IOC Report
EiPVv5yELP.exe

loading gif

Files

File Path
Type
Category
Malicious
EiPVv5yELP.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\huge[1].dat
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\2499.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\45DE.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\62FC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\blowfish.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsuAB0.tmp\liteFirewall.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Del.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\whhsvcw
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\whhsvcw:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsh46C8.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\INetC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsv9958.tmp
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
data
modified
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\cef.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
data
dropped
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\start.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
MSVC program database ver 7.00, 512*4023 bytes
dropped
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 106 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EiPVv5yELP.exe
"C:\Users\user\Desktop\EiPVv5yELP.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\whhsvcw
C:\Users\user\AppData\Roaming\whhsvcw
malicious
C:\Users\user\AppData\Local\Temp\2499.exe
C:\Users\user\AppData\Local\Temp\2499.exe
malicious
C:\Users\user\AppData\Local\Temp\45DE.exe
C:\Users\user\AppData\Local\Temp\45DE.exe
malicious
C:\Users\user\AppData\Local\Temp\62FC.exe
C:\Users\user\AppData\Local\Temp\62FC.exe
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
"C:\Users\user\AppData\Local\Temp\setup.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3728 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4412 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4492 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642839349 --mojo-platform-channel-handle=4608 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642849290 --mojo-platform-channel-handle=4680 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\whhsvcw
C:\Users\user\AppData\Roaming\whhsvcw
malicious
There are 21 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://foodypannyjsud.shop/api.
unknown
malicious
https://foodypannyjsud.shop/s
unknown
malicious
http://gebeus.ru/tmp/index.php
malicious
http://cx5519.com/tmp/index.php
malicious
contintnetksows.shop
malicious
http://evilos.cc/tmp/index.php
malicious
ellaboratepwsz.xyz
malicious
swellfrrgwwos.xyz
malicious
foodypannyjsud.shop
malicious
pedestriankodwu.xyz
malicious
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
unknown
https://www.google.com/chrome/privacy/eula_text.html
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://word.office.comM
unknown
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
unknown
https://foodypannyjsud.shop/a
unknown
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
unknown
http://crbug.com/510270
unknown
https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
unknown
https://chrome.google.com/webstore?hl=urCtrl$2
unknown
http://xiexie.wf/22_551/huge.datOK
unknown
http://crbug.com/378067
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://foodypannyjsud.shop/Q
unknown
https://chrome.google.com/webstore?hl=trCtrl$1
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://www.google.com/cloudprint
unknown
https://passwords.google.com
unknown
https://aui-cdn.atlassian.com/
unknown
http://crbug.com/497301
unknown
https://github.com/JamesNK/Newtonsoft.Json/issues/652
unknown
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
unknown
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
unknown
https://wns.windows.com/e
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://bageyou.xyz
unknown
http://crbug.com/642141
unknown
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://bitbucket.org/
unknown
https://support.google.com/chromebook?p=app_intent
unknown
http://crbug.com/717501
unknown
http://crbug.com/957772
unknown
http://crbug.com/839189
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://chrome.google.com/webstore
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://rouonixon.com/4/6150781/?ymid=831901360386478080
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.google.com/chrome/privacy/eula_text.html&
unknown
https://www.google.com/chrome/privacy/eula_text.htmlT&r
unknown
https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
unknown
https://www.ecosia.org/newtab/
unknown
http://xiexie.wf/22_551/huge.dat
unknown
http://xiexie.wf/22_551/huge.datSH/x&
unknown
http://crbug.com/819404
unknown
https://foodypannyjsud.shop/)
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://crbug.com/514696
unknown
https://foodypannyjsud.shop/apig
unknown
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chrome.google.com/webstore?hl=ukCtrl$1
unknown
https://android.notify.windows.com/iOS
unknown
http://api.install-stat.debug.world/clients/installs
unknown
https://outlook.come
unknown
https://cdn.cookielaw.org/
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
https://support.google.com/chrome/a/answer/9122284
unknown
https://chrome.google.com/webstore/
unknown
https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
unknown
https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://www.google.com/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://rouonixon.com/4/6150781/?ymid=831901360386478080&var=6150780&price=
unknown
https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
unknown
https://api.msn.com/v1/news/Feed/Windows?
unknown
https://chrome.google.com/webstore?hl=zh-CNCtrl$1
unknown
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
unknown
https://api.msn.com/I
unknown
https://support.google.com/chrome/answer/6258784
unknown
http://www.unicode.org/copyright.html
unknown
https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
unknown
http://api.install-stat.debug.world/clients/activitye
unknown
http://crbug.com/775961
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
188.114.97.3
unknown
European Union
malicious
186.101.193.110
unknown
Ecuador
malicious
141.8.192.126
unknown
Russian Federation
malicious
185.68.16.7
unknown
Ukraine
malicious
127.0.0.127
unknown
unknown
malicious
146.70.169.164
unknown
United Kingdom
malicious
185.166.143.48
unknown
Germany
172.67.221.174
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000006042C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000401B2
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\GamePall
Sid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Pid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GamePall
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
DontShowUI
HKEY_CURRENT_USER\SOFTWARE\GamePall
tmp_uid
HKEY_CURRENT_USER\SOFTWARE\GamePall
reg
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\GamePall
uid
HKEY_CURRENT_USER\Control Panel\Cursors
AppStarting
There are 208 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4371000
unclassified section
page read and write
malicious
28B0000
direct allocation
page read and write
malicious
29D1000
unclassified section
page read and write
malicious
91D000
heap
page read and write
malicious
29B0000
direct allocation
page read and write
malicious
3240000
direct allocation
page execute and read and write
malicious
7FF5DF0C9000
unkown
page readonly
9A000
stack
page read and write
7FF5DF443000
unkown
page readonly
4006000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
2E60000
unkown
page read and write
7FF5DF5E9000
unkown
page readonly
A08F000
heap
page read and write
401B000
trusted library allocation
page read and write
A38B000
heap
page read and write
7FF5DF53F000
unkown
page readonly
523E000
stack
page read and write
9F42000
heap
page read and write
402C000
trusted library allocation
page read and write
1A1D000
heap
page read and write
1273000
trusted library allocation
page execute and read and write
73B4000
unkown
page read and write
29E4000
trusted library allocation
page read and write
2EC0000
unkown
page readonly
9FC4000
heap
page read and write
A6EA000
unkown
page read and write
7FF5DEFE8000
unkown
page readonly
7940000
unkown
page readonly
18A5000
heap
page read and write
3F67000
trusted library allocation
page read and write
9E15000
heap
page read and write
2CFD000
stack
page read and write
83F0000
unkown
page read and write
4025000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
D35000
heap
page read and write
9A79000
heap
page read and write
5A23000
trusted library allocation
page read and write
BFAD000
unkown
page read and write
A6CF000
unkown
page read and write
A35A000
heap
page read and write
4088000
trusted library allocation
page read and write
2E60000
unkown
page read and write
8B60000
unkown
page read and write
26F0000
heap
page read and write
4016000
trusted library allocation
page read and write
A2CD000
heap
page read and write
8B60000
unkown
page read and write
14B6000
trusted library allocation
page execute and read and write
9F78000
unkown
page read and write
50A0000
trusted library allocation
page read and write
DF5000
heap
page read and write
7FF5DF5F0000
unkown
page readonly
7FF5DF452000
unkown
page readonly
A283000
heap
page read and write
4025000
trusted library allocation
page read and write
A2E4000
heap
page read and write
8B60000
unkown
page read and write
1A54000
heap
page read and write
2890000
unkown
page readonly
2ACF000
stack
page read and write
2F0E000
stack
page read and write
320C000
stack
page read and write
1A27000
heap
page read and write
8B60000
unkown
page read and write
5444000
trusted library allocation
page read and write
1430000
trusted library allocation
page execute and read and write
FC0000
trusted library allocation
page read and write
4004000
trusted library allocation
page read and write
100C1000
unkown
page read and write
27D7000
trusted library allocation
page read and write
404E000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
9CA3000
heap
page read and write
1220000
heap
page read and write
9FA9000
heap
page read and write
61B0000
heap
page read and write
3BE5000
trusted library allocation
page read and write
9F50000
heap
page read and write
1AA0000
heap
page read and write
2B75000
trusted library allocation
page read and write
9C45000
heap
page read and write
4025000
trusted library allocation
page read and write
4037000
trusted library allocation
page read and write
2E60000
unkown
page read and write
9ED2000
heap
page read and write
127D000
trusted library allocation
page execute and read and write
7FF5DF2ED000
unkown
page readonly
A15E000
heap
page read and write
555E000
stack
page read and write
CC0000
heap
page read and write
E3F000
stack
page read and write
CFE000
stack
page read and write
2BC8000
trusted library allocation
page read and write
B7D000
trusted library allocation
page execute and read and write
8B60000
unkown
page read and write
1286000
heap
page read and write
88B000
stack
page read and write
7DF4E6781000
unkown
page execute read
8810000
unkown
page read and write
A256000
heap
page read and write
9E6C000
heap
page read and write
9E41000
heap
page read and write
4DF6000
trusted library allocation
page read and write
66CE000
stack
page read and write
8B60000
unkown
page read and write
340D000
stack
page read and write
4056000
trusted library allocation
page read and write
2708000
unkown
page readonly
1062A000
unkown
page read and write
8B60000
unkown
page read and write
544E000
trusted library allocation
page read and write
D3C000
heap
page read and write
9BF1000
heap
page read and write
4FE2000
trusted library allocation
page read and write
9CA1000
heap
page read and write
FE7000
heap
page read and write
1A4E000
heap
page read and write
5555000
trusted library allocation
page read and write
1AD9000
heap
page read and write
C474000
unkown
page read and write
BEB0000
unkown
page read and write
A0F7000
unkown
page read and write
5090000
trusted library allocation
page read and write
5404000
trusted library allocation
page read and write
C75000
stack
page read and write
5803000
heap
page execute and read and write
2BA0000
heap
page execute and read and write
A2EC000
heap
page read and write
2E60000
unkown
page read and write
3875000
trusted library allocation
page read and write
EC6000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
7FF5DEF94000
unkown
page readonly
901B000
stack
page read and write
DC0000
heap
page read and write
BEF0000
heap
page read and write
2F40000
trusted library allocation
page read and write
7FF5DF39C000
unkown
page readonly
9CC0000
heap
page read and write
27F0000
unkown
page readonly
2E60000
unkown
page read and write
3FF1000
trusted library allocation
page read and write
1ADC000
heap
page read and write
7DF5E895F000
unkown
page readonly
505E000
stack
page read and write
9380000
unkown
page readonly
7FF5DF4AB000
unkown
page readonly
DAE000
stack
page read and write
C50C000
unkown
page read and write
9E8D000
heap
page read and write
4B80000
trusted library allocation
page read and write
FD80000
unkown
page read and write
5530000
trusted library allocation
page execute and read and write
12A7000
trusted library allocation
page execute and read and write
A41C000
heap
page read and write
54CE000
stack
page read and write
9C8F000
heap
page read and write
2C2C000
trusted library allocation
page read and write
FA7000
trusted library allocation
page execute and read and write
F3A000
heap
page read and write
B20000
heap
page read and write
257B000
trusted library allocation
page execute and read and write
1A54000
heap
page read and write
1458000
heap
page read and write
9CCC000
heap
page read and write
2DE0000
trusted library allocation
page execute and read and write
EECB000
unkown
page read and write
838B000
stack
page read and write
9DCA000
heap
page read and write
9CB7000
heap
page read and write
5420000
trusted library allocation
page read and write
A3FC000
heap
page read and write
9EF4000
heap
page read and write
8B60000
unkown
page read and write
29A4000
trusted library allocation
page read and write
672E000
stack
page read and write
9C89000
heap
page read and write
C34E000
unkown
page read and write
53D8000
trusted library allocation
page read and write
B56000
heap
page read and write
14E0000
heap
page read and write
1278000
heap
page read and write
6BB5000
heap
page read and write
A1D2000
heap
page read and write
9CA7000
heap
page read and write
BF0000
heap
page read and write
29D0000
trusted library allocation
page read and write
7FF5DF398000
unkown
page readonly
1630000
trusted library allocation
page read and write
1AB0000
heap
page read and write
3BE1000
trusted library allocation
page read and write
2D2E000
stack
page read and write
7FF5DEFAC000
unkown
page readonly
9EFD000
heap
page read and write
502E000
trusted library allocation
page read and write
8B60000
unkown
page read and write
2606000
trusted library allocation
page read and write
1455000
heap
page read and write
2ABE000
trusted library allocation
page read and write
507000
heap
page read and write
CB0000
heap
page read and write
14B7000
trusted library allocation
page execute and read and write
9C9F000
stack
page read and write
40FA000
trusted library allocation
page read and write
2620000
heap
page read and write
9A7000
heap
page read and write
9B8A000
heap
page read and write
1ADC000
heap
page read and write
CF6000
trusted library allocation
page execute and read and write
104C1000
unkown
page read and write
2870000
unkown
page read and write
2AD7000
trusted library allocation
page read and write
2AE5000
trusted library allocation
page read and write
3FF6000
trusted library allocation
page read and write
9CAA000
heap
page read and write
9CC1000
heap
page read and write
4AD8000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
4040000
trusted library allocation
page read and write
A201000
heap
page read and write
83F0000
unkown
page read and write
7FF5DEFCB000
unkown
page readonly
1030000
trusted library allocation
page read and write
20E0000
heap
page read and write
1AD4000
heap
page read and write
2E60000
unkown
page read and write
4FA000
heap
page read and write
563E000
stack
page read and write
FE8000
heap
page read and write
1ACC000
heap
page read and write
11B0000
trusted library allocation
page read and write
FD0000
trusted library allocation
page execute and read and write
4C6E000
stack
page read and write
500000
heap
page read and write
C298000
unkown
page read and write
9B95000
heap
page read and write
8B60000
unkown
page read and write
54E9000
trusted library allocation
page read and write
9CB2000
heap
page read and write
2E60000
unkown
page read and write
C93000
heap
page read and write
95F0000
unkown
page read and write
5B70000
unkown
page readonly
A085000
heap
page read and write
53F1000
trusted library allocation
page read and write
9F9B000
heap
page read and write
A278000
heap
page read and write
5406000
trusted library allocation
page read and write
2F5F000
stack
page read and write
8B60000
unkown
page read and write
3F61000
trusted library allocation
page read and write
51A000
heap
page read and write
4EE1000
trusted library allocation
page read and write
1ABA000
heap
page read and write
8B60000
unkown
page read and write
4691000
heap
page read and write
8B60000
unkown
page read and write
7FF5DF067000
unkown
page readonly
97F3000
unkown
page read and write
26DD000
stack
page read and write
4108000
trusted library allocation
page read and write
10603000
unkown
page read and write
9CB7000
heap
page read and write
5A20000
trusted library allocation
page read and write
400C000
trusted library allocation
page read and write
3C50000
heap
page read and write
588E000
stack
page read and write
2DE0000
heap
page read and write
9D46000
heap
page read and write
10811000
unkown
page read and write
1AA9000
heap
page read and write
2E60000
unkown
page read and write
29D1000
trusted library allocation
page read and write
48A0000
unkown
page read and write
B9BF000
stack
page read and write
2E24000
trusted library allocation
page read and write
1ADA000
heap
page read and write
2E60000
unkown
page read and write
2E00000
trusted library allocation
page read and write
A299000
heap
page read and write
2787000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
83F0000
unkown
page read and write
6B60000
heap
page read and write
25DE000
stack
page read and write
1204000
trusted library allocation
page read and write
7FF5DF606000
unkown
page readonly
4005000
trusted library allocation
page read and write
436000
unkown
page readonly
7FF5DF091000
unkown
page readonly
CF0000
heap
page read and write
2B9E000
stack
page read and write
5591000
trusted library allocation
page read and write
CC0000
heap
page read and write
7FF5DF09B000
unkown
page readonly
4005000
trusted library allocation
page read and write
2F81000
trusted library allocation
page read and write
A107000
heap
page read and write
30F0000
remote allocation
page read and write
9C80000
heap
page read and write
5553000
trusted library allocation
page read and write
2CE0000
heap
page read and write
4025000
trusted library allocation
page read and write
2DFC000
stack
page read and write
DE6000
stack
page read and write
53D6000
trusted library allocation
page read and write
3F57000
trusted library allocation
page read and write
2B4C000
trusted library allocation
page read and write
4284000
trusted library allocation
page read and write
8B60000
unkown
page read and write
1331000
trusted library allocation
page read and write
4FAE000
stack
page read and write
1055000
unkown
page execute read
3BB7000
trusted library allocation
page read and write
9CAD000
heap
page read and write
8810000
unkown
page read and write
A11C000
heap
page read and write
2708000
unkown
page readonly
58EE000
stack
page read and write
7FF5DF3F7000
unkown
page readonly
1050000
heap
page read and write
9CCF000
heap
page read and write
4025000
trusted library allocation
page read and write
498000
heap
page read and write
895000
heap
page read and write
830F000
stack
page read and write
83F0000
unkown
page read and write
1AD0000
heap
page read and write
402E000
trusted library allocation
page read and write
D21000
unkown
page execute read
96DF000
unkown
page read and write
E2A000
trusted library allocation
page execute and read and write
2F20000
unkown
page read and write
1150000
heap
page read and write
8B60000
unkown
page read and write
11F6000
trusted library allocation
page execute and read and write
A23B000
heap
page read and write
11D0000
heap
page read and write
7230000
unkown
page read and write
65CD000
stack
page read and write
D6F000
stack
page read and write
13A0000
unkown
page readonly
4072000
trusted library allocation
page read and write
3107000
stack
page read and write
2E20000
trusted library allocation
page read and write
57F0000
heap
page execute and read and write
AFF000
stack
page read and write
4016000
trusted library allocation
page read and write
E91000
unkown
page read and write
7FF5DF211000
unkown
page readonly
99AB000
unkown
page read and write
A0CD000
heap
page read and write
244F000
stack
page read and write
29E6000
trusted library allocation
page read and write
4025000
trusted library allocation
page read and write
1A27000
heap
page read and write
BEB0000
unkown
page read and write
59FC000
trusted library allocation
page read and write
3FDE000
stack
page read and write
C19D000
unkown
page read and write
1B2E000
stack
page read and write
B09E000
stack
page read and write
B830000
unkown
page readonly
403E000
trusted library allocation
page read and write
2577000
trusted library allocation
page execute and read and write
4FBE000
trusted library allocation
page read and write
A171000
heap
page read and write
B66000
stack
page read and write
F7D000
trusted library allocation
page execute and read and write
4004000
trusted library allocation
page read and write
479B000
unkown
page read and write
54E0000
trusted library allocation
page read and write
9CAC000
heap
page read and write
290B000
heap
page read and write
1226000
heap
page read and write
A898000
heap
page read and write
53ED000
trusted library allocation
page read and write
9A44000
heap
page read and write
11D0000
heap
page read and write
104C1000
unkown
page read and write
6DEC000
stack
page read and write
C01A000
unkown
page read and write
3EDE000
stack
page read and write
2C65000
trusted library allocation
page read and write
9E0000
heap
page read and write
B10000
heap
page read and write
259E000
stack
page read and write
42E000
unkown
page readonly
400000
unkown
page execute and read and write
C7E000
stack
page read and write
1260000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
9A8D000
heap
page read and write
42E000
unkown
page readonly
A00B000
heap
page read and write
6B4C000
stack
page read and write
6A4C000
stack
page read and write
9E54000
heap
page read and write
4EE000
heap
page read and write
338C000
stack
page read and write
8B60000
unkown
page read and write
40A000
unkown
page read and write
A318000
heap
page read and write
54C4000
trusted library allocation
page read and write
9C73000
heap
page read and write
5425000
trusted library allocation
page read and write
9EC1000
heap
page read and write
4FB0000
trusted library allocation
page read and write
401E000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
1AD1000
heap
page read and write
14B0000
heap
page read and write
ACAE000
stack
page read and write
7B4C000
stack
page read and write
BD6000
stack
page read and write
2E60000
unkown
page read and write
129A000
trusted library allocation
page execute and read and write
3A01000
trusted library allocation
page read and write
7D0E000
stack
page read and write
558A000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
A179000
heap
page read and write
9B000
stack
page read and write
120B000
trusted library allocation
page execute and read and write
505000
heap
page read and write
7DF4E6761000
unkown
page execute read
9CBF000
heap
page read and write
3F91000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
7FF5DF41B000
unkown
page readonly
2A5E000
stack
page read and write
551E000
stack
page read and write
3FF5000
trusted library allocation
page read and write
25C1000
trusted library allocation
page read and write
104C4000
unkown
page read and write
4031000
trusted library allocation
page read and write
1A3E000
heap
page read and write
549F000
stack
page read and write
A42A000
heap
page read and write
2E60000
unkown
page read and write
12A6000
trusted library allocation
page execute and read and write
4011000
trusted library allocation
page read and write
8B60000
unkown
page read and write
1AD0000
heap
page read and write
1320000
trusted library allocation
page execute and read and write
54C4000
trusted library allocation
page read and write
10000000
unkown
page readonly
7DF5E896A000
unkown
page readonly
2E30000
unkown
page read and write
4032000
trusted library allocation
page read and write
9C8E000
heap
page read and write
7FF5DF20A000
unkown
page readonly
A334000
heap
page read and write
404E000
trusted library allocation
page read and write
9605000
unkown
page read and write
5550000
trusted library allocation
page read and write
9704000
unkown
page read and write
29B0000
trusted library allocation
page read and write
1AA0000
heap
page read and write
8BE000
heap
page read and write
9D1F000
stack
page read and write
128A000
heap
page read and write
9CD1000
heap
page read and write
2F17000
trusted library allocation
page read and write
EF04000
unkown
page read and write
270F000
stack
page read and write
8800000
unkown
page read and write
F17000
heap
page read and write
1AD9000
heap
page read and write
2D53000
trusted library allocation
page read and write
100A000
heap
page read and write
3DBE000
trusted library allocation
page read and write
83F0000
unkown
page read and write
29B0000
trusted library allocation
page read and write
5480000
heap
page read and write
4027000
trusted library allocation
page read and write
4045000
trusted library allocation
page read and write
552F000
stack
page read and write
5440000
trusted library allocation
page read and write
B38000
heap
page read and write
4DA0000
trusted library allocation
page read and write
A29B000
heap
page read and write
997F000
heap
page read and write
9F0000
heap
page read and write
9A4A000
heap
page read and write
408000
unkown
page readonly
2E60000
unkown
page read and write
2F1F000
stack
page read and write
43B1000
heap
page read and write
9700000
unkown
page read and write
A146000
heap
page read and write
2BC9000
trusted library allocation
page read and write
4025000
trusted library allocation
page read and write
2E60000
unkown
page read and write
2B42000
trusted library allocation
page read and write
9CA1000
heap
page read and write
4015000
trusted library allocation
page read and write
2E60000
unkown
page read and write
9E99000
heap
page read and write
B73000
trusted library allocation
page execute and read and write
9C51000
heap
page read and write
A1E2000
heap
page read and write
11EB000
trusted library allocation
page execute and read and write
1337000
trusted library allocation
page read and write
8B60000
unkown
page read and write
7FF5DF3C6000
unkown
page readonly
108E4000
unkown
page read and write
5C1C000
stack
page read and write
E4F000
heap
page read and write
1072000
heap
page read and write
2D6E000
stack
page read and write
2E60000
unkown
page read and write
9C8F000
heap
page read and write
7FF5DF4D5000
unkown
page readonly
1203000
trusted library allocation
page execute and read and write
418000
unkown
page readonly
FEC1000
unkown
page read and write
8B60000
unkown
page read and write
C58000
heap
page read and write
401000
unkown
page execute read
128F000
heap
page read and write
A367000
heap
page read and write
1257000
heap
page read and write
B9E0000
unkown
page read and write
9CD2000
heap
page read and write
4E25000
trusted library allocation
page read and write
1AB2000
heap
page read and write
11D8000
heap
page read and write
41D1000
trusted library allocation
page read and write
9C33000
heap
page read and write
F80000
trusted library allocation
page read and write
9729000
unkown
page read and write
608C000
stack
page read and write
9EEB000
heap
page read and write
BF9B000
unkown
page read and write
339D000
unkown
page read and write
A314000
heap
page read and write
7FF5DF60D000
unkown
page readonly
52B2000
trusted library allocation
page read and write
2E60000
unkown
page read and write
EEC6000
unkown
page read and write
2E60000
unkown
page read and write
578E000
stack
page read and write
9EF0000
heap
page read and write
4CAD000
stack
page read and write
1AC4000
heap
page read and write
14E0000
heap
page execute and read and write
9E12000
heap
page read and write
9DD2000
heap
page read and write
8810000
unkown
page read and write
9F04000
heap
page read and write
CD0000
trusted library allocation
page read and write
2854000
heap
page read and write
8B60000
unkown
page read and write
B40000
heap
page read and write
5780000
trusted library allocation
page read and write
4855000
unkown
page read and write
AB0D000
stack
page read and write
2E60000
unkown
page read and write
2600000
trusted library allocation
page read and write
2F7F000
trusted library allocation
page read and write
4006000
trusted library allocation
page read and write
10002000
unkown
page readonly
4025000
trusted library allocation
page read and write
E50000
heap
page read and write
2F11000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
1190000
heap
page read and write
52AE000
stack
page read and write
7FF5DF366000
unkown
page readonly
1450000
trusted library allocation
page read and write
41B000
unkown
page write copy
5A52000
unkown
page readonly
EBD000
trusted library allocation
page execute and read and write
14D0000
heap
page read and write
C6B000
stack
page read and write
55F0000
heap
page execute and read and write
52BC000
trusted library allocation
page read and write
7FF5DF567000
unkown
page readonly
9C86000
heap
page read and write
4016000
trusted library allocation
page read and write
970000
unkown
page readonly
1AA0000
heap
page read and write
47EC000
unkown
page read and write
14A0000
trusted library allocation
page read and write
14AA000
trusted library allocation
page execute and read and write
1AD8000
heap
page read and write
2AD1000
trusted library allocation
page read and write
5A14000
trusted library allocation
page read and write
14D3000
heap
page read and write
88E000
stack
page read and write
A08E000
heap
page read and write
10F6000
stack
page read and write
7FF5DEFA6000
unkown
page readonly
EF6000
heap
page read and write
55AC000
stack
page read and write
4DC0000
trusted library allocation
page read and write
C4BE000
unkown
page read and write
7FF5DF156000
unkown
page readonly
7FF5DF0CC000
unkown
page readonly
2E60000
unkown
page read and write
BFC3000
unkown
page read and write
9CC1000
heap
page read and write
3FF8000
trusted library allocation
page read and write
2F7E000
stack
page read and write
2E60000
unkown
page read and write
F32000
heap
page read and write
2F1F000
trusted library allocation
page read and write
1AD4000
heap
page read and write
9E68000
heap
page read and write
4025000
trusted library allocation
page read and write
560E000
stack
page read and write
9CBD000
heap
page read and write
2A3B000
heap
page read and write
11E7000
trusted library allocation
page execute and read and write
2C91000
trusted library allocation
page read and write
4016000
trusted library allocation
page read and write
9E8A000
heap
page read and write
107D2000
heap
page read and write
9EA7000
heap
page read and write
2F10000
unkown
page read and write
4073000
trusted library allocation
page read and write
7FF5DF095000
unkown
page readonly
1A16000
heap
page read and write
A88F000
heap
page read and write
D60000
unkown
page read and write
6BB0000
heap
page read and write
9C43000
heap
page read and write
848E000
stack
page read and write
1050000
heap
page read and write
A090000
heap
page read and write
7FF5DF248000
unkown
page readonly
54E1000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
BE5000
heap
page read and write
2F20000
unkown
page read and write
14DE000
stack
page read and write
A1CA000
heap
page read and write
10B8000
heap
page read and write
CF6000
heap
page read and write
5047000
trusted library allocation
page read and write
9CA5000
heap
page read and write
25DE000
stack
page read and write
A394000
heap
page read and write
2E60000
unkown
page read and write
59CF000
stack
page read and write
405D000
trusted library allocation
page read and write
4286000
trusted library allocation
page read and write
D02000
trusted library allocation
page read and write
A124000
heap
page read and write
1190000
heap
page read and write
A3D9000
heap
page read and write
2E60000
unkown
page read and write
355F000
stack
page read and write
5460000
trusted library allocation
page execute and read and write
28EB000
heap
page execute and read and write
9E0000
unkown
page readonly
4B76000
trusted library allocation
page read and write
558C000
trusted library allocation
page read and write
14CB000
trusted library allocation
page execute and read and write
2B73000
trusted library allocation
page read and write
9D57000
heap
page read and write
2E20000
trusted library allocation
page read and write
A43C000
heap
page read and write
5030000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
3F81000
trusted library allocation
page read and write
9C83000
heap
page read and write
A6D2000
unkown
page read and write
99C3000
heap
page read and write
38F0000
remote allocation
page read and write
2FAB000
trusted library allocation
page read and write
8B60000
unkown
page read and write
576C000
trusted library allocation
page read and write
4FCE000
trusted library allocation
page read and write
7FF5DF21F000
unkown
page readonly
4025000
trusted library allocation
page read and write
4046000
trusted library allocation
page read and write
9CAD000
heap
page read and write
9CBC000
heap
page read and write
FA0000
trusted library allocation
page read and write
101F000
stack
page read and write
401F000
trusted library allocation
page read and write
5CC0000
heap
page read and write
8810000
unkown
page read and write
9CC5000
heap
page read and write
41B000
unkown
page read and write
1AD4000
heap
page read and write
2F8F000
trusted library allocation
page read and write
4025000
trusted library allocation
page read and write
7FF5DF4C6000
unkown
page readonly
211000
unkown
page execute read
494D000
stack
page read and write
CD3000
trusted library allocation
page execute and read and write
98A1000
unkown
page read and write
3737000
trusted library allocation
page read and write
3F61000
trusted library allocation
page read and write
9C80000
heap
page read and write
A0CB000
heap
page read and write
480000
heap
page read and write
2AC0000
trusted library allocation
page read and write
A198000
heap
page read and write
5093000
trusted library allocation
page read and write
2F20000
heap
page read and write
1AAD000
heap
page read and write
C149000
unkown
page read and write
A3D4000
heap
page read and write
10648000
unkown
page read and write
88E0000
unkown
page read and write
1ACC000
heap
page read and write
541E000
stack
page read and write
12E5000
heap
page read and write
A400000
heap
page read and write
4E23000
trusted library allocation
page read and write
7FF5DF195000
unkown
page readonly
A15B000
heap
page read and write
1AD8000
heap
page read and write
8B60000
unkown
page read and write
28D0000
heap
page read and write
7FF5DF519000
unkown
page readonly
10DD000
heap
page read and write
5C0000
heap
page read and write
10627000
unkown
page read and write
1AC3000
heap
page read and write
4015000
trusted library allocation
page read and write
9D43000
heap
page read and write
A14A000
heap
page read and write
9C85000
heap
page read and write
2E60000
unkown
page read and write
9C31000
heap
page read and write
2E60000
unkown
page read and write
5510000
trusted library allocation
page read and write
2E60000
unkown
page read and write
4269000
trusted library allocation
page read and write
38DF000
stack
page read and write
5410000
trusted library allocation
page read and write
9FE6000
heap
page read and write
1ACA000
heap
page read and write
533E000
stack
page read and write
2F47000
trusted library allocation
page read and write
A023000
heap
page read and write
1494000
trusted library allocation
page read and write
28EE000
stack
page read and write
33C0000
unkown
page readonly
5020000
trusted library allocation
page read and write
E06000
heap
page read and write
9EBE000
heap
page read and write
F20000
trusted library allocation
page read and write
20C0000
heap
page read and write
7FF5DF388000
unkown
page readonly
4015000
trusted library allocation
page read and write
1AA0000
heap
page read and write
986000
stack
page read and write
4025000
trusted library allocation
page read and write
2C25000
trusted library allocation
page read and write
EF4000
heap
page read and write
5420000
heap
page read and write
A2B5000
heap
page read and write
8B60000
unkown
page read and write
4828000
unkown
page read and write
7FF5DF0F6000
unkown
page readonly
9CB8000
heap
page read and write
10B7000
trusted library allocation
page read and write
7FF5DF1D1000
unkown
page readonly
F10000
trusted library allocation
page read and write
505E000
stack
page read and write
9A2D000
heap
page read and write
A168000
heap
page read and write
1A3F000
heap
page read and write
BF7E000
unkown
page read and write
2A90000
heap
page read and write
2820000
heap
page read and write
4035000
trusted library allocation
page read and write
94C0000
unkown
page read and write
FB0000
trusted library allocation
page read and write
2C0F000
stack
page read and write
15F0000
trusted library allocation
page read and write
A16A000
heap
page read and write
83F0000
unkown
page read and write
53DE000
trusted library allocation
page read and write
9F2A000
unkown
page read and write
7FF5DF3DF000
unkown
page readonly
9FC8000
heap
page read and write
47F3000
unkown
page read and write
54C6000
trusted library allocation
page read and write
7FF5DF5BE000
unkown
page readonly
262E000
stack
page read and write
E40000
heap
page read and write
8800000
unkown
page read and write
83F0000
unkown
page read and write
34B0000
unkown
page readonly
2637000
trusted library allocation
page read and write
9CAA000
heap
page read and write
7FF5DEFDD000
unkown
page readonly
5530000
heap
page read and write
A27D000
heap
page read and write
7FF5DF361000
unkown
page readonly
276F000
stack
page read and write
4824000
unkown
page read and write
9716000
unkown
page read and write
D20000
unkown
page readonly
A37C000
heap
page read and write
D60000
heap
page read and write
53F2000
trusted library allocation
page read and write
A28E000
heap
page read and write
1165000
heap
page read and write
4F6E000
stack
page read and write
2A1E000
heap
page read and write
7FF5DF122000
unkown
page readonly
8890000
unkown
page read and write
524E000
stack
page read and write
7FF5DEFAF000
unkown
page readonly
9C67000
heap
page read and write
9CB9000
heap
page read and write
322F000
stack
page read and write
131F000
stack
page read and write
134B000
trusted library allocation
page execute and read and write
7DF4E67A1000
unkown
page execute read
439000
unkown
page readonly
11F0000
trusted library allocation
page read and write
A0F3000
heap
page read and write
42A000
unkown
page read and write
F2D000
trusted library allocation
page execute and read and write
9FC3000
unkown
page read and write
8B60000
unkown
page read and write
9CC1000
heap
page read and write
8810000
unkown
page read and write
4612000
trusted library allocation
page read and write
7FF5DF4E3000
unkown
page readonly
5474000
trusted library allocation
page read and write
4071000
trusted library allocation
page read and write
9E4A000
heap
page read and write
BA76000
stack
page read and write
4005000
trusted library allocation
page read and write
73C3000
unkown
page read and write
5095000
trusted library allocation
page read and write
534E000
stack
page read and write
1340000
heap
page read and write
987C000
unkown
page read and write
5A4E000
stack
page read and write
16B5000
trusted library allocation
page read and write
9F7C000
unkown
page read and write
4119000
trusted library allocation
page read and write
1ACC000
heap
page read and write
4E0000
heap
page read and write
C2E000
stack
page read and write
9F3F000
heap
page read and write
4B84000
trusted library allocation
page read and write
1AA0000
heap
page read and write
5771000
trusted library allocation
page read and write
4540000
heap
page read and write
1600000
trusted library allocation
page execute and read and write
10BD000
stack
page read and write
7DF4E6770000
unkown
page readonly
F17000
heap
page read and write
9951000
heap
page read and write
1207000
trusted library allocation
page execute and read and write
5535000
trusted library allocation
page read and write
7FF5DF0C3000
unkown
page readonly
4058000
trusted library allocation
page read and write
1120000
heap
page read and write
12AA000
trusted library allocation
page execute and read and write
A31F000
heap
page read and write
404E000
trusted library allocation
page read and write
7FF5DF486000
unkown
page readonly
2BE5000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
2660000
heap
page read and write
8400000
heap
page read and write
6910000
heap
page read and write
7FF5DF5B5000
unkown
page readonly
F10000
heap
page read and write
12C0000
trusted library allocation
page read and write
9C83000
heap
page read and write
211000
unkown
page execute read
9B97000
heap
page read and write
3281000
stack
page read and write
C6E000
stack
page read and write
790000
unkown
page readonly
A450000
heap
page read and write
7FF5DF3B5000
unkown
page readonly
A270000
heap
page read and write
A3E1000
heap
page read and write
2C10000
trusted library allocation
page read and write
9DDA000
heap
page read and write
52C1000
trusted library allocation
page read and write
8800000
unkown
page read and write
4058000
trusted library allocation
page read and write
9930000
heap
page read and write
507000
heap
page read and write
5785000
trusted library allocation
page read and write
52D9000
unkown
page read and write
73BA000
unkown
page read and write
7FF5DF577000
unkown
page readonly
B9F0000
unkown
page read and write
400000
unkown
page readonly
C23D000
unkown
page read and write
9CC0000
heap
page read and write
10620000
unkown
page read and write
8B60000
unkown
page read and write
B589000
stack
page read and write
A3C8000
heap
page read and write
D5D000
unkown
page readonly
7930000
unkown
page readonly
A082000
heap
page read and write
418000
unkown
page readonly
7FF5DF364000
unkown
page readonly
3B98000
trusted library allocation
page read and write
54F5000
trusted library allocation
page read and write
639000
heap
page read and write
BFA7000
unkown
page read and write
3E49000
trusted library allocation
page read and write
8B60000
unkown
page read and write
83F0000
unkown
page read and write
9C9D000
heap
page read and write
400F000
trusted library allocation
page read and write
A438000
heap
page read and write
A0AC000
heap
page read and write
7FF5DF3BE000
unkown
page readonly
4040000
trusted library allocation
page read and write
8B60000
unkown
page read and write
586F000
stack
page read and write
405F000
trusted library allocation
page read and write
970C000
unkown
page read and write
2C9E000
stack
page read and write
AF6000
stack
page read and write
A3F0000
heap
page read and write
A096000
heap
page read and write
A08D000
unkown
page read and write
A95C000
heap
page read and write
9A20000
heap
page read and write
18EE000
stack
page read and write
4048000
trusted library allocation
page read and write
27E0000
heap
page read and write
9CB2000
heap
page read and write
9490000
unkown
page read and write
2E10000
heap
page read and write
A0A3000
heap
page read and write
4025000
trusted library allocation
page read and write
4037000
trusted library allocation
page read and write
9E48000
heap
page read and write
A09A000
unkown
page read and write
7FF5DF5B3000
unkown
page readonly
3FF1000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
12B7000
trusted library allocation
page execute and read and write
4E09000
trusted library allocation
page read and write
A3EB000
heap
page read and write
C30000
heap
page read and write
1037000
trusted library allocation
page execute and read and write
4B91000
trusted library allocation
page read and write
9953000
heap
page read and write
73E5000
unkown
page read and write
9CD8000
heap
page read and write
418000
unkown
page readonly
73A3000
unkown
page read and write
664C000
stack
page read and write
4015000
trusted library allocation
page read and write
4E5E000
stack
page read and write
7FF5DF429000
unkown
page readonly
1AB0000
heap
page read and write
2EF5000
trusted library allocation
page read and write
9F0B000
heap
page read and write
E70000
unkown
page readonly
8C28000
stack
page read and write
2A3E000
heap
page read and write
989F000
unkown
page read and write
96ED000
unkown
page read and write
7FF5DF207000
unkown
page readonly
102F000
stack
page read and write
9E1E000
stack
page read and write
4005000
trusted library allocation
page read and write
E6A000
heap
page read and write
1AD0000
heap
page read and write
1A20000
heap
page read and write
10AD000
trusted library allocation
page execute and read and write
7FF5DF310000
unkown
page readonly
2D70000
unkown
page read and write
3FEF000
trusted library allocation
page read and write
2F83000
trusted library allocation
page read and write
1AC3000
heap
page read and write
83D0000
unkown
page read and write
104E000
stack
page read and write
64CC000
stack
page read and write
7FF5DEFC2000
unkown
page readonly
B60A000
stack
page read and write
36CF000
stack
page read and write
A3A2000
heap
page read and write
9C8B000
heap
page read and write
C86000
heap
page read and write
A35000
heap
page read and write
28D3000
heap
page read and write
E7A000
heap
page read and write
5A11000
trusted library allocation
page read and write
7FF5DF4A6000
unkown
page readonly
2E60000
unkown
page read and write
4005000
trusted library allocation
page read and write
4016000
trusted library allocation
page read and write
A425000
heap
page read and write
A370000
heap
page read and write
A0EC000
heap
page read and write
4005000
trusted library allocation
page read and write
355D000
stack
page read and write
A469000
heap
page read and write
A410000
heap
page read and write
2E60000
unkown
page read and write
4017000
trusted library allocation
page read and write
4FC8000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
C183000
unkown
page read and write
5430000
trusted library allocation
page read and write
EAD000
trusted library allocation
page execute and read and write
3185000
stack
page read and write
1AC3000
heap
page read and write
A0C6000
heap
page read and write
107DA000
heap
page read and write
5582000
unkown
page readonly
B56000
stack
page read and write
153E000
stack
page read and write
29B0000
direct allocation
page read and write
F6E000
stack
page read and write
B97000
heap
page read and write
88A9000
unkown
page read and write
8810000
unkown
page read and write
590E000
stack
page read and write
2F9F000
trusted library allocation
page read and write
A469000
heap
page read and write
3FFA000
trusted library allocation
page read and write
9C88000
heap
page read and write
57EE000
stack
page read and write
446000
unkown
page readonly
9CCD000
heap
page read and write
4560000
heap
page read and write
403F000
trusted library allocation
page read and write
4CDD000
stack
page read and write
9FAB000
heap
page read and write
9E90000
heap
page read and write
995B000
heap
page read and write
1493000
trusted library allocation
page execute and read and write
29A000
unkown
page read and write
1A20000
heap
page read and write
7FF5DF3FC000
unkown
page readonly
60CE000
stack
page read and write
3070000
direct allocation
page read and write
1540000
heap
page read and write
DE0000
heap
page read and write
9CAF000
heap
page read and write
1AC9000
heap
page read and write
4024000
trusted library allocation
page read and write
151D000
heap
page read and write
402E000
trusted library allocation
page read and write
1AD4000
heap
page read and write
543C000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
13F1000
trusted library allocation
page read and write
7FF5DEFB7000
unkown
page readonly
BC0000
heap
page read and write
29C000
unkown
page readonly
5405000
trusted library allocation
page read and write
7FF5DF551000
unkown
page readonly
208E000
stack
page read and write
CB5000
heap
page read and write
F73000
trusted library allocation
page execute and read and write
460000
heap
page read and write
4E60000
heap
page execute and read and write
699E000
stack
page read and write
1A22000
heap
page read and write
2E10000
trusted library allocation
page read and write
F40000
heap
page read and write
344E000
stack
page read and write
938000
heap
page read and write
1ACC000
heap
page read and write
404E000
trusted library allocation
page read and write
2F4F000
stack
page read and write
2572000
trusted library allocation
page read and write
9F23000
unkown
page read and write
108EE000
unkown
page read and write
2BA0000
heap
page execute and read and write
8B60000
unkown
page read and write
A237000
heap
page read and write
A362000
heap
page read and write
53E0000
trusted library allocation
page read and write
3F27000
trusted library allocation
page read and write
9F88000
heap
page read and write
3E9F000
stack
page read and write
9564000
unkown
page read and write
9B1E000
stack
page read and write
2BE1000
trusted library allocation
page read and write
9C8B000
heap
page read and write
2D1E000
stack
page read and write
7FF5DF18E000
unkown
page readonly
570E000
stack
page read and write
11C0000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
2F61000
trusted library allocation
page read and write
5BFE000
stack
page read and write
2FA7000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
4025000
trusted library allocation
page read and write
A188000
heap
page read and write
4001000
trusted library allocation
page read and write
2E60000
unkown
page read and write
9BD5000
heap
page read and write
9946000
heap
page read and write
CE3000
trusted library allocation
page execute and read and write
54D5000
trusted library allocation
page read and write
401D000
trusted library allocation
page read and write
1AD9000
heap
page read and write
1A27000
heap
page read and write
974000
heap
page read and write
3FF1000
trusted library allocation
page read and write
9A5000
heap
page read and write
63CB000
stack
page read and write
D07000
trusted library allocation
page execute and read and write
7FF5DF1FD000
unkown
page readonly
4E1F000
stack
page read and write
41B000
unkown
page write copy
5762000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
4DF4000
trusted library allocation
page read and write
51A000
heap
page read and write
E69000
heap
page read and write
2E15000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
403B000
trusted library allocation
page read and write
4047000
trusted library allocation
page read and write
C1A9000
unkown
page read and write
9CB3000
heap
page read and write
8B60000
unkown
page read and write
5A30000
trusted library allocation
page read and write
B120000
unkown
page readonly
7FF5DF06F000
unkown
page readonly
A0A5000
unkown
page read and write
A8C8000
heap
page read and write
E5B000
heap
page read and write
408000
unkown
page readonly
A2A5000
heap
page read and write
9D4D000
heap
page read and write
21CF000
stack
page read and write
8B60000
unkown
page read and write
16B0000
trusted library allocation
page read and write
1AC2000
heap
page read and write
29F9000
trusted library allocation
page read and write
4E2D000
trusted library allocation
page read and write
575E000
stack
page read and write
A228000
heap
page read and write
369D000
stack
page read and write
D9B000
stack
page read and write
FD8A000
unkown
page read and write
402D000
trusted library allocation
page read and write
5520000
heap
page read and write
4016000
trusted library allocation
page read and write
83F0000
unkown
page read and write
1428000
heap
page read and write
BD7F000
stack
page read and write
D00000
heap
page read and write
2E5E000
stack
page read and write
7991000
unkown
page read and write
9E22000
heap
page read and write
19D000
stack
page read and write
73B2000
unkown
page read and write
7FF5DF537000
unkown
page readonly
28DE000
heap
page read and write
A116000
heap
page read and write
2D61000
trusted library allocation
page read and write
2A2D000
heap
page execute and read and write
B9A000
trusted library allocation
page execute and read and write
7FF5DEEEB000
unkown
page readonly
98A7000
unkown
page read and write
2D7E000
stack
page read and write
4065000
trusted library allocation
page read and write
A88A000
heap
page read and write
2F8D000
trusted library allocation
page read and write
37DE000
stack
page read and write
4017000
trusted library allocation
page read and write
9C8C000
heap
page read and write
259E000
stack
page read and write
1480000
trusted library allocation
page read and write
1AC2000
heap
page read and write
1347000
trusted library allocation
page execute and read and write
53DE000
trusted library allocation
page read and write
3F36000
trusted library allocation
page read and write
7FF5DE535000
unkown
page readonly
1064E000
unkown
page read and write
4015000
trusted library allocation
page read and write
A161000
heap
page read and write
EC2000
trusted library allocation
page read and write
9C8C000
heap
page read and write
104C3000
unkown
page read and write
9CB5000
heap
page read and write
3C3B000
trusted library allocation
page read and write
400B000
trusted library allocation
page read and write
9E0C000
heap
page read and write
8B0000
heap
page read and write
345E000
stack
page read and write
7DF4E6780000
unkown
page readonly
3362000
unkown
page read and write
A294000
heap
page read and write
1A3C000
heap
page read and write
3FFE000
trusted library allocation
page read and write
124F000
stack
page read and write
441F000
trusted library allocation
page read and write
9FF3000
heap
page read and write
51A000
heap
page read and write
FAB000
trusted library allocation
page execute and read and write
2F99000
trusted library allocation
page read and write
ED2000
trusted library allocation
page read and write
694A000
heap
page read and write
9F5F000
heap
page read and write
A2F8000
heap
page read and write
83F0000
unkown
page read and write
111E000
stack
page read and write
5ABC000
stack
page read and write
25A0000
trusted library allocation
page execute and read and write
9CB5000
heap
page read and write
8810000
unkown
page read and write
1200000
trusted library allocation
page read and write
7FF5DF08B000
unkown
page readonly
470000
heap
page read and write
138A000
heap
page read and write
4156000
trusted library allocation
page read and write
41D9000
trusted library allocation
page read and write
4025000
trusted library allocation
page read and write
50BC000
trusted library allocation
page read and write
1A3C000
heap
page read and write
83F0000
unkown
page read and write
9D92000
heap
page read and write
404E000
trusted library allocation
page read and write
19F0000
heap
page read and write
A3B4000
heap
page read and write
2A1F000
stack
page read and write
47D000
stack
page read and write
A2FF000
heap
page read and write
8B60000
unkown
page read and write
3C60000
heap
page read and write
7FF5DF58A000
unkown
page readonly
8B60000
unkown
page read and write
4005000
trusted library allocation
page read and write
3399000
unkown
page read and write
403D000
trusted library allocation
page read and write
A397000
heap
page read and write
8B60000
unkown
page read and write
1210000
heap
page read and write
2E70000
heap
page read and write
1AD9000
heap
page read and write
BFEF000
unkown
page read and write
57E0000
heap
page execute and read and write
2A77000
trusted library allocation
page read and write
9CD2000
heap
page read and write
4B74000
trusted library allocation
page read and write
507F000
stack
page read and write
7FF5DF42F000
unkown
page readonly
1A27000
heap
page read and write
555E000
stack
page read and write
995A000
heap
page read and write
1AAE000
heap
page read and write
2B2E000
stack
page read and write
1202000
trusted library allocation
page read and write
F24000
trusted library allocation
page read and write
4400000
heap
page read and write
A2AD000
heap
page read and write
F0E000
stack
page read and write
D60000
heap
page read and write
A0BD000
heap
page read and write
5470000
trusted library allocation
page read and write
3290000
unkown
page readonly
7FF5DF4EC000
unkown
page readonly
133A000
trusted library allocation
page execute and read and write
1A54000
heap
page read and write
4BA5000
trusted library allocation
page read and write
1AB6000
heap
page read and write
11E0000
trusted library allocation
page read and write
4025000
trusted library allocation
page read and write
3E93000
trusted library allocation
page read and write
7FF5DF25E000
unkown
page readonly
9EDC000
heap
page read and write
379F000
stack
page read and write
FA2000
trusted library allocation
page read and write
104CE000
unkown
page read and write
104C5000
unkown
page read and write
502C000
trusted library allocation
page read and write
B80000
heap
page read and write
7FF5DF126000
unkown
page readonly
4439000
trusted library allocation
page read and write
9BEE000
heap
page read and write
F30000
trusted library allocation
page read and write
A448000
heap
page read and write
401000
unkown
page execute read
5570000
trusted library allocation
page read and write
1250000
heap
page read and write
9966000
heap
page read and write
28FE000
heap
page read and write
9F70000
heap
page read and write
630C000
stack
page read and write
94C0000
unkown
page read and write
9F7D000
heap
page read and write
2DCE000
stack
page read and write
7840000
unkown
page read and write
10F6000
stack
page read and write
7FF5DF089000
unkown
page readonly
25E0000
trusted library allocation
page execute and read and write
980000
unkown
page readonly
402A000
trusted library allocation
page read and write
2CAF000
stack
page read and write
51D5000
trusted library allocation
page read and write
59F2000
trusted library allocation
page read and write
7FF5DF507000
unkown
page readonly
A1FE000
heap
page read and write
83F0000
unkown
page read and write
2708000
unkown
page readonly
3030000
heap
page read and write
9F91000
heap
page read and write
2708000
unkown
page readonly
8B60000
unkown
page read and write
3FFA000
trusted library allocation
page read and write
2D5D000
trusted library allocation
page read and write
A015000
heap
page read and write
3FF1000
trusted library allocation
page read and write
A332000
heap
page read and write
54B0000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
A230000
heap
page read and write
4037000
trusted library allocation
page read and write
4066000
trusted library allocation
page read and write
A30B000
heap
page read and write
4005000
trusted library allocation
page read and write
1F0000
heap
page read and write
F28000
stack
page read and write
6E00000
heap
page read and write
7FF5DF081000
unkown
page readonly
B50000
heap
page read and write
5A01000
trusted library allocation
page read and write
5AD0000
unkown
page readonly
9FB8000
heap
page read and write
2FBE000
stack
page read and write
149D000
trusted library allocation
page execute and read and write
3B4C000
trusted library allocation
page read and write
7FF5DF582000
unkown
page readonly
1AA0000
heap
page read and write
531E000
stack
page read and write
BFB3000
unkown
page read and write
10004000
unkown
page readonly
9CA6000
heap
page read and write
5440000
trusted library allocation
page read and write
2A2E000
stack
page read and write
BFA5000
unkown
page read and write
8EA8000
stack
page read and write
F00000
trusted library allocation
page execute and read and write
A285000
heap
page read and write
53E6000
trusted library allocation
page read and write
50C1000
trusted library allocation
page read and write
1460000
heap
page execute and read and write
FE0000
heap
page read and write
9C91000
heap
page read and write
2D70000
unkown
page read and write
F74000
trusted library allocation
page read and write
4131000
trusted library allocation
page read and write
A326000
heap
page read and write
8B60000
unkown
page read and write
12EE000
stack
page read and write
B70000
trusted library allocation
page read and write
312E000
stack
page read and write
A09E000
heap
page read and write
109E000
stack
page read and write
CD0000
heap
page read and write
108EC000
unkown
page read and write
9A1E000
heap
page read and write
BF90000
unkown
page read and write
8800000
unkown
page read and write
9CB5000
heap
page read and write
BFA3000
unkown
page read and write
A0DE000
heap
page read and write
9D62000
heap
page read and write
5A20000
trusted library allocation
page execute and read and write
9FDA000
heap
page read and write
9C2000
heap
page read and write
2871000
trusted library allocation
page read and write
2FB8000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
9C000
stack
page read and write
4FD6000
trusted library allocation
page read and write
7FF5DEE43000
unkown
page readonly
548E000
stack
page read and write
41B000
unkown
page write copy
8B60000
unkown
page read and write
1A53000
heap
page read and write
C565000
unkown
page read and write
2B51000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
D50000
unkown
page read and write
9A06000
heap
page read and write
2B70000
trusted library allocation
page read and write
8B60000
unkown
page read and write
2BD6000
trusted library allocation
page read and write
401000
unkown
page execute read
11D4000
trusted library allocation
page read and write
146F000
stack
page read and write
9BCD000
heap
page read and write
7FF5DF5A3000
unkown
page readonly
4005000
trusted library allocation
page read and write
AEEE000
stack
page read and write
7FF5DF43C000
unkown
page readonly
83E0000
unkown
page read and write
A1A0000
heap
page read and write
A489000
heap
page read and write
978C000
unkown
page read and write
8B60000
unkown
page read and write
7FF5DF48B000
unkown
page readonly
A174000
heap
page read and write
53DB000
trusted library allocation
page read and write
994E000
heap
page read and write
98AD000
unkown
page read and write
7FF5DF5B0000
unkown
page readonly
ED7000
trusted library allocation
page execute and read and write
13EF000
stack
page read and write
2D5F000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
1AD4000
heap
page read and write
5504000
trusted library allocation
page read and write
7FF5DEFE2000
unkown
page readonly
A37F000
heap
page read and write
19EE000
stack
page read and write
3BB5000
trusted library allocation
page read and write
83F0000
unkown
page read and write
9C98000
heap
page read and write
528000
heap
page read and write
4B8E000
trusted library allocation
page read and write
9E27000
heap
page read and write
9C88000
heap
page read and write
7FF5DEF4B000
unkown
page readonly
7FF5DF2E5000
unkown
page readonly
1A9B000
heap
page read and write
1A54000
heap
page read and write
10001000
unkown
page execute read
2D70000
unkown
page read and write
8810000
unkown
page read and write
9CAB000
heap
page read and write
9B86000
heap
page read and write
2732000
heap
page read and write
9EA4000
heap
page read and write
889E000
stack
page read and write
3FB1000
trusted library allocation
page read and write
256A000
trusted library allocation
page execute and read and write
A2C6000
heap
page read and write
9CAB000
heap
page read and write
83F0000
unkown
page read and write
A1B2000
heap
page read and write
2761000
trusted library allocation
page read and write
1C2E000
stack
page read and write
A443000
heap
page read and write
1A22000
heap
page read and write
9E62000
heap
page read and write
1490000
trusted library allocation
page read and write
1AB2000
heap
page read and write
8B60000
unkown
page read and write
4027000
trusted library allocation
page read and write
4015000
trusted library allocation
page read and write
7FF5DF539000
unkown
page readonly
3F65000
trusted library allocation
page read and write
9F00000
heap
page read and write
EE83000
unkown
page read and write
9D5A000
heap
page read and write
3BE7000
trusted library allocation
page read and write
9C88000
heap
page read and write
BFAF000
unkown
page read and write
7FF5DF4F7000
unkown
page readonly
C354000
unkown
page read and write
CD4000
trusted library allocation
page read and write
8810000
unkown
page read and write
8B60000
unkown
page read and write
9CB5000
heap
page read and write
59F5000
trusted library allocation
page read and write
550B000
trusted library allocation
page read and write
12AB000
trusted library allocation
page execute and read and write
8390000
unkown
page read and write
556E000
stack
page read and write
7FF5DF3EA000
unkown
page readonly
EC0000
trusted library allocation
page read and write
3FFA000
trusted library allocation
page read and write
3A3E000
trusted library allocation
page read and write
A2CA000
heap
page read and write
D9B000
stack
page read and write
620E000
stack
page read and write
8B60000
unkown
page read and write
8B60000
unkown
page read and write
2F20000
unkown
page read and write
296E000
stack
page read and write
518E000
stack
page read and write
4BC5000
trusted library allocation
page read and write
53C5000
trusted library allocation
page read and write
12F7000
trusted library allocation
page read and write
AD75000
heap
page read and write
A13C000
heap
page read and write
1AC6000
heap
page read and write
5A25000
trusted library allocation
page read and write
16C0000
trusted library allocation
page read and write
9CBD000
heap
page read and write
7870000
unkown
page read and write
2990000
trusted library allocation
page read and write
8B60000
unkown
page read and write
9CB2000
heap
page read and write
5640000
heap
page read and write
935D000
stack
page read and write
1A61000
heap
page read and write
9FA0000
heap
page read and write
28AE000
stack
page read and write
47A2000
unkown
page read and write
2E60000
unkown
page read and write
8B60000
unkown
page read and write
9CB1000
heap
page read and write
1AAD000
heap
page read and write
29AD000
stack
page read and write
1320000
trusted library allocation
page read and write
A1B0000
heap
page read and write
BA0000
heap
page read and write
9F10000
unkown
page read and write
A690000
unkown
page read and write
EF0000
trusted library allocation
page read and write
A080000
heap
page read and write
2E60000
unkown
page read and write
BF9F000
unkown
page read and write
2E60000
unkown
page read and write
7FF5DF532000
unkown
page readonly
9C91000
heap
page read and write
7FF5DF3C2000
unkown
page readonly
CC0000
trusted library allocation
page read and write
4FDD000
trusted library allocation
page read and write
8B60000
unkown
page read and write
10B0000
heap
page read and write
66A0000
heap
page read and write
9D88000
heap
page read and write
1ACC000
heap
page read and write
4029000
trusted library allocation
page read and write
9FBD000
heap
page read and write
5585000
trusted library allocation
page read and write
9C88000
heap
page read and write
2F61000
trusted library allocation
page read and write
9E75000
heap
page read and write
14C7000
trusted library allocation
page execute and read and write
2DBE000
stack
page read and write
7FF5DF2CB000
unkown
page readonly
10C0000
heap
page read and write
7FF5DF08F000
unkown
page readonly
401D000
trusted library allocation
page read and write
58AF000
stack
page read and write
5420000
trusted library allocation
page read and write
1270000
heap
page read and write
1ACA000
heap
page read and write
7DF4E6760000
unkown
page readonly
4096000
trusted library allocation
page read and write
28F9000
heap
page read and write
4073000
trusted library allocation
page read and write
4025000
trusted library allocation
page read and write
7FF5DF2F3000
unkown
page readonly
9C84000
heap
page read and write
7FF5DEF84000
unkown
page readonly
10612000
unkown
page read and write
104C5000
unkown
page read and write
14C0000
heap
page read and write
28B0000
direct allocation
page read and write
51CE000
stack
page read and write
2C2E000
trusted library allocation
page read and write
970000
heap
page read and write
4017000
trusted library allocation
page read and write
30BE000
stack
page read and write
2450000
trusted library allocation
page read and write
B4D000
heap
page read and write
4016000
trusted library allocation
page read and write
7FF5C0B6B000
unkown
page readonly
129B000
heap
page read and write
9CBA000
heap
page read and write
4025000
trusted library allocation
page read and write
9F5B000
heap
page read and write
2DF1000
trusted library allocation
page read and write
5A37000
trusted library allocation
page read and write
A0A9000
heap
page read and write
3BE7000
trusted library allocation
page read and write
28D0000
heap
page read and write
107E0000
unkown
page read and write
4015000
trusted library allocation
page read and write
28DF000
stack
page read and write
1350000
heap
page read and write
9CCC000
heap
page read and write
83F0000
unkown
page read and write
7FF5DF5CC000
unkown
page readonly
5A17000
trusted library allocation
page read and write
9E66000
heap
page read and write
8B60000
unkown
page read and write
7FF5DF422000
unkown
page readonly
10828000
unkown
page read and write
120D000
trusted library allocation
page execute and read and write
F9A000
trusted library allocation
page execute and read and write
8B60000
unkown
page read and write
1AC2000
heap
page read and write
B96000
trusted library allocation
page execute and read and write
4BD0000
heap
page read and write
7FF5DF1CD000
unkown
page readonly
909C000
stack
page read and write
2BF0000
trusted library allocation
page read and write
400F000
trusted library allocation
page read and write
7FF5DF07D000
unkown
page readonly
4025000
trusted library allocation
page read and write
DA6000
stack
page read and write
74D6000
unkown
page read and write
7FF5DF5A8000
unkown
page readonly
A120000
heap
page read and write
7FF5DEFFC000
unkown
page readonly
E26000
trusted library allocation
page execute and read and write
25F5000
trusted library allocation
page read and write
2E60000
unkown
page read and write
5510000
trusted library allocation
page read and write
1AD4000
heap
page read and write
A2D6000
heap
page read and write
5612000
trusted library allocation
page read and write
4015000
trusted library allocation
page read and write
A4A1000
heap
page read and write
2604000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
10841000
unkown
page read and write
12BB000
trusted library allocation
page execute and read and write
5565000
trusted library allocation
page read and write
2C8F000
trusted library allocation
page read and write
11C0000
heap
page read and write
3FF6000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
3382000
unkown
page read and write
5451000
trusted library allocation
page read and write
422000
unkown
page read and write
E38000
heap
page read and write
634D000
stack
page read and write
104CC000
unkown
page read and write
A40C000
heap
page read and write
A139000
heap
page read and write
48E0000
unkown
page read and write
1063D000
unkown
page read and write
7910000
unkown
page readonly
9CB0000
heap
page read and write
4410000
heap
page read and write
539E000
stack
page read and write
9CB3000
heap
page read and write
9E36000
heap
page read and write
558F000
stack
page read and write
12D8000
heap
page read and write
4BC3000
trusted library allocation
page read and write
4F3E000
stack
page read and write
2C97000
trusted library allocation
page read and write
9C89000
heap
page read and write
8B60000
unkown
page read and write
15B0000
heap
page read and write
E30000
heap
page read and write
56DE000
stack
page read and write
3ABE000
trusted library allocation
page read and write
9A80000
heap
page read and write
2F9C000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
9EFA000
heap
page read and write
2457000
trusted library allocation
page execute and read and write
AD2B000
stack
page read and write
2EF1000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
BF82000
unkown
page read and write
43B0000
heap
page read and write
10632000
unkown
page read and write
11F0000
trusted library allocation
page read and write
470000
heap
page read and write
54F0000
heap
page read and write
2E60000
unkown
page read and write
7FF5DF229000
unkown
page readonly
7BB000
stack
page read and write
5451000
trusted library allocation
page read and write
9BBF000
heap
page read and write
4005000
trusted library allocation
page read and write
9EDE000
heap
page read and write
2E60000
unkown
page read and write
7FF5DEFBD000
unkown
page readonly
97C4000
unkown
page read and write
A6F1000
unkown
page read and write
E30000
heap
page read and write
2E26000
trusted library allocation
page read and write
405D000
trusted library allocation
page read and write
402C000
trusted library allocation
page read and write
108E4000
unkown
page read and write
A0DB000
heap
page read and write
3877000
trusted library allocation
page read and write
5563000
trusted library allocation
page read and write
9CA0000
heap
page read and write
1ACC000
heap
page read and write
1AD9000
heap
page read and write
9CB0000
heap
page read and write
7C0000
heap
page read and write
9E46000
heap
page read and write
8B60000
unkown
page read and write
4005000
trusted library allocation
page read and write
272E000
stack
page read and write
2F91000
trusted library allocation
page read and write
4088000
trusted library allocation
page read and write
5465000
trusted library allocation
page read and write
9F98000
heap
page read and write
A0BA000
heap
page read and write
D99000
heap
page read and write
9C9D000
heap
page read and write
B30000
heap
page read and write
50AE000
stack
page read and write
408000
unkown
page readonly
A3F5000
heap
page read and write
A08D000
heap
page read and write
908000
heap
page read and write
13CF000
stack
page read and write
2619000
trusted library allocation
page read and write
8B60000
unkown
page read and write
439000
unkown
page readonly
29B0000
heap
page read and write
973C000
unkown
page read and write
A0C2000
heap
page read and write
9E59000
heap
page read and write
513F000
stack
page read and write
9C96000
heap
page read and write
9C91000
heap
page read and write
A104000
unkown
page read and write
F10000
heap
page read and write
9C8F000
heap
page read and write
8B60000
unkown
page read and write
A88A000
heap
page read and write
59EF000
stack
page read and write
FB3000
trusted library allocation
page execute and read and write
2700000
heap
page read and write
2E60000
unkown
page read and write
2E60000
unkown
page read and write
8810000
unkown
page read and write
120E000
stack
page read and write
A08A000
unkown
page read and write
528000
heap
page read and write
12E0000
heap
page read and write
404E000
trusted library allocation
page read and write
5660000
heap
page execute and read and write
596E000
stack
page read and write
7FF5DF478000
unkown
page readonly
8B60000
unkown
page read and write
11D0000
trusted library allocation
page read and write
9E3A000
heap
page read and write
14C2000
trusted library allocation
page read and write
9CB6000
heap
page read and write
C013000
unkown
page read and write
A6B000
stack
page read and write
9CA5000
heap
page read and write
6280000
unkown
page readonly
124A000
heap
page read and write
4025000
trusted library allocation
page read and write
2B95000
trusted library allocation
page read and write
9C84000
heap
page read and write
7FF5DF3AA000
unkown
page readonly
39D7000
trusted library allocation
page read and write
11A0000
unkown
page readonly
16C6000
trusted library allocation
page read and write
A2D2000
heap
page read and write
1F0000
heap
page read and write
1220000
heap
page read and write
A0E7000
heap
page read and write
2B70000
trusted library allocation
page read and write
4020000
trusted library allocation
page read and write
528F000
stack
page read and write
52D0000
heap
page execute and read and write
11A0000
trusted library allocation
page read and write
F23000
trusted library allocation
page execute and read and write
436000
unkown
page readonly
EB0000
trusted library allocation
page read and write
9CB5000
heap
page read and write
9C82000
heap
page read and write
9CB9000
heap
page read and write
C6E000
stack
page read and write
A211000
heap
page read and write
55C6000
unkown
page readonly
10F6000
stack
page read and write
3F21000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
11E2000
trusted library allocation
page read and write
12A2000
trusted library allocation
page read and write
2DAC000
stack
page read and write
9CBB000
heap
page read and write
4730000
heap
page read and write
5520000
trusted library allocation
page read and write
1032000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page execute and read and write
900000
heap
page read and write
8B60000
unkown
page read and write
2D90000
heap
page execute and read and write
104C5000
unkown
page read and write
A24E000
heap
page read and write
8B60000
unkown
page read and write
4025000
trusted library allocation
page read and write
3450000
heap
page read and write
2E60000
unkown
page read and write
9CA2000
heap
page read and write
7FF5DEFF0000
unkown
page readonly
2E60000
unkown
page read and write
1AD8000
heap
page read and write
12AC000
stack
page read and write
9FF7000
heap
page read and write
4F8000
heap
page read and write
553E000
stack
page read and write
328C000
stack
page read and write
29D5000
trusted library allocation
page read and write
7FF5DF396000
unkown
page readonly
517D000
stack
page read and write
2990000
heap
page read and write
A342000
heap
page read and write
DB0000
heap
page read and write
576E000
stack
page read and write
7399000
unkown
page read and write
286E000
stack
page read and write
1190000
heap
page read and write
401000
unkown
page execute read
FDA000
trusted library allocation
page execute and read and write
29C000
unkown
page readonly
9C91000
heap
page read and write
BA0000
heap
page read and write
2D55000
trusted library allocation
page read and write
7FF5DF5AE000
unkown
page readonly
53E1000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
7395000
unkown
page read and write
A423000
heap
page read and write
10DB000
heap
page read and write
73BC000
unkown
page read and write
C5E000
heap
page read and write
283E000
stack
page read and write
4079000
trusted library allocation
page read and write
669F000
stack
page read and write
8B60000
unkown
page read and write
7FF5DF21B000
unkown
page readonly
3A7D000
trusted library allocation
page read and write
D49000
heap
page read and write
1A3C000
heap
page read and write
29A6000
trusted library allocation
page read and write
58CF000
stack
page read and write
B3E000
stack
page read and write
2B5F000
stack
page read and write
4016000
trusted library allocation
page read and write
40A000
unkown
page write copy
490000
heap
page read and write
5416000
trusted library allocation
page read and write
73B6000
unkown
page read and write
7FF5DF3B9000
unkown
page readonly
7FF5DF50F000
unkown
page readonly
11FA000
trusted library allocation
page execute and read and write
1400000
trusted library allocation
page read and write
A744000
unkown
page read and write
1634000
unkown
page readonly
5515000
trusted library allocation
page read and write
25B0000
heap
page execute and read and write
9718000
unkown
page read and write
1146000
heap
page read and write
ADB000
stack
page read and write
9FA2000
heap
page read and write
57C0000
heap
page execute and read and write
9F82000
heap
page read and write
7FF5DF571000
unkown
page readonly
9C64000
heap
page read and write
8810000
unkown
page read and write
544E000
stack
page read and write
5500000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
5527000
trusted library allocation
page read and write
8B60000
unkown
page read and write
3FF1000
trusted library allocation
page read and write
B10000
heap
page read and write
FD8C000
unkown
page read and write
400000
unkown
page readonly
61D0000
heap
page read and write
9C98000
heap
page read and write
2C40000
heap
page read and write
1AB9000
heap
page read and write
3371000
unkown
page read and write
2B50000
heap
page read and write
401000
unkown
page execute read
7FF5DF2FE000
unkown
page readonly
2DEF000
stack
page read and write
9C49000
heap
page read and write
4760000
unkown
page read and write
59FE000
stack
page read and write
10603000
unkown
page read and write
27D1000
trusted library allocation
page read and write
3735000
trusted library allocation
page read and write
56FF000
stack
page read and write
4016000
trusted library allocation
page read and write
2F55000
trusted library allocation
page read and write
3E02000
trusted library allocation
page read and write
53E9000
trusted library allocation
page read and write
C80000
heap
page read and write
18A0000
heap
page read and write
2EEF000
stack
page read and write
53F5000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
400000
unkown
page readonly
11B4000
trusted library allocation
page read and write
53B5000
trusted library allocation
page read and write
10A8000
heap
page read and write
52D3000
trusted library allocation
page read and write
7FF5DF45A000
unkown
page readonly
7C89000
stack
page read and write
12D0000
trusted library allocation
page execute and read and write
7810000
unkown
page read and write
210000
unkown
page readonly
1215000
heap
page read and write
4FDE000
stack
page read and write
9EAF000
heap
page read and write
4860000
unkown
page read and write
9CC3000
heap
page read and write
336F000
unkown
page read and write
51DE000
trusted library allocation
page read and write
7FF5DF380000
unkown
page readonly
9C1D000
stack
page read and write
2F20000
unkown
page read and write
A3BD000
heap
page read and write
A1D6000
heap
page read and write
40A000
unkown
page write copy
2981000
trusted library allocation
page read and write
57CE000
stack
page read and write
7FF5DF3D4000
unkown
page readonly
7FF5DEFF8000
unkown
page readonly
9CA7000
heap
page read and write
5A50000
unkown
page readonly
41AB000
trusted library allocation
page read and write
9ACF000
heap
page read and write
9FA0000
unkown
page read and write
2E60000
unkown
page read and write
9A41000
heap
page read and write
4025000
trusted library allocation
page read and write
3FF5000
trusted library allocation
page read and write
9A51000
heap
page read and write
7FF5DF4F3000
unkown
page readonly
545E000
stack
page read and write
58FF000
stack
page read and write
2E60000
unkown
page read and write
53A0000
trusted library allocation
page read and write
A491000
heap
page read and write
9CB4000
heap
page read and write
8810000
unkown
page read and write
4060000
trusted library allocation
page read and write
A0B1000
unkown
page read and write
7800000
unkown
page read and write
462000
unkown
page readonly
A893000
heap
page read and write
2BD8000
trusted library allocation
page read and write
682C000
stack
page read and write
10D8000
heap
page read and write
19D000
stack
page read and write
ECA000
trusted library allocation
page execute and read and write
401F000
trusted library allocation
page read and write
19FE000
heap
page read and write
1A9B000
heap
page read and write
8B60000
unkown
page read and write
92A000
heap
page read and write
3375000
unkown
page read and write
598E000
stack
page read and write
402F000
trusted library allocation
page read and write
A090000
heap
page read and write
5489000
trusted library allocation
page read and write
AB0000
heap
page read and write
25F0000
trusted library allocation
page read and write
9CC0000
heap
page read and write
BF9D000
unkown
page read and write
104CA000
unkown
page read and write
507000
heap
page read and write
A106000
unkown
page read and write
1054000
unkown
page write copy
14A6000
trusted library allocation
page execute and read and write
AB89000
stack
page read and write
2BAE000
stack
page read and write
42A000
unkown
page read and write
A5D4000
heap
page read and write
4B97000
trusted library allocation
page read and write
2BC0000
trusted library allocation
page read and write
1AD8000
heap
page read and write
9E9E000
stack
page read and write
8B60000
unkown
page read and write
3871000
trusted library allocation
page read and write
16D0000
heap
page read and write
4F8000
heap
page read and write
9C83000
heap
page read and write
9A27000
heap
page read and write
11DF000
stack
page read and write
9A3F000
heap
page read and write
9CB3000
heap
page read and write
772000
unkown
page readonly
A8D3000
heap
page read and write
A21C000
heap
page read and write
A225000
heap
page read and write
1060F000
unkown
page read and write
A2B0000
heap
page read and write
408E000
trusted library allocation
page read and write
11D3000
trusted library allocation
page execute and read and write
7FF5DEE4E000
unkown
page readonly
A324000
heap
page read and write
AD6C000
heap
page read and write
F6F000
unkown
page read and write
9D9F000
stack
page read and write
92B000
heap
page read and write
9DD6000
heap
page read and write
A3E3000
heap
page read and write
F90000
trusted library allocation
page read and write
4023000
trusted library allocation
page read and write
9F4D000
heap
page read and write
9E1D000
heap
page read and write
BF98000
unkown
page read and write
4DA5000
trusted library allocation
page read and write
A30000
heap
page read and write
404C000
trusted library allocation
page read and write
7FF5DF3F1000
unkown
page readonly
1210000
trusted library allocation
page execute and read and write
7FF5DF57F000
unkown
page readonly
29C0000
heap
page execute and read and write
2BB6000
trusted library allocation
page read and write
9CC6000
heap
page read and write
BB0000
heap
page read and write
104C9000
unkown
page read and write
A38F000
heap
page read and write
5560000
trusted library allocation
page read and write
7FF5DF343000
unkown
page readonly
9714000
unkown
page read and write
2F65000
trusted library allocation
page read and write
9F74000
unkown
page read and write
7860000
unkown
page read and write
9FEE000
heap
page read and write
A373000
heap
page read and write
9CB1000
heap
page read and write
D18000
heap
page read and write
3F55000
trusted library allocation
page read and write
141F000
stack
page read and write
9C5A000
heap
page read and write
7909000
stack
page read and write
5712000
trusted library allocation
page read and write
A288000
heap
page read and write
2F8F000
trusted library allocation
page read and write
9F94000
heap
page read and write
1350000
heap
page read and write
7FF5DF341000
unkown
page readonly
1A27000
heap
page read and write
8910000
unkown
page read and write
3B03000
trusted library allocation
page read and write
2BBE000
trusted library allocation
page read and write
A1CF000
heap
page read and write
9CD1000
heap
page read and write
647E000
stack
page read and write
7FF5DF549000
unkown
page readonly
7FF5DF349000
unkown
page readonly
99E000
heap
page read and write
9CA2000
heap
page read and write
543B000
trusted library allocation
page read and write
9CA8000
heap
page read and write
770000
unkown
page readonly
8B60000
unkown
page read and write
880000
heap
page read and write
9C9E000
heap
page read and write
2E60000
unkown
page read and write
2BB1000
trusted library allocation
page read and write
DF0000
heap
page read and write
2560000
trusted library allocation
page read and write
3364000
unkown
page read and write
10B7000
heap
page read and write
2BB0000
trusted library allocation
page read and write
50CE000
stack
page read and write
107E000
stack
page read and write
D10000
heap
page read and write
A0E2000
heap
page read and write
50B2000
trusted library allocation
page read and write
A072000
unkown
page read and write
C192000
unkown
page read and write
BFDF000
unkown
page read and write
5570000
heap
page read and write
1274000
trusted library allocation
page read and write
8B60000
unkown
page read and write
BEB0000
unkown
page read and write
2BB0000
trusted library allocation
page read and write
C1C4000
unkown
page read and write
A269000
heap
page read and write
A377000
heap
page read and write
7FF5DEE56000
unkown
page readonly
9F1A000
heap
page read and write
8B60000
unkown
page read and write
434000
unkown
page read and write
57A0000
heap
page execute and read and write
2995000
trusted library allocation
page read and write
7A30000
unkown
page read and write
662B000
stack
page read and write
A1A4000
heap
page read and write
5C5000
heap
page read and write
2E60000
unkown
page read and write
2BCE000
trusted library allocation
page read and write
73B8000
unkown
page read and write
CE0000
trusted library allocation
page read and write
4040000
trusted library allocation
page read and write
203F000
stack
page read and write
2AB6000
trusted library allocation
page read and write
5740000
heap
page execute and read and write
A1A7000
heap
page read and write
63B000
stack
page read and write
2F97000
trusted library allocation
page read and write
9A3D000
heap
page read and write
2F20000
unkown
page read and write
FBD000
trusted library allocation
page execute and read and write
A1F8000
heap
page read and write
47B6000
unkown
page read and write
9BFD000
heap
page read and write
A091000
heap
page read and write
8800000
unkown
page read and write
1AB9000
heap
page read and write
4035000
trusted library allocation
page read and write
F40000
heap
page read and write
101DF000
unkown
page read and write
1336000
trusted library allocation
page execute and read and write
A2BC000
heap
page read and write
401000
unkown
page execute read
8B60000
unkown
page read and write
30F0000
remote allocation
page read and write
1300000
heap
page read and write
A481000
heap
page read and write
761000
stack
page read and write
A430000
heap
page read and write
2F3E000
stack
page read and write
8810000
unkown
page read and write
3F51000
trusted library allocation
page read and write
1590000
heap
page read and write
7FF5DF191000
unkown
page readonly
A39C000
heap
page read and write
1330000
trusted library allocation
page read and write
83F0000
unkown
page read and write
CDD000
trusted library allocation
page execute and read and write
4FE5000
trusted library allocation
page read and write
1AA0000
heap
page read and write
670E000
stack
page read and write
540E000
stack
page read and write
108EE000
unkown
page read and write
40B000
unkown
page execute read
1ACA000
heap
page read and write
7FF5DF458000
unkown
page readonly
9CB2000
heap
page read and write
8B60000
unkown
page read and write
A893000
heap
page read and write
403D000
trusted library allocation
page read and write
994F000
heap
page read and write
1AD8000
heap
page read and write
2E60000
unkown
page read and write
551E000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
5434000
trusted library allocation
page read and write
BF8C000
unkown
page read and write
4055000
trusted library allocation
page read and write
116E000
stack
page read and write
7FF5DF488000
unkown
page readonly
62D000
heap
page read and write
558F000
trusted library allocation
page read and write
1ACC000
heap
page read and write
9ED7000
heap
page read and write
45B000
unkown
page readonly
4025000
trusted library allocation
page read and write
C159000
unkown
page read and write
405D000
trusted library allocation
page read and write
4004000
trusted library allocation
page read and write
1296000
trusted library allocation
page execute and read and write
108EC000
unkown
page read and write
9A4C000
heap
page read and write
4411000
trusted library allocation
page read and write
9CAD000
heap
page read and write
2D70000
unkown
page read and write
7DF4E6791000
unkown
page execute read
2FBB000
trusted library allocation
page read and write
7FF5DF3E4000
unkown
page readonly
A267000
heap
page read and write
9CAD000
heap
page read and write
A2FB000
heap
page read and write
3373000
unkown
page read and write
4005000
trusted library allocation
page read and write
96F5000
unkown
page read and write
1081D000
unkown
page read and write
9B82000
heap
page read and write
643E000
stack
page read and write
286F000
stack
page read and write
52D0000
trusted library allocation
page read and write
454000
unkown
page readonly
2E21000
unkown
page read and write
4015000
trusted library allocation
page read and write
A104000
heap
page read and write
A0FC000
unkown
page read and write
11E0000
trusted library allocation
page read and write
83F0000
unkown
page read and write
7F770000
trusted library allocation
page execute and read and write
A1EB000
heap
page read and write
A152000
heap
page read and write
9EB2000
heap
page read and write
7499000
unkown
page read and write
5110000
unkown
page write copy
9C000
stack
page read and write
482E000
stack
page read and write
29F5000
trusted library allocation
page read and write
7380000
unkown
page read and write
A000000
heap
page read and write
CAB000
stack
page read and write
8B60000
unkown
page read and write
9C6D000
heap
page read and write
ADAB000
stack
page read and write
5ADC000
stack
page read and write
1AD8000
heap
page read and write
2810000
direct allocation
page execute and read and write
DD0000
heap
page read and write
CC9000
heap
page read and write
8B60000
unkown
page read and write
54F2000
trusted library allocation
page read and write
2F81000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
2566000
trusted library allocation
page execute and read and write
4B7E000
trusted library allocation
page read and write
7FF5DF3F5000
unkown
page readonly
422000
unkown
page read and write
35CE000
stack
page read and write
9C92000
heap
page read and write
8B60000
unkown
page read and write
CA0000
heap
page read and write
557E000
stack
page read and write
107D0000
heap
page read and write
149F000
stack
page read and write
2E60000
unkown
page read and write
8800000
unkown
page read and write
A92C000
heap
page read and write
B500000
unkown
page readonly
1ACC000
heap
page read and write
104CF000
unkown
page read and write
2A1A000
heap
page read and write
5055000
trusted library allocation
page read and write
44D0000
heap
page read and write
29A000
unkown
page write copy
CFA000
trusted library allocation
page execute and read and write
53D4000
trusted library allocation
page read and write
13F7000
trusted library allocation
page read and write
9F75000
heap
page read and write
401D000
trusted library allocation
page read and write
7FF5DE539000
unkown
page readonly
502E000
stack
page read and write
4038000
trusted library allocation
page read and write
9FC0000
heap
page read and write
7FF5DE9C3000
unkown
page readonly
7D0000
heap
page read and write
9CCB000
heap
page read and write
27CE000
stack
page read and write
1AAA000
heap
page read and write
2E60000
unkown
page read and write
2E39000
trusted library allocation
page read and write
A3E6000
heap
page read and write
2735000
trusted library allocation
page read and write
4FCE000
stack
page read and write
A097000
heap
page read and write
19A000
stack
page read and write
336C000
unkown
page read and write
2F21000
trusted library allocation
page read and write
A10B000
heap
page read and write
4E5000
heap
page read and write
6CEB000
stack
page read and write
1307000
heap
page read and write
C18A000
unkown
page read and write
4766000
unkown
page read and write
51E000
heap
page read and write
1AB6000
heap
page read and write
7FF5DF0A5000
unkown
page readonly
501E000
stack
page read and write
9C8C000
heap
page read and write
1200000
trusted library allocation
page read and write
8B60000
unkown
page read and write
9CD6000
heap
page read and write
C319000
unkown
page read and write
53CE000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
401D000
trusted library allocation
page read and write
3D9E000
stack
page read and write
1100000
heap
page read and write
57AE000
stack
page read and write
7FF5DEE5A000
unkown
page readonly
8B60000
unkown
page read and write
7FF5DF392000
unkown
page readonly
DF0000
heap
page read and write
99A000
heap
page read and write
2731000
trusted library allocation
page read and write
2BDD000
trusted library allocation
page read and write
4E4E000
stack
page read and write
A440000
heap
page read and write
29C0000
unclassified section
page read and write
9CB8000
heap
page read and write
12F1000
trusted library allocation
page read and write
4F9000
heap
page read and write
59FE000
trusted library allocation
page read and write
1ADC000
heap
page read and write
57D0000
trusted library allocation
page read and write
5514000
trusted library allocation
page read and write
8BA000
heap
page read and write
9F34000
heap
page read and write
3F87000
trusted library allocation
page read and write
73AF000
unkown
page read and write
7FF5DF45C000
unkown
page readonly
9CB6000
heap
page read and write
4005000
trusted library allocation
page read and write
BF10000
unkown
page readonly
561C000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
A12C000
heap
page read and write
3356000
unkown
page read and write
4690000
heap
page read and write
A163000
heap
page read and write
10A4000
trusted library allocation
page read and write
3304000
unkown
page read and write
14C0000
trusted library allocation
page read and write
9CAE000
heap
page read and write
9F63000
unkown
page read and write
934000
heap
page read and write
B7F000
stack
page read and write
940C000
stack
page read and write
4CE000
stack
page read and write
1447000
trusted library allocation
page read and write
14BA000
trusted library allocation
page execute and read and write
14AD000
trusted library allocation
page execute and read and write
680E000
stack
page read and write
570000
heap
page read and write
7FF5DF24E000
unkown
page readonly
54ED000
trusted library allocation
page read and write
4025000
trusted library allocation
page read and write
9C98000
heap
page read and write
54AE000
stack
page read and write
A195000
heap
page read and write
17BA000
stack
page read and write
541E000
stack
page read and write
400F000
trusted library allocation
page read and write
7FF5DF16B000
unkown
page readonly
7FF5DE9CB000
unkown
page readonly
2DF0000
unkown
page read and write
9BC3000
heap
page read and write
A420000
heap
page read and write
11BD000
trusted library allocation
page execute and read and write
1061A000
unkown
page read and write
A2A1000
heap
page read and write
2A6D000
stack
page read and write
5024000
trusted library allocation
page read and write
8B60000
unkown
page read and write
83B0000
unkown
page readonly
104C7000
unkown
page read and write
9C82000
heap
page read and write
2FA4000
trusted library allocation
page read and write
2E60000
unkown
page read and write
9CD8000
heap
page read and write
E55000
heap
page read and write
54CC000
trusted library allocation
page read and write
C003000
unkown
page read and write
81E000
stack
page read and write
1627000
trusted library allocation
page read and write
9954000
heap
page read and write
1070000
heap
page read and write
8590000
unkown
page readonly
4037000
trusted library allocation
page read and write
2E60000
unkown
page read and write
1A54000
heap
page read and write
9CA8000
heap
page read and write
7FF5DF584000
unkown
page readonly
8E9000
heap
page read and write
A215000
heap
page read and write
4BC0000
trusted library allocation
page read and write
1634000
unkown
page readonly
EA0000
trusted library allocation
page read and write
4ACF000
stack
page read and write
1250000
heap
page read and write
5140000
heap
page execute and read and write
4ED000
heap
page read and write
8800000
unkown
page read and write
4005000
trusted library allocation
page read and write
104C7000
unkown
page read and write
1ADC000
heap
page read and write
54DE000
trusted library allocation
page read and write
2C9A000
stack
page read and write
14B0000
trusted library allocation
page read and write
2E60000
unkown
page read and write
A46F000
heap
page read and write
C70000
heap
page read and write
2A00000
heap
page read and write
CED000
trusted library allocation
page execute and read and write
2E40000
heap
page read and write
C50000
heap
page read and write
50EE000
stack
page read and write
EE44000
unkown
page read and write
2FB7000
trusted library allocation
page read and write
11C6000
heap
page read and write
7FF5DF5FF000
unkown
page readonly
4FD1000
trusted library allocation
page read and write
104CD000
unkown
page read and write
4024000
trusted library allocation
page read and write
1AD0000
heap
page read and write
28C0000
unclassified section
page read and write
4040000
trusted library allocation
page read and write
7FF5DF04D000
unkown
page readonly
1018000
heap
page read and write
EA4000
trusted library allocation
page read and write
8B60000
unkown
page read and write
2987000
trusted library allocation
page read and write
BE0000
heap
page read and write
7FF5DEF87000
unkown
page readonly
1AA4000
heap
page read and write
2F87000
trusted library allocation
page read and write
3C40000
heap
page read and write
9CA7000
heap
page read and write
403D000
trusted library allocation
page read and write
4035000
trusted library allocation
page read and write
68DC000
stack
page read and write
E5E000
stack
page read and write
14B2000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
9BD1000
heap
page read and write
7FF5DF59E000
unkown
page readonly
14C5000
heap
page read and write
3222000
trusted library allocation
page read and write
F2D000
heap
page read and write
A019000
heap
page read and write
83F0000
unkown
page read and write
53EE000
trusted library allocation
page read and write
9CC9000
heap
page read and write
30F0000
remote allocation
page read and write
96F1000
unkown
page read and write
7FF5DEF57000
unkown
page readonly
A302000
heap
page read and write
4DF0000
trusted library allocation
page read and write
2C22000
trusted library allocation
page read and write
503E000
trusted library allocation
page read and write
108E3000
unkown
page read and write
2570000
trusted library allocation
page read and write
D69000
heap
page read and write
FD8A000
unkown
page read and write
4788000
unkown
page read and write
A33C000
heap
page read and write
291E000
stack
page read and write
C2E4000
unkown
page read and write
7FF5DF221000
unkown
page readonly
A34F000
heap
page read and write
2F50000
heap
page execute and read and write
9CAC000
heap
page read and write
400000
unkown
page readonly
A8C3000
heap
page read and write
2A70000
trusted library allocation
page read and write
9EAB000
heap
page read and write
840000
heap
page read and write
A22D000
heap
page read and write
4039000
trusted library allocation
page read and write
FB4000
trusted library allocation
page read and write
28A0000
unkown
page readonly
CEB000
stack
page read and write
3EF7000
trusted library allocation
page read and write
7B50000
unkown
page readonly
5457000
trusted library allocation
page read and write
73A7000
unkown
page read and write
53C0000
trusted library allocation
page read and write
95EE000
stack
page read and write
4066000
trusted library allocation
page read and write
ADC0000
unkown
page readonly
A086000
heap
page read and write
BFA1000
unkown
page read and write
52CE000
stack
page read and write
7FF5DF5D6000
unkown
page readonly
51C000
heap
page read and write
53C0000
trusted library allocation
page read and write
4040000
trusted library allocation
page read and write
4041000
trusted library allocation
page read and write
7FF5DEF90000
unkown
page readonly
38F0000
remote allocation
page read and write
19A000
stack
page read and write
105FF000
unkown
page read and write
126E000
stack
page read and write
531E000
stack
page read and write
79F0000
unkown
page readonly
9A25000
heap
page read and write
2E60000
unkown
page read and write
571C000
trusted library allocation
page read and write
7FF5DF4FB000
unkown
page readonly
AC0D000
stack
page read and write
2E60000
unkown
page read and write
3D57000
trusted library allocation
page read and write
7FF5DF47E000
unkown
page readonly
9489000
stack
page read and write
9BE1000
heap
page read and write
131E000
stack
page read and write
2E60000
unkown
page read and write
4100000
trusted library allocation
page read and write
56CE000
stack
page read and write
83F0000
unkown
page read and write
2B30000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
1A62000
heap
page read and write
9FB2000
heap
page read and write
2767000
trusted library allocation
page read and write
ED5000
trusted library allocation
page execute and read and write
2D78000
trusted library allocation
page read and write
1A50000
heap
page read and write
D7B000
stack
page read and write
41C9000
trusted library allocation
page read and write
7FF5DF284000
unkown
page readonly
A098000
unkown
page read and write
9EE2000
heap
page read and write
A084000
heap
page read and write
365D000
stack
page read and write
890000
heap
page read and write
83F0000
unkown
page read and write
28DA000
heap
page read and write
7FF5DF2BA000
unkown
page readonly
5524000
trusted library allocation
page read and write
104C6000
unkown
page read and write
4411000
trusted library allocation
page read and write
3FFA000
trusted library allocation
page read and write
2110000
heap
page read and write
5400000
trusted library allocation
page read and write
C4C0000
unkown
page read and write
1A50000
heap
page read and write
4FD9000
trusted library allocation
page read and write
53E4000
trusted library allocation
page read and write
8B60000
unkown
page read and write
5A40000
trusted library allocation
page execute and read and write
1195000
heap
page read and write
9CC2000
heap
page read and write
98E000
heap
page read and write
4022000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
14BB000
trusted library allocation
page execute and read and write
9F68000
heap
page read and write
73CD000
unkown
page read and write
D20000
unkown
page readonly
9F36000
heap
page read and write
4016000
trusted library allocation
page read and write
9CAB000
heap
page read and write
4015000
trusted library allocation
page read and write
7D90000
unkown
page read and write
579F000
stack
page read and write
4015000
trusted library allocation
page read and write
584E000
stack
page read and write
2CDE000
stack
page read and write
7FF5DF01B000
unkown
page readonly
9F27000
unkown
page read and write
1055000
unkown
page execute read
5721000
trusted library allocation
page read and write
2F27000
trusted library allocation
page read and write
2C61000
trusted library allocation
page read and write
275F000
trusted library allocation
page read and write
1AD4000
heap
page read and write
8A36000
unkown
page read and write
CE4000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
9CBA000
heap
page read and write
120E000
stack
page read and write
674C000
stack
page read and write
9C9F000
heap
page read and write
401D000
trusted library allocation
page read and write
C3BF000
unkown
page read and write
7F980000
trusted library allocation
page execute and read and write
A417000
heap
page read and write
8B60000
unkown
page read and write
A20C000
heap
page read and write
7DF4E6771000
unkown
page execute read
9F47000
heap
page read and write
A155000
heap
page read and write
3FFE000
trusted library allocation
page read and write
A30F000
heap
page read and write
1AD0000
heap
page read and write
103B000
trusted library allocation
page execute and read and write
4EF0000
heap
page read and write
2CCE000
stack
page read and write
8810000
unkown
page read and write
E77000
heap
page read and write
550E000
trusted library allocation
page read and write
9E2B000
heap
page read and write
9CC2000
heap
page read and write
9CB1000
heap
page read and write
9B99000
stack
page read and write
7FF5DEE52000
unkown
page readonly
2970000
trusted library allocation
page execute and read and write
5CB0000
heap
page read and write
A344000
heap
page read and write
9E32000
heap
page read and write
9CCE000
heap
page read and write
1441000
trusted library allocation
page read and write
A33E000
heap
page read and write
A0D2000
heap
page read and write
2A80000
trusted library allocation
page read and write
1ADC000
heap
page read and write
F96000
trusted library allocation
page execute and read and write
FD84000
unkown
page read and write
2ABB000
trusted library allocation
page read and write
9D6000
stack
page read and write
2E60000
unkown
page read and write
739B000
unkown
page read and write
51DC000
stack
page read and write
9F56000
heap
page read and write
53B0000
trusted library allocation
page read and write
A118000
heap
page read and write
8B60000
unkown
page read and write
7FF5DF0A2000
unkown
page readonly
51D2000
trusted library allocation
page read and write
9E38000
heap
page read and write
8B60000
unkown
page read and write
74A9000
unkown
page read and write
A1DD000
heap
page read and write
1279000
heap
page read and write
A39E000
heap
page read and write
8B60000
unkown
page read and write
4027000
trusted library allocation
page read and write
7FF5DF4BD000
unkown
page readonly
2DF7000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
283E000
heap
page read and write
401D000
trusted library allocation
page read and write
289000
unkown
page readonly
B45A000
stack
page read and write
1AAD000
heap
page read and write
2AB4000
trusted library allocation
page read and write
10652000
unkown
page read and write
3FFF000
trusted library allocation
page read and write
40A000
unkown
page read and write
7FF5DF0C1000
unkown
page readonly
4A4E000
stack
page read and write
2C31000
trusted library allocation
page read and write
7FF5DF4E7000
unkown
page readonly
2E60000
unkown
page read and write
3EE2000
trusted library allocation
page read and write
8B60000
unkown
page read and write
914B000
stack
page read and write
4750000
unkown
page read and write
1AD5000
heap
page read and write
1220000
heap
page read and write
2E60000
unkown
page read and write
4410000
trusted library allocation
page read and write
5100000
heap
page read and write
4031000
trusted library allocation
page read and write
3394000
unkown
page read and write
29A0000
direct allocation
page execute and read and write
7FF5DE5CC000
unkown
page readonly
2CB7000
trusted library allocation
page read and write
2E60000
unkown
page read and write
25C7000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
401C000
trusted library allocation
page read and write
414E000
stack
page read and write
1030000
trusted library allocation
page read and write
335B000
unkown
page read and write
1340000
trusted library allocation
page read and write
1342000
heap
page read and write
13A0000
heap
page read and write
53C4000
trusted library allocation
page read and write
1060F000
unkown
page read and write
7FF5DF0F1000
unkown
page readonly
9CBB000
heap
page read and write
A3CB000
heap
page read and write
1A3E000
heap
page read and write
5DA000
heap
page read and write
9EC5000
heap
page read and write
402A000
trusted library allocation
page read and write
AEF0000
unkown
page read and write
E0E000
stack
page read and write
3FF0000
trusted library allocation
page read and write
7FF5DEFF5000
unkown
page readonly
3F67000
trusted library allocation
page read and write
7FF5DF203000
unkown
page readonly
7FF5DF591000
unkown
page readonly
53C2000
trusted library allocation
page read and write
FE0000
heap
page read and write
7FF5DF36A000
unkown
page readonly
2E60000
unkown
page read and write
54E6000
trusted library allocation
page read and write
11DD000
trusted library allocation
page execute and read and write
1A61000
heap
page read and write
738E000
unkown
page read and write
4919000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
FF1000
unkown
page readonly
9CAE000
heap
page read and write
7FF5DF12A000
unkown
page readonly
4076000
trusted library allocation
page read and write
EDB000
trusted library allocation
page execute and read and write
D30000
heap
page read and write
6A9E000
stack
page read and write
7FF5DF5FC000
unkown
page readonly
9F92000
unkown
page read and write
FE0000
unkown
page read and write
A428000
heap
page read and write
1156000
heap
page read and write
1AD8000
heap
page read and write
7FF5DF045000
unkown
page readonly
292E000
stack
page read and write
D0B000
stack
page read and write
8B60000
unkown
page read and write
4091000
trusted library allocation
page read and write
C4BC000
unkown
page read and write
7D89000
stack
page read and write
10CF000
heap
page read and write
1AA0000
heap
page read and write
1AC2000
heap
page read and write
53C6000
trusted library allocation
page read and write
7FF5DF26F000
unkown
page readonly
C187000
unkown
page read and write
2DD8000
trusted library allocation
page read and write
4006000
trusted library allocation
page read and write
54B5000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
8B60000
unkown
page read and write
19FA000
heap
page read and write
2D70000
unkown
page read and write
1A50000
heap
page read and write
9F31000
heap
page read and write
7FF5DF62C000
unkown
page readonly
104C9000
unkown
page read and write
2E60000
unkown
page read and write
5457000
trusted library allocation
page read and write
10EA000
heap
page read and write
7FF5DF038000
unkown
page readonly
4025000
trusted library allocation
page read and write
9C11000
heap
page read and write
2640000
trusted library allocation
page read and write
2E60000
unkown
page read and write
97D0000
unkown
page read and write
BF6D000
unkown
page read and write
12B2000
trusted library allocation
page read and write
32B0000
unkown
page read and write
9DD0000
heap
page read and write
408000
unkown
page readonly
2DDE000
stack
page read and write
403E000
trusted library allocation
page read and write
101F000
stack
page read and write
1358000
heap
page read and write
2AC4000
trusted library allocation
page read and write
39D1000
trusted library allocation
page read and write
3FFA000
trusted library allocation
page read and write
1ACC000
heap
page read and write
7FF5DF0D2000
unkown
page readonly
1AC2000
heap
page read and write
A159000
heap
page read and write
7FF5DF017000
unkown
page readonly
B67000
heap
page read and write
8B60000
unkown
page read and write
C1CC000
unkown
page read and write
E9E000
stack
page read and write
1AC0000
heap
page read and write
12A7000
heap
page read and write
10B1000
trusted library allocation
page read and write
1A3E000
heap
page read and write
403D000
trusted library allocation
page read and write
9CAB000
heap
page read and write
2E60000
unkown
page read and write
51E1000
trusted library allocation
page read and write
4DE5000
trusted library allocation
page read and write
4025000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
2ECE000
stack
page read and write
509E000
stack
page read and write
1A3C000
heap
page read and write
149E000
stack
page read and write
3FF6000
trusted library allocation
page read and write
2B90000
trusted library allocation
page read and write
CD0000
trusted library allocation
page read and write
1258000
heap
page read and write
9E7F000
heap
page read and write
950E000
stack
page read and write
10A0000
trusted library allocation
page execute and read and write
2FA8000
trusted library allocation
page read and write
7FF5DF5F6000
unkown
page readonly
5476000
trusted library allocation
page read and write
8B60000
unkown
page read and write
A453000
heap
page read and write
BFAB000
unkown
page read and write
27F0000
heap
page read and write
1420000
heap
page read and write
260F000
stack
page read and write
3FF1000
trusted library allocation
page read and write
2E60000
unkown
page read and write
A0EF000
heap
page read and write
A0D8000
heap
page read and write
9D04000
heap
page read and write
1AD8000
heap
page read and write
3FF1000
trusted library allocation
page read and write
9F60000
unkown
page read and write
9C9F000
heap
page read and write
11C0000
trusted library allocation
page read and write
2BC5000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
2850000
heap
page read and write
FD85000
unkown
page read and write
9C58000
heap
page read and write
A2BA000
heap
page read and write
9C4E000
heap
page read and write
54E000
stack
page read and write
A2DD000
heap
page read and write
A08D000
heap
page read and write
3EF1000
trusted library allocation
page read and write
3349000
unkown
page read and write
E10000
trusted library allocation
page read and write
51DC000
trusted library allocation
page read and write
A19A000
heap
page read and write
8B60000
unkown
page read and write
400000
unkown
page readonly
2F51000
trusted library allocation
page read and write
B11C000
stack
page read and write
A2AA000
heap
page read and write
2BB4000
trusted library allocation
page read and write
A0FD000
heap
page read and write
A40A000
heap
page read and write
210000
unkown
page readonly
780000
heap
page read and write
462000
unkown
page readonly
2A10000
heap
page read and write
40B000
unkown
page execute read
A31D000
heap
page read and write
74F1000
unkown
page read and write
7FF5DF3A1000
unkown
page readonly
1AAD000
heap
page read and write
8B60000
unkown
page read and write
4023000
trusted library allocation
page read and write
9CB6000
heap
page read and write
7FF5DF626000
unkown
page readonly
29B000
unkown
page execute and read and write
DB8000
heap
page read and write
5580000
unkown
page readonly
E0F000
heap
page read and write
1AAD000
heap
page read and write
A1BF000
heap
page read and write
8B60000
unkown
page read and write
2C50000
heap
page execute and read and write
7FF5DF2E2000
unkown
page readonly
27F0000
heap
page read and write
AF7E000
stack
page read and write
CAE000
stack
page read and write
14F0000
trusted library allocation
page read and write
A329000
heap
page read and write
9940000
heap
page read and write
9CAA000
heap
page read and write
1AA4000
heap
page read and write
52C3000
unkown
page read and write
A3F7000
heap
page read and write
9CBA000
heap
page read and write
9CCC000
heap
page read and write
5506000
trusted library allocation
page read and write
77F0000
unkown
page read and write
1A62000
heap
page read and write
2F85000
trusted library allocation
page read and write
970000
heap
page read and write
9960000
heap
page read and write
245B000
trusted library allocation
page execute and read and write
3731000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
7FF5DF2DA000
unkown
page readonly
404D000
trusted library allocation
page read and write
104CF000
unkown
page read and write
5450000
trusted library allocation
page read and write
A37A000
heap
page read and write
8B60000
unkown
page read and write
9C4C000
heap
page read and write
83F0000
unkown
page read and write
B1C0000
unkown
page readonly
7FF5DF23A000
unkown
page readonly
2EB0000
unkown
page readonly
9C8B000
heap
page read and write
736000
stack
page read and write
A18B000
heap
page read and write
4024000
trusted library allocation
page read and write
418000
unkown
page readonly
10F6000
stack
page read and write
104CC000
unkown
page read and write
1210000
heap
page read and write
860000
heap
page read and write
99EF000
heap
page read and write
A74D000
unkown
page read and write
6BEB000
heap
page read and write
845000
heap
page read and write
4EA000
heap
page read and write
C048000
unkown
page read and write
3D51000
trusted library allocation
page read and write
1AD4000
heap
page read and write
104C1000
unkown
page read and write
5210000
heap
page execute and read and write
C40000
trusted library allocation
page read and write
A3DB000
heap
page read and write
8B60000
unkown
page read and write
2BF4000
trusted library allocation
page read and write
34C0000
unkown
page read and write
5513000
trusted library allocation
page read and write
7FF5DF435000
unkown
page readonly
1000000
heap
page read and write
5241000
unkown
page read and write
8DE000
stack
page read and write
8B60000
unkown
page read and write
2ACE000
trusted library allocation
page read and write
295F000
stack
page read and write
DD1000
heap
page read and write
92DB000
stack
page read and write
A499000
heap
page read and write
1140000
heap
page read and write
A8C3000
heap
page read and write
B259000
stack
page read and write
5465000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
9A84000
heap
page read and write
A122000
heap
page read and write
8B60000
unkown
page read and write
1ACC000
heap
page read and write
11B3000
trusted library allocation
page execute and read and write
A101000
heap
page read and write
1208000
heap
page read and write
8890000
unkown
page read and write
9CAF000
heap
page read and write
A6EE000
unkown
page read and write
4016000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
9BB7000
heap
page read and write
436F000
stack
page read and write
74E8000
unkown
page read and write
7FF5DF52D000
unkown
page readonly
7FF5DE531000
unkown
page readonly
659E000
stack
page read and write
A0FB000
heap
page read and write
10A3000
trusted library allocation
page execute and read and write
9FE2000
heap
page read and write
B359000
stack
page read and write
3399000
heap
page read and write
9CAC000
heap
page read and write
2BF6000
trusted library allocation
page read and write
3C47000
heap
page read and write
7FF5DF169000
unkown
page readonly
4E10000
trusted library allocation
page read and write
2DC0000
heap
page execute and read and write
7FF5DF54D000
unkown
page readonly
B59000
heap
page read and write
5436000
trusted library allocation
page read and write
A204000
heap
page read and write
E00000
heap
page read and write
1ADA000
heap
page read and write
A02D000
unkown
page read and write
47D9000
unkown
page read and write
9F28000
heap
page read and write
8B60000
unkown
page read and write
571E000
stack
page read and write
4003000
trusted library allocation
page read and write
4025000
trusted library allocation
page read and write
9D60000
heap
page read and write
9B90000
heap
page read and write
5D0000
heap
page read and write
402A000
trusted library allocation
page read and write
1610000
heap
page execute and read and write
4044000
trusted library allocation
page read and write
403F000
trusted library allocation
page read and write
7F740000
trusted library allocation
page execute and read and write
528000
heap
page read and write
B4DB000
stack
page read and write
2610000
trusted library allocation
page read and write
A3D2000
heap
page read and write
86CB000
stack
page read and write
2824000
heap
page read and write
2AB8000
trusted library allocation
page read and write
2B60000
heap
page read and write
1220000
heap
page read and write
7830000
unkown
page read and write
8B60000
unkown
page read and write
7FF5DF029000
unkown
page readonly
8FD000
heap
page read and write
7FF5DF49C000
unkown
page readonly
4005000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
2E60000
unkown
page read and write
1AD8000
heap
page read and write
1A22000
heap
page read and write
9C82000
heap
page read and write
9F9E000
heap
page read and write
2E60000
unkown
page read and write
8B60000
unkown
page read and write
27D0000
unkown
page read and write
501E000
stack
page read and write
8B60000
unkown
page read and write
E80000
unkown
page read and write
A455000
heap
page read and write
1AD0000
heap
page read and write
79E0000
unkown
page readonly
1342000
trusted library allocation
page read and write
3BB1000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
FD88000
unkown
page read and write
76F0000
unkown
page read and write
538E000
stack
page read and write
4031000
trusted library allocation
page read and write
A130000
heap
page read and write
7A40000
unkown
page readonly
9490000
unkown
page read and write
9F14000
heap
page read and write
BF40000
unkown
page read and write
EA3000
trusted library allocation
page execute and read and write
9CB8000
heap
page read and write
9F20000
heap
page read and write
D0B000
trusted library allocation
page execute and read and write
A14D000
heap
page read and write
971C000
unkown
page read and write
401000
unkown
page execute read
5041000
trusted library allocation
page read and write
9C8D000
heap
page read and write
41A1000
trusted library allocation
page read and write
BF84000
unkown
page read and write
998F000
heap
page read and write
A59000
stack
page read and write
47F1000
unkown
page read and write
1054000
unkown
page read and write
4015000
trusted library allocation
page read and write
4015000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
1A3C000
heap
page read and write
108E3000
unkown
page read and write
8800000
unkown
page read and write
93F6000
heap
page read and write
8B60000
unkown
page read and write
A247000
heap
page read and write
511E000
stack
page read and write
16C4000
trusted library allocation
page read and write
639000
heap
page read and write
1030000
heap
page read and write
454000
unkown
page readonly
9C92000
heap
page read and write
4FC5000
trusted library allocation
page read and write
249E000
stack
page read and write
4001000
trusted library allocation
page read and write
CFF000
stack
page read and write
418000
unkown
page readonly
E40000
heap
page read and write
962B000
unkown
page read and write
A0BD000
heap
page read and write
2650000
heap
page execute and read and write
A29D000
heap
page read and write
38F0000
remote allocation
page read and write
9F5D000
heap
page read and write
424F000
stack
page read and write
5800000
heap
page execute and read and write
24BE000
stack
page read and write
9981000
heap
page read and write
B2DF000
stack
page read and write
145F000
stack
page read and write
9BB0000
heap
page read and write
E48000
heap
page read and write
446000
unkown
page readonly
A087000
heap
page read and write
407F000
trusted library allocation
page read and write
2BE2000
trusted library allocation
page read and write
7FF5DEF06000
unkown
page readonly
41B000
unkown
page read and write
2E60000
unkown
page read and write
A881000
heap
page read and write
FD6000
trusted library allocation
page execute and read and write
2E60000
unkown
page read and write
2631000
trusted library allocation
page read and write
9F3E000
unkown
page read and write
2708000
unkown
page readonly
7FF5DE4F2000
unkown
page readonly
9E94000
heap
page read and write
5527000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
10617000
unkown
page read and write
9CCB000
heap
page read and write
1AD8000
heap
page read and write
2BD1000
trusted library allocation
page read and write
BDE000
stack
page read and write
7FF5DF623000
unkown
page readonly
5565000
trusted library allocation
page read and write
14AE000
stack
page read and write
9B80000
heap
page read and write
9EC7000
heap
page read and write
2A00000
heap
page read and write
9CB7000
heap
page read and write
57D3000
trusted library allocation
page read and write
8B60000
unkown
page read and write
4025000
trusted library allocation
page read and write
1035000
heap
page read and write
2C80000
trusted library allocation
page read and write
9D66000
heap
page read and write
A923000
heap
page read and write
94C0000
unkown
page read and write
296C000
stack
page read and write
2D4E000
stack
page read and write
2C00000
trusted library allocation
page read and write
4053000
trusted library allocation
page read and write
692E000
stack
page read and write
4025000
trusted library allocation
page read and write
D73000
unkown
page execute read
7FF5DF25B000
unkown
page readonly
9E4E000
heap
page read and write
A098000
heap
page read and write
1621000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
9C8D000
heap
page read and write
9F51000
unkown
page read and write
54CE000
trusted library allocation
page read and write
94C0000
unkown
page read and write
970000
heap
page read and write
4E00000
trusted library allocation
page read and write
644E000
stack
page read and write
2DFE000
stack
page read and write
104C8000
unkown
page read and write
5030000
heap
page execute and read and write
2BD0000
heap
page execute and read and write
7ACE000
stack
page read and write
1AD0000
heap
page read and write
104C2000
unkown
page read and write
10C0000
heap
page read and write
A2D9000
heap
page read and write
9FFC000
heap
page read and write
B010000
unkown
page read and write
9CBF000
heap
page read and write
48B0000
unkown
page read and write
4036000
trusted library allocation
page read and write
2E50000
unkown
page readonly
14F7000
heap
page read and write
9E71000
heap
page read and write
9F0000
heap
page read and write
3EF5000
trusted library allocation
page read and write
4C1E000
stack
page read and write
9C89000
heap
page read and write
971A000
unkown
page read and write
B74000
trusted library allocation
page read and write
9CCB000
heap
page read and write
4FB4000
trusted library allocation
page read and write
9C8F000
heap
page read and write
4015000
trusted library allocation
page read and write
40BC000
trusted library allocation
page read and write
1228000
heap
page read and write
5521000
trusted library allocation
page read and write
9D6A000
heap
page read and write
299E000
stack
page read and write
560000
heap
page read and write
404F000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
C24C000
unkown
page read and write
576F000
stack
page read and write
104C9000
unkown
page read and write
289000
unkown
page readonly
A0A7000
unkown
page read and write
61CE000
stack
page read and write
2E60000
unkown
page read and write
66C000
stack
page read and write
5410000
trusted library allocation
page read and write
400000
unkown
page readonly
5563000
trusted library allocation
page read and write
4016000
trusted library allocation
page read and write
5CE000
stack
page read and write
8DB000
stack
page read and write
C034000
unkown
page read and write
5470000
trusted library allocation
page read and write
4420000
heap
page read and write
10A0000
trusted library allocation
page read and write
2452000
trusted library allocation
page read and write
2BB4000
trusted library allocation
page read and write
7FF5DF382000
unkown
page readonly
8B60000
unkown
page read and write
4025000
trusted library allocation
page read and write
9CBB000
heap
page read and write
A10000
heap
page read and write
AE6F000
stack
page read and write
50A0000
heap
page read and write
1170000
heap
page read and write
2E3E000
stack
page read and write
7FF5DF55A000
unkown
page readonly
A207000
heap
page read and write
8B60000
unkown
page read and write
551E000
stack
page read and write
874C000
stack
page read and write
FD0000
trusted library allocation
page read and write
9A6C000
stack
page read and write
7B60000
unkown
page readonly
594E000
stack
page read and write
A3DE000
heap
page read and write
5783000
trusted library allocation
page read and write
8B60000
unkown
page read and write
114E000
stack
page read and write
33D9000
trusted library allocation
page read and write
45B000
unkown
page readonly
1640000
heap
page read and write
A25A000
heap
page read and write
4025000
trusted library allocation
page read and write
4025000
trusted library allocation
page read and write
2E60000
unkown
page read and write
4025000
trusted library allocation
page read and write
2B0F000
stack
page read and write
7FF5C0B65000
unkown
page readonly
4B7B000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
9FD5000
heap
page read and write
There are 3182 hidden memdumps, click here to show them.