Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
JuHVfiAuLo.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\huge[1].dat
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2C50.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\37A.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\56AD.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nsm2A3E.tmp\blowfish.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsyDD2E.tmp\liteFirewall.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Del.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\ifgewai
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\ifgewai:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsm2A3E.tmp\INetC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsm2A3E.tmp\nsProcess.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsr66D4.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\start.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
|
MSVC program database ver 7.00, 512*4023 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
There are 105 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\JuHVfiAuLo.exe
|
"C:\Users\user\Desktop\JuHVfiAuLo.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Users\user\AppData\Roaming\ifgewai
|
C:\Users\user\AppData\Roaming\ifgewai
|
||
C:\Users\user\AppData\Local\Temp\37A.exe
|
C:\Users\user\AppData\Local\Temp\37A.exe
|
||
C:\Users\user\AppData\Local\Temp\2C50.exe
|
C:\Users\user\AppData\Local\Temp\2C50.exe
|
||
C:\Users\user\AppData\Local\Temp\56AD.exe
|
C:\Users\user\AppData\Local\Temp\56AD.exe
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
"C:\Users\user\AppData\Local\Temp\setup.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0
(Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --lang=en-US
--user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3420 --field-trial-handle=3424,i,8514718793866893320,15299251401448294970,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US
--service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36
(KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3536 --field-trial-handle=3424,i,8514718793866893320,15299251401448294970,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36
(KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3576 --field-trial-handle=3424,i,8514718793866893320,15299251401448294970,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux;
Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1
--num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719980718149919
--launch-time-ticks=5903769137 --mojo-platform-channel-handle=3936 --field-trial-handle=3424,i,8514718793866893320,15299251401448294970,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux;
Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2
--enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719980718149919 --launch-time-ticks=5903928806
--mojo-platform-channel-handle=4104 --field-trial-handle=3424,i,8514718793866893320,15299251401448294970,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
There are 22 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://gebeus.ru/tmp/index.php
|
|||
http://cx5519.com/tmp/index.php
|
|||
contintnetksows.shop
|
|||
http://evilos.cc/tmp/index.php
|
|||
ellaboratepwsz.xyz
|
|||
swellfrrgwwos.xyz
|
|||
foodypannyjsud.shop
|
|||
pedestriankodwu.xyz
|
|||
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://powerpoint.office.comer
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://android.notify.windows.com/iOSA4
|
unknown
|
||
https://chrome.google.com/webstore?hl=hiCtrl$1
|
unknown
|
||
https://chrome.google.com/webstore?hl=mr&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
|
unknown
|
||
https://foodypannyjsud.shop/w
|
unknown
|
||
https://support.google.com/chrome/answer/6098869
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html
|
unknown
|
||
https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
|
unknown
|
||
https://api.msn.com:443/v1/news/Feed/Windows?
|
unknown
|
||
https://chrome.google.com/webstore?hl=ms&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
|
unknown
|
||
https://chrome.google.com/webstore?hl=af&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://excel.office.com
|
unknown
|
||
https://www.msn.com/en-us/money/personalfinance/the-big-3-mistakes-financial-advisors-say-that-the-1
|
unknown
|
||
http://crbug.com/510270
|
unknown
|
||
https://chrome.google.com/webstore?hl=urCtrl$2
|
unknown
|
||
https://chrome.google.com/webstore?hl=ja&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
http://crbug.com/378067
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://chrome.google.com/webstore?hl=trCtrl$1
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
|
unknown
|
||
https://passwords.google.com
|
unknown
|
||
https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zeal
|
unknown
|
||
https://aui-cdn.atlassian.com/
|
unknown
|
||
http://crbug.com/497301
|
unknown
|
||
https://github.com/JamesNK/Newtonsoft.Json/issues/652
|
unknown
|
||
http://www.microsoft.c
|
unknown
|
||
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
|
unknown
|
||
https://android.notify.windows.com/iOSd
|
unknown
|
||
http://bageyou.xyz
|
unknown
|
||
http://crbug.com/642141
|
unknown
|
||
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://foodypannyjsud.shop/J
|
unknown
|
||
https://chrome.google.com/webstore?hl=afCtrl$1
|
unknown
|
||
https://chrome.google.com/webstore?hl=jaCtrl$1
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
|
unknown
|
||
https://foodypannyjsud.shop/pi_
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlB&antuanDiurus
|
unknown
|
||
https://bitbucket.org/
|
unknown
|
||
https://foodypannyjsud.shop/apin
|
unknown
|
||
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
https://support.google.com/chromebook?p=app_intent
|
unknown
|
||
http://crbug.com/717501
|
unknown
|
||
http://crbug.com/957772
|
unknown
|
||
https://foodypannyjsud.shop/apio
|
unknown
|
||
https://foodypannyjsud.shop/piV
|
unknown
|
||
http://crbug.com/839189
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://foodypannyjsud.shop/apiw
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://chrome.google.com/webstore?hl=mrCtrl$1
|
unknown
|
||
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html&
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlT&r
|
unknown
|
||
https://chrome.google.com/webstore?hl=hi&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://xiexie.wf/22_551/huge.dat
|
unknown
|
||
http://crbug.com/819404
|
unknown
|
||
https://outlook.com
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://crbug.com/514696
|
unknown
|
||
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
|
unknown
|
||
https://foodypannyjsud.shop/apiN
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://crbug.com/1446731
|
unknown
|
||
https://android.notify.windows.com/iOS
|
unknown
|
||
http://api.install-stat.debug.world/clients/installs
|
unknown
|
||
https://cdn.cookielaw.org/
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
|
unknown
|
||
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://support.google.com/chrome/a/answer/9122284
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlBestuur
|
unknown
|
||
https://www.msn.com/en-us/sports/other/washington-state-ad-asks-ncaa-for-compassion-and-understandin
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity=4
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
141.8.192.126
|
unknown
|
Russian Federation
|
||
188.114.96.3
|
unknown
|
European Union
|
||
185.68.16.7
|
unknown
|
Ukraine
|
||
127.0.0.127
|
unknown
|
unknown
|
||
2.185.214.11
|
unknown
|
Iran (ISLAMIC Republic Of)
|
||
146.70.169.164
|
unknown
|
United Kingdom
|
||
1.1.1.1
|
unknown
|
Australia
|
||
104.192.141.1
|
unknown
|
United States
|
||
188.114.97.3
|
unknown
|
European Union
|
||
172.67.221.174
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@explorerframe.dll,-13137
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@explorerframe.dll,-13138
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080022
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\uhoreg\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000204CA
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR
|
KGLToGCSUpdatedRevision
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\uhoreg\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Sid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Pid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GamePall
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
|
DontShowUI
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
tmp_uid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
reg
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
uid
|
||
HKEY_CURRENT_USER\Control Panel\Cursors
|
AppStarting
|
There are 211 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4371000
|
unclassified section
|
page read and write
|
||
28D1000
|
unclassified section
|
page read and write
|
||
39B0000
|
direct allocation
|
page execute and read and write
|
||
120D000
|
heap
|
page read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
C59000
|
heap
|
page read and write
|
||
5466000
|
trusted library allocation
|
page read and write
|
||
986000
|
heap
|
page read and write
|
||
7FF5030E4000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
A5B9000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
F63000
|
unkown
|
page execute read
|
||
19A000
|
stack
|
page read and write
|
||
37C1000
|
trusted library allocation
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
9B6000
|
stack
|
page read and write
|
||
A3F9000
|
heap
|
page read and write
|
||
7FF502D8F000
|
unkown
|
page readonly
|
||
D1F000
|
stack
|
page read and write
|
||
A7FD000
|
heap
|
page read and write
|
||
4E33000
|
unkown
|
page read and write
|
||
3001000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
B80000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
2814000
|
trusted library allocation
|
page read and write
|
||
4B9D000
|
stack
|
page read and write
|
||
5253000
|
heap
|
page execute and read and write
|
||
B30000
|
unkown
|
page read and write
|
||
7FF5031AD000
|
unkown
|
page readonly
|
||
114E000
|
stack
|
page read and write
|
||
A3F9000
|
heap
|
page read and write
|
||
A8B000
|
trusted library allocation
|
page execute and read and write
|
||
BE9000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
555F000
|
stack
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
BDC000
|
heap
|
page read and write
|
||
7FF50302D000
|
unkown
|
page readonly
|
||
B0A0000
|
unkown
|
page read and write
|
||
501F000
|
trusted library allocation
|
page read and write
|
||
ABCB000
|
stack
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
A743000
|
heap
|
page read and write
|
||
BBB0000
|
unkown
|
page read and write
|
||
B00000
|
trusted library allocation
|
page execute and read and write
|
||
4CC000
|
unkown
|
page readonly
|
||
A404000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
849000
|
heap
|
page read and write
|
||
309D000
|
unkown
|
page read and write
|
||
906000
|
trusted library allocation
|
page execute and read and write
|
||
7FF502EE3000
|
unkown
|
page readonly
|
||
80A0000
|
unkown
|
page readonly
|
||
3B05000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
4F6000
|
stack
|
page read and write
|
||
660000
|
trusted library allocation
|
page read and write
|
||
A34F000
|
heap
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
BFB9000
|
unkown
|
page read and write
|
||
A83B000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
FDA000
|
trusted library allocation
|
page execute and read and write
|
||
7FF50332C000
|
unkown
|
page readonly
|
||
C83000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
10758000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
BBE000
|
heap
|
page read and write
|
||
80F0000
|
unkown
|
page readonly
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FF502D00000
|
unkown
|
page readonly
|
||
AF3000
|
stack
|
page read and write
|
||
A33E000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
B09B000
|
stack
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
F65000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
22FE000
|
stack
|
page read and write
|
||
9D54000
|
unkown
|
page read and write
|
||
1EE000
|
stack
|
page read and write
|
||
7FF502FA2000
|
unkown
|
page readonly
|
||
C60000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
7FF503082000
|
unkown
|
page readonly
|
||
C6A000
|
heap
|
page read and write
|
||
7FF502F7A000
|
unkown
|
page readonly
|
||
35AD000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
3B25000
|
trusted library allocation
|
page read and write
|
||
A1DC000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A5D9000
|
heap
|
page read and write
|
||
2CB3000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
1070A000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
3B21000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page execute and read and write
|
||
617000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A93B000
|
heap
|
page read and write
|
||
A415000
|
heap
|
page read and write
|
||
9BE3000
|
unkown
|
page read and write
|
||
7FF502DF9000
|
unkown
|
page readonly
|
||
A440000
|
heap
|
page read and write
|
||
A5C1000
|
heap
|
page read and write
|
||
7FF503167000
|
unkown
|
page readonly
|
||
AA8D000
|
stack
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
7FF50334D000
|
unkown
|
page readonly
|
||
A7F2000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
6ECB000
|
unkown
|
page read and write
|
||
DBD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF503347000
|
unkown
|
page readonly
|
||
2950000
|
heap
|
page read and write
|
||
A85A000
|
heap
|
page read and write
|
||
2FB5000
|
trusted library allocation
|
page read and write
|
||
7FF502D6B000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
1080000
|
trusted library allocation
|
page execute and read and write
|
||
10EF000
|
heap
|
page read and write
|
||
2AD8000
|
trusted library allocation
|
page read and write
|
||
7FF502EBB000
|
unkown
|
page readonly
|
||
617000
|
heap
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
C155000
|
unkown
|
page read and write
|
||
A8E5000
|
heap
|
page read and write
|
||
A99C000
|
heap
|
page read and write
|
||
BF4000
|
trusted library allocation
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
2E45000
|
trusted library allocation
|
page read and write
|
||
AA3B000
|
heap
|
page read and write
|
||
A88D000
|
heap
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
A636000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A781000
|
heap
|
page read and write
|
||
2FC6000
|
trusted library allocation
|
page read and write
|
||
7651000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
2AF7000
|
trusted library allocation
|
page read and write
|
||
F5F000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
CC9000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
A3F8000
|
heap
|
page read and write
|
||
AB71000
|
heap
|
page read and write
|
||
24B7000
|
trusted library allocation
|
page read and write
|
||
AA63000
|
heap
|
page read and write
|
||
AAF1000
|
heap
|
page read and write
|
||
B78F000
|
stack
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
FB6000
|
trusted library allocation
|
page execute and read and write
|
||
B30000
|
unkown
|
page read and write
|
||
A3FB000
|
heap
|
page read and write
|
||
99FF000
|
stack
|
page read and write
|
||
43EA000
|
unkown
|
page read and write
|
||
A3A7000
|
heap
|
page read and write
|
||
2930000
|
trusted library allocation
|
page read and write
|
||
B4F000
|
stack
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
3B12000
|
trusted library allocation
|
page read and write
|
||
3B39000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
3B3C000
|
trusted library allocation
|
page read and write
|
||
C82000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
BD7000
|
heap
|
page read and write
|
||
A440000
|
heap
|
page read and write
|
||
9E0000
|
unkown
|
page read and write
|
||
7FF502D65000
|
unkown
|
page readonly
|
||
987E000
|
stack
|
page read and write
|
||
2600000
|
heap
|
page read and write
|
||
BB50000
|
unkown
|
page read and write
|
||
3B34000
|
trusted library allocation
|
page read and write
|
||
B11000
|
trusted library allocation
|
page read and write
|
||
A6B3000
|
heap
|
page read and write
|
||
6FBF000
|
unkown
|
page read and write
|
||
2CBD000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
BDD5000
|
unkown
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
3B5D000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
546B000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
7FF5026F7000
|
unkown
|
page readonly
|
||
B610000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
8610000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
7FF502F66000
|
unkown
|
page readonly
|
||
A20D000
|
heap
|
page read and write
|
||
3CD5000
|
trusted library allocation
|
page read and write
|
||
8BB000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page execute and read and write
|
||
BD6000
|
heap
|
page read and write
|
||
A3F0000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
1039000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A060000
|
heap
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
AFF9000
|
heap
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
A474000
|
heap
|
page read and write
|
||
27C3000
|
trusted library allocation
|
page read and write
|
||
B5F0000
|
unkown
|
page readonly
|
||
A786000
|
heap
|
page read and write
|
||
974000
|
trusted library allocation
|
page read and write
|
||
3F0A000
|
trusted library allocation
|
page read and write
|
||
A41D000
|
heap
|
page read and write
|
||
A739000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
CAE000
|
heap
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
3B34000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
FD47000
|
unkown
|
page read and write
|
||
4C4F000
|
stack
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
7560000
|
unkown
|
page readonly
|
||
6EE4000
|
unkown
|
page read and write
|
||
3B47000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
4730000
|
heap
|
page read and write
|
||
9D03000
|
unkown
|
page read and write
|
||
297A000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
BC15000
|
unkown
|
page read and write
|
||
A832000
|
heap
|
page read and write
|
||
A9A0000
|
heap
|
page read and write
|
||
9B8A000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page execute and read and write
|
||
AEE000
|
stack
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
9364000
|
unkown
|
page read and write
|
||
1824000
|
unkown
|
page readonly
|
||
A615000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page execute and read and write
|
||
DAF000
|
stack
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
7FF5030A5000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
CFB000
|
heap
|
page read and write
|
||
7FF503129000
|
unkown
|
page readonly
|
||
C08000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
2BAC000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
30B4000
|
unkown
|
page read and write
|
||
3B7F000
|
trusted library allocation
|
page read and write
|
||
A4FB000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A6D5000
|
heap
|
page read and write
|
||
A417000
|
heap
|
page read and write
|
||
2F10000
|
unkown
|
page readonly
|
||
D6D000
|
heap
|
page read and write
|
||
9CEA000
|
unkown
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
B990000
|
unkown
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4865000
|
trusted library allocation
|
page read and write
|
||
7FF502CCE000
|
unkown
|
page readonly
|
||
3B5C000
|
trusted library allocation
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
3B34000
|
trusted library allocation
|
page read and write
|
||
7FF502C2E000
|
unkown
|
page readonly
|
||
7DF411EE0000
|
unkown
|
page readonly
|
||
3B08000
|
trusted library allocation
|
page read and write
|
||
2E79000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A6ED000
|
heap
|
page read and write
|
||
B80000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A85F000
|
heap
|
page read and write
|
||
BC0C000
|
unkown
|
page read and write
|
||
3AF5000
|
trusted library allocation
|
page read and write
|
||
3B2C000
|
trusted library allocation
|
page read and write
|
||
1047000
|
heap
|
page read and write
|
||
10700000
|
heap
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
2810000
|
trusted library allocation
|
page read and write
|
||
2C1A000
|
trusted library allocation
|
page execute and read and write
|
||
C8D000
|
trusted library allocation
|
page execute and read and write
|
||
A42C000
|
heap
|
page read and write
|
||
73A000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
7FF502F88000
|
unkown
|
page readonly
|
||
7FF5032B5000
|
unkown
|
page readonly
|
||
7750000
|
unkown
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
8D48000
|
stack
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
B560000
|
unkown
|
page read and write
|
||
7FF5031DA000
|
unkown
|
page readonly
|
||
B0A0000
|
unkown
|
page read and write
|
||
A7AF000
|
heap
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
A8E7000
|
heap
|
page read and write
|
||
BB0000
|
unkown
|
page read and write
|
||
A8B2000
|
heap
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
7FF5030CE000
|
unkown
|
page readonly
|
||
FD40000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A3FB000
|
heap
|
page read and write
|
||
819F000
|
stack
|
page read and write
|
||
120F000
|
heap
|
page read and write
|
||
C92000
|
heap
|
page read and write
|
||
C19000
|
heap
|
page read and write
|
||
FFA000
|
trusted library allocation
|
page execute and read and write
|
||
90A000
|
trusted library allocation
|
page execute and read and write
|
||
91DE000
|
unkown
|
page read and write
|
||
66D000
|
trusted library allocation
|
page execute and read and write
|
||
C97000
|
heap
|
page read and write
|
||
7FF503231000
|
unkown
|
page readonly
|
||
A80C000
|
heap
|
page read and write
|
||
A154000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
7FF503245000
|
unkown
|
page readonly
|
||
A94A000
|
heap
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
44D0000
|
unkown
|
page read and write
|
||
7FF503223000
|
unkown
|
page readonly
|
||
B610000
|
unkown
|
page read and write
|
||
3B08000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A8D1000
|
heap
|
page read and write
|
||
1345000
|
heap
|
page read and write
|
||
545E000
|
stack
|
page read and write
|
||
C6B000
|
heap
|
page read and write
|
||
7DF411EF1000
|
unkown
|
page execute read
|
||
B80000
|
unkown
|
page read and write
|
||
3067000
|
unkown
|
page read and write
|
||
807B000
|
stack
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
7480000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
5115000
|
trusted library allocation
|
page read and write
|
||
C6A000
|
heap
|
page read and write
|
||
7FF50318B000
|
unkown
|
page readonly
|
||
B6D0000
|
unkown
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A432000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A3C1000
|
heap
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
1240000
|
trusted library allocation
|
page execute and read and write
|
||
12F0000
|
heap
|
page read and write
|
||
2E77000
|
trusted library allocation
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
BDCB000
|
unkown
|
page read and write
|
||
9255000
|
unkown
|
page read and write
|
||
3BF0000
|
heap
|
page read and write
|
||
B33A000
|
stack
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
3B0D000
|
trusted library allocation
|
page read and write
|
||
C7A000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
2959000
|
trusted library allocation
|
page read and write
|
||
7FF502E60000
|
unkown
|
page readonly
|
||
B30000
|
unkown
|
page read and write
|
||
4AC0000
|
heap
|
page execute and read and write
|
||
C88000
|
heap
|
page read and write
|
||
4DD3000
|
trusted library allocation
|
page read and write
|
||
A806000
|
heap
|
page read and write
|
||
BE6000
|
stack
|
page read and write
|
||
7FF50270A000
|
unkown
|
page readonly
|
||
B30000
|
unkown
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
7FF502FA9000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
10741000
|
unkown
|
page read and write
|
||
7FF502C9D000
|
unkown
|
page readonly
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
E90000
|
unkown
|
page readonly
|
||
7750000
|
unkown
|
page read and write
|
||
B099000
|
heap
|
page read and write
|
||
7DF411F01000
|
unkown
|
page execute read
|
||
B30000
|
unkown
|
page read and write
|
||
B010000
|
unkown
|
page read and write
|
||
C62000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
27E4000
|
trusted library allocation
|
page read and write
|
||
A3F1000
|
heap
|
page read and write
|
||
A12F000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
BEAF000
|
unkown
|
page read and write
|
||
A728000
|
heap
|
page read and write
|
||
3B1C000
|
trusted library allocation
|
page read and write
|
||
A54C000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
A173000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A43F000
|
heap
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
A42F000
|
heap
|
page read and write
|
||
7370000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
947000
|
heap
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
A3AE000
|
heap
|
page read and write
|
||
B90000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
55D6000
|
unkown
|
page readonly
|
||
2708000
|
unkown
|
page readonly
|
||
C10000
|
unkown
|
page read and write
|
||
BEA3000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
3B13000
|
trusted library allocation
|
page read and write
|
||
FA3000
|
trusted library allocation
|
page execute and read and write
|
||
C5C000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
3B32000
|
trusted library allocation
|
page read and write
|
||
156F000
|
stack
|
page read and write
|
||
AA06000
|
heap
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
4FFC000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
unkown
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
F82000
|
trusted library allocation
|
page read and write
|
||
3B34000
|
trusted library allocation
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
3AFF000
|
trusted library allocation
|
page read and write
|
||
3099000
|
unkown
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
A429000
|
heap
|
page read and write
|
||
7FF50308A000
|
unkown
|
page readonly
|
||
A5B0000
|
heap
|
page read and write
|
||
A137000
|
heap
|
page read and write
|
||
3BFC000
|
trusted library allocation
|
page read and write
|
||
B640000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
1074D000
|
unkown
|
page read and write
|
||
A3F7000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
7FF502D20000
|
unkown
|
page readonly
|
||
B30000
|
unkown
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
106F000
|
heap
|
page read and write
|
||
AB33000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
A794000
|
heap
|
page read and write
|
||
A6F0000
|
unkown
|
page read and write
|
||
7FF502C30000
|
unkown
|
page readonly
|
||
54A4000
|
trusted library allocation
|
page read and write
|
||
7FF502F4B000
|
unkown
|
page readonly
|
||
695000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
A148000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
1202000
|
trusted library allocation
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
2DE0000
|
unkown
|
page read and write
|
||
A407000
|
heap
|
page read and write
|
||
4CA000
|
unkown
|
page read and write
|
||
A603000
|
heap
|
page read and write
|
||
A5E5000
|
heap
|
page read and write
|
||
3B25000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A7ED000
|
stack
|
page read and write
|
||
70B000
|
stack
|
page read and write
|
||
9CF4000
|
unkown
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
3B49000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
6F09000
|
unkown
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A5D7000
|
heap
|
page read and write
|
||
101F000
|
heap
|
page read and write
|
||
B80000
|
unkown
|
page read and write
|
||
A340000
|
heap
|
page read and write
|
||
AACE000
|
heap
|
page read and write
|
||
A43B000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
F51000
|
trusted library allocation
|
page read and write
|
||
EE14000
|
unkown
|
page read and write
|
||
539F000
|
stack
|
page read and write
|
||
441000
|
unkown
|
page execute read
|
||
3B7F000
|
trusted library allocation
|
page read and write
|
||
F57000
|
trusted library allocation
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
C10000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
heap
|
page read and write
|
||
79DD000
|
stack
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page execute and read and write
|
||
617000
|
heap
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
AB4B000
|
stack
|
page read and write
|
||
4378000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
7FF502D41000
|
unkown
|
page readonly
|
||
EE54000
|
unkown
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
58AE000
|
stack
|
page read and write
|
||
D68000
|
heap
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
AAF8000
|
heap
|
page read and write
|
||
AAA0000
|
unkown
|
page readonly
|
||
FD43000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
4891000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A5B7000
|
heap
|
page read and write
|
||
7FF503287000
|
unkown
|
page readonly
|
||
BDC7000
|
unkown
|
page read and write
|
||
9CF2000
|
unkown
|
page read and write
|
||
AEB000
|
stack
|
page read and write
|
||
3B23000
|
trusted library allocation
|
page read and write
|
||
2AD7000
|
trusted library allocation
|
page read and write
|
||
7FF502D04000
|
unkown
|
page readonly
|
||
418000
|
unkown
|
page readonly
|
||
3088000
|
unkown
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
7FF50317C000
|
unkown
|
page readonly
|
||
B6D0000
|
unkown
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
A41B000
|
heap
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
4398000
|
unkown
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
2720000
|
trusted library allocation
|
page read and write
|
||
A740000
|
heap
|
page read and write
|
||
10341000
|
unkown
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
A86C000
|
heap
|
page read and write
|
||
2944000
|
trusted library allocation
|
page read and write
|
||
3B20000
|
trusted library allocation
|
page read and write
|
||
5143000
|
trusted library allocation
|
page read and write
|
||
AA6F000
|
heap
|
page read and write
|
||
C5C000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A9FD000
|
heap
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
7FF5026FF000
|
unkown
|
page readonly
|
||
617000
|
heap
|
page read and write
|
||
3B33000
|
trusted library allocation
|
page read and write
|
||
664000
|
trusted library allocation
|
page read and write
|
||
27D6000
|
trusted library allocation
|
page read and write
|
||
7FF502DD1000
|
unkown
|
page readonly
|
||
134C000
|
heap
|
page read and write
|
||
5015000
|
trusted library allocation
|
page read and write
|
||
3B2E000
|
trusted library allocation
|
page read and write
|
||
B0C9000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
7FF502D29000
|
unkown
|
page readonly
|
||
C6C000
|
heap
|
page read and write
|
||
A779000
|
heap
|
page read and write
|
||
978000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
AA7E000
|
heap
|
page read and write
|
||
7FF502CF5000
|
unkown
|
page readonly
|
||
9050000
|
unkown
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A4C4000
|
heap
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
7FF502DCE000
|
unkown
|
page readonly
|
||
3B03000
|
trusted library allocation
|
page read and write
|
||
A629000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
A618000
|
heap
|
page read and write
|
||
27A0000
|
trusted library allocation
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A928000
|
heap
|
page read and write
|
||
D8C000
|
heap
|
page read and write
|
||
36AC000
|
stack
|
page read and write
|
||
BB50000
|
unkown
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
8889000
|
stack
|
page read and write
|
||
BB0000
|
unkown
|
page read and write
|
||
3B3C000
|
trusted library allocation
|
page read and write
|
||
9C8A000
|
unkown
|
page read and write
|
||
7FF502F22000
|
unkown
|
page readonly
|
||
A428000
|
heap
|
page read and write
|
||
B0D0000
|
unkown
|
page read and write
|
||
A60C000
|
heap
|
page read and write
|
||
9B6C000
|
heap
|
page read and write
|
||
525F000
|
stack
|
page read and write
|
||
7A58000
|
stack
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
5021000
|
trusted library allocation
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
A419000
|
heap
|
page read and write
|
||
7FF4ECBEF000
|
unkown
|
page readonly
|
||
10F7000
|
stack
|
page read and write
|
||
A9C2000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
3B1B000
|
trusted library allocation
|
page read and write
|
||
5332000
|
unkown
|
page readonly
|
||
FD48000
|
unkown
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
2C2B000
|
trusted library allocation
|
page execute and read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
FD4C000
|
unkown
|
page read and write
|
||
2E6F000
|
trusted library allocation
|
page read and write
|
||
48A5000
|
trusted library allocation
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
4D1F000
|
stack
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
A3B2000
|
heap
|
page read and write
|
||
2593000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
A404000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A7F4000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
7FF502D33000
|
unkown
|
page readonly
|
||
868000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
74C2000
|
unkown
|
page read and write
|
||
A41C000
|
heap
|
page read and write
|
||
A41A000
|
heap
|
page read and write
|
||
6ED7000
|
unkown
|
page read and write
|
||
B009000
|
stack
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
3B27000
|
trusted library allocation
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
3B1B000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
A090000
|
heap
|
page read and write
|
||
3E45000
|
trusted library allocation
|
page read and write
|
||
A936000
|
heap
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
1523000
|
trusted library allocation
|
page read and write
|
||
3B45000
|
trusted library allocation
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
3B2C000
|
trusted library allocation
|
page read and write
|
||
7470000
|
unkown
|
page read and write
|
||
A443000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
3B32000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
37C7000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
B02B000
|
heap
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
CBC000
|
heap
|
page read and write
|
||
3B19000
|
trusted library allocation
|
page read and write
|
||
8C5000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
A3AA000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
90BD000
|
unkown
|
page read and write
|
||
117F000
|
stack
|
page read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
3305000
|
trusted library allocation
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
B610000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
CEF000
|
heap
|
page read and write
|
||
A56E000
|
heap
|
page read and write
|
||
AB36000
|
heap
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
F7A000
|
trusted library allocation
|
page execute and read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
FD44000
|
unkown
|
page read and write
|
||
739000
|
heap
|
page read and write
|
||
BDF5000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A662000
|
heap
|
page read and write
|
||
A9B4000
|
heap
|
page read and write
|
||
2790000
|
trusted library allocation
|
page read and write
|
||
B80000
|
unkown
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
C59000
|
heap
|
page read and write
|
||
A21E000
|
heap
|
page read and write
|
||
C1AB000
|
unkown
|
page read and write
|
||
30A3000
|
unkown
|
page read and write
|
||
3B3C000
|
trusted library allocation
|
page read and write
|
||
26AD000
|
stack
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
C81000
|
heap
|
page read and write
|
||
AB10000
|
heap
|
page read and write
|
||
A868000
|
heap
|
page read and write
|
||
A42C000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A42A000
|
heap
|
page read and write
|
||
A918000
|
heap
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
9C2C000
|
unkown
|
page read and write
|
||
7810000
|
unkown
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
A439000
|
heap
|
page read and write
|
||
22F0000
|
trusted library allocation
|
page execute and read and write
|
||
A69A000
|
heap
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
AA14000
|
heap
|
page read and write
|
||
85C0000
|
unkown
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
A6AA000
|
heap
|
page read and write
|
||
2AA1000
|
trusted library allocation
|
page read and write
|
||
FD4D000
|
unkown
|
page read and write
|
||
A8ED000
|
heap
|
page read and write
|
||
7FF5030AA000
|
unkown
|
page readonly
|
||
2BF0000
|
heap
|
page execute and read and write
|
||
B30000
|
unkown
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
1257000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
C61000
|
heap
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
3B54000
|
trusted library allocation
|
page read and write
|
||
F76000
|
trusted library allocation
|
page execute and read and write
|
||
BF2E000
|
unkown
|
page read and write
|
||
9D01000
|
unkown
|
page read and write
|
||
A300000
|
heap
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
FC8000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
1244000
|
unkown
|
page write copy
|
||
1329000
|
heap
|
page read and write
|
||
7FF503195000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
2930000
|
heap
|
page execute and read and write
|
||
B30000
|
unkown
|
page read and write
|
||
48B6000
|
trusted library allocation
|
page read and write
|
||
2A71000
|
trusted library allocation
|
page read and write
|
||
DCDC000
|
stack
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
91B000
|
trusted library allocation
|
page execute and read and write
|
||
3B34000
|
trusted library allocation
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
7609000
|
stack
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
7FF502D18000
|
unkown
|
page readonly
|
||
A721000
|
heap
|
page read and write
|
||
9B83000
|
unkown
|
page read and write
|
||
B90000
|
unkown
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A2F8000
|
heap
|
page read and write
|
||
24AF000
|
trusted library allocation
|
page read and write
|
||
7FF502E8F000
|
unkown
|
page readonly
|
||
10DE000
|
stack
|
page read and write
|
||
A446000
|
heap
|
page read and write
|
||
7FF503187000
|
unkown
|
page readonly
|
||
A962000
|
heap
|
page read and write
|
||
930F000
|
unkown
|
page read and write
|
||
3AF2000
|
trusted library allocation
|
page read and write
|
||
3B06000
|
trusted library allocation
|
page read and write
|
||
7FF503126000
|
unkown
|
page readonly
|
||
C57000
|
heap
|
page read and write
|
||
7490000
|
unkown
|
page read and write
|
||
821B000
|
stack
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
11AA000
|
heap
|
page read and write
|
||
B549000
|
stack
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
C92000
|
heap
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
FC2000
|
trusted library allocation
|
page read and write
|
||
98FC000
|
stack
|
page read and write
|
||
9E4000
|
heap
|
page read and write
|
||
A587000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A8B0000
|
heap
|
page read and write
|
||
43AC000
|
unkown
|
page read and write
|
||
912000
|
trusted library allocation
|
page read and write
|
||
A3E5000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
7FF502DB8000
|
unkown
|
page readonly
|
||
A419000
|
heap
|
page read and write
|
||
AADF000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
8450000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
A7C5000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
7FF50328B000
|
unkown
|
page readonly
|
||
8596000
|
unkown
|
page read and write
|
||
7FF503216000
|
unkown
|
page readonly
|
||
9237000
|
unkown
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
206F000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
3B34000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
A400000
|
heap
|
page read and write
|
||
524F000
|
stack
|
page read and write
|
||
A40E000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
2907000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
F87000
|
trusted library allocation
|
page execute and read and write
|
||
7580000
|
unkown
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
7FF502FAF000
|
unkown
|
page readonly
|
||
9B87000
|
unkown
|
page read and write
|
||
A797000
|
heap
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
A5A3000
|
heap
|
page read and write
|
||
A492000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
3B27000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
AAAE000
|
heap
|
page read and write
|
||
4CB000
|
unkown
|
page execute and read and write
|
||
1633000
|
trusted library allocation
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
BB50000
|
unkown
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
A7D9000
|
heap
|
page read and write
|
||
37E7000
|
trusted library allocation
|
page read and write
|
||
A865000
|
heap
|
page read and write
|
||
7FF502D9D000
|
unkown
|
page readonly
|
||
B6D0000
|
unkown
|
page read and write
|
||
ED93000
|
unkown
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
9CCF000
|
unkown
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
2CD8000
|
trusted library allocation
|
page read and write
|
||
9092000
|
unkown
|
page read and write
|
||
3B34000
|
trusted library allocation
|
page read and write
|
||
C46000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
BFEE000
|
unkown
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
7FF502DC8000
|
unkown
|
page readonly
|
||
1010000
|
trusted library allocation
|
page execute and read and write
|
||
A5E8000
|
heap
|
page read and write
|
||
4431000
|
unkown
|
page read and write
|
||
535E000
|
stack
|
page read and write
|
||
D5B000
|
stack
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
7A60000
|
unkown
|
page read and write
|
||
3AA7000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
A42F000
|
heap
|
page read and write
|
||
5840000
|
heap
|
page execute and read and write
|
||
396000
|
stack
|
page read and write
|
||
9CF6000
|
unkown
|
page read and write
|
||
9D0000
|
unkown
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
3B65000
|
trusted library allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
BB50000
|
unkown
|
page read and write
|
||
43B0000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
AF80000
|
unkown
|
page read and write
|
||
AB08000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
C2B000
|
trusted library allocation
|
page execute and read and write
|
||
61E000
|
heap
|
page read and write
|
||
B76000
|
stack
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
A122000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
B80000
|
unkown
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
964E000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
3B03000
|
trusted library allocation
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
A41A000
|
heap
|
page read and write
|
||
21FF000
|
stack
|
page read and write
|
||
AAC8000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
9F1000
|
unkown
|
page readonly
|
||
9EB000
|
stack
|
page read and write
|
||
135A000
|
heap
|
page read and write
|
||
B990000
|
unkown
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
FBA000
|
trusted library allocation
|
page execute and read and write
|
||
61E000
|
heap
|
page read and write
|
||
6FE3000
|
unkown
|
page read and write
|
||
A41F000
|
heap
|
page read and write
|
||
A5F9000
|
heap
|
page read and write
|
||
A91D000
|
heap
|
page read and write
|
||
7FF502DAD000
|
unkown
|
page readonly
|
||
7750000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B8B000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
C7B000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
B80000
|
unkown
|
page read and write
|
||
A9EC000
|
heap
|
page read and write
|
||
C17C000
|
unkown
|
page read and write
|
||
A40D000
|
heap
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
146F000
|
stack
|
page read and write
|
||
AAD4000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
BDA9000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A43B000
|
heap
|
page read and write
|
||
AB59000
|
heap
|
page read and write
|
||
837000
|
trusted library allocation
|
page read and write
|
||
B90000
|
unkown
|
page read and write
|
||
B038000
|
heap
|
page read and write
|
||
A70F000
|
heap
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
91A7000
|
unkown
|
page read and write
|
||
A413000
|
heap
|
page read and write
|
||
A11F000
|
heap
|
page read and write
|
||
FF6000
|
trusted library allocation
|
page execute and read and write
|
||
12DB000
|
trusted library allocation
|
page execute and read and write
|
||
1040000
|
heap
|
page read and write
|
||
A417000
|
heap
|
page read and write
|
||
3B17000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
unkown
|
page readonly
|
||
EED000
|
trusted library allocation
|
page execute and read and write
|
||
3B1A000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
A763000
|
heap
|
page read and write
|
||
A544000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
2481000
|
trusted library allocation
|
page read and write
|
||
2B58000
|
stack
|
page read and write
|
||
A7A8000
|
heap
|
page read and write
|
||
B5A1000
|
unkown
|
page read and write
|
||
E30000
|
unkown
|
page read and write
|
||
7A2000
|
trusted library allocation
|
page read and write
|
||
A140000
|
heap
|
page read and write
|
||
4721000
|
heap
|
page read and write
|
||
13EF000
|
stack
|
page read and write
|
||
AF7F000
|
stack
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
7FF502D61000
|
unkown
|
page readonly
|
||
C8C000
|
heap
|
page read and write
|
||
A8BA000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
3CCD000
|
trusted library allocation
|
page read and write
|
||
7FF503087000
|
unkown
|
page readonly
|
||
3B1A000
|
trusted library allocation
|
page read and write
|
||
7548000
|
stack
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
7FF502E0A000
|
unkown
|
page readonly
|
||
49BE000
|
stack
|
page read and write
|
||
A421000
|
heap
|
page read and write
|
||
7FF503185000
|
unkown
|
page readonly
|
||
BEA9000
|
unkown
|
page read and write
|
||
1110000
|
heap
|
page execute and read and write
|
||
3301000
|
trusted library allocation
|
page read and write
|
||
307E000
|
unkown
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
A41B000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
617000
|
heap
|
page read and write
|
||
3B2F000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
7FF503020000
|
unkown
|
page readonly
|
||
4CC000
|
unkown
|
page readonly
|
||
2C70000
|
unkown
|
page readonly
|
||
43A0000
|
heap
|
page read and write
|
||
F11000
|
unkown
|
page execute read
|
||
7FF5032BD000
|
unkown
|
page readonly
|
||
A869000
|
stack
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
3B25000
|
trusted library allocation
|
page read and write
|
||
A723000
|
heap
|
page read and write
|
||
C83000
|
trusted library allocation
|
page execute and read and write
|
||
617000
|
heap
|
page read and write
|
||
701D000
|
unkown
|
page read and write
|
||
31D0000
|
remote allocation
|
page read and write
|
||
8100000
|
unkown
|
page readonly
|
||
B090000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
A8E9000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
AA29000
|
heap
|
page read and write
|
||
A405000
|
heap
|
page read and write
|
||
5040000
|
heap
|
page execute and read and write
|
||
B80000
|
unkown
|
page read and write
|
||
80E0000
|
unkown
|
page read and write
|
||
C8C000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
A320000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A87000
|
trusted library allocation
|
page execute and read and write
|
||
3B86000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
1293000
|
trusted library allocation
|
page execute and read and write
|
||
A760000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
C8C000
|
heap
|
page read and write
|
||
2DB0000
|
unkown
|
page read and write
|
||
BC80000
|
unkown
|
page read and write
|
||
6E15000
|
stack
|
page read and write
|
||
2F61000
|
heap
|
page read and write
|
||
27DB000
|
trusted library allocation
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
BD94000
|
unkown
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
7FF502E3F000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
85E1000
|
unkown
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A562000
|
heap
|
page read and write
|
||
44B0000
|
unkown
|
page read and write
|
||
B17000
|
trusted library allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
BE14000
|
unkown
|
page read and write
|
||
A441000
|
heap
|
page read and write
|
||
AB91000
|
heap
|
page read and write
|
||
59BC000
|
trusted library allocation
|
page read and write
|
||
7FF5032F2000
|
unkown
|
page readonly
|
||
F1B000
|
trusted library allocation
|
page execute and read and write
|
||
1320000
|
heap
|
page read and write
|
||
A36A000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
CE2000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
B048000
|
heap
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
BBA000
|
heap
|
page read and write
|
||
439B000
|
unkown
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
AAE2000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
A503000
|
heap
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
A955000
|
heap
|
page read and write
|
||
BFF4000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
3091000
|
unkown
|
page read and write
|
||
91FB000
|
unkown
|
page read and write
|
||
A445000
|
heap
|
page read and write
|
||
A54E000
|
heap
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
A36E000
|
unkown
|
page read and write
|
||
3AA1000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
2D25000
|
trusted library allocation
|
page read and write
|
||
A818000
|
heap
|
page read and write
|
||
D27000
|
heap
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
A71D000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A3F6000
|
heap
|
page read and write
|
||
7FF502F9F000
|
unkown
|
page readonly
|
||
B590000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
7FF502C4B000
|
unkown
|
page readonly
|
||
1430000
|
heap
|
page read and write
|
||
A687000
|
heap
|
page read and write
|
||
C7D000
|
heap
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
AB41000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
95C4000
|
unkown
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
3B27000
|
trusted library allocation
|
page read and write
|
||
A99A000
|
heap
|
page read and write
|
||
D36000
|
heap
|
page read and write
|
||
C99000
|
heap
|
page read and write
|
||
7FF502EC2000
|
unkown
|
page readonly
|
||
650000
|
trusted library allocation
|
page read and write
|
||
3AF2000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
255A000
|
stack
|
page read and write
|
||
BB0000
|
unkown
|
page read and write
|
||
3086000
|
unkown
|
page read and write
|
||
2829000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
3B44000
|
trusted library allocation
|
page read and write
|
||
FD4E000
|
unkown
|
page read and write
|
||
AFF2000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A142000
|
heap
|
page read and write
|
||
3E47000
|
trusted library allocation
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
2708000
|
unkown
|
page readonly
|
||
617000
|
heap
|
page read and write
|
||
4405000
|
unkown
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
A427000
|
heap
|
page read and write
|
||
A43B000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2AA5000
|
trusted library allocation
|
page read and write
|
||
297F000
|
stack
|
page read and write
|
||
6EF3000
|
unkown
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
1076E000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
7610000
|
unkown
|
page readonly
|
||
B0A0000
|
unkown
|
page read and write
|
||
C8F000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
10771000
|
unkown
|
page read and write
|
||
4A9E000
|
stack
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
48B4000
|
trusted library allocation
|
page read and write
|
||
275E000
|
trusted library allocation
|
page read and write
|
||
9BDE000
|
unkown
|
page read and write
|
||
A3FD000
|
heap
|
page read and write
|
||
2764000
|
trusted library allocation
|
page read and write
|
||
A434000
|
heap
|
page read and write
|
||
973000
|
trusted library allocation
|
page execute and read and write
|
||
A8EA000
|
stack
|
page read and write
|
||
BE8000
|
heap
|
page read and write
|
||
3AF7000
|
trusted library allocation
|
page read and write
|
||
586F000
|
stack
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
B0D0000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
A6EA000
|
heap
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
900000
|
trusted library allocation
|
page read and write
|
||
3BF1000
|
heap
|
page read and write
|
||
3C2D000
|
trusted library allocation
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
3D65000
|
trusted library allocation
|
page read and write
|
||
1299000
|
heap
|
page read and write
|
||
8E4000
|
trusted library allocation
|
page read and write
|
||
2850000
|
direct allocation
|
page execute and read and write
|
||
B90000
|
unkown
|
page read and write
|
||
7FF50324D000
|
unkown
|
page readonly
|
||
85C0000
|
unkown
|
page read and write
|
||
A65D000
|
heap
|
page read and write
|
||
7A7000
|
trusted library allocation
|
page execute and read and write
|
||
EA0000
|
heap
|
page read and write
|
||
FE53000
|
unkown
|
page read and write
|
||
BB50000
|
unkown
|
page read and write
|
||
7FF502D45000
|
unkown
|
page readonly
|
||
FAD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF502EF3000
|
unkown
|
page readonly
|
||
6FD000
|
stack
|
page read and write
|
||
B69A000
|
unkown
|
page read and write
|
||
AA55000
|
heap
|
page read and write
|
||
AA6B000
|
heap
|
page read and write
|
||
4B9000
|
unkown
|
page readonly
|
||
501C000
|
trusted library allocation
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
85C0000
|
unkown
|
page read and write
|
||
915000
|
trusted library allocation
|
page execute and read and write
|
||
B30000
|
unkown
|
page read and write
|
||
3AF8000
|
trusted library allocation
|
page read and write
|
||
919C000
|
unkown
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
A75B000
|
heap
|
page read and write
|
||
D42000
|
heap
|
page read and write
|
||
A736000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
2C57000
|
trusted library allocation
|
page read and write
|
||
A8F8000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
6EE6000
|
unkown
|
page read and write
|
||
12BA000
|
trusted library allocation
|
page execute and read and write
|
||
AA7B000
|
heap
|
page read and write
|
||
5605000
|
trusted library allocation
|
page read and write
|
||
A427000
|
heap
|
page read and write
|
||
A13A000
|
heap
|
page read and write
|
||
9C09000
|
unkown
|
page read and write
|
||
7FF50316E000
|
unkown
|
page readonly
|
||
5E5000
|
heap
|
page read and write
|
||
AABE000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
A3FE000
|
heap
|
page read and write
|
||
1298000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
3B34000
|
trusted library allocation
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
3B6A000
|
trusted library allocation
|
page read and write
|
||
3B14000
|
trusted library allocation
|
page read and write
|
||
4FE4000
|
trusted library allocation
|
page read and write
|
||
7FF502D25000
|
unkown
|
page readonly
|
||
C83000
|
heap
|
page read and write
|
||
276E000
|
trusted library allocation
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
A582000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
441000
|
unkown
|
page execute read
|
||
400000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
7FF502D84000
|
unkown
|
page readonly
|
||
A941000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
A85D000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
30A5000
|
unkown
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
C8F000
|
heap
|
page read and write
|
||
A3F2000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
10702000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
AFF2000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
EE3000
|
trusted library allocation
|
page execute and read and write
|
||
7750000
|
unkown
|
page read and write
|
||
A69E000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
4435000
|
unkown
|
page read and write
|
||
3B32000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
D10000
|
trusted library allocation
|
page execute and read and write
|
||
7DF411EE1000
|
unkown
|
page execute read
|
||
B30000
|
unkown
|
page read and write
|
||
4FE6000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
3B85000
|
trusted library allocation
|
page read and write
|
||
A802000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
8A0000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
AB21000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
2F61000
|
heap
|
page read and write
|
||
26B0000
|
heap
|
page read and write
|
||
39FB000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
4F95000
|
trusted library allocation
|
page read and write
|
||
3B2C000
|
trusted library allocation
|
page read and write
|
||
2304000
|
heap
|
page read and write
|
||
7FF502E53000
|
unkown
|
page readonly
|
||
A127000
|
heap
|
page read and write
|
||
BB0E000
|
stack
|
page read and write
|
||
A3F7000
|
heap
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
A9FF000
|
heap
|
page read and write
|
||
AADD000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
8F6000
|
stack
|
page read and write
|
||
F9F000
|
heap
|
page read and write
|
||
3AF2000
|
trusted library allocation
|
page read and write
|
||
3B25000
|
trusted library allocation
|
page read and write
|
||
B1BF000
|
stack
|
page read and write
|
||
7FF503010000
|
unkown
|
page readonly
|
||
BB0000
|
unkown
|
page read and write
|
||
C92000
|
heap
|
page read and write
|
||
A3D2000
|
heap
|
page read and write
|
||
90DA000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
3B4E000
|
trusted library allocation
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
A425000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
3B17000
|
trusted library allocation
|
page read and write
|
||
3B25000
|
trusted library allocation
|
page read and write
|
||
FBD000
|
trusted library allocation
|
page execute and read and write
|
||
29A000
|
stack
|
page read and write
|
||
A406000
|
heap
|
page read and write
|
||
C1A2000
|
unkown
|
page read and write
|
||
3B14000
|
trusted library allocation
|
page read and write
|
||
3BFE000
|
trusted library allocation
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
A5DF000
|
heap
|
page read and write
|
||
7FF503206000
|
unkown
|
page readonly
|
||
A97C000
|
heap
|
page read and write
|
||
FE94000
|
unkown
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
A7A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF503155000
|
unkown
|
page readonly
|
||
3B6C000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
A55A000
|
heap
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
A2F0000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
FE8F000
|
unkown
|
page read and write
|
||
7FF503365000
|
unkown
|
page readonly
|
||
3B0F000
|
trusted library allocation
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
A422000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
FEAE000
|
unkown
|
page read and write
|
||
7FF50328F000
|
unkown
|
page readonly
|
||
30A1000
|
unkown
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
AA78000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
BD7000
|
heap
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
9C000
|
stack
|
page read and write
|
||
59AF000
|
stack
|
page read and write
|
||
7840000
|
unkown
|
page read and write
|
||
AAA0000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
9BCB000
|
unkown
|
page read and write
|
||
3B86000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
remote allocation
|
page read and write
|
||
A403000
|
heap
|
page read and write
|
||
829C000
|
stack
|
page read and write
|
||
11E5000
|
trusted library allocation
|
page read and write
|
||
3AFB000
|
trusted library allocation
|
page read and write
|
||
A6F0000
|
unkown
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
A403000
|
heap
|
page read and write
|
||
27F1000
|
trusted library allocation
|
page read and write
|
||
A6FC000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
B237000
|
stack
|
page read and write
|
||
7FF502CD4000
|
unkown
|
page readonly
|
||
B6D0000
|
unkown
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
15D3000
|
trusted library allocation
|
page execute and read and write
|
||
BE8000
|
heap
|
page read and write
|
||
A857000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
3B25000
|
trusted library allocation
|
page read and write
|
||
A7C3000
|
heap
|
page read and write
|
||
3B65000
|
trusted library allocation
|
page read and write
|
||
7FF503055000
|
unkown
|
page readonly
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
A73C000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
3B2B000
|
trusted library allocation
|
page read and write
|
||
7FF502CDD000
|
unkown
|
page readonly
|
||
A751000
|
heap
|
page read and write
|
||
3B37000
|
trusted library allocation
|
page read and write
|
||
A332000
|
heap
|
page read and write
|
||
A225000
|
heap
|
page read and write
|
||
7FF503275000
|
unkown
|
page readonly
|
||
AB1D000
|
heap
|
page read and write
|
||
B80000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A9CF000
|
heap
|
page read and write
|
||
A9DA000
|
heap
|
page read and write
|
||
A93A000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A402000
|
heap
|
page read and write
|
||
A767000
|
heap
|
page read and write
|
||
B640000
|
unkown
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
7FF502D70000
|
unkown
|
page readonly
|
||
43B4000
|
unkown
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
3B5F000
|
trusted library allocation
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
B5D0000
|
unkown
|
page readonly
|
||
1277000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
4550000
|
heap
|
page read and write
|
||
A993000
|
heap
|
page read and write
|
||
3082000
|
unkown
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
3B26000
|
trusted library allocation
|
page read and write
|
||
1066000
|
heap
|
page read and write
|
||
936E000
|
unkown
|
page read and write
|
||
A78B000
|
heap
|
page read and write
|
||
A4B7000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
BBE8000
|
unkown
|
page read and write
|
||
FD4A000
|
unkown
|
page read and write
|
||
4BCF000
|
stack
|
page read and write
|
||
7720000
|
unkown
|
page readonly
|
||
A6C6000
|
heap
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
unkown
|
page read and write
|
||
3B13000
|
trusted library allocation
|
page read and write
|
||
D31000
|
trusted library allocation
|
page read and write
|
||
7FF502FB7000
|
unkown
|
page readonly
|
||
3B1A000
|
trusted library allocation
|
page read and write
|
||
A76A000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
DAB000
|
stack
|
page read and write
|
||
A5CE000
|
heap
|
page read and write
|
||
102E000
|
stack
|
page read and write
|
||
2971000
|
trusted library allocation
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
A92D000
|
heap
|
page read and write
|
||
AAB1000
|
heap
|
page read and write
|
||
1824000
|
unkown
|
page readonly
|
||
C01000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
3B44000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
8A49000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A413000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
2AA3000
|
trusted library allocation
|
page read and write
|
||
3C31000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
2C67000
|
trusted library allocation
|
page read and write
|
||
3B41000
|
trusted library allocation
|
page read and write
|
||
448A000
|
unkown
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
AB13000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
A3FB000
|
heap
|
page read and write
|
||
FE2000
|
trusted library allocation
|
page read and write
|
||
A49A000
|
heap
|
page read and write
|
||
E4F000
|
stack
|
page read and write
|
||
5330000
|
unkown
|
page readonly
|
||
7FF502D48000
|
unkown
|
page readonly
|
||
A706000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
C7C000
|
heap
|
page read and write
|
||
A657000
|
heap
|
page read and write
|
||
A80F000
|
heap
|
page read and write
|
||
A32F000
|
unkown
|
page read and write
|
||
3B26000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A8C9000
|
heap
|
page read and write
|
||
FC7000
|
trusted library allocation
|
page execute and read and write
|
||
1281000
|
heap
|
page read and write
|
||
B80000
|
unkown
|
page read and write
|
||
7FF50322D000
|
unkown
|
page readonly
|
||
37E1000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
3B17000
|
trusted library allocation
|
page read and write
|
||
FF79000
|
unkown
|
page read and write
|
||
3B65000
|
trusted library allocation
|
page read and write
|
||
A12D000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
AB79000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page read and write
|
||
6EC0000
|
unkown
|
page read and write
|
||
A5EC000
|
heap
|
page read and write
|
||
3B37000
|
trusted library allocation
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
A119000
|
heap
|
page read and write
|
||
9D6B000
|
unkown
|
page read and write
|
||
BDCD000
|
unkown
|
page read and write
|
||
A668000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
FE7F000
|
unkown
|
page read and write
|
||
A7F9000
|
heap
|
page read and write
|
||
7FF502B58000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
2816000
|
trusted library allocation
|
page read and write
|
||
FDD000
|
trusted library allocation
|
page execute and read and write
|
||
61E000
|
heap
|
page read and write
|
||
3C15000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
7FF503051000
|
unkown
|
page readonly
|
||
2891000
|
trusted library allocation
|
page read and write
|
||
3B6E000
|
trusted library allocation
|
page read and write
|
||
997F000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
AA50000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A576000
|
heap
|
page read and write
|
||
7FF502E0D000
|
unkown
|
page readonly
|
||
B6D0000
|
unkown
|
page read and write
|
||
C61000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
295E000
|
heap
|
page read and write
|
||
4FD5000
|
trusted library allocation
|
page read and write
|
||
BC08000
|
unkown
|
page read and write
|
||
24B1000
|
trusted library allocation
|
page read and write
|
||
AA59000
|
heap
|
page read and write
|
||
6BB000
|
stack
|
page read and write
|
||
A6D0000
|
heap
|
page read and write
|
||
CAE000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
20DE000
|
stack
|
page read and write
|
||
27C1000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
B90000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
5145000
|
trusted library allocation
|
page read and write
|
||
3B69000
|
trusted library allocation
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
A5CA000
|
heap
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
A3FB000
|
heap
|
page read and write
|
||
298E000
|
heap
|
page read and write
|
||
A568000
|
heap
|
page read and write
|
||
7630000
|
unkown
|
page readonly
|
||
C54000
|
heap
|
page read and write
|
||
2DC0000
|
unkown
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
5495000
|
trusted library allocation
|
page read and write
|
||
3B38000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
AB59000
|
heap
|
page read and write
|
||
C6C000
|
heap
|
page read and write
|
||
7FF503118000
|
unkown
|
page readonly
|
||
C89000
|
heap
|
page read and write
|
||
83D000
|
heap
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
BDE0000
|
unkown
|
page read and write
|
||
57B000
|
stack
|
page read and write
|
||
7FF5030EF000
|
unkown
|
page readonly
|
||
3AFF000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
FD30000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
93F6000
|
unkown
|
page read and write
|
||
902000
|
trusted library allocation
|
page read and write
|
||
FBD000
|
stack
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
5001000
|
trusted library allocation
|
page read and write
|
||
B80000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
7FF5031FF000
|
unkown
|
page readonly
|
||
2708000
|
unkown
|
page readonly
|
||
B59000
|
heap
|
page read and write
|
||
6F0F000
|
unkown
|
page read and write
|
||
275B000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
FD6000
|
trusted library allocation
|
page execute and read and write
|
||
4AA2000
|
trusted library allocation
|
page read and write
|
||
A700000
|
heap
|
page read and write
|
||
2C22000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page execute and read and write
|
||
30AC000
|
unkown
|
page read and write
|
||
F88000
|
heap
|
page read and write
|
||
7FF503368000
|
unkown
|
page readonly
|
||
A874000
|
heap
|
page read and write
|
||
3B14000
|
trusted library allocation
|
page read and write
|
||
7DF411ED1000
|
unkown
|
page execute read
|
||
617000
|
heap
|
page read and write
|
||
663000
|
trusted library allocation
|
page execute and read and write
|
||
630000
|
heap
|
page read and write
|
||
2DF0000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
A0E7000
|
heap
|
page read and write
|
||
298A000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
9BE6000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
44A0000
|
unkown
|
page read and write
|
||
4CA000
|
unkown
|
page write copy
|
||
F4D000
|
unkown
|
page readonly
|
||
617000
|
heap
|
page read and write
|
||
A6BF000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
FD40000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
1245000
|
unkown
|
page execute read
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
6ED9000
|
unkown
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
30CD000
|
unkown
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
2A90000
|
unkown
|
page readonly
|
||
617000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
FD44000
|
unkown
|
page read and write
|
||
C87000
|
heap
|
page read and write
|
||
3C01000
|
trusted library allocation
|
page read and write
|
||
A4A3000
|
heap
|
page read and write
|
||
68A000
|
trusted library allocation
|
page execute and read and write
|
||
1027000
|
trusted library allocation
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
C16000
|
trusted library allocation
|
page execute and read and write
|
||
A5AE000
|
heap
|
page read and write
|
||
C7C000
|
heap
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A49B000
|
heap
|
page read and write
|
||
332D000
|
stack
|
page read and write
|
||
3AF8000
|
trusted library allocation
|
page read and write
|
||
75E000
|
stack
|
page read and write
|
||
A508000
|
heap
|
page read and write
|
||
43C7000
|
unkown
|
page read and write
|
||
2F20000
|
unkown
|
page readonly
|
||
7750000
|
unkown
|
page read and write
|
||
7FF50303F000
|
unkown
|
page readonly
|
||
BE8000
|
heap
|
page read and write
|
||
2AA0000
|
unkown
|
page read and write
|
||
7FF5032D7000
|
unkown
|
page readonly
|
||
AA68000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
3B6D000
|
trusted library allocation
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
7FF5031B7000
|
unkown
|
page readonly
|
||
DC0000
|
heap
|
page read and write
|
||
7FF5030DE000
|
unkown
|
page readonly
|
||
7FF503239000
|
unkown
|
page readonly
|
||
C80000
|
heap
|
page read and write
|
||
7710000
|
unkown
|
page readonly
|
||
A968000
|
heap
|
page read and write
|
||
C95000
|
heap
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
4FF9000
|
trusted library allocation
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
970000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
trusted library allocation
|
page read and write
|
||
A3F0000
|
heap
|
page read and write
|
||
7FF502DC0000
|
unkown
|
page readonly
|
||
CEC000
|
heap
|
page read and write
|
||
F10000
|
unkown
|
page readonly
|
||
10811000
|
unkown
|
page read and write
|
||
BC5C000
|
unkown
|
page read and write
|
||
7FF502B7F000
|
unkown
|
page readonly
|
||
1036000
|
heap
|
page read and write
|
||
7FF502F8A000
|
unkown
|
page readonly
|
||
7FF5030E6000
|
unkown
|
page readonly
|
||
B6D0000
|
unkown
|
page read and write
|
||
3B34000
|
trusted library allocation
|
page read and write
|
||
EDDB000
|
unkown
|
page read and write
|
||
1C2000
|
unkown
|
page readonly
|
||
B029000
|
heap
|
page read and write
|
||
A79A000
|
heap
|
page read and write
|
||
BE8000
|
heap
|
page read and write
|
||
107C000
|
stack
|
page read and write
|
||
A194000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
3860000
|
remote allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A432000
|
heap
|
page read and write
|
||
A42A000
|
heap
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
A930000
|
heap
|
page read and write
|
||
2796000
|
trusted library allocation
|
page read and write
|
||
795D000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
28A0000
|
heap
|
page execute and read and write
|
||
27F8000
|
trusted library allocation
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
A6F9000
|
heap
|
page read and write
|
||
7FF503257000
|
unkown
|
page readonly
|
||
1272000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
A3F0000
|
heap
|
page read and write
|
||
3B03000
|
trusted library allocation
|
page read and write
|
||
1043000
|
heap
|
page read and write
|
||
14B000
|
stack
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
3AF2000
|
trusted library allocation
|
page read and write
|
||
A414000
|
heap
|
page read and write
|
||
A551000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A6B7000
|
heap
|
page read and write
|
||
1300000
|
trusted library allocation
|
page execute and read and write
|
||
29AA000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
A8B6000
|
heap
|
page read and write
|
||
7FF502E62000
|
unkown
|
page readonly
|
||
3B4D000
|
trusted library allocation
|
page read and write
|
||
A7FD000
|
heap
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
A3F7000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
BC55000
|
unkown
|
page read and write
|
||
1244000
|
unkown
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
3AF3000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
3B65000
|
trusted library allocation
|
page read and write
|
||
3B1B000
|
trusted library allocation
|
page read and write
|
||
B4C000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
1245000
|
unkown
|
page execute read
|
||
BFAE000
|
unkown
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
27BE000
|
stack
|
page read and write
|
||
3B03000
|
trusted library allocation
|
page read and write
|
||
6EE1000
|
unkown
|
page read and write
|
||
7FF5032C0000
|
unkown
|
page readonly
|
||
3AF6000
|
trusted library allocation
|
page read and write
|
||
A3CA000
|
heap
|
page read and write
|
||
4860000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
3B45000
|
trusted library allocation
|
page read and write
|
||
3B27000
|
trusted library allocation
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
3BF6000
|
trusted library allocation
|
page read and write
|
||
AB0D000
|
heap
|
page read and write
|
||
487B000
|
trusted library allocation
|
page read and write
|
||
EDD6000
|
unkown
|
page read and write
|
||
A828000
|
heap
|
page read and write
|
||
A973000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
6ECE000
|
unkown
|
page read and write
|
||
7FF502EC9000
|
unkown
|
page readonly
|
||
F9F000
|
stack
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
D43000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
1220000
|
trusted library allocation
|
page read and write
|
||
7FF5032A5000
|
unkown
|
page readonly
|
||
B990000
|
unkown
|
page read and write
|
||
1317000
|
trusted library allocation
|
page read and write
|
||
A982000
|
heap
|
page read and write
|
||
2A60000
|
unkown
|
page readonly
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
3B03000
|
trusted library allocation
|
page read and write
|
||
3AF7000
|
trusted library allocation
|
page read and write
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
BF3000
|
trusted library allocation
|
page execute and read and write
|
||
C98000
|
heap
|
page read and write
|
||
AA0B000
|
stack
|
page read and write
|
||
F7F000
|
stack
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
2901000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
7FF502DB3000
|
unkown
|
page readonly
|
||
B0A0000
|
unkown
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
9330000
|
unkown
|
page read and write
|
||
A87F000
|
heap
|
page read and write
|
||
A12B000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
A3FF000
|
heap
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
A423000
|
heap
|
page read and write
|
||
800000
|
unkown
|
page readonly
|
||
27C5000
|
trusted library allocation
|
page read and write
|
||
B90000
|
unkown
|
page read and write
|
||
5110000
|
trusted library allocation
|
page read and write
|
||
10F6000
|
stack
|
page read and write
|
||
7FF503333000
|
unkown
|
page readonly
|
||
A8D4000
|
heap
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
7FF503235000
|
unkown
|
page readonly
|
||
7550000
|
unkown
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
B88000
|
heap
|
page read and write
|
||
FE7000
|
trusted library allocation
|
page execute and read and write
|
||
A9E2000
|
heap
|
page read and write
|
||
43FD000
|
unkown
|
page read and write
|
||
55B0000
|
unkown
|
page readonly
|
||
342E000
|
stack
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
2317000
|
trusted library allocation
|
page read and write
|
||
2785000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
C8F000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A652000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
BFB4000
|
unkown
|
page read and write
|
||
7FF502DC3000
|
unkown
|
page readonly
|
||
A353000
|
heap
|
page read and write
|
||
7FF5030B4000
|
unkown
|
page readonly
|
||
B610000
|
unkown
|
page read and write
|
||
A3F9000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
3B2C000
|
trusted library allocation
|
page read and write
|
||
2A9F000
|
stack
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
FB7000
|
heap
|
page read and write
|
||
7FF503326000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
A314000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
4B9000
|
unkown
|
page readonly
|
||
C92000
|
heap
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
3CA9000
|
trusted library allocation
|
page read and write
|
||
1064000
|
heap
|
page read and write
|
||
AA46000
|
heap
|
page read and write
|
||
A18D000
|
heap
|
page read and write
|
||
C19000
|
heap
|
page read and write
|
||
2560000
|
unkown
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
4370000
|
unkown
|
page read and write
|
||
299C000
|
heap
|
page execute and read and write
|
||
FE6000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
A421000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
3307000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page read and write
|
||
4B0D000
|
stack
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
84DE000
|
stack
|
page read and write
|
||
AA76000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
7FF503277000
|
unkown
|
page readonly
|
||
617000
|
heap
|
page read and write
|
||
A712000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
2805000
|
trusted library allocation
|
page read and write
|
||
C27000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5031C3000
|
unkown
|
page readonly
|
||
C64000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
A876000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
918D000
|
unkown
|
page read and write
|
||
38D000
|
stack
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
A93D000
|
heap
|
page read and write
|
||
2882000
|
trusted library allocation
|
page read and write
|
||
10DE000
|
heap
|
page read and write
|
||
3B34000
|
trusted library allocation
|
page read and write
|
||
545F000
|
stack
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
2FF0000
|
heap
|
page execute and read and write
|
||
5250000
|
heap
|
page execute and read and write
|
||
C88000
|
heap
|
page read and write
|
||
A8DE000
|
heap
|
page read and write
|
||
A41C000
|
heap
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
3B86000
|
trusted library allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
3B7F000
|
trusted library allocation
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
9A7F000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
840000
|
heap
|
page execute and read and write
|
||
3B01000
|
trusted library allocation
|
page read and write
|
||
A556000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
AABC000
|
heap
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
BC27000
|
unkown
|
page read and write
|
||
D37000
|
trusted library allocation
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
A66000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B5E0000
|
unkown
|
page read and write
|
||
FFC5000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A92B000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
BC30000
|
unkown
|
page read and write
|
||
2745000
|
trusted library allocation
|
page read and write
|
||
A9F1000
|
heap
|
page read and write
|
||
C22000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
C81000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A2F0000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
3D38000
|
trusted library allocation
|
page read and write
|
||
3AF9000
|
trusted library allocation
|
page read and write
|
||
C9F000
|
heap
|
page read and write
|
||
CB3000
|
trusted library allocation
|
page execute and read and write
|
||
AAFC000
|
heap
|
page read and write
|
||
A69C000
|
heap
|
page read and write
|
||
A439000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
7FF5032AF000
|
unkown
|
page readonly
|
||
3052000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A070000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
10E7000
|
trusted library allocation
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
EAF000
|
stack
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A31C000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
12B4000
|
trusted library allocation
|
page read and write
|
||
FD4000
|
trusted library allocation
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
AAE5000
|
heap
|
page read and write
|
||
A0D2000
|
heap
|
page read and write
|
||
AB27000
|
heap
|
page read and write
|
||
4490000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
7AB000
|
trusted library allocation
|
page execute and read and write
|
||
921000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
B30000
|
unkown
|
page read and write
|
||
9193000
|
unkown
|
page read and write
|
||
ABD0000
|
unkown
|
page read and write
|
||
A61F000
|
heap
|
page read and write
|
||
A404000
|
heap
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
7FF502291000
|
unkown
|
page readonly
|
||
B640000
|
unkown
|
page read and write
|
||
C0DE000
|
unkown
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
AFFF000
|
heap
|
page read and write
|
||
FE70000
|
unkown
|
page read and write
|
||
A447000
|
heap
|
page read and write
|
||
A884000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A626000
|
heap
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
B49D000
|
heap
|
page read and write
|
||
24D7000
|
trusted library allocation
|
page read and write
|
||
5150000
|
heap
|
page execute and read and write
|
||
C30000
|
heap
|
page read and write
|
||
A421000
|
heap
|
page read and write
|
||
2CB5000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
3B3E000
|
trusted library allocation
|
page read and write
|
||
BB8000
|
heap
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
A3F1000
|
heap
|
page read and write
|
||
7FF5031B0000
|
unkown
|
page readonly
|
||
2AA5000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
BB50000
|
unkown
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
A913000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
7FF50301B000
|
unkown
|
page readonly
|
||
B6D0000
|
unkown
|
page read and write
|
||
A421000
|
heap
|
page read and write
|
||
8B5000
|
stack
|
page read and write
|
||
BBFA000
|
unkown
|
page read and write
|
||
7FF503006000
|
unkown
|
page readonly
|
||
AB89000
|
heap
|
page read and write
|
||
AB29000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
A807000
|
heap
|
page read and write
|
||
2A59000
|
stack
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A7F0000
|
heap
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
3B45000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
7FF4ECBF5000
|
unkown
|
page readonly
|
||
7FF5032C8000
|
unkown
|
page readonly
|
||
AACB000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
BE96000
|
unkown
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
11C4000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
FAB000
|
heap
|
page read and write
|
||
A8FB000
|
heap
|
page read and write
|
||
C1A000
|
trusted library allocation
|
page execute and read and write
|
||
D07000
|
heap
|
page read and write
|
||
CCD000
|
trusted library allocation
|
page execute and read and write
|
||
F10000
|
unkown
|
page readonly
|
||
A380000
|
heap
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
2E97000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
3860000
|
remote allocation
|
page read and write
|
||
8BC8000
|
stack
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
A990000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
3B3D000
|
trusted library allocation
|
page read and write
|
||
A4B4000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A325000
|
heap
|
page read and write
|
||
95A000
|
stack
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
A9A6000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
FE7E000
|
unkown
|
page read and write
|
||
10EB000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
7DF411EF0000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
B2BA000
|
stack
|
page read and write
|
||
7FF502E43000
|
unkown
|
page readonly
|
||
617000
|
heap
|
page read and write
|
||
C59000
|
heap
|
page read and write
|
||
7FF502D68000
|
unkown
|
page readonly
|
||
7FF503270000
|
unkown
|
page readonly
|
||
7FF502FB4000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
A3BA000
|
heap
|
page read and write
|
||
C81000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
3070000
|
direct allocation
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
AA5F000
|
heap
|
page read and write
|
||
AAC3000
|
heap
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
7FF5032C2000
|
unkown
|
page readonly
|
||
4560000
|
heap
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
3AF9000
|
trusted library allocation
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
A495000
|
heap
|
page read and write
|
||
A150000
|
heap
|
page read and write
|
||
7FF503151000
|
unkown
|
page readonly
|
||
9D0D000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
795000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
7FF503114000
|
unkown
|
page readonly
|
||
B4A6000
|
heap
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A9F5000
|
heap
|
page read and write
|
||
A11D000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
FD4A000
|
unkown
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
2FC4000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
C0FD000
|
unkown
|
page read and write
|
||
F50000
|
unkown
|
page read and write
|
||
7FF502DD3000
|
unkown
|
page readonly
|
||
355F000
|
stack
|
page read and write
|
||
BDF0000
|
unkown
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
C7E000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
BE8000
|
heap
|
page read and write
|
||
3B35000
|
trusted library allocation
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
4A3C000
|
trusted library allocation
|
page read and write
|
||
79F000
|
stack
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
A425000
|
heap
|
page read and write
|
||
BF7A000
|
unkown
|
page read and write
|
||
AB0B000
|
heap
|
page read and write
|
||
A72B000
|
heap
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
7FFD000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
BD6C000
|
unkown
|
page read and write
|
||
A72F000
|
heap
|
page read and write
|
||
E50000
|
unkown
|
page readonly
|
||
DF0000
|
heap
|
page read and write
|
||
2DA0000
|
unkown
|
page readonly
|
||
449A000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
7FF5032DB000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
11C3000
|
trusted library allocation
|
page execute and read and write
|
||
61E000
|
heap
|
page read and write
|
||
3B19000
|
trusted library allocation
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
A645000
|
heap
|
page read and write
|
||
6FDB000
|
unkown
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
7B6000
|
stack
|
page read and write
|
||
11E6000
|
trusted library allocation
|
page read and write
|
||
A9E5000
|
heap
|
page read and write
|
||
1000000
|
trusted library allocation
|
page execute and read and write
|
||
D40000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
3B00000
|
trusted library allocation
|
page read and write
|
||
FE60000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
BEE8000
|
unkown
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page read and write
|
||
2870000
|
trusted library allocation
|
page read and write
|
||
CDA000
|
trusted library allocation
|
page execute and read and write
|
||
61E000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
CD6000
|
trusted library allocation
|
page execute and read and write
|
||
A415000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
AD0C000
|
heap
|
page read and write
|
||
2ACF000
|
trusted library allocation
|
page read and write
|
||
7810000
|
unkown
|
page read and write
|
||
7FF5030A3000
|
unkown
|
page readonly
|
||
3B45000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
1219000
|
heap
|
page read and write
|
||
C5D000
|
heap
|
page read and write
|
||
A190000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
3B1C000
|
trusted library allocation
|
page read and write
|
||
A34D000
|
unkown
|
page read and write
|
||
FA4000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
41B000
|
unkown
|
page write copy
|
||
61E000
|
heap
|
page read and write
|
||
286E000
|
stack
|
page read and write
|
||
A882000
|
heap
|
page read and write
|
||
A346000
|
unkown
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
B6D0000
|
unkown
|
page read and write
|
||
3B03000
|
trusted library allocation
|
page read and write
|
||
1075A000
|
unkown
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
A347000
|
heap
|
page read and write
|
||
514E000
|
stack
|
page read and write
|
||
BB0000
|
unkown
|
page read and write
|
||
A805000
|
heap
|
page read and write
|
||
3B32000
|
trusted library allocation
|
page read and write
|
||
AB05000
|
heap
|
page read and write
|
||
7FF502DBC000
|
unkown
|
page readonly
|
||
C98000
|
heap
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
AA1D000
|
heap
|
page read and write
|
||
A412000
|
heap
|
page read and write
|
||
29AE000
|
heap
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
10F0000
|
heap
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
B640000
|
unkown
|
page read and write
|
||
A7D3000
|
heap
|
page read and write
|
||
2C16000
|
trusted library allocation
|
page execute and read and write
|
||
AFE000
|
stack
|
page read and write
|
||
FEAA000
|
unkown
|
page read and write
|
||
97D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF503335000
|
unkown
|
page readonly
|
||
A6DC000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
C7A000
|
heap
|
page read and write
|
||
FE86000
|
unkown
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
2C27000
|
trusted library allocation
|
page execute and read and write
|
||
FF87000
|
unkown
|
page read and write
|
||
3C07000
|
trusted library allocation
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
C77000
|
heap
|
page read and write
|
||
A93F000
|
heap
|
page read and write
|
||
4DB1000
|
unkown
|
page read and write
|
||
B90000
|
unkown
|
page read and write
|
||
290E000
|
stack
|
page read and write
|
||
A3FD000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
3AF1000
|
trusted library allocation
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
9BF7000
|
unkown
|
page read and write
|
||
96CC000
|
stack
|
page read and write
|
||
2935000
|
trusted library allocation
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
C5C000
|
heap
|
page read and write
|
||
A428000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
9191000
|
unkown
|
page read and write
|
||
A90C000
|
heap
|
page read and write
|
||
3B17000
|
trusted library allocation
|
page read and write
|
||
76A0000
|
unkown
|
page readonly
|
||
E3E000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B0D0000
|
unkown
|
page read and write
|
||
A95A000
|
heap
|
page read and write
|
||
A360000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
A146000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
DB3000
|
trusted library allocation
|
page execute and read and write
|
||
A684000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
5660000
|
heap
|
page execute and read and write
|
||
61E000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
4E49000
|
unkown
|
page read and write
|
||
3CC5000
|
trusted library allocation
|
page read and write
|
||
7FF5032F7000
|
unkown
|
page readonly
|
||
A679000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
810000
|
unkown
|
page readonly
|
||
B0A0000
|
unkown
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
A9AB000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
236E000
|
stack
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
A886000
|
heap
|
page read and write
|
||
FD45000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
A76000
|
trusted library allocation
|
page execute and read and write
|
||
435F000
|
stack
|
page read and write
|
||
4AAC000
|
trusted library allocation
|
page read and write
|
||
7FF5032FE000
|
unkown
|
page readonly
|
||
535E000
|
stack
|
page read and write
|
||
12F8000
|
heap
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
5592000
|
unkown
|
page readonly
|
||
7DF411F11000
|
unkown
|
page execute read
|
||
617000
|
heap
|
page read and write
|
||
670000
|
trusted library allocation
|
page read and write
|
||
A3FB000
|
heap
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
8ED000
|
trusted library allocation
|
page execute and read and write
|
||
55FE000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
7FF502D1B000
|
unkown
|
page readonly
|
||
A3FA000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
7FF503108000
|
unkown
|
page readonly
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
BE8000
|
heap
|
page read and write
|
||
3B86000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
7FF502B5B000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
AA09000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
3AFF000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
7FF502F94000
|
unkown
|
page readonly
|
||
B1B000
|
heap
|
page read and write
|
||
A42E000
|
heap
|
page read and write
|
||
7FF50327C000
|
unkown
|
page readonly
|
||
37E5000
|
trusted library allocation
|
page read and write
|
||
7FF502F47000
|
unkown
|
page readonly
|
||
C50000
|
heap
|
page read and write
|
||
2C61000
|
trusted library allocation
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
A53D000
|
heap
|
page read and write
|
||
BD2000
|
heap
|
page read and write
|
||
4876000
|
trusted library allocation
|
page read and write
|
||
288C000
|
trusted library allocation
|
page read and write
|
||
4010000
|
heap
|
page read and write
|
||
3AF7000
|
trusted library allocation
|
page read and write
|
||
7FF502DDC000
|
unkown
|
page readonly
|
||
B6D0000
|
unkown
|
page read and write
|
||
7DF411ED0000
|
unkown
|
page readonly
|
||
44DD000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
A400000
|
heap
|
page read and write
|
||
C7C000
|
heap
|
page read and write
|
||
A7B000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
3B4C000
|
trusted library allocation
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
A57F000
|
heap
|
page read and write
|
||
A42D000
|
heap
|
page read and write
|
||
A835000
|
heap
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
A161000
|
heap
|
page read and write
|
||
A670000
|
heap
|
page read and write
|
||
BB0000
|
unkown
|
page read and write
|
||
2470000
|
heap
|
page execute and read and write
|
||
3B3F000
|
trusted library allocation
|
page read and write
|
||
A410000
|
heap
|
page read and write
|
||
4FDE000
|
stack
|
page read and write
|
||
3B8D000
|
trusted library allocation
|
page read and write
|
||
B0D0000
|
unkown
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
A9BB000
|
heap
|
page read and write
|
||
3977000
|
trusted library allocation
|
page read and write
|
||
AFF0000
|
heap
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
AA35000
|
heap
|
page read and write
|
||
AAD0000
|
heap
|
page read and write
|
||
930000
|
trusted library allocation
|
page read and write
|
||
F6D000
|
trusted library allocation
|
page execute and read and write
|
||
B640000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
919F000
|
unkown
|
page read and write
|
||
A420000
|
heap
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
776000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
A420000
|
heap
|
page read and write
|
||
314D000
|
stack
|
page read and write
|
||
AA04000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
A7AC000
|
heap
|
page read and write
|
||
A319000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
4884000
|
trusted library allocation
|
page read and write
|
||
A597000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
87F000
|
heap
|
page read and write
|
||
3B16000
|
trusted library allocation
|
page read and write
|
||
4402000
|
unkown
|
page read and write
|
||
AB24000
|
heap
|
page read and write
|
||
2C01000
|
trusted library allocation
|
page read and write
|
||
A40A000
|
heap
|
page read and write
|
||
1297000
|
heap
|
page read and write
|
||
402A000
|
trusted library allocation
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
A922000
|
heap
|
page read and write
|
||
917000
|
trusted library allocation
|
page execute and read and write
|
||
AAB7000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
1008000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A42B000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
CBD000
|
trusted library allocation
|
page execute and read and write
|
||
120B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF50331B000
|
unkown
|
page readonly
|
||
460000
|
heap
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
A34A000
|
unkown
|
page read and write
|
||
3C9D000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
2AAF000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
unkown
|
page write copy
|
||
76B000
|
stack
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
7FF5030C4000
|
unkown
|
page readonly
|
||
12CB000
|
trusted library allocation
|
page execute and read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
EE4000
|
trusted library allocation
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
71E000
|
stack
|
page read and write
|
||
3B00000
|
trusted library allocation
|
page read and write
|
||
CB7000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
B0A0000
|
unkown
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
FD42000
|
unkown
|
page read and write
|
||
4CCF000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
3B27000
|
trusted library allocation
|
page read and write
|
||
29BB000
|
heap
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
2EF0000
|
stack
|
page read and write
|
||
3B32000
|
trusted library allocation
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
A695000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
BE3000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
308F000
|
unkown
|
page read and write
|
||
2AAD000
|
trusted library allocation
|
page read and write
|
||
7FF5030C9000
|
unkown
|
page readonly
|
||
B6D0000
|
unkown
|
page read and write
|
||
15D4000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
4463000
|
unkown
|
page read and write
|
||
A421000
|
heap
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
3B29000
|
trusted library allocation
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page read and write
|
||
C6F000
|
heap
|
page read and write
|
||
447A000
|
unkown
|
page read and write
|
||
4360000
|
unclassified section
|
page read and write
|
||
A220000
|
heap
|
page read and write
|
||
A471000
|
heap
|
page read and write
|
||
BE8000
|
heap
|
page read and write
|
||
E3CF000
|
stack
|
page read and write
|
||
A5C3000
|
heap
|
page read and write
|
||
AA1A000
|
heap
|
page read and write
|
||
A1E4000
|
heap
|
page read and write
|
||
7FF503175000
|
unkown
|
page readonly
|
||
A7D5000
|
heap
|
page read and write
|
||
95E000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
A998000
|
heap
|
page read and write
|
||
5610000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
FE5D000
|
unkown
|
page read and write
|
||
2301000
|
trusted library allocation
|
page read and write
|
||
A7F6000
|
heap
|
page read and write
|
||
702D000
|
unkown
|
page read and write
|
||
3B39000
|
trusted library allocation
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
A78F000
|
heap
|
page read and write
|
||
A608000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
BE8000
|
heap
|
page read and write
|
||
7FF502E9C000
|
unkown
|
page readonly
|
||
3B10000
|
trusted library allocation
|
page read and write
|
||
FF75000
|
unkown
|
page read and write
|
||
A6CD000
|
heap
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
BE3000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A41A000
|
heap
|
page read and write
|
||
7FF50312D000
|
unkown
|
page readonly
|
||
C8F000
|
heap
|
page read and write
|
||
31D0000
|
remote allocation
|
page read and write
|
||
A444000
|
heap
|
page read and write
|
||
12C7000
|
trusted library allocation
|
page execute and read and write
|
||
3B25000
|
trusted library allocation
|
page read and write
|
||
9D60000
|
unkown
|
page read and write
|
||
A6F7000
|
heap
|
page read and write
|
||
25F0000
|
trusted library allocation
|
page read and write
|
||
5474000
|
trusted library allocation
|
page read and write
|
||
1021000
|
trusted library allocation
|
page read and write
|
||
7FF503354000
|
unkown
|
page readonly
|
||
F8B000
|
trusted library allocation
|
page execute and read and write
|
||
72E000
|
heap
|
page read and write
|
||
A229000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
9416000
|
unkown
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
D3B000
|
stack
|
page read and write
|
||
7FF50335D000
|
unkown
|
page readonly
|
||
BC19000
|
unkown
|
page read and write
|
||
C8D000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
2794000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
AB7000
|
heap
|
page read and write
|
||
7FF502D3E000
|
unkown
|
page readonly
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
A41E000
|
heap
|
page read and write
|
||
553F000
|
stack
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
2AA1000
|
trusted library allocation
|
page read and write
|
||
495E000
|
stack
|
page read and write
|
||
7FF5030FF000
|
unkown
|
page readonly
|
||
A41E000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
3C4D000
|
trusted library allocation
|
page read and write
|
||
7FF5032CF000
|
unkown
|
page readonly
|
||
E85000
|
heap
|
page read and write
|
||
A5A1000
|
heap
|
page read and write
|
||
C35000
|
heap
|
page read and write
|
||
A80A000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
A8BD000
|
heap
|
page read and write
|
||
A3FC000
|
heap
|
page read and write
|
||
10756000
|
unkown
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
A9A8000
|
heap
|
page read and write
|
||
C60000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
55B0000
|
heap
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
7FF502D15000
|
unkown
|
page readonly
|
||
7FF502E06000
|
unkown
|
page readonly
|
||
B008000
|
heap
|
page read and write
|
||
1015000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
unkown
|
page read and write
|
||
A42C000
|
heap
|
page read and write
|
||
A414000
|
heap
|
page read and write
|
||
3AFC000
|
stack
|
page read and write
|
||
2620000
|
heap
|
page execute and read and write
|
||
61E000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
831E000
|
stack
|
page read and write
|
||
7FF502EB7000
|
unkown
|
page readonly
|
||
A3A0000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A98B000
|
heap
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
7FF503227000
|
unkown
|
page readonly
|
||
E80000
|
heap
|
page read and write
|
||
4970000
|
trusted library allocation
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
3B1A000
|
trusted library allocation
|
page read and write
|
||
3B13000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
BEF6000
|
unkown
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
AA2F000
|
heap
|
page read and write
|
||
A50B000
|
heap
|
page read and write
|
||
3AF3000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
AA88000
|
heap
|
page read and write
|
||
A84A000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
246F000
|
stack
|
page read and write
|
||
3B31000
|
trusted library allocation
|
page read and write
|
||
7FF502B7D000
|
unkown
|
page readonly
|
||
1090000
|
unkown
|
page readonly
|
||
D1E000
|
stack
|
page read and write
|
||
A894000
|
heap
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
AAB3000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
3AF9000
|
trusted library allocation
|
page read and write
|
||
FE5F000
|
unkown
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
A4B1000
|
heap
|
page read and write
|
||
A6FE000
|
heap
|
page read and write
|
||
B570000
|
unkown
|
page read and write
|
||
3AF0000
|
trusted library allocation
|
page read and write
|
||
296C000
|
heap
|
page execute and read and write
|
||
DECD000
|
stack
|
page read and write
|
||
977E000
|
stack
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
3AF2000
|
trusted library allocation
|
page read and write
|
||
4FF2000
|
trusted library allocation
|
page read and write
|
||
A909000
|
heap
|
page read and write
|
||
A6F0000
|
unkown
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
7FF50323B000
|
unkown
|
page readonly
|
||
A6B9000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
6FD7000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
7FF502EF7000
|
unkown
|
page readonly
|
||
A554000
|
heap
|
page read and write
|
||
565000
|
heap
|
page read and write
|
||
C7D000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
4002000
|
trusted library allocation
|
page read and write
|
||
A3A5000
|
heap
|
page read and write
|
||
C84000
|
trusted library allocation
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
A7A2000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
FD41000
|
unkown
|
page read and write
|
||
BA8B000
|
stack
|
page read and write
|
||
2E71000
|
trusted library allocation
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
BEE6000
|
unkown
|
page read and write
|
||
1311000
|
trusted library allocation
|
page read and write
|
||
A8CB000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
855E000
|
stack
|
page read and write
|
||
D1C000
|
stack
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
2780000
|
direct allocation
|
page execute and read and write
|
||
2EF2000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
11F8000
|
heap
|
page read and write
|
||
A425000
|
heap
|
page read and write
|
||
10F6000
|
stack
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
9AFF000
|
stack
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
AA85000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A81C000
|
heap
|
page read and write
|
||
A82000
|
trusted library allocation
|
page read and write
|
||
A8A0000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
3B0B000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A89B000
|
heap
|
page read and write
|
||
7FF503110000
|
unkown
|
page readonly
|
||
271E000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
7FF503032000
|
unkown
|
page readonly
|
||
1A0000
|
heap
|
page read and write
|
||
3B22000
|
trusted library allocation
|
page read and write
|
||
2BDA000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
F0A000
|
trusted library allocation
|
page execute and read and write
|
||
A826000
|
heap
|
page read and write
|
||
A675000
|
heap
|
page read and write
|
||
A7BE000
|
heap
|
page read and write
|
||
3AA5000
|
trusted library allocation
|
page read and write
|
||
831000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A87A000
|
heap
|
page read and write
|
||
CEB000
|
trusted library allocation
|
page execute and read and write
|
||
48DE000
|
stack
|
page read and write
|
||
A3F2000
|
heap
|
page read and write
|
||
A8A3000
|
heap
|
page read and write
|
||
85B000
|
stack
|
page read and write
|
||
7FF502B9A000
|
unkown
|
page readonly
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
76E0000
|
unkown
|
page readonly
|
||
686000
|
trusted library allocation
|
page execute and read and write
|
||
29D9000
|
stack
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
7FF502B8B000
|
unkown
|
page readonly
|
||
8110000
|
unkown
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
A542000
|
heap
|
page read and write
|
||
7FF502CFA000
|
unkown
|
page readonly
|
||
7FF50310B000
|
unkown
|
page readonly
|
||
5603000
|
trusted library allocation
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
8E0000
|
unkown
|
page readonly
|
||
A41F000
|
heap
|
page read and write
|
||
48B0000
|
trusted library allocation
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
7FF5032EB000
|
unkown
|
page readonly
|
||
B610000
|
unkown
|
page read and write
|
||
7FF502E5E000
|
unkown
|
page readonly
|
||
2910000
|
heap
|
page execute and read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
12B6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF503360000
|
unkown
|
page readonly
|
||
A3F2000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
2485000
|
trusted library allocation
|
page read and write
|
||
74B0000
|
unkown
|
page read and write
|
||
8440000
|
unkown
|
page read and write
|
||
C79000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
7620000
|
unkown
|
page readonly
|
||
501A000
|
trusted library allocation
|
page read and write
|
||
AB5F000
|
heap
|
page read and write
|
||
6EB0000
|
unkown
|
page read and write
|
||
3B1B000
|
trusted library allocation
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
BE99000
|
unkown
|
page read and write
|
||
B580000
|
unkown
|
page read and write
|
||
BB50000
|
unkown
|
page read and write
|
||
4DD5000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
A3FA000
|
heap
|
page read and write
|
||
A423000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
A564000
|
heap
|
page read and write
|
||
BE1C000
|
unkown
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
A906000
|
heap
|
page read and write
|
||
AFFB000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
A862000
|
heap
|
page read and write
|
||
8ECC000
|
stack
|
page read and write
|
||
3AF6000
|
trusted library allocation
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
10710000
|
unkown
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
A55C000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
1207000
|
trusted library allocation
|
page execute and read and write
|
||
617000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4005000
|
trusted library allocation
|
page read and write
|
||
A8EF000
|
heap
|
page read and write
|
||
A971000
|
heap
|
page read and write
|
||
B90000
|
unkown
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
126D000
|
heap
|
page read and write
|
||
3B13000
|
trusted library allocation
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
D22000
|
heap
|
page read and write
|
||
2874000
|
heap
|
page read and write
|
||
3860000
|
remote allocation
|
page read and write
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
3E74000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
AAEB000
|
heap
|
page read and write
|
||
C00A000
|
unkown
|
page read and write
|
||
A623000
|
heap
|
page read and write
|
||
7FF50326B000
|
unkown
|
page readonly
|
||
A631000
|
heap
|
page read and write
|
||
102B000
|
heap
|
page read and write
|
||
A14D000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
F17000
|
trusted library allocation
|
page execute and read and write
|
||
B45000
|
heap
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
7FF5030D9000
|
unkown
|
page readonly
|
||
8F0000
|
heap
|
page read and write
|
||
3B3C000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
3B00000
|
trusted library allocation
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
9BAA000
|
unkown
|
page read and write
|
||
2946000
|
trusted library allocation
|
page read and write
|
||
FE8D000
|
unkown
|
page read and write
|
||
7FF503189000
|
unkown
|
page readonly
|
||
617000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
A773000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
9D58000
|
unkown
|
page read and write
|
||
9450000
|
unkown
|
page readonly
|
||
1251000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
1C0000
|
unkown
|
page readonly
|
||
1294000
|
trusted library allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
A4AC000
|
heap
|
page read and write
|
||
15DD000
|
trusted library allocation
|
page execute and read and write
|
||
12C2000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A985000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
A5FD000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
2AC0000
|
unkown
|
page readonly
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
3B34000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
8080000
|
unkown
|
page readonly
|
||
7FF50331F000
|
unkown
|
page readonly
|
||
9B70000
|
unkown
|
page read and write
|
||
FFEB000
|
unkown
|
page read and write
|
||
AA71000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
8E3000
|
trusted library allocation
|
page execute and read and write
|
||
129D000
|
trusted library allocation
|
page execute and read and write
|
||
2756000
|
trusted library allocation
|
page read and write
|
||
7FF5031BC000
|
unkown
|
page readonly
|
||
A415000
|
heap
|
page read and write
|
||
2754000
|
trusted library allocation
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
452D000
|
trusted library allocation
|
page read and write
|
||
6E99000
|
stack
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
A429000
|
heap
|
page read and write
|
||
A5FF000
|
heap
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
3B7F000
|
trusted library allocation
|
page read and write
|
||
AA22000
|
heap
|
page read and write
|
||
5120000
|
heap
|
page execute and read and write
|
||
11AE000
|
heap
|
page read and write
|
||
FE95000
|
unkown
|
page read and write
|
||
A655000
|
heap
|
page read and write
|
||
4720000
|
heap
|
page read and write
|
||
A9D1000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
7FF502B88000
|
unkown
|
page readonly
|
||
7FF503130000
|
unkown
|
page readonly
|
||
5590000
|
unkown
|
page readonly
|
||
A6A5000
|
heap
|
page read and write
|
||
11D5000
|
trusted library allocation
|
page read and write
|
||
FCB000
|
trusted library allocation
|
page execute and read and write
|
||
7FF502B93000
|
unkown
|
page readonly
|
||
85C0000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
3AF3000
|
trusted library allocation
|
page read and write
|
||
3B25000
|
trusted library allocation
|
page read and write
|
||
1128000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
trusted library allocation
|
page read and write
|
||
7FF502CF2000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
A19A000
|
heap
|
page read and write
|
||
28C0000
|
unclassified section
|
page read and write
|
||
A5B3000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
CE7000
|
trusted library allocation
|
page execute and read and write
|
||
958000
|
heap
|
page read and write
|
||
B80000
|
unkown
|
page read and write
|
||
9366000
|
unkown
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
A9CC000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
3B6D000
|
trusted library allocation
|
page read and write
|
||
CB1000
|
trusted library allocation
|
page read and write
|
||
A68B000
|
heap
|
page read and write
|
||
A3F0000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
A41D000
|
heap
|
page read and write
|
||
3B47000
|
trusted library allocation
|
page read and write
|
||
7FF502C8C000
|
unkown
|
page readonly
|
||
7FF502B77000
|
unkown
|
page readonly
|
||
617000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
960000
|
trusted library allocation
|
page read and write
|
||
7FF5031E8000
|
unkown
|
page readonly
|
||
61E000
|
heap
|
page read and write
|
||
7FF502F2C000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page execute and read and write
|
||
617000
|
heap
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
7FF502F86000
|
unkown
|
page readonly
|
||
2CBF000
|
trusted library allocation
|
page read and write
|
||
AAB9000
|
heap
|
page read and write
|
||
3E41000
|
trusted library allocation
|
page read and write
|
||
FFBB000
|
unkown
|
page read and write
|
||
1092F000
|
unkown
|
page read and write
|
||
C92000
|
heap
|
page read and write
|
||
7FF502D10000
|
unkown
|
page readonly
|
||
C10000
|
unkown
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
AB81000
|
heap
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
10F1000
|
stack
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
3B44000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
unkown
|
page read and write
|
||
7FF502E02000
|
unkown
|
page readonly
|
||
BFD000
|
trusted library allocation
|
page execute and read and write
|
||
617000
|
heap
|
page read and write
|
||
7FF5032EE000
|
unkown
|
page readonly
|
||
B6D0000
|
unkown
|
page read and write
|
||
A416000
|
heap
|
page read and write
|
||
A158000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
3B1C000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
BC21000
|
unkown
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
A426000
|
heap
|
page read and write
|
||
7FF5032DF000
|
unkown
|
page readonly
|
||
DB4000
|
trusted library allocation
|
page read and write
|
||
C6A000
|
heap
|
page read and write
|
||
9315000
|
unkown
|
page read and write
|
||
309F000
|
unkown
|
page read and write
|
||
F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF502F6E000
|
unkown
|
page readonly
|
||
4AB1000
|
trusted library allocation
|
page read and write
|
||
A407000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
A32E000
|
heap
|
page read and write
|
||
B6D0000
|
unkown
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
BAD000
|
stack
|
page read and write
|
||
A31E000
|
heap
|
page read and write
|
||
7FF503161000
|
unkown
|
page readonly
|
||
C97000
|
heap
|
page read and write
|
||
906000
|
heap
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
5113000
|
trusted library allocation
|
page read and write
|
||
A114000
|
heap
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
C9F000
|
heap
|
page read and write
|
||
3AF3000
|
trusted library allocation
|
page read and write
|
||
7750000
|
unkown
|
page read and write
|
||
F12000
|
trusted library allocation
|
page read and write
|
||
F06000
|
trusted library allocation
|
page execute and read and write
|
||
7D0000
|
heap
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
C58000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
A401000
|
heap
|
page read and write
|
||
A693000
|
heap
|
page read and write
|
||
7FF503298000
|
unkown
|
page readonly
|
||
AA0D000
|
heap
|
page read and write
|
||
A368000
|
heap
|
page read and write
|
||
11ED000
|
heap
|
page read and write
|
||
B0A0000
|
unkown
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
A63E000
|
heap
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
CB4000
|
trusted library allocation
|
page read and write
|
||
7FF502D91000
|
unkown
|
page readonly
|
||
ABE0000
|
unkown
|
page read and write
|
||
F5F000
|
stack
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
A98F000
|
stack
|
page read and write
|
||
151F000
|
stack
|
page read and write
|
||
B610000
|
unkown
|
page read and write
|
||
88B000
|
heap
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
8FD000
|
trusted library allocation
|
page execute and read and write
|
||
FEB000
|
trusted library allocation
|
page execute and read and write
|
||
4FDF000
|
stack
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
FD3000
|
trusted library allocation
|
page execute and read and write
|
||
61E000
|
heap
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
7FF502F96000
|
unkown
|
page readonly
|
||
FD45000
|
unkown
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
10E1000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
E85000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
298E000
|
stack
|
page read and write
|
||
A732000
|
heap
|
page read and write
|
There are 3200 hidden memdumps, click here to show them.