Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
EiPVv5yELP.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\huge[1].dat
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2499.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\45DE.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\62FC.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\blowfish.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsuAB0.tmp\liteFirewall.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Del.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\whhsvcw
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\whhsvcw:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsh46C8.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\INetC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\nsProcess.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsv9958.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\start.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
|
MSVC program database ver 7.00, 512*4023 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
There are 106 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\EiPVv5yELP.exe
|
"C:\Users\user\Desktop\EiPVv5yELP.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Users\user\AppData\Roaming\whhsvcw
|
C:\Users\user\AppData\Roaming\whhsvcw
|
||
C:\Users\user\AppData\Local\Temp\2499.exe
|
C:\Users\user\AppData\Local\Temp\2499.exe
|
||
C:\Users\user\AppData\Local\Temp\45DE.exe
|
C:\Users\user\AppData\Local\Temp\45DE.exe
|
||
C:\Users\user\AppData\Local\Temp\62FC.exe
|
C:\Users\user\AppData\Local\Temp\62FC.exe
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
"C:\Users\user\AppData\Local\Temp\setup.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0
(Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3728 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US
--service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0)
Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log"
--mojo-platform-channel-handle=4412 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0
Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log"
--mojo-platform-channel-handle=4492 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android
13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process
--no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2
--enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642839349
--mojo-platform-channel-handle=4608 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android
13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox
--log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2
--enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642849290
--mojo-platform-channel-handle=4680 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\whhsvcw
|
C:\Users\user\AppData\Roaming\whhsvcw
|
There are 21 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://foodypannyjsud.shop/api.
|
unknown
|
||
https://foodypannyjsud.shop/s
|
unknown
|
||
http://gebeus.ru/tmp/index.php
|
|||
http://cx5519.com/tmp/index.php
|
|||
contintnetksows.shop
|
|||
http://evilos.cc/tmp/index.php
|
|||
ellaboratepwsz.xyz
|
|||
swellfrrgwwos.xyz
|
|||
foodypannyjsud.shop
|
|||
pedestriankodwu.xyz
|
|||
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
|
unknown
|
||
https://support.google.com/chrome/answer/6098869
|
unknown
|
||
https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html
|
unknown
|
||
https://api.msn.com:443/v1/news/Feed/Windows?
|
unknown
|
||
https://word.office.comM
|
unknown
|
||
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
|
unknown
|
||
https://foodypannyjsud.shop/a
|
unknown
|
||
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
|
unknown
|
||
http://crbug.com/510270
|
unknown
|
||
https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
|
unknown
|
||
https://chrome.google.com/webstore?hl=urCtrl$2
|
unknown
|
||
http://xiexie.wf/22_551/huge.datOK
|
unknown
|
||
http://crbug.com/378067
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://foodypannyjsud.shop/Q
|
unknown
|
||
https://chrome.google.com/webstore?hl=trCtrl$1
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
|
unknown
|
||
https://www.google.com/cloudprint
|
unknown
|
||
https://passwords.google.com
|
unknown
|
||
https://aui-cdn.atlassian.com/
|
unknown
|
||
http://crbug.com/497301
|
unknown
|
||
https://github.com/JamesNK/Newtonsoft.Json/issues/652
|
unknown
|
||
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
|
unknown
|
||
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
|
unknown
|
||
https://wns.windows.com/e
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://bageyou.xyz
|
unknown
|
||
http://crbug.com/642141
|
unknown
|
||
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://bitbucket.org/
|
unknown
|
||
https://support.google.com/chromebook?p=app_intent
|
unknown
|
||
http://crbug.com/717501
|
unknown
|
||
http://crbug.com/957772
|
unknown
|
||
http://crbug.com/839189
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://rouonixon.com/4/6150781/?ymid=831901360386478080
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
|
unknown
|
||
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html&
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlT&r
|
unknown
|
||
https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://xiexie.wf/22_551/huge.dat
|
unknown
|
||
http://xiexie.wf/22_551/huge.datSH/x&
|
unknown
|
||
http://crbug.com/819404
|
unknown
|
||
https://foodypannyjsud.shop/)
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://crbug.com/514696
|
unknown
|
||
https://foodypannyjsud.shop/apig
|
unknown
|
||
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chrome.google.com/webstore?hl=ukCtrl$1
|
unknown
|
||
https://android.notify.windows.com/iOS
|
unknown
|
||
http://api.install-stat.debug.world/clients/installs
|
unknown
|
||
https://outlook.come
|
unknown
|
||
https://cdn.cookielaw.org/
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
|
unknown
|
||
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
|
unknown
|
||
https://support.google.com/chrome/a/answer/9122284
|
unknown
|
||
https://chrome.google.com/webstore/
|
unknown
|
||
https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
|
unknown
|
||
https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
|
unknown
|
||
https://rouonixon.com/4/6150781/?ymid=831901360386478080&var=6150780&price=
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
|
unknown
|
||
https://api.msn.com/v1/news/Feed/Windows?
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-CNCtrl$1
|
unknown
|
||
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
|
unknown
|
||
https://api.msn.com/I
|
unknown
|
||
https://support.google.com/chrome/answer/6258784
|
unknown
|
||
http://www.unicode.org/copyright.html
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
|
unknown
|
||
http://api.install-stat.debug.world/clients/activitye
|
unknown
|
||
http://crbug.com/775961
|
unknown
|
||
https://support.google.com/chrome/?p=plugin_flash
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
unknown
|
European Union
|
||
186.101.193.110
|
unknown
|
Ecuador
|
||
141.8.192.126
|
unknown
|
Russian Federation
|
||
185.68.16.7
|
unknown
|
Ukraine
|
||
127.0.0.127
|
unknown
|
unknown
|
||
146.70.169.164
|
unknown
|
United Kingdom
|
||
185.166.143.48
|
unknown
|
Germany
|
||
172.67.221.174
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@explorerframe.dll,-13137
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@explorerframe.dll,-13138
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000006042C
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\ratvarre\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000401B2
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Sid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Pid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GamePall
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
|
DontShowUI
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
tmp_uid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
reg
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
uid
|
||
HKEY_CURRENT_USER\Control Panel\Cursors
|
AppStarting
|
There are 208 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4371000
|
unclassified section
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
29D1000
|
unclassified section
|
page read and write
|
||
91D000
|
heap
|
page read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
3240000
|
direct allocation
|
page execute and read and write
|
||
7FF5DF0C9000
|
unkown
|
page readonly
|
||
9A000
|
stack
|
page read and write
|
||
7FF5DF443000
|
unkown
|
page readonly
|
||
4006000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
7FF5DF5E9000
|
unkown
|
page readonly
|
||
A08F000
|
heap
|
page read and write
|
||
401B000
|
trusted library allocation
|
page read and write
|
||
A38B000
|
heap
|
page read and write
|
||
7FF5DF53F000
|
unkown
|
page readonly
|
||
523E000
|
stack
|
page read and write
|
||
9F42000
|
heap
|
page read and write
|
||
402C000
|
trusted library allocation
|
page read and write
|
||
1A1D000
|
heap
|
page read and write
|
||
1273000
|
trusted library allocation
|
page execute and read and write
|
||
73B4000
|
unkown
|
page read and write
|
||
29E4000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
unkown
|
page readonly
|
||
9FC4000
|
heap
|
page read and write
|
||
A6EA000
|
unkown
|
page read and write
|
||
7FF5DEFE8000
|
unkown
|
page readonly
|
||
7940000
|
unkown
|
page readonly
|
||
18A5000
|
heap
|
page read and write
|
||
3F67000
|
trusted library allocation
|
page read and write
|
||
9E15000
|
heap
|
page read and write
|
||
2CFD000
|
stack
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
2F21000
|
trusted library allocation
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
9A79000
|
heap
|
page read and write
|
||
5A23000
|
trusted library allocation
|
page read and write
|
||
BFAD000
|
unkown
|
page read and write
|
||
A6CF000
|
unkown
|
page read and write
|
||
A35A000
|
heap
|
page read and write
|
||
4088000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
4016000
|
trusted library allocation
|
page read and write
|
||
A2CD000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
14B6000
|
trusted library allocation
|
page execute and read and write
|
||
9F78000
|
unkown
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
7FF5DF5F0000
|
unkown
|
page readonly
|
||
7FF5DF452000
|
unkown
|
page readonly
|
||
A283000
|
heap
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
A2E4000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
1A54000
|
heap
|
page read and write
|
||
2890000
|
unkown
|
page readonly
|
||
2ACF000
|
stack
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
320C000
|
stack
|
page read and write
|
||
1A27000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
1430000
|
trusted library allocation
|
page execute and read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
4004000
|
trusted library allocation
|
page read and write
|
||
100C1000
|
unkown
|
page read and write
|
||
27D7000
|
trusted library allocation
|
page read and write
|
||
404E000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
9CA3000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
9FA9000
|
heap
|
page read and write
|
||
61B0000
|
heap
|
page read and write
|
||
3BE5000
|
trusted library allocation
|
page read and write
|
||
9F50000
|
heap
|
page read and write
|
||
1AA0000
|
heap
|
page read and write
|
||
2B75000
|
trusted library allocation
|
page read and write
|
||
9C45000
|
heap
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
4037000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
9ED2000
|
heap
|
page read and write
|
||
127D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF2ED000
|
unkown
|
page readonly
|
||
A15E000
|
heap
|
page read and write
|
||
555E000
|
stack
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
E3F000
|
stack
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
2BC8000
|
trusted library allocation
|
page read and write
|
||
B7D000
|
trusted library allocation
|
page execute and read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
1286000
|
heap
|
page read and write
|
||
88B000
|
stack
|
page read and write
|
||
7DF4E6781000
|
unkown
|
page execute read
|
||
8810000
|
unkown
|
page read and write
|
||
A256000
|
heap
|
page read and write
|
||
9E6C000
|
heap
|
page read and write
|
||
9E41000
|
heap
|
page read and write
|
||
4DF6000
|
trusted library allocation
|
page read and write
|
||
66CE000
|
stack
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
340D000
|
stack
|
page read and write
|
||
4056000
|
trusted library allocation
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
1062A000
|
unkown
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
544E000
|
trusted library allocation
|
page read and write
|
||
D3C000
|
heap
|
page read and write
|
||
9BF1000
|
heap
|
page read and write
|
||
4FE2000
|
trusted library allocation
|
page read and write
|
||
9CA1000
|
heap
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
1A4E000
|
heap
|
page read and write
|
||
5555000
|
trusted library allocation
|
page read and write
|
||
1AD9000
|
heap
|
page read and write
|
||
C474000
|
unkown
|
page read and write
|
||
BEB0000
|
unkown
|
page read and write
|
||
A0F7000
|
unkown
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
5404000
|
trusted library allocation
|
page read and write
|
||
C75000
|
stack
|
page read and write
|
||
5803000
|
heap
|
page execute and read and write
|
||
2BA0000
|
heap
|
page execute and read and write
|
||
A2EC000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
3875000
|
trusted library allocation
|
page read and write
|
||
EC6000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FF5DEF94000
|
unkown
|
page readonly
|
||
901B000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
BEF0000
|
heap
|
page read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
7FF5DF39C000
|
unkown
|
page readonly
|
||
9CC0000
|
heap
|
page read and write
|
||
27F0000
|
unkown
|
page readonly
|
||
2E60000
|
unkown
|
page read and write
|
||
3FF1000
|
trusted library allocation
|
page read and write
|
||
1ADC000
|
heap
|
page read and write
|
||
7DF5E895F000
|
unkown
|
page readonly
|
||
505E000
|
stack
|
page read and write
|
||
9380000
|
unkown
|
page readonly
|
||
7FF5DF4AB000
|
unkown
|
page readonly
|
||
DAE000
|
stack
|
page read and write
|
||
C50C000
|
unkown
|
page read and write
|
||
9E8D000
|
heap
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
FD80000
|
unkown
|
page read and write
|
||
5530000
|
trusted library allocation
|
page execute and read and write
|
||
12A7000
|
trusted library allocation
|
page execute and read and write
|
||
A41C000
|
heap
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
9C8F000
|
heap
|
page read and write
|
||
2C2C000
|
trusted library allocation
|
page read and write
|
||
FA7000
|
trusted library allocation
|
page execute and read and write
|
||
F3A000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
257B000
|
trusted library allocation
|
page execute and read and write
|
||
1A54000
|
heap
|
page read and write
|
||
1458000
|
heap
|
page read and write
|
||
9CCC000
|
heap
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page execute and read and write
|
||
EECB000
|
unkown
|
page read and write
|
||
838B000
|
stack
|
page read and write
|
||
9DCA000
|
heap
|
page read and write
|
||
9CB7000
|
heap
|
page read and write
|
||
5420000
|
trusted library allocation
|
page read and write
|
||
A3FC000
|
heap
|
page read and write
|
||
9EF4000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
29A4000
|
trusted library allocation
|
page read and write
|
||
672E000
|
stack
|
page read and write
|
||
9C89000
|
heap
|
page read and write
|
||
C34E000
|
unkown
|
page read and write
|
||
53D8000
|
trusted library allocation
|
page read and write
|
||
B56000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
1278000
|
heap
|
page read and write
|
||
6BB5000
|
heap
|
page read and write
|
||
A1D2000
|
heap
|
page read and write
|
||
9CA7000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
7FF5DF398000
|
unkown
|
page readonly
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
1AB0000
|
heap
|
page read and write
|
||
3BE1000
|
trusted library allocation
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
7FF5DEFAC000
|
unkown
|
page readonly
|
||
9EFD000
|
heap
|
page read and write
|
||
502E000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
2606000
|
trusted library allocation
|
page read and write
|
||
1455000
|
heap
|
page read and write
|
||
2ABE000
|
trusted library allocation
|
page read and write
|
||
507000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
14B7000
|
trusted library allocation
|
page execute and read and write
|
||
9C9F000
|
stack
|
page read and write
|
||
40FA000
|
trusted library allocation
|
page read and write
|
||
2620000
|
heap
|
page read and write
|
||
9A7000
|
heap
|
page read and write
|
||
9B8A000
|
heap
|
page read and write
|
||
1ADC000
|
heap
|
page read and write
|
||
CF6000
|
trusted library allocation
|
page execute and read and write
|
||
104C1000
|
unkown
|
page read and write
|
||
2870000
|
unkown
|
page read and write
|
||
2AD7000
|
trusted library allocation
|
page read and write
|
||
2AE5000
|
trusted library allocation
|
page read and write
|
||
3FF6000
|
trusted library allocation
|
page read and write
|
||
9CAA000
|
heap
|
page read and write
|
||
9CC1000
|
heap
|
page read and write
|
||
4AD8000
|
trusted library allocation
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
4040000
|
trusted library allocation
|
page read and write
|
||
A201000
|
heap
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
7FF5DEFCB000
|
unkown
|
page readonly
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
20E0000
|
heap
|
page read and write
|
||
1AD4000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
4FA000
|
heap
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
FE8000
|
heap
|
page read and write
|
||
1ACC000
|
heap
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page execute and read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
C298000
|
unkown
|
page read and write
|
||
9B95000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
54E9000
|
trusted library allocation
|
page read and write
|
||
9CB2000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
C93000
|
heap
|
page read and write
|
||
95F0000
|
unkown
|
page read and write
|
||
5B70000
|
unkown
|
page readonly
|
||
A085000
|
heap
|
page read and write
|
||
53F1000
|
trusted library allocation
|
page read and write
|
||
9F9B000
|
heap
|
page read and write
|
||
A278000
|
heap
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
4EE1000
|
trusted library allocation
|
page read and write
|
||
1ABA000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
7FF5DF067000
|
unkown
|
page readonly
|
||
97F3000
|
unkown
|
page read and write
|
||
26DD000
|
stack
|
page read and write
|
||
4108000
|
trusted library allocation
|
page read and write
|
||
10603000
|
unkown
|
page read and write
|
||
9CB7000
|
heap
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
400C000
|
trusted library allocation
|
page read and write
|
||
3C50000
|
heap
|
page read and write
|
||
588E000
|
stack
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
9D46000
|
heap
|
page read and write
|
||
10811000
|
unkown
|
page read and write
|
||
1AA9000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
29D1000
|
trusted library allocation
|
page read and write
|
||
48A0000
|
unkown
|
page read and write
|
||
B9BF000
|
stack
|
page read and write
|
||
2E24000
|
trusted library allocation
|
page read and write
|
||
1ADA000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
A299000
|
heap
|
page read and write
|
||
2787000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
6B60000
|
heap
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
1204000
|
trusted library allocation
|
page read and write
|
||
7FF5DF606000
|
unkown
|
page readonly
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
7FF5DF091000
|
unkown
|
page readonly
|
||
CF0000
|
heap
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
5591000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
7FF5DF09B000
|
unkown
|
page readonly
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
2F81000
|
trusted library allocation
|
page read and write
|
||
A107000
|
heap
|
page read and write
|
||
30F0000
|
remote allocation
|
page read and write
|
||
9C80000
|
heap
|
page read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
2DFC000
|
stack
|
page read and write
|
||
DE6000
|
stack
|
page read and write
|
||
53D6000
|
trusted library allocation
|
page read and write
|
||
3F57000
|
trusted library allocation
|
page read and write
|
||
2B4C000
|
trusted library allocation
|
page read and write
|
||
4284000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
1331000
|
trusted library allocation
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
1055000
|
unkown
|
page execute read
|
||
3BB7000
|
trusted library allocation
|
page read and write
|
||
9CAD000
|
heap
|
page read and write
|
||
8810000
|
unkown
|
page read and write
|
||
A11C000
|
heap
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
58EE000
|
stack
|
page read and write
|
||
7FF5DF3F7000
|
unkown
|
page readonly
|
||
1050000
|
heap
|
page read and write
|
||
9CCF000
|
heap
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
498000
|
heap
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
830F000
|
stack
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
402E000
|
trusted library allocation
|
page read and write
|
||
D21000
|
unkown
|
page execute read
|
||
96DF000
|
unkown
|
page read and write
|
||
E2A000
|
trusted library allocation
|
page execute and read and write
|
||
2F20000
|
unkown
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
11F6000
|
trusted library allocation
|
page execute and read and write
|
||
A23B000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
7230000
|
unkown
|
page read and write
|
||
65CD000
|
stack
|
page read and write
|
||
D6F000
|
stack
|
page read and write
|
||
13A0000
|
unkown
|
page readonly
|
||
4072000
|
trusted library allocation
|
page read and write
|
||
3107000
|
stack
|
page read and write
|
||
2E20000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
heap
|
page execute and read and write
|
||
AFF000
|
stack
|
page read and write
|
||
4016000
|
trusted library allocation
|
page read and write
|
||
E91000
|
unkown
|
page read and write
|
||
7FF5DF211000
|
unkown
|
page readonly
|
||
99AB000
|
unkown
|
page read and write
|
||
A0CD000
|
heap
|
page read and write
|
||
244F000
|
stack
|
page read and write
|
||
29E6000
|
trusted library allocation
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
1A27000
|
heap
|
page read and write
|
||
BEB0000
|
unkown
|
page read and write
|
||
59FC000
|
trusted library allocation
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
C19D000
|
unkown
|
page read and write
|
||
1B2E000
|
stack
|
page read and write
|
||
B09E000
|
stack
|
page read and write
|
||
B830000
|
unkown
|
page readonly
|
||
403E000
|
trusted library allocation
|
page read and write
|
||
2577000
|
trusted library allocation
|
page execute and read and write
|
||
4FBE000
|
trusted library allocation
|
page read and write
|
||
A171000
|
heap
|
page read and write
|
||
B66000
|
stack
|
page read and write
|
||
F7D000
|
trusted library allocation
|
page execute and read and write
|
||
4004000
|
trusted library allocation
|
page read and write
|
||
479B000
|
unkown
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
9CAC000
|
heap
|
page read and write
|
||
290B000
|
heap
|
page read and write
|
||
1226000
|
heap
|
page read and write
|
||
A898000
|
heap
|
page read and write
|
||
53ED000
|
trusted library allocation
|
page read and write
|
||
9A44000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
104C1000
|
unkown
|
page read and write
|
||
6DEC000
|
stack
|
page read and write
|
||
C01A000
|
unkown
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
2C65000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
259E000
|
stack
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page execute and read and write
|
||
C7E000
|
stack
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
53CB000
|
trusted library allocation
|
page read and write
|
||
9A8D000
|
heap
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
A00B000
|
heap
|
page read and write
|
||
6B4C000
|
stack
|
page read and write
|
||
6A4C000
|
stack
|
page read and write
|
||
9E54000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
338C000
|
stack
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
A318000
|
heap
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
9C73000
|
heap
|
page read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
9EC1000
|
heap
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
401E000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
1AD1000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
ACAE000
|
stack
|
page read and write
|
||
7B4C000
|
stack
|
page read and write
|
||
BD6000
|
stack
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
129A000
|
trusted library allocation
|
page execute and read and write
|
||
3A01000
|
trusted library allocation
|
page read and write
|
||
7D0E000
|
stack
|
page read and write
|
||
558A000
|
trusted library allocation
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
A179000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
120B000
|
trusted library allocation
|
page execute and read and write
|
||
505000
|
heap
|
page read and write
|
||
7DF4E6761000
|
unkown
|
page execute read
|
||
9CBF000
|
heap
|
page read and write
|
||
3F91000
|
trusted library allocation
|
page read and write
|
||
5A10000
|
trusted library allocation
|
page read and write
|
||
7FF5DF41B000
|
unkown
|
page readonly
|
||
2A5E000
|
stack
|
page read and write
|
||
551E000
|
stack
|
page read and write
|
||
3FF5000
|
trusted library allocation
|
page read and write
|
||
25C1000
|
trusted library allocation
|
page read and write
|
||
104C4000
|
unkown
|
page read and write
|
||
4031000
|
trusted library allocation
|
page read and write
|
||
1A3E000
|
heap
|
page read and write
|
||
549F000
|
stack
|
page read and write
|
||
A42A000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
12A6000
|
trusted library allocation
|
page execute and read and write
|
||
4011000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
1320000
|
trusted library allocation
|
page execute and read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
7DF5E896A000
|
unkown
|
page readonly
|
||
2E30000
|
unkown
|
page read and write
|
||
4032000
|
trusted library allocation
|
page read and write
|
||
9C8E000
|
heap
|
page read and write
|
||
7FF5DF20A000
|
unkown
|
page readonly
|
||
A334000
|
heap
|
page read and write
|
||
404E000
|
trusted library allocation
|
page read and write
|
||
9605000
|
unkown
|
page read and write
|
||
5550000
|
trusted library allocation
|
page read and write
|
||
9704000
|
unkown
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
1AA0000
|
heap
|
page read and write
|
||
8BE000
|
heap
|
page read and write
|
||
9D1F000
|
stack
|
page read and write
|
||
128A000
|
heap
|
page read and write
|
||
9CD1000
|
heap
|
page read and write
|
||
2F17000
|
trusted library allocation
|
page read and write
|
||
EF04000
|
unkown
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
8800000
|
unkown
|
page read and write
|
||
F17000
|
heap
|
page read and write
|
||
1AD9000
|
heap
|
page read and write
|
||
2D53000
|
trusted library allocation
|
page read and write
|
||
100A000
|
heap
|
page read and write
|
||
3DBE000
|
trusted library allocation
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
4027000
|
trusted library allocation
|
page read and write
|
||
4045000
|
trusted library allocation
|
page read and write
|
||
552F000
|
stack
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
B38000
|
heap
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
A29B000
|
heap
|
page read and write
|
||
997F000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
9A4A000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2E60000
|
unkown
|
page read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
43B1000
|
heap
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
A146000
|
heap
|
page read and write
|
||
2BC9000
|
trusted library allocation
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
2B42000
|
trusted library allocation
|
page read and write
|
||
9CA1000
|
heap
|
page read and write
|
||
4015000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
9E99000
|
heap
|
page read and write
|
||
B73000
|
trusted library allocation
|
page execute and read and write
|
||
9C51000
|
heap
|
page read and write
|
||
A1E2000
|
heap
|
page read and write
|
||
11EB000
|
trusted library allocation
|
page execute and read and write
|
||
1337000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
7FF5DF3C6000
|
unkown
|
page readonly
|
||
108E4000
|
unkown
|
page read and write
|
||
5C1C000
|
stack
|
page read and write
|
||
E4F000
|
heap
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
9C8F000
|
heap
|
page read and write
|
||
7FF5DF4D5000
|
unkown
|
page readonly
|
||
1203000
|
trusted library allocation
|
page execute and read and write
|
||
418000
|
unkown
|
page readonly
|
||
FEC1000
|
unkown
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
C58000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
128F000
|
heap
|
page read and write
|
||
A367000
|
heap
|
page read and write
|
||
1257000
|
heap
|
page read and write
|
||
B9E0000
|
unkown
|
page read and write
|
||
9CD2000
|
heap
|
page read and write
|
||
4E25000
|
trusted library allocation
|
page read and write
|
||
1AB2000
|
heap
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
41D1000
|
trusted library allocation
|
page read and write
|
||
9C33000
|
heap
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
9729000
|
unkown
|
page read and write
|
||
608C000
|
stack
|
page read and write
|
||
9EEB000
|
heap
|
page read and write
|
||
BF9B000
|
unkown
|
page read and write
|
||
339D000
|
unkown
|
page read and write
|
||
A314000
|
heap
|
page read and write
|
||
7FF5DF60D000
|
unkown
|
page readonly
|
||
52B2000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
EEC6000
|
unkown
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
9EF0000
|
heap
|
page read and write
|
||
4CAD000
|
stack
|
page read and write
|
||
1AC4000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page execute and read and write
|
||
9E12000
|
heap
|
page read and write
|
||
9DD2000
|
heap
|
page read and write
|
||
8810000
|
unkown
|
page read and write
|
||
9F04000
|
heap
|
page read and write
|
||
CD0000
|
trusted library allocation
|
page read and write
|
||
2854000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
4855000
|
unkown
|
page read and write
|
||
AB0D000
|
stack
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
2600000
|
trusted library allocation
|
page read and write
|
||
2F7F000
|
trusted library allocation
|
page read and write
|
||
4006000
|
trusted library allocation
|
page read and write
|
||
10002000
|
unkown
|
page readonly
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
2F11000
|
trusted library allocation
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
7FF5DF366000
|
unkown
|
page readonly
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
5A52000
|
unkown
|
page readonly
|
||
EBD000
|
trusted library allocation
|
page execute and read and write
|
||
14D0000
|
heap
|
page read and write
|
||
C6B000
|
stack
|
page read and write
|
||
55F0000
|
heap
|
page execute and read and write
|
||
52BC000
|
trusted library allocation
|
page read and write
|
||
7FF5DF567000
|
unkown
|
page readonly
|
||
9C86000
|
heap
|
page read and write
|
||
4016000
|
trusted library allocation
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
1AA0000
|
heap
|
page read and write
|
||
47EC000
|
unkown
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
14AA000
|
trusted library allocation
|
page execute and read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
5A14000
|
trusted library allocation
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
A08E000
|
heap
|
page read and write
|
||
10F6000
|
stack
|
page read and write
|
||
7FF5DEFA6000
|
unkown
|
page readonly
|
||
EF6000
|
heap
|
page read and write
|
||
55AC000
|
stack
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
C4BE000
|
unkown
|
page read and write
|
||
7FF5DF156000
|
unkown
|
page readonly
|
||
7FF5DF0CC000
|
unkown
|
page readonly
|
||
2E60000
|
unkown
|
page read and write
|
||
BFC3000
|
unkown
|
page read and write
|
||
9CC1000
|
heap
|
page read and write
|
||
3FF8000
|
trusted library allocation
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
F32000
|
heap
|
page read and write
|
||
2F1F000
|
trusted library allocation
|
page read and write
|
||
1AD4000
|
heap
|
page read and write
|
||
9E68000
|
heap
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
560E000
|
stack
|
page read and write
|
||
9CBD000
|
heap
|
page read and write
|
||
2A3B000
|
heap
|
page read and write
|
||
11E7000
|
trusted library allocation
|
page execute and read and write
|
||
2C91000
|
trusted library allocation
|
page read and write
|
||
4016000
|
trusted library allocation
|
page read and write
|
||
9E8A000
|
heap
|
page read and write
|
||
107D2000
|
heap
|
page read and write
|
||
9EA7000
|
heap
|
page read and write
|
||
2F10000
|
unkown
|
page read and write
|
||
4073000
|
trusted library allocation
|
page read and write
|
||
7FF5DF095000
|
unkown
|
page readonly
|
||
1A16000
|
heap
|
page read and write
|
||
A88F000
|
heap
|
page read and write
|
||
D60000
|
unkown
|
page read and write
|
||
6BB0000
|
heap
|
page read and write
|
||
9C43000
|
heap
|
page read and write
|
||
848E000
|
stack
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
A090000
|
heap
|
page read and write
|
||
7FF5DF248000
|
unkown
|
page readonly
|
||
54E1000
|
trusted library allocation
|
page read and write
|
||
54D9000
|
trusted library allocation
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
2F20000
|
unkown
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
A1CA000
|
heap
|
page read and write
|
||
10B8000
|
heap
|
page read and write
|
||
CF6000
|
heap
|
page read and write
|
||
5047000
|
trusted library allocation
|
page read and write
|
||
9CA5000
|
heap
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
A394000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
59CF000
|
stack
|
page read and write
|
||
405D000
|
trusted library allocation
|
page read and write
|
||
4286000
|
trusted library allocation
|
page read and write
|
||
D02000
|
trusted library allocation
|
page read and write
|
||
A124000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
A3D9000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
5460000
|
trusted library allocation
|
page execute and read and write
|
||
28EB000
|
heap
|
page execute and read and write
|
||
9E0000
|
unkown
|
page readonly
|
||
4B76000
|
trusted library allocation
|
page read and write
|
||
558C000
|
trusted library allocation
|
page read and write
|
||
14CB000
|
trusted library allocation
|
page execute and read and write
|
||
2B73000
|
trusted library allocation
|
page read and write
|
||
9D57000
|
heap
|
page read and write
|
||
2E20000
|
trusted library allocation
|
page read and write
|
||
A43C000
|
heap
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
3F81000
|
trusted library allocation
|
page read and write
|
||
9C83000
|
heap
|
page read and write
|
||
A6D2000
|
unkown
|
page read and write
|
||
99C3000
|
heap
|
page read and write
|
||
38F0000
|
remote allocation
|
page read and write
|
||
2FAB000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
576C000
|
trusted library allocation
|
page read and write
|
||
4FCE000
|
trusted library allocation
|
page read and write
|
||
7FF5DF21F000
|
unkown
|
page readonly
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
4046000
|
trusted library allocation
|
page read and write
|
||
9CAD000
|
heap
|
page read and write
|
||
9CBC000
|
heap
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
101F000
|
stack
|
page read and write
|
||
401F000
|
trusted library allocation
|
page read and write
|
||
5CC0000
|
heap
|
page read and write
|
||
8810000
|
unkown
|
page read and write
|
||
9CC5000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page read and write
|
||
1AD4000
|
heap
|
page read and write
|
||
2F8F000
|
trusted library allocation
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
7FF5DF4C6000
|
unkown
|
page readonly
|
||
211000
|
unkown
|
page execute read
|
||
494D000
|
stack
|
page read and write
|
||
CD3000
|
trusted library allocation
|
page execute and read and write
|
||
98A1000
|
unkown
|
page read and write
|
||
3737000
|
trusted library allocation
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
9C80000
|
heap
|
page read and write
|
||
A0CB000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
A198000
|
heap
|
page read and write
|
||
5093000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
1AAD000
|
heap
|
page read and write
|
||
C149000
|
unkown
|
page read and write
|
||
A3D4000
|
heap
|
page read and write
|
||
10648000
|
unkown
|
page read and write
|
||
88E0000
|
unkown
|
page read and write
|
||
1ACC000
|
heap
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
A400000
|
heap
|
page read and write
|
||
4E23000
|
trusted library allocation
|
page read and write
|
||
7FF5DF195000
|
unkown
|
page readonly
|
||
A15B000
|
heap
|
page read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
7FF5DF519000
|
unkown
|
page readonly
|
||
10DD000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
10627000
|
unkown
|
page read and write
|
||
1AC3000
|
heap
|
page read and write
|
||
4015000
|
trusted library allocation
|
page read and write
|
||
9D43000
|
heap
|
page read and write
|
||
A14A000
|
heap
|
page read and write
|
||
9C85000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
9C31000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
4269000
|
trusted library allocation
|
page read and write
|
||
38DF000
|
stack
|
page read and write
|
||
5410000
|
trusted library allocation
|
page read and write
|
||
9FE6000
|
heap
|
page read and write
|
||
1ACA000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
2F47000
|
trusted library allocation
|
page read and write
|
||
A023000
|
heap
|
page read and write
|
||
1494000
|
trusted library allocation
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
33C0000
|
unkown
|
page readonly
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
E06000
|
heap
|
page read and write
|
||
9EBE000
|
heap
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
20C0000
|
heap
|
page read and write
|
||
7FF5DF388000
|
unkown
|
page readonly
|
||
4015000
|
trusted library allocation
|
page read and write
|
||
1AA0000
|
heap
|
page read and write
|
||
986000
|
stack
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
2C25000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
5420000
|
heap
|
page read and write
|
||
A2B5000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
4828000
|
unkown
|
page read and write
|
||
7FF5DF0F6000
|
unkown
|
page readonly
|
||
9CB8000
|
heap
|
page read and write
|
||
10B7000
|
trusted library allocation
|
page read and write
|
||
7FF5DF1D1000
|
unkown
|
page readonly
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
505E000
|
stack
|
page read and write
|
||
9A2D000
|
heap
|
page read and write
|
||
A168000
|
heap
|
page read and write
|
||
1A3F000
|
heap
|
page read and write
|
||
BF7E000
|
unkown
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
4035000
|
trusted library allocation
|
page read and write
|
||
94C0000
|
unkown
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
A16A000
|
heap
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
53DE000
|
trusted library allocation
|
page read and write
|
||
9F2A000
|
unkown
|
page read and write
|
||
7FF5DF3DF000
|
unkown
|
page readonly
|
||
9FC8000
|
heap
|
page read and write
|
||
47F3000
|
unkown
|
page read and write
|
||
54C6000
|
trusted library allocation
|
page read and write
|
||
7FF5DF5BE000
|
unkown
|
page readonly
|
||
262E000
|
stack
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
8800000
|
unkown
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
34B0000
|
unkown
|
page readonly
|
||
2637000
|
trusted library allocation
|
page read and write
|
||
9CAA000
|
heap
|
page read and write
|
||
7FF5DEFDD000
|
unkown
|
page readonly
|
||
5530000
|
heap
|
page read and write
|
||
A27D000
|
heap
|
page read and write
|
||
7FF5DF361000
|
unkown
|
page readonly
|
||
276F000
|
stack
|
page read and write
|
||
4824000
|
unkown
|
page read and write
|
||
9716000
|
unkown
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
A37C000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
53F2000
|
trusted library allocation
|
page read and write
|
||
A28E000
|
heap
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
2A1E000
|
heap
|
page read and write
|
||
7FF5DF122000
|
unkown
|
page readonly
|
||
8890000
|
unkown
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
7FF5DEFAF000
|
unkown
|
page readonly
|
||
9C67000
|
heap
|
page read and write
|
||
9CB9000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
134B000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4E67A1000
|
unkown
|
page execute read
|
||
439000
|
unkown
|
page readonly
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
A0F3000
|
heap
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
F2D000
|
trusted library allocation
|
page execute and read and write
|
||
9FC3000
|
unkown
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
9CC1000
|
heap
|
page read and write
|
||
8810000
|
unkown
|
page read and write
|
||
4612000
|
trusted library allocation
|
page read and write
|
||
7FF5DF4E3000
|
unkown
|
page readonly
|
||
5474000
|
trusted library allocation
|
page read and write
|
||
4071000
|
trusted library allocation
|
page read and write
|
||
9E4A000
|
heap
|
page read and write
|
||
BA76000
|
stack
|
page read and write
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
73C3000
|
unkown
|
page read and write
|
||
5095000
|
trusted library allocation
|
page read and write
|
||
534E000
|
stack
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
987C000
|
unkown
|
page read and write
|
||
5A4E000
|
stack
|
page read and write
|
||
16B5000
|
trusted library allocation
|
page read and write
|
||
9F7C000
|
unkown
|
page read and write
|
||
4119000
|
trusted library allocation
|
page read and write
|
||
1ACC000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
9F3F000
|
heap
|
page read and write
|
||
4B84000
|
trusted library allocation
|
page read and write
|
||
1AA0000
|
heap
|
page read and write
|
||
5771000
|
trusted library allocation
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
1600000
|
trusted library allocation
|
page execute and read and write
|
||
10BD000
|
stack
|
page read and write
|
||
7DF4E6770000
|
unkown
|
page readonly
|
||
F17000
|
heap
|
page read and write
|
||
9951000
|
heap
|
page read and write
|
||
1207000
|
trusted library allocation
|
page execute and read and write
|
||
5535000
|
trusted library allocation
|
page read and write
|
||
7FF5DF0C3000
|
unkown
|
page readonly
|
||
4058000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
12AA000
|
trusted library allocation
|
page execute and read and write
|
||
A31F000
|
heap
|
page read and write
|
||
404E000
|
trusted library allocation
|
page read and write
|
||
7FF5DF486000
|
unkown
|
page readonly
|
||
2BE5000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
8400000
|
heap
|
page read and write
|
||
6910000
|
heap
|
page read and write
|
||
7FF5DF5B5000
|
unkown
|
page readonly
|
||
F10000
|
heap
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
9C83000
|
heap
|
page read and write
|
||
211000
|
unkown
|
page execute read
|
||
9B97000
|
heap
|
page read and write
|
||
3281000
|
stack
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
790000
|
unkown
|
page readonly
|
||
A450000
|
heap
|
page read and write
|
||
7FF5DF3B5000
|
unkown
|
page readonly
|
||
A270000
|
heap
|
page read and write
|
||
A3E1000
|
heap
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
9DDA000
|
heap
|
page read and write
|
||
52C1000
|
trusted library allocation
|
page read and write
|
||
8800000
|
unkown
|
page read and write
|
||
4058000
|
trusted library allocation
|
page read and write
|
||
9930000
|
heap
|
page read and write
|
||
507000
|
heap
|
page read and write
|
||
5785000
|
trusted library allocation
|
page read and write
|
||
52D9000
|
unkown
|
page read and write
|
||
73BA000
|
unkown
|
page read and write
|
||
7FF5DF577000
|
unkown
|
page readonly
|
||
B9F0000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
C23D000
|
unkown
|
page read and write
|
||
9CC0000
|
heap
|
page read and write
|
||
10620000
|
unkown
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
B589000
|
stack
|
page read and write
|
||
A3C8000
|
heap
|
page read and write
|
||
D5D000
|
unkown
|
page readonly
|
||
7930000
|
unkown
|
page readonly
|
||
A082000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
7FF5DF364000
|
unkown
|
page readonly
|
||
3B98000
|
trusted library allocation
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
BFA7000
|
unkown
|
page read and write
|
||
3E49000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
9C9D000
|
heap
|
page read and write
|
||
400F000
|
trusted library allocation
|
page read and write
|
||
A438000
|
heap
|
page read and write
|
||
A0AC000
|
heap
|
page read and write
|
||
7FF5DF3BE000
|
unkown
|
page readonly
|
||
4040000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
586F000
|
stack
|
page read and write
|
||
405F000
|
trusted library allocation
|
page read and write
|
||
970C000
|
unkown
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
A3F0000
|
heap
|
page read and write
|
||
A096000
|
heap
|
page read and write
|
||
A08D000
|
unkown
|
page read and write
|
||
A95C000
|
heap
|
page read and write
|
||
9A20000
|
heap
|
page read and write
|
||
18EE000
|
stack
|
page read and write
|
||
4048000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
9CB2000
|
heap
|
page read and write
|
||
9490000
|
unkown
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
A0A3000
|
heap
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
4037000
|
trusted library allocation
|
page read and write
|
||
9E48000
|
heap
|
page read and write
|
||
A09A000
|
unkown
|
page read and write
|
||
7FF5DF5B3000
|
unkown
|
page readonly
|
||
3FF1000
|
trusted library allocation
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
12B7000
|
trusted library allocation
|
page execute and read and write
|
||
4E09000
|
trusted library allocation
|
page read and write
|
||
A3EB000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
1037000
|
trusted library allocation
|
page execute and read and write
|
||
4B91000
|
trusted library allocation
|
page read and write
|
||
9953000
|
heap
|
page read and write
|
||
73E5000
|
unkown
|
page read and write
|
||
9CD8000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
73A3000
|
unkown
|
page read and write
|
||
664C000
|
stack
|
page read and write
|
||
4015000
|
trusted library allocation
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
7FF5DF429000
|
unkown
|
page readonly
|
||
1AB0000
|
heap
|
page read and write
|
||
2EF5000
|
trusted library allocation
|
page read and write
|
||
9F0B000
|
heap
|
page read and write
|
||
E70000
|
unkown
|
page readonly
|
||
8C28000
|
stack
|
page read and write
|
||
2A3E000
|
heap
|
page read and write
|
||
989F000
|
unkown
|
page read and write
|
||
96ED000
|
unkown
|
page read and write
|
||
7FF5DF207000
|
unkown
|
page readonly
|
||
102F000
|
stack
|
page read and write
|
||
9E1E000
|
stack
|
page read and write
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
E6A000
|
heap
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
10AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF310000
|
unkown
|
page readonly
|
||
2D70000
|
unkown
|
page read and write
|
||
3FEF000
|
trusted library allocation
|
page read and write
|
||
2F83000
|
trusted library allocation
|
page read and write
|
||
1AC3000
|
heap
|
page read and write
|
||
83D0000
|
unkown
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
64CC000
|
stack
|
page read and write
|
||
7FF5DEFC2000
|
unkown
|
page readonly
|
||
B60A000
|
stack
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
A3A2000
|
heap
|
page read and write
|
||
9C8B000
|
heap
|
page read and write
|
||
C86000
|
heap
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
28D3000
|
heap
|
page read and write
|
||
E7A000
|
heap
|
page read and write
|
||
5A11000
|
trusted library allocation
|
page read and write
|
||
7FF5DF4A6000
|
unkown
|
page readonly
|
||
2E60000
|
unkown
|
page read and write
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
4016000
|
trusted library allocation
|
page read and write
|
||
A425000
|
heap
|
page read and write
|
||
A370000
|
heap
|
page read and write
|
||
A0EC000
|
heap
|
page read and write
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
355D000
|
stack
|
page read and write
|
||
A469000
|
heap
|
page read and write
|
||
A410000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
4017000
|
trusted library allocation
|
page read and write
|
||
4FC8000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
2F91000
|
trusted library allocation
|
page read and write
|
||
C183000
|
unkown
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
EAD000
|
trusted library allocation
|
page execute and read and write
|
||
3185000
|
stack
|
page read and write
|
||
1AC3000
|
heap
|
page read and write
|
||
A0C6000
|
heap
|
page read and write
|
||
107DA000
|
heap
|
page read and write
|
||
5582000
|
unkown
|
page readonly
|
||
B56000
|
stack
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
88A9000
|
unkown
|
page read and write
|
||
8810000
|
unkown
|
page read and write
|
||
590E000
|
stack
|
page read and write
|
||
2F9F000
|
trusted library allocation
|
page read and write
|
||
A469000
|
heap
|
page read and write
|
||
3FFA000
|
trusted library allocation
|
page read and write
|
||
9C88000
|
heap
|
page read and write
|
||
57EE000
|
stack
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
9CCD000
|
heap
|
page read and write
|
||
4560000
|
heap
|
page read and write
|
||
403F000
|
trusted library allocation
|
page read and write
|
||
4CDD000
|
stack
|
page read and write
|
||
9FAB000
|
heap
|
page read and write
|
||
9E90000
|
heap
|
page read and write
|
||
995B000
|
heap
|
page read and write
|
||
1493000
|
trusted library allocation
|
page execute and read and write
|
||
29A000
|
unkown
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
7FF5DF3FC000
|
unkown
|
page readonly
|
||
60CE000
|
stack
|
page read and write
|
||
3070000
|
direct allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
9CAF000
|
heap
|
page read and write
|
||
1AC9000
|
heap
|
page read and write
|
||
4024000
|
trusted library allocation
|
page read and write
|
||
151D000
|
heap
|
page read and write
|
||
402E000
|
trusted library allocation
|
page read and write
|
||
1AD4000
|
heap
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
13F1000
|
trusted library allocation
|
page read and write
|
||
7FF5DEFB7000
|
unkown
|
page readonly
|
||
BC0000
|
heap
|
page read and write
|
||
29C000
|
unkown
|
page readonly
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
7FF5DF551000
|
unkown
|
page readonly
|
||
208E000
|
stack
|
page read and write
|
||
CB5000
|
heap
|
page read and write
|
||
F73000
|
trusted library allocation
|
page execute and read and write
|
||
460000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page execute and read and write
|
||
699E000
|
stack
|
page read and write
|
||
1A22000
|
heap
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
1ACC000
|
heap
|
page read and write
|
||
404E000
|
trusted library allocation
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
2572000
|
trusted library allocation
|
page read and write
|
||
9F23000
|
unkown
|
page read and write
|
||
108EE000
|
unkown
|
page read and write
|
||
2BA0000
|
heap
|
page execute and read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
A237000
|
heap
|
page read and write
|
||
A362000
|
heap
|
page read and write
|
||
53E0000
|
trusted library allocation
|
page read and write
|
||
3F27000
|
trusted library allocation
|
page read and write
|
||
9F88000
|
heap
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
9564000
|
unkown
|
page read and write
|
||
9B1E000
|
stack
|
page read and write
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
9C8B000
|
heap
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
7FF5DF18E000
|
unkown
|
page readonly
|
||
570E000
|
stack
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
trusted library allocation
|
page read and write
|
||
2F61000
|
trusted library allocation
|
page read and write
|
||
5BFE000
|
stack
|
page read and write
|
||
2FA7000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
A188000
|
heap
|
page read and write
|
||
4001000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
9BD5000
|
heap
|
page read and write
|
||
9946000
|
heap
|
page read and write
|
||
CE3000
|
trusted library allocation
|
page execute and read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
401D000
|
trusted library allocation
|
page read and write
|
||
1AD9000
|
heap
|
page read and write
|
||
1A27000
|
heap
|
page read and write
|
||
974000
|
heap
|
page read and write
|
||
3FF1000
|
trusted library allocation
|
page read and write
|
||
9A5000
|
heap
|
page read and write
|
||
63CB000
|
stack
|
page read and write
|
||
D07000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF1FD000
|
unkown
|
page readonly
|
||
4E1F000
|
stack
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
5762000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
4DF4000
|
trusted library allocation
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
2E15000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
403B000
|
trusted library allocation
|
page read and write
|
||
4047000
|
trusted library allocation
|
page read and write
|
||
C1A9000
|
unkown
|
page read and write
|
||
9CB3000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
B120000
|
unkown
|
page readonly
|
||
7FF5DF06F000
|
unkown
|
page readonly
|
||
A0A5000
|
unkown
|
page read and write
|
||
A8C8000
|
heap
|
page read and write
|
||
E5B000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
A2A5000
|
heap
|
page read and write
|
||
9D4D000
|
heap
|
page read and write
|
||
21CF000
|
stack
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
16B0000
|
trusted library allocation
|
page read and write
|
||
1AC2000
|
heap
|
page read and write
|
||
29F9000
|
trusted library allocation
|
page read and write
|
||
4E2D000
|
trusted library allocation
|
page read and write
|
||
575E000
|
stack
|
page read and write
|
||
A228000
|
heap
|
page read and write
|
||
369D000
|
stack
|
page read and write
|
||
D9B000
|
stack
|
page read and write
|
||
FD8A000
|
unkown
|
page read and write
|
||
402D000
|
trusted library allocation
|
page read and write
|
||
5520000
|
heap
|
page read and write
|
||
4016000
|
trusted library allocation
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
BD7F000
|
stack
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
7991000
|
unkown
|
page read and write
|
||
9E22000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
73B2000
|
unkown
|
page read and write
|
||
7FF5DF537000
|
unkown
|
page readonly
|
||
28DE000
|
heap
|
page read and write
|
||
A116000
|
heap
|
page read and write
|
||
2D61000
|
trusted library allocation
|
page read and write
|
||
2A2D000
|
heap
|
page execute and read and write
|
||
B9A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DEEEB000
|
unkown
|
page readonly
|
||
98A7000
|
unkown
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
4065000
|
trusted library allocation
|
page read and write
|
||
A88A000
|
heap
|
page read and write
|
||
2F8D000
|
trusted library allocation
|
page read and write
|
||
37DE000
|
stack
|
page read and write
|
||
4017000
|
trusted library allocation
|
page read and write
|
||
9C8C000
|
heap
|
page read and write
|
||
259E000
|
stack
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
1AC2000
|
heap
|
page read and write
|
||
1347000
|
trusted library allocation
|
page execute and read and write
|
||
53DE000
|
trusted library allocation
|
page read and write
|
||
3F36000
|
trusted library allocation
|
page read and write
|
||
7FF5DE535000
|
unkown
|
page readonly
|
||
1064E000
|
unkown
|
page read and write
|
||
4015000
|
trusted library allocation
|
page read and write
|
||
A161000
|
heap
|
page read and write
|
||
EC2000
|
trusted library allocation
|
page read and write
|
||
9C8C000
|
heap
|
page read and write
|
||
104C3000
|
unkown
|
page read and write
|
||
9CB5000
|
heap
|
page read and write
|
||
3C3B000
|
trusted library allocation
|
page read and write
|
||
400B000
|
trusted library allocation
|
page read and write
|
||
9E0C000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
7DF4E6780000
|
unkown
|
page readonly
|
||
3362000
|
unkown
|
page read and write
|
||
A294000
|
heap
|
page read and write
|
||
1A3C000
|
heap
|
page read and write
|
||
3FFE000
|
trusted library allocation
|
page read and write
|
||
124F000
|
stack
|
page read and write
|
||
441F000
|
trusted library allocation
|
page read and write
|
||
9FF3000
|
heap
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
FAB000
|
trusted library allocation
|
page execute and read and write
|
||
2F99000
|
trusted library allocation
|
page read and write
|
||
ED2000
|
trusted library allocation
|
page read and write
|
||
694A000
|
heap
|
page read and write
|
||
9F5F000
|
heap
|
page read and write
|
||
A2F8000
|
heap
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
111E000
|
stack
|
page read and write
|
||
5ABC000
|
stack
|
page read and write
|
||
25A0000
|
trusted library allocation
|
page execute and read and write
|
||
9CB5000
|
heap
|
page read and write
|
||
8810000
|
unkown
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
7FF5DF08B000
|
unkown
|
page readonly
|
||
470000
|
heap
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
4156000
|
trusted library allocation
|
page read and write
|
||
41D9000
|
trusted library allocation
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
50BC000
|
trusted library allocation
|
page read and write
|
||
1A3C000
|
heap
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
9D92000
|
heap
|
page read and write
|
||
404E000
|
trusted library allocation
|
page read and write
|
||
19F0000
|
heap
|
page read and write
|
||
A3B4000
|
heap
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
47D000
|
stack
|
page read and write
|
||
A2FF000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
3C60000
|
heap
|
page read and write
|
||
7FF5DF58A000
|
unkown
|
page readonly
|
||
8B60000
|
unkown
|
page read and write
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
3399000
|
unkown
|
page read and write
|
||
403D000
|
trusted library allocation
|
page read and write
|
||
A397000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
1AD9000
|
heap
|
page read and write
|
||
BFEF000
|
unkown
|
page read and write
|
||
57E0000
|
heap
|
page execute and read and write
|
||
2A77000
|
trusted library allocation
|
page read and write
|
||
9CD2000
|
heap
|
page read and write
|
||
4B74000
|
trusted library allocation
|
page read and write
|
||
507F000
|
stack
|
page read and write
|
||
7FF5DF42F000
|
unkown
|
page readonly
|
||
1A27000
|
heap
|
page read and write
|
||
555E000
|
stack
|
page read and write
|
||
995A000
|
heap
|
page read and write
|
||
1AAE000
|
heap
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
1202000
|
trusted library allocation
|
page read and write
|
||
F24000
|
trusted library allocation
|
page read and write
|
||
4400000
|
heap
|
page read and write
|
||
A2AD000
|
heap
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
A0BD000
|
heap
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
3290000
|
unkown
|
page readonly
|
||
7FF5DF4EC000
|
unkown
|
page readonly
|
||
133A000
|
trusted library allocation
|
page execute and read and write
|
||
1A54000
|
heap
|
page read and write
|
||
4BA5000
|
trusted library allocation
|
page read and write
|
||
1AB6000
|
heap
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
3E93000
|
trusted library allocation
|
page read and write
|
||
7FF5DF25E000
|
unkown
|
page readonly
|
||
9EDC000
|
heap
|
page read and write
|
||
379F000
|
stack
|
page read and write
|
||
FA2000
|
trusted library allocation
|
page read and write
|
||
104CE000
|
unkown
|
page read and write
|
||
104C5000
|
unkown
|
page read and write
|
||
502C000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
7FF5DF126000
|
unkown
|
page readonly
|
||
4439000
|
trusted library allocation
|
page read and write
|
||
9BEE000
|
heap
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
A448000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
9966000
|
heap
|
page read and write
|
||
28FE000
|
heap
|
page read and write
|
||
9F70000
|
heap
|
page read and write
|
||
630C000
|
stack
|
page read and write
|
||
94C0000
|
unkown
|
page read and write
|
||
9F7D000
|
heap
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
7840000
|
unkown
|
page read and write
|
||
10F6000
|
stack
|
page read and write
|
||
7FF5DF089000
|
unkown
|
page readonly
|
||
25E0000
|
trusted library allocation
|
page execute and read and write
|
||
980000
|
unkown
|
page readonly
|
||
402A000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
51D5000
|
trusted library allocation
|
page read and write
|
||
59F2000
|
trusted library allocation
|
page read and write
|
||
7FF5DF507000
|
unkown
|
page readonly
|
||
A1FE000
|
heap
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
3030000
|
heap
|
page read and write
|
||
9F91000
|
heap
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
8B60000
|
unkown
|
page read and write
|
||
3FFA000
|
trusted library allocation
|
page read and write
|
||
2D5D000
|
trusted library allocation
|
page read and write
|
||
A015000
|
heap
|
page read and write
|
||
3FF1000
|
trusted library allocation
|
page read and write
|
||
A332000
|
heap
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
A230000
|
heap
|
page read and write
|
||
4037000
|
trusted library allocation
|
page read and write
|
||
4066000
|
trusted library allocation
|
page read and write
|
||
A30B000
|
heap
|
page read and write
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
F28000
|
stack
|
page read and write
|
||
6E00000
|
heap
|
page read and write
|
||
7FF5DF081000
|
unkown
|
page readonly
|
||
B50000
|
heap
|
page read and write
|
||
5A01000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
unkown
|
page readonly
|
||
9FB8000
|
heap
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
149D000
|
trusted library allocation
|
page execute and read and write
|
||
3B4C000
|
trusted library allocation
|
page read and write
|
||
7FF5DF582000
|
unkown
|
page readonly
|
||
1AA0000
|
heap
|
page read and write
|
||
531E000
|
stack
|
page read and write
|
||
BFB3000
|
unkown
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
9CA6000
|
heap
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
2A2E000
|
stack
|
page read and write
|
||
BFA5000
|
unkown
|
page read and write
|
||
8EA8000
|
stack
|
page read and write
|
||
F00000
|
trusted library allocation
|
page execute and read and write
|
||
A285000
|
heap
|
page read and write
|
||
53E6000
|
trusted library allocation
|
page read and write
|
||
50C1000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page execute and read and write
|
||
FE0000
|
heap
|
page read and write
|
||
9C91000
|
heap
|
page read and write
|
||
2D70000
|
unkown
|
page read and write
|
||
F74000
|
trusted library allocation
|
page read and write
|
||
4131000
|
trusted library allocation
|
page read and write
|
||
A326000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
A09E000
|
heap
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
108EC000
|
unkown
|
page read and write
|
||
9A1E000
|
heap
|
page read and write
|
||
BF90000
|
unkown
|
page read and write
|
||
8800000
|
unkown
|
page read and write
|
||
9CB5000
|
heap
|
page read and write
|
||
BFA3000
|
unkown
|
page read and write
|
||
A0DE000
|
heap
|
page read and write
|
||
9D62000
|
heap
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page execute and read and write
|
||
9FDA000
|
heap
|
page read and write
|
||
9C2000
|
heap
|
page read and write
|
||
2871000
|
trusted library allocation
|
page read and write
|
||
2FB8000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
4FD6000
|
trusted library allocation
|
page read and write
|
||
7FF5DEE43000
|
unkown
|
page readonly
|
||
548E000
|
stack
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
8B60000
|
unkown
|
page read and write
|
||
1A53000
|
heap
|
page read and write
|
||
C565000
|
unkown
|
page read and write
|
||
2B51000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
D50000
|
unkown
|
page read and write
|
||
9A06000
|
heap
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
2BD6000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
11D4000
|
trusted library allocation
|
page read and write
|
||
146F000
|
stack
|
page read and write
|
||
9BCD000
|
heap
|
page read and write
|
||
7FF5DF5A3000
|
unkown
|
page readonly
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
AEEE000
|
stack
|
page read and write
|
||
7FF5DF43C000
|
unkown
|
page readonly
|
||
83E0000
|
unkown
|
page read and write
|
||
A1A0000
|
heap
|
page read and write
|
||
A489000
|
heap
|
page read and write
|
||
978C000
|
unkown
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
7FF5DF48B000
|
unkown
|
page readonly
|
||
A174000
|
heap
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
994E000
|
heap
|
page read and write
|
||
98AD000
|
unkown
|
page read and write
|
||
7FF5DF5B0000
|
unkown
|
page readonly
|
||
ED7000
|
trusted library allocation
|
page execute and read and write
|
||
13EF000
|
stack
|
page read and write
|
||
2D5F000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
1AD4000
|
heap
|
page read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
7FF5DEFE2000
|
unkown
|
page readonly
|
||
A37F000
|
heap
|
page read and write
|
||
19EE000
|
stack
|
page read and write
|
||
3BB5000
|
trusted library allocation
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
9C98000
|
heap
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
4B8E000
|
trusted library allocation
|
page read and write
|
||
9E27000
|
heap
|
page read and write
|
||
9C88000
|
heap
|
page read and write
|
||
7FF5DEF4B000
|
unkown
|
page readonly
|
||
7FF5DF2E5000
|
unkown
|
page readonly
|
||
1A9B000
|
heap
|
page read and write
|
||
1A54000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
2D70000
|
unkown
|
page read and write
|
||
8810000
|
unkown
|
page read and write
|
||
9CAB000
|
heap
|
page read and write
|
||
9B86000
|
heap
|
page read and write
|
||
2732000
|
heap
|
page read and write
|
||
9EA4000
|
heap
|
page read and write
|
||
889E000
|
stack
|
page read and write
|
||
3FB1000
|
trusted library allocation
|
page read and write
|
||
256A000
|
trusted library allocation
|
page execute and read and write
|
||
A2C6000
|
heap
|
page read and write
|
||
9CAB000
|
heap
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
A1B2000
|
heap
|
page read and write
|
||
2761000
|
trusted library allocation
|
page read and write
|
||
1C2E000
|
stack
|
page read and write
|
||
A443000
|
heap
|
page read and write
|
||
1A22000
|
heap
|
page read and write
|
||
9E62000
|
heap
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
1AB2000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
4027000
|
trusted library allocation
|
page read and write
|
||
4015000
|
trusted library allocation
|
page read and write
|
||
7FF5DF539000
|
unkown
|
page readonly
|
||
3F65000
|
trusted library allocation
|
page read and write
|
||
9F00000
|
heap
|
page read and write
|
||
EE83000
|
unkown
|
page read and write
|
||
9D5A000
|
heap
|
page read and write
|
||
3BE7000
|
trusted library allocation
|
page read and write
|
||
9C88000
|
heap
|
page read and write
|
||
BFAF000
|
unkown
|
page read and write
|
||
7FF5DF4F7000
|
unkown
|
page readonly
|
||
C354000
|
unkown
|
page read and write
|
||
CD4000
|
trusted library allocation
|
page read and write
|
||
8810000
|
unkown
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
9CB5000
|
heap
|
page read and write
|
||
59F5000
|
trusted library allocation
|
page read and write
|
||
550B000
|
trusted library allocation
|
page read and write
|
||
12AB000
|
trusted library allocation
|
page execute and read and write
|
||
8390000
|
unkown
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
7FF5DF3EA000
|
unkown
|
page readonly
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
3FFA000
|
trusted library allocation
|
page read and write
|
||
3A3E000
|
trusted library allocation
|
page read and write
|
||
A2CA000
|
heap
|
page read and write
|
||
D9B000
|
stack
|
page read and write
|
||
620E000
|
stack
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
2F20000
|
unkown
|
page read and write
|
||
296E000
|
stack
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
4BC5000
|
trusted library allocation
|
page read and write
|
||
53C5000
|
trusted library allocation
|
page read and write
|
||
12F7000
|
trusted library allocation
|
page read and write
|
||
AD75000
|
heap
|
page read and write
|
||
A13C000
|
heap
|
page read and write
|
||
1AC6000
|
heap
|
page read and write
|
||
5A25000
|
trusted library allocation
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
9CBD000
|
heap
|
page read and write
|
||
7870000
|
unkown
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
9CB2000
|
heap
|
page read and write
|
||
5640000
|
heap
|
page read and write
|
||
935D000
|
stack
|
page read and write
|
||
1A61000
|
heap
|
page read and write
|
||
9FA0000
|
heap
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
47A2000
|
unkown
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
9CB1000
|
heap
|
page read and write
|
||
1AAD000
|
heap
|
page read and write
|
||
29AD000
|
stack
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
A1B0000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
9F10000
|
unkown
|
page read and write
|
||
A690000
|
unkown
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
A080000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
BF9F000
|
unkown
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
7FF5DF532000
|
unkown
|
page readonly
|
||
9C91000
|
heap
|
page read and write
|
||
7FF5DF3C2000
|
unkown
|
page readonly
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
4FDD000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
66A0000
|
heap
|
page read and write
|
||
9D88000
|
heap
|
page read and write
|
||
1ACC000
|
heap
|
page read and write
|
||
4029000
|
trusted library allocation
|
page read and write
|
||
9FBD000
|
heap
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
9C88000
|
heap
|
page read and write
|
||
2F61000
|
trusted library allocation
|
page read and write
|
||
9E75000
|
heap
|
page read and write
|
||
14C7000
|
trusted library allocation
|
page execute and read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
7FF5DF2CB000
|
unkown
|
page readonly
|
||
10C0000
|
heap
|
page read and write
|
||
7FF5DF08F000
|
unkown
|
page readonly
|
||
401D000
|
trusted library allocation
|
page read and write
|
||
58AF000
|
stack
|
page read and write
|
||
5420000
|
trusted library allocation
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
1ACA000
|
heap
|
page read and write
|
||
7DF4E6760000
|
unkown
|
page readonly
|
||
4096000
|
trusted library allocation
|
page read and write
|
||
28F9000
|
heap
|
page read and write
|
||
4073000
|
trusted library allocation
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
7FF5DF2F3000
|
unkown
|
page readonly
|
||
9C84000
|
heap
|
page read and write
|
||
7FF5DEF84000
|
unkown
|
page readonly
|
||
10612000
|
unkown
|
page read and write
|
||
104C5000
|
unkown
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
2C2E000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
4017000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
2450000
|
trusted library allocation
|
page read and write
|
||
B4D000
|
heap
|
page read and write
|
||
4016000
|
trusted library allocation
|
page read and write
|
||
7FF5C0B6B000
|
unkown
|
page readonly
|
||
129B000
|
heap
|
page read and write
|
||
9CBA000
|
heap
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
9F5B000
|
heap
|
page read and write
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
A0A9000
|
heap
|
page read and write
|
||
3BE7000
|
trusted library allocation
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
107E0000
|
unkown
|
page read and write
|
||
4015000
|
trusted library allocation
|
page read and write
|
||
28DF000
|
stack
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
9CCC000
|
heap
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
7FF5DF5CC000
|
unkown
|
page readonly
|
||
5A17000
|
trusted library allocation
|
page read and write
|
||
9E66000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
7FF5DF422000
|
unkown
|
page readonly
|
||
10828000
|
unkown
|
page read and write
|
||
120D000
|
trusted library allocation
|
page execute and read and write
|
||
F9A000
|
trusted library allocation
|
page execute and read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
1AC2000
|
heap
|
page read and write
|
||
B96000
|
trusted library allocation
|
page execute and read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
7FF5DF1CD000
|
unkown
|
page readonly
|
||
909C000
|
stack
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
400F000
|
trusted library allocation
|
page read and write
|
||
7FF5DF07D000
|
unkown
|
page readonly
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
DA6000
|
stack
|
page read and write
|
||
74D6000
|
unkown
|
page read and write
|
||
7FF5DF5A8000
|
unkown
|
page readonly
|
||
A120000
|
heap
|
page read and write
|
||
7FF5DEFFC000
|
unkown
|
page readonly
|
||
E26000
|
trusted library allocation
|
page execute and read and write
|
||
25F5000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
1AD4000
|
heap
|
page read and write
|
||
A2D6000
|
heap
|
page read and write
|
||
5612000
|
trusted library allocation
|
page read and write
|
||
4015000
|
trusted library allocation
|
page read and write
|
||
A4A1000
|
heap
|
page read and write
|
||
2604000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
10841000
|
unkown
|
page read and write
|
||
12BB000
|
trusted library allocation
|
page execute and read and write
|
||
5565000
|
trusted library allocation
|
page read and write
|
||
2C8F000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
3FF6000
|
trusted library allocation
|
page read and write
|
||
2470000
|
trusted library allocation
|
page read and write
|
||
3382000
|
unkown
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
634D000
|
stack
|
page read and write
|
||
104CC000
|
unkown
|
page read and write
|
||
A40C000
|
heap
|
page read and write
|
||
A139000
|
heap
|
page read and write
|
||
48E0000
|
unkown
|
page read and write
|
||
1063D000
|
unkown
|
page read and write
|
||
7910000
|
unkown
|
page readonly
|
||
9CB0000
|
heap
|
page read and write
|
||
4410000
|
heap
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
9CB3000
|
heap
|
page read and write
|
||
9E36000
|
heap
|
page read and write
|
||
558F000
|
stack
|
page read and write
|
||
12D8000
|
heap
|
page read and write
|
||
4BC3000
|
trusted library allocation
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
2C97000
|
trusted library allocation
|
page read and write
|
||
9C89000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
3ABE000
|
trusted library allocation
|
page read and write
|
||
9A80000
|
heap
|
page read and write
|
||
2F9C000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
9EFA000
|
heap
|
page read and write
|
||
2457000
|
trusted library allocation
|
page execute and read and write
|
||
AD2B000
|
stack
|
page read and write
|
||
2EF1000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
BF82000
|
unkown
|
page read and write
|
||
43B0000
|
heap
|
page read and write
|
||
10632000
|
unkown
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
54F0000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
7FF5DF229000
|
unkown
|
page readonly
|
||
7BB000
|
stack
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
9BBF000
|
heap
|
page read and write
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
9EDE000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
7FF5DEFBD000
|
unkown
|
page readonly
|
||
97C4000
|
unkown
|
page read and write
|
||
A6F1000
|
unkown
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
2E26000
|
trusted library allocation
|
page read and write
|
||
405D000
|
trusted library allocation
|
page read and write
|
||
402C000
|
trusted library allocation
|
page read and write
|
||
108E4000
|
unkown
|
page read and write
|
||
A0DB000
|
heap
|
page read and write
|
||
3877000
|
trusted library allocation
|
page read and write
|
||
5563000
|
trusted library allocation
|
page read and write
|
||
9CA0000
|
heap
|
page read and write
|
||
1ACC000
|
heap
|
page read and write
|
||
1AD9000
|
heap
|
page read and write
|
||
9CB0000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
9E46000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
272E000
|
stack
|
page read and write
|
||
2F91000
|
trusted library allocation
|
page read and write
|
||
4088000
|
trusted library allocation
|
page read and write
|
||
5465000
|
trusted library allocation
|
page read and write
|
||
9F98000
|
heap
|
page read and write
|
||
A0BA000
|
heap
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
9C9D000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
A3F5000
|
heap
|
page read and write
|
||
A08D000
|
heap
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
13CF000
|
stack
|
page read and write
|
||
2619000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
29B0000
|
heap
|
page read and write
|
||
973C000
|
unkown
|
page read and write
|
||
A0C2000
|
heap
|
page read and write
|
||
9E59000
|
heap
|
page read and write
|
||
513F000
|
stack
|
page read and write
|
||
9C96000
|
heap
|
page read and write
|
||
9C91000
|
heap
|
page read and write
|
||
A104000
|
unkown
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
9C8F000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
A88A000
|
heap
|
page read and write
|
||
59EF000
|
stack
|
page read and write
|
||
FB3000
|
trusted library allocation
|
page execute and read and write
|
||
2700000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
8810000
|
unkown
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
A08A000
|
unkown
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
404E000
|
trusted library allocation
|
page read and write
|
||
5660000
|
heap
|
page execute and read and write
|
||
596E000
|
stack
|
page read and write
|
||
7FF5DF478000
|
unkown
|
page readonly
|
||
8B60000
|
unkown
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
9E3A000
|
heap
|
page read and write
|
||
14C2000
|
trusted library allocation
|
page read and write
|
||
9CB6000
|
heap
|
page read and write
|
||
C013000
|
unkown
|
page read and write
|
||
A6B000
|
stack
|
page read and write
|
||
9CA5000
|
heap
|
page read and write
|
||
6280000
|
unkown
|
page readonly
|
||
124A000
|
heap
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
2B95000
|
trusted library allocation
|
page read and write
|
||
9C84000
|
heap
|
page read and write
|
||
7FF5DF3AA000
|
unkown
|
page readonly
|
||
39D7000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page readonly
|
||
16C6000
|
trusted library allocation
|
page read and write
|
||
A2D2000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
A0E7000
|
heap
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
4020000
|
trusted library allocation
|
page read and write
|
||
528F000
|
stack
|
page read and write
|
||
52D0000
|
heap
|
page execute and read and write
|
||
11A0000
|
trusted library allocation
|
page read and write
|
||
F23000
|
trusted library allocation
|
page execute and read and write
|
||
436000
|
unkown
|
page readonly
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
9CB5000
|
heap
|
page read and write
|
||
9C82000
|
heap
|
page read and write
|
||
9CB9000
|
heap
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
A211000
|
heap
|
page read and write
|
||
55C6000
|
unkown
|
page readonly
|
||
10F6000
|
stack
|
page read and write
|
||
3F21000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
11E2000
|
trusted library allocation
|
page read and write
|
||
12A2000
|
trusted library allocation
|
page read and write
|
||
2DAC000
|
stack
|
page read and write
|
||
9CBB000
|
heap
|
page read and write
|
||
4730000
|
heap
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
1032000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page execute and read and write
|
||
900000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
2D90000
|
heap
|
page execute and read and write
|
||
104C5000
|
unkown
|
page read and write
|
||
A24E000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
9CA2000
|
heap
|
page read and write
|
||
7FF5DEFF0000
|
unkown
|
page readonly
|
||
2E60000
|
unkown
|
page read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
12AC000
|
stack
|
page read and write
|
||
9FF7000
|
heap
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
328C000
|
stack
|
page read and write
|
||
29D5000
|
trusted library allocation
|
page read and write
|
||
7FF5DF396000
|
unkown
|
page readonly
|
||
517D000
|
stack
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
A342000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
7399000
|
unkown
|
page read and write
|
||
286E000
|
stack
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
FDA000
|
trusted library allocation
|
page execute and read and write
|
||
29C000
|
unkown
|
page readonly
|
||
9C91000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2D55000
|
trusted library allocation
|
page read and write
|
||
7FF5DF5AE000
|
unkown
|
page readonly
|
||
53E1000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
7395000
|
unkown
|
page read and write
|
||
A423000
|
heap
|
page read and write
|
||
10DB000
|
heap
|
page read and write
|
||
73BC000
|
unkown
|
page read and write
|
||
C5E000
|
heap
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
4079000
|
trusted library allocation
|
page read and write
|
||
669F000
|
stack
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
7FF5DF21B000
|
unkown
|
page readonly
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
D49000
|
heap
|
page read and write
|
||
1A3C000
|
heap
|
page read and write
|
||
29A6000
|
trusted library allocation
|
page read and write
|
||
58CF000
|
stack
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
4016000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
490000
|
heap
|
page read and write
|
||
5416000
|
trusted library allocation
|
page read and write
|
||
73B6000
|
unkown
|
page read and write
|
||
7FF5DF3B9000
|
unkown
|
page readonly
|
||
7FF5DF50F000
|
unkown
|
page readonly
|
||
11FA000
|
trusted library allocation
|
page execute and read and write
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
A744000
|
unkown
|
page read and write
|
||
1634000
|
unkown
|
page readonly
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
25B0000
|
heap
|
page execute and read and write
|
||
9718000
|
unkown
|
page read and write
|
||
1146000
|
heap
|
page read and write
|
||
ADB000
|
stack
|
page read and write
|
||
9FA2000
|
heap
|
page read and write
|
||
57C0000
|
heap
|
page execute and read and write
|
||
9F82000
|
heap
|
page read and write
|
||
7FF5DF571000
|
unkown
|
page readonly
|
||
9C64000
|
heap
|
page read and write
|
||
8810000
|
unkown
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
3FF1000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
FD8C000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
61D0000
|
heap
|
page read and write
|
||
9C98000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
1AB9000
|
heap
|
page read and write
|
||
3371000
|
unkown
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FF5DF2FE000
|
unkown
|
page readonly
|
||
2DEF000
|
stack
|
page read and write
|
||
9C49000
|
heap
|
page read and write
|
||
4760000
|
unkown
|
page read and write
|
||
59FE000
|
stack
|
page read and write
|
||
10603000
|
unkown
|
page read and write
|
||
27D1000
|
trusted library allocation
|
page read and write
|
||
3735000
|
trusted library allocation
|
page read and write
|
||
56FF000
|
stack
|
page read and write
|
||
4016000
|
trusted library allocation
|
page read and write
|
||
2F55000
|
trusted library allocation
|
page read and write
|
||
3E02000
|
trusted library allocation
|
page read and write
|
||
53E9000
|
trusted library allocation
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
18A0000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
11B4000
|
trusted library allocation
|
page read and write
|
||
53B5000
|
trusted library allocation
|
page read and write
|
||
10A8000
|
heap
|
page read and write
|
||
52D3000
|
trusted library allocation
|
page read and write
|
||
7FF5DF45A000
|
unkown
|
page readonly
|
||
7C89000
|
stack
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page execute and read and write
|
||
7810000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
1215000
|
heap
|
page read and write
|
||
4FDE000
|
stack
|
page read and write
|
||
9EAF000
|
heap
|
page read and write
|
||
4860000
|
unkown
|
page read and write
|
||
9CC3000
|
heap
|
page read and write
|
||
336F000
|
unkown
|
page read and write
|
||
51DE000
|
trusted library allocation
|
page read and write
|
||
7FF5DF380000
|
unkown
|
page readonly
|
||
9C1D000
|
stack
|
page read and write
|
||
2F20000
|
unkown
|
page read and write
|
||
A3BD000
|
heap
|
page read and write
|
||
A1D6000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
2981000
|
trusted library allocation
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
7FF5DF3D4000
|
unkown
|
page readonly
|
||
7FF5DEFF8000
|
unkown
|
page readonly
|
||
9CA7000
|
heap
|
page read and write
|
||
5A50000
|
unkown
|
page readonly
|
||
41AB000
|
trusted library allocation
|
page read and write
|
||
9ACF000
|
heap
|
page read and write
|
||
9FA0000
|
unkown
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
9A41000
|
heap
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
3FF5000
|
trusted library allocation
|
page read and write
|
||
9A51000
|
heap
|
page read and write
|
||
7FF5DF4F3000
|
unkown
|
page readonly
|
||
545E000
|
stack
|
page read and write
|
||
58FF000
|
stack
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
53A0000
|
trusted library allocation
|
page read and write
|
||
A491000
|
heap
|
page read and write
|
||
9CB4000
|
heap
|
page read and write
|
||
8810000
|
unkown
|
page read and write
|
||
4060000
|
trusted library allocation
|
page read and write
|
||
A0B1000
|
unkown
|
page read and write
|
||
7800000
|
unkown
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
A893000
|
heap
|
page read and write
|
||
2BD8000
|
trusted library allocation
|
page read and write
|
||
682C000
|
stack
|
page read and write
|
||
10D8000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
ECA000
|
trusted library allocation
|
page execute and read and write
|
||
401F000
|
trusted library allocation
|
page read and write
|
||
19FE000
|
heap
|
page read and write
|
||
1A9B000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
92A000
|
heap
|
page read and write
|
||
3375000
|
unkown
|
page read and write
|
||
598E000
|
stack
|
page read and write
|
||
402F000
|
trusted library allocation
|
page read and write
|
||
A090000
|
heap
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
25F0000
|
trusted library allocation
|
page read and write
|
||
9CC0000
|
heap
|
page read and write
|
||
BF9D000
|
unkown
|
page read and write
|
||
104CA000
|
unkown
|
page read and write
|
||
507000
|
heap
|
page read and write
|
||
A106000
|
unkown
|
page read and write
|
||
1054000
|
unkown
|
page write copy
|
||
14A6000
|
trusted library allocation
|
page execute and read and write
|
||
AB89000
|
stack
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
A5D4000
|
heap
|
page read and write
|
||
4B97000
|
trusted library allocation
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
9E9E000
|
stack
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
3871000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
9C83000
|
heap
|
page read and write
|
||
9A27000
|
heap
|
page read and write
|
||
11DF000
|
stack
|
page read and write
|
||
9A3F000
|
heap
|
page read and write
|
||
9CB3000
|
heap
|
page read and write
|
||
772000
|
unkown
|
page readonly
|
||
A8D3000
|
heap
|
page read and write
|
||
A21C000
|
heap
|
page read and write
|
||
A225000
|
heap
|
page read and write
|
||
1060F000
|
unkown
|
page read and write
|
||
A2B0000
|
heap
|
page read and write
|
||
408E000
|
trusted library allocation
|
page read and write
|
||
11D3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DEE4E000
|
unkown
|
page readonly
|
||
A324000
|
heap
|
page read and write
|
||
AD6C000
|
heap
|
page read and write
|
||
F6F000
|
unkown
|
page read and write
|
||
9D9F000
|
stack
|
page read and write
|
||
92B000
|
heap
|
page read and write
|
||
9DD6000
|
heap
|
page read and write
|
||
A3E3000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
4023000
|
trusted library allocation
|
page read and write
|
||
9F4D000
|
heap
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
BF98000
|
unkown
|
page read and write
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
404C000
|
trusted library allocation
|
page read and write
|
||
7FF5DF3F1000
|
unkown
|
page readonly
|
||
1210000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5DF57F000
|
unkown
|
page readonly
|
||
29C0000
|
heap
|
page execute and read and write
|
||
2BB6000
|
trusted library allocation
|
page read and write
|
||
9CC6000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
104C9000
|
unkown
|
page read and write
|
||
A38F000
|
heap
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
7FF5DF343000
|
unkown
|
page readonly
|
||
9714000
|
unkown
|
page read and write
|
||
2F65000
|
trusted library allocation
|
page read and write
|
||
9F74000
|
unkown
|
page read and write
|
||
7860000
|
unkown
|
page read and write
|
||
9FEE000
|
heap
|
page read and write
|
||
A373000
|
heap
|
page read and write
|
||
9CB1000
|
heap
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
3F55000
|
trusted library allocation
|
page read and write
|
||
141F000
|
stack
|
page read and write
|
||
9C5A000
|
heap
|
page read and write
|
||
7909000
|
stack
|
page read and write
|
||
5712000
|
trusted library allocation
|
page read and write
|
||
A288000
|
heap
|
page read and write
|
||
2F8F000
|
trusted library allocation
|
page read and write
|
||
9F94000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
7FF5DF341000
|
unkown
|
page readonly
|
||
1A27000
|
heap
|
page read and write
|
||
8910000
|
unkown
|
page read and write
|
||
3B03000
|
trusted library allocation
|
page read and write
|
||
2BBE000
|
trusted library allocation
|
page read and write
|
||
A1CF000
|
heap
|
page read and write
|
||
9CD1000
|
heap
|
page read and write
|
||
647E000
|
stack
|
page read and write
|
||
7FF5DF549000
|
unkown
|
page readonly
|
||
7FF5DF349000
|
unkown
|
page readonly
|
||
99E000
|
heap
|
page read and write
|
||
9CA2000
|
heap
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
9CA8000
|
heap
|
page read and write
|
||
770000
|
unkown
|
page readonly
|
||
8B60000
|
unkown
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
9C9E000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2560000
|
trusted library allocation
|
page read and write
|
||
3364000
|
unkown
|
page read and write
|
||
10B7000
|
heap
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
107E000
|
stack
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
A0E2000
|
heap
|
page read and write
|
||
50B2000
|
trusted library allocation
|
page read and write
|
||
A072000
|
unkown
|
page read and write
|
||
C192000
|
unkown
|
page read and write
|
||
BFDF000
|
unkown
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
1274000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
BEB0000
|
unkown
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
C1C4000
|
unkown
|
page read and write
|
||
A269000
|
heap
|
page read and write
|
||
A377000
|
heap
|
page read and write
|
||
7FF5DEE56000
|
unkown
|
page readonly
|
||
9F1A000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
57A0000
|
heap
|
page execute and read and write
|
||
2995000
|
trusted library allocation
|
page read and write
|
||
7A30000
|
unkown
|
page read and write
|
||
662B000
|
stack
|
page read and write
|
||
A1A4000
|
heap
|
page read and write
|
||
5C5000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
2BCE000
|
trusted library allocation
|
page read and write
|
||
73B8000
|
unkown
|
page read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
4040000
|
trusted library allocation
|
page read and write
|
||
203F000
|
stack
|
page read and write
|
||
2AB6000
|
trusted library allocation
|
page read and write
|
||
5740000
|
heap
|
page execute and read and write
|
||
A1A7000
|
heap
|
page read and write
|
||
63B000
|
stack
|
page read and write
|
||
2F97000
|
trusted library allocation
|
page read and write
|
||
9A3D000
|
heap
|
page read and write
|
||
2F20000
|
unkown
|
page read and write
|
||
FBD000
|
trusted library allocation
|
page execute and read and write
|
||
A1F8000
|
heap
|
page read and write
|
||
47B6000
|
unkown
|
page read and write
|
||
9BFD000
|
heap
|
page read and write
|
||
A091000
|
heap
|
page read and write
|
||
8800000
|
unkown
|
page read and write
|
||
1AB9000
|
heap
|
page read and write
|
||
4035000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
101DF000
|
unkown
|
page read and write
|
||
1336000
|
trusted library allocation
|
page execute and read and write
|
||
A2BC000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
8B60000
|
unkown
|
page read and write
|
||
30F0000
|
remote allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
A481000
|
heap
|
page read and write
|
||
761000
|
stack
|
page read and write
|
||
A430000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
8810000
|
unkown
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
7FF5DF191000
|
unkown
|
page readonly
|
||
A39C000
|
heap
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
CDD000
|
trusted library allocation
|
page execute and read and write
|
||
4FE5000
|
trusted library allocation
|
page read and write
|
||
1AA0000
|
heap
|
page read and write
|
||
670E000
|
stack
|
page read and write
|
||
540E000
|
stack
|
page read and write
|
||
108EE000
|
unkown
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
1ACA000
|
heap
|
page read and write
|
||
7FF5DF458000
|
unkown
|
page readonly
|
||
9CB2000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
A893000
|
heap
|
page read and write
|
||
403D000
|
trusted library allocation
|
page read and write
|
||
994F000
|
heap
|
page read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
551E000
|
trusted library allocation
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
5434000
|
trusted library allocation
|
page read and write
|
||
BF8C000
|
unkown
|
page read and write
|
||
4055000
|
trusted library allocation
|
page read and write
|
||
116E000
|
stack
|
page read and write
|
||
7FF5DF488000
|
unkown
|
page readonly
|
||
62D000
|
heap
|
page read and write
|
||
558F000
|
trusted library allocation
|
page read and write
|
||
1ACC000
|
heap
|
page read and write
|
||
9ED7000
|
heap
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
C159000
|
unkown
|
page read and write
|
||
405D000
|
trusted library allocation
|
page read and write
|
||
4004000
|
trusted library allocation
|
page read and write
|
||
1296000
|
trusted library allocation
|
page execute and read and write
|
||
108EC000
|
unkown
|
page read and write
|
||
9A4C000
|
heap
|
page read and write
|
||
4411000
|
trusted library allocation
|
page read and write
|
||
9CAD000
|
heap
|
page read and write
|
||
2D70000
|
unkown
|
page read and write
|
||
7DF4E6791000
|
unkown
|
page execute read
|
||
2FBB000
|
trusted library allocation
|
page read and write
|
||
7FF5DF3E4000
|
unkown
|
page readonly
|
||
A267000
|
heap
|
page read and write
|
||
9CAD000
|
heap
|
page read and write
|
||
A2FB000
|
heap
|
page read and write
|
||
3373000
|
unkown
|
page read and write
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
96F5000
|
unkown
|
page read and write
|
||
1081D000
|
unkown
|
page read and write
|
||
9B82000
|
heap
|
page read and write
|
||
643E000
|
stack
|
page read and write
|
||
286F000
|
stack
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
2E21000
|
unkown
|
page read and write
|
||
4015000
|
trusted library allocation
|
page read and write
|
||
A104000
|
heap
|
page read and write
|
||
A0FC000
|
unkown
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
7F770000
|
trusted library allocation
|
page execute and read and write
|
||
A1EB000
|
heap
|
page read and write
|
||
A152000
|
heap
|
page read and write
|
||
9EB2000
|
heap
|
page read and write
|
||
7499000
|
unkown
|
page read and write
|
||
5110000
|
unkown
|
page write copy
|
||
9C000
|
stack
|
page read and write
|
||
482E000
|
stack
|
page read and write
|
||
29F5000
|
trusted library allocation
|
page read and write
|
||
7380000
|
unkown
|
page read and write
|
||
A000000
|
heap
|
page read and write
|
||
CAB000
|
stack
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
9C6D000
|
heap
|
page read and write
|
||
ADAB000
|
stack
|
page read and write
|
||
5ADC000
|
stack
|
page read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
2810000
|
direct allocation
|
page execute and read and write
|
||
DD0000
|
heap
|
page read and write
|
||
CC9000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
2F81000
|
trusted library allocation
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
2566000
|
trusted library allocation
|
page execute and read and write
|
||
4B7E000
|
trusted library allocation
|
page read and write
|
||
7FF5DF3F5000
|
unkown
|
page readonly
|
||
422000
|
unkown
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
9C92000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
107D0000
|
heap
|
page read and write
|
||
149F000
|
stack
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
8800000
|
unkown
|
page read and write
|
||
A92C000
|
heap
|
page read and write
|
||
B500000
|
unkown
|
page readonly
|
||
1ACC000
|
heap
|
page read and write
|
||
104CF000
|
unkown
|
page read and write
|
||
2A1A000
|
heap
|
page read and write
|
||
5055000
|
trusted library allocation
|
page read and write
|
||
44D0000
|
heap
|
page read and write
|
||
29A000
|
unkown
|
page write copy
|
||
CFA000
|
trusted library allocation
|
page execute and read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
13F7000
|
trusted library allocation
|
page read and write
|
||
9F75000
|
heap
|
page read and write
|
||
401D000
|
trusted library allocation
|
page read and write
|
||
7FF5DE539000
|
unkown
|
page readonly
|
||
502E000
|
stack
|
page read and write
|
||
4038000
|
trusted library allocation
|
page read and write
|
||
9FC0000
|
heap
|
page read and write
|
||
7FF5DE9C3000
|
unkown
|
page readonly
|
||
7D0000
|
heap
|
page read and write
|
||
9CCB000
|
heap
|
page read and write
|
||
27CE000
|
stack
|
page read and write
|
||
1AAA000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
2E39000
|
trusted library allocation
|
page read and write
|
||
A3E6000
|
heap
|
page read and write
|
||
2735000
|
trusted library allocation
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
A097000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
336C000
|
unkown
|
page read and write
|
||
2F21000
|
trusted library allocation
|
page read and write
|
||
A10B000
|
heap
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
6CEB000
|
stack
|
page read and write
|
||
1307000
|
heap
|
page read and write
|
||
C18A000
|
unkown
|
page read and write
|
||
4766000
|
unkown
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
1AB6000
|
heap
|
page read and write
|
||
7FF5DF0A5000
|
unkown
|
page readonly
|
||
501E000
|
stack
|
page read and write
|
||
9C8C000
|
heap
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
9CD6000
|
heap
|
page read and write
|
||
C319000
|
unkown
|
page read and write
|
||
53CE000
|
trusted library allocation
|
page read and write
|
||
52D5000
|
trusted library allocation
|
page read and write
|
||
401D000
|
trusted library allocation
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
7FF5DEE5A000
|
unkown
|
page readonly
|
||
8B60000
|
unkown
|
page read and write
|
||
7FF5DF392000
|
unkown
|
page readonly
|
||
DF0000
|
heap
|
page read and write
|
||
99A000
|
heap
|
page read and write
|
||
2731000
|
trusted library allocation
|
page read and write
|
||
2BDD000
|
trusted library allocation
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
A440000
|
heap
|
page read and write
|
||
29C0000
|
unclassified section
|
page read and write
|
||
9CB8000
|
heap
|
page read and write
|
||
12F1000
|
trusted library allocation
|
page read and write
|
||
4F9000
|
heap
|
page read and write
|
||
59FE000
|
trusted library allocation
|
page read and write
|
||
1ADC000
|
heap
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
5514000
|
trusted library allocation
|
page read and write
|
||
8BA000
|
heap
|
page read and write
|
||
9F34000
|
heap
|
page read and write
|
||
3F87000
|
trusted library allocation
|
page read and write
|
||
73AF000
|
unkown
|
page read and write
|
||
7FF5DF45C000
|
unkown
|
page readonly
|
||
9CB6000
|
heap
|
page read and write
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
BF10000
|
unkown
|
page readonly
|
||
561C000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
A12C000
|
heap
|
page read and write
|
||
3356000
|
unkown
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
A163000
|
heap
|
page read and write
|
||
10A4000
|
trusted library allocation
|
page read and write
|
||
3304000
|
unkown
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
9CAE000
|
heap
|
page read and write
|
||
9F63000
|
unkown
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
B7F000
|
stack
|
page read and write
|
||
940C000
|
stack
|
page read and write
|
||
4CE000
|
stack
|
page read and write
|
||
1447000
|
trusted library allocation
|
page read and write
|
||
14BA000
|
trusted library allocation
|
page execute and read and write
|
||
14AD000
|
trusted library allocation
|
page execute and read and write
|
||
680E000
|
stack
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
7FF5DF24E000
|
unkown
|
page readonly
|
||
54ED000
|
trusted library allocation
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
9C98000
|
heap
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
A195000
|
heap
|
page read and write
|
||
17BA000
|
stack
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
400F000
|
trusted library allocation
|
page read and write
|
||
7FF5DF16B000
|
unkown
|
page readonly
|
||
7FF5DE9CB000
|
unkown
|
page readonly
|
||
2DF0000
|
unkown
|
page read and write
|
||
9BC3000
|
heap
|
page read and write
|
||
A420000
|
heap
|
page read and write
|
||
11BD000
|
trusted library allocation
|
page execute and read and write
|
||
1061A000
|
unkown
|
page read and write
|
||
A2A1000
|
heap
|
page read and write
|
||
2A6D000
|
stack
|
page read and write
|
||
5024000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
83B0000
|
unkown
|
page readonly
|
||
104C7000
|
unkown
|
page read and write
|
||
9C82000
|
heap
|
page read and write
|
||
2FA4000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
9CD8000
|
heap
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
C003000
|
unkown
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
1627000
|
trusted library allocation
|
page read and write
|
||
9954000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
8590000
|
unkown
|
page readonly
|
||
4037000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
1A54000
|
heap
|
page read and write
|
||
9CA8000
|
heap
|
page read and write
|
||
7FF5DF584000
|
unkown
|
page readonly
|
||
8E9000
|
heap
|
page read and write
|
||
A215000
|
heap
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
1634000
|
unkown
|
page readonly
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
5140000
|
heap
|
page execute and read and write
|
||
4ED000
|
heap
|
page read and write
|
||
8800000
|
unkown
|
page read and write
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
104C7000
|
unkown
|
page read and write
|
||
1ADC000
|
heap
|
page read and write
|
||
54DE000
|
trusted library allocation
|
page read and write
|
||
2C9A000
|
stack
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
A46F000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
CED000
|
trusted library allocation
|
page execute and read and write
|
||
2E40000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
EE44000
|
unkown
|
page read and write
|
||
2FB7000
|
trusted library allocation
|
page read and write
|
||
11C6000
|
heap
|
page read and write
|
||
7FF5DF5FF000
|
unkown
|
page readonly
|
||
4FD1000
|
trusted library allocation
|
page read and write
|
||
104CD000
|
unkown
|
page read and write
|
||
4024000
|
trusted library allocation
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
28C0000
|
unclassified section
|
page read and write
|
||
4040000
|
trusted library allocation
|
page read and write
|
||
7FF5DF04D000
|
unkown
|
page readonly
|
||
1018000
|
heap
|
page read and write
|
||
EA4000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
2987000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
7FF5DEF87000
|
unkown
|
page readonly
|
||
1AA4000
|
heap
|
page read and write
|
||
2F87000
|
trusted library allocation
|
page read and write
|
||
3C40000
|
heap
|
page read and write
|
||
9CA7000
|
heap
|
page read and write
|
||
403D000
|
trusted library allocation
|
page read and write
|
||
4035000
|
trusted library allocation
|
page read and write
|
||
68DC000
|
stack
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
14B2000
|
trusted library allocation
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
9BD1000
|
heap
|
page read and write
|
||
7FF5DF59E000
|
unkown
|
page readonly
|
||
14C5000
|
heap
|
page read and write
|
||
3222000
|
trusted library allocation
|
page read and write
|
||
F2D000
|
heap
|
page read and write
|
||
A019000
|
heap
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
9CC9000
|
heap
|
page read and write
|
||
30F0000
|
remote allocation
|
page read and write
|
||
96F1000
|
unkown
|
page read and write
|
||
7FF5DEF57000
|
unkown
|
page readonly
|
||
A302000
|
heap
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
2C22000
|
trusted library allocation
|
page read and write
|
||
503E000
|
trusted library allocation
|
page read and write
|
||
108E3000
|
unkown
|
page read and write
|
||
2570000
|
trusted library allocation
|
page read and write
|
||
D69000
|
heap
|
page read and write
|
||
FD8A000
|
unkown
|
page read and write
|
||
4788000
|
unkown
|
page read and write
|
||
A33C000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
C2E4000
|
unkown
|
page read and write
|
||
7FF5DF221000
|
unkown
|
page readonly
|
||
A34F000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page execute and read and write
|
||
9CAC000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A8C3000
|
heap
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
9EAB000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
A22D000
|
heap
|
page read and write
|
||
4039000
|
trusted library allocation
|
page read and write
|
||
FB4000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
unkown
|
page readonly
|
||
CEB000
|
stack
|
page read and write
|
||
3EF7000
|
trusted library allocation
|
page read and write
|
||
7B50000
|
unkown
|
page readonly
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
73A7000
|
unkown
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
95EE000
|
stack
|
page read and write
|
||
4066000
|
trusted library allocation
|
page read and write
|
||
ADC0000
|
unkown
|
page readonly
|
||
A086000
|
heap
|
page read and write
|
||
BFA1000
|
unkown
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
7FF5DF5D6000
|
unkown
|
page readonly
|
||
51C000
|
heap
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
4040000
|
trusted library allocation
|
page read and write
|
||
4041000
|
trusted library allocation
|
page read and write
|
||
7FF5DEF90000
|
unkown
|
page readonly
|
||
38F0000
|
remote allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
105FF000
|
unkown
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
531E000
|
stack
|
page read and write
|
||
79F0000
|
unkown
|
page readonly
|
||
9A25000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
7FF5DF4FB000
|
unkown
|
page readonly
|
||
AC0D000
|
stack
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
3D57000
|
trusted library allocation
|
page read and write
|
||
7FF5DF47E000
|
unkown
|
page readonly
|
||
9489000
|
stack
|
page read and write
|
||
9BE1000
|
heap
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
4100000
|
trusted library allocation
|
page read and write
|
||
56CE000
|
stack
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
1A62000
|
heap
|
page read and write
|
||
9FB2000
|
heap
|
page read and write
|
||
2767000
|
trusted library allocation
|
page read and write
|
||
ED5000
|
trusted library allocation
|
page execute and read and write
|
||
2D78000
|
trusted library allocation
|
page read and write
|
||
1A50000
|
heap
|
page read and write
|
||
D7B000
|
stack
|
page read and write
|
||
41C9000
|
trusted library allocation
|
page read and write
|
||
7FF5DF284000
|
unkown
|
page readonly
|
||
A098000
|
unkown
|
page read and write
|
||
9EE2000
|
heap
|
page read and write
|
||
A084000
|
heap
|
page read and write
|
||
365D000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
28DA000
|
heap
|
page read and write
|
||
7FF5DF2BA000
|
unkown
|
page readonly
|
||
5524000
|
trusted library allocation
|
page read and write
|
||
104C6000
|
unkown
|
page read and write
|
||
4411000
|
trusted library allocation
|
page read and write
|
||
3FFA000
|
trusted library allocation
|
page read and write
|
||
2110000
|
heap
|
page read and write
|
||
5400000
|
trusted library allocation
|
page read and write
|
||
C4C0000
|
unkown
|
page read and write
|
||
1A50000
|
heap
|
page read and write
|
||
4FD9000
|
trusted library allocation
|
page read and write
|
||
53E4000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page execute and read and write
|
||
1195000
|
heap
|
page read and write
|
||
9CC2000
|
heap
|
page read and write
|
||
98E000
|
heap
|
page read and write
|
||
4022000
|
trusted library allocation
|
page read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
14BB000
|
trusted library allocation
|
page execute and read and write
|
||
9F68000
|
heap
|
page read and write
|
||
73CD000
|
unkown
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
9F36000
|
heap
|
page read and write
|
||
4016000
|
trusted library allocation
|
page read and write
|
||
9CAB000
|
heap
|
page read and write
|
||
4015000
|
trusted library allocation
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
579F000
|
stack
|
page read and write
|
||
4015000
|
trusted library allocation
|
page read and write
|
||
584E000
|
stack
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
7FF5DF01B000
|
unkown
|
page readonly
|
||
9F27000
|
unkown
|
page read and write
|
||
1055000
|
unkown
|
page execute read
|
||
5721000
|
trusted library allocation
|
page read and write
|
||
2F27000
|
trusted library allocation
|
page read and write
|
||
2C61000
|
trusted library allocation
|
page read and write
|
||
275F000
|
trusted library allocation
|
page read and write
|
||
1AD4000
|
heap
|
page read and write
|
||
8A36000
|
unkown
|
page read and write
|
||
CE4000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
9CBA000
|
heap
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
674C000
|
stack
|
page read and write
|
||
9C9F000
|
heap
|
page read and write
|
||
401D000
|
trusted library allocation
|
page read and write
|
||
C3BF000
|
unkown
|
page read and write
|
||
7F980000
|
trusted library allocation
|
page execute and read and write
|
||
A417000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
A20C000
|
heap
|
page read and write
|
||
7DF4E6771000
|
unkown
|
page execute read
|
||
9F47000
|
heap
|
page read and write
|
||
A155000
|
heap
|
page read and write
|
||
3FFE000
|
trusted library allocation
|
page read and write
|
||
A30F000
|
heap
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
103B000
|
trusted library allocation
|
page execute and read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
8810000
|
unkown
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
550E000
|
trusted library allocation
|
page read and write
|
||
9E2B000
|
heap
|
page read and write
|
||
9CC2000
|
heap
|
page read and write
|
||
9CB1000
|
heap
|
page read and write
|
||
9B99000
|
stack
|
page read and write
|
||
7FF5DEE52000
|
unkown
|
page readonly
|
||
2970000
|
trusted library allocation
|
page execute and read and write
|
||
5CB0000
|
heap
|
page read and write
|
||
A344000
|
heap
|
page read and write
|
||
9E32000
|
heap
|
page read and write
|
||
9CCE000
|
heap
|
page read and write
|
||
1441000
|
trusted library allocation
|
page read and write
|
||
A33E000
|
heap
|
page read and write
|
||
A0D2000
|
heap
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
1ADC000
|
heap
|
page read and write
|
||
F96000
|
trusted library allocation
|
page execute and read and write
|
||
FD84000
|
unkown
|
page read and write
|
||
2ABB000
|
trusted library allocation
|
page read and write
|
||
9D6000
|
stack
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
739B000
|
unkown
|
page read and write
|
||
51DC000
|
stack
|
page read and write
|
||
9F56000
|
heap
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
A118000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
7FF5DF0A2000
|
unkown
|
page readonly
|
||
51D2000
|
trusted library allocation
|
page read and write
|
||
9E38000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
74A9000
|
unkown
|
page read and write
|
||
A1DD000
|
heap
|
page read and write
|
||
1279000
|
heap
|
page read and write
|
||
A39E000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
4027000
|
trusted library allocation
|
page read and write
|
||
7FF5DF4BD000
|
unkown
|
page readonly
|
||
2DF7000
|
trusted library allocation
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
2D51000
|
trusted library allocation
|
page read and write
|
||
283E000
|
heap
|
page read and write
|
||
401D000
|
trusted library allocation
|
page read and write
|
||
289000
|
unkown
|
page readonly
|
||
B45A000
|
stack
|
page read and write
|
||
1AAD000
|
heap
|
page read and write
|
||
2AB4000
|
trusted library allocation
|
page read and write
|
||
10652000
|
unkown
|
page read and write
|
||
3FFF000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
7FF5DF0C1000
|
unkown
|
page readonly
|
||
4A4E000
|
stack
|
page read and write
|
||
2C31000
|
trusted library allocation
|
page read and write
|
||
7FF5DF4E7000
|
unkown
|
page readonly
|
||
2E60000
|
unkown
|
page read and write
|
||
3EE2000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
914B000
|
stack
|
page read and write
|
||
4750000
|
unkown
|
page read and write
|
||
1AD5000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
4410000
|
trusted library allocation
|
page read and write
|
||
5100000
|
heap
|
page read and write
|
||
4031000
|
trusted library allocation
|
page read and write
|
||
3394000
|
unkown
|
page read and write
|
||
29A0000
|
direct allocation
|
page execute and read and write
|
||
7FF5DE5CC000
|
unkown
|
page readonly
|
||
2CB7000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
25C7000
|
trusted library allocation
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
401C000
|
trusted library allocation
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
335B000
|
unkown
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
1342000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
53C4000
|
trusted library allocation
|
page read and write
|
||
1060F000
|
unkown
|
page read and write
|
||
7FF5DF0F1000
|
unkown
|
page readonly
|
||
9CBB000
|
heap
|
page read and write
|
||
A3CB000
|
heap
|
page read and write
|
||
1A3E000
|
heap
|
page read and write
|
||
5DA000
|
heap
|
page read and write
|
||
9EC5000
|
heap
|
page read and write
|
||
402A000
|
trusted library allocation
|
page read and write
|
||
AEF0000
|
unkown
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
3FF0000
|
trusted library allocation
|
page read and write
|
||
7FF5DEFF5000
|
unkown
|
page readonly
|
||
3F67000
|
trusted library allocation
|
page read and write
|
||
7FF5DF203000
|
unkown
|
page readonly
|
||
7FF5DF591000
|
unkown
|
page readonly
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
7FF5DF36A000
|
unkown
|
page readonly
|
||
2E60000
|
unkown
|
page read and write
|
||
54E6000
|
trusted library allocation
|
page read and write
|
||
11DD000
|
trusted library allocation
|
page execute and read and write
|
||
1A61000
|
heap
|
page read and write
|
||
738E000
|
unkown
|
page read and write
|
||
4919000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
FF1000
|
unkown
|
page readonly
|
||
9CAE000
|
heap
|
page read and write
|
||
7FF5DF12A000
|
unkown
|
page readonly
|
||
4076000
|
trusted library allocation
|
page read and write
|
||
EDB000
|
trusted library allocation
|
page execute and read and write
|
||
D30000
|
heap
|
page read and write
|
||
6A9E000
|
stack
|
page read and write
|
||
7FF5DF5FC000
|
unkown
|
page readonly
|
||
9F92000
|
unkown
|
page read and write
|
||
FE0000
|
unkown
|
page read and write
|
||
A428000
|
heap
|
page read and write
|
||
1156000
|
heap
|
page read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
7FF5DF045000
|
unkown
|
page readonly
|
||
292E000
|
stack
|
page read and write
|
||
D0B000
|
stack
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
4091000
|
trusted library allocation
|
page read and write
|
||
C4BC000
|
unkown
|
page read and write
|
||
7D89000
|
stack
|
page read and write
|
||
10CF000
|
heap
|
page read and write
|
||
1AA0000
|
heap
|
page read and write
|
||
1AC2000
|
heap
|
page read and write
|
||
53C6000
|
trusted library allocation
|
page read and write
|
||
7FF5DF26F000
|
unkown
|
page readonly
|
||
C187000
|
unkown
|
page read and write
|
||
2DD8000
|
trusted library allocation
|
page read and write
|
||
4006000
|
trusted library allocation
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
19FA000
|
heap
|
page read and write
|
||
2D70000
|
unkown
|
page read and write
|
||
1A50000
|
heap
|
page read and write
|
||
9F31000
|
heap
|
page read and write
|
||
7FF5DF62C000
|
unkown
|
page readonly
|
||
104C9000
|
unkown
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
10EA000
|
heap
|
page read and write
|
||
7FF5DF038000
|
unkown
|
page readonly
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
9C11000
|
heap
|
page read and write
|
||
2640000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
97D0000
|
unkown
|
page read and write
|
||
BF6D000
|
unkown
|
page read and write
|
||
12B2000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
unkown
|
page read and write
|
||
9DD0000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2DDE000
|
stack
|
page read and write
|
||
403E000
|
trusted library allocation
|
page read and write
|
||
101F000
|
stack
|
page read and write
|
||
1358000
|
heap
|
page read and write
|
||
2AC4000
|
trusted library allocation
|
page read and write
|
||
39D1000
|
trusted library allocation
|
page read and write
|
||
3FFA000
|
trusted library allocation
|
page read and write
|
||
1ACC000
|
heap
|
page read and write
|
||
7FF5DF0D2000
|
unkown
|
page readonly
|
||
1AC2000
|
heap
|
page read and write
|
||
A159000
|
heap
|
page read and write
|
||
7FF5DF017000
|
unkown
|
page readonly
|
||
B67000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
C1CC000
|
unkown
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
1AC0000
|
heap
|
page read and write
|
||
12A7000
|
heap
|
page read and write
|
||
10B1000
|
trusted library allocation
|
page read and write
|
||
1A3E000
|
heap
|
page read and write
|
||
403D000
|
trusted library allocation
|
page read and write
|
||
9CAB000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
51E1000
|
trusted library allocation
|
page read and write
|
||
4DE5000
|
trusted library allocation
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
1A3C000
|
heap
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
3FF6000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
trusted library allocation
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
9E7F000
|
heap
|
page read and write
|
||
950E000
|
stack
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page execute and read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
7FF5DF5F6000
|
unkown
|
page readonly
|
||
5476000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
A453000
|
heap
|
page read and write
|
||
BFAB000
|
unkown
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
260F000
|
stack
|
page read and write
|
||
3FF1000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
A0EF000
|
heap
|
page read and write
|
||
A0D8000
|
heap
|
page read and write
|
||
9D04000
|
heap
|
page read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
3FF1000
|
trusted library allocation
|
page read and write
|
||
9F60000
|
unkown
|
page read and write
|
||
9C9F000
|
heap
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
2BC5000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
FD85000
|
unkown
|
page read and write
|
||
9C58000
|
heap
|
page read and write
|
||
A2BA000
|
heap
|
page read and write
|
||
9C4E000
|
heap
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
A2DD000
|
heap
|
page read and write
|
||
A08D000
|
heap
|
page read and write
|
||
3EF1000
|
trusted library allocation
|
page read and write
|
||
3349000
|
unkown
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
51DC000
|
trusted library allocation
|
page read and write
|
||
A19A000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
B11C000
|
stack
|
page read and write
|
||
A2AA000
|
heap
|
page read and write
|
||
2BB4000
|
trusted library allocation
|
page read and write
|
||
A0FD000
|
heap
|
page read and write
|
||
A40A000
|
heap
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
780000
|
heap
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
2A10000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
A31D000
|
heap
|
page read and write
|
||
74F1000
|
unkown
|
page read and write
|
||
7FF5DF3A1000
|
unkown
|
page readonly
|
||
1AAD000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
4023000
|
trusted library allocation
|
page read and write
|
||
9CB6000
|
heap
|
page read and write
|
||
7FF5DF626000
|
unkown
|
page readonly
|
||
29B000
|
unkown
|
page execute and read and write
|
||
DB8000
|
heap
|
page read and write
|
||
5580000
|
unkown
|
page readonly
|
||
E0F000
|
heap
|
page read and write
|
||
1AAD000
|
heap
|
page read and write
|
||
A1BF000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
2C50000
|
heap
|
page execute and read and write
|
||
7FF5DF2E2000
|
unkown
|
page readonly
|
||
27F0000
|
heap
|
page read and write
|
||
AF7E000
|
stack
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
A329000
|
heap
|
page read and write
|
||
9940000
|
heap
|
page read and write
|
||
9CAA000
|
heap
|
page read and write
|
||
1AA4000
|
heap
|
page read and write
|
||
52C3000
|
unkown
|
page read and write
|
||
A3F7000
|
heap
|
page read and write
|
||
9CBA000
|
heap
|
page read and write
|
||
9CCC000
|
heap
|
page read and write
|
||
5506000
|
trusted library allocation
|
page read and write
|
||
77F0000
|
unkown
|
page read and write
|
||
1A62000
|
heap
|
page read and write
|
||
2F85000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
9960000
|
heap
|
page read and write
|
||
245B000
|
trusted library allocation
|
page execute and read and write
|
||
3731000
|
trusted library allocation
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
7FF5DF2DA000
|
unkown
|
page readonly
|
||
404D000
|
trusted library allocation
|
page read and write
|
||
104CF000
|
unkown
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
A37A000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
9C4C000
|
heap
|
page read and write
|
||
83F0000
|
unkown
|
page read and write
|
||
B1C0000
|
unkown
|
page readonly
|
||
7FF5DF23A000
|
unkown
|
page readonly
|
||
2EB0000
|
unkown
|
page readonly
|
||
9C8B000
|
heap
|
page read and write
|
||
736000
|
stack
|
page read and write
|
||
A18B000
|
heap
|
page read and write
|
||
4024000
|
trusted library allocation
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
10F6000
|
stack
|
page read and write
|
||
104CC000
|
unkown
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
99EF000
|
heap
|
page read and write
|
||
A74D000
|
unkown
|
page read and write
|
||
6BEB000
|
heap
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
4EA000
|
heap
|
page read and write
|
||
C048000
|
unkown
|
page read and write
|
||
3D51000
|
trusted library allocation
|
page read and write
|
||
1AD4000
|
heap
|
page read and write
|
||
104C1000
|
unkown
|
page read and write
|
||
5210000
|
heap
|
page execute and read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
A3DB000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
2BF4000
|
trusted library allocation
|
page read and write
|
||
34C0000
|
unkown
|
page read and write
|
||
5513000
|
trusted library allocation
|
page read and write
|
||
7FF5DF435000
|
unkown
|
page readonly
|
||
1000000
|
heap
|
page read and write
|
||
5241000
|
unkown
|
page read and write
|
||
8DE000
|
stack
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
2ACE000
|
trusted library allocation
|
page read and write
|
||
295F000
|
stack
|
page read and write
|
||
DD1000
|
heap
|
page read and write
|
||
92DB000
|
stack
|
page read and write
|
||
A499000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
A8C3000
|
heap
|
page read and write
|
||
B259000
|
stack
|
page read and write
|
||
5465000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
9A84000
|
heap
|
page read and write
|
||
A122000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
1ACC000
|
heap
|
page read and write
|
||
11B3000
|
trusted library allocation
|
page execute and read and write
|
||
A101000
|
heap
|
page read and write
|
||
1208000
|
heap
|
page read and write
|
||
8890000
|
unkown
|
page read and write
|
||
9CAF000
|
heap
|
page read and write
|
||
A6EE000
|
unkown
|
page read and write
|
||
4016000
|
trusted library allocation
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
9BB7000
|
heap
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
74E8000
|
unkown
|
page read and write
|
||
7FF5DF52D000
|
unkown
|
page readonly
|
||
7FF5DE531000
|
unkown
|
page readonly
|
||
659E000
|
stack
|
page read and write
|
||
A0FB000
|
heap
|
page read and write
|
||
10A3000
|
trusted library allocation
|
page execute and read and write
|
||
9FE2000
|
heap
|
page read and write
|
||
B359000
|
stack
|
page read and write
|
||
3399000
|
heap
|
page read and write
|
||
9CAC000
|
heap
|
page read and write
|
||
2BF6000
|
trusted library allocation
|
page read and write
|
||
3C47000
|
heap
|
page read and write
|
||
7FF5DF169000
|
unkown
|
page readonly
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
heap
|
page execute and read and write
|
||
7FF5DF54D000
|
unkown
|
page readonly
|
||
B59000
|
heap
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
A204000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
1ADA000
|
heap
|
page read and write
|
||
A02D000
|
unkown
|
page read and write
|
||
47D9000
|
unkown
|
page read and write
|
||
9F28000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
4003000
|
trusted library allocation
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
9D60000
|
heap
|
page read and write
|
||
9B90000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
402A000
|
trusted library allocation
|
page read and write
|
||
1610000
|
heap
|
page execute and read and write
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
403F000
|
trusted library allocation
|
page read and write
|
||
7F740000
|
trusted library allocation
|
page execute and read and write
|
||
528000
|
heap
|
page read and write
|
||
B4DB000
|
stack
|
page read and write
|
||
2610000
|
trusted library allocation
|
page read and write
|
||
A3D2000
|
heap
|
page read and write
|
||
86CB000
|
stack
|
page read and write
|
||
2824000
|
heap
|
page read and write
|
||
2AB8000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
7830000
|
unkown
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
7FF5DF029000
|
unkown
|
page readonly
|
||
8FD000
|
heap
|
page read and write
|
||
7FF5DF49C000
|
unkown
|
page readonly
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
1A22000
|
heap
|
page read and write
|
||
9C82000
|
heap
|
page read and write
|
||
9F9E000
|
heap
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
27D0000
|
unkown
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
E80000
|
unkown
|
page read and write
|
||
A455000
|
heap
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
79E0000
|
unkown
|
page readonly
|
||
1342000
|
trusted library allocation
|
page read and write
|
||
3BB1000
|
trusted library allocation
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
FD88000
|
unkown
|
page read and write
|
||
76F0000
|
unkown
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
4031000
|
trusted library allocation
|
page read and write
|
||
A130000
|
heap
|
page read and write
|
||
7A40000
|
unkown
|
page readonly
|
||
9490000
|
unkown
|
page read and write
|
||
9F14000
|
heap
|
page read and write
|
||
BF40000
|
unkown
|
page read and write
|
||
EA3000
|
trusted library allocation
|
page execute and read and write
|
||
9CB8000
|
heap
|
page read and write
|
||
9F20000
|
heap
|
page read and write
|
||
D0B000
|
trusted library allocation
|
page execute and read and write
|
||
A14D000
|
heap
|
page read and write
|
||
971C000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5041000
|
trusted library allocation
|
page read and write
|
||
9C8D000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
BF84000
|
unkown
|
page read and write
|
||
998F000
|
heap
|
page read and write
|
||
A59000
|
stack
|
page read and write
|
||
47F1000
|
unkown
|
page read and write
|
||
1054000
|
unkown
|
page read and write
|
||
4015000
|
trusted library allocation
|
page read and write
|
||
4015000
|
trusted library allocation
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
1A3C000
|
heap
|
page read and write
|
||
108E3000
|
unkown
|
page read and write
|
||
8800000
|
unkown
|
page read and write
|
||
93F6000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
A247000
|
heap
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
16C4000
|
trusted library allocation
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
9C92000
|
heap
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
249E000
|
stack
|
page read and write
|
||
4001000
|
trusted library allocation
|
page read and write
|
||
CFF000
|
stack
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
E40000
|
heap
|
page read and write
|
||
962B000
|
unkown
|
page read and write
|
||
A0BD000
|
heap
|
page read and write
|
||
2650000
|
heap
|
page execute and read and write
|
||
A29D000
|
heap
|
page read and write
|
||
38F0000
|
remote allocation
|
page read and write
|
||
9F5D000
|
heap
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
5800000
|
heap
|
page execute and read and write
|
||
24BE000
|
stack
|
page read and write
|
||
9981000
|
heap
|
page read and write
|
||
B2DF000
|
stack
|
page read and write
|
||
145F000
|
stack
|
page read and write
|
||
9BB0000
|
heap
|
page read and write
|
||
E48000
|
heap
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
A087000
|
heap
|
page read and write
|
||
407F000
|
trusted library allocation
|
page read and write
|
||
2BE2000
|
trusted library allocation
|
page read and write
|
||
7FF5DEF06000
|
unkown
|
page readonly
|
||
41B000
|
unkown
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
A881000
|
heap
|
page read and write
|
||
FD6000
|
trusted library allocation
|
page execute and read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
2631000
|
trusted library allocation
|
page read and write
|
||
9F3E000
|
unkown
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
7FF5DE4F2000
|
unkown
|
page readonly
|
||
9E94000
|
heap
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
10617000
|
unkown
|
page read and write
|
||
9CCB000
|
heap
|
page read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
2BD1000
|
trusted library allocation
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
7FF5DF623000
|
unkown
|
page readonly
|
||
5565000
|
trusted library allocation
|
page read and write
|
||
14AE000
|
stack
|
page read and write
|
||
9B80000
|
heap
|
page read and write
|
||
9EC7000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
9CB7000
|
heap
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
9D66000
|
heap
|
page read and write
|
||
A923000
|
heap
|
page read and write
|
||
94C0000
|
unkown
|
page read and write
|
||
296C000
|
stack
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
4053000
|
trusted library allocation
|
page read and write
|
||
692E000
|
stack
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
D73000
|
unkown
|
page execute read
|
||
7FF5DF25B000
|
unkown
|
page readonly
|
||
9E4E000
|
heap
|
page read and write
|
||
A098000
|
heap
|
page read and write
|
||
1621000
|
trusted library allocation
|
page read and write
|
||
3D81000
|
trusted library allocation
|
page read and write
|
||
9C8D000
|
heap
|
page read and write
|
||
9F51000
|
unkown
|
page read and write
|
||
54CE000
|
trusted library allocation
|
page read and write
|
||
94C0000
|
unkown
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
644E000
|
stack
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
104C8000
|
unkown
|
page read and write
|
||
5030000
|
heap
|
page execute and read and write
|
||
2BD0000
|
heap
|
page execute and read and write
|
||
7ACE000
|
stack
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
104C2000
|
unkown
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
A2D9000
|
heap
|
page read and write
|
||
9FFC000
|
heap
|
page read and write
|
||
B010000
|
unkown
|
page read and write
|
||
9CBF000
|
heap
|
page read and write
|
||
48B0000
|
unkown
|
page read and write
|
||
4036000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
unkown
|
page readonly
|
||
14F7000
|
heap
|
page read and write
|
||
9E71000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
3EF5000
|
trusted library allocation
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
9C89000
|
heap
|
page read and write
|
||
971A000
|
unkown
|
page read and write
|
||
B74000
|
trusted library allocation
|
page read and write
|
||
9CCB000
|
heap
|
page read and write
|
||
4FB4000
|
trusted library allocation
|
page read and write
|
||
9C8F000
|
heap
|
page read and write
|
||
4015000
|
trusted library allocation
|
page read and write
|
||
40BC000
|
trusted library allocation
|
page read and write
|
||
1228000
|
heap
|
page read and write
|
||
5521000
|
trusted library allocation
|
page read and write
|
||
9D6A000
|
heap
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
404F000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
C24C000
|
unkown
|
page read and write
|
||
576F000
|
stack
|
page read and write
|
||
104C9000
|
unkown
|
page read and write
|
||
289000
|
unkown
|
page readonly
|
||
A0A7000
|
unkown
|
page read and write
|
||
61CE000
|
stack
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
66C000
|
stack
|
page read and write
|
||
5410000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5563000
|
trusted library allocation
|
page read and write
|
||
4016000
|
trusted library allocation
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
8DB000
|
stack
|
page read and write
|
||
C034000
|
unkown
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
4420000
|
heap
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
2452000
|
trusted library allocation
|
page read and write
|
||
2BB4000
|
trusted library allocation
|
page read and write
|
||
7FF5DF382000
|
unkown
|
page readonly
|
||
8B60000
|
unkown
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
9CBB000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
AE6F000
|
stack
|
page read and write
|
||
50A0000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
7FF5DF55A000
|
unkown
|
page readonly
|
||
A207000
|
heap
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
551E000
|
stack
|
page read and write
|
||
874C000
|
stack
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
9A6C000
|
stack
|
page read and write
|
||
7B60000
|
unkown
|
page readonly
|
||
594E000
|
stack
|
page read and write
|
||
A3DE000
|
heap
|
page read and write
|
||
5783000
|
trusted library allocation
|
page read and write
|
||
8B60000
|
unkown
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
33D9000
|
trusted library allocation
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
1640000
|
heap
|
page read and write
|
||
A25A000
|
heap
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
unkown
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
7FF5C0B65000
|
unkown
|
page readonly
|
||
4B7B000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
9FD5000
|
heap
|
page read and write
|
There are 3182 hidden memdumps, click here to show them.