IOC Report
OBbrO5rwew.exe

loading gif

Files

File Path
Type
Category
Malicious
OBbrO5rwew.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\huge[1].dat
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\2391.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\4CC4.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\77CD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\nsc1466.tmp\liteFirewall.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsm4B00.tmp\blowfish.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Del.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\deetubv
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\deetubv:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsm4B00.tmp\INetC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsm4B00.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nstA4F2.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsx4AF0.tmp
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
data
modified
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\cef.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
data
dropped
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\start.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
MSVC program database ver 7.00, 512*4023 bytes
dropped
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 106 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OBbrO5rwew.exe
"C:\Users\user\Desktop\OBbrO5rwew.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\deetubv
C:\Users\user\AppData\Roaming\deetubv
malicious
C:\Users\user\AppData\Local\Temp\2391.exe
C:\Users\user\AppData\Local\Temp\2391.exe
malicious
C:\Users\user\AppData\Local\Temp\4CC4.exe
C:\Users\user\AppData\Local\Temp\4CC4.exe
malicious
C:\Users\user\AppData\Local\Temp\77CD.exe
C:\Users\user\AppData\Local\Temp\77CD.exe
malicious
C:\Users\user\AppData\Roaming\deetubv
C:\Users\user\AppData\Roaming\deetubv
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
"C:\Users\user\AppData\Local\Temp\setup.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 9; SM-J730G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.122 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3400 --field-trial-handle=3412,i,12963406170679374430,9093183945598996200,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 9; SM-J730G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.122 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3976 --field-trial-handle=3412,i,12963406170679374430,9093183945598996200,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 9; SM-J730G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.122 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4012 --field-trial-handle=3412,i,12963406170679374430,9093183945598996200,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 9; SM-J730G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.122 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719944520561396 --launch-time-ticks=5329031925 --mojo-platform-channel-handle=4048 --field-trial-handle=3412,i,12963406170679374430,9093183945598996200,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 9; SM-J730G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.122 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719944520561396 --launch-time-ticks=5329056479 --mojo-platform-channel-handle=4108 --field-trial-handle=3412,i,12963406170679374430,9093183945598996200,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://gebeus.ru/tmp/index.php
malicious
http://cx5519.com/tmp/index.php
malicious
contintnetksows.shop
malicious
http://evilos.cc/tmp/index.php
malicious
ellaboratepwsz.xyz
malicious
swellfrrgwwos.xyz
malicious
foodypannyjsud.shop
malicious
pedestriankodwu.xyz
malicious
towerxxuytwi.xyz
malicious
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://foodypannyjsud.shop/s
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://www.google.com/chrome/privacy/eula_text.html
unknown
https://foodypannyjsud.shop/api8
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
unknown
http://api.install-stat.debug.world/clients/activity=4P
unknown
http://api.install-stat.debug.world/clients/activitynep
unknown
https://excel.office.com
unknown
http://crbug.com/510270
unknown
https://chrome.google.com/webstore?hl=urCtrl$2
unknown
https://foodypannyjsud.shop/api(
unknown
http://crbug.com/378067
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://www.google.com/cloudprint
unknown
https://passwords.google.com
unknown
http://crbug.com/497301
unknown
https://github.com/JamesNK/Newtonsoft.Json/issues/652
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
unknown
https://foodypannyjsud.shop/piD;
unknown
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
unknown
https://foodypannyjsud.shop/H
unknown
http://bageyou.xyz
unknown
http://crbug.com/642141
unknown
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://bitbucket.org/
unknown
https://foodypannyjsud.shop//
unknown
https://foodypannyjsud.shop/piS
unknown
https://foodypannyjsud.shop/4
unknown
https://support.google.com/chromebook?p=app_intent
unknown
http://crbug.com/717501
unknown
http://crbug.com/957772
unknown
http://crbug.com/839189
unknown
https://chrome.google.com/webstore
unknown
https://foodypannyjsud.shop/6C
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.google.com/chrome/privacy/eula_text.html&
unknown
https://www.google.com/chrome/privacy/eula_text.htmlT&r
unknown
https://www.ecosia.org/newtab/
unknown
http://xiexie.wf/22_551/huge.dat
unknown
http://crbug.com/819404
unknown
https://outlook.com
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://crbug.com/514696
unknown
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
https://foodypannyjsud.shop/apiK
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chrome.google.com/webstore?hl=ukCtrl$1
unknown
https://foodypannyjsud.shop/pi6;
unknown
https://android.notify.windows.com/iOS
unknown
http://api.install-stat.debug.world/clients/installs
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://support.google.com/chrome/a/answer/9122284
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://chrome.google.com/webstore/
unknown
https://foodypannyjsud.shop/ng
unknown
https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://www.google.com/
unknown
http://api.install-stat.debug.world/clients/activity=4
unknown
https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
unknown
https://chrome.google.com/webstore?hl=zh-CNCtrl$1
unknown
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
unknown
https://word.office.comon
unknown
http://xiexie.wf/
unknown
https://foodypannyjsud.shop:443/apicrosoft
unknown
https://support.google.com/chrome/answer/6258784
unknown
https://powerpoint.office.comcember
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
unknown
http://crbug.com/775961
unknown
https://foodypannyjsud.shop/(((
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
https://www.newtonsoft.com/json
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://codereview.chromium.org/25305002).
unknown
http://schemas.micro
unknown
http://api.install-stat.debug.world/clients/activity
unknown
https://chrome.google.com/webstore?hl=zh-TWCtrl$1
unknown
http://www.apache.org/).
unknown
https://foodypannyjsud.shop/api
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
186.233.231.45
unknown
Brazil
malicious
188.114.97.3
unknown
European Union
malicious
141.8.192.126
unknown
Russian Federation
malicious
188.55.174.170
unknown
Saudi Arabia
malicious
185.68.16.7
unknown
Ukraine
malicious
127.0.0.127
unknown
unknown
malicious
146.70.169.164
unknown
United Kingdom
malicious
104.192.141.1
unknown
United States
104.21.45.251
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000B0236
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000D0018
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\GamePall
Sid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Pid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GamePall
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
DontShowUI
HKEY_CURRENT_USER\SOFTWARE\GamePall
tmp_uid
HKEY_CURRENT_USER\SOFTWARE\GamePall
reg
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\GamePall
uid
HKEY_CURRENT_USER\Control Panel\Cursors
AppStarting
There are 200 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
28B0000
direct allocation
page read and write
malicious
28D1000
unclassified section
page read and write
malicious
2801000
unclassified section
page read and write
malicious
1338000
heap
page read and write
malicious
38D0000
direct allocation
page execute and read and write
malicious
27E0000
direct allocation
page read and write
malicious
4FF1000
trusted library allocation
page read and write
7FF5D75F9000
unkown
page readonly
4EF6000
trusted library allocation
page read and write
11527000
unkown
page read and write
F00000
trusted library allocation
page read and write
5E0000
heap
page read and write
9FC6000
heap
page read and write
8500000
unkown
page read and write
EF0000
heap
page read and write
D07000
trusted library allocation
page execute and read and write
2A84000
trusted library allocation
page read and write
9FAF000
heap
page read and write
ACEB000
heap
page read and write
C3CB000
stack
page read and write
9FA4000
heap
page read and write
7DF4F24A1000
unkown
page execute read
1C2F000
heap
page read and write
5330000
unkown
page write copy
A9D9000
heap
page read and write
A857000
heap
page read and write
7E0000
trusted library allocation
page read and write
134B000
heap
page read and write
3070000
unkown
page read and write
35C9000
unkown
page read and write
1C54000
heap
page read and write
A69E000
heap
page read and write
D3B000
heap
page read and write
12A4000
trusted library allocation
page read and write
87B000
trusted library allocation
page execute and read and write
42EA000
trusted library allocation
page read and write
11FB000
trusted library allocation
page execute and read and write
4BE000
heap
page read and write
4FDE000
trusted library allocation
page read and write
28FE000
stack
page read and write
2D30000
trusted library allocation
page read and write
7DC0000
unkown
page readonly
AFE000
heap
page read and write
1F0000
heap
page read and write
7FF5D72E9000
unkown
page readonly
1366000
heap
page read and write
2773000
heap
page read and write
8500000
unkown
page read and write
436000
unkown
page readonly
A339000
heap
page read and write
A969000
heap
page read and write
F4B000
stack
page read and write
F00000
heap
page read and write
7FF5D723C000
unkown
page readonly
A85F000
heap
page read and write
4B7000
heap
page read and write
9AB4000
unkown
page read and write
A47000
trusted library allocation
page execute and read and write
11404000
unkown
page read and write
7FF5D76D7000
unkown
page readonly
43B000
stack
page read and write
9F8F000
heap
page read and write
1BB8000
heap
page read and write
1B7E000
stack
page read and write
E00000
trusted library allocation
page read and write
418000
unkown
page readonly
4B0000
heap
page read and write
4BE000
heap
page read and write
9B4000
trusted library allocation
page read and write
7FF5D72DF000
unkown
page readonly
434B000
trusted library allocation
page read and write
1010000
heap
page read and write
42B3000
trusted library allocation
page read and write
8500000
unkown
page read and write
21E0000
trusted library allocation
page read and write
12D0000
unkown
page readonly
1C29000
heap
page read and write
54EC000
trusted library allocation
page read and write
4BE000
heap
page read and write
D90000
heap
page read and write
BFB000
heap
page read and write
432C000
trusted library allocation
page read and write
4B7000
heap
page read and write
42B3000
trusted library allocation
page read and write
4BE000
heap
page read and write
7FF5D72FB000
unkown
page readonly
2AEE000
stack
page read and write
15E0000
trusted library allocation
page read and write
9F8D000
heap
page read and write
7FF5D752F000
unkown
page readonly
AABE000
heap
page read and write
A0A9000
stack
page read and write
1000000
heap
page read and write
1BB4000
heap
page read and write
314F000
stack
page read and write
26B0000
trusted library allocation
page read and write
7FF5D7488000
unkown
page readonly
10B0000
heap
page read and write
37BE000
stack
page read and write
B10000
heap
page read and write
4312000
trusted library allocation
page read and write
4BE000
heap
page read and write
1C3E000
heap
page read and write
42C1000
trusted library allocation
page read and write
3070000
unkown
page read and write
4CC9000
trusted library allocation
page read and write
42F3000
trusted library allocation
page read and write
700000
heap
page read and write
B950000
unkown
page readonly
324F000
stack
page read and write
7FD000
heap
page read and write
2971000
heap
page execute and read and write
DEE000
stack
page read and write
A2C0000
heap
page read and write
7FF5D7534000
unkown
page readonly
334F000
stack
page read and write
4BE000
heap
page read and write
4B7000
heap
page read and write
1129A000
unkown
page read and write
1F0000
heap
page read and write
A33D000
heap
page read and write
A2EA000
heap
page read and write
AD02000
heap
page read and write
1C63000
heap
page read and write
14FE000
stack
page read and write
AD08000
heap
page read and write
10D5000
heap
page read and write
AB5F000
heap
page read and write
8500000
unkown
page read and write
2890000
trusted library allocation
page read and write
10E0000
stack
page read and write
7FF5D7691000
unkown
page readonly
AC03000
heap
page read and write
C09000
heap
page read and write
ABA4000
heap
page read and write
2D80000
heap
page read and write
AC4F000
heap
page read and write
2935000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
7FF5D75F2000
unkown
page readonly
1BB2000
heap
page read and write
2B6E000
stack
page read and write
148F000
stack
page read and write
7D4000
trusted library allocation
page read and write
FEA000
trusted library allocation
page execute and read and write
4BE000
heap
page read and write
B10000
heap
page read and write
A74A000
heap
page read and write
390000
heap
page read and write
4421000
heap
page read and write
7FF5D7722000
unkown
page readonly
7FF5D7398000
unkown
page readonly
A554000
heap
page read and write
ABC0000
heap
page read and write
3370000
unkown
page read and write
4BE000
heap
page read and write
42A3000
trusted library allocation
page read and write
4FE4000
trusted library allocation
page read and write
AB33000
heap
page read and write
FB0000
trusted library allocation
page execute and read and write
2A30000
trusted library allocation
page read and write
A33F000
unkown
page read and write
26C0000
heap
page read and write
2DE0000
trusted library allocation
page read and write
BF3E000
stack
page read and write
7CB0000
unkown
page readonly
1BCC000
heap
page read and write
A342000
heap
page read and write
26AF000
stack
page read and write
3F6000
stack
page read and write
7FF5D6BE4000
unkown
page readonly
A35C000
heap
page read and write
4B7000
heap
page read and write
4B7000
heap
page read and write
FC0000
trusted library allocation
page read and write
10E0000
unkown
page read and write
AC79000
heap
page read and write
5E8000
heap
page read and write
62F000
heap
page read and write
1577000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
7FF5D77F7000
unkown
page readonly
422000
unkown
page read and write
DE5000
trusted library allocation
page execute and read and write
A92D000
heap
page read and write
7E0000
heap
page read and write
4B7000
heap
page read and write
2720000
trusted library allocation
page read and write
6F6000
stack
page read and write
AC8000
heap
page read and write
4B7000
heap
page read and write
ACAE000
heap
page read and write
8500000
unkown
page read and write
A24A000
heap
page read and write
4BE000
heap
page read and write
9F8A000
heap
page read and write
A83D000
heap
page read and write
42A2000
trusted library allocation
page read and write
4BE000
heap
page read and write
F40000
trusted library allocation
page read and write
872000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
439F000
stack
page read and write
768C000
unkown
page read and write
E5B000
heap
page read and write
A6D8000
heap
page read and write
42BA000
trusted library allocation
page read and write
1170000
heap
page read and write
722000
heap
page read and write
408000
unkown
page readonly
EFC000
heap
page read and write
618000
heap
page read and write
38B0000
heap
page read and write
8500000
unkown
page read and write
4BE000
heap
page read and write
1270000
unkown
page read and write
7FF5D77C2000
unkown
page readonly
40A000
unkown
page write copy
F6B000
heap
page read and write
CD0000
trusted library allocation
page read and write
7FF5D7589000
unkown
page readonly
2547000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
1129E000
unkown
page read and write
7FF5D7546000
unkown
page readonly
BE7000
trusted library allocation
page read and write
4F73000
trusted library allocation
page read and write
A4C000
heap
page read and write
7FF5D716B000
unkown
page readonly
A313000
unkown
page read and write
1160000
unkown
page read and write
7611000
unkown
page read and write
7FF5D6AB6000
unkown
page readonly
2400000
trusted library allocation
page read and write
AB7F000
heap
page read and write
7FF5D7376000
unkown
page readonly
9B8000
heap
page read and write
8880000
unkown
page readonly
11A0000
heap
page read and write
1C48000
heap
page read and write
1290000
heap
page read and write
870000
heap
page read and write
42AB000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
DD6000
trusted library allocation
page execute and read and write
63D000
heap
page read and write
7FF5D7795000
unkown
page readonly
C7CB000
unkown
page read and write
A51C000
heap
page read and write
A348000
heap
page read and write
400000
unkown
page readonly
A318000
heap
page read and write
42A3000
trusted library allocation
page read and write
11C0000
heap
page read and write
4BE000
heap
page read and write
A24A000
heap
page read and write
4BE000
heap
page read and write
A797000
heap
page read and write
AE4000
trusted library allocation
page read and write
11BE000
stack
page read and write
A348000
heap
page read and write
C44F000
stack
page read and write
4A0E000
unkown
page read and write
4B7000
heap
page read and write
4B7000
heap
page read and write
1C63000
heap
page read and write
A3AC000
unkown
page read and write
C30000
heap
page read and write
4B7000
heap
page read and write
2790000
heap
page read and write
42D3000
trusted library allocation
page read and write
2DD4000
trusted library allocation
page read and write
8FD9000
stack
page read and write
3060000
unkown
page read and write
7FF5D77B6000
unkown
page readonly
E9D000
stack
page read and write
35E4000
unkown
page read and write
AA0E000
unkown
page read and write
9A94000
unkown
page read and write
8500000
unkown
page read and write
113C8000
unkown
page read and write
429C000
trusted library allocation
page read and write
3140000
unkown
page read and write
A10000
heap
page read and write
373E000
stack
page read and write
8500000
unkown
page read and write
2D37000
trusted library allocation
page execute and read and write
110E000
stack
page read and write
1350000
unkown
page readonly
1570000
heap
page read and write
A60D000
heap
page read and write
A2DD000
heap
page read and write
42D1000
trusted library allocation
page read and write
AD3A000
heap
page read and write
ABE7000
heap
page read and write
B5F000
stack
page read and write
ED0000
trusted library allocation
page read and write
113C0000
unkown
page read and write
11D0000
trusted library allocation
page read and write
D0B000
trusted library allocation
page execute and read and write
A935000
heap
page read and write
2739000
heap
page read and write
132A000
heap
page read and write
A346000
heap
page read and write
17F0000
heap
page read and write
860000
heap
page read and write
1C5E000
heap
page read and write
A31E000
heap
page read and write
7435000
stack
page read and write
7FF5D774A000
unkown
page readonly
877000
trusted library allocation
page execute and read and write
C65E000
unkown
page read and write
7FF5D751F000
unkown
page readonly
AC6F000
heap
page read and write
3060000
unkown
page read and write
63D000
heap
page read and write
7FF5D769E000
unkown
page readonly
62A000
heap
page read and write
42C2000
trusted library allocation
page read and write
1571000
trusted library allocation
page read and write
7FF5D7507000
unkown
page readonly
A324000
heap
page read and write
1C63000
heap
page read and write
7FF5D7336000
unkown
page readonly
A313000
heap
page read and write
9B79000
unkown
page read and write
11A5000
heap
page read and write
283E000
heap
page read and write
A81B000
heap
page read and write
42DE000
trusted library allocation
page read and write
42A2000
trusted library allocation
page read and write
AA14000
heap
page read and write
11297000
unkown
page read and write
9E0000
heap
page read and write
117A000
trusted library allocation
page execute and read and write
3C90000
remote allocation
page read and write
9AAA000
unkown
page read and write
42A3000
trusted library allocation
page read and write
7FF5D77C7000
unkown
page readonly
C50000
trusted library allocation
page read and write
5574000
trusted library allocation
page read and write
3060000
unkown
page read and write
A18000
heap
page read and write
6F6000
stack
page read and write
ACE0000
heap
page read and write
D5B000
stack
page read and write
A9EC000
heap
page read and write
42A3000
trusted library allocation
page read and write
1C59000
heap
page read and write
1BB8000
heap
page read and write
A3E3000
heap
page read and write
A9D3000
heap
page read and write
ABCA000
heap
page read and write
B980000
unkown
page readonly
4B7000
heap
page read and write
4BE000
heap
page read and write
7FF5D76C8000
unkown
page readonly
9FBF000
heap
page read and write
63B000
stack
page read and write
D5C000
stack
page read and write
C642000
unkown
page read and write
40B000
unkown
page execute read
2904000
trusted library allocation
page read and write
A3B6000
unkown
page read and write
1383000
heap
page read and write
5576000
trusted library allocation
page read and write
150E000
stack
page read and write
C4E000
stack
page read and write
A31C000
heap
page read and write
844000
trusted library allocation
page read and write
135B000
heap
page read and write
AC99000
heap
page read and write
8F7000
heap
page read and write
A391000
unkown
page read and write
1290000
trusted library allocation
page read and write
42EB000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
11295000
unkown
page read and write
252D000
stack
page read and write
4420000
heap
page read and write
A10000
heap
page read and write
BE90000
unkown
page read and write
DE0000
heap
page read and write
3AB1000
trusted library allocation
page read and write
17C7000
trusted library allocation
page read and write
AA69000
heap
page read and write
1027000
heap
page read and write
2F18000
trusted library allocation
page read and write
1C67000
heap
page read and write
272C000
trusted library allocation
page read and write
2D32000
trusted library allocation
page read and write
8500000
unkown
page read and write
108E000
stack
page read and write
1085000
trusted library allocation
page read and write
2BD0000
heap
page read and write
4A44000
unkown
page read and write
2600000
trusted library allocation
page read and write
7FF5D7485000
unkown
page readonly
42C5000
trusted library allocation
page read and write
4BE000
heap
page read and write
429A000
trusted library allocation
page read and write
4BE000
heap
page read and write
A212000
heap
page read and write
1C56000
heap
page read and write
A6A7000
heap
page read and write
8DE000
stack
page read and write
9B0000
trusted library allocation
page read and write
11294000
unkown
page read and write
1C37000
heap
page read and write
1281000
unkown
page readonly
2FC0000
heap
page execute and read and write
3370000
unkown
page read and write
2458000
trusted library allocation
page read and write
418000
unkown
page readonly
3060000
unkown
page read and write
8500000
unkown
page read and write
A8A7000
heap
page read and write
DDA000
trusted library allocation
page execute and read and write
A249000
heap
page read and write
3060000
unkown
page read and write
BE49000
stack
page read and write
17E0000
heap
page read and write
4B7000
heap
page read and write
4B7000
heap
page read and write
3EB000
stack
page read and write
1080000
trusted library allocation
page read and write
D47000
heap
page read and write
4BE000
heap
page read and write
42B7000
trusted library allocation
page read and write
42A4000
trusted library allocation
page read and write
18DE000
stack
page read and write
820000
heap
page read and write
8500000
unkown
page read and write
575000
heap
page read and write
AAFB000
heap
page read and write
3290000
unkown
page read and write
A82E000
heap
page read and write
B17000
heap
page read and write
42DB000
trusted library allocation
page read and write
F57000
heap
page read and write
9B3000
trusted library allocation
page execute and read and write
1291000
trusted library allocation
page read and write
4B7000
heap
page read and write
462E000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
3060000
unkown
page read and write
1550000
trusted library allocation
page read and write
A711000
heap
page read and write
8500000
unkown
page read and write
1610000
heap
page read and write
910000
trusted library allocation
page read and write
135D000
heap
page read and write
7DF4F2491000
unkown
page execute read
11427000
unkown
page read and write
4BE000
heap
page read and write
EB7000
trusted library allocation
page read and write
E90000
heap
page read and write
51DC000
trusted library allocation
page read and write
7E60000
unkown
page read and write
5350000
trusted library allocation
page read and write
8500000
unkown
page read and write
9A90000
unkown
page read and write
3060000
unkown
page read and write
446000
unkown
page readonly
26EE000
trusted library allocation
page read and write
3060000
unkown
page read and write
2910000
trusted library allocation
page read and write
C90000
heap
page read and write
A343000
heap
page read and write
11296000
unkown
page read and write
2170000
heap
page read and write
7FF5D7682000
unkown
page readonly
F42D000
unkown
page read and write
A79E000
heap
page read and write
7810000
unkown
page read and write
7FF5D71C4000
unkown
page readonly
4B7000
heap
page read and write
AACA000
heap
page read and write
A6E6000
heap
page read and write
1731000
unkown
page readonly
AD3D000
heap
page read and write
1C59000
heap
page read and write
8500000
unkown
page read and write
AC29000
heap
page read and write
A91A000
heap
page read and write
4B7000
heap
page read and write
1C59000
heap
page read and write
7FF5D71AF000
unkown
page readonly
10CD000
trusted library allocation
page execute and read and write
A310000
heap
page read and write
114F8000
unkown
page read and write
A75F000
heap
page read and write
A49F000
heap
page read and write
42B0000
trusted library allocation
page read and write
AA52000
heap
page read and write
26B1000
trusted library allocation
page read and write
1C4D000
heap
page read and write
2A76000
trusted library allocation
page read and write
5FB000
stack
page read and write
4BE000
heap
page read and write
1C3B000
heap
page read and write
2B70000
heap
page read and write
A78C000
heap
page read and write
72F000
heap
page read and write
5330000
trusted library allocation
page read and write
162F000
heap
page read and write
8380000
unkown
page read and write
9DA000
trusted library allocation
page execute and read and write
C605000
unkown
page read and write
42A3000
trusted library allocation
page read and write
11B0000
heap
page read and write
14D7000
heap
page read and write
42A3000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
7DF4F2470000
unkown
page readonly
42B3000
trusted library allocation
page read and write
D50000
trusted library allocation
page read and write
A346000
heap
page read and write
9F89000
heap
page read and write
4B7000
heap
page read and write
670000
heap
page read and write
1C2E000
heap
page read and write
27DC000
stack
page read and write
1C59000
heap
page read and write
558E000
trusted library allocation
page read and write
4B7000
heap
page read and write
AB92000
heap
page read and write
7FF5D7065000
unkown
page readonly
8500000
unkown
page read and write
A8F000
heap
page read and write
418000
unkown
page readonly
1380000
heap
page read and write
295E000
heap
page read and write
AD2A000
heap
page read and write
2B00000
heap
page read and write
8D0000
trusted library allocation
page read and write
2C5F000
stack
page read and write
231E000
stack
page read and write
42A2000
trusted library allocation
page read and write
156A000
trusted library allocation
page execute and read and write
49A8000
unkown
page read and write
73C000
heap
page read and write
127E000
stack
page read and write
1580000
trusted library allocation
page read and write
E80000
heap
page read and write
38FE000
stack
page read and write
A619000
heap
page read and write
C5C000
unkown
page readonly
1383000
heap
page read and write
20E0000
heap
page read and write
4B8D000
stack
page read and write
95FB000
stack
page read and write
B33000
heap
page read and write
5EA000
heap
page read and write
C4BD000
unkown
page read and write
A88000
heap
page read and write
42AA000
trusted library allocation
page read and write
3310000
unkown
page read and write
4BE000
heap
page read and write
429A000
trusted library allocation
page read and write
8380000
unkown
page read and write
1550000
trusted library allocation
page execute and read and write
42B2000
trusted library allocation
page read and write
1C5D000
heap
page read and write
AA97000
heap
page read and write
585000
heap
page read and write
DC7000
heap
page read and write
502F000
stack
page read and write
40A000
unkown
page read and write
A349000
heap
page read and write
AB88000
heap
page read and write
F78000
heap
page read and write
42B4000
trusted library allocation
page read and write
154E000
stack
page read and write
7FF5D77DD000
unkown
page readonly
C60000
trusted library allocation
page read and write
4B7000
heap
page read and write
7FF5D75D9000
unkown
page readonly
42C5000
trusted library allocation
page read and write
4B7000
heap
page read and write
1102000
trusted library allocation
page read and write
2F0F000
stack
page read and write
B60000
heap
page read and write
A886000
heap
page read and write
146B000
trusted library allocation
page execute and read and write
8890000
unkown
page readonly
8A70000
unkown
page read and write
AA04000
unkown
page read and write
42CB000
trusted library allocation
page read and write
C5F8000
unkown
page read and write
4BE000
heap
page read and write
12B0000
trusted library allocation
page read and write
42A3000
trusted library allocation
page read and write
37FD000
stack
page read and write
1182000
trusted library allocation
page read and write
A65C000
heap
page read and write
A315000
heap
page read and write
401000
unkown
page execute read
2606000
trusted library allocation
page read and write
4BE000
heap
page read and write
1334000
heap
page read and write
A71F000
heap
page read and write
33B0000
unkown
page readonly
3060000
unkown
page read and write
7FF5D7764000
unkown
page readonly
A510000
heap
page read and write
5522000
trusted library allocation
page read and write
26B4000
trusted library allocation
page read and write
7FF5D77F0000
unkown
page readonly
42B0000
trusted library allocation
page read and write
7FF5D77E0000
unkown
page readonly
DB4000
trusted library allocation
page read and write
4BE000
heap
page read and write
1156000
stack
page read and write
17D0000
heap
page read and write
7FF5D775C000
unkown
page readonly
2EA1000
unkown
page read and write
A39C000
unkown
page read and write
3060000
unkown
page read and write
3060000
unkown
page read and write
439000
unkown
page readonly
CAA000
heap
page read and write
3060000
unkown
page read and write
1337000
heap
page read and write
7FF5D7837000
unkown
page readonly
AD0000
trusted library allocation
page read and write
1140000
heap
page read and write
A2E000
heap
page read and write
1C2E000
heap
page read and write
49FA000
unkown
page read and write
10C3000
trusted library allocation
page execute and read and write
35CF000
unkown
page read and write
8500000
unkown
page read and write
A5B000
stack
page read and write
A41A000
heap
page read and write
244E000
stack
page read and write
A280000
heap
page read and write
26D0000
trusted library allocation
page read and write
73C000
heap
page read and write
A31F000
heap
page read and write
101E000
stack
page read and write
73B000
heap
page read and write
FC4000
trusted library allocation
page read and write
9A72000
unkown
page read and write
4B7000
heap
page read and write
7FF5D705D000
unkown
page readonly
2BE0000
trusted library allocation
page read and write
A343000
heap
page read and write
3537000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
A6B7000
heap
page read and write
9A98000
unkown
page read and write
A3C3000
unkown
page read and write
BE0000
trusted library allocation
page read and write
75E0000
unkown
page read and write
A853000
heap
page read and write
F08000
heap
page read and write
A33C000
heap
page read and write
5479000
unkown
page read and write
10000000
unkown
page readonly
2531000
trusted library allocation
page read and write
590000
heap
page read and write
A23A000
unkown
page read and write
42B5000
trusted library allocation
page read and write
A321000
heap
page read and write
A50000
heap
page read and write
1C48000
heap
page read and write
A220000
heap
page read and write
51C2000
trusted library allocation
page read and write
7FF5D7792000
unkown
page readonly
2EB0000
heap
page execute and read and write
2A97000
trusted library allocation
page read and write
60B000
heap
page read and write
AA12000
heap
page read and write
F50000
trusted library allocation
page read and write
1408000
heap
page read and write
2511000
trusted library allocation
page read and write
10DC000
heap
page read and write
2C01000
trusted library allocation
page read and write
4B7000
heap
page read and write
B07000
heap
page read and write
AA40000
unkown
page read and write
C8A000
trusted library allocation
page execute and read and write
4B7000
heap
page read and write
AF6000
stack
page read and write
4BE000
heap
page read and write
143D000
trusted library allocation
page execute and read and write
11292000
unkown
page read and write
1C4A000
heap
page read and write
35D5000
unkown
page read and write
543E000
stack
page read and write
7FF5D717C000
unkown
page readonly
418000
unkown
page readonly
8380000
unkown
page read and write
3EF5000
trusted library allocation
page read and write
55E3000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
E60000
heap
page read and write
4BE000
heap
page read and write
26B0000
trusted library allocation
page read and write
A7B1000
heap
page read and write
A893000
heap
page read and write
7D3000
trusted library allocation
page execute and read and write
A3C4000
heap
page read and write
9B0000
heap
page read and write
4B7000
heap
page read and write
F60000
heap
page read and write
4B7000
heap
page read and write
A3DB000
heap
page read and write
98E000
stack
page read and write
A888000
heap
page read and write
AB19000
heap
page read and write
1340000
unkown
page read and write
A248000
heap
page read and write
7609000
unkown
page read and write
AC89000
heap
page read and write
4C0000
unkown
page readonly
779E000
unkown
page read and write
2830000
heap
page read and write
A735000
heap
page read and write
A347000
heap
page read and write
1433000
trusted library allocation
page execute and read and write
7FF5D77CD000
unkown
page readonly
2790000
heap
page read and write
A6EF000
heap
page read and write
42A2000
trusted library allocation
page read and write
EAF000
stack
page read and write
4B7000
heap
page read and write
42BA000
trusted library allocation
page read and write
C5F0000
unkown
page read and write
8500000
unkown
page read and write
3060000
unkown
page read and write
3626000
unkown
page read and write
11F0000
trusted library allocation
page read and write
10B4000
unkown
page write copy
A325000
heap
page read and write
A7D7000
heap
page read and write
3630000
unkown
page readonly
B220000
unkown
page read and write
26E5000
trusted library allocation
page read and write
4BE000
heap
page read and write
418000
unkown
page readonly
AA09000
heap
page read and write
170A000
heap
page read and write
35DC000
unkown
page read and write
9A6A000
unkown
page read and write
42B4000
trusted library allocation
page read and write
A339000
heap
page read and write
A91D000
heap
page read and write
F1F000
heap
page read and write
5334000
trusted library allocation
page read and write
C983000
unkown
page read and write
7FF5D7452000
unkown
page readonly
4BE000
heap
page read and write
42B7000
trusted library allocation
page read and write
4B7000
heap
page read and write
9A0000
trusted library allocation
page read and write
536000
stack
page read and write
1359000
heap
page read and write
26C5000
trusted library allocation
page read and write
1C63000
heap
page read and write
480000
heap
page read and write
8500000
unkown
page read and write
7FF5D7462000
unkown
page readonly
1378000
heap
page read and write
BC0000
heap
page read and write
158B000
trusted library allocation
page execute and read and write
42DB000
trusted library allocation
page read and write
4297000
trusted library allocation
page read and write
BD0000
heap
page read and write
A341000
heap
page read and write
4B7000
heap
page read and write
A806000
heap
page read and write
7FF5D6ABD000
unkown
page readonly
D30000
trusted library allocation
page execute and read and write
49FD000
unkown
page read and write
10B4000
unkown
page read and write
4BE000
heap
page read and write
9C0000
trusted library allocation
page read and write
42DB000
trusted library allocation
page read and write
42AA000
trusted library allocation
page read and write
7FF5D7523000
unkown
page readonly
A228000
heap
page read and write
8500000
unkown
page read and write
434B000
trusted library allocation
page read and write
A223000
heap
page read and write
4BE000
heap
page read and write
4BE000
heap
page read and write
3370000
unkown
page read and write
1270000
trusted library allocation
page execute and read and write
A98C000
heap
page read and write
2F81000
heap
page read and write
1C5E000
heap
page read and write
1C3B000
heap
page read and write
4323000
trusted library allocation
page read and write
1C2E000
heap
page read and write
2B00000
heap
page execute and read and write
1090000
trusted library allocation
page read and write
2BF0000
heap
page execute and read and write
C86000
trusted library allocation
page execute and read and write
4B00000
unkown
page read and write
4B7000
heap
page read and write
F43000
trusted library allocation
page execute and read and write
5591000
trusted library allocation
page read and write
C22000
trusted library allocation
page read and write
14D0000
heap
page read and write
25BF000
stack
page read and write
A52000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
4BE000
heap
page read and write
7FF5D72C8000
unkown
page readonly
A10000
trusted library allocation
page read and write
ABBD000
heap
page read and write
113A2000
unkown
page read and write
3AB5000
trusted library allocation
page read and write
C2B000
trusted library allocation
page execute and read and write
7EB000
heap
page read and write
536E000
stack
page read and write
580000
heap
page read and write
A5F8000
heap
page read and write
2900000
trusted library allocation
page read and write
2320000
heap
page read and write
7FF5D7262000
unkown
page readonly
960000
heap
page read and write
3060000
unkown
page read and write
5020000
heap
page read and write
A2FD000
heap
page read and write
5260000
heap
page read and write
1C64000
heap
page read and write
1433000
trusted library allocation
page execute and read and write
2794000
heap
page read and write
AA72000
heap
page read and write
403E000
stack
page read and write
9FD2000
heap
page read and write
4330000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
A91F000
heap
page read and write
42C1000
trusted library allocation
page read and write
33F0000
unkown
page read and write
EFA000
trusted library allocation
page execute and read and write
B56000
stack
page read and write
7D0000
heap
page read and write
A6F8000
heap
page read and write
7FF5D7639000
unkown
page readonly
7FF5D71BF000
unkown
page readonly
A31F000
heap
page read and write
E10000
unkown
page readonly
543E000
stack
page read and write
362A000
unkown
page read and write
BB0E000
stack
page read and write
4B7000
heap
page read and write
162F000
stack
page read and write
1220000
trusted library allocation
page read and write
2805000
trusted library allocation
page read and write
1C63000
heap
page read and write
7FF5D748A000
unkown
page readonly
4EFB000
trusted library allocation
page read and write
A868000
heap
page read and write
7FF5D72D7000
unkown
page readonly
42A2000
trusted library allocation
page read and write
1456000
trusted library allocation
page execute and read and write
4BE000
heap
page read and write
35BD000
unkown
page read and write
D80000
unkown
page readonly
C621000
unkown
page read and write
9C000
stack
page read and write
A6B4000
heap
page read and write
7FF5D771A000
unkown
page readonly
42B0000
trusted library allocation
page read and write
4397000
trusted library allocation
page read and write
7FF5D7593000
unkown
page readonly
42A3000
trusted library allocation
page read and write
293F000
trusted library allocation
page read and write
970000
heap
page read and write
10CB000
heap
page read and write
2931000
trusted library allocation
page read and write
4BE000
heap
page read and write
1C5A000
heap
page read and write
8500000
unkown
page read and write
4980000
unkown
page read and write
47B0000
heap
page read and write
42AA000
trusted library allocation
page read and write
2D9E000
stack
page read and write
9F84000
heap
page read and write
4B7000
heap
page read and write
26E4000
trusted library allocation
page read and write
1C36000
heap
page read and write
2FB3000
trusted library allocation
page read and write
A246000
heap
page read and write
8A0000
trusted library allocation
page execute and read and write
27EE000
trusted library allocation
page read and write
2FB5000
trusted library allocation
page read and write
94AB000
stack
page read and write
4B7000
heap
page read and write
2560000
heap
page read and write
5300000
trusted library allocation
page read and write
2B02000
unkown
page readonly
430E000
trusted library allocation
page read and write
A769000
heap
page read and write
731000
heap
page read and write
CFA000
trusted library allocation
page execute and read and write
BDE000
heap
page read and write
6EF000
heap
page read and write
C81C000
unkown
page read and write
400000
unkown
page readonly
274D000
trusted library allocation
page read and write
DC0000
unkown
page read and write
AB67000
heap
page read and write
42AA000
trusted library allocation
page read and write
DF2000
trusted library allocation
page read and write
F76000
trusted library allocation
page execute and read and write
4BE000
heap
page read and write
AA05000
heap
page read and write
A7DC000
heap
page read and write
4FEE000
trusted library allocation
page read and write
84F000
heap
page read and write
258E000
stack
page read and write
A242000
heap
page read and write
BD8000
heap
page read and write
D2F000
heap
page read and write
6E0000
heap
page read and write
1C61000
heap
page read and write
AAD9000
heap
page read and write
980000
heap
page read and write
10534000
unkown
page read and write
A90000
heap
page read and write
8500000
unkown
page read and write
8500000
unkown
page read and write
96A000
heap
page read and write
26A5000
trusted library allocation
page read and write
23AD000
trusted library allocation
page read and write
CF0000
heap
page read and write
8E4000
heap
page read and write
127F000
stack
page read and write
4432000
trusted library allocation
page read and write
42A2000
trusted library allocation
page read and write
F0C000
heap
page read and write
25C1000
trusted library allocation
page read and write
7FF5D719C000
unkown
page readonly
FF0000
heap
page read and write
1C63000
heap
page read and write
843000
trusted library allocation
page execute and read and write
1694000
unkown
page readonly
4BE000
heap
page read and write
C13000
heap
page read and write
571E000
stack
page read and write
4B7000
heap
page read and write
3060000
unkown
page read and write
8500000
unkown
page read and write
42C6000
trusted library allocation
page read and write
A33E000
heap
page read and write
23F0000
trusted library allocation
page read and write
1618000
heap
page read and write
53DE000
stack
page read and write
7FF5D7455000
unkown
page readonly
42A3000
trusted library allocation
page read and write
9A000
stack
page read and write
8500000
unkown
page read and write
4F00000
trusted library allocation
page read and write
296C000
trusted library allocation
page read and write
A513000
heap
page read and write
A34D000
heap
page read and write
959000
heap
page read and write
A33E000
heap
page read and write
2EE0000
heap
page read and write
1C63000
heap
page read and write
7FF5D75CB000
unkown
page readonly
A595000
heap
page read and write
26D6000
trusted library allocation
page read and write
1C63000
heap
page read and write
94F4000
unkown
page read and write
4C8D000
stack
page read and write
FE0000
trusted library allocation
page read and write
3060000
unkown
page read and write
E50000
trusted library allocation
page execute and read and write
A824000
heap
page read and write
C5A000
unkown
page read and write
2A80000
trusted library allocation
page read and write
BEA0000
unkown
page readonly
A384000
unkown
page read and write
5E9000
heap
page read and write
C73E000
unkown
page read and write
9F92000
heap
page read and write
3060000
unkown
page read and write
3060000
unkown
page read and write
462000
unkown
page readonly
12EF000
heap
page read and write
7FF5D7244000
unkown
page readonly
75F8000
unkown
page read and write
436000
unkown
page readonly
4B7000
heap
page read and write
AD32000
heap
page read and write
95E000
stack
page read and write
12F6000
stack
page read and write
4295000
trusted library allocation
page read and write
7FF5D732D000
unkown
page readonly
2220000
heap
page read and write
1C4A000
heap
page read and write
A6FE000
heap
page read and write
4B7000
heap
page read and write
B4D0000
unkown
page readonly
AA92000
unkown
page read and write
7FF5D77A4000
unkown
page readonly
3060000
unkown
page read and write
8380000
unkown
page read and write
A365000
heap
page read and write
113B1000
unkown
page read and write
C48B000
unkown
page read and write
A237000
unkown
page read and write
9AA0000
unkown
page read and write
843F000
stack
page read and write
ABF7000
heap
page read and write
11298000
unkown
page read and write
E38000
heap
page read and write
35CD000
stack
page read and write
A339000
heap
page read and write
8500000
unkown
page read and write
113F8000
unkown
page read and write
2A95000
trusted library allocation
page read and write
A2A6000
heap
page read and write
7FF5D7458000
unkown
page readonly
7FF5D72BF000
unkown
page readonly
42DB000
trusted library allocation
page read and write
BBD000
trusted library allocation
page execute and read and write
A365000
heap
page read and write
42AA000
trusted library allocation
page read and write
9FBA000
heap
page read and write
9F85000
heap
page read and write
1540000
trusted library allocation
page read and write
8500000
unkown
page read and write
8500000
unkown
page read and write
84BB000
stack
page read and write
C615000
unkown
page read and write
12AD000
trusted library allocation
page execute and read and write
2320000
trusted library allocation
page read and write
113E7000
unkown
page read and write
2D81000
trusted library allocation
page read and write
42CF000
trusted library allocation
page read and write
7FF5D770A000
unkown
page readonly
CE0000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
4F6E000
stack
page read and write
9B2C000
unkown
page read and write
BB0000
heap
page read and write
A264000
unkown
page read and write
7FF5D762F000
unkown
page readonly
55E5000
trusted library allocation
page read and write
7B20000
unkown
page read and write
9C0000
heap
page read and write
101B000
heap
page read and write
226C000
stack
page read and write
1129A000
unkown
page read and write
B85A000
stack
page read and write
7C0000
heap
page read and write
DBD000
unkown
page readonly
7FF5D72D3000
unkown
page readonly
8EB000
trusted library allocation
page execute and read and write
610000
heap
page read and write
AC74000
heap
page read and write
1388000
heap
page read and write
769A000
unkown
page read and write
BD0000
unkown
page readonly
4610000
heap
page read and write
BAF000
stack
page read and write
A964000
heap
page read and write
2F81000
heap
page read and write
363E000
stack
page read and write
2EC0000
unkown
page readonly
84CC000
unkown
page read and write
C472000
unkown
page read and write
5D6000
stack
page read and write
35C3000
unkown
page read and write
8500000
unkown
page read and write
F10000
heap
page read and write
C46F000
unkown
page read and write
A3E9000
heap
page read and write
B76000
stack
page read and write
49C2000
unkown
page read and write
1280000
heap
page read and write
8500000
unkown
page read and write
4BE000
heap
page read and write
54DE000
stack
page read and write
C0E000
stack
page read and write
4BE000
heap
page read and write
A33E000
heap
page read and write
4BE000
heap
page read and write
55C3000
unkown
page readonly
9C000
stack
page read and write
C10000
trusted library allocation
page read and write
D9D000
heap
page read and write
DB0000
heap
page read and write
85E000
stack
page read and write
900000
heap
page read and write
AA63000
heap
page read and write
10634000
unkown
page read and write
1649000
heap
page read and write
A260000
heap
page read and write
4BE000
heap
page read and write
3060000
unkown
page read and write
239E000
stack
page read and write
295A000
heap
page read and write
55E0000
trusted library allocation
page read and write
8500000
unkown
page read and write
BCD000
trusted library allocation
page execute and read and write
1129C000
unkown
page read and write
1C61000
heap
page read and write
7FF5D7396000
unkown
page readonly
F54000
trusted library allocation
page read and write
42A2000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
A2F000
stack
page read and write
F36000
heap
page read and write
429F000
trusted library allocation
page read and write
5531000
trusted library allocation
page read and write
63B000
heap
page read and write
CC0000
trusted library allocation
page read and write
2AA5000
trusted library allocation
page read and write
C97000
trusted library allocation
page execute and read and write
10EA000
heap
page read and write
62A000
heap
page read and write
A222000
heap
page read and write
1C48000
heap
page read and write
454000
unkown
page readonly
C5FD000
unkown
page read and write
9F81000
heap
page read and write
10E0000
unkown
page read and write
A8E000
stack
page read and write
2A8C000
stack
page read and write
C1E000
stack
page read and write
1450000
trusted library allocation
page read and write
3331000
unkown
page read and write
4BE000
heap
page read and write
A408000
unkown
page read and write
1510000
heap
page read and write
28A0000
trusted library allocation
page read and write
ACBA000
heap
page read and write
A42E000
heap
page read and write
1C4B000
heap
page read and write
FF0000
unkown
page readonly
2FB0000
trusted library allocation
page read and write
A9A3000
heap
page read and write
43C8000
trusted library allocation
page read and write
8500000
unkown
page read and write
A88E000
heap
page read and write
7FF5D7284000
unkown
page readonly
576E000
stack
page read and write
AA90000
heap
page read and write
2DE1000
trusted library allocation
page read and write
540000
heap
page read and write
51E3000
trusted library allocation
page read and write
35F4000
unkown
page read and write
2906000
trusted library allocation
page read and write
35DC000
trusted library allocation
page read and write
ABA9000
heap
page read and write
9E7000
heap
page read and write
4347000
trusted library allocation
page read and write
8500000
unkown
page read and write
1C67000
heap
page read and write
3060000
unkown
page read and write
A349000
heap
page read and write
A952000
heap
page read and write
4B7000
heap
page read and write
4291000
trusted library allocation
page read and write
3780000
remote allocation
page read and write
F3F0000
unkown
page read and write
9EB0000
unkown
page readonly
D51000
stack
page read and write
720000
heap
page read and write
2404000
trusted library allocation
page read and write
A250000
heap
page read and write
12C5000
heap
page read and write
CD0000
heap
page read and write
1C36000
heap
page read and write
13B9000
heap
page read and write
42D9000
trusted library allocation
page read and write
10E0000
unkown
page read and write
C5C000
unkown
page readonly
ACDB000
heap
page read and write
4BE000
heap
page read and write
1094000
trusted library allocation
page read and write
7FF5D7404000
unkown
page readonly
5F6000
heap
page read and write
586E000
stack
page read and write
F41000
trusted library allocation
page read and write
4B7000
heap
page read and write
EF6000
stack
page read and write
8B0000
trusted library allocation
page read and write
CDD000
trusted library allocation
page execute and read and write
4BE000
heap
page read and write
13A3000
heap
page read and write
4310000
trusted library allocation
page read and write
4BE000
heap
page read and write
2FB0000
trusted library allocation
page read and write
7E0000
heap
page read and write
254D000
trusted library allocation
page read and write
7AE0000
unkown
page read and write
6DA000
heap
page read and write
A23F000
heap
page read and write
DB4000
heap
page read and write
7FF5D77D2000
unkown
page readonly
AC3000
heap
page read and write
3C90000
remote allocation
page read and write
2A90000
trusted library allocation
page read and write
3060000
unkown
page read and write
9ABD000
unkown
page read and write
A7BE000
heap
page read and write
FA0000
heap
page read and write
5DE000
stack
page read and write
BD0000
heap
page read and write
4B7000
heap
page read and write
2A8B000
trusted library allocation
page execute and read and write
881B000
stack
page read and write
1C32000
heap
page read and write
9820000
unkown
page read and write
11293000
unkown
page read and write
CB0000
heap
page read and write
8500000
unkown
page read and write
1207000
trusted library allocation
page execute and read and write
7FF5D7391000
unkown
page readonly
A738000
heap
page read and write
A342000
heap
page read and write
A758000
heap
page read and write
42C3000
trusted library allocation
page read and write
2270000
heap
page execute and read and write
4A90000
unkown
page read and write
915000
heap
page read and write
A315000
heap
page read and write
42B3000
trusted library allocation
page read and write
A9FD000
unkown
page read and write
7FF5D776D000
unkown
page readonly
3060000
unkown
page read and write
1430000
trusted library allocation
page read and write
A325000
heap
page read and write
1C3E000
heap
page read and write
509E000
stack
page read and write
4B7000
heap
page read and write
A333000
heap
page read and write
44CF000
trusted library allocation
page read and write
AC11000
heap
page read and write
53E1000
unkown
page read and write
10CE000
stack
page read and write
1330000
heap
page read and write
A833000
heap
page read and write
14CE000
stack
page read and write
8EB000
heap
page read and write
BFB8000
stack
page read and write
E671000
unkown
page read and write
EF6000
trusted library allocation
page execute and read and write
42CC000
trusted library allocation
page read and write
A0D000
trusted library allocation
page execute and read and write
3170000
unkown
page read and write
B03B000
stack
page read and write
9A84000
unkown
page read and write
A77C000
heap
page read and write
8500000
unkown
page read and write
13CA000
heap
page read and write
A21A000
heap
page read and write
4B7000
heap
page read and write
1270000
trusted library allocation
page execute and read and write
4BE000
heap
page read and write
1C63000
heap
page read and write
113F000
stack
page read and write
3060000
unkown
page read and write
8DCB000
stack
page read and write
401000
unkown
page execute read
2CDE000
stack
page read and write
86D0000
unkown
page readonly
A818000
heap
page read and write
D40000
heap
page read and write
AA2D000
heap
page read and write
7B00000
unkown
page readonly
4BE000
heap
page read and write
25F0000
trusted library allocation
page read and write
2AC0000
heap
page read and write
1410000
heap
page read and write
A02E000
stack
page read and write
2BE6000
trusted library allocation
page read and write
56CE000
stack
page read and write
42B3000
trusted library allocation
page read and write
55A5000
trusted library allocation
page read and write
AA7F000
heap
page read and write
4B7000
heap
page read and write
42B3000
trusted library allocation
page read and write
8500000
unkown
page read and write
AA43000
heap
page read and write
AC83000
heap
page read and write
42AA000
trusted library allocation
page read and write
A18000
heap
page read and write
9FCD000
heap
page read and write
BD6000
heap
page read and write
C06000
heap
page read and write
24B8000
trusted library allocation
page read and write
517E000
stack
page read and write
9F8B000
heap
page read and write
7460000
unkown
page read and write
5D5000
heap
page read and write
222E000
stack
page read and write
A728000
heap
page read and write
9F0000
heap
page read and write
75FD000
unkown
page read and write
1462000
trusted library allocation
page read and write
A24D000
heap
page read and write
7FF5D758D000
unkown
page readonly
9F8D000
heap
page read and write
8F0000
trusted library allocation
page read and write
DF7000
trusted library allocation
page execute and read and write
AB25000
heap
page read and write
42AE000
trusted library allocation
page read and write
A50000
heap
page read and write
A6C1000
heap
page read and write
7FF5D7360000
unkown
page readonly
A9F2000
heap
page read and write
11A0000
heap
page read and write
D56000
trusted library allocation
page execute and read and write
A882000
heap
page read and write
242E000
stack
page read and write
2B4F000
stack
page read and write
A37000
heap
page read and write
1C65000
heap
page read and write
2705000
trusted library allocation
page read and write
12D8000
heap
page read and write
4BE000
heap
page read and write
4B7000
heap
page read and write
C16000
trusted library allocation
page execute and read and write
285F000
heap
page read and write
4F11000
trusted library allocation
page read and write
42AF000
trusted library allocation
page read and write
2358000
trusted library allocation
page read and write
DDA000
heap
page read and write
33C0000
unkown
page read and write
9FB000
stack
page read and write
26A0000
trusted library allocation
page read and write
105B000
stack
page read and write
F30000
trusted library allocation
page read and write
A4B000
trusted library allocation
page execute and read and write
4B7000
heap
page read and write
25A0000
heap
page read and write
276E000
stack
page read and write
1142D000
unkown
page read and write
27E0000
direct allocation
page read and write
2C7F000
stack
page read and write
DC0000
trusted library allocation
page read and write
3060000
unkown
page read and write
7FF5D781A000
unkown
page readonly
4BE000
heap
page read and write
AA01000
unkown
page read and write
1369000
heap
page read and write
1281000
trusted library allocation
page read and write
9FAF000
stack
page read and write
588000
heap
page read and write
2433000
trusted library allocation
page read and write
8500000
unkown
page read and write
1C5C000
heap
page read and write
14D0000
trusted library allocation
page execute and read and write
7DD000
trusted library allocation
page execute and read and write
1C59000
heap
page read and write
19A000
stack
page read and write
5580000
trusted library allocation
page read and write
8500000
unkown
page read and write
4B7000
heap
page read and write
5440000
trusted library allocation
page read and write
4B7000
heap
page read and write
BF4000
trusted library allocation
page read and write
D5F000
heap
page read and write
8500000
unkown
page read and write
ACB7000
heap
page read and write
4EF4000
trusted library allocation
page read and write
3060000
unkown
page read and write
805000
heap
page read and write
C78A000
unkown
page read and write
C70000
heap
page read and write
3060000
unkown
page read and write
4F04000
trusted library allocation
page read and write
12D8000
heap
page read and write
3100000
unkown
page read and write
B115000
heap
page read and write
AA4C000
heap
page read and write
1B80000
heap
page read and write
27F0000
unclassified section
page read and write
AC46000
heap
page read and write
42D9000
trusted library allocation
page read and write
AA02000
heap
page read and write
740000
heap
page read and write
1297000
trusted library allocation
page read and write
4B7000
heap
page read and write
7FF5D76AF000
unkown
page readonly
C54A000
unkown
page read and write
7FF5D7075000
unkown
page readonly
3489000
stack
page read and write
C49000
unkown
page readonly
A60000
trusted library allocation
page read and write
8500000
unkown
page read and write
9FBF000
heap
page read and write
113FA000
unkown
page read and write
42AE000
trusted library allocation
page read and write
16FD000
heap
page read and write
4294000
trusted library allocation
page read and write
A979000
heap
page read and write
7FF5D760B000
unkown
page readonly
A00000
trusted library allocation
page read and write
A552000
heap
page read and write
4500000
trusted library allocation
page read and write
C78000
heap
page read and write
BD0000
heap
page read and write
4347000
trusted library allocation
page read and write
913000
trusted library allocation
page execute and read and write
1C66000
heap
page read and write
4B7000
heap
page read and write
9FC0000
heap
page read and write
2A80000
heap
page read and write
A6ED000
heap
page read and write
113E3000
unkown
page read and write
7FF5D75AF000
unkown
page readonly
5445000
trusted library allocation
page read and write
3780000
remote allocation
page read and write
401000
unkown
page execute read
113DA000
unkown
page read and write
26F4000
trusted library allocation
page read and write
AA18000
heap
page read and write
25C7000
trusted library allocation
page read and write
1C59000
heap
page read and write
DF0000
heap
page read and write
AE3000
trusted library allocation
page execute and read and write
FEE000
stack
page read and write
28C0000
unclassified section
page read and write
9AAC000
unkown
page read and write
A6EA000
heap
page read and write
AAE2000
heap
page read and write
1158B000
unkown
page read and write
EB5000
stack
page read and write
25A7000
trusted library allocation
page read and write
2A5E000
stack
page read and write
8F6000
stack
page read and write
CB5000
heap
page read and write
3070000
unkown
page read and write
23A1000
trusted library allocation
page read and write
3780000
remote allocation
page read and write
DA0000
trusted library allocation
page read and write
4BE000
heap
page read and write
4D5E000
stack
page read and write
7FF5D71F9000
unkown
page readonly
AA07000
heap
page read and write
1280000
heap
page read and write
7FF5D7236000
unkown
page readonly
7FF5CE33D000
unkown
page readonly
8500000
unkown
page read and write
2720000
heap
page read and write
A335000
heap
page read and write
8500000
unkown
page read and write
A6F5000
heap
page read and write
B80000
trusted library allocation
page read and write
3060000
unkown
page read and write
12A3000
trusted library allocation
page execute and read and write
27BE000
stack
page read and write
3060000
unkown
page read and write
ACBE000
heap
page read and write
42B3000
trusted library allocation
page read and write
42AC000
trusted library allocation
page read and write
A4A000
trusted library allocation
page execute and read and write
F20000
heap
page read and write
A30000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
434B000
trusted library allocation
page read and write
4BE000
heap
page read and write
8500000
unkown
page read and write
840000
trusted library allocation
page read and write
1C3F000
heap
page read and write
B11E000
heap
page read and write
A6B9000
heap
page read and write
A251000
unkown
page read and write
26DD000
trusted library allocation
page read and write
8500000
unkown
page read and write
9E2000
trusted library allocation
page read and write
A7E8000
heap
page read and write
10D0000
heap
page read and write
4B7000
heap
page read and write
4B7000
heap
page read and write
2A35000
trusted library allocation
page read and write
115D000
trusted library allocation
page execute and read and write
4F0E000
trusted library allocation
page read and write
A35E000
heap
page read and write
7FF5D77DA000
unkown
page readonly
A9D7000
heap
page read and write
A7FF000
heap
page read and write
A240000
heap
page read and write
401000
unkown
page execute read
117E000
stack
page read and write
1270000
heap
page read and write
4BE000
heap
page read and write
A7CA000
heap
page read and write
40A000
unkown
page read and write
B67000
trusted library allocation
page execute and read and write
413F000
stack
page read and write
EF0000
trusted library allocation
page read and write
287F000
trusted library allocation
page read and write
A340000
heap
page read and write
10FAF000
unkown
page read and write
4294000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
7FF5D706E000
unkown
page readonly
9F94000
heap
page read and write
FC1000
trusted library allocation
page read and write
C61D000
unkown
page read and write
C9E6000
unkown
page read and write
4468000
trusted library allocation
page read and write
42E2000
trusted library allocation
page read and write
7FF5D723F000
unkown
page readonly
A6FB000
heap
page read and write
6242000
unkown
page readonly
A99F000
heap
page read and write
A2A0000
heap
page read and write
A2D7000
unkown
page read and write
7FF5D7591000
unkown
page readonly
1FDE000
stack
page read and write
C0BA000
stack
page read and write
A3DF000
heap
page read and write
ADA3000
heap
page read and write
A785000
heap
page read and write
1C32000
heap
page read and write
5F5000
heap
page read and write
26E2000
trusted library allocation
page read and write
570000
heap
page read and write
4BE000
heap
page read and write
8500000
unkown
page read and write
1420000
trusted library allocation
page read and write
8500000
unkown
page read and write
4A71000
unkown
page read and write
4B7000
heap
page read and write
7FF5D74C3000
unkown
page readonly
1587000
trusted library allocation
page execute and read and write
11291000
unkown
page read and write
4B5000
heap
page read and write
59FE000
stack
page read and write
42BB000
trusted library allocation
page read and write
1C2C000
heap
page read and write
A7F8000
heap
page read and write
533E000
stack
page read and write
4BE000
heap
page read and write
4BE000
heap
page read and write
4410000
heap
page read and write
1305000
heap
page read and write
2B50000
heap
page execute and read and write
3530000
unkown
page read and write
1C56000
heap
page read and write
897E000
stack
page read and write
FC7000
trusted library allocation
page read and write
1605000
trusted library allocation
page read and write
4BE000
heap
page read and write
9F92000
heap
page read and write
2F93000
heap
page read and write
F2B000
heap
page read and write
A93A000
heap
page read and write
AC1000
trusted library allocation
page read and write
1376000
heap
page read and write
4B7000
heap
page read and write
A28B000
heap
page read and write
4B7000
heap
page read and write
2ED0000
trusted library allocation
page read and write
A41C000
heap
page read and write
A23000
trusted library allocation
page execute and read and write
4B7000
heap
page read and write
E4E000
stack
page read and write
10F6000
stack
page read and write
8500000
unkown
page read and write
1553000
trusted library allocation
page execute and read and write
4BE000
heap
page read and write
805000
heap
page read and write
1C63000
heap
page read and write
3060000
unkown
page read and write
4BE000
heap
page read and write
C90000
heap
page read and write
3DE7000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
42E000
unkown
page readonly
26D6000
trusted library allocation
page read and write
8500000
unkown
page read and write
A913000
heap
page read and write
41B000
unkown
page write copy
7FF5D729E000
unkown
page readonly
42A2000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
7E0000
heap
page read and write
1202000
trusted library allocation
page read and write
7C70000
unkown
page readonly
BC0000
trusted library allocation
page read and write
2D3B000
trusted library allocation
page execute and read and write
AA41000
heap
page read and write
F3F000
stack
page read and write
42F6000
trusted library allocation
page read and write
1129D000
unkown
page read and write
BD1000
unkown
page execute read
F52A000
heap
page read and write
360D000
stack
page read and write
BF0000
trusted library allocation
page read and write
A33E000
heap
page read and write
A24000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
DDA000
trusted library allocation
page execute and read and write
A94B000
heap
page read and write
F37000
heap
page read and write
7631000
unkown
page read and write
8500000
unkown
page read and write
430C000
trusted library allocation
page read and write
7FF5D7202000
unkown
page readonly
A55000
heap
page read and write
10E0000
unkown
page read and write
2EA0000
trusted library allocation
page execute and read and write
9A9E000
unkown
page read and write
F43C000
unkown
page read and write
B48000
heap
page read and write
4B7000
heap
page read and write
429F000
trusted library allocation
page read and write
A876000
heap
page read and write
2EC1000
trusted library allocation
page read and write
2708000
unkown
page readonly
5005000
trusted library allocation
page read and write
4312000
trusted library allocation
page read and write
4BE000
heap
page read and write
985000
heap
page read and write
8500000
unkown
page read and write
105B3000
unkown
page read and write
7FF5D75C1000
unkown
page readonly
42B3000
trusted library allocation
page read and write
4FF7000
trusted library allocation
page read and write
2801000
trusted library allocation
page read and write
7FF5D77A8000
unkown
page readonly
4FD6000
trusted library allocation
page read and write
7DF4F2471000
unkown
page execute read
42A3000
trusted library allocation
page read and write
434B000
trusted library allocation
page read and write
10E0000
unkown
page read and write
B559000
stack
page read and write
AA66000
heap
page read and write
106E000
stack
page read and write
2A6F000
stack
page read and write
42CC000
trusted library allocation
page read and write
A880000
heap
page read and write
8500000
unkown
page read and write
4BE000
heap
page read and write
BC7000
heap
page read and write
2406000
trusted library allocation
page read and write
26CA000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
A753000
heap
page read and write
1C63000
heap
page read and write
529E000
stack
page read and write
297F000
heap
page read and write
11299000
unkown
page read and write
A82A000
heap
page read and write
F2E000
stack
page read and write
AE0000
heap
page execute and read and write
DE2000
trusted library allocation
page read and write
283A000
heap
page read and write
42A4000
trusted library allocation
page read and write
EF5000
heap
page read and write
9820000
unkown
page read and write
E6E000
stack
page read and write
F50000
trusted library allocation
page read and write
7FF5D75B3000
unkown
page readonly
2670000
trusted library allocation
page read and write
1129F000
unkown
page read and write
42B4000
trusted library allocation
page read and write
2D7E000
stack
page read and write
CD4000
trusted library allocation
page read and write
ABFC000
heap
page read and write
7FF5D7752000
unkown
page readonly
A981000
heap
page read and write
A344000
heap
page read and write
A263000
heap
page read and write
76E000
stack
page read and write
7FF5D7267000
unkown
page readonly
1560000
heap
page read and write
7FF5D744E000
unkown
page readonly
800000
heap
page read and write
C669000
unkown
page read and write
1153000
trusted library allocation
page execute and read and write
650000
heap
page read and write
EF6000
stack
page read and write
42B3000
trusted library allocation
page read and write
8C8000
heap
page read and write
11C1000
unkown
page read and write
243D000
trusted library allocation
page read and write
379D000
stack
page read and write
42DB000
trusted library allocation
page read and write
EB1000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
42FB000
trusted library allocation
page read and write
4986000
unkown
page read and write
EC0000
trusted library allocation
page read and write
A8A2000
heap
page read and write
25F5000
trusted library allocation
page read and write
10E0000
heap
page read and write
55C0000
trusted library allocation
page read and write
9AC3000
unkown
page read and write
AC3B000
heap
page read and write
3110000
unkown
page readonly
1C63000
heap
page read and write
C460000
unkown
page read and write
AC56000
heap
page read and write
A3AA000
unkown
page read and write
25CE000
stack
page read and write
DCE000
stack
page read and write
A9CD000
heap
page read and write
8ECC000
stack
page read and write
C10000
heap
page read and write
AA5E000
heap
page read and write
A3EE000
heap
page read and write
54E2000
trusted library allocation
page read and write
CCC000
stack
page read and write
11293000
unkown
page read and write
7FF5D76D5000
unkown
page readonly
1210000
trusted library allocation
page read and write
2BAE000
stack
page read and write
8500000
unkown
page read and write
A219000
heap
page read and write
400000
unkown
page readonly
3070000
unkown
page read and write
CEE000
stack
page read and write
7AC0000
unkown
page read and write
A34C000
heap
page read and write
8500000
unkown
page read and write
F13000
heap
page read and write
A44C000
heap
page read and write
4B7000
heap
page read and write
9FB3000
heap
page read and write
276E000
stack
page read and write
9F86000
heap
page read and write
11B0000
heap
page read and write
2435000
trusted library allocation
page read and write
A86C000
heap
page read and write
942C000
stack
page read and write
400000
unkown
page readonly
4BE000
heap
page read and write
391B000
stack
page read and write
1C5C000
heap
page read and write
3000000
heap
page read and write
8500000
unkown
page read and write
A3B9000
unkown
page read and write
400000
unkown
page readonly
7FF5D779E000
unkown
page readonly
4BE000
heap
page read and write
7FF5D7694000
unkown
page readonly
A33C000
heap
page read and write
AB8D000
heap
page read and write
A342000
heap
page read and write
ACA7000
heap
page read and write
40B000
unkown
page execute read
42E5000
trusted library allocation
page read and write
42CA000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
3B3E000
stack
page read and write
2887000
trusted library allocation
page read and write
15B0000
trusted library allocation
page execute and read and write
3060000
unkown
page read and write
11D5000
trusted library allocation
page read and write
2A60000
heap
page read and write
A8B5000
heap
page read and write
A24D000
heap
page read and write
9F81000
heap
page read and write
807000
heap
page read and write
408000
unkown
page readonly
1298000
heap
page read and write
5560000
trusted library allocation
page read and write
8500000
unkown
page read and write
26D4000
trusted library allocation
page read and write
1287000
heap
page read and write
1160000
trusted library allocation
page read and write
A548000
heap
page read and write
A0E000
stack
page read and write
1C2F000
heap
page read and write
7FF5D7438000
unkown
page readonly
4BE000
heap
page read and write
A987000
heap
page read and write
760F000
unkown
page read and write
63D000
heap
page read and write
A253000
heap
page read and write
9F97000
heap
page read and write
7FF5D7289000
unkown
page readonly
A210000
heap
page read and write
A7CD000
heap
page read and write
4BE000
heap
page read and write
760B000
unkown
page read and write
AC1A000
heap
page read and write
C92000
trusted library allocation
page read and write
134F000
heap
page read and write
B4BF000
stack
page read and write
42D2000
trusted library allocation
page read and write
10BC000
heap
page read and write
8C0000
trusted library allocation
page read and write
E00000
unkown
page readonly
4BE000
heap
page read and write
8C2000
heap
page read and write
7FF5D6A4B000
unkown
page readonly
4B7000
heap
page read and write
AC0C000
heap
page read and write
8500000
unkown
page read and write
4B7000
heap
page read and write
51D2000
trusted library allocation
page read and write
4BE000
heap
page read and write
12DE000
stack
page read and write
ACB000
stack
page read and write
AC21000
heap
page read and write
11296000
unkown
page read and write
3060000
unkown
page read and write
AE1D000
stack
page read and write
153E000
stack
page read and write
AC42000
heap
page read and write
4B7000
heap
page read and write
3060000
unkown
page read and write
446000
unkown
page readonly
8500000
unkown
page read and write
14CF000
stack
page read and write
8A0000
trusted library allocation
page read and write
5DC000
heap
page read and write
25B7000
trusted library allocation
page read and write
4B7000
heap
page read and write
7FF5D76DA000
unkown
page readonly
A33E000
heap
page read and write
26B3000
trusted library allocation
page read and write
7DF4F2461000
unkown
page execute read
A942000
heap
page read and write
114E6000
unkown
page read and write
7FF5D7073000
unkown
page readonly
A9E9000
heap
page read and write
F434000
unkown
page read and write
1C51000
heap
page read and write
8500000
unkown
page read and write
4293000
trusted library allocation
page read and write
D58000
stack
page read and write
3AB000
stack
page read and write
F438000
unkown
page read and write
830000
heap
page read and write
7B80000
unkown
page readonly
1C63000
heap
page read and write
7FF5D768B000
unkown
page readonly
4B7000
heap
page read and write
42B3000
trusted library allocation
page read and write
1180000
heap
page read and write
3310000
unkown
page read and write
42DC000
trusted library allocation
page read and write
28B0000
heap
page read and write
3AB7000
trusted library allocation
page read and write
7FF5D75FF000
unkown
page readonly
26DE000
trusted library allocation
page read and write
AED000
trusted library allocation
page execute and read and write
69F000
heap
page read and write
A21B000
heap
page read and write
26FF000
stack
page read and write
C36000
heap
page read and write
42C2000
trusted library allocation
page read and write
429E000
trusted library allocation
page read and write
60B000
heap
page read and write
12FB000
heap
page read and write
10B5000
unkown
page execute read
45EF000
stack
page read and write
42B3000
trusted library allocation
page read and write
79B000
stack
page read and write
10574000
unkown
page read and write
A6F1000
heap
page read and write
45A0000
heap
page read and write
35B0000
unkown
page read and write
4BE000
heap
page read and write
11293000
unkown
page read and write
42B3000
trusted library allocation
page read and write
4BE000
heap
page read and write
41B000
unkown
page read and write
2625000
trusted library allocation
page read and write
A416000
unkown
page read and write
C617000
unkown
page read and write
7FF5D75E9000
unkown
page readonly
7FF5D71C8000
unkown
page readonly
A95A000
heap
page read and write
F82000
trusted library allocation
page read and write
13B6000
heap
page read and write
DA6000
heap
page read and write
1560000
heap
page read and write
1C3D000
heap
page read and write
647000
heap
page read and write
3531000
trusted library allocation
page read and write
2680000
heap
page read and write
7DF4F2481000
unkown
page execute read
A40000
heap
page read and write
632000
heap
page read and write
1C58000
heap
page read and write
49D6000
unkown
page read and write
85B000
heap
page read and write
4BE000
heap
page read and write
24A0000
heap
page read and write
2420000
heap
page read and write
4BE000
heap
page read and write
AA0D000
heap
page read and write
A26A000
heap
page read and write
105B000
stack
page read and write
1338000
heap
page read and write
C4C6000
unkown
page read and write
1180000
trusted library allocation
page read and write
7FF5CE343000
unkown
page readonly
4B7000
heap
page read and write
113BF000
unkown
page read and write
A36000
trusted library allocation
page execute and read and write
1C4A000
heap
page read and write
F87000
trusted library allocation
page execute and read and write
57A000
stack
page read and write
7FF5D75EE000
unkown
page readonly
8500000
unkown
page read and write
1560000
trusted library allocation
page read and write
AB0B000
heap
page read and write
F8B000
trusted library allocation
page execute and read and write
8D3D000
stack
page read and write
8500000
unkown
page read and write
D20000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
1287000
trusted library allocation
page read and write
E20000
heap
page read and write
747000
heap
page read and write
25FE000
stack
page read and write
429F000
trusted library allocation
page read and write
47C3000
trusted library allocation
page read and write
E30000
heap
page read and write
A994000
heap
page read and write
7FF5D6BEF000
unkown
page readonly
12CE000
stack
page read and write
3060000
unkown
page read and write
11EF000
stack
page read and write
4BE000
heap
page read and write
52FF000
stack
page read and write
CF6000
trusted library allocation
page execute and read and write
A722000
heap
page read and write
26F6000
trusted library allocation
page read and write
ABCD000
heap
page read and write
4B7000
heap
page read and write
4BE000
heap
page read and write
4BE000
heap
page read and write
7FF5D74F2000
unkown
page readonly
8500000
unkown
page read and write
5050000
heap
page read and write
25BE000
stack
page read and write
A44A000
heap
page read and write
470000
heap
page read and write
42AA000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
3080000
direct allocation
page read and write
4600000
heap
page read and write
2300000
heap
page read and write
431C000
trusted library allocation
page read and write
2958000
trusted library allocation
page read and write
D45000
heap
page read and write
A2E6000
heap
page read and write
4B7000
heap
page read and write
AAB8000
heap
page read and write
7AF1000
unkown
page read and write
3120000
unkown
page read and write
49BB000
unkown
page read and write
11297000
unkown
page read and write
11E0000
heap
page read and write
C483000
unkown
page read and write
4B7000
heap
page read and write
C5B000
stack
page read and write
2FA0000
trusted library allocation
page read and write
362D000
unkown
page read and write
62A000
heap
page read and write
DD6000
trusted library allocation
page execute and read and write
504E000
stack
page read and write
F31000
trusted library allocation
page read and write
155D000
trusted library allocation
page execute and read and write
2550000
trusted library allocation
page read and write
12BE000
stack
page read and write
2FB000
stack
page read and write
1C64000
heap
page read and write
7EF000
heap
page read and write
1460000
trusted library allocation
page read and write
4BE000
heap
page read and write
3060000
unkown
page read and write
42B3000
trusted library allocation
page read and write
4B7000
heap
page read and write
C653000
unkown
page read and write
1C3D000
heap
page read and write
1C24000
heap
page read and write
12E0000
heap
page read and write
2811000
trusted library allocation
page read and write
3060000
unkown
page read and write
A778000
heap
page read and write
3060000
unkown
page read and write
9B41000
unkown
page read and write
A7B6000
heap
page read and write
FE0000
heap
page read and write
BD0000
heap
page read and write
2606000
trusted library allocation
page read and write
4B7000
heap
page read and write
2431000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
11B6000
heap
page read and write
3A23000
heap
page read and write
8500000
unkown
page read and write
7FF5D720A000
unkown
page readonly
154F000
stack
page read and write
7FF5D71EF000
unkown
page readonly
2DC0000
trusted library allocation
page read and write
AB4E000
heap
page read and write
C5A000
unkown
page write copy
C90000
trusted library allocation
page execute and read and write
1C31000
heap
page read and write
8A00000
unkown
page read and write
42DA000
trusted library allocation
page read and write
1187000
trusted library allocation
page execute and read and write
A79B000
heap
page read and write
5DE000
heap
page read and write
CB3000
heap
page read and write
293D000
trusted library allocation
page read and write
C4DC000
unkown
page read and write
42CC000
trusted library allocation
page read and write
60B000
heap
page read and write
1C5E000
heap
page read and write
4BE000
heap
page read and write
283D000
trusted library allocation
page read and write
3060000
unkown
page read and write
25A1000
trusted library allocation
page read and write
7FA000
trusted library allocation
page execute and read and write
9F96000
heap
page read and write
2B6D000
stack
page read and write
12CE000
heap
page read and write
AA8C000
heap
page read and write
11C5000
heap
page read and write
BEF000
heap
page read and write
AB21000
heap
page read and write
2828000
trusted library allocation
page read and write
34CE000
stack
page read and write
12C0000
heap
page read and write
10672000
unkown
page read and write
12FC000
heap
page read and write
137B000
heap
page read and write
7FF5D7808000
unkown
page readonly
4FE0000
trusted library allocation
page read and write
E80000
heap
page read and write
359D000
trusted library allocation
page read and write
23DC000
trusted library allocation
page read and write
2A7B000
trusted library allocation
page read and write
355F000
stack
page read and write
700000
trusted library allocation
page read and write
A733000
heap
page read and write
259E000
stack
page read and write
1C5E000
heap
page read and write
A8AB000
heap
page read and write
1BCC000
heap
page read and write
19D000
stack
page read and write
42F3000
trusted library allocation
page read and write
3060000
unkown
page read and write
4BE000
heap
page read and write
A916000
heap
page read and write
45B000
unkown
page readonly
1176000
trusted library allocation
page execute and read and write
10A0000
heap
page read and write
11E0000
trusted library allocation
page read and write
8DF000
heap
page read and write
F0B000
heap
page read and write
4B7000
heap
page read and write
AB08000
heap
page read and write
42A3000
trusted library allocation
page read and write
1C4A000
heap
page read and write
A273000
unkown
page read and write
4B7000
heap
page read and write
145A000
trusted library allocation
page execute and read and write
D34000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
D67000
trusted library allocation
page execute and read and write
E70000
heap
page read and write
7FF5D7641000
unkown
page readonly
A346000
heap
page read and write
2A87000
trusted library allocation
page execute and read and write
D6E000
stack
page read and write
914000
trusted library allocation
page read and write
ABAE000
heap
page read and write
6CF000
stack
page read and write
F421000
unkown
page read and write
1440000
heap
page read and write
4BE000
heap
page read and write
9F96000
heap
page read and write
8B3000
trusted library allocation
page execute and read and write
AA08000
unkown
page read and write
4BE000
heap
page read and write
8500000
unkown
page read and write
588C000
trusted library allocation
page read and write
12B0000
unkown
page read and write
2621000
trusted library allocation
page read and write
8F5000
heap
page read and write
997C000
stack
page read and write
42B3000
trusted library allocation
page read and write
42A3000
trusted library allocation
page read and write
A98F000
heap
page read and write
1BD1000
heap
page read and write
4B7000
heap
page read and write
95E000
stack
page read and write
4FDB000
trusted library allocation
page read and write
E35000
heap
page read and write
25F0000
heap
page read and write
8500000
unkown
page read and write
A74D000
heap
page read and write
C29000
heap
page read and write
2708000
unkown
page readonly
A6AA000
heap
page read and write
42A3000
trusted library allocation
page read and write
C27000
trusted library allocation
page execute and read and write
10002000
unkown
page readonly
26FD000
trusted library allocation
page read and write
B62000
trusted library allocation
page read and write
A8A0000
heap
page read and write
2661000
trusted library allocation
page read and write
500E000
stack
page read and write
4B7000
heap
page read and write
A241000
heap
page read and write
15C1000
trusted library allocation
page read and write
78E000
stack
page read and write
2AD8000
trusted library allocation
page read and write
AF7000
heap
page read and write
A9A0000
unkown
page read and write
D6B000
heap
page read and write
7FF5D7703000
unkown
page readonly
1096000
trusted library allocation
page read and write
4B7000
heap
page read and write
8500000
unkown
page read and write
BF3000
trusted library allocation
page execute and read and write
8B4000
trusted library allocation
page read and write
552C000
trusted library allocation
page read and write
AC5E000
heap
page read and write
8500000
unkown
page read and write
B0E000
stack
page read and write
12CE000
stack
page read and write
1BCF000
heap
page read and write
3A71000
trusted library allocation
page read and write
580000
heap
page read and write
26CE000
trusted library allocation
page read and write
1467000
trusted library allocation
page execute and read and write
D90000
trusted library allocation
page execute and read and write
3A77000
trusted library allocation
page read and write
1049000
heap
page read and write
BC6000
stack
page read and write
9CF000
stack
page read and write
2AB5000
trusted library allocation
page read and write
A40000
heap
page read and write
2708000
unkown
page readonly
5336000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
2280000
trusted library allocation
page execute and read and write
BA0000
trusted library allocation
page read and write
A910000
heap
page read and write
42A9000
trusted library allocation
page read and write
7FF5D7784000
unkown
page readonly
3060000
unkown
page read and write
AA00000
heap
page read and write
105FB000
unkown
page read and write
1154000
trusted library allocation
page read and write
5349000
trusted library allocation
page read and write
3DE5000
trusted library allocation
page read and write
C9B000
trusted library allocation
page execute and read and write
AC81000
heap
page read and write
760D000
unkown
page read and write
7FF5D77E9000
unkown
page readonly
1BED000
heap
page read and write
2A70000
trusted library allocation
page read and write
4B7000
heap
page read and write
A724000
heap
page read and write
510E000
stack
page read and write
1C2A000
heap
page read and write
30B000
stack
page read and write
400000
unkown
page execute and read and write
42A3000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
C800000
unkown
page read and write
A5B000
trusted library allocation
page execute and read and write
9B76000
unkown
page read and write
3A1C000
stack
page read and write
5DF000
heap
page read and write
8500000
unkown
page read and write
ACC9000
heap
page read and write
4F75000
trusted library allocation
page read and write
4BE000
heap
page read and write
D18000
heap
page read and write
2A71000
trusted library allocation
page read and write
A34A000
heap
page read and write
42CC000
trusted library allocation
page read and write
1AF9000
stack
page read and write
D6B000
trusted library allocation
page execute and read and write
A46000
heap
page read and write
A242000
heap
page read and write
51CC000
trusted library allocation
page read and write
A349000
heap
page read and write
7FF5D7309000
unkown
page readonly
7E5000
heap
page read and write
A42000
trusted library allocation
page read and write
4B7000
heap
page read and write
F50000
heap
page read and write
4298000
trusted library allocation
page read and write
100F000
heap
page read and write
51D1000
trusted library allocation
page read and write
A2DF000
heap
page read and write
60E000
heap
page read and write
4BE000
heap
page read and write
9A8C000
unkown
page read and write
429F000
trusted library allocation
page read and write
11A7000
trusted library allocation
page read and write
113D1000
unkown
page read and write
4B7000
heap
page read and write
42A3000
trusted library allocation
page read and write
7FF5D747F000
unkown
page readonly
E4F000
heap
page read and write
7FF5D71EA000
unkown
page readonly
9FB8000
heap
page read and write
2A70000
trusted library allocation
page read and write
A845000
heap
page read and write
C5B000
unkown
page execute and read and write
1C59000
heap
page read and write
1C6F000
heap
page read and write
E30000
heap
page read and write
C47F000
unkown
page read and write
42A3000
trusted library allocation
page read and write
40A000
unkown
page write copy
1C6F000
heap
page read and write
3060000
unkown
page read and write
3060000
unkown
page read and write
DFE000
stack
page read and write
A45D000
heap
page read and write
C80000
heap
page read and write
E80000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
42C3000
trusted library allocation
page read and write
26D8000
trusted library allocation
page read and write
977E000
stack
page read and write
4B7000
heap
page read and write
557E000
trusted library allocation
page read and write
2E9F000
stack
page read and write
A47000
trusted library allocation
page execute and read and write
AB01000
heap
page read and write
430C000
trusted library allocation
page read and write
3060000
unkown
page read and write
FE6000
trusted library allocation
page execute and read and write
AB98000
heap
page read and write
A350000
heap
page read and write
AB0000
trusted library allocation
page execute and read and write
7FF5D7280000
unkown
page readonly
A03000
trusted library allocation
page execute and read and write
E7E000
stack
page read and write
BBB000
stack
page read and write
1C63000
heap
page read and write
400000
unkown
page execute and read and write
1250000
unkown
page read and write
4BE000
heap
page read and write
9EAE000
stack
page read and write
A93E000
heap
page read and write
A31C000
heap
page read and write
7FF5D74FA000
unkown
page readonly
55B6000
trusted library allocation
page read and write
1434000
trusted library allocation
page read and write
1C64000
heap
page read and write
3740000
heap
page read and write
AD22000
heap
page read and write
408000
unkown
page readonly
1BB2000
heap
page read and write
A7EE000
heap
page read and write
1260000
heap
page read and write
42C6000
trusted library allocation
page read and write
3060000
unkown
page read and write
4EFE000
trusted library allocation
page read and write
7FF5D749B000
unkown
page readonly
42F4000
trusted library allocation
page read and write
42C6000
trusted library allocation
page read and write
4A16000
unkown
page read and write
2680000
trusted library allocation
page read and write
A436000
heap
page read and write
4BE000
heap
page read and write
8BD000
trusted library allocation
page execute and read and write
F21000
trusted library allocation
page read and write
1C5C000
heap
page read and write
1BA7000
heap
page read and write
3060000
unkown
page read and write
7FF5D748C000
unkown
page readonly
A5D7000
heap
page read and write
2500000
heap
page execute and read and write
7FF5D7272000
unkown
page readonly
B14E000
heap
page read and write
51D4000
trusted library allocation
page read and write
8C39000
stack
page read and write
A9DF000
heap
page read and write
950000
heap
page read and write
55C0000
unkown
page readonly
C496000
unkown
page read and write
8500000
unkown
page read and write
AB94000
heap
page read and write
927D000
stack
page read and write
2E5E000
stack
page read and write
8500000
unkown
page read and write
1085000
trusted library allocation
page read and write
C22000
trusted library allocation
page read and write
7FF5D71E0000
unkown
page readonly
7FF5D778A000
unkown
page readonly
42F2000
trusted library allocation
page read and write
4BE000
heap
page read and write
4BE000
heap
page read and write
7FF5D75BF000
unkown
page readonly
4B7000
heap
page read and write
A2CC000
heap
page read and write
7FF5D7745000
unkown
page readonly
114BA000
unkown
page read and write
EEE000
stack
page read and write
130D000
heap
page read and write
1320000
trusted library allocation
page read and write
2710000
heap
page execute and read and write
7FF5D7077000
unkown
page readonly
761E000
unkown
page read and write
D70000
heap
page read and write
9FBD000
heap
page read and write
42B3000
trusted library allocation
page read and write
9F90000
heap
page read and write
A3F8000
heap
page read and write
25D0000
heap
page read and write
F30000
heap
page read and write
1C67000
heap
page read and write
7FF5D71A6000
unkown
page readonly
D0E000
stack
page read and write
8A46000
unkown
page read and write
11F0000
trusted library allocation
page read and write
4303000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
8500000
unkown
page read and write
5AFF000
stack
page read and write
ACE4000
heap
page read and write
9FA6000
heap
page read and write
84D000
trusted library allocation
page execute and read and write
BAC000
stack
page read and write
113A3000
unkown
page read and write
7FF5D7700000
unkown
page readonly
A772000
heap
page read and write
900000
heap
page read and write
42BC000
trusted library allocation
page read and write
2A74000
trusted library allocation
page read and write
7FF5D71DA000
unkown
page readonly
4BE000
heap
page read and write
7FF5D774C000
unkown
page readonly
55B4000
trusted library allocation
page read and write
FF0000
heap
page read and write
8500000
unkown
page read and write
9A92000
unkown
page read and write
4A2000
unkown
page readonly
8500000
unkown
page read and write
35D1000
unkown
page read and write
A318000
heap
page read and write
280F000
trusted library allocation
page read and write
A859000
heap
page read and write
1C63000
heap
page read and write
C625000
unkown
page read and write
24F0000
trusted library allocation
page execute and read and write
5891000
trusted library allocation
page read and write
1129D000
unkown
page read and write
A9E4000
heap
page read and write
A9D6000
heap
page read and write
BCE000
stack
page read and write
11A1000
trusted library allocation
page read and write
F60000
heap
page read and write
8E4E000
stack
page read and write
A6C3000
heap
page read and write
A24D000
heap
page read and write
10B0000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
1390000
heap
page read and write
4BAE000
stack
page read and write
A44E000
heap
page read and write
A31B000
heap
page read and write
9F94000
heap
page read and write
2708000
trusted library allocation
page read and write
27D4000
heap
page read and write
DEE000
stack
page read and write
8500000
unkown
page read and write
42D5000
trusted library allocation
page read and write
2DF0000
heap
page read and write
1107000
trusted library allocation
page execute and read and write
12C7000
heap
page read and write
1C28000
heap
page read and write
A316000
heap
page read and write
42D9000
trusted library allocation
page read and write
D26000
heap
page read and write
AB6A000
heap
page read and write
17F7000
heap
page read and write
A286000
unkown
page read and write
4B7000
heap
page read and write
A7F1000
heap
page read and write
ACAB000
heap
page read and write
9FC2000
heap
page read and write
920000
heap
page read and write
AF0000
heap
page read and write
42A3000
trusted library allocation
page read and write
C5E000
stack
page read and write
780000
heap
page read and write
42B3000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
A7C6000
heap
page read and write
2FD1000
trusted library allocation
page read and write
3060000
unkown
page read and write
8C0000
heap
page read and write
4B7000
heap
page read and write
6F6000
stack
page read and write
35D3000
unkown
page read and write
2660000
heap
page read and write
AB17000
heap
page read and write
2DD6000
trusted library allocation
page read and write
42A2000
trusted library allocation
page read and write
7C31000
unkown
page read and write
ABF000
stack
page read and write
23AF000
trusted library allocation
page read and write
710000
heap
page read and write
3060000
unkown
page read and write
4BE000
heap
page read and write
360000
heap
page read and write
44C0000
heap
page read and write
ABE2000
heap
page read and write
5560000
heap
page execute and read and write
2AA0000
trusted library allocation
page read and write
7FF5D76CD000
unkown
page readonly
AADD000
heap
page read and write
4BE000
heap
page read and write
23C8000
trusted library allocation
page read and write
2442000
trusted library allocation
page read and write
7D0000
heap
page read and write
9FC4000
heap
page read and write
4B7000
heap
page read and write
91F0000
unkown
page readonly
35FA000
unkown
page read and write
AAA0000
heap
page read and write
A9B000
heap
page read and write
338E000
stack
page read and write
5D0000
heap
page read and write
7FF5D7799000
unkown
page readonly
590000
heap
page read and write
C450000
unkown
page read and write
1153D000
unkown
page read and write
4347000
trusted library allocation
page read and write
76F8000
unkown
page read and write
15B0000
heap
page read and write
960000
heap
page read and write
7FF5D770F000
unkown
page readonly
4B7000
heap
page read and write
85BE000
stack
page read and write
7CE000
stack
page read and write
1C59000
heap
page read and write
8500000
unkown
page read and write
2570000
heap
page read and write
255E000
stack
page read and write
42F3000
trusted library allocation
page read and write
434000
unkown
page read and write
7FF5D77E3000
unkown
page readonly
A00000
heap
page read and write
1445000
heap
page read and write
1C5E000
heap
page read and write
5584000
trusted library allocation
page read and write
A233000
unkown
page read and write
4297000
trusted library allocation
page read and write
C24E000
stack
page read and write
3400000
unkown
page read and write
4BE000
heap
page read and write
4BE000
heap
page read and write
DE7000
trusted library allocation
page execute and read and write
2710000
trusted library allocation
page read and write
8E2000
trusted library allocation
page read and write
4A40000
unkown
page read and write
42C8000
trusted library allocation
page read and write
1C5C000
heap
page read and write
A3A000
trusted library allocation
page execute and read and write
138D000
heap
page read and write
4BE000
heap
page read and write
8C0000
heap
page read and write
13F0000
heap
page read and write
27C0000
trusted library allocation
page read and write
AC01000
heap
page read and write
4293000
trusted library allocation
page read and write
15D0000
heap
page read and write
551E000
stack
page read and write
2941000
trusted library allocation
page read and write
9FD4000
heap
page read and write
1C27000
heap
page read and write
1030000
heap
page read and write
8F6000
stack
page read and write
4B7000
heap
page read and write
16DE000
heap
page read and write
35CD000
unkown
page read and write
FD0000
trusted library allocation
page read and write
16EB000
heap
page read and write
DDF000
stack
page read and write
A3D6000
heap
page read and write
1280000
trusted library allocation
page read and write
10D7000
heap
page read and write
2AFF000
stack
page read and write
89F9000
stack
page read and write
AC14000
heap
page read and write
7FF5D7482000
unkown
page readonly
4BE000
heap
page read and write
249F000
stack
page read and write
4F2E000
stack
page read and write
768E000
unkown
page read and write
A928000
heap
page read and write
51E0000
trusted library allocation
page read and write
ABC2000
heap
page read and write
BD0000
unkown
page readonly
3DE1000
trusted library allocation
page read and write
3060000
unkown
page read and write
B0E0000
unkown
page readonly
3EF7000
trusted library allocation
page read and write
A764000
heap
page read and write
42A3000
trusted library allocation
page read and write
35B3000
unkown
page read and write
389E000
stack
page read and write
3060000
unkown
page read and write
A342000
heap
page read and write
9D6000
trusted library allocation
page execute and read and write
D3D000
trusted library allocation
page execute and read and write
DA0000
heap
page read and write
A31A000
heap
page read and write
A84D000
heap
page read and write
42A3000
trusted library allocation
page read and write
96FE000
stack
page read and write
A325000
heap
page read and write
A316000
heap
page read and write
5D0000
heap
page read and write
2702000
trusted library allocation
page read and write
43E8000
trusted library allocation
page read and write
F10000
trusted library allocation
page execute and read and write
C2B000
trusted library allocation
page execute and read and write
A95F000
heap
page read and write
1C4A000
heap
page read and write
1080000
trusted library allocation
page read and write
A31C000
heap
page read and write
1156A000
unkown
page read and write
3060000
unkown
page read and write
26B7000
trusted library allocation
page read and write
11DF000
stack
page read and write
910000
trusted library allocation
page read and write
7FF5D7407000
unkown
page readonly
44EE000
stack
page read and write
830000
trusted library allocation
page read and write
1C63000
heap
page read and write
AA78000
heap
page read and write
D02000
trusted library allocation
page read and write
4BE000
heap
page read and write
23F0000
trusted library allocation
page read and write
3060000
unkown
page read and write
42B3000
trusted library allocation
page read and write
272E000
trusted library allocation
page read and write
1C56000
heap
page read and write
AC9C000
heap
page read and write
42AA000
trusted library allocation
page read and write
1BCC000
heap
page read and write
AC0E000
heap
page read and write
AE0000
trusted library allocation
page read and write
C27000
trusted library allocation
page execute and read and write
1C5F000
heap
page read and write
4B7000
heap
page read and write
AB31000
heap
page read and write
910000
heap
page read and write
A95C000
heap
page read and write
B0A000
trusted library allocation
page execute and read and write
EC0000
trusted library allocation
page read and write
AAFD000
heap
page read and write
4293000
trusted library allocation
page read and write
895000
heap
page read and write
A421000
heap
page read and write
120B000
trusted library allocation
page execute and read and write
C61B000
unkown
page read and write
9F8A000
heap
page read and write
10C7000
heap
page read and write
1B8A000
heap
page read and write
42B3000
trusted library allocation
page read and write
1157A000
unkown
page read and write
3060000
unkown
page read and write
B6B000
trusted library allocation
page execute and read and write
7E58000
stack
page read and write
20DF000
stack
page read and write
A237000
heap
page read and write
C8E000
stack
page read and write
A9DF000
unkown
page read and write
3280000
unkown
page read and write
54DE000
stack
page read and write
22FC000
stack
page read and write
80B000
trusted library allocation
page execute and read and write
ABDD000
heap
page read and write
C7BE000
unkown
page read and write
A944000
heap
page read and write
546E000
stack
page read and write
9F8D000
heap
page read and write
4B7000
heap
page read and write
ACC1000
heap
page read and write
3561000
trusted library allocation
page read and write
3520000
unkown
page readonly
9FCA000
heap
page read and write
4B7000
heap
page read and write
ABE5000
heap
page read and write
9A96000
unkown
page read and write
C63000
trusted library allocation
page execute and read and write
3060000
unkown
page read and write
A7FD000
heap
page read and write
7686000
unkown
page read and write
4B7000
heap
page read and write
DF9000
heap
page read and write
429C000
trusted library allocation
page read and write
51E1000
trusted library allocation
page read and write
AC7000
trusted library allocation
page read and write
7C80000
unkown
page read and write
918000
heap
page read and write
44D0000
heap
page read and write
B330000
unkown
page read and write
42A2000
trusted library allocation
page read and write
1BED000
heap
page read and write
2D10000
trusted library allocation
page read and write
AA8E000
heap
page read and write
A33B000
heap
page read and write
1BCE000
heap
page read and write
106F000
stack
page read and write
4B7000
heap
page read and write
113A8000
unkown
page read and write
9F81000
heap
page read and write
4290000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
ACC3000
heap
page read and write
1394000
heap
page read and write
BB9E000
stack
page read and write
A35A000
heap
page read and write
4A0000
unkown
page readonly
2AF0000
trusted library allocation
page read and write
AC38000
heap
page read and write
27FF000
stack
page read and write
42E0000
trusted library allocation
page read and write
A3A000
heap
page read and write
3500000
stack
page read and write
2A91000
trusted library allocation
page read and write
7FF5D760E000
unkown
page readonly
42B3000
trusted library allocation
page read and write
4BE000
heap
page read and write
4BE000
heap
page read and write
3070000
unkown
page read and write
8500000
unkown
page read and write
D77000
heap
page read and write
3C67000
trusted library allocation
page read and write
800000
heap
page read and write
3060000
unkown
page read and write
ACF000
stack
page read and write
A246000
heap
page read and write
4BE000
heap
page read and write
AC53000
heap
page read and write
632000
heap
page read and write
9DF000
stack
page read and write
3060000
unkown
page read and write
A742000
heap
page read and write
28B0000
direct allocation
page read and write
28AE000
stack
page read and write
F45E000
unkown
page read and write
556E000
stack
page read and write
840000
heap
page read and write
B00000
trusted library allocation
page read and write
13A0000
unkown
page readonly
2DDF000
stack
page read and write
11D0000
heap
page read and write
C035000
stack
page read and write
42C6000
trusted library allocation
page read and write
4AC0000
unkown
page read and write
7FF5D7385000
unkown
page readonly
AB0E000
heap
page read and write
AB42000
heap
page read and write
BB4000
trusted library allocation
page read and write
51F0000
heap
page execute and read and write
7FF5D77EB000
unkown
page readonly
FC3000
trusted library allocation
page execute and read and write
1C61000
heap
page read and write
42B3000
trusted library allocation
page read and write
1C39000
heap
page read and write
1550000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
14CC000
stack
page read and write
F520000
heap
page read and write
14CF000
stack
page read and write
A0E000
stack
page read and write
1566000
trusted library allocation
page execute and read and write
4BE000
heap
page read and write
1307000
heap
page read and write
AB45000
heap
page read and write
A89B000
heap
page read and write
A230000
heap
page read and write
AB3D000
heap
page read and write
4F70000
trusted library allocation
page read and write
B8DB000
stack
page read and write
28A7000
trusted library allocation
page read and write
9AB2000
unkown
page read and write
7D3E000
stack
page read and write
10001000
unkown
page execute read
E85000
heap
page read and write
374D000
trusted library allocation
page read and write
14BF000
stack
page read and write
866000
trusted library allocation
page execute and read and write
4AB0000
unkown
page read and write
58B0000
heap
page execute and read and write
2FF9000
stack
page read and write
4B7000
heap
page read and write
422000
unkown
page read and write
7440000
unkown
page read and write
2AF0000
trusted library allocation
page execute and read and write
838000
heap
page read and write
3070000
unkown
page read and write
9D67000
unkown
page read and write
C7C6000
unkown
page read and write
4B7000
heap
page read and write
1BCE000
heap
page read and write
2B46000
unkown
page readonly
7FF5D75DF000
unkown
page readonly
42C7000
trusted library allocation
page read and write
A100000
heap
page read and write
D20000
heap
page read and write
8500000
unkown
page read and write
2441000
trusted library allocation
page read and write
ACC6000
heap
page read and write
4BE000
heap
page read and write
7FF5D7257000
unkown
page readonly
4BE000
heap
page read and write
802000
trusted library allocation
page read and write
7FF5D777A000
unkown
page readonly
26D1000
trusted library allocation
page read and write
3A3E000
stack
page read and write
9EB000
trusted library allocation
page execute and read and write
2530000
trusted library allocation
page execute and read and write
7FF5D7820000
unkown
page readonly
2AB1000
trusted library allocation
page read and write
F84000
heap
page read and write
AD40000
heap
page read and write
2410000
trusted library allocation
page read and write
DE9000
heap
page read and write
7FF5D75B8000
unkown
page readonly
ACB4000
heap
page read and write
27C0000
direct allocation
page execute and read and write
4BE000
heap
page read and write
130A000
heap
page read and write
103C000
heap
page read and write
44D1000
heap
page read and write
1C58000
heap
page read and write
3070000
unkown
page read and write
D81000
unkown
page execute read
62B9000
unkown
page readonly
7FF5D783B000
unkown
page readonly
D62000
trusted library allocation
page read and write
867000
heap
page read and write
3060000
unkown
page read and write
1B20000
heap
page read and write
A28D000
unkown
page read and write
2A76000
trusted library allocation
page execute and read and write
EE0000
trusted library allocation
page read and write
2920000
heap
page read and write
AFBE000
stack
page read and write
115E000
stack
page read and write
4B7000
heap
page read and write
A976000
heap
page read and write
9B0B000
unkown
page read and write
8D0000
heap
page read and write
A30000
trusted library allocation
page read and write
1C58000
heap
page read and write
7FF5D77FD000
unkown
page readonly
BFF000
stack
page read and write
4390000
trusted library allocation
page read and write
7F0000
heap
page read and write
41B000
unkown
page write copy
3060000
unkown
page read and write
17E7000
heap
page read and write
296E000
stack
page read and write
278E000
stack
page read and write
56D0000
heap
page read and write
4B7000
heap
page read and write
7FF5D72D0000
unkown
page readonly
A415000
heap
page read and write
4BE000
heap
page read and write
7DF4F2460000
unkown
page readonly
1140000
trusted library allocation
page read and write
9E5000
heap
page read and write
610000
heap
page read and write
7DF4F2480000
unkown
page readonly
13A6000
heap
page read and write
2A80000
heap
page execute and read and write
2F9E000
stack
page read and write
1C31000
heap
page read and write
EF0000
heap
page read and write
3060000
unkown
page read and write
4BE000
heap
page read and write
42BB000
trusted library allocation
page read and write
7FF5D71D7000
unkown
page readonly
243E000
stack
page read and write
42C7000
trusted library allocation
page read and write
A672000
heap
page read and write
17C1000
trusted library allocation
page read and write
9DB000
heap
page read and write
890000
heap
page read and write
9F9F000
heap
page read and write
12C0000
heap
page read and write
9679000
stack
page read and write
B7DD000
stack
page read and write
FCD000
trusted library allocation
page execute and read and write
ABF3000
heap
page read and write
D5A000
trusted library allocation
page execute and read and write
ABB9000
heap
page read and write
8500000
unkown
page read and write
42B3000
trusted library allocation
page read and write
42A3000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
AC2D000
heap
page read and write
7FF5D7760000
unkown
page readonly
5882000
trusted library allocation
page read and write
2C05000
trusted library allocation
page read and write
11F2000
trusted library allocation
page read and write
3060000
unkown
page read and write
A41E000
heap
page read and write
42D7000
trusted library allocation
page read and write
4B7000
heap
page read and write
A9B8000
heap
page read and write
42A2000
trusted library allocation
page read and write
105F6000
unkown
page read and write
4BE000
heap
page read and write
42D0000
trusted library allocation
page read and write
19A000
stack
page read and write
14F0000
heap
page read and write
2FD6000
trusted library allocation
page read and write
3C90000
remote allocation
page read and write
9F87000
heap
page read and write
9FBA000
heap
page read and write
2740000
heap
page execute and read and write
4AA0000
unkown
page read and write
1020000
heap
page read and write
1C54000
heap
page read and write
4B7000
heap
page read and write
2D50000
trusted library allocation
page read and write
4B7000
heap
page read and write
2A6F000
stack
page read and write
2D20000
trusted library allocation
page read and write
7D8000
heap
page read and write
42EE000
trusted library allocation
page read and write
460000
heap
page read and write
4BE000
heap
page read and write
F3F000
stack
page read and write
1C63000
heap
page read and write
55C9000
trusted library allocation
page read and write
587F000
stack
page read and write
566E000
stack
page read and write
3060000
unkown
page read and write
A30000
heap
page read and write
2340000
heap
page execute and read and write
4BE000
heap
page read and write
A80C000
heap
page read and write
51E5000
trusted library allocation
page read and write
A1AF000
stack
page read and write
408000
unkown
page readonly
E69000
heap
page read and write
1C2C000
heap
page read and write
42BA000
trusted library allocation
page read and write
ABB2000
heap
page read and write
A54000
heap
page read and write
ED0000
heap
page read and write
91D000
trusted library allocation
page execute and read and write
25C8000
trusted library allocation
page read and write
C8B0000
unkown
page read and write
7FF5D76E8000
unkown
page readonly
1C4A000
heap
page read and write
1C54000
heap
page read and write
2D7F000
stack
page read and write
12A0000
trusted library allocation
page read and write
4B7000
heap
page read and write
A891000
heap
page read and write
4BE000
heap
page read and write
3060000
unkown
page read and write
BAB000
stack
page read and write
A3F1000
heap
page read and write
7618000
unkown
page read and write
1E4E000
stack
page read and write
AAE9000
heap
page read and write
A31B000
heap
page read and write
9A8D000
heap
page read and write
D0E000
stack
page read and write
42B3000
trusted library allocation
page read and write
A219000
heap
page read and write
7FF5D75A6000
unkown
page readonly
12BB000
heap
page read and write
7B60000
unkown
page readonly
3060000
unkown
page read and write
F37000
trusted library allocation
page read and write
9ADB000
unkown
page read and write
3060000
unkown
page read and write
A9E9000
unkown
page read and write
C64000
trusted library allocation
page read and write
9F89000
heap
page read and write
1C4C000
heap
page read and write
2EC7000
trusted library allocation
page read and write
7FF5D7705000
unkown
page readonly
C806000
unkown
page read and write
26B4000
trusted library allocation
page read and write
AD02000
heap
page read and write
7FF5D69BB000
unkown
page readonly
4B7000
heap
page read and write
7FF5D7215000
unkown
page readonly
3070000
unkown
page read and write
A99C000
heap
page read and write
A251000
heap
page read and write
7DBD000
stack
page read and write
C62D000
unkown
page read and write
7E5000
heap
page read and write
3060000
unkown
page read and write
BE1000
trusted library allocation
page read and write
A766000
heap
page read and write
8500000
unkown
page read and write
7F0000
heap
page read and write
BC0000
heap
page read and write
7989000
stack
page read and write
11FA000
trusted library allocation
page execute and read and write
3310000
unkown
page read and write
42B3000
trusted library allocation
page read and write
7FF5D772C000
unkown
page readonly
A872000
heap
page read and write
285E000
heap
page read and write
AEE000
heap
page read and write
DB3000
trusted library allocation
page execute and read and write
C85000
heap
page read and write
4391000
heap
page read and write
5E0000
heap
page read and write
A341000
heap
page read and write
5B0000
heap
page read and write
850000
trusted library allocation
page read and write
41B000
unkown
page write copy
42A3000
trusted library allocation
page read and write
123E000
stack
page read and write
9E7000
trusted library allocation
page execute and read and write
1C29000
heap
page read and write
4297000
trusted library allocation
page read and write
1560000
heap
page read and write
A816000
heap
page read and write
42E2000
trusted library allocation
page read and write
30FB000
stack
page read and write
4BE000
heap
page read and write
EA0000
trusted library allocation
page execute and read and write
370000
heap
page read and write
4460000
trusted library allocation
page read and write
7FF5D7450000
unkown
page readonly
A1F000
heap
page read and write
5325000
trusted library allocation
page read and write
7DD0000
heap
page read and write
C8C000
stack
page read and write
BF8000
heap
page read and write
7FF5D7558000
unkown
page readonly
2A82000
trusted library allocation
page read and write
2A7A000
trusted library allocation
page execute and read and write
52E0000
trusted library allocation
page read and write
8F49000
stack
page read and write
4BE000
heap
page read and write
17AB000
stack
page read and write
9CF000
heap
page read and write
AF0000
heap
page read and write
A268000
heap
page read and write
4BE000
heap
page read and write
A6BC000
heap
page read and write
4B7000
heap
page read and write
AC4000
heap
page read and write
2919000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
1BD0000
heap
page read and write
26DB000
trusted library allocation
page read and write
A7B000
stack
page read and write
12D0000
heap
page read and write
42A3000
trusted library allocation
page read and write
BF0000
heap
page read and write
1175000
heap
page read and write
8500000
unkown
page read and write
C40000
trusted library allocation
page read and write
8DA000
trusted library allocation
page execute and read and write
2290000
heap
page read and write
11CF000
stack
page read and write
AAA9000
unkown
page read and write
11B0000
heap
page read and write
7FF5D77B9000
unkown
page readonly
42D6000
trusted library allocation
page read and write
A32B000
heap
page read and write
5A0000
heap
page read and write
A25B000
heap
page read and write
42F3000
trusted library allocation
page read and write
718000
heap
page read and write
3310000
unkown
page read and write
CAF000
heap
page read and write
A841000
heap
page read and write
8500000
unkown
page read and write
A4A000
trusted library allocation
page execute and read and write
A789000
heap
page read and write
42A3000
trusted library allocation
page read and write
1554000
trusted library allocation
page read and write
8500000
unkown
page read and write
A40E000
unkown
page read and write
1C4C000
heap
page read and write
AF0000
trusted library allocation
page read and write
AAF5000
heap
page read and write
2458000
trusted library allocation
page read and write
AEA000
heap
page read and write
4B7000
heap
page read and write
3CB000
stack
page read and write
7FF5D7604000
unkown
page readonly
DD2000
trusted library allocation
page read and write
4B7000
heap
page read and write
17E5000
heap
page read and write
3310000
unkown
page read and write
A7A6000
heap
page read and write
AC8D000
heap
page read and write
F522000
heap
page read and write
520E000
stack
page read and write
10BB000
heap
page read and write
11428000
unkown
page read and write
A262000
heap
page read and write
A323000
heap
page read and write
4B7000
heap
page read and write
645000
heap
page read and write
ACCE000
heap
page read and write
2A7E000
trusted library allocation
page read and write
8500000
unkown
page read and write
AF6000
stack
page read and write
3060000
unkown
page read and write
1C27000
heap
page read and write
7C0000
trusted library allocation
page read and write
ABEB000
heap
page read and write
2610000
heap
page execute and read and write
3060000
unkown
page read and write
2448000
trusted library allocation
page read and write
4BE000
heap
page read and write
1C63000
heap
page read and write
42B3000
trusted library allocation
page read and write
DFB000
trusted library allocation
page execute and read and write
280D000
trusted library allocation
page read and write
9FBD000
heap
page read and write
A33D000
heap
page read and write
86E0000
unkown
page readonly
1120000
heap
page read and write
1BB8000
heap
page read and write
A2E1000
heap
page read and write
4312000
trusted library allocation
page read and write
1390000
heap
page read and write
284E000
stack
page read and write
C00000
trusted library allocation
page read and write
AD1A000
heap
page read and write
42B3000
trusted library allocation
page read and write
AB59000
heap
page read and write
51CE000
stack
page read and write
10004000
unkown
page readonly
4B7000
heap
page read and write
ACF3000
heap
page read and write
2F7E000
stack
page read and write
AC63000
heap
page read and write
26E8000
trusted library allocation
page read and write
A719000
heap
page read and write
BB10000
heap
page read and write
2BE4000
trusted library allocation
page read and write
75B000
stack
page read and write
CD7000
heap
page read and write
F44F000
unkown
page read and write
2B00000
unkown
page readonly
4BE000
heap
page read and write
F53000
trusted library allocation
page execute and read and write
4B7000
heap
page read and write
7FF5D7429000
unkown
page readonly
4B7000
heap
page read and write
F5D000
trusted library allocation
page execute and read and write
27F0000
heap
page execute and read and write
E97000
heap
page read and write
4F7E000
stack
page read and write
7C90000
unkown
page read and write
1C48000
heap
page read and write
2BD0000
trusted library allocation
page read and write
8500000
unkown
page read and write
5443000
trusted library allocation
page read and write
36FE000
stack
page read and write
113DB000
unkown
page read and write
A2A2000
unkown
page read and write
A2B000
heap
page read and write
979000
heap
page read and write
3C7F000
stack
page read and write
B3B000
heap
page read and write
2B11000
trusted library allocation
page read and write
11B0000
heap
page read and write
4B7000
heap
page read and write
401000
unkown
page execute read
2A46000
trusted library allocation
page read and write
A341000
heap
page read and write
42B3000
trusted library allocation
page read and write
FF8000
heap
page read and write
7FF5D766E000
unkown
page readonly
1C63000
heap
page read and write
4B7000
heap
page read and write
A40000
trusted library allocation
page read and write
2950000
heap
page read and write
5340000
trusted library allocation
page read and write
DD3000
unkown
page execute read
7605000
unkown
page read and write
29D0000
trusted library allocation
page read and write
8500000
unkown
page read and write
3C61000
trusted library allocation
page read and write
1BEE000
heap
page read and write
D40000
trusted library allocation
page read and write
23A3000
trusted library allocation
page read and write
AB9B000
heap
page read and write
4B7000
heap
page read and write
2C61000
trusted library allocation
page read and write
1025000
heap
page read and write
27D0000
heap
page read and write
865000
heap
page read and write
9A76000
unkown
page read and write
CF6000
stack
page read and write
A247000
heap
page read and write
9F92000
heap
page read and write
C49000
unkown
page readonly
2541000
trusted library allocation
page read and write
2A90000
trusted library allocation
page read and write
A7CF000
heap
page read and write
A9C0000
heap
page read and write
454000
unkown
page readonly
8500000
unkown
page read and write
A85B000
heap
page read and write
11298000
unkown
page read and write
A70000
heap
page read and write
79E000
heap
page read and write
1B8E000
heap
page read and write
42DA000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
429D000
trusted library allocation
page read and write
8930000
unkown
page read and write
4BE000
heap
page read and write
3060000
unkown
page read and write
11F6000
trusted library allocation
page execute and read and write
3060000
unkown
page read and write
A361000
heap
page read and write
4E7E000
stack
page read and write
2E08000
trusted library allocation
page read and write
1C59000
heap
page read and write
9F8A000
heap
page read and write
45B000
unkown
page readonly
1480000
trusted library allocation
page read and write
2650000
trusted library allocation
page execute and read and write
7AB0000
unkown
page read and write
3C65000
trusted library allocation
page read and write
820000
heap
page read and write
243F000
trusted library allocation
page read and write
7FF5D73F5000
unkown
page readonly
A33E000
heap
page read and write
4F25000
trusted library allocation
page read and write
9FAA000
heap
page read and write
2A70000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
42DB000
trusted library allocation
page read and write
7FF5D7643000
unkown
page readonly
A2B5000
unkown
page read and write
118B000
trusted library allocation
page execute and read and write
3060000
unkown
page read and write
C9C000
heap
page read and write
42A3000
trusted library allocation
page read and write
4BE000
heap
page read and write
1200000
trusted library allocation
page read and write
F93000
heap
page read and write
26C8000
trusted library allocation
page read and write
675000
heap
page read and write
C663000
unkown
page read and write
42C9000
trusted library allocation
page read and write
1142B000
unkown
page read and write
6F6000
stack
page read and write
4BE000
heap
page read and write
42CA000
trusted library allocation
page read and write
8500000
unkown
page read and write
400000
unkown
page readonly
2A80000
trusted library allocation
page read and write
1582000
trusted library allocation
page read and write
10E91000
unkown
page read and write
2D26000
trusted library allocation
page execute and read and write
4B7000
heap
page read and write
24E0000
heap
page execute and read and write
560000
heap
page read and write
8500000
unkown
page read and write
51BE000
stack
page read and write
A212000
heap
page read and write
39FD000
stack
page read and write
ED4000
trusted library allocation
page read and write
1C63000
heap
page read and write
9F99000
heap
page read and write
A86E000
heap
page read and write
110B000
trusted library allocation
page execute and read and write
12A0000
heap
page read and write
401000
unkown
page execute read
2623000
trusted library allocation
page read and write
2708000
unkown
page readonly
A393000
heap
page read and write
43B0000
trusted library allocation
page read and write
AC34000
heap
page read and write
400000
unkown
page readonly
2EF1000
trusted library allocation
page read and write
1C62000
heap
page read and write
B06000
trusted library allocation
page execute and read and write
1C63000
heap
page read and write
A12F000
stack
page read and write
AB7B000
heap
page read and write
7FF5D738E000
unkown
page readonly
8CB8000
stack
page read and write
C5FA000
unkown
page read and write
D80000
unkown
page readonly
10C4000
trusted library allocation
page read and write
7FF5D7648000
unkown
page readonly
A6E0000
heap
page read and write
98FD000
stack
page read and write
42A2000
trusted library allocation
page read and write
431F000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
AC49000
heap
page read and write
8500000
unkown
page read and write
A60A000
heap
page read and write
22DC000
stack
page read and write
4B7000
heap
page read and write
A4D000
stack
page read and write
2604000
trusted library allocation
page read and write
252E000
stack
page read and write
8E7000
trusted library allocation
page execute and read and write
2667000
trusted library allocation
page read and write
4BE000
heap
page read and write
7654000
unkown
page read and write
9AF9000
unkown
page read and write
9A80000
unkown
page read and write
2933000
trusted library allocation
page read and write
1018000
heap
page read and write
3A75000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
1100000
heap
page read and write
A08000
heap
page read and write
9F8B000
heap
page read and write
8D6000
trusted library allocation
page execute and read and write
CC0000
trusted library allocation
page execute and read and write
42CB000
trusted library allocation
page read and write
AC8F000
heap
page read and write
23A5000
trusted library allocation
page read and write
10E0000
unkown
page read and write
7FF5D7394000
unkown
page readonly
7FF5D6BDB000
unkown
page readonly
A33B000
heap
page read and write
3070000
unkown
page read and write
C865000
unkown
page read and write
1C65000
heap
page read and write
2DC5000
trusted library allocation
page read and write
26F0000
trusted library allocation
page read and write
8500000
unkown
page read and write
1520000
heap
page read and write
A344000
heap
page read and write
A35F000
heap
page read and write
5CE000
stack
page read and write
42BC000
trusted library allocation
page read and write
1C61000
heap
page read and write
23B1000
trusted library allocation
page read and write
A3F3000
heap
page read and write
AB84000
heap
page read and write
42C3000
trusted library allocation
page read and write
ABD4000
heap
page read and write
A364000
heap
page read and write
4BE000
heap
page read and write
1C54000
heap
page read and write
1C32000
heap
page read and write
42B3000
trusted library allocation
page read and write
D33000
trusted library allocation
page execute and read and write
26B6000
trusted library allocation
page read and write
4B7000
heap
page read and write
E54000
heap
page read and write
26BE000
trusted library allocation
page read and write
43EF000
stack
page read and write
539F000
stack
page read and write
2A93000
trusted library allocation
page read and write
5F5000
heap
page read and write
4BE000
heap
page read and write
1C69000
heap
page read and write
7FF5D72BD000
unkown
page readonly
348F000
stack
page read and write
4B7000
heap
page read and write
8B1000
trusted library allocation
page read and write
19D000
stack
page read and write
A339000
heap
page read and write
47B0000
heap
page read and write
8360000
unkown
page read and write
BD0000
trusted library allocation
page execute and read and write
4B7000
heap
page read and write
CD3000
trusted library allocation
page execute and read and write
1090000
heap
page read and write
3070000
unkown
page read and write
7FF5D7425000
unkown
page readonly
1C30000
heap
page read and write
4BE000
heap
page read and write
F00000
heap
page read and write
9BD000
trusted library allocation
page execute and read and write
1C4D000
heap
page read and write
3310000
unkown
page read and write
1600000
trusted library allocation
page read and write
D10000
heap
page read and write
B5F000
stack
page read and write
F27000
trusted library allocation
page read and write
7FF5D72CE000
unkown
page readonly
E5E000
stack
page read and write
4B7000
heap
page read and write
6D0000
heap
page read and write
A75C000
heap
page read and write
1580000
heap
page read and write
113FB000
unkown
page read and write
860000
trusted library allocation
page read and write
1129D000
unkown
page read and write
1360000
unkown
page readonly
AC25000
heap
page read and write
11F7000
trusted library allocation
page execute and read and write
7FF5D745B000
unkown
page readonly
7FF5D764F000
unkown
page readonly
7693000
unkown
page read and write
A04000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
2BAE000
stack
page read and write
3060000
unkown
page read and write
1C56000
heap
page read and write
7FF5D7292000
unkown
page readonly
F80000
heap
page read and write
213E000
stack
page read and write
7FF5D776F000
unkown
page readonly
2F80000
heap
page read and write
2FFB000
trusted library allocation
page read and write
370C000
stack
page read and write
4BE000
heap
page read and write
124F000
stack
page read and write
D50000
heap
page read and write
4299000
trusted library allocation
page read and write
114E000
stack
page read and write
126E000
stack
page read and write
BB3000
trusted library allocation
page execute and read and write
4347000
trusted library allocation
page read and write
3B7E000
stack
page read and write
25B8000
trusted library allocation
page read and write
4B7000
heap
page read and write
4390000
heap
page read and write
C4E000
stack
page read and write
AA5A000
heap
page read and write
1C29000
heap
page read and write
4B7000
heap
page read and write
1590000
heap
page read and write
59BE000
stack
page read and write
2800000
heap
page read and write
ED8000
heap
page read and write
A39F000
unkown
page read and write
4BE000
heap
page read and write
7FF5D71CC000
unkown
page readonly
12D0000
heap
page read and write
1C63000
heap
page read and write
163B000
heap
page read and write
7FF5D75D6000
unkown
page readonly
1C4A000
heap
page read and write
A35000
heap
page read and write
3370000
unkown
page read and write
BD1000
unkown
page execute read
3060000
unkown
page read and write
7FF5D71E6000
unkown
page readonly
3160000
unkown
page read and write
10C0000
trusted library allocation
page read and write
C0F000
stack
page read and write
2850000
heap
page execute and read and write
1C48000
heap
page read and write
38BF000
stack
page read and write
966000
heap
page read and write
A955000
heap
page read and write
AB51000
heap
page read and write
7B10000
unkown
page read and write
11294000
unkown
page read and write
1190000
trusted library allocation
page execute and read and write
A34C000
heap
page read and write
7FF5D7230000
unkown
page readonly
1694000
unkown
page readonly
1C67000
heap
page read and write
A967000
heap
page read and write
42C2000
trusted library allocation
page read and write
AC86000
heap
page read and write
4B7000
heap
page read and write
4A12000
unkown
page read and write
4BE000
heap
page read and write
A225000
heap
page read and write
E77000
trusted library allocation
page read and write
AC5C000
heap
page read and write
4BE000
heap
page read and write
F40000
trusted library allocation
page read and write
4DB000
stack
page read and write
C6D000
trusted library allocation
page execute and read and write
A607000
heap
page read and write
F69000
heap
page read and write
8500000
unkown
page read and write
A5EF000
heap
page read and write
4AAD000
stack
page read and write
2708000
unkown
page readonly
4BE000
heap
page read and write
ED3000
trusted library allocation
page execute and read and write
A220000
unkown
page read and write
C908000
unkown
page read and write
2855000
trusted library allocation
page read and write
A67B000
heap
page read and write
1180000
heap
page read and write
7FF5D743F000
unkown
page readonly
7FF5D74A6000
unkown
page readonly
AB76000
heap
page read and write
418D000
stack
page read and write
AA7000
heap
page read and write
7FF5D66E3000
unkown
page readonly
1389000
heap
page read and write
41B000
unkown
page read and write
3060000
unkown
page read and write
3310000
unkown
page read and write
3060000
unkown
page read and write
42B3000
trusted library allocation
page read and write
4B7000
heap
page read and write
B15000
heap
page read and write
7FB000
heap
page read and write
8500000
unkown
page read and write
42B3000
trusted library allocation
page read and write
4BE000
heap
page read and write
9579000
stack
page read and write
125E000
stack
page read and write
7CC000
heap
page read and write
4438000
trusted library allocation
page read and write
4B7000
heap
page read and write
84E000
stack
page read and write
3060000
unkown
page read and write
8870000
unkown
page readonly
DA0000
heap
page read and write
9A8E000
unkown
page read and write
143D000
trusted library allocation
page execute and read and write
77DB000
unkown
page read and write
7FF5D7740000
unkown
page readonly
A330000
heap
page read and write
1646000
heap
page read and write
4BE000
heap
page read and write
CA0000
heap
page read and write
35C1000
unkown
page read and write
4FD4000
trusted library allocation
page read and write
A57000
trusted library allocation
page execute and read and write
A78000
heap
page read and write
10E0000
unkown
page read and write
4EF0000
trusted library allocation
page read and write
462000
unkown
page readonly
42A000
unkown
page read and write
1C5D000
heap
page read and write
B0BD000
stack
page read and write
462B000
trusted library allocation
page read and write
10FF000
stack
page read and write
4FD0000
trusted library allocation
page read and write
3370000
unkown
page read and write
F47000
trusted library allocation
page read and write
DC0000
heap
page read and write
A2D000
trusted library allocation
page execute and read and write
2AA0000
heap
page execute and read and write
4B7000
heap
page read and write
8500000
unkown
page read and write
7F0000
trusted library allocation
page read and write
10E0000
unkown
page read and write
A740000
heap
page read and write
8500000
unkown
page read and write
8500000
unkown
page read and write
2A50000
trusted library allocation
page read and write
42A3000
trusted library allocation
page read and write
A311000
heap
page read and write
EDD000
trusted library allocation
page execute and read and write
890000
trusted library allocation
page read and write
BFD000
trusted library allocation
page execute and read and write
97FF000
stack
page read and write
A240000
heap
page read and write
4F17000
trusted library allocation
page read and write
4BE000
heap
page read and write
4BE000
heap
page read and write
A49000
heap
page read and write
8500000
unkown
page read and write
7FF5D710B000
unkown
page readonly
4B7000
heap
page read and write
26F1000
trusted library allocation
page read and write
DBD000
trusted library allocation
page execute and read and write
8B7000
trusted library allocation
page read and write
266E000
stack
page read and write
F7A000
trusted library allocation
page execute and read and write
10B5000
unkown
page execute read
1C4C000
heap
page read and write
825000
heap
page read and write
2881000
trusted library allocation
page read and write
AA92000
heap
page read and write
1434000
trusted library allocation
page read and write
2BB0000
heap
page read and write
A77E000
heap
page read and write
C609000
unkown
page read and write
CA7000
heap
page read and write
1C65000
heap
page read and write
632000
heap
page read and write
1096000
heap
page read and write
736000
stack
page read and write
2780000
direct allocation
page execute and read and write
7FF5D7797000
unkown
page readonly
4391000
trusted library allocation
page read and write
42A2000
trusted library allocation
page read and write
4BE000
heap
page read and write
AE9000
heap
page read and write
4BE000
heap
page read and write
8500000
unkown
page read and write
2B20000
heap
page execute and read and write
DEB000
trusted library allocation
page execute and read and write
AAE000
stack
page read and write
AA9C000
unkown
page read and write
7CE000
stack
page read and write
1150000
trusted library allocation
page read and write
8F6000
stack
page read and write
401000
unkown
page execute read
42AC000
trusted library allocation
page read and write
4BE000
heap
page read and write
9AA8000
unkown
page read and write
C9A7000
unkown
page read and write
3370000
unkown
page read and write
4B7000
heap
page read and write
4294000
trusted library allocation
page read and write
81E000
stack
page read and write
A9C7000
heap
page read and write
ABA2000
heap
page read and write
3DE000
stack
page read and write
A7A8000
heap
page read and write
439000
unkown
page readonly
99B0000
unkown
page read and write
1C5D000
heap
page read and write
4293000
trusted library allocation
page read and write
7FF5D765F000
unkown
page readonly
A330000
heap
page read and write
7FF5D74B8000
unkown
page readonly
52C0000
trusted library allocation
page read and write
4BE000
heap
page read and write
11299000
unkown
page read and write
12AF000
heap
page read and write
10689000
unkown
page read and write
AAEF000
heap
page read and write
AD04000
heap
page read and write
807000
trusted library allocation
page execute and read and write
BDC0000
unkown
page read and write
4BE000
heap
page read and write
9F89000
heap
page read and write
8500000
unkown
page read and write
ABFA000
heap
page read and write
5E8000
heap
page read and write
4BE000
heap
page read and write
2720000
heap
page read and write
A6BF000
heap
page read and write
4B7000
heap
page read and write
A3E6000
heap
page read and write
4BE000
heap
page read and write
11406000
unkown
page read and write
345E000
stack
page read and write
4BE000
heap
page read and write
113F0000
unkown
page read and write
A35F000
heap
page read and write
C5F4000
unkown
page read and write
2803000
trusted library allocation
page read and write
A92B000
heap
page read and write
8500000
unkown
page read and write
4B7000
heap
page read and write
7FF5D76F5000
unkown
page readonly
AB05000
heap
page read and write
8DD0000
stack
page read and write
1C63000
heap
page read and write
3060000
unkown
page read and write
E70000
trusted library allocation
page read and write
26FE000
stack
page read and write
5463000
unkown
page read and write
C1CC000
stack
page read and write
5210000
heap
page execute and read and write
42E7000
trusted library allocation
page read and write
1395000
heap
page read and write
660000
heap
page read and write
23F5000
trusted library allocation
page read and write
557B000
trusted library allocation
page read and write
A327000
heap
page read and write
42A000
unkown
page read and write
12CA000
heap
page read and write
ACB1000
heap
page read and write
54F1000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
1C59000
heap
page read and write
4312000
trusted library allocation
page read and write
1156000
stack
page read and write
4B7000
heap
page read and write
1030000
heap
page read and write
52E5000
trusted library allocation
page read and write
4B7000
heap
page read and write
42A3000
trusted library allocation
page read and write
A46000
trusted library allocation
page execute and read and write
7FF5D7442000
unkown
page readonly
428E000
stack
page read and write
BE70000
unkown
page readonly
10E0000
unkown
page read and write
ACD3000
heap
page read and write
77A2000
unkown
page read and write
A837000
heap
page read and write
AB2B000
heap
page read and write
9AC000
stack
page read and write
4B7000
heap
page read and write
A20000
trusted library allocation
page read and write
11FE000
stack
page read and write
7B0000
heap
page read and write
1321000
heap
page read and write
A33A000
heap
page read and write
1C63000
heap
page read and write
35B5000
unkown
page read and write
A2F000
stack
page read and write
42A7000
trusted library allocation
page read and write
2A60000
heap
page read and write
99C0000
unkown
page read and write
A2F7000
heap
page read and write
A6C7000
heap
page read and write
A27D000
heap
page read and write
2D2A000
trusted library allocation
page execute and read and write
A450000
heap
page read and write
2AEE000
stack
page read and write
2B17000
trusted library allocation
page read and write
A9CB000
heap
page read and write
8500000
unkown
page read and write
AC7F000
heap
page read and write
C5EC000
unkown
page read and write
9B000
stack
page read and write
1C67000
heap
page read and write
A9FD000
heap
page read and write
AA3C000
heap
page read and write
3060000
unkown
page read and write
1B10000
heap
page read and write
DA0000
heap
page read and write
8500000
unkown
page read and write
770000
heap
page read and write
1140C000
unkown
page read and write
53B000
stack
page read and write
25B0000
heap
page read and write
151E000
stack
page read and write
7FF5D75F6000
unkown
page readonly
2BB0000
trusted library allocation
page read and write
4BE000
heap
page read and write
4B7000
heap
page read and write
288E000
stack
page read and write
1C69000
heap
page read and write
1C59000
heap
page read and write
86A000
trusted library allocation
page execute and read and write
A27A000
heap
page read and write
7691000
unkown
page read and write
7637000
unkown
page read and write
15C7000
trusted library allocation
page read and write
C40000
heap
page read and write
A9AB000
heap
page read and write
4BE000
heap
page read and write
8C9000
heap
page read and write
7F6000
trusted library allocation
page execute and read and write
2960000
heap
page execute and read and write
AB79000
heap
page read and write
7FF5D728E000
unkown
page readonly
3060000
unkown
page read and write
C1F000
stack
page read and write
7FF5D7669000
unkown
page readonly
A76F000
heap
page read and write
395000
heap
page read and write
7AA0000
unkown
page read and write
C1A000
trusted library allocation
page execute and read and write
ACFE000
heap
page read and write
7FF5D66E8000
unkown
page readonly
1C48000
heap
page read and write
1067B000
unkown
page read and write
2FE1000
trusted library allocation
page read and write
10E0000
unkown
page read and write
9FB5000
heap
page read and write
AAAC000
heap
page read and write
42A3000
trusted library allocation
page read and write
1C58000
heap
page read and write
D48000
heap
page read and write
A896000
heap
page read and write
8500000
unkown
page read and write
A94F000
heap
page read and write
A23A000
heap
page read and write
290F000
stack
page read and write
14D0000
heap
page read and write
3EF1000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
9E2E000
stack
page read and write
42E000
unkown
page readonly
2920000
heap
page execute and read and write
4B7000
heap
page read and write
BD8000
heap
page read and write
42A3000
trusted library allocation
page read and write
7FF5D720F000
unkown
page readonly
BBF000
stack
page read and write
10E0000
unkown
page read and write
2BD5000
trusted library allocation
page read and write
There are 3681 hidden memdumps, click here to show them.