IOC Report
SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\huge[1].dat
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\53FF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7719.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\96C7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\nsn3C59.tmp\liteFirewall.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsz7739.tmp\blowfish.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Del.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\svgbeht
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\svgbeht:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsaC2D3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsu7719.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsz7739.tmp\INetC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsz7739.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
data
modified
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\cef.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
data
dropped
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\start.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
MSVC program database ver 7.00, 512*4023 bytes
dropped
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 106 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\svgbeht
C:\Users\user\AppData\Roaming\svgbeht
malicious
C:\Users\user\AppData\Local\Temp\53FF.exe
C:\Users\user\AppData\Local\Temp\53FF.exe
malicious
C:\Users\user\AppData\Local\Temp\7719.exe
C:\Users\user\AppData\Local\Temp\7719.exe
malicious
C:\Users\user\AppData\Local\Temp\96C7.exe
C:\Users\user\AppData\Local\Temp\96C7.exe
malicious
C:\Users\user\AppData\Roaming\svgbeht
C:\Users\user\AppData\Roaming\svgbeht
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
"C:\Users\user\AppData\Local\Temp\setup.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.127 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3924 --field-trial-handle=3932,i,15479230681103079642,970092008260029416,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.127 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=2972 --field-trial-handle=3932,i,15479230681103079642,970092008260029416,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.127 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=2260 --field-trial-handle=3932,i,15479230681103079642,970092008260029416,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.127 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719957786566967 --launch-time-ticks=6521213265 --mojo-platform-channel-handle=4044 --field-trial-handle=3932,i,15479230681103079642,970092008260029416,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.127 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719957786566967 --launch-time-ticks=6521380179 --mojo-platform-channel-handle=4056 --field-trial-handle=3932,i,15479230681103079642,970092008260029416,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://gebeus.ru/tmp/index.php
malicious
http://cx5519.com/tmp/index.php
malicious
contintnetksows.shop
malicious
http://evilos.cc/tmp/index.php
malicious
ellaboratepwsz.xyz
malicious
swellfrrgwwos.xyz
malicious
foodypannyjsud.shop
malicious
pedestriankodwu.xyz
malicious
towerxxuytwi.xyz
malicious
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://foodypannyjsud.shop/q
unknown
https://duckduckgo.com/ac/?q=
unknown
https://foodypannyjsud.shop/s
unknown
https://foodypannyjsud.shop/t
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://www.google.com/chrome/privacy/eula_text.html
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
unknown
https://excel.office.com
unknown
https://foodypannyjsud.shop/-%
unknown
http://crbug.com/510270
unknown
https://foodypannyjsud.shop/g
unknown
https://foodypannyjsud.shop/h
unknown
https://go.protekt2day.com/go/1c68c94b-6319-4e81-a7cf-3041c0161b9b?cost=0.180000&visitor_id=83180631
unknown
https://chrome.google.com/webstore?hl=urCtrl$2
unknown
https://foodypannyjsud.shop/m
unknown
https://foodypannyjsud.shop/O
unknown
http://crbug.com/378067
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://passwords.google.com
unknown
https://go.protekt2day.com/go/1c68c94b-6319-4e81-a7cf-3041c0161b9b?cost=0.180000
unknown
https://aui-cdn.atlassian.com/
unknown
http://www.iana.org/assignments/multicast-addresses
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
unknown
https://foodypannyjsud.shop/D
unknown
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://bageyou.xyz
unknown
http://crbug.com/642141
unknown
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://bitbucket.org/
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.connectionstrings.com/
unknown
https://chromewebstore.google.com/declarativeNetRequestWithHostAccessds=2-1719957786566967id5app.win
unknown
https://support.google.com/chromebook?p=app_intent
unknown
http://crbug.com/957772
unknown
https://chrome.google.com/webstore
unknown
https://foodypannyjsud.shop/apit
unknown
https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.google.com/chrome/privacy/eula_text.html&
unknown
http://logging.apache.org/log4j
unknown
https://www.google.com/chrome/privacy/eula_text.htmlT&r
unknown
https://foodypannyjsud.shop/apif
unknown
https://www.ecosia.org/newtab/
unknown
http://xiexie.wf/22_551/huge.dat
unknown
http://crbug.com/819404
unknown
https://outlook.com
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://foodypannyjsud.shop/apiP
unknown
https://chrome.google.com/webstore?hl=ukCtrl$1
unknown
https://android.notify.windows.com/iOS
unknown
http://api.install-stat.debug.world/clients/installs
unknown
https://cdn.cookielaw.org/
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://chromewebstore.google.com/
unknown
https://support.google.com/chrome/a/answer/9122284
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
unknown
https://chrome.google.com/webstore?hl=zh-CNCtrl$1
unknown
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
unknown
https://word.office.comon
unknown
http://www.unicode.org/copyright.html
unknown
https://powerpoint.office.comcember
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
unknown
https://www.newtonsoft.com/json
unknown
http://crbug.com/1352358
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://bageyou.xyz/c/g
unknown
http://schemas.micro
unknown
https://crbug.com/1201800
unknown
http://api.install-stat.debug.world/clients/activity
unknown
https://chrome.google.com/webstore?hl=zh-TWCtrl$1
unknown
https://foodypannyjsud.shop/op
unknown
http://www.apache.org/).
unknown
https://foodypannyjsud.shop/api
unknown
https://myactivity.google.com/
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
190.159.30.35
unknown
Colombia
malicious
141.8.192.126
unknown
Russian Federation
malicious
188.114.96.3
unknown
European Union
malicious
185.68.16.7
unknown
Ukraine
malicious
127.0.0.127
unknown
unknown
malicious
146.70.169.164
unknown
United Kingdom
malicious
104.192.141.1
unknown
United States
104.21.45.251
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020434
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000E028A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\GamePall
Sid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Pid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GamePall
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
DontShowUI
HKEY_CURRENT_USER\SOFTWARE\GamePall
tmp_uid
HKEY_CURRENT_USER\SOFTWARE\GamePall
reg
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\GamePall
uid
HKEY_CURRENT_USER\Control Panel\Cursors
AppStarting
There are 207 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4271000
unclassified section
page read and write
malicious
4371000
unclassified section
page read and write
malicious
4350000
direct allocation
page read and write
malicious
27E0000
direct allocation
page read and write
malicious
4250000
direct allocation
page read and write
malicious
D9D000
heap
page read and write
malicious
4371000
unclassified section
page read and write
malicious
36E0000
direct allocation
page execute and read and write
malicious
BB10000
heap
page read and write
A184000
heap
page read and write
6AAF000
unkown
page readonly
3C290000
direct allocation
page read and write
DE9000
heap
page read and write
7FF5D6A4B000
unkown
page readonly
7AC0000
unkown
page read and write
7FF5D7705000
unkown
page readonly
A7BA000
heap
page read and write
62E000
heap
page read and write
627000
heap
page read and write
9F5F000
heap
page read and write
A0DC000
heap
page read and write
3693000
trusted library allocation
page read and write
7C31000
unkown
page read and write
12C7000
trusted library allocation
page execute and read and write
3692000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
6F4000
heap
page read and write
2A6F000
stack
page read and write
3739000
trusted library allocation
page read and write
62E000
heap
page read and write
7F0000
unkown
page readonly
A13F000
heap
page read and write
A3F7000
heap
page read and write
3C25C000
direct allocation
page read and write
856000
heap
page read and write
8B70000
unkown
page read and write
7C80000
unkown
page read and write
A361000
heap
page read and write
50C5000
trusted library allocation
page read and write
770D000
unkown
page readonly
A1C000
heap
page read and write
363F000
trusted library allocation
page read and write
714000
heap
page read and write
3662000
trusted library allocation
page read and write
35CE000
stack
page read and write
A220000
unkown
page read and write
A401000
heap
page read and write
470000
heap
page read and write
A4E0000
heap
page read and write
9ABD000
unkown
page read and write
3360000
unkown
page read and write
6F4000
heap
page read and write
A497000
heap
page read and write
C70000
trusted library allocation
page read and write
10E0000
unkown
page read and write
9EBC000
heap
page read and write
BE90000
unkown
page read and write
721000
heap
page read and write
A616000
heap
page read and write
2F3E000
stack
page read and write
CE0000
heap
page read and write
731000
heap
page read and write
2708000
unkown
page readonly
460000
heap
page read and write
73E000
heap
page read and write
A1AC000
heap
page read and write
23B8000
trusted library allocation
page read and write
A1A3000
heap
page read and write
5330000
unkown
page write copy
49C2000
unkown
page read and write
A935000
heap
page read and write
A40E000
unkown
page read and write
700000
heap
page read and write
27E40000
direct allocation
page read and write
3652000
trusted library allocation
page read and write
F44F000
unkown
page read and write
C46F000
unkown
page read and write
762D000
unkown
page readonly
3030000
unkown
page read and write
367B000
trusted library allocation
page read and write
62E000
heap
page read and write
5A9E000
stack
page read and write
3030000
unkown
page read and write
6DA000
heap
page read and write
820000
heap
page read and write
716000
heap
page read and write
9E7C000
heap
page read and write
100E000
stack
page read and write
7FF5D77D2000
unkown
page readonly
10E0000
unkown
page read and write
7FF5D7808000
unkown
page readonly
A380000
heap
page read and write
A4B2000
heap
page read and write
A720000
heap
page read and write
367A000
trusted library allocation
page read and write
3590000
remote allocation
page read and write
363E000
trusted library allocation
page read and write
838000
heap
page read and write
8B70000
unkown
page read and write
6A0A000
unkown
page readonly
7FF5D72D3000
unkown
page readonly
3673000
trusted library allocation
page read and write
6F2000
heap
page read and write
5479000
unkown
page read and write
363E000
trusted library allocation
page read and write
B950000
unkown
page readonly
8B70000
unkown
page read and write
7FF5D766E000
unkown
page readonly
24FE000
stack
page read and write
3652000
trusted library allocation
page read and write
3505000
trusted library allocation
page read and write
AA01000
unkown
page read and write
6DA000
heap
page read and write
716000
heap
page read and write
6CD4000
unkown
page readonly
73E000
heap
page read and write
AA0C000
unkown
page read and write
A1AA000
heap
page read and write
2C2E000
stack
page read and write
5355000
trusted library allocation
page read and write
11E0000
heap
page read and write
7FF5D7523000
unkown
page readonly
3360000
unkown
page read and write
6A779000
unkown
page read and write
3633000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
A1A1000
heap
page read and write
B8DB000
stack
page read and write
363E000
trusted library allocation
page read and write
7FF5D76F5000
unkown
page readonly
FF5000
unkown
page execute read
5E6A000
unkown
page readonly
A1BD000
heap
page read and write
10E0000
unkown
page read and write
A1A2000
heap
page read and write
9A94000
unkown
page read and write
280E000
heap
page read and write
7FF5D72D7000
unkown
page readonly
A6D7000
heap
page read and write
A8F4000
heap
page read and write
62E000
heap
page read and write
A8B2000
heap
page read and write
E30000
heap
page read and write
2DFD000
stack
page read and write
727000
heap
page read and write
10E0000
unkown
page read and write
2770000
heap
page read and write
27E88000
direct allocation
page read and write
627000
heap
page read and write
99B000
trusted library allocation
page execute and read and write
CC0000
unkown
page readonly
4DF6000
trusted library allocation
page read and write
627000
heap
page read and write
19A000
stack
page read and write
C908000
unkown
page read and write
ECA000
unkown
page write copy
9E85000
heap
page read and write
6F0000
heap
page read and write
10E0000
unkown
page read and write
297A000
heap
page read and write
727F000
unkown
page readonly
716000
heap
page read and write
A35A000
heap
page read and write
C20000
remote allocation
page read and write
71ED000
unkown
page readonly
A4E8000
heap
page read and write
A377000
heap
page read and write
62E000
heap
page read and write
7691000
unkown
page read and write
7B60000
unkown
page readonly
7631000
unkown
page read and write
850000
heap
page read and write
363E000
trusted library allocation
page read and write
9C000
stack
page read and write
1120000
unkown
page read and write
6F2000
heap
page read and write
D30000
heap
page read and write
69C000
heap
page read and write
886000
heap
page read and write
696A000
unkown
page readonly
27BE000
stack
page read and write
56E0000
trusted library allocation
page read and write
850000
trusted library allocation
page execute and read and write
3140000
heap
page read and write
4C40000
heap
page read and write
7FF5D7752000
unkown
page readonly
A42C000
heap
page read and write
6BA2000
unkown
page readonly
8B70000
unkown
page read and write
A1AB000
heap
page read and write
10E0000
unkown
page read and write
1230000
heap
page read and write
9F89000
heap
page read and write
7FF5D76DA000
unkown
page readonly
10E0000
unkown
page read and write
8900000
unkown
page read and write
6D57000
unkown
page readonly
75A000
heap
page read and write
760F000
unkown
page read and write
2390000
trusted library allocation
page read and write
10E0000
unkown
page read and write
8C39000
stack
page read and write
9A90000
unkown
page read and write
7FF5D74C3000
unkown
page readonly
D30000
heap
page read and write
62E000
heap
page read and write
5880000
heap
page execute and read and write
A17B000
heap
page read and write
2B40000
trusted library allocation
page execute and read and write
363E000
trusted library allocation
page read and write
365D000
trusted library allocation
page read and write
1120000
unkown
page read and write
6DE4000
unkown
page readonly
2CB1000
trusted library allocation
page read and write
370000
heap
page read and write
71C000
heap
page read and write
36E3000
trusted library allocation
page read and write
6FF000
heap
page read and write
697B000
unkown
page readonly
8FD9000
stack
page read and write
248E000
stack
page read and write
3656000
trusted library allocation
page read and write
2385000
trusted library allocation
page read and write
731000
heap
page read and write
40B000
unkown
page execute read
3672000
trusted library allocation
page read and write
721000
heap
page read and write
A825000
heap
page read and write
1111E000
unkown
page read and write
4C0E000
stack
page read and write
700000
heap
page read and write
2B50000
heap
page execute and read and write
C80000
trusted library allocation
page execute and read and write
8D3C000
stack
page read and write
3030000
unkown
page read and write
A580000
heap
page read and write
8B70000
unkown
page read and write
A0A8000
heap
page read and write
3634000
trusted library allocation
page read and write
2CE1000
trusted library allocation
page read and write
E58000
heap
page read and write
A77D000
heap
page read and write
27E24000
direct allocation
page read and write
627000
heap
page read and write
30E0000
trusted library allocation
page read and write
4A16000
unkown
page read and write
3652000
trusted library allocation
page read and write
400000
unkown
page readonly
73E000
heap
page read and write
4DF4000
trusted library allocation
page read and write
A4CD000
heap
page read and write
2EA0000
unkown
page read and write
9F63000
heap
page read and write
10E0000
unkown
page read and write
73E000
heap
page read and write
E1A000
heap
page read and write
5110000
trusted library allocation
page read and write
3030000
unkown
page read and write
75C2000
unkown
page readonly
8A70000
unkown
page read and write
1383000
heap
page read and write
DAF000
stack
page read and write
3140000
unkown
page read and write
11265000
unkown
page read and write
2720000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
110DF000
unkown
page read and write
2EDF000
stack
page read and write
363E000
trusted library allocation
page read and write
2784000
heap
page read and write
6F6000
stack
page read and write
62E000
heap
page read and write
6FB000
heap
page read and write
714000
heap
page read and write
71C000
heap
page read and write
2570000
trusted library allocation
page read and write
73B2000
unkown
page readonly
BB0C000
stack
page read and write
A1C6000
heap
page read and write
10E0000
unkown
page read and write
96FE000
stack
page read and write
A6F2000
heap
page read and write
64A000
heap
page read and write
72DF000
unkown
page readonly
10D0000
heap
page read and write
2FE1000
heap
page read and write
364A000
trusted library allocation
page read and write
1363000
trusted library allocation
page execute and read and write
329C000
stack
page read and write
A6C4000
heap
page read and write
A736000
heap
page read and write
A0C7000
heap
page read and write
1100000
unkown
page read and write
62E000
heap
page read and write
314F000
stack
page read and write
99B0000
unkown
page read and write
627000
heap
page read and write
62E000
heap
page read and write
724E000
unkown
page readonly
70E0000
unkown
page readonly
62E000
heap
page read and write
6DA000
heap
page read and write
627000
heap
page read and write
B980000
unkown
page readonly
A33F000
unkown
page read and write
713000
heap
page read and write
1270000
unkown
page read and write
A678000
heap
page read and write
4DFE000
trusted library allocation
page read and write
62E000
heap
page read and write
A75A000
heap
page read and write
A638000
heap
page read and write
3654000
trusted library allocation
page read and write
BD0000
heap
page read and write
3B6A8000
direct allocation
page read and write
69C000
heap
page read and write
A9FD000
unkown
page read and write
36E3000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
7F4000
trusted library allocation
page read and write
9AAC000
unkown
page read and write
B00000
heap
page read and write
B80000
trusted library allocation
page read and write
6981000
unkown
page readonly
A195000
heap
page read and write
A44B000
heap
page read and write
4C2E000
stack
page read and write
F56B000
stack
page read and write
721000
heap
page read and write
7FF5D7267000
unkown
page readonly
3652000
trusted library allocation
page read and write
A8C2000
heap
page read and write
304E000
stack
page read and write
62E000
heap
page read and write
40CA000
trusted library allocation
page read and write
A80F000
heap
page read and write
4E17000
trusted library allocation
page read and write
68D000
heap
page read and write
69C000
heap
page read and write
401000
unkown
page execute read
986000
stack
page read and write
3100000
trusted library allocation
page read and write
9F79000
heap
page read and write
6DA000
heap
page read and write
A1A4000
heap
page read and write
BDB000
trusted library allocation
page execute and read and write
7FF5D7604000
unkown
page readonly
A754000
heap
page read and write
3659000
trusted library allocation
page read and write
7FF5D774A000
unkown
page readonly
400000
unkown
page readonly
7FF5D7360000
unkown
page readonly
73E000
heap
page read and write
4F70000
heap
page read and write
2B87000
trusted library allocation
page read and write
532E000
stack
page read and write
A86B000
heap
page read and write
A1A5000
heap
page read and write
36AA000
trusted library allocation
page read and write
A82A000
heap
page read and write
10E0000
unkown
page read and write
A2F5000
heap
page read and write
566E000
stack
page read and write
A17D000
heap
page read and write
8B70000
unkown
page read and write
713000
heap
page read and write
439000
unkown
page readonly
6F4000
heap
page read and write
408000
unkown
page readonly
4400000
heap
page read and write
8B70000
unkown
page read and write
62E000
heap
page read and write
62E000
heap
page read and write
36C4000
trusted library allocation
page read and write
3160000
unkown
page read and write
62E000
heap
page read and write
9D80000
heap
page read and write
5A60000
heap
page execute and read and write
8B70000
unkown
page read and write
6E30000
unkown
page readonly
A6BE000
heap
page read and write
363E000
trusted library allocation
page read and write
62E000
heap
page read and write
73E000
heap
page read and write
4691000
heap
page read and write
5693000
heap
page execute and read and write
3380000
unkown
page read and write
7DD0000
heap
page read and write
62E000
heap
page read and write
86F000
heap
page read and write
A946000
heap
page read and write
5A4A000
trusted library allocation
page read and write
1114E000
unkown
page read and write
A44F000
heap
page read and write
7DF4F2470000
unkown
page readonly
A46A000
heap
page read and write
8B70000
unkown
page read and write
62E000
heap
page read and write
DC3000
trusted library allocation
page execute and read and write
627000
heap
page read and write
A94C000
heap
page read and write
73E000
heap
page read and write
62E000
heap
page read and write
2C31000
trusted library allocation
page read and write
2C51000
trusted library allocation
page read and write
A5AD000
heap
page read and write
A3C3000
unkown
page read and write
950000
trusted library allocation
page read and write
AFBE000
stack
page read and write
366F000
trusted library allocation
page read and write
7FF5D77F0000
unkown
page readonly
6A03000
unkown
page readonly
2A02000
trusted library allocation
page read and write
7B10000
unkown
page read and write
15D4000
unkown
page readonly
722000
heap
page read and write
3110000
trusted library allocation
page read and write
698000
heap
page read and write
764F000
unkown
page readonly
388E000
stack
page read and write
704E000
unkown
page readonly
6FB000
heap
page read and write
13B5000
heap
page read and write
7FF5D7385000
unkown
page readonly
367B000
trusted library allocation
page read and write
627000
heap
page read and write
1129C000
unkown
page read and write
1320000
heap
page read and write
367B000
trusted library allocation
page read and write
3030000
unkown
page read and write
A600000
heap
page read and write
A1AF000
heap
page read and write
B03B000
stack
page read and write
A6F4000
heap
page read and write
8B70000
unkown
page read and write
A4D8000
heap
page read and write
A3A0000
heap
page read and write
6E7C000
unkown
page readonly
627000
heap
page read and write
4350000
direct allocation
page read and write
10E0000
unkown
page read and write
55AE000
trusted library allocation
page read and write
29FB000
trusted library allocation
page execute and read and write
68D000
heap
page read and write
B85A000
stack
page read and write
62E000
heap
page read and write
3030000
unkown
page read and write
BE0000
trusted library allocation
page read and write
2720000
heap
page read and write
3B05000
trusted library allocation
page read and write
110F8000
unkown
page read and write
368A000
trusted library allocation
page read and write
3060000
unkown
page read and write
10634000
unkown
page read and write
3B09000
trusted library allocation
page read and write
A48B000
heap
page read and write
4D8F000
stack
page read and write
7FF5D76CD000
unkown
page readonly
281B000
heap
page execute and read and write
2EA0000
unkown
page read and write
3C51000
trusted library allocation
page read and write
62E000
heap
page read and write
30E0000
direct allocation
page read and write
A12F000
stack
page read and write
A7C6000
heap
page read and write
62E000
heap
page read and write
A1A2000
heap
page read and write
7FF5D720F000
unkown
page readonly
62E000
heap
page read and write
49FA000
unkown
page read and write
A622000
heap
page read and write
363E000
trusted library allocation
page read and write
6F4000
heap
page read and write
62E000
heap
page read and write
F42D000
unkown
page read and write
69C000
heap
page read and write
A41A000
heap
page read and write
AFE000
stack
page read and write
51E0000
heap
page execute and read and write
2CFC000
stack
page read and write
7FF5D77FD000
unkown
page readonly
3652000
trusted library allocation
page read and write
68B4000
unkown
page readonly
3662000
trusted library allocation
page read and write
A738000
heap
page read and write
27E68000
direct allocation
page read and write
62E000
heap
page read and write
C83000
trusted library allocation
page execute and read and write
6DA000
heap
page read and write
627000
heap
page read and write
10E0000
unkown
page read and write
1F0000
heap
page read and write
3643000
trusted library allocation
page read and write
7DF4F2481000
unkown
page execute read
29F2000
trusted library allocation
page read and write
10FB8000
unkown
page read and write
62E000
heap
page read and write
8B70000
unkown
page read and write
C669000
unkown
page read and write
54BF000
stack
page read and write
832000
heap
page read and write
7FF5D7691000
unkown
page readonly
AA04000
unkown
page read and write
B80000
trusted library allocation
page read and write
A0D0000
heap
page read and write
364A000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
3687000
trusted library allocation
page read and write
9B41000
unkown
page read and write
363E000
trusted library allocation
page read and write
D53000
trusted library allocation
page read and write
3B618000
direct allocation
page read and write
71C000
heap
page read and write
2480000
heap
page read and write
110CB000
unkown
page read and write
A3E9000
heap
page read and write
98F000
stack
page read and write
10FB1000
unkown
page read and write
2EA1000
unkown
page read and write
867000
trusted library allocation
page read and write
3643000
trusted library allocation
page read and write
3674000
trusted library allocation
page read and write
3652000
trusted library allocation
page read and write
A3C5000
heap
page read and write
A84A000
heap
page read and write
7FF5D7407000
unkown
page readonly
A5A5000
heap
page read and write
5135000
trusted library allocation
page read and write
4360000
unclassified section
page read and write
305E000
stack
page read and write
4390000
heap
page read and write
10FB1000
unkown
page read and write
1223000
trusted library allocation
page execute and read and write
A7DC000
heap
page read and write
36A4000
trusted library allocation
page read and write
A586000
heap
page read and write
3B60C000
direct allocation
page read and write
627000
heap
page read and write
BC8000
trusted library allocation
page read and write
A364000
heap
page read and write
9F37000
heap
page read and write
705000
heap
page read and write
8B70000
unkown
page read and write
712F000
unkown
page readonly
7FF5D77DA000
unkown
page readonly
7423000
unkown
page readonly
3656000
trusted library allocation
page read and write
A488000
heap
page read and write
110F000
stack
page read and write
3C27C000
direct allocation
page read and write
363A000
trusted library allocation
page read and write
41B000
unkown
page read and write
3678000
trusted library allocation
page read and write
364A000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
881E000
stack
page read and write
AB02000
heap
page read and write
A1C2000
heap
page read and write
A3E7000
heap
page read and write
B40000
heap
page read and write
627000
heap
page read and write
A513000
heap
page read and write
1AB000
stack
page read and write
A1AD000
heap
page read and write
7440000
unkown
page read and write
2B20000
heap
page read and write
5341000
trusted library allocation
page read and write
C61D000
unkown
page read and write
364A000
trusted library allocation
page read and write
2FF9000
stack
page read and write
10000000
unkown
page readonly
7605000
unkown
page read and write
62E000
heap
page read and write
4DB0000
heap
page execute and read and write
627000
heap
page read and write
A184000
heap
page read and write
2CAE000
stack
page read and write
C8B1000
unkown
page read and write
627000
heap
page read and write
3652000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
53E1000
unkown
page read and write
2B10000
trusted library allocation
page execute and read and write
3652000
trusted library allocation
page read and write
62E000
heap
page read and write
71A000
heap
page read and write
7FF5D77B9000
unkown
page readonly
10004000
unkown
page readonly
110C3000
unkown
page read and write
627000
heap
page read and write
9EE0000
unkown
page read and write
627000
heap
page read and write
6B35000
unkown
page readonly
A266000
heap
page read and write
408000
unkown
page readonly
B330000
unkown
page read and write
23A0000
trusted library allocation
page read and write
627000
heap
page read and write
62E000
heap
page read and write
45B000
unkown
page readonly
A0AA000
heap
page read and write
A0A0000
heap
page read and write
13BC000
heap
page read and write
363E000
trusted library allocation
page read and write
627000
heap
page read and write
230D000
stack
page read and write
30CE000
stack
page read and write
A7BE000
heap
page read and write
6EEE000
unkown
page readonly
A991000
heap
page read and write
5ADE000
stack
page read and write
55C5000
trusted library allocation
page read and write
856000
heap
page read and write
2790000
direct allocation
page execute and read and write
367E000
trusted library allocation
page read and write
7FF5D74B8000
unkown
page readonly
800000
trusted library allocation
page read and write
366C000
trusted library allocation
page read and write
10E0000
unkown
page read and write
A1AB000
heap
page read and write
365C000
trusted library allocation
page read and write
3652000
trusted library allocation
page read and write
3679000
trusted library allocation
page read and write
A13C000
heap
page read and write
5596000
trusted library allocation
page read and write
A1BF000
heap
page read and write
366B000
trusted library allocation
page read and write
A7E1000
heap
page read and write
7DBC000
stack
page read and write
8B70000
unkown
page read and write
36B3000
trusted library allocation
page read and write
85BE000
stack
page read and write
3643000
trusted library allocation
page read and write
A711000
heap
page read and write
A02E000
stack
page read and write
62E000
heap
page read and write
71EE000
unkown
page readonly
1120C000
unkown
page read and write
721000
heap
page read and write
8B70000
unkown
page read and write
C8D000
trusted library allocation
page execute and read and write
71C000
heap
page read and write
62E000
heap
page read and write
A7EA000
heap
page read and write
62E000
heap
page read and write
1280000
trusted library allocation
page read and write
6A70E000
unkown
page write copy
9E77000
heap
page read and write
C8B4000
unkown
page read and write
12F6000
stack
page read and write
A578000
heap
page read and write
7FF5D71BF000
unkown
page readonly
34DF000
stack
page read and write
A4E5000
heap
page read and write
7FF5D7065000
unkown
page readonly
A893000
heap
page read and write
A9DF000
unkown
page read and write
4401000
heap
page read and write
A69C000
heap
page read and write
A81E000
heap
page read and write
A183000
heap
page read and write
2A95000
trusted library allocation
page read and write
35C3000
unkown
page read and write
DC0000
trusted library allocation
page read and write
A842000
heap
page read and write
6FB000
heap
page read and write
6A6ED000
unkown
page write copy
2950000
heap
page read and write
7FF5D7398000
unkown
page readonly
3030000
unkown
page read and write
386F000
trusted library allocation
page read and write
A19D000
heap
page read and write
23AE000
trusted library allocation
page read and write
11134000
unkown
page read and write
760D000
unkown
page read and write
4A0E000
unkown
page read and write
10FB1000
unkown
page read and write
10E0000
unkown
page read and write
401000
unkown
page execute read
A85C000
heap
page read and write
3C228000
direct allocation
page read and write
27A7000
trusted library allocation
page read and write
4980000
unkown
page read and write
627000
heap
page read and write
9E60000
heap
page read and write
276E000
stack
page read and write
A5A3000
heap
page read and write
3030000
unkown
page read and write
10E0000
unkown
page read and write
3B64C000
direct allocation
page read and write
3652000
trusted library allocation
page read and write
A5F7000
heap
page read and write
3652000
trusted library allocation
page read and write
A952000
heap
page read and write
35C9000
unkown
page read and write
3669000
trusted library allocation
page read and write
8B70000
unkown
page read and write
8B70000
unkown
page read and write
4DC9000
trusted library allocation
page read and write
A391000
unkown
page read and write
7FF5D7639000
unkown
page readonly
62E000
heap
page read and write
5146000
trusted library allocation
page read and write
258F000
stack
page read and write
3030000
unkown
page read and write
9A6A000
unkown
page read and write
A244000
heap
page read and write
62E000
heap
page read and write
69A1000
unkown
page readonly
8B70000
unkown
page read and write
3C240000
direct allocation
page read and write
627000
heap
page read and write
A65B000
heap
page read and write
4DFB000
trusted library allocation
page read and write
A1C4000
heap
page read and write
C40000
heap
page read and write
A176000
heap
page read and write
5549000
trusted library allocation
page read and write
A176000
heap
page read and write
5106000
trusted library allocation
page read and write
10FBF000
unkown
page read and write
7693000
unkown
page read and write
27EE4000
direct allocation
page read and write
1386000
trusted library allocation
page execute and read and write
627000
heap
page read and write
E1E000
stack
page read and write
3B0000
heap
page read and write
1F7000
heap
page read and write
A6AE000
heap
page read and write
7E0000
trusted library allocation
page read and write
73E000
heap
page read and write
12A0000
trusted library allocation
page read and write
B08000
heap
page read and write
23A4000
trusted library allocation
page read and write
531F000
stack
page read and write
8B70000
unkown
page read and write
627000
heap
page read and write
7FF5D7682000
unkown
page readonly
627000
heap
page read and write
27E9C000
direct allocation
page read and write
A338000
heap
page read and write
23D0000
trusted library allocation
page read and write
A588000
heap
page read and write
EF0000
heap
page read and write
7FF5D781A000
unkown
page readonly
10FB8000
unkown
page read and write
AC5000
heap
page read and write
62E000
heap
page read and write
62E000
heap
page read and write
A35E000
heap
page read and write
4DA5000
trusted library allocation
page read and write
A0EB000
heap
page read and write
8B70000
unkown
page read and write
A868000
heap
page read and write
3C2F8000
direct allocation
page read and write
27EC4000
direct allocation
page read and write
62E000
heap
page read and write
10E0000
unkown
page read and write
7FF5D7077000
unkown
page readonly
620000
heap
page read and write
7FF5D72CE000
unkown
page readonly
4E7E000
stack
page read and write
62E000
heap
page read and write
A19C000
heap
page read and write
5A4C000
trusted library allocation
page read and write
627000
heap
page read and write
10FBD000
unkown
page read and write
7FF5D66E8000
unkown
page readonly
3290000
unkown
page read and write
3030000
unkown
page read and write
26DE000
stack
page read and write
104F000
stack
page read and write
C625000
unkown
page read and write
462000
unkown
page readonly
17A0000
heap
page read and write
ECA000
unkown
page read and write
528E000
stack
page read and write
C20000
heap
page read and write
A808000
heap
page read and write
A481000
heap
page read and write
3656000
trusted library allocation
page read and write
62E000
heap
page read and write
A19F000
heap
page read and write
6F4000
heap
page read and write
A174000
heap
page read and write
10E0000
unkown
page read and write
3730000
heap
page read and write
9D8F000
heap
page read and write
7823000
unkown
page readonly
7FF5D71DA000
unkown
page readonly
9EAD000
stack
page read and write
469D000
stack
page read and write
A17F000
heap
page read and write
A19F000
heap
page read and write
8B70000
unkown
page read and write
77A2000
unkown
page read and write
7D3E000
stack
page read and write
62E000
heap
page read and write
82B000
trusted library allocation
page execute and read and write
6777000
unkown
page readonly
627000
heap
page read and write
9895000
heap
page read and write
942D000
stack
page read and write
8B70000
unkown
page read and write
62E000
heap
page read and write
5621000
trusted library allocation
page read and write
4B00000
unkown
page read and write
A779000
heap
page read and write
A446000
heap
page read and write
A397000
heap
page read and write
A356000
heap
page read and write
6A776000
unkown
page read and write
7FF5D717C000
unkown
page readonly
EB9000
unkown
page readonly
6B1000
heap
page read and write
713000
heap
page read and write
7FF5D706E000
unkown
page readonly
363E000
trusted library allocation
page read and write
27F0000
unclassified section
page read and write
6D6B000
unkown
page readonly
1400000
heap
page read and write
A7CA000
heap
page read and write
A0F9000
heap
page read and write
7FF5D7795000
unkown
page readonly
713000
heap
page read and write
721000
heap
page read and write
9F72000
heap
page read and write
9579000
stack
page read and write
716000
heap
page read and write
627000
heap
page read and write
593E000
stack
page read and write
3835000
heap
page read and write
627000
heap
page read and write
7FF5D72BF000
unkown
page readonly
A5ED000
heap
page read and write
62E000
heap
page read and write
779000
heap
page read and write
A836000
heap
page read and write
3652000
trusted library allocation
page read and write
73B4000
unkown
page readonly
627000
heap
page read and write
1293000
trusted library allocation
page execute and read and write
627000
heap
page read and write
A4EB000
heap
page read and write
3652000
trusted library allocation
page read and write
627000
heap
page read and write
D9E000
stack
page read and write
36E3000
trusted library allocation
page read and write
62E000
heap
page read and write
3030000
unkown
page read and write
11140000
unkown
page read and write
747000
heap
page read and write
ECC000
unkown
page readonly
85B000
heap
page read and write
4F4E000
stack
page read and write
620000
heap
page read and write
36B3000
trusted library allocation
page read and write
9E7B000
heap
page read and write
365B000
trusted library allocation
page read and write
A3AA000
unkown
page read and write
299A000
heap
page read and write
5613000
trusted library allocation
page read and write
8DD0000
stack
page read and write
462000
unkown
page readonly
3C234000
direct allocation
page read and write
91F0000
unkown
page readonly
422000
unkown
page read and write
3674000
trusted library allocation
page read and write
2731000
trusted library allocation
page read and write
1F0000
heap
page read and write
716000
heap
page read and write
262E000
stack
page read and write
3A53000
trusted library allocation
page read and write
408000
unkown
page readonly
7F0000
trusted library allocation
page read and write
62E000
heap
page read and write
3B6B4000
direct allocation
page read and write
6FF000
heap
page read and write
A4EF000
heap
page read and write
A6E5000
heap
page read and write
362A000
unkown
page read and write
9E90000
heap
page read and write
8B70000
unkown
page read and write
A91B000
heap
page read and write
749D000
unkown
page readonly
380000
heap
page read and write
23F0000
heap
page read and write
7FF5D778A000
unkown
page readonly
367F000
trusted library allocation
page read and write
D7F000
heap
page read and write
A669000
heap
page read and write
40B000
unkown
page execute read
1FFE000
stack
page read and write
1484000
heap
page read and write
A770000
heap
page read and write
71C000
heap
page read and write
6A6F8000
unkown
page write copy
A191000
heap
page read and write
9E2E000
stack
page read and write
72F000
heap
page read and write
A773000
heap
page read and write
364A000
trusted library allocation
page read and write
36EB000
trusted library allocation
page read and write
713000
heap
page read and write
A495000
heap
page read and write
6D68000
unkown
page readonly
627000
heap
page read and write
11110000
unkown
page read and write
27BD000
heap
page read and write
716000
heap
page read and write
2BCF000
stack
page read and write
6D4F000
unkown
page readonly
E5E000
heap
page read and write
A2A2000
unkown
page read and write
363E000
trusted library allocation
page read and write
BD5000
trusted library allocation
page read and write
6B31000
unkown
page readonly
A0BB000
heap
page read and write
9F0000
heap
page read and write
4E7C000
trusted library allocation
page read and write
7FF5D74F2000
unkown
page readonly
3005000
trusted library allocation
page read and write
365C000
trusted library allocation
page read and write
5A3F000
stack
page read and write
627000
heap
page read and write
2EA0000
unkown
page read and write
1100000
unkown
page read and write
7FF5D772C000
unkown
page readonly
A845000
heap
page read and write
A9A0000
unkown
page read and write
E92000
heap
page read and write
710000
heap
page read and write
BF0000
trusted library allocation
page read and write
F0C000
heap
page read and write
1110E000
unkown
page read and write
986000
trusted library allocation
page execute and read and write
50F5000
trusted library allocation
page read and write
6EF4000
unkown
page readonly
7FF5D723C000
unkown
page readonly
16F7000
trusted library allocation
page read and write
45DA000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
7C70000
unkown
page readonly
6DA000
heap
page read and write
42E000
unkown
page readonly
B6D000
stack
page read and write
7421000
unkown
page readonly
A11000
trusted library allocation
page read and write
62E000
heap
page read and write
11DF000
stack
page read and write
7FF5D77A8000
unkown
page readonly
62E000
heap
page read and write
AD0000
heap
page read and write
559B000
trusted library allocation
page read and write
A959000
heap
page read and write
2839000
heap
page read and write
10FBB000
unkown
page read and write
4DA0000
trusted library allocation
page read and write
2560000
trusted library allocation
page read and write
10E0000
unkown
page read and write
4AEE000
stack
page read and write
3B648000
direct allocation
page read and write
725F000
unkown
page readonly
2B3D000
stack
page read and write
716000
heap
page read and write
3772000
trusted library allocation
page read and write
524E000
stack
page read and write
315F000
stack
page read and write
239E000
trusted library allocation
page read and write
7435000
stack
page read and write
760B000
unkown
page read and write
2730000
heap
page read and write
2DDE000
stack
page read and write
C65E000
unkown
page read and write
3777000
trusted library allocation
page read and write
9AB2000
unkown
page read and write
2EA0000
unkown
page read and write
62E000
heap
page read and write
4FBF000
stack
page read and write
AD77000
heap
page read and write
A1A8000
heap
page read and write
10E0000
unkown
page read and write
71A000
heap
page read and write
3030000
unkown
page read and write
747D000
unkown
page readonly
1F5F000
stack
page read and write
8B70000
unkown
page read and write
A15000
heap
page read and write
3590000
remote allocation
page read and write
8DCB000
stack
page read and write
73E000
heap
page read and write
368C000
trusted library allocation
page read and write
A570000
heap
page read and write
297E000
heap
page read and write
5610000
trusted library allocation
page read and write
3030000
unkown
page read and write
234E000
stack
page read and write
671000
heap
page read and write
35D5000
trusted library allocation
page read and write
7FF5D6BDB000
unkown
page readonly
10CCF000
unkown
page read and write
87F000
stack
page read and write
507E000
stack
page read and write
A620000
heap
page read and write
10E0000
unkown
page read and write
627000
heap
page read and write
363E000
trusted library allocation
page read and write
3C254000
direct allocation
page read and write
5530000
trusted library allocation
page read and write
27EF0000
direct allocation
page read and write
3B698000
direct allocation
page read and write
E40000
trusted library allocation
page read and write
A6FA000
heap
page read and write
AA92000
unkown
page read and write
23C5000
trusted library allocation
page read and write
A694000
heap
page read and write
A8D5000
heap
page read and write
3652000
trusted library allocation
page read and write
490D000
stack
page read and write
533C000
trusted library allocation
page read and write
7FF5D7438000
unkown
page readonly
10002000
unkown
page readonly
BA4000
trusted library allocation
page read and write
10E0000
unkown
page read and write
4DE0000
heap
page read and write
62E000
heap
page read and write
8B70000
unkown
page read and write
40A000
unkown
page read and write
9AF9000
unkown
page read and write
A3B9000
unkown
page read and write
73E000
heap
page read and write
9EB0000
unkown
page readonly
A6D1000
heap
page read and write
A923000
heap
page read and write
A185000
heap
page read and write
A1A2000
heap
page read and write
70B000
heap
page read and write
627000
heap
page read and write
3C20C000
direct allocation
page read and write
A12B000
heap
page read and write
627000
heap
page read and write
23EE000
stack
page read and write
7FF5D744E000
unkown
page readonly
563E000
stack
page read and write
A24F000
heap
page read and write
27A0000
heap
page read and write
18E0000
heap
page read and write
627000
heap
page read and write
366D000
trusted library allocation
page read and write
D50000
heap
page read and write
27D0000
direct allocation
page execute and read and write
8B70000
unkown
page read and write
2EA0000
unkown
page read and write
ECB000
unkown
page execute and read and write
73E000
heap
page read and write
2396000
trusted library allocation
page read and write
363D000
trusted library allocation
page read and write
A3DB000
heap
page read and write
37DC000
trusted library allocation
page read and write
3C2B8000
direct allocation
page read and write
627000
heap
page read and write
62E000
heap
page read and write
62E000
heap
page read and write
A25C000
heap
page read and write
837000
heap
page read and write
69C000
heap
page read and write
1340000
unkown
page read and write
372C000
stack
page read and write
A382000
heap
page read and write
BCA000
trusted library allocation
page execute and read and write
627000
heap
page read and write
25DE000
stack
page read and write
10FB6000
unkown
page read and write
710000
heap
page read and write
62E000
heap
page read and write
B90000
heap
page execute and read and write
68D000
heap
page read and write
4D8E000
stack
page read and write
9E73000
heap
page read and write
627000
heap
page read and write
A20000
heap
page read and write
A7C000
stack
page read and write
3B6C4000
direct allocation
page read and write
A4AA000
heap
page read and write
29E0000
trusted library allocation
page read and write
7DF4F2461000
unkown
page execute read
27F29000
direct allocation
page read and write
110D9000
unkown
page read and write
A674000
heap
page read and write
366D000
trusted library allocation
page read and write
3646000
trusted library allocation
page read and write
E46000
trusted library allocation
page execute and read and write
C800000
unkown
page read and write
A19D000
heap
page read and write
5536000
trusted library allocation
page read and write
7FF5D75FF000
unkown
page readonly
62E000
heap
page read and write
10E0000
unkown
page read and write
62E000
heap
page read and write
71F7000
unkown
page readonly
7FF5D6ABD000
unkown
page readonly
8B70000
unkown
page read and write
3626000
unkown
page read and write
1294000
trusted library allocation
page read and write
73E000
heap
page read and write
8B70000
unkown
page read and write
401000
unkown
page execute read
10E0000
unkown
page read and write
7686000
unkown
page read and write
33DE000
stack
page read and write
1395000
heap
page read and write
A4AD000
heap
page read and write
7FF5D7289000
unkown
page readonly
4D9C000
trusted library allocation
page read and write
363D000
trusted library allocation
page read and write
3643000
trusted library allocation
page read and write
4AE24000
direct allocation
page read and write
5511000
trusted library allocation
page read and write
713000
heap
page read and write
627000
heap
page read and write
2B60000
heap
page read and write
A198000
heap
page read and write
A47C000
heap
page read and write
C642000
unkown
page read and write
62E000
heap
page read and write
4AF0000
trusted library allocation
page read and write
1120000
unkown
page read and write
84BB000
stack
page read and write
12E0000
trusted library allocation
page read and write
7FF5D7202000
unkown
page readonly
1120000
unkown
page read and write
2750000
heap
page execute and read and write
367B000
trusted library allocation
page read and write
6FA000
heap
page read and write
62E000
heap
page read and write
B1F000
heap
page read and write
363E000
trusted library allocation
page read and write
345E000
stack
page read and write
E41000
heap
page read and write
3030000
unkown
page read and write
366B000
trusted library allocation
page read and write
6CE5000
unkown
page readonly
A31A000
heap
page read and write
62E000
heap
page read and write
627000
heap
page read and write
BFB8000
stack
page read and write
25CF000
stack
page read and write
6D00000
unkown
page readonly
A1A9000
heap
page read and write
9E70000
heap
page read and write
9D0000
heap
page read and write
7FF5D74A6000
unkown
page readonly
10E0000
unkown
page read and write
42A000
unkown
page read and write
7A3000
heap
page read and write
9CE000
stack
page read and write
627000
heap
page read and write
7FF5D75A6000
unkown
page readonly
A412000
heap
page read and write
62E000
heap
page read and write
23E0000
trusted library allocation
page read and write
42F0000
heap
page read and write
3643000
trusted library allocation
page read and write
671000
heap
page read and write
7FF5D7452000
unkown
page readonly
43A1000
heap
page read and write
4DB4000
trusted library allocation
page read and write
4A12000
unkown
page read and write
114F000
stack
page read and write
3659000
trusted library allocation
page read and write
7FF5D729E000
unkown
page readonly
A1A8000
heap
page read and write
62E000
heap
page read and write
36A5000
trusted library allocation
page read and write
7609000
unkown
page read and write
2D9F000
stack
page read and write
2AB0000
trusted library allocation
page read and write
105B3000
unkown
page read and write
6EF2000
unkown
page readonly
A19C000
heap
page read and write
10E0000
unkown
page read and write
2D07000
trusted library allocation
page read and write
A195000
heap
page read and write
36D0000
trusted library allocation
page read and write
712D000
unkown
page readonly
A45E000
heap
page read and write
6D53000
unkown
page readonly
E41000
unkown
page execute read
6A6CC000
unkown
page read and write
9E74000
heap
page read and write
7FF5D75C1000
unkown
page readonly
D55000
heap
page read and write
7FF5D71EF000
unkown
page readonly
73E000
heap
page read and write
7FF5D7309000
unkown
page readonly
71A000
heap
page read and write
62E000
heap
page read and write
4FA000
stack
page read and write
C90000
heap
page read and write
279F000
trusted library allocation
page read and write
3652000
trusted library allocation
page read and write
3290000
unkown
page read and write
27E01000
direct allocation
page read and write
8B70000
unkown
page read and write
678000
heap
page read and write
49FD000
unkown
page read and write
73B000
heap
page read and write
C62D000
unkown
page read and write
A8CE000
heap
page read and write
3666000
trusted library allocation
page read and write
A8FC000
heap
page read and write
1F0000
heap
page read and write
6A5E000
unkown
page readonly
35C1000
unkown
page read and write
627000
heap
page read and write
2CE7000
trusted library allocation
page read and write
828000
heap
page read and write
734000
heap
page read and write
422000
unkown
page read and write
7FF5D7792000
unkown
page readonly
4AE14000
direct allocation
page read and write
3741000
trusted library allocation
page read and write
62E000
heap
page read and write
7FF5D7764000
unkown
page readonly
AD80000
heap
page read and write
363E000
trusted library allocation
page read and write
A0AF000
heap
page read and write
2AA4000
trusted library allocation
page read and write
7FF5D7546000
unkown
page readonly
A1A2000
heap
page read and write
716000
heap
page read and write
111D8000
unkown
page read and write
5630000
trusted library allocation
page read and write
2360000
trusted library allocation
page read and write
6D51000
unkown
page readonly
A1A8000
heap
page read and write
3656000
trusted library allocation
page read and write
1110E000
unkown
page read and write
C653000
unkown
page read and write
C0BA000
stack
page read and write
6A77B000
unkown
page read and write
A1A0000
heap
page read and write
A761000
heap
page read and write
670000
heap
page read and write
3643000
trusted library allocation
page read and write
A7F1000
heap
page read and write
A080000
heap
page read and write
41B000
unkown
page write copy
A4B0000
heap
page read and write
A509000
heap
page read and write
3639000
trusted library allocation
page read and write
AD7F000
heap
page read and write
4AE34000
direct allocation
page read and write
6A6EC000
unkown
page read and write
62E000
heap
page read and write
721000
heap
page read and write
7FF5D758D000
unkown
page readonly
2775000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
B2F000
stack
page read and write
8B70000
unkown
page read and write
361E000
stack
page read and write
627000
heap
page read and write
12BA000
trusted library allocation
page execute and read and write
A26A000
heap
page read and write
276E000
stack
page read and write
627000
heap
page read and write
3682000
trusted library allocation
page read and write
1100000
unkown
page read and write
13C9000
heap
page read and write
2CB5000
trusted library allocation
page read and write
A278000
heap
page read and write
363E000
trusted library allocation
page read and write
A3C2000
heap
page read and write
10E0000
unkown
page read and write
5463000
unkown
page read and write
71C000
heap
page read and write
3643000
trusted library allocation
page read and write
62E000
heap
page read and write
964000
trusted library allocation
page read and write
363F000
trusted library allocation
page read and write
355F000
stack
page read and write
8B70000
unkown
page read and write
769A000
unkown
page read and write
94F4000
unkown
page read and write
D50000
trusted library allocation
page read and write
16F1000
trusted library allocation
page read and write
8870000
unkown
page readonly
9C000
stack
page read and write
721000
heap
page read and write
70F4000
unkown
page readonly
A43A000
heap
page read and write
362D000
unkown
page read and write
1160000
unkown
page read and write
A1AA000
heap
page read and write
276E000
stack
page read and write
A7D3000
heap
page read and write
89DA000
heap
page read and write
E20000
heap
page read and write
36B1000
trusted library allocation
page read and write
6A6FD000
unkown
page read and write
3663000
trusted library allocation
page read and write
711000
heap
page read and write
7C90000
unkown
page read and write
7FF5D76C8000
unkown
page readonly
43C0000
heap
page read and write
9A6000
stack
page read and write
3669000
trusted library allocation
page read and write
3651000
trusted library allocation
page read and write
C035000
stack
page read and write
A19A000
heap
page read and write
8B70000
unkown
page read and write
BD7000
trusted library allocation
page execute and read and write
10FB3000
unkown
page read and write
A194000
heap
page read and write
8B70000
unkown
page read and write
4C8E000
stack
page read and write
C5FA000
unkown
page read and write
61B0000
unkown
page readonly
82F000
heap
page read and write
A57C000
heap
page read and write
1114A000
unkown
page read and write
9A98000
unkown
page read and write
7684000
unkown
page readonly
373B000
trusted library allocation
page read and write
A231000
heap
page read and write
69C000
heap
page read and write
10E0000
unkown
page read and write
62E000
heap
page read and write
8A46000
unkown
page read and write
7FF5D75D6000
unkown
page readonly
3642000
trusted library allocation
page read and write
A6C7000
heap
page read and write
308E000
stack
page read and write
10E0000
unkown
page read and write
10E0000
unkown
page read and write
C30000
heap
page read and write
1224000
trusted library allocation
page read and write
A3E5000
heap
page read and write
627000
heap
page read and write
382C000
stack
page read and write
364E000
trusted library allocation
page read and write
10E0000
unkown
page read and write
10E0000
unkown
page read and write
3687000
trusted library allocation
page read and write
351E000
stack
page read and write
7418000
unkown
page readonly
D68000
heap
page read and write
7FF5D777A000
unkown
page readonly
A26D000
heap
page read and write
C05000
heap
page read and write
A1A3000
heap
page read and write
A913000
heap
page read and write
8BE000
stack
page read and write
C496000
unkown
page read and write
3663000
trusted library allocation
page read and write
4260000
unclassified section
page read and write
446000
unkown
page readonly
A60B000
heap
page read and write
39CC000
trusted library allocation
page read and write
1398000
heap
page read and write
A6EC000
heap
page read and write
BE4000
trusted library allocation
page read and write
6C50000
unkown
page readonly
E42000
trusted library allocation
page read and write
4B70000
heap
page read and write
730000
heap
page read and write
4F5E000
stack
page read and write
10FB6000
unkown
page read and write
10E0000
unkown
page read and write
7FF5D77E9000
unkown
page readonly
68F000
heap
page read and write
36B3000
trusted library allocation
page read and write
3507000
trusted library allocation
page read and write
727000
heap
page read and write
54E0000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
3030000
unkown
page read and write
78E000
stack
page read and write
364C000
trusted library allocation
page read and write
C450000
unkown
page read and write
3637000
trusted library allocation
page read and write
368A000
trusted library allocation
page read and write
3652000
trusted library allocation
page read and write
1123F000
unkown
page read and write
49D6000
unkown
page read and write
3694000
trusted library allocation
page read and write
68F000
heap
page read and write
7FF5D7820000
unkown
page readonly
2430000
heap
page read and write
9EAC000
heap
page read and write
2590000
trusted library allocation
page read and write
10E0000
unkown
page read and write
6F14000
unkown
page readonly
89D2000
heap
page read and write
6D4D000
unkown
page readonly
418000
unkown
page readonly
D1E000
stack
page read and write
A76C000
heap
page read and write
7FF5D75DF000
unkown
page readonly
710000
heap
page read and write
9FE000
stack
page read and write
62E000
heap
page read and write
6DF1000
unkown
page readonly
DAE000
stack
page read and write
DCD000
trusted library allocation
page execute and read and write
50D0000
trusted library allocation
page read and write
43A0000
heap
page read and write
7502000
unkown
page readonly
C5FD000
unkown
page read and write
627000
heap
page read and write
A1C0000
heap
page read and write
110DE000
unkown
page read and write
50BE000
stack
page read and write
3652000
trusted library allocation
page read and write
7FF5D7450000
unkown
page readonly
9E81000
heap
page read and write
A6B4000
heap
page read and write
CF6000
stack
page read and write
62E000
heap
page read and write
3030000
unkown
page read and write
40A000
unkown
page write copy
256A000
trusted library allocation
page execute and read and write
752D000
unkown
page readonly
363E000
trusted library allocation
page read and write
33DE000
stack
page read and write
A262000
heap
page read and write
A768000
heap
page read and write
3643000
trusted library allocation
page read and write
436000
unkown
page readonly
68F000
heap
page read and write
C24E000
stack
page read and write
A716000
heap
page read and write
1120000
unkown
page read and write
7AF1000
unkown
page read and write
627000
heap
page read and write
7FF5D7458000
unkown
page readonly
7FF5D745B000
unkown
page readonly
A4C0000
heap
page read and write
7FF5D748C000
unkown
page readonly
7FF5D7669000
unkown
page readonly
7FF5D7073000
unkown
page readonly
6A73D000
unkown
page read and write
5690000
heap
page execute and read and write
10E0000
unkown
page read and write
7553000
unkown
page readonly
9F7C000
heap
page read and write
62E000
heap
page read and write
62E000
heap
page read and write
4CCC000
trusted library allocation
page read and write
7FF5D7075000
unkown
page readonly
A177000
heap
page read and write
9E0000
heap
page read and write
627000
heap
page read and write
A862000
heap
page read and write
1350000
unkown
page readonly
ADC8000
heap
page read and write
6BFD000
unkown
page readonly
A1A8000
heap
page read and write
3B604000
direct allocation
page read and write
3652000
trusted library allocation
page read and write
239B000
trusted library allocation
page read and write
A62B000
heap
page read and write
4DB0000
trusted library allocation
page read and write
763E000
unkown
page readonly
27EF4000
direct allocation
page read and write
454000
unkown
page readonly
3675000
trusted library allocation
page read and write
272F000
stack
page read and write
A594000
heap
page read and write
FF5000
unkown
page execute read
2B80000
trusted library allocation
page read and write
A30D000
heap
page read and write
2EA0000
unkown
page read and write
7850000
unclassified section
page readonly
A8AF000
heap
page read and write
364A000
trusted library allocation
page read and write
363B000
trusted library allocation
page read and write
4AE2C000
direct allocation
page read and write
A4A3000
heap
page read and write
DCB000
stack
page read and write
62E000
heap
page read and write
5353000
trusted library allocation
page read and write
7B80000
unkown
page readonly
A81C000
heap
page read and write
3680000
trusted library allocation
page read and write
6EEC000
unkown
page readonly
73E000
heap
page read and write
A889000
heap
page read and write
A6E3000
heap
page read and write
35B0000
unkown
page read and write
73E000
heap
page read and write
3C57000
trusted library allocation
page read and write
54F6000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
A36B000
heap
page read and write
62E000
heap
page read and write
A7AC000
heap
page read and write
7FF5D762F000
unkown
page readonly
627000
heap
page read and write
A726000
heap
page read and write
9A92000
unkown
page read and write
713000
heap
page read and write
A84F000
heap
page read and write
363E000
trusted library allocation
page read and write
7B20000
unkown
page read and write
A39D000
heap
page read and write
10E0000
unkown
page read and write
8B70000
unkown
page read and write
9A9E000
unkown
page read and write
6FB000
heap
page read and write
A89A000
heap
page read and write
11C1000
unkown
page read and write
4C15000
trusted library allocation
page read and write
4E81000
trusted library allocation
page read and write
3170000
unkown
page read and write
3486000
stack
page read and write
62E000
heap
page read and write
50BE000
stack
page read and write
7FF5D7745000
unkown
page readonly
73E000
heap
page read and write
992000
trusted library allocation
page read and write
27E60000
direct allocation
page read and write
9FBB000
heap
page read and write
27F20000
direct allocation
page read and write
7FF5D71D7000
unkown
page readonly
A4D5000
heap
page read and write
C5F8000
unkown
page read and write
627000
heap
page read and write
3652000
trusted library allocation
page read and write
8B70000
unkown
page read and write
6F9000
heap
page read and write
A74A000
heap
page read and write
62E000
heap
page read and write
A17000
trusted library allocation
page read and write
7FF5D7284000
unkown
page readonly
1360000
unkown
page readonly
41B000
unkown
page write copy
166B000
trusted library allocation
page execute and read and write
A3AC000
unkown
page read and write
10FB5000
unkown
page read and write
62E000
heap
page read and write
C7C6000
unkown
page read and write
3643000
trusted library allocation
page read and write
3030000
unkown
page read and write
C90000
trusted library allocation
page read and write
3C2A4000
direct allocation
page read and write
3380000
unkown
page read and write
4E0E000
trusted library allocation
page read and write
A4D3000
heap
page read and write
12F0000
heap
page read and write
627000
heap
page read and write
A19C000
heap
page read and write
627000
heap
page read and write
2350000
heap
page execute and read and write
27E4C000
direct allocation
page read and write
62E000
heap
page read and write
7FF5D75CB000
unkown
page readonly
AD76000
heap
page read and write
7D2000
unkown
page readonly
137D000
trusted library allocation
page execute and read and write
10FBE000
unkown
page read and write
8B70000
unkown
page read and write
3400000
unkown
page read and write
363E000
trusted library allocation
page read and write
434000
unkown
page read and write
27E78000
direct allocation
page read and write
3663000
trusted library allocation
page read and write
7FF5D72FB000
unkown
page readonly
A460000
heap
page read and write
BFE000
stack
page read and write
A671000
heap
page read and write
A584000
heap
page read and write
10E0000
unkown
page read and write
6B91000
unkown
page readonly
A186000
heap
page read and write
B37000
heap
page read and write
3672000
trusted library allocation
page read and write
7FF5D7272000
unkown
page readonly
963000
trusted library allocation
page execute and read and write
4E11000
trusted library allocation
page read and write
29F6000
trusted library allocation
page execute and read and write
35CD000
unkown
page read and write
62E000
heap
page read and write
2FE3000
trusted library allocation
page read and write
62E000
heap
page read and write
6F2000
heap
page read and write
C615000
unkown
page read and write
62E000
heap
page read and write
2720000
heap
page read and write
29F5000
trusted library allocation
page execute and read and write
A17B000
heap
page read and write
C78A000
unkown
page read and write
A6EF000
heap
page read and write
C7BE000
unkown
page read and write
521E000
stack
page read and write
6FA000
heap
page read and write
62E000
heap
page read and write
8B70000
unkown
page read and write
12C2000
trusted library allocation
page read and write
364A000
trusted library allocation
page read and write
3030000
unkown
page read and write
122D000
trusted library allocation
page execute and read and write
A1A1000
heap
page read and write
7FF5D770A000
unkown
page readonly
A0E0000
heap
page read and write
363E000
trusted library allocation
page read and write
7FF5D720A000
unkown
page readonly
A386000
heap
page read and write
B4D0000
unkown
page readonly
627000
heap
page read and write
129D000
trusted library allocation
page execute and read and write
727000
heap
page read and write
A39C000
unkown
page read and write
574F000
stack
page read and write
A3D1000
heap
page read and write
E40000
unkown
page readonly
3B674000
direct allocation
page read and write
363E000
trusted library allocation
page read and write
3643000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
3030000
unkown
page read and write
BE70000
unkown
page readonly
7FF5D71C4000
unkown
page readonly
8B70000
unkown
page read and write
3731000
heap
page read and write
927C000
stack
page read and write
366A000
trusted library allocation
page read and write
9F56000
heap
page read and write
9A96000
unkown
page read and write
10E0000
unkown
page read and write
70BE000
unkown
page readonly
7FF5D710B000
unkown
page readonly
9AB4000
unkown
page read and write
3637000
trusted library allocation
page read and write
86D0000
unkown
page readonly
D47000
trusted library allocation
page read and write
FF0000
heap
page read and write
5A4E000
trusted library allocation
page read and write
A4FD000
heap
page read and write
A607000
heap
page read and write
62E000
heap
page read and write
6B1000
heap
page read and write
A1AA000
heap
page read and write
A313000
unkown
page read and write
400000
unkown
page execute and read and write
89D0000
heap
page read and write
3B624000
direct allocation
page read and write
6F0000
heap
page read and write
A479000
heap
page read and write
8900000
unkown
page read and write
716000
heap
page read and write
7460000
unkown
page read and write
4A71000
unkown
page read and write
627000
heap
page read and write
10E0000
unkown
page read and write
9AC3000
unkown
page read and write
10FB2000
unkown
page read and write
7315000
unkown
page readonly
54FB000
trusted library allocation
page read and write
627000
heap
page read and write
997000
trusted library allocation
page execute and read and write
70CF000
unkown
page readonly
62E000
heap
page read and write
A707000
heap
page read and write
375A000
trusted library allocation
page read and write
7FF5D77F7000
unkown
page readonly
27D0000
heap
page read and write
1220000
trusted library allocation
page read and write
AD88000
heap
page read and write
A410000
heap
page read and write
45B000
unkown
page readonly
3030000
unkown
page read and write
714A000
unkown
page readonly
4690000
heap
page read and write
71C000
heap
page read and write
C621000
unkown
page read and write
627000
heap
page read and write
30FB000
stack
page read and write
510B000
trusted library allocation
page read and write
986000
stack
page read and write
7FF5D719C000
unkown
page readonly
A62F000
heap
page read and write
A174000
heap
page read and write
148C000
heap
page read and write
627000
heap
page read and write
3663000
trusted library allocation
page read and write
599F000
stack
page read and write
3030000
unkown
page read and write
627000
heap
page read and write
BC1000
trusted library allocation
page read and write
3663000
trusted library allocation
page read and write
5144000
trusted library allocation
page read and write
1731000
unkown
page readonly
627000
heap
page read and write
9F5C000
heap
page read and write
401000
unkown
page execute read
62E000
heap
page read and write
363E000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
A2F0000
heap
page read and write
7FF5D6AB6000
unkown
page readonly
454000
unkown
page readonly
3DE000
stack
page read and write
EB9000
unkown
page readonly
10674000
unkown
page read and write
367B000
trusted library allocation
page read and write
D00000
unkown
page read and write
7FF5D7648000
unkown
page readonly
86E0000
unkown
page readonly
365D000
trusted library allocation
page read and write
779E000
unkown
page read and write
A2FC000
heap
page read and write
627000
heap
page read and write
627000
heap
page read and write
627000
heap
page read and write
7201000
unkown
page readonly
418000
unkown
page readonly
75F8000
unkown
page read and write
3C204000
direct allocation
page read and write
33B0000
unkown
page readonly
716000
heap
page read and write
A1C4000
heap
page read and write
29AB000
heap
page read and write
D41000
trusted library allocation
page read and write
10E0000
unkown
page read and write
3662000
trusted library allocation
page read and write
30D1000
trusted library allocation
page read and write
A131000
heap
page read and write
7FF5D771A000
unkown
page readonly
C20000
remote allocation
page read and write
A3F4000
heap
page read and write
62E000
heap
page read and write
747A000
unkown
page readonly
627000
heap
page read and write
7FF5D774C000
unkown
page readonly
1499000
heap
page read and write
640000
heap
page read and write
3652000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
105F000
stack
page read and write
75FD000
unkown
page read and write
368F000
trusted library allocation
page read and write
D8B000
heap
page read and write
12D0000
unkown
page readonly
27E7C000
direct allocation
page read and write
B7DC000
stack
page read and write
3116000
trusted library allocation
page read and write
700000
heap
page read and write
4E25000
trusted library allocation
page read and write
77DB000
unkown
page read and write
A3BB000
heap
page read and write
A179000
heap
page read and write
73E000
heap
page read and write
9F99000
heap
page read and write
8B70000
unkown
page read and write
627000
heap
page read and write
9F4F000
heap
page read and write
4F1E000
stack
page read and write
BB9E000
stack
page read and write
3652000
trusted library allocation
page read and write
7FF5D7244000
unkown
page readonly
627000
heap
page read and write
4AE04000
direct allocation
page read and write
731000
heap
page read and write
627000
heap
page read and write
BEA0000
unkown
page readonly
3652000
trusted library allocation
page read and write
7FF5D77E0000
unkown
page readonly
9E0000
heap
page read and write
8360000
unkown
page read and write
A5D3000
heap
page read and write
1700000
heap
page read and write
2FE9000
trusted library allocation
page read and write
9A000
stack
page read and write
418000
unkown
page readonly
1380000
trusted library allocation
page read and write
A144000
heap
page read and write
2960000
direct allocation
page execute and read and write
B559000
stack
page read and write
1370000
trusted library allocation
page read and write
A1A5000
heap
page read and write
503D000
stack
page read and write
33F0000
unkown
page read and write
75D1000
unkown
page readonly
A00000
trusted library allocation
page execute and read and write
3682000
trusted library allocation
page read and write
6DA000
heap
page read and write
F80000
heap
page read and write
76CC000
unkown
page readonly
555000
heap
page read and write
62E000
heap
page read and write
F3B000
stack
page read and write
A7EF000
heap
page read and write
8B70000
unkown
page read and write
A939000
heap
page read and write
960000
trusted library allocation
page read and write
6B20000
unkown
page readonly
3B668000
direct allocation
page read and write
51A0000
heap
page read and write
364E000
trusted library allocation
page read and write
10E0000
unkown
page read and write
8B70000
unkown
page read and write
4B60000
trusted library allocation
page read and write
10E0000
unkown
page read and write
3689000
trusted library allocation
page read and write
27A7000
heap
page read and write
A7C2000
heap
page read and write
A905000
heap
page read and write
7FF5D7391000
unkown
page readonly
2F7E000
stack
page read and write
A3F2000
heap
page read and write
627000
heap
page read and write
A170000
heap
page read and write
A59E000
heap
page read and write
A658000
heap
page read and write
44F0000
heap
page read and write
3690000
trusted library allocation
page read and write
2760000
heap
page read and write
719000
heap
page read and write
DD0000
heap
page read and write
A5B2000
heap
page read and write
627000
heap
page read and write
363D000
trusted library allocation
page read and write
E60000
heap
page read and write
10E0000
unkown
page read and write
400000
unkown
page readonly
2770000
heap
page read and write
A812000
heap
page read and write
363B000
trusted library allocation
page read and write
A666000
heap
page read and write
280A000
heap
page read and write
363E000
trusted library allocation
page read and write
12B6000
trusted library allocation
page execute and read and write
4C10000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
27E6C000
direct allocation
page read and write
E4A000
trusted library allocation
page execute and read and write
7FF5D76D5000
unkown
page readonly
A10000
heap
page read and write
3669000
trusted library allocation
page read and write
9A76000
unkown
page read and write
A590000
heap
page read and write
10FB9000
unkown
page read and write
27AF000
heap
page execute and read and write
2708000
unkown
page readonly
39C5000
trusted library allocation
page read and write
C7CB000
unkown
page read and write
A3B6000
unkown
page read and write
3652000
trusted library allocation
page read and write
7FF5D71C8000
unkown
page readonly
718000
heap
page read and write
3120000
trusted library allocation
page read and write
A326000
heap
page read and write
B90000
heap
page read and write
98FD000
stack
page read and write
3792000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
A185000
heap
page read and write
AA1000
heap
page read and write
730000
heap
page read and write
5550000
trusted library allocation
page read and write
19D000
stack
page read and write
9FAF000
stack
page read and write
7FF5D77A4000
unkown
page readonly
627000
heap
page read and write
12CB000
trusted library allocation
page execute and read and write
F421000
unkown
page read and write
A416000
unkown
page read and write
3641000
trusted library allocation
page read and write
A910000
heap
page read and write
A709000
heap
page read and write
D60000
heap
page read and write
A903000
heap
page read and write
6DA000
heap
page read and write
10FB6000
unkown
page read and write
627000
heap
page read and write
3652000
trusted library allocation
page read and write
6FE6000
unkown
page readonly
A458000
heap
page read and write
10E0000
unkown
page read and write
F13000
heap
page read and write
560E000
stack
page read and write
3B01000
trusted library allocation
page read and write
627000
heap
page read and write
A1C5000
heap
page read and write
408000
unkown
page readonly
A17D000
heap
page read and write
3689000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
7FF5D760B000
unkown
page readonly
9F82000
heap
page read and write
9FFD000
heap
page read and write
31D0000
heap
page read and write
10E0000
unkown
page read and write
761E000
unkown
page read and write
3060000
unkown
page read and write
18D0000
heap
page execute and read and write
96D000
trusted library allocation
page execute and read and write
10E0000
unkown
page read and write
8B70000
unkown
page read and write
4CC2000
trusted library allocation
page read and write
9B000
stack
page read and write
4AA0000
unkown
page read and write
62E000
heap
page read and write
A1BD000
heap
page read and write
2B90000
trusted library allocation
page read and write
400000
unkown
page readonly
A3FB000
heap
page read and write
10574000
unkown
page read and write
A3B8000
heap
page read and write
1113D000
unkown
page read and write
11112000
unkown
page read and write
10534000
unkown
page read and write
BF3E000
stack
page read and write
9FB1000
heap
page read and write
C47F000
unkown
page read and write
12B0000
trusted library allocation
page read and write
7AB0000
unkown
page read and write
6A6FE000
unkown
page write copy
7D0000
unkown
page readonly
A795000
heap
page read and write
62E000
heap
page read and write
627000
heap
page read and write
7DF4F2471000
unkown
page execute read
7F3000
trusted library allocation
page execute and read and write
A1A0000
heap
page read and write
10BB1000
unkown
page read and write
7FF5D7703000
unkown
page readonly
3699000
trusted library allocation
page read and write
678000
heap
page read and write
7FF5D6BE4000
unkown
page readonly
A3ED000
heap
page read and write
3002000
trusted library allocation
page read and write
10FB2000
unkown
page read and write
15D4000
unkown
page readonly
9A84000
unkown
page read and write
3030000
unkown
page read and write
10E0000
unkown
page read and write
7FF5D72C8000
unkown
page readonly
A467000
heap
page read and write
27EAC000
direct allocation
page read and write
4DF0000
trusted library allocation
page read and write
2EFE000
stack
page read and write
7FF5D764F000
unkown
page readonly
A6FC000
heap
page read and write
A882000
heap
page read and write
73E000
heap
page read and write
A332000
heap
page read and write
6F0000
heap
page read and write
A369000
heap
page read and write
568E000
stack
page read and write
5332000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
381A000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
716000
heap
page read and write
30D7000
trusted library allocation
page read and write
3652000
trusted library allocation
page read and write
62E000
heap
page read and write
5590000
trusted library allocation
page read and write
8B70000
unkown
page read and write
6F6000
stack
page read and write
3652000
trusted library allocation
page read and write
35CF000
unkown
page read and write
7148000
unkown
page readonly
3659000
trusted library allocation
page read and write
35D3000
unkown
page read and write
3638000
trusted library allocation
page read and write
8B70000
unkown
page read and write
42A000
unkown
page read and write
627000
heap
page read and write
A6CD000
heap
page read and write
A28D000
unkown
page read and write
A31C000
heap
page read and write
2A5E000
stack
page read and write
7CB0000
unkown
page readonly
75E0000
unkown
page read and write
50D0000
heap
page execute and read and write
50C2000
unkown
page readonly
627000
heap
page read and write
B24000
heap
page read and write
A5DA000
heap
page read and write
627000
heap
page read and write
5594000
trusted library allocation
page read and write
110F0000
unkown
page read and write
A834000
heap
page read and write
7FF5D775C000
unkown
page readonly
62E000
heap
page read and write
1120000
unkown
page read and write
6FF000
heap
page read and write
627000
heap
page read and write
98A000
trusted library allocation
page execute and read and write
123E000
stack
page read and write
2AA6000
trusted library allocation
page read and write
2FF2000
trusted library allocation
page read and write
EB5000
stack
page read and write
62E000
heap
page read and write
D66000
heap
page read and write
7FF5D705D000
unkown
page readonly
A8E7000
heap
page read and write
62E000
heap
page read and write
DD6000
heap
page read and write
3030000
unkown
page read and write
2A5E000
stack
page read and write
2C0A000
trusted library allocation
page read and write
10E0000
stack
page read and write
41B000
unkown
page read and write
52EE000
stack
page read and write
A6A7000
heap
page read and write
2380000
trusted library allocation
page read and write
AC0000
heap
page read and write
368B000
trusted library allocation
page read and write
6F0A000
unkown
page readonly
758F000
unkown
page readonly
A33A000
heap
page read and write
73E000
heap
page read and write
627000
heap
page read and write
7E58000
stack
page read and write
51DE000
stack
page read and write
CA0000
heap
page read and write
627000
heap
page read and write
ADB8000
heap
page read and write
7FF5D7482000
unkown
page readonly
713000
heap
page read and write
12C0000
trusted library allocation
page read and write
D2E000
stack
page read and write
112CF000
unkown
page read and write
7FF5D769E000
unkown
page readonly
3658000
trusted library allocation
page read and write
3129000
trusted library allocation
page read and write
1450000
trusted library allocation
page execute and read and write
C00000
heap
page read and write
7FF5D748A000
unkown
page readonly
9AAA000
unkown
page read and write
B4BF000
stack
page read and write
62E000
heap
page read and write
11146000
unkown
page read and write
A8BF000
heap
page read and write
627000
heap
page read and write
E00000
unkown
page readonly
7FF5D6BEF000
unkown
page readonly
418000
unkown
page readonly
D13000
unkown
page execute read
3652000
trusted library allocation
page read and write
418000
unkown
page readonly
5504000
trusted library allocation
page read and write
7B00000
unkown
page readonly
7FF5D7262000
unkown
page readonly
627000
heap
page read and write
7FF5D71CC000
unkown
page readonly
56E3000
trusted library allocation
page read and write
C605000
unkown
page read and write
A5E1000
heap
page read and write
2FE6000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
9F1D000
heap
page read and write
8390000
unkown
page read and write
3500000
stack
page read and write
37E2000
trusted library allocation
page read and write
3F07000
trusted library allocation
page read and write
7FF5D7507000
unkown
page readonly
561A000
trusted library allocation
page read and write
587E000
stack
page read and write
56E5000
trusted library allocation
page read and write
7FF5D765F000
unkown
page readonly
50C0000
unkown
page readonly
9EB1000
heap
page read and write
ADB0000
heap
page read and write
3290000
unkown
page read and write
29FA000
trusted library allocation
page execute and read and write
B66000
heap
page read and write
99B8000
unkown
page read and write
A4FF000
heap
page read and write
3652000
trusted library allocation
page read and write
A65E000
heap
page read and write
6FF000
heap
page read and write
A1F4000
heap
page read and write
3B688000
direct allocation
page read and write
DC4000
trusted library allocation
page read and write
3030000
unkown
page read and write
3812000
trusted library allocation
page read and write
7611000
unkown
page read and write
2EA0000
unkown
page read and write
6FF000
heap
page read and write
627000
heap
page read and write
7FF5D71A6000
unkown
page readonly
7FF5D7643000
unkown
page readonly
4CD1000
trusted library allocation
page read and write
10E0000
unkown
page read and write
1F5000
heap
page read and write
8B70000
unkown
page read and write
10E0000
unkown
page read and write
9C000
stack
page read and write
3380000
unkown
page read and write
9DB000
stack
page read and write
9AA0000
unkown
page read and write
16DE000
stack
page read and write
3641000
trusted library allocation
page read and write
7FF5D7336000
unkown
page readonly
ADAB000
heap
page read and write
A598000
heap
page read and write
69EE000
unkown
page readonly
2F01000
trusted library allocation
page read and write
8B70000
unkown
page read and write
A346000
heap
page read and write
2720000
heap
page read and write
3662000
trusted library allocation
page read and write
7FF5D743F000
unkown
page readonly
1000000
heap
page read and write
2771000
trusted library allocation
page read and write
A2BA000
heap
page read and write
C00000
heap
page read and write
627000
heap
page read and write
62E000
heap
page read and write
2970000
heap
page read and write
A803000
heap
page read and write
62E000
heap
page read and write
62E000
heap
page read and write
627000
heap
page read and write
10E0000
unkown
page read and write
2EA0000
unkown
page read and write
2800000
heap
page read and write
559E000
trusted library allocation
page read and write
9E95000
heap
page read and write
369B000
trusted library allocation
page read and write
367B000
trusted library allocation
page read and write
35B3000
unkown
page read and write
A19C000
heap
page read and write
71A000
heap
page read and write
62E000
heap
page read and write
5140000
trusted library allocation
page read and write
1250000
unkown
page read and write
368A000
trusted library allocation
page read and write
A63F000
heap
page read and write
A8BC000
heap
page read and write
86F000
heap
page read and write
A5E5000
heap
page read and write
54C0000
trusted library allocation
page read and write
6A784000
unkown
page read and write
54E5000
trusted library allocation
page read and write
3630000
unkown
page readonly
4DD0000
trusted library allocation
page read and write
739E000
unkown
page readonly
9A80000
unkown
page read and write
A697000
heap
page read and write
3685000
trusted library allocation
page read and write
A1A7000
heap
page read and write
4E72000
trusted library allocation
page read and write
A1A1000
heap
page read and write
3310000
unkown
page read and write
35BD000
unkown
page read and write
5A40000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
5D0000
heap
page read and write
691000
heap
page read and write
10E0000
unkown
page read and write
A83A000
heap
page read and write
363E000
trusted library allocation
page read and write
970000
trusted library allocation
page read and write
678000
heap
page read and write
10001000
unkown
page execute read
70C000
heap
page read and write
19A000
stack
page read and write
DB8000
heap
page read and write
62E000
heap
page read and write
4D92000
trusted library allocation
page read and write
D60000
heap
page read and write
3030000
unkown
page read and write
3FE000
stack
page read and write
A17D000
heap
page read and write
3280000
unkown
page read and write
4B1E000
stack
page read and write
C806000
unkown
page read and write
880000
heap
page read and write
1F90000
heap
page read and write
C81C000
unkown
page read and write
2B05000
trusted library allocation
page read and write
6A6B1000
unkown
page write copy
3B694000
direct allocation
page read and write
AD7B000
heap
page read and write
627000
heap
page read and write
BE49000
stack
page read and write
A79B000
heap
page read and write
62E000
heap
page read and write
62E000
heap
page read and write
180E000
stack
page read and write
9D67000
unkown
page read and write
A909000
heap
page read and write
74E0000
unkown
page readonly
10FBD000
unkown
page read and write
627000
heap
page read and write
C7E000
stack
page read and write
9F58000
heap
page read and write
363A000
trusted library allocation
page read and write
710000
heap
page read and write
7361000
unkown
page readonly
62E000
heap
page read and write
A5FD000
heap
page read and write
6A964000
unkown
page readonly
303F000
stack
page read and write
110E4000
unkown
page read and write
5114000
trusted library allocation
page read and write
3B07000
trusted library allocation
page read and write
1281000
unkown
page readonly
FEE000
stack
page read and write
3662000
trusted library allocation
page read and write
A67E000
heap
page read and write
672000
heap
page read and write
A1A4000
heap
page read and write
AE1D000
stack
page read and write
439000
unkown
page readonly
627000
heap
page read and write
13A0000
unkown
page readonly
5290000
trusted library allocation
page read and write
8B70000
unkown
page read and write
7FF5D72E9000
unkown
page readonly
9F8000
heap
page read and write
7654000
unkown
page read and write
A0A9000
stack
page read and write
4151000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
A919000
heap
page read and write
2EA0000
unkown
page read and write
68D000
heap
page read and write
7FF5D77CD000
unkown
page readonly
110D9000
unkown
page read and write
398F000
stack
page read and write
49BB000
unkown
page read and write
8F49000
stack
page read and write
3BB0000
heap
page read and write
1690000
heap
page execute and read and write
2740000
heap
page read and write
62E000
heap
page read and write
A179000
heap
page read and write
7803000
unkown
page readonly
A1A9000
heap
page read and write
A4D1000
heap
page read and write
8E4E000
stack
page read and write
627000
heap
page read and write
CC0000
unkown
page readonly
401000
unkown
page execute read
7FF5D7641000
unkown
page readonly
7FF5D7694000
unkown
page readonly
716000
heap
page read and write
730000
heap
page read and write
3639000
trusted library allocation
page read and write
3634000
trusted library allocation
page read and write
713000
heap
page read and write
35D5000
unkown
page read and write
7FF5D71F9000
unkown
page readonly
AD7F000
heap
page read and write
A792000
heap
page read and write
10F6000
stack
page read and write
A57D000
heap
page read and write
400000
unkown
page readonly
6EF6000
unkown
page readonly
625000
heap
page read and write
627000
heap
page read and write
6B8F000
unkown
page readonly
7637000
unkown
page read and write
363F000
trusted library allocation
page read and write
4B5E000
stack
page read and write
2394000
trusted library allocation
page read and write
9A72000
unkown
page read and write
A4C3000
heap
page read and write
8890000
unkown
page readonly
7FF5D7442000
unkown
page readonly
40A000
unkown
page read and write
2774000
heap
page read and write
6BFF000
unkown
page readonly
9B0B000
unkown
page read and write
363F000
trusted library allocation
page read and write
365F000
trusted library allocation
page read and write
A17D000
heap
page read and write
3B628000
direct allocation
page read and write
6E4000
heap
page read and write
827000
trusted library allocation
page execute and read and write
627000
heap
page read and write
A1AC000
heap
page read and write
27A1000
trusted library allocation
page read and write
D40000
heap
page read and write
A233000
unkown
page read and write
401000
unkown
page execute read
6A6F1000
unkown
page read and write
A17F000
heap
page read and write
A581000
heap
page read and write
7182000
unkown
page readonly
BB0000
trusted library allocation
page read and write
A32E000
heap
page read and write
62E000
heap
page read and write
561F000
trusted library allocation
page read and write
35FA000
unkown
page read and write
9F6B000
heap
page read and write
3C280000
direct allocation
page read and write
124F000
stack
page read and write
1121B000
unkown
page read and write
704000
heap
page read and write
A729000
heap
page read and write
A732000
heap
page read and write
997C000
stack
page read and write
A661000
heap
page read and write
739000
heap
page read and write
7FF5D728E000
unkown
page readonly
10E0000
unkown
page read and write
C460000
unkown
page read and write
2FE1000
heap
page read and write
D3E000
heap
page read and write
74B9000
unkown
page readonly
42E000
unkown
page readonly
7FF5D75F6000
unkown
page readonly
43FF000
stack
page read and write
627000
heap
page read and write
7FF5D751F000
unkown
page readonly
A1AB000
heap
page read and write
2A6E000
stack
page read and write
A872000
heap
page read and write
546E000
stack
page read and write
627000
heap
page read and write
627000
heap
page read and write
3671000
trusted library allocation
page read and write
7FF5D7429000
unkown
page readonly
53EF000
stack
page read and write
7FF5D7591000
unkown
page readonly
35E4000
unkown
page read and write
7FF5D776D000
unkown
page readonly
5150000
trusted library allocation
page read and write
36EB000
trusted library allocation
page read and write
7FF5D7292000
unkown
page readonly
3652000
trusted library allocation
page read and write
62E000
heap
page read and write
C96B000
unkown
page read and write
A88C000
heap
page read and write
3663000
trusted library allocation
page read and write
3C201000
direct allocation
page read and write
F438000
unkown
page read and write
6A703000
unkown
page read and write
13FF000
stack
page read and write
1100000
unkown
page read and write
10E0000
unkown
page read and write
73E000
heap
page read and write
A6DF000
heap
page read and write
7FF5D779E000
unkown
page readonly
6FF000
heap
page read and write
A1BD000
heap
page read and write
A1A2000
heap
page read and write
10FB9000
unkown
page read and write
A80C000
heap
page read and write
A389000
heap
page read and write
A196000
heap
page read and write
36AE000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
A1A2000
heap
page read and write
110F7000
unkown
page read and write
A17B000
heap
page read and write
7B1000
heap
page read and write
74AE000
unkown
page readonly
10E0000
unkown
page read and write
A19E000
heap
page read and write
35B5000
unkown
page read and write
27D7000
heap
page read and write
345E000
stack
page read and write
B2B000
heap
page read and write
3643000
trusted library allocation
page read and write
A2D7000
unkown
page read and write
A17C000
heap
page read and write
7FF5D7396000
unkown
page readonly
A4CA000
heap
page read and write
1090000
heap
page read and write
C4C6000
unkown
page read and write
363B000
trusted library allocation
page read and write
476D000
stack
page read and write
670000
heap
page read and write
7FF5D7558000
unkown
page readonly
4250000
direct allocation
page read and write
C9A7000
unkown
page read and write
716000
heap
page read and write
9E7F000
heap
page read and write
BA6000
trusted library allocation
page read and write
73E000
heap
page read and write
10E0000
unkown
page read and write
62E000
heap
page read and write
F5F000
stack
page read and write
9AA8000
unkown
page read and write
3030000
unkown
page read and write
A776000
heap
page read and write
A1A5000
heap
page read and write
10E0000
unkown
page read and write
62E000
heap
page read and write
7FD000
trusted library allocation
page execute and read and write
16E0000
heap
page read and write
627000
heap
page read and write
A9E9000
unkown
page read and write
A17B000
heap
page read and write
7FF5D75F9000
unkown
page readonly
C483000
unkown
page read and write
4740000
heap
page read and write
A1C3000
heap
page read and write
E3B000
heap
page read and write
730000
heap
page read and write
3C55000
trusted library allocation
page read and write
3683000
trusted library allocation
page read and write
73E000
heap
page read and write
3668000
trusted library allocation
page read and write
56DE000
stack
page read and write
A314000
heap
page read and write
6EC000
heap
page read and write
5640000
heap
page read and write
A40B000
heap
page read and write
A700000
heap
page read and write
7FF5D76D7000
unkown
page readonly
99C0000
unkown
page read and write
5350000
trusted library allocation
page read and write
7FF5D77C7000
unkown
page readonly
DB0000
heap
page read and write
B0BD000
stack
page read and write
62E000
heap
page read and write
7114000
unkown
page readonly
7FF5D738E000
unkown
page readonly
667000
heap
page read and write
627000
heap
page read and write
3060000
unkown
page read and write
BDC0000
unkown
page read and write
71FF000
unkown
page readonly
62E000
heap
page read and write
7AA0000
unkown
page read and write
550000
heap
page read and write
41B000
unkown
page read and write
4E00000
trusted library allocation
page read and write
8ECC000
stack
page read and write
A237000
unkown
page read and write
C4BD000
unkown
page read and write
3679000
trusted library allocation
page read and write
62E000
heap
page read and write
3590000
remote allocation
page read and write
504F000
stack
page read and write
7293000
unkown
page readonly
AB2000
heap
page read and write
3B658000
direct allocation
page read and write
FF4000
unkown
page read and write
A646000
heap
page read and write
10E0000
unkown
page read and write
510000
heap
page read and write
8A00000
unkown
page read and write
7FF5D75BF000
unkown
page readonly
1660000
trusted library allocation
page read and write
105FB000
unkown
page read and write
8B70000
unkown
page read and write
6FA000
heap
page read and write
364A000
trusted library allocation
page read and write
3C2B0000
direct allocation
page read and write
7FF5D7799000
unkown
page readonly
6EF8000
unkown
page readonly
FA0000
heap
page read and write
62E000
heap
page read and write
9EF3000
heap
page read and write
C3CE000
stack
page read and write
32DE000
stack
page read and write
1240000
heap
page read and write
A198000
heap
page read and write
364A000
trusted library allocation
page read and write
3C2FC000
direct allocation
page read and write
8390000
unkown
page read and write
C609000
unkown
page read and write
3679000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
62E000
heap
page read and write
A1B4000
heap
page read and write
A579000
heap
page read and write
8B70000
unkown
page read and write
A41E000
heap
page read and write
C4DC000
unkown
page read and write
35D1000
unkown
page read and write
3652000
trusted library allocation
page read and write
10E0000
unkown
page read and write
10E0000
unkown
page read and write
3679000
trusted library allocation
page read and write
434F000
stack
page read and write
27E8C000
direct allocation
page read and write
627000
heap
page read and write
10E0000
unkown
page read and write
62E000
heap
page read and write
7FF5D77EB000
unkown
page readonly
C1CC000
stack
page read and write
36CF000
stack
page read and write
55B7000
trusted library allocation
page read and write
3652000
trusted library allocation
page read and write
B0E0000
unkown
page readonly
A93F000
heap
page read and write
62E000
heap
page read and write
363B000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
B00000
heap
page read and write
5525000
trusted library allocation
page read and write
50F0000
trusted library allocation
page read and write
7FF5D72D0000
unkown
page readonly
7FF5D71EA000
unkown
page readonly
A765000
heap
page read and write
3030000
unkown
page read and write
7730000
unkown
page readonly
3030000
unkown
page read and write
3520000
unkown
page readonly
A7AE000
heap
page read and write
A71D000
heap
page read and write
10FB1000
unkown
page read and write
27EB0000
direct allocation
page read and write
B220000
unkown
page read and write
4AB0000
unkown
page read and write
E40000
unkown
page readonly
4A44000
unkown
page read and write
A19C000
heap
page read and write
70F2000
unkown
page readonly
9B2C000
unkown
page read and write
7FF5D75D9000
unkown
page readonly
7FF5D73F5000
unkown
page readonly
7DF4F24A1000
unkown
page execute read
A586000
heap
page read and write
718000
heap
page read and write
390000
heap
page read and write
293E000
stack
page read and write
3B638000
direct allocation
page read and write
A251000
unkown
page read and write
4E6E000
stack
page read and write
8B70000
unkown
page read and write
A286000
unkown
page read and write
363E000
trusted library allocation
page read and write
1390000
heap
page read and write
F436000
unkown
page read and write
A1BF000
heap
page read and write
1120000
unkown
page read and write
436000
unkown
page readonly
721000
heap
page read and write
115E000
stack
page read and write
72E9000
unkown
page readonly
8390000
unkown
page read and write
627000
heap
page read and write
4D8E000
stack
page read and write
10E0000
unkown
page read and write
7FF5D783B000
unkown
page readonly
62E000
heap
page read and write
8B70000
unkown
page read and write
2572000
trusted library allocation
page read and write
B4E000
stack
page read and write
4ED6000
unkown
page readonly
7FF5D7700000
unkown
page readonly
6A6F3000
unkown
page write copy
5500000
trusted library allocation
page read and write
3B640000
direct allocation
page read and write
E10000
unkown
page readonly
A2B5000
unkown
page read and write
3030000
unkown
page read and write
7810000
unkown
page read and write
8880000
unkown
page readonly
105F6000
unkown
page read and write
3120000
unkown
page read and write
1112D000
unkown
page read and write
363E000
trusted library allocation
page read and write
1667000
trusted library allocation
page execute and read and write
1350000
trusted library allocation
page read and write
A1B6000
heap
page read and write
8B70000
unkown
page read and write
36BC000
trusted library allocation
page read and write
364A000
trusted library allocation
page read and write
23D2000
trusted library allocation
page read and write
62E000
heap
page read and write
9A8C000
unkown
page read and write
35D7000
trusted library allocation
page read and write
ECC000
unkown
page readonly
A070000
heap
page read and write
7FF5D77C2000
unkown
page readonly
4C8E000
stack
page read and write
C5F4000
unkown
page read and write
627000
heap
page read and write
F434000
unkown
page read and write
40A000
unkown
page write copy
9F74000
heap
page read and write
7FF5D7784000
unkown
page readonly
4DB6000
trusted library allocation
page read and write
44D0000
heap
page read and write
A1AE000
heap
page read and write
367A000
trusted library allocation
page read and write
69C000
heap
page read and write
4AE40000
direct allocation
page read and write
69C000
heap
page read and write
A101000
heap
page read and write
A88E000
heap
page read and write
837000
heap
page read and write
627000
heap
page read and write
3668000
trusted library allocation
page read and write
A50C000
heap
page read and write
71C000
heap
page read and write
7DF4F2480000
unkown
page readonly
6DA000
heap
page read and write
68D000
heap
page read and write
7D8000
heap
page read and write
3530000
unkown
page read and write
73E000
heap
page read and write
7125000
unkown
page readonly
4AF3000
trusted library allocation
page read and write
A1BB000
heap
page read and write
A784000
heap
page read and write
2C37000
trusted library allocation
page read and write
27E14000
direct allocation
page read and write
6F9000
heap
page read and write
A66C000
heap
page read and write
62E000
heap
page read and write
10FBB000
unkown
page read and write
A5DC000
heap
page read and write
A408000
unkown
page read and write
12F6000
heap
page read and write
A3C8000
heap
page read and write
E17000
heap
page read and write
3682000
trusted library allocation
page read and write
627000
heap
page read and write
A236000
heap
page read and write
A415000
heap
page read and write
5360000
heap
page execute and read and write
1120000
heap
page read and write
A0B8000
heap
page read and write
A8EF000
heap
page read and write
FCF000
stack
page read and write
62E000
heap
page read and write
85E000
heap
page read and write
A19F000
heap
page read and write
3B620000
direct allocation
page read and write
3638000
trusted library allocation
page read and write
3682000
trusted library allocation
page read and write
627000
heap
page read and write
70B3000
unkown
page readonly
A586000
heap
page read and write
3C26C000
direct allocation
page read and write
81A000
trusted library allocation
page execute and read and write
2501000
trusted library allocation
page read and write
7FF5D75B3000
unkown
page readonly
C5F0000
unkown
page read and write
A3AD000
heap
page read and write
3B650000
direct allocation
page read and write
55A4000
trusted library allocation
page read and write
A24C000
heap
page read and write
62E000
heap
page read and write
10FB8000
unkown
page read and write
AA40000
unkown
page read and write
750000
heap
page read and write
A714000
heap
page read and write
627000
heap
page read and write
7FF5D71E0000
unkown
page readonly
3691000
trusted library allocation
page read and write
A172000
heap
page read and write
5F0000
heap
page read and write
A93000
heap
page read and write
4460000
heap
page read and write
627000
heap
page read and write
721000
heap
page read and write
35B000
stack
page read and write
7FF5D69BB000
unkown
page readonly
627000
heap
page read and write
A197000
heap
page read and write
2EA0000
unkown
page read and write
9F85000
heap
page read and write
8B70000
unkown
page read and write
1790000
trusted library allocation
page execute and read and write
76F8000
unkown
page read and write
2708000
unkown
page readonly
12B0000
unkown
page read and write
6A6F7000
unkown
page read and write
A87D000
heap
page read and write
A39F000
unkown
page read and write
D99000
heap
page read and write
82E000
heap
page read and write
5121000
trusted library allocation
page read and write
A193000
heap
page read and write
11132000
unkown
page read and write
7FF5CE343000
unkown
page readonly
A199000
heap
page read and write
A5B9000
heap
page read and write
1290000
trusted library allocation
page read and write
6F4000
heap
page read and write
7FF5D723F000
unkown
page readonly
A3E1000
heap
page read and write
10E0000
unkown
page read and write
627000
heap
page read and write
627000
heap
page read and write
3652000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
A432000
heap
page read and write
2708000
unkown
page readonly
A091000
heap
page read and write
1364000
trusted library allocation
page read and write
A1B2000
heap
page read and write
2566000
trusted library allocation
page execute and read and write
D84000
heap
page read and write
7618000
unkown
page read and write
C3E000
stack
page read and write
C7D000
stack
page read and write
2737000
trusted library allocation
page read and write
301F000
stack
page read and write
627000
heap
page read and write
29F7000
trusted library allocation
page execute and read and write
4E04000
trusted library allocation
page read and write
A1A6000
heap
page read and write
7FF5D776F000
unkown
page readonly
4E40000
heap
page execute and read and write
C3E000
stack
page read and write
3C270000
direct allocation
page read and write
AAA8000
unkown
page read and write
11277000
unkown
page read and write
4E92000
unkown
page readonly
8989000
unkown
page read and write
710000
heap
page read and write
10E0000
unkown
page read and write
A74F000
heap
page read and write
A34F000
heap
page read and write
9E88000
heap
page read and write
C80000
trusted library allocation
page read and write
35D1000
trusted library allocation
page read and write
D7D000
heap
page read and write
62E000
heap
page read and write
8B70000
unkown
page read and write
10E0000
unkown
page read and write
7FF5D768B000
unkown
page readonly
7FF5D74FA000
unkown
page readonly
10E0000
unkown
page read and write
4DA1000
trusted library allocation
page read and write
71A000
heap
page read and write
A5BF000
heap
page read and write
10BE000
stack
page read and write
A856000
heap
page read and write
363E000
trusted library allocation
page read and write
33C0000
unkown
page read and write
7AE0000
unkown
page read and write
44E0000
heap
page read and write
2708000
unkown
page readonly
3662000
trusted library allocation
page read and write
F30000
heap
page read and write
50C0000
trusted library allocation
page read and write
10FBF000
unkown
page read and write
6A740000
unkown
page read and write
7FF5D7462000
unkown
page readonly
A5B7000
heap
page read and write
7DC0000
unkown
page readonly
53BE000
stack
page read and write
A8B4000
heap
page read and write
2BA0000
heap
page read and write
7FF5D75B8000
unkown
page readonly
540000
heap
page read and write
3360000
unkown
page read and write
A8DE000
heap
page read and write
3630000
trusted library allocation
page read and write
FF4000
unkown
page write copy
855000
heap
page read and write
A139000
heap
page read and write
23B1000
trusted library allocation
page read and write
6A6BA000
unkown
page write copy
A5CF000
heap
page read and write
10E0000
unkown
page read and write
7608000
unkown
page readonly
7FF5D72BD000
unkown
page readonly
69C000
heap
page read and write
A5A9000
heap
page read and write
CC1000
unkown
page execute read
A742000
heap
page read and write
E50000
heap
page read and write
3689000
trusted library allocation
page read and write
3360000
unkown
page read and write
9F9B000
heap
page read and write
7DF4F2491000
unkown
page execute read
8B70000
unkown
page read and write
355F000
stack
page read and write
627000
heap
page read and write
2AF0000
heap
page execute and read and write
363E000
trusted library allocation
page read and write
24CE000
stack
page read and write
BA3000
trusted library allocation
page execute and read and write
2ACF000
stack
page read and write
3C2A0000
direct allocation
page read and write
3652000
trusted library allocation
page read and write
A574000
heap
page read and write
9A8E000
unkown
page read and write
A406000
heap
page read and write
627000
heap
page read and write
704000
heap
page read and write
A949000
heap
page read and write
1360000
trusted library allocation
page read and write
7FF5D7797000
unkown
page readonly
363E000
trusted library allocation
page read and write
D3A000
heap
page read and write
710000
heap
page read and write
627000
heap
page read and write
7FF5D7760000
unkown
page readonly
C472000
unkown
page read and write
62E000
heap
page read and write
3675000
trusted library allocation
page read and write
627000
heap
page read and write
4F3D000
stack
page read and write
3652000
trusted library allocation
page read and write
1390000
heap
page read and write
B2E000
stack
page read and write
A57D000
heap
page read and write
69F0000
unkown
page readonly
9E81000
heap
page read and write
7CE000
heap
page read and write
73E000
heap
page read and write
3B6E0000
direct allocation
page read and write
62E000
heap
page read and write
A264000
unkown
page read and write
A17A000
heap
page read and write
678000
heap
page read and write
678000
heap
page read and write
718000
heap
page read and write
C663000
unkown
page read and write
1380000
heap
page read and write
7FF5D7593000
unkown
page readonly
4AE44000
direct allocation
page read and write
62E000
heap
page read and write
7FF5D7722000
unkown
page readonly
424E000
stack
page read and write
E2D000
trusted library allocation
page execute and read and write
A186000
heap
page read and write
2577000
trusted library allocation
page execute and read and write
3652000
trusted library allocation
page read and write
3110000
unkown
page readonly
1170000
heap
page read and write
627000
heap
page read and write
627000
heap
page read and write
95FB000
stack
page read and write
7FF5D7425000
unkown
page readonly
A7B3000
heap
page read and write
73E000
heap
page read and write
363E000
trusted library allocation
page read and write
A8DC000
heap
page read and write
3652000
trusted library allocation
page read and write
A180000
heap
page read and write
627000
heap
page read and write
73E000
heap
page read and write
62E000
heap
page read and write
2B01000
trusted library allocation
page read and write
BF9000
trusted library allocation
page read and write
A1A3000
heap
page read and write
4EBE000
stack
page read and write
2AA0000
trusted library allocation
page read and write
4AE01000
direct allocation
page read and write
768E000
unkown
page read and write
704000
heap
page read and write
50C3000
trusted library allocation
page read and write
E86000
heap
page read and write
718000
heap
page read and write
FF0000
unkown
page readonly
62E000
heap
page read and write
10E0000
unkown
page read and write
3105000
trusted library allocation
page read and write
A335000
heap
page read and write
6FF000
heap
page read and write
25D1000
trusted library allocation
page read and write
A182000
heap
page read and write
73E000
heap
page read and write
627000
heap
page read and write
74E000
stack
page read and write
10E0000
unkown
page read and write
9F65000
heap
page read and write
12AD000
trusted library allocation
page execute and read and write
7FF5D7740000
unkown
page readonly
3114000
trusted library allocation
page read and write
3652000
trusted library allocation
page read and write
2C40000
heap
page execute and read and write
A1A5000
heap
page read and write
731000
heap
page read and write
62E000
heap
page read and write
3775000
trusted library allocation
page read and write
A78D000
heap
page read and write
94AE000
stack
page read and write
A198000
heap
page read and write
519E000
stack
page read and write
366A000
trusted library allocation
page read and write
C84000
trusted library allocation
page read and write
7FF5D7230000
unkown
page readonly
6F4000
heap
page read and write
A852000
heap
page read and write
721000
heap
page read and write
3694000
trusted library allocation
page read and write
62E000
heap
page read and write
3030000
unkown
page read and write
62E000
heap
page read and write
62E000
heap
page read and write
3030000
unkown
page read and write
F3F0000
unkown
page read and write
62E000
heap
page read and write
816000
trusted library allocation
page execute and read and write
62E000
heap
page read and write
4E90000
unkown
page readonly
F86000
heap
page read and write
9679000
stack
page read and write
9BE000
stack
page read and write
A384000
unkown
page read and write
2CDF000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
7E60000
unkown
page read and write
70AD000
unkown
page readonly
CBE000
stack
page read and write
10E0000
unkown
page read and write
3771000
trusted library allocation
page read and write
930000
heap
page read and write
8B70000
unkown
page read and write
4AF5000
trusted library allocation
page read and write
A170000
heap
page read and write
10E0000
unkown
page read and write
583E000
stack
page read and write
4C13000
trusted library allocation
page read and write
B71000
stack
page read and write
A33E000
heap
page read and write
2708000
unkown
page readonly
8B70000
unkown
page read and write
870000
trusted library allocation
page read and write
627000
heap
page read and write
A2A000
heap
page read and write
62E000
heap
page read and write
A8CA000
heap
page read and write
627000
heap
page read and write
3689000
trusted library allocation
page read and write
3030000
unkown
page read and write
A5F4000
heap
page read and write
36CA000
trusted library allocation
page read and write
A77B000
heap
page read and write
88B000
stack
page read and write
A1AF000
stack
page read and write
62E000
heap
page read and write
700000
heap
page read and write
B0E000
stack
page read and write
35DC000
unkown
page read and write
40B000
unkown
page execute read
165F000
stack
page read and write
36B0000
trusted library allocation
page read and write
10E0000
unkown
page read and write
2EA0000
unkown
page read and write
627000
heap
page read and write
27ED4000
direct allocation
page read and write
5633000
trusted library allocation
page read and write
27E04000
direct allocation
page read and write
38AA000
trusted library allocation
page read and write
6D55000
unkown
page readonly
9F9F000
heap
page read and write
C20000
remote allocation
page read and write
7FF5D71AF000
unkown
page readonly
721000
heap
page read and write
3F01000
trusted library allocation
page read and write
7FF5D7488000
unkown
page readonly
A174000
heap
page read and write
27E50000
direct allocation
page read and write
365F000
trusted library allocation
page read and write
ADAF000
heap
page read and write
DDC000
heap
page read and write
B85000
trusted library allocation
page read and write
627000
heap
page read and write
C48B000
unkown
page read and write
A121000
heap
page read and write
A93C000
heap
page read and write
3650000
trusted library allocation
page read and write
1120000
heap
page read and write
C10000
trusted library allocation
page read and write
3653000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
C00000
heap
page read and write
E37000
heap
page read and write
A404000
heap
page read and write
82A000
heap
page read and write
1210000
trusted library allocation
page read and write
7058000
unkown
page readonly
1110A000
unkown
page read and write
35F4000
unkown
page read and write
627000
heap
page read and write
77E000
stack
page read and write
7291000
unkown
page readonly
A0C0000
heap
page read and write
5615000
trusted library allocation
page read and write
13B0000
heap
page read and write
401000
unkown
page execute read
A69A000
heap
page read and write
C73E000
unkown
page read and write
7FF5D7236000
unkown
page readonly
27C7000
trusted library allocation
page read and write
7FF5D7215000
unkown
page readonly
6A35000
unkown
page readonly
731000
heap
page read and write
A8E9000
heap
page read and write
3B601000
direct allocation
page read and write
62E000
heap
page read and write
107F000
stack
page read and write
6DB000
heap
page read and write
3687000
trusted library allocation
page read and write
A43D000
heap
page read and write
627000
heap
page read and write
7FF5D732D000
unkown
page readonly
2780000
heap
page read and write
A82000
heap
page read and write
69C000
heap
page read and write
511F000
stack
page read and write
62E000
heap
page read and write
3662000
trusted library allocation
page read and write
10E0000
unkown
page read and write
F40000
heap
page read and write
ACD000
stack
page read and write
1060000
heap
page read and write
843F000
stack
page read and write
7FF5D66E3000
unkown
page readonly
62E000
heap
page read and write
418000
unkown
page readonly
A273000
unkown
page read and write
C617000
unkown
page read and write
10E0000
unkown
page read and write
2A07000
trusted library allocation
page execute and read and write
627000
heap
page read and write
2A0B000
trusted library allocation
page execute and read and write
7FF5D7404000
unkown
page readonly
A1A7000
heap
page read and write
7FF5D76AF000
unkown
page readonly
7FF5D71E6000
unkown
page readonly
A92D000
heap
page read and write
A7E6000
heap
page read and write
3652000
trusted library allocation
page read and write
3B684000
direct allocation
page read and write
36EB000
trusted library allocation
page read and write
853B000
stack
page read and write
A23A000
heap
page read and write
627000
heap
page read and write
5635000
trusted library allocation
page read and write
71C000
heap
page read and write
3693000
trusted library allocation
page read and write
7673000
unkown
page readonly
3501000
trusted library allocation
page read and write
7FF5D75AF000
unkown
page readonly
A38F000
heap
page read and write
B95000
heap
page read and write
7FF5D7589000
unkown
page readonly
2740000
trusted library allocation
page read and write
856000
heap
page read and write
8CB8000
stack
page read and write
424E000
stack
page read and write
8B70000
unkown
page read and write
18B0000
heap
page read and write
7DF4F2460000
unkown
page readonly
BE0000
heap
page read and write
23D6000
trusted library allocation
page read and write
710000
heap
page read and write
A570000
heap
page read and write
A36E000
heap
page read and write
7FF5D76E8000
unkown
page readonly
29F0000
trusted library allocation
page read and write
7BC000
heap
page read and write
A034000
heap
page read and write
A4F3000
heap
page read and write
31B000
stack
page read and write
3030000
unkown
page read and write
9ADB000
unkown
page read and write
4A90000
unkown
page read and write
A1B1000
heap
page read and write
3151000
trusted library allocation
page read and write
7FF5D7455000
unkown
page readonly
8AA000
stack
page read and write
699000
heap
page read and write
2829000
heap
page read and write
1F0000
heap
page read and write
A23A000
unkown
page read and write
C44F000
stack
page read and write
62E000
heap
page read and write
A800000
heap
page read and write
400000
unkown
page execute and read and write
295F000
stack
page read and write
319D000
stack
page read and write
627000
heap
page read and write
A465000
heap
page read and write
A198000
heap
page read and write
A19A000
heap
page read and write
136D000
trusted library allocation
page execute and read and write
4986000
unkown
page read and write
363E000
trusted library allocation
page read and write
4157000
trusted library allocation
page read and write
6BF8000
unkown
page readonly
8979000
stack
page read and write
702E000
unkown
page readonly
62E000
heap
page read and write
A491000
heap
page read and write
A577000
heap
page read and write
AD72000
heap
page read and write
6A72F000
unkown
page read and write
6D90000
unkown
page readonly
692000
heap
page read and write
64E000
heap
page read and write
627000
heap
page read and write
627000
heap
page read and write
367B000
trusted library allocation
page read and write
3030000
unkown
page read and write
7FF5D7280000
unkown
page readonly
3100000
unkown
page read and write
BC7000
trusted library allocation
page execute and read and write
7FF5D72DF000
unkown
page readonly
138A000
trusted library allocation
page execute and read and write
9F4D000
heap
page read and write
A628000
heap
page read and write
366D000
trusted library allocation
page read and write
3659000
trusted library allocation
page read and write
3634000
trusted library allocation
page read and write
3C260000
direct allocation
page read and write
2EA0000
unkown
page read and write
3668000
trusted library allocation
page read and write
A172000
heap
page read and write
10E0000
unkown
page read and write
446000
unkown
page readonly
CFD000
unkown
page readonly
3643000
trusted library allocation
page read and write
721000
heap
page read and write
A30A000
heap
page read and write
822000
trusted library allocation
page read and write
7FF5D75E9000
unkown
page readonly
5BDE000
stack
page read and write
A0A2000
heap
page read and write
8B70000
unkown
page read and write
6A01000
unkown
page readonly
627000
heap
page read and write
4A40000
unkown
page read and write
A58C000
heap
page read and write
A7A5000
heap
page read and write
3652000
trusted library allocation
page read and write
7989000
stack
page read and write
3C214000
direct allocation
page read and write
718000
heap
page read and write
72A4000
unkown
page readonly
5890000
heap
page execute and read and write
363E000
trusted library allocation
page read and write
10E0000
unkown
page read and write
3130000
trusted library allocation
page read and write
556E000
stack
page read and write
6B1A000
unkown
page readonly
6A704000
unkown
page write copy
27F34000
direct allocation
page read and write
BE6000
trusted library allocation
page read and write
BB4000
trusted library allocation
page read and write
1468000
heap
page read and write
72B5000
unkown
page readonly
7FF5D747F000
unkown
page readonly
A2F7000
heap
page read and write
7FF5D7534000
unkown
page readonly
7FF5D77E3000
unkown
page readonly
6F9000
heap
page read and write
4ADF000
stack
page read and write
8B70000
unkown
page read and write
6B6F000
unkown
page readonly
7FF5D7837000
unkown
page readonly
A7CC000
heap
page read and write
7FF5D770F000
unkown
page readonly
3030000
unkown
page read and write
A636000
heap
page read and write
AA9D000
unkown
page read and write
86F000
heap
page read and write
7FF5D752F000
unkown
page readonly
6DA000
heap
page read and write
BAB000
trusted library allocation
page read and write
73E000
heap
page read and write
55B1000
trusted library allocation
page read and write
627000
heap
page read and write
721000
heap
page read and write
9F45000
heap
page read and write
4540000
heap
page read and write
795000
heap
page read and write
1662000
trusted library allocation
page read and write
6A6B8000
unkown
page read and write
7291000
unkown
page readonly
62E000
heap
page read and write
62E000
heap
page read and write
7D0000
heap
page read and write
3C224000
direct allocation
page read and write
3647000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
7FF5D77DD000
unkown
page readonly
A8D8000
heap
page read and write
144E000
stack
page read and write
62E000
heap
page read and write
2FE0000
heap
page read and write
2EC0000
unkown
page readonly
4D4E000
stack
page read and write
2FF5000
trusted library allocation
page read and write
271E000
stack
page read and write
27E2C000
direct allocation
page read and write
257B000
trusted library allocation
page execute and read and write
19D000
stack
page read and write
3652000
trusted library allocation
page read and write
BA4000
heap
page read and write
27EBC000
direct allocation
page read and write
A371000
heap
page read and write
3652000
trusted library allocation
page read and write
700000
heap
page read and write
1F4000
heap
page read and write
62E000
heap
page read and write
10E0000
unkown
page read and write
363D000
trusted library allocation
page read and write
7FF5CE33D000
unkown
page readonly
5640000
heap
page read and write
627000
heap
page read and write
A17D000
heap
page read and write
2C9E000
stack
page read and write
627000
heap
page read and write
627000
heap
page read and write
400000
unkown
page readonly
363B000
trusted library allocation
page read and write
7FF5D7485000
unkown
page readonly
3C324000
direct allocation
page read and write
7FF5D749B000
unkown
page readonly
62E000
heap
page read and write
BB4000
trusted library allocation
page read and write
768C000
unkown
page read and write
19D000
stack
page read and write
6BA4000
unkown
page readonly
7FF5D75F2000
unkown
page readonly
72CC000
unkown
page readonly
62E000
heap
page read and write
C61B000
unkown
page read and write
A3D4000
heap
page read and write
7FF5D7394000
unkown
page readonly
627000
heap
page read and write
298C000
heap
page execute and read and write
673000
heap
page read and write
6FF000
heap
page read and write
1680000
trusted library allocation
page read and write
7FF5D77B6000
unkown
page readonly
62E000
heap
page read and write
10E0000
unkown
page read and write
364D000
trusted library allocation
page read and write
62E000
heap
page read and write
363E000
trusted library allocation
page read and write
1460000
heap
page read and write
6EF0000
unkown
page readonly
366D000
trusted library allocation
page read and write
7FF5D716B000
unkown
page readonly
2F1E000
stack
page read and write
5893000
heap
page execute and read and write
627000
heap
page read and write
3331000
unkown
page read and write
A46E000
heap
page read and write
4AC0000
unkown
page read and write
49A8000
unkown
page read and write
A072000
heap
page read and write
5159000
trusted library allocation
page read and write
A82C000
heap
page read and write
88B000
stack
page read and write
A31E000
heap
page read and write
71A000
heap
page read and write
6F2000
heap
page read and write
8B70000
unkown
page read and write
7FF5D7376000
unkown
page readonly
72CE000
unkown
page readonly
1FA0000
heap
page read and write
6F4000
heap
page read and write
7FF5D75EE000
unkown
page readonly
6F9000
heap
page read and write
6A6D2000
unkown
page write copy
41B000
unkown
page write copy
A7EC000
heap
page read and write
E41000
unkown
page execute read
E6D1000
unkown
page read and write
7FF5D7257000
unkown
page readonly
8B70000
unkown
page read and write
367A000
trusted library allocation
page read and write
380A000
trusted library allocation
page read and write
861000
trusted library allocation
page read and write
73E000
heap
page read and write
6AD9000
unkown
page readonly
10FB3000
unkown
page read and write
There are 3255 hidden memdumps, click here to show them.