
||
187E000
|
stack
|
page read and write
|
||
1DA000
|
stack
|
page read and write
|
||
7FF5ED433000
|
unkown
|
page readonly
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
25D1000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
6392000
|
unkown
|
page readonly
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
1121000
|
heap
|
page read and write
|
||
7FF5ED337000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
3594000
|
trusted library allocation
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
A831000
|
heap
|
page read and write
|
||
358D000
|
trusted library allocation
|
page read and write
|
||
2906000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
3140000
|
unkown
|
page read and write
|
||
F53000
|
stack
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A491000
|
heap
|
page read and write
|
||
A4B2000
|
heap
|
page read and write
|
||
A426000
|
heap
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
C20000
|
heap
|
page read and write
|
||
2D06000
|
trusted library allocation
|
page read and write
|
||
7FF5ED449000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
A9BB000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
4B93000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
B8B0000
|
unkown
|
page read and write
|
||
3577000
|
trusted library allocation
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
12C8000
|
heap
|
page read and write
|
||
56BE000
|
stack
|
page read and write
|
||
A3F7000
|
heap
|
page read and write
|
||
B82A000
|
stack
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
A98E000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
98B000
|
stack
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
1340000
|
trusted library allocation
|
page execute and read and write
|
||
10C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED644000
|
unkown
|
page readonly
|
||
7FF5ED3EA000
|
unkown
|
page readonly
|
||
7FF5ED821000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
3130000
|
unkown
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
7FF5ED9B8000
|
unkown
|
page readonly
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
A647000
|
heap
|
page read and write
|
||
3535000
|
trusted library allocation
|
page read and write
|
||
F68000
|
heap
|
page read and write
|
||
F455000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
3587000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
A662000
|
heap
|
page read and write
|
||
A3EA000
|
heap
|
page read and write
|
||
1684000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
987B000
|
unkown
|
page read and write
|
||
2468000
|
trusted library allocation
|
page read and write
|
||
1334000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
111F000
|
heap
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
C6F8000
|
unkown
|
page read and write
|
||
3543000
|
trusted library allocation
|
page read and write
|
||
B170000
|
unkown
|
page readonly
|
||
E05000
|
heap
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
A3D3000
|
heap
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
784A000
|
unkown
|
page read and write
|
||
37A0000
|
unkown
|
page read and write
|
||
A3F7000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page execute and read and write
|
||
4261000
|
trusted library allocation
|
page read and write
|
||
3544000
|
trusted library allocation
|
page read and write
|
||
9A5B000
|
unkown
|
page read and write
|
||
4BA6000
|
unkown
|
page read and write
|
||
311F000
|
stack
|
page read and write
|
||
A3F8000
|
heap
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
3564000
|
trusted library allocation
|
page read and write
|
||
18F7000
|
heap
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
16D4000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
C49E000
|
stack
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
2B10000
|
remote allocation
|
page read and write
|
||
591F000
|
stack
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
5AAE000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
13D8000
|
heap
|
page read and write
|
||
3559000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A19F000
|
stack
|
page read and write
|
||
3712000
|
trusted library allocation
|
page read and write
|
||
5870000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
2B10000
|
remote allocation
|
page read and write
|
||
A3E3000
|
heap
|
page read and write
|
||
B04000
|
unkown
|
page readonly
|
||
7FF5ED8A4000
|
unkown
|
page readonly
|
||
F450000
|
unkown
|
page read and write
|
||
113D000
|
heap
|
page read and write
|
||
113D000
|
heap
|
page read and write
|
||
2910000
|
trusted library allocation
|
page read and write
|
||
7FF5ED872000
|
unkown
|
page readonly
|
||
2764000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
BD6000
|
stack
|
page read and write
|
||
7FF5ED3CE000
|
unkown
|
page readonly
|
||
3130000
|
unkown
|
page read and write
|
||
246A000
|
trusted library allocation
|
page read and write
|
||
3578000
|
trusted library allocation
|
page read and write
|
||
A83B000
|
heap
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
10002000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
F896000
|
unkown
|
page read and write
|
||
A965000
|
heap
|
page read and write
|
||
1356000
|
trusted library allocation
|
page execute and read and write
|
||
113E000
|
stack
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
2410000
|
trusted library allocation
|
page read and write
|
||
5455000
|
trusted library allocation
|
page read and write
|
||
A90A000
|
heap
|
page read and write
|
||
1683000
|
trusted library allocation
|
page execute and read and write
|
||
A44A000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A1A3000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
3140000
|
unkown
|
page read and write
|
||
31E2000
|
trusted library allocation
|
page read and write
|
||
AA90000
|
unkown
|
page read and write
|
||
7DF4F3030000
|
unkown
|
page readonly
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
3562000
|
trusted library allocation
|
page read and write
|
||
A7CB000
|
heap
|
page read and write
|
||
37AC000
|
unkown
|
page read and write
|
||
C811000
|
unkown
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
2E87000
|
trusted library allocation
|
page read and write
|
||
A83F000
|
heap
|
page read and write
|
||
A37D000
|
unkown
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
B22B000
|
stack
|
page read and write
|
||
A3F3000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
A9A1000
|
heap
|
page read and write
|
||
35A6000
|
trusted library allocation
|
page read and write
|
||
100B000
|
trusted library allocation
|
page execute and read and write
|
||
540000
|
heap
|
page read and write
|
||
103B000
|
stack
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
1265000
|
heap
|
page read and write
|
||
3748000
|
unkown
|
page read and write
|
||
A40F000
|
heap
|
page read and write
|
||
A494000
|
unkown
|
page read and write
|
||
AA01000
|
heap
|
page read and write
|
||
A0A0000
|
heap
|
page read and write
|
||
A5D2000
|
heap
|
page read and write
|
||
7FF5ED426000
|
unkown
|
page readonly
|
||
A9A4000
|
heap
|
page read and write
|
||
F452000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
A81B000
|
heap
|
page read and write
|
||
7FF5ED5F7000
|
unkown
|
page readonly
|
||
A3E9000
|
heap
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
7FF5ED956000
|
unkown
|
page readonly
|
||
9D7000
|
stack
|
page read and write
|
||
5324000
|
trusted library allocation
|
page read and write
|
||
A3DD000
|
heap
|
page read and write
|
||
C512000
|
unkown
|
page read and write
|
||
7FF5ED9D6000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
118D000
|
heap
|
page read and write
|
||
3531000
|
trusted library allocation
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
3547000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
1179000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
F956000
|
unkown
|
page read and write
|
||
378C000
|
stack
|
page read and write
|
||
A577000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A6AA000
|
heap
|
page read and write
|
||
10F5000
|
heap
|
page read and write
|
||
146B000
|
trusted library allocation
|
page execute and read and write
|
||
FF6000
|
trusted library allocation
|
page execute and read and write
|
||
A9F8000
|
heap
|
page read and write
|
||
A875000
|
heap
|
page read and write
|
||
6654000
|
unkown
|
page readonly
|
||
F56000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
161F000
|
stack
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
A777000
|
heap
|
page read and write
|
||
3565000
|
trusted library allocation
|
page read and write
|
||
CA7C000
|
unkown
|
page read and write
|
||
C557000
|
unkown
|
page read and write
|
||
7FF5ED8C6000
|
unkown
|
page readonly
|
||
860000
|
heap
|
page read and write
|
||
A488000
|
heap
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
A3C6000
|
heap
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
62E000
|
stack
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
11C6000
|
heap
|
page read and write
|
||
411000
|
unkown
|
page execute read
|
||
65CB000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
A601000
|
heap
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
3560000
|
trusted library allocation
|
page read and write
|
||
A3F3000
|
heap
|
page read and write
|
||
9879000
|
unkown
|
page read and write
|
||
2D91000
|
trusted library allocation
|
page read and write
|
||
359D000
|
trusted library allocation
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
2CCE000
|
trusted library allocation
|
page read and write
|
||
A3AF000
|
heap
|
page read and write
|
||
A40E000
|
heap
|
page read and write
|
||
368D000
|
stack
|
page read and write
|
||
A32A000
|
unkown
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
7FF5ED9D9000
|
unkown
|
page readonly
|
||
C6F2000
|
unkown
|
page read and write
|
||
7D20000
|
unkown
|
page readonly
|
||
7FF5EDA38000
|
unkown
|
page readonly
|
||
9070000
|
unkown
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
3556000
|
trusted library allocation
|
page read and write
|
||
2F0B000
|
trusted library allocation
|
page execute and read and write
|
||
A3D4000
|
heap
|
page read and write
|
||
9929000
|
unkown
|
page read and write
|
||
A844000
|
heap
|
page read and write
|
||
B00C000
|
stack
|
page read and write
|
||
79B1000
|
unkown
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
146D000
|
heap
|
page read and write
|
||
5591000
|
trusted library allocation
|
page read and write
|
||
57E4000
|
trusted library allocation
|
page read and write
|
||
3593000
|
trusted library allocation
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
EF6000
|
stack
|
page read and write
|
||
F1C000
|
heap
|
page read and write
|
||
10DD000
|
trusted library allocation
|
page execute and read and write
|
||
3130000
|
unkown
|
page read and write
|
||
AB72000
|
unkown
|
page read and write
|
||
7F30000
|
unkown
|
page read and write
|
||
A388000
|
heap
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
3530000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
3587000
|
trusted library allocation
|
page read and write
|
||
A726000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
271F000
|
stack
|
page read and write
|
||
BD1D000
|
stack
|
page read and write
|
||
A3F0000
|
heap
|
page read and write
|
||
56C3000
|
unkown
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
23AE000
|
stack
|
page read and write
|
||
A310000
|
unkown
|
page read and write
|
||
A47A000
|
heap
|
page read and write
|
||
118D000
|
heap
|
page read and write
|
||
A3E6000
|
heap
|
page read and write
|
||
13F1000
|
trusted library allocation
|
page read and write
|
||
A197000
|
heap
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
4267000
|
trusted library allocation
|
page read and write
|
||
7FF5ED674000
|
unkown
|
page readonly
|
||
7FF5ED961000
|
unkown
|
page readonly
|
||
787C000
|
unkown
|
page read and write
|
||
97A9000
|
unkown
|
page read and write
|
||
A760000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
3450000
|
unkown
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
37F9000
|
unkown
|
page read and write
|
||
7F40000
|
unkown
|
page readonly
|
||
2EF5000
|
trusted library allocation
|
page read and write
|
||
7FF5ED3A7000
|
unkown
|
page readonly
|
||
7FF5ED867000
|
unkown
|
page readonly
|
||
3588000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
3556000
|
trusted library allocation
|
page read and write
|
||
A311000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
A7A8000
|
heap
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
9977000
|
unkown
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page execute and read and write
|
||
2314000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
A77F000
|
heap
|
page read and write
|
||
A8AA000
|
heap
|
page read and write
|
||
662000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
A3EF000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
7FF5ED1BC000
|
unkown
|
page readonly
|
||
581E000
|
stack
|
page read and write
|
||
2ED4000
|
trusted library allocation
|
page read and write
|
||
A165000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
11A7000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
A323000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
66BC000
|
unkown
|
page readonly
|
||
A870000
|
heap
|
page read and write
|
||
C563000
|
unkown
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
F958000
|
unkown
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
10D7000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
11A7000
|
heap
|
page read and write
|
||
A819000
|
heap
|
page read and write
|
||
5B70000
|
unkown
|
page readonly
|
||
A82A000
|
heap
|
page read and write
|
||
A3C0000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A364000
|
unkown
|
page read and write
|
||
C6F4000
|
unkown
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
A3CE000
|
heap
|
page read and write
|
||
5530000
|
heap
|
page read and write
|
||
AB76000
|
unkown
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
A71A000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
132B000
|
heap
|
page read and write
|
||
133F000
|
stack
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
35A2000
|
trusted library allocation
|
page read and write
|
||
7FF5ED4FD000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
2D6C000
|
stack
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
F457000
|
unkown
|
page read and write
|
||
F451000
|
unkown
|
page read and write
|
||
3120000
|
unkown
|
page read and write
|
||
9F9E000
|
stack
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
A4FA000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
A3F1000
|
heap
|
page read and write
|
||
FBFD000
|
unkown
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
246E000
|
trusted library allocation
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
7A34000
|
unkown
|
page read and write
|
||
F68000
|
heap
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
3587000
|
trusted library allocation
|
page read and write
|
||
79FB000
|
unkown
|
page read and write
|
||
2F11000
|
trusted library allocation
|
page read and write
|
||
1036000
|
heap
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
F959000
|
unkown
|
page read and write
|
||
A3CF000
|
heap
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
A375000
|
unkown
|
page read and write
|
||
7FF5D1CD4000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
10AF000
|
stack
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
13E0000
|
unkown
|
page read and write
|
||
A67E000
|
heap
|
page read and write
|
||
3587000
|
trusted library allocation
|
page read and write
|
||
FBF1000
|
unkown
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
AB1A000
|
unkown
|
page read and write
|
||
F45D000
|
unkown
|
page read and write
|
||
5460000
|
heap
|
page execute and read and write
|
||
C6E3000
|
unkown
|
page read and write
|
||
16D3000
|
trusted library allocation
|
page execute and read and write
|
||
A419000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
F6C000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
9550000
|
unkown
|
page readonly
|
||
88EE000
|
stack
|
page read and write
|
||
11A2000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
982D000
|
unkown
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
62C0000
|
unkown
|
page readonly
|
||
1220000
|
unkown
|
page read and write
|
||
3797000
|
unkown
|
page read and write
|
||
65EA000
|
unkown
|
page readonly
|
||
57DF000
|
stack
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
A12C000
|
heap
|
page read and write
|
||
7FF5ED810000
|
unkown
|
page readonly
|
||
7FF5ED4B0000
|
unkown
|
page readonly
|
||
2780000
|
direct allocation
|
page execute and read and write
|
||
A88B000
|
heap
|
page read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
65B8000
|
unkown
|
page readonly
|
||
A19D000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
399B000
|
stack
|
page read and write
|
||
35A7000
|
trusted library allocation
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
1197000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
7FF5ED46A000
|
unkown
|
page readonly
|
||
A411000
|
heap
|
page read and write
|
||
28EE000
|
heap
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
BFB000
|
stack
|
page read and write
|
||
2CB0000
|
trusted library allocation
|
page read and write
|
||
57FE000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
A8C8000
|
heap
|
page read and write
|
||
58C3000
|
trusted library allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
3577000
|
trusted library allocation
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
726000
|
heap
|
page read and write
|
||
141F000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
3546000
|
trusted library allocation
|
page read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
287E000
|
stack
|
page read and write
|
||
978E000
|
unkown
|
page read and write
|
||
7857000
|
unkown
|
page read and write
|
||
4400000
|
heap
|
page read and write
|
||
1179000
|
heap
|
page read and write
|
||
3A71000
|
trusted library allocation
|
page read and write
|
||
A2C9000
|
heap
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
A433000
|
unkown
|
page read and write
|
||
2E64000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
3584000
|
trusted library allocation
|
page read and write
|
||
118A000
|
heap
|
page read and write
|
||
1351000
|
trusted library allocation
|
page read and write
|
||
A711000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A684000
|
heap
|
page read and write
|
||
9AB000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
A50C000
|
heap
|
page read and write
|
||
3548000
|
trusted library allocation
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
2C1B000
|
trusted library allocation
|
page execute and read and write
|
||
F7DB000
|
unkown
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
C846000
|
unkown
|
page read and write
|
||
A3EE000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
98A8000
|
unkown
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
6C9000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
2ECE000
|
trusted library allocation
|
page read and write
|
||
1490000
|
unkown
|
page read and write
|
||
7FF5ED76D000
|
unkown
|
page readonly
|
||
A53A000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
F457000
|
unkown
|
page read and write
|
||
11AC000
|
heap
|
page read and write
|
||
A409000
|
heap
|
page read and write
|
||
7FF5ED7C4000
|
unkown
|
page readonly
|
||
9B9000
|
heap
|
page read and write
|
||
A543000
|
heap
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
A080000
|
heap
|
page read and write
|
||
43B0000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
A534000
|
heap
|
page read and write
|
||
2E10000
|
heap
|
page execute and read and write
|
||
537000
|
heap
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
F453000
|
unkown
|
page read and write
|
||
A42B000
|
heap
|
page read and write
|
||
A9D3000
|
heap
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
22D000
|
unkown
|
page readonly
|
||
C88B000
|
unkown
|
page read and write
|
||
16EF000
|
stack
|
page read and write
|
||
A8F1000
|
heap
|
page read and write
|
||
A139000
|
heap
|
page read and write
|
||
10D3000
|
trusted library allocation
|
page execute and read and write
|
||
308A000
|
stack
|
page read and write
|
||
18C0000
|
trusted library allocation
|
page execute and read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
3550000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
7695000
|
stack
|
page read and write
|
||
355A000
|
trusted library allocation
|
page read and write
|
||
7FF5ED4DF000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
7FF5EDA31000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
9B0C000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
16BB000
|
trusted library allocation
|
page execute and read and write
|
||
537000
|
heap
|
page read and write
|
||
3599000
|
trusted library allocation
|
page read and write
|
||
1179000
|
heap
|
page read and write
|
||
A3F9000
|
heap
|
page read and write
|
||
551E000
|
stack
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
36D5000
|
stack
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
3580000
|
unkown
|
page readonly
|
||
28EE000
|
heap
|
page read and write
|
||
8FB9000
|
stack
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
3548000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
A530000
|
heap
|
page read and write
|
||
A50B000
|
unkown
|
page read and write
|
||
8710000
|
unkown
|
page readonly
|
||
C84D000
|
unkown
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
3546000
|
trusted library allocation
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
F952000
|
unkown
|
page read and write
|
||
AA06000
|
heap
|
page read and write
|
||
A8CC000
|
heap
|
page read and write
|
||
A48E000
|
heap
|
page read and write
|
||
2CF5000
|
trusted library allocation
|
page read and write
|
||
A6D4000
|
heap
|
page read and write
|
||
A402000
|
heap
|
page read and write
|
||
7FF5ED980000
|
unkown
|
page readonly
|
||
C89A000
|
unkown
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
7FF5ED1CF000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
2400000
|
trusted library allocation
|
page read and write
|
||
7FF5ED1F0000
|
unkown
|
page readonly
|
||
65B6000
|
unkown
|
page readonly
|
||
3800000
|
remote allocation
|
page read and write
|
||
7FF5ED1CB000
|
unkown
|
page readonly
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
786B000
|
unkown
|
page read and write
|
||
7FF5ED7E9000
|
unkown
|
page readonly
|
||
1046000
|
heap
|
page read and write
|
||
AFD4000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
117B000
|
heap
|
page read and write
|
||
7DF4F3041000
|
unkown
|
page execute read
|
||
3130000
|
unkown
|
page read and write
|
||
116D000
|
heap
|
page read and write
|
||
A975000
|
heap
|
page read and write
|
||
8210000
|
unkown
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
A8D1000
|
heap
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
11BC000
|
heap
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
A3F2000
|
heap
|
page read and write
|
||
E7A1000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
364D000
|
stack
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
379E000
|
unkown
|
page read and write
|
||
A417000
|
heap
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
7FF5ED39E000
|
unkown
|
page readonly
|
||
357A000
|
trusted library allocation
|
page read and write
|
||
A2CC000
|
heap
|
page read and write
|
||
A49B000
|
heap
|
page read and write
|
||
A409000
|
heap
|
page read and write
|
||
125A000
|
heap
|
page read and write
|
||
7FF5ED445000
|
unkown
|
page readonly
|
||
14B4000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
FC00000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
7FF5ED46E000
|
unkown
|
page readonly
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
F45F000
|
unkown
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
118D000
|
heap
|
page read and write
|
||
F3B000
|
trusted library allocation
|
page execute and read and write
|
||
182F000
|
stack
|
page read and write
|
||
1121000
|
heap
|
page read and write
|
||
7FF5ED714000
|
unkown
|
page readonly
|
||
A48C000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
8A3000
|
trusted library allocation
|
page execute and read and write
|
||
537000
|
heap
|
page read and write
|
||
8000000
|
unkown
|
page read and write
|
||
F4F000
|
heap
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
2AEE000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
2E81000
|
trusted library allocation
|
page read and write
|
||
10DC000
|
heap
|
page read and write
|
||
A01B000
|
stack
|
page read and write
|
||
C8E1000
|
unkown
|
page read and write
|
||
55F0000
|
heap
|
page execute and read and write
|
||
C08A000
|
stack
|
page read and write
|
||
4F6000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
558E000
|
trusted library allocation
|
page read and write
|
||
A779000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
38BD000
|
trusted library allocation
|
page read and write
|
||
A3FC000
|
heap
|
page read and write
|
||
F457000
|
unkown
|
page read and write
|
||
1179000
|
heap
|
page read and write
|
||
16DD000
|
trusted library allocation
|
page execute and read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
7FF5ED864000
|
unkown
|
page readonly
|
||
1335000
|
heap
|
page read and write
|
||
3538000
|
trusted library allocation
|
page read and write
|
||
A400000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
55A5000
|
trusted library allocation
|
page read and write
|
||
1378000
|
heap
|
page read and write
|
||
EF6000
|
stack
|
page read and write
|
||
7FF5ED97E000
|
unkown
|
page readonly
|
||
8BF0000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
356B000
|
trusted library allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
16B0000
|
trusted library allocation
|
page read and write
|
||
57EE000
|
trusted library allocation
|
page read and write
|
||
A912000
|
heap
|
page read and write
|
||
B729000
|
stack
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
7FF5ED885000
|
unkown
|
page readonly
|
||
25CF000
|
trusted library allocation
|
page read and write
|
||
A41B000
|
heap
|
page read and write
|
||
3565000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
1109000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
49C000
|
unkown
|
page readonly
|
||
FB5000
|
heap
|
page read and write
|
||
10DE000
|
heap
|
page read and write
|
||
7FF5ED476000
|
unkown
|
page readonly
|
||
5830000
|
trusted library allocation
|
page read and write
|
||
A638000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
A625000
|
heap
|
page read and write
|
||
A3FE000
|
heap
|
page read and write
|
||
67D9000
|
unkown
|
page readonly
|
||
106E000
|
stack
|
page read and write
|
||
3D95000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A417000
|
heap
|
page read and write
|
||
A820000
|
heap
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
7FF5ED793000
|
unkown
|
page readonly
|
||
49C000
|
unkown
|
page readonly
|
||
F95E000
|
unkown
|
page read and write
|
||
A379000
|
unkown
|
page read and write
|
||
F45C000
|
unkown
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
45F0000
|
heap
|
page read and write
|
||
35D0000
|
unkown
|
page read and write
|
||
A8BC000
|
heap
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
A1A6000
|
heap
|
page read and write
|
||
10D4000
|
trusted library allocation
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
2E55000
|
trusted library allocation
|
page read and write
|
||
A3F9000
|
heap
|
page read and write
|
||
7FF5ED9CA000
|
unkown
|
page readonly
|
||
A3EB000
|
heap
|
page read and write
|
||
A72F000
|
heap
|
page read and write
|
||
A80B000
|
heap
|
page read and write
|
||
53A1000
|
trusted library allocation
|
page read and write
|
||
4C4B000
|
unkown
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
8A0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED990000
|
unkown
|
page readonly
|
||
3070000
|
direct allocation
|
page read and write
|
||
3581000
|
trusted library allocation
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
3639000
|
trusted library allocation
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
7D00000
|
unkown
|
page readonly
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
1191000
|
heap
|
page read and write
|
||
3589000
|
trusted library allocation
|
page read and write
|
||
A9AB000
|
heap
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
2ED4000
|
trusted library allocation
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
3543000
|
trusted library allocation
|
page read and write
|
||
3206000
|
trusted library allocation
|
page read and write
|
||
3559000
|
trusted library allocation
|
page read and write
|
||
1462000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
A315000
|
heap
|
page read and write
|
||
A6B2000
|
heap
|
page read and write
|
||
143B000
|
stack
|
page read and write
|
||
7FF5EDA0B000
|
unkown
|
page readonly
|
||
A5FA000
|
heap
|
page read and write
|
||
23F0000
|
trusted library allocation
|
page execute and read and write
|
||
4BC9000
|
unkown
|
page read and write
|
||
2CA3000
|
trusted library allocation
|
page read and write
|
||
9139000
|
stack
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
C52C000
|
unkown
|
page read and write
|
||
5861000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
353E000
|
trusted library allocation
|
page read and write
|
||
7FF5ED451000
|
unkown
|
page readonly
|
||
14E0000
|
heap
|
page read and write
|
||
A51C000
|
heap
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
A3EC000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A4E8000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
7FF5ED660000
|
unkown
|
page readonly
|
||
A3C4000
|
heap
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
2ECB000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
13F7000
|
trusted library allocation
|
page read and write
|
||
A5C8000
|
heap
|
page read and write
|
||
489000
|
unkown
|
page readonly
|
||
1F1000
|
unkown
|
page execute read
|
||
A3ED000
|
heap
|
page read and write
|
||
B6A0000
|
heap
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
11A7000
|
heap
|
page read and write
|
||
3F15000
|
trusted library allocation
|
page read and write
|
||
10D1000
|
trusted library allocation
|
page read and write
|
||
5AFE000
|
stack
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
7FF5ED52F000
|
unkown
|
page readonly
|
||
A54B000
|
heap
|
page read and write
|
||
7FF5ED64F000
|
unkown
|
page readonly
|
||
A327000
|
unkown
|
page read and write
|
||
36F0000
|
unkown
|
page readonly
|
||
A1C4000
|
heap
|
page read and write
|
||
7FF5ED9ED000
|
unkown
|
page readonly
|
||
116F000
|
stack
|
page read and write
|
||
F45F000
|
unkown
|
page read and write
|
||
31EB000
|
trusted library allocation
|
page read and write
|
||
7FF5ECED2000
|
unkown
|
page readonly
|
||
11A3000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
31EE000
|
trusted library allocation
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
135A000
|
trusted library allocation
|
page execute and read and write
|
||
C857000
|
unkown
|
page read and write
|
||
41B000
|
unkown
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
A1B8000
|
heap
|
page read and write
|
||
A5E4000
|
heap
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
8860000
|
unkown
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
A5B1000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
55F3000
|
heap
|
page execute and read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
987F000
|
unkown
|
page read and write
|
||
A331000
|
heap
|
page read and write
|
||
A4C1000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
BAF9000
|
stack
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
13FC000
|
heap
|
page read and write
|
||
EF6000
|
stack
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
797D000
|
unkown
|
page read and write
|
||
7FF5ED670000
|
unkown
|
page readonly
|
||
A5B7000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
979C000
|
unkown
|
page read and write
|
||
18F0000
|
heap
|
page read and write
|
||
117B000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
7FF5ED342000
|
unkown
|
page readonly
|
||
A686000
|
heap
|
page read and write
|
||
1179000
|
heap
|
page read and write
|
||
A3E0000
|
heap
|
page read and write
|
||
33D1000
|
trusted library allocation
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
F954000
|
unkown
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
A7E9000
|
heap
|
page read and write
|
||
168D000
|
trusted library allocation
|
page execute and read and write
|
||
AADB000
|
unkown
|
page read and write
|
||
57EB000
|
trusted library allocation
|
page read and write
|
||
B04000
|
unkown
|
page readonly
|
||
5453000
|
trusted library allocation
|
page read and write
|
||
10D6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED279000
|
unkown
|
page readonly
|
||
3450000
|
unkown
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
EF8000
|
heap
|
page read and write
|
||
10F6000
|
trusted library allocation
|
page execute and read and write
|
||
537000
|
heap
|
page read and write
|
||
7FF5ED942000
|
unkown
|
page readonly
|
||
F7E9000
|
unkown
|
page read and write
|
||
2E05000
|
trusted library allocation
|
page read and write
|
||
A556000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A587000
|
heap
|
page read and write
|
||
11A7000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
A32E000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
7FF5ED4A1000
|
unkown
|
page readonly
|
||
8EC6000
|
unkown
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
28F5000
|
trusted library allocation
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
B190000
|
unkown
|
page read and write
|
||
130B000
|
heap
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
725000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
7FF5ED818000
|
unkown
|
page readonly
|
||
A940000
|
heap
|
page read and write
|
||
1103000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A391000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
F5D000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
unkown
|
page read and write
|
||
539A000
|
trusted library allocation
|
page read and write
|
||
A434000
|
heap
|
page read and write
|
||
C5AA000
|
unkown
|
page read and write
|
||
9B60000
|
unkown
|
page readonly
|
||
122C000
|
heap
|
page read and write
|
||
AFCA000
|
heap
|
page read and write
|
||
1104000
|
heap
|
page read and write
|
||
65A5000
|
unkown
|
page readonly
|
||
F2F000
|
stack
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page execute and read and write
|
||
B5AE000
|
stack
|
page read and write
|
||
55AE000
|
stack
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
1174000
|
heap
|
page read and write
|
||
3246000
|
trusted library allocation
|
page read and write
|
||
36DA000
|
trusted library allocation
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
CA63000
|
unkown
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
F28000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
A6C2000
|
heap
|
page read and write
|
||
A5A6000
|
heap
|
page read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
3548000
|
trusted library allocation
|
page read and write
|
||
3800000
|
unkown
|
page readonly
|
||
13CF000
|
stack
|
page read and write
|
||
7FF5ED68F000
|
unkown
|
page readonly
|
||
A12A000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A54E000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
7FF5EDA47000
|
unkown
|
page readonly
|
||
12CF000
|
heap
|
page read and write
|
||
C9DE000
|
unkown
|
page read and write
|
||
A0E5000
|
heap
|
page read and write
|
||
C10A000
|
stack
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
7FF5ED7CF000
|
unkown
|
page readonly
|
||
F45B000
|
unkown
|
page read and write
|
||
A899000
|
heap
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
58BE000
|
stack
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
3800000
|
remote allocation
|
page read and write
|
||
A3D1000
|
heap
|
page read and write
|
||
A40B000
|
heap
|
page read and write
|
||
1101000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
A3CE000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A4B8000
|
unkown
|
page read and write
|
||
A1ED000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
2B83000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
585C000
|
trusted library allocation
|
page read and write
|
||
BDC0000
|
unkown
|
page readonly
|
||
76A0000
|
unkown
|
page read and write
|
||
356D000
|
trusted library allocation
|
page read and write
|
||
7FF5ED844000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
7FF5ED9AE000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
A59B000
|
heap
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
F452000
|
unkown
|
page read and write
|
||
4BE3000
|
unkown
|
page read and write
|
||
A706000
|
heap
|
page read and write
|
||
1109000
|
heap
|
page read and write
|
||
2445000
|
trusted library allocation
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
1002000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A86C000
|
heap
|
page read and write
|
||
EFC000
|
stack
|
page read and write
|
||
A2C0000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A3F4000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
7FF5ED7D6000
|
unkown
|
page readonly
|
||
126B000
|
heap
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
1102000
|
trusted library allocation
|
page read and write
|
||
A77B000
|
heap
|
page read and write
|
||
1169000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
7FF5ED87D000
|
unkown
|
page readonly
|
||
A954000
|
heap
|
page read and write
|
||
1510000
|
unkown
|
page readonly
|
||
AFD6000
|
heap
|
page read and write
|
||
A3EF000
|
heap
|
page read and write
|
||
5852000
|
trusted library allocation
|
page read and write
|
||
C41F000
|
stack
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
97D4000
|
unkown
|
page read and write
|
||
25F7000
|
trusted library allocation
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
3A8E000
|
trusted library allocation
|
page read and write
|
||
A95C000
|
heap
|
page read and write
|
||
BA4E000
|
stack
|
page read and write
|
||
B003000
|
heap
|
page read and write
|
||
7FF5ED81B000
|
unkown
|
page readonly
|
||
43F0000
|
heap
|
page read and write
|
||
1505000
|
heap
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
2485000
|
trusted library allocation
|
page read and write
|
||
A748000
|
heap
|
page read and write
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
A3CD000
|
heap
|
page read and write
|
||
7FF5ED933000
|
unkown
|
page readonly
|
||
10F2000
|
heap
|
page read and write
|
||
315A000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
A3EB000
|
heap
|
page read and write
|
||
A7E3000
|
heap
|
page read and write
|
||
F950000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
A893000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
500D000
|
stack
|
page read and write
|
||
10AC000
|
stack
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
A78B000
|
heap
|
page read and write
|
||
10F81000
|
unkown
|
page read and write
|
||
16AA000
|
trusted library allocation
|
page execute and read and write
|
||
A0C2000
|
heap
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
11A2000
|
heap
|
page read and write
|
||
A4F3000
|
heap
|
page read and write
|
||
A8EE000
|
heap
|
page read and write
|
||
1256000
|
heap
|
page read and write
|
||
7FF5ED4E8000
|
unkown
|
page readonly
|
||
1020000
|
heap
|
page read and write
|
||
9798000
|
unkown
|
page read and write
|
||
7FF5ED71B000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
234B000
|
trusted library allocation
|
page execute and read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
A481000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
B08D000
|
stack
|
page read and write
|
||
31E4000
|
trusted library allocation
|
page read and write
|
||
A3CE000
|
heap
|
page read and write
|
||
A62E000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
2F07000
|
trusted library allocation
|
page execute and read and write
|
||
537000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
35A2000
|
trusted library allocation
|
page read and write
|
||
A91F000
|
heap
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
F5C000
|
heap
|
page read and write
|
||
3536000
|
trusted library allocation
|
page read and write
|
||
B8AB000
|
stack
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
C5A3000
|
unkown
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
3AB000
|
stack
|
page read and write
|
||
A99E000
|
heap
|
page read and write
|
||
A465000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
1005000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
A412000
|
heap
|
page read and write
|
||
8CB000
|
stack
|
page read and write
|
||
AA41000
|
heap
|
page read and write
|
||
A57B000
|
heap
|
page read and write
|
||
BDA0000
|
unkown
|
page readonly
|
||
4B50000
|
unkown
|
page read and write
|
||
9660000
|
unkown
|
page read and write
|
||
9687000
|
unkown
|
page read and write
|
||
7FF5ED93E000
|
unkown
|
page readonly
|
||
D4B000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
A3D1000
|
heap
|
page read and write
|
||
8720000
|
unkown
|
page readonly
|
||
B016000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
35D7000
|
trusted library allocation
|
page read and write
|
||
A3C2000
|
heap
|
page read and write
|
||
2E26000
|
trusted library allocation
|
page read and write
|
||
63C9000
|
unkown
|
page readonly
|
||
3578000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A3D7000
|
heap
|
page read and write
|
||
356E000
|
trusted library allocation
|
page read and write
|
||
F953000
|
unkown
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
3450000
|
unkown
|
page read and write
|
||
1548000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
906E000
|
stack
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
7FF5ED4B4000
|
unkown
|
page readonly
|
||
4B90000
|
unkown
|
page read and write
|
||
4C34000
|
unkown
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
3200000
|
unkown
|
page read and write
|
||
3572000
|
trusted library allocation
|
page read and write
|
||
BDB000
|
stack
|
page read and write
|
||
A3F1000
|
heap
|
page read and write
|
||
7FF5ED692000
|
unkown
|
page readonly
|
||
AD1D000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
A7F7000
|
heap
|
page read and write
|
||
7DF4F3031000
|
unkown
|
page execute read
|
||
A340000
|
heap
|
page read and write
|
||
3536000
|
trusted library allocation
|
page read and write
|
||
A9F5000
|
heap
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
1342000
|
heap
|
page read and write
|
||
63A5000
|
unkown
|
page readonly
|
||
A4F0000
|
heap
|
page read and write
|
||
7FF5ED850000
|
unkown
|
page readonly
|
||
12CE000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
7FF5ED9D2000
|
unkown
|
page readonly
|
||
4B78000
|
unkown
|
page read and write
|
||
7FF5ED755000
|
unkown
|
page readonly
|
||
7FF5ED43A000
|
unkown
|
page readonly
|
||
3553000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
3756000
|
unkown
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
A6B9000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
F455000
|
unkown
|
page read and write
|
||
A45E000
|
heap
|
page read and write
|
||
10E7000
|
heap
|
page read and write
|
||
1407000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
C6D8000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
58C5000
|
trusted library allocation
|
page read and write
|
||
A3C5000
|
heap
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
3543000
|
trusted library allocation
|
page read and write
|
||
A402000
|
heap
|
page read and write
|
||
C89C000
|
unkown
|
page read and write
|
||
8C70000
|
stack
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
3210000
|
unkown
|
page read and write
|
||
FC08000
|
unkown
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
3450000
|
unkown
|
page read and write
|
||
A1BD000
|
heap
|
page read and write
|
||
9881000
|
unkown
|
page read and write
|
||
3947000
|
trusted library allocation
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
A982000
|
heap
|
page read and write
|
||
2450000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
11E9000
|
heap
|
page read and write
|
||
10C0000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
3001000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page execute and read and write
|
||
11B4000
|
heap
|
page read and write
|
||
524000
|
unkown
|
page write copy
|
||
537000
|
heap
|
page read and write
|
||
2ED3000
|
trusted library allocation
|
page execute and read and write
|
||
3547000
|
trusted library allocation
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
131A000
|
heap
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
7FF5ED8E7000
|
unkown
|
page readonly
|
||
1440000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
A2D0000
|
heap
|
page read and write
|
||
A46F000
|
heap
|
page read and write
|
||
B07D000
|
heap
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
2740000
|
direct allocation
|
page execute and read and write
|
||
A74A000
|
heap
|
page read and write
|
||
107E000
|
stack
|
page read and write
|
||
A21E000
|
stack
|
page read and write
|
||
A3EE000
|
heap
|
page read and write
|
||
7FF5ED928000
|
unkown
|
page readonly
|
||
A550000
|
heap
|
page read and write
|
||
A070000
|
heap
|
page read and write
|
||
1707000
|
trusted library allocation
|
page execute and read and write
|
||
1194000
|
heap
|
page read and write
|
||
A3F0000
|
heap
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
818D000
|
stack
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
A40A000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
7FF5ED735000
|
unkown
|
page readonly
|
||
2F0E000
|
stack
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
A721000
|
heap
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
1104000
|
heap
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
FFA000
|
trusted library allocation
|
page execute and read and write
|
||
A895000
|
heap
|
page read and write
|
||
3547000
|
trusted library allocation
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
A9AF000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A814000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
F450000
|
unkown
|
page read and write
|
||
6550000
|
unkown
|
page readonly
|
||
1100000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
7FF5ED77C000
|
unkown
|
page readonly
|
||
A3EB000
|
heap
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
3596000
|
trusted library allocation
|
page read and write
|
||
F95E000
|
unkown
|
page read and write
|
||
7FF5ED2A9000
|
unkown
|
page readonly
|
||
10B4000
|
trusted library allocation
|
page read and write
|
||
10F7000
|
heap
|
page read and write
|
||
2EDC000
|
trusted library allocation
|
page read and write
|
||
7FF5ED50A000
|
unkown
|
page readonly
|
||
F30000
|
heap
|
page read and write
|
||
7FF5ED8F9000
|
unkown
|
page readonly
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
3700000
|
unkown
|
page read and write
|
||
C350000
|
unkown
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
79D3000
|
unkown
|
page read and write
|
||
3539000
|
trusted library allocation
|
page read and write
|
||
102000
|
unkown
|
page readonly
|
||
11A7000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
11A6000
|
stack
|
page read and write
|
||
32D6000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
123B000
|
stack
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
A6D8000
|
heap
|
page read and write
|
||
F8D4000
|
unkown
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
7D40000
|
unkown
|
page read and write
|
||
118D000
|
heap
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
2EDA000
|
trusted library allocation
|
page read and write
|
||
A391000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7950000
|
unkown
|
page read and write
|
||
B074000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
13EF000
|
heap
|
page read and write
|
||
A22F000
|
heap
|
page read and write
|
||
355F000
|
trusted library allocation
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
3319000
|
stack
|
page read and write
|
||
2EDE000
|
trusted library allocation
|
page read and write
|
||
A131000
|
heap
|
page read and write
|
||
2EE7000
|
trusted library allocation
|
page read and write
|
||
AFCF000
|
heap
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
A459000
|
heap
|
page read and write
|
||
DB1000
|
stack
|
page read and write
|
||
ED5000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
785B000
|
unkown
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
2A74000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A632000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A40D000
|
heap
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
7B80000
|
unkown
|
page read and write
|
||
11A2000
|
heap
|
page read and write
|
||
A4FD000
|
heap
|
page read and write
|
||
16F1000
|
trusted library allocation
|
page read and write
|
||
170B000
|
trusted library allocation
|
page execute and read and write
|
||
2F70000
|
trusted library allocation
|
page execute and read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
4B56000
|
unkown
|
page read and write
|
||
2BD0000
|
heap
|
page execute and read and write
|
||
37AE000
|
unkown
|
page read and write
|
||
3551000
|
trusted library allocation
|
page read and write
|
||
37A2000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
8F0B000
|
unkown
|
page read and write
|
||
A87D000
|
heap
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
3450000
|
unkown
|
page read and write
|
||
7FF5ED669000
|
unkown
|
page readonly
|
||
11C0000
|
unkown
|
page read and write
|
||
3A86000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
A97A000
|
heap
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
7FF5EDA70000
|
unkown
|
page readonly
|
||
A5DB000
|
heap
|
page read and write
|
||
B8C0000
|
unkown
|
page readonly
|
||
33B0000
|
trusted library allocation
|
page read and write
|
||
2EE1000
|
trusted library allocation
|
page read and write
|
||
9F1E000
|
stack
|
page read and write
|
||
7FF5ED847000
|
unkown
|
page readonly
|
||
2BE3000
|
trusted library allocation
|
page execute and read and write
|
||
F958000
|
unkown
|
page read and write
|
||
123F000
|
stack
|
page read and write
|
||
37F6000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A6CB000
|
heap
|
page read and write
|
||
A8DD000
|
heap
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
A65A000
|
heap
|
page read and write
|
||
A401000
|
heap
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
3579000
|
trusted library allocation
|
page read and write
|
||
A51E000
|
heap
|
page read and write
|
||
96DF000
|
unkown
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
F957000
|
unkown
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
7FF5ED8C1000
|
unkown
|
page readonly
|
||
356E000
|
trusted library allocation
|
page read and write
|
||
A44C000
|
heap
|
page read and write
|
||
3550000
|
trusted library allocation
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
5557000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A58C000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
7FF5ED86B000
|
unkown
|
page readonly
|
||
18D1000
|
trusted library allocation
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
10AB000
|
stack
|
page read and write
|
||
F450000
|
unkown
|
page read and write
|
||
A3FF000
|
heap
|
page read and write
|
||
E25000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
662000
|
heap
|
page read and write
|
||
55B6000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1090000
|
heap
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
3549000
|
trusted library allocation
|
page read and write
|
||
5663000
|
trusted library allocation
|
page read and write
|
||
125E000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
A184000
|
heap
|
page read and write
|
||
3E37000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
F451000
|
unkown
|
page read and write
|
||
A9CC000
|
heap
|
page read and write
|
||
7FF5ED996000
|
unkown
|
page readonly
|
||
A3CA000
|
heap
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
1197000
|
heap
|
page read and write
|
||
A2DA000
|
heap
|
page read and write
|
||
366A000
|
trusted library allocation
|
page read and write
|
||
A26000
|
heap
|
page read and write
|
||
9A10000
|
unkown
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
31F4000
|
trusted library allocation
|
page read and write
|
||
3392000
|
trusted library allocation
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
6763000
|
unkown
|
page readonly
|
||
3209000
|
trusted library allocation
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
FD5000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
4CB0000
|
unkown
|
page read and write
|
||
A70F000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
21DF000
|
stack
|
page read and write
|
||
2ADF000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
1197000
|
heap
|
page read and write
|
||
8DA0000
|
unkown
|
page read and write
|
||
7FF5ED8B4000
|
unkown
|
page readonly
|
||
A73E000
|
heap
|
page read and write
|
||
A4D4000
|
heap
|
page read and write
|
||
148F000
|
stack
|
page read and write
|
||
1109F000
|
unkown
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
2440000
|
trusted library allocation
|
page read and write
|
||
7FF5ED975000
|
unkown
|
page readonly
|
||
A7CE000
|
heap
|
page read and write
|
||
3238000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page read and write
|
||
A3CB000
|
heap
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
6585000
|
unkown
|
page readonly
|
||
F45C000
|
unkown
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
10E2000
|
trusted library allocation
|
page read and write
|
||
A350000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A38E000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
1248000
|
heap
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
2E2B000
|
trusted library allocation
|
page read and write
|
||
3571000
|
trusted library allocation
|
page read and write
|
||
C516000
|
unkown
|
page read and write
|
||
6572000
|
unkown
|
page readonly
|
||
33C0000
|
heap
|
page execute and read and write
|
||
1451000
|
unkown
|
page readonly
|
||
A1F000
|
stack
|
page read and write
|
||
2C06000
|
trusted library allocation
|
page execute and read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
A562000
|
heap
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
3330000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
B8C000
|
stack
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
2F61000
|
heap
|
page read and write
|
||
7DF4F3040000
|
unkown
|
page readonly
|
||
1F0000
|
unkown
|
page readonly
|
||
2902000
|
heap
|
page execute and read and write
|
||
37A8000
|
unkown
|
page read and write
|
||
8C40000
|
heap
|
page read and write
|
||
9D64000
|
unkown
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
F14000
|
trusted library allocation
|
page read and write
|
||
A3F9000
|
heap
|
page read and write
|
||
69A5000
|
unkown
|
page readonly
|
||
A79E000
|
heap
|
page read and write
|
||
35B3000
|
trusted library allocation
|
page read and write
|
||
CBC000
|
stack
|
page read and write
|
||
3542000
|
trusted library allocation
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
5651000
|
trusted library allocation
|
page read and write
|
||
A520000
|
heap
|
page read and write
|
||
EEF000
|
stack
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
9792000
|
unkown
|
page read and write
|
||
3A71000
|
trusted library allocation
|
page read and write
|
||
F95E000
|
unkown
|
page read and write
|
||
C350000
|
unkown
|
page read and write
|
||
A3BE000
|
unkown
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
A3CE000
|
heap
|
page read and write
|
||
7FF5ED503000
|
unkown
|
page readonly
|
||
F30000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A63C000
|
heap
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A3D2000
|
heap
|
page read and write
|
||
B629000
|
stack
|
page read and write
|
||
2464000
|
trusted library allocation
|
page read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
2482000
|
trusted library allocation
|
page read and write
|
||
A7C0000
|
heap
|
page read and write
|
||
2C0A000
|
trusted library allocation
|
page execute and read and write
|
||
B7AE000
|
stack
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
2E34000
|
trusted library allocation
|
page read and write
|
||
A582000
|
heap
|
page read and write
|
||
7FF5ED265000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
A3EB000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
359F000
|
trusted library allocation
|
page read and write
|
||
2300000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page execute and read and write
|
||
A089000
|
heap
|
page read and write
|
||
1449000
|
heap
|
page read and write
|
||
3543000
|
trusted library allocation
|
page read and write
|
||
5801000
|
trusted library allocation
|
page read and write
|
||
977A000
|
unkown
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
890000
|
trusted library allocation
|
page read and write
|
||
3450000
|
unkown
|
page read and write
|
||
7FF5ED986000
|
unkown
|
page readonly
|
||
A0D2000
|
heap
|
page read and write
|
||
358F000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
110B000
|
trusted library allocation
|
page execute and read and write
|
||
3140000
|
unkown
|
page read and write
|
||
1221000
|
heap
|
page read and write
|
||
BEB000
|
stack
|
page read and write
|
||
49A000
|
unkown
|
page write copy
|
||
339F000
|
stack
|
page read and write
|
||
28C0000
|
unclassified section
|
page read and write
|
||
9869000
|
unkown
|
page read and write
|
||
1483000
|
heap
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
A6C5000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
8A4000
|
trusted library allocation
|
page read and write
|
||
A68A000
|
heap
|
page read and write
|
||
8EC000
|
heap
|
page read and write
|
||
2F61000
|
heap
|
page read and write
|
||
A68F000
|
heap
|
page read and write
|
||
C6CF000
|
unkown
|
page read and write
|
||
7FF5ED39B000
|
unkown
|
page readonly
|
||
651000
|
heap
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
49A000
|
unkown
|
page read and write
|
||
10B8000
|
heap
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
7E11000
|
unkown
|
page read and write
|
||
A504000
|
heap
|
page read and write
|
||
A614000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
16F6000
|
trusted library allocation
|
page execute and read and write
|
||
F957000
|
unkown
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
7FF5ED92C000
|
unkown
|
page readonly
|
||
78A0000
|
unkown
|
page read and write
|
||
2EFA000
|
trusted library allocation
|
page execute and read and write
|
||
3758000
|
unkown
|
page read and write
|
||
A474000
|
heap
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
F26000
|
heap
|
page read and write
|
||
F450000
|
unkown
|
page read and write
|
||
1350000
|
unkown
|
page readonly
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
A763000
|
heap
|
page read and write
|
||
3591000
|
trusted library allocation
|
page read and write
|
||
A3B7000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
35A2000
|
trusted library allocation
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
3577000
|
trusted library allocation
|
page read and write
|
||
232D000
|
trusted library allocation
|
page execute and read and write
|
||
18BC000
|
stack
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
F45C000
|
unkown
|
page read and write
|
||
3395000
|
trusted library allocation
|
page read and write
|
||
F853000
|
unkown
|
page read and write
|
||
7DF4F3050000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
111F000
|
heap
|
page read and write
|
||
F57000
|
heap
|
page read and write
|
||
138D000
|
heap
|
page read and write
|
||
25A5000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
1109000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
3582000
|
trusted library allocation
|
page read and write
|
||
122D000
|
heap
|
page read and write
|
||
A3EB000
|
heap
|
page read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
3130000
|
unkown
|
page read and write
|
||
117B000
|
heap
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
3261000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
3587000
|
trusted library allocation
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
2332000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
1179000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
A75D000
|
heap
|
page read and write
|
||
965C000
|
stack
|
page read and write
|
||
A66E000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
3800000
|
remote allocation
|
page read and write
|
||
A6DE000
|
heap
|
page read and write
|
||
CB3C000
|
unkown
|
page read and write
|
||
AAF9000
|
unkown
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
F951000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A5C0000
|
heap
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
heap
|
page execute and read and write
|
||
10F7000
|
heap
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
F38000
|
heap
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
3212000
|
trusted library allocation
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
A3F8000
|
heap
|
page read and write
|
||
C6B000
|
stack
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
A393000
|
heap
|
page read and write
|
||
A590000
|
heap
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
A494000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
37D2000
|
unkown
|
page read and write
|
||
8BE0000
|
unkown
|
page readonly
|
||
11B4000
|
heap
|
page read and write
|
||
1406000
|
heap
|
page read and write
|
||
A879000
|
heap
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
9070000
|
unkown
|
page read and write
|
||
3633000
|
trusted library allocation
|
page read and write
|
||
A925000
|
heap
|
page read and write
|
||
A1C7000
|
heap
|
page read and write
|
||
56D9000
|
unkown
|
page read and write
|
||
8730000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
43C1000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
BDD0000
|
unkown
|
page readonly
|
||
117D000
|
heap
|
page read and write
|
||
1598000
|
heap
|
page read and write
|
||
A3FF000
|
heap
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
BC9B000
|
stack
|
page read and write
|
||
6741000
|
unkown
|
page readonly
|
||
A97C000
|
heap
|
page read and write
|
||
16F7000
|
trusted library allocation
|
page read and write
|
||
7867000
|
unkown
|
page read and write
|
||
A3EC000
|
heap
|
page read and write
|
||
3531000
|
trusted library allocation
|
page read and write
|
||
7FF5ED73D000
|
unkown
|
page readonly
|
||
3587000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
3201000
|
trusted library allocation
|
page read and write
|
||
A3E3000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
7FF5ED4EF000
|
unkown
|
page readonly
|
||
1109000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
1770000
|
heap
|
page read and write
|
||
5E20000
|
unkown
|
page readonly
|
||
7FF5ED1D6000
|
unkown
|
page readonly
|
||
A889000
|
heap
|
page read and write
|
||
A40D000
|
heap
|
page read and write
|
||
A94F000
|
heap
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
2EC4000
|
trusted library allocation
|
page read and write
|
||
111F000
|
heap
|
page read and write
|
||
F45E000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
AAFE000
|
unkown
|
page read and write
|
||
7FF5ED28E000
|
unkown
|
page readonly
|
||
A8C0000
|
heap
|
page read and write
|
||
A77D000
|
heap
|
page read and write
|
||
896B000
|
stack
|
page read and write
|
||
31F8000
|
trusted library allocation
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
986B000
|
unkown
|
page read and write
|
||
AFCB000
|
heap
|
page read and write
|
||
3791000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
B10D000
|
stack
|
page read and write
|
||
4CE000
|
stack
|
page read and write
|
||
A3C0000
|
heap
|
page read and write
|
||
7FF5ED3F3000
|
unkown
|
page readonly
|
||
129D000
|
heap
|
page read and write
|
||
A2F0000
|
heap
|
page read and write
|
||
7852000
|
unkown
|
page read and write
|
||
1336000
|
stack
|
page read and write
|
||
97B5000
|
unkown
|
page read and write
|
||
13A1000
|
unkown
|
page read and write
|
||
3565000
|
trusted library allocation
|
page read and write
|
||
16B2000
|
trusted library allocation
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
4370000
|
unclassified section
|
page read and write
|
||
1439000
|
heap
|
page read and write
|
||
35A0000
|
trusted library allocation
|
page read and write
|
||
FBB000
|
stack
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
10E9000
|
heap
|
page read and write
|
||
2430000
|
heap
|
page execute and read and write
|
||
53E000
|
heap
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
7FF5EDA2A000
|
unkown
|
page readonly
|
||
353F000
|
trusted library allocation
|
page read and write
|
||
16B7000
|
trusted library allocation
|
page execute and read and write
|
||
2340000
|
trusted library allocation
|
page read and write
|
||
93BE000
|
stack
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
7FF5EDA11000
|
unkown
|
page readonly
|
||
245E000
|
trusted library allocation
|
page read and write
|
||
7FF5ED4F3000
|
unkown
|
page readonly
|
||
15A0000
|
heap
|
page read and write
|
||
A837000
|
heap
|
page read and write
|
||
3235000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
7FF5ED586000
|
unkown
|
page readonly
|
||
53AE000
|
stack
|
page read and write
|
||
1109000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
7FF5ED26E000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
A15B000
|
heap
|
page read and write
|
||
A3F1000
|
heap
|
page read and write
|
||
12A3000
|
trusted library allocation
|
page execute and read and write
|
||
3220000
|
unkown
|
page readonly
|
||
14B5000
|
heap
|
page read and write
|
||
CF0000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
A71D000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
1109000
|
heap
|
page read and write
|
||
3576000
|
trusted library allocation
|
page read and write
|
||
A352000
|
heap
|
page read and write
|
||
7FF5ED418000
|
unkown
|
page readonly
|
||
353F000
|
trusted library allocation
|
page read and write
|
||
1346000
|
heap
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
28EA000
|
heap
|
page read and write
|
||
A932000
|
heap
|
page read and write
|
||
A756000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
3547000
|
trusted library allocation
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
3738000
|
unkown
|
page read and write
|
||
AB74000
|
unkown
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
A866000
|
heap
|
page read and write
|
||
A5F0000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
7FF5ED295000
|
unkown
|
page readonly
|
||
3536000
|
trusted library allocation
|
page read and write
|
||
7FFE000
|
stack
|
page read and write
|
||
575E000
|
stack
|
page read and write
|
||
63EB000
|
unkown
|
page readonly
|
||
31E0000
|
trusted library allocation
|
page read and write
|
||
7E50000
|
unkown
|
page readonly
|
||
A5DD000
|
heap
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
37BD000
|
unkown
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
FD9000
|
heap
|
page read and write
|
||
DD0000
|
unkown
|
page readonly
|
||
A3DF000
|
heap
|
page read and write
|
||
7900000
|
unkown
|
page read and write
|
||
A1A0000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
3215000
|
trusted library allocation
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
354A000
|
trusted library allocation
|
page read and write
|
||
7FF5ED6B9000
|
unkown
|
page readonly
|
||
65ED000
|
unkown
|
page readonly
|
||
A962000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
9DED000
|
stack
|
page read and write
|
||
1107000
|
trusted library allocation
|
page read and write
|
||
A3C8000
|
heap
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
A509000
|
heap
|
page read and write
|
||
5206000
|
unkown
|
page readonly
|
||
B4B5000
|
heap
|
page read and write
|
||
3542000
|
trusted library allocation
|
page read and write
|
||
116C000
|
heap
|
page read and write
|
||
7FF5ED516000
|
unkown
|
page readonly
|
||
A405000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
43C0000
|
heap
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
2347000
|
trusted library allocation
|
page execute and read and write
|
||
537000
|
heap
|
page read and write
|
||
3579000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
3587000
|
trusted library allocation
|
page read and write
|
||
A93E000
|
heap
|
page read and write
|
||
A4BD000
|
heap
|
page read and write
|
||
662000
|
heap
|
page read and write
|
||
A3F2000
|
heap
|
page read and write
|
||
D0D000
|
trusted library allocation
|
page execute and read and write
|
||
A724000
|
heap
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
1095000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A3F7000
|
heap
|
page read and write
|
||
7C80000
|
unkown
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
14B0000
|
unkown
|
page readonly
|
||
C700000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
7FF5ED915000
|
unkown
|
page readonly
|
||
1197000
|
heap
|
page read and write
|
||
4C1E000
|
unkown
|
page read and write
|
||
A38A000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A6BE000
|
heap
|
page read and write
|
||
7FF5ED71E000
|
unkown
|
page readonly
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
A3F7000
|
heap
|
page read and write
|
||
A3D7000
|
heap
|
page read and write
|
||
A43A000
|
heap
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
A59F000
|
heap
|
page read and write
|
||
A862000
|
heap
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
1179000
|
heap
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
A431000
|
heap
|
page read and write
|
||
7FF5ED8AC000
|
unkown
|
page readonly
|
||
7FF5ED412000
|
unkown
|
page readonly
|
||
3556000
|
trusted library allocation
|
page read and write
|
||
C7C5000
|
unkown
|
page read and write
|
||
10ED000
|
trusted library allocation
|
page execute and read and write
|
||
D28000
|
heap
|
page read and write
|
||
7FF5ED349000
|
unkown
|
page readonly
|
||
9070000
|
unkown
|
page read and write
|
||
3579000
|
trusted library allocation
|
page read and write
|
||
230000
|
unkown
|
page read and write
|
||
7FF5ED743000
|
unkown
|
page readonly
|
||
7FF5ED505000
|
unkown
|
page readonly
|
||
A5BD000
|
heap
|
page read and write
|
||
AFCD000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
358B000
|
trusted library allocation
|
page read and write
|
||
8CEE000
|
stack
|
page read and write
|
||
A3D7000
|
heap
|
page read and write
|
||
CB89000
|
unkown
|
page read and write
|
||
7859000
|
unkown
|
page read and write
|
||
A097000
|
heap
|
page read and write
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
A8D8000
|
heap
|
page read and write
|
||
5641000
|
unkown
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
C964000
|
unkown
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
325F000
|
stack
|
page read and write
|
||
F89B000
|
unkown
|
page read and write
|
||
A610000
|
heap
|
page read and write
|
||
A549000
|
heap
|
page read and write
|
||
CA42000
|
unkown
|
page read and write
|
||
3549000
|
trusted library allocation
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
13A8000
|
heap
|
page read and write
|
||
A93C000
|
heap
|
page read and write
|
||
5F6000
|
stack
|
page read and write
|
||
359E000
|
trusted library allocation
|
page read and write
|
||
A80F000
|
heap
|
page read and write
|
||
5ABF000
|
stack
|
page read and write
|
||
C4D0000
|
unkown
|
page read and write
|
||
113A000
|
heap
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
7FF5EDA76000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
8C70000
|
unkown
|
page read and write
|
||
524000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
58FE000
|
stack
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
281F000
|
stack
|
page read and write
|
||
435F000
|
stack
|
page read and write
|
||
2BED000
|
trusted library allocation
|
page execute and read and write
|
||
A4AE000
|
unkown
|
page read and write
|
||
A566000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
4BDC000
|
unkown
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
118D000
|
heap
|
page read and write
|
||
A94D000
|
heap
|
page read and write
|
||
A3C5000
|
heap
|
page read and write
|
||
AB69000
|
unkown
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
F957000
|
unkown
|
page read and write
|
||
7FF5ED9A6000
|
unkown
|
page readonly
|
||
A3F4000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
7FF5ED48A000
|
unkown
|
page readonly
|
||
11B5000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
7FF5ED5CE000
|
unkown
|
page readonly
|
||
408000
|
unkown
|
page readonly
|
||
FFD000
|
heap
|
page read and write
|
||
4BE1000
|
unkown
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
1431000
|
heap
|
page read and write
|
||
34E9000
|
stack
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
3659000
|
stack
|
page read and write
|
||
1197000
|
heap
|
page read and write
|
||
56FE000
|
stack
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
7865000
|
unkown
|
page read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
131E000
|
heap
|
page read and write
|
||
F952000
|
unkown
|
page read and write
|
||
FAC000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
A3FC000
|
heap
|
page read and write
|
||
356B000
|
trusted library allocation
|
page read and write
|
||
A236000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
537000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
112D000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
78AD000
|
unkown
|
page read and write
|
||
A3E9000
|
heap
|
page read and write
|
||
8AD000
|
trusted library allocation
|
page execute and read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
A3F3000
|
heap
|
page read and write
|
||
40C7000
|
trusted library allocation
|
page read and write
|
||
A3F2000
|
heap
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
3544000
|
trusted library allocation
|
page read and write
|
||
9871000
|
unkown
|
page read and write
|
||
64C000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
3538000
|
trusted library allocation
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
231D000
|
trusted library allocation
|
page execute and read and write
|
||
FC24000
|
unkown
|
page read and write
|
||
3591000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
6AE000
|
heap
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
8A6E000
|
stack
|
page read and write
|
||
8FA000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A72A000
|
heap
|
page read and write
|
||
2F20000
|
trusted library allocation
|
page read and write
|
||
37B0000
|
unkown
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
111F000
|
heap
|
page read and write
|
||
B150000
|
unkown
|
page read and write
|
||
A8F9000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A60A000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
AF8D000
|
stack
|
page read and write
|
||
A46C000
|
heap
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
9AC000
|
heap
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
3544000
|
trusted library allocation
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
3542000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
heap
|
page execute and read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
A7EB000
|
heap
|
page read and write
|
||
3630000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
408000
|
unkown
|
page readonly
|
||
A797000
|
heap
|
page read and write
|
||
525000
|
unkown
|
page execute read
|
||
C6BF000
|
unkown
|
page read and write
|
||
7F50000
|
unkown
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
2E48000
|
trusted library allocation
|
page read and write
|
||
A3E5000
|
heap
|
page read and write
|
||
355A000
|
trusted library allocation
|
page read and write
|
||
7CD0000
|
unkown
|
page read and write
|
||
1007000
|
trusted library allocation
|
page execute and read and write
|
||
DE5000
|
heap
|
page read and write
|
||
12C1000
|
heap
|
page read and write
|
||
A9F0000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED806000
|
unkown
|
page readonly
|
||
1136000
|
stack
|
page read and write
|
||
B0AD000
|
heap
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
B4AC000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
91B8000
|
stack
|
page read and write
|
||
F458000
|
unkown
|
page read and write
|
||
A39C000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
64CD000
|
unkown
|
page readonly
|
||
C50000
|
heap
|
page read and write
|
||
1333000
|
trusted library allocation
|
page execute and read and write
|
||
5590000
|
unkown
|
page write copy
|
||
AA19000
|
heap
|
page read and write
|
||
1179000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
A415000
|
heap
|
page read and write
|
||
3A60000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
7DF4F3061000
|
unkown
|
page execute read
|
||
A650000
|
heap
|
page read and write
|
||
11C0000
|
unkown
|
page read and write
|
||
C6C1000
|
unkown
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
F459000
|
unkown
|
page read and write
|
||
3599000
|
trusted library allocation
|
page read and write
|
||
A9BE000
|
heap
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
58AF000
|
stack
|
page read and write
|
||
A3D5000
|
heap
|
page read and write
|
||
11A2000
|
heap
|
page read and write
|
||
8B90000
|
unkown
|
page readonly
|
||
154E000
|
stack
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
A8DF000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
3AA7000
|
heap
|
page read and write
|
||
356B000
|
trusted library allocation
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A99B000
|
heap
|
page read and write
|
||
673F000
|
unkown
|
page readonly
|
||
9070000
|
unkown
|
page read and write
|
||
A512000
|
heap
|
page read and write
|
||
10BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED556000
|
unkown
|
page readonly
|
||
134D000
|
trusted library allocation
|
page execute and read and write
|
||
11C8000
|
heap
|
page read and write
|
||
A461000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
8C50000
|
unkown
|
page readonly
|
||
8B7000
|
heap
|
page read and write
|
||
13DF000
|
stack
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page execute and read and write
|
||
579E000
|
stack
|
page read and write
|
||
5584000
|
trusted library allocation
|
page read and write
|
||
7847000
|
unkown
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
F95F000
|
unkown
|
page read and write
|
||
1242000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A766000
|
heap
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
7CC0000
|
unkown
|
page readonly
|
||
3599000
|
trusted library allocation
|
page read and write
|
||
9875000
|
unkown
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
A169000
|
heap
|
page read and write
|
||
9F7000
|
heap
|
page read and write
|
||
57A3000
|
heap
|
page execute and read and write
|
||
7E60000
|
unkown
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
986F000
|
unkown
|
page read and write
|
||
2C6D000
|
stack
|
page read and write
|
||
55C9000
|
trusted library allocation
|
page read and write
|
||
7FF5ED85F000
|
unkown
|
page readonly
|
||
537000
|
heap
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
B640000
|
unkown
|
page read and write
|
||
6A8000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
A988000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
A085000
|
heap
|
page read and write
|
||
9C6000
|
stack
|
page read and write
|
||
1467000
|
trusted library allocation
|
page execute and read and write
|
||
A807000
|
heap
|
page read and write
|
||
7FF5ED409000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
7FF5ED779000
|
unkown
|
page readonly
|
||
A3EA000
|
heap
|
page read and write
|
||
12F6000
|
stack
|
page read and write
|
||
C4A0000
|
unkown
|
page read and write
|
||
F95A000
|
unkown
|
page read and write
|
||
3702000
|
trusted library allocation
|
page read and write
|
||
7FF5ED41C000
|
unkown
|
page readonly
|
||
FBC0000
|
unkown
|
page read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
2490000
|
heap
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
3150000
|
heap
|
page read and write
|
||
3152000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
7FF5ED7F1000
|
unkown
|
page readonly
|
||
A3C8000
|
heap
|
page read and write
|
||
F457000
|
unkown
|
page read and write
|
||
A3CE000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
9883000
|
unkown
|
page read and write
|
||
5326000
|
trusted library allocation
|
page read and write
|
||
A09E000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
7FF5ED8E2000
|
unkown
|
page readonly
|
||
9070000
|
unkown
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A3C2000
|
heap
|
page read and write
|
||
1101000
|
trusted library allocation
|
page read and write
|
||
139C000
|
heap
|
page read and write
|
||
3547000
|
trusted library allocation
|
page read and write
|
||
A3E9000
|
heap
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
3546000
|
trusted library allocation
|
page read and write
|
||
3548000
|
trusted library allocation
|
page read and write
|
||
A30B000
|
heap
|
page read and write
|
||
A444000
|
heap
|
page read and write
|
||
7FF5ED59E000
|
unkown
|
page readonly
|
||
A3AD000
|
heap
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
8208000
|
stack
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
3795000
|
unkown
|
page read and write
|
||
7FF5ED1EA000
|
unkown
|
page readonly
|
||
1190000
|
heap
|
page read and write
|
||
A52B000
|
heap
|
page read and write
|
||
A411000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
A3CB000
|
heap
|
page read and write
|
||
A4AD000
|
heap
|
page read and write
|
||
7CE0000
|
unkown
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
A3EF000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
A886000
|
heap
|
page read and write
|
||
916000
|
heap
|
page read and write
|
||
CA20000
|
unkown
|
page read and write
|
||
8B60000
|
unkown
|
page readonly
|
||
2904000
|
trusted library allocation
|
page read and write
|
||
1101000
|
heap
|
page read and write
|
||
7FF5ED6A5000
|
unkown
|
page readonly
|
||
7FF5ED55F000
|
unkown
|
page readonly
|
||
89E0000
|
unkown
|
page read and write
|
||
11EC000
|
heap
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
9815000
|
unkown
|
page read and write
|
||
18E0000
|
trusted library allocation
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
111F000
|
heap
|
page read and write
|
||
A41E000
|
heap
|
page read and write
|
||
6592000
|
unkown
|
page readonly
|
||
A3CD000
|
heap
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
A91A000
|
heap
|
page read and write
|
||
A9B2000
|
heap
|
page read and write
|
||
A47F000
|
heap
|
page read and write
|
||
2E31000
|
trusted library allocation
|
page read and write
|
||
A7EE000
|
heap
|
page read and write
|
||
A39B000
|
unkown
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
3450000
|
unkown
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page execute and read and write
|
||
5BFF000
|
stack
|
page read and write
|
||
7FF5ED8FF000
|
unkown
|
page readonly
|
||
7FF5ED5EB000
|
unkown
|
page readonly
|
||
1494000
|
heap
|
page read and write
|
||
3209000
|
stack
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
1198000
|
heap
|
page read and write
|
||
89A0000
|
unkown
|
page read and write
|
||
95DB000
|
stack
|
page read and write
|
||
36BD000
|
stack
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
C5A0000
|
unkown
|
page read and write
|
||
A3F3000
|
heap
|
page read and write
|
||
64C7000
|
unkown
|
page readonly
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
5AD0000
|
heap
|
page execute and read and write
|
||
F814000
|
unkown
|
page read and write
|
||
7FF5ED5C1000
|
unkown
|
page readonly
|
||
9070000
|
unkown
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
A935000
|
heap
|
page read and write
|
||
245B000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
C962000
|
unkown
|
page read and write
|
||
35D3000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
51C0000
|
unkown
|
page readonly
|
||
3130000
|
unkown
|
page read and write
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
171E000
|
stack
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
14C0000
|
heap
|
page execute and read and write
|
||
C50A000
|
unkown
|
page read and write
|
||
33B9000
|
stack
|
page read and write
|
||
7FF5ED93B000
|
unkown
|
page readonly
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
97C3000
|
unkown
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
9893000
|
unkown
|
page read and write
|
||
A94C000
|
heap
|
page read and write
|
||
2C12000
|
trusted library allocation
|
page read and write
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
A1AB000
|
heap
|
page read and write
|
||
A4B4000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
63B6000
|
unkown
|
page readonly
|
||
4FB000
|
stack
|
page read and write
|
||
7FF5ED507000
|
unkown
|
page readonly
|
||
A3EE000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
7DF4F3071000
|
unkown
|
page execute read
|
||
10001000
|
unkown
|
page execute read
|
||
9070000
|
unkown
|
page read and write
|
||
A4CF000
|
heap
|
page read and write
|
||
4C50000
|
unkown
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
10EB000
|
trusted library allocation
|
page execute and read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
7D53000
|
unkown
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
3579000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
64CB000
|
unkown
|
page readonly
|
||
11A5000
|
heap
|
page read and write
|
||
176E000
|
stack
|
page read and write
|
||
A42F000
|
heap
|
page read and write
|
||
D03000
|
trusted library allocation
|
page execute and read and write
|
||
1200000
|
heap
|
page read and write
|
||
A9C7000
|
heap
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
A570000
|
heap
|
page read and write
|
||
A3F7000
|
heap
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
3591000
|
trusted library allocation
|
page read and write
|
||
A995000
|
heap
|
page read and write
|
||
A3EE000
|
heap
|
page read and write
|
||
A572000
|
heap
|
page read and write
|
||
AAF2000
|
unkown
|
page read and write
|
||
3568000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
F95F000
|
unkown
|
page read and write
|
||
11CE000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A634000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
EC1C000
|
stack
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
A423000
|
heap
|
page read and write
|
||
7FF5D1CCD000
|
unkown
|
page readonly
|
||
57FE000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED33F000
|
unkown
|
page readonly
|
||
9070000
|
unkown
|
page read and write
|
||
F955000
|
unkown
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
25FE000
|
stack
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
1357000
|
trusted library allocation
|
page read and write
|
||
A4D7000
|
heap
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
18A7000
|
heap
|
page read and write
|
||
AA39000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
7FF5ED625000
|
unkown
|
page readonly
|
||
11A2000
|
heap
|
page read and write
|
||
14CD000
|
heap
|
page read and write
|
||
525000
|
unkown
|
page execute read
|
||
342E000
|
stack
|
page read and write
|
||
ADB000
|
stack
|
page read and write
|
||
7FF5ED68C000
|
unkown
|
page readonly
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
A70C000
|
heap
|
page read and write
|
||
7FF5ED2A4000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
1317000
|
heap
|
page read and write
|
||
3577000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A6AF000
|
heap
|
page read and write
|
||
A3D7000
|
heap
|
page read and write
|
||
89C0000
|
unkown
|
page read and write
|
||
7FF5ED62F000
|
unkown
|
page readonly
|
||
145E000
|
heap
|
page read and write
|
||
A467000
|
heap
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
8DB000
|
stack
|
page read and write
|
||
A29E000
|
stack
|
page read and write
|
||
A385000
|
heap
|
page read and write
|
||
E5B000
|
stack
|
page read and write
|
||
7FF5ED3D6000
|
unkown
|
page readonly
|
||
525000
|
unkown
|
page execute read
|
||
1220000
|
unkown
|
page read and write
|
||
A3EA000
|
heap
|
page read and write
|
||
A3CC000
|
heap
|
page read and write
|
||
233A000
|
trusted library allocation
|
page execute and read and write
|
||
AAF6000
|
unkown
|
page read and write
|
||
7FF5ED65C000
|
unkown
|
page readonly
|
||
A3F7000
|
heap
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
2AAD000
|
stack
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
7FF5ED471000
|
unkown
|
page readonly
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
A5EB000
|
heap
|
page read and write
|
||
A752000
|
heap
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
7FF5ED6DB000
|
unkown
|
page readonly
|
||
13E0000
|
unkown
|
page read and write
|
||
A4FC000
|
unkown
|
page read and write
|
||
3450000
|
unkown
|
page read and write
|
||
A76B000
|
heap
|
page read and write
|
||
A7D0000
|
heap
|
page read and write
|
||
7FF5ED803000
|
unkown
|
page readonly
|
||
3200000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
7FF5ED697000
|
unkown
|
page readonly
|
||
2454000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
9E6C000
|
stack
|
page read and write
|
||
4487000
|
trusted library allocation
|
page read and write
|
||
7FF5ED800000
|
unkown
|
page readonly
|
||
3579000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
66BA000
|
unkown
|
page readonly
|
||
31FE000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
44C0000
|
heap
|
page read and write
|
||
A3A7000
|
heap
|
page read and write
|
||
A670000
|
heap
|
page read and write
|
||
7FF5ED853000
|
unkown
|
page readonly
|
||
7FF5ED94A000
|
unkown
|
page readonly
|
||
3577000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
16FA000
|
trusted library allocation
|
page execute and read and write
|
||
A26E000
|
heap
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
A3F5000
|
heap
|
page read and write
|
||
59AF000
|
stack
|
page read and write
|
||
7FF5ED9BE000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
7FF5ED404000
|
unkown
|
page readonly
|
||
A147000
|
heap
|
page read and write
|
||
A3F6000
|
heap
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
A3EA000
|
heap
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
3F17000
|
trusted library allocation
|
page read and write
|
||
987D000
|
unkown
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
A3E6000
|
heap
|
page read and write
|
||
A3C9000
|
heap
|
page read and write
|
||
30C1000
|
trusted library allocation
|
page read and write
|
||
A7FC000
|
heap
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
B006000
|
heap
|
page read and write
|
||
343B000
|
stack
|
page read and write
|
||
AA12000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page execute and read and write
|
||
A9FE000
|
heap
|
page read and write
|
||
77F000
|
heap
|
page read and write
|
||
7FF5ED9C8000
|
unkown
|
page readonly
|
||
31E6000
|
trusted library allocation
|
page read and write
|
||
7FF5ED602000
|
unkown
|
page readonly
|
||
A51A000
|
heap
|
page read and write
|
||
9885000
|
unkown
|
page read and write
|
||
7FF5ED7FD000
|
unkown
|
page readonly
|
||
2EB5000
|
trusted library allocation
|
page read and write
|
||
35BB000
|
trusted library allocation
|
page read and write
|
||
A6A0000
|
heap
|
page read and write
|
||
2406000
|
trusted library allocation
|
page read and write
|
||
A361000
|
unkown
|
page read and write
|
||
4265000
|
trusted library allocation
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
A3CF000
|
heap
|
page read and write
|
||
87BA000
|
stack
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
7FF5ED937000
|
unkown
|
page readonly
|
||
A6F8000
|
heap
|
page read and write
|
||
10B3000
|
trusted library allocation
|
page execute and read and write
|
||
A697000
|
heap
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
7F2E000
|
stack
|
page read and write
|
||
2345000
|
trusted library allocation
|
page execute and read and write
|
||
A3FB000
|
heap
|
page read and write
|
||
14B1000
|
trusted library allocation
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
112B000
|
heap
|
page read and write
|
||
2EC6000
|
trusted library allocation
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
9C000
|
stack
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
111F000
|
heap
|
page read and write
|
||
3631000
|
heap
|
page read and write
|
||
23ED000
|
stack
|
page read and write
|
||
A791000
|
heap
|
page read and write
|
||
923E000
|
stack
|
page read and write
|
||
A40C000
|
heap
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
7FF5ED750000
|
unkown
|
page readonly
|
||
11B4000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
3549000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
1096000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
||
35A3000
|
trusted library allocation
|
page read and write
|
||
A3EC000
|
heap
|
page read and write
|
||
A56D000
|
heap
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
AAD1000
|
unkown
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
7FF5ED40D000
|
unkown
|
page readonly
|
||
1121000
|
heap
|
page read and write
|
||
A3D5000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
A8AF000
|
heap
|
page read and write
|
||
355C000
|
trusted library allocation
|
page read and write
|
||
2330000
|
trusted library allocation
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
A125000
|
heap
|
page read and write
|
||
7FF5ED3D0000
|
unkown
|
page readonly
|
||
5E22000
|
unkown
|
page readonly
|
||
3140000
|
unkown
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
25A1000
|
trusted library allocation
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
A11F000
|
stack
|
page read and write
|
||
815000
|
heap
|
page read and write
|
||
A629000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
1462000
|
trusted library allocation
|
page read and write
|
||
A959000
|
heap
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
F03000
|
trusted library allocation
|
page execute and read and write
|
||
117B000
|
heap
|
page read and write
|
||
C507000
|
unkown
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
7FF5EDA14000
|
unkown
|
page readonly
|
||
12B1000
|
heap
|
page read and write
|
||
A4A6000
|
heap
|
page read and write
|
||
AA49000
|
heap
|
page read and write
|
||
411000
|
unkown
|
page execute read
|
||
4B8B000
|
unkown
|
page read and write
|
||
A6D2000
|
heap
|
page read and write
|
||
282F000
|
heap
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
3579000
|
trusted library allocation
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
3551000
|
trusted library allocation
|
page read and write
|
||
3590000
|
unkown
|
page read and write
|
||
3559000
|
trusted library allocation
|
page read and write
|
||
A411000
|
heap
|
page read and write
|
||
2D04000
|
trusted library allocation
|
page read and write
|
||
56C3000
|
trusted library allocation
|
page read and write
|
||
9B3000
|
heap
|
page read and write
|
||
7FF5ED5C9000
|
unkown
|
page readonly
|
||
9873000
|
unkown
|
page read and write
|
||
F45F000
|
unkown
|
page read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
FC04000
|
unkown
|
page read and write
|
||
7FF5ED9CC000
|
unkown
|
page readonly
|
||
2471000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9FF000
|
unkown
|
page readonly
|
||
1138000
|
heap
|
page read and write
|
||
354D000
|
trusted library allocation
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
5665000
|
trusted library allocation
|
page read and write
|
||
AFD3000
|
heap
|
page read and write
|
||
7FF5ED5C5000
|
unkown
|
page readonly
|
||
11B4000
|
heap
|
page read and write
|
||
2320000
|
trusted library allocation
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
3568000
|
trusted library allocation
|
page read and write
|
||
4C18000
|
unkown
|
page read and write
|
||
C893000
|
unkown
|
page read and write
|
||
F950000
|
unkown
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
8F7000
|
heap
|
page read and write
|
||
3140000
|
unkown
|
page read and write
|
||
1239000
|
heap
|
page read and write
|
||
3536000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
trusted library allocation
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
4C60000
|
unkown
|
page read and write
|
||
7FF5ED42B000
|
unkown
|
page readonly
|
||
356B000
|
trusted library allocation
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
A5D000
|
stack
|
page read and write
|
||
785D000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
13C0000
|
unkown
|
page read and write
|
||
C544000
|
unkown
|
page read and write
|
||
5643000
|
trusted library allocation
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
A90E000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
2E79000
|
trusted library allocation
|
page read and write
|
||
9B7000
|
heap
|
page read and write
|
||
7FF5ED3DA000
|
unkown
|
page readonly
|
||
99A000
|
heap
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
10F7000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
A991000
|
heap
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
7FF5ED74A000
|
unkown
|
page readonly
|
||
A1C1000
|
heap
|
page read and write
|
||
A372000
|
heap
|
page read and write
|
||
354D000
|
trusted library allocation
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
A3ED000
|
heap
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
2930000
|
heap
|
page execute and read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
A3E9000
|
heap
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
7FF5ED9A1000
|
unkown
|
page readonly
|
||
B004000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
7FF5ED814000
|
unkown
|
page readonly
|
||
BD98000
|
stack
|
page read and write
|
||
169F000
|
stack
|
page read and write
|
||
2EDD000
|
trusted library allocation
|
page execute and read and write
|
||
8D6D000
|
stack
|
page read and write
|
||
A61E000
|
heap
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
A0E2000
|
heap
|
page read and write
|
||
1702000
|
trusted library allocation
|
page read and write
|
||
A3F8000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
7FF5EDA53000
|
unkown
|
page readonly
|
||
2336000
|
trusted library allocation
|
page execute and read and write
|
||
150F000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
F95E000
|
unkown
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
2742000
|
heap
|
page read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
A8FC000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
535D000
|
stack
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
358E000
|
trusted library allocation
|
page read and write
|
||
3E31000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
3450000
|
unkown
|
page read and write
|
||
3542000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
trusted library allocation
|
page execute and read and write
|
||
5565000
|
trusted library allocation
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
A502000
|
unkown
|
page read and write
|
||
9877000
|
unkown
|
page read and write
|
||
A31C000
|
heap
|
page read and write
|
||
3589000
|
trusted library allocation
|
page read and write
|
||
7FF5ED781000
|
unkown
|
page readonly
|
||
F957000
|
unkown
|
page read and write
|
||
A8EB000
|
heap
|
page read and write
|
||
33A1000
|
trusted library allocation
|
page read and write
|
||
3200000
|
unkown
|
page read and write
|
||
B140000
|
unkown
|
page readonly
|
||
E18000
|
heap
|
page read and write
|
||
33B5000
|
trusted library allocation
|
page read and write
|
||
A978000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
8C70000
|
unkown
|
page read and write
|
||
A73B000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
7FF5ED97A000
|
unkown
|
page readonly
|
||
108D000
|
stack
|
page read and write
|
||
A4DE000
|
heap
|
page read and write
|
||
16A6000
|
trusted library allocation
|
page execute and read and write
|
||
785F000
|
unkown
|
page read and write
|
||
F04000
|
trusted library allocation
|
page read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
320D000
|
trusted library allocation
|
page read and write
|
||
7FF5ED286000
|
unkown
|
page readonly
|
||
63C7000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
7FF5ED519000
|
unkown
|
page readonly
|
||
11A5000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
585000
|
heap
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
A3E4000
|
heap
|
page read and write
|
||
5C3E000
|
stack
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
2E66000
|
trusted library allocation
|
page read and write
|
||
7FF5ED7DB000
|
unkown
|
page readonly
|
||
11A6000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
7FF5ED5A8000
|
unkown
|
page readonly
|
||
6737000
|
unkown
|
page readonly
|
||
10FA000
|
trusted library allocation
|
page execute and read and write
|
||
1710000
|
heap
|
page read and write
|
||
A3C1000
|
heap
|
page read and write
|
||
F95000
|
heap
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
7FF5ED91A000
|
unkown
|
page readonly
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
3548000
|
trusted library allocation
|
page read and write
|
||
1208000
|
heap
|
page read and write
|
||
12BD000
|
heap
|
page read and write
|
||
1101000
|
heap
|
page read and write
|
||
22DF000
|
stack
|
page read and write
|
||
A4A1000
|
unkown
|
page read and write
|
||
6548000
|
unkown
|
page readonly
|
||
2EF6000
|
trusted library allocation
|
page execute and read and write
|
||
F7D2000
|
unkown
|
page read and write
|
||
7FF5ED4C6000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
118F000
|
stack
|
page read and write
|
||
A7D7000
|
heap
|
page read and write
|
||
1198000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
3572000
|
trusted library allocation
|
page read and write
|
||
A37B000
|
unkown
|
page read and write
|
||
7FF5ED9C6000
|
unkown
|
page readonly
|
||
41B000
|
unkown
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
A484000
|
heap
|
page read and write
|
||
1408000
|
heap
|
page read and write
|
||
11E1000
|
unkown
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
A606000
|
heap
|
page read and write
|
||
AA1F000
|
heap
|
page read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
C54A000
|
unkown
|
page read and write
|
||
3450000
|
unkown
|
page read and write
|
||
3240000
|
trusted library allocation
|
page read and write
|
||
A6B7000
|
heap
|
page read and write
|
||
5840000
|
heap
|
page execute and read and write
|
||
A8B8000
|
heap
|
page read and write
|
||
2C17000
|
trusted library allocation
|
page execute and read and write
|
||
59D0000
|
unkown
|
page readonly
|
||
460000
|
heap
|
page read and write
|
||
7FF5EDA08000
|
unkown
|
page readonly
|
||
153C000
|
heap
|
page read and write
|
||
F914000
|
unkown
|
page read and write
|
||
A33E000
|
unkown
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
2EDE000
|
trusted library allocation
|
page read and write
|
||
3598000
|
trusted library allocation
|
page read and write
|
||
C6C9000
|
unkown
|
page read and write
|
||
13E0000
|
unkown
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
A4CA000
|
heap
|
page read and write
|
||
51C2000
|
unkown
|
page readonly
|
||
53E000
|
heap
|
page read and write
|
||
7FF5EDA0D000
|
unkown
|
page readonly
|
||
A618000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
4401000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
7869000
|
unkown
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
3D92000
|
trusted library allocation
|
page read and write
|
||
B650000
|
unkown
|
page read and write
|
||
8108000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
10CD000
|
trusted library allocation
|
page execute and read and write
|
||
356D000
|
trusted library allocation
|
page read and write
|
||
76C0000
|
unkown
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
F45F000
|
unkown
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
7FF5ED534000
|
unkown
|
page readonly
|
||
422000
|
unkown
|
page read and write
|
||
7953000
|
unkown
|
page read and write
|
||
A7DB000
|
heap
|
page read and write
|
||
28CA000
|
heap
|
page read and write
|
||
247D000
|
trusted library allocation
|
page read and write
|
||
28CE000
|
heap
|
page read and write
|
||
D57000
|
heap
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
1148000
|
heap
|
page read and write
|
||
A57F000
|
heap
|
page read and write
|
||
A57D000
|
heap
|
page read and write
|
||
7CA0000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
C51E000
|
unkown
|
page read and write
|
||
E09000
|
heap
|
page read and write
|
||
C503000
|
unkown
|
page read and write
|
||
6552000
|
unkown
|
page readonly
|
||
A96B000
|
heap
|
page read and write
|
||
A416000
|
heap
|
page read and write
|
||
2BE4000
|
trusted library allocation
|
page read and write
|
||
1121000
|
heap
|
page read and write
|
||
3140000
|
unkown
|
page read and write
|
||
370A000
|
trusted library allocation
|
page read and write
|
||
A4E4000
|
heap
|
page read and write
|
||
2476000
|
trusted library allocation
|
page read and write
|
||
A4AB000
|
unkown
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
DE0000
|
unkown
|
page readonly
|
||
7FF5ED9E1000
|
unkown
|
page readonly
|
||
7FF5EDA69000
|
unkown
|
page readonly
|
||
A69E000
|
heap
|
page read and write
|
||
37F2000
|
unkown
|
page read and write
|
||
2794000
|
heap
|
page read and write
|
||
FC1E000
|
unkown
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
9070000
|
unkown
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
489000
|
unkown
|
page readonly
|
||
C92D000
|
unkown
|
page read and write
|
There are 3170 hidden memdumps, click here to show them.