IOC Report
JuHVfiAuLo.exe

loading gif

Files

File Path
Type
Category
Malicious
JuHVfiAuLo.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\huge[1].dat
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\2C50.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\37A.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\56AD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\nsm2A3E.tmp\blowfish.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsyDD2E.tmp\liteFirewall.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Del.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ifgewai
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ifgewai:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsm2A3E.tmp\INetC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsm2A3E.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsr66D4.tmp
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
data
modified
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\cef.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
data
dropped
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\start.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
MSVC program database ver 7.00, 512*4023 bytes
dropped
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 105 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\JuHVfiAuLo.exe
"C:\Users\user\Desktop\JuHVfiAuLo.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\ifgewai
C:\Users\user\AppData\Roaming\ifgewai
malicious
C:\Users\user\AppData\Local\Temp\37A.exe
C:\Users\user\AppData\Local\Temp\37A.exe
malicious
C:\Users\user\AppData\Local\Temp\2C50.exe
C:\Users\user\AppData\Local\Temp\2C50.exe
malicious
C:\Users\user\AppData\Local\Temp\56AD.exe
C:\Users\user\AppData\Local\Temp\56AD.exe
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
"C:\Users\user\AppData\Local\Temp\setup.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3420 --field-trial-handle=3424,i,8514718793866893320,15299251401448294970,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3536 --field-trial-handle=3424,i,8514718793866893320,15299251401448294970,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3576 --field-trial-handle=3424,i,8514718793866893320,15299251401448294970,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719980718149919 --launch-time-ticks=5903769137 --mojo-platform-channel-handle=3936 --field-trial-handle=3424,i,8514718793866893320,15299251401448294970,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/26.0 Chrome/122.0.0.0 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719980718149919 --launch-time-ticks=5903928806 --mojo-platform-channel-handle=4104 --field-trial-handle=3424,i,8514718793866893320,15299251401448294970,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
There are 22 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://gebeus.ru/tmp/index.php
malicious
http://cx5519.com/tmp/index.php
malicious
contintnetksows.shop
malicious
http://evilos.cc/tmp/index.php
malicious
ellaboratepwsz.xyz
malicious
swellfrrgwwos.xyz
malicious
foodypannyjsud.shop
malicious
pedestriankodwu.xyz
malicious
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://powerpoint.office.comer
unknown
https://duckduckgo.com/ac/?q=
unknown
https://android.notify.windows.com/iOSA4
unknown
https://chrome.google.com/webstore?hl=hiCtrl$1
unknown
https://chrome.google.com/webstore?hl=mr&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://foodypannyjsud.shop/w
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://www.google.com/chrome/privacy/eula_text.html
unknown
https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://chrome.google.com/webstore?hl=ms&category=theme81https://myactivity.google.com/myactivity/?u
unknown
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
unknown
https://chrome.google.com/webstore?hl=af&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://excel.office.com
unknown
https://www.msn.com/en-us/money/personalfinance/the-big-3-mistakes-financial-advisors-say-that-the-1
unknown
http://crbug.com/510270
unknown
https://chrome.google.com/webstore?hl=urCtrl$2
unknown
https://chrome.google.com/webstore?hl=ja&category=theme81https://myactivity.google.com/myactivity/?u
unknown
http://crbug.com/378067
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://chrome.google.com/webstore?hl=trCtrl$1
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://passwords.google.com
unknown
https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zeal
unknown
https://aui-cdn.atlassian.com/
unknown
http://crbug.com/497301
unknown
https://github.com/JamesNK/Newtonsoft.Json/issues/652
unknown
http://www.microsoft.c
unknown
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
unknown
https://android.notify.windows.com/iOSd
unknown
http://bageyou.xyz
unknown
http://crbug.com/642141
unknown
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://foodypannyjsud.shop/J
unknown
https://chrome.google.com/webstore?hl=afCtrl$1
unknown
https://chrome.google.com/webstore?hl=jaCtrl$1
unknown
https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
unknown
https://foodypannyjsud.shop/pi_
unknown
https://www.google.com/chrome/privacy/eula_text.htmlB&antuanDiurus
unknown
https://bitbucket.org/
unknown
https://foodypannyjsud.shop/apin
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://support.google.com/chromebook?p=app_intent
unknown
http://crbug.com/717501
unknown
http://crbug.com/957772
unknown
https://foodypannyjsud.shop/apio
unknown
https://foodypannyjsud.shop/piV
unknown
http://crbug.com/839189
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://chrome.google.com/webstore
unknown
https://foodypannyjsud.shop/apiw
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://chrome.google.com/webstore?hl=mrCtrl$1
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.google.com/chrome/privacy/eula_text.html&
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://www.google.com/chrome/privacy/eula_text.htmlT&r
unknown
https://chrome.google.com/webstore?hl=hi&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://www.ecosia.org/newtab/
unknown
http://xiexie.wf/22_551/huge.dat
unknown
http://crbug.com/819404
unknown
https://outlook.com
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://crbug.com/514696
unknown
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
unknown
https://foodypannyjsud.shop/apiN
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://crbug.com/1446731
unknown
https://android.notify.windows.com/iOS
unknown
http://api.install-stat.debug.world/clients/installs
unknown
https://cdn.cookielaw.org/
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
https://chromewebstore.google.com/
unknown
https://support.google.com/chrome/a/answer/9122284
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA
unknown
https://www.google.com/chrome/privacy/eula_text.htmlBestuur
unknown
https://www.msn.com/en-us/sports/other/washington-state-ad-asks-ncaa-for-compassion-and-understandin
unknown
https://www.google.com/
unknown
http://api.install-stat.debug.world/clients/activity=4
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
141.8.192.126
unknown
Russian Federation
malicious
188.114.96.3
unknown
European Union
malicious
185.68.16.7
unknown
Ukraine
malicious
127.0.0.127
unknown
unknown
malicious
2.185.214.11
unknown
Iran (ISLAMIC Republic Of)
malicious
146.70.169.164
unknown
United Kingdom
malicious
1.1.1.1
unknown
Australia
104.192.141.1
unknown
United States
188.114.97.3
unknown
European Union
172.67.221.174
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080022
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\uhoreg\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000204CA
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR
KGLToGCSUpdatedRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\uhoreg\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\GamePall
Sid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Pid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GamePall
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
DontShowUI
HKEY_CURRENT_USER\SOFTWARE\GamePall
tmp_uid
HKEY_CURRENT_USER\SOFTWARE\GamePall
reg
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\GamePall
uid
HKEY_CURRENT_USER\Control Panel\Cursors
AppStarting
There are 211 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4371000
unclassified section
page read and write
malicious
28D1000
unclassified section
page read and write
malicious
39B0000
direct allocation
page execute and read and write
malicious
120D000
heap
page read and write
malicious
2860000
direct allocation
page read and write
malicious
28B0000
direct allocation
page read and write
malicious
C59000
heap
page read and write
5466000
trusted library allocation
page read and write
986000
heap
page read and write
7FF5030E4000
unkown
page readonly
61E000
heap
page read and write
BFC000
heap
page read and write
A5B9000
heap
page read and write
7750000
unkown
page read and write
F63000
unkown
page execute read
19A000
stack
page read and write
37C1000
trusted library allocation
page read and write
513E000
stack
page read and write
C90000
heap
page read and write
1100000
heap
page read and write
9B6000
stack
page read and write
A3F9000
heap
page read and write
7FF502D8F000
unkown
page readonly
D1F000
stack
page read and write
A7FD000
heap
page read and write
4E33000
unkown
page read and write
3001000
trusted library allocation
page read and write
61E000
heap
page read and write
C64000
heap
page read and write
B610000
unkown
page read and write
61E000
heap
page read and write
1294000
heap
page read and write
1270000
heap
page read and write
617000
heap
page read and write
B6D0000
unkown
page read and write
B80000
unkown
page read and write
61E000
heap
page read and write
2814000
trusted library allocation
page read and write
4B9D000
stack
page read and write
5253000
heap
page execute and read and write
B30000
unkown
page read and write
7FF5031AD000
unkown
page readonly
114E000
stack
page read and write
A3F9000
heap
page read and write
A8B000
trusted library allocation
page execute and read and write
BE9000
heap
page read and write
617000
heap
page read and write
1F0000
heap
page read and write
B6D0000
unkown
page read and write
B6D0000
unkown
page read and write
CA0000
heap
page read and write
39AF000
stack
page read and write
617000
heap
page read and write
555F000
stack
page read and write
C7B000
heap
page read and write
BDC000
heap
page read and write
7FF50302D000
unkown
page readonly
B0A0000
unkown
page read and write
501F000
trusted library allocation
page read and write
ABCB000
stack
page read and write
2910000
heap
page read and write
A743000
heap
page read and write
BBB0000
unkown
page read and write
B00000
trusted library allocation
page execute and read and write
4CC000
unkown
page readonly
A404000
heap
page read and write
C10000
unkown
page read and write
849000
heap
page read and write
309D000
unkown
page read and write
906000
trusted library allocation
page execute and read and write
7FF502EE3000
unkown
page readonly
80A0000
unkown
page readonly
3B05000
trusted library allocation
page read and write
B30000
unkown
page read and write
4F6000
stack
page read and write
660000
trusted library allocation
page read and write
A34F000
heap
page read and write
3AFC000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
3AEE000
stack
page read and write
EE0000
trusted library allocation
page read and write
BFB9000
unkown
page read and write
A83B000
heap
page read and write
B610000
unkown
page read and write
1000000
heap
page read and write
B6D0000
unkown
page read and write
FDA000
trusted library allocation
page execute and read and write
7FF50332C000
unkown
page readonly
C83000
heap
page read and write
C64000
heap
page read and write
10758000
unkown
page read and write
400000
unkown
page readonly
BBE000
heap
page read and write
80F0000
unkown
page readonly
FB0000
trusted library allocation
page read and write
400000
unkown
page readonly
7FF502D00000
unkown
page readonly
AF3000
stack
page read and write
A33E000
heap
page read and write
61E000
heap
page read and write
B09B000
stack
page read and write
D85000
heap
page read and write
F65000
heap
page read and write
D20000
heap
page read and write
22FE000
stack
page read and write
9D54000
unkown
page read and write
1EE000
stack
page read and write
7FF502FA2000
unkown
page readonly
C60000
heap
page read and write
61E000
heap
page read and write
7FF503082000
unkown
page readonly
C6A000
heap
page read and write
7FF502F7A000
unkown
page readonly
35AD000
stack
page read and write
61E000
heap
page read and write
3B25000
trusted library allocation
page read and write
A1DC000
heap
page read and write
617000
heap
page read and write
A5D9000
heap
page read and write
2CB3000
trusted library allocation
page read and write
6D0000
heap
page read and write
1070A000
heap
page read and write
617000
heap
page read and write
3B21000
trusted library allocation
page read and write
CA0000
trusted library allocation
page execute and read and write
617000
heap
page read and write
617000
heap
page read and write
A93B000
heap
page read and write
A415000
heap
page read and write
9BE3000
unkown
page read and write
7FF502DF9000
unkown
page readonly
A440000
heap
page read and write
A5C1000
heap
page read and write
7FF503167000
unkown
page readonly
AA8D000
stack
page read and write
3AFA000
trusted library allocation
page read and write
7FF50334D000
unkown
page readonly
A7F2000
heap
page read and write
B610000
unkown
page read and write
6ECB000
unkown
page read and write
DBD000
trusted library allocation
page execute and read and write
7FF503347000
unkown
page readonly
2950000
heap
page read and write
A85A000
heap
page read and write
2FB5000
trusted library allocation
page read and write
7FF502D6B000
unkown
page readonly
61E000
heap
page read and write
82E000
stack
page read and write
1080000
trusted library allocation
page execute and read and write
10EF000
heap
page read and write
2AD8000
trusted library allocation
page read and write
7FF502EBB000
unkown
page readonly
617000
heap
page read and write
BFC000
heap
page read and write
1291000
heap
page read and write
61E000
heap
page read and write
283E000
stack
page read and write
C155000
unkown
page read and write
A8E5000
heap
page read and write
A99C000
heap
page read and write
BF4000
trusted library allocation
page read and write
2A5E000
stack
page read and write
D80000
heap
page read and write
2E45000
trusted library allocation
page read and write
AA3B000
heap
page read and write
A88D000
heap
page read and write
C57000
heap
page read and write
A636000
heap
page read and write
617000
heap
page read and write
A781000
heap
page read and write
2FC6000
trusted library allocation
page read and write
7651000
unkown
page read and write
B6D0000
unkown
page read and write
2AF7000
trusted library allocation
page read and write
F5F000
stack
page read and write
C40000
heap
page read and write
CA0000
heap
page read and write
CC9000
heap
page read and write
408000
unkown
page readonly
A3F8000
heap
page read and write
AB71000
heap
page read and write
24B7000
trusted library allocation
page read and write
AA63000
heap
page read and write
AAF1000
heap
page read and write
B78F000
stack
page read and write
B6D0000
unkown
page read and write
FB6000
trusted library allocation
page execute and read and write
B30000
unkown
page read and write
A3FB000
heap
page read and write
99FF000
stack
page read and write
43EA000
unkown
page read and write
A3A7000
heap
page read and write
2930000
trusted library allocation
page read and write
B4F000
stack
page read and write
ED0000
trusted library allocation
page read and write
3B12000
trusted library allocation
page read and write
3B39000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
61E000
heap
page read and write
7750000
unkown
page read and write
3B3C000
trusted library allocation
page read and write
C82000
heap
page read and write
3F0000
heap
page read and write
BD7000
heap
page read and write
A440000
heap
page read and write
9E0000
unkown
page read and write
7FF502D65000
unkown
page readonly
987E000
stack
page read and write
2600000
heap
page read and write
BB50000
unkown
page read and write
3B34000
trusted library allocation
page read and write
B11000
trusted library allocation
page read and write
A6B3000
heap
page read and write
6FBF000
unkown
page read and write
2CBD000
trusted library allocation
page read and write
617000
heap
page read and write
BDD5000
unkown
page read and write
3E0000
heap
page read and write
3AFC000
trusted library allocation
page read and write
3B5D000
trusted library allocation
page read and write
61E000
heap
page read and write
546B000
trusted library allocation
page read and write
B30000
unkown
page read and write
BFC000
heap
page read and write
7FF5026F7000
unkown
page readonly
B610000
unkown
page read and write
B30000
unkown
page read and write
7750000
unkown
page read and write
8610000
unkown
page read and write
617000
heap
page read and write
7FF502F66000
unkown
page readonly
A20D000
heap
page read and write
3CD5000
trusted library allocation
page read and write
8BB000
stack
page read and write
7B0000
heap
page read and write
617000
heap
page read and write
3AFA000
trusted library allocation
page read and write
2D30000
heap
page execute and read and write
BD6000
heap
page read and write
A3F0000
heap
page read and write
617000
heap
page read and write
61E000
heap
page read and write
1039000
heap
page read and write
B6D0000
unkown
page read and write
A060000
heap
page read and write
C98000
heap
page read and write
61E000
heap
page read and write
AFF9000
heap
page read and write
C08000
heap
page read and write
B30000
unkown
page read and write
A474000
heap
page read and write
27C3000
trusted library allocation
page read and write
B5F0000
unkown
page readonly
A786000
heap
page read and write
974000
trusted library allocation
page read and write
3F0A000
trusted library allocation
page read and write
A41D000
heap
page read and write
A739000
heap
page read and write
7750000
unkown
page read and write
BE0000
trusted library allocation
page read and write
C10000
unkown
page read and write
CAE000
heap
page read and write
D9E000
stack
page read and write
3B34000
trusted library allocation
page read and write
61E000
heap
page read and write
FD47000
unkown
page read and write
4C4F000
stack
page read and write
7750000
unkown
page read and write
7560000
unkown
page readonly
6EE4000
unkown
page read and write
3B47000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
4730000
heap
page read and write
9D03000
unkown
page read and write
297A000
heap
page read and write
617000
heap
page read and write
BC15000
unkown
page read and write
A832000
heap
page read and write
A9A0000
heap
page read and write
9B8A000
unkown
page read and write
B6D0000
unkown
page read and write
7D0000
trusted library allocation
page execute and read and write
AEE000
stack
page read and write
617000
heap
page read and write
9364000
unkown
page read and write
1824000
unkown
page readonly
A615000
heap
page read and write
2B60000
heap
page execute and read and write
DAF000
stack
page read and write
B30000
unkown
page read and write
7FF5030A5000
unkown
page readonly
61E000
heap
page read and write
CFB000
heap
page read and write
7FF503129000
unkown
page readonly
C08000
heap
page read and write
1190000
heap
page read and write
C88000
heap
page read and write
2BAC000
stack
page read and write
61E000
heap
page read and write
30B4000
unkown
page read and write
3B7F000
trusted library allocation
page read and write
A4FB000
heap
page read and write
B6D0000
unkown
page read and write
A6D5000
heap
page read and write
A417000
heap
page read and write
2F10000
unkown
page readonly
D6D000
heap
page read and write
9CEA000
unkown
page read and write
C97000
heap
page read and write
B990000
unkown
page read and write
C54000
heap
page read and write
4865000
trusted library allocation
page read and write
7FF502CCE000
unkown
page readonly
3B5C000
trusted library allocation
page read and write
AF6000
stack
page read and write
3B34000
trusted library allocation
page read and write
7FF502C2E000
unkown
page readonly
7DF411EE0000
unkown
page readonly
3B08000
trusted library allocation
page read and write
2E79000
stack
page read and write
61E000
heap
page read and write
61E000
heap
page read and write
A6ED000
heap
page read and write
B80000
unkown
page read and write
617000
heap
page read and write
A85F000
heap
page read and write
BC0C000
unkown
page read and write
3AF5000
trusted library allocation
page read and write
3B2C000
trusted library allocation
page read and write
1047000
heap
page read and write
10700000
heap
page read and write
54A6000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
2C1A000
trusted library allocation
page execute and read and write
C8D000
trusted library allocation
page execute and read and write
A42C000
heap
page read and write
73A000
heap
page read and write
B610000
unkown
page read and write
7FF502F88000
unkown
page readonly
7FF5032B5000
unkown
page readonly
7750000
unkown
page read and write
B610000
unkown
page read and write
8D48000
stack
page read and write
7750000
unkown
page read and write
B560000
unkown
page read and write
7FF5031DA000
unkown
page readonly
B0A0000
unkown
page read and write
A7AF000
heap
page read and write
276E000
stack
page read and write
2990000
heap
page read and write
A8E7000
heap
page read and write
BB0000
unkown
page read and write
A8B2000
heap
page read and write
3AFA000
trusted library allocation
page read and write
7FF5030CE000
unkown
page readonly
FD40000
unkown
page read and write
617000
heap
page read and write
A3FB000
heap
page read and write
819F000
stack
page read and write
120F000
heap
page read and write
C92000
heap
page read and write
C19000
heap
page read and write
FFA000
trusted library allocation
page execute and read and write
90A000
trusted library allocation
page execute and read and write
91DE000
unkown
page read and write
66D000
trusted library allocation
page execute and read and write
C97000
heap
page read and write
7FF503231000
unkown
page readonly
A80C000
heap
page read and write
A154000
heap
page read and write
B0A0000
unkown
page read and write
617000
heap
page read and write
F5E000
stack
page read and write
7FF503245000
unkown
page readonly
A94A000
heap
page read and write
C83000
heap
page read and write
44D0000
unkown
page read and write
7FF503223000
unkown
page readonly
B610000
unkown
page read and write
3B08000
trusted library allocation
page read and write
617000
heap
page read and write
A8D1000
heap
page read and write
1345000
heap
page read and write
545E000
stack
page read and write
C6B000
heap
page read and write
7DF411EF1000
unkown
page execute read
B80000
unkown
page read and write
3067000
unkown
page read and write
807B000
stack
page read and write
C88000
heap
page read and write
4D9E000
stack
page read and write
7480000
unkown
page read and write
61E000
heap
page read and write
5115000
trusted library allocation
page read and write
C6A000
heap
page read and write
7FF50318B000
unkown
page readonly
B6D0000
unkown
page read and write
11B0000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
A432000
heap
page read and write
C10000
unkown
page read and write
B6D0000
unkown
page read and write
A3C1000
heap
page read and write
C83000
heap
page read and write
1240000
trusted library allocation
page execute and read and write
12F0000
heap
page read and write
2E77000
trusted library allocation
page read and write
B610000
unkown
page read and write
BDCB000
unkown
page read and write
9255000
unkown
page read and write
3BF0000
heap
page read and write
B33A000
stack
page read and write
C57000
heap
page read and write
3B0D000
trusted library allocation
page read and write
C7A000
heap
page read and write
B30000
unkown
page read and write
B6D0000
unkown
page read and write
7750000
unkown
page read and write
2959000
trusted library allocation
page read and write
7FF502E60000
unkown
page readonly
B30000
unkown
page read and write
4AC0000
heap
page execute and read and write
C88000
heap
page read and write
4DD3000
trusted library allocation
page read and write
A806000
heap
page read and write
BE6000
stack
page read and write
7FF50270A000
unkown
page readonly
B30000
unkown
page read and write
2760000
trusted library allocation
page read and write
7FF502FA9000
unkown
page readonly
61E000
heap
page read and write
10741000
unkown
page read and write
7FF502C9D000
unkown
page readonly
3AFC000
trusted library allocation
page read and write
6D0000
heap
page read and write
E90000
unkown
page readonly
7750000
unkown
page read and write
B099000
heap
page read and write
7DF411F01000
unkown
page execute read
B30000
unkown
page read and write
B010000
unkown
page read and write
C62000
heap
page read and write
640000
heap
page read and write
93E000
stack
page read and write
27E4000
trusted library allocation
page read and write
A3F1000
heap
page read and write
A12F000
heap
page read and write
61E000
heap
page read and write
FA0000
trusted library allocation
page read and write
BEAF000
unkown
page read and write
A728000
heap
page read and write
3B1C000
trusted library allocation
page read and write
A54C000
heap
page read and write
F90000
trusted library allocation
page read and write
A173000
heap
page read and write
B0A0000
unkown
page read and write
B0A0000
unkown
page read and write
7750000
unkown
page read and write
61E000
heap
page read and write
A43F000
heap
page read and write
12B0000
trusted library allocation
page read and write
A42F000
heap
page read and write
7370000
unkown
page read and write
617000
heap
page read and write
947000
heap
page read and write
FE0000
trusted library allocation
page read and write
2CAF000
stack
page read and write
408000
unkown
page readonly
A3AE000
heap
page read and write
B90000
unkown
page read and write
B30000
unkown
page read and write
55D6000
unkown
page readonly
2708000
unkown
page readonly
C10000
unkown
page read and write
BEA3000
unkown
page read and write
B30000
unkown
page read and write
61E000
heap
page read and write
3B13000
trusted library allocation
page read and write
FA3000
trusted library allocation
page execute and read and write
C5C000
heap
page read and write
617000
heap
page read and write
3B32000
trusted library allocation
page read and write
156F000
stack
page read and write
AA06000
heap
page read and write
DB0000
trusted library allocation
page read and write
3AFC000
trusted library allocation
page read and write
4FFC000
trusted library allocation
page read and write
BB0000
unkown
page read and write
DB0000
heap
page read and write
F82000
trusted library allocation
page read and write
3B34000
trusted library allocation
page read and write
3AFA000
trusted library allocation
page read and write
617000
heap
page read and write
F80000
heap
page read and write
3AFF000
trusted library allocation
page read and write
3099000
unkown
page read and write
C97000
heap
page read and write
A429000
heap
page read and write
7FF50308A000
unkown
page readonly
A5B0000
heap
page read and write
A137000
heap
page read and write
3BFC000
trusted library allocation
page read and write
B640000
unkown
page read and write
617000
heap
page read and write
1074D000
unkown
page read and write
A3F7000
heap
page read and write
B50000
heap
page read and write
CF4000
heap
page read and write
7FF502D20000
unkown
page readonly
B30000
unkown
page read and write
439000
unkown
page readonly
61E000
heap
page read and write
106F000
heap
page read and write
AB33000
heap
page read and write
5D0000
heap
page read and write
11E0000
trusted library allocation
page read and write
A794000
heap
page read and write
A6F0000
unkown
page read and write
7FF502C30000
unkown
page readonly
54A4000
trusted library allocation
page read and write
7FF502F4B000
unkown
page readonly
695000
heap
page read and write
1260000
heap
page read and write
A148000
heap
page read and write
61E000
heap
page read and write
C10000
heap
page read and write
2CC1000
trusted library allocation
page read and write
1202000
trusted library allocation
page read and write
436000
unkown
page readonly
2DE0000
unkown
page read and write
A407000
heap
page read and write
4CA000
unkown
page read and write
A603000
heap
page read and write
A5E5000
heap
page read and write
3B25000
trusted library allocation
page read and write
4DB0000
heap
page read and write
617000
heap
page read and write
A7ED000
stack
page read and write
70B000
stack
page read and write
9CF4000
unkown
page read and write
C80000
heap
page read and write
DA0000
heap
page read and write
3B49000
trusted library allocation
page read and write
617000
heap
page read and write
6F09000
unkown
page read and write
DDE000
stack
page read and write
617000
heap
page read and write
A5D7000
heap
page read and write
101F000
heap
page read and write
B80000
unkown
page read and write
A340000
heap
page read and write
AACE000
heap
page read and write
A43B000
heap
page read and write
617000
heap
page read and write
D50000
heap
page read and write
F51000
trusted library allocation
page read and write
EE14000
unkown
page read and write
539F000
stack
page read and write
441000
unkown
page execute read
3B7F000
trusted library allocation
page read and write
F57000
trusted library allocation
page read and write
40B000
unkown
page execute read
C10000
unkown
page read and write
B6D0000
unkown
page read and write
61E000
heap
page read and write
3971000
trusted library allocation
page read and write
43F0000
heap
page read and write
79DD000
stack
page read and write
2C50000
trusted library allocation
page execute and read and write
617000
heap
page read and write
2820000
trusted library allocation
page read and write
C10000
unkown
page read and write
C57000
heap
page read and write
AB4B000
stack
page read and write
4378000
unkown
page read and write
61E000
heap
page read and write
7FF502D41000
unkown
page readonly
EE54000
unkown
page read and write
C10000
unkown
page read and write
58AE000
stack
page read and write
D68000
heap
page read and write
C83000
heap
page read and write
AAF8000
heap
page read and write
AAA0000
unkown
page readonly
FD43000
unkown
page read and write
617000
heap
page read and write
4891000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
A5B7000
heap
page read and write
7FF503287000
unkown
page readonly
BDC7000
unkown
page read and write
9CF2000
unkown
page read and write
AEB000
stack
page read and write
3B23000
trusted library allocation
page read and write
2AD7000
trusted library allocation
page read and write
7FF502D04000
unkown
page readonly
418000
unkown
page readonly
3088000
unkown
page read and write
2E3F000
stack
page read and write
7FF50317C000
unkown
page readonly
B6D0000
unkown
page read and write
C97000
heap
page read and write
A41B000
heap
page read and write
1200000
trusted library allocation
page read and write
4398000
unkown
page read and write
C97000
heap
page read and write
2720000
trusted library allocation
page read and write
A740000
heap
page read and write
10341000
unkown
page read and write
462000
unkown
page readonly
A86C000
heap
page read and write
2944000
trusted library allocation
page read and write
3B20000
trusted library allocation
page read and write
5143000
trusted library allocation
page read and write
AA6F000
heap
page read and write
C5C000
heap
page read and write
617000
heap
page read and write
A9FD000
heap
page read and write
D5E000
stack
page read and write
61E000
heap
page read and write
7FF5026FF000
unkown
page readonly
617000
heap
page read and write
3B33000
trusted library allocation
page read and write
664000
trusted library allocation
page read and write
27D6000
trusted library allocation
page read and write
7FF502DD1000
unkown
page readonly
134C000
heap
page read and write
5015000
trusted library allocation
page read and write
3B2E000
trusted library allocation
page read and write
B0C9000
heap
page read and write
B0A0000
unkown
page read and write
7FF502D29000
unkown
page readonly
C6C000
heap
page read and write
A779000
heap
page read and write
978000
heap
page read and write
B0A0000
unkown
page read and write
7750000
unkown
page read and write
AA7E000
heap
page read and write
7FF502CF5000
unkown
page readonly
9050000
unkown
page read and write
FC0000
heap
page read and write
61E000
heap
page read and write
A4C4000
heap
page read and write
1227000
heap
page read and write
7FF502DCE000
unkown
page readonly
3B03000
trusted library allocation
page read and write
A629000
heap
page read and write
C10000
unkown
page read and write
A618000
heap
page read and write
27A0000
trusted library allocation
page read and write
7750000
unkown
page read and write
61E000
heap
page read and write
A928000
heap
page read and write
D8C000
heap
page read and write
36AC000
stack
page read and write
BB50000
unkown
page read and write
E5E000
stack
page read and write
8889000
stack
page read and write
BB0000
unkown
page read and write
3B3C000
trusted library allocation
page read and write
9C8A000
unkown
page read and write
7FF502F22000
unkown
page readonly
A428000
heap
page read and write
B0D0000
unkown
page read and write
A60C000
heap
page read and write
9B6C000
heap
page read and write
525F000
stack
page read and write
7A58000
stack
page read and write
850000
heap
page read and write
5021000
trusted library allocation
page read and write
7750000
unkown
page read and write
A419000
heap
page read and write
7FF4ECBEF000
unkown
page readonly
10F7000
stack
page read and write
A9C2000
heap
page read and write
F70000
heap
page read and write
C60000
heap
page read and write
B30000
unkown
page read and write
C97000
heap
page read and write
B6D0000
unkown
page read and write
3B1B000
trusted library allocation
page read and write
5332000
unkown
page readonly
FD48000
unkown
page read and write
BFE000
heap
page read and write
2C2B000
trusted library allocation
page execute and read and write
B6D0000
unkown
page read and write
7750000
unkown
page read and write
4FAE000
stack
page read and write
FD4C000
unkown
page read and write
2E6F000
trusted library allocation
page read and write
48A5000
trusted library allocation
page read and write
B0A0000
unkown
page read and write
B30000
unkown
page read and write
4D1F000
stack
page read and write
B0A0000
unkown
page read and write
A3B2000
heap
page read and write
2593000
heap
page read and write
D8E000
stack
page read and write
A404000
heap
page read and write
61E000
heap
page read and write
B6D0000
unkown
page read and write
A7F4000
heap
page read and write
7750000
unkown
page read and write
7FF502D33000
unkown
page readonly
868000
heap
page read and write
617000
heap
page read and write
61E000
heap
page read and write
74C2000
unkown
page read and write
A41C000
heap
page read and write
A41A000
heap
page read and write
6ED7000
unkown
page read and write
B009000
stack
page read and write
1268000
heap
page read and write
1160000
heap
page read and write
7750000
unkown
page read and write
3B27000
trusted library allocation
page read and write
C10000
unkown
page read and write
3B1B000
trusted library allocation
page read and write
8F0000
trusted library allocation
page read and write
318F000
stack
page read and write
B30000
unkown
page read and write
A090000
heap
page read and write
3E45000
trusted library allocation
page read and write
A936000
heap
page read and write
C97000
heap
page read and write
38AE000
stack
page read and write
1523000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
B0A0000
unkown
page read and write
B30000
unkown
page read and write
3B2C000
trusted library allocation
page read and write
7470000
unkown
page read and write
A443000
heap
page read and write
B30000
unkown
page read and write
3B32000
trusted library allocation
page read and write
61E000
heap
page read and write
B30000
unkown
page read and write
BFC000
heap
page read and write
37C7000
trusted library allocation
page read and write
BB0000
unkown
page read and write
B30000
unkown
page read and write
B02B000
heap
page read and write
B28000
heap
page read and write
CBC000
heap
page read and write
3B19000
trusted library allocation
page read and write
8C5000
heap
page read and write
617000
heap
page read and write
B0A0000
unkown
page read and write
D5E000
stack
page read and write
2320000
heap
page read and write
41B000
unkown
page write copy
A3AA000
heap
page read and write
B6D0000
unkown
page read and write
90BD000
unkown
page read and write
117F000
stack
page read and write
2860000
direct allocation
page read and write
3305000
trusted library allocation
page read and write
54B9000
trusted library allocation
page read and write
C54000
heap
page read and write
2708000
unkown
page readonly
B610000
unkown
page read and write
617000
heap
page read and write
5140000
heap
page read and write
1530000
heap
page read and write
CEF000
heap
page read and write
A56E000
heap
page read and write
AB36000
heap
page read and write
114E000
stack
page read and write
F7A000
trusted library allocation
page execute and read and write
C80000
trusted library allocation
page read and write
FD44000
unkown
page read and write
739000
heap
page read and write
BDF5000
unkown
page read and write
61E000
heap
page read and write
A662000
heap
page read and write
A9B4000
heap
page read and write
2790000
trusted library allocation
page read and write
B80000
unkown
page read and write
3AFA000
trusted library allocation
page read and write
C97000
heap
page read and write
C59000
heap
page read and write
A21E000
heap
page read and write
C1AB000
unkown
page read and write
30A3000
unkown
page read and write
3B3C000
trusted library allocation
page read and write
26AD000
stack
page read and write
F30000
trusted library allocation
page read and write
B30000
unkown
page read and write
617000
heap
page read and write
B610000
unkown
page read and write
C81000
heap
page read and write
AB10000
heap
page read and write
A868000
heap
page read and write
A42C000
heap
page read and write
7750000
unkown
page read and write
61E000
heap
page read and write
A42A000
heap
page read and write
A918000
heap
page read and write
27E1000
trusted library allocation
page read and write
9C2C000
unkown
page read and write
7810000
unkown
page read and write
B610000
unkown
page read and write
A439000
heap
page read and write
22F0000
trusted library allocation
page execute and read and write
A69A000
heap
page read and write
2C00000
trusted library allocation
page read and write
AA14000
heap
page read and write
85C0000
unkown
page read and write
B610000
unkown
page read and write
A6AA000
heap
page read and write
2AA1000
trusted library allocation
page read and write
FD4D000
unkown
page read and write
A8ED000
heap
page read and write
7FF5030AA000
unkown
page readonly
2BF0000
heap
page execute and read and write
B30000
unkown
page read and write
B0A0000
unkown
page read and write
1257000
trusted library allocation
page read and write
760000
heap
page read and write
617000
heap
page read and write
C61000
heap
page read and write
C57000
heap
page read and write
3B54000
trusted library allocation
page read and write
F76000
trusted library allocation
page execute and read and write
BF2E000
unkown
page read and write
9D01000
unkown
page read and write
A300000
heap
page read and write
3AFC000
trusted library allocation
page read and write
C90000
heap
page read and write
FC8000
heap
page read and write
B30000
unkown
page read and write
1244000
unkown
page write copy
1329000
heap
page read and write
7FF503195000
unkown
page readonly
61E000
heap
page read and write
FB0000
trusted library allocation
page read and write
31CE000
stack
page read and write
2930000
heap
page execute and read and write
B30000
unkown
page read and write
48B6000
trusted library allocation
page read and write
2A71000
trusted library allocation
page read and write
DCDC000
stack
page read and write
617000
heap
page read and write
91B000
trusted library allocation
page execute and read and write
3B34000
trusted library allocation
page read and write
B610000
unkown
page read and write
7609000
stack
page read and write
CF6000
stack
page read and write
7FF502D18000
unkown
page readonly
A721000
heap
page read and write
9B83000
unkown
page read and write
B90000
unkown
page read and write
C60000
heap
page read and write
B610000
unkown
page read and write
617000
heap
page read and write
A2F8000
heap
page read and write
24AF000
trusted library allocation
page read and write
7FF502E8F000
unkown
page readonly
10DE000
stack
page read and write
A446000
heap
page read and write
7FF503187000
unkown
page readonly
A962000
heap
page read and write
930F000
unkown
page read and write
3AF2000
trusted library allocation
page read and write
3B06000
trusted library allocation
page read and write
7FF503126000
unkown
page readonly
C57000
heap
page read and write
7490000
unkown
page read and write
821B000
stack
page read and write
2C10000
trusted library allocation
page read and write
C98000
heap
page read and write
11AA000
heap
page read and write
B549000
stack
page read and write
A76F000
heap
page read and write
C92000
heap
page read and write
DC5000
heap
page read and write
FC2000
trusted library allocation
page read and write
98FC000
stack
page read and write
9E4000
heap
page read and write
A587000
heap
page read and write
61E000
heap
page read and write
A8B0000
heap
page read and write
43AC000
unkown
page read and write
912000
trusted library allocation
page read and write
A3E5000
heap
page read and write
61E000
heap
page read and write
7FF502DB8000
unkown
page readonly
A419000
heap
page read and write
AADF000
heap
page read and write
617000
heap
page read and write
8450000
unkown
page read and write
617000
heap
page read and write
1260000
trusted library allocation
page read and write
A7C5000
heap
page read and write
7750000
unkown
page read and write
7FF50328B000
unkown
page readonly
8596000
unkown
page read and write
7FF503216000
unkown
page readonly
9237000
unkown
page read and write
61E000
stack
page read and write
3AFA000
trusted library allocation
page read and write
7C0000
heap
page read and write
206F000
stack
page read and write
61E000
heap
page read and write
3B34000
trusted library allocation
page read and write
61E000
heap
page read and write
61E000
heap
page read and write
C57000
heap
page read and write
408000
unkown
page readonly
A400000
heap
page read and write
524F000
stack
page read and write
A40E000
heap
page read and write
61E000
heap
page read and write
2907000
trusted library allocation
page read and write
617000
heap
page read and write
F87000
trusted library allocation
page execute and read and write
7580000
unkown
page read and write
B610000
unkown
page read and write
7FF502FAF000
unkown
page readonly
9B87000
unkown
page read and write
A797000
heap
page read and write
C98000
heap
page read and write
A5A3000
heap
page read and write
A492000
heap
page read and write
B30000
unkown
page read and write
3B27000
trusted library allocation
page read and write
61E000
heap
page read and write
AAAE000
heap
page read and write
4CB000
unkown
page execute and read and write
1633000
trusted library allocation
page read and write
CD8000
heap
page read and write
1340000
heap
page read and write
BB50000
unkown
page read and write
C54000
heap
page read and write
A7D9000
heap
page read and write
37E7000
trusted library allocation
page read and write
A865000
heap
page read and write
7FF502D9D000
unkown
page readonly
B6D0000
unkown
page read and write
ED93000
unkown
page read and write
5AE000
stack
page read and write
9CCF000
unkown
page read and write
2A6E000
stack
page read and write
2CD8000
trusted library allocation
page read and write
9092000
unkown
page read and write
3B34000
trusted library allocation
page read and write
C46000
heap
page read and write
61E000
heap
page read and write
BFEE000
unkown
page read and write
A5E000
stack
page read and write
7750000
unkown
page read and write
7FF502DC8000
unkown
page readonly
1010000
trusted library allocation
page execute and read and write
A5E8000
heap
page read and write
4431000
unkown
page read and write
535E000
stack
page read and write
D5B000
stack
page read and write
E50000
heap
page read and write
7A60000
unkown
page read and write
3AA7000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
A42F000
heap
page read and write
5840000
heap
page execute and read and write
396000
stack
page read and write
9CF6000
unkown
page read and write
9D0000
unkown
page read and write
C10000
unkown
page read and write
3B65000
trusted library allocation
page read and write
C54000
heap
page read and write
61E000
heap
page read and write
7750000
unkown
page read and write
C10000
unkown
page read and write
399F000
stack
page read and write
BB50000
unkown
page read and write
43B0000
unkown
page read and write
401000
unkown
page execute read
AF80000
unkown
page read and write
AB08000
heap
page read and write
9C000
stack
page read and write
C2B000
trusted library allocation
page execute and read and write
61E000
heap
page read and write
B76000
stack
page read and write
D40000
heap
page read and write
C7B000
heap
page read and write
B30000
unkown
page read and write
A122000
heap
page read and write
61E000
heap
page read and write
B80000
unkown
page read and write
266E000
stack
page read and write
964E000
stack
page read and write
61E000
heap
page read and write
3B03000
trusted library allocation
page read and write
B0A0000
unkown
page read and write
3AFC000
trusted library allocation
page read and write
A41A000
heap
page read and write
21FF000
stack
page read and write
AAC8000
heap
page read and write
7750000
unkown
page read and write
9F1000
unkown
page readonly
9EB000
stack
page read and write
135A000
heap
page read and write
B990000
unkown
page read and write
BFC000
heap
page read and write
1640000
trusted library allocation
page read and write
FBA000
trusted library allocation
page execute and read and write
61E000
heap
page read and write
6FE3000
unkown
page read and write
A41F000
heap
page read and write
A5F9000
heap
page read and write
A91D000
heap
page read and write
7FF502DAD000
unkown
page readonly
7750000
unkown
page read and write
617000
heap
page read and write
B8B000
heap
page read and write
418000
unkown
page readonly
C7B000
heap
page read and write
61E000
heap
page read and write
61E000
heap
page read and write
FFE000
stack
page read and write
B80000
unkown
page read and write
A9EC000
heap
page read and write
C17C000
unkown
page read and write
A40D000
heap
page read and write
1010000
trusted library allocation
page read and write
27F0000
heap
page read and write
146F000
stack
page read and write
AAD4000
heap
page read and write
617000
heap
page read and write
BFE000
heap
page read and write
BDA9000
unkown
page read and write
B6D0000
unkown
page read and write
A43B000
heap
page read and write
AB59000
heap
page read and write
837000
trusted library allocation
page read and write
B90000
unkown
page read and write
B038000
heap
page read and write
A70F000
heap
page read and write
2910000
heap
page read and write
91A7000
unkown
page read and write
A413000
heap
page read and write
A11F000
heap
page read and write
FF6000
trusted library allocation
page execute and read and write
12DB000
trusted library allocation
page execute and read and write
1040000
heap
page read and write
A417000
heap
page read and write
3B17000
trusted library allocation
page read and write
2C80000
unkown
page readonly
EED000
trusted library allocation
page execute and read and write
3B1A000
trusted library allocation
page read and write
61E000
heap
page read and write
B610000
unkown
page read and write
A763000
heap
page read and write
A544000
heap
page read and write
B610000
unkown
page read and write
61E000
heap
page read and write
2481000
trusted library allocation
page read and write
2B58000
stack
page read and write
A7A8000
heap
page read and write
B5A1000
unkown
page read and write
E30000
unkown
page read and write
7A2000
trusted library allocation
page read and write
A140000
heap
page read and write
4721000
heap
page read and write
13EF000
stack
page read and write
AF7F000
stack
page read and write
7750000
unkown
page read and write
7FF502D61000
unkown
page readonly
C8C000
heap
page read and write
A8BA000
heap
page read and write
C10000
unkown
page read and write
3CCD000
trusted library allocation
page read and write
7FF503087000
unkown
page readonly
3B1A000
trusted library allocation
page read and write
7548000
stack
page read and write
B30000
unkown
page read and write
7FF502E0A000
unkown
page readonly
49BE000
stack
page read and write
A421000
heap
page read and write
7FF503185000
unkown
page readonly
BEA9000
unkown
page read and write
1110000
heap
page execute and read and write
3301000
trusted library allocation
page read and write
307E000
unkown
page read and write
454000
unkown
page readonly
A41B000
heap
page read and write
770000
heap
page read and write
440000
unkown
page readonly
617000
heap
page read and write
3B2F000
trusted library allocation
page read and write
61E000
heap
page read and write
7FF503020000
unkown
page readonly
4CC000
unkown
page readonly
2C70000
unkown
page readonly
43A0000
heap
page read and write
F11000
unkown
page execute read
7FF5032BD000
unkown
page readonly
A869000
stack
page read and write
12A0000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
A723000
heap
page read and write
C83000
trusted library allocation
page execute and read and write
617000
heap
page read and write
701D000
unkown
page read and write
31D0000
remote allocation
page read and write
8100000
unkown
page readonly
B090000
heap
page read and write
61E000
heap
page read and write
B30000
unkown
page read and write
A8E9000
heap
page read and write
61E000
heap
page read and write
AA29000
heap
page read and write
A405000
heap
page read and write
5040000
heap
page execute and read and write
B80000
unkown
page read and write
80E0000
unkown
page read and write
C8C000
heap
page read and write
A749000
heap
page read and write
A320000
heap
page read and write
61E000
heap
page read and write
A87000
trusted library allocation
page execute and read and write
3B86000
trusted library allocation
page read and write
61E000
heap
page read and write
C88000
heap
page read and write
1035000
heap
page read and write
7750000
unkown
page read and write
1293000
trusted library allocation
page execute and read and write
A760000
heap
page read and write
50FE000
stack
page read and write
C8C000
heap
page read and write
2DB0000
unkown
page read and write
BC80000
unkown
page read and write
6E15000
stack
page read and write
2F61000
heap
page read and write
27DB000
trusted library allocation
page read and write
40B000
unkown
page execute read
BD94000
unkown
page read and write
7750000
unkown
page read and write
7FF502E3F000
unkown
page readonly
61E000
heap
page read and write
39EE000
stack
page read and write
85E1000
unkown
page read and write
B610000
unkown
page read and write
B6D0000
unkown
page read and write
A562000
heap
page read and write
44B0000
unkown
page read and write
B17000
trusted library allocation
page read and write
1650000
heap
page read and write
BE14000
unkown
page read and write
A441000
heap
page read and write
AB91000
heap
page read and write
59BC000
trusted library allocation
page read and write
7FF5032F2000
unkown
page readonly
F1B000
trusted library allocation
page execute and read and write
1320000
heap
page read and write
A36A000
unkown
page read and write
61E000
heap
page read and write
CE2000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
B048000
heap
page read and write
FB0000
trusted library allocation
page read and write
BBA000
heap
page read and write
439B000
unkown
page read and write
D55000
heap
page read and write
AAE2000
heap
page read and write
7750000
unkown
page read and write
B30000
unkown
page read and write
A503000
heap
page read and write
11D6000
heap
page read and write
A955000
heap
page read and write
BFF4000
unkown
page read and write
B6D0000
unkown
page read and write
12C0000
trusted library allocation
page read and write
AB5000
heap
page read and write
3091000
unkown
page read and write
91FB000
unkown
page read and write
A445000
heap
page read and write
A54E000
heap
page read and write
C83000
heap
page read and write
A36E000
unkown
page read and write
3AA1000
trusted library allocation
page read and write
620000
heap
page read and write
FF0000
trusted library allocation
page read and write
617000
heap
page read and write
61E000
heap
page read and write
2D25000
trusted library allocation
page read and write
A818000
heap
page read and write
D27000
heap
page read and write
11C0000
trusted library allocation
page read and write
C88000
heap
page read and write
61E000
heap
page read and write
B6D0000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
61E000
heap
page read and write
FA0000
trusted library allocation
page read and write
A71D000
heap
page read and write
617000
heap
page read and write
A3F6000
heap
page read and write
7FF502F9F000
unkown
page readonly
B590000
heap
page read and write
2C80000
heap
page read and write
7FF502C4B000
unkown
page readonly
1430000
heap
page read and write
A687000
heap
page read and write
C7D000
heap
page read and write
3D3E000
stack
page read and write
C97000
heap
page read and write
AB41000
heap
page read and write
7E0000
heap
page read and write
95C4000
unkown
page read and write
28AE000
stack
page read and write
B6D0000
unkown
page read and write
3B27000
trusted library allocation
page read and write
A99A000
heap
page read and write
D36000
heap
page read and write
C99000
heap
page read and write
7FF502EC2000
unkown
page readonly
650000
trusted library allocation
page read and write
3AF2000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
C57000
heap
page read and write
255A000
stack
page read and write
BB0000
unkown
page read and write
3086000
unkown
page read and write
2829000
trusted library allocation
page read and write
61E000
heap
page read and write
3B44000
trusted library allocation
page read and write
FD4E000
unkown
page read and write
AFF2000
heap
page read and write
61E000
heap
page read and write
5600000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
A142000
heap
page read and write
3E47000
trusted library allocation
page read and write
C10000
unkown
page read and write
D95000
heap
page read and write
2708000
unkown
page readonly
617000
heap
page read and write
4405000
unkown
page read and write
C97000
heap
page read and write
A427000
heap
page read and write
A43B000
heap
page read and write
401000
unkown
page execute read
2AA5000
trusted library allocation
page read and write
297F000
stack
page read and write
6EF3000
unkown
page read and write
282E000
stack
page read and write
1076E000
unkown
page read and write
61E000
heap
page read and write
B30000
unkown
page read and write
7610000
unkown
page readonly
B0A0000
unkown
page read and write
C8F000
heap
page read and write
B0A0000
unkown
page read and write
10771000
unkown
page read and write
4A9E000
stack
page read and write
C10000
unkown
page read and write
1185000
heap
page read and write
48B4000
trusted library allocation
page read and write
275E000
trusted library allocation
page read and write
9BDE000
unkown
page read and write
A3FD000
heap
page read and write
2764000
trusted library allocation
page read and write
A434000
heap
page read and write
973000
trusted library allocation
page execute and read and write
A8EA000
stack
page read and write
BE8000
heap
page read and write
3AF7000
trusted library allocation
page read and write
586F000
stack
page read and write
1260000
heap
page read and write
B6D0000
unkown
page read and write
B0D0000
unkown
page read and write
B30000
unkown
page read and write
A6EA000
heap
page read and write
D19000
heap
page read and write
4DCE000
stack
page read and write
900000
trusted library allocation
page read and write
3BF1000
heap
page read and write
3C2D000
trusted library allocation
page read and write
3AFC000
trusted library allocation
page read and write
3D65000
trusted library allocation
page read and write
1299000
heap
page read and write
8E4000
trusted library allocation
page read and write
2850000
direct allocation
page execute and read and write
B90000
unkown
page read and write
7FF50324D000
unkown
page readonly
85C0000
unkown
page read and write
A65D000
heap
page read and write
7A7000
trusted library allocation
page execute and read and write
EA0000
heap
page read and write
FE53000
unkown
page read and write
BB50000
unkown
page read and write
7FF502D45000
unkown
page readonly
FAD000
trusted library allocation
page execute and read and write
7FF502EF3000
unkown
page readonly
6FD000
stack
page read and write
B69A000
unkown
page read and write
AA55000
heap
page read and write
AA6B000
heap
page read and write
4B9000
unkown
page readonly
501C000
trusted library allocation
page read and write
B0A0000
unkown
page read and write
85C0000
unkown
page read and write
915000
trusted library allocation
page execute and read and write
B30000
unkown
page read and write
3AF8000
trusted library allocation
page read and write
919C000
unkown
page read and write
B610000
unkown
page read and write
A75B000
heap
page read and write
D42000
heap
page read and write
A736000
heap
page read and write
B6D0000
unkown
page read and write
2C57000
trusted library allocation
page read and write
A8F8000
heap
page read and write
1260000
heap
page read and write
6EE6000
unkown
page read and write
12BA000
trusted library allocation
page execute and read and write
AA7B000
heap
page read and write
5605000
trusted library allocation
page read and write
A427000
heap
page read and write
A13A000
heap
page read and write
9C09000
unkown
page read and write
7FF50316E000
unkown
page readonly
5E5000
heap
page read and write
AABE000
heap
page read and write
5E0000
heap
page read and write
3AFA000
trusted library allocation
page read and write
A3FE000
heap
page read and write
1298000
heap
page read and write
B6D0000
unkown
page read and write
3B34000
trusted library allocation
page read and write
2771000
trusted library allocation
page read and write
3B6A000
trusted library allocation
page read and write
3B14000
trusted library allocation
page read and write
4FE4000
trusted library allocation
page read and write
7FF502D25000
unkown
page readonly
C83000
heap
page read and write
276E000
trusted library allocation
page read and write
C83000
heap
page read and write
A582000
heap
page read and write
617000
heap
page read and write
441000
unkown
page execute read
400000
unkown
page readonly
61E000
heap
page read and write
7FF502D84000
unkown
page readonly
A941000
heap
page read and write
61E000
heap
page read and write
F60000
trusted library allocation
page read and write
A85D000
heap
page read and write
560000
heap
page read and write
30A5000
unkown
page read and write
1255000
heap
page read and write
C8F000
heap
page read and write
A3F2000
heap
page read and write
B0A0000
unkown
page read and write
10702000
heap
page read and write
617000
heap
page read and write
AFF2000
heap
page read and write
617000
heap
page read and write
EE3000
trusted library allocation
page execute and read and write
7750000
unkown
page read and write
A69E000
heap
page read and write
1620000
heap
page read and write
617000
heap
page read and write
4435000
unkown
page read and write
3B32000
trusted library allocation
page read and write
5E0000
heap
page read and write
D10000
trusted library allocation
page execute and read and write
7DF411EE1000
unkown
page execute read
B30000
unkown
page read and write
4FE6000
trusted library allocation
page read and write
617000
heap
page read and write
B6D0000
unkown
page read and write
B6D0000
unkown
page read and write
3B85000
trusted library allocation
page read and write
A802000
heap
page read and write
418000
unkown
page readonly
8A0000
heap
page read and write
61E000
heap
page read and write
C10000
unkown
page read and write
AB21000
heap
page read and write
B6D0000
unkown
page read and write
B0A0000
unkown
page read and write
2F61000
heap
page read and write
26B0000
heap
page read and write
39FB000
stack
page read and write
D90000
heap
page read and write
980000
heap
page read and write
4F95000
trusted library allocation
page read and write
3B2C000
trusted library allocation
page read and write
2304000
heap
page read and write
7FF502E53000
unkown
page readonly
A127000
heap
page read and write
BB0E000
stack
page read and write
A3F7000
heap
page read and write
4FB0000
trusted library allocation
page read and write
A9FF000
heap
page read and write
AADD000
heap
page read and write
7750000
unkown
page read and write
8F6000
stack
page read and write
F9F000
heap
page read and write
3AF2000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
B1BF000
stack
page read and write
7FF503010000
unkown
page readonly
BB0000
unkown
page read and write
C92000
heap
page read and write
A3D2000
heap
page read and write
90DA000
unkown
page read and write
617000
heap
page read and write
3B4E000
trusted library allocation
page read and write
7750000
unkown
page read and write
A425000
heap
page read and write
C10000
unkown
page read and write
B30000
unkown
page read and write
B0A0000
unkown
page read and write
3B17000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
FBD000
trusted library allocation
page execute and read and write
29A000
stack
page read and write
A406000
heap
page read and write
C1A2000
unkown
page read and write
3B14000
trusted library allocation
page read and write
3BFE000
trusted library allocation
page read and write
C57000
heap
page read and write
7750000
unkown
page read and write
A5DF000
heap
page read and write
7FF503206000
unkown
page readonly
A97C000
heap
page read and write
FE94000
unkown
page read and write
B0A0000
unkown
page read and write
A7A000
trusted library allocation
page execute and read and write
7FF503155000
unkown
page readonly
3B6C000
trusted library allocation
page read and write
C64000
heap
page read and write
A55A000
heap
page read and write
C98000
heap
page read and write
8D0000
trusted library allocation
page read and write
42A000
unkown
page read and write
A2F0000
heap
page read and write
F90000
heap
page read and write
FE8F000
unkown
page read and write
7FF503365000
unkown
page readonly
3B0F000
trusted library allocation
page read and write
295A000
heap
page read and write
A422000
heap
page read and write
617000
heap
page read and write
B610000
unkown
page read and write
B6D0000
unkown
page read and write
617000
heap
page read and write
FEAE000
unkown
page read and write
7FF50328F000
unkown
page readonly
30A1000
unkown
page read and write
C1E000
stack
page read and write
B30000
unkown
page read and write
AA78000
heap
page read and write
7750000
unkown
page read and write
BE0000
heap
page read and write
617000
heap
page read and write
B6D0000
unkown
page read and write
BD7000
heap
page read and write
42E000
unkown
page readonly
9C000
stack
page read and write
59AF000
stack
page read and write
7840000
unkown
page read and write
AAA0000
heap
page read and write
C10000
unkown
page read and write
9BCB000
unkown
page read and write
3B86000
trusted library allocation
page read and write
31D0000
remote allocation
page read and write
A403000
heap
page read and write
829C000
stack
page read and write
11E5000
trusted library allocation
page read and write
3AFB000
trusted library allocation
page read and write
A6F0000
unkown
page read and write
45B000
unkown
page readonly
12F0000
trusted library allocation
page read and write
4820000
heap
page read and write
A403000
heap
page read and write
27F1000
trusted library allocation
page read and write
A6FC000
heap
page read and write
7750000
unkown
page read and write
B237000
stack
page read and write
7FF502CD4000
unkown
page readonly
B6D0000
unkown
page read and write
C57000
heap
page read and write
15D3000
trusted library allocation
page execute and read and write
BE8000
heap
page read and write
A857000
heap
page read and write
B6D0000
unkown
page read and write
3B25000
trusted library allocation
page read and write
A7C3000
heap
page read and write
3B65000
trusted library allocation
page read and write
7FF503055000
unkown
page readonly
5010000
trusted library allocation
page read and write
A73C000
heap
page read and write
1010000
heap
page read and write
3B2B000
trusted library allocation
page read and write
7FF502CDD000
unkown
page readonly
A751000
heap
page read and write
3B37000
trusted library allocation
page read and write
A332000
heap
page read and write
A225000
heap
page read and write
7FF503275000
unkown
page readonly
AB1D000
heap
page read and write
B80000
unkown
page read and write
B6D0000
unkown
page read and write
A9CF000
heap
page read and write
A9DA000
heap
page read and write
A93A000
heap
page read and write
B6D0000
unkown
page read and write
A402000
heap
page read and write
A767000
heap
page read and write
B640000
unkown
page read and write
C98000
heap
page read and write
7FF502D70000
unkown
page readonly
43B4000
unkown
page read and write
D29000
heap
page read and write
B6D0000
unkown
page read and write
4B4E000
stack
page read and write
3B5F000
trusted library allocation
page read and write
1090000
heap
page read and write
B5D0000
unkown
page readonly
1277000
heap
page read and write
B0A0000
unkown
page read and write
4550000
heap
page read and write
A993000
heap
page read and write
3082000
unkown
page read and write
4FE0000
heap
page read and write
3B26000
trusted library allocation
page read and write
1066000
heap
page read and write
936E000
unkown
page read and write
A78B000
heap
page read and write
A4B7000
heap
page read and write
C10000
unkown
page read and write
1214000
heap
page read and write
BBE8000
unkown
page read and write
FD4A000
unkown
page read and write
4BCF000
stack
page read and write
7720000
unkown
page readonly
A6C6000
heap
page read and write
2FD0000
trusted library allocation
page read and write
BB0000
unkown
page read and write
3B13000
trusted library allocation
page read and write
D31000
trusted library allocation
page read and write
7FF502FB7000
unkown
page readonly
3B1A000
trusted library allocation
page read and write
A76A000
heap
page read and write
B30000
unkown
page read and write
DAB000
stack
page read and write
A5CE000
heap
page read and write
102E000
stack
page read and write
2971000
trusted library allocation
page read and write
C57000
heap
page read and write
A92D000
heap
page read and write
AAB1000
heap
page read and write
1824000
unkown
page readonly
C01000
unkown
page read and write
617000
heap
page read and write
B30000
unkown
page read and write
3B44000
trusted library allocation
page read and write
617000
heap
page read and write
8A49000
stack
page read and write
61E000
heap
page read and write
A413000
heap
page read and write
F60000
heap
page read and write
2AA3000
trusted library allocation
page read and write
3C31000
trusted library allocation
page read and write
11F0000
heap
page read and write
2C67000
trusted library allocation
page read and write
3B41000
trusted library allocation
page read and write
448A000
unkown
page read and write
9B000
stack
page read and write
54FE000
stack
page read and write
AB13000
heap
page read and write
960000
heap
page read and write
A3FB000
heap
page read and write
FE2000
trusted library allocation
page read and write
A49A000
heap
page read and write
E4F000
stack
page read and write
5330000
unkown
page readonly
7FF502D48000
unkown
page readonly
A706000
heap
page read and write
B0A0000
unkown
page read and write
C7C000
heap
page read and write
A657000
heap
page read and write
A80F000
heap
page read and write
A32F000
unkown
page read and write
3B26000
trusted library allocation
page read and write
617000
heap
page read and write
A8C9000
heap
page read and write
FC7000
trusted library allocation
page execute and read and write
1281000
heap
page read and write
B80000
unkown
page read and write
7FF50322D000
unkown
page readonly
37E1000
trusted library allocation
page read and write
E40000
heap
page read and write
617000
heap
page read and write
6DA000
heap
page read and write
3B17000
trusted library allocation
page read and write
FF79000
unkown
page read and write
3B65000
trusted library allocation
page read and write
A12D000
heap
page read and write
617000
heap
page read and write
61E000
heap
page read and write
AB79000
heap
page read and write
61E000
heap
page read and write
41B000
unkown
page read and write
6EC0000
unkown
page read and write
A5EC000
heap
page read and write
3B37000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
A119000
heap
page read and write
9D6B000
unkown
page read and write
BDCD000
unkown
page read and write
A668000
heap
page read and write
E70000
heap
page read and write
FE7F000
unkown
page read and write
A7F9000
heap
page read and write
7FF502B58000
unkown
page readonly
61E000
heap
page read and write
B0A0000
unkown
page read and write
C10000
unkown
page read and write
1F0000
heap
page read and write
860000
heap
page read and write
2816000
trusted library allocation
page read and write
FDD000
trusted library allocation
page execute and read and write
61E000
heap
page read and write
3C15000
trusted library allocation
page read and write
27D0000
heap
page read and write
89E000
stack
page read and write
B6D0000
unkown
page read and write
DFE000
stack
page read and write
7FF503051000
unkown
page readonly
2891000
trusted library allocation
page read and write
3B6E000
trusted library allocation
page read and write
997F000
stack
page read and write
61E000
heap
page read and write
AA50000
heap
page read and write
617000
heap
page read and write
A576000
heap
page read and write
7FF502E0D000
unkown
page readonly
B6D0000
unkown
page read and write
C61000
heap
page read and write
B30000
unkown
page read and write
295E000
heap
page read and write
4FD5000
trusted library allocation
page read and write
BC08000
unkown
page read and write
24B1000
trusted library allocation
page read and write
AA59000
heap
page read and write
6BB000
stack
page read and write
A6D0000
heap
page read and write
CAE000
heap
page read and write
61E000
heap
page read and write
11F0000
heap
page read and write
40A000
unkown
page write copy
20DE000
stack
page read and write
27C1000
trusted library allocation
page read and write
617000
heap
page read and write
C98000
heap
page read and write
B90000
unkown
page read and write
B6D0000
unkown
page read and write
5145000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
7750000
unkown
page read and write
A5CA000
heap
page read and write
11D0000
trusted library allocation
page read and write
A3FB000
heap
page read and write
298E000
heap
page read and write
A568000
heap
page read and write
7630000
unkown
page readonly
C54000
heap
page read and write
2DC0000
unkown
page read and write
AF0000
heap
page read and write
C98000
heap
page read and write
3AFA000
trusted library allocation
page read and write
5495000
trusted library allocation
page read and write
3B38000
trusted library allocation
page read and write
B30000
unkown
page read and write
AB59000
heap
page read and write
C6C000
heap
page read and write
7FF503118000
unkown
page readonly
C89000
heap
page read and write
83D000
heap
page read and write
43DE000
stack
page read and write
BDE0000
unkown
page read and write
57B000
stack
page read and write
7FF5030EF000
unkown
page readonly
3AFF000
trusted library allocation
page read and write
617000
heap
page read and write
FD30000
heap
page read and write
617000
heap
page read and write
7750000
unkown
page read and write
93F6000
unkown
page read and write
902000
trusted library allocation
page read and write
FBD000
stack
page read and write
B30000
unkown
page read and write
5001000
trusted library allocation
page read and write
B80000
unkown
page read and write
617000
heap
page read and write
7FF5031FF000
unkown
page readonly
2708000
unkown
page readonly
B59000
heap
page read and write
6F0F000
unkown
page read and write
275B000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
FD6000
trusted library allocation
page execute and read and write
4AA2000
trusted library allocation
page read and write
A700000
heap
page read and write
2C22000
trusted library allocation
page read and write
DA0000
heap
page execute and read and write
30AC000
unkown
page read and write
F88000
heap
page read and write
7FF503368000
unkown
page readonly
A874000
heap
page read and write
3B14000
trusted library allocation
page read and write
7DF411ED1000
unkown
page execute read
617000
heap
page read and write
663000
trusted library allocation
page execute and read and write
630000
heap
page read and write
2DF0000
unkown
page read and write
61E000
heap
page read and write
C83000
heap
page read and write
A0E7000
heap
page read and write
298A000
heap
page read and write
F60000
heap
page read and write
9BE6000
unkown
page read and write
B30000
unkown
page read and write
44A0000
unkown
page read and write
4CA000
unkown
page write copy
F4D000
unkown
page readonly
617000
heap
page read and write
A6BF000
heap
page read and write
B6D0000
unkown
page read and write
FD40000
unkown
page read and write
61E000
heap
page read and write
1245000
unkown
page execute read
C70000
trusted library allocation
page read and write
6ED9000
unkown
page read and write
7750000
unkown
page read and write
30CD000
unkown
page read and write
A20000
heap
page read and write
2A90000
unkown
page readonly
617000
heap
page read and write
61E000
heap
page read and write
FD44000
unkown
page read and write
C87000
heap
page read and write
3C01000
trusted library allocation
page read and write
A4A3000
heap
page read and write
68A000
trusted library allocation
page execute and read and write
1027000
trusted library allocation
page read and write
12FE000
stack
page read and write
C16000
trusted library allocation
page execute and read and write
A5AE000
heap
page read and write
C7C000
heap
page read and write
3AFA000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
A49B000
heap
page read and write
332D000
stack
page read and write
3AF8000
trusted library allocation
page read and write
75E000
stack
page read and write
A508000
heap
page read and write
43C7000
unkown
page read and write
2F20000
unkown
page readonly
7750000
unkown
page read and write
7FF50303F000
unkown
page readonly
BE8000
heap
page read and write
2AA0000
unkown
page read and write
7FF5032D7000
unkown
page readonly
AA68000
heap
page read and write
40A000
unkown
page write copy
3B6D000
trusted library allocation
page read and write
B610000
unkown
page read and write
7FF5031B7000
unkown
page readonly
DC0000
heap
page read and write
7FF5030DE000
unkown
page readonly
7FF503239000
unkown
page readonly
C80000
heap
page read and write
7710000
unkown
page readonly
A968000
heap
page read and write
C95000
heap
page read and write
510E000
stack
page read and write
B6D0000
unkown
page read and write
61E000
heap
page read and write
4FF9000
trusted library allocation
page read and write
7750000
unkown
page read and write
3AFA000
trusted library allocation
page read and write
970000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
A3F0000
heap
page read and write
7FF502DC0000
unkown
page readonly
CEC000
heap
page read and write
F10000
unkown
page readonly
10811000
unkown
page read and write
BC5C000
unkown
page read and write
7FF502B7F000
unkown
page readonly
1036000
heap
page read and write
7FF502F8A000
unkown
page readonly
7FF5030E6000
unkown
page readonly
B6D0000
unkown
page read and write
3B34000
trusted library allocation
page read and write
EDDB000
unkown
page read and write
1C2000
unkown
page readonly
B029000
heap
page read and write
A79A000
heap
page read and write
BE8000
heap
page read and write
107C000
stack
page read and write
A194000
heap
page read and write
1100000
heap
page read and write
3860000
remote allocation
page read and write
61E000
heap
page read and write
A432000
heap
page read and write
A42A000
heap
page read and write
54B0000
trusted library allocation
page read and write
A930000
heap
page read and write
2796000
trusted library allocation
page read and write
795D000
stack
page read and write
C20000
heap
page read and write
61E000
heap
page read and write
28A0000
heap
page execute and read and write
27F8000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
A6F9000
heap
page read and write
7FF503257000
unkown
page readonly
1272000
heap
page read and write
422000
unkown
page read and write
B0A0000
unkown
page read and write
A3F0000
heap
page read and write
3B03000
trusted library allocation
page read and write
1043000
heap
page read and write
14B000
stack
page read and write
157E000
stack
page read and write
2980000
heap
page read and write
3AF2000
trusted library allocation
page read and write
A414000
heap
page read and write
A551000
heap
page read and write
617000
heap
page read and write
A6B7000
heap
page read and write
1300000
trusted library allocation
page execute and read and write
29AA000
heap
page read and write
617000
heap
page read and write
3E3F000
stack
page read and write
A8B6000
heap
page read and write
7FF502E62000
unkown
page readonly
3B4D000
trusted library allocation
page read and write
A7FD000
heap
page read and write
985000
heap
page read and write
A3F7000
heap
page read and write
B6D0000
unkown
page read and write
617000
heap
page read and write
BC55000
unkown
page read and write
1244000
unkown
page read and write
B70000
heap
page read and write
B30000
unkown
page read and write
3AF3000
trusted library allocation
page read and write
B30000
unkown
page read and write
3B65000
trusted library allocation
page read and write
3B1B000
trusted library allocation
page read and write
B4C000
heap
page read and write
61E000
heap
page read and write
61E000
heap
page read and write
1245000
unkown
page execute read
BFAE000
unkown
page read and write
4D5E000
stack
page read and write
27BE000
stack
page read and write
3B03000
trusted library allocation
page read and write
6EE1000
unkown
page read and write
7FF5032C0000
unkown
page readonly
3AF6000
trusted library allocation
page read and write
A3CA000
heap
page read and write
4860000
trusted library allocation
page read and write
B30000
unkown
page read and write
C83000
heap
page read and write
B610000
unkown
page read and write
BD0000
heap
page read and write
3B45000
trusted library allocation
page read and write
3B27000
trusted library allocation
page read and write
51DE000
stack
page read and write
3AFC000
trusted library allocation
page read and write
3BF6000
trusted library allocation
page read and write
AB0D000
heap
page read and write
487B000
trusted library allocation
page read and write
EDD6000
unkown
page read and write
A828000
heap
page read and write
A973000
heap
page read and write
B6D0000
unkown
page read and write
B6D0000
unkown
page read and write
6ECE000
unkown
page read and write
7FF502EC9000
unkown
page readonly
F9F000
stack
page read and write
B610000
unkown
page read and write
D43000
heap
page read and write
1150000
heap
page read and write
1220000
trusted library allocation
page read and write
7FF5032A5000
unkown
page readonly
B990000
unkown
page read and write
1317000
trusted library allocation
page read and write
A982000
heap
page read and write
2A60000
unkown
page readonly
DA0000
trusted library allocation
page read and write
3B03000
trusted library allocation
page read and write
3AF7000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
BF3000
trusted library allocation
page execute and read and write
C98000
heap
page read and write
AA0B000
stack
page read and write
F7F000
stack
page read and write
C1E000
stack
page read and write
2901000
trusted library allocation
page read and write
43F1000
heap
page read and write
B6D0000
unkown
page read and write
3AFC000
trusted library allocation
page read and write
7FF502DB3000
unkown
page readonly
B0A0000
unkown
page read and write
992000
heap
page read and write
9330000
unkown
page read and write
A87F000
heap
page read and write
A12B000
heap
page read and write
400000
unkown
page execute and read and write
A3FF000
heap
page read and write
446000
unkown
page readonly
A423000
heap
page read and write
800000
unkown
page readonly
27C5000
trusted library allocation
page read and write
B90000
unkown
page read and write
5110000
trusted library allocation
page read and write
10F6000
stack
page read and write
7FF503333000
unkown
page readonly
A8D4000
heap
page read and write
2BAE000
stack
page read and write
B30000
unkown
page read and write
7FF503235000
unkown
page readonly
7550000
unkown
page read and write
A788000
heap
page read and write
B88000
heap
page read and write
FE7000
trusted library allocation
page execute and read and write
A9E2000
heap
page read and write
43FD000
unkown
page read and write
55B0000
unkown
page readonly
342E000
stack
page read and write
617000
heap
page read and write
2317000
trusted library allocation
page read and write
2785000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
C8F000
heap
page read and write
C50000
heap
page read and write
D47000
heap
page read and write
617000
heap
page read and write
A652000
heap
page read and write
617000
heap
page read and write
BFB4000
unkown
page read and write
7FF502DC3000
unkown
page readonly
A353000
heap
page read and write
7FF5030B4000
unkown
page readonly
B610000
unkown
page read and write
A3F9000
heap
page read and write
617000
heap
page read and write
61E000
heap
page read and write
3B2C000
trusted library allocation
page read and write
2A9F000
stack
page read and write
617000
heap
page read and write
BE2000
heap
page read and write
3AFA000
trusted library allocation
page read and write
FB7000
heap
page read and write
7FF503326000
unkown
page readonly
61E000
heap
page read and write
A314000
heap
page read and write
1030000
heap
page read and write
B610000
unkown
page read and write
B30000
unkown
page read and write
4B9000
unkown
page readonly
C92000
heap
page read and write
CC0000
trusted library allocation
page read and write
3CA9000
trusted library allocation
page read and write
1064000
heap
page read and write
AA46000
heap
page read and write
A18D000
heap
page read and write
C19000
heap
page read and write
2560000
unkown
page read and write
912000
heap
page read and write
4370000
unkown
page read and write
299C000
heap
page execute and read and write
FE6000
heap
page read and write
B610000
unkown
page read and write
B40000
heap
page read and write
A421000
heap
page read and write
AB0000
heap
page read and write
3307000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
49C0000
trusted library allocation
page read and write
4B0D000
stack
page read and write
13A0000
heap
page read and write
617000
heap
page read and write
84DE000
stack
page read and write
AA76000
heap
page read and write
940000
heap
page read and write
7FF503277000
unkown
page readonly
617000
heap
page read and write
A712000
heap
page read and write
A10000
heap
page read and write
2805000
trusted library allocation
page read and write
C27000
trusted library allocation
page execute and read and write
7FF5031C3000
unkown
page readonly
C64000
heap
page read and write
61E000
heap
page read and write
19D000
stack
page read and write
A876000
heap
page read and write
617000
heap
page read and write
295E000
stack
page read and write
918D000
unkown
page read and write
38D000
stack
page read and write
3AFA000
trusted library allocation
page read and write
A93D000
heap
page read and write
2882000
trusted library allocation
page read and write
10DE000
heap
page read and write
3B34000
trusted library allocation
page read and write
545F000
stack
page read and write
7750000
unkown
page read and write
2FF0000
heap
page execute and read and write
5250000
heap
page execute and read and write
C88000
heap
page read and write
A8DE000
heap
page read and write
A41C000
heap
page read and write
EEE000
stack
page read and write
B0A0000
unkown
page read and write
3B86000
trusted library allocation
page read and write
C54000
heap
page read and write
B6D0000
unkown
page read and write
3B7F000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
9A7F000
stack
page read and write
61E000
heap
page read and write
840000
heap
page execute and read and write
3B01000
trusted library allocation
page read and write
A556000
heap
page read and write
BB0000
heap
page read and write
AABC000
heap
page read and write
C97000
heap
page read and write
BC27000
unkown
page read and write
D37000
trusted library allocation
page read and write
3AFA000
trusted library allocation
page read and write
13F0000
heap
page read and write
A66000
heap
page read and write
617000
heap
page read and write
B5E0000
unkown
page read and write
FFC5000
unkown
page read and write
400000
unkown
page readonly
A92B000
heap
page read and write
617000
heap
page read and write
BC30000
unkown
page read and write
2745000
trusted library allocation
page read and write
A9F1000
heap
page read and write
C22000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
2AB1000
trusted library allocation
page read and write
C81000
heap
page read and write
B6D0000
unkown
page read and write
A2F0000
unkown
page read and write
617000
heap
page read and write
77FE000
stack
page read and write
3D38000
trusted library allocation
page read and write
3AF9000
trusted library allocation
page read and write
C9F000
heap
page read and write
CB3000
trusted library allocation
page execute and read and write
AAFC000
heap
page read and write
A69C000
heap
page read and write
A439000
heap
page read and write
B30000
unkown
page read and write
7FF5032AF000
unkown
page readonly
3052000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
A070000
heap
page read and write
B6D0000
unkown
page read and write
10E7000
trusted library allocation
page read and write
131B000
heap
page read and write
EAF000
stack
page read and write
617000
heap
page read and write
A31C000
heap
page read and write
BE0000
heap
page read and write
12B4000
trusted library allocation
page read and write
FD4000
trusted library allocation
page read and write
7750000
unkown
page read and write
30C0000
heap
page read and write
1300000
trusted library allocation
page read and write
61E000
heap
page read and write
AAE5000
heap
page read and write
A0D2000
heap
page read and write
AB27000
heap
page read and write
4490000
heap
page read and write
40A000
unkown
page read and write
7AB000
trusted library allocation
page execute and read and write
921000
heap
page read and write
401000
unkown
page execute read
B30000
unkown
page read and write
9193000
unkown
page read and write
ABD0000
unkown
page read and write
A61F000
heap
page read and write
A404000
heap
page read and write
11BE000
stack
page read and write
7FF502291000
unkown
page readonly
B640000
unkown
page read and write
C0DE000
unkown
page read and write
36EE000
stack
page read and write
B6D0000
unkown
page read and write
AFFF000
heap
page read and write
FE70000
unkown
page read and write
A447000
heap
page read and write
A884000
heap
page read and write
B610000
unkown
page read and write
61E000
heap
page read and write
A626000
heap
page read and write
BE2000
heap
page read and write
400000
unkown
page readonly
B49D000
heap
page read and write
24D7000
trusted library allocation
page read and write
5150000
heap
page execute and read and write
C30000
heap
page read and write
A421000
heap
page read and write
2CB5000
trusted library allocation
page read and write
617000
heap
page read and write
3B3E000
trusted library allocation
page read and write
BB8000
heap
page read and write
2C40000
trusted library allocation
page read and write
A3F1000
heap
page read and write
7FF5031B0000
unkown
page readonly
2AA5000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
B6D0000
unkown
page read and write
BB50000
unkown
page read and write
28B0000
direct allocation
page read and write
A913000
heap
page read and write
A60000
heap
page read and write
61E000
heap
page read and write
7FF50301B000
unkown
page readonly
B6D0000
unkown
page read and write
A421000
heap
page read and write
8B5000
stack
page read and write
BBFA000
unkown
page read and write
7FF503006000
unkown
page readonly
AB89000
heap
page read and write
AB29000
heap
page read and write
617000
heap
page read and write
B30000
unkown
page read and write
A807000
heap
page read and write
2A59000
stack
page read and write
E80000
heap
page read and write
C7F000
heap
page read and write
61E000
heap
page read and write
A7F0000
heap
page read and write
C98000
heap
page read and write
3B45000
trusted library allocation
page read and write
B30000
unkown
page read and write
61E000
heap
page read and write
617000
heap
page read and write
7FF4ECBF5000
unkown
page readonly
7FF5032C8000
unkown
page readonly
AACB000
heap
page read and write
617000
heap
page read and write
BE96000
unkown
page read and write
B0A0000
unkown
page read and write
11C4000
trusted library allocation
page read and write
B30000
unkown
page read and write
FAB000
heap
page read and write
A8FB000
heap
page read and write
C1A000
trusted library allocation
page execute and read and write
D07000
heap
page read and write
CCD000
trusted library allocation
page execute and read and write
F10000
unkown
page readonly
A380000
heap
page read and write
CB0000
trusted library allocation
page read and write
318E000
stack
page read and write
2E97000
trusted library allocation
page read and write
CD0000
heap
page read and write
3860000
remote allocation
page read and write
8BC8000
stack
page read and write
C9E000
stack
page read and write
A990000
heap
page read and write
7750000
unkown
page read and write
3B3D000
trusted library allocation
page read and write
A4B4000
heap
page read and write
617000
heap
page read and write
A325000
heap
page read and write
95A000
stack
page read and write
C7F000
heap
page read and write
A9A6000
heap
page read and write
B0A0000
unkown
page read and write
2960000
heap
page read and write
2870000
heap
page read and write
2590000
heap
page read and write
FE7E000
unkown
page read and write
10EB000
heap
page read and write
C54000
heap
page read and write
7DF411EF0000
unkown
page readonly
61E000
heap
page read and write
B2BA000
stack
page read and write
7FF502E43000
unkown
page readonly
617000
heap
page read and write
C59000
heap
page read and write
7FF502D68000
unkown
page readonly
7FF503270000
unkown
page readonly
7FF502FB4000
unkown
page readonly
61E000
heap
page read and write
A3BA000
heap
page read and write
C81000
heap
page read and write
617000
heap
page read and write
3070000
direct allocation
page read and write
7750000
unkown
page read and write
AA5F000
heap
page read and write
AAC3000
heap
page read and write
31CE000
stack
page read and write
32CE000
stack
page read and write
2960000
heap
page read and write
617000
heap
page read and write
7FF5032C2000
unkown
page readonly
4560000
heap
page read and write
BFC000
heap
page read and write
61E000
heap
page read and write
540000
heap
page read and write
3AF9000
trusted library allocation
page read and write
B0A0000
unkown
page read and write
A495000
heap
page read and write
A150000
heap
page read and write
7FF503151000
unkown
page readonly
9D0D000
unkown
page read and write
B6D0000
unkown
page read and write
795000
heap
page read and write
B610000
unkown
page read and write
61E000
heap
page read and write
3AFC000
trusted library allocation
page read and write
B4E000
stack
page read and write
B610000
unkown
page read and write
61E000
heap
page read and write
7FF503114000
unkown
page readonly
B4A6000
heap
page read and write
FFE000
stack
page read and write
61E000
heap
page read and write
A9F5000
heap
page read and write
A11D000
heap
page read and write
B6D0000
unkown
page read and write
FD4A000
unkown
page read and write
F70000
heap
page read and write
D99000
heap
page read and write
2FC4000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
C0FD000
unkown
page read and write
F50000
unkown
page read and write
7FF502DD3000
unkown
page readonly
355F000
stack
page read and write
BDF0000
unkown
page read and write
B0A0000
unkown
page read and write
11FF000
stack
page read and write
69E000
stack
page read and write
B610000
unkown
page read and write
C7E000
heap
page read and write
617000
heap
page read and write
BE8000
heap
page read and write
3B35000
trusted library allocation
page read and write
7750000
unkown
page read and write
4A3C000
trusted library allocation
page read and write
79F000
stack
page read and write
3AFC000
trusted library allocation
page read and write
A425000
heap
page read and write
BF7A000
unkown
page read and write
AB0B000
heap
page read and write
A72B000
heap
page read and write
345E000
stack
page read and write
7FFD000
stack
page read and write
61E000
heap
page read and write
C54000
heap
page read and write
C83000
heap
page read and write
C98000
heap
page read and write
BD6C000
unkown
page read and write
A72F000
heap
page read and write
E50000
unkown
page readonly
DF0000
heap
page read and write
2DA0000
unkown
page readonly
449A000
unkown
page read and write
61E000
heap
page read and write
7FF5032DB000
unkown
page readonly
61E000
heap
page read and write
11C3000
trusted library allocation
page execute and read and write
61E000
heap
page read and write
3B19000
trusted library allocation
page read and write
C98000
heap
page read and write
A645000
heap
page read and write
6FDB000
unkown
page read and write
CC0000
trusted library allocation
page read and write
7B6000
stack
page read and write
11E6000
trusted library allocation
page read and write
A9E5000
heap
page read and write
1000000
trusted library allocation
page execute and read and write
D40000
heap
page read and write
617000
heap
page read and write
3B00000
trusted library allocation
page read and write
FE60000
unkown
page read and write
617000
heap
page read and write
3AFA000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
3AFC000
trusted library allocation
page read and write
BEE8000
unkown
page read and write
27C0000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
CDA000
trusted library allocation
page execute and read and write
61E000
heap
page read and write
B6D0000
unkown
page read and write
B6D0000
unkown
page read and write
CD6000
trusted library allocation
page execute and read and write
A415000
heap
page read and write
B6D0000
unkown
page read and write
AD0C000
heap
page read and write
2ACF000
trusted library allocation
page read and write
7810000
unkown
page read and write
7FF5030A3000
unkown
page readonly
3B45000
trusted library allocation
page read and write
61E000
heap
page read and write
1219000
heap
page read and write
C5D000
heap
page read and write
A190000
heap
page read and write
61E000
heap
page read and write
3B1C000
trusted library allocation
page read and write
A34D000
unkown
page read and write
FA4000
trusted library allocation
page read and write
61E000
heap
page read and write
3AFA000
trusted library allocation
page read and write
41B000
unkown
page write copy
61E000
heap
page read and write
286E000
stack
page read and write
A882000
heap
page read and write
A346000
unkown
page read and write
BB0000
heap
page read and write
42E000
unkown
page readonly
B6D0000
unkown
page read and write
3B03000
trusted library allocation
page read and write
1075A000
unkown
page read and write
C10000
unkown
page read and write
A347000
heap
page read and write
514E000
stack
page read and write
BB0000
unkown
page read and write
A805000
heap
page read and write
3B32000
trusted library allocation
page read and write
AB05000
heap
page read and write
7FF502DBC000
unkown
page readonly
C98000
heap
page read and write
3AFA000
trusted library allocation
page read and write
B30000
unkown
page read and write
AA1D000
heap
page read and write
A412000
heap
page read and write
29AE000
heap
page read and write
425E000
stack
page read and write
401000
unkown
page execute read
10F0000
heap
page read and write
54A0000
trusted library allocation
page read and write
B640000
unkown
page read and write
A7D3000
heap
page read and write
2C16000
trusted library allocation
page execute and read and write
AFE000
stack
page read and write
FEAA000
unkown
page read and write
97D000
trusted library allocation
page execute and read and write
7FF503335000
unkown
page readonly
A6DC000
heap
page read and write
B6D0000
unkown
page read and write
C7A000
heap
page read and write
FE86000
unkown
page read and write
B610000
unkown
page read and write
2C27000
trusted library allocation
page execute and read and write
FF87000
unkown
page read and write
3C07000
trusted library allocation
page read and write
3AFA000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
C77000
heap
page read and write
A93F000
heap
page read and write
4DB1000
unkown
page read and write
B90000
unkown
page read and write
290E000
stack
page read and write
A3FD000
heap
page read and write
617000
heap
page read and write
3AF1000
trusted library allocation
page read and write
521E000
stack
page read and write
9BF7000
unkown
page read and write
96CC000
stack
page read and write
2935000
trusted library allocation
page read and write
8C8000
heap
page read and write
C5C000
heap
page read and write
A428000
heap
page read and write
B30000
unkown
page read and write
9191000
unkown
page read and write
A90C000
heap
page read and write
3B17000
trusted library allocation
page read and write
76A0000
unkown
page readonly
E3E000
heap
page read and write
B30000
unkown
page read and write
617000
heap
page read and write
B0D0000
unkown
page read and write
A95A000
heap
page read and write
A360000
heap
page read and write
B30000
unkown
page read and write
A146000
heap
page read and write
B30000
unkown
page read and write
DB3000
trusted library allocation
page execute and read and write
A684000
heap
page read and write
C10000
unkown
page read and write
5660000
heap
page execute and read and write
61E000
heap
page read and write
617000
heap
page read and write
4E49000
unkown
page read and write
3CC5000
trusted library allocation
page read and write
7FF5032F7000
unkown
page readonly
A679000
heap
page read and write
2F3E000
stack
page read and write
810000
unkown
page readonly
B0A0000
unkown
page read and write
7750000
unkown
page read and write
A9AB000
heap
page read and write
617000
heap
page read and write
236E000
stack
page read and write
2BEE000
stack
page read and write
11D0000
heap
page read and write
B40000
heap
page read and write
A886000
heap
page read and write
FD45000
unkown
page read and write
617000
heap
page read and write
389E000
stack
page read and write
A76000
trusted library allocation
page execute and read and write
435F000
stack
page read and write
4AAC000
trusted library allocation
page read and write
7FF5032FE000
unkown
page readonly
535E000
stack
page read and write
12F8000
heap
page read and write
899000
heap
page read and write
5592000
unkown
page readonly
7DF411F11000
unkown
page execute read
617000
heap
page read and write
670000
trusted library allocation
page read and write
A3FB000
heap
page read and write
3AFA000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
43EF000
stack
page read and write
C54000
heap
page read and write
8ED000
trusted library allocation
page execute and read and write
55FE000
stack
page read and write
C60000
heap
page read and write
C10000
unkown
page read and write
C97000
heap
page read and write
7FF502D1B000
unkown
page readonly
A3FA000
heap
page read and write
C60000
heap
page read and write
61E000
heap
page read and write
617000
heap
page read and write
7FF503108000
unkown
page readonly
1420000
trusted library allocation
page read and write
BE8000
heap
page read and write
3B86000
trusted library allocation
page read and write
617000
heap
page read and write
7FF502B5B000
unkown
page readonly
61E000
heap
page read and write
AA09000
heap
page read and write
617000
heap
page read and write
B30000
unkown
page read and write
3AFF000
trusted library allocation
page read and write
617000
heap
page read and write
9B0000
heap
page read and write
7FF502F94000
unkown
page readonly
B1B000
heap
page read and write
A42E000
heap
page read and write
7FF50327C000
unkown
page readonly
37E5000
trusted library allocation
page read and write
7FF502F47000
unkown
page readonly
C50000
heap
page read and write
2C61000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
A53D000
heap
page read and write
BD2000
heap
page read and write
4876000
trusted library allocation
page read and write
288C000
trusted library allocation
page read and write
4010000
heap
page read and write
3AF7000
trusted library allocation
page read and write
7FF502DDC000
unkown
page readonly
B6D0000
unkown
page read and write
7DF411ED0000
unkown
page readonly
44DD000
stack
page read and write
61E000
heap
page read and write
61E000
heap
page read and write
B610000
unkown
page read and write
1020000
heap
page read and write
A400000
heap
page read and write
C7C000
heap
page read and write
A7B000
stack
page read and write
61E000
heap
page read and write
B30000
unkown
page read and write
3B4C000
trusted library allocation
page read and write
3AFC000
trusted library allocation
page read and write
A57F000
heap
page read and write
A42D000
heap
page read and write
A835000
heap
page read and write
1290000
trusted library allocation
page read and write
A161000
heap
page read and write
A670000
heap
page read and write
BB0000
unkown
page read and write
2470000
heap
page execute and read and write
3B3F000
trusted library allocation
page read and write
A410000
heap
page read and write
4FDE000
stack
page read and write
3B8D000
trusted library allocation
page read and write
B0D0000
unkown
page read and write
C10000
unkown
page read and write
A9BB000
heap
page read and write
3977000
trusted library allocation
page read and write
AFF0000
heap
page read and write
2950000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
3AFA000
trusted library allocation
page read and write
AA35000
heap
page read and write
AAD0000
heap
page read and write
930000
trusted library allocation
page read and write
F6D000
trusted library allocation
page execute and read and write
B640000
unkown
page read and write
617000
heap
page read and write
919F000
unkown
page read and write
A420000
heap
page read and write
BE2000
heap
page read and write
C98000
heap
page read and write
61E000
heap
page read and write
776000
heap
page read and write
2720000
heap
page read and write
A420000
heap
page read and write
314D000
stack
page read and write
AA04000
heap
page read and write
C10000
unkown
page read and write
61E000
heap
page read and write
1630000
trusted library allocation
page read and write
A7AC000
heap
page read and write
A319000
heap
page read and write
B610000
unkown
page read and write
617000
heap
page read and write
4884000
trusted library allocation
page read and write
A597000
heap
page read and write
B30000
unkown
page read and write
87F000
heap
page read and write
3B16000
trusted library allocation
page read and write
4402000
unkown
page read and write
AB24000
heap
page read and write
2C01000
trusted library allocation
page read and write
A40A000
heap
page read and write
1297000
heap
page read and write
402A000
trusted library allocation
page read and write
C10000
unkown
page read and write
1F0000
heap
page read and write
C98000
heap
page read and write
B610000
unkown
page read and write
A922000
heap
page read and write
917000
trusted library allocation
page execute and read and write
AAB7000
heap
page read and write
B6D0000
unkown
page read and write
BA0000
trusted library allocation
page read and write
61E000
heap
page read and write
1008000
heap
page read and write
B6D0000
unkown
page read and write
61E000
heap
page read and write
617000
heap
page read and write
A42B000
heap
page read and write
617000
heap
page read and write
B30000
unkown
page read and write
CBD000
trusted library allocation
page execute and read and write
120B000
trusted library allocation
page execute and read and write
7FF50331B000
unkown
page readonly
460000
heap
page read and write
C97000
heap
page read and write
C88000
heap
page read and write
C54000
heap
page read and write
A34A000
unkown
page read and write
3C9D000
trusted library allocation
page read and write
61E000
heap
page read and write
2AAF000
trusted library allocation
page read and write
4D00000
unkown
page write copy
76B000
stack
page read and write
7750000
unkown
page read and write
7FF5030C4000
unkown
page readonly
12CB000
trusted library allocation
page execute and read and write
B0A0000
unkown
page read and write
EE4000
trusted library allocation
page read and write
DEE000
stack
page read and write
D80000
heap
page read and write
71E000
stack
page read and write
3B00000
trusted library allocation
page read and write
CB7000
trusted library allocation
page read and write
1320000
heap
page read and write
2B4F000
stack
page read and write
401000
unkown
page execute read
B0A0000
unkown
page read and write
2F7E000
stack
page read and write
61E000
heap
page read and write
FD42000
unkown
page read and write
4CCF000
stack
page read and write
61E000
heap
page read and write
B30000
unkown
page read and write
3B27000
trusted library allocation
page read and write
29BB000
heap
page read and write
2C70000
trusted library allocation
page read and write
B0A0000
unkown
page read and write
B30000
unkown
page read and write
4A5E000
stack
page read and write
2EF0000
stack
page read and write
3B32000
trusted library allocation
page read and write
121B000
heap
page read and write
A695000
heap
page read and write
7750000
unkown
page read and write
BE3000
heap
page read and write
C54000
heap
page read and write
308F000
unkown
page read and write
2AAD000
trusted library allocation
page read and write
7FF5030C9000
unkown
page readonly
B6D0000
unkown
page read and write
15D4000
trusted library allocation
page read and write
1220000
heap
page read and write
4463000
unkown
page read and write
A421000
heap
page read and write
BFC000
heap
page read and write
61E000
heap
page read and write
3B29000
trusted library allocation
page read and write
C83000
heap
page read and write
C98000
heap
page read and write
41B000
unkown
page read and write
C6F000
heap
page read and write
447A000
unkown
page read and write
4360000
unclassified section
page read and write
A220000
heap
page read and write
A471000
heap
page read and write
BE8000
heap
page read and write
E3CF000
stack
page read and write
A5C3000
heap
page read and write
AA1A000
heap
page read and write
A1E4000
heap
page read and write
7FF503175000
unkown
page readonly
A7D5000
heap
page read and write
95E000
heap
page read and write
C64000
heap
page read and write
3AFC000
trusted library allocation
page read and write
A998000
heap
page read and write
5610000
heap
page read and write
617000
heap
page read and write
7750000
unkown
page read and write
15D0000
trusted library allocation
page read and write
FE5D000
unkown
page read and write
2301000
trusted library allocation
page read and write
A7F6000
heap
page read and write
702D000
unkown
page read and write
3B39000
trusted library allocation
page read and write
C10000
unkown
page read and write
A78F000
heap
page read and write
A608000
heap
page read and write
61E000
heap
page read and write
BE8000
heap
page read and write
7FF502E9C000
unkown
page readonly
3B10000
trusted library allocation
page read and write
FF75000
unkown
page read and write
A6CD000
heap
page read and write
C00000
trusted library allocation
page read and write
3220000
heap
page read and write
61E000
heap
page read and write
7750000
unkown
page read and write
BE3000
heap
page read and write
617000
heap
page read and write
61E000
heap
page read and write
A41A000
heap
page read and write
7FF50312D000
unkown
page readonly
C8F000
heap
page read and write
31D0000
remote allocation
page read and write
A444000
heap
page read and write
12C7000
trusted library allocation
page execute and read and write
3B25000
trusted library allocation
page read and write
9D60000
unkown
page read and write
A6F7000
heap
page read and write
25F0000
trusted library allocation
page read and write
5474000
trusted library allocation
page read and write
1021000
trusted library allocation
page read and write
7FF503354000
unkown
page readonly
F8B000
trusted library allocation
page execute and read and write
72E000
heap
page read and write
A229000
heap
page read and write
D90000
heap
page read and write
B610000
unkown
page read and write
1326000
heap
page read and write
9416000
unkown
page read and write
1030000
trusted library allocation
page read and write
15E0000
heap
page read and write
D3B000
stack
page read and write
7FF50335D000
unkown
page readonly
BC19000
unkown
page read and write
C8D000
heap
page read and write
D60000
heap
page read and write
2794000
heap
page read and write
B30000
unkown
page read and write
AB7000
heap
page read and write
7FF502D3E000
unkown
page readonly
12E0000
trusted library allocation
page read and write
A41E000
heap
page read and write
553F000
stack
page read and write
7750000
unkown
page read and write
2AA1000
trusted library allocation
page read and write
495E000
stack
page read and write
7FF5030FF000
unkown
page readonly
A41E000
heap
page read and write
617000
heap
page read and write
3C4D000
trusted library allocation
page read and write
7FF5032CF000
unkown
page readonly
E85000
heap
page read and write
A5A1000
heap
page read and write
C35000
heap
page read and write
A80A000
heap
page read and write
B30000
unkown
page read and write
860000
heap
page read and write
B30000
unkown
page read and write
A8BD000
heap
page read and write
A3FC000
heap
page read and write
10756000
unkown
page read and write
11A0000
heap
page read and write
28BE000
stack
page read and write
1328000
heap
page read and write
A9A8000
heap
page read and write
C60000
unkown
page readonly
61E000
heap
page read and write
55B0000
heap
page read and write
C57000
heap
page read and write
7FF502D15000
unkown
page readonly
7FF502E06000
unkown
page readonly
B008000
heap
page read and write
1015000
trusted library allocation
page read and write
BB0000
unkown
page read and write
A42C000
heap
page read and write
A414000
heap
page read and write
3AFC000
stack
page read and write
2620000
heap
page execute and read and write
61E000
heap
page read and write
617000
heap
page read and write
B6D0000
unkown
page read and write
A77C000
heap
page read and write
831E000
stack
page read and write
7FF502EB7000
unkown
page readonly
A3A0000
heap
page read and write
61E000
heap
page read and write
A98B000
heap
page read and write
C98000
heap
page read and write
7FF503227000
unkown
page readonly
E80000
heap
page read and write
4970000
trusted library allocation
page read and write
418000
unkown
page readonly
3B1A000
trusted library allocation
page read and write
3B13000
trusted library allocation
page read and write
BFC000
heap
page read and write
C98000
heap
page read and write
BEF6000
unkown
page read and write
4DD0000
trusted library allocation
page read and write
AA2F000
heap
page read and write
A50B000
heap
page read and write
3AF3000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
AA88000
heap
page read and write
A84A000
heap
page read and write
617000
heap
page read and write
246F000
stack
page read and write
3B31000
trusted library allocation
page read and write
7FF502B7D000
unkown
page readonly
1090000
unkown
page readonly
D1E000
stack
page read and write
A894000
heap
page read and write
5470000
trusted library allocation
page read and write
61E000
heap
page read and write
617000
heap
page read and write
AAB3000
heap
page read and write
61E000
heap
page read and write
3AF9000
trusted library allocation
page read and write
FE5F000
unkown
page read and write
C88000
heap
page read and write
A4B1000
heap
page read and write
A6FE000
heap
page read and write
B570000
unkown
page read and write
3AF0000
trusted library allocation
page read and write
296C000
heap
page execute and read and write
DECD000
stack
page read and write
977E000
stack
page read and write
B610000
unkown
page read and write
3AF2000
trusted library allocation
page read and write
4FF2000
trusted library allocation
page read and write
A909000
heap
page read and write
A6F0000
unkown
page read and write
1310000
trusted library allocation
page read and write
7FF50323B000
unkown
page readonly
A6B9000
heap
page read and write
B0A0000
unkown
page read and write
6FD7000
unkown
page read and write
61E000
heap
page read and write
E70000
heap
page read and write
617000
heap
page read and write
7FF502EF7000
unkown
page readonly
A554000
heap
page read and write
565000
heap
page read and write
C7D000
heap
page read and write
7750000
unkown
page read and write
B610000
unkown
page read and write
4002000
trusted library allocation
page read and write
A3A5000
heap
page read and write
C84000
trusted library allocation
page read and write
C10000
unkown
page read and write
2A9E000
stack
page read and write
A7A2000
heap
page read and write
B6D0000
unkown
page read and write
340F000
stack
page read and write
BF0000
trusted library allocation
page read and write
1230000
heap
page read and write
617000
heap
page read and write
FD41000
unkown
page read and write
BA8B000
stack
page read and write
2E71000
trusted library allocation
page read and write
7750000
unkown
page read and write
BEE6000
unkown
page read and write
1311000
trusted library allocation
page read and write
A8CB000
heap
page read and write
61E000
heap
page read and write
529E000
stack
page read and write
855E000
stack
page read and write
D1C000
stack
page read and write
617000
heap
page read and write
F00000
trusted library allocation
page read and write
2780000
direct allocation
page execute and read and write
2EF2000
stack
page read and write
61E000
heap
page read and write
FE0000
trusted library allocation
page read and write
11F8000
heap
page read and write
A425000
heap
page read and write
10F6000
stack
page read and write
12B0000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
9AFF000
stack
page read and write
B30000
unkown
page read and write
B0A0000
unkown
page read and write
A90000
heap
page read and write
7750000
unkown
page read and write
1E0000
unkown
page readonly
AA85000
heap
page read and write
B30000
unkown
page read and write
B30000
unkown
page read and write
617000
heap
page read and write
A81C000
heap
page read and write
A82000
trusted library allocation
page read and write
A8A0000
heap
page read and write
1180000
heap
page read and write
3B0B000
heap
page read and write
61E000
heap
page read and write
A89B000
heap
page read and write
7FF503110000
unkown
page readonly
271E000
stack
page read and write
61E000
heap
page read and write
C10000
unkown
page read and write
7FF503032000
unkown
page readonly
1A0000
heap
page read and write
3B22000
trusted library allocation
page read and write
2BDA000
stack
page read and write
61E000
heap
page read and write
F0A000
trusted library allocation
page execute and read and write
A826000
heap
page read and write
A675000
heap
page read and write
A7BE000
heap
page read and write
3AA5000
trusted library allocation
page read and write
831000
trusted library allocation
page read and write
617000
heap
page read and write
A87A000
heap
page read and write
CEB000
trusted library allocation
page execute and read and write
48DE000
stack
page read and write
A3F2000
heap
page read and write
A8A3000
heap
page read and write
85B000
stack
page read and write
7FF502B9A000
unkown
page readonly
5140000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
76E0000
unkown
page readonly
686000
trusted library allocation
page execute and read and write
29D9000
stack
page read and write
B30000
unkown
page read and write
7FF502B8B000
unkown
page readonly
8110000
unkown
page read and write
61E000
heap
page read and write
FC0000
heap
page read and write
B30000
unkown
page read and write
B0A0000
unkown
page read and write
2B5E000
stack
page read and write
A542000
heap
page read and write
7FF502CFA000
unkown
page readonly
7FF50310B000
unkown
page readonly
5603000
trusted library allocation
page read and write
C98000
heap
page read and write
8E0000
unkown
page readonly
A41F000
heap
page read and write
48B0000
trusted library allocation
page read and write
2300000
heap
page read and write
C57000
heap
page read and write
7FF5032EB000
unkown
page readonly
B610000
unkown
page read and write
7FF502E5E000
unkown
page readonly
2910000
heap
page execute and read and write
2310000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
12B6000
trusted library allocation
page execute and read and write
7FF503360000
unkown
page readonly
A3F2000
heap
page read and write
1180000
heap
page read and write
2485000
trusted library allocation
page read and write
74B0000
unkown
page read and write
8440000
unkown
page read and write
C79000
heap
page read and write
617000
heap
page read and write
7620000
unkown
page readonly
501A000
trusted library allocation
page read and write
AB5F000
heap
page read and write
6EB0000
unkown
page read and write
3B1B000
trusted library allocation
page read and write
3AFA000
trusted library allocation
page read and write
BE99000
unkown
page read and write
B580000
unkown
page read and write
BB50000
unkown
page read and write
4DD5000
trusted library allocation
page read and write
B30000
unkown
page read and write
B610000
unkown
page read and write
A3FA000
heap
page read and write
A423000
heap
page read and write
7750000
unkown
page read and write
A564000
heap
page read and write
BE1C000
unkown
page read and write
B20000
heap
page read and write
A906000
heap
page read and write
AFFB000
heap
page read and write
7750000
unkown
page read and write
11E0000
trusted library allocation
page read and write
A862000
heap
page read and write
8ECC000
stack
page read and write
3AF6000
trusted library allocation
page read and write
7750000
unkown
page read and write
10710000
unkown
page read and write
B0A0000
unkown
page read and write
C97000
heap
page read and write
A55C000
heap
page read and write
C54000
heap
page read and write
690000
heap
page read and write
B0A0000
unkown
page read and write
1207000
trusted library allocation
page execute and read and write
617000
heap
page read and write
C20000
heap
page read and write
7E0000
heap
page read and write
4005000
trusted library allocation
page read and write
A8EF000
heap
page read and write
A971000
heap
page read and write
B90000
unkown
page read and write
27B0000
trusted library allocation
page read and write
126D000
heap
page read and write
3B13000
trusted library allocation
page read and write
C10000
unkown
page read and write
617000
heap
page read and write
59B2000
trusted library allocation
page read and write
D22000
heap
page read and write
2874000
heap
page read and write
3860000
remote allocation
page read and write
2E41000
trusted library allocation
page read and write
950000
heap
page read and write
3E74000
trusted library allocation
page read and write
617000
heap
page read and write
AAEB000
heap
page read and write
C00A000
unkown
page read and write
A623000
heap
page read and write
7FF50326B000
unkown
page readonly
A631000
heap
page read and write
102B000
heap
page read and write
A14D000
heap
page read and write
B0A0000
unkown
page read and write
4880000
trusted library allocation
page read and write
F17000
trusted library allocation
page execute and read and write
B45000
heap
page read and write
7AE000
stack
page read and write
7FF5030D9000
unkown
page readonly
8F0000
heap
page read and write
3B3C000
trusted library allocation
page read and write
617000
heap
page read and write
3B00000
trusted library allocation
page read and write
2EFF000
stack
page read and write
9BAA000
unkown
page read and write
2946000
trusted library allocation
page read and write
FE8D000
unkown
page read and write
7FF503189000
unkown
page readonly
617000
heap
page read and write
61E000
heap
page read and write
A773000
heap
page read and write
B610000
unkown
page read and write
C97000
heap
page read and write
9D58000
unkown
page read and write
9450000
unkown
page readonly
1251000
trusted library allocation
page read and write
61E000
heap
page read and write
B6D0000
unkown
page read and write
440000
unkown
page readonly
1C0000
unkown
page readonly
1294000
trusted library allocation
page read and write
19D000
stack
page read and write
A4AC000
heap
page read and write
15DD000
trusted library allocation
page execute and read and write
12C2000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
A985000
heap
page read and write
11F0000
heap
page read and write
A5FD000
heap
page read and write
617000
heap
page read and write
28FE000
stack
page read and write
2AC0000
unkown
page readonly
4840000
trusted library allocation
page read and write
C88000
heap
page read and write
3B34000
trusted library allocation
page read and write
B30000
unkown
page read and write
8080000
unkown
page readonly
7FF50331F000
unkown
page readonly
9B70000
unkown
page read and write
FFEB000
unkown
page read and write
AA71000
heap
page read and write
617000
heap
page read and write
B30000
unkown
page read and write
8E3000
trusted library allocation
page execute and read and write
129D000
trusted library allocation
page execute and read and write
2756000
trusted library allocation
page read and write
7FF5031BC000
unkown
page readonly
A415000
heap
page read and write
2754000
trusted library allocation
page read and write
B6D0000
unkown
page read and write
452D000
trusted library allocation
page read and write
6E99000
stack
page read and write
C97000
heap
page read and write
2790000
heap
page read and write
A429000
heap
page read and write
A5FF000
heap
page read and write
59C1000
trusted library allocation
page read and write
C88000
heap
page read and write
3B7F000
trusted library allocation
page read and write
AA22000
heap
page read and write
5120000
heap
page execute and read and write
11AE000
heap
page read and write
FE95000
unkown
page read and write
A655000
heap
page read and write
4720000
heap
page read and write
A9D1000
heap
page read and write
617000
heap
page read and write
B6D0000
unkown
page read and write
7FF502B88000
unkown
page readonly
7FF503130000
unkown
page readonly
5590000
unkown
page readonly
A6A5000
heap
page read and write
11D5000
trusted library allocation
page read and write
FCB000
trusted library allocation
page execute and read and write
7FF502B93000
unkown
page readonly
85C0000
unkown
page read and write
B6D0000
unkown
page read and write
617000
heap
page read and write
B30000
unkown
page read and write
3AF3000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
1128000
trusted library allocation
page read and write
11E4000
trusted library allocation
page read and write
7FF502CF2000
unkown
page readonly
61E000
heap
page read and write
A19A000
heap
page read and write
28C0000
unclassified section
page read and write
A5B3000
heap
page read and write
790000
heap
page read and write
B610000
unkown
page read and write
B6D0000
unkown
page read and write
617000
heap
page read and write
61E000
heap
page read and write
CE7000
trusted library allocation
page execute and read and write
958000
heap
page read and write
B80000
unkown
page read and write
9366000
unkown
page read and write
48C0000
heap
page read and write
55A0000
trusted library allocation
page read and write
A9CC000
heap
page read and write
61E000
heap
page read and write
C83000
heap
page read and write
B6D0000
unkown
page read and write
C10000
unkown
page read and write
3B6D000
trusted library allocation
page read and write
CB1000
trusted library allocation
page read and write
A68B000
heap
page read and write
A3F0000
heap
page read and write
3010000
unkown
page read and write
A41D000
heap
page read and write
3B47000
trusted library allocation
page read and write
7FF502C8C000
unkown
page readonly
7FF502B77000
unkown
page readonly
617000
heap
page read and write
617000
heap
page read and write
960000
trusted library allocation
page read and write
7FF5031E8000
unkown
page readonly
61E000
heap
page read and write
7FF502F2C000
unkown
page readonly
400000
unkown
page execute and read and write
617000
heap
page read and write
7750000
unkown
page read and write
BD0000
heap
page read and write
5000000
trusted library allocation
page read and write
7FF502F86000
unkown
page readonly
2CBF000
trusted library allocation
page read and write
AAB9000
heap
page read and write
3E41000
trusted library allocation
page read and write
FFBB000
unkown
page read and write
1092F000
unkown
page read and write
C92000
heap
page read and write
7FF502D10000
unkown
page readonly
C10000
unkown
page read and write
308E000
stack
page read and write
AB81000
heap
page read and write
113E000
stack
page read and write
61E000
heap
page read and write
10F1000
stack
page read and write
B0A0000
unkown
page read and write
B30000
unkown
page read and write
3B44000
trusted library allocation
page read and write
6ED0000
unkown
page read and write
7FF502E02000
unkown
page readonly
BFD000
trusted library allocation
page execute and read and write
617000
heap
page read and write
7FF5032EE000
unkown
page readonly
B6D0000
unkown
page read and write
A416000
heap
page read and write
A158000
heap
page read and write
617000
heap
page read and write
3B1C000
trusted library allocation
page read and write
E60000
heap
page read and write
BC21000
unkown
page read and write
576E000
stack
page read and write
A426000
heap
page read and write
7FF5032DF000
unkown
page readonly
DB4000
trusted library allocation
page read and write
C6A000
heap
page read and write
9315000
unkown
page read and write
309F000
unkown
page read and write
F40000
trusted library allocation
page execute and read and write
7FF502F6E000
unkown
page readonly
4AB1000
trusted library allocation
page read and write
A407000
heap
page read and write
B6D0000
unkown
page read and write
A32E000
heap
page read and write
B6D0000
unkown
page read and write
B30000
unkown
page read and write
C88000
heap
page read and write
BAD000
stack
page read and write
A31E000
heap
page read and write
7FF503161000
unkown
page readonly
C97000
heap
page read and write
906000
heap
page read and write
4FEE000
stack
page read and write
5113000
trusted library allocation
page read and write
A114000
heap
page read and write
1520000
trusted library allocation
page read and write
617000
heap
page read and write
C88000
heap
page read and write
B610000
unkown
page read and write
C9F000
heap
page read and write
3AF3000
trusted library allocation
page read and write
7750000
unkown
page read and write
F12000
trusted library allocation
page read and write
F06000
trusted library allocation
page execute and read and write
7D0000
heap
page read and write
FD0000
trusted library allocation
page read and write
2D0E000
stack
page read and write
27E0000
trusted library allocation
page read and write
C58000
heap
page read and write
617000
heap
page read and write
A401000
heap
page read and write
A693000
heap
page read and write
7FF503298000
unkown
page readonly
AA0D000
heap
page read and write
A368000
heap
page read and write
11ED000
heap
page read and write
B0A0000
unkown
page read and write
352F000
stack
page read and write
A63E000
heap
page read and write
2AD1000
trusted library allocation
page read and write
CB4000
trusted library allocation
page read and write
7FF502D91000
unkown
page readonly
ABE0000
unkown
page read and write
F5F000
stack
page read and write
B30000
unkown
page read and write
130F000
heap
page read and write
A98F000
stack
page read and write
151F000
stack
page read and write
B610000
unkown
page read and write
88B000
heap
page read and write
37EE000
stack
page read and write
8FD000
trusted library allocation
page execute and read and write
FEB000
trusted library allocation
page execute and read and write
4FDF000
stack
page read and write
4FE0000
trusted library allocation
page read and write
FD3000
trusted library allocation
page execute and read and write
61E000
heap
page read and write
2CB1000
trusted library allocation
page read and write
61E000
heap
page read and write
7FF502F96000
unkown
page readonly
FD45000
unkown
page read and write
2CCE000
stack
page read and write
330E000
stack
page read and write
4F90000
trusted library allocation
page read and write
10E1000
trusted library allocation
page read and write
C90000
heap
page read and write
61E000
heap
page read and write
E85000
heap
page read and write
617000
heap
page read and write
298E000
stack
page read and write
A732000
heap
page read and write
There are 3200 hidden memdumps, click here to show them.