IOC Report
6IMo1kM9CC.exe

loading gif

Files

File Path
Type
Category
Malicious
6IMo1kM9CC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\huge[1].dat
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\218A.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\500D.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\F817.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nshE60F.tmp\liteFirewall.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\blowfish.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Del.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\feuiuvb
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\feuiuvb:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\INetC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsq70FD.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsx1F86.tmp
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
data
modified
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\cef.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
data
dropped
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\start.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
MSVC program database ver 7.00, 512*4023 bytes
dropped
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 106 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\6IMo1kM9CC.exe
"C:\Users\user\Desktop\6IMo1kM9CC.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\feuiuvb
C:\Users\user\AppData\Roaming\feuiuvb
malicious
C:\Users\user\AppData\Local\Temp\F817.exe
C:\Users\user\AppData\Local\Temp\F817.exe
malicious
C:\Users\user\AppData\Local\Temp\218A.exe
C:\Users\user\AppData\Local\Temp\218A.exe
malicious
C:\Users\user\AppData\Local\Temp\500D.exe
C:\Users\user\AppData\Local\Temp\500D.exe
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
"C:\Users\user\AppData\Local\Temp\setup.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3388 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3548 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3692 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728010167 --mojo-platform-channel-handle=4152 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728172431 --mojo-platform-channel-handle=4208 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://cx5519.com/tmp/index.php
malicious
http://evilos.cc/tmp/index.php
malicious
ellaboratepwsz.xyz
malicious
swellfrrgwwos.xyz
malicious
foodypannyjsud.shop
malicious
146.70.169.164:2227
malicious
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://aka.ms/odirmr
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://chrome.google.com/webstore?hl=hiCtrl$1
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
http://api.install-stat.debug.world/clients/activity.0
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://foodypannyjsud.shop/api3
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
unknown
http://crbug.com/510270
unknown
https://chrome.google.com/webstore?hl=urCtrl$2
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
http://crbug.com/378067
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://foodypannyjsud.shop/ta
unknown
http://www.iana.org/assignments/multicast-addresses
unknown
http://crbug.com/497301
unknown
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
unknown
http://bageyou.xyz
unknown
http://crbug.com/642141
unknown
https://foodypannyjsud.shop/piL4
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://wns.windows.com/L
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://chrome.google.com/webstore
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.google.com/chrome/privacy/eula_text.html&
unknown
http://logging.apache.org/log4j
unknown
https://www.google.com/chrome/privacy/eula_text.htmlT&r
unknown
https://www.ecosia.org/newtab/
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
http://xiexie.wf/22_551/huge.dat
unknown
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://crbug.com/1446731
unknown
https://chrome.google.com/webstore?hl=ukCtrl$1
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://foodypannyjsud.shop/apiX
unknown
https://chromewebstore.google.com/
unknown
https://support.google.com/chrome/a/answer/9122284
unknown
https://outlook.com_
unknown
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupeewP
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
unknown
http://xiexie.wf/
unknown
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
http://www.unicode.org/copyright.html
unknown
http://crbug.com/775961
unknown
https://codereview.chromium.org/25305002).
unknown
http://schemas.micro
unknown
http://api.install-stat.debug.world/clients/activity
unknown
https://chrome.google.com/webstore?hl=zh-TWCtrl$1
unknown
http://www.apache.org/).
unknown
http://crbug.com/275944
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
unknown
http://xiexie.wf/b6e4-4079-b30a-7368302a1ad4
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
unknown
https://policies.google.com/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
unknown
https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
unknown
http://logging.apache.org/log4net/schemas/log4net-events-1.2>
unknown
https://foodypannyjsud.shop/api##
unknown
https://foodypannyjsud.shop/HH
unknown
https://chrome.google.com/webstore/category/extensions
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://passwords.google.comT
unknown
https://web-security-reports.services.atlassian.com/csp-report/bb-website
unknown
https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
unknown
https://d136azpfpnge1l.cloudfront.net/;
unknown
http://crbug.com/672186).
unknown
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupeetP
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherUseIeSitelist
unknown
https://chrome.google.com/webstore?hl=enCtrl$1
unknown
https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
unknown
https://www.google.com/chrome/privacy/eula_text.htmlYar&d
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
188.114.97.3
unknown
European Union
malicious
190.98.23.157
unknown
Suriname
malicious
141.8.192.126
unknown
Russian Federation
malicious
185.68.16.7
unknown
Ukraine
malicious
127.0.0.127
unknown
unknown
malicious
146.70.169.164
unknown
United Kingdom
malicious
104.192.141.1
unknown
United States
188.114.96.3
unknown
European Union
172.67.221.174
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000050278
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080328
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\GamePall
Sid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Pid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GamePall
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
DontShowUI
HKEY_CURRENT_USER\SOFTWARE\GamePall
tmp_uid
HKEY_CURRENT_USER\SOFTWARE\GamePall
reg
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\GamePall
uid
HKEY_CURRENT_USER\Control Panel\Cursors
AppStarting
There are 231 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4381000
unclassified section
page read and write
malicious
12BD000
heap
page read and write
malicious
4360000
direct allocation
page read and write
malicious
28B0000
direct allocation
page read and write
malicious
3950000
direct allocation
page execute and read and write
malicious
4381000
unclassified section
page read and write
malicious
393F000
stack
page read and write
133B000
heap
page read and write
53E000
heap
page read and write
259E000
stack
page read and write
11A1000
heap
page read and write
537000
heap
page read and write
D04000
trusted library allocation
page read and write
2BA0000
heap
page read and write
A947000
heap
page read and write
A85B000
heap
page read and write
A7DE000
heap
page read and write
530000
heap
page read and write
8C70000
unkown
page read and write
9070000
unkown
page read and write
454000
unkown
page readonly
123A000
heap
page read and write
243000
unkown
page execute read
3160000
unkown
page readonly
F95B000
unkown
page read and write
18A0000
unkown
page readonly
2708000
unkown
page readonly
A515000
heap
page read and write
2D00000
trusted library allocation
page read and write
535000
heap
page read and write
A802000
heap
page read and write
6752000
unkown
page readonly
7FF5ED4BB000
unkown
page readonly
A09E000
stack
page read and write
F958000
unkown
page read and write
A569000
heap
page read and write
2313000
trusted library allocation
page execute and read and write
53E000
heap
page read and write
3579000
trusted library allocation
page read and write
2456000
trusted library allocation
page read and write
515000
heap
page read and write
13C0000
unkown
page read and write
355D000
trusted library allocation
page read and write
7884000
unkown
page read and write
7FF5ED849000
unkown
page readonly
2E60000
trusted library allocation
page read and write
53E000
heap
page read and write
A2FF000
heap
page read and write
33B3000
trusted library allocation
page read and write
36D3000
stack
page read and write
A9B6000
heap
page read and write
4CD0000
unkown
page read and write
C57F000
unkown
page read and write
18D7000
trusted library allocation
page read and write
7FF5ED80C000
unkown
page readonly
A491000
unkown
page read and write
537000
heap
page read and write
53E000
heap
page read and write
F95F000
unkown
page read and write
3568000
trusted library allocation
page read and write
1107000
trusted library allocation
page execute and read and write
A3C9000
heap
page read and write
9070000
unkown
page read and write
1070000
heap
page read and write
5820000
trusted library allocation
page read and write
2EE0000
trusted library allocation
page read and write
11A5000
heap
page read and write
63DA000
unkown
page readonly
A3CE000
heap
page read and write
A5C5000
heap
page read and write
35A0000
unkown
page readonly
1220000
unkown
page read and write
2342000
trusted library allocation
page read and write
3290000
unkown
page read and write
132B000
heap
page read and write
11A1000
heap
page read and write
10E7000
trusted library allocation
page execute and read and write
3F72000
trusted library allocation
page read and write
339C000
trusted library allocation
page read and write
A84B000
heap
page read and write
F97000
heap
page read and write
943D000
stack
page read and write
53E000
heap
page read and write
A69C000
heap
page read and write
9795000
unkown
page read and write
850000
heap
page read and write
13E0000
unkown
page read and write
9070000
unkown
page read and write
C561000
unkown
page read and write
5710000
heap
page execute and read and write
7FF5ED4C2000
unkown
page readonly
A49E000
unkown
page read and write
A857000
heap
page read and write
1123000
heap
page read and write
1040000
heap
page read and write
EB5000
heap
page read and write
339E000
trusted library allocation
page read and write
354E000
trusted library allocation
page read and write
67C000
heap
page read and write
1220000
unkown
page read and write
F7F000
heap
page read and write
10DA000
trusted library allocation
page execute and read and write
F958000
unkown
page read and write
3130000
unkown
page read and write
7FF5ED939000
unkown
page readonly
6697000
unkown
page readonly
A140000
heap
page read and write
1020000
trusted library allocation
page read and write
A1D3000
heap
page read and write
11B4000
heap
page read and write
124F000
stack
page read and write
F00000
heap
page read and write
112B000
heap
page read and write
400000
unkown
page readonly
7FF5ED7E0000
unkown
page readonly
537000
heap
page read and write
1518000
heap
page read and write
25D7000
trusted library allocation
page read and write
7FF5ED9F2000
unkown
page readonly
A3A4000
heap
page read and write
40C1000
trusted library allocation
page read and write
53E000
heap
page read and write
53E000
heap
page read and write
97D000
heap
page read and write
2F64000
heap
page read and write
A3CB000
heap
page read and write
7C90000
unkown
page read and write
F794000
unkown
page read and write
A66B000
heap
page read and write
5540000
trusted library allocation
page read and write
133B000
heap
page read and write
112B000
heap
page read and write
368A000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
12A8000
heap
page read and write
A906000
heap
page read and write
353D000
trusted library allocation
page read and write
56C5000
trusted library allocation
page read and write
AA31000
heap
page read and write
2708000
unkown
page readonly
D66000
stack
page read and write
7DF4F3051000
unkown
page execute read
49B000
unkown
page execute and read and write
A883000
heap
page read and write
A655000
heap
page read and write
537000
heap
page read and write
F38000
heap
page read and write
6C0000
heap
page read and write
FEF000
stack
page read and write
3556000
trusted library allocation
page read and write
11C0000
unkown
page read and write
A5E6000
heap
page read and write
A092000
heap
page read and write
A3CC000
heap
page read and write
14B0000
heap
page read and write
AA0E000
heap
page read and write
1230000
unkown
page read and write
4CC0000
unkown
page read and write
1406000
heap
page read and write
7FF5ED495000
unkown
page readonly
1481000
heap
page read and write
5807000
trusted library allocation
page read and write
A736000
heap
page read and write
65C9000
unkown
page readonly
537000
heap
page read and write
7861000
unkown
page read and write
1153000
heap
page read and write
53E000
heap
page read and write
7FF5ED695000
unkown
page readonly
67DC000
unkown
page readonly
114E000
stack
page read and write
A3C4000
heap
page read and write
AF0C000
stack
page read and write
97AD000
unkown
page read and write
7863000
unkown
page read and write
8C70000
unkown
page read and write
A479000
unkown
page read and write
A8FE000
heap
page read and write
300E000
stack
page read and write
537000
heap
page read and write
1121000
heap
page read and write
133D000
trusted library allocation
page execute and read and write
537000
heap
page read and write
2F02000
trusted library allocation
page read and write
10DA000
heap
page read and write
DD6000
heap
page read and write
F10000
trusted library allocation
page read and write
18A0000
heap
page read and write
35B7000
trusted library allocation
page read and write
9070000
unkown
page read and write
A4EC000
heap
page read and write
1720000
heap
page read and write
7977000
unkown
page read and write
9070000
unkown
page read and write
4360000
direct allocation
page read and write
139B000
heap
page read and write
14C6000
heap
page read and write
3250000
heap
page execute and read and write
14B7000
trusted library allocation
page read and write
537000
heap
page read and write
28E0000
heap
page read and write
7FF5ED77E000
unkown
page readonly
3A70000
trusted library allocation
page read and write
31D5000
trusted library allocation
page read and write
A891000
heap
page read and write
5315000
trusted library allocation
page read and write
A623000
heap
page read and write
53E000
heap
page read and write
3565000
trusted library allocation
page read and write
355E000
trusted library allocation
page read and write
1368000
heap
page read and write
353E000
trusted library allocation
page read and write
3A9C000
stack
page read and write
2B10000
remote allocation
page read and write
35CB000
trusted library allocation
page read and write
187E000
stack
page read and write
1DA000
stack
page read and write
7FF5ED433000
unkown
page readonly
10E0000
trusted library allocation
page read and write
25D1000
trusted library allocation
page read and write
53E000
heap
page read and write
6392000
unkown
page readonly
2C00000
trusted library allocation
page read and write
11A1000
heap
page read and write
1121000
heap
page read and write
7FF5ED337000
unkown
page readonly
53E000
heap
page read and write
3594000
trusted library allocation
page read and write
40B000
unkown
page execute read
A831000
heap
page read and write
358D000
trusted library allocation
page read and write
2906000
trusted library allocation
page read and write
13C0000
unkown
page read and write
3140000
unkown
page read and write
F53000
stack
page read and write
1102000
heap
page read and write
13E0000
unkown
page read and write
53E000
heap
page read and write
A491000
heap
page read and write
A4B2000
heap
page read and write
A426000
heap
page read and write
13C0000
unkown
page read and write
418000
unkown
page readonly
C20000
heap
page read and write
2D06000
trusted library allocation
page read and write
7FF5ED449000
unkown
page readonly
537000
heap
page read and write
A9BB000
heap
page read and write
BF0000
heap
page read and write
4B93000
unkown
page read and write
537000
heap
page read and write
B8B0000
unkown
page read and write
3577000
trusted library allocation
page read and write
158E000
stack
page read and write
12C8000
heap
page read and write
56BE000
stack
page read and write
A3F7000
heap
page read and write
B82A000
stack
page read and write
32EE000
stack
page read and write
A98E000
heap
page read and write
1360000
heap
page read and write
98B000
stack
page read and write
1180000
heap
page read and write
1340000
trusted library allocation
page execute and read and write
10C0000
trusted library allocation
page execute and read and write
7FF5ED644000
unkown
page readonly
7FF5ED3EA000
unkown
page readonly
7FF5ED821000
unkown
page readonly
400000
unkown
page readonly
3130000
unkown
page read and write
10E0000
heap
page read and write
53E000
heap
page read and write
51FE000
stack
page read and write
7FF5ED9B8000
unkown
page readonly
1240000
trusted library allocation
page read and write
3130000
unkown
page read and write
A647000
heap
page read and write
3535000
trusted library allocation
page read and write
F68000
heap
page read and write
F455000
unkown
page read and write
537000
heap
page read and write
3587000
trusted library allocation
page read and write
13C0000
unkown
page read and write
A662000
heap
page read and write
A3EA000
heap
page read and write
1684000
trusted library allocation
page read and write
53E000
heap
page read and write
987B000
unkown
page read and write
2468000
trusted library allocation
page read and write
1334000
trusted library allocation
page read and write
401000
unkown
page execute read
111F000
heap
page read and write
2BF0000
trusted library allocation
page read and write
9070000
unkown
page read and write
1220000
unkown
page read and write
11A5000
heap
page read and write
C6F8000
unkown
page read and write
3543000
trusted library allocation
page read and write
B170000
unkown
page readonly
E05000
heap
page read and write
ABF000
stack
page read and write
67A000
heap
page read and write
11A8000
heap
page read and write
A3D3000
heap
page read and write
354E000
trusted library allocation
page read and write
53E000
heap
page read and write
784A000
unkown
page read and write
37A0000
unkown
page read and write
A3F7000
heap
page read and write
2D50000
heap
page execute and read and write
4261000
trusted library allocation
page read and write
3544000
trusted library allocation
page read and write
9A5B000
unkown
page read and write
4BA6000
unkown
page read and write
311F000
stack
page read and write
A3F8000
heap
page read and write
11A3000
heap
page read and write
3564000
trusted library allocation
page read and write
18F7000
heap
page read and write
2C00000
trusted library allocation
page read and write
16D4000
trusted library allocation
page read and write
53E000
heap
page read and write
C49E000
stack
page read and write
53E000
heap
page read and write
354C000
trusted library allocation
page read and write
2B10000
remote allocation
page read and write
591F000
stack
page read and write
11B5000
heap
page read and write
5AAE000
stack
page read and write
537000
heap
page read and write
13D8000
heap
page read and write
3559000
trusted library allocation
page read and write
537000
heap
page read and write
A19F000
stack
page read and write
3712000
trusted library allocation
page read and write
5870000
heap
page read and write
10B0000
heap
page read and write
9070000
unkown
page read and write
352E000
stack
page read and write
2B10000
remote allocation
page read and write
A3E3000
heap
page read and write
B04000
unkown
page readonly
7FF5ED8A4000
unkown
page readonly
F450000
unkown
page read and write
113D000
heap
page read and write
113D000
heap
page read and write
2910000
trusted library allocation
page read and write
7FF5ED872000
unkown
page readonly
2764000
heap
page read and write
11B4000
heap
page read and write
8C70000
unkown
page read and write
BD6000
stack
page read and write
7FF5ED3CE000
unkown
page readonly
3130000
unkown
page read and write
246A000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
A83B000
heap
page read and write
2C7E000
stack
page read and write
1210000
heap
page read and write
10002000
unkown
page readonly
53E000
heap
page read and write
F896000
unkown
page read and write
A965000
heap
page read and write
1356000
trusted library allocation
page execute and read and write
113E000
stack
page read and write
675000
heap
page read and write
2410000
trusted library allocation
page read and write
5455000
trusted library allocation
page read and write
A90A000
heap
page read and write
1683000
trusted library allocation
page execute and read and write
A44A000
heap
page read and write
53E000
heap
page read and write
A1A3000
heap
page read and write
537000
heap
page read and write
7E70000
unkown
page read and write
3140000
unkown
page read and write
31E2000
trusted library allocation
page read and write
AA90000
unkown
page read and write
7DF4F3030000
unkown
page readonly
5AB0000
trusted library allocation
page read and write
3562000
trusted library allocation
page read and write
A7CB000
heap
page read and write
37AC000
unkown
page read and write
C811000
unkown
page read and write
1030000
heap
page read and write
2E87000
trusted library allocation
page read and write
A83F000
heap
page read and write
A37D000
unkown
page read and write
434000
unkown
page read and write
FD0000
heap
page read and write
B22B000
stack
page read and write
A3F3000
heap
page read and write
11B4000
heap
page read and write
11A3000
heap
page read and write
A9A1000
heap
page read and write
35A6000
trusted library allocation
page read and write
100B000
trusted library allocation
page execute and read and write
540000
heap
page read and write
103B000
stack
page read and write
1490000
heap
page read and write
1469000
heap
page read and write
5BE000
stack
page read and write
53E000
heap
page read and write
3540000
trusted library allocation
page read and write
930000
heap
page read and write
1265000
heap
page read and write
3748000
unkown
page read and write
A40F000
heap
page read and write
A494000
unkown
page read and write
AA01000
heap
page read and write
A0A0000
heap
page read and write
A5D2000
heap
page read and write
7FF5ED426000
unkown
page readonly
A9A4000
heap
page read and write
F452000
unkown
page read and write
53E000
heap
page read and write
1220000
unkown
page read and write
A81B000
heap
page read and write
7FF5ED5F7000
unkown
page readonly
A3E9000
heap
page read and write
354E000
trusted library allocation
page read and write
7FF5ED956000
unkown
page readonly
9D7000
stack
page read and write
5324000
trusted library allocation
page read and write
A3DD000
heap
page read and write
C512000
unkown
page read and write
7FF5ED9D6000
unkown
page readonly
53E000
heap
page read and write
118D000
heap
page read and write
3531000
trusted library allocation
page read and write
354E000
trusted library allocation
page read and write
3547000
trusted library allocation
page read and write
6A0000
heap
page read and write
1179000
heap
page read and write
537000
heap
page read and write
55B4000
trusted library allocation
page read and write
13E0000
unkown
page read and write
F956000
unkown
page read and write
378C000
stack
page read and write
A577000
heap
page read and write
537000
heap
page read and write
A6AA000
heap
page read and write
10F5000
heap
page read and write
146B000
trusted library allocation
page execute and read and write
FF6000
trusted library allocation
page execute and read and write
A9F8000
heap
page read and write
A875000
heap
page read and write
6654000
unkown
page readonly
F56000
heap
page read and write
53E000
heap
page read and write
11A3000
heap
page read and write
161F000
stack
page read and write
13C0000
unkown
page read and write
A777000
heap
page read and write
3565000
trusted library allocation
page read and write
CA7C000
unkown
page read and write
C557000
unkown
page read and write
7FF5ED8C6000
unkown
page readonly
860000
heap
page read and write
A488000
heap
page read and write
354E000
trusted library allocation
page read and write
A3C6000
heap
page read and write
11C0000
unkown
page read and write
62E000
stack
page read and write
53E000
heap
page read and write
11C6000
heap
page read and write
411000
unkown
page execute read
65CB000
unkown
page readonly
537000
heap
page read and write
A601000
heap
page read and write
11C0000
unkown
page read and write
3560000
trusted library allocation
page read and write
A3F3000
heap
page read and write
9879000
unkown
page read and write
2D91000
trusted library allocation
page read and write
359D000
trusted library allocation
page read and write
3130000
unkown
page read and write
13C0000
unkown
page read and write
355B000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
A3AF000
heap
page read and write
A40E000
heap
page read and write
368D000
stack
page read and write
A32A000
unkown
page read and write
11B5000
heap
page read and write
7FF5ED9D9000
unkown
page readonly
C6F2000
unkown
page read and write
7D20000
unkown
page readonly
7FF5EDA38000
unkown
page readonly
9070000
unkown
page read and write
720000
heap
page read and write
3556000
trusted library allocation
page read and write
2F0B000
trusted library allocation
page execute and read and write
A3D4000
heap
page read and write
9929000
unkown
page read and write
A844000
heap
page read and write
B00C000
stack
page read and write
79B1000
unkown
page read and write
530000
heap
page read and write
53E000
heap
page read and write
11B4000
heap
page read and write
146D000
heap
page read and write
5591000
trusted library allocation
page read and write
57E4000
trusted library allocation
page read and write
3593000
trusted library allocation
page read and write
418000
unkown
page readonly
EF6000
stack
page read and write
F1C000
heap
page read and write
10DD000
trusted library allocation
page execute and read and write
3130000
unkown
page read and write
AB72000
unkown
page read and write
7F30000
unkown
page read and write
A388000
heap
page read and write
3130000
unkown
page read and write
53E000
heap
page read and write
13C0000
unkown
page read and write
1010000
heap
page read and write
3530000
trusted library allocation
page read and write
53E000
heap
page read and write
150E000
stack
page read and write
3587000
trusted library allocation
page read and write
A726000
heap
page read and write
A10000
heap
page read and write
271F000
stack
page read and write
BD1D000
stack
page read and write
A3F0000
heap
page read and write
56C3000
unkown
page read and write
BC0000
heap
page read and write
10E0000
trusted library allocation
page read and write
23AE000
stack
page read and write
A310000
unkown
page read and write
A47A000
heap
page read and write
118D000
heap
page read and write
A3E6000
heap
page read and write
13F1000
trusted library allocation
page read and write
A197000
heap
page read and write
11A3000
heap
page read and write
11B4000
heap
page read and write
9070000
unkown
page read and write
4267000
trusted library allocation
page read and write
7FF5ED674000
unkown
page readonly
7FF5ED961000
unkown
page readonly
787C000
unkown
page read and write
97A9000
unkown
page read and write
A760000
heap
page read and write
53E000
heap
page read and write
3450000
unkown
page read and write
45B000
unkown
page readonly
37F9000
unkown
page read and write
7F40000
unkown
page readonly
2EF5000
trusted library allocation
page read and write
7FF5ED3A7000
unkown
page readonly
7FF5ED867000
unkown
page readonly
3588000
trusted library allocation
page read and write
53E000
heap
page read and write
3556000
trusted library allocation
page read and write
A311000
heap
page read and write
1530000
heap
page read and write
A7A8000
heap
page read and write
436000
unkown
page readonly
9977000
unkown
page read and write
1182000
heap
page read and write
14A0000
trusted library allocation
page execute and read and write
2314000
trusted library allocation
page read and write
14F0000
heap
page read and write
A77F000
heap
page read and write
A8AA000
heap
page read and write
662000
heap
page read and write
9070000
unkown
page read and write
5ABE000
trusted library allocation
page read and write
3130000
unkown
page read and write
A3EF000
heap
page read and write
5D0000
heap
page read and write
11B5000
heap
page read and write
7FF5ED1BC000
unkown
page readonly
581E000
stack
page read and write
2ED4000
trusted library allocation
page read and write
A165000
heap
page read and write
53E000
heap
page read and write
11A7000
heap
page read and write
1220000
unkown
page read and write
9070000
unkown
page read and write
A323000
unkown
page read and write
537000
heap
page read and write
10DE000
stack
page read and write
537000
heap
page read and write
1360000
heap
page read and write
66BC000
unkown
page readonly
A870000
heap
page read and write
C563000
unkown
page read and write
10000000
unkown
page readonly
F958000
unkown
page read and write
675000
heap
page read and write
537000
heap
page read and write
9070000
unkown
page read and write
13D0000
trusted library allocation
page read and write
11B4000
heap
page read and write
10D7000
trusted library allocation
page read and write
11C0000
unkown
page read and write
1194000
heap
page read and write
5355000
trusted library allocation
page read and write
11EE000
stack
page read and write
11A7000
heap
page read and write
A819000
heap
page read and write
5B70000
unkown
page readonly
A82A000
heap
page read and write
A3C0000
heap
page read and write
537000
heap
page read and write
A364000
unkown
page read and write
C6F4000
unkown
page read and write
3540000
trusted library allocation
page read and write
112B000
heap
page read and write
A3CE000
heap
page read and write
5530000
heap
page read and write
AB76000
unkown
page read and write
11C0000
unkown
page read and write
A71A000
heap
page read and write
537000
heap
page read and write
132B000
heap
page read and write
133F000
stack
page read and write
53E000
heap
page read and write
35A2000
trusted library allocation
page read and write
7FF5ED4FD000
unkown
page readonly
53E000
heap
page read and write
2D6C000
stack
page read and write
8C0000
heap
page read and write
F457000
unkown
page read and write
F451000
unkown
page read and write
3120000
unkown
page read and write
9F9E000
stack
page read and write
1220000
unkown
page read and write
A4FA000
heap
page read and write
112B000
heap
page read and write
3130000
unkown
page read and write
A3F1000
heap
page read and write
FBFD000
unkown
page read and write
13E0000
unkown
page read and write
2E2F000
stack
page read and write
246E000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
7A34000
unkown
page read and write
F68000
heap
page read and write
2E00000
trusted library allocation
page read and write
8C70000
unkown
page read and write
3587000
trusted library allocation
page read and write
79FB000
unkown
page read and write
2F11000
trusted library allocation
page read and write
1036000
heap
page read and write
2F00000
trusted library allocation
page read and write
F959000
unkown
page read and write
A3CF000
heap
page read and write
42E000
unkown
page readonly
A375000
unkown
page read and write
7FF5D1CD4000
unkown
page readonly
537000
heap
page read and write
10AF000
stack
page read and write
345E000
stack
page read and write
355F000
stack
page read and write
462000
unkown
page readonly
13E0000
unkown
page read and write
A67E000
heap
page read and write
3587000
trusted library allocation
page read and write
FBF1000
unkown
page read and write
112B000
heap
page read and write
537000
heap
page read and write
53E000
heap
page read and write
AB1A000
unkown
page read and write
F45D000
unkown
page read and write
5460000
heap
page execute and read and write
C6E3000
unkown
page read and write
16D3000
trusted library allocation
page execute and read and write
A419000
heap
page read and write
418000
unkown
page readonly
F6C000
heap
page read and write
1180000
heap
page read and write
537000
heap
page read and write
9070000
unkown
page read and write
9550000
unkown
page readonly
88EE000
stack
page read and write
11A2000
heap
page read and write
537000
heap
page read and write
41B000
unkown
page write copy
982D000
unkown
page read and write
353D000
trusted library allocation
page read and write
62C0000
unkown
page readonly
1220000
unkown
page read and write
3797000
unkown
page read and write
65EA000
unkown
page readonly
57DF000
stack
page read and write
1220000
unkown
page read and write
A12C000
heap
page read and write
7FF5ED810000
unkown
page readonly
7FF5ED4B0000
unkown
page readonly
2780000
direct allocation
page execute and read and write
A88B000
heap
page read and write
5D3E000
stack
page read and write
40A000
unkown
page write copy
65B8000
unkown
page readonly
A19D000
heap
page read and write
53E000
heap
page read and write
399B000
stack
page read and write
35A7000
trusted library allocation
page read and write
33EF000
stack
page read and write
1197000
heap
page read and write
53E000
heap
page read and write
7FF5ED46A000
unkown
page readonly
A411000
heap
page read and write
28EE000
heap
page read and write
11A3000
heap
page read and write
BFB000
stack
page read and write
2CB0000
trusted library allocation
page read and write
57FE000
stack
page read and write
19A000
stack
page read and write
5364000
trusted library allocation
page read and write
354C000
trusted library allocation
page read and write
A8C8000
heap
page read and write
58C3000
trusted library allocation
page read and write
F50000
heap
page read and write
3577000
trusted library allocation
page read and write
6F6000
stack
page read and write
726000
heap
page read and write
141F000
heap
page read and write
53E000
heap
page read and write
3546000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
11C0000
unkown
page read and write
287E000
stack
page read and write
978E000
unkown
page read and write
7857000
unkown
page read and write
4400000
heap
page read and write
1179000
heap
page read and write
3A71000
trusted library allocation
page read and write
A2C9000
heap
page read and write
13C0000
unkown
page read and write
A433000
unkown
page read and write
2E64000
trusted library allocation
page read and write
2F60000
heap
page read and write
9070000
unkown
page read and write
3584000
trusted library allocation
page read and write
118A000
heap
page read and write
1351000
trusted library allocation
page read and write
A711000
heap
page read and write
53E000
heap
page read and write
A684000
heap
page read and write
9AB000
heap
page read and write
2B60000
heap
page read and write
A50C000
heap
page read and write
3548000
trusted library allocation
page read and write
F85000
heap
page read and write
2C1B000
trusted library allocation
page execute and read and write
F7DB000
unkown
page read and write
2EC0000
trusted library allocation
page read and write
C846000
unkown
page read and write
A3EE000
heap
page read and write
1430000
heap
page read and write
98A8000
unkown
page read and write
28B0000
direct allocation
page read and write
11C0000
unkown
page read and write
439000
unkown
page readonly
53E000
heap
page read and write
10D0000
trusted library allocation
page read and write
6C9000
heap
page read and write
1490000
heap
page read and write
2ECE000
trusted library allocation
page read and write
1490000
unkown
page read and write
7FF5ED76D000
unkown
page readonly
A53A000
heap
page read and write
2750000
heap
page read and write
F457000
unkown
page read and write
11AC000
heap
page read and write
A409000
heap
page read and write
7FF5ED7C4000
unkown
page readonly
9B9000
heap
page read and write
A543000
heap
page read and write
13FF000
stack
page read and write
A080000
heap
page read and write
43B0000
heap
page read and write
11B4000
heap
page read and write
8C70000
unkown
page read and write
1110000
heap
page read and write
A534000
heap
page read and write
2E10000
heap
page execute and read and write
537000
heap
page read and write
1720000
trusted library allocation
page read and write
11C0000
unkown
page read and write
F453000
unkown
page read and write
A42B000
heap
page read and write
A9D3000
heap
page read and write
11A1000
heap
page read and write
1400000
heap
page read and write
22D000
unkown
page readonly
C88B000
unkown
page read and write
16EF000
stack
page read and write
A8F1000
heap
page read and write
A139000
heap
page read and write
10D3000
trusted library allocation
page execute and read and write
308A000
stack
page read and write
18C0000
trusted library allocation
page execute and read and write
1350000
trusted library allocation
page read and write
3550000
trusted library allocation
page read and write
13C0000
unkown
page read and write
11A1000
heap
page read and write
7695000
stack
page read and write
355A000
trusted library allocation
page read and write
7FF5ED4DF000
unkown
page readonly
537000
heap
page read and write
7FF5EDA31000
unkown
page readonly
53E000
heap
page read and write
1177000
heap
page read and write
9B0C000
heap
page read and write
9070000
unkown
page read and write
383E000
stack
page read and write
16BB000
trusted library allocation
page execute and read and write
537000
heap
page read and write
3599000
trusted library allocation
page read and write
1179000
heap
page read and write
A3F9000
heap
page read and write
551E000
stack
page read and write
354E000
trusted library allocation
page read and write
36D5000
stack
page read and write
13C0000
unkown
page read and write
3580000
unkown
page readonly
28EE000
heap
page read and write
8FB9000
stack
page read and write
13C0000
unkown
page read and write
3548000
trusted library allocation
page read and write
10D0000
heap
page read and write
A530000
heap
page read and write
A50B000
unkown
page read and write
8710000
unkown
page readonly
C84D000
unkown
page read and write
2BCE000
stack
page read and write
3546000
trusted library allocation
page read and write
354E000
trusted library allocation
page read and write
F952000
unkown
page read and write
AA06000
heap
page read and write
A8CC000
heap
page read and write
A48E000
heap
page read and write
2CF5000
trusted library allocation
page read and write
A6D4000
heap
page read and write
A402000
heap
page read and write
7FF5ED980000
unkown
page readonly
C89A000
unkown
page read and write
4540000
heap
page read and write
7FF5ED1CF000
unkown
page readonly
537000
heap
page read and write
2400000
trusted library allocation
page read and write
7FF5ED1F0000
unkown
page readonly
65B6000
unkown
page readonly
3800000
remote allocation
page read and write
7FF5ED1CB000
unkown
page readonly
2ED0000
trusted library allocation
page read and write
786B000
unkown
page read and write
7FF5ED7E9000
unkown
page readonly
1046000
heap
page read and write
AFD4000
heap
page read and write
537000
heap
page read and write
329E000
stack
page read and write
117B000
heap
page read and write
7DF4F3041000
unkown
page execute read
3130000
unkown
page read and write
116D000
heap
page read and write
A975000
heap
page read and write
8210000
unkown
page read and write
28C0000
heap
page read and write
A8D1000
heap
page read and write
13C0000
unkown
page read and write
11BC000
heap
page read and write
11B5000
heap
page read and write
9070000
unkown
page read and write
A3F2000
heap
page read and write
E7A1000
unkown
page read and write
537000
heap
page read and write
364D000
stack
page read and write
11A3000
heap
page read and write
53E000
heap
page read and write
379E000
unkown
page read and write
A417000
heap
page read and write
31EE000
stack
page read and write
7FF5ED39E000
unkown
page readonly
357A000
trusted library allocation
page read and write
A2CC000
heap
page read and write
A49B000
heap
page read and write
A409000
heap
page read and write
125A000
heap
page read and write
7FF5ED445000
unkown
page readonly
14B4000
heap
page read and write
53E000
heap
page read and write
FC00000
unkown
page read and write
53E000
heap
page read and write
1194000
heap
page read and write
8C8000
heap
page read and write
537000
heap
page read and write
7E0000
heap
page read and write
7FF5ED46E000
unkown
page readonly
5356000
trusted library allocation
page read and write
3540000
trusted library allocation
page read and write
354C000
trusted library allocation
page read and write
F45F000
unkown
page read and write
16D0000
trusted library allocation
page read and write
118D000
heap
page read and write
F3B000
trusted library allocation
page execute and read and write
182F000
stack
page read and write
1121000
heap
page read and write
7FF5ED714000
unkown
page readonly
A48C000
heap
page read and write
A704000
heap
page read and write
8A3000
trusted library allocation
page execute and read and write
537000
heap
page read and write
8000000
unkown
page read and write
F4F000
heap
page read and write
8C70000
unkown
page read and write
2AEE000
stack
page read and write
F30000
heap
page read and write
2E81000
trusted library allocation
page read and write
10DC000
heap
page read and write
A01B000
stack
page read and write
C8E1000
unkown
page read and write
55F0000
heap
page execute and read and write
C08A000
stack
page read and write
4F6000
stack
page read and write
401000
unkown
page execute read
558E000
trusted library allocation
page read and write
A779000
heap
page read and write
1100000
heap
page read and write
38BD000
trusted library allocation
page read and write
A3FC000
heap
page read and write
F457000
unkown
page read and write
1179000
heap
page read and write
16DD000
trusted library allocation
page execute and read and write
3540000
trusted library allocation
page read and write
7FF5ED864000
unkown
page readonly
1335000
heap
page read and write
3538000
trusted library allocation
page read and write
A400000
heap
page read and write
53E000
heap
page read and write
55A5000
trusted library allocation
page read and write
1378000
heap
page read and write
EF6000
stack
page read and write
7FF5ED97E000
unkown
page readonly
8BF0000
unkown
page readonly
537000
heap
page read and write
57E0000
trusted library allocation
page read and write
356B000
trusted library allocation
page read and write
19D000
stack
page read and write
16B0000
trusted library allocation
page read and write
57EE000
trusted library allocation
page read and write
A912000
heap
page read and write
B729000
stack
page read and write
1190000
heap
page read and write
53E000
heap
page read and write
7FF5ED885000
unkown
page readonly
25CF000
trusted library allocation
page read and write
A41B000
heap
page read and write
3565000
trusted library allocation
page read and write
53E000
heap
page read and write
1109000
heap
page read and write
9070000
unkown
page read and write
49C000
unkown
page readonly
FB5000
heap
page read and write
10DE000
heap
page read and write
7FF5ED476000
unkown
page readonly
5830000
trusted library allocation
page read and write
A638000
heap
page read and write
537000
heap
page read and write
537000
heap
page read and write
1220000
unkown
page read and write
A625000
heap
page read and write
A3FE000
heap
page read and write
67D9000
unkown
page readonly
106E000
stack
page read and write
3D95000
trusted library allocation
page read and write
53E000
heap
page read and write
A417000
heap
page read and write
A820000
heap
page read and write
11C0000
unkown
page read and write
1220000
unkown
page read and write
7FF5ED793000
unkown
page readonly
49C000
unkown
page readonly
F95E000
unkown
page read and write
A379000
unkown
page read and write
F45C000
unkown
page read and write
40A000
unkown
page read and write
45F0000
heap
page read and write
35D0000
unkown
page read and write
A8BC000
heap
page read and write
54CE000
stack
page read and write
A1A6000
heap
page read and write
10D4000
trusted library allocation
page read and write
8C70000
unkown
page read and write
537000
heap
page read and write
2E55000
trusted library allocation
page read and write
A3F9000
heap
page read and write
7FF5ED9CA000
unkown
page readonly
A3EB000
heap
page read and write
A72F000
heap
page read and write
A80B000
heap
page read and write
53A1000
trusted library allocation
page read and write
4C4B000
unkown
page read and write
68E000
stack
page read and write
8A0000
trusted library allocation
page read and write
7FF5ED990000
unkown
page readonly
3070000
direct allocation
page read and write
3581000
trusted library allocation
page read and write
322E000
stack
page read and write
3639000
trusted library allocation
page read and write
9070000
unkown
page read and write
11A3000
heap
page read and write
7D00000
unkown
page readonly
31D0000
trusted library allocation
page read and write
53E000
heap
page read and write
1191000
heap
page read and write
3589000
trusted library allocation
page read and write
A9AB000
heap
page read and write
11A5000
heap
page read and write
2ED4000
trusted library allocation
page read and write
1177000
heap
page read and write
11A1000
heap
page read and write
3540000
trusted library allocation
page read and write
B5E000
stack
page read and write
580000
heap
page read and write
3543000
trusted library allocation
page read and write
3206000
trusted library allocation
page read and write
3559000
trusted library allocation
page read and write
1462000
heap
page read and write
1030000
heap
page read and write
A315000
heap
page read and write
A6B2000
heap
page read and write
143B000
stack
page read and write
7FF5EDA0B000
unkown
page readonly
A5FA000
heap
page read and write
23F0000
trusted library allocation
page execute and read and write
4BC9000
unkown
page read and write
2CA3000
trusted library allocation
page read and write
9139000
stack
page read and write
11A1000
heap
page read and write
C52C000
unkown
page read and write
5861000
trusted library allocation
page read and write
13E0000
unkown
page read and write
353E000
trusted library allocation
page read and write
7FF5ED451000
unkown
page readonly
14E0000
heap
page read and write
A51C000
heap
page read and write
11B5000
heap
page read and write
11B5000
heap
page read and write
A3EC000
heap
page read and write
53E000
heap
page read and write
A4E8000
heap
page read and write
EB0000
heap
page read and write
CA5000
heap
page read and write
7FF5ED660000
unkown
page readonly
A3C4000
heap
page read and write
FD7000
heap
page read and write
2ECB000
trusted library allocation
page read and write
1110000
heap
page read and write
3130000
unkown
page read and write
13E0000
unkown
page read and write
13F7000
trusted library allocation
page read and write
A5C8000
heap
page read and write
489000
unkown
page readonly
1F1000
unkown
page execute read
A3ED000
heap
page read and write
B6A0000
heap
page read and write
5354000
trusted library allocation
page read and write
354E000
stack
page read and write
11A7000
heap
page read and write
3F15000
trusted library allocation
page read and write
10D1000
trusted library allocation
page read and write
5AFE000
stack
page read and write
3540000
trusted library allocation
page read and write
7FF5ED52F000
unkown
page readonly
A54B000
heap
page read and write
7FF5ED64F000
unkown
page readonly
A327000
unkown
page read and write
36F0000
unkown
page readonly
A1C4000
heap
page read and write
7FF5ED9ED000
unkown
page readonly
116F000
stack
page read and write
F45F000
unkown
page read and write
31EB000
trusted library allocation
page read and write
7FF5ECED2000
unkown
page readonly
11A3000
heap
page read and write
11B4000
heap
page read and write
31EE000
trusted library allocation
page read and write
8C70000
unkown
page read and write
53E000
heap
page read and write
135A000
trusted library allocation
page execute and read and write
C857000
unkown
page read and write
41B000
unkown
page read and write
19D000
stack
page read and write
A1B8000
heap
page read and write
A5E4000
heap
page read and write
D4E000
stack
page read and write
8860000
unkown
page read and write
56C0000
trusted library allocation
page read and write
A5B1000
heap
page read and write
1F0000
heap
page read and write
11C0000
unkown
page read and write
55F3000
heap
page execute and read and write
10C0000
trusted library allocation
page read and write
3150000
heap
page read and write
987F000
unkown
page read and write
A331000
heap
page read and write
A4C1000
heap
page read and write
53E000
heap
page read and write
BAF9000
stack
page read and write
353D000
trusted library allocation
page read and write
9F0000
heap
page read and write
10A0000
trusted library allocation
page read and write
13FC000
heap
page read and write
EF6000
stack
page read and write
354E000
trusted library allocation
page read and write
1194000
heap
page read and write
537000
heap
page read and write
797D000
unkown
page read and write
7FF5ED670000
unkown
page readonly
A5B7000
heap
page read and write
53E000
heap
page read and write
537000
heap
page read and write
979C000
unkown
page read and write
18F0000
heap
page read and write
117B000
heap
page read and write
DE0000
heap
page read and write
7FF5ED342000
unkown
page readonly
A686000
heap
page read and write
1179000
heap
page read and write
A3E0000
heap
page read and write
33D1000
trusted library allocation
page read and write
9070000
unkown
page read and write
537000
heap
page read and write
F954000
unkown
page read and write
354C000
trusted library allocation
page read and write
A7E9000
heap
page read and write
168D000
trusted library allocation
page execute and read and write
AADB000
unkown
page read and write
57EB000
trusted library allocation
page read and write
B04000
unkown
page readonly
5453000
trusted library allocation
page read and write
10D6000
trusted library allocation
page execute and read and write
7FF5ED279000
unkown
page readonly
3450000
unkown
page read and write
3130000
unkown
page read and write
11B4000
heap
page read and write
EF8000
heap
page read and write
10F6000
trusted library allocation
page execute and read and write
537000
heap
page read and write
7FF5ED942000
unkown
page readonly
F7E9000
unkown
page read and write
2E05000
trusted library allocation
page read and write
A556000
heap
page read and write
537000
heap
page read and write
A587000
heap
page read and write
11A7000
heap
page read and write
11B4000
heap
page read and write
A32E000
heap
page read and write
537000
heap
page read and write
7FF5ED4A1000
unkown
page readonly
8EC6000
unkown
page read and write
13E0000
unkown
page read and write
28F5000
trusted library allocation
page read and write
112B000
heap
page read and write
B190000
unkown
page read and write
130B000
heap
page read and write
1102000
heap
page read and write
725000
heap
page read and write
9070000
unkown
page read and write
7FF5ED818000
unkown
page readonly
A940000
heap
page read and write
1103000
heap
page read and write
53E000
heap
page read and write
A391000
heap
page read and write
537000
heap
page read and write
537000
heap
page read and write
11A3000
heap
page read and write
F5D000
heap
page read and write
537000
heap
page read and write
537000
heap
page read and write
1680000
trusted library allocation
page read and write
1194000
heap
page read and write
EC0000
trusted library allocation
page read and write
4CE0000
unkown
page read and write
539A000
trusted library allocation
page read and write
A434000
heap
page read and write
C5AA000
unkown
page read and write
9B60000
unkown
page readonly
122C000
heap
page read and write
AFCA000
heap
page read and write
1104000
heap
page read and write
65A5000
unkown
page readonly
F2F000
stack
page read and write
2D80000
trusted library allocation
page execute and read and write
B5AE000
stack
page read and write
55AE000
stack
page read and write
387F000
stack
page read and write
354C000
trusted library allocation
page read and write
1174000
heap
page read and write
3246000
trusted library allocation
page read and write
36DA000
trusted library allocation
page read and write
3130000
unkown
page read and write
CA63000
unkown
page read and write
6D8000
heap
page read and write
3540000
trusted library allocation
page read and write
F28000
heap
page read and write
14A0000
heap
page read and write
A6C2000
heap
page read and write
A5A6000
heap
page read and write
16F0000
trusted library allocation
page read and write
53E000
heap
page read and write
11A5000
heap
page read and write
53E000
heap
page read and write
3548000
trusted library allocation
page read and write
3800000
unkown
page readonly
13CF000
stack
page read and write
7FF5ED68F000
unkown
page readonly
A12A000
heap
page read and write
53E000
heap
page read and write
A54E000
heap
page read and write
9070000
unkown
page read and write
11B5000
heap
page read and write
7FF5EDA47000
unkown
page readonly
12CF000
heap
page read and write
C9DE000
unkown
page read and write
A0E5000
heap
page read and write
C10A000
stack
page read and write
2F6E000
stack
page read and write
7FF5ED7CF000
unkown
page readonly
F45B000
unkown
page read and write
A899000
heap
page read and write
354C000
trusted library allocation
page read and write
58BE000
stack
page read and write
E80000
heap
page read and write
3800000
remote allocation
page read and write
A3D1000
heap
page read and write
A40B000
heap
page read and write
1101000
heap
page read and write
3230000
trusted library allocation
page read and write
42A000
unkown
page read and write
A3CE000
heap
page read and write
53E000
heap
page read and write
A4B8000
unkown
page read and write
A1ED000
heap
page read and write
2DF0000
heap
page read and write
2B83000
trusted library allocation
page read and write
13C0000
unkown
page read and write
585C000
trusted library allocation
page read and write
BDC0000
unkown
page readonly
76A0000
unkown
page read and write
356D000
trusted library allocation
page read and write
7FF5ED844000
unkown
page readonly
53E000
heap
page read and write
7FF5ED9AE000
unkown
page readonly
53E000
heap
page read and write
A59B000
heap
page read and write
13E0000
unkown
page read and write
F452000
unkown
page read and write
4BE3000
unkown
page read and write
A706000
heap
page read and write
1109000
heap
page read and write
2445000
trusted library allocation
page read and write
8C70000
unkown
page read and write
1002000
trusted library allocation
page read and write
11B4000
heap
page read and write
53E000
heap
page read and write
A86C000
heap
page read and write
EFC000
stack
page read and write
A2C0000
heap
page read and write
537000
heap
page read and write
A3F4000
heap
page read and write
537000
heap
page read and write
7FF5ED7D6000
unkown
page readonly
126B000
heap
page read and write
130F000
heap
page read and write
53E000
heap
page read and write
1102000
trusted library allocation
page read and write
A77B000
heap
page read and write
1169000
heap
page read and write
1220000
unkown
page read and write
537000
heap
page read and write
7FF5ED87D000
unkown
page readonly
A954000
heap
page read and write
1510000
unkown
page readonly
AFD6000
heap
page read and write
A3EF000
heap
page read and write
5852000
trusted library allocation
page read and write
C41F000
stack
page read and write
53E000
heap
page read and write
97D4000
unkown
page read and write
25F7000
trusted library allocation
page read and write
3130000
unkown
page read and write
3A8E000
trusted library allocation
page read and write
A95C000
heap
page read and write
BA4E000
stack
page read and write
B003000
heap
page read and write
7FF5ED81B000
unkown
page readonly
43F0000
heap
page read and write
1505000
heap
page read and write
8C70000
unkown
page read and write
2485000
trusted library allocation
page read and write
A748000
heap
page read and write
1400000
trusted library allocation
page read and write
A3CD000
heap
page read and write
7FF5ED933000
unkown
page readonly
10F2000
heap
page read and write
315A000
heap
page read and write
53E000
heap
page read and write
15EE000
stack
page read and write
A3EB000
heap
page read and write
A7E3000
heap
page read and write
F950000
unkown
page read and write
53E000
heap
page read and write
11A8000
heap
page read and write
439000
unkown
page readonly
A893000
heap
page read and write
537000
heap
page read and write
354E000
trusted library allocation
page read and write
53E000
heap
page read and write
500D000
stack
page read and write
10AC000
stack
page read and write
3130000
unkown
page read and write
A78B000
heap
page read and write
10F81000
unkown
page read and write
16AA000
trusted library allocation
page execute and read and write
A0C2000
heap
page read and write
354E000
trusted library allocation
page read and write
1177000
heap
page read and write
E01000
heap
page read and write
2F6F000
stack
page read and write
537000
heap
page read and write
11A2000
heap
page read and write
A4F3000
heap
page read and write
A8EE000
heap
page read and write
1256000
heap
page read and write
7FF5ED4E8000
unkown
page readonly
1020000
heap
page read and write
9798000
unkown
page read and write
7FF5ED71B000
unkown
page readonly
537000
heap
page read and write
234B000
trusted library allocation
page execute and read and write
8C70000
unkown
page read and write
A481000
heap
page read and write
332E000
stack
page read and write
B08D000
stack
page read and write
31E4000
trusted library allocation
page read and write
A3CE000
heap
page read and write
A62E000
heap
page read and write
40B000
unkown
page execute read
2F07000
trusted library allocation
page execute and read and write
537000
heap
page read and write
11B4000
heap
page read and write
35A2000
trusted library allocation
page read and write
A91F000
heap
page read and write
C9E000
stack
page read and write
164E000
stack
page read and write
F5C000
heap
page read and write
3536000
trusted library allocation
page read and write
B8AB000
stack
page read and write
1460000
trusted library allocation
page read and write
C5A3000
unkown
page read and write
11A1000
heap
page read and write
3AB000
stack
page read and write
A99E000
heap
page read and write
A465000
heap
page read and write
8A0000
heap
page read and write
11A3000
heap
page read and write
1005000
heap
page read and write
9070000
unkown
page read and write
A412000
heap
page read and write
8CB000
stack
page read and write
AA41000
heap
page read and write
A57B000
heap
page read and write
BDA0000
unkown
page readonly
4B50000
unkown
page read and write
9660000
unkown
page read and write
9687000
unkown
page read and write
7FF5ED93E000
unkown
page readonly
D4B000
heap
page read and write
537000
heap
page read and write
11A3000
heap
page read and write
A3D1000
heap
page read and write
8720000
unkown
page readonly
B016000
heap
page read and write
53E000
heap
page read and write
10B0000
trusted library allocation
page read and write
9070000
unkown
page read and write
35D7000
trusted library allocation
page read and write
A3C2000
heap
page read and write
2E26000
trusted library allocation
page read and write
63C9000
unkown
page readonly
3578000
trusted library allocation
page read and write
53E000
heap
page read and write
A3D7000
heap
page read and write
356E000
trusted library allocation
page read and write
F953000
unkown
page read and write
560000
heap
page read and write
3450000
unkown
page read and write
1548000
heap
page read and write
537000
heap
page read and write
537000
heap
page read and write
906E000
stack
page read and write
9070000
unkown
page read and write
120000
unkown
page readonly
7FF5ED4B4000
unkown
page readonly
4B90000
unkown
page read and write
4C34000
unkown
page read and write
5815000
trusted library allocation
page read and write
1590000
heap
page read and write
3200000
unkown
page read and write
3572000
trusted library allocation
page read and write
BDB000
stack
page read and write
A3F1000
heap
page read and write
7FF5ED692000
unkown
page readonly
AD1D000
heap
page read and write
9070000
unkown
page read and write
A7F7000
heap
page read and write
7DF4F3031000
unkown
page execute read
A340000
heap
page read and write
3536000
trusted library allocation
page read and write
A9F5000
heap
page read and write
45B000
unkown
page readonly
354E000
trusted library allocation
page read and write
11B5000
heap
page read and write
5560000
trusted library allocation
page read and write
9070000
unkown
page read and write
E20000
heap
page read and write
5360000
trusted library allocation
page read and write
1342000
heap
page read and write
63A5000
unkown
page readonly
A4F0000
heap
page read and write
7FF5ED850000
unkown
page readonly
12CE000
stack
page read and write
537000
heap
page read and write
7FF5ED9D2000
unkown
page readonly
4B78000
unkown
page read and write
7FF5ED755000
unkown
page readonly
7FF5ED43A000
unkown
page readonly
3553000
trusted library allocation
page read and write
537000
heap
page read and write
3756000
unkown
page read and write
8FE000
stack
page read and write
A6B9000
heap
page read and write
14D0000
heap
page read and write
F455000
unkown
page read and write
A45E000
heap
page read and write
10E7000
heap
page read and write
1407000
heap
page read and write
11B4000
heap
page read and write
537000
heap
page read and write
C6D8000
unkown
page read and write
53E000
heap
page read and write
58C5000
trusted library allocation
page read and write
A3C5000
heap
page read and write
10E0000
trusted library allocation
page read and write
537000
heap
page read and write
3543000
trusted library allocation
page read and write
A402000
heap
page read and write
C89C000
unkown
page read and write
8C70000
stack
page read and write
1320000
heap
page read and write
127E000
stack
page read and write
3210000
unkown
page read and write
FC08000
unkown
page read and write
31A0000
heap
page read and write
3450000
unkown
page read and write
A1BD000
heap
page read and write
9881000
unkown
page read and write
3947000
trusted library allocation
page read and write
10CE000
stack
page read and write
A982000
heap
page read and write
2450000
trusted library allocation
page read and write
53E000
heap
page read and write
11E9000
heap
page read and write
10C0000
unkown
page readonly
537000
heap
page read and write
3001000
trusted library allocation
page read and write
EF0000
heap
page read and write
10F0000
trusted library allocation
page execute and read and write
11B4000
heap
page read and write
524000
unkown
page write copy
537000
heap
page read and write
2ED3000
trusted library allocation
page execute and read and write
3547000
trusted library allocation
page read and write
354C000
trusted library allocation
page read and write
131A000
heap
page read and write
5580000
trusted library allocation
page read and write
F7E000
stack
page read and write
13C0000
unkown
page read and write
30B0000
heap
page read and write
7FF5ED8E7000
unkown
page readonly
1440000
unkown
page read and write
53E000
heap
page read and write
1510000
heap
page read and write
A2D0000
heap
page read and write
A46F000
heap
page read and write
B07D000
heap
page read and write
F51000
heap
page read and write
11B4000
heap
page read and write
2740000
direct allocation
page execute and read and write
A74A000
heap
page read and write
107E000
stack
page read and write
A21E000
stack
page read and write
A3EE000
heap
page read and write
7FF5ED928000
unkown
page readonly
A550000
heap
page read and write
A070000
heap
page read and write
1707000
trusted library allocation
page execute and read and write
1194000
heap
page read and write
A3F0000
heap
page read and write
13E0000
unkown
page read and write
818D000
stack
page read and write
11B4000
heap
page read and write
2C20000
heap
page read and write
A40A000
heap
page read and write
FA0000
heap
page read and write
7FF5ED735000
unkown
page readonly
2F0E000
stack
page read and write
11C0000
unkown
page read and write
A721000
heap
page read and write
1182000
heap
page read and write
53E000
heap
page read and write
1104000
heap
page read and write
DDE000
stack
page read and write
FFA000
trusted library allocation
page execute and read and write
A895000
heap
page read and write
3547000
trusted library allocation
page read and write
11B5000
heap
page read and write
400000
unkown
page readonly
53E000
heap
page read and write
A9AF000
heap
page read and write
537000
heap
page read and write
A814000
heap
page read and write
9070000
unkown
page read and write
F450000
unkown
page read and write
6550000
unkown
page readonly
1100000
heap
page read and write
3220000
heap
page read and write
11A3000
heap
page read and write
7FF5ED77C000
unkown
page readonly
A3EB000
heap
page read and write
FC5000
heap
page read and write
3596000
trusted library allocation
page read and write
F95E000
unkown
page read and write
7FF5ED2A9000
unkown
page readonly
10B4000
trusted library allocation
page read and write
10F7000
heap
page read and write
2EDC000
trusted library allocation
page read and write
7FF5ED50A000
unkown
page readonly
F30000
heap
page read and write
7FF5ED8F9000
unkown
page readonly
5ABC000
trusted library allocation
page read and write
3700000
unkown
page read and write
C350000
unkown
page read and write
9070000
unkown
page read and write
79D3000
unkown
page read and write
3539000
trusted library allocation
page read and write
102000
unkown
page readonly
11A7000
heap
page read and write
53E000
heap
page read and write
3240000
unkown
page read and write
11A1000
heap
page read and write
11A6000
stack
page read and write
32D6000
trusted library allocation
page read and write
BFE000
stack
page read and write
F60000
heap
page read and write
123B000
stack
page read and write
3F11000
trusted library allocation
page read and write
11B4000
heap
page read and write
A6D8000
heap
page read and write
F8D4000
unkown
page read and write
2900000
trusted library allocation
page read and write
53E000
heap
page read and write
7D40000
unkown
page read and write
118D000
heap
page read and write
97E000
stack
page read and write
2EDA000
trusted library allocation
page read and write
A391000
unkown
page read and write
401000
unkown
page execute read
7950000
unkown
page read and write
B074000
heap
page read and write
1220000
unkown
page read and write
13EF000
heap
page read and write
A22F000
heap
page read and write
355F000
trusted library allocation
page read and write
9070000
unkown
page read and write
3319000
stack
page read and write
2EDE000
trusted library allocation
page read and write
A131000
heap
page read and write
2EE7000
trusted library allocation
page read and write
AFCF000
heap
page read and write
12D2000
heap
page read and write
A459000
heap
page read and write
DB1000
stack
page read and write
ED5000
heap
page read and write
422000
unkown
page read and write
785B000
unkown
page read and write
10F0000
heap
page read and write
53E000
heap
page read and write
2A74000
trusted library allocation
page read and write
53E000
heap
page read and write
A632000
heap
page read and write
537000
heap
page read and write
A40D000
heap
page read and write
4FCE000
stack
page read and write
7B80000
unkown
page read and write
11A2000
heap
page read and write
A4FD000
heap
page read and write
16F1000
trusted library allocation
page read and write
170B000
trusted library allocation
page execute and read and write
2F70000
trusted library allocation
page execute and read and write
EF0000
trusted library allocation
page read and write
101E000
stack
page read and write
4B56000
unkown
page read and write
2BD0000
heap
page execute and read and write
37AE000
unkown
page read and write
3551000
trusted library allocation
page read and write
37A2000
trusted library allocation
page read and write
2F70000
heap
page read and write
9070000
unkown
page read and write
3130000
unkown
page read and write
8F0B000
unkown
page read and write
A87D000
heap
page read and write
11C0000
unkown
page read and write
3450000
unkown
page read and write
7FF5ED669000
unkown
page readonly
11C0000
unkown
page read and write
3A86000
trusted library allocation
page read and write
32D4000
trusted library allocation
page read and write
11B4000
heap
page read and write
10C0000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
354E000
trusted library allocation
page read and write
A97A000
heap
page read and write
13E0000
unkown
page read and write
7FF5EDA70000
unkown
page readonly
A5DB000
heap
page read and write
B8C0000
unkown
page readonly
33B0000
trusted library allocation
page read and write
2EE1000
trusted library allocation
page read and write
9F1E000
stack
page read and write
7FF5ED847000
unkown
page readonly
2BE3000
trusted library allocation
page execute and read and write
F958000
unkown
page read and write
123F000
stack
page read and write
37F6000
unkown
page read and write
53E000
heap
page read and write
A6CB000
heap
page read and write
A8DD000
heap
page read and write
11DE000
stack
page read and write
11A5000
heap
page read and write
1220000
unkown
page read and write
A65A000
heap
page read and write
A401000
heap
page read and write
354E000
trusted library allocation
page read and write
3579000
trusted library allocation
page read and write
A51E000
heap
page read and write
96DF000
unkown
page read and write
3130000
unkown
page read and write
F957000
unkown
page read and write
56DE000
stack
page read and write
11B4000
heap
page read and write
537000
heap
page read and write
537000
heap
page read and write
53E000
heap
page read and write
7FF5ED8C1000
unkown
page readonly
356E000
trusted library allocation
page read and write
A44C000
heap
page read and write
3550000
trusted library allocation
page read and write
11A5000
heap
page read and write
5557000
stack
page read and write
537000
heap
page read and write
A58C000
heap
page read and write
11B4000
heap
page read and write
1220000
unkown
page read and write
2708000
unkown
page readonly
7FF5ED86B000
unkown
page readonly
18D1000
trusted library allocation
page read and write
68C000
heap
page read and write
10AB000
stack
page read and write
F450000
unkown
page read and write
A3FF000
heap
page read and write
E25000
heap
page read and write
9070000
unkown
page read and write
537000
heap
page read and write
662000
heap
page read and write
55B6000
trusted library allocation
page read and write
401000
unkown
page execute read
1090000
heap
page read and write
58C0000
trusted library allocation
page read and write
3549000
trusted library allocation
page read and write
5663000
trusted library allocation
page read and write
125E000
heap
page read and write
11B4000
heap
page read and write
A184000
heap
page read and write
3E37000
trusted library allocation
page read and write
40A000
unkown
page read and write
53E000
heap
page read and write
F451000
unkown
page read and write
A9CC000
heap
page read and write
7FF5ED996000
unkown
page readonly
A3CA000
heap
page read and write
13E0000
unkown
page read and write
1197000
heap
page read and write
A2DA000
heap
page read and write
366A000
trusted library allocation
page read and write
A26000
heap
page read and write
9A10000
unkown
page read and write
13E0000
unkown
page read and write
BA0000
heap
page read and write
31F4000
trusted library allocation
page read and write
3392000
trusted library allocation
page read and write
446000
unkown
page readonly
6763000
unkown
page readonly
3209000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
1250000
heap
page read and write
FD5000
heap
page read and write
53E000
heap
page read and write
13C0000
unkown
page read and write
11A3000
heap
page read and write
2ABF000
stack
page read and write
4CB0000
unkown
page read and write
A70F000
heap
page read and write
537000
heap
page read and write
21DF000
stack
page read and write
2ADF000
stack
page read and write
537000
heap
page read and write
1197000
heap
page read and write
8DA0000
unkown
page read and write
7FF5ED8B4000
unkown
page readonly
A73E000
heap
page read and write
A4D4000
heap
page read and write
148F000
stack
page read and write
1109F000
unkown
page read and write
2790000
heap
page read and write
2440000
trusted library allocation
page read and write
7FF5ED975000
unkown
page readonly
A7CE000
heap
page read and write
3238000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
A3CB000
heap
page read and write
5480000
heap
page read and write
2EBE000
stack
page read and write
6585000
unkown
page readonly
F45C000
unkown
page read and write
1330000
heap
page read and write
10E2000
trusted library allocation
page read and write
A350000
heap
page read and write
537000
heap
page read and write
A38E000
heap
page read and write
53E000
heap
page read and write
1248000
heap
page read and write
1340000
trusted library allocation
page read and write
2E2B000
trusted library allocation
page read and write
3571000
trusted library allocation
page read and write
C516000
unkown
page read and write
6572000
unkown
page readonly
33C0000
heap
page execute and read and write
1451000
unkown
page readonly
A1F000
stack
page read and write
2C06000
trusted library allocation
page execute and read and write
D10000
trusted library allocation
page read and write
A562000
heap
page read and write
3130000
unkown
page read and write
537000
heap
page read and write
3330000
trusted library allocation
page read and write
537000
heap
page read and write
B8C000
stack
page read and write
137E000
stack
page read and write
2F61000
heap
page read and write
7DF4F3040000
unkown
page readonly
1F0000
unkown
page readonly
2902000
heap
page execute and read and write
37A8000
unkown
page read and write
8C40000
heap
page read and write
9D64000
unkown
page read and write
2ED0000
trusted library allocation
page read and write
F14000
trusted library allocation
page read and write
A3F9000
heap
page read and write
69A5000
unkown
page readonly
A79E000
heap
page read and write
35B3000
trusted library allocation
page read and write
CBC000
stack
page read and write
3542000
trusted library allocation
page read and write
10004000
unkown
page readonly
5651000
trusted library allocation
page read and write
A520000
heap
page read and write
EEF000
stack
page read and write
1130000
trusted library allocation
page read and write
40A000
unkown
page write copy
9792000
unkown
page read and write
3A71000
trusted library allocation
page read and write
F95E000
unkown
page read and write
C350000
unkown
page read and write
A3BE000
unkown
page read and write
28AE000
stack
page read and write
A3CE000
heap
page read and write
7FF5ED503000
unkown
page readonly
F30000
heap
page read and write
537000
heap
page read and write
A63C000
heap
page read and write
69E000
stack
page read and write
537000
heap
page read and write
A3D2000
heap
page read and write
B629000
stack
page read and write
2464000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
537000
heap
page read and write
2482000
trusted library allocation
page read and write
A7C0000
heap
page read and write
2C0A000
trusted library allocation
page execute and read and write
B7AE000
stack
page read and write
53E000
heap
page read and write
D55000
heap
page read and write
2E34000
trusted library allocation
page read and write
A582000
heap
page read and write
7FF5ED265000
unkown
page readonly
537000
heap
page read and write
A3EB000
heap
page read and write
537000
heap
page read and write
8C70000
unkown
page read and write
359F000
trusted library allocation
page read and write
2300000
trusted library allocation
page read and write
537000
heap
page read and write
28E0000
heap
page execute and read and write
A089000
heap
page read and write
1449000
heap
page read and write
3543000
trusted library allocation
page read and write
5801000
trusted library allocation
page read and write
977A000
unkown
page read and write
3540000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
8C70000
unkown
page read and write
3130000
unkown
page read and write
28BE000
stack
page read and write
890000
trusted library allocation
page read and write
3450000
unkown
page read and write
7FF5ED986000
unkown
page readonly
A0D2000
heap
page read and write
358F000
trusted library allocation
page read and write
13C0000
unkown
page read and write
537000
heap
page read and write
2B90000
heap
page read and write
110B000
trusted library allocation
page execute and read and write
3140000
unkown
page read and write
1221000
heap
page read and write
BEB000
stack
page read and write
49A000
unkown
page write copy
339F000
stack
page read and write
28C0000
unclassified section
page read and write
9869000
unkown
page read and write
1483000
heap
page read and write
556E000
stack
page read and write
A6C5000
heap
page read and write
53E000
heap
page read and write
8A4000
trusted library allocation
page read and write
A68A000
heap
page read and write
8EC000
heap
page read and write
2F61000
heap
page read and write
A68F000
heap
page read and write
C6CF000
unkown
page read and write
7FF5ED39B000
unkown
page readonly
651000
heap
page read and write
13E0000
unkown
page read and write
49A000
unkown
page read and write
10B8000
heap
page read and write
11A6000
heap
page read and write
7E11000
unkown
page read and write
A504000
heap
page read and write
A614000
heap
page read and write
9070000
unkown
page read and write
2FFE000
stack
page read and write
16F6000
trusted library allocation
page execute and read and write
F957000
unkown
page read and write
860000
heap
page read and write
7FF5ED92C000
unkown
page readonly
78A0000
unkown
page read and write
2EFA000
trusted library allocation
page execute and read and write
3758000
unkown
page read and write
A474000
heap
page read and write
11B5000
heap
page read and write
1180000
heap
page read and write
F26000
heap
page read and write
F450000
unkown
page read and write
1350000
unkown
page readonly
354C000
trusted library allocation
page read and write
12D0000
heap
page read and write
A763000
heap
page read and write
3591000
trusted library allocation
page read and write
A3B7000
heap
page read and write
2B60000
heap
page read and write
35A2000
trusted library allocation
page read and write
33FE000
stack
page read and write
2720000
heap
page read and write
3577000
trusted library allocation
page read and write
232D000
trusted library allocation
page execute and read and write
18BC000
stack
page read and write
3130000
unkown
page read and write
F45C000
unkown
page read and write
3395000
trusted library allocation
page read and write
F853000
unkown
page read and write
7DF4F3050000
unkown
page readonly
537000
heap
page read and write
111F000
heap
page read and write
F57000
heap
page read and write
138D000
heap
page read and write
25A5000
trusted library allocation
page read and write
11C0000
unkown
page read and write
38B0000
trusted library allocation
page read and write
1109000
heap
page read and write
537000
heap
page read and write
3582000
trusted library allocation
page read and write
122D000
heap
page read and write
A3EB000
heap
page read and write
32E0000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
3130000
unkown
page read and write
117B000
heap
page read and write
1100000
trusted library allocation
page read and write
3261000
trusted library allocation
page read and write
53E000
heap
page read and write
3587000
trusted library allocation
page read and write
9070000
unkown
page read and write
2332000
trusted library allocation
page read and write
537000
heap
page read and write
1179000
heap
page read and write
11B4000
heap
page read and write
354E000
trusted library allocation
page read and write
11B4000
heap
page read and write
A75D000
heap
page read and write
965C000
stack
page read and write
A66E000
heap
page read and write
1140000
heap
page read and write
3800000
remote allocation
page read and write
A6DE000
heap
page read and write
CB3C000
unkown
page read and write
AAF9000
unkown
page read and write
AC0000
trusted library allocation
page read and write
F951000
unkown
page read and write
537000
heap
page read and write
53E000
heap
page read and write
A5C0000
heap
page read and write
5380000
trusted library allocation
page read and write
2D80000
heap
page execute and read and write
10F7000
heap
page read and write
16D0000
trusted library allocation
page read and write
D50000
heap
page read and write
F38000
heap
page read and write
117D000
heap
page read and write
3212000
trusted library allocation
page read and write
9070000
unkown
page read and write
A3F8000
heap
page read and write
C6B000
stack
page read and write
3130000
unkown
page read and write
A393000
heap
page read and write
A590000
heap
page read and write
55B0000
trusted library allocation
page read and write
A494000
heap
page read and write
408000
unkown
page readonly
8B0000
trusted library allocation
page read and write
37D2000
unkown
page read and write
8BE0000
unkown
page readonly
11B4000
heap
page read and write
1406000
heap
page read and write
A879000
heap
page read and write
42A000
unkown
page read and write
E10000
heap
page read and write
410000
unkown
page readonly
9070000
unkown
page read and write
3633000
trusted library allocation
page read and write
A925000
heap
page read and write
A1C7000
heap
page read and write
56D9000
unkown
page read and write
8730000
unkown
page read and write
53E000
heap
page read and write
43C1000
heap
page read and write
9070000
unkown
page read and write
BDD0000
unkown
page readonly
117D000
heap
page read and write
1598000
heap
page read and write
A3FF000
heap
page read and write
11B5000
heap
page read and write
675000
heap
page read and write
BC9B000
stack
page read and write
6741000
unkown
page readonly
A97C000
heap
page read and write
16F7000
trusted library allocation
page read and write
7867000
unkown
page read and write
A3EC000
heap
page read and write
3531000
trusted library allocation
page read and write
7FF5ED73D000
unkown
page readonly
3587000
trusted library allocation
page read and write
537000
heap
page read and write
3201000
trusted library allocation
page read and write
A3E3000
heap
page read and write
470000
heap
page read and write
7FF5ED4EF000
unkown
page readonly
1109000
heap
page read and write
53E000
heap
page read and write
1770000
heap
page read and write
5E20000
unkown
page readonly
7FF5ED1D6000
unkown
page readonly
A889000
heap
page read and write
A40D000
heap
page read and write
A94F000
heap
page read and write
8C70000
unkown
page read and write
2DE0000
trusted library allocation
page read and write
2EC4000
trusted library allocation
page read and write
111F000
heap
page read and write
F45E000
unkown
page read and write
53E000
heap
page read and write
470000
heap
page read and write
354E000
trusted library allocation
page read and write
13C0000
unkown
page read and write
41B000
unkown
page write copy
AAFE000
unkown
page read and write
7FF5ED28E000
unkown
page readonly
A8C0000
heap
page read and write
A77D000
heap
page read and write
896B000
stack
page read and write
31F8000
trusted library allocation
page read and write
100000
unkown
page readonly
986B000
unkown
page read and write
AFCB000
heap
page read and write
3791000
unkown
page read and write
537000
heap
page read and write
B10D000
stack
page read and write
4CE000
stack
page read and write
A3C0000
heap
page read and write
7FF5ED3F3000
unkown
page readonly
129D000
heap
page read and write
A2F0000
heap
page read and write
7852000
unkown
page read and write
1336000
stack
page read and write
97B5000
unkown
page read and write
13A1000
unkown
page read and write
3565000
trusted library allocation
page read and write
16B2000
trusted library allocation
page read and write
418000
unkown
page readonly
4370000
unclassified section
page read and write
1439000
heap
page read and write
35A0000
trusted library allocation
page read and write
FBB000
stack
page read and write
1220000
unkown
page read and write
10E9000
heap
page read and write
2430000
heap
page execute and read and write
53E000
heap
page read and write
8C70000
unkown
page read and write
7FF5EDA2A000
unkown
page readonly
353F000
trusted library allocation
page read and write
16B7000
trusted library allocation
page execute and read and write
2340000
trusted library allocation
page read and write
93BE000
stack
page read and write
3130000
unkown
page read and write
7FF5EDA11000
unkown
page readonly
245E000
trusted library allocation
page read and write
7FF5ED4F3000
unkown
page readonly
15A0000
heap
page read and write
A837000
heap
page read and write
3235000
trusted library allocation
page read and write
30B0000
heap
page read and write
7FF5ED586000
unkown
page readonly
53AE000
stack
page read and write
1109000
heap
page read and write
EA0000
heap
page read and write
30E0000
heap
page read and write
7FF5ED26E000
unkown
page readonly
537000
heap
page read and write
A15B000
heap
page read and write
A3F1000
heap
page read and write
12A3000
trusted library allocation
page execute and read and write
3220000
unkown
page readonly
14B5000
heap
page read and write
CF0000
trusted library allocation
page read and write
13C0000
unkown
page read and write
13C0000
unkown
page read and write
A71D000
heap
page read and write
537000
heap
page read and write
53E000
heap
page read and write
50FE000
stack
page read and write
1109000
heap
page read and write
3576000
trusted library allocation
page read and write
A352000
heap
page read and write
7FF5ED418000
unkown
page readonly
353F000
trusted library allocation
page read and write
1346000
heap
page read and write
2EC0000
trusted library allocation
page read and write
F80000
heap
page read and write
28EA000
heap
page read and write
A932000
heap
page read and write
A756000
heap
page read and write
537000
heap
page read and write
11A3000
heap
page read and write
3547000
trusted library allocation
page read and write
1108000
heap
page read and write
3738000
unkown
page read and write
AB74000
unkown
page read and write
112B000
heap
page read and write
A866000
heap
page read and write
A5F0000
heap
page read and write
510000
heap
page read and write
1220000
unkown
page read and write
7FF5ED295000
unkown
page readonly
3536000
trusted library allocation
page read and write
7FFE000
stack
page read and write
575E000
stack
page read and write
63EB000
unkown
page readonly
31E0000
trusted library allocation
page read and write
7E50000
unkown
page readonly
A5DD000
heap
page read and write
34FF000
stack
page read and write
37BD000
unkown
page read and write
B90000
heap
page read and write
2910000
heap
page read and write
FCE000
stack
page read and write
FD9000
heap
page read and write
DD0000
unkown
page readonly
A3DF000
heap
page read and write
7900000
unkown
page read and write
A1A0000
heap
page read and write
64E000
heap
page read and write
437F000
stack
page read and write
53E000
heap
page read and write
3215000
trusted library allocation
page read and write
11A1000
heap
page read and write
354A000
trusted library allocation
page read and write
7FF5ED6B9000
unkown
page readonly
65ED000
unkown
page readonly
A962000
heap
page read and write
2BD0000
trusted library allocation
page read and write
9DED000
stack
page read and write
1107000
trusted library allocation
page read and write
A3C8000
heap
page read and write
462000
unkown
page readonly
A509000
heap
page read and write
5206000
unkown
page readonly
B4B5000
heap
page read and write
3542000
trusted library allocation
page read and write
116C000
heap
page read and write
7FF5ED516000
unkown
page readonly
A405000
heap
page read and write
2F80000
heap
page read and write
43C0000
heap
page read and write
14E5000
heap
page read and write
2347000
trusted library allocation
page execute and read and write
537000
heap
page read and write
3579000
trusted library allocation
page read and write
700000
heap
page read and write
1220000
unkown
page read and write
3587000
trusted library allocation
page read and write
A93E000
heap
page read and write
A4BD000
heap
page read and write
662000
heap
page read and write
A3F2000
heap
page read and write
D0D000
trusted library allocation
page execute and read and write
A724000
heap
page read and write
11C0000
unkown
page read and write
1095000
stack
page read and write
537000
heap
page read and write
A3F7000
heap
page read and write
7C80000
unkown
page read and write
11B4000
heap
page read and write
537000
heap
page read and write
14B0000
unkown
page readonly
C700000
unkown
page read and write
53E000
heap
page read and write
2720000
heap
page read and write
7FF5ED915000
unkown
page readonly
1197000
heap
page read and write
4C1E000
unkown
page read and write
A38A000
heap
page read and write
537000
heap
page read and write
A6BE000
heap
page read and write
7FF5ED71E000
unkown
page readonly
57F0000
trusted library allocation
page read and write
A3F7000
heap
page read and write
A3D7000
heap
page read and write
A43A000
heap
page read and write
5366000
trusted library allocation
page read and write
A59F000
heap
page read and write
A862000
heap
page read and write
2E7E000
stack
page read and write
53E000
heap
page read and write
1179000
heap
page read and write
6E4000
heap
page read and write
A431000
heap
page read and write
7FF5ED8AC000
unkown
page readonly
7FF5ED412000
unkown
page readonly
3556000
trusted library allocation
page read and write
C7C5000
unkown
page read and write
10ED000
trusted library allocation
page execute and read and write
D28000
heap
page read and write
7FF5ED349000
unkown
page readonly
9070000
unkown
page read and write
3579000
trusted library allocation
page read and write
230000
unkown
page read and write
7FF5ED743000
unkown
page readonly
7FF5ED505000
unkown
page readonly
A5BD000
heap
page read and write
AFCD000
heap
page read and write
1500000
heap
page read and write
358B000
trusted library allocation
page read and write
8CEE000
stack
page read and write
A3D7000
heap
page read and write
CB89000
unkown
page read and write
7859000
unkown
page read and write
A097000
heap
page read and write
1700000
trusted library allocation
page read and write
A8D8000
heap
page read and write
5641000
unkown
page read and write
29BF000
stack
page read and write
537000
heap
page read and write
C964000
unkown
page read and write
4C0000
heap
page read and write
9070000
unkown
page read and write
8C70000
unkown
page read and write
325F000
stack
page read and write
F89B000
unkown
page read and write
A610000
heap
page read and write
A549000
heap
page read and write
CA42000
unkown
page read and write
3549000
trusted library allocation
page read and write
9070000
unkown
page read and write
13A8000
heap
page read and write
A93C000
heap
page read and write
5F6000
stack
page read and write
359E000
trusted library allocation
page read and write
A80F000
heap
page read and write
5ABF000
stack
page read and write
C4D0000
unkown
page read and write
113A000
heap
page read and write
377E000
stack
page read and write
7FF5EDA76000
unkown
page readonly
401000
unkown
page execute read
8C70000
unkown
page read and write
524000
unkown
page read and write
53E000
heap
page read and write
58FE000
stack
page read and write
354C000
trusted library allocation
page read and write
281F000
stack
page read and write
435F000
stack
page read and write
2BED000
trusted library allocation
page execute and read and write
A4AE000
unkown
page read and write
A566000
heap
page read and write
9070000
unkown
page read and write
4BDC000
unkown
page read and write
980000
heap
page read and write
118D000
heap
page read and write
A94D000
heap
page read and write
A3C5000
heap
page read and write
AB69000
unkown
page read and write
1250000
heap
page read and write
1480000
heap
page read and write
F957000
unkown
page read and write
7FF5ED9A6000
unkown
page readonly
A3F4000
heap
page read and write
53E000
heap
page read and write
7FF5ED48A000
unkown
page readonly
11B5000
heap
page read and write
537000
heap
page read and write
563E000
stack
page read and write
82E000
stack
page read and write
53E000
heap
page read and write
7FF5ED5CE000
unkown
page readonly
408000
unkown
page readonly
FFD000
heap
page read and write
4BE1000
unkown
page read and write
11A5000
heap
page read and write
2BE0000
trusted library allocation
page read and write
1431000
heap
page read and write
34E9000
stack
page read and write
354E000
trusted library allocation
page read and write
3659000
stack
page read and write
1197000
heap
page read and write
56FE000
stack
page read and write
354C000
trusted library allocation
page read and write
810000
heap
page read and write
7865000
unkown
page read and write
57F4000
trusted library allocation
page read and write
537000
heap
page read and write
131E000
heap
page read and write
F952000
unkown
page read and write
FAC000
heap
page read and write
9E0000
heap
page read and write
A3FC000
heap
page read and write
356B000
trusted library allocation
page read and write
A236000
heap
page read and write
400000
unkown
page execute and read and write
537000
heap
page read and write
53E000
heap
page read and write
112D000
heap
page read and write
3652000
trusted library allocation
page read and write
53E000
heap
page read and write
78AD000
unkown
page read and write
A3E9000
heap
page read and write
8AD000
trusted library allocation
page execute and read and write
1330000
trusted library allocation
page read and write
11B5000
heap
page read and write
A3F3000
heap
page read and write
40C7000
trusted library allocation
page read and write
A3F2000
heap
page read and write
5F8000
heap
page read and write
3544000
trusted library allocation
page read and write
9871000
unkown
page read and write
64C000
heap
page read and write
537000
heap
page read and write
85E000
stack
page read and write
3538000
trusted library allocation
page read and write
1177000
heap
page read and write
231D000
trusted library allocation
page execute and read and write
FC24000
unkown
page read and write
3591000
trusted library allocation
page read and write
11A0000
heap
page read and write
6AE000
heap
page read and write
3130000
unkown
page read and write
8A6E000
stack
page read and write
8FA000
heap
page read and write
53E000
heap
page read and write
A72A000
heap
page read and write
2F20000
trusted library allocation
page read and write
37B0000
unkown
page read and write
F90000
heap
page read and write
310E000
stack
page read and write
111F000
heap
page read and write
B150000
unkown
page read and write
A8F9000
heap
page read and write
53E000
heap
page read and write
53E000
heap
page read and write
A60A000
heap
page read and write
400000
unkown
page readonly
AF8D000
stack
page read and write
A46C000
heap
page read and write
13C0000
unkown
page read and write
9AC000
heap
page read and write
436000
unkown
page readonly
3544000
trusted library allocation
page read and write
276E000
stack
page read and write
3542000
trusted library allocation
page read and write
57A0000
heap
page execute and read and write
2C10000
trusted library allocation
page read and write
A7EB000
heap
page read and write
3630000
heap
page read and write
401000
unkown
page execute read
354E000
trusted library allocation
page read and write
13BE000
stack
page read and write
2708000
unkown
page readonly
408000
unkown
page readonly
A797000
heap
page read and write
525000
unkown
page execute read
C6BF000
unkown
page read and write
7F50000
unkown
page read and write
3130000
unkown
page read and write
2E48000
trusted library allocation
page read and write
A3E5000
heap
page read and write
355A000
trusted library allocation
page read and write
7CD0000
unkown
page read and write
1007000
trusted library allocation
page execute and read and write
DE5000
heap
page read and write
12C1000
heap
page read and write
A9F0000
heap
page read and write
537000
heap
page read and write
1182000
heap
page read and write
2EB0000
trusted library allocation
page read and write
7FF5ED806000
unkown
page readonly
1136000
stack
page read and write
B0AD000
heap
page read and write
2C9E000
stack
page read and write
1220000
unkown
page read and write
B4AC000
heap
page read and write
537000
heap
page read and write
91B8000
stack
page read and write
F458000
unkown
page read and write
A39C000
heap
page read and write
2EF0000
heap
page read and write
FF0000
heap
page read and write
64CD000
unkown
page readonly
C50000
heap
page read and write
1333000
trusted library allocation
page execute and read and write
5590000
unkown
page write copy
AA19000
heap
page read and write
1179000
heap
page read and write
F40000
heap
page read and write
A415000
heap
page read and write
3A60000
heap
page read and write
537000
heap
page read and write
7DF4F3061000
unkown
page execute read
A650000
heap
page read and write
11C0000
unkown
page read and write
C6C1000
unkown
page read and write
11B4000
heap
page read and write
F459000
unkown
page read and write
3599000
trusted library allocation
page read and write
A9BE000
heap
page read and write
2D10000
trusted library allocation
page read and write
58AF000
stack
page read and write
A3D5000
heap
page read and write
11A2000
heap
page read and write
8B90000
unkown
page readonly
154E000
stack
page read and write
9070000
unkown
page read and write
A8DF000
heap
page read and write
537000
heap
page read and write
3AA7000
heap
page read and write
356B000
trusted library allocation
page read and write
68C000
heap
page read and write
537000
heap
page read and write
A99B000
heap
page read and write
673F000
unkown
page readonly
9070000
unkown
page read and write
A512000
heap
page read and write
10BD000
trusted library allocation
page execute and read and write
7FF5ED556000
unkown
page readonly
134D000
trusted library allocation
page execute and read and write
11C8000
heap
page read and write
A461000
heap
page read and write
ED0000
heap
page read and write
1480000
trusted library allocation
page read and write
8C50000
unkown
page readonly
8B7000
heap
page read and write
13DF000
stack
page read and write
13E0000
trusted library allocation
page execute and read and write
579E000
stack
page read and write
5584000
trusted library allocation
page read and write
7847000
unkown
page read and write
315E000
stack
page read and write
F95F000
unkown
page read and write
1242000
heap
page read and write
537000
heap
page read and write
A766000
heap
page read and write
1177000
heap
page read and write
7CC0000
unkown
page readonly
3599000
trusted library allocation
page read and write
9875000
unkown
page read and write
1182000
heap
page read and write
3540000
trusted library allocation
page read and write
400000
unkown
page readonly
53E000
heap
page read and write
A169000
heap
page read and write
9F7000
heap
page read and write
57A3000
heap
page execute and read and write
7E60000
unkown
page read and write
354C000
trusted library allocation
page read and write
1220000
unkown
page read and write
986F000
unkown
page read and write
2C6D000
stack
page read and write
55C9000
trusted library allocation
page read and write
7FF5ED85F000
unkown
page readonly
537000
heap
page read and write
2B80000
trusted library allocation
page read and write
13E0000
unkown
page read and write
B640000
unkown
page read and write
6A8000
heap
page read and write
53E000
heap
page read and write
A988000
heap
page read and write
11B4000
heap
page read and write
A085000
heap
page read and write
9C6000
stack
page read and write
1467000
trusted library allocation
page execute and read and write
A807000
heap
page read and write
7FF5ED409000
unkown
page readonly
53E000
heap
page read and write
7FF5ED779000
unkown
page readonly
A3EA000
heap
page read and write
12F6000
stack
page read and write
C4A0000
unkown
page read and write
F95A000
unkown
page read and write
3702000
trusted library allocation
page read and write
7FF5ED41C000
unkown
page readonly
FBC0000
unkown
page read and write
5370000
trusted library allocation
page read and write
2490000
heap
page read and write
42E000
unkown
page readonly
3150000
heap
page read and write
3152000
heap
page read and write
9070000
unkown
page read and write
89F000
stack
page read and write
7FF5ED7F1000
unkown
page readonly
A3C8000
heap
page read and write
F457000
unkown
page read and write
A3CE000
heap
page read and write
11B4000
heap
page read and write
53E000
heap
page read and write
9883000
unkown
page read and write
5326000
trusted library allocation
page read and write
A09E000
heap
page read and write
11E0000
heap
page read and write
7FF5ED8E2000
unkown
page readonly
9070000
unkown
page read and write
354C000
trusted library allocation
page read and write
2310000
trusted library allocation
page read and write
537000
heap
page read and write
A3C2000
heap
page read and write
1101000
trusted library allocation
page read and write
139C000
heap
page read and write
3547000
trusted library allocation
page read and write
A3E9000
heap
page read and write
FEE000
stack
page read and write
3546000
trusted library allocation
page read and write
3548000
trusted library allocation
page read and write
A30B000
heap
page read and write
A444000
heap
page read and write
7FF5ED59E000
unkown
page readonly
A3AD000
heap
page read and write
354E000
trusted library allocation
page read and write
8208000
stack
page read and write
865000
heap
page read and write
2D90000
heap
page read and write
8B0000
heap
page read and write
3795000
unkown
page read and write
7FF5ED1EA000
unkown
page readonly
1190000
heap
page read and write
A52B000
heap
page read and write
A411000
heap
page read and write
D90000
heap
page read and write
1190000
heap
page read and write
8C70000
unkown
page read and write
A3CB000
heap
page read and write
A4AD000
heap
page read and write
7CE0000
unkown
page read and write
1490000
heap
page read and write
A3EF000
heap
page read and write
19A000
stack
page read and write
537000
heap
page read and write
11A5000
heap
page read and write
A886000
heap
page read and write
916000
heap
page read and write
CA20000
unkown
page read and write
8B60000
unkown
page readonly
2904000
trusted library allocation
page read and write
1101000
heap
page read and write
7FF5ED6A5000
unkown
page readonly
7FF5ED55F000
unkown
page readonly
89E0000
unkown
page read and write
11EC000
heap
page read and write
13E0000
unkown
page read and write
9815000
unkown
page read and write
18E0000
trusted library allocation
page read and write
11A5000
heap
page read and write
111F000
heap
page read and write
A41E000
heap
page read and write
6592000
unkown
page readonly
A3CD000
heap
page read and write
3540000
trusted library allocation
page read and write
A91A000
heap
page read and write
A9B2000
heap
page read and write
A47F000
heap
page read and write
2E31000
trusted library allocation
page read and write
A7EE000
heap
page read and write
A39B000
unkown
page read and write
9070000
unkown
page read and write
2E6F000
stack
page read and write
3450000
unkown
page read and write
2760000
heap
page read and write
537000
heap
page read and write
537000
heap
page read and write
2F00000
heap
page execute and read and write
5BFF000
stack
page read and write
7FF5ED8FF000
unkown
page readonly
7FF5ED5EB000
unkown
page readonly
1494000
heap
page read and write
3209000
stack
page read and write
53E000
heap
page read and write
13C0000
unkown
page read and write
1198000
heap
page read and write
89A0000
unkown
page read and write
95DB000
stack
page read and write
36BD000
stack
page read and write
9B000
stack
page read and write
C5A0000
unkown
page read and write
A3F3000
heap
page read and write
64C7000
unkown
page readonly
10F0000
trusted library allocation
page read and write
537000
heap
page read and write
5AD0000
heap
page execute and read and write
F814000
unkown
page read and write
7FF5ED5C1000
unkown
page readonly
9070000
unkown
page read and write
55C0000
trusted library allocation
page read and write
C30000
heap
page read and write
A935000
heap
page read and write
245B000
trusted library allocation
page read and write
53E000
heap
page read and write
C962000
unkown
page read and write
35D3000
trusted library allocation
page read and write
53E000
heap
page read and write
537000
heap
page read and write
53E000
heap
page read and write
51C0000
unkown
page readonly
3130000
unkown
page read and write
1700000
trusted library allocation
page read and write
1030000
heap
page read and write
171E000
stack
page read and write
1510000
heap
page read and write
2B8E000
stack
page read and write
14C0000
heap
page execute and read and write
C50A000
unkown
page read and write
33B9000
stack
page read and write
7FF5ED93B000
unkown
page readonly
354C000
trusted library allocation
page read and write
97C3000
unkown
page read and write
35BE000
stack
page read and write
11B4000
heap
page read and write
353D000
trusted library allocation
page read and write
9893000
unkown
page read and write
A94C000
heap
page read and write
2C12000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
A1AB000
heap
page read and write
A4B4000
heap
page read and write
537000
heap
page read and write
63B6000
unkown
page readonly
4FB000
stack
page read and write
7FF5ED507000
unkown
page readonly
A3EE000
heap
page read and write
1220000
unkown
page read and write
7DF4F3071000
unkown
page execute read
10001000
unkown
page execute read
9070000
unkown
page read and write
A4CF000
heap
page read and write
4C50000
unkown
page read and write
11B4000
heap
page read and write
10EB000
trusted library allocation
page execute and read and write
13C0000
unkown
page read and write
7D53000
unkown
page read and write
11B4000
heap
page read and write
9070000
unkown
page read and write
3579000
trusted library allocation
page read and write
2BE0000
heap
page read and write
64CB000
unkown
page readonly
11A5000
heap
page read and write
176E000
stack
page read and write
A42F000
heap
page read and write
D03000
trusted library allocation
page execute and read and write
1200000
heap
page read and write
A9C7000
heap
page read and write
446000
unkown
page readonly
A570000
heap
page read and write
A3F7000
heap
page read and write
109E000
stack
page read and write
537000
heap
page read and write
3591000
trusted library allocation
page read and write
A995000
heap
page read and write
A3EE000
heap
page read and write
A572000
heap
page read and write
AAF2000
unkown
page read and write
3568000
trusted library allocation
page read and write
537000
heap
page read and write
10D0000
heap
page read and write
F95F000
unkown
page read and write
11CE000
heap
page read and write
537000
heap
page read and write
A634000
heap
page read and write
112B000
heap
page read and write
3130000
unkown
page read and write
53E000
heap
page read and write
EC1C000
stack
page read and write
1177000
heap
page read and write
537000
heap
page read and write
8C70000
unkown
page read and write
A423000
heap
page read and write
7FF5D1CCD000
unkown
page readonly
57FE000
trusted library allocation
page read and write
32D0000
trusted library allocation
page read and write
7FF5ED33F000
unkown
page readonly
9070000
unkown
page read and write
F955000
unkown
page read and write
1220000
unkown
page read and write
25FE000
stack
page read and write
CA0000
heap
page read and write
53E000
heap
page read and write
3540000
trusted library allocation
page read and write
1357000
trusted library allocation
page read and write
A4D7000
heap
page read and write
10D0000
trusted library allocation
page read and write
18A7000
heap
page read and write
AA39000
heap
page read and write
1080000
heap
page read and write
7FF5ED625000
unkown
page readonly
11A2000
heap
page read and write
14CD000
heap
page read and write
525000
unkown
page execute read
342E000
stack
page read and write
ADB000
stack
page read and write
7FF5ED68C000
unkown
page readonly
D00000
trusted library allocation
page read and write
9070000
unkown
page read and write
A70C000
heap
page read and write
7FF5ED2A4000
unkown
page readonly
53E000
heap
page read and write
630000
heap
page read and write
1317000
heap
page read and write
3577000
trusted library allocation
page read and write
537000
heap
page read and write
11B4000
heap
page read and write
53E000
heap
page read and write
13C0000
unkown
page read and write
537000
heap
page read and write
A6AF000
heap
page read and write
A3D7000
heap
page read and write
89C0000
unkown
page read and write
7FF5ED62F000
unkown
page readonly
145E000
heap
page read and write
A467000
heap
page read and write
300F000
stack
page read and write
8DB000
stack
page read and write
A29E000
stack
page read and write
A385000
heap
page read and write
E5B000
stack
page read and write
7FF5ED3D6000
unkown
page readonly
525000
unkown
page execute read
1220000
unkown
page read and write
A3EA000
heap
page read and write
A3CC000
heap
page read and write
233A000
trusted library allocation
page execute and read and write
AAF6000
unkown
page read and write
7FF5ED65C000
unkown
page readonly
A3F7000
heap
page read and write
8C70000
unkown
page read and write
2AAD000
stack
page read and write
53E000
heap
page read and write
7FF5ED471000
unkown
page readonly
FF0000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
A5EB000
heap
page read and write
A752000
heap
page read and write
11B5000
heap
page read and write
11B4000
heap
page read and write
7FF5ED6DB000
unkown
page readonly
13E0000
unkown
page read and write
A4FC000
unkown
page read and write
3450000
unkown
page read and write
A76B000
heap
page read and write
A7D0000
heap
page read and write
7FF5ED803000
unkown
page readonly
3200000
unkown
page read and write
53E000
heap
page read and write
1310000
heap
page read and write
2360000
trusted library allocation
page read and write
7FF5ED697000
unkown
page readonly
2454000
trusted library allocation
page read and write
13C0000
unkown
page read and write
11B5000
heap
page read and write
9E6C000
stack
page read and write
4487000
trusted library allocation
page read and write
7FF5ED800000
unkown
page readonly
3579000
trusted library allocation
page read and write
CC0000
heap
page read and write
2EC0000
trusted library allocation
page read and write
66BA000
unkown
page readonly
31FE000
trusted library allocation
page read and write
1400000
heap
page read and write
44C0000
heap
page read and write
A3A7000
heap
page read and write
A670000
heap
page read and write
7FF5ED853000
unkown
page readonly
7FF5ED94A000
unkown
page readonly
3577000
trusted library allocation
page read and write
53EE000
stack
page read and write
16FA000
trusted library allocation
page execute and read and write
A26E000
heap
page read and write
57E6000
trusted library allocation
page read and write
A3F5000
heap
page read and write
59AF000
stack
page read and write
7FF5ED9BE000
unkown
page readonly
53E000
heap
page read and write
19A000
stack
page read and write
7FF5ED404000
unkown
page readonly
A147000
heap
page read and write
A3F6000
heap
page read and write
E0E000
stack
page read and write
A3EA000
heap
page read and write
138E000
stack
page read and write
3F17000
trusted library allocation
page read and write
987D000
unkown
page read and write
9070000
unkown
page read and write
A3E6000
heap
page read and write
A3C9000
heap
page read and write
30C1000
trusted library allocation
page read and write
A7FC000
heap
page read and write
2B4E000
stack
page read and write
B006000
heap
page read and write
343B000
stack
page read and write
AA12000
heap
page read and write
2FD0000
heap
page execute and read and write
A9FE000
heap
page read and write
77F000
heap
page read and write
7FF5ED9C8000
unkown
page readonly
31E6000
trusted library allocation
page read and write
7FF5ED602000
unkown
page readonly
A51A000
heap
page read and write
9885000
unkown
page read and write
7FF5ED7FD000
unkown
page readonly
2EB5000
trusted library allocation
page read and write
35BB000
trusted library allocation
page read and write
A6A0000
heap
page read and write
2406000
trusted library allocation
page read and write
A361000
unkown
page read and write
4265000
trusted library allocation
page read and write
1225000
heap
page read and write
A3CF000
heap
page read and write
87BA000
stack
page read and write
5395000
trusted library allocation
page read and write
537000
heap
page read and write
7FF5ED937000
unkown
page readonly
A6F8000
heap
page read and write
10B3000
trusted library allocation
page execute and read and write
A697000
heap
page read and write
106E000
stack
page read and write
7F2E000
stack
page read and write
2345000
trusted library allocation
page execute and read and write
A3FB000
heap
page read and write
14B1000
trusted library allocation
page read and write
510000
heap
page read and write
1F0000
unkown
page readonly
112B000
heap
page read and write
2EC6000
trusted library allocation
page read and write
3130000
unkown
page read and write
408000
unkown
page readonly
9C000
stack
page read and write
1182000
heap
page read and write
53E000
heap
page read and write
11A3000
heap
page read and write
111F000
heap
page read and write
3631000
heap
page read and write
23ED000
stack
page read and write
A791000
heap
page read and write
923E000
stack
page read and write
A40C000
heap
page read and write
11A5000
heap
page read and write
7FF5ED750000
unkown
page readonly
11B4000
heap
page read and write
53E000
heap
page read and write
1F0000
heap
page read and write
13C0000
unkown
page read and write
3549000
trusted library allocation
page read and write
1240000
heap
page read and write
1096000
heap
page read and write
1370000
heap
page read and write
1182000
heap
page read and write
35A3000
trusted library allocation
page read and write
A3EC000
heap
page read and write
A56D000
heap
page read and write
539F000
trusted library allocation
page read and write
AAD1000
unkown
page read and write
11A3000
heap
page read and write
7FF5ED40D000
unkown
page readonly
1121000
heap
page read and write
A3D5000
heap
page read and write
9070000
unkown
page read and write
9070000
unkown
page read and write
A8AF000
heap
page read and write
355C000
trusted library allocation
page read and write
2330000
trusted library allocation
page read and write
537000
heap
page read and write
A125000
heap
page read and write
7FF5ED3D0000
unkown
page readonly
5E22000
unkown
page readonly
3140000
unkown
page read and write
11B5000
heap
page read and write
53E000
heap
page read and write
25A1000
trusted library allocation
page read and write
2ABF000
stack
page read and write
A11F000
stack
page read and write
815000
heap
page read and write
A629000
heap
page read and write
9070000
unkown
page read and write
1462000
trusted library allocation
page read and write
A959000
heap
page read and write
11A3000
heap
page read and write
2C30000
trusted library allocation
page read and write
11A3000
heap
page read and write
F03000
trusted library allocation
page execute and read and write
117B000
heap
page read and write
C507000
unkown
page read and write
8C70000
unkown
page read and write
7FF5EDA14000
unkown
page readonly
12B1000
heap
page read and write
A4A6000
heap
page read and write
AA49000
heap
page read and write
411000
unkown
page execute read
4B8B000
unkown
page read and write
A6D2000
heap
page read and write
282F000
heap
page read and write
11B5000
heap
page read and write
3579000
trusted library allocation
page read and write
9070000
unkown
page read and write
3551000
trusted library allocation
page read and write
3590000
unkown
page read and write
3559000
trusted library allocation
page read and write
A411000
heap
page read and write
2D04000
trusted library allocation
page read and write
56C3000
trusted library allocation
page read and write
9B3000
heap
page read and write
7FF5ED5C9000
unkown
page readonly
9873000
unkown
page read and write
F45F000
unkown
page read and write
5ABA000
trusted library allocation
page read and write
FB0000
heap
page read and write
FC04000
unkown
page read and write
7FF5ED9CC000
unkown
page readonly
2471000
trusted library allocation
page read and write
7FF5ED9FF000
unkown
page readonly
1138000
heap
page read and write
354D000
trusted library allocation
page read and write
2D2E000
stack
page read and write
5665000
trusted library allocation
page read and write
AFD3000
heap
page read and write
7FF5ED5C5000
unkown
page readonly
11B4000
heap
page read and write
2320000
trusted library allocation
page read and write
353A000
trusted library allocation
page read and write
D20000
heap
page read and write
3568000
trusted library allocation
page read and write
4C18000
unkown
page read and write
C893000
unkown
page read and write
F950000
unkown
page read and write
355B000
trusted library allocation
page read and write
8F7000
heap
page read and write
3140000
unkown
page read and write
1239000
heap
page read and write
3536000
trusted library allocation
page read and write
16E0000
trusted library allocation
page read and write
1720000
heap
page read and write
4C60000
unkown
page read and write
7FF5ED42B000
unkown
page readonly
356B000
trusted library allocation
page read and write
410000
unkown
page readonly
A5D000
stack
page read and write
785D000
unkown
page read and write
53E000
heap
page read and write
13C0000
unkown
page read and write
C544000
unkown
page read and write
5643000
trusted library allocation
page read and write
8C70000
unkown
page read and write
A90E000
heap
page read and write
5F0000
heap
page read and write
2E79000
trusted library allocation
page read and write
9B7000
heap
page read and write
7FF5ED3DA000
unkown
page readonly
99A000
heap
page read and write
108E000
stack
page read and write
10F7000
heap
page read and write
53E000
heap
page read and write
16C0000
trusted library allocation
page read and write
319F000
stack
page read and write
A991000
heap
page read and write
E7E000
stack
page read and write
7FF5ED74A000
unkown
page readonly
A1C1000
heap
page read and write
A372000
heap
page read and write
354D000
trusted library allocation
page read and write
11CA000
heap
page read and write
10F0000
heap
page read and write
A3ED000
heap
page read and write
354E000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
1690000
trusted library allocation
page read and write
3130000
unkown
page read and write
2930000
heap
page execute and read and write
2D7E000
stack
page read and write
354C000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
3130000
unkown
page read and write
A3E9000
heap
page read and write
354E000
trusted library allocation
page read and write
9070000
unkown
page read and write
7FF5ED9A1000
unkown
page readonly
B004000
heap
page read and write
9070000
unkown
page read and write
9070000
unkown
page read and write
7FF5ED814000
unkown
page readonly
BD98000
stack
page read and write
169F000
stack
page read and write
2EDD000
trusted library allocation
page execute and read and write
8D6D000
stack
page read and write
A61E000
heap
page read and write
532B000
trusted library allocation
page read and write
A0E2000
heap
page read and write
1702000
trusted library allocation
page read and write
A3F8000
heap
page read and write
9B000
stack
page read and write
7FF5EDA53000
unkown
page readonly
2336000
trusted library allocation
page execute and read and write
150F000
stack
page read and write
537000
heap
page read and write
E30000
heap
page read and write
649000
heap
page read and write
F95E000
unkown
page read and write
5350000
trusted library allocation
page read and write
11A3000
heap
page read and write
2742000
heap
page read and write
2920000
trusted library allocation
page read and write
A8FC000
heap
page read and write
53E000
heap
page read and write
400000
unkown
page readonly
535D000
stack
page read and write
988000
heap
page read and write
117D000
heap
page read and write
354E000
trusted library allocation
page read and write
358E000
trusted library allocation
page read and write
3E31000
trusted library allocation
page read and write
53E000
heap
page read and write
3450000
unkown
page read and write
3542000
trusted library allocation
page read and write
16E0000
trusted library allocation
page execute and read and write
5565000
trusted library allocation
page read and write
353D000
trusted library allocation
page read and write
A502000
unkown
page read and write
9877000
unkown
page read and write
A31C000
heap
page read and write
3589000
trusted library allocation
page read and write
7FF5ED781000
unkown
page readonly
F957000
unkown
page read and write
A8EB000
heap
page read and write
33A1000
trusted library allocation
page read and write
3200000
unkown
page read and write
B140000
unkown
page readonly
E18000
heap
page read and write
33B5000
trusted library allocation
page read and write
A978000
heap
page read and write
537000
heap
page read and write
935000
heap
page read and write
8C70000
unkown
page read and write
A73B000
heap
page read and write
53E000
heap
page read and write
1177000
heap
page read and write
7FF5ED97A000
unkown
page readonly
108D000
stack
page read and write
A4DE000
heap
page read and write
16A6000
trusted library allocation
page execute and read and write
785F000
unkown
page read and write
F04000
trusted library allocation
page read and write
5369000
trusted library allocation
page read and write
320D000
trusted library allocation
page read and write
7FF5ED286000
unkown
page readonly
63C7000
unkown
page readonly
53E000
heap
page read and write
7FF5ED519000
unkown
page readonly
11A5000
heap
page read and write
500000
heap
page read and write
585000
heap
page read and write
68C000
heap
page read and write
A3E4000
heap
page read and write
5C3E000
stack
page read and write
9070000
unkown
page read and write
2E66000
trusted library allocation
page read and write
7FF5ED7DB000
unkown
page readonly
11A6000
heap
page read and write
9070000
unkown
page read and write
7FF5ED5A8000
unkown
page readonly
6737000
unkown
page readonly
10FA000
trusted library allocation
page execute and read and write
1710000
heap
page read and write
A3C1000
heap
page read and write
F95000
heap
page read and write
5360000
trusted library allocation
page read and write
C30000
heap
page read and write
7FF5ED91A000
unkown
page readonly
2E41000
trusted library allocation
page read and write
DC0000
heap
page read and write
3548000
trusted library allocation
page read and write
1208000
heap
page read and write
12BD000
heap
page read and write
1101000
heap
page read and write
22DF000
stack
page read and write
A4A1000
unkown
page read and write
6548000
unkown
page readonly
2EF6000
trusted library allocation
page execute and read and write
F7D2000
unkown
page read and write
7FF5ED4C6000
unkown
page readonly
53E000
heap
page read and write
118F000
stack
page read and write
A7D7000
heap
page read and write
1198000
heap
page read and write
53E000
heap
page read and write
9070000
unkown
page read and write
3572000
trusted library allocation
page read and write
A37B000
unkown
page read and write
7FF5ED9C6000
unkown
page readonly
41B000
unkown
page read and write
3130000
unkown
page read and write
A484000
heap
page read and write
1408000
heap
page read and write
11E1000
unkown
page read and write
454000
unkown
page readonly
53E000
heap
page read and write
A606000
heap
page read and write
AA1F000
heap
page read and write
2E70000
trusted library allocation
page read and write
C54A000
unkown
page read and write
3450000
unkown
page read and write
3240000
trusted library allocation
page read and write
A6B7000
heap
page read and write
5840000
heap
page execute and read and write
A8B8000
heap
page read and write
2C17000
trusted library allocation
page execute and read and write
59D0000
unkown
page readonly
460000
heap
page read and write
7FF5EDA08000
unkown
page readonly
153C000
heap
page read and write
F914000
unkown
page read and write
A33E000
unkown
page read and write
1180000
heap
page read and write
2EDE000
trusted library allocation
page read and write
3598000
trusted library allocation
page read and write
C6C9000
unkown
page read and write
13E0000
unkown
page read and write
152E000
stack
page read and write
537000
heap
page read and write
9C000
stack
page read and write
A4CA000
heap
page read and write
51C2000
unkown
page readonly
53E000
heap
page read and write
7FF5EDA0D000
unkown
page readonly
A618000
heap
page read and write
F9A000
heap
page read and write
4401000
heap
page read and write
9070000
unkown
page read and write
7869000
unkown
page read and write
8BC000
heap
page read and write
354C000
trusted library allocation
page read and write
3D92000
trusted library allocation
page read and write
B650000
unkown
page read and write
8108000
stack
page read and write
537000
heap
page read and write
910000
heap
page read and write
2ED0000
trusted library allocation
page read and write
10CD000
trusted library allocation
page execute and read and write
356D000
trusted library allocation
page read and write
76C0000
unkown
page read and write
9070000
unkown
page read and write
53E000
heap
page read and write
10B0000
heap
page read and write
53E000
heap
page read and write
13D0000
heap
page read and write
F45F000
unkown
page read and write
9A000
stack
page read and write
55D0000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
11A3000
heap
page read and write
7FF5ED534000
unkown
page readonly
422000
unkown
page read and write
7953000
unkown
page read and write
A7DB000
heap
page read and write
28CA000
heap
page read and write
247D000
trusted library allocation
page read and write
28CE000
heap
page read and write
D57000
heap
page read and write
28DE000
stack
page read and write
1148000
heap
page read and write
A57F000
heap
page read and write
A57D000
heap
page read and write
7CA0000
unkown
page read and write
53E000
heap
page read and write
C51E000
unkown
page read and write
E09000
heap
page read and write
C503000
unkown
page read and write
6552000
unkown
page readonly
A96B000
heap
page read and write
A416000
heap
page read and write
2BE4000
trusted library allocation
page read and write
1121000
heap
page read and write
3140000
unkown
page read and write
370A000
trusted library allocation
page read and write
A4E4000
heap
page read and write
2476000
trusted library allocation
page read and write
A4AB000
unkown
page read and write
53E000
heap
page read and write
DE0000
unkown
page readonly
7FF5ED9E1000
unkown
page readonly
7FF5EDA69000
unkown
page readonly
A69E000
heap
page read and write
37F2000
unkown
page read and write
2794000
heap
page read and write
FC1E000
unkown
page read and write
5310000
trusted library allocation
page read and write
9070000
unkown
page read and write
CF6000
stack
page read and write
53E000
heap
page read and write
489000
unkown
page readonly
C92D000
unkown
page read and write
There are 3170 hidden memdumps, click here to show them.