Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\huge[1].dat
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\263.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\3D69.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\698B.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nsaF0B8.tmp\liteFirewall.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsq35F8.tmp\blowfish.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Del.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\tvgrbbh
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\tvgrbbh:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsg753D.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsl35D8.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsq35F8.tmp\INetC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsq35F8.tmp\nsProcess.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\start.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
|
MSVC program database ver 7.00, 512*4023 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
There are 106 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Users\user\AppData\Roaming\tvgrbbh
|
C:\Users\user\AppData\Roaming\tvgrbbh
|
||
C:\Users\user\AppData\Local\Temp\263.exe
|
C:\Users\user\AppData\Local\Temp\263.exe
|
||
C:\Users\user\AppData\Local\Temp\3D69.exe
|
C:\Users\user\AppData\Local\Temp\3D69.exe
|
||
C:\Users\user\AppData\Local\Temp\698B.exe
|
C:\Users\user\AppData\Local\Temp\698B.exe
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
"C:\Users\user\AppData\Local\Temp\setup.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0
(Linux; Android 10; STK-L21) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.133 Mobile Safari/537.36" --lang=en-US
--user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3516 --field-trial-handle=3520,i,255411136791549311,11110477984056802424,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US
--service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; STK-L21)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.133 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3732 --field-trial-handle=3520,i,255411136791549311,11110477984056802424,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; STK-L21) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/126.0.6478.133 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4064 --field-trial-handle=3520,i,255411136791549311,11110477984056802424,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux;
Android 10; STK-L21) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.133 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1
--num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1720019080238565
--launch-time-ticks=5451895126 --mojo-platform-channel-handle=2284 --field-trial-handle=3520,i,255411136791549311,11110477984056802424,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux;
Android 10; STK-L21) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.133 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2
--enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1720019080238565 --launch-time-ticks=5451915685
--mojo-platform-channel-handle=4032 --field-trial-handle=3520,i,255411136791549311,11110477984056802424,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
There are 25 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://foodypannyjsud.shop/api.
|
unknown
|
||
https://foodypannyjsud.shop/o
|
unknown
|
||
https://foodypannyjsud.shop/s
|
unknown
|
||
https://foodypannyjsud.shop/t
|
unknown
|
||
http://gebeus.ru/tmp/index.php
|
|||
http://cx5519.com/tmp/index.php
|
|||
contintnetksows.shop
|
|||
http://evilos.cc/tmp/index.php
|
|||
ellaboratepwsz.xyz
|
|||
swellfrrgwwos.xyz
|
|||
foodypannyjsud.shop
|
|||
pedestriankodwu.xyz
|
|||
towerxxuytwi.xyz
|
|||
https://foodypannyjsud.shop/ox
|
unknown
|
||
http://office-techs.biz/tmp/index.php
|
|||
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://chrome.google.com/webstore?hl=mr&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://support.google.com/chrome/answer/6098869
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
|
unknown
|
||
https://chrome.google.com/webstore?hl=et&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chrome.google.com/webstore?hl=etCtrl$1
|
unknown
|
||
https://excel.office.com
|
unknown
|
||
https://chrome.google.com/webstore?hl=urCtrl$2
|
unknown
|
||
https://foodypannyjsud.shop/j
|
unknown
|
||
https://foodypannyjsud.shop/api(
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://chrome.google.com/webstore?hl=ltCtrl$1
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
|
unknown
|
||
https://passwords.google.com
|
unknown
|
||
https://foodypannyjsud.shop/e5
|
unknown
|
||
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
|
unknown
|
||
https://foodypannyjsud.shop/C
|
unknown
|
||
https://foodypannyjsud.shop/la
|
unknown
|
||
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
|
unknown
|
||
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
|
unknown
|
||
http://bageyou.xyz
|
unknown
|
||
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://bitbucket.org/
|
unknown
|
||
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
https://foodypannyjsud.shop/apil
|
unknown
|
||
https://support.google.com/chromebook?p=app_intent
|
unknown
|
||
https://foodypannyjsud.shop/6C
|
unknown
|
||
https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://chrome.google.com/webstore?hl=mrCtrl$1
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html&
|
unknown
|
||
https://chrome.google.com/webstore?hl=lt&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlT&r
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://xiexie.wf/22_551/huge.dat
|
unknown
|
||
https://outlook.com
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlA&biHaldab
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
|
unknown
|
||
https://foodypannyjsud.shop/apiK
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://foodypannyjsud.shop/pi7
|
unknown
|
||
https://chrome.google.com/webstore?hl=ukCtrl$1
|
unknown
|
||
https://android.notify.windows.com/iOS
|
unknown
|
||
http://api.install-stat.debug.world/clients/installs
|
unknown
|
||
https://foodypannyjsud.shop/es
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://support.google.com/chrome/a/answer/9122284
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
|
unknown
|
||
https://foodypannyjsud.shop/fe
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-CNCtrl$1
|
unknown
|
||
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
|
unknown
|
||
https://word.office.comon
|
unknown
|
||
http://www.unicode.org/copyright.html
|
unknown
|
||
https://powerpoint.office.comcember
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlP&agalbaTvarko
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://schemas.micro
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity
|
unknown
|
||
https://chrome.google.com/webstore?hl=zh-TWCtrl$1
|
unknown
|
||
http://www.apache.org/).
|
unknown
|
||
https://foodypannyjsud.shop/api
|
unknown
|
||
https://myactivity.google.com/
|
unknown
|
||
http://xiexie.wf/22_551/huge.dat247
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
https://foodypannyjsud.shop/pi
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
137.74.196.132
|
unknown
|
France
|
||
77.221.157.163
|
unknown
|
Russian Federation
|
||
179.53.197.185
|
unknown
|
Dominican Republic
|
||
188.114.96.3
|
unknown
|
European Union
|
||
189.165.129.60
|
unknown
|
Mexico
|
||
127.0.0.127
|
unknown
|
unknown
|
||
146.70.169.164
|
unknown
|
United Kingdom
|
||
104.192.141.1
|
unknown
|
United States
|
||
188.114.97.3
|
unknown
|
European Union
|
||
104.21.45.251
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@explorerframe.dll,-13137
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@explorerframe.dll,-13138
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000008047A
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000009047A
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Sid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Pid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GamePall
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
|
DontShowUI
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
tmp_uid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
reg
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
uid
|
||
HKEY_CURRENT_USER\Control Panel\Cursors
|
AppStarting
|
There are 192 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2C70000
|
direct allocation
|
page read and write
|
||
DBD000
|
unkown
|
page readonly
|
||
2DB1000
|
unclassified section
|
page read and write
|
||
C0C000
|
heap
|
page read and write
|
||
3440000
|
direct allocation
|
page execute and read and write
|
||
4861000
|
unclassified section
|
page read and write
|
||
4840000
|
direct allocation
|
page read and write
|
||
7FF5D71A6000
|
unkown
|
page readonly
|
||
429000
|
unkown
|
page read and write
|
||
3FC1000
|
trusted library allocation
|
page read and write
|
||
97FF000
|
stack
|
page read and write
|
||
3F86000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
A21C000
|
heap
|
page read and write
|
||
7DF4F2480000
|
unkown
|
page readonly
|
||
597000
|
heap
|
page read and write
|
||
8E4E000
|
stack
|
page read and write
|
||
9E6D000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page read and write
|
||
7CE000
|
heap
|
page read and write
|
||
30A0000
|
trusted library allocation
|
page execute and read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
3F97000
|
trusted library allocation
|
page read and write
|
||
9F40000
|
heap
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
7DF4F2470000
|
unkown
|
page readonly
|
||
2427000
|
trusted library allocation
|
page read and write
|
||
111C7000
|
unkown
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
C663000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
C66000
|
trusted library allocation
|
page execute and read and write
|
||
15F2000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9E25000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9EF2000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9CD1000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3F87000
|
trusted library allocation
|
page read and write
|
||
A09E000
|
heap
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
AAF8000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
A5ED000
|
heap
|
page read and write
|
||
9F00000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
3F89000
|
trusted library allocation
|
page read and write
|
||
AAF8000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
13A2000
|
heap
|
page read and write
|
||
9A72000
|
unkown
|
page read and write
|
||
4B55000
|
trusted library allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
275E000
|
stack
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
CCD000
|
heap
|
page read and write
|
||
226E000
|
stack
|
page read and write
|
||
2E86000
|
heap
|
page read and write
|
||
9F04000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
12BB000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
3F59000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
311F000
|
stack
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
9D09000
|
heap
|
page read and write
|
||
404D000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A193000
|
heap
|
page read and write
|
||
A424000
|
heap
|
page read and write
|
||
FAF000
|
stack
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
1136000
|
stack
|
page read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
26A14000
|
direct allocation
|
page read and write
|
||
9EF0000
|
heap
|
page read and write
|
||
31A0000
|
trusted library allocation
|
page read and write
|
||
9E4F000
|
heap
|
page read and write
|
||
9EC2000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
604C0000
|
unkown
|
page readonly
|
||
9DF0000
|
heap
|
page read and write
|
||
E64D000
|
stack
|
page read and write
|
||
A9E9000
|
unkown
|
page read and write
|
||
20E0000
|
heap
|
page read and write
|
||
3667000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
425000
|
unkown
|
page readonly
|
||
3160000
|
unkown
|
page read and write
|
||
7FF5D747F000
|
unkown
|
page readonly
|
||
22E0000
|
heap
|
page execute and read and write
|
||
334F000
|
unkown
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
7FF5D76DA000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
404E000
|
trusted library allocation
|
page read and write
|
||
1DB000
|
stack
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
573E000
|
stack
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
7FF5D772C000
|
unkown
|
page readonly
|
||
11A0000
|
unkown
|
page read and write
|
||
9F12000
|
heap
|
page read and write
|
||
6000000
|
unkown
|
page readonly
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
7B80000
|
unkown
|
page readonly
|
||
3F5F000
|
trusted library allocation
|
page read and write
|
||
CCF000
|
heap
|
page read and write
|
||
7FF5D77CD000
|
unkown
|
page readonly
|
||
9EBA000
|
heap
|
page read and write
|
||
48820000
|
direct allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
7989000
|
stack
|
page read and write
|
||
A17A000
|
heap
|
page read and write
|
||
A4D2000
|
heap
|
page read and write
|
||
2C2F000
|
stack
|
page read and write
|
||
7AA0000
|
unkown
|
page read and write
|
||
A33A000
|
heap
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
6DD000
|
heap
|
page read and write
|
||
C605000
|
unkown
|
page read and write
|
||
7FF5D75DF000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
533E000
|
trusted library allocation
|
page read and write
|
||
7FF5D7722000
|
unkown
|
page readonly
|
||
11A0000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
E6F000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
7691000
|
unkown
|
page read and write
|
||
2C60000
|
direct allocation
|
page execute and read and write
|
||
3F52000
|
trusted library allocation
|
page read and write
|
||
D37000
|
trusted library allocation
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
3F88000
|
trusted library allocation
|
page read and write
|
||
A9A0000
|
unkown
|
page read and write
|
||
49BB000
|
unkown
|
page read and write
|
||
7FF5D779E000
|
unkown
|
page readonly
|
||
11451000
|
unkown
|
page read and write
|
||
284A000
|
trusted library allocation
|
page execute and read and write
|
||
59E000
|
heap
|
page read and write
|
||
9EAD000
|
stack
|
page read and write
|
||
35D3000
|
unkown
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
3520000
|
unkown
|
page readonly
|
||
CAB000
|
heap
|
page read and write
|
||
7FF5D7639000
|
unkown
|
page readonly
|
||
540000
|
heap
|
page read and write
|
||
10B5000
|
unkown
|
page execute read
|
||
11E0000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
9F30000
|
heap
|
page read and write
|
||
124D000
|
trusted library allocation
|
page execute and read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
31F7000
|
unkown
|
page read and write
|
||
BB10000
|
heap
|
page read and write
|
||
A3BF000
|
heap
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
1340000
|
unkown
|
page read and write
|
||
3940000
|
remote allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9F19000
|
heap
|
page read and write
|
||
CD2000
|
heap
|
page read and write
|
||
9F2E000
|
heap
|
page read and write
|
||
2BEB000
|
unkown
|
page readonly
|
||
26AA4000
|
direct allocation
|
page read and write
|
||
9F29000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
7AC000
|
stack
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
CC8000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
7FF5D7267000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
7FF5D7452000
|
unkown
|
page readonly
|
||
5072000
|
trusted library allocation
|
page read and write
|
||
E3B000
|
stack
|
page read and write
|
||
C51000
|
heap
|
page read and write
|
||
2DC3000
|
heap
|
page read and write
|
||
588E000
|
trusted library allocation
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
2CA0000
|
heap
|
page execute and read and write
|
||
3180000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
31A6000
|
trusted library allocation
|
page read and write
|
||
7FF5D7257000
|
unkown
|
page readonly
|
||
1264000
|
trusted library allocation
|
page read and write
|
||
4F6000
|
stack
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
A515000
|
heap
|
page read and write
|
||
7FF5D705D000
|
unkown
|
page readonly
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
A25A000
|
heap
|
page read and write
|
||
A393000
|
heap
|
page read and write
|
||
58CE000
|
stack
|
page read and write
|
||
6AB000
|
unkown
|
page execute and read and write
|
||
3180000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
943000
|
trusted library allocation
|
page execute and read and write
|
||
1220000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
5C4C000
|
trusted library allocation
|
page read and write
|
||
7440000
|
unkown
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
A059000
|
heap
|
page read and write
|
||
A67F000
|
heap
|
page read and write
|
||
9F3B000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
A37C000
|
heap
|
page read and write
|
||
9A92000
|
unkown
|
page read and write
|
||
A208000
|
heap
|
page read and write
|
||
573E000
|
stack
|
page read and write
|
||
9F34000
|
heap
|
page read and write
|
||
7FF5D72E9000
|
unkown
|
page readonly
|
||
A3CD000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3F89000
|
trusted library allocation
|
page read and write
|
||
7FF5D729E000
|
unkown
|
page readonly
|
||
7FF5D7202000
|
unkown
|
page readonly
|
||
9E3A000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
358C000
|
stack
|
page read and write
|
||
30FB000
|
stack
|
page read and write
|
||
7C90000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
369D000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3661000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
35B5000
|
unkown
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
986000
|
heap
|
page read and write
|
||
2FC4000
|
trusted library allocation
|
page read and write
|
||
AA6000
|
trusted library allocation
|
page execute and read and write
|
||
10606000
|
unkown
|
page read and write
|
||
9E45000
|
heap
|
page read and write
|
||
524A0000
|
direct allocation
|
page read and write
|
||
8CB8000
|
stack
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
A44A000
|
heap
|
page read and write
|
||
75FD000
|
unkown
|
page read and write
|
||
A60F000
|
heap
|
page read and write
|
||
8FD9000
|
stack
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
9CB5000
|
heap
|
page read and write
|
||
A3AA000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
A47C000
|
heap
|
page read and write
|
||
3F48000
|
trusted library allocation
|
page read and write
|
||
C5F8000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
4B95000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
3120000
|
unkown
|
page read and write
|
||
3F44000
|
trusted library allocation
|
page read and write
|
||
3F8E000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
3665000
|
trusted library allocation
|
page read and write
|
||
2E93000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
54F0000
|
unkown
|
page readonly
|
||
9E9000
|
heap
|
page read and write
|
||
8DCB000
|
stack
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3FF5000
|
trusted library allocation
|
page read and write
|
||
E00000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
27C6000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
126B000
|
trusted library allocation
|
page execute and read and write
|
||
1140000
|
unkown
|
page read and write
|
||
3F57000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
602EA000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9F19000
|
heap
|
page read and write
|
||
7FF5D7589000
|
unkown
|
page readonly
|
||
7FF5D76D7000
|
unkown
|
page readonly
|
||
A220000
|
unkown
|
page read and write
|
||
3F4F000
|
trusted library allocation
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
9FE9000
|
heap
|
page read and write
|
||
52470000
|
direct allocation
|
page read and write
|
||
7FF5D7438000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
B07000
|
trusted library allocation
|
page read and write
|
||
7FF5D723F000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
A6A1000
|
heap
|
page read and write
|
||
A159000
|
heap
|
page read and write
|
||
3FFB000
|
trusted library allocation
|
page read and write
|
||
9F2B000
|
heap
|
page read and write
|
||
60306000
|
unkown
|
page read and write
|
||
9F22000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
7FF5D72CE000
|
unkown
|
page readonly
|
||
502D000
|
trusted library allocation
|
page read and write
|
||
2790000
|
trusted library allocation
|
page read and write
|
||
BAA000
|
heap
|
page read and write
|
||
9FE5000
|
heap
|
page read and write
|
||
12D9000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
A320000
|
heap
|
page read and write
|
||
7AE000
|
heap
|
page read and write
|
||
9EC4000
|
heap
|
page read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
2FF2000
|
trusted library allocation
|
page read and write
|
||
9F27000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
9CE1000
|
heap
|
page read and write
|
||
7609000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
7FF5D7507000
|
unkown
|
page readonly
|
||
317D000
|
stack
|
page read and write
|
||
C28000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9E84000
|
heap
|
page read and write
|
||
4BA6000
|
trusted library allocation
|
page read and write
|
||
5704000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
A4A7000
|
heap
|
page read and write
|
||
53A0000
|
heap
|
page execute and read and write
|
||
3180000
|
unkown
|
page read and write
|
||
E73000
|
trusted library allocation
|
page execute and read and write
|
||
C62D000
|
unkown
|
page read and write
|
||
42A000
|
unkown
|
page write copy
|
||
D50000
|
heap
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
AB41000
|
heap
|
page read and write
|
||
11A5A000
|
unkown
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
7FF5D738E000
|
unkown
|
page readonly
|
||
C81C000
|
unkown
|
page read and write
|
||
A196000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
A3C2000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
425000
|
unkown
|
page readonly
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3F7A000
|
trusted library allocation
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
5960000
|
unkown
|
page readonly
|
||
7AE0000
|
unkown
|
page read and write
|
||
7FF5D771A000
|
unkown
|
page readonly
|
||
9F18000
|
heap
|
page read and write
|
||
2B0E000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2E7E000
|
stack
|
page read and write
|
||
35FA000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
133B000
|
heap
|
page read and write
|
||
97B000
|
trusted library allocation
|
page execute and read and write
|
||
CBD000
|
heap
|
page read and write
|
||
7FF5D75C1000
|
unkown
|
page readonly
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
7D3E000
|
stack
|
page read and write
|
||
9F22000
|
heap
|
page read and write
|
||
622C1000
|
unkown
|
page execute read
|
||
2852000
|
trusted library allocation
|
page read and write
|
||
9F27000
|
heap
|
page read and write
|
||
588A000
|
trusted library allocation
|
page read and write
|
||
A2FD000
|
heap
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
779E000
|
unkown
|
page read and write
|
||
3F88000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
560F000
|
stack
|
page read and write
|
||
3F89000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
9F0E000
|
heap
|
page read and write
|
||
A670000
|
heap
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
26A54000
|
direct allocation
|
page read and write
|
||
A103000
|
heap
|
page read and write
|
||
40F9000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
49D6000
|
unkown
|
page read and write
|
||
52404000
|
direct allocation
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
A542000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9EF2000
|
heap
|
page read and write
|
||
C72000
|
trusted library allocation
|
page read and write
|
||
7FF5D6BE4000
|
unkown
|
page readonly
|
||
12D0000
|
unkown
|
page readonly
|
||
A4AC000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9F23000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
760D000
|
unkown
|
page read and write
|
||
7FF5D706E000
|
unkown
|
page readonly
|
||
C27000
|
heap
|
page read and write
|
||
7FF5D72BD000
|
unkown
|
page readonly
|
||
2CE0000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
2F61000
|
trusted library allocation
|
page read and write
|
||
A257000
|
heap
|
page read and write
|
||
570C000
|
trusted library allocation
|
page read and write
|
||
CAB000
|
heap
|
page read and write
|
||
B220000
|
unkown
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
9F44000
|
heap
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
CDE000
|
heap
|
page read and write
|
||
C28000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
85BE000
|
stack
|
page read and write
|
||
C0BA000
|
stack
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
52460000
|
direct allocation
|
page read and write
|
||
A9FD000
|
unkown
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
3940000
|
remote allocation
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
3140000
|
unkown
|
page read and write
|
||
ACA000
|
heap
|
page read and write
|
||
1620000
|
trusted library allocation
|
page execute and read and write
|
||
597000
|
heap
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
A211000
|
heap
|
page read and write
|
||
699000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
C47000
|
heap
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
6031D000
|
unkown
|
page execute read
|
||
408000
|
unkown
|
page readonly
|
||
A3CA000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
7FF5D778A000
|
unkown
|
page readonly
|
||
CB2000
|
heap
|
page read and write
|
||
A5A8000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
3F72000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
7FF5D74FA000
|
unkown
|
page readonly
|
||
11E0000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9E61000
|
heap
|
page read and write
|
||
9EFB000
|
heap
|
page read and write
|
||
7FF5D7485000
|
unkown
|
page readonly
|
||
C7BE000
|
unkown
|
page read and write
|
||
A288000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
111CC000
|
unkown
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
42A000
|
unkown
|
page write copy
|
||
C7B000
|
heap
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
2B21000
|
trusted library allocation
|
page read and write
|
||
B87000
|
heap
|
page read and write
|
||
601F1000
|
unkown
|
page execute read
|
||
A3AC000
|
unkown
|
page read and write
|
||
7FF5D744E000
|
unkown
|
page readonly
|
||
B10000
|
heap
|
page read and write
|
||
7FF5D6A4B000
|
unkown
|
page readonly
|
||
A3D7000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
7FF5D7799000
|
unkown
|
page readonly
|
||
23EE000
|
stack
|
page read and write
|
||
65EC1000
|
unkown
|
page execute read
|
||
7FF5D7488000
|
unkown
|
page readonly
|
||
9F24000
|
heap
|
page read and write
|
||
A1BE000
|
heap
|
page read and write
|
||
3110000
|
unkown
|
page readonly
|
||
49A8000
|
unkown
|
page read and write
|
||
CCC000
|
heap
|
page read and write
|
||
7FF5D74F2000
|
unkown
|
page readonly
|
||
9FE7000
|
heap
|
page read and write
|
||
99C0000
|
unkown
|
page read and write
|
||
3F48000
|
trusted library allocation
|
page read and write
|
||
7FF5D719C000
|
unkown
|
page readonly
|
||
111CA000
|
unkown
|
page read and write
|
||
1870000
|
heap
|
page read and write
|
||
6B6000
|
heap
|
page read and write
|
||
7FF5D72D7000
|
unkown
|
page readonly
|
||
A60C000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A5CA000
|
heap
|
page read and write
|
||
9A98000
|
unkown
|
page read and write
|
||
CD6000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
27F5000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
9578000
|
stack
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
A26B000
|
heap
|
page read and write
|
||
10E4000
|
trusted library allocation
|
page read and write
|
||
94D000
|
trusted library allocation
|
page execute and read and write
|
||
4830000
|
heap
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
9CEE000
|
heap
|
page read and write
|
||
9E70000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
4047000
|
trusted library allocation
|
page read and write
|
||
1263000
|
trusted library allocation
|
page execute and read and write
|
||
CB1000
|
heap
|
page read and write
|
||
A689000
|
heap
|
page read and write
|
||
1696000
|
trusted library allocation
|
page read and write
|
||
4FA9000
|
trusted library allocation
|
page read and write
|
||
54F2000
|
unkown
|
page readonly
|
||
9F3F000
|
heap
|
page read and write
|
||
23F1000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
9F19000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
C47F000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
C96000
|
heap
|
page read and write
|
||
22D0000
|
trusted library allocation
|
page read and write
|
||
111CF000
|
unkown
|
page read and write
|
||
31B0000
|
heap
|
page execute and read and write
|
||
9F26000
|
heap
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9C72000
|
heap
|
page read and write
|
||
3F64000
|
trusted library allocation
|
page read and write
|
||
26A44000
|
direct allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
3F58000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
3F71000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
9F3D000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
534E000
|
trusted library allocation
|
page read and write
|
||
A5C0000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9E20000
|
heap
|
page read and write
|
||
15B4000
|
trusted library allocation
|
page read and write
|
||
7FF5D77A4000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
3F70000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
7FF5D7272000
|
unkown
|
page readonly
|
||
348D000
|
stack
|
page read and write
|
||
A1E8000
|
heap
|
page read and write
|
||
B36000
|
stack
|
page read and write
|
||
9F11000
|
heap
|
page read and write
|
||
177F000
|
stack
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
9F02000
|
heap
|
page read and write
|
||
A65D000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
7FF5D7820000
|
unkown
|
page readonly
|
||
8F49000
|
stack
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
7FF5D7215000
|
unkown
|
page readonly
|
||
A0B9000
|
heap
|
page read and write
|
||
9F44000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
3FBC000
|
trusted library allocation
|
page read and write
|
||
A217000
|
heap
|
page read and write
|
||
1B3E000
|
stack
|
page read and write
|
||
9E37000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
7FF5D71E6000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
3F91000
|
trusted library allocation
|
page read and write
|
||
3FB9000
|
trusted library allocation
|
page read and write
|
||
3F5B000
|
trusted library allocation
|
page read and write
|
||
9F16000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
4A16000
|
unkown
|
page read and write
|
||
C28000
|
heap
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
13F3000
|
trusted library allocation
|
page execute and read and write
|
||
940000
|
trusted library allocation
|
page read and write
|
||
7FF5D71EF000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
3F8C000
|
trusted library allocation
|
page read and write
|
||
C17000
|
heap
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
7FF5D77DA000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
C460000
|
unkown
|
page read and write
|
||
9DB000
|
heap
|
page read and write
|
||
3530000
|
unkown
|
page read and write
|
||
109F000
|
stack
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
1262000
|
trusted library allocation
|
page read and write
|
||
9BFF000
|
heap
|
page read and write
|
||
11A59000
|
unkown
|
page read and write
|
||
C5FA000
|
unkown
|
page read and write
|
||
11A54000
|
unkown
|
page read and write
|
||
5A30000
|
heap
|
page execute and read and write
|
||
5021000
|
trusted library allocation
|
page read and write
|
||
7DF4F24A1000
|
unkown
|
page execute read
|
||
7FF5D69BB000
|
unkown
|
page readonly
|
||
429000
|
unkown
|
page write copy
|
||
A262000
|
heap
|
page read and write
|
||
48844000
|
direct allocation
|
page read and write
|
||
4880C000
|
direct allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A38D000
|
heap
|
page read and write
|
||
A655000
|
heap
|
page read and write
|
||
D80000
|
unkown
|
page readonly
|
||
12D0000
|
heap
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
A58A000
|
heap
|
page read and write
|
||
9AAC000
|
unkown
|
page read and write
|
||
111C4000
|
unkown
|
page read and write
|
||
A0CA000
|
heap
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
7FF5D75F9000
|
unkown
|
page readonly
|
||
A4F2000
|
heap
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
CD6000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
A3D2000
|
heap
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
A612000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
9F14000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
4B00000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A1F6000
|
heap
|
page read and write
|
||
3F41000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
7FF5D77F7000
|
unkown
|
page readonly
|
||
7A0000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
BB9C000
|
stack
|
page read and write
|
||
A493000
|
heap
|
page read and write
|
||
1BA5000
|
heap
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
A355000
|
heap
|
page read and write
|
||
2C70000
|
direct allocation
|
page read and write
|
||
35DC000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9D0B000
|
heap
|
page read and write
|
||
577E000
|
stack
|
page read and write
|
||
9F3C000
|
heap
|
page read and write
|
||
A3B8000
|
heap
|
page read and write
|
||
BF3E000
|
stack
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
CC8000
|
heap
|
page read and write
|
||
BAE000
|
heap
|
page read and write
|
||
11A5B000
|
unkown
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
A62F000
|
heap
|
page read and write
|
||
A237000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
21D0000
|
trusted library allocation
|
page execute and read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
A590000
|
heap
|
page read and write
|
||
3191000
|
trusted library allocation
|
page read and write
|
||
9C08000
|
heap
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
7CB0000
|
unkown
|
page readonly
|
||
A21000
|
heap
|
page read and write
|
||
A3C3000
|
unkown
|
page read and write
|
||
3FED000
|
trusted library allocation
|
page read and write
|
||
3F58000
|
trusted library allocation
|
page read and write
|
||
F431000
|
unkown
|
page read and write
|
||
9F05000
|
heap
|
page read and write
|
||
6AC000
|
unkown
|
page readonly
|
||
1630000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
9F21000
|
heap
|
page read and write
|
||
9CF3000
|
heap
|
page read and write
|
||
C97F000
|
unkown
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
A0BE000
|
heap
|
page read and write
|
||
524A4000
|
direct allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
760F000
|
unkown
|
page read and write
|
||
AAF2000
|
heap
|
page read and write
|
||
3F81000
|
trusted library allocation
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
9AF4000
|
heap
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
597000
|
heap
|
page read and write
|
||
27B5000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
A1B4000
|
heap
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9D21000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
E32000
|
trusted library allocation
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
265F000
|
stack
|
page read and write
|
||
9F1D000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A48A000
|
heap
|
page read and write
|
||
850000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
C22000
|
heap
|
page read and write
|
||
7FF5D7740000
|
unkown
|
page readonly
|
||
A2A2000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
C5FD000
|
unkown
|
page read and write
|
||
52454000
|
direct allocation
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
111CD000
|
unkown
|
page read and write
|
||
A52E000
|
heap
|
page read and write
|
||
53E1000
|
unkown
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
C22000
|
heap
|
page read and write
|
||
26AF1000
|
direct allocation
|
page read and write
|
||
3FA5000
|
trusted library allocation
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
A580000
|
heap
|
page read and write
|
||
7FF5D7385000
|
unkown
|
page readonly
|
||
775000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
5AB000
|
stack
|
page read and write
|
||
A305000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
9AA8000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
A084000
|
heap
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
F580000
|
heap
|
page read and write
|
||
7FF5D7407000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
A18E000
|
heap
|
page read and write
|
||
51A5000
|
trusted library allocation
|
page read and write
|
||
7FF5D760E000
|
unkown
|
page readonly
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
A458000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
7FF5D75EE000
|
unkown
|
page readonly
|
||
7FF5D7360000
|
unkown
|
page readonly
|
||
9B2C000
|
unkown
|
page read and write
|
||
7FF5D76C8000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
A338000
|
heap
|
page read and write
|
||
111C0000
|
unkown
|
page read and write
|
||
3F8B000
|
trusted library allocation
|
page read and write
|
||
CC2000
|
heap
|
page read and write
|
||
7FF5D71CC000
|
unkown
|
page readonly
|
||
2FF7000
|
trusted library allocation
|
page execute and read and write
|
||
60312000
|
unkown
|
page read and write
|
||
2CE7000
|
trusted library allocation
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
7FF5D7700000
|
unkown
|
page readonly
|
||
20C0000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
7FF5D75E9000
|
unkown
|
page readonly
|
||
5175000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
E3B000
|
trusted library allocation
|
page execute and read and write
|
||
A334000
|
heap
|
page read and write
|
||
5B3F000
|
stack
|
page read and write
|
||
A293000
|
heap
|
page read and write
|
||
7FF5D77F0000
|
unkown
|
page readonly
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
20B6000
|
trusted library allocation
|
page execute and read and write
|
||
597000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
26A0C000
|
direct allocation
|
page read and write
|
||
BAF000
|
stack
|
page read and write
|
||
3FED000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
1256000
|
trusted library allocation
|
page execute and read and write
|
||
507C000
|
trusted library allocation
|
page read and write
|
||
2F76000
|
trusted library allocation
|
page read and write
|
||
7FF5D7752000
|
unkown
|
page readonly
|
||
C47000
|
heap
|
page read and write
|
||
3CB1000
|
trusted library allocation
|
page read and write
|
||
3180000
|
heap
|
page execute and read and write
|
||
9F14000
|
heap
|
page read and write
|
||
7FF5CE343000
|
unkown
|
page readonly
|
||
646000
|
heap
|
page read and write
|
||
3B55000
|
trusted library allocation
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
7FF5D7442000
|
unkown
|
page readonly
|
||
5C3F000
|
stack
|
page read and write
|
||
C3C000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
A5F9000
|
heap
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
15EA000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D77E3000
|
unkown
|
page readonly
|
||
A0E2000
|
heap
|
page read and write
|
||
2870000
|
trusted library allocation
|
page read and write
|
||
5C51000
|
trusted library allocation
|
page read and write
|
||
F44C000
|
unkown
|
page read and write
|
||
A098000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
9F2C000
|
heap
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
7618000
|
unkown
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
A233000
|
unkown
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
CBF000
|
heap
|
page read and write
|
||
9CFC000
|
heap
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
5A2E000
|
stack
|
page read and write
|
||
322000
|
unkown
|
page readonly
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
CE2000
|
heap
|
page read and write
|
||
5785000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
7FF5D75B3000
|
unkown
|
page readonly
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
E26000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D7262000
|
unkown
|
page readonly
|
||
597000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
D80000
|
unkown
|
page readonly
|
||
11E0000
|
unkown
|
page read and write
|
||
621000
|
unkown
|
page execute read
|
||
9F21000
|
heap
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
EBB000
|
heap
|
page read and write
|
||
111C5000
|
unkown
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
4820000
|
direct allocation
|
page execute and read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
7FF5D745B000
|
unkown
|
page readonly
|
||
3FFF000
|
trusted library allocation
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
A588000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page execute and read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
CDD000
|
heap
|
page read and write
|
||
CC2000
|
heap
|
page read and write
|
||
125A000
|
trusted library allocation
|
page execute and read and write
|
||
3F9F000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
9E41000
|
heap
|
page read and write
|
||
3F60000
|
trusted library allocation
|
page read and write
|
||
9A8C000
|
unkown
|
page read and write
|
||
9D7F000
|
heap
|
page read and write
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
A6B1000
|
heap
|
page read and write
|
||
7FF5D75BF000
|
unkown
|
page readonly
|
||
CD2000
|
heap
|
page read and write
|
||
A644000
|
heap
|
page read and write
|
||
A1D0000
|
heap
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
578C000
|
trusted library allocation
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
86E0000
|
unkown
|
page readonly
|
||
B0BD000
|
stack
|
page read and write
|
||
2F61000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
23F5000
|
trusted library allocation
|
page read and write
|
||
9F22000
|
heap
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
CD9000
|
heap
|
page read and write
|
||
3F68000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
BDC0000
|
unkown
|
page read and write
|
||
57C0000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
A4B7000
|
heap
|
page read and write
|
||
B01000
|
trusted library allocation
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
7FF5D7450000
|
unkown
|
page readonly
|
||
E74000
|
trusted library allocation
|
page read and write
|
||
22A0000
|
trusted library allocation
|
page read and write
|
||
A19E000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
127D000
|
trusted library allocation
|
page execute and read and write
|
||
A220000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9C7F000
|
heap
|
page read and write
|
||
F582000
|
heap
|
page read and write
|
||
A6C4000
|
heap
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
222E000
|
stack
|
page read and write
|
||
32F7000
|
trusted library allocation
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
7FF5D77A8000
|
unkown
|
page readonly
|
||
1140000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
B0E0000
|
unkown
|
page readonly
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
A2FD000
|
heap
|
page read and write
|
||
CE7000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
9F06000
|
heap
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
7DF4F2460000
|
unkown
|
page readonly
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
7FF5D76AF000
|
unkown
|
page readonly
|
||
B4C000
|
heap
|
page read and write
|
||
22C6000
|
trusted library allocation
|
page read and write
|
||
602C9000
|
unkown
|
page readonly
|
||
9DF000
|
stack
|
page read and write
|
||
2736000
|
heap
|
page read and write
|
||
1270000
|
unkown
|
page read and write
|
||
1298000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9E7C000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
2EC0000
|
unkown
|
page readonly
|
||
7810000
|
unkown
|
page read and write
|
||
9F20000
|
heap
|
page read and write
|
||
A1A0000
|
heap
|
page read and write
|
||
CD6000
|
heap
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
heap
|
page execute and read and write
|
||
4187000
|
trusted library allocation
|
page read and write
|
||
9F20000
|
heap
|
page read and write
|
||
9EF3000
|
heap
|
page read and write
|
||
7FF5D7641000
|
unkown
|
page readonly
|
||
A512000
|
heap
|
page read and write
|
||
A129000
|
heap
|
page read and write
|
||
9B85000
|
unkown
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
A233000
|
heap
|
page read and write
|
||
7FF5D77B6000
|
unkown
|
page readonly
|
||
9F23000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
3FF5000
|
trusted library allocation
|
page read and write
|
||
A3F8000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
9EFD000
|
heap
|
page read and write
|
||
A24D000
|
heap
|
page read and write
|
||
A3A3000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
9C14000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
4986000
|
unkown
|
page read and write
|
||
538F000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
A057000
|
heap
|
page read and write
|
||
2E5A000
|
heap
|
page read and write
|
||
9F25000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
3FF5000
|
trusted library allocation
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
3B51000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
48874000
|
direct allocation
|
page read and write
|
||
9E8A000
|
heap
|
page read and write
|
||
7FF5D7591000
|
unkown
|
page readonly
|
||
7FF5D77EB000
|
unkown
|
page readonly
|
||
A0A9000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
31B7000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9EFB000
|
heap
|
page read and write
|
||
4FF5000
|
trusted library allocation
|
page read and write
|
||
C28000
|
heap
|
page read and write
|
||
9ABD000
|
unkown
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
897E000
|
stack
|
page read and write
|
||
C7CB000
|
unkown
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
11E0000
|
unkown
|
page read and write
|
||
3FB9000
|
trusted library allocation
|
page read and write
|
||
CD6000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
52434000
|
direct allocation
|
page read and write
|
||
CBC000
|
heap
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
5536000
|
unkown
|
page readonly
|
||
A273000
|
unkown
|
page read and write
|
||
9F1A000
|
heap
|
page read and write
|
||
540F000
|
stack
|
page read and write
|
||
7FF5D7244000
|
unkown
|
page readonly
|
||
A694000
|
heap
|
page read and write
|
||
35CF000
|
unkown
|
page read and write
|
||
9F24000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
15A0000
|
heap
|
page execute and read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3F58000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
F448000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
9C12000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
2050000
|
heap
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
11A53000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A463000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
CDD000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
577E000
|
stack
|
page read and write
|
||
7FF5D732D000
|
unkown
|
page readonly
|
||
11A0000
|
unkown
|
page read and write
|
||
A36F000
|
heap
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
48864000
|
direct allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
F444000
|
unkown
|
page read and write
|
||
26AE4000
|
direct allocation
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
9F2C000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
AC2000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
7FF5D71F9000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
30B7000
|
trusted library allocation
|
page read and write
|
||
CDD000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
A64E000
|
heap
|
page read and write
|
||
9EF4000
|
heap
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
A69B000
|
heap
|
page read and write
|
||
9F1B000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
11A5E000
|
unkown
|
page read and write
|
||
9F19000
|
heap
|
page read and write
|
||
1458000
|
heap
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
8A00000
|
unkown
|
page read and write
|
||
A497000
|
heap
|
page read and write
|
||
7FF5D743F000
|
unkown
|
page readonly
|
||
A1AF000
|
stack
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
27D9000
|
trusted library allocation
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
111C9000
|
unkown
|
page read and write
|
||
9EFF000
|
heap
|
page read and write
|
||
9D3D000
|
heap
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF5D75CB000
|
unkown
|
page readonly
|
||
977E000
|
stack
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
35C9000
|
unkown
|
page read and write
|
||
E77000
|
trusted library allocation
|
page read and write
|
||
5913000
|
heap
|
page execute and read and write
|
||
F460000
|
unkown
|
page read and write
|
||
A3E9000
|
heap
|
page read and write
|
||
27C4000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
AB08000
|
heap
|
page read and write
|
||
7FF5D7292000
|
unkown
|
page readonly
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
A615000
|
heap
|
page read and write
|
||
7CE000
|
heap
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
4980000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
9EFB000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
11A5F000
|
unkown
|
page read and write
|
||
A64B000
|
heap
|
page read and write
|
||
1694000
|
trusted library allocation
|
page read and write
|
||
7686000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9F1C000
|
heap
|
page read and write
|
||
3FD6000
|
trusted library allocation
|
page read and write
|
||
7FF5D7558000
|
unkown
|
page readonly
|
||
86D0000
|
unkown
|
page readonly
|
||
11A50000
|
unkown
|
page read and write
|
||
AA08000
|
unkown
|
page read and write
|
||
9D0F000
|
heap
|
page read and write
|
||
A2FD000
|
heap
|
page read and write
|
||
7AE000
|
heap
|
page read and write
|
||
A6AF000
|
heap
|
page read and write
|
||
9F3C000
|
heap
|
page read and write
|
||
118F000
|
stack
|
page read and write
|
||
A1D4000
|
heap
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
7637000
|
unkown
|
page read and write
|
||
654C1000
|
unkown
|
page execute read
|
||
2B10000
|
trusted library allocation
|
page read and write
|
||
3F78000
|
trusted library allocation
|
page read and write
|
||
209D000
|
trusted library allocation
|
page execute and read and write
|
||
597000
|
heap
|
page read and write
|
||
362D000
|
unkown
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
8890000
|
unkown
|
page readonly
|
||
11E0000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
A5E9000
|
heap
|
page read and write
|
||
8C39000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
9E2B000
|
heap
|
page read and write
|
||
3F41000
|
trusted library allocation
|
page read and write
|
||
1B9D000
|
stack
|
page read and write
|
||
1731000
|
unkown
|
page readonly
|
||
12B0000
|
unkown
|
page read and write
|
||
A4EC000
|
heap
|
page read and write
|
||
2CE1000
|
trusted library allocation
|
page read and write
|
||
9F2B000
|
heap
|
page read and write
|
||
7FF5D74C3000
|
unkown
|
page readonly
|
||
123E000
|
stack
|
page read and write
|
||
9EF6000
|
heap
|
page read and write
|
||
A709000
|
heap
|
page read and write
|
||
C77000
|
trusted library allocation
|
page execute and read and write
|
||
2D9E000
|
heap
|
page execute and read and write
|
||
597000
|
heap
|
page read and write
|
||
A14A000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
7FF5D7482000
|
unkown
|
page readonly
|
||
20C2000
|
trusted library allocation
|
page read and write
|
||
A332000
|
heap
|
page read and write
|
||
A6F9000
|
heap
|
page read and write
|
||
A14D000
|
heap
|
page read and write
|
||
3F62000
|
trusted library allocation
|
page read and write
|
||
3CE1000
|
trusted library allocation
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
BB0D000
|
stack
|
page read and write
|
||
5781000
|
trusted library allocation
|
page read and write
|
||
41B6000
|
trusted library allocation
|
page read and write
|
||
9D1C000
|
heap
|
page read and write
|
||
3F89000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
7FF5D7462000
|
unkown
|
page readonly
|
||
5081000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
22A5000
|
trusted library allocation
|
page read and write
|
||
9F19000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
60315000
|
unkown
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
285B000
|
trusted library allocation
|
page execute and read and write
|
||
A251000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
94F4000
|
unkown
|
page read and write
|
||
A243000
|
heap
|
page read and write
|
||
25FE000
|
stack
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
8819000
|
stack
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
EBB000
|
stack
|
page read and write
|
||
48898000
|
direct allocation
|
page read and write
|
||
5910000
|
heap
|
page execute and read and write
|
||
37DF000
|
stack
|
page read and write
|
||
C46F000
|
unkown
|
page read and write
|
||
26A01000
|
direct allocation
|
page read and write
|
||
A38A000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
A11E000
|
heap
|
page read and write
|
||
A12D000
|
heap
|
page read and write
|
||
315D000
|
stack
|
page read and write
|
||
A68B000
|
heap
|
page read and write
|
||
1176F000
|
unkown
|
page read and write
|
||
11651000
|
unkown
|
page read and write
|
||
9F22000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
3185000
|
trusted library allocation
|
page read and write
|
||
A13B000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
3FBE000
|
trusted library allocation
|
page read and write
|
||
32F1000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
EB5000
|
stack
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
7FF5D749B000
|
unkown
|
page readonly
|
||
A45D000
|
heap
|
page read and write
|
||
3F80000
|
trusted library allocation
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
9F2E000
|
heap
|
page read and write
|
||
B559000
|
stack
|
page read and write
|
||
A40E000
|
unkown
|
page read and write
|
||
CE2000
|
heap
|
page read and write
|
||
A5B2000
|
heap
|
page read and write
|
||
843F000
|
stack
|
page read and write
|
||
3F7A000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9F28000
|
heap
|
page read and write
|
||
272D000
|
stack
|
page read and write
|
||
C65E000
|
unkown
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
12F5000
|
heap
|
page read and write
|
||
24EF000
|
stack
|
page read and write
|
||
48804000
|
direct allocation
|
page read and write
|
||
84BB000
|
stack
|
page read and write
|
||
A266000
|
heap
|
page read and write
|
||
3626000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
76C000
|
heap
|
page read and write
|
||
C73E000
|
unkown
|
page read and write
|
||
7631000
|
unkown
|
page read and write
|
||
7FF5D776D000
|
unkown
|
page readonly
|
||
601F0000
|
unkown
|
page readonly
|
||
7FF5D71D7000
|
unkown
|
page readonly
|
||
2FEF000
|
stack
|
page read and write
|
||
5FF000
|
heap
|
page read and write
|
||
3F75000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
C47000
|
heap
|
page read and write
|
||
4A12000
|
unkown
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
7FF5D710B000
|
unkown
|
page readonly
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
5344000
|
trusted library allocation
|
page read and write
|
||
3500000
|
stack
|
page read and write
|
||
10682000
|
unkown
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
26A60000
|
direct allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
C61D000
|
unkown
|
page read and write
|
||
2FFB000
|
trusted library allocation
|
page execute and read and write
|
||
6AC000
|
unkown
|
page readonly
|
||
2D07000
|
trusted library allocation
|
page read and write
|
||
7FF5D7694000
|
unkown
|
page readonly
|
||
26AB0000
|
direct allocation
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
A10D000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
CE3000
|
heap
|
page read and write
|
||
1250000
|
unkown
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
3F71000
|
trusted library allocation
|
page read and write
|
||
9F20000
|
heap
|
page read and write
|
||
1216000
|
heap
|
page read and write
|
||
A2F1000
|
heap
|
page read and write
|
||
5325000
|
trusted library allocation
|
page read and write
|
||
A095000
|
heap
|
page read and write
|
||
7FF5D76D5000
|
unkown
|
page readonly
|
||
A46E000
|
heap
|
page read and write
|
||
111C8000
|
unkown
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
A150000
|
heap
|
page read and write
|
||
9A84000
|
unkown
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
A24A000
|
heap
|
page read and write
|
||
7FF5CE33D000
|
unkown
|
page readonly
|
||
48A1000
|
heap
|
page read and write
|
||
EAF000
|
heap
|
page read and write
|
||
26B1C000
|
direct allocation
|
page read and write
|
||
CEA000
|
heap
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
597000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
AAFF000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
10E3000
|
trusted library allocation
|
page execute and read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
9FE0000
|
heap
|
page read and write
|
||
4F94000
|
trusted library allocation
|
page read and write
|
||
C483000
|
unkown
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
4BB9000
|
trusted library allocation
|
page read and write
|
||
26A04000
|
direct allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3FB9000
|
trusted library allocation
|
page read and write
|
||
A601000
|
heap
|
page read and write
|
||
7FF5D7797000
|
unkown
|
page readonly
|
||
D1E000
|
stack
|
page read and write
|
||
CD6000
|
heap
|
page read and write
|
||
CDD000
|
heap
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
A384000
|
heap
|
page read and write
|
||
A681000
|
heap
|
page read and write
|
||
3FAC000
|
trusted library allocation
|
page read and write
|
||
215E000
|
stack
|
page read and write
|
||
7FF5D71E0000
|
unkown
|
page readonly
|
||
A501000
|
heap
|
page read and write
|
||
C1CC000
|
stack
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3F6D000
|
trusted library allocation
|
page read and write
|
||
98FD000
|
stack
|
page read and write
|
||
2500000
|
heap
|
page execute and read and write
|
||
2C80000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
2E83000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
9F1F000
|
heap
|
page read and write
|
||
3F77000
|
trusted library allocation
|
page read and write
|
||
51A3000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
9F1C000
|
heap
|
page read and write
|
||
C62000
|
trusted library allocation
|
page read and write
|
||
7605000
|
unkown
|
page read and write
|
||
7FF5D775C000
|
unkown
|
page readonly
|
||
144B000
|
heap
|
page read and write
|
||
4A0E000
|
unkown
|
page read and write
|
||
7FF5D7284000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
9F1F000
|
heap
|
page read and write
|
||
C63000
|
heap
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
5026000
|
trusted library allocation
|
page read and write
|
||
7FF5D75AF000
|
unkown
|
page readonly
|
||
678000
|
heap
|
page read and write
|
||
A0D7000
|
heap
|
page read and write
|
||
7FF5D75B8000
|
unkown
|
page readonly
|
||
9C30000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
42C5000
|
trusted library allocation
|
page read and write
|
||
52490000
|
direct allocation
|
page read and write
|
||
4935000
|
trusted library allocation
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
C9A7000
|
unkown
|
page read and write
|
||
A6FB000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
4040000
|
heap
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
A28D000
|
unkown
|
page read and write
|
||
35E4000
|
unkown
|
page read and write
|
||
CE1000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
2E81000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
35BD000
|
unkown
|
page read and write
|
||
602EB000
|
unkown
|
page write copy
|
||
9F44000
|
heap
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
4EB2000
|
trusted library allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
54E3000
|
trusted library allocation
|
page read and write
|
||
9D6000
|
stack
|
page read and write
|
||
7FF5D7682000
|
unkown
|
page readonly
|
||
7FF5D762F000
|
unkown
|
page readonly
|
||
A6BF000
|
heap
|
page read and write
|
||
C861000
|
unkown
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
C6A000
|
trusted library allocation
|
page execute and read and write
|
||
602FC000
|
unkown
|
page write copy
|
||
C40000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
3F69000
|
trusted library allocation
|
page read and write
|
||
7FF5D776F000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
CC8000
|
heap
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
2FC3000
|
trusted library allocation
|
page execute and read and write
|
||
A55A000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
3CB7000
|
trusted library allocation
|
page read and write
|
||
530F000
|
stack
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
1060B000
|
unkown
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
5962000
|
unkown
|
page readonly
|
||
9DF6000
|
heap
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
7FF5D72D0000
|
unkown
|
page readonly
|
||
9EFB000
|
heap
|
page read and write
|
||
CD9000
|
heap
|
page read and write
|
||
A618000
|
heap
|
page read and write
|
||
C642000
|
unkown
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
7FF5D7336000
|
unkown
|
page readonly
|
||
CB9000
|
heap
|
page read and write
|
||
CE7000
|
heap
|
page read and write
|
||
C908000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
79B000
|
heap
|
page read and write
|
||
7FF5D76E8000
|
unkown
|
page readonly
|
||
C3F000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
A41E000
|
heap
|
page read and write
|
||
A5DD000
|
heap
|
page read and write
|
||
588C000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
A5DF000
|
heap
|
page read and write
|
||
7FF5D66E3000
|
unkown
|
page readonly
|
||
A714000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
CBB000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
617000
|
heap
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
C4C6000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
7FF5D764F000
|
unkown
|
page readonly
|
||
A49C000
|
heap
|
page read and write
|
||
A305000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
9EF4000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
9EF9000
|
heap
|
page read and write
|
||
59EE000
|
stack
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
AA01000
|
unkown
|
page read and write
|
||
2D8E000
|
heap
|
page read and write
|
||
A3AD000
|
heap
|
page read and write
|
||
A5FE000
|
heap
|
page read and write
|
||
57A3000
|
trusted library allocation
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
C617000
|
unkown
|
page read and write
|
||
3FDE000
|
trusted library allocation
|
page read and write
|
||
7FF5D7546000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
9F24000
|
heap
|
page read and write
|
||
9F42000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9275000
|
stack
|
page read and write
|
||
185D000
|
stack
|
page read and write
|
||
7FF5D75D6000
|
unkown
|
page readonly
|
||
D1F000
|
stack
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
DD3000
|
unkown
|
page execute read
|
||
8880000
|
unkown
|
page readonly
|
||
5200000
|
heap
|
page execute and read and write
|
||
A69D000
|
heap
|
page read and write
|
||
C31000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
248E000
|
stack
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
26A7C000
|
direct allocation
|
page read and write
|
||
A23A000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
133B000
|
heap
|
page read and write
|
||
7FF5D7289000
|
unkown
|
page readonly
|
||
A0DA000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
A5C2000
|
heap
|
page read and write
|
||
5060000
|
trusted library allocation
|
page read and write
|
||
A20E000
|
heap
|
page read and write
|
||
11A51000
|
unkown
|
page read and write
|
||
C800000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
5015000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
BED000
|
heap
|
page read and write
|
||
42DA000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
12F6000
|
stack
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
11A52000
|
unkown
|
page read and write
|
||
9F25000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
159F000
|
stack
|
page read and write
|
||
A6B8000
|
heap
|
page read and write
|
||
30B1000
|
trusted library allocation
|
page read and write
|
||
2FE6000
|
trusted library allocation
|
page execute and read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
271E000
|
stack
|
page read and write
|
||
A5DB000
|
heap
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
A642000
|
heap
|
page read and write
|
||
3F65000
|
trusted library allocation
|
page read and write
|
||
5061000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
26A80000
|
direct allocation
|
page read and write
|
||
9F16000
|
heap
|
page read and write
|
||
668C1000
|
unkown
|
page execute read
|
||
54BE000
|
stack
|
page read and write
|
||
79B000
|
heap
|
page read and write
|
||
AC7000
|
trusted library allocation
|
page execute and read and write
|
||
AA9C000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
2BEB000
|
unkown
|
page readonly
|
||
CAB000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
FEB000
|
stack
|
page read and write
|
||
A39F000
|
unkown
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
A9DF000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3F89000
|
trusted library allocation
|
page read and write
|
||
CD2000
|
heap
|
page read and write
|
||
CDD000
|
heap
|
page read and write
|
||
14CF000
|
stack
|
page read and write
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
C653000
|
unkown
|
page read and write
|
||
3F64000
|
trusted library allocation
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9C03000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
11D0000
|
unkown
|
page read and write
|
||
C61B000
|
unkown
|
page read and write
|
||
111CF000
|
unkown
|
page read and write
|
||
58D5000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
65C7000
|
unkown
|
page readonly
|
||
CE0000
|
heap
|
page read and write
|
||
77DB000
|
unkown
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
9A96000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
1581000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
7FF5D7429000
|
unkown
|
page readonly
|
||
11A0000
|
unkown
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
3FE6000
|
trusted library allocation
|
page read and write
|
||
9EFB000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
595E000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
52480000
|
direct allocation
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
4CA000
|
heap
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
3F68000
|
trusted library allocation
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
A2FF000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
A6F1000
|
heap
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
35D5000
|
unkown
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
53A3000
|
heap
|
page execute and read and write
|
||
A68D000
|
heap
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
7FF5D766E000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
3F76000
|
trusted library allocation
|
page read and write
|
||
9EB0000
|
unkown
|
page readonly
|
||
A52B000
|
heap
|
page read and write
|
||
3FED000
|
trusted library allocation
|
page read and write
|
||
CC8000
|
heap
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
42D2000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
BEA0000
|
unkown
|
page readonly
|
||
997C000
|
stack
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
A132000
|
heap
|
page read and write
|
||
15A1000
|
trusted library allocation
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
2CDF000
|
trusted library allocation
|
page read and write
|
||
2DB4000
|
heap
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
429F000
|
stack
|
page read and write
|
||
132F000
|
heap
|
page read and write
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
6EF8000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
10F6000
|
heap
|
page read and write
|
||
7FF5D72D3000
|
unkown
|
page readonly
|
||
A4C4000
|
heap
|
page read and write
|
||
11A5F000
|
unkown
|
page read and write
|
||
3F91000
|
trusted library allocation
|
page read and write
|
||
7FF5D72BF000
|
unkown
|
page readonly
|
||
3070000
|
direct allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
535000
|
heap
|
page read and write
|
||
7FF5D765F000
|
unkown
|
page readonly
|
||
7FF5D7425000
|
unkown
|
page readonly
|
||
7FF5D7309000
|
unkown
|
page readonly
|
||
7FF5D7705000
|
unkown
|
page readonly
|
||
C44000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
B85A000
|
stack
|
page read and write
|
||
2447000
|
trusted library allocation
|
page read and write
|
||
2E6E000
|
heap
|
page execute and read and write
|
||
9AB4000
|
unkown
|
page read and write
|
||
9F10000
|
heap
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
A6D9000
|
heap
|
page read and write
|
||
C609000
|
unkown
|
page read and write
|
||
2B04000
|
trusted library allocation
|
page read and write
|
||
CD6000
|
heap
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
BE49000
|
stack
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
A1D9000
|
heap
|
page read and write
|
||
A37F000
|
heap
|
page read and write
|
||
7FF5D7534000
|
unkown
|
page readonly
|
||
3F41000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
418D000
|
trusted library allocation
|
page read and write
|
||
409E000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
A4BE000
|
heap
|
page read and write
|
||
9A6A000
|
unkown
|
page read and write
|
||
C806000
|
unkown
|
page read and write
|
||
9F1F000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
3F48000
|
trusted library allocation
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
A391000
|
unkown
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
11A5C000
|
unkown
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
3F89000
|
trusted library allocation
|
page read and write
|
||
A66B000
|
heap
|
page read and write
|
||
A310000
|
heap
|
page read and write
|
||
7AB0000
|
unkown
|
page read and write
|
||
9F29000
|
heap
|
page read and write
|
||
9F39000
|
heap
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
7FF5D7394000
|
unkown
|
page readonly
|
||
A427000
|
heap
|
page read and write
|
||
48801000
|
direct allocation
|
page read and write
|
||
1140000
|
unkown
|
page read and write
|
||
2B35000
|
trusted library allocation
|
page read and write
|
||
31AF000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
FB6000
|
stack
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
E7D000
|
trusted library allocation
|
page execute and read and write
|
||
597000
|
heap
|
page read and write
|
||
761E000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
E92E000
|
stack
|
page read and write
|
||
9EFD000
|
heap
|
page read and write
|
||
1360000
|
unkown
|
page readonly
|
||
2E6E000
|
stack
|
page read and write
|
||
3F6A000
|
trusted library allocation
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
3FE6000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
A8D000
|
trusted library allocation
|
page execute and read and write
|
||
59E000
|
heap
|
page read and write
|
||
3F70000
|
trusted library allocation
|
page read and write
|
||
7FF5D71C8000
|
unkown
|
page readonly
|
||
439000
|
unkown
|
page readonly
|
||
1FDE000
|
stack
|
page read and write
|
||
7C31000
|
unkown
|
page read and write
|
||
9EF1000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
1590000
|
trusted library allocation
|
page execute and read and write
|
||
A3B6000
|
heap
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
A620000
|
heap
|
page read and write
|
||
9F21000
|
heap
|
page read and write
|
||
9F23000
|
heap
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
7FF5D768B000
|
unkown
|
page readonly
|
||
111C6000
|
unkown
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
7FF5D7795000
|
unkown
|
page readonly
|
||
12D8000
|
heap
|
page read and write
|
||
103B000
|
stack
|
page read and write
|
||
7FF5D75F2000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
9A76000
|
unkown
|
page read and write
|
||
A3A9000
|
heap
|
page read and write
|
||
A32A000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
516E000
|
stack
|
page read and write
|
||
3F49000
|
trusted library allocation
|
page read and write
|
||
9679000
|
stack
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
6A40000
|
unkown
|
page readonly
|
||
1150000
|
unkown
|
page read and write
|
||
111CC000
|
unkown
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
2BEB000
|
unkown
|
page readonly
|
||
A471000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
4888C000
|
direct allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
3FE6000
|
trusted library allocation
|
page read and write
|
||
48858000
|
direct allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
A284000
|
heap
|
page read and write
|
||
A504000
|
heap
|
page read and write
|
||
3F77000
|
trusted library allocation
|
page read and write
|
||
9F19000
|
heap
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
79B000
|
heap
|
page read and write
|
||
9C38000
|
heap
|
page read and write
|
||
3195000
|
trusted library allocation
|
page read and write
|
||
3FE6000
|
trusted library allocation
|
page read and write
|
||
E60000
|
trusted library allocation
|
page execute and read and write
|
||
9CEB000
|
heap
|
page read and write
|
||
C669000
|
unkown
|
page read and write
|
||
7FF5D781A000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
CDB000
|
heap
|
page read and write
|
||
99B0000
|
unkown
|
page read and write
|
||
C37000
|
trusted library allocation
|
page read and write
|
||
3F7A000
|
trusted library allocation
|
page read and write
|
||
A0FB000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
58A0000
|
heap
|
page execute and read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1286000
|
trusted library allocation
|
page execute and read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
A564000
|
heap
|
page read and write
|
||
10644000
|
unkown
|
page read and write
|
||
35F4000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
60B000
|
heap
|
page read and write
|
||
3F97000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page readonly
|
||
5735000
|
trusted library allocation
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
7FF5D72FB000
|
unkown
|
page readonly
|
||
2661000
|
trusted library allocation
|
page read and write
|
||
C9D1000
|
unkown
|
page read and write
|
||
4BA4000
|
trusted library allocation
|
page read and write
|
||
9E5A000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
2093000
|
trusted library allocation
|
page execute and read and write
|
||
251E000
|
stack
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
A12F000
|
stack
|
page read and write
|
||
7FF5D7077000
|
unkown
|
page readonly
|
||
C50000
|
heap
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
1E90000
|
heap
|
page read and write
|
||
7460000
|
unkown
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
1140000
|
unkown
|
page read and write
|
||
7FF5D75FF000
|
unkown
|
page readonly
|
||
1290000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
7FF5D77C7000
|
unkown
|
page readonly
|
||
CA11000
|
unkown
|
page read and write
|
||
A184000
|
heap
|
page read and write
|
||
4A71000
|
unkown
|
page read and write
|
||
5173000
|
trusted library allocation
|
page read and write
|
||
9AC3000
|
unkown
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
20BA000
|
trusted library allocation
|
page execute and read and write
|
||
9B000
|
stack
|
page read and write
|
||
3F7B000
|
trusted library allocation
|
page read and write
|
||
9F74000
|
heap
|
page read and write
|
||
A54C000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A1EE000
|
heap
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
7FF5D7458000
|
unkown
|
page readonly
|
||
1160000
|
unkown
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
7FF5D7075000
|
unkown
|
page readonly
|
||
A16C000
|
heap
|
page read and write
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
972000
|
trusted library allocation
|
page read and write
|
||
3F79000
|
trusted library allocation
|
page read and write
|
||
A39C000
|
unkown
|
page read and write
|
||
A6A8000
|
heap
|
page read and write
|
||
4A90000
|
unkown
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
1140000
|
unkown
|
page read and write
|
||
CA0E000
|
unkown
|
page read and write
|
||
9FB6000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
7FF5D6AB6000
|
unkown
|
page readonly
|
||
4CFE000
|
stack
|
page read and write
|
||
3F43000
|
trusted library allocation
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
48EF000
|
stack
|
page read and write
|
||
9A80000
|
unkown
|
page read and write
|
||
9C08000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9AAA000
|
unkown
|
page read and write
|
||
C22000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
E6CD000
|
stack
|
page read and write
|
||
7FF5D752F000
|
unkown
|
page readonly
|
||
A306000
|
heap
|
page read and write
|
||
B950000
|
unkown
|
page readonly
|
||
9F14000
|
heap
|
page read and write
|
||
A3DA000
|
heap
|
page read and write
|
||
C3C000
|
heap
|
page read and write
|
||
9F23000
|
heap
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
1281000
|
unkown
|
page readonly
|
||
BB9000
|
stack
|
page read and write
|
||
9F20000
|
heap
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
9F16000
|
heap
|
page read and write
|
||
7FF5D74B8000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A326000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9F1A000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
CD2000
|
heap
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
9F18000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
AB31000
|
heap
|
page read and write
|
||
5245C000
|
direct allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3F71000
|
trusted library allocation
|
page read and write
|
||
3F95000
|
trusted library allocation
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
597000
|
heap
|
page read and write
|
||
272F000
|
stack
|
page read and write
|
||
CD6000
|
heap
|
page read and write
|
||
1685000
|
trusted library allocation
|
page read and write
|
||
CDF000
|
heap
|
page read and write
|
||
1B40000
|
heap
|
page read and write
|
||
7FF5D7703000
|
unkown
|
page readonly
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
A344000
|
heap
|
page read and write
|
||
B01A000
|
heap
|
page read and write
|
||
9D29000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
2FEA000
|
trusted library allocation
|
page execute and read and write
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
91F0000
|
unkown
|
page readonly
|
||
11A0000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9F1E000
|
heap
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
76F8000
|
unkown
|
page read and write
|
||
A631000
|
heap
|
page read and write
|
||
1140000
|
unkown
|
page read and write
|
||
640C1000
|
unkown
|
page execute read
|
||
16EF000
|
stack
|
page read and write
|
||
3FB9000
|
trusted library allocation
|
page read and write
|
||
129B000
|
trusted library allocation
|
page execute and read and write
|
||
7B00000
|
unkown
|
page readonly
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
A701000
|
heap
|
page read and write
|
||
9E51000
|
heap
|
page read and write
|
||
26A34000
|
direct allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
7FF5D76CD000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
52414000
|
direct allocation
|
page read and write
|
||
327C000
|
stack
|
page read and write
|
||
A508000
|
heap
|
page read and write
|
||
31A4000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
9CF9000
|
heap
|
page read and write
|
||
7FF5D769E000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
9CF0000
|
heap
|
page read and write
|
||
7FF5D777A000
|
unkown
|
page readonly
|
||
B59000
|
heap
|
page read and write
|
||
AF1000
|
stack
|
page read and write
|
||
A2B5000
|
unkown
|
page read and write
|
||
10B4000
|
unkown
|
page write copy
|
||
30D0000
|
heap
|
page read and write
|
||
11A5E000
|
unkown
|
page read and write
|
||
C472000
|
unkown
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
7FF5D783B000
|
unkown
|
page readonly
|
||
75F8000
|
unkown
|
page read and write
|
||
9EFB000
|
heap
|
page read and write
|
||
CE7000
|
heap
|
page read and write
|
||
7FF5D72C8000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
A486000
|
heap
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
7290000
|
unkown
|
page readonly
|
||
A2FA000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
5029000
|
trusted library allocation
|
page read and write
|
||
20DF000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
CE2000
|
heap
|
page read and write
|
||
3FBE000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
A36B000
|
heap
|
page read and write
|
||
212E000
|
stack
|
page read and write
|
||
12F7000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
7FF5D71DA000
|
unkown
|
page readonly
|
||
31D7000
|
trusted library allocation
|
page read and write
|
||
A374000
|
heap
|
page read and write
|
||
26AF4000
|
direct allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3F77000
|
trusted library allocation
|
page read and write
|
||
C450000
|
unkown
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
A570000
|
heap
|
page read and write
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
63B000
|
stack
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
F0C000
|
heap
|
page read and write
|
||
544E000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
12FC000
|
heap
|
page read and write
|
||
3F95000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3F78000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
3F87000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
9B41000
|
unkown
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
7DF4F2491000
|
unkown
|
page execute read
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
2846000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D770A000
|
unkown
|
page readonly
|
||
1610000
|
heap
|
page execute and read and write
|
||
8D5000
|
heap
|
page read and write
|
||
7FF5D7391000
|
unkown
|
page readonly
|
||
597000
|
heap
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
96FE000
|
stack
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
3F91000
|
trusted library allocation
|
page read and write
|
||
C4BD000
|
unkown
|
page read and write
|
||
2605000
|
trusted library allocation
|
page read and write
|
||
618C1000
|
unkown
|
page execute read
|
||
54DE000
|
stack
|
page read and write
|
||
B980000
|
unkown
|
page readonly
|
||
597000
|
heap
|
page read and write
|
||
3100000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
A362000
|
heap
|
page read and write
|
||
A2FB000
|
heap
|
page read and write
|
||
A03A000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
BE90000
|
unkown
|
page read and write
|
||
736000
|
stack
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
4C4D000
|
stack
|
page read and write
|
||
A126000
|
heap
|
page read and write
|
||
60306000
|
unkown
|
page read and write
|
||
B4D0000
|
unkown
|
page readonly
|
||
A309000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
A219000
|
heap
|
page read and write
|
||
4041000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
96A000
|
trusted library allocation
|
page execute and read and write
|
||
1220000
|
unkown
|
page read and write
|
||
7FF5D73F5000
|
unkown
|
page readonly
|
||
C28000
|
heap
|
page read and write
|
||
3160000
|
trusted library allocation
|
page read and write
|
||
9EFD000
|
heap
|
page read and write
|
||
169F000
|
stack
|
page read and write
|
||
A540000
|
heap
|
page read and write
|
||
3F87000
|
trusted library allocation
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
9F29000
|
heap
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
A116000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
1366000
|
heap
|
page read and write
|
||
A448000
|
heap
|
page read and write
|
||
3F71000
|
trusted library allocation
|
page read and write
|
||
A313000
|
unkown
|
page read and write
|
||
3F4A000
|
trusted library allocation
|
page read and write
|
||
A308000
|
heap
|
page read and write
|
||
6AA000
|
unkown
|
page write copy
|
||
3180000
|
unkown
|
page read and write
|
||
9E81000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
A0B5000
|
heap
|
page read and write
|
||
1309000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
111C0000
|
unkown
|
page read and write
|
||
A43A000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
2600000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
2AC1000
|
trusted library allocation
|
page read and write
|
||
3F87000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
12AF000
|
heap
|
page read and write
|
||
B76000
|
heap
|
page read and write
|
||
4EAE000
|
stack
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
A699000
|
heap
|
page read and write
|
||
A203000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
CAB000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
A1D7000
|
heap
|
page read and write
|
||
3FA9000
|
trusted library allocation
|
page read and write
|
||
1140000
|
unkown
|
page read and write
|
||
571E000
|
trusted library allocation
|
page read and write
|
||
604C1000
|
unkown
|
page execute read
|
||
7E60000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
1587000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
7FF5D7073000
|
unkown
|
page readonly
|
||
3F58000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
F43D000
|
unkown
|
page read and write
|
||
7FF5D77FD000
|
unkown
|
page readonly
|
||
C50000
|
heap
|
page read and write
|
||
15A7000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
111CD000
|
unkown
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
AA04000
|
unkown
|
page read and write
|
||
9E7A000
|
heap
|
page read and write
|
||
A166000
|
heap
|
page read and write
|
||
9F1D000
|
heap
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
ABB000
|
stack
|
page read and write
|
||
A384000
|
unkown
|
page read and write
|
||
26A5C000
|
direct allocation
|
page read and write
|
||
A5D6000
|
heap
|
page read and write
|
||
CDE000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
51D000
|
heap
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9EFC000
|
heap
|
page read and write
|
||
AE1D000
|
stack
|
page read and write
|
||
9F28000
|
heap
|
page read and write
|
||
7B2000
|
heap
|
page read and write
|
||
9A94000
|
unkown
|
page read and write
|
||
CC8000
|
heap
|
page read and write
|
||
524D8000
|
direct allocation
|
page read and write
|
||
425000
|
unkown
|
page readonly
|
||
42A000
|
unkown
|
page read and write
|
||
3F7B000
|
trusted library allocation
|
page read and write
|
||
21DE000
|
stack
|
page read and write
|
||
3F87000
|
trusted library allocation
|
page read and write
|
||
9EFA000
|
heap
|
page read and write
|
||
9FAF000
|
stack
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
D20000
|
trusted library allocation
|
page execute and read and write
|
||
60EC1000
|
unkown
|
page execute read
|
||
33B0000
|
unkown
|
page readonly
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
7FF5D77D2000
|
unkown
|
page readonly
|
||
C70000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
55E0000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
602EA000
|
unkown
|
page read and write
|
||
A4CD000
|
heap
|
page read and write
|
||
4887C000
|
direct allocation
|
page read and write
|
||
1694000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
2B51000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
remote allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
7FF5D7808000
|
unkown
|
page readonly
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
A272000
|
heap
|
page read and write
|
||
7E58000
|
stack
|
page read and write
|
||
A83000
|
trusted library allocation
|
page execute and read and write
|
||
A39C000
|
heap
|
page read and write
|
||
A556000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
A50C000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A4D6000
|
heap
|
page read and write
|
||
7DF4F2471000
|
unkown
|
page execute read
|
||
3230000
|
unkown
|
page read and write
|
||
A286000
|
unkown
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
A3B000
|
stack
|
page read and write
|
||
A100000
|
heap
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
7B3000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
9E00000
|
heap
|
page read and write
|
||
A711000
|
heap
|
page read and write
|
||
9F07000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
FCB000
|
stack
|
page read and write
|
||
7FF5D77E9000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
9E2E000
|
stack
|
page read and write
|
||
9F0E000
|
heap
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
2960000
|
trusted library allocation
|
page execute and read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
A323000
|
heap
|
page read and write
|
||
A235000
|
heap
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
9AF9000
|
unkown
|
page read and write
|
||
5B1F000
|
stack
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
A4FD000
|
heap
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
524B0000
|
direct allocation
|
page read and write
|
||
9C48000
|
heap
|
page read and write
|
||
9CF000
|
heap
|
page read and write
|
||
53F0000
|
heap
|
page read and write
|
||
12CC000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
A10F000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
9F22000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9EFB000
|
heap
|
page read and write
|
||
578A000
|
trusted library allocation
|
page read and write
|
||
94AB000
|
stack
|
page read and write
|
||
10504000
|
unkown
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
CDD000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A358000
|
heap
|
page read and write
|
||
7FF5D7236000
|
unkown
|
page readonly
|
||
C84000
|
heap
|
page read and write
|
||
10699000
|
unkown
|
page read and write
|
||
A1B1000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
7FF5D7404000
|
unkown
|
page readonly
|
||
126D000
|
trusted library allocation
|
page execute and read and write
|
||
434000
|
unkown
|
page read and write
|
||
A409000
|
heap
|
page read and write
|
||
B8DB000
|
stack
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
11A5F000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
C7C6000
|
unkown
|
page read and write
|
||
9D36000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
62CC1000
|
unkown
|
page execute read
|
||
11E0000
|
unkown
|
page read and write
|
||
26A40000
|
direct allocation
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
1170000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3F56000
|
trusted library allocation
|
page read and write
|
||
7FF5D6BEF000
|
unkown
|
page readonly
|
||
9F2B000
|
heap
|
page read and write
|
||
26AC8000
|
direct allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A081000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
A3B9000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
597000
|
heap
|
page read and write
|
||
7FF5D7604000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
A142000
|
heap
|
page read and write
|
||
AAA7000
|
unkown
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
A3A0000
|
heap
|
page read and write
|
||
AB01000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
7FF5D7455000
|
unkown
|
page readonly
|
||
A1FE000
|
heap
|
page read and write
|
||
C48B000
|
unkown
|
page read and write
|
||
C24E000
|
stack
|
page read and write
|
||
2CB5000
|
trusted library allocation
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
111CB000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
A6DF000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
9CE6000
|
heap
|
page read and write
|
||
A554000
|
heap
|
page read and write
|
||
C4DC000
|
unkown
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
7B10000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
C9E3000
|
unkown
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
35B0000
|
unkown
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
1BA0000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
9F29000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
E54D000
|
stack
|
page read and write
|
||
C23000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
95FC000
|
stack
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9FDA000
|
heap
|
page read and write
|
||
3FF5000
|
trusted library allocation
|
page read and write
|
||
7FF5D77DD000
|
unkown
|
page readonly
|
||
AB38000
|
heap
|
page read and write
|
||
4AB0000
|
unkown
|
page read and write
|
||
7FF5D7398000
|
unkown
|
page readonly
|
||
9EE000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
A569000
|
heap
|
page read and write
|
||
9EFB000
|
heap
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
C625000
|
unkown
|
page read and write
|
||
8DB000
|
stack
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
A222000
|
heap
|
page read and write
|
||
33F0000
|
unkown
|
page read and write
|
||
11D0000
|
unkown
|
page read and write
|
||
A521000
|
heap
|
page read and write
|
||
A2D7000
|
unkown
|
page read and write
|
||
966000
|
trusted library allocation
|
page execute and read and write
|
||
A02E000
|
stack
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
254E000
|
stack
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
1267000
|
trusted library allocation
|
page execute and read and write
|
||
42C7000
|
trusted library allocation
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
9F10000
|
heap
|
page read and write
|
||
7FF5D75D9000
|
unkown
|
page readonly
|
||
19A000
|
stack
|
page read and write
|
||
7FF5D66E8000
|
unkown
|
page readonly
|
||
7FF5D75A6000
|
unkown
|
page readonly
|
||
ACB000
|
trusted library allocation
|
page execute and read and write
|
||
A1A3000
|
heap
|
page read and write
|
||
C75000
|
trusted library allocation
|
page execute and read and write
|
||
C621000
|
unkown
|
page read and write
|
||
7FF5D720A000
|
unkown
|
page readonly
|
||
4116000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
128A000
|
trusted library allocation
|
page execute and read and write
|
||
5246C000
|
direct allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
C4D000
|
trusted library allocation
|
page execute and read and write
|
||
3FBE000
|
trusted library allocation
|
page read and write
|
||
A67C000
|
heap
|
page read and write
|
||
9F1F000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
A495000
|
heap
|
page read and write
|
||
5004000
|
trusted library allocation
|
page read and write
|
||
C5F0000
|
unkown
|
page read and write
|
||
A4B2000
|
heap
|
page read and write
|
||
32C5000
|
trusted library allocation
|
page read and write
|
||
A456000
|
heap
|
page read and write
|
||
5002000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9EF3000
|
heap
|
page read and write
|
||
8360000
|
unkown
|
page read and write
|
||
CC8000
|
heap
|
page read and write
|
||
7FF5D74A6000
|
unkown
|
page readonly
|
||
E5CE000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
CC2000
|
heap
|
page read and write
|
||
A408000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
A4F6000
|
heap
|
page read and write
|
||
A1C6000
|
heap
|
page read and write
|
||
3F71000
|
trusted library allocation
|
page read and write
|
||
49FD000
|
unkown
|
page read and write
|
||
8ECB000
|
stack
|
page read and write
|
||
7C70000
|
unkown
|
page readonly
|
||
3F46000
|
trusted library allocation
|
page read and write
|
||
2AF5000
|
trusted library allocation
|
page read and write
|
||
3F63000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
7FF5D716B000
|
unkown
|
page readonly
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
636C1000
|
unkown
|
page execute read
|
||
59E000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
E2A000
|
trusted library allocation
|
page execute and read and write
|
||
5046000
|
trusted library allocation
|
page read and write
|
||
77C000
|
heap
|
page read and write
|
||
7FF5D770F000
|
unkown
|
page readonly
|
||
9FF8000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
11A53000
|
unkown
|
page read and write
|
||
7FF5D717C000
|
unkown
|
page readonly
|
||
C23000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
111CD000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
9F04000
|
heap
|
page read and write
|
||
10584000
|
unkown
|
page read and write
|
||
1140000
|
unkown
|
page read and write
|
||
A1B9000
|
heap
|
page read and write
|
||
407E000
|
trusted library allocation
|
page read and write
|
||
5190000
|
heap
|
page read and write
|
||
9EFE000
|
heap
|
page read and write
|
||
1140000
|
unkown
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
9F29000
|
heap
|
page read and write
|
||
2B06000
|
trusted library allocation
|
page read and write
|
||
9D07000
|
heap
|
page read and write
|
||
A667000
|
heap
|
page read and write
|
||
853B000
|
stack
|
page read and write
|
||
9F1D000
|
heap
|
page read and write
|
||
A247000
|
heap
|
page read and write
|
||
9F3B000
|
heap
|
page read and write
|
||
F64000
|
heap
|
page read and write
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
C28000
|
heap
|
page read and write
|
||
9BF8000
|
heap
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
7FF5D72DF000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
7B60000
|
unkown
|
page readonly
|
||
10B4000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
3FED000
|
trusted library allocation
|
page read and write
|
||
3F9000
|
stack
|
page read and write
|
||
AB01000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
9AFA000
|
heap
|
page read and write
|
||
3F67000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
58D3000
|
trusted library allocation
|
page read and write
|
||
A42D000
|
heap
|
page read and write
|
||
AA92000
|
unkown
|
page read and write
|
||
9F27000
|
heap
|
page read and write
|
||
9B8000
|
heap
|
page read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
5044000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
unkown
|
page read and write
|
||
32F0000
|
remote allocation
|
page read and write
|
||
AA0E000
|
unkown
|
page read and write
|
||
258F000
|
stack
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
7FF5D751F000
|
unkown
|
page readonly
|
||
35C3000
|
unkown
|
page read and write
|
||
9F24000
|
heap
|
page read and write
|
||
5727000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
9EFA000
|
heap
|
page read and write
|
||
A4F9000
|
heap
|
page read and write
|
||
9F27000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
A40E000
|
heap
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
A4AA000
|
heap
|
page read and write
|
||
BFA000
|
heap
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
1AFF000
|
stack
|
page read and write
|
||
9CD9000
|
heap
|
page read and write
|
||
A84000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
3E81000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
77C000
|
heap
|
page read and write
|
||
3F57000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9EF9000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
5830000
|
heap
|
page read and write
|
||
2FF9000
|
stack
|
page read and write
|
||
425000
|
unkown
|
page readonly
|
||
C54000
|
heap
|
page read and write
|
||
C3C000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
1350000
|
unkown
|
page readonly
|
||
C3F000
|
heap
|
page read and write
|
||
A88A000
|
heap
|
page read and write
|
||
7FF5D76F5000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
3FA4000
|
trusted library allocation
|
page read and write
|
||
5018000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
27F3000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
4850000
|
unclassified section
|
page read and write
|
||
3F5F000
|
trusted library allocation
|
page read and write
|
||
9EA4000
|
heap
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
7435000
|
stack
|
page read and write
|
||
9F04000
|
heap
|
page read and write
|
||
35D1000
|
unkown
|
page read and write
|
||
A573000
|
heap
|
page read and write
|
||
35B3000
|
unkown
|
page read and write
|
||
52444000
|
direct allocation
|
page read and write
|
||
7FF5D7745000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
C3C000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
7B20000
|
unkown
|
page read and write
|
||
7FF5D71AF000
|
unkown
|
page readonly
|
||
A635000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
772000
|
heap
|
page read and write
|
||
A368000
|
heap
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
9F33000
|
heap
|
page read and write
|
||
2DA0000
|
unclassified section
|
page read and write
|
||
A053000
|
heap
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
3170000
|
heap
|
page execute and read and write
|
||
2080000
|
trusted library allocation
|
page read and write
|
||
273D000
|
heap
|
page read and write
|
||
9C05000
|
heap
|
page read and write
|
||
9F3A000
|
heap
|
page read and write
|
||
6031E000
|
unkown
|
page readonly
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
CCC000
|
heap
|
page read and write
|
||
3F7A000
|
trusted library allocation
|
page read and write
|
||
3489000
|
stack
|
page read and write
|
||
7FF5D7837000
|
unkown
|
page readonly
|
||
4420000
|
heap
|
page read and write
|
||
13C5000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
9F1E000
|
heap
|
page read and write
|
||
7FF5D71C4000
|
unkown
|
page readonly
|
||
2DB6000
|
heap
|
page read and write
|
||
3E87000
|
trusted library allocation
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
9FD2000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3F4B000
|
trusted library allocation
|
page read and write
|
||
3630000
|
unkown
|
page readonly
|
||
A2F0000
|
heap
|
page read and write
|
||
3F40000
|
trusted library allocation
|
page read and write
|
||
26AD4000
|
direct allocation
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
9F1E000
|
heap
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
A6D9000
|
heap
|
page read and write
|
||
1570000
|
trusted library allocation
|
page execute and read and write
|
||
C7B000
|
heap
|
page read and write
|
||
11A53000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
9EF2000
|
heap
|
page read and write
|
||
A33F000
|
unkown
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
59E000
|
heap
|
page read and write
|
||
4882C000
|
direct allocation
|
page read and write
|
||
11C1000
|
unkown
|
page read and write
|
||
2280000
|
trusted library allocation
|
page read and write
|
||
41B1000
|
trusted library allocation
|
page read and write
|
||
7340000
|
unkown
|
page readonly
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
7FF5D774C000
|
unkown
|
page readonly
|
||
A59E000
|
heap
|
page read and write
|
||
AFBE000
|
stack
|
page read and write
|
||
9C10000
|
heap
|
page read and write
|
||
2BEB000
|
unkown
|
page readonly
|
||
597000
|
heap
|
page read and write
|
||
7FF5D7764000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
A518000
|
heap
|
page read and write
|
||
3F89000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
20A0000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
DC0000
|
unkown
|
page read and write
|
||
320000
|
unkown
|
page readonly
|
||
1297000
|
trusted library allocation
|
page execute and read and write
|
||
A5AF000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
CDB000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
1BA7000
|
heap
|
page read and write
|
||
10E0000
|
stack
|
page read and write
|
||
9EFC000
|
heap
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
A1C9000
|
heap
|
page read and write
|
||
3F8B000
|
trusted library allocation
|
page read and write
|
||
C3C000
|
heap
|
page read and write
|
||
429000
|
unkown
|
page write copy
|
||
32C1000
|
trusted library allocation
|
page read and write
|
||
CE7000
|
heap
|
page read and write
|
||
2850000
|
trusted library allocation
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9F44000
|
heap
|
page read and write
|
||
9A90000
|
unkown
|
page read and write
|
||
35C1000
|
unkown
|
page read and write
|
||
A341000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
64AC1000
|
unkown
|
page execute read
|
||
3180000
|
unkown
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
48818000
|
direct allocation
|
page read and write
|
||
3280000
|
unkown
|
page read and write
|
||
A5A3000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
7FF5D75F6000
|
unkown
|
page readonly
|
||
11A0000
|
unkown
|
page read and write
|
||
7DF4F2461000
|
unkown
|
page execute read
|
||
A205000
|
heap
|
page read and write
|
||
2421000
|
trusted library allocation
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
A63E000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
2F61000
|
heap
|
page read and write
|
||
7FF5D7760000
|
unkown
|
page readonly
|
||
20E0000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
9F04000
|
heap
|
page read and write
|
||
A639000
|
heap
|
page read and write
|
||
A690000
|
heap
|
page read and write
|
||
3F99000
|
trusted library allocation
|
page read and write
|
||
747E000
|
stack
|
page read and write
|
||
A5CE000
|
heap
|
page read and write
|
||
15FB000
|
trusted library allocation
|
page execute and read and write
|
||
A00000
|
heap
|
page read and write
|
||
A365000
|
heap
|
page read and write
|
||
2D8A000
|
heap
|
page read and write
|
||
3F9A000
|
trusted library allocation
|
page read and write
|
||
9CDB000
|
heap
|
page read and write
|
||
14C5000
|
heap
|
page read and write
|
||
A42A000
|
heap
|
page read and write
|
||
2857000
|
trusted library allocation
|
page execute and read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
CD9000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
944000
|
trusted library allocation
|
page read and write
|
||
A34A000
|
heap
|
page read and write
|
||
419E000
|
stack
|
page read and write
|
||
411E000
|
trusted library allocation
|
page read and write
|
||
A506000
|
heap
|
page read and write
|
||
7FF5D748A000
|
unkown
|
page readonly
|
||
9AB2000
|
unkown
|
page read and write
|
||
A0AA000
|
heap
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
52424000
|
direct allocation
|
page read and write
|
||
9F3A000
|
heap
|
page read and write
|
||
3F41000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
5330000
|
unkown
|
page write copy
|
||
A31D000
|
heap
|
page read and write
|
||
AAA000
|
trusted library allocation
|
page execute and read and write
|
||
1810000
|
heap
|
page read and write
|
||
A0C1000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
3F91000
|
trusted library allocation
|
page read and write
|
||
F58A000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page execute and read and write
|
||
CC1000
|
heap
|
page read and write
|
||
D81000
|
unkown
|
page execute read
|
||
7FF5D7065000
|
unkown
|
page readonly
|
||
A1F0000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
105C3000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
2EA1000
|
unkown
|
page read and write
|
||
26AA0000
|
direct allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
529000
|
heap
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
5050000
|
trusted library allocation
|
page read and write
|
||
A1E1000
|
heap
|
page read and write
|
||
7FF5D77B9000
|
unkown
|
page readonly
|
||
443C000
|
trusted library allocation
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
5434000
|
trusted library allocation
|
page read and write
|
||
3F4F000
|
trusted library allocation
|
page read and write
|
||
7D5000
|
heap
|
page read and write
|
||
A270000
|
heap
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
9ADB000
|
unkown
|
page read and write
|
||
C3C000
|
heap
|
page read and write
|
||
A416000
|
unkown
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
7FF5D7376000
|
unkown
|
page readonly
|
||
3F67000
|
trusted library allocation
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
8D3C000
|
stack
|
page read and write
|
||
15E6000
|
trusted library allocation
|
page execute and read and write
|
||
49FA000
|
unkown
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
3F6F000
|
trusted library allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
13A0000
|
unkown
|
page readonly
|
||
5721000
|
trusted library allocation
|
page read and write
|
||
C3C000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
8F6000
|
stack
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
A276000
|
heap
|
page read and write
|
||
C035000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
C615000
|
unkown
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
2FCD000
|
trusted library allocation
|
page execute and read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9CD3000
|
heap
|
page read and write
|
||
298E000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
7FF5D6ABD000
|
unkown
|
page readonly
|
||
9BE0000
|
heap
|
page read and write
|
||
4A44000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
9EF7000
|
heap
|
page read and write
|
||
A0CF000
|
heap
|
page read and write
|
||
9F27000
|
heap
|
page read and write
|
||
3F7A000
|
trusted library allocation
|
page read and write
|
||
A177000
|
heap
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
DBD000
|
trusted library allocation
|
page execute and read and write
|
||
26A90000
|
direct allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
7FF5D77C2000
|
unkown
|
page readonly
|
||
10000000
|
unkown
|
page readonly
|
||
CBB000
|
heap
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
7FF5D760B000
|
unkown
|
page readonly
|
||
9F2F000
|
heap
|
page read and write
|
||
C5D000
|
trusted library allocation
|
page execute and read and write
|
||
A2F3000
|
heap
|
page read and write
|
||
A528000
|
heap
|
page read and write
|
||
5D5000
|
heap
|
page read and write
|
||
C5F4000
|
unkown
|
page read and write
|
||
5465000
|
trusted library allocation
|
page read and write
|
||
A27D000
|
heap
|
page read and write
|
||
3F71000
|
trusted library allocation
|
page read and write
|
||
5351000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
A3E5000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
A280000
|
heap
|
page read and write
|
||
9F31000
|
heap
|
page read and write
|
||
9B89000
|
unkown
|
page read and write
|
||
A316000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
C891000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
7FF5D7280000
|
unkown
|
page readonly
|
||
3F48000
|
trusted library allocation
|
page read and write
|
||
3F77000
|
trusted library allocation
|
page read and write
|
||
E37000
|
trusted library allocation
|
page execute and read and write
|
||
49C2000
|
unkown
|
page read and write
|
||
F44A000
|
unkown
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
F36000
|
stack
|
page read and write
|
||
3F58000
|
trusted library allocation
|
page read and write
|
||
E71000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9CFD000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
3F80000
|
trusted library allocation
|
page read and write
|
||
9CE3000
|
heap
|
page read and write
|
||
A162000
|
heap
|
page read and write
|
||
26A70000
|
direct allocation
|
page read and write
|
||
9F12000
|
heap
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
B4BF000
|
stack
|
page read and write
|
||
A0A2000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
A07C000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
501E000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
5032000
|
trusted library allocation
|
page read and write
|
||
5336000
|
trusted library allocation
|
page read and write
|
||
5479000
|
unkown
|
page read and write
|
||
3FBD000
|
trusted library allocation
|
page read and write
|
||
BFB8000
|
stack
|
page read and write
|
||
769A000
|
unkown
|
page read and write
|
||
49D0000
|
heap
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page read and write
|
||
3FB9000
|
trusted library allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
F9F000
|
stack
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
9FCA000
|
heap
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
C60000
|
trusted library allocation
|
page read and write
|
||
3F41000
|
trusted library allocation
|
page read and write
|
||
F400000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
7FF5D71EA000
|
unkown
|
page readonly
|
||
B023000
|
heap
|
page read and write
|
||
241F000
|
trusted library allocation
|
page read and write
|
||
1347000
|
heap
|
page read and write
|
||
A4E4000
|
heap
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
4BD5000
|
trusted library allocation
|
page read and write
|
||
A22F000
|
heap
|
page read and write
|
||
58CF000
|
stack
|
page read and write
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
CA8000
|
heap
|
page read and write
|
||
1610000
|
trusted library allocation
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
8D9000
|
heap
|
page read and write
|
||
40EE000
|
trusted library allocation
|
page read and write
|
||
60304000
|
unkown
|
page write copy
|
||
CA0000
|
heap
|
page read and write
|
||
A451000
|
heap
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
7FF5D7669000
|
unkown
|
page readonly
|
||
7654000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
9F24000
|
heap
|
page read and write
|
||
48884000
|
direct allocation
|
page read and write
|
||
7AF1000
|
unkown
|
page read and write
|
||
3F59000
|
trusted library allocation
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
20CB000
|
trusted library allocation
|
page execute and read and write
|
||
2E5E000
|
heap
|
page read and write
|
||
9F32000
|
heap
|
page read and write
|
||
9C0D000
|
heap
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
977000
|
trusted library allocation
|
page execute and read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
C44F000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
2AC7000
|
trusted library allocation
|
page read and write
|
||
9A8E000
|
unkown
|
page read and write
|
||
20C7000
|
trusted library allocation
|
page execute and read and write
|
||
429000
|
unkown
|
page read and write
|
||
A35A000
|
heap
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
E4CD000
|
stack
|
page read and write
|
||
9A0000
|
trusted library allocation
|
page execute and read and write
|
||
9EF1000
|
heap
|
page read and write
|
||
7FF5D748C000
|
unkown
|
page readonly
|
||
4126000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
505C000
|
trusted library allocation
|
page read and write
|
||
3F48000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
11A57000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
C7B000
|
trusted library allocation
|
page execute and read and write
|
||
A3ED000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9A9E000
|
unkown
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
5463000
|
unkown
|
page read and write
|
||
176E000
|
stack
|
page read and write
|
||
48888000
|
direct allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
CFC000
|
stack
|
page read and write
|
||
621000
|
unkown
|
page execute read
|
||
597000
|
heap
|
page read and write
|
||
9F1F000
|
heap
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
15F7000
|
trusted library allocation
|
page execute and read and write
|
||
4AC0000
|
unkown
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
CAF000
|
heap
|
page read and write
|
||
A662000
|
heap
|
page read and write
|
||
9F3D000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
4181000
|
trusted library allocation
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
1C4000
|
heap
|
page read and write
|
||
15BD000
|
trusted library allocation
|
page execute and read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
A3B6000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
A0A5000
|
heap
|
page read and write
|
||
CBE000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
1694000
|
unkown
|
page readonly
|
||
9F3B000
|
heap
|
page read and write
|
||
3F4F000
|
trusted library allocation
|
page read and write
|
||
7FF5D774A000
|
unkown
|
page readonly
|
||
9EB2000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
5035000
|
trusted library allocation
|
page read and write
|
||
3F5A000
|
trusted library allocation
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
76F000
|
heap
|
page read and write
|
||
7C80000
|
unkown
|
page read and write
|
||
26B28000
|
direct allocation
|
page read and write
|
||
7DF4F2481000
|
unkown
|
page execute read
|
||
2F67000
|
trusted library allocation
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
10B5000
|
unkown
|
page execute read
|
||
CDE000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
75E0000
|
unkown
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
111C6000
|
unkown
|
page read and write
|
||
3B57000
|
trusted library allocation
|
page read and write
|
||
22C4000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
2094000
|
trusted library allocation
|
page read and write
|
||
10002000
|
unkown
|
page readonly
|
||
33C0000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
9BF0000
|
heap
|
page read and write
|
||
950000
|
trusted library allocation
|
page read and write
|
||
4BD3000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
AB2B000
|
heap
|
page read and write
|
||
A231000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
55D5000
|
trusted library allocation
|
page read and write
|
||
B03B000
|
stack
|
page read and write
|
||
12A8000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
77C000
|
heap
|
page read and write
|
||
A3A6000
|
heap
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
CAB000
|
heap
|
page read and write
|
||
EC8000
|
heap
|
page read and write
|
||
9F04000
|
heap
|
page read and write
|
||
7DF5F46E1000
|
unkown
|
page readonly
|
||
11A0000
|
unkown
|
page read and write
|
||
699000
|
unkown
|
page readonly
|
||
597000
|
heap
|
page read and write
|
||
4AA0000
|
unkown
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
107D000
|
stack
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
9F0F000
|
heap
|
page read and write
|
||
529000
|
heap
|
page read and write
|
||
362A000
|
unkown
|
page read and write
|
||
786000
|
heap
|
page read and write
|
||
32EF000
|
trusted library allocation
|
page read and write
|
||
3554000
|
unkown
|
page read and write
|
||
26AB8000
|
direct allocation
|
page read and write
|
||
570E000
|
trusted library allocation
|
page read and write
|
||
2090000
|
trusted library allocation
|
page read and write
|
||
6AB0000
|
unkown
|
page readonly
|
||
7FF5D7396000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
7FF5D7784000
|
unkown
|
page readonly
|
||
3940000
|
remote allocation
|
page read and write
|
||
A5EF000
|
heap
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
22C0000
|
trusted library allocation
|
page read and write
|
||
9F10000
|
heap
|
page read and write
|
||
3F60000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
A23A000
|
heap
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
348B000
|
stack
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
9B0B000
|
unkown
|
page read and write
|
||
3F80000
|
trusted library allocation
|
page read and write
|
||
340000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
111CE000
|
unkown
|
page read and write
|
||
10ED000
|
trusted library allocation
|
page execute and read and write
|
||
9BC000
|
stack
|
page read and write
|
||
345C000
|
trusted library allocation
|
page read and write
|
||
7FF5D7523000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
55E2000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
760B000
|
unkown
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
A6C7000
|
heap
|
page read and write
|
||
11A58000
|
unkown
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
52440000
|
direct allocation
|
page read and write
|
||
7AC0000
|
unkown
|
page read and write
|
||
3F68000
|
trusted library allocation
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
3F43000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
3F58000
|
trusted library allocation
|
page read and write
|
||
2277000
|
trusted library allocation
|
page read and write
|
||
C51000
|
heap
|
page read and write
|
||
AA40000
|
unkown
|
page read and write
|
||
5247C000
|
direct allocation
|
page read and write
|
||
1EDE000
|
unkown
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
35CD000
|
unkown
|
page read and write
|
||
A441000
|
heap
|
page read and write
|
||
A5BE000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
7FF5D723C000
|
unkown
|
page readonly
|
||
C3CE000
|
stack
|
page read and write
|
||
A595000
|
heap
|
page read and write
|
||
A6AC000
|
heap
|
page read and write
|
||
3F4E000
|
trusted library allocation
|
page read and write
|
||
7FF5D6BDB000
|
unkown
|
page readonly
|
||
C28000
|
heap
|
page read and write
|
||
3FA1000
|
trusted library allocation
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
3F76000
|
trusted library allocation
|
page read and write
|
||
AAFB000
|
heap
|
page read and write
|
||
15B3000
|
trusted library allocation
|
page execute and read and write
|
||
7480000
|
unclassified section
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
BE70000
|
unkown
|
page readonly
|
||
7611000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
9F1C000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A08000
|
heap
|
page read and write
|
||
7FF5D720F000
|
unkown
|
page readonly
|
||
597000
|
heap
|
page read and write
|
||
68D000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
2B14000
|
trusted library allocation
|
page read and write
|
||
CAB000
|
heap
|
page read and write
|
||
11E0000
|
unkown
|
page read and write
|
||
8A46000
|
unkown
|
page read and write
|
||
A524000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
A4C7000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
A575000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
3F9E000
|
trusted library allocation
|
page read and write
|
||
95FB000
|
heap
|
page read and write
|
||
A9D000
|
trusted library allocation
|
page execute and read and write
|
||
A0D2000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
AB31000
|
heap
|
page read and write
|
||
3F76000
|
trusted library allocation
|
page read and write
|
||
A530000
|
heap
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
1068B000
|
unkown
|
page read and write
|
||
1292000
|
trusted library allocation
|
page read and write
|
||
66BD3000
|
unkown
|
page execute read
|
||
3F71000
|
trusted library allocation
|
page read and write
|
||
3F45000
|
trusted library allocation
|
page read and write
|
||
A18B000
|
heap
|
page read and write
|
||
10544000
|
unkown
|
page read and write
|
||
C78A000
|
unkown
|
page read and write
|
||
A1FC000
|
heap
|
page read and write
|
||
48834000
|
direct allocation
|
page read and write
|
||
9F1D000
|
heap
|
page read and write
|
||
8980000
|
stack
|
page read and write
|
||
A659000
|
heap
|
page read and write
|
||
4F00000
|
heap
|
page execute and read and write
|
||
A0F1000
|
heap
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D728E000
|
unkown
|
page readonly
|
||
11A5D000
|
unkown
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
143F000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
DB4000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
89FC000
|
stack
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
A431000
|
heap
|
page read and write
|
||
A4D9000
|
heap
|
page read and write
|
||
52401000
|
direct allocation
|
page read and write
|
||
7FF5D7643000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
2B1E000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A2F2000
|
heap
|
page read and write
|
||
26A6C000
|
direct allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
9F17000
|
heap
|
page read and write
|
||
DB3000
|
trusted library allocation
|
page execute and read and write
|
||
B40000
|
heap
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
7FF5D77E0000
|
unkown
|
page readonly
|
||
59E000
|
heap
|
page read and write
|
||
8A70000
|
unkown
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
26A24000
|
direct allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9EF0000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
A4B4000
|
heap
|
page read and write
|
||
3FEE000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
7DBC000
|
stack
|
page read and write
|
||
9D67000
|
unkown
|
page read and write
|
||
7693000
|
unkown
|
page read and write
|
||
7FF5D7792000
|
unkown
|
page readonly
|
||
A171000
|
heap
|
page read and write
|
||
602EC000
|
unkown
|
page write copy
|
||
10004000
|
unkown
|
page readonly
|
||
11A0000
|
unkown
|
page read and write
|
||
C43000
|
trusted library allocation
|
page execute and read and write
|
||
C20000
|
heap
|
page read and write
|
||
7FF5D7691000
|
unkown
|
page readonly
|
||
595000
|
heap
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page execute and read and write
|
||
C496000
|
unkown
|
page read and write
|
||
A0AE000
|
heap
|
page read and write
|
||
4066000
|
trusted library allocation
|
page read and write
|
||
7FF5D7593000
|
unkown
|
page readonly
|
||
3591000
|
heap
|
page read and write
|
||
7FF5D7648000
|
unkown
|
page readonly
|
||
3F6C000
|
trusted library allocation
|
page read and write
|
||
354A000
|
unkown
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
500E000
|
trusted library allocation
|
page read and write
|
||
A546000
|
heap
|
page read and write
|
||
2800000
|
heap
|
page execute and read and write
|
||
CD2000
|
heap
|
page read and write
|
||
6AA000
|
unkown
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
7FF5D758D000
|
unkown
|
page readonly
|
||
597000
|
heap
|
page read and write
|
||
7FF5D7230000
|
unkown
|
page readonly
|
||
9F23000
|
heap
|
page read and write
|
||
11A0000
|
unkown
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
A264000
|
unkown
|
page read and write
|
||
AF8000
|
stack
|
page read and write
|
||
5880000
|
trusted library allocation
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
2B0B000
|
trusted library allocation
|
page read and write
|
||
5242C000
|
direct allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
11E0000
|
unkown
|
page read and write
|
||
A1AF000
|
heap
|
page read and write
|
||
CBB000
|
heap
|
page read and write
|
||
32F0000
|
remote allocation
|
page read and write
|
||
3F89000
|
trusted library allocation
|
page read and write
|
||
A130000
|
heap
|
page read and write
|
||
C17000
|
heap
|
page read and write
|
||
A051000
|
heap
|
page read and write
|
||
8870000
|
unkown
|
page readonly
|
||
7FF5D71BF000
|
unkown
|
page readonly
|
||
C7B000
|
heap
|
page read and write
|
||
B7DF000
|
unkown
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
3317000
|
trusted library allocation
|
page read and write
|
||
3F4B000
|
trusted library allocation
|
page read and write
|
||
12C7000
|
heap
|
page read and write
|
||
9BFE000
|
heap
|
page read and write
|
||
9F27000
|
heap
|
page read and write
|
||
A106000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
4EBC000
|
trusted library allocation
|
page read and write
|
||
CDF000
|
heap
|
page read and write
|
||
2271000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A0C8000
|
heap
|
page read and write
|
||
48830000
|
direct allocation
|
page read and write
|
There are 3358 hidden memdumps, click here to show them.