IOC Report
LXbM8RbhLa.exe

loading gif

Files

File Path
Type
Category
Malicious
LXbM8RbhLa.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\huge[1].dat
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\A50C.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\C9EB.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\EDA0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\nsd7951.tmp\liteFirewall.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsyC940.tmp\blowfish.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Del.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ervhhuc
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ervhhuc:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\nskBC1.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nstC920.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsyC940.tmp\INetC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsyC940.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
data
modified
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\cef.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
data
dropped
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\start.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
MSVC program database ver 7.00, 512*4023 bytes
dropped
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 106 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LXbM8RbhLa.exe
"C:\Users\user\Desktop\LXbM8RbhLa.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\ervhhuc
C:\Users\user\AppData\Roaming\ervhhuc
malicious
C:\Users\user\AppData\Local\Temp\A50C.exe
C:\Users\user\AppData\Local\Temp\A50C.exe
malicious
C:\Users\user\AppData\Local\Temp\C9EB.exe
C:\Users\user\AppData\Local\Temp\C9EB.exe
malicious
C:\Users\user\AppData\Local\Temp\EDA0.exe
C:\Users\user\AppData\Local\Temp\EDA0.exe
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
"C:\Users\user\AppData\Local\Temp\setup.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3116 --field-trial-handle=3128,i,16564650160723935827,11428467048589295655,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3396 --field-trial-handle=3128,i,16564650160723935827,11428467048589295655,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3808 --field-trial-handle=3128,i,16564650160723935827,11428467048589295655,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719978473683865 --launch-time-ticks=7845153143 --mojo-platform-channel-handle=3856 --field-trial-handle=3128,i,16564650160723935827,11428467048589295655,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719978473683865 --launch-time-ticks=7845163762 --mojo-platform-channel-handle=3892 --field-trial-handle=3128,i,16564650160723935827,11428467048589295655,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://gebeus.ru/tmp/index.php
malicious
http://cx5519.com/tmp/index.php
malicious
contintnetksows.shop
malicious
http://evilos.cc/tmp/index.php
malicious
ellaboratepwsz.xyz
malicious
swellfrrgwwos.xyz
malicious
foodypannyjsud.shop
malicious
pedestriankodwu.xyz
malicious
towerxxuytwi.xyz
malicious
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://foodypannyjsud.shop/s
unknown
https://chrome.google.com/webstore?hl=mr&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://foodypannyjsud.shop/w
unknown
https://support.google.com/chrome/answer/6098869
unknown
http://xiexie.wf/22_551/huge.dat(
unknown
https://www.google.com/chrome/privacy/eula_text.html
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
unknown
https://chrome.google.com/webstore?hl=et&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chrome.google.com/webstore?hl=etCtrl$1
unknown
https://excel.office.com
unknown
https://chrome.google.com/webstore?hl=urCtrl$2
unknown
https://foodypannyjsud.shop/m
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://foodypannyjsud.shop/piw
unknown
https://chrome.google.com/webstore?hl=ltCtrl$1
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://passwords.google.com
unknown
https://aui-cdn.atlassian.com/
unknown
http://www.iana.org/assignments/multicast-addresses
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
unknown
https://foodypannyjsud.shop/E
unknown
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://bageyou.xyz
unknown
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://bitbucket.org/
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.connectionstrings.com/
unknown
https://support.google.com/chromebook?p=app_intent
unknown
https://foodypannyjsud.shop/6
unknown
https://foodypannyjsud.shop/p9
unknown
https://foodypannyjsud.shop/apix
unknown
https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://foodypannyjsud.shop/ob
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://chrome.google.com/webstore?hl=mrCtrl$1
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.google.com/chrome/privacy/eula_text.html&
unknown
http://logging.apache.org/log4j
unknown
https://chrome.google.com/webstore?hl=lt&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://www.google.com/chrome/privacy/eula_text.htmlT&r
unknown
https://www.ecosia.org/newtab/
unknown
http://xiexie.wf/22_551/huge.dat
unknown
https://outlook.com
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://foodypannyjsud.shop/bmN
unknown
https://foodypannyjsud.shop/.
unknown
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
unknown
https://www.google.com/chrome/privacy/eula_text.htmlA&biHaldab
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chrome.google.com/webstore?hl=ukCtrl$1
unknown
https://android.notify.windows.com/iOS
unknown
http://api.install-stat.debug.world/clients/installs
unknown
https://cdn.cookielaw.org/
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://support.google.com/chrome/a/answer/9122284
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
unknown
https://foodypannyjsud.shop/fe
unknown
https://foodypannyjsud.shop/..
unknown
https://chrome.google.com/webstore?hl=zh-CNCtrl$1
unknown
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
unknown
https://word.office.comon
unknown
http://www.unicode.org/copyright.html
unknown
https://powerpoint.office.comcember
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
unknown
https://www.google.com/chrome/privacy/eula_text.htmlP&agalbaTvarko
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://bageyou.xyz/c/g
unknown
http://schemas.micro
unknown
http://api.install-stat.debug.world/clients/activity
unknown
https://chrome.google.com/webstore?hl=zh-TWCtrl$1
unknown
http://www.apache.org/).
unknown
https://foodypannyjsud.shop/api
unknown
https://myactivity.google.com/
unknown
https://foodypannyjsud.shop/ox
unknown
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
141.8.192.126
unknown
Russian Federation
malicious
188.114.96.3
unknown
European Union
malicious
185.68.16.7
unknown
Ukraine
malicious
127.0.0.127
unknown
unknown
malicious
201.110.238.249
unknown
Mexico
malicious
146.70.169.164
unknown
United Kingdom
malicious
1.1.1.1
unknown
Australia
104.192.141.1
unknown
United States
104.21.45.251
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000090026
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000604E2
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\GamePall
Sid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Pid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GamePall
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
DontShowUI
HKEY_CURRENT_USER\SOFTWARE\GamePall
tmp_uid
HKEY_CURRENT_USER\SOFTWARE\GamePall
reg
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\GamePall
uid
HKEY_CURRENT_USER\Control Panel\Cursors
AppStarting
There are 205 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3210000
direct allocation
page execute and read and write
malicious
4391000
unclassified section
page read and write
malicious
4350000
direct allocation
page read and write
malicious
A27000
heap
page read and write
malicious
4360000
direct allocation
page read and write
malicious
4491000
unclassified section
page read and write
malicious
1140000
heap
page read and write
11E4000
trusted library allocation
page read and write
9CB4000
heap
page read and write
A0CC000
heap
page read and write
11F0000
heap
page read and write
1180000
unkown
page read and write
5EE000
heap
page read and write
38B0000
trusted library allocation
page read and write
154B000
heap
page read and write
1EE0000
heap
page read and write
5E7000
heap
page read and write
3380000
unkown
page read and write
31EE000
stack
page read and write
10E0000
unkown
page read and write
5EE000
heap
page read and write
8900000
unkown
page read and write
5EE000
heap
page read and write
C625000
unkown
page read and write
A167000
heap
page read and write
1180000
unkown
page read and write
1170000
heap
page read and write
5E7000
heap
page read and write
38C1000
trusted library allocation
page read and write
38DB000
trusted library allocation
page read and write
1039000
heap
page read and write
29DC000
heap
page execute and read and write
5890000
heap
page execute and read and write
9C89000
heap
page read and write
9BBB000
heap
page read and write
55C000
heap
page read and write
38D1000
trusted library allocation
page read and write
4AC0000
unkown
page read and write
5EE000
heap
page read and write
144C000
heap
page read and write
454000
unkown
page readonly
A14B000
heap
page read and write
1459000
heap
page read and write
1180000
unkown
page read and write
9CB9000
heap
page read and write
5EE000
heap
page read and write
145B000
heap
page read and write
5EE000
heap
page read and write
2A2A000
trusted library allocation
page read and write
408000
unkown
page readonly
7FF5D75FF000
unkown
page readonly
1590000
trusted library allocation
page read and write
A410000
heap
page read and write
1455000
heap
page read and write
C11000
trusted library allocation
page read and write
55F5000
trusted library allocation
page read and write
7FF5D716B000
unkown
page readonly
2730000
heap
page read and write
27A7000
trusted library allocation
page read and write
B0BD000
stack
page read and write
5580000
trusted library allocation
page read and write
1434000
trusted library allocation
page read and write
9CB6000
heap
page read and write
F78000
heap
page read and write
38F0000
trusted library allocation
page read and write
1504000
trusted library allocation
page read and write
38A1000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
145C000
heap
page read and write
11E5000
heap
page read and write
7FF5D71E6000
unkown
page readonly
5E7000
heap
page read and write
38CA000
trusted library allocation
page read and write
A081000
heap
page read and write
5E7000
heap
page read and write
F13000
heap
page read and write
38D1000
trusted library allocation
page read and write
1178000
heap
page read and write
C4E000
heap
page read and write
A0DD000
heap
page read and write
112B2000
unkown
page read and write
4AB0000
unkown
page read and write
8900000
unkown
page read and write
1453000
heap
page read and write
5E7000
heap
page read and write
38DA000
trusted library allocation
page read and write
A650000
heap
page read and write
390000
unkown
page readonly
8E4E000
stack
page read and write
1480000
trusted library allocation
page read and write
38B8000
trusted library allocation
page read and write
FF8000
heap
page read and write
38C1000
trusted library allocation
page read and write
A613000
heap
page read and write
7FF5D7760000
unkown
page readonly
485000
heap
page read and write
13A3000
heap
page read and write
1180000
unkown
page read and write
D80000
heap
page read and write
107B000
stack
page read and write
3331000
unkown
page read and write
A4DD000
heap
page read and write
5175000
trusted library allocation
page read and write
1027000
heap
page read and write
4E26000
trusted library allocation
page read and write
599E000
stack
page read and write
9F83000
heap
page read and write
1360000
trusted library allocation
page read and write
112B7000
unkown
page read and write
215E000
stack
page read and write
A0AF000
heap
page read and write
7FF5D71AF000
unkown
page readonly
271E000
stack
page read and write
9CA8000
heap
page read and write
9AF9000
unkown
page read and write
9B91000
unkown
page read and write
A5E2000
heap
page read and write
43B0000
heap
page read and write
A589000
heap
page read and write
1453000
heap
page read and write
374F000
stack
page read and write
38B0000
trusted library allocation
page read and write
539E000
stack
page read and write
145B000
heap
page read and write
7DF4F2480000
unkown
page readonly
9B80000
heap
page read and write
98FA000
heap
page read and write
9F04000
heap
page read and write
98CF000
heap
page read and write
470000
heap
page read and write
A4A2000
heap
page read and write
9B2C000
unkown
page read and write
13C9000
heap
page read and write
434000
unkown
page read and write
9D95000
heap
page read and write
13AE000
heap
page read and write
5E7000
heap
page read and write
9C69000
heap
page read and write
13D5000
heap
page read and write
1376000
heap
page read and write
7FF5D72FB000
unkown
page readonly
38D7000
trusted library allocation
page read and write
9C80000
heap
page read and write
3024000
trusted library allocation
page read and write
AA0A000
unkown
page read and write
5551000
trusted library allocation
page read and write
2EA1000
unkown
page read and write
144E000
heap
page read and write
144C000
heap
page read and write
1430000
trusted library allocation
page read and write
A71A000
heap
page read and write
1180000
unkown
page read and write
50CA000
trusted library allocation
page read and write
38F7000
trusted library allocation
page read and write
9C4F000
heap
page read and write
A70000
trusted library allocation
page read and write
7611000
unkown
page read and write
5E7000
heap
page read and write
5EE000
heap
page read and write
C609000
unkown
page read and write
8900000
unkown
page read and write
3380000
unkown
page read and write
2720000
heap
page read and write
2DB5000
trusted library allocation
page read and write
143D000
heap
page read and write
391D000
trusted library allocation
page read and write
FBF000
stack
page read and write
35D5000
unkown
page read and write
9CB0000
heap
page read and write
5047000
trusted library allocation
page read and write
7440000
unkown
page read and write
143A000
heap
page read and write
5EE000
heap
page read and write
9ABD000
unkown
page read and write
38D1000
trusted library allocation
page read and write
274E000
stack
page read and write
137A000
heap
page read and write
13A9000
heap
page read and write
98E5000
heap
page read and write
3400000
unkown
page read and write
A62F000
heap
page read and write
5E7000
heap
page read and write
7DF4F2461000
unkown
page execute read
10CF000
stack
page read and write
87A0000
unkown
page read and write
524F000
stack
page read and write
9911000
heap
page read and write
A310000
heap
page read and write
B7DC000
stack
page read and write
A55E000
heap
page read and write
8900000
unkown
page read and write
AE1D000
stack
page read and write
2951000
trusted library allocation
page read and write
5EE000
heap
page read and write
5EE000
heap
page read and write
820000
unkown
page readonly
1260000
unkown
page read and write
1320000
heap
page read and write
A9FD000
unkown
page read and write
10E0000
unkown
page read and write
7FF5D766E000
unkown
page readonly
5EE000
heap
page read and write
7FF5D74FA000
unkown
page readonly
5EE000
heap
page read and write
5EE000
heap
page read and write
5EE000
heap
page read and write
5479000
unkown
page read and write
9DBB000
heap
page read and write
7FF5D769E000
unkown
page readonly
9CAA000
heap
page read and write
9CBE000
heap
page read and write
D28000
heap
page read and write
E77F000
unkown
page read and write
142F000
heap
page read and write
3380000
unkown
page read and write
35C1000
unkown
page read and write
8900000
unkown
page read and write
C98000
heap
page read and write
13B0000
heap
page read and write
142E000
heap
page read and write
4A12000
unkown
page read and write
5EE000
heap
page read and write
9C58000
heap
page read and write
A1EF000
heap
page read and write
7FF5D75B3000
unkown
page readonly
9CB4000
heap
page read and write
1F0000
heap
page read and write
A206000
heap
page read and write
1760000
trusted library allocation
page read and write
4B00000
unkown
page read and write
1432000
heap
page read and write
4DE000
stack
page read and write
15FE000
stack
page read and write
A4B1000
heap
page read and write
27A1000
trusted library allocation
page read and write
278B000
heap
page read and write
38F4000
trusted library allocation
page read and write
A35B000
heap
page read and write
563E000
stack
page read and write
8900000
unkown
page read and write
2900000
trusted library allocation
page read and write
CBC000
heap
page read and write
275E000
heap
page read and write
9EC2000
heap
page read and write
A0AA000
stack
page read and write
98F8000
heap
page read and write
2E0D000
stack
page read and write
9CBB000
heap
page read and write
144C000
heap
page read and write
4057000
trusted library allocation
page read and write
27D7000
trusted library allocation
page execute and read and write
1180000
unkown
page read and write
1465000
heap
page read and write
A273000
unkown
page read and write
A291000
heap
page read and write
C61D000
unkown
page read and write
F86000
stack
page read and write
A128000
heap
page read and write
7FF5D71EA000
unkown
page readonly
87A0000
unkown
page read and write
1260000
unkown
page read and write
408000
unkown
page readonly
2C0E000
stack
page read and write
610000
heap
page read and write
38B1000
trusted library allocation
page read and write
5330000
unkown
page write copy
9C98000
heap
page read and write
D90000
heap
page read and write
105A000
heap
page read and write
2D9E000
stack
page read and write
9DCD000
heap
page read and write
9279000
stack
page read and write
B50000
trusted library allocation
page read and write
7FF5D7360000
unkown
page readonly
11D0000
heap
page read and write
B97000
trusted library allocation
page execute and read and write
2AC4000
trusted library allocation
page read and write
7686000
unkown
page read and write
A649000
heap
page read and write
35C3000
unkown
page read and write
87A0000
unkown
page read and write
7FF5D77B9000
unkown
page readonly
10F6000
stack
page read and write
10E0000
unkown
page read and write
F5E000
stack
page read and write
1180000
unkown
page read and write
8900000
unkown
page read and write
A1C0000
heap
page read and write
98C8000
heap
page read and write
A4F8000
heap
page read and write
143C000
heap
page read and write
2E32000
trusted library allocation
page read and write
3A03000
trusted library allocation
page read and write
77DB000
unkown
page read and write
E10000
heap
page read and write
A9F000
heap
page read and write
DE6000
heap
page read and write
5161000
trusted library allocation
page read and write
145B000
heap
page read and write
901000
unkown
page execute read
4E79000
trusted library allocation
page read and write
391E000
trusted library allocation
page read and write
98F0000
heap
page read and write
B80000
trusted library allocation
page read and write
B30000
heap
page read and write
5EE000
heap
page read and write
8900000
unkown
page read and write
4D93000
trusted library allocation
page read and write
8DCB000
stack
page read and write
3626000
unkown
page read and write
9A9E000
unkown
page read and write
B330000
unkown
page read and write
38BA000
trusted library allocation
page read and write
144C000
heap
page read and write
4CE0000
trusted library allocation
page read and write
7DF4F2491000
unkown
page execute read
7FF5D779E000
unkown
page readonly
9CB2000
heap
page read and write
5A9E000
stack
page read and write
273B000
heap
page read and write
A341000
heap
page read and write
2E41000
trusted library allocation
page read and write
990D000
heap
page read and write
A0FC000
heap
page read and write
7FF5D7280000
unkown
page readonly
5EE000
heap
page read and write
5E7000
heap
page read and write
1180000
unkown
page read and write
E8E000
stack
page read and write
50F000
heap
page read and write
A3C3000
unkown
page read and write
521E000
stack
page read and write
A40D000
heap
page read and write
1510000
trusted library allocation
page read and write
9C98000
heap
page read and write
C663000
unkown
page read and write
5EE000
heap
page read and write
38C1000
trusted library allocation
page read and write
5290000
heap
page execute and read and write
7FF5D7691000
unkown
page readonly
1425000
heap
page read and write
2E3C000
trusted library allocation
page read and write
A2D9000
heap
page read and write
288E000
stack
page read and write
A2FA000
heap
page read and write
7FF5D76AF000
unkown
page readonly
5EE000
heap
page read and write
539E000
stack
page read and write
C87000
heap
page read and write
A529000
heap
page read and write
7FF5D7075000
unkown
page readonly
38A3000
trusted library allocation
page read and write
5E7000
heap
page read and write
13B5000
heap
page read and write
A139000
heap
page read and write
13FB000
heap
page read and write
5E1000
stack
page read and write
AF0000
heap
page read and write
A415000
heap
page read and write
A361000
heap
page read and write
3380000
unkown
page read and write
5EE000
heap
page read and write
9918000
heap
page read and write
9CA0000
heap
page read and write
4F0E000
stack
page read and write
10E0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
A186000
heap
page read and write
1455000
heap
page read and write
1380000
trusted library allocation
page read and write
5E7000
heap
page read and write
4E1E000
stack
page read and write
38D6000
trusted library allocation
page read and write
1200000
unkown
page read and write
7FF5D7837000
unkown
page readonly
1180000
unkown
page read and write
3A83000
trusted library allocation
page read and write
7FF5D7077000
unkown
page readonly
7FF5D778A000
unkown
page readonly
2E60000
trusted library allocation
page read and write
9C92000
heap
page read and write
2731000
heap
page read and write
A12C000
heap
page read and write
13B4000
heap
page read and write
A699000
heap
page read and write
142A000
heap
page read and write
8900000
unkown
page read and write
7435000
stack
page read and write
9CBD000
heap
page read and write
13B0000
heap
page read and write
B8DB000
stack
page read and write
3380000
unkown
page read and write
7FF5D7482000
unkown
page readonly
118F000
heap
page read and write
38C1000
trusted library allocation
page read and write
13CF000
heap
page read and write
7FF5D744E000
unkown
page readonly
5E7000
heap
page read and write
7FF5D7407000
unkown
page readonly
A3C3000
heap
page read and write
12E4000
heap
page read and write
A3CA000
heap
page read and write
38DB000
trusted library allocation
page read and write
7FF5D768B000
unkown
page readonly
2A4D000
stack
page read and write
1438000
heap
page read and write
FF0000
heap
page read and write
1245000
heap
page read and write
538E000
stack
page read and write
98C4000
heap
page read and write
5EE000
heap
page read and write
1386000
trusted library allocation
page execute and read and write
9D8C000
heap
page read and write
38B8000
trusted library allocation
page read and write
9CAE000
heap
page read and write
A61A000
heap
page read and write
87A0000
unkown
page read and write
9CC2000
heap
page read and write
293E000
stack
page read and write
151D000
trusted library allocation
page execute and read and write
A64000
trusted library allocation
page read and write
9DB6000
heap
page read and write
1180000
unkown
page read and write
4980000
unkown
page read and write
2A1B000
trusted library allocation
page read and write
75FD000
unkown
page read and write
7FF5D732D000
unkown
page readonly
2DF5000
trusted library allocation
page read and write
A47A000
heap
page read and write
145A000
heap
page read and write
5E7000
heap
page read and write
A286000
unkown
page read and write
1435000
heap
page read and write
4A40000
unkown
page read and write
7DC0000
unkown
page readonly
144E000
heap
page read and write
5E7000
heap
page read and write
A075000
heap
page read and write
4D01000
trusted library allocation
page read and write
7FF5D73F5000
unkown
page readonly
A043000
heap
page read and write
13A0000
unkown
page readonly
87A0000
unkown
page read and write
EF0000
heap
page read and write
D3C000
heap
page read and write
87A0000
unkown
page read and write
C5FD000
unkown
page read and write
2A28000
trusted library allocation
page read and write
7FF5D7593000
unkown
page readonly
2740000
trusted library allocation
page read and write
A2E9000
heap
page read and write
145B000
heap
page read and write
98C7000
heap
page read and write
7FF5D76F5000
unkown
page readonly
8B70000
unkown
page read and write
800000
unkown
page readonly
A5BA000
heap
page read and write
38D0000
trusted library allocation
page read and write
9CAE000
heap
page read and write
1353000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
550000
heap
page read and write
1680000
heap
page read and write
28E7000
trusted library allocation
page execute and read and write
4380000
heap
page read and write
3120000
unkown
page read and write
9BD1000
heap
page read and write
9CAC000
heap
page read and write
28E5000
trusted library allocation
page read and write
E77B000
unkown
page read and write
A56C000
heap
page read and write
9D71000
heap
page read and write
5E7000
heap
page read and write
B0E0000
unkown
page readonly
A671000
heap
page read and write
8900000
unkown
page read and write
1180000
unkown
page read and write
C450000
unkown
page read and write
A162000
heap
page read and write
5E7000
heap
page read and write
38E0000
trusted library allocation
page read and write
7D3E000
stack
page read and write
A607000
heap
page read and write
A0D2000
heap
page read and write
3959000
trusted library allocation
page read and write
12C0000
heap
page read and write
2A5F000
stack
page read and write
5EE000
heap
page read and write
10674000
unkown
page read and write
40A000
unkown
page read and write
5EE000
heap
page read and write
5534000
trusted library allocation
page read and write
9B89000
unkown
page read and write
5E7000
heap
page read and write
5E7000
heap
page read and write
1450000
heap
page read and write
87A0000
unkown
page read and write
2DDE000
trusted library allocation
page read and write
87A0000
unkown
page read and write
9BB7000
heap
page read and write
1740000
trusted library allocation
page read and write
A0E000
stack
page read and write
87A0000
unkown
page read and write
144C000
heap
page read and write
143D000
trusted library allocation
page execute and read and write
1200000
heap
page read and write
5EE000
heap
page read and write
2708000
unkown
page readonly
5EE000
heap
page read and write
87A0000
unkown
page read and write
7FF5D75BF000
unkown
page readonly
A351000
heap
page read and write
9CA9000
heap
page read and write
2F2E000
stack
page read and write
1436000
heap
page read and write
2A50000
trusted library allocation
page read and write
2DC6000
trusted library allocation
page read and write
306E000
stack
page read and write
C5F0000
unkown
page read and write
7FF5D771A000
unkown
page readonly
9C94000
heap
page read and write
EBE000
stack
page read and write
7C90000
unkown
page read and write
A65E000
heap
page read and write
A40E000
unkown
page read and write
9DC7000
heap
page read and write
A15000
heap
page read and write
9C89000
heap
page read and write
9CB0000
heap
page read and write
38E7000
trusted library allocation
page read and write
5591000
trusted library allocation
page read and write
E37000
trusted library allocation
page execute and read and write
1180000
unkown
page read and write
7DF4F2470000
unkown
page readonly
7FF5D705D000
unkown
page readonly
A0E9000
heap
page read and write
8900000
unkown
page read and write
9D0000
heap
page read and write
38B1000
trusted library allocation
page read and write
1180000
unkown
page read and write
5536000
trusted library allocation
page read and write
13E0000
heap
page read and write
38E9000
trusted library allocation
page read and write
7FF5D7523000
unkown
page readonly
2EB7000
trusted library allocation
page read and write
A218000
heap
page read and write
AA01000
unkown
page read and write
27A3000
trusted library allocation
page execute and read and write
391C000
trusted library allocation
page read and write
8B70000
unkown
page read and write
1F4000
heap
page read and write
7FF5D6BE4000
unkown
page readonly
27F0000
heap
page read and write
5E7000
heap
page read and write
10E0000
unkown
page read and write
B54000
trusted library allocation
page read and write
B4D0000
unkown
page readonly
5E7000
heap
page read and write
1180000
unkown
page read and write
11E0000
trusted library allocation
page read and write
39CB000
trusted library allocation
page read and write
A4B4000
heap
page read and write
38C4000
trusted library allocation
page read and write
9A90000
unkown
page read and write
1437000
heap
page read and write
A66A000
heap
page read and write
1180000
unkown
page read and write
1F0000
heap
page read and write
19A000
stack
page read and write
25EE000
stack
page read and write
A591000
heap
page read and write
38E7000
trusted library allocation
page read and write
A475000
heap
page read and write
A0C0000
heap
page read and write
4D22000
trusted library allocation
page read and write
549E000
stack
page read and write
5870000
heap
page execute and read and write
A396000
heap
page read and write
38C1000
trusted library allocation
page read and write
7FF5D77F7000
unkown
page readonly
13D0000
heap
page read and write
3901000
trusted library allocation
page read and write
A605000
heap
page read and write
A1C5000
heap
page read and write
272D000
stack
page read and write
1180000
unkown
page read and write
13AE000
heap
page read and write
E772000
unkown
page read and write
38FE000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
5EE000
heap
page read and write
98D1000
heap
page read and write
5EE000
heap
page read and write
BC0000
trusted library allocation
page read and write
13F1000
heap
page read and write
38D6000
trusted library allocation
page read and write
7FF5D72C8000
unkown
page readonly
1107000
trusted library allocation
page execute and read and write
A1E8000
heap
page read and write
7FF5D7404000
unkown
page readonly
145A000
trusted library allocation
page execute and read and write
5EE000
heap
page read and write
C78A000
unkown
page read and write
87A0000
unkown
page read and write
A586000
heap
page read and write
9CCC000
heap
page read and write
98C6000
heap
page read and write
9C89000
heap
page read and write
5B5E000
stack
page read and write
10E0000
unkown
page read and write
423E000
stack
page read and write
13E1000
heap
page read and write
9CA5000
heap
page read and write
7FF5D723F000
unkown
page readonly
142E000
heap
page read and write
7AF1000
unkown
page read and write
355F000
stack
page read and write
7FF5D7740000
unkown
page readonly
E774000
unkown
page read and write
C1CC000
stack
page read and write
5EE000
heap
page read and write
900000
unkown
page readonly
5EE000
heap
page read and write
5EE000
heap
page read and write
5E7000
heap
page read and write
E771000
unkown
page read and write
1426000
heap
page read and write
A2BA000
heap
page read and write
10FCF000
unkown
page read and write
98CC000
heap
page read and write
42A000
unkown
page read and write
9CBD000
heap
page read and write
A2B5000
unkown
page read and write
89CA000
unkown
page read and write
9908000
heap
page read and write
7DF4F2460000
unkown
page readonly
11F0000
trusted library allocation
page read and write
7FF5D6ABD000
unkown
page readonly
98C000
unkown
page readonly
3CB0000
heap
page read and write
A523000
heap
page read and write
9C97000
heap
page read and write
10F0000
trusted library allocation
page read and write
11CD000
trusted library allocation
page execute and read and write
8900000
unkown
page read and write
9CBE000
heap
page read and write
5E5000
heap
page read and write
C44F000
stack
page read and write
5EE000
heap
page read and write
13AE000
heap
page read and write
1437000
heap
page read and write
5EE000
heap
page read and write
38B0000
trusted library allocation
page read and write
362D000
unkown
page read and write
4391000
heap
page read and write
143A000
heap
page read and write
1180000
unkown
page read and write
1782000
trusted library allocation
page read and write
29CA000
heap
page read and write
87A0000
unkown
page read and write
7FF5D720F000
unkown
page readonly
A4EB000
heap
page read and write
1180000
unkown
page read and write
9B0000
heap
page read and write
7C80000
unkown
page read and write
C7C6000
unkown
page read and write
A28D000
heap
page read and write
C605000
unkown
page read and write
A3F4000
heap
page read and write
8900000
unkown
page read and write
89BC000
stack
page read and write
A8C000
heap
page read and write
9BC1000
heap
page read and write
1180000
unkown
page read and write
3051000
trusted library allocation
page read and write
DB0000
heap
page read and write
2DCB000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
9D9D000
heap
page read and write
5E7000
heap
page read and write
4986000
unkown
page read and write
5EE000
heap
page read and write
5EE000
heap
page read and write
E60000
trusted library allocation
page read and write
7654000
unkown
page read and write
11C0000
trusted library allocation
page read and write
7FF5D76CD000
unkown
page readonly
A3EA000
heap
page read and write
5034000
trusted library allocation
page read and write
38A1000
trusted library allocation
page read and write
38B0000
trusted library allocation
page read and write
7FF5D75DF000
unkown
page readonly
E778000
unkown
page read and write
A5AE000
heap
page read and write
38B9000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
A551000
heap
page read and write
8900000
unkown
page read and write
8900000
unkown
page read and write
1450000
heap
page read and write
5EE000
heap
page read and write
1621000
trusted library allocation
page read and write
5E7000
heap
page read and write
112BE000
unkown
page read and write
A32000
heap
page read and write
38A7000
trusted library allocation
page read and write
A177000
heap
page read and write
106FB000
unkown
page read and write
9C89000
heap
page read and write
1340000
trusted library allocation
page read and write
9D67000
unkown
page read and write
7E60000
unkown
page read and write
A034000
heap
page read and write
BB10000
heap
page read and write
DA7000
heap
page read and write
87A0000
unkown
page read and write
19D000
stack
page read and write
8B70000
unkown
page read and write
9CB1000
heap
page read and write
1180000
unkown
page read and write
5EE000
heap
page read and write
3D5C000
trusted library allocation
page read and write
D3F000
stack
page read and write
2750000
heap
page read and write
A3FD000
heap
page read and write
A416000
unkown
page read and write
9C8F000
heap
page read and write
9F0000
heap
page read and write
C615000
unkown
page read and write
13CF000
heap
page read and write
3380000
unkown
page read and write
137E000
heap
page read and write
5E7000
heap
page read and write
98A000
unkown
page write copy
1180000
unkown
page read and write
12C0000
heap
page read and write
A494000
heap
page read and write
5EE000
heap
page read and write
408000
unkown
page readonly
122B000
heap
page read and write
843F000
stack
page read and write
7FF5D69BB000
unkown
page readonly
7FF5D77DD000
unkown
page readonly
38A2000
trusted library allocation
page read and write
7FF5D7425000
unkown
page readonly
E77D000
unkown
page read and write
13A3000
heap
page read and write
27D0000
trusted library allocation
page read and write
2EBF000
trusted library allocation
page read and write
A691000
heap
page read and write
87A0000
unkown
page read and write
12C0000
trusted library allocation
page execute and read and write
A3D7000
heap
page read and write
A0E2000
heap
page read and write
A233000
unkown
page read and write
1455000
heap
page read and write
5EE000
heap
page read and write
7FF5D77A4000
unkown
page readonly
2A36000
trusted library allocation
page read and write
8900000
unkown
page read and write
A565000
heap
page read and write
1180000
unkown
page read and write
50F000
heap
page read and write
1180000
unkown
page read and write
3959000
trusted library allocation
page read and write
29CE000
heap
page read and write
DE0000
heap
page read and write
38B0000
trusted library allocation
page read and write
41B000
unkown
page read and write
2AB5000
trusted library allocation
page read and write
9CD7000
heap
page read and write
9CB6000
heap
page read and write
55A0000
heap
page read and write
1057000
heap
page read and write
5E7000
heap
page read and write
979000
unkown
page readonly
29B0000
trusted library allocation
page execute and read and write
B53000
trusted library allocation
page execute and read and write
1383000
heap
page read and write
8900000
unkown
page read and write
28E5000
trusted library allocation
page execute and read and write
9C96000
heap
page read and write
298C000
stack
page read and write
7B00000
unkown
page readonly
1437000
heap
page read and write
11DF000
unkown
page read and write
27CA000
trusted library allocation
page execute and read and write
38D9000
trusted library allocation
page read and write
E97000
heap
page read and write
38DE000
trusted library allocation
page read and write
570000
heap
page read and write
E77E000
unkown
page read and write
75E0000
unkown
page read and write
38E9000
trusted library allocation
page read and write
E69000
heap
page read and write
9CB8000
heap
page read and write
3CC2000
trusted library allocation
page read and write
5E7000
heap
page read and write
AAC3000
heap
page read and write
30C0000
remote allocation
page read and write
38BA000
trusted library allocation
page read and write
98D8000
heap
page read and write
7460000
unkown
page read and write
7FF5D7797000
unkown
page readonly
98D4000
heap
page read and write
28E0000
trusted library allocation
page read and write
7FF5D7284000
unkown
page readonly
4E30000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
A620000
heap
page read and write
2A16000
trusted library allocation
page read and write
9FD000
heap
page read and write
9BAD000
unkown
page read and write
9B88000
heap
page read and write
C40000
heap
page read and write
38C1000
trusted library allocation
page read and write
1398000
heap
page read and write
5E7000
heap
page read and write
A6D000
trusted library allocation
page execute and read and write
9FAF000
stack
page read and write
119E000
stack
page read and write
38C1000
trusted library allocation
page read and write
7B60000
unkown
page readonly
1180000
unkown
page read and write
27BD000
trusted library allocation
page execute and read and write
A072000
heap
page read and write
38B1000
trusted library allocation
page read and write
9C88000
heap
page read and write
5E7000
heap
page read and write
7FF5D75AF000
unkown
page readonly
A5B7000
heap
page read and write
D7D000
stack
page read and write
5557000
trusted library allocation
page read and write
5EE000
heap
page read and write
1235000
heap
page read and write
1340000
unkown
page read and write
38B0000
trusted library allocation
page read and write
454000
unkown
page readonly
38F5000
trusted library allocation
page read and write
1075000
heap
page read and write
C61B000
unkown
page read and write
15F7000
heap
page read and write
5EE000
heap
page read and write
5EE000
heap
page read and write
50C0000
trusted library allocation
page read and write
7FF5D7792000
unkown
page readonly
1592000
trusted library allocation
page read and write
A156000
heap
page read and write
4F7F000
stack
page read and write
D60000
heap
page read and write
BEA0000
unkown
page readonly
9A76000
unkown
page read and write
1453000
heap
page read and write
C800000
unkown
page read and write
9A92000
unkown
page read and write
38AD000
trusted library allocation
page read and write
C035000
stack
page read and write
1532000
trusted library allocation
page read and write
1F3E000
stack
page read and write
5265000
trusted library allocation
page read and write
38E0000
trusted library allocation
page read and write
1360000
unkown
page readonly
4EC000
stack
page read and write
768E000
unkown
page read and write
39B2000
trusted library allocation
page read and write
AEE000
stack
page read and write
146B000
trusted library allocation
page execute and read and write
1116000
heap
page read and write
1203000
heap
page read and write
8900000
unkown
page read and write
E777000
unkown
page read and write
145B000
heap
page read and write
5E7000
heap
page read and write
40A000
unkown
page write copy
1435000
heap
page read and write
A223000
heap
page read and write
9A6A000
unkown
page read and write
13D5000
heap
page read and write
75F8000
unkown
page read and write
5EE000
heap
page read and write
A11D000
heap
page read and write
E15000
heap
page read and write
FC0000
heap
page read and write
D4C000
heap
page read and write
A3AC000
unkown
page read and write
41B000
unkown
page write copy
35B5000
unkown
page read and write
390000
unkown
page readonly
8900000
unkown
page read and write
144C000
heap
page read and write
4390000
heap
page read and write
8900000
unkown
page read and write
A2A6000
heap
page read and write
31F0000
heap
page read and write
C621000
unkown
page read and write
A02B000
heap
page read and write
112B4000
unkown
page read and write
7FF5D7820000
unkown
page readonly
A0CA000
heap
page read and write
1528000
heap
page read and write
2761000
trusted library allocation
page read and write
98CD000
heap
page read and write
1465000
heap
page read and write
8900000
unkown
page read and write
145B000
heap
page read and write
167E000
stack
page read and write
7FF5D747F000
unkown
page readonly
C68000
heap
page read and write
C7E000
stack
page read and write
1203000
unkown
page read and write
446000
unkown
page readonly
325B000
stack
page read and write
E77A000
unkown
page read and write
C862000
unkown
page read and write
C472000
unkown
page read and write
1260000
unkown
page read and write
12D0000
unkown
page readonly
A63000
trusted library allocation
page execute and read and write
38C1000
trusted library allocation
page read and write
13B4000
heap
page read and write
4670000
heap
page read and write
5EE000
heap
page read and write
5EE000
heap
page read and write
2990000
heap
page read and write
1200000
unkown
page read and write
418000
unkown
page readonly
49D6000
unkown
page read and write
DE0000
heap
page read and write
7FF5D7458000
unkown
page readonly
10C0000
trusted library allocation
page read and write
9CAA000
heap
page read and write
50B0000
trusted library allocation
page read and write
C48B000
unkown
page read and write
7FF5D751F000
unkown
page readonly
4360000
direct allocation
page read and write
38D9000
trusted library allocation
page read and write
9CC9000
heap
page read and write
5E7000
heap
page read and write
9CB4000
heap
page read and write
38FC000
trusted library allocation
page read and write
A3E8000
heap
page read and write
1710000
heap
page read and write
1200000
unkown
page read and write
2E63000
trusted library allocation
page read and write
104D000
heap
page read and write
A3B5000
heap
page read and write
142E000
heap
page read and write
A43F000
heap
page read and write
A1C8000
heap
page read and write
112B5000
unkown
page read and write
2C50000
heap
page read and write
F60000
heap
page read and write
A2CD000
heap
page read and write
9BA000
heap
page read and write
1110000
heap
page read and write
30C0000
remote allocation
page read and write
5030000
trusted library allocation
page read and write
392D000
trusted library allocation
page read and write
5E7000
heap
page read and write
AA8000
heap
page read and write
38DA000
trusted library allocation
page read and write
E770000
unkown
page read and write
5EE000
heap
page read and write
98C4000
heap
page read and write
9C53000
heap
page read and write
145A000
heap
page read and write
558F000
trusted library allocation
page read and write
10D4000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
9C97000
heap
page read and write
5EE000
heap
page read and write
19A000
stack
page read and write
38E7000
trusted library allocation
page read and write
A17E000
heap
page read and write
3380000
unkown
page read and write
1180000
unkown
page read and write
408000
unkown
page readonly
1453000
heap
page read and write
5E7000
heap
page read and write
283E000
stack
page read and write
7FF5D7438000
unkown
page readonly
D60000
heap
page read and write
38B1000
trusted library allocation
page read and write
C65E000
unkown
page read and write
A539000
heap
page read and write
13F1000
heap
page read and write
204F000
stack
page read and write
A109000
heap
page read and write
2EBC000
trusted library allocation
page read and write
1180000
unkown
page read and write
10F9000
stack
page read and write
5565000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
AA92000
unkown
page read and write
87B000
stack
page read and write
5583000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
1180000
unkown
page read and write
5EE000
heap
page read and write
38A5000
trusted library allocation
page read and write
171F000
stack
page read and write
50D1000
trusted library allocation
page read and write
9A80000
unkown
page read and write
FB0000
trusted library allocation
page read and write
B0E000
stack
page read and write
A44A000
heap
page read and write
10789000
unkown
page read and write
98D1000
heap
page read and write
AFBE000
stack
page read and write
1436000
heap
page read and write
1440000
trusted library allocation
page read and write
35D3000
unkown
page read and write
9CAE000
heap
page read and write
A0FA000
heap
page read and write
13E3000
heap
page read and write
1440000
heap
page read and write
7FF5D7398000
unkown
page readonly
5E7000
heap
page read and write
470000
heap
page read and write
5E7000
heap
page read and write
1180000
unkown
page read and write
439000
unkown
page readonly
A00C000
heap
page read and write
A0B4000
heap
page read and write
9B000
stack
page read and write
258F000
stack
page read and write
9CC3000
heap
page read and write
11E3000
trusted library allocation
page execute and read and write
129C000
heap
page read and write
7FF5D7455000
unkown
page readonly
4D6000
heap
page read and write
5EE000
heap
page read and write
7FF5D7309000
unkown
page readonly
9CA8000
heap
page read and write
1395000
heap
page read and write
16E0000
heap
page read and write
A36C000
heap
page read and write
214F000
stack
page read and write
3A7B000
trusted library allocation
page read and write
9CD8000
heap
page read and write
5026000
trusted library allocation
page read and write
504F000
stack
page read and write
C80000
heap
page read and write
E65000
trusted library allocation
page read and write
F4F0000
unkown
page read and write
9BEB000
heap
page read and write
BE70000
unkown
page readonly
1465000
heap
page read and write
7FF5D7385000
unkown
page readonly
A3AB000
heap
page read and write
121F000
heap
page read and write
A380000
heap
page read and write
C5F4000
unkown
page read and write
9CB3000
heap
page read and write
A63F000
heap
page read and write
E26000
trusted library allocation
page execute and read and write
9AB4000
unkown
page read and write
112BB000
unkown
page read and write
FC0000
heap
page read and write
A5AC000
heap
page read and write
35CF000
unkown
page read and write
2DB0000
trusted library allocation
page read and write
2B7F000
stack
page read and write
B92000
trusted library allocation
page read and write
38DA000
trusted library allocation
page read and write
BA0000
heap
page read and write
2A14000
trusted library allocation
page read and write
A3D1000
heap
page read and write
1453000
heap
page read and write
1214000
heap
page read and write
35F4000
unkown
page read and write
112B8000
unkown
page read and write
7810000
unkown
page read and write
159E000
stack
page read and write
9C85000
heap
page read and write
553E000
trusted library allocation
page read and write
13A9000
heap
page read and write
38C4000
trusted library allocation
page read and write
13C0000
heap
page read and write
13CF000
heap
page read and write
2A45000
trusted library allocation
page read and write
38A0000
trusted library allocation
page read and write
5EE000
heap
page read and write
1390000
heap
page read and write
2E20000
trusted library allocation
page read and write
5C0000
heap
page read and write
8900000
unkown
page read and write
A3A1000
heap
page read and write
144C000
heap
page read and write
D19000
heap
page read and write
5E7000
heap
page read and write
1260000
unkown
page read and write
7FF5D7429000
unkown
page readonly
2A42000
trusted library allocation
page read and write
1180000
unkown
page read and write
1350000
unkown
page readonly
138A000
trusted library allocation
page execute and read and write
7FF5D7808000
unkown
page readonly
9C5C000
heap
page read and write
A46C000
heap
page read and write
A85000
heap
page read and write
AA8000
heap
page read and write
A452000
heap
page read and write
3E3000
unkown
page execute read
7FF5D77E0000
unkown
page readonly
A4A9000
heap
page read and write
9D7C000
heap
page read and write
21A0000
heap
page read and write
5E7000
heap
page read and write
38FD000
trusted library allocation
page read and write
98CF000
heap
page read and write
13DF000
heap
page read and write
A0A3000
heap
page read and write
A525000
heap
page read and write
830000
heap
page read and write
A5FF000
heap
page read and write
7FF5D74A6000
unkown
page readonly
8890000
unkown
page readonly
9CA8000
heap
page read and write
9C83000
heap
page read and write
5620000
unkown
page readonly
7FF5D7065000
unkown
page readonly
2AC6000
trusted library allocation
page read and write
B220000
unkown
page read and write
112B9000
unkown
page read and write
2CBE000
stack
page read and write
5E7000
heap
page read and write
5EE000
heap
page read and write
8900000
unkown
page read and write
98DD000
heap
page read and write
7631000
unkown
page read and write
8900000
unkown
page read and write
11A5000
heap
page read and write
7FF5D75F2000
unkown
page readonly
9CA6000
heap
page read and write
1597000
trusted library allocation
page execute and read and write
390D000
trusted library allocation
page read and write
4CD000
heap
page read and write
3AE7000
trusted library allocation
page read and write
14EE000
stack
page read and write
8C39000
stack
page read and write
9CB7000
heap
page read and write
5E61000
unkown
page readonly
13E3000
heap
page read and write
7DF4F2471000
unkown
page execute read
389E000
stack
page read and write
A07B000
heap
page read and write
13E1000
heap
page read and write
5E7000
heap
page read and write
A2B0000
heap
page read and write
E771000
unkown
page read and write
BB0D000
stack
page read and write
4350000
direct allocation
page read and write
1530000
trusted library allocation
page read and write
38DB000
trusted library allocation
page read and write
7FF5D75E9000
unkown
page readonly
A689000
heap
page read and write
13DF000
heap
page read and write
4D2C000
trusted library allocation
page read and write
29EA000
heap
page read and write
7FF5D745B000
unkown
page readonly
E90000
heap
page read and write
6C5000
unkown
page execute read
278E000
stack
page read and write
35BD000
unkown
page read and write
C5FA000
unkown
page read and write
A62C000
heap
page read and write
1249000
heap
page read and write
177A000
trusted library allocation
page execute and read and write
7FF5D710B000
unkown
page readonly
9CD8000
heap
page read and write
7FF5D719C000
unkown
page readonly
2F4E000
stack
page read and write
422000
unkown
page read and write
7FF5D77C7000
unkown
page readonly
E2A000
trusted library allocation
page execute and read and write
38D9000
trusted library allocation
page read and write
38D4000
trusted library allocation
page read and write
3140000
unkown
page read and write
391D000
trusted library allocation
page read and write
2F50000
remote allocation
page read and write
AAA000
heap
page read and write
1218000
heap
page read and write
5E7000
heap
page read and write
DB0000
heap
page execute and read and write
9CB0000
heap
page read and write
38B1000
trusted library allocation
page read and write
F4F000
stack
page read and write
A2A0000
heap
page read and write
283E000
stack
page read and write
A79000
heap
page read and write
2ED8000
trusted library allocation
page read and write
5EE000
heap
page read and write
5024000
trusted library allocation
page read and write
2F7E000
stack
page read and write
9C80000
heap
page read and write
145C000
heap
page read and write
CFF000
stack
page read and write
112B5000
unkown
page read and write
38D6000
trusted library allocation
page read and write
3380000
unkown
page read and write
A337000
heap
page read and write
7FF5D758D000
unkown
page readonly
335C000
stack
page read and write
3489000
stack
page read and write
9C38000
heap
page read and write
1462000
trusted library allocation
page read and write
145C000
heap
page read and write
9D6E000
heap
page read and write
1180000
unkown
page read and write
A02E000
stack
page read and write
5EE000
heap
page read and write
1180000
unkown
page read and write
3020000
trusted library allocation
page read and write
9DAC000
heap
page read and write
5E7000
heap
page read and write
9F46000
heap
page read and write
9CAD000
heap
page read and write
3BFF000
stack
page read and write
1180000
unkown
page read and write
1070000
heap
page read and write
E70000
heap
page read and write
96FE000
stack
page read and write
A2CF000
heap
page read and write
7FF5D77C2000
unkown
page readonly
E773000
unkown
page read and write
9CB5000
heap
page read and write
98CD000
heap
page read and write
9C80000
heap
page read and write
5EE000
heap
page read and write
A639000
heap
page read and write
A5D0000
heap
page read and write
3959000
trusted library allocation
page read and write
38BC000
trusted library allocation
page read and write
8900000
unkown
page read and write
7FF5D71F9000
unkown
page readonly
A0F8000
heap
page read and write
10D0000
trusted library allocation
page read and write
7FF5D76D5000
unkown
page readonly
87A0000
unkown
page read and write
38A6000
trusted library allocation
page read and write
13AE000
heap
page read and write
A01D000
heap
page read and write
7609000
unkown
page read and write
7FF5D723C000
unkown
page readonly
7FF5D71CC000
unkown
page readonly
460000
heap
page read and write
8A46000
unkown
page read and write
5EE000
heap
page read and write
A3A000
heap
page read and write
A562000
heap
page read and write
E77C000
unkown
page read and write
40A000
unkown
page write copy
295E000
stack
page read and write
1180000
unkown
page read and write
480000
heap
page read and write
1841000
trusted library allocation
page read and write
1847000
trusted library allocation
page read and write
2F0D000
stack
page read and write
5E7000
heap
page read and write
2ED7000
trusted library allocation
page read and write
8900000
unkown
page read and write
A28D000
unkown
page read and write
B70000
heap
page read and write
853B000
stack
page read and write
98F9000
heap
page read and write
C48000
heap
page read and write
7FF5D74B8000
unkown
page readonly
9969000
heap
page read and write
9BC3000
heap
page read and write
8900000
unkown
page read and write
A06B000
heap
page read and write
C7CB000
unkown
page read and write
C483000
unkown
page read and write
13A1000
heap
page read and write
38C1000
trusted library allocation
page read and write
7FF5D7267000
unkown
page readonly
4F00000
heap
page read and write
A50000
trusted library allocation
page read and write
41C7000
trusted library allocation
page read and write
5E7000
heap
page read and write
1627000
trusted library allocation
page read and write
41B000
unkown
page write copy
B25000
heap
page read and write
B9B000
trusted library allocation
page execute and read and write
A374000
heap
page read and write
582E000
stack
page read and write
7FF5D7236000
unkown
page readonly
5EE000
heap
page read and write
8900000
unkown
page read and write
9BB3000
heap
page read and write
28B4000
heap
page read and write
B77000
heap
page read and write
8ECC000
stack
page read and write
A029000
heap
page read and write
A677000
heap
page read and write
A457000
heap
page read and write
38EE000
trusted library allocation
page read and write
A51C000
heap
page read and write
5EE000
heap
page read and write
4DA0000
unkown
page readonly
5EE000
heap
page read and write
5EE000
heap
page read and write
13C0000
heap
page read and write
13DB000
heap
page read and write
4FA000
heap
page read and write
38AD000
trusted library allocation
page read and write
A462000
heap
page read and write
35E4000
unkown
page read and write
1555000
heap
page read and write
1440000
heap
page read and write
9CCB000
heap
page read and write
1459000
heap
page read and write
9CC9000
heap
page read and write
97FF000
stack
page read and write
49FA000
unkown
page read and write
9D81000
heap
page read and write
11C3000
trusted library allocation
page execute and read and write
9915000
heap
page read and write
5E7000
heap
page read and write
38C2000
trusted library allocation
page read and write
5E7000
heap
page read and write
98F5000
heap
page read and write
7FF5D71C8000
unkown
page readonly
A5BC000
heap
page read and write
C30000
heap
page read and write
1730000
heap
page read and write
39A0000
trusted library allocation
page read and write
9C9E000
heap
page read and write
A558000
heap
page read and write
2E70000
heap
page execute and read and write
A2D7000
heap
page read and write
4E70000
trusted library allocation
page read and write
1180000
unkown
page read and write
5E7000
heap
page read and write
A487000
heap
page read and write
A657000
heap
page read and write
1180000
unkown
page read and write
2901000
trusted library allocation
page read and write
9CB8000
heap
page read and write
A2D5000
heap
page read and write
A9DF000
unkown
page read and write
E0D000
trusted library allocation
page execute and read and write
38B8000
trusted library allocation
page read and write
C80000
heap
page read and write
A6A9000
heap
page read and write
9C03000
heap
page read and write
E90000
heap
page read and write
1750000
trusted library allocation
page read and write
CE8000
heap
page read and write
87A0000
unkown
page read and write
A642000
heap
page read and write
11ED000
trusted library allocation
page execute and read and write
7AA0000
unkown
page read and write
38C1000
trusted library allocation
page read and write
9FE5000
heap
page read and write
A45F000
heap
page read and write
1180000
unkown
page read and write
38D8000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
5EE000
heap
page read and write
87A0000
unkown
page read and write
9679000
stack
page read and write
1432000
heap
page read and write
8900000
unkown
page read and write
364E000
stack
page read and write
10734000
unkown
page read and write
5E7000
heap
page read and write
4CEE000
trusted library allocation
page read and write
87A0000
unkown
page read and write
2F61000
heap
page read and write
38E8000
trusted library allocation
page read and write
98FD000
heap
page read and write
2EC0000
unkown
page readonly
9C8B000
heap
page read and write
A2FF000
heap
page read and write
3160000
unkown
page read and write
27D2000
trusted library allocation
page read and write
A1AA000
heap
page read and write
30C0000
remote allocation
page read and write
A98000
heap
page read and write
7FF5CE33D000
unkown
page readonly
F553000
unkown
page read and write
38B0000
trusted library allocation
page read and write
5EE000
heap
page read and write
1180000
unkown
page read and write
E7E000
stack
page read and write
11E0000
heap
page read and write
E8B000
stack
page read and write
A220000
unkown
page read and write
4DE6000
unkown
page readonly
110D000
trusted library allocation
page execute and read and write
53E1000
unkown
page read and write
1200000
unkown
page read and write
E40000
heap
page read and write
9CC0000
heap
page read and write
87D0000
unkown
page read and write
9F69000
heap
page read and write
35D1000
unkown
page read and write
8900000
unkown
page read and write
1453000
heap
page read and write
27C6000
trusted library allocation
page execute and read and write
275A000
heap
page read and write
13C0000
heap
page read and write
112B2000
unkown
page read and write
A4C6000
heap
page read and write
4D1000
heap
page read and write
768C000
unkown
page read and write
1180000
unkown
page read and write
5180000
heap
page execute and read and write
1180000
unkown
page read and write
28A0000
heap
page read and write
7DD0000
heap
page read and write
DFE000
stack
page read and write
9CA1000
heap
page read and write
9CB0000
heap
page read and write
98A000
unkown
page read and write
5EE000
heap
page read and write
38C1000
trusted library allocation
page read and write
2A3D000
trusted library allocation
page read and write
87A0000
unkown
page read and write
7FF5D77A8000
unkown
page readonly
9FE8000
heap
page read and write
7691000
unkown
page read and write
1281000
unkown
page readonly
9F5A000
heap
page read and write
7FF5D7700000
unkown
page readonly
42E000
unkown
page readonly
1230000
trusted library allocation
page read and write
D88000
heap
page read and write
7FF5D7705000
unkown
page readonly
1180000
unkown
page read and write
5E7000
heap
page read and write
D65000
heap
page read and write
38B1000
trusted library allocation
page read and write
7FF5D764F000
unkown
page readonly
1610000
trusted library allocation
page execute and read and write
7FF5D77CD000
unkown
page readonly
42E000
unkown
page readonly
5EE000
heap
page read and write
A2C6000
heap
page read and write
13E3000
heap
page read and write
515C000
trusted library allocation
page read and write
35C9000
unkown
page read and write
38CE000
trusted library allocation
page read and write
38B8000
trusted library allocation
page read and write
CE0000
heap
page read and write
5EE000
heap
page read and write
3902000
trusted library allocation
page read and write
5E7000
heap
page read and write
B36000
heap
page read and write
3E87000
trusted library allocation
page read and write
1438000
heap
page read and write
1370000
heap
page read and write
C47F000
unkown
page read and write
98CD000
heap
page read and write
3931000
trusted library allocation
page read and write
A025000
heap
page read and write
7FF5D77E3000
unkown
page readonly
A3B9000
heap
page read and write
38A5000
trusted library allocation
page read and write
10634000
unkown
page read and write
1465000
heap
page read and write
9B90000
heap
page read and write
5E7000
heap
page read and write
CC9000
heap
page read and write
5E7000
heap
page read and write
C8DE000
unkown
page read and write
BFB8000
stack
page read and write
5EE000
heap
page read and write
9C0B000
heap
page read and write
CA4000
unkown
page readonly
E778000
unkown
page read and write
17A0000
trusted library allocation
page read and write
5155000
trusted library allocation
page read and write
9CD7000
heap
page read and write
5E7000
heap
page read and write
1230000
heap
page read and write
4D07000
trusted library allocation
page read and write
5EE000
heap
page read and write
7FF5D75EE000
unkown
page readonly
9C8E000
heap
page read and write
9CAB000
heap
page read and write
761E000
unkown
page read and write
5490000
heap
page execute and read and write
5E7000
heap
page read and write
27B0000
heap
page execute and read and write
2730000
trusted library allocation
page read and write
5E7000
heap
page read and write
A29A000
heap
page read and write
8900000
unkown
page read and write
AA8000
heap
page read and write
9C91000
heap
page read and write
1180000
unkown
page read and write
A105000
heap
page read and write
7FF5D7639000
unkown
page readonly
A54A000
heap
page read and write
E779000
unkown
page read and write
1180000
unkown
page read and write
A198000
heap
page read and write
5E0000
heap
page read and write
1456000
trusted library allocation
page execute and read and write
5E7000
heap
page read and write
7FF5D776F000
unkown
page readonly
E40000
heap
page read and write
144E000
heap
page read and write
39A1000
heap
page read and write
1237000
heap
page read and write
4340000
direct allocation
page execute and read and write
2BB1000
trusted library allocation
page read and write
4F7000
heap
page read and write
CF6000
stack
page read and write
1776000
trusted library allocation
page execute and read and write
98C8000
heap
page read and write
3363000
heap
page read and write
7FF5D748C000
unkown
page readonly
9C9D000
heap
page read and write
112B8000
unkown
page read and write
401000
unkown
page execute read
98D0000
heap
page read and write
9BC7000
heap
page read and write
12B5000
heap
page read and write
1440000
heap
page read and write
802000
unkown
page readonly
272F000
stack
page read and write
7FF5D7604000
unkown
page readonly
2DBF000
stack
page read and write
DAB000
heap
page read and write
1260000
unkown
page read and write
38C1000
trusted library allocation
page read and write
A0B2000
heap
page read and write
A4BF000
heap
page read and write
9CC1000
heap
page read and write
38A1000
trusted library allocation
page read and write
27AD000
trusted library allocation
page execute and read and write
1398000
heap
page read and write
9CD2000
heap
page read and write
124D000
heap
page read and write
7FF5D770F000
unkown
page readonly
5F0000
heap
page read and write
3761000
trusted library allocation
page read and write
7FF5D781A000
unkown
page readonly
8900000
unkown
page read and write
144C000
heap
page read and write
5E7000
heap
page read and write
50F000
heap
page read and write
A1E6000
heap
page read and write
D0C000
heap
page read and write
5EE000
heap
page read and write
1520000
trusted library allocation
page read and write
502B000
trusted library allocation
page read and write
C46F000
unkown
page read and write
7FF5D7215000
unkown
page readonly
5E7000
heap
page read and write
38B1000
trusted library allocation
page read and write
9A94000
unkown
page read and write
525E000
stack
page read and write
A194000
heap
page read and write
8900000
unkown
page read and write
9CA6000
heap
page read and write
5EE000
heap
page read and write
5263000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
422000
unkown
page read and write
9C8D000
heap
page read and write
2B7E000
stack
page read and write
401000
unkown
page execute read
8900000
unkown
page read and write
98CB000
heap
page read and write
38C2000
trusted library allocation
page read and write
8900000
unkown
page read and write
3530000
unkown
page read and write
A1AF000
stack
page read and write
131E000
stack
page read and write
3959000
trusted library allocation
page read and write
5EE000
heap
page read and write
7FF5D77DA000
unkown
page readonly
D3E000
stack
page read and write
38E7000
trusted library allocation
page read and write
554E000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
145A000
heap
page read and write
115E000
stack
page read and write
9C12000
heap
page read and write
513E000
stack
page read and write
144E000
heap
page read and write
38B1000
trusted library allocation
page read and write
840000
heap
page read and write
A1CE000
heap
page read and write
C10000
trusted library allocation
page execute and read and write
E7E000
stack
page read and write
A5A9000
heap
page read and write
7FF5D75B8000
unkown
page readonly
5EE000
heap
page read and write
5EE000
heap
page read and write
5260000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
112BB000
unkown
page read and write
1180000
unkown
page read and write
5E7000
heap
page read and write
5EE000
heap
page read and write
A39C000
unkown
page read and write
9CAD000
heap
page read and write
9A70000
heap
page read and write
153B000
trusted library allocation
page execute and read and write
E77D000
unkown
page read and write
A304000
heap
page read and write
E77D000
unkown
page read and write
433F000
stack
page read and write
7FF5D72D0000
unkown
page readonly
7FF5D6BDB000
unkown
page readonly
7FF5D72BD000
unkown
page readonly
1453000
heap
page read and write
3B1B000
trusted library allocation
page read and write
A145000
heap
page read and write
1180000
unkown
page read and write
C24E000
stack
page read and write
2E81000
trusted library allocation
page read and write
13D5000
heap
page read and write
3911000
trusted library allocation
page read and write
1787000
trusted library allocation
page execute and read and write
8900000
unkown
page read and write
BB9D000
stack
page read and write
A4BA000
heap
page read and write
A388000
heap
page read and write
5E7000
heap
page read and write
A18E000
heap
page read and write
9C8E000
heap
page read and write
A47C000
heap
page read and write
38B1000
trusted library allocation
page read and write
A09D000
heap
page read and write
98C000
unkown
page readonly
7FF5D7452000
unkown
page readonly
10DE000
stack
page read and write
38B8000
trusted library allocation
page read and write
A0E5000
heap
page read and write
9CA8000
heap
page read and write
7FF5D77EB000
unkown
page readonly
A36A000
heap
page read and write
D40000
heap
page read and write
5173000
trusted library allocation
page read and write
13DD000
heap
page read and write
A0A6000
heap
page read and write
13BC000
heap
page read and write
4CDF000
stack
page read and write
1420000
trusted library allocation
page read and write
A4FE000
heap
page read and write
A65B000
heap
page read and write
135D000
stack
page read and write
E74000
heap
page read and write
112B7000
unkown
page read and write
A1C000
heap
page read and write
A5FD000
heap
page read and write
1459000
heap
page read and write
9B9C000
heap
page read and write
A173000
heap
page read and write
7FF5D7784000
unkown
page readonly
87A0000
unkown
page read and write
1467000
trusted library allocation
page execute and read and write
144C000
heap
page read and write
13A0000
heap
page read and write
4EBE000
stack
page read and write
42A000
unkown
page read and write
B950000
unkown
page readonly
9CB8000
heap
page read and write
A80000
heap
page read and write
379E000
stack
page read and write
9F79000
heap
page read and write
127E000
stack
page read and write
7FF5D72D3000
unkown
page readonly
50C5000
trusted library allocation
page read and write
A5C8000
heap
page read and write
38C1000
trusted library allocation
page read and write
1770000
trusted library allocation
page read and write
E771000
unkown
page read and write
A594000
heap
page read and write
462000
unkown
page readonly
B4BF000
stack
page read and write
C50000
heap
page read and write
500F000
stack
page read and write
9CBC000
heap
page read and write
AAAB000
unkown
page read and write
38C1000
trusted library allocation
page read and write
AA93000
heap
page read and write
7AB0000
unkown
page read and write
942B000
stack
page read and write
33B0000
unkown
page readonly
A41A000
heap
page read and write
3110000
unkown
page readonly
A1FE000
heap
page read and write
15EE000
stack
page read and write
7FF5D72E9000
unkown
page readonly
8900000
unkown
page read and write
28C0000
trusted library allocation
page read and write
9A96000
unkown
page read and write
9D65000
heap
page read and write
4CE4000
trusted library allocation
page read and write
7FF5D7272000
unkown
page readonly
9EB0000
unkown
page readonly
13A9000
heap
page read and write
9AA0000
unkown
page read and write
5EE000
heap
page read and write
900000
unkown
page readonly
3310000
unkown
page read and write
A301000
heap
page read and write
1180000
unkown
page read and write
9CBB000
heap
page read and write
27A4000
trusted library allocation
page read and write
1434000
heap
page read and write
A23A000
unkown
page read and write
125E000
stack
page read and write
AAB000
heap
page read and write
9BF1000
heap
page read and write
A280000
heap
page read and write
144A000
heap
page read and write
A12F000
stack
page read and write
38A1000
trusted library allocation
page read and write
7FF5D77D2000
unkown
page readonly
13AE000
heap
page read and write
553E000
stack
page read and write
436000
unkown
page readonly
8D3C000
stack
page read and write
38A1000
trusted library allocation
page read and write
1180000
unkown
page read and write
A0E7000
heap
page read and write
38D3000
trusted library allocation
page read and write
9CA7000
heap
page read and write
A04E000
heap
page read and write
1830000
trusted library allocation
page execute and read and write
2A70000
heap
page read and write
C75000
heap
page read and write
9CB4000
heap
page read and write
CA4000
unkown
page readonly
2750000
heap
page read and write
5E7000
heap
page read and write
9CC9000
heap
page read and write
1ED0000
heap
page read and write
850000
heap
page read and write
A13B000
heap
page read and write
7FF5D749B000
unkown
page readonly
8900000
unkown
page read and write
2720000
trusted library allocation
page read and write
38BE000
trusted library allocation
page read and write
10E0000
unkown
page read and write
5EE000
heap
page read and write
87D0000
unkown
page read and write
5041000
trusted library allocation
page read and write
2E65000
trusted library allocation
page read and write
4E5000
heap
page read and write
112BF000
unkown
page read and write
13CF000
heap
page read and write
13B4000
heap
page read and write
136D000
trusted library allocation
page execute and read and write
98D2000
heap
page read and write
7FF5D7648000
unkown
page readonly
A289000
heap
page read and write
5EE000
heap
page read and write
112B3000
unkown
page read and write
9BBF000
heap
page read and write
2FBE000
stack
page read and write
29D0000
heap
page execute and read and write
A1F8000
heap
page read and write
F622000
heap
page read and write
5E7000
heap
page read and write
5E7000
heap
page read and write
110B000
trusted library allocation
page execute and read and write
5E7000
heap
page read and write
1260000
unkown
page read and write
2A90000
trusted library allocation
page read and write
46D4000
trusted library allocation
page read and write
7B80000
unkown
page readonly
98F3000
heap
page read and write
1180000
unkown
page read and write
A88000
heap
page read and write
A53D000
heap
page read and write
E771000
unkown
page read and write
8900000
unkown
page read and write
153F000
heap
page read and write
38B1000
trusted library allocation
page read and write
EF0000
heap
page read and write
12C0000
trusted library allocation
page read and write
A2EE000
heap
page read and write
98D6000
heap
page read and write
98C9000
heap
page read and write
7FF5D7396000
unkown
page readonly
13B4000
heap
page read and write
38C1000
trusted library allocation
page read and write
5E7000
heap
page read and write
1172000
stack
page read and write
FE0000
heap
page read and write
5E7000
heap
page read and write
5E7000
heap
page read and write
5E7000
heap
page read and write
7FF5D71E0000
unkown
page readonly
F8F000
heap
page read and write
1455000
heap
page read and write
B8A000
trusted library allocation
page execute and read and write
A32B000
heap
page read and write
9ADB000
unkown
page read and write
4EFE000
stack
page read and write
A20C000
heap
page read and write
3955000
trusted library allocation
page read and write
5E7000
heap
page read and write
5E7000
heap
page read and write
7FF5D776D000
unkown
page readonly
4A71000
unkown
page read and write
E32000
trusted library allocation
page read and write
C0BA000
stack
page read and write
528E000
stack
page read and write
12D7000
trusted library allocation
page read and write
3280000
unkown
page read and write
A099000
heap
page read and write
14CE000
stack
page read and write
2726000
trusted library allocation
page read and write
8F49000
stack
page read and write
13CF000
heap
page read and write
D00000
heap
page read and write
9901000
heap
page read and write
38C1000
trusted library allocation
page read and write
1465000
heap
page read and write
5EE000
heap
page read and write
38E4000
trusted library allocation
page read and write
A143000
heap
page read and write
1F40000
heap
page read and write
FF0000
unkown
page readonly
9CB8000
heap
page read and write
4D8E000
stack
page read and write
1180000
unkown
page read and write
45B000
unkown
page readonly
2FF9000
stack
page read and write
5293000
heap
page execute and read and write
5E7000
heap
page read and write
C642000
unkown
page read and write
45B000
unkown
page readonly
9D84000
heap
page read and write
1436000
heap
page read and write
9C000
stack
page read and write
AF6000
stack
page read and write
1110000
heap
page read and write
28DA000
trusted library allocation
page execute and read and write
29C0000
heap
page read and write
BE90000
unkown
page read and write
5E7000
heap
page read and write
8900000
unkown
page read and write
87A0000
unkown
page read and write
401000
unkown
page execute read
1210000
trusted library allocation
page read and write
1180000
unkown
page read and write
7FF5D7462000
unkown
page readonly
9D9B000
heap
page read and write
400000
unkown
page readonly
A251000
unkown
page read and write
DBB000
stack
page read and write
7637000
unkown
page read and write
13B0000
heap
page read and write
A030000
heap
page read and write
7FF5D7292000
unkown
page readonly
7FF5D7558000
unkown
page readonly
93CF000
heap
page read and write
1438000
heap
page read and write
38B1000
trusted library allocation
page read and write
5EE000
heap
page read and write
DEB000
stack
page read and write
5EE000
heap
page read and write
122F000
stack
page read and write
13B0000
heap
page read and write
8DA000
stack
page read and write
5EE000
heap
page read and write
99B0000
unkown
page read and write
5E7000
heap
page read and write
A17B000
heap
page read and write
1453000
heap
page read and write
503000
heap
page read and write
A88000
heap
page read and write
1537000
trusted library allocation
page execute and read and write
9C8E000
heap
page read and write
5EE000
heap
page read and write
A313000
unkown
page read and write
FA5000
heap
page read and write
144C000
heap
page read and write
7FF5D775C000
unkown
page readonly
3030000
unkown
page read and write
4A0E000
unkown
page read and write
144A000
heap
page read and write
4051000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
E3B000
trusted library allocation
page execute and read and write
AA8A000
heap
page read and write
A60000
trusted library allocation
page read and write
5E7000
heap
page read and write
7FF5D72DF000
unkown
page readonly
A541000
heap
page read and write
7FF5D72D7000
unkown
page readonly
A011000
heap
page read and write
135D000
trusted library allocation
page execute and read and write
8900000
unkown
page read and write
7FF5D7546000
unkown
page readonly
3E81000
trusted library allocation
page read and write
9AC3000
unkown
page read and write
7FF5D75CB000
unkown
page readonly
9A84000
unkown
page read and write
3170000
unkown
page read and write
5E7000
heap
page read and write
1731000
unkown
page readonly
5E7000
heap
page read and write
4BDE000
stack
page read and write
39A0000
heap
page read and write
7FF5D729E000
unkown
page readonly
A0D4000
heap
page read and write
A46E000
heap
page read and write
5E7000
heap
page read and write
10004000
unkown
page readonly
5EE000
heap
page read and write
4E2B000
trusted library allocation
page read and write
7FF5D7394000
unkown
page readonly
1180000
unkown
page read and write
9AB2000
unkown
page read and write
1436000
heap
page read and write
11BF000
stack
page read and write
A3A6000
heap
page read and write
2F60000
heap
page read and write
418000
unkown
page readonly
5E7000
heap
page read and write
5EE000
heap
page read and write
10CB1000
unkown
page read and write
5EE000
heap
page read and write
8900000
unkown
page read and write
294E000
stack
page read and write
38C1000
trusted library allocation
page read and write
41B000
unkown
page read and write
5EE000
heap
page read and write
E4CD000
stack
page read and write
7AE0000
unkown
page read and write
5170000
trusted library allocation
page read and write
6C5000
unkown
page execute read
3380000
unkown
page read and write
7FF5D74C3000
unkown
page readonly
2F51000
trusted library allocation
page read and write
9CA3000
heap
page read and write
A34D000
heap
page read and write
2DC4000
trusted library allocation
page read and write
1270000
unkown
page read and write
5E7000
heap
page read and write
11EA000
trusted library allocation
page execute and read and write
F53A000
unkown
page read and write
8F6000
stack
page read and write
28E2000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
A3F0000
heap
page read and write
5140000
trusted library allocation
page read and write
8900000
unkown
page read and write
9CAA000
heap
page read and write
8900000
unkown
page read and write
3201000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
A4F3000
heap
page read and write
1463000
heap
page read and write
C0E000
stack
page read and write
13CF000
heap
page read and write
1500000
heap
page read and write
9D13000
heap
page read and write
F70000
heap
page read and write
EF5000
heap
page read and write
7FF5D71C4000
unkown
page readonly
3360000
unkown
page read and write
35DC000
unkown
page read and write
A3B6000
unkown
page read and write
A2D3000
heap
page read and write
6C4000
unkown
page write copy
7FF5D774A000
unkown
page readonly
1180000
unkown
page read and write
A264000
unkown
page read and write
C30000
heap
page read and write
504000
heap
page read and write
9F76000
heap
page read and write
9CBA000
heap
page read and write
9B85000
unkown
page read and write
1780000
trusted library allocation
page read and write
9D78000
heap
page read and write
9578000
stack
page read and write
9D8A000
heap
page read and write
3A8B000
trusted library allocation
page read and write
1311000
trusted library allocation
page read and write
38DD000
trusted library allocation
page read and write
4BDE000
stack
page read and write
16DF000
stack
page read and write
9905000
heap
page read and write
9BE000
heap
page read and write
5E7000
heap
page read and write
6250000
unkown
page readonly
1180000
unkown
page read and write
1200000
unkown
page read and write
3E61000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
A404000
heap
page read and write
1460000
trusted library allocation
page read and write
B60000
heap
page read and write
8900000
unkown
page read and write
A5C1000
heap
page read and write
10002000
unkown
page readonly
FA7000
heap
page read and write
4DA2000
unkown
page readonly
7605000
unkown
page read and write
C4C6000
unkown
page read and write
3A4E000
trusted library allocation
page read and write
A07E000
heap
page read and write
1432000
heap
page read and write
28E0000
trusted library allocation
page read and write
11A7000
heap
page read and write
9CB6000
heap
page read and write
400000
unkown
page execute and read and write
7FF5D7376000
unkown
page readonly
5E7000
heap
page read and write
615000
heap
page read and write
13B5000
heap
page read and write
38B8000
trusted library allocation
page read and write
31FF000
stack
page read and write
9C80000
heap
page read and write
A84000
heap
page read and write
7FF5D7799000
unkown
page readonly
8360000
unkown
page read and write
A510000
heap
page read and write
2A31000
trusted library allocation
page read and write
1180000
unkown
page read and write
1260000
unkown
page read and write
1180000
unkown
page read and write
DDE000
stack
page read and write
2E19000
trusted library allocation
page read and write
9C4B000
heap
page read and write
A136000
heap
page read and write
A503000
heap
page read and write
A16A000
heap
page read and write
478000
heap
page read and write
30FB000
stack
page read and write
7FF5D706E000
unkown
page readonly
A090000
heap
page read and write
4A90000
unkown
page read and write
9E0F000
heap
page read and write
7B20000
unkown
page read and write
98C9000
heap
page read and write
FF7000
heap
page read and write
7FF5D75D9000
unkown
page readonly
1354000
trusted library allocation
page read and write
A371000
heap
page read and write
362A000
unkown
page read and write
A660000
heap
page read and write
9C84000
heap
page read and write
A334000
heap
page read and write
B03B000
stack
page read and write
5544000
trusted library allocation
page read and write
A182000
heap
page read and write
AA0F000
unkown
page read and write
1200000
unkown
page read and write
7FF5D7745000
unkown
page readonly
5E7000
heap
page read and write
38B1000
trusted library allocation
page read and write
2708000
unkown
page readonly
A391000
unkown
page read and write
A9E9000
unkown
page read and write
5EE000
heap
page read and write
35B3000
unkown
page read and write
5EE000
heap
page read and write
27F0000
trusted library allocation
page read and write
2BB7000
trusted library allocation
page read and write
5EE000
heap
page read and write
5463000
unkown
page read and write
436000
unkown
page readonly
5EE000
heap
page read and write
9AAA000
unkown
page read and write
5EE000
heap
page read and write
150D000
trusted library allocation
page execute and read and write
38C8000
trusted library allocation
page read and write
9CC7000
heap
page read and write
A088000
heap
page read and write
1754000
trusted library allocation
page read and write
9CAA000
heap
page read and write
C20000
trusted library allocation
page read and write
C908000
unkown
page read and write
9CAE000
heap
page read and write
30FE000
stack
page read and write
3901000
trusted library allocation
page read and write
54FE000
stack
page read and write
4D15000
trusted library allocation
page read and write
DFD000
trusted library allocation
page execute and read and write
5EE000
heap
page read and write
5EE000
heap
page read and write
9CCF000
heap
page read and write
E40000
heap
page read and write
15D0000
heap
page read and write
E77A000
unkown
page read and write
143B000
heap
page read and write
112BD000
unkown
page read and write
1500000
trusted library allocation
page read and write
9BE5000
heap
page read and write
10DD000
trusted library allocation
page execute and read and write
4571000
heap
page read and write
A3F9000
heap
page read and write
13DF000
heap
page read and write
98E1000
heap
page read and write
5E7000
heap
page read and write
11F2000
trusted library allocation
page read and write
7FF5D7694000
unkown
page readonly
9960000
heap
page read and write
35FA000
unkown
page read and write
38A8000
trusted library allocation
page read and write
5C60000
unclassified section
page readonly
C460000
unkown
page read and write
F536000
unkown
page read and write
1150000
heap
page read and write
5EE000
heap
page read and write
A209000
heap
page read and write
7FF5D7073000
unkown
page readonly
38DA000
trusted library allocation
page read and write
38E9000
trusted library allocation
page read and write
112B1000
unkown
page read and write
1180000
unkown
page read and write
5EE000
heap
page read and write
4D90000
trusted library allocation
page read and write
3070000
direct allocation
page read and write
A2A2000
heap
page read and write
1867000
heap
page read and write
98CF000
heap
page read and write
144A000
heap
page read and write
2A05000
trusted library allocation
page read and write
7FF5D72BF000
unkown
page readonly
11F0000
trusted library allocation
page read and write
5EE000
heap
page read and write
5E7000
heap
page read and write
38C7000
trusted library allocation
page read and write
7C31000
unkown
page read and write
A2C2000
heap
page read and write
7C70000
unkown
page readonly
40A000
unkown
page read and write
9CD1000
heap
page read and write
38A6000
trusted library allocation
page read and write
7FF5D7764000
unkown
page readonly
A1BB000
heap
page read and write
A070000
heap
page read and write
10001000
unkown
page execute read
5E7000
heap
page read and write
2E00000
trusted library allocation
page read and write
A445000
heap
page read and write
2A7F000
stack
page read and write
28D0000
trusted library allocation
page read and write
5EE000
heap
page read and write
9D46000
heap
page read and write
8900000
unkown
page read and write
9C96000
heap
page read and write
84BB000
stack
page read and write
9D75000
heap
page read and write
5E7000
heap
page read and write
5EE000
heap
page read and write
2BAF000
trusted library allocation
page read and write
1438000
heap
page read and write
5585000
trusted library allocation
page read and write
2940000
trusted library allocation
page execute and read and write
8900000
unkown
page read and write
106B3000
unkown
page read and write
13DF000
heap
page read and write
5E7000
heap
page read and write
7FF5D7257000
unkown
page readonly
C653000
unkown
page read and write
A2B4000
heap
page read and write
446000
unkown
page readonly
2A2E000
trusted library allocation
page read and write
C40000
heap
page read and write
A1DA000
heap
page read and write
A52D000
heap
page read and write
8900000
unkown
page read and write
38F5000
trusted library allocation
page read and write
1398000
heap
page read and write
1300000
trusted library allocation
page execute and read and write
1260000
unkown
page read and write
44B0000
heap
page read and write
145B000
heap
page read and write
2700000
trusted library allocation
page read and write
38F0000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
38D6000
trusted library allocation
page read and write
15A0000
trusted library allocation
page execute and read and write
102E000
stack
page read and write
7989000
stack
page read and write
A1B7000
heap
page read and write
106F6000
unkown
page read and write
144C000
heap
page read and write
B15000
heap
page read and write
1180000
unkown
page read and write
5060000
trusted library allocation
page read and write
A328000
heap
page read and write
9CB3000
heap
page read and write
11F7000
trusted library allocation
page execute and read and write
9CBF000
heap
page read and write
9CB5000
heap
page read and write
2F90000
heap
page read and write
395F000
trusted library allocation
page read and write
FFB000
heap
page read and write
870000
heap
page read and write
7FF5D75F9000
unkown
page readonly
BDC0000
unkown
page read and write
503E000
trusted library allocation
page read and write
C7BE000
unkown
page read and write
98E0000
heap
page read and write
112B7000
unkown
page read and write
8880000
unkown
page readonly
38AF000
trusted library allocation
page read and write
CA23000
unkown
page read and write
C62D000
unkown
page read and write
5EE000
heap
page read and write
5E7000
heap
page read and write
8900000
unkown
page read and write
9C9F000
heap
page read and write
EC0000
heap
page read and write
B85A000
stack
page read and write
8900000
unkown
page read and write
DF4000
trusted library allocation
page read and write
9B0B000
unkown
page read and write
1180000
unkown
page read and write
5E7000
heap
page read and write
7FF5D7589000
unkown
page readonly
4D95000
trusted library allocation
page read and write
7FF5D7485000
unkown
page readonly
10F0000
trusted library allocation
page read and write
7FF5D75F6000
unkown
page readonly
1180000
unkown
page read and write
1432000
heap
page read and write
2790000
trusted library allocation
page execute and read and write
5E7000
heap
page read and write
38CA000
trusted library allocation
page read and write
7FF5D774C000
unkown
page readonly
B97000
trusted library allocation
page execute and read and write
1435000
heap
page read and write
400000
unkown
page readonly
7FF5D760B000
unkown
page readonly
38AF000
trusted library allocation
page read and write
14E0000
heap
page read and write
7AC0000
unkown
page read and write
9C9A000
heap
page read and write
9CC0000
heap
page read and write
5EE000
heap
page read and write
B86000
trusted library allocation
page execute and read and write
901000
unkown
page execute read
28EB000
trusted library allocation
page execute and read and write
3901000
trusted library allocation
page read and write
1180000
unkown
page read and write
9CCE000
heap
page read and write
3CD000
unkown
page readonly
13A9000
heap
page read and write
2AD0000
heap
page execute and read and write
514E000
stack
page read and write
1200000
unkown
page read and write
A357000
heap
page read and write
2E04000
trusted library allocation
page read and write
A4C2000
heap
page read and write
98B000
unkown
page execute and read and write
2890000
direct allocation
page execute and read and write
95FB000
stack
page read and write
7FF5D77E9000
unkown
page readonly
8900000
unkown
page read and write
28CD000
trusted library allocation
page execute and read and write
CCE000
stack
page read and write
A298000
heap
page read and write
58B000
stack
page read and write
143D000
heap
page read and write
9D5C000
heap
page read and write
A3C6000
heap
page read and write
33F0000
unkown
page read and write
5EE000
heap
page read and write
E772000
unkown
page read and write
57EE000
stack
page read and write
9CC9000
heap
page read and write
5E7000
heap
page read and write
E22000
heap
page read and write
7FF5D6AB6000
unkown
page readonly
38B0000
trusted library allocation
page read and write
BD6000
stack
page read and write
145C000
heap
page read and write
1250000
unkown
page read and write
A164000
heap
page read and write
5E7000
heap
page read and write
28D2000
trusted library allocation
page read and write
1578000
heap
page read and write
5E7000
heap
page read and write
4E41000
trusted library allocation
page read and write
28BE000
stack
page read and write
9E2E000
stack
page read and write
4A16000
unkown
page read and write
5E7000
heap
page read and write
1200000
unkown
page read and write
A484000
heap
page read and write
91F0000
unkown
page readonly
1030000
heap
page read and write
51EE000
stack
page read and write
8900000
unkown
page read and write
1850000
heap
page execute and read and write
ADB000
stack
page read and write
13DB000
heap
page read and write
553B000
trusted library allocation
page read and write
FDE000
stack
page read and write
8A00000
unkown
page read and write
11E0000
trusted library allocation
page read and write
2A24000
trusted library allocation
page read and write
87A0000
unkown
page read and write
ED5000
heap
page read and write
A615000
heap
page read and write
A4D1000
heap
page read and write
38B1000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
38E9000
trusted library allocation
page read and write
A5C5000
heap
page read and write
5E7000
heap
page read and write
5EE000
heap
page read and write
9CB4000
heap
page read and write
1000000
heap
page read and write
10E0000
stack
page read and write
FC8000
heap
page read and write
7FF5D720A000
unkown
page readonly
A092000
heap
page read and write
5E7000
heap
page read and write
EB5000
stack
page read and write
10F6000
stack
page read and write
F620000
heap
page read and write
38B8000
trusted library allocation
page read and write
5E7000
heap
page read and write
143B000
heap
page read and write
1180000
unkown
page read and write
2EB1000
trusted library allocation
page read and write
27C0000
trusted library allocation
page read and write
2A1E000
trusted library allocation
page read and write
418000
unkown
page readonly
A346000
heap
page read and write
9A8E000
unkown
page read and write
112B2000
unkown
page read and write
A34D000
heap
page read and write
4F40000
heap
page execute and read and write
A596000
heap
page read and write
143A000
heap
page read and write
7FF5D7230000
unkown
page readonly
8900000
unkown
page read and write
A31B000
heap
page read and write
9D69000
heap
page read and write
98F3000
heap
page read and write
AA40000
unkown
page read and write
9BCE000
heap
page read and write
1609000
heap
page read and write
BFE000
stack
page read and write
1090000
heap
page read and write
4F7000
heap
page read and write
7FF5D77F0000
unkown
page readonly
DE0000
trusted library allocation
page read and write
8EB000
stack
page read and write
1435000
heap
page read and write
11C4000
trusted library allocation
page read and write
A19B000
heap
page read and write
FE0000
trusted library allocation
page read and write
9CB5000
heap
page read and write
2708000
unkown
page readonly
1180000
unkown
page read and write
38BF000
trusted library allocation
page read and write
391D000
trusted library allocation
page read and write
AA9E000
unkown
page read and write
38A3000
trusted library allocation
page read and write
C82000
heap
page read and write
2EDB000
trusted library allocation
page read and write
9A8C000
unkown
page read and write
98D5000
heap
page read and write
2A10000
trusted library allocation
page read and write
4370000
unclassified section
page read and write
143A000
heap
page read and write
4E34000
trusted library allocation
page read and write
FDF000
heap
page read and write
38DA000
trusted library allocation
page read and write
38D5000
trusted library allocation
page read and write
1180000
unkown
page read and write
A1AD000
heap
page read and write
49A8000
unkown
page read and write
9C8F000
heap
page read and write
7FF5D7391000
unkown
page readonly
DB7000
heap
page read and write
2EC2000
trusted library allocation
page read and write
1077B000
unkown
page read and write
7FF5D783B000
unkown
page readonly
19D000
stack
page read and write
ADB000
stack
page read and write
112BC000
unkown
page read and write
13B0000
heap
page read and write
A152000
heap
page read and write
38C5000
trusted library allocation
page read and write
13A1000
heap
page read and write
A2D7000
unkown
page read and write
7CB0000
unkown
page readonly
9C32000
heap
page read and write
C669000
unkown
page read and write
5E7000
heap
page read and write
38C0000
trusted library allocation
page read and write
29BF000
stack
page read and write
11A0000
heap
page read and write
1200000
unkown
page read and write
760F000
unkown
page read and write
A518000
heap
page read and write
4CDF000
stack
page read and write
13E1000
heap
page read and write
29C6000
trusted library allocation
page read and write
2A8E000
stack
page read and write
9CAA000
heap
page read and write
1180000
unkown
page read and write
2C80000
trusted library allocation
page read and write
8900000
unkown
page read and write
112B2000
unkown
page read and write
1455000
heap
page read and write
1208000
heap
page read and write
A43D000
heap
page read and write
E90000
heap
page read and write
5EE000
heap
page read and write
2F50000
remote allocation
page read and write
105F4000
unkown
page read and write
A10000
heap
page read and write
7FF5D7795000
unkown
page readonly
1180000
unkown
page read and write
A2E7000
heap
page read and write
DB5000
heap
page read and write
2A60000
trusted library allocation
page read and write
401000
unkown
page execute read
38C1000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
391E000
trusted library allocation
page read and write
A379000
heap
page read and write
5055000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
760D000
unkown
page read and write
55EE000
stack
page read and write
1180000
unkown
page read and write
7FF5D75D6000
unkown
page readonly
E30000
heap
page read and write
A12E000
heap
page read and write
1463000
heap
page read and write
A4D6000
heap
page read and write
7DF4F2481000
unkown
page execute read
4A9E000
stack
page read and write
7FF5D6BEF000
unkown
page readonly
9C80000
heap
page read and write
10E0000
unkown
page read and write
1440000
heap
page read and write
8900000
unkown
page read and write
2BD7000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
87D0000
unkown
page read and write
5E7000
heap
page read and write
A02E000
heap
page read and write
33C0000
unkown
page read and write
5EE000
heap
page read and write
515F000
trusted library allocation
page read and write
1433000
trusted library allocation
page execute and read and write
7FF5D71DA000
unkown
page readonly
98FF000
heap
page read and write
9CAF000
heap
page read and write
5B7E000
stack
page read and write
A555000
heap
page read and write
C5F8000
unkown
page read and write
9C8F000
heap
page read and write
7FF5D7202000
unkown
page readonly
3925000
trusted library allocation
page read and write
8900000
unkown
page read and write
112BD000
unkown
page read and write
1180000
unkown
page read and write
9A000
stack
page read and write
4380000
heap
page read and write
2F50000
remote allocation
page read and write
A3B9000
unkown
page read and write
9CD6000
heap
page read and write
A018000
heap
page read and write
5EE000
heap
page read and write
38E9000
trusted library allocation
page read and write
12CC000
heap
page read and write
38C1000
trusted library allocation
page read and write
435F000
stack
page read and write
9CB2000
heap
page read and write
28B0000
heap
page read and write
3955000
trusted library allocation
page read and write
7FF5D76D7000
unkown
page readonly
38C1000
trusted library allocation
page read and write
A0BD000
heap
page read and write
5EE000
heap
page read and write
3026000
trusted library allocation
page read and write
7FF5D76DA000
unkown
page readonly
C00000
trusted library allocation
page execute and read and write
7DBD000
stack
page read and write
A366000
heap
page read and write
140B000
heap
page read and write
B40000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
1440000
heap
page read and write
A123000
heap
page read and write
125B000
stack
page read and write
C8C1000
unkown
page read and write
1400000
heap
page read and write
1180000
unkown
page read and write
1753000
trusted library allocation
page execute and read and write
15B7000
trusted library allocation
page read and write
2F40000
heap
page read and write
3765000
trusted library allocation
page read and write
B92000
trusted library allocation
page read and write
28F0000
heap
page read and write
144C000
heap
page read and write
394E000
trusted library allocation
page read and write
2F4D000
stack
page read and write
50CC000
trusted library allocation
page read and write
A0BB000
heap
page read and write
5E7000
heap
page read and write
13C0000
heap
page read and write
D9F000
heap
page read and write
1206000
heap
page read and write
5E7000
heap
page read and write
A5A0000
heap
page read and write
5E7000
heap
page read and write
9FCA000
heap
page read and write
5EE000
heap
page read and write
12DB000
heap
page read and write
5E7000
heap
page read and write
5EE000
heap
page read and write
38DB000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
9AAC000
unkown
page read and write
5E7000
heap
page read and write
38F8000
trusted library allocation
page read and write
5EE000
heap
page read and write
4D31000
trusted library allocation
page read and write
7FF5D7752000
unkown
page readonly
144C000
heap
page read and write
38B1000
trusted library allocation
page read and write
4AA0000
unkown
page read and write
8DE000
stack
page read and write
8900000
unkown
page read and write
5E7000
heap
page read and write
979000
unkown
page readonly
A013000
heap
page read and write
A628000
heap
page read and write
5EE000
heap
page read and write
E77F000
unkown
page read and write
1200000
unkown
page read and write
144C000
heap
page read and write
F9B000
heap
page read and write
7DF4F24A1000
unkown
page execute read
7FF5D7591000
unkown
page readonly
2B81000
trusted library allocation
page read and write
87A0000
unkown
page read and write
8900000
unkown
page read and write
112B2000
unkown
page read and write
98D8000
heap
page read and write
A1E3000
heap
page read and write
400000
unkown
page execute and read and write
779E000
unkown
page read and write
27DB000
trusted library allocation
page execute and read and write
1150000
heap
page read and write
12E0000
trusted library allocation
page read and write
A4AC000
heap
page read and write
316F000
stack
page read and write
A2A2000
unkown
page read and write
38B0000
trusted library allocation
page read and write
9A72000
unkown
page read and write
14D0000
trusted library allocation
page execute and read and write
B10000
heap
page read and write
1700000
trusted library allocation
page read and write
A4B7000
heap
page read and write
1557000
heap
page read and write
3010000
trusted library allocation
page read and write
13FF000
stack
page read and write
5EE000
heap
page read and write
9902000
heap
page read and write
7FF5D7682000
unkown
page readonly
11D0000
trusted library allocation
page read and write
A33F000
unkown
page read and write
ED0000
heap
page read and write
2AE1000
trusted library allocation
page read and write
1180000
unkown
page read and write
5020000
trusted library allocation
page read and write
3500000
stack
page read and write
127E000
stack
page read and write
7FF5D7262000
unkown
page readonly
5EE000
heap
page read and write
28D6000
trusted library allocation
page execute and read and write
9C8D000
heap
page read and write
A3AA000
unkown
page read and write
7FF5D74F2000
unkown
page readonly
7FF5D748A000
unkown
page readonly
55F3000
trusted library allocation
page read and write
8900000
unkown
page read and write
7FF5D762F000
unkown
page readonly
98EA000
heap
page read and write
769A000
unkown
page read and write
3630000
unkown
page readonly
5EE000
heap
page read and write
9C8E000
heap
page read and write
8900000
unkown
page read and write
2F0C000
stack
page read and write
7FF5D765F000
unkown
page readonly
112BF000
unkown
page read and write
9CA3000
heap
page read and write
9CB6000
heap
page read and write
7FF5D71D7000
unkown
page readonly
276B000
heap
page execute and read and write
94AB000
stack
page read and write
7FF5D752F000
unkown
page readonly
86D0000
unkown
page readonly
6C4000
unkown
page read and write
112BC000
unkown
page read and write
1235000
heap
page read and write
7FF5D72CE000
unkown
page readonly
8900000
unkown
page read and write
5E7000
heap
page read and write
27B0000
trusted library allocation
page read and write
4CFE000
trusted library allocation
page read and write
2708000
unkown
page readonly
C4BD000
unkown
page read and write
1434000
heap
page read and write
38B5000
trusted library allocation
page read and write
BE49000
stack
page read and write
49BB000
unkown
page read and write
1260000
unkown
page read and write
2BCF000
stack
page read and write
3A53000
trusted library allocation
page read and write
A368000
heap
page read and write
E4A000
heap
page read and write
7693000
unkown
page read and write
1200000
unkown
page read and write
D40000
heap
page read and write
4CF4000
trusted library allocation
page read and write
1356000
stack
page read and write
38B0000
trusted library allocation
page read and write
7FF5D7289000
unkown
page readonly
9D03000
heap
page read and write
9D9F000
heap
page read and write
881F000
stack
page read and write
A610000
heap
page read and write
38C1000
trusted library allocation
page read and write
BD6000
stack
page read and write
5EE000
heap
page read and write
B8A000
trusted library allocation
page execute and read and write
13F2000
heap
page read and write
13E1000
heap
page read and write
38C1000
trusted library allocation
page read and write
A3D3000
heap
page read and write
5E7000
heap
page read and write
1439000
heap
page read and write
2EAF000
trusted library allocation
page read and write
1630000
heap
page execute and read and write
87A0000
unkown
page read and write
1260000
unkown
page read and write
142A000
heap
page read and write
A637000
heap
page read and write
5EE000
heap
page read and write
38AC000
trusted library allocation
page read and write
4F0000
heap
page read and write
5E0000
heap
page read and write
8900000
unkown
page read and write
5E7000
heap
page read and write
F9F000
stack
page read and write
1120000
heap
page read and write
C3CD000
stack
page read and write
13A3000
heap
page read and write
5EE000
heap
page read and write
1180000
unkown
page read and write
9CB0000
heap
page read and write
144C000
heap
page read and write
144C000
heap
page read and write
50E0000
heap
page read and write
462000
unkown
page readonly
3100000
unkown
page read and write
87A0000
unkown
page read and write
9CD6000
heap
page read and write
98C7000
heap
page read and write
4360000
unclassified section
page read and write
5E7000
heap
page read and write
17EE000
stack
page read and write
38E9000
trusted library allocation
page read and write
1438000
heap
page read and write
4E66000
trusted library allocation
page read and write
12BD000
heap
page read and write
5EE000
heap
page read and write
38A7000
trusted library allocation
page read and write
1317000
trusted library allocation
page read and write
7FF5D717C000
unkown
page readonly
9EC3000
heap
page read and write
5EE000
heap
page read and write
123C000
heap
page read and write
1180000
unkown
page read and write
C8C5000
unkown
page read and write
1210000
heap
page read and write
9B41000
unkown
page read and write
F0C000
heap
page read and write
A1F5000
heap
page read and write
12BC000
stack
page read and write
13B0000
heap
page read and write
8900000
unkown
page read and write
8900000
unkown
page read and write
13C0000
heap
page read and write
99C0000
unkown
page read and write
E774000
unkown
page read and write
13A9000
heap
page read and write
7FF5D77B6000
unkown
page readonly
AB0000
heap
page read and write
105D000
heap
page read and write
1453000
heap
page read and write
1103000
trusted library allocation
page execute and read and write
112B4000
unkown
page read and write
99B000
stack
page read and write
F521000
unkown
page read and write
7618000
unkown
page read and write
E10000
unkown
page readonly
5EE000
heap
page read and write
1431000
heap
page read and write
E778000
unkown
page read and write
5EE000
heap
page read and write
3520000
unkown
page readonly
1435000
heap
page read and write
418000
unkown
page readonly
A0A0000
heap
page read and write
515A000
trusted library allocation
page read and write
38B2000
trusted library allocation
page read and write
E77C000
unkown
page read and write
9C51000
heap
page read and write
12B0000
trusted library allocation
page read and write
12B0000
unkown
page read and write
10D3000
trusted library allocation
page execute and read and write
391D000
trusted library allocation
page read and write
145B000
heap
page read and write
9CC5000
heap
page read and write
7FF5D777A000
unkown
page readonly
A576000
heap
page read and write
4CE000
heap
page read and write
1200000
unkown
page read and write
28C0000
trusted library allocation
page read and write
5E7000
heap
page read and write
38D0000
trusted library allocation
page read and write
2A54000
trusted library allocation
page read and write
7FF5D7507000
unkown
page readonly
9CAF000
heap
page read and write
7FB000
stack
page read and write
8B70000
unkown
page read and write
2E1C000
trusted library allocation
page read and write
5EE000
heap
page read and write
8900000
unkown
page read and write
9C000
stack
page read and write
152A000
trusted library allocation
page execute and read and write
1104000
trusted library allocation
page read and write
9CBC000
heap
page read and write
144E000
heap
page read and write
9AA8000
unkown
page read and write
98C0000
heap
page read and write
A5F1000
heap
page read and write
C8DA000
unkown
page read and write
9C9E000
heap
page read and write
A670000
heap
page read and write
5E7000
heap
page read and write
5EE000
heap
page read and write
1180000
unkown
page read and write
86E0000
unkown
page readonly
40B000
unkown
page execute read
38B7000
trusted library allocation
page read and write
9D6000
stack
page read and write
5332000
unkown
page readonly
A408000
unkown
page read and write
15C0000
heap
page read and write
DF0000
trusted library allocation
page read and write
AB7000
heap
page read and write
1600000
heap
page read and write
A287000
heap
page read and write
156E000
stack
page read and write
7FF5D6A4B000
unkown
page readonly
A6A1000
heap
page read and write
A0D8000
heap
page read and write
C806000
unkown
page read and write
A4E4000
heap
page read and write
3040000
heap
page execute and read and write
559E000
stack
page read and write
A13E000
heap
page read and write
3D0000
unkown
page read and write
49FD000
unkown
page read and write
87A0000
unkown
page read and write
5EE000
heap
page read and write
391000
unkown
page execute read
85BE000
stack
page read and write
400000
unkown
page readonly
A3D9000
heap
page read and write
12BE000
stack
page read and write
A2F5000
heap
page read and write
50AE000
stack
page read and write
7FF5D75C1000
unkown
page readonly
35B0000
unkown
page read and write
1526000
trusted library allocation
page execute and read and write
5EE000
heap
page read and write
1390000
heap
page read and write
3955000
trusted library allocation
page read and write
10FA000
trusted library allocation
page execute and read and write
11FE000
stack
page read and write
3030000
trusted library allocation
page read and write
2C70000
heap
page read and write
C617000
unkown
page read and write
D80000
heap
page read and write
9F88000
heap
page read and write
4CA000
heap
page read and write
4CEB000
trusted library allocation
page read and write
10F6000
trusted library allocation
page execute and read and write
7FF5D7534000
unkown
page readonly
A19D000
heap
page read and write
8900000
unkown
page read and write
38E1000
trusted library allocation
page read and write
345E000
stack
page read and write
1102000
trusted library allocation
page read and write
38E7000
trusted library allocation
page read and write
A213000
heap
page read and write
A423000
heap
page read and write
39AC000
trusted library allocation
page read and write
F62A000
heap
page read and write
178B000
trusted library allocation
page execute and read and write
A654000
heap
page read and write
7FF5D772C000
unkown
page readonly
9C9E000
heap
page read and write
9BB0000
heap
page read and write
7FF5D77FD000
unkown
page readonly
5EE000
heap
page read and write
A1E1000
heap
page read and write
38C9000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
14DE000
stack
page read and write
98D6000
heap
page read and write
A8C000
heap
page read and write
A5F3000
heap
page read and write
38C1000
trusted library allocation
page read and write
7FF5D738E000
unkown
page readonly
38DC000
trusted library allocation
page read and write
2E85000
trusted library allocation
page read and write
BF3E000
stack
page read and write
38BE000
trusted library allocation
page read and write
5330000
unkown
page readonly
400000
unkown
page readonly
5E7000
heap
page read and write
7FF5D7641000
unkown
page readonly
7FF5D7669000
unkown
page readonly
4570000
heap
page read and write
B86000
trusted library allocation
page execute and read and write
5EE000
heap
page read and write
166E000
stack
page read and write
38C1000
trusted library allocation
page read and write
7FF5D7442000
unkown
page readonly
D3B000
stack
page read and write
9CB6000
heap
page read and write
A4A6000
heap
page read and write
A50A000
heap
page read and write
12AE000
stack
page read and write
87A0000
unkown
page read and write
1380000
heap
page read and write
2C4E000
stack
page read and write
99B3000
unkown
page read and write
8900000
unkown
page read and write
2E50000
heap
page execute and read and write
5183000
heap
page execute and read and write
7E58000
stack
page read and write
98DF000
heap
page read and write
1200000
heap
page read and write
87A0000
unkown
page read and write
11D5000
heap
page read and write
C90000
heap
page read and write
10000000
unkown
page readonly
B9B000
trusted library allocation
page execute and read and write
119B000
heap
page read and write
5E7000
heap
page read and write
38C1000
trusted library allocation
page read and write
38CA000
trusted library allocation
page read and write
A114000
heap
page read and write
7FF5D76E8000
unkown
page readonly
DC8000
heap
page read and write
7FF5D728E000
unkown
page readonly
5E7000
heap
page read and write
9BD9000
heap
page read and write
1438000
heap
page read and write
3767000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
5EE000
heap
page read and write
131E000
stack
page read and write
A1B5000
heap
page read and write
3E85000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
87A0000
unkown
page read and write
8900000
unkown
page read and write
A578000
heap
page read and write
B5D000
trusted library allocation
page execute and read and write
7B10000
unkown
page read and write
9C86000
heap
page read and write
38D1000
trusted library allocation
page read and write
5E7000
heap
page read and write
13DD000
heap
page read and write
1237000
heap
page read and write
15B1000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
A1A2000
heap
page read and write
A573000
heap
page read and write
262E000
stack
page read and write
10EB1000
unkown
page read and write
9C6F000
heap
page read and write
B980000
unkown
page readonly
A384000
unkown
page read and write
7FF5D7703000
unkown
page readonly
8CB8000
stack
page read and write
1278000
heap
page read and write
31AE000
stack
page read and write
A622000
heap
page read and write
7FF5D66E3000
unkown
page readonly
1860000
heap
page read and write
7FF5D7643000
unkown
page readonly
76F8000
unkown
page read and write
3901000
trusted library allocation
page read and write
2DE1000
trusted library allocation
page read and write
E10000
heap
page read and write
158F000
stack
page read and write
401000
unkown
page execute read
50CF000
trusted library allocation
page read and write
C73E000
unkown
page read and write
159B000
trusted library allocation
page execute and read and write
5EE000
heap
page read and write
8FD9000
stack
page read and write
3360000
unkown
page read and write
1156000
heap
page read and write
5E7000
heap
page read and write
7FF5D760E000
unkown
page readonly
38CA000
trusted library allocation
page read and write
1520000
heap
page read and write
AA04000
unkown
page read and write
A2C8000
heap
page read and write
F52D000
unkown
page read and write
391D000
trusted library allocation
page read and write
A431000
heap
page read and write
9D6B000
heap
page read and write
5EE000
heap
page read and write
A5CD000
heap
page read and write
7FF5D7722000
unkown
page readonly
760B000
unkown
page read and write
87A0000
unkown
page read and write
8900000
unkown
page read and write
E3E000
stack
page read and write
87D0000
unkown
page read and write
38B0000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
9C89000
heap
page read and write
2957000
trusted library allocation
page read and write
38B8000
trusted library allocation
page read and write
5690000
unkown
page readonly
145B000
heap
page read and write
F532000
unkown
page read and write
AAA000
heap
page read and write
1465000
heap
page read and write
3118000
trusted library allocation
page read and write
586E000
stack
page read and write
5EE000
heap
page read and write
1180000
unkown
page read and write
9E80000
heap
page read and write
9E9B000
heap
page read and write
485E000
stack
page read and write
4ECE000
stack
page read and write
3AFE000
stack
page read and write
2FFD000
stack
page read and write
1180000
unkown
page read and write
38BC000
trusted library allocation
page read and write
12D1000
trusted library allocation
page read and write
F530000
unkown
page read and write
2F61000
heap
page read and write
AAA000
heap
page read and write
38E8000
trusted library allocation
page read and write
9CA5000
heap
page read and write
38D8000
trusted library allocation
page read and write
4CE6000
trusted library allocation
page read and write
7FF5D7488000
unkown
page readonly
5E7000
heap
page read and write
9A98000
unkown
page read and write
2DCE000
trusted library allocation
page read and write
1393000
heap
page read and write
7FF5D76C8000
unkown
page readonly
976000
stack
page read and write
4D40000
heap
page read and write
11E6000
trusted library allocation
page execute and read and write
556E000
stack
page read and write
A4CC000
heap
page read and write
13A9000
heap
page read and write
1450000
trusted library allocation
page read and write
9CB9000
heap
page read and write
11FB000
trusted library allocation
page execute and read and write
5E7000
heap
page read and write
9CAB000
heap
page read and write
400000
unkown
page readonly
1299000
heap
page read and write
1180000
unkown
page read and write
A472000
heap
page read and write
7FF5D743F000
unkown
page readonly
A078000
heap
page read and write
A1D1000
heap
page read and write
C496000
unkown
page read and write
35CD000
unkown
page read and write
8A70000
unkown
page read and write
A35F000
heap
page read and write
5893000
heap
page execute and read and write
2B85000
trusted library allocation
page read and write
1180000
unkown
page read and write
548F000
stack
page read and write
7FF5CE343000
unkown
page readonly
A425000
heap
page read and write
2ECB000
trusted library allocation
page read and write
C8D8000
unkown
page read and write
9C8C000
heap
page read and write
1550000
trusted library allocation
page read and write
5EE000
heap
page read and write
5EE000
heap
page read and write
401000
unkown
page execute read
5E7000
heap
page read and write
38B1000
trusted library allocation
page read and write
1503000
trusted library allocation
page execute and read and write
C9A7000
unkown
page read and write
A39F000
unkown
page read and write
F55E000
unkown
page read and write
3907000
trusted library allocation
page read and write
1438000
heap
page read and write
5E7000
heap
page read and write
9CB9000
heap
page read and write
2E10000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
E771000
unkown
page read and write
5E7000
heap
page read and write
7FF5D75A6000
unkown
page readonly
4A44000
unkown
page read and write
7FF5D7244000
unkown
page readonly
1435000
heap
page read and write
5EE000
heap
page read and write
182C000
stack
page read and write
8870000
unkown
page readonly
1ECE000
stack
page read and write
112B0000
unkown
page read and write
3AE1000
trusted library allocation
page read and write
4E55000
trusted library allocation
page read and write
5270000
heap
page execute and read and write
8900000
unkown
page read and write
5570000
trusted library allocation
page read and write
FEB000
heap
page read and write
38EE000
trusted library allocation
page read and write
A237000
unkown
page read and write
4E5000
heap
page read and write
B20000
heap
page read and write
13AE000
heap
page read and write
B559000
stack
page read and write
5E7000
heap
page read and write
9C17000
heap
page read and write
439000
unkown
page readonly
A4D3000
heap
page read and write
2DD4000
trusted library allocation
page read and write
A491000
heap
page read and write
5E7000
heap
page read and write
39E3000
trusted library allocation
page read and write
A049000
heap
page read and write
1453000
heap
page read and write
2A00000
trusted library allocation
page read and write
7FF5D770A000
unkown
page readonly
A3B3000
heap
page read and write
262E000
stack
page read and write
5E7000
heap
page read and write
4E64000
trusted library allocation
page read and write
5E7000
heap
page read and write
A5E9000
heap
page read and write
175D000
trusted library allocation
page execute and read and write
A0CE000
heap
page read and write
1230000
heap
page read and write
7FF5D7450000
unkown
page readonly
2960000
heap
page read and write
38A1000
trusted library allocation
page read and write
11CF000
stack
page read and write
1180000
unkown
page read and write
997C000
stack
page read and write
2C90000
heap
page read and write
392A000
trusted library allocation
page read and write
7FF5D66E8000
unkown
page readonly
310E000
stack
page read and write
2F30000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
1370000
heap
page read and write
A49D000
heap
page read and write
13C0000
heap
page read and write
1434000
heap
page read and write
5E7000
heap
page read and write
10772000
unkown
page read and write
38B8000
trusted library allocation
page read and write
1180000
unkown
page read and write
5E7000
heap
page read and write
98FD000
stack
page read and write
502E000
trusted library allocation
page read and write
40B000
unkown
page execute read
DE2000
heap
page read and write
A9A0000
unkown
page read and write
A050000
heap
page read and write
D6E000
heap
page read and write
7FF5D7336000
unkown
page readonly
11E0000
heap
page read and write
2C7E000
stack
page read and write
E00000
unkown
page readonly
2779000
heap
page read and write
1160000
unkown
page read and write
5EE000
heap
page read and write
87A0000
unkown
page read and write
89E000
stack
page read and write
94F4000
unkown
page read and write
C81C000
unkown
page read and write
1208000
heap
page read and write
3955000
trusted library allocation
page read and write
9C82000
heap
page read and write
977E000
stack
page read and write
38B0000
trusted library allocation
page read and write
C4DC000
unkown
page read and write
38D1000
trusted library allocation
page read and write
7FF5D71A6000
unkown
page readonly
5EE000
heap
page read and write
2A38000
trusted library allocation
page read and write
9E3000
stack
page read and write
A3DE000
heap
page read and write
A5A3000
heap
page read and write
304E000
stack
page read and write
87A0000
unkown
page read and write
15EA000
heap
page read and write
2F60000
heap
page read and write
DF3000
trusted library allocation
page execute and read and write
3AE4000
trusted library allocation
page read and write
49C2000
unkown
page read and write
A428000
heap
page read and write
32AF000
stack
page read and write
3904000
trusted library allocation
page read and write
7FF5D71BF000
unkown
page readonly
9CB7000
heap
page read and write
7FF5D71EF000
unkown
page readonly
38C9000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
2E06000
trusted library allocation
page read and write
C17000
trusted library allocation
page read and write
13E3000
heap
page read and write
There are 3127 hidden memdumps, click here to show them.