IOC Report
SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\huge[1].dat
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\898.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\A817.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\D91B.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsdB435.tmp\liteFirewall.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsgD880.tmp\blowfish.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Del.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ihuhfti
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ihuhfti:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsgD880.tmp\INetC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsgD880.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsqD86F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsu2BAB.tmp
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
data
modified
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\cef.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
data
dropped
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\start.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
MSVC program database ver 7.00, 512*4023 bytes
dropped
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 106 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\ihuhfti
C:\Users\user\AppData\Roaming\ihuhfti
malicious
C:\Users\user\AppData\Local\Temp\A817.exe
C:\Users\user\AppData\Local\Temp\A817.exe
malicious
C:\Users\user\AppData\Local\Temp\D91B.exe
C:\Users\user\AppData\Local\Temp\D91B.exe
malicious
C:\Users\user\AppData\Local\Temp\898.exe
C:\Users\user\AppData\Local\Temp\898.exe
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
"C:\Users\user\AppData\Local\Temp\setup.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3616 --field-trial-handle=3608,i,5322583597789313851,6405145499234275535,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3824 --field-trial-handle=3608,i,5322583597789313851,6405145499234275535,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3812 --field-trial-handle=3608,i,5322583597789313851,6405145499234275535,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719942231320003 --launch-time-ticks=6813093635 --mojo-platform-channel-handle=4168 --field-trial-handle=3608,i,5322583597789313851,6405145499234275535,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719942231320003 --launch-time-ticks=6813175347 --mojo-platform-channel-handle=4216 --field-trial-handle=3608,i,5322583597789313851,6405145499234275535,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
There are 26 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://gebeus.ru/tmp/index.php
malicious
http://cx5519.com/tmp/index.php
malicious
contintnetksows.shop
malicious
http://evilos.cc/tmp/index.php
malicious
ellaboratepwsz.xyz
malicious
swellfrrgwwos.xyz
malicious
foodypannyjsud.shop
malicious
pedestriankodwu.xyz
malicious
towerxxuytwi.xyz
malicious
http://office-techs.biz/tmp/index.php
malicious
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://foodypannyjsud.shop/s
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://www.google.com/chrome/privacy/eula_text.html
unknown
https://www.google.com/chrome/privacy/eula_text.htmlP&al
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
unknown
https://excel.office.com
unknown
https://chrome.google.com/webstore?hl=urCtrl$2
unknown
https://chrome.google.com/webstore?hl=te&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://foodypannyjsud.shop/pik
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://passwords.google.com
unknown
https://aui-cdn.atlassian.com/
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
https://java.coA
unknown
http://api.install-stat.debug.world/clients/activity=4p
unknown
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
unknown
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
unknown
http://bageyou.xyz
unknown
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://bitbucket.org/
unknown
https://foodypannyjsud.shop/op8
unknown
http://xiexie.wf/22_551/huge.datll
unknown
https://support.google.com/chromebook?p=app_intent
unknown
https://foodypannyjsud.shop/$p
unknown
https://foodypannyjsud.shop/piO
unknown
https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://xiexie.wf/22_551/huge.dat2c2e-da81-46d0-b6b6-535557bcc5fa
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.google.com/chrome/privacy/eula_text.html&
unknown
https://www.google.com/chrome/privacy/eula_text.htmlT&r
unknown
https://www.ecosia.org/newtab/
unknown
http://xiexie.wf/22_551/huge.dat
unknown
https://foodypannyjsud.shop/apie
unknown
https://foodypannyjsud.shop/oi
unknown
https://foodypannyjsud.shop/pi8
unknown
https://outlook.com
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://go.mic
unknown
https://foodypannyjsud.shop/apiU8
unknown
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chrome.google.com/webstore?hl=ukCtrl$1
unknown
https://chrome.google.com/webstore?hl=lvCtrl$1
unknown
https://foodypannyjsud.shop/apiT
unknown
https://android.notify.windows.com/iOS
unknown
http://api.install-stat.debug.world/clients/installs
unknown
https://cdn.cookielaw.org/
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://support.google.com/chrome/a/answer/9122284
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
unknown
http://api.install-stat.debug.world/clients/activity=4
unknown
https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
unknown
https://chrome.google.com/webstore?hl=teCtrl$1
unknown
https://chrome.google.com/webstore?hl=zh-CNCtrl$1
unknown
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
unknown
https://word.office.comon
unknown
http://www.unicode.org/copyright.html
unknown
https://powerpoint.office.comcember
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.micro
unknown
http://api.install-stat.debug.world/clients/activity
unknown
https://foodypannyjsud.shop/s.
unknown
https://chrome.google.com/webstore?hl=zh-TWCtrl$1
unknown
http://www.apache.org/).
unknown
https://foodypannyjsud.shop/api
unknown
https://myactivity.google.com/
unknown
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
unknown
https://policies.google.com/
unknown
https://d301sr5gafysq2.cloudfront.net/
unknown
https://foodypannyjsud.shop/pi
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://wns.windows.com/)s
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
186.233.231.45
unknown
Brazil
malicious
188.114.97.3
unknown
European Union
malicious
141.8.192.126
unknown
Russian Federation
malicious
185.68.16.7
unknown
Ukraine
malicious
127.0.0.127
unknown
unknown
malicious
146.70.169.164
unknown
United Kingdom
malicious
123.212.43.225
unknown
Korea Republic of
malicious
104.192.141.1
unknown
United States
172.67.221.174
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000004047A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\GamePall
Sid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Pid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GamePall
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
DontShowUI
HKEY_CURRENT_USER\SOFTWARE\GamePall
tmp_uid
HKEY_CURRENT_USER\SOFTWARE\GamePall
reg
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\GamePall
uid
HKEY_CURRENT_USER\Control Panel\Cursors
AppStarting
There are 177 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
28D0000
direct allocation
page read and write
malicious
3520000
direct allocation
page execute and read and write
malicious
4391000
unclassified section
page read and write
malicious
4271000
unclassified section
page read and write
malicious
C3D000
heap
page read and write
malicious
28B0000
direct allocation
page read and write
malicious
AA0C000
unkown
page read and write
9C60000
heap
page read and write
8500000
unkown
page read and write
363A000
trusted library allocation
page read and write
894A000
unkown
page read and write
7FF5D7534000
unkown
page readonly
1B0000
heap
page read and write
4D7E000
trusted library allocation
page read and write
AA08000
unkown
page read and write
8900000
unkown
page read and write
3640000
trusted library allocation
page read and write
A5D4000
heap
page read and write
367D000
heap
page read and write
A00E000
heap
page read and write
41CAC000
direct allocation
page read and write
A660000
heap
page read and write
A24C000
heap
page read and write
106A6000
unkown
page read and write
51E000
heap
page read and write
7FF5D7391000
unkown
page readonly
4EB5000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
36F9000
trusted library allocation
page read and write
408000
unkown
page readonly
7FF5D768B000
unkown
page readonly
4D76000
trusted library allocation
page read and write
87E0000
unkown
page read and write
C6B000
heap
page read and write
7FF5D774A000
unkown
page readonly
261000
unkown
page execute read
2E80000
unkown
page read and write
A4CC000
heap
page read and write
3640000
trusted library allocation
page read and write
39F3000
trusted library allocation
page read and write
9E6C000
heap
page read and write
2E80000
unkown
page read and write
3640000
trusted library allocation
page read and write
64D21000
unkown
page execute read
9D37000
heap
page read and write
9E2B000
heap
page read and write
A70000
heap
page read and write
8500000
unkown
page read and write
1130000
heap
page read and write
35BE000
stack
page read and write
3640000
trusted library allocation
page read and write
9E8D000
heap
page read and write
F0A000
heap
page read and write
53A000
trusted library allocation
page execute and read and write
9E9A000
heap
page read and write
9E73000
heap
page read and write
262E000
stack
page read and write
A54E000
heap
page read and write
2A05000
trusted library allocation
page read and write
7FF5D72D3000
unkown
page readonly
52D000
trusted library allocation
page execute and read and write
51A000
stack
page read and write
594000
unkown
page write copy
51E000
heap
page read and write
A146000
heap
page read and write
3608000
trusted library allocation
page read and write
2FC60000
direct allocation
page read and write
A3A6000
heap
page read and write
997C000
stack
page read and write
F66000
heap
page read and write
E10000
unkown
page readonly
F35000
heap
page read and write
9E71000
heap
page read and write
517000
heap
page read and write
277E000
heap
page read and write
F50000
heap
page read and write
51E000
heap
page read and write
517000
heap
page read and write
A507000
heap
page read and write
7FF5D77B6000
unkown
page readonly
2D4E000
stack
page read and write
517000
heap
page read and write
3638000
trusted library allocation
page read and write
640000
heap
page read and write
35E1000
trusted library allocation
page read and write
9E8C000
heap
page read and write
9E8D000
heap
page read and write
3500000
stack
page read and write
1021B000
unkown
page read and write
7AF1000
unkown
page read and write
F03000
heap
page read and write
F42000
heap
page read and write
F3B000
heap
page read and write
106F000
heap
page read and write
3640000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
2680000
heap
page read and write
7C5000
heap
page read and write
A358000
heap
page read and write
580000
heap
page read and write
439000
unkown
page readonly
A266000
heap
page read and write
9E84000
heap
page read and write
51E000
heap
page read and write
3477000
trusted library allocation
page read and write
F37000
heap
page read and write
2A31000
trusted library allocation
page read and write
A592000
heap
page read and write
C4B000
heap
page read and write
F3D000
heap
page read and write
41C0C000
direct allocation
page read and write
B7D000
trusted library allocation
page execute and read and write
F30000
heap
page read and write
5437000
trusted library allocation
page read and write
51EE000
trusted library allocation
page read and write
517000
heap
page read and write
41B000
unkown
page write copy
A8C5000
heap
page read and write
AD0000
heap
page read and write
A408000
unkown
page read and write
363A000
trusted library allocation
page read and write
7FF5D783B000
unkown
page readonly
35F1000
trusted library allocation
page read and write
7FF5D7795000
unkown
page readonly
2ADD000
stack
page read and write
5201000
trusted library allocation
page read and write
25ED000
stack
page read and write
F3D000
heap
page read and write
3638000
trusted library allocation
page read and write
1150000
unkown
page read and write
2708000
unkown
page readonly
B20000
trusted library allocation
page read and write
A50F000
heap
page read and write
9A90000
unkown
page read and write
1150000
unkown
page read and write
A2C3000
heap
page read and write
33C0000
unkown
page read and write
3638000
trusted library allocation
page read and write
48F3000
trusted library allocation
page read and write
7FF5D732D000
unkown
page readonly
3638000
trusted library allocation
page read and write
9E86000
heap
page read and write
3638000
trusted library allocation
page read and write
7FF5D72E9000
unkown
page readonly
9E65000
heap
page read and write
35F1000
trusted library allocation
page read and write
41C14000
direct allocation
page read and write
7FF5D76DA000
unkown
page readonly
4403000
trusted library allocation
page read and write
40A000
unkown
page write copy
A588000
heap
page read and write
A276000
heap
page read and write
35CF000
unkown
page read and write
26FE000
stack
page read and write
8500000
unkown
page read and write
A3DC000
heap
page read and write
C5F0000
unkown
page read and write
51E000
heap
page read and write
37B1000
trusted library allocation
page read and write
462000
unkown
page readonly
5310000
trusted library allocation
page read and write
AED000
stack
page read and write
4862C000
direct allocation
page read and write
39E0000
heap
page read and write
8500000
unkown
page read and write
7FF5D75CB000
unkown
page readonly
35FA000
unkown
page read and write
4360000
unclassified section
page read and write
3BB7000
trusted library allocation
page read and write
A39A000
heap
page read and write
9EB8000
heap
page read and write
EF7000
heap
page read and write
A336000
heap
page read and write
51E000
heap
page read and write
9FF0000
heap
page read and write
2A50000
trusted library allocation
page read and write
A644000
heap
page read and write
AC91000
heap
page read and write
35E1000
trusted library allocation
page read and write
8500000
unkown
page read and write
C7BE000
unkown
page read and write
3640000
trusted library allocation
page read and write
25AE000
stack
page read and write
F14000
heap
page read and write
A4E8000
heap
page read and write
35DF000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
106A8000
unkown
page read and write
29E0000
trusted library allocation
page read and write
41C40000
direct allocation
page read and write
345E000
stack
page read and write
517000
heap
page read and write
3638000
trusted library allocation
page read and write
9CFE000
heap
page read and write
17D0000
trusted library allocation
page read and write
A609000
heap
page read and write
87B0000
unkown
page read and write
C7C000
heap
page read and write
C9B000
stack
page read and write
10AB8000
unkown
page read and write
9579000
stack
page read and write
A70D000
heap
page read and write
3607000
trusted library allocation
page read and write
9F8B000
heap
page read and write
103E000
stack
page read and write
51E000
heap
page read and write
3638000
trusted library allocation
page read and write
51E000
heap
page read and write
F35000
heap
page read and write
4C7E000
stack
page read and write
8500000
unkown
page read and write
87B0000
unkown
page read and write
3530000
unkown
page read and write
3640000
trusted library allocation
page read and write
517000
heap
page read and write
7637000
unkown
page read and write
8500000
unkown
page read and write
A7DE000
heap
page read and write
517000
heap
page read and write
A731000
heap
page read and write
9E63000
heap
page read and write
A7A2000
heap
page read and write
3638000
trusted library allocation
page read and write
517000
heap
page read and write
9C59000
heap
page read and write
2FC9C000
direct allocation
page read and write
361A000
trusted library allocation
page read and write
A849000
heap
page read and write
A3B6000
unkown
page read and write
F44000
heap
page read and write
BFB8000
stack
page read and write
3640000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
2791000
trusted library allocation
page read and write
2E80000
unkown
page read and write
35E1000
trusted library allocation
page read and write
40B000
unkown
page execute read
A351000
heap
page read and write
A402000
heap
page read and write
AE1D000
stack
page read and write
35EC000
trusted library allocation
page read and write
A79C000
heap
page read and write
106A6000
unkown
page read and write
2FC6C000
direct allocation
page read and write
7FF5D75D9000
unkown
page readonly
6053A000
unkown
page read and write
4D97000
trusted library allocation
page read and write
7FF5D762F000
unkown
page readonly
17D6000
trusted library allocation
page execute and read and write
8B70000
unkown
page read and write
2945000
trusted library allocation
page read and write
7FF5D7452000
unkown
page readonly
7FF5D7262000
unkown
page readonly
2C00000
heap
page read and write
10004000
unkown
page readonly
360A000
trusted library allocation
page read and write
2FDD000
stack
page read and write
41C88000
direct allocation
page read and write
FE7000
trusted library allocation
page execute and read and write
10AB3000
unkown
page read and write
7FF5D7488000
unkown
page readonly
4E8D000
stack
page read and write
3640000
trusted library allocation
page read and write
8500000
unkown
page read and write
C806000
unkown
page read and write
F33000
heap
page read and write
6C3000
trusted library allocation
page execute and read and write
51E000
heap
page read and write
35E8000
trusted library allocation
page read and write
B23000
trusted library allocation
page execute and read and write
8510000
unkown
page read and write
7FF5D71F9000
unkown
page readonly
9E9A000
heap
page read and write
2670000
trusted library allocation
page read and write
F50000
heap
page read and write
27C9000
heap
page read and write
9E8F000
heap
page read and write
517000
heap
page read and write
9E8B000
heap
page read and write
A059000
heap
page read and write
A5FC000
heap
page read and write
35D8000
trusted library allocation
page read and write
A282000
heap
page read and write
5380000
heap
page read and write
51E000
heap
page read and write
8500000
unkown
page read and write
1495000
heap
page read and write
517000
heap
page read and write
A5F1000
heap
page read and write
C33000
trusted library allocation
page execute and read and write
FF0000
unkown
page readonly
E93000
heap
page read and write
51E000
heap
page read and write
F3F000
heap
page read and write
10E4000
trusted library allocation
page read and write
F1E000
heap
page read and write
7FF5D769E000
unkown
page readonly
7FF5D774C000
unkown
page readonly
A512000
heap
page read and write
4AEF000
stack
page read and write
8500000
unkown
page read and write
9D0000
heap
page read and write
A373000
heap
page read and write
7FF5D76E8000
unkown
page readonly
392F000
stack
page read and write
517000
heap
page read and write
8500000
unkown
page read and write
7FF5CE343000
unkown
page readonly
A662000
heap
page read and write
56C000
heap
page read and write
60556000
unkown
page read and write
12D0000
unkown
page readonly
106A4000
unkown
page read and write
3640000
trusted library allocation
page read and write
A29B000
heap
page read and write
106AC000
unkown
page read and write
1DC000
unkown
page readonly
9D3A000
heap
page read and write
87B0000
unkown
page read and write
FCD000
trusted library allocation
page execute and read and write
8500000
unkown
page read and write
B7DF000
stack
page read and write
7AE0000
unkown
page read and write
A5FA000
heap
page read and write
A831000
heap
page read and write
35E0000
trusted library allocation
page read and write
51E000
heap
page read and write
7FF5D7764000
unkown
page readonly
A818000
heap
page read and write
48618000
direct allocation
page read and write
8F49000
stack
page read and write
3627000
trusted library allocation
page read and write
8520000
unkown
page read and write
5340000
heap
page execute and read and write
2BAE000
stack
page read and write
41CB0000
direct allocation
page read and write
7FF5D7438000
unkown
page readonly
517000
heap
page read and write
35C1000
unkown
page read and write
C62D000
unkown
page read and write
6E0000
heap
page read and write
515000
heap
page read and write
5315000
trusted library allocation
page read and write
F35000
heap
page read and write
470000
heap
page read and write
9E25000
heap
page read and write
760B000
unkown
page read and write
77A2000
unkown
page read and write
540000
heap
page read and write
517000
heap
page read and write
1000000
trusted library allocation
page read and write
B950000
unkown
page readonly
6C6000
heap
page read and write
51E000
heap
page read and write
514000
trusted library allocation
page read and write
A06B000
heap
page read and write
3640000
trusted library allocation
page read and write
C035000
stack
page read and write
A5E9000
heap
page read and write
7DC0000
unkown
page readonly
3640000
trusted library allocation
page read and write
9EB0000
heap
page read and write
2E80000
unkown
page read and write
48F0000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
1C0000
heap
page read and write
35D1000
trusted library allocation
page read and write
B5B000
trusted library allocation
page execute and read and write
34BE000
stack
page read and write
F51000
heap
page read and write
A7C3000
heap
page read and write
2434000
trusted library allocation
page read and write
401000
unkown
page execute read
31AE000
stack
page read and write
1250000
unkown
page read and write
400000
unkown
page readonly
3638000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
FD6000
trusted library allocation
page execute and read and write
86E0000
unkown
page readonly
160000
heap
page read and write
486AC000
direct allocation
page read and write
A6FA000
heap
page read and write
3640000
trusted library allocation
page read and write
106AD000
unkown
page read and write
53CE000
stack
page read and write
EB35000
unkown
page read and write
7FF5D7289000
unkown
page readonly
A6DF000
heap
page read and write
7691000
unkown
page read and write
1040000
trusted library allocation
page read and write
A25A000
heap
page read and write
3640000
trusted library allocation
page read and write
2660000
trusted library allocation
page read and write
9FCB000
heap
page read and write
1150000
unkown
page read and write
83B000
stack
page read and write
3640000
trusted library allocation
page read and write
8500000
unkown
page read and write
8946000
unkown
page read and write
9E81000
heap
page read and write
2A14000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
C35000
heap
page read and write
A740000
heap
page read and write
A6C6000
heap
page read and write
A39D000
heap
page read and write
51E000
heap
page read and write
517000
heap
page read and write
2745000
trusted library allocation
page read and write
517000
heap
page read and write
F30000
heap
page read and write
F03000
heap
page read and write
277A000
heap
page read and write
9D1B000
heap
page read and write
8500000
unkown
page read and write
3638000
trusted library allocation
page read and write
150000
unkown
page readonly
1F0000
heap
page read and write
A84C000
heap
page read and write
8510000
unkown
page read and write
51E000
heap
page read and write
7618000
unkown
page read and write
8500000
unkown
page read and write
9D20000
heap
page read and write
6053A000
unkown
page read and write
517000
heap
page read and write
2400000
trusted library allocation
page read and write
A555000
heap
page read and write
5000000
heap
page execute and read and write
5930000
trusted library allocation
page read and write
517000
heap
page read and write
2A3D000
trusted library allocation
page read and write
51F4000
trusted library allocation
page read and write
7E0000
heap
page read and write
75F8000
unkown
page read and write
9D2D000
heap
page read and write
41B000
unkown
page write copy
A7E6000
heap
page read and write
5226000
trusted library allocation
page read and write
A4AC000
heap
page read and write
9D67000
unkown
page read and write
51D5000
trusted library allocation
page read and write
1860000
heap
page read and write
51E000
heap
page read and write
A846000
heap
page read and write
7DF4F2481000
unkown
page execute read
400000
unkown
page readonly
A0A9000
stack
page read and write
C3CC000
stack
page read and write
9C000
stack
page read and write
51E000
heap
page read and write
5FD0000
unkown
page readonly
F85000
heap
page read and write
F44000
heap
page read and write
C5F4000
unkown
page read and write
35E0000
trusted library allocation
page read and write
C4C6000
unkown
page read and write
7686000
unkown
page read and write
3613000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
BE49000
stack
page read and write
F33000
heap
page read and write
A3C3000
unkown
page read and write
36D1000
heap
page read and write
10254000
unkown
page read and write
106AF000
unkown
page read and write
3640000
trusted library allocation
page read and write
2A71000
trusted library allocation
page read and write
400000
unkown
page readonly
C9B000
heap
page read and write
51E000
heap
page read and write
7FF5D76CD000
unkown
page readonly
7609000
unkown
page read and write
517000
heap
page read and write
F3D000
heap
page read and write
3640000
trusted library allocation
page read and write
B46000
trusted library allocation
page execute and read and write
F44000
heap
page read and write
A30B000
heap
page read and write
3638000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
C48000
heap
page read and write
A6B4000
heap
page read and write
A706000
heap
page read and write
8500000
unkown
page read and write
4ED0000
heap
page read and write
517000
heap
page read and write
2A39000
trusted library allocation
page read and write
106AA000
unkown
page read and write
A88A000
heap
page read and write
51E000
heap
page read and write
2A36000
trusted library allocation
page read and write
1019B000
unkown
page read and write
3638000
trusted library allocation
page read and write
51E000
heap
page read and write
517000
heap
page read and write
361D000
trusted library allocation
page read and write
EFD000
stack
page read and write
8510000
unkown
page read and write
517000
heap
page read and write
9E55000
heap
page read and write
A4E6000
heap
page read and write
51E000
heap
page read and write
3621000
trusted library allocation
page read and write
517000
heap
page read and write
3638000
trusted library allocation
page read and write
7FF5D723F000
unkown
page readonly
3638000
trusted library allocation
page read and write
2E80000
unkown
page read and write
2E80000
unkown
page read and write
517000
heap
page read and write
517000
heap
page read and write
F3D000
heap
page read and write
C483000
unkown
page read and write
3638000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
F08C000
stack
page read and write
2E80000
unkown
page read and write
C3D000
trusted library allocation
page execute and read and write
A14A000
heap
page read and write
10216000
unkown
page read and write
99B6000
unkown
page read and write
7FF5D7752000
unkown
page readonly
3640000
trusted library allocation
page read and write
517000
heap
page read and write
517000
heap
page read and write
49E50000
direct allocation
page read and write
769A000
unkown
page read and write
87B0000
unkown
page read and write
4D91000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
35F4000
trusted library allocation
page read and write
C617000
unkown
page read and write
4D74000
trusted library allocation
page read and write
17EB000
trusted library allocation
page execute and read and write
3640000
trusted library allocation
page read and write
7FF5D72FB000
unkown
page readonly
517000
heap
page read and write
51E000
heap
page read and write
517000
heap
page read and write
B980000
unkown
page readonly
F33000
heap
page read and write
4EB0000
trusted library allocation
page read and write
2FD0000
remote allocation
page read and write
7CB0000
unkown
page readonly
9E35000
heap
page read and write
3640000
trusted library allocation
page read and write
4F6E000
stack
page read and write
86D0000
unkown
page readonly
2F60000
trusted library allocation
page read and write
A4B9000
heap
page read and write
F54000
heap
page read and write
4601000
heap
page read and write
A828000
heap
page read and write
1400000
heap
page read and write
9D06000
heap
page read and write
1000000
heap
page read and write
F07000
heap
page read and write
1230000
heap
page read and write
3640000
trusted library allocation
page read and write
9379000
stack
page read and write
51E000
heap
page read and write
3638000
trusted library allocation
page read and write
360A000
trusted library allocation
page read and write
35D1000
trusted library allocation
page read and write
760F000
unkown
page read and write
2754000
trusted library allocation
page read and write
34834000
direct allocation
page read and write
A7AB000
heap
page read and write
1584000
trusted library allocation
page read and write
517000
heap
page read and write
48658000
direct allocation
page read and write
7FF5D743F000
unkown
page readonly
2BB1000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
9E6D000
heap
page read and write
9D63000
heap
page read and write
1687000
heap
page read and write
51E000
heap
page read and write
7D0000
trusted library allocation
page execute and read and write
3638000
trusted library allocation
page read and write
3619000
trusted library allocation
page read and write
28C0000
heap
page read and write
7FF5D75BF000
unkown
page readonly
B6F000
stack
page read and write
2654000
trusted library allocation
page read and write
594000
unkown
page read and write
4F6000
stack
page read and write
35F1000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
34804000
direct allocation
page read and write
8500000
unkown
page read and write
3638000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
B57000
trusted library allocation
page execute and read and write
6056D000
unkown
page execute read
9E96000
heap
page read and write
27F8000
trusted library allocation
page read and write
9E6D000
heap
page read and write
35EC000
trusted library allocation
page read and write
9E9E000
heap
page read and write
8500000
unkown
page read and write
41C9C000
direct allocation
page read and write
3641000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
A74E000
heap
page read and write
513000
trusted library allocation
page execute and read and write
A39F000
unkown
page read and write
A83A000
heap
page read and write
9E6C000
heap
page read and write
21A0000
trusted library allocation
page read and write
7FF5D7792000
unkown
page readonly
6053C000
unkown
page write copy
2F70000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
BD8000
heap
page read and write
9E94000
heap
page read and write
9F80000
heap
page read and write
3638000
trusted library allocation
page read and write
7FF5D7202000
unkown
page readonly
A6A4000
heap
page read and write
35E7000
trusted library allocation
page read and write
A6ED000
heap
page read and write
1150000
unkown
page read and write
A7A0000
heap
page read and write
2FC2C000
direct allocation
page read and write
25F0000
heap
page read and write
3640000
trusted library allocation
page read and write
9FB0000
heap
page read and write
3640000
trusted library allocation
page read and write
B74000
unkown
page readonly
3648000
trusted library allocation
page read and write
1090000
heap
page read and write
A55A000
heap
page read and write
F33000
heap
page read and write
520E000
stack
page read and write
F27000
heap
page read and write
101D3000
unkown
page read and write
321E000
stack
page read and write
401000
unkown
page execute read
3640000
trusted library allocation
page read and write
517000
heap
page read and write
F36000
stack
page read and write
520000
trusted library allocation
page read and write
297E000
stack
page read and write
35E2000
trusted library allocation
page read and write
10AB5000
unkown
page read and write
A714000
heap
page read and write
A637000
heap
page read and write
55860000
direct allocation
page read and write
F3D000
heap
page read and write
7FF5D75F2000
unkown
page readonly
4FCD000
stack
page read and write
3640000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
BD5000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
41CBC000
direct allocation
page read and write
76B000
stack
page read and write
2410000
heap
page read and write
35E1000
trusted library allocation
page read and write
C6B000
trusted library allocation
page execute and read and write
F13000
heap
page read and write
BB10000
heap
page read and write
A733000
heap
page read and write
34814000
direct allocation
page read and write
51E000
heap
page read and write
5770000
heap
page execute and read and write
A6E4000
heap
page read and write
2E80000
unkown
page read and write
14C0000
heap
page read and write
8931000
unkown
page read and write
1000000
heap
page read and write
9AB4000
unkown
page read and write
E3B000
stack
page read and write
E2E000
stack
page read and write
3100000
unkown
page read and write
2F6C000
trusted library allocation
page read and write
8FD8000
stack
page read and write
2E80000
unkown
page read and write
A21D000
heap
page read and write
8500000
unkown
page read and write
9CED000
heap
page read and write
3679000
trusted library allocation
page read and write
51E000
heap
page read and write
C1D000
heap
page read and write
C56000
trusted library allocation
page execute and read and write
3600000
trusted library allocation
page read and write
51E000
heap
page read and write
1599000
trusted library allocation
page read and write
7B0000
heap
page read and write
49C2000
unkown
page read and write
517000
heap
page read and write
F37000
heap
page read and write
9E91000
heap
page read and write
7FF5D73F5000
unkown
page readonly
4600000
heap
page read and write
BA0000
heap
page read and write
21A7000
trusted library allocation
page execute and read and write
4590000
heap
page read and write
1100000
heap
page read and write
338B000
stack
page read and write
9D34000
heap
page read and write
EBE000
stack
page read and write
517000
heap
page read and write
9E78000
heap
page read and write
28E0000
heap
page read and write
7FF5D7799000
unkown
page readonly
305C000
stack
page read and write
9E92000
heap
page read and write
2D8E000
stack
page read and write
C48B000
unkown
page read and write
9E61000
heap
page read and write
EB6000
heap
page read and write
8510000
unkown
page read and write
5250000
trusted library allocation
page read and write
A384000
heap
page read and write
51E000
heap
page read and write
F35000
heap
page read and write
9FB2000
heap
page read and write
3487C000
direct allocation
page read and write
7FF5D7398000
unkown
page readonly
6D0000
heap
page read and write
CA9000
heap
page read and write
4AA0000
unkown
page read and write
51E000
heap
page read and write
87B0000
unkown
page read and write
8500000
unkown
page read and write
A3C3000
heap
page read and write
51E000
heap
page read and write
35F7000
trusted library allocation
page read and write
4D8D000
stack
page read and write
69D000
heap
page read and write
A708000
heap
page read and write
517000
heap
page read and write
40A000
unkown
page read and write
3638000
trusted library allocation
page read and write
51E000
heap
page read and write
A084000
heap
page read and write
9C2E000
heap
page read and write
3638000
trusted library allocation
page read and write
49E6C000
direct allocation
page read and write
6C0000
trusted library allocation
page read and write
23D5000
trusted library allocation
page read and write
F35000
heap
page read and write
1457000
heap
page read and write
49E8C000
direct allocation
page read and write
9EA5000
heap
page read and write
A4EF000
heap
page read and write
29D000
unkown
page readonly
8963000
unkown
page read and write
517000
heap
page read and write
2A25000
trusted library allocation
page read and write
EB37000
unkown
page read and write
F1E000
heap
page read and write
41D00000
direct allocation
page read and write
A484000
heap
page read and write
BD5000
heap
page read and write
A3B1000
heap
page read and write
E30000
heap
page read and write
3640000
trusted library allocation
page read and write
41C4C000
direct allocation
page read and write
35F8000
trusted library allocation
page read and write
1440000
heap
page read and write
106AF000
unkown
page read and write
51E000
heap
page read and write
F1A000
heap
page read and write
35E1000
trusted library allocation
page read and write
7E58000
stack
page read and write
A4DA000
heap
page read and write
9E63000
heap
page read and write
B73000
trusted library allocation
page execute and read and write
7DF4F2460000
unkown
page readonly
A030000
heap
page read and write
76F8000
unkown
page read and write
9CA2000
heap
page read and write
363A000
trusted library allocation
page read and write
BE8000
heap
page read and write
51E000
heap
page read and write
5EF2000
unkown
page readonly
F54000
heap
page read and write
42A000
unkown
page read and write
3640000
trusted library allocation
page read and write
30DC000
stack
page read and write
55814000
direct allocation
page read and write
56DE000
stack
page read and write
A3D4000
heap
page read and write
4D7F000
stack
page read and write
5220000
trusted library allocation
page read and write
A6BC000
heap
page read and write
1383000
heap
page read and write
50A000
heap
page read and write
A76B000
heap
page read and write
35FA000
trusted library allocation
page read and write
1575000
trusted library allocation
page read and write
A2E5000
heap
page read and write
BF3D000
stack
page read and write
9E67000
heap
page read and write
8A46000
unkown
page read and write
B0E0000
unkown
page readonly
A797000
heap
page read and write
9E9A000
heap
page read and write
127E000
stack
page read and write
51E000
heap
page read and write
1400000
trusted library allocation
page execute and read and write
7FF5D749B000
unkown
page readonly
8500000
unkown
page read and write
42E000
unkown
page readonly
8870000
unkown
page readonly
C46F000
unkown
page read and write
3617000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
13A0000
unkown
page readonly
10114000
unkown
page read and write
1150000
unkown
page read and write
3640000
trusted library allocation
page read and write
400000
unkown
page readonly
51E000
heap
page read and write
8500000
unkown
page read and write
F03000
heap
page read and write
8500000
unkown
page read and write
3640000
trusted library allocation
page read and write
548000
heap
page read and write
4D8E000
trusted library allocation
page read and write
A63D000
heap
page read and write
51E000
heap
page read and write
30FB000
stack
page read and write
3640000
trusted library allocation
page read and write
7FF5D7280000
unkown
page readonly
B74000
unkown
page readonly
F13000
heap
page read and write
1131000
heap
page read and write
24A000
stack
page read and write
9EA3000
heap
page read and write
A417000
heap
page read and write
23F9000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
A338000
heap
page read and write
3605000
trusted library allocation
page read and write
5424000
trusted library allocation
page read and write
2FC01000
direct allocation
page read and write
10AB9000
unkown
page read and write
87E0000
unkown
page read and write
51E000
heap
page read and write
35F1000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
2F6E000
trusted library allocation
page read and write
9DD000
trusted library allocation
page execute and read and write
37A9000
trusted library allocation
page read and write
348A0000
direct allocation
page read and write
7FF5D7669000
unkown
page readonly
401000
unkown
page execute read
7FF5D72BF000
unkown
page readonly
9E78000
heap
page read and write
6CD000
heap
page read and write
1150000
unkown
page read and write
F34000
heap
page read and write
517000
heap
page read and write
2E80000
unkown
page read and write
EAC000
heap
page read and write
1200000
heap
page execute and read and write
3638000
trusted library allocation
page read and write
9E76000
heap
page read and write
51E000
heap
page read and write
3640000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
A27A000
heap
page read and write
51E000
heap
page read and write
10AB3000
unkown
page read and write
3617000
trusted library allocation
page read and write
35D7000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
7FF5D7589000
unkown
page readonly
F22000
heap
page read and write
2424000
trusted library allocation
page read and write
7FF5D74A6000
unkown
page readonly
7FF5D706E000
unkown
page readonly
51E000
heap
page read and write
8500000
unkown
page read and write
A4A3000
heap
page read and write
35E4000
unkown
page read and write
51E000
heap
page read and write
517000
heap
page read and write
9B0B000
unkown
page read and write
7FF5D7682000
unkown
page readonly
51E000
heap
page read and write
51E000
heap
page read and write
C0B000
heap
page read and write
7FF5D758D000
unkown
page readonly
99B0000
unkown
page read and write
9E94000
heap
page read and write
35E1000
trusted library allocation
page read and write
2F80000
heap
page execute and read and write
2FC68000
direct allocation
page read and write
732E000
stack
page read and write
49E40000
direct allocation
page read and write
F0A000
heap
page read and write
3638000
trusted library allocation
page read and write
E60000
heap
page read and write
144E000
stack
page read and write
CC7000
heap
page read and write
517000
heap
page read and write
1117000
trusted library allocation
page execute and read and write
F33000
heap
page read and write
115C000
heap
page read and write
6EA000
heap
page read and write
19D000
stack
page read and write
51E000
heap
page read and write
C908000
unkown
page read and write
A624000
heap
page read and write
A3C7000
heap
page read and write
F0A000
heap
page read and write
3791000
trusted library allocation
page read and write
28EF000
heap
page read and write
54E5000
trusted library allocation
page read and write
3614000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
61121000
unkown
page execute read
C496000
unkown
page read and write
A7AD000
heap
page read and write
309E000
stack
page read and write
C5A000
heap
page read and write
A815000
heap
page read and write
F50000
heap
page read and write
F0A000
heap
page read and write
AF8000
stack
page read and write
2A54000
trusted library allocation
page read and write
2471000
trusted library allocation
page read and write
15A0000
heap
page read and write
35EA000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
9E70000
heap
page read and write
A766000
heap
page read and write
A40D000
heap
page read and write
5720000
heap
page execute and read and write
F50000
heap
page read and write
9FC3000
heap
page read and write
A4D3000
heap
page read and write
408000
unkown
page readonly
4290000
heap
page read and write
48664000
direct allocation
page read and write
A678000
heap
page read and write
3731000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
51E000
heap
page read and write
8500000
unkown
page read and write
35EA000
trusted library allocation
page read and write
51E000
heap
page read and write
8500000
unkown
page read and write
35F1000
trusted library allocation
page read and write
A8E000
stack
page read and write
7FF5D717C000
unkown
page readonly
41C2C000
direct allocation
page read and write
9EB8000
heap
page read and write
91F0000
unkown
page readonly
7FF5D7639000
unkown
page readonly
F54000
heap
page read and write
8500000
unkown
page read and write
51E000
heap
page read and write
2E80000
unkown
page read and write
51E000
heap
page read and write
A3BA000
heap
page read and write
60721000
unkown
page execute read
825000
heap
page read and write
517000
heap
page read and write
CC2000
heap
page read and write
3660000
trusted library allocation
page read and write
F40000
heap
page read and write
DEF000
stack
page read and write
4DF3000
trusted library allocation
page read and write
B4BD000
stack
page read and write
C472000
unkown
page read and write
35F0000
trusted library allocation
page read and write
35D8000
trusted library allocation
page read and write
8500000
unkown
page read and write
620000
heap
page read and write
260000
unkown
page readonly
35F1000
trusted library allocation
page read and write
9E76000
heap
page read and write
A5B1000
heap
page read and write
2EC0000
unkown
page readonly
28E1000
heap
page execute and read and write
DCE000
stack
page read and write
3638000
trusted library allocation
page read and write
9C0000
heap
page read and write
D68000
heap
page read and write
7FF5D7784000
unkown
page readonly
C65000
heap
page read and write
3638000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
7D0000
heap
page read and write
2B3000
unkown
page execute read
9CEA000
heap
page read and write
51E000
heap
page read and write
FBD000
trusted library allocation
page execute and read and write
A6FD000
heap
page read and write
517000
heap
page read and write
3640000
trusted library allocation
page read and write
23E6000
trusted library allocation
page read and write
A672000
heap
page read and write
BA8000
heap
page read and write
9C49000
heap
page read and write
7330000
unclassified section
page readonly
517000
heap
page read and write
5410000
trusted library allocation
page read and write
EF0000
heap
page read and write
35F1000
trusted library allocation
page read and write
9FE3000
heap
page read and write
517000
heap
page read and write
A20B000
heap
page read and write
16AF000
stack
page read and write
7FF5D75EE000
unkown
page readonly
22CE000
stack
page read and write
4A0000
heap
page read and write
517000
heap
page read and write
4980000
unkown
page read and write
51E000
heap
page read and write
3638000
trusted library allocation
page read and write
8500000
unkown
page read and write
103CC000
stack
page read and write
2E80000
unkown
page read and write
3640000
trusted library allocation
page read and write
41C04000
direct allocation
page read and write
362E000
trusted library allocation
page read and write
7FF5D778A000
unkown
page readonly
2669000
trusted library allocation
page read and write
2BDD000
stack
page read and write
9E2F000
heap
page read and write
41CC4000
direct allocation
page read and write
10AB0000
unkown
page read and write
8500000
unkown
page read and write
7FF5D710B000
unkown
page readonly
49FA000
unkown
page read and write
34880000
direct allocation
page read and write
9A80000
unkown
page read and write
647000
trusted library allocation
page execute and read and write
3640000
trusted library allocation
page read and write
9E70000
heap
page read and write
87B0000
unkown
page read and write
A612000
heap
page read and write
7611000
unkown
page read and write
7FF5D72CE000
unkown
page readonly
C1CC000
stack
page read and write
1C9000
unkown
page readonly
3BFA000
trusted library allocation
page read and write
49E14000
direct allocation
page read and write
51E000
heap
page read and write
49D6000
unkown
page read and write
8500000
unkown
page read and write
C4DC000
unkown
page read and write
7FF5D77A8000
unkown
page readonly
36D0000
heap
page read and write
1390000
heap
page read and write
8500000
unkown
page read and write
64321000
unkown
page execute read
49EBC000
direct allocation
page read and write
561000
heap
page read and write
C24E000
stack
page read and write
35F1000
trusted library allocation
page read and write
E72D000
stack
page read and write
A12F000
stack
page read and write
9C29000
heap
page read and write
2756000
trusted library allocation
page read and write
51E000
heap
page read and write
F35000
heap
page read and write
54DE000
stack
page read and write
F10000
heap
page read and write
9E8A000
heap
page read and write
3619000
trusted library allocation
page read and write
360A000
trusted library allocation
page read and write
517000
heap
page read and write
2700000
trusted library allocation
page execute and read and write
136D000
trusted library allocation
page execute and read and write
517000
heap
page read and write
5E0000
heap
page read and write
517000
heap
page read and write
F10000
heap
page read and write
A341000
heap
page read and write
F35000
heap
page read and write
30D0000
direct allocation
page read and write
51E000
heap
page read and write
3638000
trusted library allocation
page read and write
BDC0000
unkown
page read and write
597E000
stack
page read and write
1159000
heap
page read and write
699000
heap
page read and write
A6EA000
heap
page read and write
A3EF000
heap
page read and write
35E8000
trusted library allocation
page read and write
2E80000
unkown
page read and write
7FF5D775C000
unkown
page readonly
F54000
heap
page read and write
3638000
trusted library allocation
page read and write
A5D7000
heap
page read and write
517000
heap
page read and write
99B3000
unkown
page read and write
A50000
trusted library allocation
page read and write
10AB8000
unkown
page read and write
41D28000
direct allocation
page read and write
A39F000
heap
page read and write
F3B000
heap
page read and write
486D0000
direct allocation
page read and write
9D6C000
heap
page read and write
F40000
heap
page read and write
35F1000
trusted library allocation
page read and write
A7C0000
heap
page read and write
3612000
trusted library allocation
page read and write
4A40000
unkown
page read and write
3640000
trusted library allocation
page read and write
2381000
trusted library allocation
page read and write
F0E000
heap
page read and write
1386000
trusted library allocation
page execute and read and write
A8A9000
heap
page read and write
3638000
trusted library allocation
page read and write
A49B000
heap
page read and write
7FF5D777A000
unkown
page readonly
7DF4F2470000
unkown
page readonly
ACC1000
heap
page read and write
35D2000
trusted library allocation
page read and write
2E80000
unkown
page read and write
A7C5000
heap
page read and write
231F000
stack
page read and write
7FF5D71E0000
unkown
page readonly
F44000
heap
page read and write
A5E3000
heap
page read and write
BA2000
trusted library allocation
page read and write
A626000
heap
page read and write
3638000
trusted library allocation
page read and write
9A96000
unkown
page read and write
3640000
trusted library allocation
page read and write
7FF5D723C000
unkown
page readonly
436000
unkown
page readonly
E60000
heap
page read and write
A380000
heap
page read and write
364C000
trusted library allocation
page read and write
33F0000
unkown
page read and write
9E8F000
heap
page read and write
F10000
heap
page read and write
9E50000
heap
page read and write
517000
heap
page read and write
3607000
trusted library allocation
page read and write
49EAC000
direct allocation
page read and write
9C25000
heap
page read and write
7DF4F2471000
unkown
page execute read
A3BF000
heap
page read and write
A38A000
heap
page read and write
9E4D000
heap
page read and write
3640000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
363A000
trusted library allocation
page read and write
A813000
heap
page read and write
9E67000
heap
page read and write
87A0000
unkown
page read and write
6A6000
heap
page read and write
36DD000
trusted library allocation
page read and write
4DA5000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
27EF000
stack
page read and write
BDE000
heap
page read and write
A3E4000
heap
page read and write
7FF5D7215000
unkown
page readonly
87B0000
unkown
page read and write
CAC000
heap
page read and write
8500000
unkown
page read and write
49E60000
direct allocation
page read and write
517000
heap
page read and write
517000
heap
page read and write
3638000
trusted library allocation
page read and write
27F4000
heap
page read and write
35FB000
trusted library allocation
page read and write
378D000
trusted library allocation
page read and write
517000
heap
page read and write
3638000
trusted library allocation
page read and write
A68D000
heap
page read and write
3638000
trusted library allocation
page read and write
9E95000
heap
page read and write
360C000
trusted library allocation
page read and write
8500000
unkown
page read and write
EB0000
heap
page read and write
2FF9000
stack
page read and write
2901000
trusted library allocation
page read and write
104E000
stack
page read and write
A85F000
heap
page read and write
106A9000
unkown
page read and write
B97000
trusted library allocation
page read and write
A2FD000
heap
page read and write
F54000
heap
page read and write
49E01000
direct allocation
page read and write
51E000
heap
page read and write
442000
unkown
page readonly
400000
unkown
page readonly
8510000
unkown
page read and write
2650000
trusted library allocation
page read and write
A683000
heap
page read and write
A2F3000
heap
page read and write
A820000
heap
page read and write
F55000
heap
page read and write
B24000
trusted library allocation
page read and write
7FF5D751F000
unkown
page readonly
34890000
direct allocation
page read and write
6FC000
heap
page read and write
51E000
heap
page read and write
F0A000
heap
page read and write
3606000
trusted library allocation
page read and write
1040000
heap
page read and write
5479000
unkown
page read and write
3638000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
1150000
unkown
page read and write
49E9C000
direct allocation
page read and write
10ABF000
unkown
page read and write
F50000
heap
page read and write
CA2A000
unkown
page read and write
35E0000
trusted library allocation
page read and write
228E000
stack
page read and write
BEF000
stack
page read and write
57AE000
stack
page read and write
9679000
stack
page read and write
F25000
heap
page read and write
F33000
heap
page read and write
768C000
unkown
page read and write
A694000
heap
page read and write
3638000
trusted library allocation
page read and write
1150000
unkown
page read and write
15A8000
heap
page read and write
51E000
heap
page read and write
A066000
heap
page read and write
35F1000
trusted library allocation
page read and write
F44000
heap
page read and write
492F000
stack
page read and write
3638000
trusted library allocation
page read and write
C5A000
trusted library allocation
page execute and read and write
51E000
heap
page read and write
A7F4000
heap
page read and write
3640000
trusted library allocation
page read and write
A2AB000
heap
page read and write
51E000
heap
page read and write
51E000
heap
page read and write
1427000
trusted library allocation
page read and write
970000
heap
page read and write
9C20000
heap
page read and write
51E000
heap
page read and write
1030000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
EAC000
heap
page read and write
A332000
heap
page read and write
41C7C000
direct allocation
page read and write
184E000
stack
page read and write
17B0000
trusted library allocation
page read and write
A248000
heap
page read and write
3640000
trusted library allocation
page read and write
A9FD000
unkown
page read and write
51E000
heap
page read and write
3638000
trusted library allocation
page read and write
525F000
trusted library allocation
page read and write
51E000
heap
page read and write
3630000
trusted library allocation
page read and write
7FF5D6AB6000
unkown
page readonly
3603000
trusted library allocation
page read and write
1050000
heap
page read and write
28F0000
trusted library allocation
page execute and read and write
F3D000
heap
page read and write
517000
heap
page read and write
8500000
unkown
page read and write
7A0000
heap
page read and write
33D0000
remote allocation
page read and write
9A94000
unkown
page read and write
28DC000
stack
page read and write
35F2000
trusted library allocation
page read and write
106A8000
unkown
page read and write
5584C000
direct allocation
page read and write
51E000
heap
page read and write
A487000
heap
page read and write
3625000
trusted library allocation
page read and write
7FF5D72D7000
unkown
page readonly
9EA5000
heap
page read and write
4461000
heap
page read and write
F0A000
heap
page read and write
11F0000
unkown
page read and write
BAB000
trusted library allocation
page execute and read and write
A227000
heap
page read and write
7DF4F2461000
unkown
page execute read
55850000
direct allocation
page read and write
35E8000
trusted library allocation
page read and write
A701000
heap
page read and write
60720000
unkown
page readonly
3609000
trusted library allocation
page read and write
4D85000
trusted library allocation
page read and write
A7B3000
heap
page read and write
7FF5D75B3000
unkown
page readonly
7FF5D7740000
unkown
page readonly
3638000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
7FF5D75E9000
unkown
page readonly
656000
heap
page read and write
A231000
heap
page read and write
2E80000
unkown
page read and write
A409000
heap
page read and write
3638000
trusted library allocation
page read and write
C5FA000
unkown
page read and write
35D3000
unkown
page read and write
DDF000
stack
page read and write
517000
heap
page read and write
3400000
unkown
page read and write
A78A000
heap
page read and write
21C0000
trusted library allocation
page read and write
A620000
heap
page read and write
151000
unkown
page execute read
A23F000
heap
page read and write
F42000
heap
page read and write
337E000
stack
page read and write
3640000
trusted library allocation
page read and write
936000
stack
page read and write
F50000
heap
page read and write
9D51000
heap
page read and write
F02000
heap
page read and write
49EE0000
direct allocation
page read and write
3638000
trusted library allocation
page read and write
87B0000
unkown
page read and write
7FF5D776F000
unkown
page readonly
3640000
trusted library allocation
page read and write
7FF5D77E9000
unkown
page readonly
9E6F000
heap
page read and write
110F000
stack
page read and write
ABB000
stack
page read and write
51E000
heap
page read and write
9E70000
heap
page read and write
2E80000
unkown
page read and write
3638000
trusted library allocation
page read and write
F34000
heap
page read and write
AF1000
stack
page read and write
6054C000
unkown
page write copy
6A6000
heap
page read and write
35E1000
trusted library allocation
page read and write
1870000
heap
page read and write
C605000
unkown
page read and write
4DEE000
stack
page read and write
9AAA000
unkown
page read and write
4C3E000
stack
page read and write
C4BD000
unkown
page read and write
8500000
unkown
page read and write
40A000
unkown
page read and write
7440000
unkown
page read and write
35D0000
trusted library allocation
page read and write
3619000
trusted library allocation
page read and write
9A98000
unkown
page read and write
2720000
heap
page read and write
A4FE000
heap
page read and write
3638000
trusted library allocation
page read and write
709000
heap
page read and write
9EA000
trusted library allocation
page execute and read and write
3640000
trusted library allocation
page read and write
A60000
heap
page read and write
A520000
heap
page read and write
3640000
trusted library allocation
page read and write
1107000
heap
page read and write
7DF4F2480000
unkown
page readonly
A2C7000
heap
page read and write
34870000
direct allocation
page read and write
61B21000
unkown
page execute read
A2A4000
heap
page read and write
1490000
heap
page read and write
106AF000
unkown
page read and write
360A000
trusted library allocation
page read and write
A6B9000
heap
page read and write
AA5000
heap
page read and write
347F000
stack
page read and write
CFC000
stack
page read and write
2F4E000
stack
page read and write
56C000
heap
page read and write
A213000
heap
page read and write
3627000
trusted library allocation
page read and write
7AA0000
unkown
page read and write
35E0000
trusted library allocation
page read and write
A90000
heap
page read and write
9E6000
trusted library allocation
page execute and read and write
A65000
heap
page read and write
9E98000
heap
page read and write
7FF5D75DF000
unkown
page readonly
9E6B000
heap
page read and write
12D0000
trusted library allocation
page read and write
49E24000
direct allocation
page read and write
23F0000
trusted library allocation
page read and write
A7BA000
heap
page read and write
289E000
stack
page read and write
74C000
stack
page read and write
517000
heap
page read and write
1363000
trusted library allocation
page execute and read and write
7B80000
unkown
page readonly
3640000
trusted library allocation
page read and write
7FF5D76D5000
unkown
page readonly
A769000
heap
page read and write
EE7000
trusted library allocation
page read and write
A40F000
heap
page read and write
3640000
trusted library allocation
page read and write
10B000
stack
page read and write
A250000
heap
page read and write
3617000
trusted library allocation
page read and write
75FD000
unkown
page read and write
10AB8000
unkown
page read and write
3640000
trusted library allocation
page read and write
D7F000
heap
page read and write
9E70000
heap
page read and write
3640000
trusted library allocation
page read and write
9E8A000
heap
page read and write
C30000
trusted library allocation
page read and write
9ADB000
unkown
page read and write
107B000
heap
page read and write
517000
heap
page read and write
D84000
heap
page read and write
6C4000
trusted library allocation
page read and write
7FF5D7760000
unkown
page readonly
400000
unkown
page readonly
1106000
trusted library allocation
page execute and read and write
F42000
heap
page read and write
F42000
heap
page read and write
E8AD000
stack
page read and write
2708000
unkown
page readonly
B00000
heap
page read and write
363C000
trusted library allocation
page read and write
17A0000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
7FF5D7450000
unkown
page readonly
517000
heap
page read and write
51D000
trusted library allocation
page execute and read and write
367A000
trusted library allocation
page read and write
8500000
unkown
page read and write
A16000
heap
page read and write
35E1000
trusted library allocation
page read and write
2E80000
unkown
page read and write
BD0000
trusted library allocation
page read and write
35E1000
trusted library allocation
page read and write
10ABD000
unkown
page read and write
9E88000
heap
page read and write
7FF5D7236000
unkown
page readonly
A492000
heap
page read and write
587F000
stack
page read and write
2FD1000
heap
page read and write
A20000
heap
page read and write
C5F8000
unkown
page read and write
517000
heap
page read and write
A718000
heap
page read and write
35DF000
trusted library allocation
page read and write
7FF5D716B000
unkown
page readonly
35F1000
trusted library allocation
page read and write
106A1000
unkown
page read and write
9F96000
heap
page read and write
A050000
heap
page read and write
49E78000
direct allocation
page read and write
7FF5D760B000
unkown
page readonly
7FF5D77DD000
unkown
page readonly
226D000
stack
page read and write
2770000
heap
page read and write
A590000
heap
page read and write
4D84000
trusted library allocation
page read and write
A2C0000
heap
page read and write
4D7B000
trusted library allocation
page read and write
A4A5000
heap
page read and write
8500000
unkown
page read and write
364E000
trusted library allocation
page read and write
F10C000
stack
page read and write
2F91000
trusted library allocation
page read and write
A292000
heap
page read and write
1DA000
unkown
page write copy
48604000
direct allocation
page read and write
3638000
trusted library allocation
page read and write
B8DB000
stack
page read and write
E6F000
stack
page read and write
35E9000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
FEB000
trusted library allocation
page execute and read and write
A778000
heap
page read and write
ECA000
heap
page read and write
9E9B000
heap
page read and write
8880000
unkown
page readonly
A75C000
heap
page read and write
3640000
trusted library allocation
page read and write
FE7000
trusted library allocation
page execute and read and write
1058000
heap
page read and write
35F1000
trusted library allocation
page read and write
1230000
heap
page read and write
510F000
stack
page read and write
4B00000
unkown
page read and write
9D2B000
heap
page read and write
51E000
heap
page read and write
3640000
trusted library allocation
page read and write
1E0000
heap
page read and write
51E000
heap
page read and write
9E2E000
heap
page read and write
8500000
unkown
page read and write
2FC88000
direct allocation
page read and write
329E000
stack
page read and write
7FF5D74FA000
unkown
page readonly
7FF5D7808000
unkown
page readonly
A9DF000
unkown
page read and write
53E0000
unkown
page readonly
1C9000
unkown
page readonly
7631000
unkown
page read and write
7C70000
unkown
page readonly
2420000
trusted library allocation
page read and write
51E000
heap
page read and write
3640000
trusted library allocation
page read and write
5586C000
direct allocation
page read and write
237E000
stack
page read and write
A6BE000
heap
page read and write
7FF5D7360000
unkown
page readonly
48688000
direct allocation
page read and write
A3F6000
heap
page read and write
7FF5D66E3000
unkown
page readonly
51E000
heap
page read and write
E4CC000
stack
page read and write
41C01000
direct allocation
page read and write
517000
heap
page read and write
8500000
unkown
page read and write
1138000
heap
page read and write
23E1000
trusted library allocation
page read and write
768E000
unkown
page read and write
5261000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
2A0000
unkown
page read and write
A606000
heap
page read and write
F44000
heap
page read and write
936000
stack
page read and write
54E0000
trusted library allocation
page read and write
7DBC000
stack
page read and write
272F000
stack
page read and write
7FF5D77B9000
unkown
page readonly
35F1000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
A0E000
stack
page read and write
51E000
heap
page read and write
35E0000
trusted library allocation
page read and write
9A000
stack
page read and write
7FF5D752F000
unkown
page readonly
7FF5D720A000
unkown
page readonly
3120000
unkown
page read and write
106AF000
unkown
page read and write
AA01000
unkown
page read and write
9E3E000
heap
page read and write
8500000
unkown
page read and write
3640000
trusted library allocation
page read and write
8DCB000
stack
page read and write
9A8E000
unkown
page read and write
7FF5D7523000
unkown
page readonly
D96000
stack
page read and write
3640000
trusted library allocation
page read and write
21A2000
trusted library allocation
page read and write
7D3E000
stack
page read and write
3485C000
direct allocation
page read and write
510000
trusted library allocation
page read and write
7D0000
heap
page read and write
8500000
unkown
page read and write
517000
heap
page read and write
3638000
trusted library allocation
page read and write
9E0000
heap
page read and write
41C50000
direct allocation
page read and write
517000
heap
page read and write
3640000
trusted library allocation
page read and write
A4F4000
heap
page read and write
51E000
heap
page read and write
A2D4000
heap
page read and write
21D0000
heap
page read and write
35F1000
trusted library allocation
page read and write
87E0000
unkown
page read and write
F07000
heap
page read and write
A771000
heap
page read and write
2E80000
unkown
page read and write
3638000
trusted library allocation
page read and write
7FF5D7426000
unkown
page readonly
D47000
heap
page read and write
517000
heap
page read and write
CE0000
heap
page read and write
2FC78000
direct allocation
page read and write
2FD0000
remote allocation
page read and write
7FF5D748A000
unkown
page readonly
2F50000
trusted library allocation
page read and write
41C24000
direct allocation
page read and write
3634000
trusted library allocation
page read and write
B2D000
trusted library allocation
page execute and read and write
3638000
trusted library allocation
page read and write
20CF000
stack
page read and write
1DC000
unkown
page readonly
35EA000
trusted library allocation
page read and write
41C68000
direct allocation
page read and write
EB6000
heap
page read and write
F36000
heap
page read and write
940000
heap
page read and write
2E80000
unkown
page read and write
517000
heap
page read and write
A7EC000
heap
page read and write
9C69000
heap
page read and write
2A42000
trusted library allocation
page read and write
17DA000
trusted library allocation
page execute and read and write
49E68000
direct allocation
page read and write
1586000
trusted library allocation
page read and write
108C000
stack
page read and write
17C0000
trusted library allocation
page read and write
A7FB000
heap
page read and write
51E000
heap
page read and write
A2A2000
unkown
page read and write
1150000
unkown
page read and write
A104000
heap
page read and write
4EB3000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
9E59000
heap
page read and write
5215000
trusted library allocation
page read and write
41B000
unkown
page read and write
8500000
unkown
page read and write
2A45000
trusted library allocation
page read and write
2A7F000
trusted library allocation
page read and write
8500000
unkown
page read and write
517000
heap
page read and write
8500000
unkown
page read and write
3640000
trusted library allocation
page read and write
7FF5D6BDB000
unkown
page readonly
51E000
heap
page read and write
7FF5D77CD000
unkown
page readonly
9AF9000
unkown
page read and write
3641000
trusted library allocation
page read and write
517000
heap
page read and write
3640000
trusted library allocation
page read and write
A203000
heap
page read and write
A055000
heap
page read and write
9D29000
heap
page read and write
9B41000
unkown
page read and write
F07000
heap
page read and write
B74000
trusted library allocation
page read and write
422000
unkown
page read and write
9C35000
heap
page read and write
7C90000
unkown
page read and write
F27000
heap
page read and write
3660000
trusted library allocation
page read and write
C609000
unkown
page read and write
9E82000
heap
page read and write
9E31000
heap
page read and write
9E4A000
heap
page read and write
3640000
trusted library allocation
page read and write
F50000
heap
page read and write
8500000
unkown
page read and write
7FF5D75C1000
unkown
page readonly
4864C000
direct allocation
page read and write
3643000
trusted library allocation
page read and write
10E8F000
unkown
page read and write
3638000
trusted library allocation
page read and write
33D0000
remote allocation
page read and write
1030000
heap
page read and write
A23A000
unkown
page read and write
9B2C000
unkown
page read and write
C61D000
unkown
page read and write
7FF5D7257000
unkown
page readonly
69E000
stack
page read and write
3632000
trusted library allocation
page read and write
7FF5D7292000
unkown
page readonly
3640000
trusted library allocation
page read and write
E62C000
stack
page read and write
2441000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
35D6000
trusted library allocation
page read and write
FDA000
trusted library allocation
page execute and read and write
3640000
trusted library allocation
page read and write
1392000
trusted library allocation
page read and write
51E000
heap
page read and write
517000
heap
page read and write
9FBE000
heap
page read and write
8890000
unkown
page readonly
3641000
trusted library allocation
page read and write
49E2C000
direct allocation
page read and write
221E000
stack
page read and write
5773000
heap
page execute and read and write
7FF5D772C000
unkown
page readonly
1270000
unkown
page read and write
8500000
unkown
page read and write
F03000
heap
page read and write
2A75000
trusted library allocation
page read and write
9E75000
heap
page read and write
F44000
heap
page read and write
517000
heap
page read and write
8500000
unkown
page read and write
1103000
heap
page read and write
8B70000
unkown
page read and write
42E000
unkown
page readonly
2447000
trusted library allocation
page read and write
114C000
heap
page read and write
35F4000
unkown
page read and write
65721000
unkown
page execute read
2848000
trusted library allocation
page read and write
9E67000
heap
page read and write
3638000
trusted library allocation
page read and write
517000
heap
page read and write
F27000
heap
page read and write
7FF5D766E000
unkown
page readonly
517000
heap
page read and write
454000
unkown
page readonly
4AF3000
heap
page execute and read and write
9E9B000
heap
page read and write
8500000
unkown
page read and write
12C7000
trusted library allocation
page read and write
7FF5D7641000
unkown
page readonly
9E66000
heap
page read and write
66121000
unkown
page execute read
14B000
stack
page read and write
7FF5D728E000
unkown
page readonly
2E80000
unkown
page read and write
51E000
heap
page read and write
35F7000
trusted library allocation
page read and write
2ABF000
stack
page read and write
6A10000
unkown
page readonly
35F1000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
2FC8C000
direct allocation
page read and write
F0E000
heap
page read and write
8500000
unkown
page read and write
C7CB000
unkown
page read and write
35D5000
unkown
page read and write
1100000
trusted library allocation
page read and write
163E000
heap
page read and write
F3D000
heap
page read and write
FBF000
stack
page read and write
51E000
heap
page read and write
9E22000
heap
page read and write
2ECE000
stack
page read and write
3638000
trusted library allocation
page read and write
FE2000
trusted library allocation
page read and write
E931000
unkown
page read and write
29DE000
stack
page read and write
135E000
stack
page read and write
F43000
heap
page read and write
8A70000
unkown
page read and write
F50000
heap
page read and write
28E0000
heap
page read and write
A25E000
heap
page read and write
1100000
heap
page read and write
ECB000
heap
page read and write
35F1000
trusted library allocation
page read and write
F44000
heap
page read and write
418000
unkown
page readonly
FEB000
trusted library allocation
page execute and read and write
3170000
unkown
page read and write
5343000
heap
page execute and read and write
51E000
heap
page read and write
1096000
heap
page read and write
8520000
unkown
page read and write
7FF5D77E0000
unkown
page readonly
34824000
direct allocation
page read and write
A35F000
heap
page read and write
548E000
stack
page read and write
2E40000
heap
page execute and read and write
A67D000
heap
page read and write
3C85000
trusted library allocation
page read and write
A3AC000
unkown
page read and write
1450000
heap
page read and write
A08D000
heap
page read and write
362A000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
9E63000
heap
page read and write
517000
heap
page read and write
F44000
heap
page read and write
48698000
direct allocation
page read and write
FA0000
trusted library allocation
page read and write
2E80000
unkown
page read and write
A571000
heap
page read and write
446000
unkown
page readonly
517000
heap
page read and write
A4C6000
heap
page read and write
A6D3000
heap
page read and write
7654000
unkown
page read and write
9E8E000
heap
page read and write
4869C000
direct allocation
page read and write
30A0000
heap
page execute and read and write
3F97000
trusted library allocation
page read and write
F12000
heap
page read and write
A3CB000
heap
page read and write
C8F000
heap
page read and write
CC4000
heap
page read and write
B91000
trusted library allocation
page read and write
2FC40000
direct allocation
page read and write
2E80000
unkown
page read and write
E35000
heap
page read and write
1570000
heap
page read and write
9E59000
heap
page read and write
60519000
unkown
page readonly
1360000
unkown
page readonly
A71E000
heap
page read and write
A5A6000
heap
page read and write
2E80000
unkown
page read and write
A822000
heap
page read and write
FDA000
trusted library allocation
page execute and read and write
340E000
stack
page read and write
C625000
unkown
page read and write
363A000
trusted library allocation
page read and write
138A000
trusted library allocation
page execute and read and write
3638000
trusted library allocation
page read and write
361E000
trusted library allocation
page read and write
3486C000
direct allocation
page read and write
9EB5000
heap
page read and write
28A0000
direct allocation
page execute and read and write
3638000
trusted library allocation
page read and write
11F0000
unkown
page read and write
35FA000
trusted library allocation
page read and write
7FF5D76D7000
unkown
page readonly
10E0000
trusted library allocation
page read and write
A6CC000
heap
page read and write
F03000
heap
page read and write
A65C000
heap
page read and write
119C000
heap
page read and write
517000
heap
page read and write
F50000
heap
page read and write
F21000
heap
page read and write
3640000
trusted library allocation
page read and write
A68F000
heap
page read and write
2EA1000
unkown
page read and write
7FF5D7075000
unkown
page readonly
1150000
unkown
page read and write
51E000
heap
page read and write
35F4000
trusted library allocation
page read and write
C0BA000
stack
page read and write
1150000
unkown
page read and write
C70000
heap
page read and write
9E9C000
heap
page read and write
517000
heap
page read and write
EA4000
trusted library allocation
page read and write
363C000
trusted library allocation
page read and write
2FC14000
direct allocation
page read and write
2717000
trusted library allocation
page read and write
260000
unkown
page readonly
51E000
heap
page read and write
C04000
heap
page read and write
A546000
heap
page read and write
5330000
unkown
page write copy
4C0000
heap
page read and write
B330000
unkown
page read and write
15A0000
heap
page read and write
51E000
heap
page read and write
7FF5D71EF000
unkown
page readonly
E50000
heap
page read and write
9EAD000
heap
page read and write
35F1000
trusted library allocation
page read and write
17B3000
trusted library allocation
page execute and read and write
363E000
trusted library allocation
page read and write
51E000
heap
page read and write
3640000
trusted library allocation
page read and write
3051000
unkown
page read and write
517000
heap
page read and write
A14D000
heap
page read and write
3640000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
A6C8000
heap
page read and write
7FF5D720F000
unkown
page readonly
35F1000
trusted library allocation
page read and write
F50000
heap
page read and write
9E7D000
heap
page read and write
C5EC000
unkown
page read and write
8360000
unkown
page read and write
A538000
heap
page read and write
7FF5D7745000
unkown
page readonly
9EAD000
heap
page read and write
7FF5D7077000
unkown
page readonly
B03B000
stack
page read and write
A286000
unkown
page read and write
A29D000
heap
page read and write
49E4C000
direct allocation
page read and write
1150000
unkown
page read and write
10AB7000
unkown
page read and write
A3AA000
unkown
page read and write
F0E000
heap
page read and write
3638000
trusted library allocation
page read and write
A74B000
heap
page read and write
2FCF000
stack
page read and write
7FF5D77EB000
unkown
page readonly
9D4D000
heap
page read and write
7FF5D7604000
unkown
page readonly
7FF5D72C8000
unkown
page readonly
10E1000
heap
page read and write
7FF5D7691000
unkown
page readonly
4D90000
trusted library allocation
page read and write
41D34000
direct allocation
page read and write
A6AE000
heap
page read and write
EA0000
trusted library allocation
page read and write
A656000
heap
page read and write
55824000
direct allocation
page read and write
9E68000
heap
page read and write
2920000
trusted library allocation
page read and write
C7C6000
unkown
page read and write
517000
heap
page read and write
6D0000
heap
page read and write
1F0000
heap
page read and write
9E87000
heap
page read and write
1590000
trusted library allocation
page read and write
408000
unkown
page readonly
F50000
heap
page read and write
F3B000
heap
page read and write
422000
unkown
page read and write
4D80000
trusted library allocation
page read and write
A2EB000
heap
page read and write
C50000
trusted library allocation
page read and write
3609000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
7FF5D75F9000
unkown
page readonly
51E000
heap
page read and write
3640000
trusted library allocation
page read and write
E82000
heap
page read and write
1150000
unkown
page read and write
9E33000
heap
page read and write
9E67000
heap
page read and write
1397000
trusted library allocation
page execute and read and write
EAD000
trusted library allocation
page execute and read and write
51E000
heap
page read and write
B05000
heap
page read and write
106A3000
unkown
page read and write
35F1000
trusted library allocation
page read and write
35B5000
unkown
page read and write
84BB000
stack
page read and write
517000
heap
page read and write
2656000
trusted library allocation
page read and write
10ABA000
unkown
page read and write
81E000
stack
page read and write
6C6000
heap
page read and write
1128000
heap
page read and write
460000
unkown
page readonly
A2F6000
heap
page read and write
106A5000
unkown
page read and write
A273000
heap
page read and write
A754000
heap
page read and write
2FCAC000
direct allocation
page read and write
F1A000
heap
page read and write
3601000
trusted library allocation
page read and write
7FF5D7396000
unkown
page readonly
60565000
unkown
page read and write
12BE000
stack
page read and write
362D000
unkown
page read and write
9EAF000
heap
page read and write
9FD8000
heap
page read and write
517000
heap
page read and write
F43000
heap
page read and write
77DB000
unkown
page read and write
3640000
trusted library allocation
page read and write
7FF5D71C4000
unkown
page readonly
49BB000
unkown
page read and write
F44000
heap
page read and write
A652000
heap
page read and write
9AC3000
unkown
page read and write
A2BD000
heap
page read and write
517000
heap
page read and write
40B000
unkown
page execute read
BE70000
unkown
page readonly
F33000
heap
page read and write
7FF5D6BE4000
unkown
page readonly
3638000
trusted library allocation
page read and write
ED0000
trusted library allocation
page execute and read and write
35C3000
unkown
page read and write
7FF5D771A000
unkown
page readonly
7FF5D7394000
unkown
page readonly
139B000
trusted library allocation
page execute and read and write
2A80000
heap
page read and write
2FC7C000
direct allocation
page read and write
3638000
trusted library allocation
page read and write
F3F000
heap
page read and write
7FF5D7272000
unkown
page readonly
4A90000
unkown
page read and write
A757000
heap
page read and write
517000
heap
page read and write
51E000
heap
page read and write
8500000
unkown
page read and write
35F1000
trusted library allocation
page read and write
A4CF000
heap
page read and write
3622000
trusted library allocation
page read and write
7FF5D7591000
unkown
page readonly
363A000
trusted library allocation
page read and write
4380000
heap
page read and write
3795000
trusted library allocation
page read and write
517000
heap
page read and write
49EC8000
direct allocation
page read and write
35D1000
unkown
page read and write
9E97000
heap
page read and write
9E8E000
heap
page read and write
60556000
unkown
page read and write
7FF5D7458000
unkown
page readonly
7FF5D72D0000
unkown
page readonly
3640000
trusted library allocation
page read and write
517000
heap
page read and write
3638000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
41CFD000
direct allocation
page read and write
2E8E000
stack
page read and write
2E80000
unkown
page read and write
34854000
direct allocation
page read and write
7FF5D7837000
unkown
page readonly
95FB000
stack
page read and write
9E91000
heap
page read and write
8500000
unkown
page read and write
BDA000
heap
page read and write
3638000
trusted library allocation
page read and write
60565000
unkown
page read and write
3633000
trusted library allocation
page read and write
5463000
unkown
page read and write
106A7000
unkown
page read and write
7FF5D7485000
unkown
page readonly
360A000
trusted library allocation
page read and write
9C2D000
heap
page read and write
51E000
heap
page read and write
2426000
trusted library allocation
page read and write
48AE000
stack
page read and write
3640000
trusted library allocation
page read and write
8500000
unkown
page read and write
11F0000
unkown
page read and write
54E3000
trusted library allocation
page read and write
3661000
trusted library allocation
page read and write
B3E000
stack
page read and write
F11000
heap
page read and write
35E2000
trusted library allocation
page read and write
35E1000
trusted library allocation
page read and write
35E1000
trusted library allocation
page read and write
35E8000
trusted library allocation
page read and write
EA3000
trusted library allocation
page execute and read and write
7605000
unkown
page read and write
3640000
trusted library allocation
page read and write
8500000
unkown
page read and write
A749000
heap
page read and write
3640000
trusted library allocation
page read and write
AFBE000
stack
page read and write
F3B000
heap
page read and write
470000
heap
page read and write
EAC000
heap
page read and write
3825000
trusted library allocation
page read and write
12B0000
unkown
page read and write
2E80000
unkown
page read and write
517000
heap
page read and write
2E80000
unkown
page read and write
8500000
unkown
page read and write
9E5E000
heap
page read and write
2B90000
heap
page read and write
36DA000
trusted library allocation
page read and write
9F0000
heap
page read and write
51E000
heap
page read and write
9E8F000
heap
page read and write
8500000
unkown
page read and write
9A92000
unkown
page read and write
A40E000
unkown
page read and write
2800000
heap
page read and write
9EB0000
heap
page read and write
7FF5D6ABD000
unkown
page readonly
3280000
unkown
page read and write
A207000
heap
page read and write
541B000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
E70000
heap
page read and write
1090000
trusted library allocation
page read and write
2A28000
trusted library allocation
page read and write
9EB1000
heap
page read and write
3638000
trusted library allocation
page read and write
A22B000
heap
page read and write
9E2A000
heap
page read and write
AF6000
stack
page read and write
A843000
heap
page read and write
1410000
trusted library allocation
page execute and read and write
9CF2000
heap
page read and write
2E80000
unkown
page read and write
10AB000
stack
page read and write
8500000
unkown
page read and write
8500000
unkown
page read and write
A319000
heap
page read and write
C34000
trusted library allocation
page read and write
9E95000
heap
page read and write
8510000
unkown
page read and write
7FF5D76C8000
unkown
page readonly
4AB0000
unkown
page read and write
69C000
heap
page read and write
BE90000
unkown
page read and write
F27000
heap
page read and write
7FF5CE33D000
unkown
page readonly
9E88000
heap
page read and write
7FF5D74F2000
unkown
page readonly
9E29000
heap
page read and write
F36000
heap
page read and write
A010000
heap
page read and write
F35000
heap
page read and write
BA0000
trusted library allocation
page read and write
39F7000
trusted library allocation
page read and write
F36000
heap
page read and write
106AF000
unkown
page read and write
3849000
trusted library allocation
page read and write
A2BB000
heap
page read and write
A5AA000
heap
page read and write
7FF5D7385000
unkown
page readonly
41CD0000
direct allocation
page read and write
A3DF000
heap
page read and write
517000
heap
page read and write
F0C000
heap
page read and write
175F000
stack
page read and write
8500000
unkown
page read and write
41C8C000
direct allocation
page read and write
7FF5D6A4B000
unkown
page readonly
7FF5D7065000
unkown
page readonly
48674000
direct allocation
page read and write
D60000
heap
page read and write
517000
heap
page read and write
942E000
stack
page read and write
454000
unkown
page readonly
35FA000
trusted library allocation
page read and write
363A000
trusted library allocation
page read and write
B96000
trusted library allocation
page execute and read and write
9E89000
heap
page read and write
51E000
heap
page read and write
C70000
heap
page read and write
51E000
heap
page read and write
C13000
heap
page read and write
E6A000
heap
page read and write
10AB9000
unkown
page read and write
A7B5000
heap
page read and write
5426000
unkown
page readonly
A4EF000
heap
page read and write
8500000
unkown
page read and write
F51000
heap
page read and write
87B0000
unkown
page read and write
2FD0000
remote allocation
page read and write
4FAE000
stack
page read and write
A2B5000
unkown
page read and write
2AC7000
trusted library allocation
page read and write
F33000
heap
page read and write
3663000
trusted library allocation
page read and write
1281000
unkown
page readonly
3640000
trusted library allocation
page read and write
3606000
trusted library allocation
page read and write
1AE000
stack
page read and write
2270000
heap
page read and write
8500000
unkown
page read and write
7FF5D764F000
unkown
page readonly
A84E000
heap
page read and write
440000
unkown
page readonly
94AB000
stack
page read and write
7FF5D77C2000
unkown
page readonly
5587C000
direct allocation
page read and write
1150000
unkown
page read and write
41CE0000
direct allocation
page read and write
B10000
trusted library allocation
page read and write
10002000
unkown
page readonly
517000
heap
page read and write
8500000
unkown
page read and write
8500000
unkown
page read and write
A316000
heap
page read and write
51E000
heap
page read and write
99E000
stack
page read and write
2FC50000
direct allocation
page read and write
A7F0000
heap
page read and write
8510000
unkown
page read and write
8500000
unkown
page read and write
F20000
heap
page read and write
B80000
trusted library allocation
page execute and read and write
3640000
trusted library allocation
page read and write
F50000
heap
page read and write
517000
heap
page read and write
35F3000
trusted library allocation
page read and write
541E000
trusted library allocation
page read and write
F42000
heap
page read and write
A28D000
unkown
page read and write
F07000
heap
page read and write
2FC38000
direct allocation
page read and write
23E4000
trusted library allocation
page read and write
843F000
stack
page read and write
1731000
unkown
page readonly
FB4000
trusted library allocation
page read and write
8500000
unkown
page read and write
BDE000
heap
page read and write
A3AD000
heap
page read and write
27AC000
heap
page read and write
3638000
trusted library allocation
page read and write
13FF000
stack
page read and write
3638000
trusted library allocation
page read and write
9E65000
heap
page read and write
517000
heap
page read and write
7FF5D71D7000
unkown
page readonly
B4A000
trusted library allocation
page execute and read and write
361E000
trusted library allocation
page read and write
E92000
heap
page read and write
3638000
trusted library allocation
page read and write
A573000
heap
page read and write
8500000
unkown
page read and write
51E000
heap
page read and write
2390000
heap
page read and write
51E000
heap
page read and write
517000
heap
page read and write
51E000
heap
page read and write
7FF5D71AF000
unkown
page readonly
35E8000
trusted library allocation
page read and write
A313000
unkown
page read and write
35F1000
trusted library allocation
page read and write
2FD5000
heap
page read and write
9FAF000
stack
page read and write
E87000
heap
page read and write
365B000
trusted library allocation
page read and write
517000
heap
page read and write
56B000
heap
page read and write
434000
unkown
page read and write
7FF5D738E000
unkown
page readonly
7FF5D72DF000
unkown
page readonly
A561000
heap
page read and write
8500000
unkown
page read and write
F3F000
heap
page read and write
566E000
stack
page read and write
13FE000
stack
page read and write
E00000
unkown
page readonly
1340000
unkown
page read and write
1150000
unkown
page read and write
3640000
trusted library allocation
page read and write
362A000
unkown
page read and write
A7D0000
heap
page read and write
2F65000
trusted library allocation
page read and write
263E000
stack
page read and write
BE0000
heap
page read and write
35E1000
trusted library allocation
page read and write
9E6F000
heap
page read and write
28E4000
heap
page read and write
51E000
heap
page read and write
2791000
heap
page execute and read and write
8500000
unkown
page read and write
9C20000
heap
page read and write
3638000
trusted library allocation
page read and write
4A71000
unkown
page read and write
33B0000
unkown
page readonly
3640000
trusted library allocation
page read and write
AB0000
heap
page read and write
A482000
heap
page read and write
3638000
trusted library allocation
page read and write
9E36000
heap
page read and write
9E9C000
heap
page read and write
9EB6000
heap
page read and write
218E000
stack
page read and write
51EB000
trusted library allocation
page read and write
8500000
unkown
page read and write
F55000
heap
page read and write
A416000
unkown
page read and write
B52000
trusted library allocation
page read and write
10ABE000
unkown
page read and write
1395000
heap
page read and write
A5AC000
heap
page read and write
35E1000
trusted library allocation
page read and write
A7E4000
heap
page read and write
A5DD000
heap
page read and write
439000
unkown
page readonly
3638000
trusted library allocation
page read and write
1450000
heap
page read and write
2460000
heap
page execute and read and write
25FE000
stack
page read and write
4A44000
unkown
page read and write
15D7000
heap
page read and write
9E98000
heap
page read and write
7FF5D7376000
unkown
page readonly
E98000
heap
page read and write
8B70000
unkown
page read and write
7B00000
unkown
page readonly
B220000
unkown
page read and write
1110000
trusted library allocation
page read and write
8500000
unkown
page read and write
F170000
heap
page read and write
23D0000
heap
page execute and read and write
3638000
trusted library allocation
page read and write
62521000
unkown
page execute read
51E000
heap
page read and write
7FF5D7722000
unkown
page readonly
3640000
trusted library allocation
page read and write
1043000
trusted library allocation
page execute and read and write
87B0000
unkown
page read and write
4A5000
heap
page read and write
2E80000
unkown
page read and write
C653000
unkown
page read and write
9D0000
trusted library allocation
page read and write
8C39000
stack
page read and write
1490000
heap
page read and write
39F0000
trusted library allocation
page read and write
1877000
heap
page read and write
3640000
trusted library allocation
page read and write
9CFB000
heap
page read and write
FF0000
heap
page read and write
7FF5D719C000
unkown
page readonly
7FF5D7593000
unkown
page readonly
7FF5D770F000
unkown
page readonly
35D1000
trusted library allocation
page read and write
35FA000
trusted library allocation
page read and write
5582C000
direct allocation
page read and write
3640000
trusted library allocation
page read and write
B85A000
stack
page read and write
9EAB000
heap
page read and write
A20E000
heap
page read and write
A859000
heap
page read and write
51E000
heap
page read and write
A298000
heap
page read and write
A480000
heap
page read and write
51E000
heap
page read and write
500000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
28C0000
direct allocation
page execute and read and write
9E8A000
heap
page read and write
1138000
heap
page read and write
148E000
stack
page read and write
A785000
heap
page read and write
5490000
heap
page read and write
51E000
heap
page read and write
106A2000
unkown
page read and write
360D000
trusted library allocation
page read and write
517000
heap
page read and write
E98000
heap
page read and write
25BE000
stack
page read and write
8500000
unkown
page read and write
3638000
trusted library allocation
page read and write
1085000
heap
page read and write
2950000
trusted library allocation
page read and write
2890000
heap
page read and write
B8D000
trusted library allocation
page execute and read and write
F2E000
stack
page read and write
8500000
unkown
page read and write
53E1000
unkown
page read and write
2E4E000
stack
page read and write
7FF5D747F000
unkown
page readonly
2A80000
trusted library allocation
page read and write
7FF5D77F0000
unkown
page readonly
2708000
unkown
page readonly
51E000
heap
page read and write
366C000
stack
page read and write
23B0000
trusted library allocation
page read and write
9E62000
heap
page read and write
E92C000
stack
page read and write
9E9D000
heap
page read and write
3638000
trusted library allocation
page read and write
F1E000
heap
page read and write
A862000
heap
page read and write
94F4000
unkown
page read and write
2E80000
unkown
page read and write
418000
unkown
page readonly
1000000
heap
page read and write
436000
unkown
page readonly
7FF5D76F5000
unkown
page readonly
258F000
stack
page read and write
3640000
trusted library allocation
page read and write
517000
heap
page read and write
2455000
trusted library allocation
page read and write
40A000
unkown
page write copy
99B9000
unkown
page read and write
284E000
stack
page read and write
35B3000
unkown
page read and write
F55000
heap
page read and write
AAA7000
unkown
page read and write
F60000
heap
page read and write
7FF5D745B000
unkown
page readonly
542E000
trusted library allocation
page read and write
A046000
heap
page read and write
4B3E000
stack
page read and write
49A8000
unkown
page read and write
1150000
unkown
page read and write
8500000
unkown
page read and write
102F000
stack
page read and write
1220000
trusted library allocation
page execute and read and write
8500000
unkown
page read and write
BD7000
heap
page read and write
39F1000
trusted library allocation
page read and write
1150000
unkown
page read and write
F33000
heap
page read and write
A3F2000
heap
page read and write
1169000
heap
page read and write
35E0000
trusted library allocation
page read and write
9E28000
heap
page read and write
9E9C000
heap
page read and write
5445000
trusted library allocation
page read and write
552E000
stack
page read and write
51E000
heap
page read and write
311E000
stack
page read and write
EB6000
heap
page read and write
650000
heap
page read and write
A06C000
heap
page read and write
F10000
heap
page read and write
A82B000
heap
page read and write
10001000
unkown
page execute read
51F0000
trusted library allocation
page read and write
517000
heap
page read and write
F20000
heap
page read and write
A67B000
heap
page read and write
60562000
unkown
page read and write
A7F6000
heap
page read and write
10ED000
trusted library allocation
page execute and read and write
118F000
stack
page read and write
A5C8000
heap
page read and write
9FD0000
heap
page read and write
6F4000
heap
page read and write
A368000
heap
page read and write
4260000
unclassified section
page read and write
517000
heap
page read and write
9AB2000
unkown
page read and write
BA5000
trusted library allocation
page execute and read and write
2D0F000
stack
page read and write
517000
heap
page read and write
3622000
trusted library allocation
page read and write
4860C000
direct allocation
page read and write
48634000
direct allocation
page read and write
84C7000
unkown
page read and write
AA40000
unkown
page read and write
401000
unkown
page execute read
35DD000
trusted library allocation
page read and write
C62000
trusted library allocation
page read and write
7DD0000
heap
page read and write
A215000
heap
page read and write
579000
heap
page read and write
C44F000
stack
page read and write
D1F000
heap
page read and write
3638000
trusted library allocation
page read and write
F39000
heap
page read and write
19A000
stack
page read and write
CBC000
heap
page read and write
7FF5D77C7000
unkown
page readonly
A9A0000
unkown
page read and write
3F91000
trusted library allocation
page read and write
35E1000
trusted library allocation
page read and write
7FF5D7422000
unkown
page readonly
35E1000
trusted library allocation
page read and write
462000
unkown
page readonly
51E000
heap
page read and write
3471000
trusted library allocation
page read and write
8500000
unkown
page read and write
7B20000
unkown
page read and write
AA9E000
unkown
page read and write
4A12000
unkown
page read and write
5414000
trusted library allocation
page read and write
355F000
stack
page read and write
9B000
stack
page read and write
2E80000
unkown
page read and write
A0C3000
heap
page read and write
A288000
heap
page read and write
1110000
trusted library allocation
page read and write
9E2E000
stack
page read and write
9E32000
heap
page read and write
A27D000
heap
page read and write
F37000
heap
page read and write
2A56000
trusted library allocation
page read and write
3797000
trusted library allocation
page read and write
17E7000
trusted library allocation
page execute and read and write
460000
heap
page read and write
9F93000
heap
page read and write
9EB8000
heap
page read and write
35F1000
trusted library allocation
page read and write
A535000
heap
page read and write
6EA000
heap
page read and write
A6A1000
heap
page read and write
F50000
heap
page read and write
A219000
heap
page read and write
35BD000
unkown
page read and write
7FF5D69BB000
unkown
page readonly
3110000
unkown
page readonly
2E80000
unkown
page read and write
1150000
unkown
page read and write
1DB000
unkown
page execute and read and write
2E80000
unkown
page read and write
7FF5D7558000
unkown
page readonly
2956000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
F35000
heap
page read and write
9E38000
heap
page read and write
2A70000
trusted library allocation
page read and write
7FF5D7244000
unkown
page readonly
7DF4F24A1000
unkown
page execute read
8500000
unkown
page read and write
2710000
trusted library allocation
page read and write
83B000
stack
page read and write
42A000
unkown
page read and write
9FBB000
heap
page read and write
34840000
direct allocation
page read and write
7FF5D7705000
unkown
page readonly
106A1000
unkown
page read and write
F11000
heap
page read and write
9EA0000
heap
page read and write
3638000
trusted library allocation
page read and write
35E1000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
446000
unkown
page readonly
F44000
heap
page read and write
1120000
heap
page read and write
7989000
stack
page read and write
3625000
trusted library allocation
page read and write
517000
heap
page read and write
2430000
heap
page read and write
2C0F000
stack
page read and write
BEA0000
unkown
page readonly
A15A000
heap
page read and write
3640000
trusted library allocation
page read and write
10FD000
trusted library allocation
page execute and read and write
CBB000
heap
page read and write
3638000
trusted library allocation
page read and write
4D4F000
stack
page read and write
9E97000
heap
page read and write
10F0000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
F34000
heap
page read and write
63921000
unkown
page execute read
9FE1000
heap
page read and write
FB3000
trusted library allocation
page execute and read and write
8500000
unkown
page read and write
760D000
unkown
page read and write
3640000
trusted library allocation
page read and write
1300000
heap
page read and write
A53B000
heap
page read and write
A854000
heap
page read and write
78E000
stack
page read and write
408000
unkown
page readonly
418000
unkown
page readonly
9E97000
heap
page read and write
7FF5D7429000
unkown
page readonly
A168000
heap
page read and write
87B0000
unkown
page read and write
A2FB000
heap
page read and write
A15D000
heap
page read and write
3D9D000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
51E000
heap
page read and write
9E68000
heap
page read and write
A56B000
heap
page read and write
A565000
heap
page read and write
A26B000
heap
page read and write
9F8E000
heap
page read and write
7FF5D765F000
unkown
page readonly
9E85000
heap
page read and write
A3AA000
heap
page read and write
3640000
trusted library allocation
page read and write
10AB3000
unkown
page read and write
7FF5D7284000
unkown
page readonly
12C1000
trusted library allocation
page read and write
51E000
heap
page read and write
3640000
trusted library allocation
page read and write
1090000
heap
page read and write
7FF5D7700000
unkown
page readonly
9AAC000
unkown
page read and write
1411000
trusted library allocation
page read and write
55878000
direct allocation
page read and write
656000
heap
page read and write
51E000
heap
page read and write
F54000
heap
page read and write
3638000
trusted library allocation
page read and write
106AD000
unkown
page read and write
101A9000
unkown
page read and write
3638000
trusted library allocation
page read and write
17E2000
trusted library allocation
page read and write
57F0000
unkown
page readonly
51E000
heap
page read and write
3638000
trusted library allocation
page read and write
1421000
trusted library allocation
page read and write
112F000
unkown
page read and write
150000
unkown
page readonly
242E000
trusted library allocation
page read and write
7FF5D71EA000
unkown
page readonly
7CF000
stack
page read and write
A2DF000
heap
page read and write
F3E000
stack
page read and write
10E3000
trusted library allocation
page execute and read and write
517000
heap
page read and write
3640000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
F03000
heap
page read and write
3640000
trusted library allocation
page read and write
F3D000
heap
page read and write
8500000
unkown
page read and write
51E000
heap
page read and write
8500000
unkown
page read and write
7C31000
unkown
page read and write
517000
heap
page read and write
F50000
heap
page read and write
7FF5D71A6000
unkown
page readonly
A4F2000
heap
page read and write
3640000
trusted library allocation
page read and write
C78000
heap
page read and write
9E8B000
heap
page read and write
C663000
unkown
page read and write
517000
heap
page read and write
7FF5D71CC000
unkown
page readonly
1364000
trusted library allocation
page read and write
9E90000
heap
page read and write
3638000
trusted library allocation
page read and write
6CA000
heap
page read and write
F10000
heap
page read and write
3619000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
51E000
heap
page read and write
3EFB000
trusted library allocation
page read and write
35E5000
trusted library allocation
page read and write
51E000
heap
page read and write
3640000
trusted library allocation
page read and write
8B70000
unkown
page read and write
10000000
unkown
page readonly
51E000
heap
page read and write
2FC4C000
direct allocation
page read and write
4460000
heap
page read and write
7CE000
stack
page read and write
C17000
heap
page read and write
35DF000
trusted library allocation
page read and write
1850000
trusted library allocation
page execute and read and write
3633000
trusted library allocation
page read and write
17BD000
trusted library allocation
page execute and read and write
DCF000
stack
page read and write
7FF5D75F6000
unkown
page readonly
592E000
stack
page read and write
A2D7000
unkown
page read and write
A347000
heap
page read and write
A75A000
heap
page read and write
35E1000
trusted library allocation
page read and write
8500000
unkown
page read and write
A4B6000
heap
page read and write
A78E000
heap
page read and write
AC88000
heap
page read and write
2E80000
unkown
page read and write
48620000
direct allocation
page read and write
15BF000
heap
page read and write
517000
heap
page read and write
10AB3000
unkown
page read and write
3638000
trusted library allocation
page read and write
AA92000
unkown
page read and write
3638000
trusted library allocation
page read and write
A61A000
heap
page read and write
ECE000
stack
page read and write
A2D8000
heap
page read and write
C67000
trusted library allocation
page execute and read and write
8500000
unkown
page read and write
8500000
unkown
page read and write
A3EC000
heap
page read and write
9A8C000
unkown
page read and write
10154000
unkown
page read and write
4A0E000
unkown
page read and write
BB6000
stack
page read and write
48EE000
stack
page read and write
7FF5D7820000
unkown
page readonly
F03000
heap
page read and write
A4C2000
heap
page read and write
A3F4000
heap
page read and write
96E6000
heap
page read and write
640000
heap
page read and write
51E000
heap
page read and write
7FF5D7267000
unkown
page readonly
1430000
heap
page read and write
500000
heap
page read and write
517000
heap
page read and write
87B0000
unkown
page read and write
790000
heap
page read and write
48F5000
trusted library allocation
page read and write
A52D000
heap
page read and write
3638000
trusted library allocation
page read and write
356C000
stack
page read and write
3BB1000
trusted library allocation
page read and write
9C10000
heap
page read and write
276E000
stack
page read and write
75E0000
unkown
page read and write
7FF5D71E6000
unkown
page readonly
3640000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
4450000
heap
page read and write
3711000
trusted library allocation
page read and write
A72D000
heap
page read and write
35DC000
trusted library allocation
page read and write
9F90000
heap
page read and write
2430000
trusted library allocation
page read and write
382E000
stack
page read and write
E82E000
stack
page read and write
9E85000
heap
page read and write
A3B9000
unkown
page read and write
51E4000
trusted library allocation
page read and write
1150000
unkown
page read and write
8500000
unkown
page read and write
E98000
heap
page read and write
3603000
trusted library allocation
page read and write
23D0000
trusted library allocation
page read and write
1150000
unkown
page read and write
E87000
heap
page read and write
3640000
trusted library allocation
page read and write
9E6F000
heap
page read and write
8500000
unkown
page read and write
EAC000
heap
page read and write
FD6000
trusted library allocation
page execute and read and write
7FF5D75B8000
unkown
page readonly
3640000
trusted library allocation
page read and write
7FF5D71BF000
unkown
page readonly
893D000
unkown
page read and write
2F7F000
stack
page read and write
3638000
trusted library allocation
page read and write
3619000
trusted library allocation
page read and write
66B21000
unkown
page execute read
8500000
unkown
page read and write
8500000
unkown
page read and write
9D55000
heap
page read and write
517000
heap
page read and write
BCB000
heap
page read and write
9E25000
heap
page read and write
35DC000
unkown
page read and write
9DAE000
heap
page read and write
4E01000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
A51D000
heap
page read and write
28B0000
direct allocation
page read and write
131F000
stack
page read and write
87B0000
unkown
page read and write
9E5B000
heap
page read and write
530E000
stack
page read and write
E37000
heap
page read and write
A71C000
heap
page read and write
5AD000
heap
page read and write
1150000
unkown
page read and write
15FD000
heap
page read and write
A295000
heap
page read and write
7FF5D781A000
unkown
page readonly
60554000
unkown
page write copy
F172000
heap
page read and write
106A5000
unkown
page read and write
A73E000
heap
page read and write
7AC0000
unkown
page read and write
363A000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
9EA3000
heap
page read and write
517000
heap
page read and write
F37000
heap
page read and write
F70000
heap
page read and write
F36000
heap
page read and write
10294000
unkown
page read and write
87B0000
unkown
page read and write
517000
heap
page read and write
8500000
unkown
page read and write
51E000
heap
page read and write
A2AF000
heap
page read and write
10AB2000
unkown
page read and write
570000
heap
page read and write
A6D1000
heap
page read and write
9E90000
heap
page read and write
9FFF000
heap
page read and write
28CA000
heap
page read and write
A391000
unkown
page read and write
51E000
heap
page read and write
F1FC000
stack
page read and write
9C40000
heap
page read and write
B90000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
8500000
unkown
page read and write
A1AF000
stack
page read and write
9E90000
heap
page read and write
3641000
trusted library allocation
page read and write
A251000
unkown
page read and write
510000
heap
page read and write
85BE000
stack
page read and write
6CD000
trusted library allocation
page execute and read and write
35EA000
trusted library allocation
page read and write
55868000
direct allocation
page read and write
9E78000
heap
page read and write
A5D0000
heap
page read and write
9EB0000
heap
page read and write
A640000
heap
page read and write
7FF5D748C000
unkown
page readonly
8500000
unkown
page read and write
593F000
trusted library allocation
page read and write
F13000
heap
page read and write
9E0000
heap
page read and write
2750000
trusted library allocation
page read and write
9EA2000
heap
page read and write
A59F000
heap
page read and write
62F21000
unkown
page execute read
9E64000
heap
page read and write
418000
unkown
page readonly
B0BD000
stack
page read and write
27BD000
stack
page read and write
17B4000
trusted library allocation
page read and write
9A9E000
unkown
page read and write
F35000
heap
page read and write
444F000
stack
page read and write
64B000
trusted library allocation
page execute and read and write
9E4C000
heap
page read and write
A52A000
heap
page read and write
9C31000
heap
page read and write
41C78000
direct allocation
page read and write
F27000
heap
page read and write
2A1E000
trusted library allocation
page read and write
348BC000
direct allocation
page read and write
E90000
trusted library allocation
page read and write
1150000
unkown
page read and write
51E000
heap
page read and write
9C000
stack
page read and write
7FF5D75AF000
unkown
page readonly
A77B000
heap
page read and write
BA7000
trusted library allocation
page execute and read and write
3638000
trusted library allocation
page read and write
650000
heap
page read and write
17B000
stack
page read and write
517000
heap
page read and write
C460000
unkown
page read and write
8500000
unkown
page read and write
3638000
trusted library allocation
page read and write
9E23000
heap
page read and write
7FF5D7546000
unkown
page readonly
8A00000
unkown
page read and write
A9E9000
unkown
page read and write
2940000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
517000
heap
page read and write
5E7000
heap
page read and write
28D0000
direct allocation
page read and write
12E0000
heap
page execute and read and write
F27000
heap
page read and write
3140000
unkown
page read and write
3640000
trusted library allocation
page read and write
517000
heap
page read and write
3638000
trusted library allocation
page read and write
9E9C000
heap
page read and write
10192000
unkown
page read and write
8500000
unkown
page read and write
7FF5D7482000
unkown
page readonly
60441000
unkown
page execute read
D80000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
C05000
heap
page read and write
F32000
heap
page read and write
35EC000
trusted library allocation
page read and write
517000
heap
page read and write
A7A7000
heap
page read and write
7FF5D729E000
unkown
page readonly
2ABF000
stack
page read and write
B30000
trusted library allocation
page read and write
7B10000
unkown
page read and write
A721000
heap
page read and write
7FF5D7648000
unkown
page readonly
D98000
heap
page read and write
3660000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
34801000
direct allocation
page read and write
2A2E000
trusted library allocation
page read and write
2A98000
trusted library allocation
page read and write
525A000
trusted library allocation
page read and write
7FF5D76AF000
unkown
page readonly
9E29000
heap
page read and write
2FCB0000
direct allocation
page read and write
A504000
heap
page read and write
517000
heap
page read and write
3640000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
41B000
unkown
page read and write
1150000
unkown
page read and write
A610000
heap
page read and write
517000
heap
page read and write
35F5000
trusted library allocation
page read and write
B4D0000
unkown
page readonly
A384000
unkown
page read and write
51E000
heap
page read and write
7B60000
unkown
page readonly
9E89000
heap
page read and write
3640000
trusted library allocation
page read and write
7FF5D75D6000
unkown
page readonly
87B0000
unkown
page read and write
1380000
heap
page read and write
9E83000
heap
page read and write
4986000
unkown
page read and write
3638000
trusted library allocation
page read and write
35F1000
trusted library allocation
page read and write
2E80000
unkown
page read and write
9E20000
heap
page read and write
761E000
unkown
page read and write
7FF5D74C3000
unkown
page readonly
9CF000
stack
page read and write
7FF5D779E000
unkown
page readonly
3608000
trusted library allocation
page read and write
EB3B000
unkown
page read and write
556E000
stack
page read and write
35F0000
trusted library allocation
page read and write
4340000
heap
page read and write
D8B000
heap
page read and write
A392000
heap
page read and write
9E99000
heap
page read and write
2370000
heap
page read and write
A57E000
heap
page read and write
363A000
trusted library allocation
page read and write
2C4D000
stack
page read and write
5CE000
stack
page read and write
1460000
heap
page read and write
D64000
heap
page read and write
8500000
unkown
page read and write
9EB0000
unkown
page readonly
6E0000
heap
page read and write
2A81000
trusted library allocation
page read and write
A871000
heap
page read and write
7FF5D7309000
unkown
page readonly
60440000
unkown
page readonly
A308000
heap
page read and write
9E69000
heap
page read and write
6D8000
heap
page read and write
51E000
heap
page read and write
5860000
unkown
page readonly
9DE5000
heap
page read and write
1370000
trusted library allocation
page read and write
1DA000
unkown
page read and write
3613000
trusted library allocation
page read and write
F54000
heap
page read and write
2FE0000
heap
page read and write
7FF5D7643000
unkown
page readonly
41CF0000
direct allocation
page read and write
B80000
trusted library allocation
page read and write
A03A000
heap
page read and write
4EE000
stack
page read and write
F10000
heap
page read and write
F50000
heap
page read and write
8500000
unkown
page read and write
C40000
trusted library allocation
page read and write
4AC0000
unkown
page read and write
9AA0000
unkown
page read and write
108E000
stack
page read and write
3638000
trusted library allocation
page read and write
10AB9000
unkown
page read and write
6597000
unkown
page readonly
3607000
trusted library allocation
page read and write
3630000
unkown
page readonly
3640000
trusted library allocation
page read and write
F54000
heap
page read and write
4AF0000
heap
page execute and read and write
9E99000
heap
page read and write
6CB000
heap
page read and write
A18A000
heap
page read and write
517000
heap
page read and write
9E60000
heap
page read and write
BFF000
heap
page read and write
7FF5D77E3000
unkown
page readonly
517000
heap
page read and write
EB5000
stack
page read and write
3660000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
A312000
heap
page read and write
60562000
unkown
page read and write
348D0000
direct allocation
page read and write
51E000
heap
page read and write
2AB0000
trusted library allocation
page read and write
F3D000
heap
page read and write
51E000
heap
page read and write
98FD000
stack
page read and write
35F1000
trusted library allocation
page read and write
6B0000
trusted library allocation
page read and write
8500000
unkown
page read and write
51E000
heap
page read and write
3617000
trusted library allocation
page read and write
F0A000
heap
page read and write
87B0000
unkown
page read and write
A808000
heap
page read and write
E98000
heap
page read and write
10ABC000
unkown
page read and write
9CE5000
heap
page read and write
8500000
unkown
page read and write
CE5000
heap
page read and write
A7BE000
heap
page read and write
7AB0000
unkown
page read and write
6E58000
unkown
page readonly
51FE000
trusted library allocation
page read and write
517000
heap
page read and write
A237000
unkown
page read and write
7FF5D7442000
unkown
page readonly
87B0000
unkown
page read and write
9E2C000
heap
page read and write
4868C000
direct allocation
page read and write
9CA6000
heap
page read and write
34844000
direct allocation
page read and write
3638000
trusted library allocation
page read and write
77A000
heap
page read and write
8CF000
stack
page read and write
A5CE000
heap
page read and write
8500000
unkown
page read and write
51E000
heap
page read and write
31B1000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
49FD000
unkown
page read and write
3626000
unkown
page read and write
FA0000
heap
page read and write
A156000
heap
page read and write
A697000
heap
page read and write
2F6A000
trusted library allocation
page read and write
F43000
heap
page read and write
A738000
heap
page read and write
35F1000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
7E0000
heap
page read and write
3638000
trusted library allocation
page read and write
8500000
unkown
page read and write
7FF5D77F7000
unkown
page readonly
7FF5D7407000
unkown
page readonly
7FF5D74B8000
unkown
page readonly
2E80000
unkown
page read and write
8500000
unkown
page read and write
3640000
trusted library allocation
page read and write
9EAC000
heap
page read and write
7FF5D7797000
unkown
page readonly
348A4000
direct allocation
page read and write
A48F000
heap
page read and write
3617000
trusted library allocation
page read and write
2FD1000
heap
page read and write
7FF5D71DA000
unkown
page readonly
C65E000
unkown
page read and write
A833000
heap
page read and write
517000
heap
page read and write
9E6D000
heap
page read and write
9EAE000
stack
page read and write
7460000
unkown
page read and write
F50000
heap
page read and write
248E000
stack
page read and write
35F1000
trusted library allocation
page read and write
A668000
heap
page read and write
35D1000
trusted library allocation
page read and write
99C0000
unkown
page read and write
49EB0000
direct allocation
page read and write
48630000
direct allocation
page read and write
2640000
heap
page execute and read and write
9E9D000
heap
page read and write
3638000
trusted library allocation
page read and write
10ABE000
unkown
page read and write
3640000
trusted library allocation
page read and write
106AA000
unkown
page read and write
50CD000
stack
page read and write
2E80000
unkown
page read and write
2E51000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
B559000
stack
page read and write
517000
heap
page read and write
A63A000
heap
page read and write
1420000
heap
page read and write
8520000
unkown
page read and write
A5E5000
heap
page read and write
A330000
heap
page read and write
3520000
unkown
page readonly
1150000
unkown
page read and write
7FF5D776D000
unkown
page readonly
7810000
unkown
page read and write
A0C2000
heap
page read and write
7435000
stack
page read and write
17E0000
trusted library allocation
page read and write
1800000
trusted library allocation
page read and write
517000
heap
page read and write
F13000
heap
page read and write
9CF0000
heap
page read and write
106A7000
unkown
page read and write
4A16000
unkown
page read and write
A69A000
heap
page read and write
35F1000
trusted library allocation
page read and write
7FF5D77DA000
unkown
page readonly
278E000
stack
page read and write
2E3C000
stack
page read and write
5320000
heap
page execute and read and write
99BD000
unkown
page read and write
1417000
trusted library allocation
page read and write
7693000
unkown
page read and write
8500000
unkown
page read and write
3602000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
A82F000
heap
page read and write
7FF5D7455000
unkown
page readonly
A238000
heap
page read and write
F0A000
heap
page read and write
C800000
unkown
page read and write
51E000
heap
page read and write
9E20000
heap
page read and write
36E0000
trusted library allocation
page read and write
647000
heap
page read and write
111B000
trusted library allocation
page execute and read and write
3638000
trusted library allocation
page read and write
7FF5D7507000
unkown
page readonly
EB32000
unkown
page read and write
7FF5D75A6000
unkown
page readonly
EF0000
heap
page read and write
9E6D000
heap
page read and write
3638000
trusted library allocation
page read and write
F36000
heap
page read and write
3661000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
11A6000
stack
page read and write
7FF5D7404000
unkown
page readonly
4A2E000
stack
page read and write
10AB3000
unkown
page read and write
A320000
heap
page read and write
3640000
trusted library allocation
page read and write
1150000
unkown
page read and write
7FF5D744E000
unkown
page readonly
1D0000
heap
page read and write
9A84000
unkown
page read and write
486E0000
direct allocation
page read and write
A211000
heap
page read and write
AA0000
heap
page read and write
F13000
heap
page read and write
1112000
trusted library allocation
page read and write
C61B000
unkown
page read and write
179F000
stack
page read and write
3640000
trusted library allocation
page read and write
595000
unkown
page execute read
3640000
trusted library allocation
page read and write
A1CC000
heap
page read and write
55801000
direct allocation
page read and write
A632000
heap
page read and write
A790000
heap
page read and write
C73E000
unkown
page read and write
1160000
unkown
page read and write
A85C000
heap
page read and write
110A000
trusted library allocation
page execute and read and write
8500000
unkown
page read and write
A264000
unkown
page read and write
1400000
trusted library allocation
page read and write
2F8F000
stack
page read and write
A53D000
heap
page read and write
1154000
heap
page read and write
7FF5D7230000
unkown
page readonly
87B0000
unkown
page read and write
2720000
trusted library allocation
page read and write
5255000
trusted library allocation
page read and write
C78A000
unkown
page read and write
7FF5D6BEF000
unkown
page readonly
4DA0000
heap
page execute and read and write
51E000
heap
page read and write
F42000
heap
page read and write
C450000
unkown
page read and write
49E7C000
direct allocation
page read and write
7FF5D770A000
unkown
page readonly
7FF5D77FD000
unkown
page readonly
3603000
trusted library allocation
page read and write
8500000
unkown
page read and write
41C6C000
direct allocation
page read and write
106AF000
unkown
page read and write
9D3D000
heap
page read and write
151000
unkown
page execute read
517000
heap
page read and write
517000
heap
page read and write
8500000
unkown
page read and write
571E000
stack
page read and write
3618000
trusted library allocation
page read and write
9E92000
heap
page read and write
3611000
trusted library allocation
page read and write
779E000
unkown
page read and write
361E000
trusted library allocation
page read and write
A220000
unkown
page read and write
C615000
unkown
page read and write
A233000
unkown
page read and write
7FF5D71C8000
unkown
page readonly
E10000
heap
page read and write
19A000
stack
page read and write
C9D1000
unkown
page read and write
1656000
heap
page read and write
48684000
direct allocation
page read and write
8520000
unkown
page read and write
3640000
trusted library allocation
page read and write
517000
heap
page read and write
13B0000
trusted library allocation
page read and write
7DF4F2491000
unkown
page execute read
1087000
heap
page read and write
363E000
trusted library allocation
page read and write
242B000
trusted library allocation
page read and write
F80000
heap
page read and write
106A7000
unkown
page read and write
3633000
trusted library allocation
page read and write
71F0000
unkown
page readonly
41C60000
direct allocation
page read and write
7C0000
heap
page read and write
6056E000
unkown
page readonly
486A8000
direct allocation
page read and write
3638000
trusted library allocation
page read and write
BD0000
heap
page read and write
A2D1000
heap
page read and write
F50000
heap
page read and write
35E0000
trusted library allocation
page read and write
A6D6000
heap
page read and write
F03000
heap
page read and write
BB0D000
stack
page read and write
3640000
trusted library allocation
page read and write
C81C000
unkown
page read and write
820000
heap
page read and write
2E80000
unkown
page read and write
35F1000
trusted library allocation
page read and write
9A76000
unkown
page read and write
F10000
heap
page read and write
106AF000
unkown
page read and write
51E000
heap
page read and write
517000
heap
page read and write
B05D000
heap
page read and write
9E81000
heap
page read and write
A5F7000
heap
page read and write
35E0000
trusted library allocation
page read and write
7FF5D77A4000
unkown
page readonly
7FF5D77D2000
unkown
page readonly
7FF5D72BD000
unkown
page readonly
3638000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
A48B000
heap
page read and write
3638000
trusted library allocation
page read and write
A568000
heap
page read and write
2A6F000
stack
page read and write
8500000
unkown
page read and write
51E000
heap
page read and write
A425000
heap
page read and write
2E8E000
stack
page read and write
51E000
heap
page read and write
96FE000
stack
page read and write
33D0000
remote allocation
page read and write
F33000
heap
page read and write
10D0000
trusted library allocation
page read and write
990000
heap
page read and write
35EF000
trusted library allocation
page read and write
9E8D000
heap
page read and write
9E9E000
heap
page read and write
3638000
trusted library allocation
page read and write
A0BA000
heap
page read and write
28CE000
heap
page read and write
87B0000
unkown
page read and write
8500000
unkown
page read and write
C669000
unkown
page read and write
517000
heap
page read and write
51E000
heap
page read and write
2A00000
trusted library allocation
page read and write
EB3C000
unkown
page read and write
9C35000
heap
page read and write
A62F000
heap
page read and write
517000
heap
page read and write
D5E000
heap
page read and write
9E83000
heap
page read and write
42C0000
heap
page read and write
9D03000
heap
page read and write
3640000
trusted library allocation
page read and write
9E29000
heap
page read and write
F35000
heap
page read and write
279F000
heap
page read and write
9A72000
unkown
page read and write
35B0000
unkown
page read and write
A36E000
heap
page read and write
9E78000
heap
page read and write
486C0000
direct allocation
page read and write
3160000
unkown
page read and write
517000
heap
page read and write
1350000
unkown
page readonly
A224000
heap
page read and write
A04A000
heap
page read and write
2E80000
unkown
page read and write
7FF5D7336000
unkown
page readonly
51E000
heap
page read and write
2DFF000
stack
page read and write
45B000
unkown
page readonly
BC0000
trusted library allocation
page read and write
C9CB000
unkown
page read and write
4D8A000
trusted library allocation
page read and write
6D0000
heap
page read and write
A38E000
heap
page read and write
8500000
unkown
page read and write
517000
heap
page read and write
3638000
trusted library allocation
page read and write
A5F5000
heap
page read and write
111B000
heap
page read and write
2FC24000
direct allocation
page read and write
3640000
trusted library allocation
page read and write
2910000
heap
page execute and read and write
3619000
trusted library allocation
page read and write
FEE000
stack
page read and write
9AA8000
unkown
page read and write
C20000
trusted library allocation
page read and write
2FD0000
heap
page read and write
2708000
unkown
page readonly
51E000
heap
page read and write
28AE000
stack
page read and write
C621000
unkown
page read and write
339E000
stack
page read and write
A3FA000
heap
page read and write
3640000
trusted library allocation
page read and write
21AB000
trusted library allocation
page execute and read and write
8500000
unkown
page read and write
B7E000
stack
page read and write
1380000
trusted library allocation
page read and write
7C80000
unkown
page read and write
517000
heap
page read and write
243E000
trusted library allocation
page read and write
517000
heap
page read and write
2387000
trusted library allocation
page read and write
E6E000
heap
page read and write
A325000
heap
page read and write
7FF5D75FF000
unkown
page readonly
F54000
heap
page read and write
35D5000
trusted library allocation
page read and write
9E97000
heap
page read and write
19D000
stack
page read and write
401000
unkown
page execute read
B054000
heap
page read and write
53E2000
unkown
page readonly
BD0000
heap
page read and write
2BBF000
stack
page read and write
A2B3000
heap
page read and write
517000
heap
page read and write
2A73000
trusted library allocation
page read and write
9E8A000
heap
page read and write
3489000
stack
page read and write
3000000
heap
page read and write
C642000
unkown
page read and write
87E0000
unkown
page read and write
51E000
heap
page read and write
108E000
stack
page read and write
7FF5D7073000
unkown
page readonly
3640000
trusted library allocation
page read and write
51E000
heap
page read and write
37B9000
trusted library allocation
page read and write
2A12000
trusted library allocation
page read and write
A648000
heap
page read and write
525C000
trusted library allocation
page read and write
2960000
heap
page read and write
A597000
heap
page read and write
F10000
heap
page read and write
3640000
trusted library allocation
page read and write
517000
heap
page read and write
20E0000
heap
page read and write
51E000
heap
page read and write
3640000
trusted library allocation
page read and write
4F6000
stack
page read and write
35E0000
trusted library allocation
page read and write
8F6000
stack
page read and write
87B0000
unkown
page read and write
A17C000
heap
page read and write
10D71000
unkown
page read and write
4D8C000
trusted library allocation
page read and write
5EF0000
unkown
page readonly
1034D000
stack
page read and write
F17A000
heap
page read and write
7FF5D7694000
unkown
page readonly
11E8000
stack
page read and write
48601000
direct allocation
page read and write
C47F000
unkown
page read and write
96C000
stack
page read and write
35E8000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
2E80000
unkown
page read and write
51E000
heap
page read and write
EB3F000
unkown
page read and write
3640000
trusted library allocation
page read and write
595000
unkown
page execute read
9E2C000
heap
page read and write
A2DC000
heap
page read and write
3638000
trusted library allocation
page read and write
642000
trusted library allocation
page read and write
DF0000
heap
page read and write
2A7F000
stack
page read and write
A273000
unkown
page read and write
8510000
unkown
page read and write
35CD000
unkown
page read and write
536000
trusted library allocation
page execute and read and write
56AE000
stack
page read and write
BF0000
heap
page read and write
8500000
unkown
page read and write
A080000
heap
page read and write
2A7D000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
AA04000
unkown
page read and write
517000
heap
page read and write
35F1000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
7FF5D705D000
unkown
page readonly
35DA000
trusted library allocation
page read and write
9E91000
heap
page read and write
BBF000
heap
page read and write
A016000
heap
page read and write
FD0000
trusted library allocation
page read and write
A3D9000
heap
page read and write
35F1000
trusted library allocation
page read and write
60E000
stack
page read and write
3640000
trusted library allocation
page read and write
51E000
heap
page read and write
A39C000
unkown
page read and write
C5FD000
unkown
page read and write
2E80000
unkown
page read and write
2D4E000
stack
page read and write
401000
unkown
page execute read
B9A000
trusted library allocation
page execute and read and write
A525000
heap
page read and write
E6AC000
stack
page read and write
49E88000
direct allocation
page read and write
3659000
trusted library allocation
page read and write
360A000
trusted library allocation
page read and write
35F2000
trusted library allocation
page read and write
9E64000
heap
page read and write
A02E000
stack
page read and write
8EF000
stack
page read and write
55840000
direct allocation
page read and write
35F1000
trusted library allocation
page read and write
51E000
heap
page read and write
273F000
heap
page read and write
15CB000
heap
page read and write
B92000
trusted library allocation
page read and write
7FE000
stack
page read and write
4867C000
direct allocation
page read and write
35E1000
trusted library allocation
page read and write
51E000
heap
page read and write
3638000
trusted library allocation
page read and write
7FF5D7703000
unkown
page readonly
9E2D000
heap
page read and write
ECB000
heap
page read and write
8500000
unkown
page read and write
5313000
trusted library allocation
page read and write
8500000
unkown
page read and write
3781000
trusted library allocation
page read and write
BB0000
heap
page read and write
35D1000
trusted library allocation
page read and write
7E60000
unkown
page read and write
27F0000
heap
page read and write
9EB0000
heap
page read and write
A33F000
unkown
page read and write
8510000
unkown
page read and write
3640000
trusted library allocation
page read and write
51E000
heap
page read and write
FE2000
trusted library allocation
page read and write
45B000
unkown
page readonly
51E000
heap
page read and write
8948000
unkown
page read and write
2954000
trusted library allocation
page read and write
34860000
direct allocation
page read and write
23C0000
trusted library allocation
page execute and read and write
A551000
heap
page read and write
9E9B000
heap
page read and write
9A6A000
unkown
page read and write
48644000
direct allocation
page read and write
350F000
stack
page read and write
35C9000
unkown
page read and write
9ABD000
unkown
page read and write
A56E000
heap
page read and write
3638000
trusted library allocation
page read and write
A10000
heap
page read and write
3630000
trusted library allocation
page read and write
595000
unkown
page execute read
F50000
heap
page read and write
35D1000
trusted library allocation
page read and write
C9A7000
unkown
page read and write
3638000
trusted library allocation
page read and write
7FF5D66E8000
unkown
page readonly
9E6F000
heap
page read and write
There are 3421 hidden memdumps, click here to show them.