Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
LXbM8RbhLa.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\huge[1].dat
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\A50C.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\C9EB.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\EDA0.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nsd7951.tmp\liteFirewall.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsyC940.tmp\blowfish.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Del.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\ervhhuc
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\ervhhuc:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nskBC1.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nstC920.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsyC940.tmp\INetC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsyC940.tmp\nsProcess.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\start.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
|
MSVC program database ver 7.00, 512*4023 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
There are 106 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\LXbM8RbhLa.exe
|
"C:\Users\user\Desktop\LXbM8RbhLa.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Users\user\AppData\Roaming\ervhhuc
|
C:\Users\user\AppData\Roaming\ervhhuc
|
||
C:\Users\user\AppData\Local\Temp\A50C.exe
|
C:\Users\user\AppData\Local\Temp\A50C.exe
|
||
C:\Users\user\AppData\Local\Temp\C9EB.exe
|
C:\Users\user\AppData\Local\Temp\C9EB.exe
|
||
C:\Users\user\AppData\Local\Temp\EDA0.exe
|
C:\Users\user\AppData\Local\Temp\EDA0.exe
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
"C:\Users\user\AppData\Local\Temp\setup.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0
(Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --lang=en-US
--user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3116 --field-trial-handle=3128,i,16564650160723935827,11428467048589295655,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US
--service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36
(KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3396 --field-trial-handle=3128,i,16564650160723935827,11428467048589295655,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36
(KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3808 --field-trial-handle=3128,i,16564650160723935827,11428467048589295655,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux;
Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1
--num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719978473683865
--launch-time-ticks=7845153143 --mojo-platform-channel-handle=3856 --field-trial-handle=3128,i,16564650160723935827,11428467048589295655,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux;
Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2
--enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719978473683865 --launch-time-ticks=7845163762
--mojo-platform-channel-handle=3892 --field-trial-handle=3128,i,16564650160723935827,11428467048589295655,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
There are 25 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://gebeus.ru/tmp/index.php
|
|||
http://cx5519.com/tmp/index.php
|
|||
contintnetksows.shop
|
|||
http://evilos.cc/tmp/index.php
|
|||
ellaboratepwsz.xyz
|
|||
swellfrrgwwos.xyz
|
|||
foodypannyjsud.shop
|
|||
pedestriankodwu.xyz
|
|||
towerxxuytwi.xyz
|
|||
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://foodypannyjsud.shop/s
|
unknown
|
||
https://chrome.google.com/webstore?hl=mr&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://foodypannyjsud.shop/w
|
unknown
|
||
https://support.google.com/chrome/answer/6098869
|
unknown
|
||
http://xiexie.wf/22_551/huge.dat(
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
|
unknown
|
||
https://chrome.google.com/webstore?hl=et&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chrome.google.com/webstore?hl=etCtrl$1
|
unknown
|
||
https://excel.office.com
|
unknown
|
||
https://chrome.google.com/webstore?hl=urCtrl$2
|
unknown
|
||
https://foodypannyjsud.shop/m
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://foodypannyjsud.shop/piw
|
unknown
|
||
https://chrome.google.com/webstore?hl=ltCtrl$1
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
|
unknown
|
||
https://passwords.google.com
|
unknown
|
||
https://aui-cdn.atlassian.com/
|
unknown
|
||
http://www.iana.org/assignments/multicast-addresses
|
unknown
|
||
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
|
unknown
|
||
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
|
unknown
|
||
https://foodypannyjsud.shop/E
|
unknown
|
||
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://bageyou.xyz
|
unknown
|
||
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://bitbucket.org/
|
unknown
|
||
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
http://www.connectionstrings.com/
|
unknown
|
||
https://support.google.com/chromebook?p=app_intent
|
unknown
|
||
https://foodypannyjsud.shop/6
|
unknown
|
||
https://foodypannyjsud.shop/p9
|
unknown
|
||
https://foodypannyjsud.shop/apix
|
unknown
|
||
https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://foodypannyjsud.shop/ob
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://chrome.google.com/webstore?hl=mrCtrl$1
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html&
|
unknown
|
||
http://logging.apache.org/log4j
|
unknown
|
||
https://chrome.google.com/webstore?hl=lt&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlT&r
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://xiexie.wf/22_551/huge.dat
|
unknown
|
||
https://outlook.com
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://foodypannyjsud.shop/bmN
|
unknown
|
||
https://foodypannyjsud.shop/.
|
unknown
|
||
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlA&biHaldab
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chrome.google.com/webstore?hl=ukCtrl$1
|
unknown
|
||
https://android.notify.windows.com/iOS
|
unknown
|
||
http://api.install-stat.debug.world/clients/installs
|
unknown
|
||
https://cdn.cookielaw.org/
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://support.google.com/chrome/a/answer/9122284
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
|
unknown
|
||
https://foodypannyjsud.shop/fe
|
unknown
|
||
https://foodypannyjsud.shop/..
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-CNCtrl$1
|
unknown
|
||
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
|
unknown
|
||
https://word.office.comon
|
unknown
|
||
http://www.unicode.org/copyright.html
|
unknown
|
||
https://powerpoint.office.comcember
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlP&agalbaTvarko
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://bageyou.xyz/c/g
|
unknown
|
||
http://schemas.micro
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-TWCtrl$1
|
unknown
|
||
http://www.apache.org/).
|
unknown
|
||
https://foodypannyjsud.shop/api
|
unknown
|
||
https://myactivity.google.com/
|
unknown
|
||
https://foodypannyjsud.shop/ox
|
unknown
|
||
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
141.8.192.126
|
unknown
|
Russian Federation
|
||
188.114.96.3
|
unknown
|
European Union
|
||
185.68.16.7
|
unknown
|
Ukraine
|
||
127.0.0.127
|
unknown
|
unknown
|
||
201.110.238.249
|
unknown
|
Mexico
|
||
146.70.169.164
|
unknown
|
United Kingdom
|
||
1.1.1.1
|
unknown
|
Australia
|
||
104.192.141.1
|
unknown
|
United States
|
||
104.21.45.251
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000090026
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000604E2
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Sid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Pid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GamePall
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
|
DontShowUI
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
tmp_uid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
reg
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
uid
|
||
HKEY_CURRENT_USER\Control Panel\Cursors
|
AppStarting
|
There are 205 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3210000
|
direct allocation
|
page execute and read and write
|
||
4391000
|
unclassified section
|
page read and write
|
||
4350000
|
direct allocation
|
page read and write
|
||
A27000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
4491000
|
unclassified section
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
11E4000
|
trusted library allocation
|
page read and write
|
||
9CB4000
|
heap
|
page read and write
|
||
A0CC000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
154B000
|
heap
|
page read and write
|
||
1EE0000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
3380000
|
unkown
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
C625000
|
unkown
|
page read and write
|
||
A167000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
38DB000
|
trusted library allocation
|
page read and write
|
||
1039000
|
heap
|
page read and write
|
||
29DC000
|
heap
|
page execute and read and write
|
||
5890000
|
heap
|
page execute and read and write
|
||
9C89000
|
heap
|
page read and write
|
||
9BBB000
|
heap
|
page read and write
|
||
55C000
|
heap
|
page read and write
|
||
38D1000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
A14B000
|
heap
|
page read and write
|
||
1459000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
9CB9000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
2A2A000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
7FF5D75FF000
|
unkown
|
page readonly
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
A410000
|
heap
|
page read and write
|
||
1455000
|
heap
|
page read and write
|
||
C11000
|
trusted library allocation
|
page read and write
|
||
55F5000
|
trusted library allocation
|
page read and write
|
||
7FF5D716B000
|
unkown
|
page readonly
|
||
2730000
|
heap
|
page read and write
|
||
27A7000
|
trusted library allocation
|
page read and write
|
||
B0BD000
|
stack
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
1434000
|
trusted library allocation
|
page read and write
|
||
9CB6000
|
heap
|
page read and write
|
||
F78000
|
heap
|
page read and write
|
||
38F0000
|
trusted library allocation
|
page read and write
|
||
1504000
|
trusted library allocation
|
page read and write
|
||
38A1000
|
trusted library allocation
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
145C000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
7FF5D71E6000
|
unkown
|
page readonly
|
||
5E7000
|
heap
|
page read and write
|
||
38CA000
|
trusted library allocation
|
page read and write
|
||
A081000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
38D1000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
C4E000
|
heap
|
page read and write
|
||
A0DD000
|
heap
|
page read and write
|
||
112B2000
|
unkown
|
page read and write
|
||
4AB0000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
1453000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
38DA000
|
trusted library allocation
|
page read and write
|
||
A650000
|
heap
|
page read and write
|
||
390000
|
unkown
|
page readonly
|
||
8E4E000
|
stack
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
38B8000
|
trusted library allocation
|
page read and write
|
||
FF8000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
A613000
|
heap
|
page read and write
|
||
7FF5D7760000
|
unkown
|
page readonly
|
||
485000
|
heap
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
107B000
|
stack
|
page read and write
|
||
3331000
|
unkown
|
page read and write
|
||
A4DD000
|
heap
|
page read and write
|
||
5175000
|
trusted library allocation
|
page read and write
|
||
1027000
|
heap
|
page read and write
|
||
4E26000
|
trusted library allocation
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
9F83000
|
heap
|
page read and write
|
||
1360000
|
trusted library allocation
|
page read and write
|
||
112B7000
|
unkown
|
page read and write
|
||
215E000
|
stack
|
page read and write
|
||
A0AF000
|
heap
|
page read and write
|
||
7FF5D71AF000
|
unkown
|
page readonly
|
||
271E000
|
stack
|
page read and write
|
||
9CA8000
|
heap
|
page read and write
|
||
9AF9000
|
unkown
|
page read and write
|
||
9B91000
|
unkown
|
page read and write
|
||
A5E2000
|
heap
|
page read and write
|
||
43B0000
|
heap
|
page read and write
|
||
A589000
|
heap
|
page read and write
|
||
1453000
|
heap
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
7DF4F2480000
|
unkown
|
page readonly
|
||
9B80000
|
heap
|
page read and write
|
||
98FA000
|
heap
|
page read and write
|
||
9F04000
|
heap
|
page read and write
|
||
98CF000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
A4A2000
|
heap
|
page read and write
|
||
9B2C000
|
unkown
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
9D95000
|
heap
|
page read and write
|
||
13AE000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
9C69000
|
heap
|
page read and write
|
||
13D5000
|
heap
|
page read and write
|
||
1376000
|
heap
|
page read and write
|
||
7FF5D72FB000
|
unkown
|
page readonly
|
||
38D7000
|
trusted library allocation
|
page read and write
|
||
9C80000
|
heap
|
page read and write
|
||
3024000
|
trusted library allocation
|
page read and write
|
||
AA0A000
|
unkown
|
page read and write
|
||
5551000
|
trusted library allocation
|
page read and write
|
||
2EA1000
|
unkown
|
page read and write
|
||
144E000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
A71A000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
50CA000
|
trusted library allocation
|
page read and write
|
||
38F7000
|
trusted library allocation
|
page read and write
|
||
9C4F000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
7611000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
C609000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
3380000
|
unkown
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
2DB5000
|
trusted library allocation
|
page read and write
|
||
143D000
|
heap
|
page read and write
|
||
391D000
|
trusted library allocation
|
page read and write
|
||
FBF000
|
stack
|
page read and write
|
||
35D5000
|
unkown
|
page read and write
|
||
9CB0000
|
heap
|
page read and write
|
||
5047000
|
trusted library allocation
|
page read and write
|
||
7440000
|
unkown
|
page read and write
|
||
143A000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
9ABD000
|
unkown
|
page read and write
|
||
38D1000
|
trusted library allocation
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
13A9000
|
heap
|
page read and write
|
||
98E5000
|
heap
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
A62F000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
7DF4F2461000
|
unkown
|
page execute read
|
||
10CF000
|
stack
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
524F000
|
stack
|
page read and write
|
||
9911000
|
heap
|
page read and write
|
||
A310000
|
heap
|
page read and write
|
||
B7DC000
|
stack
|
page read and write
|
||
A55E000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
AE1D000
|
stack
|
page read and write
|
||
2951000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
820000
|
unkown
|
page readonly
|
||
1260000
|
unkown
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
A9FD000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D766E000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
7FF5D74FA000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5479000
|
unkown
|
page read and write
|
||
9DBB000
|
heap
|
page read and write
|
||
7FF5D769E000
|
unkown
|
page readonly
|
||
9CAA000
|
heap
|
page read and write
|
||
9CBE000
|
heap
|
page read and write
|
||
D28000
|
heap
|
page read and write
|
||
E77F000
|
unkown
|
page read and write
|
||
142F000
|
heap
|
page read and write
|
||
3380000
|
unkown
|
page read and write
|
||
35C1000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
142E000
|
heap
|
page read and write
|
||
4A12000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
9C58000
|
heap
|
page read and write
|
||
A1EF000
|
heap
|
page read and write
|
||
7FF5D75B3000
|
unkown
|
page readonly
|
||
9CB4000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
A206000
|
heap
|
page read and write
|
||
1760000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
unkown
|
page read and write
|
||
1432000
|
heap
|
page read and write
|
||
4DE000
|
stack
|
page read and write
|
||
15FE000
|
stack
|
page read and write
|
||
A4B1000
|
heap
|
page read and write
|
||
27A1000
|
trusted library allocation
|
page read and write
|
||
278B000
|
heap
|
page read and write
|
||
38F4000
|
trusted library allocation
|
page read and write
|
||
A35B000
|
heap
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
CBC000
|
heap
|
page read and write
|
||
275E000
|
heap
|
page read and write
|
||
9EC2000
|
heap
|
page read and write
|
||
A0AA000
|
stack
|
page read and write
|
||
98F8000
|
heap
|
page read and write
|
||
2E0D000
|
stack
|
page read and write
|
||
9CBB000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
4057000
|
trusted library allocation
|
page read and write
|
||
27D7000
|
trusted library allocation
|
page execute and read and write
|
||
1180000
|
unkown
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
A273000
|
unkown
|
page read and write
|
||
A291000
|
heap
|
page read and write
|
||
C61D000
|
unkown
|
page read and write
|
||
F86000
|
stack
|
page read and write
|
||
A128000
|
heap
|
page read and write
|
||
7FF5D71EA000
|
unkown
|
page readonly
|
||
87A0000
|
unkown
|
page read and write
|
||
1260000
|
unkown
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2C0E000
|
stack
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
5330000
|
unkown
|
page write copy
|
||
9C98000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
9DCD000
|
heap
|
page read and write
|
||
9279000
|
stack
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
7FF5D7360000
|
unkown
|
page readonly
|
||
11D0000
|
heap
|
page read and write
|
||
B97000
|
trusted library allocation
|
page execute and read and write
|
||
2AC4000
|
trusted library allocation
|
page read and write
|
||
7686000
|
unkown
|
page read and write
|
||
A649000
|
heap
|
page read and write
|
||
35C3000
|
unkown
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
7FF5D77B9000
|
unkown
|
page readonly
|
||
10F6000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
A1C0000
|
heap
|
page read and write
|
||
98C8000
|
heap
|
page read and write
|
||
A4F8000
|
heap
|
page read and write
|
||
143C000
|
heap
|
page read and write
|
||
2E32000
|
trusted library allocation
|
page read and write
|
||
3A03000
|
trusted library allocation
|
page read and write
|
||
77DB000
|
unkown
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
A9F000
|
heap
|
page read and write
|
||
DE6000
|
heap
|
page read and write
|
||
5161000
|
trusted library allocation
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
901000
|
unkown
|
page execute read
|
||
4E79000
|
trusted library allocation
|
page read and write
|
||
391E000
|
trusted library allocation
|
page read and write
|
||
98F0000
|
heap
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
4D93000
|
trusted library allocation
|
page read and write
|
||
8DCB000
|
stack
|
page read and write
|
||
3626000
|
unkown
|
page read and write
|
||
9A9E000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
38BA000
|
trusted library allocation
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
7DF4F2491000
|
unkown
|
page execute read
|
||
7FF5D779E000
|
unkown
|
page readonly
|
||
9CB2000
|
heap
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
273B000
|
heap
|
page read and write
|
||
A341000
|
heap
|
page read and write
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
990D000
|
heap
|
page read and write
|
||
A0FC000
|
heap
|
page read and write
|
||
7FF5D7280000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
50F000
|
heap
|
page read and write
|
||
A3C3000
|
unkown
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
A40D000
|
heap
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
9C98000
|
heap
|
page read and write
|
||
C663000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
5290000
|
heap
|
page execute and read and write
|
||
7FF5D7691000
|
unkown
|
page readonly
|
||
1425000
|
heap
|
page read and write
|
||
2E3C000
|
trusted library allocation
|
page read and write
|
||
A2D9000
|
heap
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
A2FA000
|
heap
|
page read and write
|
||
7FF5D76AF000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
C87000
|
heap
|
page read and write
|
||
A529000
|
heap
|
page read and write
|
||
7FF5D7075000
|
unkown
|
page readonly
|
||
38A3000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
13B5000
|
heap
|
page read and write
|
||
A139000
|
heap
|
page read and write
|
||
13FB000
|
heap
|
page read and write
|
||
5E1000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
A415000
|
heap
|
page read and write
|
||
A361000
|
heap
|
page read and write
|
||
3380000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
9918000
|
heap
|
page read and write
|
||
9CA0000
|
heap
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
A186000
|
heap
|
page read and write
|
||
1455000
|
heap
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
38D6000
|
trusted library allocation
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
7FF5D7837000
|
unkown
|
page readonly
|
||
1180000
|
unkown
|
page read and write
|
||
3A83000
|
trusted library allocation
|
page read and write
|
||
7FF5D7077000
|
unkown
|
page readonly
|
||
7FF5D778A000
|
unkown
|
page readonly
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
9C92000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
A12C000
|
heap
|
page read and write
|
||
13B4000
|
heap
|
page read and write
|
||
A699000
|
heap
|
page read and write
|
||
142A000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
7435000
|
stack
|
page read and write
|
||
9CBD000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
B8DB000
|
stack
|
page read and write
|
||
3380000
|
unkown
|
page read and write
|
||
7FF5D7482000
|
unkown
|
page readonly
|
||
118F000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
13CF000
|
heap
|
page read and write
|
||
7FF5D744E000
|
unkown
|
page readonly
|
||
5E7000
|
heap
|
page read and write
|
||
7FF5D7407000
|
unkown
|
page readonly
|
||
A3C3000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
A3CA000
|
heap
|
page read and write
|
||
38DB000
|
trusted library allocation
|
page read and write
|
||
7FF5D768B000
|
unkown
|
page readonly
|
||
2A4D000
|
stack
|
page read and write
|
||
1438000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
1245000
|
heap
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
98C4000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
1386000
|
trusted library allocation
|
page execute and read and write
|
||
9D8C000
|
heap
|
page read and write
|
||
38B8000
|
trusted library allocation
|
page read and write
|
||
9CAE000
|
heap
|
page read and write
|
||
A61A000
|
heap
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
9CC2000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
151D000
|
trusted library allocation
|
page execute and read and write
|
||
A64000
|
trusted library allocation
|
page read and write
|
||
9DB6000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
4980000
|
unkown
|
page read and write
|
||
2A1B000
|
trusted library allocation
|
page read and write
|
||
75FD000
|
unkown
|
page read and write
|
||
7FF5D732D000
|
unkown
|
page readonly
|
||
2DF5000
|
trusted library allocation
|
page read and write
|
||
A47A000
|
heap
|
page read and write
|
||
145A000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
A286000
|
unkown
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
4A40000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page readonly
|
||
144E000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
A075000
|
heap
|
page read and write
|
||
4D01000
|
trusted library allocation
|
page read and write
|
||
7FF5D73F5000
|
unkown
|
page readonly
|
||
A043000
|
heap
|
page read and write
|
||
13A0000
|
unkown
|
page readonly
|
||
87A0000
|
unkown
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
D3C000
|
heap
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
C5FD000
|
unkown
|
page read and write
|
||
2A28000
|
trusted library allocation
|
page read and write
|
||
7FF5D7593000
|
unkown
|
page readonly
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
A2E9000
|
heap
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
98C7000
|
heap
|
page read and write
|
||
7FF5D76F5000
|
unkown
|
page readonly
|
||
8B70000
|
unkown
|
page read and write
|
||
800000
|
unkown
|
page readonly
|
||
A5BA000
|
heap
|
page read and write
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
9CAE000
|
heap
|
page read and write
|
||
1353000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
550000
|
heap
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
28E7000
|
trusted library allocation
|
page execute and read and write
|
||
4380000
|
heap
|
page read and write
|
||
3120000
|
unkown
|
page read and write
|
||
9BD1000
|
heap
|
page read and write
|
||
9CAC000
|
heap
|
page read and write
|
||
28E5000
|
trusted library allocation
|
page read and write
|
||
E77B000
|
unkown
|
page read and write
|
||
A56C000
|
heap
|
page read and write
|
||
9D71000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
B0E0000
|
unkown
|
page readonly
|
||
A671000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
C450000
|
unkown
|
page read and write
|
||
A162000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
38E0000
|
trusted library allocation
|
page read and write
|
||
7D3E000
|
stack
|
page read and write
|
||
A607000
|
heap
|
page read and write
|
||
A0D2000
|
heap
|
page read and write
|
||
3959000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
2A5F000
|
stack
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
10674000
|
unkown
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
9B89000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
2DDE000
|
trusted library allocation
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
9BB7000
|
heap
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
143D000
|
trusted library allocation
|
page execute and read and write
|
||
1200000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
7FF5D75BF000
|
unkown
|
page readonly
|
||
A351000
|
heap
|
page read and write
|
||
9CA9000
|
heap
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
1436000
|
heap
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
2DC6000
|
trusted library allocation
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
C5F0000
|
unkown
|
page read and write
|
||
7FF5D771A000
|
unkown
|
page readonly
|
||
9C94000
|
heap
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
7C90000
|
unkown
|
page read and write
|
||
A65E000
|
heap
|
page read and write
|
||
A40E000
|
unkown
|
page read and write
|
||
9DC7000
|
heap
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
9C89000
|
heap
|
page read and write
|
||
9CB0000
|
heap
|
page read and write
|
||
38E7000
|
trusted library allocation
|
page read and write
|
||
5591000
|
trusted library allocation
|
page read and write
|
||
E37000
|
trusted library allocation
|
page execute and read and write
|
||
1180000
|
unkown
|
page read and write
|
||
7DF4F2470000
|
unkown
|
page readonly
|
||
7FF5D705D000
|
unkown
|
page readonly
|
||
A0E9000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
5536000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
38E9000
|
trusted library allocation
|
page read and write
|
||
7FF5D7523000
|
unkown
|
page readonly
|
||
2EB7000
|
trusted library allocation
|
page read and write
|
||
A218000
|
heap
|
page read and write
|
||
AA01000
|
unkown
|
page read and write
|
||
27A3000
|
trusted library allocation
|
page execute and read and write
|
||
391C000
|
trusted library allocation
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
7FF5D6BE4000
|
unkown
|
page readonly
|
||
27F0000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
B54000
|
trusted library allocation
|
page read and write
|
||
B4D0000
|
unkown
|
page readonly
|
||
5E7000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
39CB000
|
trusted library allocation
|
page read and write
|
||
A4B4000
|
heap
|
page read and write
|
||
38C4000
|
trusted library allocation
|
page read and write
|
||
9A90000
|
unkown
|
page read and write
|
||
1437000
|
heap
|
page read and write
|
||
A66A000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
25EE000
|
stack
|
page read and write
|
||
A591000
|
heap
|
page read and write
|
||
38E7000
|
trusted library allocation
|
page read and write
|
||
A475000
|
heap
|
page read and write
|
||
A0C0000
|
heap
|
page read and write
|
||
4D22000
|
trusted library allocation
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
5870000
|
heap
|
page execute and read and write
|
||
A396000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
7FF5D77F7000
|
unkown
|
page readonly
|
||
13D0000
|
heap
|
page read and write
|
||
3901000
|
trusted library allocation
|
page read and write
|
||
A605000
|
heap
|
page read and write
|
||
A1C5000
|
heap
|
page read and write
|
||
272D000
|
stack
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
13AE000
|
heap
|
page read and write
|
||
E772000
|
unkown
|
page read and write
|
||
38FE000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
98D1000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
13F1000
|
heap
|
page read and write
|
||
38D6000
|
trusted library allocation
|
page read and write
|
||
7FF5D72C8000
|
unkown
|
page readonly
|
||
1107000
|
trusted library allocation
|
page execute and read and write
|
||
A1E8000
|
heap
|
page read and write
|
||
7FF5D7404000
|
unkown
|
page readonly
|
||
145A000
|
trusted library allocation
|
page execute and read and write
|
||
5EE000
|
heap
|
page read and write
|
||
C78A000
|
unkown
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
A586000
|
heap
|
page read and write
|
||
9CCC000
|
heap
|
page read and write
|
||
98C6000
|
heap
|
page read and write
|
||
9C89000
|
heap
|
page read and write
|
||
5B5E000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
13E1000
|
heap
|
page read and write
|
||
9CA5000
|
heap
|
page read and write
|
||
7FF5D723F000
|
unkown
|
page readonly
|
||
142E000
|
heap
|
page read and write
|
||
7AF1000
|
unkown
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
7FF5D7740000
|
unkown
|
page readonly
|
||
E774000
|
unkown
|
page read and write
|
||
C1CC000
|
stack
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
900000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
E771000
|
unkown
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
A2BA000
|
heap
|
page read and write
|
||
10FCF000
|
unkown
|
page read and write
|
||
98CC000
|
heap
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
9CBD000
|
heap
|
page read and write
|
||
A2B5000
|
unkown
|
page read and write
|
||
89CA000
|
unkown
|
page read and write
|
||
9908000
|
heap
|
page read and write
|
||
7DF4F2460000
|
unkown
|
page readonly
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
7FF5D6ABD000
|
unkown
|
page readonly
|
||
98C000
|
unkown
|
page readonly
|
||
3CB0000
|
heap
|
page read and write
|
||
A523000
|
heap
|
page read and write
|
||
9C97000
|
heap
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
11CD000
|
trusted library allocation
|
page execute and read and write
|
||
8900000
|
unkown
|
page read and write
|
||
9CBE000
|
heap
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
C44F000
|
stack
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
13AE000
|
heap
|
page read and write
|
||
1437000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
362D000
|
unkown
|
page read and write
|
||
4391000
|
heap
|
page read and write
|
||
143A000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
1782000
|
trusted library allocation
|
page read and write
|
||
29CA000
|
heap
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
7FF5D720F000
|
unkown
|
page readonly
|
||
A4EB000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
7C80000
|
unkown
|
page read and write
|
||
C7C6000
|
unkown
|
page read and write
|
||
A28D000
|
heap
|
page read and write
|
||
C605000
|
unkown
|
page read and write
|
||
A3F4000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
89BC000
|
stack
|
page read and write
|
||
A8C000
|
heap
|
page read and write
|
||
9BC1000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
3051000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
2DCB000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
9D9D000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
4986000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
7654000
|
unkown
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
7FF5D76CD000
|
unkown
|
page readonly
|
||
A3EA000
|
heap
|
page read and write
|
||
5034000
|
trusted library allocation
|
page read and write
|
||
38A1000
|
trusted library allocation
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
7FF5D75DF000
|
unkown
|
page readonly
|
||
E778000
|
unkown
|
page read and write
|
||
A5AE000
|
heap
|
page read and write
|
||
38B9000
|
trusted library allocation
|
page read and write
|
||
3015000
|
trusted library allocation
|
page read and write
|
||
A551000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
1621000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
112BE000
|
unkown
|
page read and write
|
||
A32000
|
heap
|
page read and write
|
||
38A7000
|
trusted library allocation
|
page read and write
|
||
A177000
|
heap
|
page read and write
|
||
106FB000
|
unkown
|
page read and write
|
||
9C89000
|
heap
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
9D67000
|
unkown
|
page read and write
|
||
7E60000
|
unkown
|
page read and write
|
||
A034000
|
heap
|
page read and write
|
||
BB10000
|
heap
|
page read and write
|
||
DA7000
|
heap
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
9CB1000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
3D5C000
|
trusted library allocation
|
page read and write
|
||
D3F000
|
stack
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
A3FD000
|
heap
|
page read and write
|
||
A416000
|
unkown
|
page read and write
|
||
9C8F000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
C615000
|
unkown
|
page read and write
|
||
13CF000
|
heap
|
page read and write
|
||
3380000
|
unkown
|
page read and write
|
||
137E000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
98A000
|
unkown
|
page write copy
|
||
1180000
|
unkown
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
A494000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
122B000
|
heap
|
page read and write
|
||
843F000
|
stack
|
page read and write
|
||
7FF5D69BB000
|
unkown
|
page readonly
|
||
7FF5D77DD000
|
unkown
|
page readonly
|
||
38A2000
|
trusted library allocation
|
page read and write
|
||
7FF5D7425000
|
unkown
|
page readonly
|
||
E77D000
|
unkown
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
2EBF000
|
trusted library allocation
|
page read and write
|
||
A691000
|
heap
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page execute and read and write
|
||
A3D7000
|
heap
|
page read and write
|
||
A0E2000
|
heap
|
page read and write
|
||
A233000
|
unkown
|
page read and write
|
||
1455000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
7FF5D77A4000
|
unkown
|
page readonly
|
||
2A36000
|
trusted library allocation
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
A565000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
50F000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
3959000
|
trusted library allocation
|
page read and write
|
||
29CE000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
41B000
|
unkown
|
page read and write
|
||
2AB5000
|
trusted library allocation
|
page read and write
|
||
9CD7000
|
heap
|
page read and write
|
||
9CB6000
|
heap
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
1057000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
979000
|
unkown
|
page readonly
|
||
29B0000
|
trusted library allocation
|
page execute and read and write
|
||
B53000
|
trusted library allocation
|
page execute and read and write
|
||
1383000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
28E5000
|
trusted library allocation
|
page execute and read and write
|
||
9C96000
|
heap
|
page read and write
|
||
298C000
|
stack
|
page read and write
|
||
7B00000
|
unkown
|
page readonly
|
||
1437000
|
heap
|
page read and write
|
||
11DF000
|
unkown
|
page read and write
|
||
27CA000
|
trusted library allocation
|
page execute and read and write
|
||
38D9000
|
trusted library allocation
|
page read and write
|
||
E97000
|
heap
|
page read and write
|
||
38DE000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
E77E000
|
unkown
|
page read and write
|
||
75E0000
|
unkown
|
page read and write
|
||
38E9000
|
trusted library allocation
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
9CB8000
|
heap
|
page read and write
|
||
3CC2000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
AAC3000
|
heap
|
page read and write
|
||
30C0000
|
remote allocation
|
page read and write
|
||
38BA000
|
trusted library allocation
|
page read and write
|
||
98D8000
|
heap
|
page read and write
|
||
7460000
|
unkown
|
page read and write
|
||
7FF5D7797000
|
unkown
|
page readonly
|
||
98D4000
|
heap
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
7FF5D7284000
|
unkown
|
page readonly
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
A620000
|
heap
|
page read and write
|
||
2A16000
|
trusted library allocation
|
page read and write
|
||
9FD000
|
heap
|
page read and write
|
||
9BAD000
|
unkown
|
page read and write
|
||
9B88000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
A6D000
|
trusted library allocation
|
page execute and read and write
|
||
9FAF000
|
stack
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
7B60000
|
unkown
|
page readonly
|
||
1180000
|
unkown
|
page read and write
|
||
27BD000
|
trusted library allocation
|
page execute and read and write
|
||
A072000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
9C88000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
7FF5D75AF000
|
unkown
|
page readonly
|
||
A5B7000
|
heap
|
page read and write
|
||
D7D000
|
stack
|
page read and write
|
||
5557000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
1235000
|
heap
|
page read and write
|
||
1340000
|
unkown
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
38F5000
|
trusted library allocation
|
page read and write
|
||
1075000
|
heap
|
page read and write
|
||
C61B000
|
unkown
|
page read and write
|
||
15F7000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
7FF5D7792000
|
unkown
|
page readonly
|
||
1592000
|
trusted library allocation
|
page read and write
|
||
A156000
|
heap
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
BEA0000
|
unkown
|
page readonly
|
||
9A76000
|
unkown
|
page read and write
|
||
1453000
|
heap
|
page read and write
|
||
C800000
|
unkown
|
page read and write
|
||
9A92000
|
unkown
|
page read and write
|
||
38AD000
|
trusted library allocation
|
page read and write
|
||
C035000
|
stack
|
page read and write
|
||
1532000
|
trusted library allocation
|
page read and write
|
||
1F3E000
|
stack
|
page read and write
|
||
5265000
|
trusted library allocation
|
page read and write
|
||
38E0000
|
trusted library allocation
|
page read and write
|
||
1360000
|
unkown
|
page readonly
|
||
4EC000
|
stack
|
page read and write
|
||
768E000
|
unkown
|
page read and write
|
||
39B2000
|
trusted library allocation
|
page read and write
|
||
AEE000
|
stack
|
page read and write
|
||
146B000
|
trusted library allocation
|
page execute and read and write
|
||
1116000
|
heap
|
page read and write
|
||
1203000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
E777000
|
unkown
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1435000
|
heap
|
page read and write
|
||
A223000
|
heap
|
page read and write
|
||
9A6A000
|
unkown
|
page read and write
|
||
13D5000
|
heap
|
page read and write
|
||
75F8000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
A11D000
|
heap
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
D4C000
|
heap
|
page read and write
|
||
A3AC000
|
unkown
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
35B5000
|
unkown
|
page read and write
|
||
390000
|
unkown
|
page readonly
|
||
8900000
|
unkown
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
4390000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
A2A6000
|
heap
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
C621000
|
unkown
|
page read and write
|
||
A02B000
|
heap
|
page read and write
|
||
112B4000
|
unkown
|
page read and write
|
||
7FF5D7820000
|
unkown
|
page readonly
|
||
A0CA000
|
heap
|
page read and write
|
||
1528000
|
heap
|
page read and write
|
||
2761000
|
trusted library allocation
|
page read and write
|
||
98CD000
|
heap
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
7FF5D747F000
|
unkown
|
page readonly
|
||
C68000
|
heap
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
1203000
|
unkown
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
325B000
|
stack
|
page read and write
|
||
E77A000
|
unkown
|
page read and write
|
||
C862000
|
unkown
|
page read and write
|
||
C472000
|
unkown
|
page read and write
|
||
1260000
|
unkown
|
page read and write
|
||
12D0000
|
unkown
|
page readonly
|
||
A63000
|
trusted library allocation
|
page execute and read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
13B4000
|
heap
|
page read and write
|
||
4670000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
49D6000
|
unkown
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
7FF5D7458000
|
unkown
|
page readonly
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
9CAA000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
C48B000
|
unkown
|
page read and write
|
||
7FF5D751F000
|
unkown
|
page readonly
|
||
4360000
|
direct allocation
|
page read and write
|
||
38D9000
|
trusted library allocation
|
page read and write
|
||
9CC9000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
9CB4000
|
heap
|
page read and write
|
||
38FC000
|
trusted library allocation
|
page read and write
|
||
A3E8000
|
heap
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
2E63000
|
trusted library allocation
|
page read and write
|
||
104D000
|
heap
|
page read and write
|
||
A3B5000
|
heap
|
page read and write
|
||
142E000
|
heap
|
page read and write
|
||
A43F000
|
heap
|
page read and write
|
||
A1C8000
|
heap
|
page read and write
|
||
112B5000
|
unkown
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
A2CD000
|
heap
|
page read and write
|
||
9BA000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
30C0000
|
remote allocation
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
392D000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
AA8000
|
heap
|
page read and write
|
||
38DA000
|
trusted library allocation
|
page read and write
|
||
E770000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
98C4000
|
heap
|
page read and write
|
||
9C53000
|
heap
|
page read and write
|
||
145A000
|
heap
|
page read and write
|
||
558F000
|
trusted library allocation
|
page read and write
|
||
10D4000
|
trusted library allocation
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
9C97000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
38E7000
|
trusted library allocation
|
page read and write
|
||
A17E000
|
heap
|
page read and write
|
||
3380000
|
unkown
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1453000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
7FF5D7438000
|
unkown
|
page readonly
|
||
D60000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
C65E000
|
unkown
|
page read and write
|
||
A539000
|
heap
|
page read and write
|
||
13F1000
|
heap
|
page read and write
|
||
204F000
|
stack
|
page read and write
|
||
A109000
|
heap
|
page read and write
|
||
2EBC000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
10F9000
|
stack
|
page read and write
|
||
5565000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
AA92000
|
unkown
|
page read and write
|
||
87B000
|
stack
|
page read and write
|
||
5583000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
38A5000
|
trusted library allocation
|
page read and write
|
||
171F000
|
stack
|
page read and write
|
||
50D1000
|
trusted library allocation
|
page read and write
|
||
9A80000
|
unkown
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
A44A000
|
heap
|
page read and write
|
||
10789000
|
unkown
|
page read and write
|
||
98D1000
|
heap
|
page read and write
|
||
AFBE000
|
stack
|
page read and write
|
||
1436000
|
heap
|
page read and write
|
||
1440000
|
trusted library allocation
|
page read and write
|
||
35D3000
|
unkown
|
page read and write
|
||
9CAE000
|
heap
|
page read and write
|
||
A0FA000
|
heap
|
page read and write
|
||
13E3000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
7FF5D7398000
|
unkown
|
page readonly
|
||
5E7000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
A00C000
|
heap
|
page read and write
|
||
A0B4000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
258F000
|
stack
|
page read and write
|
||
9CC3000
|
heap
|
page read and write
|
||
11E3000
|
trusted library allocation
|
page execute and read and write
|
||
129C000
|
heap
|
page read and write
|
||
7FF5D7455000
|
unkown
|
page readonly
|
||
4D6000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
7FF5D7309000
|
unkown
|
page readonly
|
||
9CA8000
|
heap
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
A36C000
|
heap
|
page read and write
|
||
214F000
|
stack
|
page read and write
|
||
3A7B000
|
trusted library allocation
|
page read and write
|
||
9CD8000
|
heap
|
page read and write
|
||
5026000
|
trusted library allocation
|
page read and write
|
||
504F000
|
stack
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
E65000
|
trusted library allocation
|
page read and write
|
||
F4F0000
|
unkown
|
page read and write
|
||
9BEB000
|
heap
|
page read and write
|
||
BE70000
|
unkown
|
page readonly
|
||
1465000
|
heap
|
page read and write
|
||
7FF5D7385000
|
unkown
|
page readonly
|
||
A3AB000
|
heap
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
A380000
|
heap
|
page read and write
|
||
C5F4000
|
unkown
|
page read and write
|
||
9CB3000
|
heap
|
page read and write
|
||
A63F000
|
heap
|
page read and write
|
||
E26000
|
trusted library allocation
|
page execute and read and write
|
||
9AB4000
|
unkown
|
page read and write
|
||
112BB000
|
unkown
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
A5AC000
|
heap
|
page read and write
|
||
35CF000
|
unkown
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
B92000
|
trusted library allocation
|
page read and write
|
||
38DA000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
A3D1000
|
heap
|
page read and write
|
||
1453000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
35F4000
|
unkown
|
page read and write
|
||
112B8000
|
unkown
|
page read and write
|
||
7810000
|
unkown
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
9C85000
|
heap
|
page read and write
|
||
553E000
|
trusted library allocation
|
page read and write
|
||
13A9000
|
heap
|
page read and write
|
||
38C4000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
13CF000
|
heap
|
page read and write
|
||
2A45000
|
trusted library allocation
|
page read and write
|
||
38A0000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
2E20000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
A3A1000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
1260000
|
unkown
|
page read and write
|
||
7FF5D7429000
|
unkown
|
page readonly
|
||
2A42000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
1350000
|
unkown
|
page readonly
|
||
138A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D7808000
|
unkown
|
page readonly
|
||
9C5C000
|
heap
|
page read and write
|
||
A46C000
|
heap
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
AA8000
|
heap
|
page read and write
|
||
A452000
|
heap
|
page read and write
|
||
3E3000
|
unkown
|
page execute read
|
||
7FF5D77E0000
|
unkown
|
page readonly
|
||
A4A9000
|
heap
|
page read and write
|
||
9D7C000
|
heap
|
page read and write
|
||
21A0000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
38FD000
|
trusted library allocation
|
page read and write
|
||
98CF000
|
heap
|
page read and write
|
||
13DF000
|
heap
|
page read and write
|
||
A0A3000
|
heap
|
page read and write
|
||
A525000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
A5FF000
|
heap
|
page read and write
|
||
7FF5D74A6000
|
unkown
|
page readonly
|
||
8890000
|
unkown
|
page readonly
|
||
9CA8000
|
heap
|
page read and write
|
||
9C83000
|
heap
|
page read and write
|
||
5620000
|
unkown
|
page readonly
|
||
7FF5D7065000
|
unkown
|
page readonly
|
||
2AC6000
|
trusted library allocation
|
page read and write
|
||
B220000
|
unkown
|
page read and write
|
||
112B9000
|
unkown
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
98DD000
|
heap
|
page read and write
|
||
7631000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
7FF5D75F2000
|
unkown
|
page readonly
|
||
9CA6000
|
heap
|
page read and write
|
||
1597000
|
trusted library allocation
|
page execute and read and write
|
||
390D000
|
trusted library allocation
|
page read and write
|
||
4CD000
|
heap
|
page read and write
|
||
3AE7000
|
trusted library allocation
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
8C39000
|
stack
|
page read and write
|
||
9CB7000
|
heap
|
page read and write
|
||
5E61000
|
unkown
|
page readonly
|
||
13E3000
|
heap
|
page read and write
|
||
7DF4F2471000
|
unkown
|
page execute read
|
||
389E000
|
stack
|
page read and write
|
||
A07B000
|
heap
|
page read and write
|
||
13E1000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
A2B0000
|
heap
|
page read and write
|
||
E771000
|
unkown
|
page read and write
|
||
BB0D000
|
stack
|
page read and write
|
||
4350000
|
direct allocation
|
page read and write
|
||
1530000
|
trusted library allocation
|
page read and write
|
||
38DB000
|
trusted library allocation
|
page read and write
|
||
7FF5D75E9000
|
unkown
|
page readonly
|
||
A689000
|
heap
|
page read and write
|
||
13DF000
|
heap
|
page read and write
|
||
4D2C000
|
trusted library allocation
|
page read and write
|
||
29EA000
|
heap
|
page read and write
|
||
7FF5D745B000
|
unkown
|
page readonly
|
||
E90000
|
heap
|
page read and write
|
||
6C5000
|
unkown
|
page execute read
|
||
278E000
|
stack
|
page read and write
|
||
35BD000
|
unkown
|
page read and write
|
||
C5FA000
|
unkown
|
page read and write
|
||
A62C000
|
heap
|
page read and write
|
||
1249000
|
heap
|
page read and write
|
||
177A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D710B000
|
unkown
|
page readonly
|
||
9CD8000
|
heap
|
page read and write
|
||
7FF5D719C000
|
unkown
|
page readonly
|
||
2F4E000
|
stack
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
7FF5D77C7000
|
unkown
|
page readonly
|
||
E2A000
|
trusted library allocation
|
page execute and read and write
|
||
38D9000
|
trusted library allocation
|
page read and write
|
||
38D4000
|
trusted library allocation
|
page read and write
|
||
3140000
|
unkown
|
page read and write
|
||
391D000
|
trusted library allocation
|
page read and write
|
||
2F50000
|
remote allocation
|
page read and write
|
||
AAA000
|
heap
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page execute and read and write
|
||
9CB0000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
F4F000
|
stack
|
page read and write
|
||
A2A0000
|
heap
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
A79000
|
heap
|
page read and write
|
||
2ED8000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5024000
|
trusted library allocation
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
9C80000
|
heap
|
page read and write
|
||
145C000
|
heap
|
page read and write
|
||
CFF000
|
stack
|
page read and write
|
||
112B5000
|
unkown
|
page read and write
|
||
38D6000
|
trusted library allocation
|
page read and write
|
||
3380000
|
unkown
|
page read and write
|
||
A337000
|
heap
|
page read and write
|
||
7FF5D758D000
|
unkown
|
page readonly
|
||
335C000
|
stack
|
page read and write
|
||
3489000
|
stack
|
page read and write
|
||
9C38000
|
heap
|
page read and write
|
||
1462000
|
trusted library allocation
|
page read and write
|
||
145C000
|
heap
|
page read and write
|
||
9D6E000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
A02E000
|
stack
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
9DAC000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
9F46000
|
heap
|
page read and write
|
||
9CAD000
|
heap
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
96FE000
|
stack
|
page read and write
|
||
A2CF000
|
heap
|
page read and write
|
||
7FF5D77C2000
|
unkown
|
page readonly
|
||
E773000
|
unkown
|
page read and write
|
||
9CB5000
|
heap
|
page read and write
|
||
98CD000
|
heap
|
page read and write
|
||
9C80000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
A639000
|
heap
|
page read and write
|
||
A5D0000
|
heap
|
page read and write
|
||
3959000
|
trusted library allocation
|
page read and write
|
||
38BC000
|
trusted library allocation
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
7FF5D71F9000
|
unkown
|
page readonly
|
||
A0F8000
|
heap
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
7FF5D76D5000
|
unkown
|
page readonly
|
||
87A0000
|
unkown
|
page read and write
|
||
38A6000
|
trusted library allocation
|
page read and write
|
||
13AE000
|
heap
|
page read and write
|
||
A01D000
|
heap
|
page read and write
|
||
7609000
|
unkown
|
page read and write
|
||
7FF5D723C000
|
unkown
|
page readonly
|
||
7FF5D71CC000
|
unkown
|
page readonly
|
||
460000
|
heap
|
page read and write
|
||
8A46000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
A3A000
|
heap
|
page read and write
|
||
A562000
|
heap
|
page read and write
|
||
E77C000
|
unkown
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
295E000
|
stack
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
1841000
|
trusted library allocation
|
page read and write
|
||
1847000
|
trusted library allocation
|
page read and write
|
||
2F0D000
|
stack
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
2ED7000
|
trusted library allocation
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
A28D000
|
unkown
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
853B000
|
stack
|
page read and write
|
||
98F9000
|
heap
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
7FF5D74B8000
|
unkown
|
page readonly
|
||
9969000
|
heap
|
page read and write
|
||
9BC3000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
A06B000
|
heap
|
page read and write
|
||
C7CB000
|
unkown
|
page read and write
|
||
C483000
|
unkown
|
page read and write
|
||
13A1000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
7FF5D7267000
|
unkown
|
page readonly
|
||
4F00000
|
heap
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
41C7000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
1627000
|
trusted library allocation
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
B25000
|
heap
|
page read and write
|
||
B9B000
|
trusted library allocation
|
page execute and read and write
|
||
A374000
|
heap
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
7FF5D7236000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
9BB3000
|
heap
|
page read and write
|
||
28B4000
|
heap
|
page read and write
|
||
B77000
|
heap
|
page read and write
|
||
8ECC000
|
stack
|
page read and write
|
||
A029000
|
heap
|
page read and write
|
||
A677000
|
heap
|
page read and write
|
||
A457000
|
heap
|
page read and write
|
||
38EE000
|
trusted library allocation
|
page read and write
|
||
A51C000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
4DA0000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
13DB000
|
heap
|
page read and write
|
||
4FA000
|
heap
|
page read and write
|
||
38AD000
|
trusted library allocation
|
page read and write
|
||
A462000
|
heap
|
page read and write
|
||
35E4000
|
unkown
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
9CCB000
|
heap
|
page read and write
|
||
1459000
|
heap
|
page read and write
|
||
9CC9000
|
heap
|
page read and write
|
||
97FF000
|
stack
|
page read and write
|
||
49FA000
|
unkown
|
page read and write
|
||
9D81000
|
heap
|
page read and write
|
||
11C3000
|
trusted library allocation
|
page execute and read and write
|
||
9915000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
38C2000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
98F5000
|
heap
|
page read and write
|
||
7FF5D71C8000
|
unkown
|
page readonly
|
||
A5BC000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
39A0000
|
trusted library allocation
|
page read and write
|
||
9C9E000
|
heap
|
page read and write
|
||
A558000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page execute and read and write
|
||
A2D7000
|
heap
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
A487000
|
heap
|
page read and write
|
||
A657000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
2901000
|
trusted library allocation
|
page read and write
|
||
9CB8000
|
heap
|
page read and write
|
||
A2D5000
|
heap
|
page read and write
|
||
A9DF000
|
unkown
|
page read and write
|
||
E0D000
|
trusted library allocation
|
page execute and read and write
|
||
38B8000
|
trusted library allocation
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
A6A9000
|
heap
|
page read and write
|
||
9C03000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
CE8000
|
heap
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
A642000
|
heap
|
page read and write
|
||
11ED000
|
trusted library allocation
|
page execute and read and write
|
||
7AA0000
|
unkown
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
9FE5000
|
heap
|
page read and write
|
||
A45F000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
38D8000
|
trusted library allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
9679000
|
stack
|
page read and write
|
||
1432000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
10734000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
4CEE000
|
trusted library allocation
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
2F61000
|
heap
|
page read and write
|
||
38E8000
|
trusted library allocation
|
page read and write
|
||
98FD000
|
heap
|
page read and write
|
||
2EC0000
|
unkown
|
page readonly
|
||
9C8B000
|
heap
|
page read and write
|
||
A2FF000
|
heap
|
page read and write
|
||
3160000
|
unkown
|
page read and write
|
||
27D2000
|
trusted library allocation
|
page read and write
|
||
A1AA000
|
heap
|
page read and write
|
||
30C0000
|
remote allocation
|
page read and write
|
||
A98000
|
heap
|
page read and write
|
||
7FF5CE33D000
|
unkown
|
page readonly
|
||
F553000
|
unkown
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
E8B000
|
stack
|
page read and write
|
||
A220000
|
unkown
|
page read and write
|
||
4DE6000
|
unkown
|
page readonly
|
||
110D000
|
trusted library allocation
|
page execute and read and write
|
||
53E1000
|
unkown
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
9CC0000
|
heap
|
page read and write
|
||
87D0000
|
unkown
|
page read and write
|
||
9F69000
|
heap
|
page read and write
|
||
35D1000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
1453000
|
heap
|
page read and write
|
||
27C6000
|
trusted library allocation
|
page execute and read and write
|
||
275A000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
112B2000
|
unkown
|
page read and write
|
||
A4C6000
|
heap
|
page read and write
|
||
4D1000
|
heap
|
page read and write
|
||
768C000
|
unkown
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
5180000
|
heap
|
page execute and read and write
|
||
1180000
|
unkown
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
9CA1000
|
heap
|
page read and write
|
||
9CB0000
|
heap
|
page read and write
|
||
98A000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
2A3D000
|
trusted library allocation
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
7FF5D77A8000
|
unkown
|
page readonly
|
||
9FE8000
|
heap
|
page read and write
|
||
7691000
|
unkown
|
page read and write
|
||
1281000
|
unkown
|
page readonly
|
||
9F5A000
|
heap
|
page read and write
|
||
7FF5D7700000
|
unkown
|
page readonly
|
||
42E000
|
unkown
|
page readonly
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
D88000
|
heap
|
page read and write
|
||
7FF5D7705000
|
unkown
|
page readonly
|
||
1180000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
D65000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
7FF5D764F000
|
unkown
|
page readonly
|
||
1610000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D77CD000
|
unkown
|
page readonly
|
||
42E000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
A2C6000
|
heap
|
page read and write
|
||
13E3000
|
heap
|
page read and write
|
||
515C000
|
trusted library allocation
|
page read and write
|
||
35C9000
|
unkown
|
page read and write
|
||
38CE000
|
trusted library allocation
|
page read and write
|
||
38B8000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
3902000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
B36000
|
heap
|
page read and write
|
||
3E87000
|
trusted library allocation
|
page read and write
|
||
1438000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
C47F000
|
unkown
|
page read and write
|
||
98CD000
|
heap
|
page read and write
|
||
3931000
|
trusted library allocation
|
page read and write
|
||
A025000
|
heap
|
page read and write
|
||
7FF5D77E3000
|
unkown
|
page readonly
|
||
A3B9000
|
heap
|
page read and write
|
||
38A5000
|
trusted library allocation
|
page read and write
|
||
10634000
|
unkown
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
9B90000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
CC9000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
C8DE000
|
unkown
|
page read and write
|
||
BFB8000
|
stack
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
9C0B000
|
heap
|
page read and write
|
||
CA4000
|
unkown
|
page readonly
|
||
E778000
|
unkown
|
page read and write
|
||
17A0000
|
trusted library allocation
|
page read and write
|
||
5155000
|
trusted library allocation
|
page read and write
|
||
9CD7000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
4D07000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
7FF5D75EE000
|
unkown
|
page readonly
|
||
9C8E000
|
heap
|
page read and write
|
||
9CAB000
|
heap
|
page read and write
|
||
761E000
|
unkown
|
page read and write
|
||
5490000
|
heap
|
page execute and read and write
|
||
5E7000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page execute and read and write
|
||
2730000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
A29A000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
AA8000
|
heap
|
page read and write
|
||
9C91000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
A105000
|
heap
|
page read and write
|
||
7FF5D7639000
|
unkown
|
page readonly
|
||
A54A000
|
heap
|
page read and write
|
||
E779000
|
unkown
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
A198000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
1456000
|
trusted library allocation
|
page execute and read and write
|
||
5E7000
|
heap
|
page read and write
|
||
7FF5D776F000
|
unkown
|
page readonly
|
||
E40000
|
heap
|
page read and write
|
||
144E000
|
heap
|
page read and write
|
||
39A1000
|
heap
|
page read and write
|
||
1237000
|
heap
|
page read and write
|
||
4340000
|
direct allocation
|
page execute and read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
4F7000
|
heap
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
1776000
|
trusted library allocation
|
page execute and read and write
|
||
98C8000
|
heap
|
page read and write
|
||
3363000
|
heap
|
page read and write
|
||
7FF5D748C000
|
unkown
|
page readonly
|
||
9C9D000
|
heap
|
page read and write
|
||
112B8000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
98D0000
|
heap
|
page read and write
|
||
9BC7000
|
heap
|
page read and write
|
||
12B5000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
802000
|
unkown
|
page readonly
|
||
272F000
|
stack
|
page read and write
|
||
7FF5D7604000
|
unkown
|
page readonly
|
||
2DBF000
|
stack
|
page read and write
|
||
DAB000
|
heap
|
page read and write
|
||
1260000
|
unkown
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
A0B2000
|
heap
|
page read and write
|
||
A4BF000
|
heap
|
page read and write
|
||
9CC1000
|
heap
|
page read and write
|
||
38A1000
|
trusted library allocation
|
page read and write
|
||
27AD000
|
trusted library allocation
|
page execute and read and write
|
||
1398000
|
heap
|
page read and write
|
||
9CD2000
|
heap
|
page read and write
|
||
124D000
|
heap
|
page read and write
|
||
7FF5D770F000
|
unkown
|
page readonly
|
||
5F0000
|
heap
|
page read and write
|
||
3761000
|
trusted library allocation
|
page read and write
|
||
7FF5D781A000
|
unkown
|
page readonly
|
||
8900000
|
unkown
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
50F000
|
heap
|
page read and write
|
||
A1E6000
|
heap
|
page read and write
|
||
D0C000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
502B000
|
trusted library allocation
|
page read and write
|
||
C46F000
|
unkown
|
page read and write
|
||
7FF5D7215000
|
unkown
|
page readonly
|
||
5E7000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
9A94000
|
unkown
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
A194000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
9CA6000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5263000
|
trusted library allocation
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
9C8D000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
8900000
|
unkown
|
page read and write
|
||
98CB000
|
heap
|
page read and write
|
||
38C2000
|
trusted library allocation
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
3530000
|
unkown
|
page read and write
|
||
A1AF000
|
stack
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
3959000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
7FF5D77DA000
|
unkown
|
page readonly
|
||
D3E000
|
stack
|
page read and write
|
||
38E7000
|
trusted library allocation
|
page read and write
|
||
554E000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
145A000
|
heap
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
9C12000
|
heap
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
144E000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
A1CE000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page execute and read and write
|
||
E7E000
|
stack
|
page read and write
|
||
A5A9000
|
heap
|
page read and write
|
||
7FF5D75B8000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
3039000
|
trusted library allocation
|
page read and write
|
||
112BB000
|
unkown
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
A39C000
|
unkown
|
page read and write
|
||
9CAD000
|
heap
|
page read and write
|
||
9A70000
|
heap
|
page read and write
|
||
153B000
|
trusted library allocation
|
page execute and read and write
|
||
E77D000
|
unkown
|
page read and write
|
||
A304000
|
heap
|
page read and write
|
||
E77D000
|
unkown
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
7FF5D72D0000
|
unkown
|
page readonly
|
||
7FF5D6BDB000
|
unkown
|
page readonly
|
||
7FF5D72BD000
|
unkown
|
page readonly
|
||
1453000
|
heap
|
page read and write
|
||
3B1B000
|
trusted library allocation
|
page read and write
|
||
A145000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
C24E000
|
stack
|
page read and write
|
||
2E81000
|
trusted library allocation
|
page read and write
|
||
13D5000
|
heap
|
page read and write
|
||
3911000
|
trusted library allocation
|
page read and write
|
||
1787000
|
trusted library allocation
|
page execute and read and write
|
||
8900000
|
unkown
|
page read and write
|
||
BB9D000
|
stack
|
page read and write
|
||
A4BA000
|
heap
|
page read and write
|
||
A388000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
A18E000
|
heap
|
page read and write
|
||
9C8E000
|
heap
|
page read and write
|
||
A47C000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
A09D000
|
heap
|
page read and write
|
||
98C000
|
unkown
|
page readonly
|
||
7FF5D7452000
|
unkown
|
page readonly
|
||
10DE000
|
stack
|
page read and write
|
||
38B8000
|
trusted library allocation
|
page read and write
|
||
A0E5000
|
heap
|
page read and write
|
||
9CA8000
|
heap
|
page read and write
|
||
7FF5D77EB000
|
unkown
|
page readonly
|
||
A36A000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
5173000
|
trusted library allocation
|
page read and write
|
||
13DD000
|
heap
|
page read and write
|
||
A0A6000
|
heap
|
page read and write
|
||
13BC000
|
heap
|
page read and write
|
||
4CDF000
|
stack
|
page read and write
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
A4FE000
|
heap
|
page read and write
|
||
A65B000
|
heap
|
page read and write
|
||
135D000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
112B7000
|
unkown
|
page read and write
|
||
A1C000
|
heap
|
page read and write
|
||
A5FD000
|
heap
|
page read and write
|
||
1459000
|
heap
|
page read and write
|
||
9B9C000
|
heap
|
page read and write
|
||
A173000
|
heap
|
page read and write
|
||
7FF5D7784000
|
unkown
|
page readonly
|
||
87A0000
|
unkown
|
page read and write
|
||
1467000
|
trusted library allocation
|
page execute and read and write
|
||
144C000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
B950000
|
unkown
|
page readonly
|
||
9CB8000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
379E000
|
stack
|
page read and write
|
||
9F79000
|
heap
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
7FF5D72D3000
|
unkown
|
page readonly
|
||
50C5000
|
trusted library allocation
|
page read and write
|
||
A5C8000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
1770000
|
trusted library allocation
|
page read and write
|
||
E771000
|
unkown
|
page read and write
|
||
A594000
|
heap
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
B4BF000
|
stack
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
500F000
|
stack
|
page read and write
|
||
9CBC000
|
heap
|
page read and write
|
||
AAAB000
|
unkown
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
AA93000
|
heap
|
page read and write
|
||
7AB0000
|
unkown
|
page read and write
|
||
942B000
|
stack
|
page read and write
|
||
33B0000
|
unkown
|
page readonly
|
||
A41A000
|
heap
|
page read and write
|
||
3110000
|
unkown
|
page readonly
|
||
A1FE000
|
heap
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
7FF5D72E9000
|
unkown
|
page readonly
|
||
8900000
|
unkown
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
9A96000
|
unkown
|
page read and write
|
||
9D65000
|
heap
|
page read and write
|
||
4CE4000
|
trusted library allocation
|
page read and write
|
||
7FF5D7272000
|
unkown
|
page readonly
|
||
9EB0000
|
unkown
|
page readonly
|
||
13A9000
|
heap
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
900000
|
unkown
|
page readonly
|
||
3310000
|
unkown
|
page read and write
|
||
A301000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
9CBB000
|
heap
|
page read and write
|
||
27A4000
|
trusted library allocation
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
A23A000
|
unkown
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
9BF1000
|
heap
|
page read and write
|
||
A280000
|
heap
|
page read and write
|
||
144A000
|
heap
|
page read and write
|
||
A12F000
|
stack
|
page read and write
|
||
38A1000
|
trusted library allocation
|
page read and write
|
||
7FF5D77D2000
|
unkown
|
page readonly
|
||
13AE000
|
heap
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
8D3C000
|
stack
|
page read and write
|
||
38A1000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
A0E7000
|
heap
|
page read and write
|
||
38D3000
|
trusted library allocation
|
page read and write
|
||
9CA7000
|
heap
|
page read and write
|
||
A04E000
|
heap
|
page read and write
|
||
1830000
|
trusted library allocation
|
page execute and read and write
|
||
2A70000
|
heap
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
9CB4000
|
heap
|
page read and write
|
||
CA4000
|
unkown
|
page readonly
|
||
2750000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
9CC9000
|
heap
|
page read and write
|
||
1ED0000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
A13B000
|
heap
|
page read and write
|
||
7FF5D749B000
|
unkown
|
page readonly
|
||
8900000
|
unkown
|
page read and write
|
||
2720000
|
trusted library allocation
|
page read and write
|
||
38BE000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
87D0000
|
unkown
|
page read and write
|
||
5041000
|
trusted library allocation
|
page read and write
|
||
2E65000
|
trusted library allocation
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
112BF000
|
unkown
|
page read and write
|
||
13CF000
|
heap
|
page read and write
|
||
13B4000
|
heap
|
page read and write
|
||
136D000
|
trusted library allocation
|
page execute and read and write
|
||
98D2000
|
heap
|
page read and write
|
||
7FF5D7648000
|
unkown
|
page readonly
|
||
A289000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
112B3000
|
unkown
|
page read and write
|
||
9BBF000
|
heap
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
29D0000
|
heap
|
page execute and read and write
|
||
A1F8000
|
heap
|
page read and write
|
||
F622000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
110B000
|
trusted library allocation
|
page execute and read and write
|
||
5E7000
|
heap
|
page read and write
|
||
1260000
|
unkown
|
page read and write
|
||
2A90000
|
trusted library allocation
|
page read and write
|
||
46D4000
|
trusted library allocation
|
page read and write
|
||
7B80000
|
unkown
|
page readonly
|
||
98F3000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
A88000
|
heap
|
page read and write
|
||
A53D000
|
heap
|
page read and write
|
||
E771000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
153F000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
A2EE000
|
heap
|
page read and write
|
||
98D6000
|
heap
|
page read and write
|
||
98C9000
|
heap
|
page read and write
|
||
7FF5D7396000
|
unkown
|
page readonly
|
||
13B4000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
1172000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
7FF5D71E0000
|
unkown
|
page readonly
|
||
F8F000
|
heap
|
page read and write
|
||
1455000
|
heap
|
page read and write
|
||
B8A000
|
trusted library allocation
|
page execute and read and write
|
||
A32B000
|
heap
|
page read and write
|
||
9ADB000
|
unkown
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
A20C000
|
heap
|
page read and write
|
||
3955000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
7FF5D776D000
|
unkown
|
page readonly
|
||
4A71000
|
unkown
|
page read and write
|
||
E32000
|
trusted library allocation
|
page read and write
|
||
C0BA000
|
stack
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
12D7000
|
trusted library allocation
|
page read and write
|
||
3280000
|
unkown
|
page read and write
|
||
A099000
|
heap
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
2726000
|
trusted library allocation
|
page read and write
|
||
8F49000
|
stack
|
page read and write
|
||
13CF000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
9901000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
38E4000
|
trusted library allocation
|
page read and write
|
||
A143000
|
heap
|
page read and write
|
||
1F40000
|
heap
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
9CB8000
|
heap
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
2FF9000
|
stack
|
page read and write
|
||
5293000
|
heap
|
page execute and read and write
|
||
5E7000
|
heap
|
page read and write
|
||
C642000
|
unkown
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
9D84000
|
heap
|
page read and write
|
||
1436000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
28DA000
|
trusted library allocation
|
page execute and read and write
|
||
29C0000
|
heap
|
page read and write
|
||
BE90000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
7FF5D7462000
|
unkown
|
page readonly
|
||
9D9B000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A251000
|
unkown
|
page read and write
|
||
DBB000
|
stack
|
page read and write
|
||
7637000
|
unkown
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
A030000
|
heap
|
page read and write
|
||
7FF5D7292000
|
unkown
|
page readonly
|
||
7FF5D7558000
|
unkown
|
page readonly
|
||
93CF000
|
heap
|
page read and write
|
||
1438000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
DEB000
|
stack
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
122F000
|
stack
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
8DA000
|
stack
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
99B0000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
A17B000
|
heap
|
page read and write
|
||
1453000
|
heap
|
page read and write
|
||
503000
|
heap
|
page read and write
|
||
A88000
|
heap
|
page read and write
|
||
1537000
|
trusted library allocation
|
page execute and read and write
|
||
9C8E000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
A313000
|
unkown
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
7FF5D775C000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
4A0E000
|
unkown
|
page read and write
|
||
144A000
|
heap
|
page read and write
|
||
4051000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
E3B000
|
trusted library allocation
|
page execute and read and write
|
||
AA8A000
|
heap
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
7FF5D72DF000
|
unkown
|
page readonly
|
||
A541000
|
heap
|
page read and write
|
||
7FF5D72D7000
|
unkown
|
page readonly
|
||
A011000
|
heap
|
page read and write
|
||
135D000
|
trusted library allocation
|
page execute and read and write
|
||
8900000
|
unkown
|
page read and write
|
||
7FF5D7546000
|
unkown
|
page readonly
|
||
3E81000
|
trusted library allocation
|
page read and write
|
||
9AC3000
|
unkown
|
page read and write
|
||
7FF5D75CB000
|
unkown
|
page readonly
|
||
9A84000
|
unkown
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
1731000
|
unkown
|
page readonly
|
||
5E7000
|
heap
|
page read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
39A0000
|
heap
|
page read and write
|
||
7FF5D729E000
|
unkown
|
page readonly
|
||
A0D4000
|
heap
|
page read and write
|
||
A46E000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
4E2B000
|
trusted library allocation
|
page read and write
|
||
7FF5D7394000
|
unkown
|
page readonly
|
||
1180000
|
unkown
|
page read and write
|
||
9AB2000
|
unkown
|
page read and write
|
||
1436000
|
heap
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
A3A6000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
5E7000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
10CB1000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
41B000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
E4CD000
|
stack
|
page read and write
|
||
7AE0000
|
unkown
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
unkown
|
page execute read
|
||
3380000
|
unkown
|
page read and write
|
||
7FF5D74C3000
|
unkown
|
page readonly
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
9CA3000
|
heap
|
page read and write
|
||
A34D000
|
heap
|
page read and write
|
||
2DC4000
|
trusted library allocation
|
page read and write
|
||
1270000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
11EA000
|
trusted library allocation
|
page execute and read and write
|
||
F53A000
|
unkown
|
page read and write
|
||
8F6000
|
stack
|
page read and write
|
||
28E2000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
A3F0000
|
heap
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
9CAA000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
3201000
|
trusted library allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
A4F3000
|
heap
|
page read and write
|
||
1463000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
13CF000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
9D13000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
7FF5D71C4000
|
unkown
|
page readonly
|
||
3360000
|
unkown
|
page read and write
|
||
35DC000
|
unkown
|
page read and write
|
||
A3B6000
|
unkown
|
page read and write
|
||
A2D3000
|
heap
|
page read and write
|
||
6C4000
|
unkown
|
page write copy
|
||
7FF5D774A000
|
unkown
|
page readonly
|
||
1180000
|
unkown
|
page read and write
|
||
A264000
|
unkown
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
9F76000
|
heap
|
page read and write
|
||
9CBA000
|
heap
|
page read and write
|
||
9B85000
|
unkown
|
page read and write
|
||
1780000
|
trusted library allocation
|
page read and write
|
||
9D78000
|
heap
|
page read and write
|
||
9578000
|
stack
|
page read and write
|
||
9D8A000
|
heap
|
page read and write
|
||
3A8B000
|
trusted library allocation
|
page read and write
|
||
1311000
|
trusted library allocation
|
page read and write
|
||
38DD000
|
trusted library allocation
|
page read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
16DF000
|
stack
|
page read and write
|
||
9905000
|
heap
|
page read and write
|
||
9BE000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
6250000
|
unkown
|
page readonly
|
||
1180000
|
unkown
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
3E61000
|
trusted library allocation
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
A404000
|
heap
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
A5C1000
|
heap
|
page read and write
|
||
10002000
|
unkown
|
page readonly
|
||
FA7000
|
heap
|
page read and write
|
||
4DA2000
|
unkown
|
page readonly
|
||
7605000
|
unkown
|
page read and write
|
||
C4C6000
|
unkown
|
page read and write
|
||
3A4E000
|
trusted library allocation
|
page read and write
|
||
A07E000
|
heap
|
page read and write
|
||
1432000
|
heap
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
11A7000
|
heap
|
page read and write
|
||
9CB6000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
7FF5D7376000
|
unkown
|
page readonly
|
||
5E7000
|
heap
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
13B5000
|
heap
|
page read and write
|
||
38B8000
|
trusted library allocation
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
9C80000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
7FF5D7799000
|
unkown
|
page readonly
|
||
8360000
|
unkown
|
page read and write
|
||
A510000
|
heap
|
page read and write
|
||
2A31000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
1260000
|
unkown
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
2E19000
|
trusted library allocation
|
page read and write
|
||
9C4B000
|
heap
|
page read and write
|
||
A136000
|
heap
|
page read and write
|
||
A503000
|
heap
|
page read and write
|
||
A16A000
|
heap
|
page read and write
|
||
478000
|
heap
|
page read and write
|
||
30FB000
|
stack
|
page read and write
|
||
7FF5D706E000
|
unkown
|
page readonly
|
||
A090000
|
heap
|
page read and write
|
||
4A90000
|
unkown
|
page read and write
|
||
9E0F000
|
heap
|
page read and write
|
||
7B20000
|
unkown
|
page read and write
|
||
98C9000
|
heap
|
page read and write
|
||
FF7000
|
heap
|
page read and write
|
||
7FF5D75D9000
|
unkown
|
page readonly
|
||
1354000
|
trusted library allocation
|
page read and write
|
||
A371000
|
heap
|
page read and write
|
||
362A000
|
unkown
|
page read and write
|
||
A660000
|
heap
|
page read and write
|
||
9C84000
|
heap
|
page read and write
|
||
A334000
|
heap
|
page read and write
|
||
B03B000
|
stack
|
page read and write
|
||
5544000
|
trusted library allocation
|
page read and write
|
||
A182000
|
heap
|
page read and write
|
||
AA0F000
|
unkown
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
7FF5D7745000
|
unkown
|
page readonly
|
||
5E7000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
A391000
|
unkown
|
page read and write
|
||
A9E9000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
35B3000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
2BB7000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5463000
|
unkown
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
9AAA000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
150D000
|
trusted library allocation
|
page execute and read and write
|
||
38C8000
|
trusted library allocation
|
page read and write
|
||
9CC7000
|
heap
|
page read and write
|
||
A088000
|
heap
|
page read and write
|
||
1754000
|
trusted library allocation
|
page read and write
|
||
9CAA000
|
heap
|
page read and write
|
||
C20000
|
trusted library allocation
|
page read and write
|
||
C908000
|
unkown
|
page read and write
|
||
9CAE000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
3901000
|
trusted library allocation
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
DFD000
|
trusted library allocation
|
page execute and read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
9CCF000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
E77A000
|
unkown
|
page read and write
|
||
143B000
|
heap
|
page read and write
|
||
112BD000
|
unkown
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
9BE5000
|
heap
|
page read and write
|
||
10DD000
|
trusted library allocation
|
page execute and read and write
|
||
4571000
|
heap
|
page read and write
|
||
A3F9000
|
heap
|
page read and write
|
||
13DF000
|
heap
|
page read and write
|
||
98E1000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
11F2000
|
trusted library allocation
|
page read and write
|
||
7FF5D7694000
|
unkown
|
page readonly
|
||
9960000
|
heap
|
page read and write
|
||
35FA000
|
unkown
|
page read and write
|
||
38A8000
|
trusted library allocation
|
page read and write
|
||
5C60000
|
unclassified section
|
page readonly
|
||
C460000
|
unkown
|
page read and write
|
||
F536000
|
unkown
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
A209000
|
heap
|
page read and write
|
||
7FF5D7073000
|
unkown
|
page readonly
|
||
38DA000
|
trusted library allocation
|
page read and write
|
||
38E9000
|
trusted library allocation
|
page read and write
|
||
112B1000
|
unkown
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
3070000
|
direct allocation
|
page read and write
|
||
A2A2000
|
heap
|
page read and write
|
||
1867000
|
heap
|
page read and write
|
||
98CF000
|
heap
|
page read and write
|
||
144A000
|
heap
|
page read and write
|
||
2A05000
|
trusted library allocation
|
page read and write
|
||
7FF5D72BF000
|
unkown
|
page readonly
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
38C7000
|
trusted library allocation
|
page read and write
|
||
7C31000
|
unkown
|
page read and write
|
||
A2C2000
|
heap
|
page read and write
|
||
7C70000
|
unkown
|
page readonly
|
||
40A000
|
unkown
|
page read and write
|
||
9CD1000
|
heap
|
page read and write
|
||
38A6000
|
trusted library allocation
|
page read and write
|
||
7FF5D7764000
|
unkown
|
page readonly
|
||
A1BB000
|
heap
|
page read and write
|
||
A070000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
5E7000
|
heap
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
A445000
|
heap
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
9D46000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
9C96000
|
heap
|
page read and write
|
||
84BB000
|
stack
|
page read and write
|
||
9D75000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
2BAF000
|
trusted library allocation
|
page read and write
|
||
1438000
|
heap
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
2940000
|
trusted library allocation
|
page execute and read and write
|
||
8900000
|
unkown
|
page read and write
|
||
106B3000
|
unkown
|
page read and write
|
||
13DF000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
7FF5D7257000
|
unkown
|
page readonly
|
||
C653000
|
unkown
|
page read and write
|
||
A2B4000
|
heap
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
2A2E000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
A1DA000
|
heap
|
page read and write
|
||
A52D000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
38F5000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
1300000
|
trusted library allocation
|
page execute and read and write
|
||
1260000
|
unkown
|
page read and write
|
||
44B0000
|
heap
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
38F0000
|
trusted library allocation
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
38D6000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page execute and read and write
|
||
102E000
|
stack
|
page read and write
|
||
7989000
|
stack
|
page read and write
|
||
A1B7000
|
heap
|
page read and write
|
||
106F6000
|
unkown
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
B15000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
5060000
|
trusted library allocation
|
page read and write
|
||
A328000
|
heap
|
page read and write
|
||
9CB3000
|
heap
|
page read and write
|
||
11F7000
|
trusted library allocation
|
page execute and read and write
|
||
9CBF000
|
heap
|
page read and write
|
||
9CB5000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
395F000
|
trusted library allocation
|
page read and write
|
||
FFB000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
7FF5D75F9000
|
unkown
|
page readonly
|
||
BDC0000
|
unkown
|
page read and write
|
||
503E000
|
trusted library allocation
|
page read and write
|
||
C7BE000
|
unkown
|
page read and write
|
||
98E0000
|
heap
|
page read and write
|
||
112B7000
|
unkown
|
page read and write
|
||
8880000
|
unkown
|
page readonly
|
||
38AF000
|
trusted library allocation
|
page read and write
|
||
CA23000
|
unkown
|
page read and write
|
||
C62D000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
9C9F000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
B85A000
|
stack
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
DF4000
|
trusted library allocation
|
page read and write
|
||
9B0B000
|
unkown
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
7FF5D7589000
|
unkown
|
page readonly
|
||
4D95000
|
trusted library allocation
|
page read and write
|
||
7FF5D7485000
|
unkown
|
page readonly
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
7FF5D75F6000
|
unkown
|
page readonly
|
||
1180000
|
unkown
|
page read and write
|
||
1432000
|
heap
|
page read and write
|
||
2790000
|
trusted library allocation
|
page execute and read and write
|
||
5E7000
|
heap
|
page read and write
|
||
38CA000
|
trusted library allocation
|
page read and write
|
||
7FF5D774C000
|
unkown
|
page readonly
|
||
B97000
|
trusted library allocation
|
page execute and read and write
|
||
1435000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FF5D760B000
|
unkown
|
page readonly
|
||
38AF000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
7AC0000
|
unkown
|
page read and write
|
||
9C9A000
|
heap
|
page read and write
|
||
9CC0000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
B86000
|
trusted library allocation
|
page execute and read and write
|
||
901000
|
unkown
|
page execute read
|
||
28EB000
|
trusted library allocation
|
page execute and read and write
|
||
3901000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
9CCE000
|
heap
|
page read and write
|
||
3CD000
|
unkown
|
page readonly
|
||
13A9000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page execute and read and write
|
||
514E000
|
stack
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
A357000
|
heap
|
page read and write
|
||
2E04000
|
trusted library allocation
|
page read and write
|
||
A4C2000
|
heap
|
page read and write
|
||
98B000
|
unkown
|
page execute and read and write
|
||
2890000
|
direct allocation
|
page execute and read and write
|
||
95FB000
|
stack
|
page read and write
|
||
7FF5D77E9000
|
unkown
|
page readonly
|
||
8900000
|
unkown
|
page read and write
|
||
28CD000
|
trusted library allocation
|
page execute and read and write
|
||
CCE000
|
stack
|
page read and write
|
||
A298000
|
heap
|
page read and write
|
||
58B000
|
stack
|
page read and write
|
||
143D000
|
heap
|
page read and write
|
||
9D5C000
|
heap
|
page read and write
|
||
A3C6000
|
heap
|
page read and write
|
||
33F0000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
E772000
|
unkown
|
page read and write
|
||
57EE000
|
stack
|
page read and write
|
||
9CC9000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
E22000
|
heap
|
page read and write
|
||
7FF5D6AB6000
|
unkown
|
page readonly
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
BD6000
|
stack
|
page read and write
|
||
145C000
|
heap
|
page read and write
|
||
1250000
|
unkown
|
page read and write
|
||
A164000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
28D2000
|
trusted library allocation
|
page read and write
|
||
1578000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
4E41000
|
trusted library allocation
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
9E2E000
|
stack
|
page read and write
|
||
4A16000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
A484000
|
heap
|
page read and write
|
||
91F0000
|
unkown
|
page readonly
|
||
1030000
|
heap
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
1850000
|
heap
|
page execute and read and write
|
||
ADB000
|
stack
|
page read and write
|
||
13DB000
|
heap
|
page read and write
|
||
553B000
|
trusted library allocation
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
8A00000
|
unkown
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
2A24000
|
trusted library allocation
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
ED5000
|
heap
|
page read and write
|
||
A615000
|
heap
|
page read and write
|
||
A4D1000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
38E9000
|
trusted library allocation
|
page read and write
|
||
A5C5000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
9CB4000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
10E0000
|
stack
|
page read and write
|
||
FC8000
|
heap
|
page read and write
|
||
7FF5D720A000
|
unkown
|
page readonly
|
||
A092000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
EB5000
|
stack
|
page read and write
|
||
10F6000
|
stack
|
page read and write
|
||
F620000
|
heap
|
page read and write
|
||
38B8000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
143B000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
2EB1000
|
trusted library allocation
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page read and write
|
||
2A1E000
|
trusted library allocation
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
A346000
|
heap
|
page read and write
|
||
9A8E000
|
unkown
|
page read and write
|
||
112B2000
|
unkown
|
page read and write
|
||
A34D000
|
heap
|
page read and write
|
||
4F40000
|
heap
|
page execute and read and write
|
||
A596000
|
heap
|
page read and write
|
||
143A000
|
heap
|
page read and write
|
||
7FF5D7230000
|
unkown
|
page readonly
|
||
8900000
|
unkown
|
page read and write
|
||
A31B000
|
heap
|
page read and write
|
||
9D69000
|
heap
|
page read and write
|
||
98F3000
|
heap
|
page read and write
|
||
AA40000
|
unkown
|
page read and write
|
||
9BCE000
|
heap
|
page read and write
|
||
1609000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
4F7000
|
heap
|
page read and write
|
||
7FF5D77F0000
|
unkown
|
page readonly
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
8EB000
|
stack
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
11C4000
|
trusted library allocation
|
page read and write
|
||
A19B000
|
heap
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
9CB5000
|
heap
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
1180000
|
unkown
|
page read and write
|
||
38BF000
|
trusted library allocation
|
page read and write
|
||
391D000
|
trusted library allocation
|
page read and write
|
||
AA9E000
|
unkown
|
page read and write
|
||
38A3000
|
trusted library allocation
|
page read and write
|
||
C82000
|
heap
|
page read and write
|
||
2EDB000
|
trusted library allocation
|
page read and write
|
||
9A8C000
|
unkown
|
page read and write
|
||
98D5000
|
heap
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
4370000
|
unclassified section
|
page read and write
|
||
143A000
|
heap
|
page read and write
|
||
4E34000
|
trusted library allocation
|
page read and write
|
||
FDF000
|
heap
|
page read and write
|
||
38DA000
|
trusted library allocation
|
page read and write
|
||
38D5000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
A1AD000
|
heap
|
page read and write
|
||
49A8000
|
unkown
|
page read and write
|
||
9C8F000
|
heap
|
page read and write
|
||
7FF5D7391000
|
unkown
|
page readonly
|
||
DB7000
|
heap
|
page read and write
|
||
2EC2000
|
trusted library allocation
|
page read and write
|
||
1077B000
|
unkown
|
page read and write
|
||
7FF5D783B000
|
unkown
|
page readonly
|
||
19D000
|
stack
|
page read and write
|
||
ADB000
|
stack
|
page read and write
|
||
112BC000
|
unkown
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
A152000
|
heap
|
page read and write
|
||
38C5000
|
trusted library allocation
|
page read and write
|
||
13A1000
|
heap
|
page read and write
|
||
A2D7000
|
unkown
|
page read and write
|
||
7CB0000
|
unkown
|
page readonly
|
||
9C32000
|
heap
|
page read and write
|
||
C669000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
38C0000
|
trusted library allocation
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
760F000
|
unkown
|
page read and write
|
||
A518000
|
heap
|
page read and write
|
||
4CDF000
|
stack
|
page read and write
|
||
13E1000
|
heap
|
page read and write
|
||
29C6000
|
trusted library allocation
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
9CAA000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
112B2000
|
unkown
|
page read and write
|
||
1455000
|
heap
|
page read and write
|
||
1208000
|
heap
|
page read and write
|
||
A43D000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
2F50000
|
remote allocation
|
page read and write
|
||
105F4000
|
unkown
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
7FF5D7795000
|
unkown
|
page readonly
|
||
1180000
|
unkown
|
page read and write
|
||
A2E7000
|
heap
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
391E000
|
trusted library allocation
|
page read and write
|
||
A379000
|
heap
|
page read and write
|
||
5055000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
trusted library allocation
|
page read and write
|
||
760D000
|
unkown
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
7FF5D75D6000
|
unkown
|
page readonly
|
||
E30000
|
heap
|
page read and write
|
||
A12E000
|
heap
|
page read and write
|
||
1463000
|
heap
|
page read and write
|
||
A4D6000
|
heap
|
page read and write
|
||
7DF4F2481000
|
unkown
|
page execute read
|
||
4A9E000
|
stack
|
page read and write
|
||
7FF5D6BEF000
|
unkown
|
page readonly
|
||
9C80000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
2BD7000
|
trusted library allocation
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
87D0000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
A02E000
|
heap
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
515F000
|
trusted library allocation
|
page read and write
|
||
1433000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D71DA000
|
unkown
|
page readonly
|
||
98FF000
|
heap
|
page read and write
|
||
9CAF000
|
heap
|
page read and write
|
||
5B7E000
|
stack
|
page read and write
|
||
A555000
|
heap
|
page read and write
|
||
C5F8000
|
unkown
|
page read and write
|
||
9C8F000
|
heap
|
page read and write
|
||
7FF5D7202000
|
unkown
|
page readonly
|
||
3925000
|
trusted library allocation
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
112BD000
|
unkown
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
4380000
|
heap
|
page read and write
|
||
2F50000
|
remote allocation
|
page read and write
|
||
A3B9000
|
unkown
|
page read and write
|
||
9CD6000
|
heap
|
page read and write
|
||
A018000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
38E9000
|
trusted library allocation
|
page read and write
|
||
12CC000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
435F000
|
stack
|
page read and write
|
||
9CB2000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
3955000
|
trusted library allocation
|
page read and write
|
||
7FF5D76D7000
|
unkown
|
page readonly
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
A0BD000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
3026000
|
trusted library allocation
|
page read and write
|
||
7FF5D76DA000
|
unkown
|
page readonly
|
||
C00000
|
trusted library allocation
|
page execute and read and write
|
||
7DBD000
|
stack
|
page read and write
|
||
A366000
|
heap
|
page read and write
|
||
140B000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
558A000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
A123000
|
heap
|
page read and write
|
||
125B000
|
stack
|
page read and write
|
||
C8C1000
|
unkown
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
1753000
|
trusted library allocation
|
page execute and read and write
|
||
15B7000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
3765000
|
trusted library allocation
|
page read and write
|
||
B92000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
394E000
|
trusted library allocation
|
page read and write
|
||
2F4D000
|
stack
|
page read and write
|
||
50CC000
|
trusted library allocation
|
page read and write
|
||
A0BB000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
D9F000
|
heap
|
page read and write
|
||
1206000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
A5A0000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
9FCA000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
38DB000
|
trusted library allocation
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
9AAC000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
38F8000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
4D31000
|
trusted library allocation
|
page read and write
|
||
7FF5D7752000
|
unkown
|
page readonly
|
||
144C000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
unkown
|
page read and write
|
||
8DE000
|
stack
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
979000
|
unkown
|
page readonly
|
||
A013000
|
heap
|
page read and write
|
||
A628000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
E77F000
|
unkown
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
F9B000
|
heap
|
page read and write
|
||
7DF4F24A1000
|
unkown
|
page execute read
|
||
7FF5D7591000
|
unkown
|
page readonly
|
||
2B81000
|
trusted library allocation
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
112B2000
|
unkown
|
page read and write
|
||
98D8000
|
heap
|
page read and write
|
||
A1E3000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
779E000
|
unkown
|
page read and write
|
||
27DB000
|
trusted library allocation
|
page execute and read and write
|
||
1150000
|
heap
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
A4AC000
|
heap
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
A2A2000
|
unkown
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
9A72000
|
unkown
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page execute and read and write
|
||
B10000
|
heap
|
page read and write
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
A4B7000
|
heap
|
page read and write
|
||
1557000
|
heap
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
9902000
|
heap
|
page read and write
|
||
7FF5D7682000
|
unkown
|
page readonly
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
A33F000
|
unkown
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
3500000
|
stack
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
7FF5D7262000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
28D6000
|
trusted library allocation
|
page execute and read and write
|
||
9C8D000
|
heap
|
page read and write
|
||
A3AA000
|
unkown
|
page read and write
|
||
7FF5D74F2000
|
unkown
|
page readonly
|
||
7FF5D748A000
|
unkown
|
page readonly
|
||
55F3000
|
trusted library allocation
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
7FF5D762F000
|
unkown
|
page readonly
|
||
98EA000
|
heap
|
page read and write
|
||
769A000
|
unkown
|
page read and write
|
||
3630000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
9C8E000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
2F0C000
|
stack
|
page read and write
|
||
7FF5D765F000
|
unkown
|
page readonly
|
||
112BF000
|
unkown
|
page read and write
|
||
9CA3000
|
heap
|
page read and write
|
||
9CB6000
|
heap
|
page read and write
|
||
7FF5D71D7000
|
unkown
|
page readonly
|
||
276B000
|
heap
|
page execute and read and write
|
||
94AB000
|
stack
|
page read and write
|
||
7FF5D752F000
|
unkown
|
page readonly
|
||
86D0000
|
unkown
|
page readonly
|
||
6C4000
|
unkown
|
page read and write
|
||
112BC000
|
unkown
|
page read and write
|
||
1235000
|
heap
|
page read and write
|
||
7FF5D72CE000
|
unkown
|
page readonly
|
||
8900000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
4CFE000
|
trusted library allocation
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
C4BD000
|
unkown
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
38B5000
|
trusted library allocation
|
page read and write
|
||
BE49000
|
stack
|
page read and write
|
||
49BB000
|
unkown
|
page read and write
|
||
1260000
|
unkown
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
3A53000
|
trusted library allocation
|
page read and write
|
||
A368000
|
heap
|
page read and write
|
||
E4A000
|
heap
|
page read and write
|
||
7693000
|
unkown
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
4CF4000
|
trusted library allocation
|
page read and write
|
||
1356000
|
stack
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
7FF5D7289000
|
unkown
|
page readonly
|
||
9D03000
|
heap
|
page read and write
|
||
9D9F000
|
heap
|
page read and write
|
||
881F000
|
stack
|
page read and write
|
||
A610000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
BD6000
|
stack
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
B8A000
|
trusted library allocation
|
page execute and read and write
|
||
13F2000
|
heap
|
page read and write
|
||
13E1000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
A3D3000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
1439000
|
heap
|
page read and write
|
||
2EAF000
|
trusted library allocation
|
page read and write
|
||
1630000
|
heap
|
page execute and read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
1260000
|
unkown
|
page read and write
|
||
142A000
|
heap
|
page read and write
|
||
A637000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
38AC000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
F9F000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
C3CD000
|
stack
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
9CB0000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
50E0000
|
heap
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
3100000
|
unkown
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
9CD6000
|
heap
|
page read and write
|
||
98C7000
|
heap
|
page read and write
|
||
4360000
|
unclassified section
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
17EE000
|
stack
|
page read and write
|
||
38E9000
|
trusted library allocation
|
page read and write
|
||
1438000
|
heap
|
page read and write
|
||
4E66000
|
trusted library allocation
|
page read and write
|
||
12BD000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
38A7000
|
trusted library allocation
|
page read and write
|
||
1317000
|
trusted library allocation
|
page read and write
|
||
7FF5D717C000
|
unkown
|
page readonly
|
||
9EC3000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
123C000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
C8C5000
|
unkown
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
9B41000
|
unkown
|
page read and write
|
||
F0C000
|
heap
|
page read and write
|
||
A1F5000
|
heap
|
page read and write
|
||
12BC000
|
stack
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
99C0000
|
unkown
|
page read and write
|
||
E774000
|
unkown
|
page read and write
|
||
13A9000
|
heap
|
page read and write
|
||
7FF5D77B6000
|
unkown
|
page readonly
|
||
AB0000
|
heap
|
page read and write
|
||
105D000
|
heap
|
page read and write
|
||
1453000
|
heap
|
page read and write
|
||
1103000
|
trusted library allocation
|
page execute and read and write
|
||
112B4000
|
unkown
|
page read and write
|
||
99B000
|
stack
|
page read and write
|
||
F521000
|
unkown
|
page read and write
|
||
7618000
|
unkown
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
1431000
|
heap
|
page read and write
|
||
E778000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
3520000
|
unkown
|
page readonly
|
||
1435000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
A0A0000
|
heap
|
page read and write
|
||
515A000
|
trusted library allocation
|
page read and write
|
||
38B2000
|
trusted library allocation
|
page read and write
|
||
E77C000
|
unkown
|
page read and write
|
||
9C51000
|
heap
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
10D3000
|
trusted library allocation
|
page execute and read and write
|
||
391D000
|
trusted library allocation
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
9CC5000
|
heap
|
page read and write
|
||
7FF5D777A000
|
unkown
|
page readonly
|
||
A576000
|
heap
|
page read and write
|
||
4CE000
|
heap
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
2A54000
|
trusted library allocation
|
page read and write
|
||
7FF5D7507000
|
unkown
|
page readonly
|
||
9CAF000
|
heap
|
page read and write
|
||
7FB000
|
stack
|
page read and write
|
||
8B70000
|
unkown
|
page read and write
|
||
2E1C000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
152A000
|
trusted library allocation
|
page execute and read and write
|
||
1104000
|
trusted library allocation
|
page read and write
|
||
9CBC000
|
heap
|
page read and write
|
||
144E000
|
heap
|
page read and write
|
||
9AA8000
|
unkown
|
page read and write
|
||
98C0000
|
heap
|
page read and write
|
||
A5F1000
|
heap
|
page read and write
|
||
C8DA000
|
unkown
|
page read and write
|
||
9C9E000
|
heap
|
page read and write
|
||
A670000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
86E0000
|
unkown
|
page readonly
|
||
40B000
|
unkown
|
page execute read
|
||
38B7000
|
trusted library allocation
|
page read and write
|
||
9D6000
|
stack
|
page read and write
|
||
5332000
|
unkown
|
page readonly
|
||
A408000
|
unkown
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
AB7000
|
heap
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
A287000
|
heap
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
7FF5D6A4B000
|
unkown
|
page readonly
|
||
A6A1000
|
heap
|
page read and write
|
||
A0D8000
|
heap
|
page read and write
|
||
C806000
|
unkown
|
page read and write
|
||
A4E4000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page execute and read and write
|
||
559E000
|
stack
|
page read and write
|
||
A13E000
|
heap
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
49FD000
|
unkown
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
391000
|
unkown
|
page execute read
|
||
85BE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A3D9000
|
heap
|
page read and write
|
||
12BE000
|
stack
|
page read and write
|
||
A2F5000
|
heap
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
7FF5D75C1000
|
unkown
|
page readonly
|
||
35B0000
|
unkown
|
page read and write
|
||
1526000
|
trusted library allocation
|
page execute and read and write
|
||
5EE000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
3955000
|
trusted library allocation
|
page read and write
|
||
10FA000
|
trusted library allocation
|
page execute and read and write
|
||
11FE000
|
stack
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
C617000
|
unkown
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
9F88000
|
heap
|
page read and write
|
||
4CA000
|
heap
|
page read and write
|
||
4CEB000
|
trusted library allocation
|
page read and write
|
||
10F6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D7534000
|
unkown
|
page readonly
|
||
A19D000
|
heap
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
38E1000
|
trusted library allocation
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
1102000
|
trusted library allocation
|
page read and write
|
||
38E7000
|
trusted library allocation
|
page read and write
|
||
A213000
|
heap
|
page read and write
|
||
A423000
|
heap
|
page read and write
|
||
39AC000
|
trusted library allocation
|
page read and write
|
||
F62A000
|
heap
|
page read and write
|
||
178B000
|
trusted library allocation
|
page execute and read and write
|
||
A654000
|
heap
|
page read and write
|
||
7FF5D772C000
|
unkown
|
page readonly
|
||
9C9E000
|
heap
|
page read and write
|
||
9BB0000
|
heap
|
page read and write
|
||
7FF5D77FD000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
A1E1000
|
heap
|
page read and write
|
||
38C9000
|
trusted library allocation
|
page read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
98D6000
|
heap
|
page read and write
|
||
A8C000
|
heap
|
page read and write
|
||
A5F3000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
7FF5D738E000
|
unkown
|
page readonly
|
||
38DC000
|
trusted library allocation
|
page read and write
|
||
2E85000
|
trusted library allocation
|
page read and write
|
||
BF3E000
|
stack
|
page read and write
|
||
38BE000
|
trusted library allocation
|
page read and write
|
||
5330000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
5E7000
|
heap
|
page read and write
|
||
7FF5D7641000
|
unkown
|
page readonly
|
||
7FF5D7669000
|
unkown
|
page readonly
|
||
4570000
|
heap
|
page read and write
|
||
B86000
|
trusted library allocation
|
page execute and read and write
|
||
5EE000
|
heap
|
page read and write
|
||
166E000
|
stack
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
7FF5D7442000
|
unkown
|
page readonly
|
||
D3B000
|
stack
|
page read and write
|
||
9CB6000
|
heap
|
page read and write
|
||
A4A6000
|
heap
|
page read and write
|
||
A50A000
|
heap
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
99B3000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
2E50000
|
heap
|
page execute and read and write
|
||
5183000
|
heap
|
page execute and read and write
|
||
7E58000
|
stack
|
page read and write
|
||
98DF000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
B9B000
|
trusted library allocation
|
page execute and read and write
|
||
119B000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
38CA000
|
trusted library allocation
|
page read and write
|
||
A114000
|
heap
|
page read and write
|
||
7FF5D76E8000
|
unkown
|
page readonly
|
||
DC8000
|
heap
|
page read and write
|
||
7FF5D728E000
|
unkown
|
page readonly
|
||
5E7000
|
heap
|
page read and write
|
||
9BD9000
|
heap
|
page read and write
|
||
1438000
|
heap
|
page read and write
|
||
3767000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
A1B5000
|
heap
|
page read and write
|
||
3E85000
|
trusted library allocation
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
A578000
|
heap
|
page read and write
|
||
B5D000
|
trusted library allocation
|
page execute and read and write
|
||
7B10000
|
unkown
|
page read and write
|
||
9C86000
|
heap
|
page read and write
|
||
38D1000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
13DD000
|
heap
|
page read and write
|
||
1237000
|
heap
|
page read and write
|
||
15B1000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
A1A2000
|
heap
|
page read and write
|
||
A573000
|
heap
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
10EB1000
|
unkown
|
page read and write
|
||
9C6F000
|
heap
|
page read and write
|
||
B980000
|
unkown
|
page readonly
|
||
A384000
|
unkown
|
page read and write
|
||
7FF5D7703000
|
unkown
|
page readonly
|
||
8CB8000
|
stack
|
page read and write
|
||
1278000
|
heap
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
A622000
|
heap
|
page read and write
|
||
7FF5D66E3000
|
unkown
|
page readonly
|
||
1860000
|
heap
|
page read and write
|
||
7FF5D7643000
|
unkown
|
page readonly
|
||
76F8000
|
unkown
|
page read and write
|
||
3901000
|
trusted library allocation
|
page read and write
|
||
2DE1000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
158F000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
50CF000
|
trusted library allocation
|
page read and write
|
||
C73E000
|
unkown
|
page read and write
|
||
159B000
|
trusted library allocation
|
page execute and read and write
|
||
5EE000
|
heap
|
page read and write
|
||
8FD9000
|
stack
|
page read and write
|
||
3360000
|
unkown
|
page read and write
|
||
1156000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
7FF5D760E000
|
unkown
|
page readonly
|
||
38CA000
|
trusted library allocation
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
AA04000
|
unkown
|
page read and write
|
||
A2C8000
|
heap
|
page read and write
|
||
F52D000
|
unkown
|
page read and write
|
||
391D000
|
trusted library allocation
|
page read and write
|
||
A431000
|
heap
|
page read and write
|
||
9D6B000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
A5CD000
|
heap
|
page read and write
|
||
7FF5D7722000
|
unkown
|
page readonly
|
||
760B000
|
unkown
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
8900000
|
unkown
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
87D0000
|
unkown
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
9C89000
|
heap
|
page read and write
|
||
2957000
|
trusted library allocation
|
page read and write
|
||
38B8000
|
trusted library allocation
|
page read and write
|
||
5690000
|
unkown
|
page readonly
|
||
145B000
|
heap
|
page read and write
|
||
F532000
|
unkown
|
page read and write
|
||
AAA000
|
heap
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
3118000
|
trusted library allocation
|
page read and write
|
||
586E000
|
stack
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
9E80000
|
heap
|
page read and write
|
||
9E9B000
|
heap
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
2FFD000
|
stack
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
38BC000
|
trusted library allocation
|
page read and write
|
||
12D1000
|
trusted library allocation
|
page read and write
|
||
F530000
|
unkown
|
page read and write
|
||
2F61000
|
heap
|
page read and write
|
||
AAA000
|
heap
|
page read and write
|
||
38E8000
|
trusted library allocation
|
page read and write
|
||
9CA5000
|
heap
|
page read and write
|
||
38D8000
|
trusted library allocation
|
page read and write
|
||
4CE6000
|
trusted library allocation
|
page read and write
|
||
7FF5D7488000
|
unkown
|
page readonly
|
||
5E7000
|
heap
|
page read and write
|
||
9A98000
|
unkown
|
page read and write
|
||
2DCE000
|
trusted library allocation
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
7FF5D76C8000
|
unkown
|
page readonly
|
||
976000
|
stack
|
page read and write
|
||
4D40000
|
heap
|
page read and write
|
||
11E6000
|
trusted library allocation
|
page execute and read and write
|
||
556E000
|
stack
|
page read and write
|
||
A4CC000
|
heap
|
page read and write
|
||
13A9000
|
heap
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
9CB9000
|
heap
|
page read and write
|
||
11FB000
|
trusted library allocation
|
page execute and read and write
|
||
5E7000
|
heap
|
page read and write
|
||
9CAB000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1299000
|
heap
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
A472000
|
heap
|
page read and write
|
||
7FF5D743F000
|
unkown
|
page readonly
|
||
A078000
|
heap
|
page read and write
|
||
A1D1000
|
heap
|
page read and write
|
||
C496000
|
unkown
|
page read and write
|
||
35CD000
|
unkown
|
page read and write
|
||
8A70000
|
unkown
|
page read and write
|
||
A35F000
|
heap
|
page read and write
|
||
5893000
|
heap
|
page execute and read and write
|
||
2B85000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
548F000
|
stack
|
page read and write
|
||
7FF5CE343000
|
unkown
|
page readonly
|
||
A425000
|
heap
|
page read and write
|
||
2ECB000
|
trusted library allocation
|
page read and write
|
||
C8D8000
|
unkown
|
page read and write
|
||
9C8C000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5E7000
|
heap
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
1503000
|
trusted library allocation
|
page execute and read and write
|
||
C9A7000
|
unkown
|
page read and write
|
||
A39F000
|
unkown
|
page read and write
|
||
F55E000
|
unkown
|
page read and write
|
||
3907000
|
trusted library allocation
|
page read and write
|
||
1438000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
9CB9000
|
heap
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
E771000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
7FF5D75A6000
|
unkown
|
page readonly
|
||
4A44000
|
unkown
|
page read and write
|
||
7FF5D7244000
|
unkown
|
page readonly
|
||
1435000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
182C000
|
stack
|
page read and write
|
||
8870000
|
unkown
|
page readonly
|
||
1ECE000
|
stack
|
page read and write
|
||
112B0000
|
unkown
|
page read and write
|
||
3AE1000
|
trusted library allocation
|
page read and write
|
||
4E55000
|
trusted library allocation
|
page read and write
|
||
5270000
|
heap
|
page execute and read and write
|
||
8900000
|
unkown
|
page read and write
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
FEB000
|
heap
|
page read and write
|
||
38EE000
|
trusted library allocation
|
page read and write
|
||
A237000
|
unkown
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
13AE000
|
heap
|
page read and write
|
||
B559000
|
stack
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
9C17000
|
heap
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
A4D3000
|
heap
|
page read and write
|
||
2DD4000
|
trusted library allocation
|
page read and write
|
||
A491000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
39E3000
|
trusted library allocation
|
page read and write
|
||
A049000
|
heap
|
page read and write
|
||
1453000
|
heap
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
7FF5D770A000
|
unkown
|
page readonly
|
||
A3B3000
|
heap
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
4E64000
|
trusted library allocation
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
A5E9000
|
heap
|
page read and write
|
||
175D000
|
trusted library allocation
|
page execute and read and write
|
||
A0CE000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
7FF5D7450000
|
unkown
|
page readonly
|
||
2960000
|
heap
|
page read and write
|
||
38A1000
|
trusted library allocation
|
page read and write
|
||
11CF000
|
stack
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
997C000
|
stack
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
392A000
|
trusted library allocation
|
page read and write
|
||
7FF5D66E8000
|
unkown
|
page readonly
|
||
310E000
|
stack
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
A49D000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
10772000
|
unkown
|
page read and write
|
||
38B8000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
98FD000
|
stack
|
page read and write
|
||
502E000
|
trusted library allocation
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
DE2000
|
heap
|
page read and write
|
||
A9A0000
|
unkown
|
page read and write
|
||
A050000
|
heap
|
page read and write
|
||
D6E000
|
heap
|
page read and write
|
||
7FF5D7336000
|
unkown
|
page readonly
|
||
11E0000
|
heap
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
E00000
|
unkown
|
page readonly
|
||
2779000
|
heap
|
page read and write
|
||
1160000
|
unkown
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
94F4000
|
unkown
|
page read and write
|
||
C81C000
|
unkown
|
page read and write
|
||
1208000
|
heap
|
page read and write
|
||
3955000
|
trusted library allocation
|
page read and write
|
||
9C82000
|
heap
|
page read and write
|
||
977E000
|
stack
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
C4DC000
|
unkown
|
page read and write
|
||
38D1000
|
trusted library allocation
|
page read and write
|
||
7FF5D71A6000
|
unkown
|
page readonly
|
||
5EE000
|
heap
|
page read and write
|
||
2A38000
|
trusted library allocation
|
page read and write
|
||
9E3000
|
stack
|
page read and write
|
||
A3DE000
|
heap
|
page read and write
|
||
A5A3000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
87A0000
|
unkown
|
page read and write
|
||
15EA000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
DF3000
|
trusted library allocation
|
page execute and read and write
|
||
3AE4000
|
trusted library allocation
|
page read and write
|
||
49C2000
|
unkown
|
page read and write
|
||
A428000
|
heap
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
3904000
|
trusted library allocation
|
page read and write
|
||
7FF5D71BF000
|
unkown
|
page readonly
|
||
9CB7000
|
heap
|
page read and write
|
||
7FF5D71EF000
|
unkown
|
page readonly
|
||
38C9000
|
trusted library allocation
|
page read and write
|
||
55F0000
|
trusted library allocation
|
page read and write
|
||
2E06000
|
trusted library allocation
|
page read and write
|
||
C17000
|
trusted library allocation
|
page read and write
|
||
13E3000
|
heap
|
page read and write
|
There are 3127 hidden memdumps, click here to show them.