Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\huge[1].dat
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\23E4.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5371.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nsp4EBF.tmp\blowfish.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsr4CB.tmp\liteFirewall.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Del.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\aggtjfs
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\aggtjfs:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsk4E9F.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsp4EBF.tmp\INetC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsp4EBF.tmp\nsProcess.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nst9548.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\start.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
|
MSVC program database ver 7.00, 512*4023 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
There are 105 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Users\user\AppData\Roaming\aggtjfs
|
C:\Users\user\AppData\Roaming\aggtjfs
|
||
C:\Users\user\AppData\Local\Temp\23E4.exe
|
C:\Users\user\AppData\Local\Temp\23E4.exe
|
||
C:\Users\user\AppData\Local\Temp\5371.exe
|
C:\Users\user\AppData\Local\Temp\5371.exe
|
||
C:\Users\user\AppData\Local\Temp\setup.exe
|
"C:\Users\user\AppData\Local\Temp\setup.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0
(Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3472 --field-trial-handle=3476,i,3252441317310229410,1173011674787013367,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US
--service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/127.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3660 --field-trial-handle=3476,i,3252441317310229410,1173011674787013367,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/127.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3592 --field-trial-handle=3476,i,3252441317310229410,1173011674787013367,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux;
Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1
--num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1720115578234356
--launch-time-ticks=4603408239 --mojo-platform-channel-handle=3948 --field-trial-handle=3476,i,3252441317310229410,1173011674787013367,262144
--disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux;
Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User
Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2
--enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1720115578234356 --launch-time-ticks=4603422960
--mojo-platform-channel-handle=4012 --field-trial-handle=3476,i,3252441317310229410,1173011674787013367,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI
/prefetch:1
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
||
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
|
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
|
There are 25 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://cx5519.com/tmp/index.php
|
|||
http://evilos.cc/tmp/index.php
|
|||
ellaboratepwsz.xyz
|
|||
swellfrrgwwos.xyz
|
|||
foodypannyjsud.shop
|
|||
https://anglebug.com/4674
|
unknown
|
||
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlA&judaGestionat
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://anglebug.com/8280enableTranslatedShaderSubstitutionCheck
|
unknown
|
||
https://support.google.com/chrome/answer/6098869
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlP&al
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity=4P
|
unknown
|
||
http://crbug.com/550292
|
unknown
|
||
https://foodypannyjsud.shop/piy
|
unknown
|
||
https://chrome.google.com/webstore?hl=urCtrl$2
|
unknown
|
||
http://crbug.com/883276
|
unknown
|
||
https://crbug.com/1356053
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
https://anglebug.com/5536
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
|
unknown
|
||
https://crbug.com/705865
|
unknown
|
||
http://crbug.com/110263
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://bageyou.xyz
|
unknown
|
||
http://logging.apache.org/log4ne
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://chrome.google.com/webstore?hl=arCtrl$1
|
unknown
|
||
https://crbug.com/593024
|
unknown
|
||
https://crbug.com/1137851
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.html&
|
unknown
|
||
http://anglebug.com/2152skipVSConstantRegisterZeroIn
|
unknown
|
||
https://crbug.com/1300575
|
unknown
|
||
https://www.google.com/chrome/privacy/eula_text.htmlT&r
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://xiexie.wf/22_551/huge.dat
|
unknown
|
||
https://crbug.com/710443
|
unknown
|
||
https://crbug.com/1042393
|
unknown
|
||
https://crbug.com/1060012
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://xiexie.wf/22_551/huge.datF$
|
unknown
|
||
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/3246allowClearForRobustResourceInitSome
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
https://foodypannyjsud.shop/apiP
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
https://chrome.google.com/webstore?hl=ukCtrl$1
|
unknown
|
||
http://anglebug.com/3997
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
http://crbug.com/642605
|
unknown
|
||
http://anglebug.com/1452
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://support.google.com/chrome/a/answer/9122284
|
unknown
|
||
https://chrome.google.com/webstore?hl=caCtrl$1
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity=4
|
unknown
|
||
https://crbug.com/650547callClearTwiceUsing
|
unknown
|
||
https://chrome.google.com/webstore?hl=teCtrl$1
|
unknown
|
||
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
|
unknown
|
||
https://word.office.comon
|
unknown
|
||
http://crbug.com/1420130
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
https://chrome.google.com/webstore?hl=ar&category=theme81https://myactivity.google.com/myactivity/?u
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
http://www.unicode.org/copyright.html
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
http://crbug.com/1181068
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://anglebug.com/2894
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
https://foodypannyjsud.shop:443/apiOYFBOLXA.pdfPK
|
unknown
|
||
http://bageyou.xyz/c/g
|
unknown
|
||
http://schemas.micro
|
unknown
|
||
http://api.install-stat.debug.world/clients/activity
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
77.221.157.163
|
unknown
|
Russian Federation
|
||
152.231.127.132
|
unknown
|
Chile
|
||
188.114.96.3
|
unknown
|
European Union
|
||
185.149.100.242
|
unknown
|
Turkey
|
||
127.0.0.127
|
unknown
|
unknown
|
||
104.21.45.251
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@explorerframe.dll,-13137
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@explorerframe.dll,-13138
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000002043E
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020460
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Sid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Pid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GamePall
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
|
DontShowUI
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
tmp_uid
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
reg
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\GamePall
|
uid
|
||
HKEY_CURRENT_USER\Control Panel\Cursors
|
AppStarting
|
There are 194 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2C20000
|
direct allocation
|
page read and write
|
||
2DA1000
|
unclassified section
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
4851000
|
unclassified section
|
page read and write
|
||
39BE000
|
trusted library allocation
|
page read and write
|
||
57D1000
|
trusted library allocation
|
page read and write
|
||
5011000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
9A96000
|
unkown
|
page read and write
|
||
1250000
|
unkown
|
page read and write
|
||
F53B000
|
unkown
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
12BE000
|
trusted library allocation
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
7FF5D723F000
|
unkown
|
page readonly
|
||
9780000
|
unkown
|
page read and write
|
||
A02E000
|
stack
|
page read and write
|
||
BD1000
|
heap
|
page read and write
|
||
142E000
|
trusted library allocation
|
page read and write
|
||
5920000
|
heap
|
page read and write
|
||
2D8E000
|
heap
|
page execute and read and write
|
||
AB7000
|
trusted library allocation
|
page execute and read and write
|
||
BCC000
|
heap
|
page read and write
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
7FF5D7455000
|
unkown
|
page readonly
|
||
30CE000
|
trusted library allocation
|
page read and write
|
||
E3D000
|
trusted library allocation
|
page execute and read and write
|
||
3D5000
|
heap
|
page read and write
|
||
843F000
|
stack
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
9ADB000
|
unkown
|
page read and write
|
||
10EB1000
|
unkown
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
35D1000
|
trusted library allocation
|
page read and write
|
||
1270000
|
unkown
|
page read and write
|
||
39D9000
|
trusted library allocation
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
5037000
|
trusted library allocation
|
page read and write
|
||
363D000
|
trusted library allocation
|
page read and write
|
||
1386000
|
stack
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
4AA0000
|
unkown
|
page read and write
|
||
58ED000
|
stack
|
page read and write
|
||
39EC000
|
trusted library allocation
|
page read and write
|
||
12DD000
|
trusted library allocation
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
C54B000
|
unkown
|
page read and write
|
||
663D000
|
stack
|
page read and write
|
||
BA9000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7C80000
|
unkown
|
page read and write
|
||
3370000
|
unkown
|
page read and write
|
||
8870000
|
unkown
|
page readonly
|
||
3DD4000
|
trusted library allocation
|
page read and write
|
||
16AE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
176D000
|
trusted library allocation
|
page execute and read and write
|
||
3986000
|
trusted library allocation
|
page read and write
|
||
5324000
|
trusted library allocation
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
30D7000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
4C27000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
24CF000
|
stack
|
page read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
52D0000
|
heap
|
page execute and read and write
|
||
B9C000
|
heap
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
630B000
|
stack
|
page read and write
|
||
41E000
|
unkown
|
page readonly
|
||
85BE000
|
stack
|
page read and write
|
||
1033000
|
trusted library allocation
|
page read and write
|
||
37F2000
|
trusted library allocation
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
A2A2000
|
unkown
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
31DC000
|
stack
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
5B5E000
|
stack
|
page read and write
|
||
3ED7000
|
trusted library allocation
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
2CA0000
|
trusted library allocation
|
page execute and read and write
|
||
870000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
BCD000
|
heap
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
760D000
|
unkown
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
3A73000
|
trusted library allocation
|
page read and write
|
||
C0BA000
|
stack
|
page read and write
|
||
4A06000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
3B07000
|
trusted library allocation
|
page read and write
|
||
67D8000
|
heap
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
1281000
|
unkown
|
page readonly
|
||
3980000
|
trusted library allocation
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
7FF5D71CC000
|
unkown
|
page readonly
|
||
9700000
|
unkown
|
page read and write
|
||
5092000
|
trusted library allocation
|
page read and write
|
||
3C33000
|
trusted library allocation
|
page read and write
|
||
F5B4000
|
unkown
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
7FF5D77F0000
|
unkown
|
page readonly
|
||
3B52000
|
trusted library allocation
|
page read and write
|
||
142B000
|
trusted library allocation
|
page read and write
|
||
8A70000
|
unkown
|
page read and write
|
||
C11000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
8D9000
|
heap
|
page read and write
|
||
39CF000
|
trusted library allocation
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
4AD1000
|
trusted library allocation
|
page read and write
|
||
2B0D000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
39B1000
|
trusted library allocation
|
page read and write
|
||
5BFE000
|
stack
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
A7D000
|
trusted library allocation
|
page execute and read and write
|
||
2B94000
|
trusted library allocation
|
page read and write
|
||
A237000
|
unkown
|
page read and write
|
||
AFA000
|
heap
|
page read and write
|
||
3989000
|
trusted library allocation
|
page read and write
|
||
5FCE000
|
stack
|
page read and write
|
||
A264000
|
unkown
|
page read and write
|
||
F78000
|
heap
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
29FD000
|
trusted library allocation
|
page read and write
|
||
7FF5D7429000
|
unkown
|
page readonly
|
||
9A7000
|
trusted library allocation
|
page read and write
|
||
12C8000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
23B6000
|
trusted library allocation
|
page read and write
|
||
39B9000
|
trusted library allocation
|
page read and write
|
||
B47000
|
heap
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page read and write
|
||
5D02000
|
trusted library allocation
|
page read and write
|
||
561E000
|
stack
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
7DF4F2481000
|
unkown
|
page execute read
|
||
36F1000
|
trusted library allocation
|
page read and write
|
||
A3B9000
|
unkown
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
399A000
|
trusted library allocation
|
page read and write
|
||
22FE000
|
stack
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
4D3F000
|
stack
|
page read and write
|
||
112B2000
|
unkown
|
page read and write
|
||
399E000
|
trusted library allocation
|
page read and write
|
||
7FF5D77B6000
|
unkown
|
page readonly
|
||
11F1000
|
trusted library allocation
|
page read and write
|
||
22D0000
|
trusted library allocation
|
page execute and read and write
|
||
87F2000
|
heap
|
page read and write
|
||
4BC4000
|
trusted library allocation
|
page read and write
|
||
CA9000
|
heap
|
page read and write
|
||
118E000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
7FF5D732D000
|
unkown
|
page readonly
|
||
5AEB000
|
stack
|
page read and write
|
||
7C31000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
BD7000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3999000
|
trusted library allocation
|
page read and write
|
||
7FF5D7215000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
7FF5D71E0000
|
unkown
|
page readonly
|
||
A9DF000
|
unkown
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
2DD5000
|
trusted library allocation
|
page read and write
|
||
484F000
|
stack
|
page read and write
|
||
C908000
|
unkown
|
page read and write
|
||
3BB7000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
trusted library allocation
|
page read and write
|
||
50B6000
|
trusted library allocation
|
page read and write
|
||
57C8000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
BB1000
|
heap
|
page read and write
|
||
398F000
|
trusted library allocation
|
page read and write
|
||
BB10000
|
heap
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
B76000
|
stack
|
page read and write
|
||
7E58000
|
stack
|
page read and write
|
||
760F000
|
unkown
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
7FF5D748C000
|
unkown
|
page readonly
|
||
B3D000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page readonly
|
||
4B0000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
C17000
|
trusted library allocation
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
3B14000
|
trusted library allocation
|
page read and write
|
||
10B91000
|
unkown
|
page read and write
|
||
7FF5D775C000
|
unkown
|
page readonly
|
||
8980000
|
unkown
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
B47000
|
heap
|
page read and write
|
||
53FF000
|
stack
|
page read and write
|
||
E33000
|
trusted library allocation
|
page execute and read and write
|
||
4D5E000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
35B5000
|
unkown
|
page read and write
|
||
942C000
|
stack
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
1515000
|
heap
|
page read and write
|
||
9A72000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
97B0000
|
unkown
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
7FF5D7593000
|
unkown
|
page readonly
|
||
1210000
|
unkown
|
page read and write
|
||
CA4000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
10C3000
|
trusted library allocation
|
page execute and read and write
|
||
C609000
|
unkown
|
page read and write
|
||
546E000
|
trusted library allocation
|
page read and write
|
||
1098000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
249C000
|
trusted library allocation
|
page read and write
|
||
1037000
|
heap
|
page read and write
|
||
2941000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
7FF5D77E0000
|
unkown
|
page readonly
|
||
7FF5D74C3000
|
unkown
|
page readonly
|
||
9AAA000
|
unkown
|
page read and write
|
||
39CD000
|
trusted library allocation
|
page read and write
|
||
4BD4000
|
trusted library allocation
|
page read and write
|
||
95FD000
|
stack
|
page read and write
|
||
88F000
|
heap
|
page read and write
|
||
7EB000
|
trusted library allocation
|
page execute and read and write
|
||
1350000
|
unkown
|
page readonly
|
||
815000
|
heap
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
45D8000
|
trusted library allocation
|
page read and write
|
||
39C2000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
9A6A000
|
unkown
|
page read and write
|
||
1498000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
C7CB000
|
unkown
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
1340000
|
unkown
|
page read and write
|
||
C9A7000
|
unkown
|
page read and write
|
||
101F000
|
heap
|
page read and write
|
||
A286000
|
unkown
|
page read and write
|
||
E7D5000
|
unkown
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
BD2000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
5E32000
|
heap
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
616E000
|
stack
|
page read and write
|
||
362D000
|
unkown
|
page read and write
|
||
1001000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
4FFF000
|
stack
|
page read and write
|
||
7BD000
|
trusted library allocation
|
page execute and read and write
|
||
B28000
|
heap
|
page read and write
|
||
5285000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
49CE000
|
trusted library allocation
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
740000
|
heap
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
39C1000
|
trusted library allocation
|
page read and write
|
||
50F2000
|
trusted library allocation
|
page read and write
|
||
27B1000
|
trusted library allocation
|
page read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
2498000
|
trusted library allocation
|
page read and write
|
||
39B7000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
817000
|
heap
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
C73E000
|
unkown
|
page read and write
|
||
7FF5D751F000
|
unkown
|
page readonly
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
570E000
|
stack
|
page read and write
|
||
853B000
|
stack
|
page read and write
|
||
7DBD000
|
stack
|
page read and write
|
||
3990000
|
trusted library allocation
|
page read and write
|
||
4AC8000
|
trusted library allocation
|
page read and write
|
||
7FF5D72D3000
|
unkown
|
page readonly
|
||
680000
|
heap
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
5790000
|
heap
|
page read and write
|
||
39A9000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
E7D6000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
300D000
|
stack
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
AE1D000
|
stack
|
page read and write
|
||
F536000
|
unkown
|
page read and write
|
||
1360000
|
unkown
|
page readonly
|
||
73E000
|
stack
|
page read and write
|
||
7AB0000
|
unkown
|
page read and write
|
||
7FF5D76CD000
|
unkown
|
page readonly
|
||
630000
|
heap
|
page read and write
|
||
61CE000
|
stack
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
3520000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
7FF5D770F000
|
unkown
|
page readonly
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
BFB8000
|
stack
|
page read and write
|
||
27C9000
|
heap
|
page read and write
|
||
3979000
|
trusted library allocation
|
page read and write
|
||
E87000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
trusted library allocation
|
page read and write
|
||
C20000
|
remote allocation
|
page read and write
|
||
7FF5D706E000
|
unkown
|
page readonly
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
7FF5D77C7000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D76D7000
|
unkown
|
page readonly
|
||
8980000
|
unkown
|
page read and write
|
||
7EEC0000
|
trusted library allocation
|
page execute and read and write
|
||
5912000
|
unkown
|
page readonly
|
||
5E4D000
|
stack
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
BEA0000
|
unkown
|
page readonly
|
||
10F7000
|
trusted library allocation
|
page execute and read and write
|
||
E6B000
|
trusted library allocation
|
page execute and read and write
|
||
3D00000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
7CD000
|
trusted library allocation
|
page execute and read and write
|
||
E7D5000
|
unkown
|
page read and write
|
||
1A2000
|
unkown
|
page readonly
|
||
513C000
|
trusted library allocation
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
33F0000
|
unkown
|
page read and write
|
||
7FF5D76C8000
|
unkown
|
page readonly
|
||
7FF5D738E000
|
unkown
|
page readonly
|
||
2E90000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
7FF5D7442000
|
unkown
|
page readonly
|
||
2FF9000
|
stack
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
3BEC000
|
trusted library allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
3994000
|
trusted library allocation
|
page read and write
|
||
7FF5D72D7000
|
unkown
|
page readonly
|
||
2B5B000
|
trusted library allocation
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
75F8000
|
unkown
|
page read and write
|
||
2B85000
|
trusted library allocation
|
page read and write
|
||
7E5000
|
trusted library allocation
|
page execute and read and write
|
||
8980000
|
unkown
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
4E47000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
trusted library allocation
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
178A000
|
trusted library allocation
|
page execute and read and write
|
||
5875000
|
trusted library allocation
|
page read and write
|
||
E7DC000
|
unkown
|
page read and write
|
||
E7D4000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
4D80000
|
heap
|
page execute and read and write
|
||
3D0D000
|
trusted library allocation
|
page read and write
|
||
E7D0000
|
unkown
|
page read and write
|
||
7D3E000
|
stack
|
page read and write
|
||
7FF5D7760000
|
unkown
|
page readonly
|
||
2EA0000
|
unkown
|
page read and write
|
||
1763000
|
trusted library allocation
|
page execute and read and write
|
||
4FE2000
|
unkown
|
page readonly
|
||
9EAB000
|
stack
|
page read and write
|
||
E67000
|
trusted library allocation
|
page execute and read and write
|
||
8980000
|
unkown
|
page read and write
|
||
7FF5D7284000
|
unkown
|
page readonly
|
||
E10000
|
unkown
|
page readonly
|
||
2FE4000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
39A6000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
8390000
|
unkown
|
page read and write
|
||
5E2E000
|
stack
|
page read and write
|
||
7D6000
|
trusted library allocation
|
page execute and read and write
|
||
27D7000
|
trusted library allocation
|
page read and write
|
||
A39C000
|
unkown
|
page read and write
|
||
39AA000
|
trusted library allocation
|
page read and write
|
||
C8C8000
|
unkown
|
page read and write
|
||
1770000
|
trusted library allocation
|
page read and write
|
||
100C000
|
heap
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
50AE000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
23B4000
|
trusted library allocation
|
page read and write
|
||
1302000
|
trusted library allocation
|
page read and write
|
||
11A6000
|
trusted library allocation
|
page execute and read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
3992000
|
trusted library allocation
|
page read and write
|
||
12C4000
|
trusted library allocation
|
page read and write
|
||
BDC0000
|
unkown
|
page read and write
|
||
C1CC000
|
stack
|
page read and write
|
||
49FA000
|
unkown
|
page read and write
|
||
2BA5000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FF5D7280000
|
unkown
|
page readonly
|
||
CC5000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
35E4000
|
unkown
|
page read and write
|
||
84C000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
C20000
|
remote allocation
|
page read and write
|
||
3A92000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
7FF5D77DA000
|
unkown
|
page readonly
|
||
39ED000
|
trusted library allocation
|
page read and write
|
||
54EC000
|
trusted library allocation
|
page read and write
|
||
24CE000
|
stack
|
page read and write
|
||
AFE000
|
heap
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
39A8000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
BEB000
|
stack
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
5A6E000
|
stack
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
31F1000
|
trusted library allocation
|
page read and write
|
||
7FF5D7745000
|
unkown
|
page readonly
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
7FF5D710B000
|
unkown
|
page readonly
|
||
2B03000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
541C000
|
trusted library allocation
|
page read and write
|
||
4AE2000
|
trusted library allocation
|
page read and write
|
||
7FF5D779E000
|
unkown
|
page readonly
|
||
5D30000
|
trusted library allocation
|
page execute and read and write
|
||
8980000
|
unkown
|
page read and write
|
||
17C0000
|
trusted library allocation
|
page read and write
|
||
22F0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
7686000
|
unkown
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
7FF5D77CD000
|
unkown
|
page readonly
|
||
C7BE000
|
unkown
|
page read and write
|
||
5195000
|
trusted library allocation
|
page read and write
|
||
2A09000
|
trusted library allocation
|
page read and write
|
||
E34000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
trusted library allocation
|
page read and write
|
||
17EF000
|
stack
|
page read and write
|
||
5761000
|
trusted library allocation
|
page read and write
|
||
5403000
|
heap
|
page execute and read and write
|
||
10BF000
|
stack
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
2280000
|
trusted library allocation
|
page read and write
|
||
7B10000
|
unkown
|
page read and write
|
||
9A84000
|
unkown
|
page read and write
|
||
52F0000
|
heap
|
page execute and read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
112BE000
|
unkown
|
page read and write
|
||
10DE1000
|
unkown
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
34DE000
|
trusted library allocation
|
page read and write
|
||
574C000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7AF1000
|
unkown
|
page read and write
|
||
7FF5D758D000
|
unkown
|
page readonly
|
||
7989000
|
stack
|
page read and write
|
||
2490000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
86E0000
|
unkown
|
page readonly
|
||
7FF5D7272000
|
unkown
|
page readonly
|
||
10F6000
|
stack
|
page read and write
|
||
3370000
|
unkown
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
8AB000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
C615000
|
unkown
|
page read and write
|
||
397F000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
4A04000
|
trusted library allocation
|
page read and write
|
||
7D6000
|
trusted library allocation
|
page execute and read and write
|
||
777000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
673E000
|
stack
|
page read and write
|
||
9A8E000
|
unkown
|
page read and write
|
||
EA7000
|
trusted library allocation
|
page read and write
|
||
7D2000
|
trusted library allocation
|
page read and write
|
||
2717000
|
trusted library allocation
|
page read and write
|
||
8360000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
434000
|
unkown
|
page read and write
|
||
7FF5D7385000
|
unkown
|
page readonly
|
||
8CB8000
|
stack
|
page read and write
|
||
69F0000
|
heap
|
page read and write
|
||
1534000
|
heap
|
page read and write
|
||
7FF5D7438000
|
unkown
|
page readonly
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
B21000
|
heap
|
page read and write
|
||
7DA000
|
trusted library allocation
|
page execute and read and write
|
||
39AB000
|
trusted library allocation
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
7FF5D7837000
|
unkown
|
page readonly
|
||
50BC000
|
stack
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
7FF5D72E9000
|
unkown
|
page readonly
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
243C000
|
stack
|
page read and write
|
||
585A000
|
trusted library allocation
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
3046000
|
trusted library allocation
|
page read and write
|
||
60CD000
|
stack
|
page read and write
|
||
769A000
|
unkown
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
63DC000
|
stack
|
page read and write
|
||
A40E000
|
unkown
|
page read and write
|
||
3988000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
2B28000
|
trusted library allocation
|
page read and write
|
||
24B0000
|
heap
|
page read and write
|
||
E3F000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page execute and read and write
|
||
687B000
|
stack
|
page read and write
|
||
7FF5D7682000
|
unkown
|
page readonly
|
||
7FF5D7523000
|
unkown
|
page readonly
|
||
8BA000
|
heap
|
page read and write
|
||
7110000
|
heap
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
7FF5D7309000
|
unkown
|
page readonly
|
||
69FC000
|
stack
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
9AF9000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
42D000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
2BA1000
|
trusted library allocation
|
page read and write
|
||
41E000
|
unkown
|
page readonly
|
||
7AE000
|
stack
|
page read and write
|
||
EB5000
|
stack
|
page read and write
|
||
A1AF000
|
stack
|
page read and write
|
||
4ADD000
|
trusted library allocation
|
page read and write
|
||
8E4E000
|
stack
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
E5D0000
|
unkown
|
page read and write
|
||
6EAE000
|
stack
|
page read and write
|
||
5F4E000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
27B7000
|
trusted library allocation
|
page read and write
|
||
5297000
|
trusted library allocation
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
2267000
|
trusted library allocation
|
page execute and read and write
|
||
9780000
|
unkown
|
page read and write
|
||
A12F000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D769E000
|
unkown
|
page readonly
|
||
102B000
|
heap
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
18D1000
|
trusted library allocation
|
page read and write
|
||
7FF5D72BF000
|
unkown
|
page readonly
|
||
4BFE000
|
stack
|
page read and write
|
||
5D20000
|
trusted library allocation
|
page read and write
|
||
68FC000
|
stack
|
page read and write
|
||
385E000
|
stack
|
page read and write
|
||
560F000
|
stack
|
page read and write
|
||
768E000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
32A9000
|
trusted library allocation
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
142A000
|
trusted library allocation
|
page execute and read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
5316000
|
trusted library allocation
|
page read and write
|
||
2A16000
|
trusted library allocation
|
page read and write
|
||
2BAF000
|
trusted library allocation
|
page read and write
|
||
4E55000
|
trusted library allocation
|
page read and write
|
||
3BE2000
|
trusted library allocation
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
1437000
|
trusted library allocation
|
page execute and read and write
|
||
130B000
|
trusted library allocation
|
page execute and read and write
|
||
3BA1000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
35D3000
|
unkown
|
page read and write
|
||
E56000
|
trusted library allocation
|
page execute and read and write
|
||
49A8000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
50C5000
|
trusted library allocation
|
page read and write
|
||
E14000
|
trusted library allocation
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
39A7000
|
trusted library allocation
|
page read and write
|
||
7DF4F2480000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
A3AC000
|
unkown
|
page read and write
|
||
1130000
|
unkown
|
page read and write
|
||
39D8000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
149C000
|
heap
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
621A000
|
heap
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
4873000
|
trusted library allocation
|
page read and write
|
||
7FF5D66E8000
|
unkown
|
page readonly
|
||
9EE0000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
23B0000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
50C2000
|
trusted library allocation
|
page read and write
|
||
873000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D7425000
|
unkown
|
page readonly
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
7FF5D7462000
|
unkown
|
page readonly
|
||
1780000
|
trusted library allocation
|
page read and write
|
||
B59000
|
heap
|
page read and write
|
||
7FF5D71F9000
|
unkown
|
page readonly
|
||
645000
|
heap
|
page read and write
|
||
7FF5D7336000
|
unkown
|
page readonly
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
50D4000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
35B3000
|
unkown
|
page read and write
|
||
35D1000
|
unkown
|
page read and write
|
||
128B000
|
stack
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
52E5000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
5153000
|
trusted library allocation
|
page read and write
|
||
5463000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
5A70000
|
heap
|
page execute and read and write
|
||
768C000
|
unkown
|
page read and write
|
||
A9A0000
|
unkown
|
page read and write
|
||
50B1000
|
trusted library allocation
|
page read and write
|
||
7FF5D7820000
|
unkown
|
page readonly
|
||
39F4000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
BC8000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
66FE000
|
stack
|
page read and write
|
||
10E6000
|
trusted library allocation
|
page execute and read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
136B000
|
heap
|
page read and write
|
||
367D000
|
trusted library allocation
|
page read and write
|
||
39AC000
|
trusted library allocation
|
page read and write
|
||
AA92000
|
unkown
|
page read and write
|
||
9D5000
|
heap
|
page read and write
|
||
11ED000
|
trusted library allocation
|
page execute and read and write
|
||
131F000
|
heap
|
page read and write
|
||
761E000
|
unkown
|
page read and write
|
||
7FF5D781A000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
7FF5D75BF000
|
unkown
|
page readonly
|
||
7FF5D74FA000
|
unkown
|
page readonly
|
||
9EE0000
|
unkown
|
page read and write
|
||
A73000
|
trusted library allocation
|
page execute and read and write
|
||
3BB1000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
5D0C000
|
stack
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
9AC3000
|
unkown
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
BD2000
|
heap
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
39C1000
|
trusted library allocation
|
page read and write
|
||
3EF7000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
50E0000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
2BC8000
|
trusted library allocation
|
page read and write
|
||
BD6000
|
heap
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
39A9000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
39C7000
|
trusted library allocation
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
3980000
|
trusted library allocation
|
page read and write
|
||
1184000
|
trusted library allocation
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
2EA0000
|
unkown
|
page read and write
|
||
7691000
|
unkown
|
page read and write
|
||
7FF5D72C8000
|
unkown
|
page readonly
|
||
39B0000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
62C0000
|
heap
|
page read and write
|
||
397A000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
5192000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
140D000
|
trusted library allocation
|
page execute and read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
112B4000
|
unkown
|
page read and write
|
||
91F0000
|
unkown
|
page readonly
|
||
36A5000
|
trusted library allocation
|
page read and write
|
||
7FF5D72BD000
|
unkown
|
page readonly
|
||
1150000
|
unkown
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
574E000
|
stack
|
page read and write
|
||
35CF000
|
unkown
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
7FF5D720F000
|
unkown
|
page readonly
|
||
4277000
|
trusted library allocation
|
page read and write
|
||
7FF5D745B000
|
unkown
|
page readonly
|
||
48A0000
|
heap
|
page read and write
|
||
35B0000
|
unkown
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
7B0000
|
trusted library allocation
|
page read and write
|
||
49E1000
|
trusted library allocation
|
page read and write
|
||
7FF5D7808000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3471000
|
trusted library allocation
|
page read and write
|
||
E7D0000
|
unkown
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
F0C000
|
heap
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
7FF5D77A8000
|
unkown
|
page readonly
|
||
2E90000
|
unkown
|
page read and write
|
||
E7DF000
|
unkown
|
page read and write
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
4C93000
|
heap
|
page execute and read and write
|
||
3B1A000
|
trusted library allocation
|
page read and write
|
||
18D7000
|
trusted library allocation
|
page read and write
|
||
3153000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
7FF5D783B000
|
unkown
|
page readonly
|
||
3B42000
|
trusted library allocation
|
page read and write
|
||
BA9000
|
heap
|
page read and write
|
||
592E000
|
stack
|
page read and write
|
||
3A79000
|
trusted library allocation
|
page read and write
|
||
3370000
|
unkown
|
page read and write
|
||
519E000
|
trusted library allocation
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
14C7000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
10002000
|
unkown
|
page readonly
|
||
40B000
|
unkown
|
page execute read
|
||
851000
|
heap
|
page read and write
|
||
7FF5D777A000
|
unkown
|
page readonly
|
||
7631000
|
unkown
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
5345000
|
trusted library allocation
|
page read and write
|
||
39BE000
|
trusted library allocation
|
page read and write
|
||
11B7000
|
trusted library allocation
|
page execute and read and write
|
||
E95000
|
heap
|
page read and write
|
||
1460000
|
trusted library allocation
|
page execute and read and write
|
||
3180000
|
unkown
|
page read and write
|
||
64BE000
|
stack
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
6AFD000
|
stack
|
page read and write
|
||
7B60000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
36C1000
|
trusted library allocation
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
50A8000
|
trusted library allocation
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
3988000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
7FF5D7700000
|
unkown
|
page readonly
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
5340000
|
heap
|
page execute and read and write
|
||
143E000
|
stack
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
86D0000
|
unkown
|
page readonly
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
866000
|
heap
|
page read and write
|
||
12F6000
|
trusted library allocation
|
page execute and read and write
|
||
6790000
|
heap
|
page read and write
|
||
58DE000
|
stack
|
page read and write
|
||
879000
|
heap
|
page read and write
|
||
180E000
|
stack
|
page read and write
|
||
B43000
|
heap
|
page read and write
|
||
CD6000
|
trusted library allocation
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
4A80000
|
heap
|
page read and write
|
||
3988000
|
trusted library allocation
|
page read and write
|
||
10C4000
|
trusted library allocation
|
page read and write
|
||
6C3D000
|
stack
|
page read and write
|
||
2E0A000
|
heap
|
page read and write
|
||
57BB000
|
trusted library allocation
|
page read and write
|
||
7FF5D7289000
|
unkown
|
page readonly
|
||
8980000
|
unkown
|
page read and write
|
||
98FD000
|
stack
|
page read and write
|
||
87F0000
|
heap
|
page read and write
|
||
7FF5D752F000
|
unkown
|
page readonly
|
||
3785000
|
trusted library allocation
|
page read and write
|
||
1544000
|
unkown
|
page readonly
|
||
515000
|
heap
|
page read and write
|
||
4990000
|
heap
|
page read and write
|
||
2878000
|
heap
|
page read and write
|
||
112B9000
|
unkown
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
29F5000
|
trusted library allocation
|
page read and write
|
||
397D000
|
trusted library allocation
|
page read and write
|
||
651E000
|
stack
|
page read and write
|
||
2B0F000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
2B05000
|
trusted library allocation
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
9A8C000
|
unkown
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
47A000
|
stack
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page execute and read and write
|
||
112B8000
|
unkown
|
page read and write
|
||
35D5000
|
unkown
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
C460000
|
unkown
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
7FF5D7764000
|
unkown
|
page readonly
|
||
1351000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
3980000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
41E000
|
unkown
|
page readonly
|
||
1410000
|
heap
|
page execute and read and write
|
||
39B0000
|
trusted library allocation
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
7FF5D7398000
|
unkown
|
page readonly
|
||
4AEA000
|
unkown
|
page read and write
|
||
5026000
|
unkown
|
page readonly
|
||
7FF5D765F000
|
unkown
|
page readonly
|
||
25D1000
|
trusted library allocation
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
4AE5000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
E13000
|
trusted library allocation
|
page execute and read and write
|
||
5CED000
|
stack
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
12F7000
|
trusted library allocation
|
page read and write
|
||
5910000
|
unkown
|
page readonly
|
||
35BD000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
30E5000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
2AF0000
|
heap
|
page execute and read and write
|
||
57A0000
|
heap
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
39EC000
|
trusted library allocation
|
page read and write
|
||
BD2000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
9A90000
|
unkown
|
page read and write
|
||
77DB000
|
unkown
|
page read and write
|
||
25CF000
|
stack
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
62DD000
|
stack
|
page read and write
|
||
6DAE000
|
stack
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
54DF000
|
stack
|
page read and write
|
||
CD4000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
585E000
|
trusted library allocation
|
page read and write
|
||
49DE000
|
trusted library allocation
|
page read and write
|
||
BD2000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
39A8000
|
trusted library allocation
|
page read and write
|
||
7FF5D75DF000
|
unkown
|
page readonly
|
||
12D0000
|
unkown
|
page readonly
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
7FF5D77F7000
|
unkown
|
page readonly
|
||
41F7000
|
trusted library allocation
|
page read and write
|
||
112BC000
|
unkown
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
2EAD000
|
stack
|
page read and write
|
||
7FF5D7558000
|
unkown
|
page readonly
|
||
BB3000
|
heap
|
page read and write
|
||
398C000
|
trusted library allocation
|
page read and write
|
||
7B4000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
BAE000
|
heap
|
page read and write
|
||
6EA000
|
heap
|
page read and write
|
||
10CD000
|
trusted library allocation
|
page execute and read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
2BE3000
|
unkown
|
page readonly
|
||
1210000
|
unkown
|
page read and write
|
||
13A7000
|
heap
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
7C0000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
E7D3000
|
unkown
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
112B2000
|
unkown
|
page read and write
|
||
7FF5D75C1000
|
unkown
|
page readonly
|
||
5870000
|
heap
|
page read and write
|
||
39DB000
|
trusted library allocation
|
page read and write
|
||
7FF5D76D5000
|
unkown
|
page readonly
|
||
1240000
|
unkown
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
4E2E000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
C47000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
118D000
|
trusted library allocation
|
page execute and read and write
|
||
1210000
|
unkown
|
page read and write
|
||
C9CD000
|
unkown
|
page read and write
|
||
39A1000
|
trusted library allocation
|
page read and write
|
||
7FF5D72CE000
|
unkown
|
page readonly
|
||
BC7000
|
heap
|
page read and write
|
||
4DE0000
|
heap
|
page execute and read and write
|
||
E7D9000
|
unkown
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
9AB4000
|
unkown
|
page read and write
|
||
A3B6000
|
unkown
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
9D7000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
87B000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
AB2000
|
trusted library allocation
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
BA3000
|
heap
|
page read and write
|
||
39A1000
|
trusted library allocation
|
page read and write
|
||
24F2000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
4DD5000
|
trusted library allocation
|
page read and write
|
||
584E000
|
stack
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
12F7000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7E0000
|
heap
|
page read and write
|
||
7FF5D705D000
|
unkown
|
page readonly
|
||
5479000
|
unkown
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
E47000
|
trusted library allocation
|
page execute and read and write
|
||
50FC000
|
trusted library allocation
|
page read and write
|
||
5263000
|
trusted library allocation
|
page read and write
|
||
7FF5D719C000
|
unkown
|
page readonly
|
||
7FF5D7722000
|
unkown
|
page readonly
|
||
57CE000
|
trusted library allocation
|
page read and write
|
||
D0B000
|
stack
|
page read and write
|
||
5023000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page execute and read and write
|
||
C5F4000
|
unkown
|
page read and write
|
||
39A7000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
F65000
|
unkown
|
page execute read
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
2BE3000
|
unkown
|
page readonly
|
||
2E90000
|
unkown
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
E4B000
|
trusted library allocation
|
page execute and read and write
|
||
E81000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
E7DF000
|
unkown
|
page read and write
|
||
7FF5D6ABD000
|
unkown
|
page readonly
|
||
3CCF000
|
stack
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
7FF5D7065000
|
unkown
|
page readonly
|
||
A251000
|
unkown
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
5495000
|
trusted library allocation
|
page read and write
|
||
3D79000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
35DC000
|
unkown
|
page read and write
|
||
1406000
|
trusted library allocation
|
page read and write
|
||
1792000
|
trusted library allocation
|
page read and write
|
||
3996000
|
trusted library allocation
|
page read and write
|
||
4ADA000
|
unkown
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
3B6D000
|
trusted library allocation
|
page read and write
|
||
3975000
|
trusted library allocation
|
page read and write
|
||
BD7000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
526E000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
3988000
|
trusted library allocation
|
page read and write
|
||
399A000
|
trusted library allocation
|
page read and write
|
||
9B0B000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
18F7000
|
heap
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
2A48000
|
trusted library allocation
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
6990000
|
heap
|
page read and write
|
||
7FF5D6A4B000
|
unkown
|
page readonly
|
||
49ED000
|
trusted library allocation
|
page read and write
|
||
7FF5D7450000
|
unkown
|
page readonly
|
||
3BD1000
|
trusted library allocation
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
39E9000
|
trusted library allocation
|
page read and write
|
||
10C5000
|
heap
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
C5FA000
|
unkown
|
page read and write
|
||
39C0000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
24ED000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
7FF5D744E000
|
unkown
|
page readonly
|
||
1434000
|
trusted library allocation
|
page read and write
|
||
B85A000
|
stack
|
page read and write
|
||
7FF5D75F6000
|
unkown
|
page readonly
|
||
4EB000
|
stack
|
page read and write
|
||
6740000
|
heap
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
874000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
unkown
|
page read and write
|
||
12D4000
|
trusted library allocation
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
4BE7000
|
trusted library allocation
|
page read and write
|
||
7FF5D75CB000
|
unkown
|
page readonly
|
||
7FF5D76E8000
|
unkown
|
page readonly
|
||
B43000
|
heap
|
page read and write
|
||
3EF5000
|
trusted library allocation
|
page read and write
|
||
39B2000
|
trusted library allocation
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
3ED1000
|
trusted library allocation
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
A233000
|
unkown
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
7DF4F2461000
|
unkown
|
page execute read
|
||
9EE0000
|
unkown
|
page read and write
|
||
362A000
|
unkown
|
page read and write
|
||
5466000
|
trusted library allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
B4D0000
|
unkown
|
page readonly
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
277F000
|
stack
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
7618000
|
unkown
|
page read and write
|
||
67EB000
|
heap
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
39EE000
|
trusted library allocation
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
2E0E000
|
heap
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
BD1000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
2473000
|
trusted library allocation
|
page read and write
|
||
7FF5D7075000
|
unkown
|
page readonly
|
||
668E000
|
stack
|
page read and write
|
||
49D8000
|
trusted library allocation
|
page read and write
|
||
4C24000
|
trusted library allocation
|
page read and write
|
||
BC7000
|
heap
|
page read and write
|
||
7FF5D770A000
|
unkown
|
page readonly
|
||
882000
|
heap
|
page read and write
|
||
90B000
|
stack
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
5400000
|
heap
|
page execute and read and write
|
||
3021000
|
trusted library allocation
|
page read and write
|
||
4BDE000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
2EC0000
|
unkown
|
page readonly
|
||
10F0000
|
unkown
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
13D5000
|
heap
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
7FF5D748A000
|
unkown
|
page readonly
|
||
57B2000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
1790000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
97FF000
|
stack
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
25B0000
|
heap
|
page execute and read and write
|
||
1150000
|
unkown
|
page read and write
|
||
7FF5D6BEF000
|
unkown
|
page readonly
|
||
5271000
|
trusted library allocation
|
page read and write
|
||
29FA000
|
trusted library allocation
|
page read and write
|
||
584E000
|
stack
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
1183000
|
trusted library allocation
|
page execute and read and write
|
||
990000
|
trusted library allocation
|
page execute and read and write
|
||
1404000
|
trusted library allocation
|
page read and write
|
||
54E2000
|
trusted library allocation
|
page read and write
|
||
AA0F000
|
unkown
|
page read and write
|
||
8FD9000
|
stack
|
page read and write
|
||
B99000
|
heap
|
page read and write
|
||
3520000
|
unkown
|
page readonly
|
||
7FF5D69BB000
|
unkown
|
page readonly
|
||
1098000
|
heap
|
page read and write
|
||
7FF5D7244000
|
unkown
|
page readonly
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
3BA7000
|
trusted library allocation
|
page read and write
|
||
AFBE000
|
stack
|
page read and write
|
||
509E000
|
trusted library allocation
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
6EA000
|
heap
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
C5FD000
|
unkown
|
page read and write
|
||
BCB000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1130000
|
unkown
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
7FF5D77D2000
|
unkown
|
page readonly
|
||
9780000
|
unkown
|
page read and write
|
||
10F7000
|
heap
|
page read and write
|
||
7FF5D728E000
|
unkown
|
page readonly
|
||
47BE000
|
stack
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
7FF5D7262000
|
unkown
|
page readonly
|
||
529E000
|
stack
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
3980000
|
trusted library allocation
|
page read and write
|
||
570E000
|
stack
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
39A1000
|
trusted library allocation
|
page read and write
|
||
7FF5D7458000
|
unkown
|
page readonly
|
||
BF0000
|
trusted library allocation
|
page execute and read and write
|
||
865000
|
heap
|
page read and write
|
||
7654000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
5084000
|
trusted library allocation
|
page read and write
|
||
C20000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
3975000
|
trusted library allocation
|
page read and write
|
||
18E0000
|
trusted library allocation
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
4D9F000
|
stack
|
page read and write
|
||
7B80000
|
unkown
|
page readonly
|
||
1267000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D774C000
|
unkown
|
page readonly
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
FAB000
|
heap
|
page read and write
|
||
2EA1000
|
unkown
|
page read and write
|
||
7FF5D7604000
|
unkown
|
page readonly
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
5A0E000
|
stack
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
12CE000
|
trusted library allocation
|
page read and write
|
||
927D000
|
stack
|
page read and write
|
||
112B3000
|
unkown
|
page read and write
|
||
7FF5D7404000
|
unkown
|
page readonly
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
BD2000
|
heap
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
C1E000
|
stack
|
page read and write
|
||
258F000
|
stack
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
AAA9000
|
unkown
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
7FF5D720A000
|
unkown
|
page readonly
|
||
4A70000
|
heap
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
7FF5D71D7000
|
unkown
|
page readonly
|
||
3980000
|
trusted library allocation
|
page read and write
|
||
CA3000
|
trusted library allocation
|
page execute and read and write
|
||
29F7000
|
trusted library allocation
|
page read and write
|
||
11BB000
|
trusted library allocation
|
page execute and read and write
|
||
B3D000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
B43000
|
heap
|
page read and write
|
||
7BD000
|
trusted library allocation
|
page execute and read and write
|
||
1150000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
882000
|
heap
|
page read and write
|
||
7B4000
|
trusted library allocation
|
page read and write
|
||
3630000
|
unkown
|
page readonly
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
39B7000
|
trusted library allocation
|
page read and write
|
||
7C90000
|
unkown
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
10E14000
|
unkown
|
page read and write
|
||
C5F0000
|
unkown
|
page read and write
|
||
7FF5D7077000
|
unkown
|
page readonly
|
||
52DE000
|
stack
|
page read and write
|
||
3110000
|
unkown
|
page readonly
|
||
3787000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
24E6000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
3E66000
|
trusted library allocation
|
page read and write
|
||
6207000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
87D000
|
trusted library allocation
|
page execute and read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
697C000
|
stack
|
page read and write
|
||
1403000
|
trusted library allocation
|
page execute and read and write
|
||
39A5000
|
trusted library allocation
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
3B01000
|
trusted library allocation
|
page read and write
|
||
C31000
|
unkown
|
page execute read
|
||
BC5000
|
heap
|
page read and write
|
||
8ECC000
|
stack
|
page read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
F4F3000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
33C0000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
8D1000
|
heap
|
page read and write
|
||
7FF5D7202000
|
unkown
|
page readonly
|
||
9780000
|
unkown
|
page read and write
|
||
3A71000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
4BCE000
|
trusted library allocation
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
26C5000
|
trusted library allocation
|
page read and write
|
||
5283000
|
trusted library allocation
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
B43000
|
heap
|
page read and write
|
||
487D000
|
stack
|
page read and write
|
||
3160000
|
unkown
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
1544000
|
unkown
|
page readonly
|
||
641D000
|
stack
|
page read and write
|
||
39A6000
|
trusted library allocation
|
page read and write
|
||
BCB000
|
heap
|
page read and write
|
||
7FF5CE343000
|
unkown
|
page readonly
|
||
57C0000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
2B6E000
|
trusted library allocation
|
page read and write
|
||
B43000
|
heap
|
page read and write
|
||
436C000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
9A76000
|
unkown
|
page read and write
|
||
49B5000
|
trusted library allocation
|
page read and write
|
||
4264000
|
trusted library allocation
|
page read and write
|
||
7FF5D71E6000
|
unkown
|
page readonly
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
7FF5D7795000
|
unkown
|
page readonly
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
B43000
|
heap
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
35CD000
|
unkown
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
7FF5D7534000
|
unkown
|
page readonly
|
||
12D3000
|
trusted library allocation
|
page execute and read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
24DA000
|
trusted library allocation
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
39F4000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
879000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page execute and read and write
|
||
39F4000
|
trusted library allocation
|
page read and write
|
||
7DF4F24A1000
|
unkown
|
page execute read
|
||
C46F000
|
unkown
|
page read and write
|
||
5300000
|
trusted library allocation
|
page execute and read and write
|
||
3155000
|
trusted library allocation
|
page read and write
|
||
4ABC000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
39F4000
|
trusted library allocation
|
page read and write
|
||
7FF5D75D6000
|
unkown
|
page readonly
|
||
2EA0000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
1008000
|
heap
|
page read and write
|
||
5474000
|
trusted library allocation
|
page read and write
|
||
9AAC000
|
unkown
|
page read and write
|
||
2BA3000
|
trusted library allocation
|
page read and write
|
||
3041000
|
unkown
|
page read and write
|
||
5050000
|
trusted library allocation
|
page read and write
|
||
7FF5D6BE4000
|
unkown
|
page readonly
|
||
5085000
|
trusted library allocation
|
page read and write
|
||
39EC000
|
trusted library allocation
|
page read and write
|
||
4A12000
|
unkown
|
page read and write
|
||
399F000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
1171000
|
trusted library allocation
|
page read and write
|
||
BD3000
|
heap
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
4EEF000
|
stack
|
page read and write
|
||
3997000
|
trusted library allocation
|
page read and write
|
||
13C3000
|
heap
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
4AB0000
|
unkown
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
9A92000
|
unkown
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3980000
|
trusted library allocation
|
page read and write
|
||
564F000
|
stack
|
page read and write
|
||
2EF1000
|
trusted library allocation
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
7FF5D72D0000
|
unkown
|
page readonly
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
4BC6000
|
trusted library allocation
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
10DF0000
|
unkown
|
page read and write
|
||
57E2000
|
trusted library allocation
|
page read and write
|
||
38A1000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
6B13000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
531B000
|
trusted library allocation
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
B9C000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D71C8000
|
unkown
|
page readonly
|
||
326F000
|
stack
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
5410000
|
trusted library allocation
|
page read and write
|
||
8391000
|
unkown
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
8DCB000
|
stack
|
page read and write
|
||
9B2C000
|
unkown
|
page read and write
|
||
3992000
|
trusted library allocation
|
page read and write
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
253E000
|
stack
|
page read and write
|
||
900000
|
trusted library allocation
|
page read and write
|
||
7FF5D723C000
|
unkown
|
page readonly
|
||
2440000
|
heap
|
page execute and read and write
|
||
AF1000
|
trusted library allocation
|
page read and write
|
||
C617000
|
unkown
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
BA9000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5D27000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
10FB000
|
trusted library allocation
|
page execute and read and write
|
||
3180000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
3977000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
4AC5000
|
trusted library allocation
|
page read and write
|
||
1478000
|
heap
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
B980000
|
unkown
|
page readonly
|
||
2D1F000
|
stack
|
page read and write
|
||
5025000
|
trusted library allocation
|
page read and write
|
||
3340000
|
unkown
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
399B000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D7507000
|
unkown
|
page readonly
|
||
40A000
|
unkown
|
page write copy
|
||
BD2000
|
heap
|
page read and write
|
||
3271000
|
trusted library allocation
|
page read and write
|
||
B8F000
|
stack
|
page read and write
|
||
C8C5000
|
unkown
|
page read and write
|
||
5040000
|
trusted library allocation
|
page execute and read and write
|
||
9D0000
|
heap
|
page read and write
|
||
97B0000
|
unkown
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7693000
|
unkown
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
7FF5D77E3000
|
unkown
|
page readonly
|
||
CEB000
|
trusted library allocation
|
page execute and read and write
|
||
9780000
|
unkown
|
page read and write
|
||
41F1000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
heap
|
page read and write
|
||
7FF5D7488000
|
unkown
|
page readonly
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
7FF5D75B3000
|
unkown
|
page readonly
|
||
2EA0000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
12BB000
|
trusted library allocation
|
page read and write
|
||
9B41000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
7FF5D77DD000
|
unkown
|
page readonly
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
3976000
|
trusted library allocation
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
7DF4F2460000
|
unkown
|
page readonly
|
||
4BCB000
|
trusted library allocation
|
page read and write
|
||
7DA000
|
trusted library allocation
|
page execute and read and write
|
||
53BE000
|
stack
|
page read and write
|
||
5017000
|
trusted library allocation
|
page read and write
|
||
11F7000
|
trusted library allocation
|
page read and write
|
||
6020000
|
unkown
|
page readonly
|
||
C621000
|
unkown
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
3706000
|
trusted library allocation
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
157A000
|
heap
|
page read and write
|
||
7C70000
|
unkown
|
page readonly
|
||
89A000
|
trusted library allocation
|
page execute and read and write
|
||
3976000
|
trusted library allocation
|
page read and write
|
||
35D7000
|
trusted library allocation
|
page read and write
|
||
7FF5D7691000
|
unkown
|
page readonly
|
||
1410000
|
trusted library allocation
|
page read and write
|
||
7E7000
|
trusted library allocation
|
page execute and read and write
|
||
3180000
|
unkown
|
page read and write
|
||
AA40000
|
unkown
|
page read and write
|
||
7FF5D7641000
|
unkown
|
page readonly
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
C61B000
|
unkown
|
page read and write
|
||
BCD000
|
heap
|
page read and write
|
||
57BE000
|
trusted library allocation
|
page read and write
|
||
C806000
|
unkown
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
4A90000
|
unkown
|
page read and write
|
||
3044000
|
trusted library allocation
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
2CB7000
|
trusted library allocation
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
49F2000
|
trusted library allocation
|
page read and write
|
||
9D67000
|
unkown
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
8A46000
|
unkown
|
page read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
B03B000
|
stack
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
5370000
|
heap
|
page read and write
|
||
13CD000
|
stack
|
page read and write
|
||
5DD0000
|
heap
|
page read and write
|
||
BAF000
|
heap
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
2F7E000
|
stack
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
EA1000
|
trusted library allocation
|
page read and write
|
||
7FF5D71EA000
|
unkown
|
page readonly
|
||
3ACA000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
2DA4000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
E7D0000
|
unkown
|
page read and write
|
||
FB6000
|
stack
|
page read and write
|
||
ABB000
|
trusted library allocation
|
page execute and read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
629E000
|
stack
|
page read and write
|
||
C83000
|
unkown
|
page execute read
|
||
7DD0000
|
heap
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
33B0000
|
unkown
|
page readonly
|
||
BA2000
|
heap
|
page read and write
|
||
7FF5D743F000
|
unkown
|
page readonly
|
||
EF6000
|
stack
|
page read and write
|
||
35FF000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
5A6E000
|
stack
|
page read and write
|
||
5752000
|
trusted library allocation
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
1571000
|
heap
|
page read and write
|
||
7FF5D776F000
|
unkown
|
page readonly
|
||
4FEE000
|
stack
|
page read and write
|
||
BCC000
|
heap
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
7FF5D778A000
|
unkown
|
page readonly
|
||
EBB000
|
stack
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
11E3000
|
trusted library allocation
|
page execute and read and write
|
||
B9E000
|
heap
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
30FB000
|
stack
|
page read and write
|
||
2BA0000
|
heap
|
page execute and read and write
|
||
3530000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
606E000
|
stack
|
page read and write
|
||
8F9000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
1066000
|
heap
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
7DB000
|
stack
|
page read and write
|
||
B7DC000
|
stack
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
FBF000
|
stack
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
94F4000
|
unkown
|
page read and write
|
||
4986000
|
unkown
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
35C3000
|
unkown
|
page read and write
|
||
F9C000
|
heap
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
35B0000
|
trusted library allocation
|
page read and write
|
||
C65E000
|
unkown
|
page read and write
|
||
C496000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
617C000
|
stack
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
7FF5D75A6000
|
unkown
|
page readonly
|
||
8390000
|
unkown
|
page read and write
|
||
7FF5D749B000
|
unkown
|
page readonly
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
C81C000
|
unkown
|
page read and write
|
||
BB0B000
|
stack
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
B559000
|
stack
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
24C6000
|
trusted library allocation
|
page read and write
|
||
39D4000
|
trusted library allocation
|
page read and write
|
||
2040000
|
heap
|
page read and write
|
||
842000
|
heap
|
page read and write
|
||
12B4000
|
trusted library allocation
|
page read and write
|
||
10D7000
|
heap
|
page read and write
|
||
35FA000
|
unkown
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
143B000
|
trusted library allocation
|
page execute and read and write
|
||
5331000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
7FF5D766E000
|
unkown
|
page readonly
|
||
5770000
|
heap
|
page read and write
|
||
381F000
|
stack
|
page read and write
|
||
BE5000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
C625000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
39A7000
|
trusted library allocation
|
page read and write
|
||
4478000
|
trusted library allocation
|
page read and write
|
||
7FF5D774A000
|
unkown
|
page readonly
|
||
7FF5D7485000
|
unkown
|
page readonly
|
||
2E90000
|
unkown
|
page read and write
|
||
3942000
|
trusted library allocation
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
7FF5D7394000
|
unkown
|
page readonly
|
||
25CF000
|
stack
|
page read and write
|
||
57D9000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
7FF5D75AF000
|
unkown
|
page readonly
|
||
1240000
|
unkown
|
page read and write
|
||
12AF000
|
stack
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
112B5000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
7FF5D7694000
|
unkown
|
page readonly
|
||
BA0000
|
heap
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
C70000
|
unkown
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
2BE3000
|
unkown
|
page readonly
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
7FF5D7482000
|
unkown
|
page readonly
|
||
5160000
|
heap
|
page read and write
|
||
9A9E000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
A220000
|
unkown
|
page read and write
|
||
4027000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
3945000
|
trusted library allocation
|
page read and write
|
||
7FF5D6BDB000
|
unkown
|
page readonly
|
||
23C0000
|
heap
|
page execute and read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
3848000
|
trusted library allocation
|
page read and write
|
||
6480000
|
heap
|
page read and write
|
||
8890000
|
unkown
|
page readonly
|
||
96B000
|
stack
|
page read and write
|
||
8B7000
|
trusted library allocation
|
page execute and read and write
|
||
7FD50000
|
trusted library allocation
|
page execute and read and write
|
||
8980000
|
unkown
|
page read and write
|
||
54F1000
|
trusted library allocation
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
42B6000
|
trusted library allocation
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
68A000
|
heap
|
page read and write
|
||
7E60000
|
unkown
|
page read and write
|
||
CF5000
|
heap
|
page read and write
|
||
39A9000
|
trusted library allocation
|
page read and write
|
||
658E000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D7236000
|
unkown
|
page readonly
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
7FF5D768B000
|
unkown
|
page readonly
|
||
397F000
|
trusted library allocation
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
7FF5D77B9000
|
unkown
|
page readonly
|
||
7FF5D7589000
|
unkown
|
page readonly
|
||
2EA0000
|
unkown
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
5620000
|
heap
|
page execute and read and write
|
||
50A5000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
27C9000
|
heap
|
page read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
2BE3000
|
unkown
|
page readonly
|
||
2B0E000
|
stack
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
4D75000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
BE3000
|
trusted library allocation
|
page read and write
|
||
7FF5D75FF000
|
unkown
|
page readonly
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
42A000
|
unkown
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
2DA7000
|
heap
|
page read and write
|
||
7FF5D71AF000
|
unkown
|
page readonly
|
||
3010000
|
heap
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
12ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D76DA000
|
unkown
|
page readonly
|
||
49C4000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
75E0000
|
unkown
|
page read and write
|
||
1424000
|
trusted library allocation
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
3781000
|
trusted library allocation
|
page read and write
|
||
E7DC000
|
unkown
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
AA9C000
|
unkown
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page execute and read and write
|
||
7E8000
|
heap
|
page read and write
|
||
10F2000
|
trusted library allocation
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
7FF5D75F9000
|
unkown
|
page readonly
|
||
3601000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
7FF5D7396000
|
unkown
|
page readonly
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D7407000
|
unkown
|
page readonly
|
||
39A6000
|
trusted library allocation
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
7FF5D762F000
|
unkown
|
page readonly
|
||
8980000
|
unkown
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
39EC000
|
trusted library allocation
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
5130000
|
trusted library allocation
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
3AAA000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
3975000
|
trusted library allocation
|
page read and write
|
||
7DF4F2470000
|
unkown
|
page readonly
|
||
2C10000
|
direct allocation
|
page execute and read and write
|
||
9A80000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
AAF000
|
stack
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
1447000
|
trusted library allocation
|
page read and write
|
||
F64000
|
unkown
|
page write copy
|
||
BD2000
|
heap
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
EF6000
|
stack
|
page read and write
|
||
7FF5D77C2000
|
unkown
|
page readonly
|
||
13F5000
|
trusted library allocation
|
page read and write
|
||
5855000
|
trusted library allocation
|
page read and write
|
||
10AF000
|
heap
|
page read and write
|
||
2B71000
|
trusted library allocation
|
page read and write
|
||
2B54000
|
trusted library allocation
|
page read and write
|
||
E62000
|
trusted library allocation
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
89F9000
|
stack
|
page read and write
|
||
A2B5000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4ACE000
|
trusted library allocation
|
page read and write
|
||
26F7000
|
trusted library allocation
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
24CB000
|
trusted library allocation
|
page read and write
|
||
A313000
|
unkown
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
2A06000
|
trusted library allocation
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
2E37000
|
heap
|
page read and write
|
||
5C0C000
|
stack
|
page read and write
|
||
7DF4F2471000
|
unkown
|
page execute read
|
||
97B0000
|
unkown
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
C20000
|
remote allocation
|
page read and write
|
||
112B3000
|
unkown
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
41E000
|
unkown
|
page readonly
|
||
A74000
|
trusted library allocation
|
page read and write
|
||
C48B000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
9B7000
|
heap
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
56C0000
|
heap
|
page execute and read and write
|
||
39EE000
|
trusted library allocation
|
page read and write
|
||
A2D7000
|
unkown
|
page read and write
|
||
5020000
|
trusted library allocation
|
page execute and read and write
|
||
16B7000
|
trusted library allocation
|
page read and write
|
||
249E000
|
trusted library allocation
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
7FF5D7648000
|
unkown
|
page readonly
|
||
126B000
|
trusted library allocation
|
page execute and read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
1455000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
1110000
|
unkown
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
23FF000
|
stack
|
page read and write
|
||
39B9000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
2B5E000
|
trusted library allocation
|
page read and write
|
||
4275000
|
trusted library allocation
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
576000
|
stack
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page read and write
|
||
8C39000
|
stack
|
page read and write
|
||
24F5000
|
trusted library allocation
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
1786000
|
trusted library allocation
|
page execute and read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
5880000
|
heap
|
page execute and read and write
|
||
2E1F000
|
heap
|
page execute and read and write
|
||
7FF5D7292000
|
unkown
|
page readonly
|
||
39F1000
|
trusted library allocation
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
24D8000
|
trusted library allocation
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
80F000
|
heap
|
page read and write
|
||
52E3000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
39ED000
|
trusted library allocation
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
1019000
|
heap
|
page read and write
|
||
E00000
|
unkown
|
page readonly
|
||
9B0000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
2FD5000
|
trusted library allocation
|
page read and write
|
||
3980000
|
trusted library allocation
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
13B3000
|
heap
|
page read and write
|
||
37B000
|
stack
|
page read and write
|
||
7FF5CE33D000
|
unkown
|
page readonly
|
||
3180000
|
unkown
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
3B4A000
|
trusted library allocation
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
C605000
|
unkown
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
24D4000
|
trusted library allocation
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
779E000
|
unkown
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
585C000
|
trusted library allocation
|
page read and write
|
||
422000
|
unkown
|
page write copy
|
||
328E000
|
stack
|
page read and write
|
||
28C6000
|
heap
|
page read and write
|
||
4BE1000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
trusted library allocation
|
page execute and read and write
|
||
2670000
|
heap
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
2FAD000
|
stack
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
39A4000
|
trusted library allocation
|
page read and write
|
||
C663000
|
unkown
|
page read and write
|
||
674E000
|
stack
|
page read and write
|
||
49F5000
|
trusted library allocation
|
page read and write
|
||
FE8000
|
heap
|
page read and write
|
||
A7B000
|
stack
|
page read and write
|
||
AA01000
|
unkown
|
page read and write
|
||
BDE000
|
heap
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
120A000
|
stack
|
page read and write
|
||
3977000
|
trusted library allocation
|
page read and write
|
||
5141000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
7FF5D764F000
|
unkown
|
page readonly
|
||
1210000
|
unkown
|
page read and write
|
||
3C7E000
|
trusted library allocation
|
page read and write
|
||
C4DC000
|
unkown
|
page read and write
|
||
1567000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D72DF000
|
unkown
|
page readonly
|
||
3059000
|
trusted library allocation
|
page read and write
|
||
3994000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
14AF000
|
heap
|
page read and write
|
||
30D1000
|
trusted library allocation
|
page read and write
|
||
B5E000
|
heap
|
page read and write
|
||
2A19000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
C653000
|
unkown
|
page read and write
|
||
69DC000
|
stack
|
page read and write
|
||
9827000
|
unkown
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
849000
|
heap
|
page read and write
|
||
5861000
|
trusted library allocation
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
39B000
|
stack
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
2471000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page execute and read and write
|
||
3489000
|
stack
|
page read and write
|
||
808000
|
heap
|
page read and write
|
||
24C4000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
11AA000
|
trusted library allocation
|
page execute and read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
39B7000
|
trusted library allocation
|
page read and write
|
||
3A78000
|
trusted library allocation
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
546B000
|
trusted library allocation
|
page read and write
|
||
540E000
|
stack
|
page read and write
|
||
175F000
|
stack
|
page read and write
|
||
4FE0000
|
unkown
|
page readonly
|
||
C483000
|
unkown
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
7FF5D71BF000
|
unkown
|
page readonly
|
||
39A1000
|
trusted library allocation
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
7FF5D74F2000
|
unkown
|
page readonly
|
||
7FF5D7799000
|
unkown
|
page readonly
|
||
9EE0000
|
unkown
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
50BD000
|
trusted library allocation
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
30C4000
|
trusted library allocation
|
page read and write
|
||
49BB000
|
unkown
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
1076000
|
trusted library allocation
|
page read and write
|
||
112BB000
|
unkown
|
page read and write
|
||
3BA3000
|
trusted library allocation
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
4E60000
|
heap
|
page execute and read and write
|
||
1150000
|
unkown
|
page read and write
|
||
5D11000
|
trusted library allocation
|
page read and write
|
||
C33000
|
trusted library allocation
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
A23A000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
61AB000
|
stack
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
12F1000
|
trusted library allocation
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
7F1E0000
|
trusted library allocation
|
page execute and read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
heap
|
page execute and read and write
|
||
7FF5D74B8000
|
unkown
|
page readonly
|
||
4D55000
|
trusted library allocation
|
page read and write
|
||
39B8000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
4980000
|
unkown
|
page read and write
|
||
760B000
|
unkown
|
page read and write
|
||
7460000
|
unkown
|
page read and write
|
||
7FF5D76F5000
|
unkown
|
page readonly
|
||
7FF5D75E9000
|
unkown
|
page readonly
|
||
3989000
|
trusted library allocation
|
page read and write
|
||
BD2000
|
heap
|
page read and write
|
||
C035000
|
stack
|
page read and write
|
||
2B78000
|
trusted library allocation
|
page read and write
|
||
3990000
|
trusted library allocation
|
page read and write
|
||
A9FD000
|
unkown
|
page read and write
|
||
39C9000
|
trusted library allocation
|
page read and write
|
||
1731000
|
unkown
|
page readonly
|
||
1337000
|
heap
|
page read and write
|
||
49E9000
|
trusted library allocation
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
7FF5D77A4000
|
unkown
|
page readonly
|
||
B20000
|
heap
|
page read and write
|
||
B43000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
B9C000
|
heap
|
page read and write
|
||
7CB0000
|
unkown
|
page readonly
|
||
776000
|
stack
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
5F7E000
|
stack
|
page read and write
|
||
B0E0000
|
unkown
|
page readonly
|
||
10F0000
|
unkown
|
page read and write
|
||
7FF5D77FD000
|
unkown
|
page readonly
|
||
50B9000
|
trusted library allocation
|
page read and write
|
||
B0BD000
|
stack
|
page read and write
|
||
143E000
|
trusted library allocation
|
page read and write
|
||
7FF5D72FB000
|
unkown
|
page readonly
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
C5F8000
|
unkown
|
page read and write
|
||
10DB0000
|
unkown
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
4A0E000
|
unkown
|
page read and write
|
||
49C2000
|
unkown
|
page read and write
|
||
9ABD000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
3728000
|
trusted library allocation
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
80E000
|
heap
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
FFF000
|
stack
|
page read and write
|
||
5155000
|
trusted library allocation
|
page read and write
|
||
3140000
|
unkown
|
page read and write
|
||
5BEC000
|
stack
|
page read and write
|
||
30BB000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
6420000
|
heap
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
unkown
|
page read and write
|
||
C6D000
|
unkown
|
page readonly
|
||
C40000
|
heap
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
9FAF000
|
stack
|
page read and write
|
||
F64000
|
unkown
|
page read and write
|
||
8D3B000
|
stack
|
page read and write
|
||
3980000
|
trusted library allocation
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
640C000
|
stack
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
4C90000
|
heap
|
page execute and read and write
|
||
68DC000
|
stack
|
page read and write
|
||
BA9000
|
heap
|
page read and write
|
||
627C000
|
stack
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
E5A000
|
trusted library allocation
|
page execute and read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
87FA000
|
heap
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
BE70000
|
unkown
|
page readonly
|
||
3990000
|
trusted library allocation
|
page read and write
|
||
7FF5D717C000
|
unkown
|
page readonly
|
||
7605000
|
unkown
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
76F8000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5430000
|
heap
|
page read and write
|
||
2C20000
|
direct allocation
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
12A5000
|
trusted library allocation
|
page read and write
|
||
26EF000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
2B9F000
|
stack
|
page read and write
|
||
4AFA000
|
unkown
|
page read and write
|
||
89D000
|
heap
|
page read and write
|
||
272F000
|
stack
|
page read and write
|
||
7FF5D74A6000
|
unkown
|
page readonly
|
||
49FD000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
3500000
|
stack
|
page read and write
|
||
7FF5D7792000
|
unkown
|
page readonly
|
||
1210000
|
heap
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
7FF5D73F5000
|
unkown
|
page readonly
|
||
860000
|
trusted library allocation
|
page read and write
|
||
7FF5D77EB000
|
unkown
|
page readonly
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
A39F000
|
unkown
|
page read and write
|
||
8BB000
|
trusted library allocation
|
page execute and read and write
|
||
B8B000
|
stack
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
1797000
|
trusted library allocation
|
page execute and read and write
|
||
BC1000
|
heap
|
page read and write
|
||
3977000
|
trusted library allocation
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
A416000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
23A5000
|
trusted library allocation
|
page read and write
|
||
1043000
|
trusted library allocation
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
A0A9000
|
stack
|
page read and write
|
||
3100000
|
unkown
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
BD0000
|
heap
|
page read and write
|
||
BCF000
|
heap
|
page read and write
|
||
A3AA000
|
unkown
|
page read and write
|
||
56AC000
|
stack
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
3C13000
|
trusted library allocation
|
page read and write
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
4BA8000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
3978000
|
trusted library allocation
|
page read and write
|
||
4D4E000
|
stack
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
C47F000
|
unkown
|
page read and write
|
||
36C0000
|
trusted library allocation
|
page read and write
|
||
398B000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
10EE000
|
heap
|
page read and write
|
||
50EF000
|
stack
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
7FF5D76AF000
|
unkown
|
page readonly
|
||
576F000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
49B0000
|
trusted library allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
1426000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
9578000
|
stack
|
page read and write
|
||
3980000
|
trusted library allocation
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
7FF5D7230000
|
unkown
|
page readonly
|
||
C79000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
2D90000
|
unclassified section
|
page read and write
|
||
BE49000
|
stack
|
page read and write
|
||
3990000
|
trusted library allocation
|
page read and write
|
||
2ED1000
|
trusted library allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
39FB000
|
trusted library allocation
|
page read and write
|
||
B220000
|
unkown
|
page read and write
|
||
2785000
|
trusted library allocation
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
trusted library allocation
|
page read and write
|
||
C7C6000
|
unkown
|
page read and write
|
||
7FF5D7452000
|
unkown
|
page readonly
|
||
B48000
|
heap
|
page read and write
|
||
4AB4000
|
trusted library allocation
|
page read and write
|
||
39A0000
|
trusted library allocation
|
page read and write
|
||
B9C000
|
heap
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
BC8000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page execute and read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
39B9000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
direct allocation
|
page execute and read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
5086000
|
trusted library allocation
|
page read and write
|
||
512E000
|
stack
|
page read and write
|
||
9AA8000
|
unkown
|
page read and write
|
||
62AC000
|
stack
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
F65000
|
unkown
|
page execute read
|
||
39C1000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page execute and read and write
|
||
E36000
|
trusted library allocation
|
page execute and read and write
|
||
B43000
|
heap
|
page read and write
|
||
7FF5D776D000
|
unkown
|
page readonly
|
||
24CE000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
14BB000
|
heap
|
page read and write
|
||
2EB5000
|
trusted library allocation
|
page read and write
|
||
84BB000
|
stack
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
49C2000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
132B000
|
heap
|
page read and write
|
||
BD1000
|
heap
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
A33F000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
397A000
|
trusted library allocation
|
page read and write
|
||
70FC000
|
stack
|
page read and write
|
||
E7D0000
|
unkown
|
page read and write
|
||
4DD3000
|
trusted library allocation
|
page read and write
|
||
9A98000
|
unkown
|
page read and write
|
||
1820000
|
heap
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
A9A000
|
trusted library allocation
|
page execute and read and write
|
||
B28000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
1426000
|
trusted library allocation
|
page execute and read and write
|
||
5421000
|
trusted library allocation
|
page read and write
|
||
2B64000
|
trusted library allocation
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
3B31000
|
trusted library allocation
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
39AD000
|
trusted library allocation
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
7FF5D7257000
|
unkown
|
page readonly
|
||
10F0000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
7FF5D7669000
|
unkown
|
page readonly
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
trusted library allocation
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
C4C6000
|
unkown
|
page read and write
|
||
4ABE000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
1810000
|
trusted library allocation
|
page execute and read and write
|
||
52F7000
|
trusted library allocation
|
page read and write
|
||
7FF000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
88F000
|
heap
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
7E2000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
C4BD000
|
unkown
|
page read and write
|
||
7FF5D716B000
|
unkown
|
page readonly
|
||
4F8F000
|
stack
|
page read and write
|
||
B8DB000
|
stack
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
1764000
|
trusted library allocation
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
16B1000
|
trusted library allocation
|
page read and write
|
||
9E2E000
|
stack
|
page read and write
|
||
39B8000
|
trusted library allocation
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
880000
|
trusted library allocation
|
page read and write
|
||
E7D5000
|
unkown
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
39B9000
|
trusted library allocation
|
page read and write
|
||
AA04000
|
unkown
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
5865000
|
trusted library allocation
|
page read and write
|
||
14A9000
|
heap
|
page read and write
|
||
5A4E000
|
stack
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
7FF5D729E000
|
unkown
|
page readonly
|
||
3565000
|
trusted library allocation
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
10E0F000
|
unkown
|
page read and write
|
||
7AA0000
|
unkown
|
page read and write
|
||
3BAB000
|
trusted library allocation
|
page read and write
|
||
B4BF000
|
stack
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
226B000
|
trusted library allocation
|
page execute and read and write
|
||
39B7000
|
trusted library allocation
|
page read and write
|
||
55A5000
|
trusted library allocation
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
4BF5000
|
trusted library allocation
|
page read and write
|
||
10DF8000
|
unkown
|
page read and write
|
||
4271000
|
trusted library allocation
|
page read and write
|
||
55A3000
|
trusted library allocation
|
page read and write
|
||
7FF5D7705000
|
unkown
|
page readonly
|
||
2FE6000
|
trusted library allocation
|
page read and write
|
||
15FF000
|
stack
|
page read and write
|
||
10FCF000
|
unkown
|
page read and write
|
||
37A0000
|
trusted library allocation
|
page read and write
|
||
94AB000
|
stack
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
BCD000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
87C1000
|
unkown
|
page read and write
|
||
58CE000
|
stack
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
12E5000
|
trusted library allocation
|
page read and write
|
||
18F0000
|
heap
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
4AD9000
|
trusted library allocation
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
12E2000
|
trusted library allocation
|
page read and write
|
||
24E1000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2262000
|
trusted library allocation
|
page read and write
|
||
42E000
|
unkown
|
page readonly
|
||
1180000
|
trusted library allocation
|
page read and write
|
||
3980000
|
trusted library allocation
|
page read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
3150000
|
trusted library allocation
|
page read and write
|
||
1307000
|
trusted library allocation
|
page execute and read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
7637000
|
unkown
|
page read and write
|
||
7440000
|
unkown
|
page read and write
|
||
D56000
|
heap
|
page read and write
|
||
39BC000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
C6B000
|
heap
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
530F000
|
stack
|
page read and write
|
||
26C1000
|
trusted library allocation
|
page read and write
|
||
7609000
|
unkown
|
page read and write
|
||
BC7000
|
heap
|
page read and write
|
||
F574000
|
unkown
|
page read and write
|
||
35F4000
|
unkown
|
page read and write
|
||
EF8000
|
heap
|
page read and write
|
||
C62D000
|
unkown
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
7B3000
|
trusted library allocation
|
page execute and read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
1110000
|
unkown
|
page read and write
|
||
3A70000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
1076000
|
heap
|
page read and write
|
||
3999000
|
trusted library allocation
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
3120000
|
unkown
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
112B2000
|
unkown
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
2475000
|
trusted library allocation
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
BD4000
|
heap
|
page read and write
|
||
39B9000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
FE0000
|
heap
|
page execute and read and write
|
||
10DED000
|
unkown
|
page read and write
|
||
C61D000
|
unkown
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
8A5000
|
heap
|
page read and write
|
||
51A1000
|
trusted library allocation
|
page read and write
|
||
1160000
|
unkown
|
page read and write
|
||
7FF5D7267000
|
unkown
|
page readonly
|
||
10F0000
|
unkown
|
page read and write
|
||
10CA000
|
heap
|
page read and write
|
||
8980000
|
stack
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
1441000
|
trusted library allocation
|
page read and write
|
||
A273000
|
unkown
|
page read and write
|
||
B5F000
|
heap
|
page read and write
|
||
9679000
|
stack
|
page read and write
|
||
10EA000
|
trusted library allocation
|
page execute and read and write
|
||
BCD000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
397F000
|
trusted library allocation
|
page read and write
|
||
1838000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
55D0000
|
heap
|
page read and write
|
||
4A71000
|
unkown
|
page read and write
|
||
30B4000
|
trusted library allocation
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
12A6000
|
heap
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
A408000
|
unkown
|
page read and write
|
||
BE90000
|
unkown
|
page read and write
|
||
2B96000
|
trusted library allocation
|
page read and write
|
||
55E0000
|
heap
|
page read and write
|
||
F9F000
|
stack
|
page read and write
|
||
882000
|
heap
|
page read and write
|
||
7FF5D71A6000
|
unkown
|
page readonly
|
||
1210000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
2AFA000
|
trusted library allocation
|
page read and write
|
||
5132000
|
trusted library allocation
|
page read and write
|
||
7FF5D75EE000
|
unkown
|
page readonly
|
||
8390000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
E42000
|
trusted library allocation
|
page read and write
|
||
BA9000
|
heap
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
745000
|
heap
|
page read and write
|
||
4C40000
|
heap
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
7FF5D71EF000
|
unkown
|
page readonly
|
||
1240000
|
unkown
|
page read and write
|
||
63BE000
|
stack
|
page read and write
|
||
E3A000
|
trusted library allocation
|
page execute and read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
39A1000
|
trusted library allocation
|
page read and write
|
||
88F000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
39F3000
|
trusted library allocation
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
BCC000
|
heap
|
page read and write
|
||
35C1000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
3370000
|
unkown
|
page read and write
|
||
7FF5D7784000
|
unkown
|
page readonly
|
||
39A2000
|
trusted library allocation
|
page read and write
|
||
112BB000
|
unkown
|
page read and write
|
||
3280000
|
unkown
|
page read and write
|
||
1160000
|
trusted library allocation
|
page execute and read and write
|
||
9700000
|
stack
|
page read and write
|
||
3CCE000
|
trusted library allocation
|
page read and write
|
||
7FF5D772C000
|
unkown
|
page readonly
|
||
408000
|
unkown
|
page readonly
|
||
7FBB0000
|
trusted library allocation
|
page execute and read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
7FF5D6AB6000
|
unkown
|
page readonly
|
||
124E000
|
stack
|
page read and write
|
||
BF3E000
|
stack
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
3EF1000
|
trusted library allocation
|
page read and write
|
||
A96000
|
trusted library allocation
|
page execute and read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
13F6000
|
heap
|
page read and write
|
||
7FF5D7546000
|
unkown
|
page readonly
|
||
2E90000
|
unkown
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
C669000
|
unkown
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
3980000
|
trusted library allocation
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
310D000
|
stack
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
519C000
|
trusted library allocation
|
page read and write
|
||
4930000
|
heap
|
page read and write
|
||
A28D000
|
unkown
|
page read and write
|
||
3BB5000
|
trusted library allocation
|
page read and write
|
||
8B2000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
575C000
|
trusted library allocation
|
page read and write
|
||
42D000
|
unkown
|
page read and write
|
||
5330000
|
unkown
|
page write copy
|
||
10E0000
|
unkown
|
page read and write
|
||
3970000
|
trusted library allocation
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
39AF000
|
trusted library allocation
|
page read and write
|
||
8A00000
|
unkown
|
page read and write
|
||
22CE000
|
stack
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
879000
|
heap
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
107C000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
3A1E000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
10BB000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page execute and read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
E90000
|
trusted library allocation
|
page execute and read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
11B2000
|
trusted library allocation
|
page read and write
|
||
234E000
|
stack
|
page read and write
|
||
36FE000
|
trusted library allocation
|
page read and write
|
||
BCD000
|
heap
|
page read and write
|
||
C642000
|
unkown
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
B950000
|
unkown
|
page readonly
|
||
7FF5D75F2000
|
unkown
|
page readonly
|
||
9EB0000
|
unkown
|
page readonly
|
||
39A1000
|
trusted library allocation
|
page read and write
|
||
12D6000
|
trusted library allocation
|
page read and write
|
||
49E6000
|
trusted library allocation
|
page read and write
|
||
2A74000
|
trusted library allocation
|
page read and write
|
||
1210000
|
unkown
|
page read and write
|
||
5DCC000
|
stack
|
page read and write
|
||
39C5000
|
trusted library allocation
|
page read and write
|
||
397A000
|
trusted library allocation
|
page read and write
|
||
49D6000
|
unkown
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
3477000
|
trusted library allocation
|
page read and write
|
||
977E000
|
stack
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
56AE000
|
stack
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
39A8000
|
trusted library allocation
|
page read and write
|
||
591E000
|
stack
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
1007000
|
trusted library allocation
|
page read and write
|
||
7FF5D760B000
|
unkown
|
page readonly
|
||
B5F000
|
heap
|
page read and write
|
||
BC7000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
572E000
|
stack
|
page read and write
|
||
4A16000
|
unkown
|
page read and write
|
||
3035000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
heap
|
page execute and read and write
|
||
3C6E000
|
trusted library allocation
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
7FF5D7073000
|
unkown
|
page readonly
|
||
23A0000
|
trusted library allocation
|
page read and write
|
||
238C000
|
stack
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
399E000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
3160000
|
heap
|
page execute and read and write
|
||
39AA000
|
trusted library allocation
|
page read and write
|
||
99C0000
|
unkown
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
A384000
|
unkown
|
page read and write
|
||
6B00000
|
heap
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
24DE000
|
trusted library allocation
|
page read and write
|
||
59CE000
|
stack
|
page read and write
|
||
12D1000
|
trusted library allocation
|
page read and write
|
||
C78A000
|
unkown
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
12B6000
|
trusted library allocation
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
7FF5D7639000
|
unkown
|
page readonly
|
||
BBF000
|
heap
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
39CE000
|
trusted library allocation
|
page read and write
|
||
27AF000
|
trusted library allocation
|
page read and write
|
||
7FF5D7740000
|
unkown
|
page readonly
|
||
39C2000
|
trusted library allocation
|
page read and write
|
||
3990000
|
trusted library allocation
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
7FF5D7752000
|
unkown
|
page readonly
|
||
7B00000
|
unkown
|
page readonly
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
unkown
|
page read and write
|
||
8AC000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
6B3D000
|
heap
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
5E0D000
|
stack
|
page read and write
|
||
CB4000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
130F000
|
stack
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
2781000
|
trusted library allocation
|
page read and write
|
||
3980000
|
trusted library allocation
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
9700000
|
unkown
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
7611000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page execute and read and write
|
||
96FE000
|
stack
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
CD0000
|
trusted library allocation
|
page read and write
|
||
BCD000
|
heap
|
page read and write
|
||
247F000
|
trusted library allocation
|
page read and write
|
||
5265000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
C44F000
|
stack
|
page read and write
|
||
50DC000
|
stack
|
page read and write
|
||
61D0000
|
heap
|
page read and write
|
||
7FF5D7797000
|
unkown
|
page readonly
|
||
C800000
|
unkown
|
page read and write
|
||
5D0E000
|
trusted library allocation
|
page read and write
|
||
997C000
|
stack
|
page read and write
|
||
39AA000
|
trusted library allocation
|
page read and write
|
||
3D21000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
2D7A000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page execute and read and write
|
||
50D6000
|
trusted library allocation
|
page read and write
|
||
125A000
|
trusted library allocation
|
page execute and read and write
|
||
9780000
|
unkown
|
page read and write
|
||
5D0C000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
7B20000
|
unkown
|
page read and write
|
||
C450000
|
unkown
|
page read and write
|
||
7810000
|
unkown
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
EF3000
|
stack
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
4E9F000
|
stack
|
page read and write
|
||
F9D000
|
stack
|
page read and write
|
||
1177000
|
trusted library allocation
|
page read and write
|
||
7FF5D771A000
|
unkown
|
page readonly
|
||
619C000
|
stack
|
page read and write
|
||
7FF5D75D9000
|
unkown
|
page readonly
|
||
C46000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
30B6000
|
trusted library allocation
|
page read and write
|
||
12DD000
|
trusted library allocation
|
page execute and read and write
|
||
B20000
|
heap
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
2DD3000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page execute and read and write
|
||
9AB2000
|
unkown
|
page read and write
|
||
5BBE000
|
stack
|
page read and write
|
||
897E000
|
stack
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
BD1000
|
heap
|
page read and write
|
||
8880000
|
unkown
|
page readonly
|
||
2E90000
|
unkown
|
page read and write
|
||
C24E000
|
stack
|
page read and write
|
||
E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5D71DA000
|
unkown
|
page readonly
|
||
4AD6000
|
trusted library allocation
|
page read and write
|
||
7FF5D7376000
|
unkown
|
page readonly
|
||
398F000
|
trusted library allocation
|
page read and write
|
||
7FF5D66E3000
|
unkown
|
page readonly
|
||
26BE000
|
stack
|
page read and write
|
||
5D2E000
|
stack
|
page read and write
|
||
166E000
|
stack
|
page read and write
|
||
7FF5D75B8000
|
unkown
|
page readonly
|
||
8390000
|
unkown
|
page read and write
|
||
39CA000
|
trusted library allocation
|
page read and write
|
||
9A94000
|
unkown
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
4D53000
|
trusted library allocation
|
page read and write
|
||
266D000
|
stack
|
page read and write
|
||
BA7000
|
heap
|
page read and write
|
||
34A1000
|
trusted library allocation
|
page read and write
|
||
3380000
|
unkown
|
page read and write
|
||
E7DA000
|
unkown
|
page read and write
|
||
75FD000
|
unkown
|
page read and write
|
||
5E9000
|
stack
|
page read and write
|
||
2D50000
|
unclassified section
|
page read and write
|
||
7FF5D7591000
|
unkown
|
page readonly
|
||
896000
|
trusted library allocation
|
page execute and read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
1150000
|
unkown
|
page read and write
|
||
9780000
|
unkown
|
page read and write
|
||
2D7E000
|
heap
|
page read and write
|
||
4221000
|
trusted library allocation
|
page read and write
|
||
7FF5D7703000
|
unkown
|
page readonly
|
||
BDE000
|
heap
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
10E0000
|
unkown
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
2481000
|
trusted library allocation
|
page read and write
|
||
2D14000
|
heap
|
page read and write
|
||
53E1000
|
unkown
|
page read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
286F000
|
stack
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
27BD000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
4D73000
|
trusted library allocation
|
page read and write
|
||
2C34000
|
heap
|
page read and write
|
||
BC7000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1074000
|
trusted library allocation
|
page read and write
|
||
422000
|
unkown
|
page write copy
|
||
AF7000
|
trusted library allocation
|
page read and write
|
||
7FF5D7643000
|
unkown
|
page readonly
|
||
2F5F000
|
stack
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
2BAD000
|
trusted library allocation
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
39B2000
|
trusted library allocation
|
page read and write
|
||
7FF5D77E9000
|
unkown
|
page readonly
|
||
B95000
|
heap
|
page read and write
|
||
7AC0000
|
unkown
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
A3C3000
|
unkown
|
page read and write
|
||
5094000
|
trusted library allocation
|
page read and write
|
||
7B3000
|
trusted library allocation
|
page execute and read and write
|
||
1760000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
unkown
|
page read and write
|
||
3180000
|
unkown
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
2B56000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
1432000
|
trusted library allocation
|
page read and write
|
||
22E7000
|
trusted library allocation
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
5412000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
C472000
|
unkown
|
page read and write
|
||
7FF5D7360000
|
unkown
|
page readonly
|
||
7FF5D7391000
|
unkown
|
page readonly
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
4021000
|
trusted library allocation
|
page read and write
|
||
22E1000
|
trusted library allocation
|
page read and write
|
||
3626000
|
unkown
|
page read and write
|
||
179B000
|
trusted library allocation
|
page execute and read and write
|
||
7F520000
|
trusted library allocation
|
page execute and read and write
|
||
8390000
|
unkown
|
page read and write
|
||
35C9000
|
unkown
|
page read and write
|
||
26F1000
|
trusted library allocation
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
DFF000
|
stack
|
page read and write
|
||
A9E9000
|
unkown
|
page read and write
|
||
247D000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
A391000
|
unkown
|
page read and write
|
||
9EE0000
|
unkown
|
page read and write
|
||
136E000
|
stack
|
page read and write
|
||
398D000
|
trusted library allocation
|
page read and write
|
||
39D1000
|
trusted library allocation
|
page read and write
|
||
99B0000
|
unkown
|
page read and write
|
||
755000
|
heap
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
4A44000
|
unkown
|
page read and write
|
||
1256000
|
trusted library allocation
|
page execute and read and write
|
||
1262000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
49D5000
|
trusted library allocation
|
page read and write
|
||
3978000
|
trusted library allocation
|
page read and write
|
||
C35000
|
trusted library allocation
|
page read and write
|
||
6FFB000
|
stack
|
page read and write
|
||
AA0C000
|
unkown
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
7FF5D747F000
|
unkown
|
page readonly
|
||
F90000
|
heap
|
page read and write
|
||
13A0000
|
unkown
|
page readonly
|
||
BCA000
|
heap
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
80B000
|
heap
|
page read and write
|
||
3400000
|
unkown
|
page read and write
|
||
5E7E000
|
heap
|
page read and write
|
||
67B000
|
stack
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
7DF4F2491000
|
unkown
|
page execute read
|
||
B330000
|
unkown
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
3997000
|
trusted library allocation
|
page read and write
|
||
637E000
|
stack
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
8F49000
|
stack
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
||
8390000
|
unkown
|
page read and write
|
||
7435000
|
stack
|
page read and write
|
||
10F0000
|
unkown
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
5DC0000
|
heap
|
page read and write
|
||
8980000
|
unkown
|
page read and write
|
There are 2932 hidden memdumps, click here to show them.