IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\huge[1].dat
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\263.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\3D69.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\698B.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\nsaF0B8.tmp\liteFirewall.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsq35F8.tmp\blowfish.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Del.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\tvgrbbh
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\tvgrbbh:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsg753D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsl35D8.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsq35F8.tmp\INetC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsq35F8.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
data
modified
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\cef.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
data
dropped
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\start.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
MSVC program database ver 7.00, 512*4023 bytes
dropped
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 106 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\tvgrbbh
C:\Users\user\AppData\Roaming\tvgrbbh
malicious
C:\Users\user\AppData\Local\Temp\263.exe
C:\Users\user\AppData\Local\Temp\263.exe
malicious
C:\Users\user\AppData\Local\Temp\3D69.exe
C:\Users\user\AppData\Local\Temp\3D69.exe
malicious
C:\Users\user\AppData\Local\Temp\698B.exe
C:\Users\user\AppData\Local\Temp\698B.exe
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
"C:\Users\user\AppData\Local\Temp\setup.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; STK-L21) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.133 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3516 --field-trial-handle=3520,i,255411136791549311,11110477984056802424,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; STK-L21) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.133 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3732 --field-trial-handle=3520,i,255411136791549311,11110477984056802424,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; STK-L21) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.133 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4064 --field-trial-handle=3520,i,255411136791549311,11110477984056802424,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; STK-L21) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.133 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1720019080238565 --launch-time-ticks=5451895126 --mojo-platform-channel-handle=2284 --field-trial-handle=3520,i,255411136791549311,11110477984056802424,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; STK-L21) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.133 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1720019080238565 --launch-time-ticks=5451915685 --mojo-platform-channel-handle=4032 --field-trial-handle=3520,i,255411136791549311,11110477984056802424,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://foodypannyjsud.shop/api.
unknown
malicious
https://foodypannyjsud.shop/o
unknown
malicious
https://foodypannyjsud.shop/s
unknown
malicious
https://foodypannyjsud.shop/t
unknown
malicious
http://gebeus.ru/tmp/index.php
malicious
http://cx5519.com/tmp/index.php
malicious
contintnetksows.shop
malicious
http://evilos.cc/tmp/index.php
malicious
ellaboratepwsz.xyz
malicious
swellfrrgwwos.xyz
malicious
foodypannyjsud.shop
malicious
pedestriankodwu.xyz
malicious
towerxxuytwi.xyz
malicious
https://foodypannyjsud.shop/ox
unknown
malicious
http://office-techs.biz/tmp/index.php
malicious
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://chrome.google.com/webstore?hl=mr&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://www.google.com/chrome/privacy/eula_text.html
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
unknown
https://chrome.google.com/webstore?hl=et&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chrome.google.com/webstore?hl=etCtrl$1
unknown
https://excel.office.com
unknown
https://chrome.google.com/webstore?hl=urCtrl$2
unknown
https://foodypannyjsud.shop/j
unknown
https://foodypannyjsud.shop/api(
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://chrome.google.com/webstore?hl=ltCtrl$1
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://passwords.google.com
unknown
https://foodypannyjsud.shop/e5
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
https://foodypannyjsud.shop/C
unknown
https://foodypannyjsud.shop/la
unknown
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
unknown
https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
unknown
http://bageyou.xyz
unknown
https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://bitbucket.org/
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://foodypannyjsud.shop/apil
unknown
https://support.google.com/chromebook?p=app_intent
unknown
https://foodypannyjsud.shop/6C
unknown
https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://chrome.google.com/webstore?hl=mrCtrl$1
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.google.com/chrome/privacy/eula_text.html&
unknown
https://chrome.google.com/webstore?hl=lt&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://www.google.com/chrome/privacy/eula_text.htmlT&r
unknown
https://www.ecosia.org/newtab/
unknown
http://xiexie.wf/22_551/huge.dat
unknown
https://outlook.com
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
unknown
https://www.google.com/chrome/privacy/eula_text.htmlA&biHaldab
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
https://foodypannyjsud.shop/apiK
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://foodypannyjsud.shop/pi7
unknown
https://chrome.google.com/webstore?hl=ukCtrl$1
unknown
https://android.notify.windows.com/iOS
unknown
http://api.install-stat.debug.world/clients/installs
unknown
https://foodypannyjsud.shop/es
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://support.google.com/chrome/a/answer/9122284
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
unknown
https://foodypannyjsud.shop/fe
unknown
https://chrome.google.com/webstore?hl=zh-CNCtrl$1
unknown
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
unknown
https://word.office.comon
unknown
http://www.unicode.org/copyright.html
unknown
https://powerpoint.office.comcember
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
unknown
https://www.google.com/chrome/privacy/eula_text.htmlP&agalbaTvarko
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.micro
unknown
http://api.install-stat.debug.world/clients/activity
unknown
https://chrome.google.com/webstore?hl=zh-TWCtrl$1
unknown
http://www.apache.org/).
unknown
https://foodypannyjsud.shop/api
unknown
https://myactivity.google.com/
unknown
http://xiexie.wf/22_551/huge.dat247
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
unknown
https://policies.google.com/
unknown
https://foodypannyjsud.shop/pi
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
137.74.196.132
unknown
France
malicious
77.221.157.163
unknown
Russian Federation
malicious
179.53.197.185
unknown
Dominican Republic
malicious
188.114.96.3
unknown
European Union
malicious
189.165.129.60
unknown
Mexico
malicious
127.0.0.127
unknown
unknown
malicious
146.70.169.164
unknown
United Kingdom
malicious
104.192.141.1
unknown
United States
188.114.97.3
unknown
European Union
104.21.45.251
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000008047A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000009047A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\GamePall
Sid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Pid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GamePall
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
DontShowUI
HKEY_CURRENT_USER\SOFTWARE\GamePall
tmp_uid
HKEY_CURRENT_USER\SOFTWARE\GamePall
reg
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\GamePall
uid
HKEY_CURRENT_USER\Control Panel\Cursors
AppStarting
There are 192 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C70000
direct allocation
page read and write
malicious
DBD000
unkown
page readonly
malicious
2DB1000
unclassified section
page read and write
malicious
C0C000
heap
page read and write
malicious
3440000
direct allocation
page execute and read and write
malicious
4861000
unclassified section
page read and write
malicious
4840000
direct allocation
page read and write
malicious
7FF5D71A6000
unkown
page readonly
429000
unkown
page read and write
3FC1000
trusted library allocation
page read and write
97FF000
stack
page read and write
3F86000
trusted library allocation
page read and write
11A0000
unkown
page read and write
11A0000
unkown
page read and write
3180000
unkown
page read and write
3F61000
trusted library allocation
page read and write
A21C000
heap
page read and write
7DF4F2480000
unkown
page readonly
597000
heap
page read and write
8E4E000
stack
page read and write
9E6D000
heap
page read and write
59E000
heap
page read and write
4840000
direct allocation
page read and write
7CE000
heap
page read and write
30A0000
trusted library allocation
page execute and read and write
3F61000
trusted library allocation
page read and write
E10000
unkown
page readonly
3F97000
trusted library allocation
page read and write
9F40000
heap
page read and write
3230000
unkown
page read and write
E80000
trusted library allocation
page read and write
7DF4F2470000
unkown
page readonly
2427000
trusted library allocation
page read and write
111C7000
unkown
page read and write
2C00000
heap
page read and write
C663000
unkown
page read and write
10E0000
unkown
page read and write
5070000
heap
page read and write
C66000
trusted library allocation
page execute and read and write
15F2000
trusted library allocation
page read and write
59E000
heap
page read and write
9E25000
heap
page read and write
59E000
heap
page read and write
9EF2000
heap
page read and write
E90000
heap
page read and write
59E000
heap
page read and write
9CD1000
heap
page read and write
3180000
unkown
page read and write
3F87000
trusted library allocation
page read and write
A09E000
heap
page read and write
11E0000
unkown
page read and write
AAF8000
heap
page read and write
1210000
heap
page read and write
A5ED000
heap
page read and write
9F00000
heap
page read and write
597000
heap
page read and write
59E000
heap
page read and write
3F89000
trusted library allocation
page read and write
AAF8000
heap
page read and write
2E20000
heap
page read and write
13A2000
heap
page read and write
9A72000
unkown
page read and write
4B55000
trusted library allocation
page read and write
C54000
heap
page read and write
275E000
stack
page read and write
597000
heap
page read and write
CCD000
heap
page read and write
226E000
stack
page read and write
2E86000
heap
page read and write
9F04000
heap
page read and write
59E000
heap
page read and write
12BB000
heap
page read and write
3180000
unkown
page read and write
10E0000
unkown
page read and write
597000
heap
page read and write
2F80000
heap
page read and write
3F59000
trusted library allocation
page read and write
59E000
heap
page read and write
CA8000
heap
page read and write
14B0000
heap
page read and write
11A0000
unkown
page read and write
59E000
heap
page read and write
311F000
stack
page read and write
11E0000
unkown
page read and write
C80000
heap
page read and write
9D09000
heap
page read and write
404D000
trusted library allocation
page read and write
3180000
unkown
page read and write
A193000
heap
page read and write
A424000
heap
page read and write
FAF000
stack
page read and write
47FE000
stack
page read and write
1136000
stack
page read and write
15B0000
trusted library allocation
page read and write
26A14000
direct allocation
page read and write
9EF0000
heap
page read and write
31A0000
trusted library allocation
page read and write
9E4F000
heap
page read and write
9EC2000
heap
page read and write
597000
heap
page read and write
604C0000
unkown
page readonly
9DF0000
heap
page read and write
E64D000
stack
page read and write
A9E9000
unkown
page read and write
20E0000
heap
page read and write
3667000
trusted library allocation
page read and write
1370000
heap
page read and write
425000
unkown
page readonly
3160000
unkown
page read and write
7FF5D747F000
unkown
page readonly
22E0000
heap
page execute and read and write
334F000
unkown
page read and write
262E000
stack
page read and write
7FF5D76DA000
unkown
page readonly
59E000
heap
page read and write
404E000
trusted library allocation
page read and write
1DB000
stack
page read and write
FF0000
unkown
page readonly
573E000
stack
page read and write
C7B000
heap
page read and write
3F61000
trusted library allocation
page read and write
620000
unkown
page readonly
3F61000
trusted library allocation
page read and write
3180000
unkown
page read and write
7FF5D772C000
unkown
page readonly
11A0000
unkown
page read and write
9F12000
heap
page read and write
6000000
unkown
page readonly
3F61000
trusted library allocation
page read and write
3180000
unkown
page read and write
7B80000
unkown
page readonly
3F5F000
trusted library allocation
page read and write
CCF000
heap
page read and write
7FF5D77CD000
unkown
page readonly
9EBA000
heap
page read and write
48820000
direct allocation
page read and write
11A0000
unkown
page read and write
11A0000
unkown
page read and write
7989000
stack
page read and write
A17A000
heap
page read and write
A4D2000
heap
page read and write
2C2F000
stack
page read and write
7AA0000
unkown
page read and write
A33A000
heap
page read and write
C88000
heap
page read and write
6DD000
heap
page read and write
C605000
unkown
page read and write
7FF5D75DF000
unkown
page readonly
59E000
heap
page read and write
1150000
unkown
page read and write
533E000
trusted library allocation
page read and write
7FF5D7722000
unkown
page readonly
11A0000
unkown
page read and write
59E000
heap
page read and write
E6F000
stack
page read and write
59E000
heap
page read and write
597000
heap
page read and write
59E000
heap
page read and write
58D0000
trusted library allocation
page read and write
7691000
unkown
page read and write
2C60000
direct allocation
page execute and read and write
3F52000
trusted library allocation
page read and write
D37000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
3F88000
trusted library allocation
page read and write
A9A0000
unkown
page read and write
49BB000
unkown
page read and write
7FF5D779E000
unkown
page readonly
11451000
unkown
page read and write
284A000
trusted library allocation
page execute and read and write
59E000
heap
page read and write
9EAD000
stack
page read and write
35D3000
unkown
page read and write
1395000
heap
page read and write
3520000
unkown
page readonly
CAB000
heap
page read and write
7FF5D7639000
unkown
page readonly
540000
heap
page read and write
10B5000
unkown
page execute read
11E0000
unkown
page read and write
597000
heap
page read and write
9F30000
heap
page read and write
124D000
trusted library allocation
page execute and read and write
27F0000
trusted library allocation
page read and write
31F7000
unkown
page read and write
BB10000
heap
page read and write
A3BF000
heap
page read and write
EAE000
stack
page read and write
1340000
unkown
page read and write
3940000
remote allocation
page read and write
3180000
unkown
page read and write
9F19000
heap
page read and write
CD2000
heap
page read and write
9F2E000
heap
page read and write
2BEB000
unkown
page readonly
26AA4000
direct allocation
page read and write
9F29000
heap
page read and write
3180000
unkown
page read and write
1220000
unkown
page read and write
3180000
unkown
page read and write
7AC000
stack
page read and write
3490000
heap
page read and write
CC8000
heap
page read and write
59E000
heap
page read and write
11E0000
unkown
page read and write
2CB1000
trusted library allocation
page read and write
7FF5D7267000
unkown
page readonly
59E000
heap
page read and write
7FF5D7452000
unkown
page readonly
5072000
trusted library allocation
page read and write
E3B000
stack
page read and write
C51000
heap
page read and write
2DC3000
heap
page read and write
588E000
trusted library allocation
page read and write
304F000
stack
page read and write
2CA0000
heap
page execute and read and write
3180000
unkown
page read and write
59E000
heap
page read and write
31A6000
trusted library allocation
page read and write
7FF5D7257000
unkown
page readonly
1264000
trusted library allocation
page read and write
4F6000
stack
page read and write
15A0000
trusted library allocation
page read and write
A515000
heap
page read and write
7FF5D705D000
unkown
page readonly
54C0000
trusted library allocation
page read and write
A25A000
heap
page read and write
A393000
heap
page read and write
58CE000
stack
page read and write
6AB000
unkown
page execute and read and write
3180000
unkown
page read and write
11A0000
unkown
page read and write
943000
trusted library allocation
page execute and read and write
1220000
unkown
page read and write
597000
heap
page read and write
5C4C000
trusted library allocation
page read and write
7440000
unkown
page read and write
CA5000
heap
page read and write
A059000
heap
page read and write
A67F000
heap
page read and write
9F3B000
heap
page read and write
1150000
unkown
page read and write
A37C000
heap
page read and write
9A92000
unkown
page read and write
A208000
heap
page read and write
573E000
stack
page read and write
9F34000
heap
page read and write
7FF5D72E9000
unkown
page readonly
A3CD000
heap
page read and write
7C4000
heap
page read and write
3F89000
trusted library allocation
page read and write
7FF5D729E000
unkown
page readonly
7FF5D7202000
unkown
page readonly
9E3A000
heap
page read and write
40A000
unkown
page write copy
358C000
stack
page read and write
30FB000
stack
page read and write
7C90000
unkown
page read and write
3180000
unkown
page read and write
369D000
stack
page read and write
59E000
heap
page read and write
3180000
unkown
page read and write
3661000
trusted library allocation
page read and write
3180000
unkown
page read and write
35B5000
unkown
page read and write
DBE000
stack
page read and write
4F90000
trusted library allocation
page read and write
434000
unkown
page read and write
986000
heap
page read and write
2FC4000
trusted library allocation
page read and write
AA6000
trusted library allocation
page execute and read and write
10606000
unkown
page read and write
9E45000
heap
page read and write
524A0000
direct allocation
page read and write
8CB8000
stack
page read and write
345E000
stack
page read and write
A44A000
heap
page read and write
75FD000
unkown
page read and write
A60F000
heap
page read and write
8FD9000
stack
page read and write
D80000
heap
page read and write
9CB5000
heap
page read and write
A3AA000
unkown
page read and write
11A0000
unkown
page read and write
A47C000
heap
page read and write
3F48000
trusted library allocation
page read and write
C5F8000
unkown
page read and write
11A0000
unkown
page read and write
4B95000
trusted library allocation
page read and write
597000
heap
page read and write
3120000
unkown
page read and write
3F44000
trusted library allocation
page read and write
3F8E000
trusted library allocation
page read and write
7D0000
heap
page read and write
3665000
trusted library allocation
page read and write
2E93000
heap
page read and write
19D000
stack
page read and write
54F0000
unkown
page readonly
9E9000
heap
page read and write
8DCB000
stack
page read and write
3180000
unkown
page read and write
597000
heap
page read and write
3180000
unkown
page read and write
3FF5000
trusted library allocation
page read and write
E00000
unkown
page readonly
10E0000
unkown
page read and write
27C6000
trusted library allocation
page read and write
11A0000
unkown
page read and write
401000
unkown
page execute read
126B000
trusted library allocation
page execute and read and write
1140000
unkown
page read and write
3F57000
trusted library allocation
page read and write
3180000
unkown
page read and write
602EA000
unkown
page read and write
3180000
unkown
page read and write
9F19000
heap
page read and write
7FF5D7589000
unkown
page readonly
7FF5D76D7000
unkown
page readonly
A220000
unkown
page read and write
3F4F000
trusted library allocation
page read and write
2EEE000
stack
page read and write
59E000
heap
page read and write
C7B000
heap
page read and write
9FE9000
heap
page read and write
52470000
direct allocation
page read and write
7FF5D7438000
unkown
page readonly
3180000
unkown
page read and write
13E0000
trusted library allocation
page read and write
597000
heap
page read and write
B07000
trusted library allocation
page read and write
7FF5D723F000
unkown
page readonly
59E000
heap
page read and write
59E000
heap
page read and write
A6A1000
heap
page read and write
A159000
heap
page read and write
3FFB000
trusted library allocation
page read and write
9F2B000
heap
page read and write
60306000
unkown
page read and write
9F22000
heap
page read and write
C54000
heap
page read and write
7FF5D72CE000
unkown
page readonly
502D000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
BAA000
heap
page read and write
9FE5000
heap
page read and write
12D9000
heap
page read and write
11A0000
unkown
page read and write
A320000
heap
page read and write
7AE000
heap
page read and write
9EC4000
heap
page read and write
A90000
trusted library allocation
page read and write
2FF2000
trusted library allocation
page read and write
9F27000
heap
page read and write
9C000
stack
page read and write
9CE1000
heap
page read and write
7609000
unkown
page read and write
59E000
heap
page read and write
7FF5D7507000
unkown
page readonly
317D000
stack
page read and write
C28000
heap
page read and write
59E000
heap
page read and write
9E84000
heap
page read and write
4BA6000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
3180000
unkown
page read and write
11E0000
unkown
page read and write
391F000
stack
page read and write
A4A7000
heap
page read and write
53A0000
heap
page execute and read and write
3180000
unkown
page read and write
E73000
trusted library allocation
page execute and read and write
C62D000
unkown
page read and write
42A000
unkown
page write copy
D50000
heap
page read and write
3F51000
trusted library allocation
page read and write
4BD0000
trusted library allocation
page read and write
AB41000
heap
page read and write
11A5A000
unkown
page read and write
3F61000
trusted library allocation
page read and write
7FF5D738E000
unkown
page readonly
C81C000
unkown
page read and write
A196000
heap
page read and write
597000
heap
page read and write
A3C2000
heap
page read and write
2F60000
heap
page read and write
3180000
unkown
page read and write
425000
unkown
page readonly
3F50000
trusted library allocation
page read and write
3180000
unkown
page read and write
3F7A000
trusted library allocation
page read and write
28BE000
stack
page read and write
5960000
unkown
page readonly
7AE0000
unkown
page read and write
7FF5D771A000
unkown
page readonly
9F18000
heap
page read and write
2B0E000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
400000
unkown
page readonly
2E7E000
stack
page read and write
35FA000
unkown
page read and write
59E000
heap
page read and write
133B000
heap
page read and write
97B000
trusted library allocation
page execute and read and write
CBD000
heap
page read and write
7FF5D75C1000
unkown
page readonly
3F61000
trusted library allocation
page read and write
7D3E000
stack
page read and write
9F22000
heap
page read and write
622C1000
unkown
page execute read
2852000
trusted library allocation
page read and write
9F27000
heap
page read and write
588A000
trusted library allocation
page read and write
A2FD000
heap
page read and write
1590000
trusted library allocation
page read and write
779E000
unkown
page read and write
3F88000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
560F000
stack
page read and write
3F89000
trusted library allocation
page read and write
597000
heap
page read and write
381E000
stack
page read and write
9F0E000
heap
page read and write
A670000
heap
page read and write
C40000
trusted library allocation
page read and write
26A54000
direct allocation
page read and write
A103000
heap
page read and write
40F9000
trusted library allocation
page read and write
11A0000
unkown
page read and write
49D6000
unkown
page read and write
52404000
direct allocation
page read and write
2D7E000
stack
page read and write
A542000
heap
page read and write
3180000
unkown
page read and write
9EF2000
heap
page read and write
C72000
trusted library allocation
page read and write
7FF5D6BE4000
unkown
page readonly
12D0000
unkown
page readonly
A4AC000
heap
page read and write
59E000
heap
page read and write
9F23000
heap
page read and write
21E0000
heap
page read and write
760D000
unkown
page read and write
7FF5D706E000
unkown
page readonly
C27000
heap
page read and write
7FF5D72BD000
unkown
page readonly
2CE0000
heap
page read and write
1220000
unkown
page read and write
2F61000
trusted library allocation
page read and write
A257000
heap
page read and write
570C000
trusted library allocation
page read and write
CAB000
heap
page read and write
B220000
unkown
page read and write
1280000
trusted library allocation
page read and write
9F44000
heap
page read and write
3F51000
trusted library allocation
page read and write
3180000
unkown
page read and write
59E000
heap
page read and write
CDE000
heap
page read and write
C28000
heap
page read and write
597000
heap
page read and write
1250000
trusted library allocation
page read and write
85BE000
stack
page read and write
C0BA000
stack
page read and write
160E000
stack
page read and write
52460000
direct allocation
page read and write
A9FD000
unkown
page read and write
C7B000
heap
page read and write
3940000
remote allocation
page read and write
C7B000
heap
page read and write
3140000
unkown
page read and write
ACA000
heap
page read and write
1620000
trusted library allocation
page execute and read and write
597000
heap
page read and write
CA5000
heap
page read and write
A211000
heap
page read and write
699000
unkown
page readonly
59E000
heap
page read and write
C47000
heap
page read and write
42C1000
trusted library allocation
page read and write
6031D000
unkown
page execute read
408000
unkown
page readonly
A3CA000
heap
page read and write
4C0000
heap
page read and write
7FF5D778A000
unkown
page readonly
CB2000
heap
page read and write
A5A8000
heap
page read and write
59E000
heap
page read and write
2F51000
trusted library allocation
page read and write
3F72000
trusted library allocation
page read and write
59E000
heap
page read and write
7FF5D74FA000
unkown
page readonly
11E0000
unkown
page read and write
11A0000
unkown
page read and write
3180000
unkown
page read and write
9E61000
heap
page read and write
9EFB000
heap
page read and write
7FF5D7485000
unkown
page readonly
C7BE000
unkown
page read and write
A288000
heap
page read and write
11A0000
heap
page read and write
3F50000
trusted library allocation
page read and write
111CC000
unkown
page read and write
C7B000
heap
page read and write
42A000
unkown
page write copy
C7B000
heap
page read and write
2550000
heap
page read and write
2B21000
trusted library allocation
page read and write
B87000
heap
page read and write
601F1000
unkown
page execute read
A3AC000
unkown
page read and write
7FF5D744E000
unkown
page readonly
B10000
heap
page read and write
7FF5D6A4B000
unkown
page readonly
A3D7000
heap
page read and write
11A0000
unkown
page read and write
7FF5D7799000
unkown
page readonly
23EE000
stack
page read and write
65EC1000
unkown
page execute read
7FF5D7488000
unkown
page readonly
9F24000
heap
page read and write
A1BE000
heap
page read and write
3110000
unkown
page readonly
49A8000
unkown
page read and write
CCC000
heap
page read and write
7FF5D74F2000
unkown
page readonly
9FE7000
heap
page read and write
99C0000
unkown
page read and write
3F48000
trusted library allocation
page read and write
7FF5D719C000
unkown
page readonly
111CA000
unkown
page read and write
1870000
heap
page read and write
6B6000
heap
page read and write
7FF5D72D7000
unkown
page readonly
A60C000
heap
page read and write
3180000
unkown
page read and write
A5CA000
heap
page read and write
9A98000
unkown
page read and write
CD6000
heap
page read and write
11A0000
unkown
page read and write
11A0000
unkown
page read and write
11A0000
unkown
page read and write
27F5000
trusted library allocation
page read and write
59E000
heap
page read and write
59E000
heap
page read and write
36DE000
stack
page read and write
9578000
stack
page read and write
3F51000
trusted library allocation
page read and write
597000
heap
page read and write
A26B000
heap
page read and write
10E4000
trusted library allocation
page read and write
94D000
trusted library allocation
page execute and read and write
4830000
heap
page read and write
5457000
trusted library allocation
page read and write
9CEE000
heap
page read and write
9E70000
heap
page read and write
59E000
heap
page read and write
3180000
unkown
page read and write
4047000
trusted library allocation
page read and write
1263000
trusted library allocation
page execute and read and write
CB1000
heap
page read and write
A689000
heap
page read and write
1696000
trusted library allocation
page read and write
4FA9000
trusted library allocation
page read and write
54F2000
unkown
page readonly
9F3F000
heap
page read and write
23F1000
trusted library allocation
page read and write
597000
heap
page read and write
C7B000
heap
page read and write
9F19000
heap
page read and write
470000
heap
page read and write
5370000
trusted library allocation
page read and write
840000
heap
page read and write
CB0000
heap
page read and write
C47F000
unkown
page read and write
11A0000
unkown
page read and write
C96000
heap
page read and write
22D0000
trusted library allocation
page read and write
111CF000
unkown
page read and write
31B0000
heap
page execute and read and write
9F26000
heap
page read and write
2C6E000
stack
page read and write
3180000
unkown
page read and write
9C72000
heap
page read and write
3F64000
trusted library allocation
page read and write
26A44000
direct allocation
page read and write
597000
heap
page read and write
3F58000
trusted library allocation
page read and write
1150000
unkown
page read and write
11A0000
unkown
page read and write
3F71000
trusted library allocation
page read and write
597000
heap
page read and write
9F3D000
heap
page read and write
59E000
heap
page read and write
534E000
trusted library allocation
page read and write
A5C0000
heap
page read and write
3180000
unkown
page read and write
9E20000
heap
page read and write
15B4000
trusted library allocation
page read and write
7FF5D77A4000
unkown
page readonly
3180000
unkown
page read and write
980000
heap
page read and write
C3F000
heap
page read and write
3F70000
trusted library allocation
page read and write
59E000
heap
page read and write
7FF5D7272000
unkown
page readonly
348D000
stack
page read and write
A1E8000
heap
page read and write
B36000
stack
page read and write
9F11000
heap
page read and write
177F000
stack
page read and write
1150000
unkown
page read and write
578E000
stack
page read and write
9F02000
heap
page read and write
A65D000
heap
page read and write
3180000
unkown
page read and write
5790000
trusted library allocation
page read and write
7FF5D7820000
unkown
page readonly
8F49000
stack
page read and write
CC0000
heap
page read and write
3180000
unkown
page read and write
7FF5D7215000
unkown
page readonly
A0B9000
heap
page read and write
9F44000
heap
page read and write
597000
heap
page read and write
3FBC000
trusted library allocation
page read and write
A217000
heap
page read and write
1B3E000
stack
page read and write
9E37000
heap
page read and write
11A0000
unkown
page read and write
528E000
stack
page read and write
7FF5D71E6000
unkown
page readonly
3180000
unkown
page read and write
3F91000
trusted library allocation
page read and write
3FB9000
trusted library allocation
page read and write
3F5B000
trusted library allocation
page read and write
9F16000
heap
page read and write
3180000
unkown
page read and write
21E0000
heap
page read and write
4A16000
unkown
page read and write
C28000
heap
page read and write
C7B000
heap
page read and write
11A0000
unkown
page read and write
13F3000
trusted library allocation
page execute and read and write
940000
trusted library allocation
page read and write
7FF5D71EF000
unkown
page readonly
3180000
unkown
page read and write
3F8C000
trusted library allocation
page read and write
C17000
heap
page read and write
32BE000
stack
page read and write
7FF5D77DA000
unkown
page readonly
3180000
unkown
page read and write
C460000
unkown
page read and write
9DB000
heap
page read and write
3530000
unkown
page read and write
109F000
stack
page read and write
597000
heap
page read and write
CA5000
heap
page read and write
597000
heap
page read and write
454000
unkown
page readonly
1262000
trusted library allocation
page read and write
9BFF000
heap
page read and write
11A59000
unkown
page read and write
C5FA000
unkown
page read and write
11A54000
unkown
page read and write
5A30000
heap
page execute and read and write
5021000
trusted library allocation
page read and write
7DF4F24A1000
unkown
page execute read
7FF5D69BB000
unkown
page readonly
429000
unkown
page write copy
A262000
heap
page read and write
48844000
direct allocation
page read and write
4880C000
direct allocation
page read and write
3180000
unkown
page read and write
A38D000
heap
page read and write
A655000
heap
page read and write
D80000
unkown
page readonly
12D0000
heap
page read and write
3010000
trusted library allocation
page read and write
A58A000
heap
page read and write
9AAC000
unkown
page read and write
111C4000
unkown
page read and write
A0CA000
heap
page read and write
4E6E000
stack
page read and write
1255000
heap
page read and write
7FF5D75F9000
unkown
page readonly
A4F2000
heap
page read and write
11E0000
unkown
page read and write
59E000
heap
page read and write
3180000
unkown
page read and write
CD6000
heap
page read and write
11A0000
unkown
page read and write
A3D2000
heap
page read and write
DC5000
heap
page read and write
A612000
heap
page read and write
2AD0000
heap
page read and write
401000
unkown
page execute read
9F14000
heap
page read and write
3180000
unkown
page read and write
10F0000
heap
page read and write
4B00000
unkown
page read and write
3180000
unkown
page read and write
A1F6000
heap
page read and write
3F41000
trusted library allocation
page read and write
3180000
unkown
page read and write
7FF5D77F7000
unkown
page readonly
7A0000
heap
page read and write
CD4000
heap
page read and write
BB9C000
stack
page read and write
A493000
heap
page read and write
1BA5000
heap
page read and write
1428000
heap
page read and write
A355000
heap
page read and write
2C70000
direct allocation
page read and write
35DC000
unkown
page read and write
59E000
heap
page read and write
9D0B000
heap
page read and write
577E000
stack
page read and write
9F3C000
heap
page read and write
A3B8000
heap
page read and write
BF3E000
stack
page read and write
3180000
unkown
page read and write
5BE000
stack
page read and write
C54000
heap
page read and write
CC8000
heap
page read and write
BAE000
heap
page read and write
11A5B000
unkown
page read and write
1220000
unkown
page read and write
A62F000
heap
page read and write
A237000
unkown
page read and write
597000
heap
page read and write
21D0000
trusted library allocation
page execute and read and write
3F61000
trusted library allocation
page read and write
A590000
heap
page read and write
3191000
trusted library allocation
page read and write
9C08000
heap
page read and write
E20000
trusted library allocation
page read and write
C48000
heap
page read and write
7CB0000
unkown
page readonly
A21000
heap
page read and write
A3C3000
unkown
page read and write
3FED000
trusted library allocation
page read and write
3F58000
trusted library allocation
page read and write
F431000
unkown
page read and write
9F05000
heap
page read and write
6AC000
unkown
page readonly
1630000
heap
page read and write
597000
heap
page read and write
9F21000
heap
page read and write
9CF3000
heap
page read and write
C97F000
unkown
page read and write
4B80000
heap
page read and write
A0BE000
heap
page read and write
524A4000
direct allocation
page read and write
597000
heap
page read and write
3F61000
trusted library allocation
page read and write
760F000
unkown
page read and write
AAF2000
heap
page read and write
3F81000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
587E000
stack
page read and write
3F50000
trusted library allocation
page read and write
1420000
heap
page read and write
9AF4000
heap
page read and write
4BB0000
trusted library allocation
page read and write
446000
unkown
page readonly
597000
heap
page read and write
27B5000
trusted library allocation
page read and write
D40000
heap
page read and write
59E000
heap
page read and write
A1B4000
heap
page read and write
3CEE000
stack
page read and write
59E000
heap
page read and write
9D21000
heap
page read and write
11A0000
unkown
page read and write
E32000
trusted library allocation
page read and write
D50000
trusted library allocation
page read and write
265F000
stack
page read and write
9F1D000
heap
page read and write
3180000
unkown
page read and write
A48A000
heap
page read and write
850000
trusted library allocation
page read and write
1150000
unkown
page read and write
C22000
heap
page read and write
7FF5D7740000
unkown
page readonly
A2A2000
unkown
page read and write
3180000
unkown
page read and write
C5FD000
unkown
page read and write
52454000
direct allocation
page read and write
CA5000
heap
page read and write
5376000
trusted library allocation
page read and write
59E000
heap
page read and write
111CD000
unkown
page read and write
A52E000
heap
page read and write
53E1000
unkown
page read and write
3F51000
trusted library allocation
page read and write
C22000
heap
page read and write
26AF1000
direct allocation
page read and write
3FA5000
trusted library allocation
page read and write
3F51000
trusted library allocation
page read and write
A580000
heap
page read and write
7FF5D7385000
unkown
page readonly
775000
heap
page read and write
11A0000
unkown
page read and write
11A0000
unkown
page read and write
11A0000
unkown
page read and write
5AB000
stack
page read and write
A305000
heap
page read and write
D30000
heap
page read and write
11A0000
unkown
page read and write
4B81000
heap
page read and write
59E000
heap
page read and write
790000
heap
page read and write
9AA8000
unkown
page read and write
59E000
heap
page read and write
A084000
heap
page read and write
CA5000
heap
page read and write
3180000
unkown
page read and write
F580000
heap
page read and write
7FF5D7407000
unkown
page readonly
3180000
unkown
page read and write
A18E000
heap
page read and write
51A5000
trusted library allocation
page read and write
7FF5D760E000
unkown
page readonly
4BC0000
trusted library allocation
page read and write
59E000
heap
page read and write
A458000
heap
page read and write
94E000
stack
page read and write
7FF5D75EE000
unkown
page readonly
7FF5D7360000
unkown
page readonly
9B2C000
unkown
page read and write
7FF5D76C8000
unkown
page readonly
59E000
heap
page read and write
597000
heap
page read and write
3F61000
trusted library allocation
page read and write
A338000
heap
page read and write
111C0000
unkown
page read and write
3F8B000
trusted library allocation
page read and write
CC2000
heap
page read and write
7FF5D71CC000
unkown
page readonly
2FF7000
trusted library allocation
page execute and read and write
60312000
unkown
page read and write
2CE7000
trusted library allocation
page read and write
CD8000
heap
page read and write
7FF5D7700000
unkown
page readonly
20C0000
trusted library allocation
page read and write
11E0000
unkown
page read and write
7FF5D75E9000
unkown
page readonly
5175000
trusted library allocation
page read and write
597000
heap
page read and write
E3B000
trusted library allocation
page execute and read and write
A334000
heap
page read and write
5B3F000
stack
page read and write
A293000
heap
page read and write
7FF5D77F0000
unkown
page readonly
5740000
trusted library allocation
page read and write
20B6000
trusted library allocation
page execute and read and write
597000
heap
page read and write
9A000
stack
page read and write
1220000
unkown
page read and write
26A0C000
direct allocation
page read and write
BAF000
stack
page read and write
3FED000
trusted library allocation
page read and write
1340000
heap
page read and write
1256000
trusted library allocation
page execute and read and write
507C000
trusted library allocation
page read and write
2F76000
trusted library allocation
page read and write
7FF5D7752000
unkown
page readonly
C47000
heap
page read and write
3CB1000
trusted library allocation
page read and write
3180000
heap
page execute and read and write
9F14000
heap
page read and write
7FF5CE343000
unkown
page readonly
646000
heap
page read and write
3B55000
trusted library allocation
page read and write
519E000
stack
page read and write
B70000
heap
page read and write
7FF5D7442000
unkown
page readonly
5C3F000
stack
page read and write
C3C000
heap
page read and write
597000
heap
page read and write
A5F9000
heap
page read and write
1270000
trusted library allocation
page read and write
15EA000
trusted library allocation
page execute and read and write
7FF5D77E3000
unkown
page readonly
A0E2000
heap
page read and write
2870000
trusted library allocation
page read and write
5C51000
trusted library allocation
page read and write
F44C000
unkown
page read and write
A098000
heap
page read and write
11A0000
unkown
page read and write
9F2C000
heap
page read and write
543E000
trusted library allocation
page read and write
11E0000
unkown
page read and write
7618000
unkown
page read and write
11E0000
unkown
page read and write
A233000
unkown
page read and write
C54000
heap
page read and write
CBF000
heap
page read and write
9CFC000
heap
page read and write
309E000
stack
page read and write
3180000
unkown
page read and write
5A2E000
stack
page read and write
322000
unkown
page readonly
5340000
trusted library allocation
page read and write
CE2000
heap
page read and write
5785000
trusted library allocation
page read and write
11E0000
unkown
page read and write
1150000
unkown
page read and write
820000
heap
page read and write
2D80000
heap
page read and write
57A5000
trusted library allocation
page read and write
7FF5D75B3000
unkown
page readonly
55D0000
trusted library allocation
page read and write
E26000
trusted library allocation
page execute and read and write
7FF5D7262000
unkown
page readonly
597000
heap
page read and write
2C80000
heap
page read and write
3180000
unkown
page read and write
A19000
heap
page read and write
597000
heap
page read and write
D80000
unkown
page readonly
11E0000
unkown
page read and write
621000
unkown
page execute read
9F21000
heap
page read and write
15C0000
heap
page read and write
3230000
unkown
page read and write
EBB000
heap
page read and write
111C5000
unkown
page read and write
315E000
stack
page read and write
4820000
direct allocation
page execute and read and write
2ACE000
stack
page read and write
845000
heap
page read and write
3180000
unkown
page read and write
597000
heap
page read and write
7FF5D745B000
unkown
page readonly
3FFF000
trusted library allocation
page read and write
CA5000
heap
page read and write
A588000
heap
page read and write
D40000
heap
page execute and read and write
11A0000
unkown
page read and write
CDD000
heap
page read and write
CC2000
heap
page read and write
125A000
trusted library allocation
page execute and read and write
3F9F000
trusted library allocation
page read and write
3180000
unkown
page read and write
E98000
heap
page read and write
11A0000
unkown
page read and write
9E41000
heap
page read and write
3F60000
trusted library allocation
page read and write
9A8C000
unkown
page read and write
9D7F000
heap
page read and write
54E5000
trusted library allocation
page read and write
19D000
stack
page read and write
11A0000
unkown
page read and write
A6B1000
heap
page read and write
7FF5D75BF000
unkown
page readonly
CD2000
heap
page read and write
A644000
heap
page read and write
A1D0000
heap
page read and write
3DEF000
stack
page read and write
CC0000
heap
page read and write
C48000
heap
page read and write
578C000
trusted library allocation
page read and write
5334000
trusted library allocation
page read and write
15D0000
heap
page read and write
11A0000
unkown
page read and write
86E0000
unkown
page readonly
B0BD000
stack
page read and write
2F61000
heap
page read and write
11A0000
unkown
page read and write
23F5000
trusted library allocation
page read and write
9F22000
heap
page read and write
C7B000
heap
page read and write
CD9000
heap
page read and write
3F68000
trusted library allocation
page read and write
59E000
heap
page read and write
BDC0000
unkown
page read and write
57C0000
heap
page read and write
11A0000
unkown
page read and write
67A000
heap
page read and write
A4B7000
heap
page read and write
B01000
trusted library allocation
page read and write
5300000
heap
page read and write
3F51000
trusted library allocation
page read and write
7FF5D7450000
unkown
page readonly
E74000
trusted library allocation
page read and write
22A0000
trusted library allocation
page read and write
A19E000
heap
page read and write
560000
heap
page read and write
127D000
trusted library allocation
page execute and read and write
A220000
heap
page read and write
59E000
heap
page read and write
9C7F000
heap
page read and write
F582000
heap
page read and write
A6C4000
heap
page read and write
2AD0000
trusted library allocation
page read and write
11DE000
stack
page read and write
59E000
heap
page read and write
597000
heap
page read and write
222E000
stack
page read and write
32F7000
trusted library allocation
page read and write
42A000
unkown
page read and write
7FF5D77A8000
unkown
page readonly
1140000
unkown
page read and write
59E000
heap
page read and write
B0E0000
unkown
page readonly
5390000
trusted library allocation
page read and write
A2FD000
heap
page read and write
CE7000
heap
page read and write
AB0000
heap
page read and write
9F06000
heap
page read and write
2EAF000
stack
page read and write
7DF4F2460000
unkown
page readonly
3F51000
trusted library allocation
page read and write
7FF5D76AF000
unkown
page readonly
B4C000
heap
page read and write
22C6000
trusted library allocation
page read and write
602C9000
unkown
page readonly
9DF000
stack
page read and write
2736000
heap
page read and write
1270000
unkown
page read and write
1298000
heap
page read and write
11A0000
unkown
page read and write
3180000
unkown
page read and write
59E000
heap
page read and write
9E7C000
heap
page read and write
11A0000
unkown
page read and write
2EC0000
unkown
page readonly
7810000
unkown
page read and write
9F20000
heap
page read and write
A1A0000
heap
page read and write
CD6000
heap
page read and write
5430000
trusted library allocation
page read and write
57B0000
heap
page execute and read and write
4187000
trusted library allocation
page read and write
9F20000
heap
page read and write
9EF3000
heap
page read and write
7FF5D7641000
unkown
page readonly
A512000
heap
page read and write
A129000
heap
page read and write
9B85000
unkown
page read and write
2970000
heap
page read and write
A233000
heap
page read and write
7FF5D77B6000
unkown
page readonly
9F23000
heap
page read and write
11A0000
unkown
page read and write
11A0000
unkown
page read and write
3FF5000
trusted library allocation
page read and write
A3F8000
heap
page read and write
3180000
unkown
page read and write
C3F000
heap
page read and write
9EFD000
heap
page read and write
A24D000
heap
page read and write
A3A3000
heap
page read and write
597000
heap
page read and write
9C14000
heap
page read and write
3180000
unkown
page read and write
4986000
unkown
page read and write
538F000
stack
page read and write
59E000
heap
page read and write
3F51000
trusted library allocation
page read and write
A057000
heap
page read and write
2E5A000
heap
page read and write
9F25000
heap
page read and write
C30000
heap
page read and write
3FF5000
trusted library allocation
page read and write
262E000
stack
page read and write
2C7E000
stack
page read and write
3B51000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
D4E000
stack
page read and write
48874000
direct allocation
page read and write
9E8A000
heap
page read and write
7FF5D7591000
unkown
page readonly
7FF5D77EB000
unkown
page readonly
A0A9000
stack
page read and write
5E0000
heap
page read and write
31B7000
trusted library allocation
page read and write
58E0000
heap
page read and write
3180000
unkown
page read and write
9EFB000
heap
page read and write
4FF5000
trusted library allocation
page read and write
C28000
heap
page read and write
9ABD000
unkown
page read and write
C50000
heap
page read and write
897E000
stack
page read and write
C7CB000
unkown
page read and write
45B000
unkown
page readonly
11E0000
unkown
page read and write
3FB9000
trusted library allocation
page read and write
CD6000
heap
page read and write
E70000
trusted library allocation
page read and write
52434000
direct allocation
page read and write
CBC000
heap
page read and write
1379000
heap
page read and write
11A0000
unkown
page read and write
597000
heap
page read and write
5536000
unkown
page readonly
A273000
unkown
page read and write
9F1A000
heap
page read and write
540F000
stack
page read and write
7FF5D7244000
unkown
page readonly
A694000
heap
page read and write
35CF000
unkown
page read and write
9F24000
heap
page read and write
59E000
heap
page read and write
7D8000
heap
page read and write
15A0000
heap
page execute and read and write
3180000
unkown
page read and write
3F58000
trusted library allocation
page read and write
597000
heap
page read and write
F448000
unkown
page read and write
597000
heap
page read and write
9C12000
heap
page read and write
597000
heap
page read and write
2D2E000
stack
page read and write
3180000
unkown
page read and write
2050000
heap
page read and write
3F61000
trusted library allocation
page read and write
11A53000
unkown
page read and write
11A0000
unkown
page read and write
4D10000
heap
page read and write
3180000
unkown
page read and write
A463000
heap
page read and write
11A0000
unkown
page read and write
CDD000
heap
page read and write
11A0000
unkown
page read and write
577E000
stack
page read and write
7FF5D732D000
unkown
page readonly
11A0000
unkown
page read and write
A36F000
heap
page read and write
11E0000
unkown
page read and write
48864000
direct allocation
page read and write
59E000
heap
page read and write
F444000
unkown
page read and write
26AE4000
direct allocation
page read and write
C7B000
heap
page read and write
9F2C000
heap
page read and write
11F0000
heap
page read and write
AC2000
trusted library allocation
page read and write
3180000
unkown
page read and write
1380000
heap
page read and write
7FF5D71F9000
unkown
page readonly
3180000
unkown
page read and write
30B7000
trusted library allocation
page read and write
CDD000
heap
page read and write
597000
heap
page read and write
CB9000
heap
page read and write
10E0000
unkown
page read and write
C48000
heap
page read and write
A64E000
heap
page read and write
9EF4000
heap
page read and write
307E000
stack
page read and write
F90000
heap
page read and write
A69B000
heap
page read and write
9F1B000
heap
page read and write
2E70000
heap
page read and write
11A5E000
unkown
page read and write
9F19000
heap
page read and write
1458000
heap
page read and write
50EE000
stack
page read and write
597000
heap
page read and write
4B0000
heap
page read and write
3F61000
trusted library allocation
page read and write
8A00000
unkown
page read and write
A497000
heap
page read and write
7FF5D743F000
unkown
page readonly
A1AF000
stack
page read and write
597000
heap
page read and write
27D9000
trusted library allocation
page read and write
5A1E000
stack
page read and write
111C9000
unkown
page read and write
9EFF000
heap
page read and write
9D3D000
heap
page read and write
147E000
stack
page read and write
422000
unkown
page read and write
3030000
unkown
page read and write
7FF5D75CB000
unkown
page readonly
977E000
stack
page read and write
11A0000
unkown
page read and write
3180000
unkown
page read and write
EF0000
heap
page read and write
5470000
trusted library allocation
page read and write
11A0000
unkown
page read and write
35C9000
unkown
page read and write
E77000
trusted library allocation
page read and write
5913000
heap
page execute and read and write
F460000
unkown
page read and write
A3E9000
heap
page read and write
27C4000
trusted library allocation
page read and write
3180000
unkown
page read and write
AB08000
heap
page read and write
7FF5D7292000
unkown
page readonly
C50000
trusted library allocation
page read and write
A615000
heap
page read and write
7CE000
heap
page read and write
E0E000
stack
page read and write
3F51000
trusted library allocation
page read and write
597000
heap
page read and write
4980000
unkown
page read and write
1150000
unkown
page read and write
3180000
unkown
page read and write
59E000
heap
page read and write
11A0000
unkown
page read and write
9EFB000
heap
page read and write
3180000
unkown
page read and write
C3F000
heap
page read and write
11A5F000
unkown
page read and write
A64B000
heap
page read and write
1694000
trusted library allocation
page read and write
7686000
unkown
page read and write
3180000
unkown
page read and write
9F1C000
heap
page read and write
3FD6000
trusted library allocation
page read and write
7FF5D7558000
unkown
page readonly
86D0000
unkown
page readonly
11A50000
unkown
page read and write
AA08000
unkown
page read and write
9D0F000
heap
page read and write
A2FD000
heap
page read and write
7AE000
heap
page read and write
A6AF000
heap
page read and write
9F3C000
heap
page read and write
118F000
stack
page read and write
A1D4000
heap
page read and write
B6E000
stack
page read and write
59E000
heap
page read and write
7637000
unkown
page read and write
654C1000
unkown
page execute read
2B10000
trusted library allocation
page read and write
3F78000
trusted library allocation
page read and write
209D000
trusted library allocation
page execute and read and write
597000
heap
page read and write
362D000
unkown
page read and write
19A000
stack
page read and write
1000000
heap
page read and write
8890000
unkown
page readonly
11E0000
unkown
page read and write
11A0000
unkown
page read and write
530000
heap
page read and write
A5E9000
heap
page read and write
8C39000
stack
page read and write
59E000
heap
page read and write
CA8000
heap
page read and write
2F7E000
stack
page read and write
1150000
unkown
page read and write
9E2B000
heap
page read and write
3F41000
trusted library allocation
page read and write
1B9D000
stack
page read and write
1731000
unkown
page readonly
12B0000
unkown
page read and write
A4EC000
heap
page read and write
2CE1000
trusted library allocation
page read and write
9F2B000
heap
page read and write
7FF5D74C3000
unkown
page readonly
123E000
stack
page read and write
9EF6000
heap
page read and write
A709000
heap
page read and write
C77000
trusted library allocation
page execute and read and write
2D9E000
heap
page execute and read and write
597000
heap
page read and write
A14A000
heap
page read and write
3180000
unkown
page read and write
7FF5D7482000
unkown
page readonly
20C2000
trusted library allocation
page read and write
A332000
heap
page read and write
A6F9000
heap
page read and write
A14D000
heap
page read and write
3F62000
trusted library allocation
page read and write
3CE1000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
BB0D000
stack
page read and write
5781000
trusted library allocation
page read and write
41B6000
trusted library allocation
page read and write
9D1C000
heap
page read and write
3F89000
trusted library allocation
page read and write
597000
heap
page read and write
7FF5D7462000
unkown
page readonly
5081000
trusted library allocation
page read and write
59E000
heap
page read and write
22A5000
trusted library allocation
page read and write
9F19000
heap
page read and write
1220000
unkown
page read and write
60315000
unkown
page read and write
2C00000
heap
page read and write
285B000
trusted library allocation
page execute and read and write
A251000
unkown
page read and write
59E000
heap
page read and write
597000
heap
page read and write
597000
heap
page read and write
1250000
trusted library allocation
page read and write
94F4000
unkown
page read and write
A243000
heap
page read and write
25FE000
stack
page read and write
3180000
unkown
page read and write
8819000
stack
page read and write
3180000
unkown
page read and write
EBB000
stack
page read and write
48898000
direct allocation
page read and write
5910000
heap
page execute and read and write
37DF000
stack
page read and write
C46F000
unkown
page read and write
26A01000
direct allocation
page read and write
A38A000
heap
page read and write
11A0000
unkown
page read and write
A11E000
heap
page read and write
A12D000
heap
page read and write
315D000
stack
page read and write
A68B000
heap
page read and write
1176F000
unkown
page read and write
11651000
unkown
page read and write
9F22000
heap
page read and write
1220000
unkown
page read and write
462000
unkown
page readonly
3185000
trusted library allocation
page read and write
A13B000
heap
page read and write
C54000
heap
page read and write
59E000
heap
page read and write
C48000
heap
page read and write
3FBE000
trusted library allocation
page read and write
32F1000
trusted library allocation
page read and write
3180000
unkown
page read and write
EB5000
stack
page read and write
3180000
unkown
page read and write
11A0000
unkown
page read and write
3180000
unkown
page read and write
8980000
unkown
page read and write
7FF5D749B000
unkown
page readonly
A45D000
heap
page read and write
3F80000
trusted library allocation
page read and write
BDE000
stack
page read and write
1150000
unkown
page read and write
9F2E000
heap
page read and write
B559000
stack
page read and write
A40E000
unkown
page read and write
CE2000
heap
page read and write
A5B2000
heap
page read and write
843F000
stack
page read and write
3F7A000
trusted library allocation
page read and write
3180000
unkown
page read and write
3180000
unkown
page read and write
9F28000
heap
page read and write
272D000
stack
page read and write
C65E000
unkown
page read and write
D78000
heap
page read and write
3180000
unkown
page read and write
12F5000
heap
page read and write
24EF000
stack
page read and write
48804000
direct allocation
page read and write
84BB000
stack
page read and write
A266000
heap
page read and write
3626000
unkown
page read and write
3180000
unkown
page read and write
76C000
heap
page read and write
C73E000
unkown
page read and write
7631000
unkown
page read and write
7FF5D776D000
unkown
page readonly
601F0000
unkown
page readonly
7FF5D71D7000
unkown
page readonly
2FEF000
stack
page read and write
5FF000
heap
page read and write
3F75000
trusted library allocation
page read and write
597000
heap
page read and write
C47000
heap
page read and write
4A12000
unkown
page read and write
7F0000
heap
page read and write
11A0000
unkown
page read and write
7FF5D710B000
unkown
page readonly
3F50000
trusted library allocation
page read and write
5344000
trusted library allocation
page read and write
3500000
stack
page read and write
10682000
unkown
page read and write
3F61000
trusted library allocation
page read and write
C54000
heap
page read and write
26A60000
direct allocation
page read and write
597000
heap
page read and write
1318000
heap
page read and write
C61D000
unkown
page read and write
2FFB000
trusted library allocation
page execute and read and write
6AC000
unkown
page readonly
2D07000
trusted library allocation
page read and write
7FF5D7694000
unkown
page readonly
26AB0000
direct allocation
page read and write
87E000
stack
page read and write
A10D000
heap
page read and write
3180000
unkown
page read and write
CE3000
heap
page read and write
1250000
unkown
page read and write
C7B000
heap
page read and write
59E000
heap
page read and write
3F71000
trusted library allocation
page read and write
9F20000
heap
page read and write
1216000
heap
page read and write
A2F1000
heap
page read and write
5325000
trusted library allocation
page read and write
A095000
heap
page read and write
7FF5D76D5000
unkown
page readonly
A46E000
heap
page read and write
111C8000
unkown
page read and write
4980000
heap
page read and write
A150000
heap
page read and write
9A84000
unkown
page read and write
439000
unkown
page readonly
A24A000
heap
page read and write
7FF5CE33D000
unkown
page readonly
48A1000
heap
page read and write
EAF000
heap
page read and write
26B1C000
direct allocation
page read and write
CEA000
heap
page read and write
436000
unkown
page readonly
597000
heap
page read and write
11A0000
unkown
page read and write
11A0000
unkown
page read and write
C12000
heap
page read and write
950000
heap
page read and write
11A0000
unkown
page read and write
AAFF000
heap
page read and write
3180000
unkown
page read and write
10E3000
trusted library allocation
page execute and read and write
1680000
trusted library allocation
page read and write
9FE0000
heap
page read and write
4F94000
trusted library allocation
page read and write
C483000
unkown
page read and write
3F51000
trusted library allocation
page read and write
4BB9000
trusted library allocation
page read and write
26A04000
direct allocation
page read and write
3180000
unkown
page read and write
3FB9000
trusted library allocation
page read and write
A601000
heap
page read and write
7FF5D7797000
unkown
page readonly
D1E000
stack
page read and write
CD6000
heap
page read and write
CDD000
heap
page read and write
E60000
trusted library allocation
page read and write
A384000
heap
page read and write
A681000
heap
page read and write
3FAC000
trusted library allocation
page read and write
215E000
stack
page read and write
7FF5D71E0000
unkown
page readonly
A501000
heap
page read and write
C1CC000
stack
page read and write
3180000
unkown
page read and write
3F6D000
trusted library allocation
page read and write
98FD000
stack
page read and write
2500000
heap
page execute and read and write
2C80000
heap
page read and write
11A0000
unkown
page read and write
CB0000
heap
page read and write
2E83000
heap
page read and write
11A0000
unkown
page read and write
1444000
heap
page read and write
9F1F000
heap
page read and write
3F77000
trusted library allocation
page read and write
51A3000
trusted library allocation
page read and write
597000
heap
page read and write
12CE000
stack
page read and write
400000
unkown
page readonly
9F1C000
heap
page read and write
C62000
trusted library allocation
page read and write
7605000
unkown
page read and write
7FF5D775C000
unkown
page readonly
144B000
heap
page read and write
4A0E000
unkown
page read and write
7FF5D7284000
unkown
page readonly
3180000
unkown
page read and write
9F1F000
heap
page read and write
C63000
heap
page read and write
11E0000
unkown
page read and write
5026000
trusted library allocation
page read and write
7FF5D75AF000
unkown
page readonly
678000
heap
page read and write
A0D7000
heap
page read and write
7FF5D75B8000
unkown
page readonly
9C30000
heap
page read and write
11A0000
unkown
page read and write
42C5000
trusted library allocation
page read and write
52490000
direct allocation
page read and write
4935000
trusted library allocation
page read and write
13BE000
stack
page read and write
710000
heap
page read and write
C9A7000
unkown
page read and write
A6FB000
heap
page read and write
3180000
unkown
page read and write
11E0000
unkown
page read and write
4040000
heap
page read and write
8BE000
stack
page read and write
A28D000
unkown
page read and write
35E4000
unkown
page read and write
CE1000
heap
page read and write
3180000
unkown
page read and write
2E81000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
3F51000
trusted library allocation
page read and write
CA5000
heap
page read and write
35BD000
unkown
page read and write
602EB000
unkown
page write copy
9F44000
heap
page read and write
115E000
stack
page read and write
1260000
trusted library allocation
page read and write
4EB2000
trusted library allocation
page read and write
C54000
heap
page read and write
54E3000
trusted library allocation
page read and write
9D6000
stack
page read and write
7FF5D7682000
unkown
page readonly
7FF5D762F000
unkown
page readonly
A6BF000
heap
page read and write
C861000
unkown
page read and write
1190000
heap
page read and write
11A0000
unkown
page read and write
11E0000
unkown
page read and write
C6A000
trusted library allocation
page execute and read and write
602FC000
unkown
page write copy
C40000
heap
page read and write
830000
heap
page read and write
48A0000
heap
page read and write
3F69000
trusted library allocation
page read and write
7FF5D776F000
unkown
page readonly
3180000
unkown
page read and write
CC8000
heap
page read and write
434000
unkown
page read and write
53BE000
stack
page read and write
2FC3000
trusted library allocation
page execute and read and write
A55A000
heap
page read and write
3180000
unkown
page read and write
16A0000
heap
page read and write
3CB7000
trusted library allocation
page read and write
530F000
stack
page read and write
597000
heap
page read and write
4890000
heap
page read and write
59E000
heap
page read and write
1060B000
unkown
page read and write
527E000
stack
page read and write
DB0000
trusted library allocation
page read and write
5962000
unkown
page readonly
9DF6000
heap
page read and write
1260000
trusted library allocation
page read and write
7FF5D72D0000
unkown
page readonly
9EFB000
heap
page read and write
CD9000
heap
page read and write
A618000
heap
page read and write
C642000
unkown
page read and write
3F61000
trusted library allocation
page read and write
7FF5D7336000
unkown
page readonly
CB9000
heap
page read and write
CE7000
heap
page read and write
C908000
unkown
page read and write
59E000
heap
page read and write
79B000
heap
page read and write
7FF5D76E8000
unkown
page readonly
C3F000
heap
page read and write
597000
heap
page read and write
A41E000
heap
page read and write
A5DD000
heap
page read and write
588C000
trusted library allocation
page read and write
11A0000
unkown
page read and write
A5DF000
heap
page read and write
7FF5D66E3000
unkown
page readonly
A714000
heap
page read and write
342F000
stack
page read and write
CBB000
heap
page read and write
40A000
unkown
page write copy
617000
heap
page read and write
462000
unkown
page readonly
C4C6000
unkown
page read and write
597000
heap
page read and write
7FF5D764F000
unkown
page readonly
A49C000
heap
page read and write
A305000
heap
page read and write
550000
heap
page read and write
9EF4000
heap
page read and write
1C0000
heap
page read and write
9EF9000
heap
page read and write
59EE000
stack
page read and write
3400000
unkown
page read and write
AA01000
unkown
page read and write
2D8E000
heap
page read and write
A3AD000
heap
page read and write
A5FE000
heap
page read and write
57A3000
trusted library allocation
page read and write
2610000
heap
page read and write
C617000
unkown
page read and write
3FDE000
trusted library allocation
page read and write
7FF5D7546000
unkown
page readonly
3180000
unkown
page read and write
9F24000
heap
page read and write
9F42000
heap
page read and write
3180000
unkown
page read and write
9275000
stack
page read and write
185D000
stack
page read and write
7FF5D75D6000
unkown
page readonly
D1F000
stack
page read and write
3180000
unkown
page read and write
DD3000
unkown
page execute read
8880000
unkown
page readonly
5200000
heap
page execute and read and write
A69D000
heap
page read and write
C31000
trusted library allocation
page read and write
11A0000
unkown
page read and write
15C0000
trusted library allocation
page read and write
248E000
stack
page read and write
CC0000
heap
page read and write
26A7C000
direct allocation
page read and write
A23A000
unkown
page read and write
3180000
unkown
page read and write
59E000
heap
page read and write
133B000
heap
page read and write
7FF5D7289000
unkown
page readonly
A0DA000
heap
page read and write
11A0000
unkown
page read and write
A5C2000
heap
page read and write
5060000
trusted library allocation
page read and write
A20E000
heap
page read and write
11A51000
unkown
page read and write
C800000
unkown
page read and write
3180000
unkown
page read and write
5015000
trusted library allocation
page read and write
1150000
unkown
page read and write
BED000
heap
page read and write
42DA000
trusted library allocation
page read and write
597000
heap
page read and write
12F6000
stack
page read and write
860000
heap
page read and write
11A52000
unkown
page read and write
9F25000
heap
page read and write
597000
heap
page read and write
B28000
heap
page read and write
159F000
stack
page read and write
A6B8000
heap
page read and write
30B1000
trusted library allocation
page read and write
2FE6000
trusted library allocation
page execute and read and write
5700000
trusted library allocation
page read and write
11A0000
unkown
page read and write
E90000
heap
page read and write
9C000
stack
page read and write
271E000
stack
page read and write
A5DB000
heap
page read and write
3F51000
trusted library allocation
page read and write
27D0000
trusted library allocation
page read and write
A642000
heap
page read and write
3F65000
trusted library allocation
page read and write
5061000
trusted library allocation
page read and write
59E000
heap
page read and write
26A80000
direct allocation
page read and write
9F16000
heap
page read and write
668C1000
unkown
page execute read
54BE000
stack
page read and write
79B000
heap
page read and write
AC7000
trusted library allocation
page execute and read and write
AA9C000
unkown
page read and write
1170000
unkown
page read and write
11E0000
unkown
page read and write
2BEB000
unkown
page readonly
CAB000
heap
page read and write
597000
heap
page read and write
C50000
heap
page read and write
FEB000
stack
page read and write
A39F000
unkown
page read and write
D20000
heap
page read and write
A9DF000
unkown
page read and write
3180000
unkown
page read and write
3F89000
trusted library allocation
page read and write
CD2000
heap
page read and write
CDD000
heap
page read and write
14CF000
stack
page read and write
3F50000
trusted library allocation
page read and write
597000
heap
page read and write
C653000
unkown
page read and write
3F64000
trusted library allocation
page read and write
167E000
stack
page read and write
59E000
heap
page read and write
9C03000
heap
page read and write
1420000
heap
page read and write
A70000
trusted library allocation
page read and write
3180000
unkown
page read and write
11D0000
unkown
page read and write
C61B000
unkown
page read and write
111CF000
unkown
page read and write
58D5000
trusted library allocation
page read and write
3180000
unkown
page read and write
65C7000
unkown
page readonly
CE0000
heap
page read and write
77DB000
unkown
page read and write
3F61000
trusted library allocation
page read and write
9A96000
unkown
page read and write
3180000
unkown
page read and write
1581000
trusted library allocation
page read and write
597000
heap
page read and write
7FF5D7429000
unkown
page readonly
11A0000
unkown
page read and write
750000
heap
page read and write
156E000
stack
page read and write
3FE6000
trusted library allocation
page read and write
9EFB000
heap
page read and write
597000
heap
page read and write
595E000
stack
page read and write
7E0000
heap
page read and write
52480000
direct allocation
page read and write
2760000
heap
page read and write
4CA000
heap
page read and write
167E000
stack
page read and write
3F68000
trusted library allocation
page read and write
515E000
stack
page read and write
A2FF000
heap
page read and write
CA0000
heap
page read and write
A6F1000
heap
page read and write
14C0000
heap
page read and write
CAC000
heap
page read and write
C7B000
heap
page read and write
59E000
heap
page read and write
35D5000
unkown
page read and write
F60000
heap
page read and write
C54000
heap
page read and write
597000
heap
page read and write
53A3000
heap
page execute and read and write
A68D000
heap
page read and write
313E000
stack
page read and write
7FF5D766E000
unkown
page readonly
59E000
heap
page read and write
10E0000
trusted library allocation
page read and write
3F76000
trusted library allocation
page read and write
9EB0000
unkown
page readonly
A52B000
heap
page read and write
3FED000
trusted library allocation
page read and write
CC8000
heap
page read and write
865000
heap
page read and write
42D2000
trusted library allocation
page read and write
CD0000
heap
page read and write
BEA0000
unkown
page readonly
997C000
stack
page read and write
11A0000
unkown
page read and write
3F50000
trusted library allocation
page read and write
A132000
heap
page read and write
15A1000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
2CDF000
trusted library allocation
page read and write
2DB4000
heap
page read and write
CD8000
heap
page read and write
429F000
stack
page read and write
132F000
heap
page read and write
3F50000
trusted library allocation
page read and write
3180000
unkown
page read and write
11E0000
unkown
page read and write
6EF8000
unkown
page readonly
3180000
unkown
page read and write
10F6000
heap
page read and write
7FF5D72D3000
unkown
page readonly
A4C4000
heap
page read and write
11A5F000
unkown
page read and write
3F91000
trusted library allocation
page read and write
7FF5D72BF000
unkown
page readonly
3070000
direct allocation
page read and write
900000
heap
page read and write
59E000
heap
page read and write
12F0000
heap
page read and write
597000
heap
page read and write
535000
heap
page read and write
7FF5D765F000
unkown
page readonly
7FF5D7425000
unkown
page readonly
7FF5D7309000
unkown
page readonly
7FF5D7705000
unkown
page readonly
C44000
trusted library allocation
page read and write
1210000
heap
page read and write
B85A000
stack
page read and write
2447000
trusted library allocation
page read and write
2E6E000
heap
page execute and read and write
9AB4000
unkown
page read and write
9F10000
heap
page read and write
3F61000
trusted library allocation
page read and write
A6D9000
heap
page read and write
C609000
unkown
page read and write
2B04000
trusted library allocation
page read and write
CD6000
heap
page read and write
3230000
unkown
page read and write
BE49000
stack
page read and write
11A0000
unkown
page read and write
A1D9000
heap
page read and write
A37F000
heap
page read and write
7FF5D7534000
unkown
page readonly
3F41000
trusted library allocation
page read and write
3180000
unkown
page read and write
418D000
trusted library allocation
page read and write
409E000
trusted library allocation
page read and write
3180000
unkown
page read and write
1390000
heap
page read and write
A4BE000
heap
page read and write
9A6A000
unkown
page read and write
C806000
unkown
page read and write
9F1F000
heap
page read and write
597000
heap
page read and write
2F7F000
stack
page read and write
3F48000
trusted library allocation
page read and write
2C84000
heap
page read and write
A391000
unkown
page read and write
2F70000
heap
page read and write
11E0000
unkown
page read and write
400000
unkown
page execute and read and write
11A5C000
unkown
page read and write
303E000
stack
page read and write
3F89000
trusted library allocation
page read and write
A66B000
heap
page read and write
A310000
heap
page read and write
7AB0000
unkown
page read and write
9F29000
heap
page read and write
9F39000
heap
page read and write
1170000
unkown
page read and write
3180000
unkown
page read and write
597000
heap
page read and write
7FF5D7394000
unkown
page readonly
A427000
heap
page read and write
48801000
direct allocation
page read and write
1140000
unkown
page read and write
2B35000
trusted library allocation
page read and write
31AF000
trusted library allocation
page read and write
11A0000
unkown
page read and write
3180000
unkown
page read and write
FB6000
stack
page read and write
1080000
heap
page read and write
E7D000
trusted library allocation
page execute and read and write
597000
heap
page read and write
761E000
unkown
page read and write
59E000
heap
page read and write
E92E000
stack
page read and write
9EFD000
heap
page read and write
1360000
unkown
page readonly
2E6E000
stack
page read and write
3F6A000
trusted library allocation
page read and write
3F2E000
stack
page read and write
3FE6000
trusted library allocation
page read and write
10E0000
unkown
page read and write
A8D000
trusted library allocation
page execute and read and write
59E000
heap
page read and write
3F70000
trusted library allocation
page read and write
7FF5D71C8000
unkown
page readonly
439000
unkown
page readonly
1FDE000
stack
page read and write
7C31000
unkown
page read and write
9EF1000
heap
page read and write
11A0000
unkown
page read and write
1590000
trusted library allocation
page execute and read and write
A3B6000
heap
page read and write
C3F000
heap
page read and write
2A8E000
stack
page read and write
A620000
heap
page read and write
9F21000
heap
page read and write
9F23000
heap
page read and write
2AF0000
trusted library allocation
page read and write
59E000
heap
page read and write
51A0000
trusted library allocation
page read and write
3180000
unkown
page read and write
7FF5D768B000
unkown
page readonly
111C6000
unkown
page read and write
10C0000
heap
page read and write
7FF5D7795000
unkown
page readonly
12D8000
heap
page read and write
103B000
stack
page read and write
7FF5D75F2000
unkown
page readonly
3180000
unkown
page read and write
9A76000
unkown
page read and write
A3A9000
heap
page read and write
A32A000
heap
page read and write
3180000
unkown
page read and write
516E000
stack
page read and write
3F49000
trusted library allocation
page read and write
9679000
stack
page read and write
11E0000
unkown
page read and write
6A40000
unkown
page readonly
1150000
unkown
page read and write
111CC000
unkown
page read and write
DA0000
trusted library allocation
page read and write
2BEB000
unkown
page readonly
A471000
heap
page read and write
597000
heap
page read and write
4888C000
direct allocation
page read and write
59E000
heap
page read and write
3FE6000
trusted library allocation
page read and write
48858000
direct allocation
page read and write
59E000
heap
page read and write
A284000
heap
page read and write
A504000
heap
page read and write
3F77000
trusted library allocation
page read and write
9F19000
heap
page read and write
510E000
stack
page read and write
79B000
heap
page read and write
9C38000
heap
page read and write
3195000
trusted library allocation
page read and write
3FE6000
trusted library allocation
page read and write
E60000
trusted library allocation
page execute and read and write
9CEB000
heap
page read and write
C669000
unkown
page read and write
7FF5D781A000
unkown
page readonly
3180000
unkown
page read and write
5E8000
heap
page read and write
400000
unkown
page readonly
CDB000
heap
page read and write
99B0000
unkown
page read and write
C37000
trusted library allocation
page read and write
3F7A000
trusted library allocation
page read and write
A0FB000
heap
page read and write
10E0000
unkown
page read and write
58A0000
heap
page execute and read and write
2FF0000
trusted library allocation
page read and write
401000
unkown
page execute read
1286000
trusted library allocation
page execute and read and write
3F51000
trusted library allocation
page read and write
A564000
heap
page read and write
10644000
unkown
page read and write
35F4000
unkown
page read and write
11A0000
unkown
page read and write
1280000
trusted library allocation
page read and write
3180000
unkown
page read and write
60B000
heap
page read and write
3F97000
trusted library allocation
page read and write
7DC0000
unkown
page readonly
5735000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
7FF5D72FB000
unkown
page readonly
2661000
trusted library allocation
page read and write
C9D1000
unkown
page read and write
4BA4000
trusted library allocation
page read and write
9E5A000
heap
page read and write
1250000
heap
page read and write
2093000
trusted library allocation
page execute and read and write
251E000
stack
page read and write
3230000
unkown
page read and write
A12F000
stack
page read and write
7FF5D7077000
unkown
page readonly
C50000
heap
page read and write
305E000
stack
page read and write
1E90000
heap
page read and write
7460000
unkown
page read and write
9AA0000
unkown
page read and write
1140000
unkown
page read and write
7FF5D75FF000
unkown
page readonly
1290000
heap
page read and write
597000
heap
page read and write
7FF5D77C7000
unkown
page readonly
CA11000
unkown
page read and write
A184000
heap
page read and write
4A71000
unkown
page read and write
5173000
trusted library allocation
page read and write
9AC3000
unkown
page read and write
E30000
heap
page read and write
20BA000
trusted library allocation
page execute and read and write
9B000
stack
page read and write
3F7B000
trusted library allocation
page read and write
9F74000
heap
page read and write
A54C000
heap
page read and write
59E000
heap
page read and write
11A0000
unkown
page read and write
3180000
unkown
page read and write
A1EE000
heap
page read and write
359E000
stack
page read and write
59E000
heap
page read and write
7FF5D7458000
unkown
page readonly
1160000
unkown
page read and write
CDE000
stack
page read and write
7FF5D7075000
unkown
page readonly
A16C000
heap
page read and write
3F50000
trusted library allocation
page read and write
597000
heap
page read and write
597000
heap
page read and write
972000
trusted library allocation
page read and write
3F79000
trusted library allocation
page read and write
A39C000
unkown
page read and write
A6A8000
heap
page read and write
4A90000
unkown
page read and write
C7B000
heap
page read and write
1140000
unkown
page read and write
CA0E000
unkown
page read and write
9FB6000
heap
page read and write
59E000
heap
page read and write
7FF5D6AB6000
unkown
page readonly
4CFE000
stack
page read and write
3F43000
trusted library allocation
page read and write
3F61000
trusted library allocation
page read and write
48EF000
stack
page read and write
9A80000
unkown
page read and write
9C08000
heap
page read and write
3180000
unkown
page read and write
9AAA000
unkown
page read and write
C22000
heap
page read and write
597000
heap
page read and write
5436000
trusted library allocation
page read and write
E6CD000
stack
page read and write
7FF5D752F000
unkown
page readonly
A306000
heap
page read and write
B950000
unkown
page readonly
9F14000
heap
page read and write
A3DA000
heap
page read and write
C3C000
heap
page read and write
9F23000
heap
page read and write
CA5000
heap
page read and write
1281000
unkown
page readonly
BB9000
stack
page read and write
9F20000
heap
page read and write
15C0000
heap
page read and write
9F16000
heap
page read and write
7FF5D74B8000
unkown
page readonly
59E000
heap
page read and write
3180000
unkown
page read and write
A326000
heap
page read and write
3180000
unkown
page read and write
9F1A000
heap
page read and write
3180000
unkown
page read and write
CD2000
heap
page read and write
5440000
trusted library allocation
page read and write
9F18000
heap
page read and write
401000
unkown
page execute read
AB31000
heap
page read and write
5245C000
direct allocation
page read and write
597000
heap
page read and write
3180000
unkown
page read and write
3F71000
trusted library allocation
page read and write
3F95000
trusted library allocation
page read and write
446000
unkown
page readonly
597000
heap
page read and write
272F000
stack
page read and write
CD6000
heap
page read and write
1685000
trusted library allocation
page read and write
CDF000
heap
page read and write
1B40000
heap
page read and write
7FF5D7703000
unkown
page readonly
1580000
trusted library allocation
page read and write
A344000
heap
page read and write
B01A000
heap
page read and write
9D29000
heap
page read and write
11A0000
unkown
page read and write
2FEA000
trusted library allocation
page execute and read and write
3F50000
trusted library allocation
page read and write
91F0000
unkown
page readonly
11A0000
unkown
page read and write
3180000
unkown
page read and write
9F1E000
heap
page read and write
C48000
heap
page read and write
76F8000
unkown
page read and write
A631000
heap
page read and write
1140000
unkown
page read and write
640C1000
unkown
page execute read
16EF000
stack
page read and write
3FB9000
trusted library allocation
page read and write
129B000
trusted library allocation
page execute and read and write
7B00000
unkown
page readonly
2FB0000
trusted library allocation
page read and write
3F50000
trusted library allocation
page read and write
A701000
heap
page read and write
9E51000
heap
page read and write
26A34000
direct allocation
page read and write
597000
heap
page read and write
7FF5D76CD000
unkown
page readonly
59E000
heap
page read and write
52414000
direct allocation
page read and write
327C000
stack
page read and write
A508000
heap
page read and write
31A4000
trusted library allocation
page read and write
1150000
unkown
page read and write
9CF9000
heap
page read and write
7FF5D769E000
unkown
page readonly
59E000
heap
page read and write
9CF0000
heap
page read and write
7FF5D777A000
unkown
page readonly
B59000
heap
page read and write
AF1000
stack
page read and write
A2B5000
unkown
page read and write
10B4000
unkown
page write copy
30D0000
heap
page read and write
11A5E000
unkown
page read and write
C472000
unkown
page read and write
3F51000
trusted library allocation
page read and write
7FF5D783B000
unkown
page readonly
75F8000
unkown
page read and write
9EFB000
heap
page read and write
CE7000
heap
page read and write
7FF5D72C8000
unkown
page readonly
401000
unkown
page execute read
A486000
heap
page read and write
20B0000
trusted library allocation
page read and write
7290000
unkown
page readonly
A2FA000
heap
page read and write
59E000
heap
page read and write
597000
heap
page read and write
3180000
unkown
page read and write
597000
heap
page read and write
5029000
trusted library allocation
page read and write
20DF000
stack
page read and write
C54000
heap
page read and write
597000
heap
page read and write
CE2000
heap
page read and write
3FBE000
trusted library allocation
page read and write
11A0000
unkown
page read and write
A36B000
heap
page read and write
212E000
stack
page read and write
12F7000
heap
page read and write
11A0000
unkown
page read and write
11A0000
unkown
page read and write
7FF5D71DA000
unkown
page readonly
31D7000
trusted library allocation
page read and write
A374000
heap
page read and write
26AF4000
direct allocation
page read and write
3180000
unkown
page read and write
3F77000
trusted library allocation
page read and write
C450000
unkown
page read and write
470000
heap
page read and write
A570000
heap
page read and write
5052000
trusted library allocation
page read and write
2D6F000
stack
page read and write
597000
heap
page read and write
63B000
stack
page read and write
11A0000
unkown
page read and write
F0C000
heap
page read and write
544E000
trusted library allocation
page read and write
59E000
heap
page read and write
12FC000
heap
page read and write
3F95000
trusted library allocation
page read and write
3180000
unkown
page read and write
3F78000
trusted library allocation
page read and write
1150000
unkown
page read and write
3F87000
trusted library allocation
page read and write
3180000
unkown
page read and write
22B0000
heap
page read and write
9B41000
unkown
page read and write
11E0000
unkown
page read and write
597000
heap
page read and write
2A7E000
stack
page read and write
7DF4F2491000
unkown
page execute read
2FD0000
trusted library allocation
page read and write
2846000
trusted library allocation
page execute and read and write
7FF5D770A000
unkown
page readonly
1610000
heap
page execute and read and write
8D5000
heap
page read and write
7FF5D7391000
unkown
page readonly
597000
heap
page read and write
E0E000
stack
page read and write
96FE000
stack
page read and write
597000
heap
page read and write
3F91000
trusted library allocation
page read and write
C4BD000
unkown
page read and write
2605000
trusted library allocation
page read and write
618C1000
unkown
page execute read
54DE000
stack
page read and write
B980000
unkown
page readonly
597000
heap
page read and write
3100000
unkown
page read and write
11A0000
unkown
page read and write
1220000
unkown
page read and write
A362000
heap
page read and write
A2FB000
heap
page read and write
A03A000
heap
page read and write
408000
unkown
page readonly
BE90000
unkown
page read and write
736000
stack
page read and write
CD8000
heap
page read and write
4C4D000
stack
page read and write
A126000
heap
page read and write
60306000
unkown
page read and write
B4D0000
unkown
page readonly
A309000
heap
page read and write
11A0000
unkown
page read and write
A219000
heap
page read and write
4041000
heap
page read and write
408000
unkown
page readonly
96A000
trusted library allocation
page execute and read and write
1220000
unkown
page read and write
7FF5D73F5000
unkown
page readonly
C28000
heap
page read and write
3160000
trusted library allocation
page read and write
9EFD000
heap
page read and write
169F000
stack
page read and write
A540000
heap
page read and write
3F87000
trusted library allocation
page read and write
3E2E000
stack
page read and write
9F29000
heap
page read and write
3F61000
trusted library allocation
page read and write
A116000
heap
page read and write
C54000
heap
page read and write
42E000
unkown
page readonly
1366000
heap
page read and write
A448000
heap
page read and write
3F71000
trusted library allocation
page read and write
A313000
unkown
page read and write
3F4A000
trusted library allocation
page read and write
A308000
heap
page read and write
6AA000
unkown
page write copy
3180000
unkown
page read and write
9E81000
heap
page read and write
400000
unkown
page execute and read and write
A0B5000
heap
page read and write
1309000
heap
page read and write
8D0000
heap
page read and write
11E0000
unkown
page read and write
400000
unkown
page readonly
111C0000
unkown
page read and write
A43A000
heap
page read and write
597000
heap
page read and write
2600000
trusted library allocation
page read and write
59E000
heap
page read and write
2AC1000
trusted library allocation
page read and write
3F87000
trusted library allocation
page read and write
1150000
unkown
page read and write
12AF000
heap
page read and write
B76000
heap
page read and write
4EAE000
stack
page read and write
CA8000
heap
page read and write
A699000
heap
page read and write
A203000
heap
page read and write
B20000
heap
page read and write
597000
heap
page read and write
CAB000
heap
page read and write
408000
unkown
page readonly
A1D7000
heap
page read and write
3FA9000
trusted library allocation
page read and write
1140000
unkown
page read and write
571E000
trusted library allocation
page read and write
604C1000
unkown
page execute read
7E60000
unkown
page read and write
597000
heap
page read and write
1587000
trusted library allocation
page read and write
FC0000
heap
page read and write
8AF000
stack
page read and write
2430000
heap
page read and write
3180000
unkown
page read and write
7FF5D7073000
unkown
page readonly
3F58000
trusted library allocation
page read and write
59E000
heap
page read and write
F43D000
unkown
page read and write
7FF5D77FD000
unkown
page readonly
C50000
heap
page read and write
15A7000
trusted library allocation
page read and write
3180000
unkown
page read and write
111CD000
unkown
page read and write
1F0000
heap
page read and write
AA04000
unkown
page read and write
9E7A000
heap
page read and write
A166000
heap
page read and write
9F1D000
heap
page read and write
4EBE000
stack
page read and write
ABB000
stack
page read and write
A384000
unkown
page read and write
26A5C000
direct allocation
page read and write
A5D6000
heap
page read and write
CDE000
heap
page read and write
3180000
unkown
page read and write
51D000
heap
page read and write
3F61000
trusted library allocation
page read and write
16F0000
heap
page read and write
3180000
unkown
page read and write
9EFC000
heap
page read and write
AE1D000
stack
page read and write
9F28000
heap
page read and write
7B2000
heap
page read and write
9A94000
unkown
page read and write
CC8000
heap
page read and write
524D8000
direct allocation
page read and write
425000
unkown
page readonly
42A000
unkown
page read and write
3F7B000
trusted library allocation
page read and write
21DE000
stack
page read and write
3F87000
trusted library allocation
page read and write
9EFA000
heap
page read and write
9FAF000
stack
page read and write
597000
heap
page read and write
D20000
trusted library allocation
page execute and read and write
60EC1000
unkown
page execute read
33B0000
unkown
page readonly
3F50000
trusted library allocation
page read and write
7FF5D77D2000
unkown
page readonly
C70000
heap
page read and write
3180000
unkown
page read and write
55E0000
trusted library allocation
page read and write
D10000
heap
page read and write
602EA000
unkown
page read and write
A4CD000
heap
page read and write
4887C000
direct allocation
page read and write
1694000
unkown
page readonly
59E000
heap
page read and write
2ABE000
stack
page read and write
CD8000
heap
page read and write
2B51000
trusted library allocation
page read and write
32F0000
remote allocation
page read and write
3180000
unkown
page read and write
7FF5D7808000
unkown
page readonly
B10000
trusted library allocation
page read and write
A272000
heap
page read and write
7E58000
stack
page read and write
A83000
trusted library allocation
page execute and read and write
A39C000
heap
page read and write
A556000
heap
page read and write
59E000
heap
page read and write
BF0000
heap
page read and write
3F50000
trusted library allocation
page read and write
A50C000
heap
page read and write
3180000
unkown
page read and write
3180000
unkown
page read and write
A4D6000
heap
page read and write
7DF4F2471000
unkown
page execute read
3230000
unkown
page read and write
A286000
unkown
page read and write
E80000
trusted library allocation
page read and write
A3B000
stack
page read and write
A100000
heap
page read and write
2F5E000
stack
page read and write
7B3000
heap
page read and write
59E000
heap
page read and write
3F61000
trusted library allocation
page read and write
10E0000
unkown
page read and write
9E00000
heap
page read and write
A711000
heap
page read and write
9F07000
heap
page read and write
597000
heap
page read and write
FCB000
stack
page read and write
7FF5D77E9000
unkown
page readonly
3180000
unkown
page read and write
9E2E000
stack
page read and write
9F0E000
heap
page read and write
500E000
stack
page read and write
2960000
trusted library allocation
page execute and read and write
57A0000
trusted library allocation
page read and write
A323000
heap
page read and write
A235000
heap
page read and write
11E0000
unkown
page read and write
9AF9000
unkown
page read and write
5B1F000
stack
page read and write
11A0000
unkown
page read and write
3F51000
trusted library allocation
page read and write
A4FD000
heap
page read and write
F13000
heap
page read and write
B90000
heap
page read and write
11A0000
unkown
page read and write
3180000
unkown
page read and write
400000
unkown
page readonly
3180000
unkown
page read and write
524B0000
direct allocation
page read and write
9C48000
heap
page read and write
9CF000
heap
page read and write
53F0000
heap
page read and write
12CC000
heap
page read and write
597000
heap
page read and write
A10F000
heap
page read and write
C94000
heap
page read and write
9F22000
heap
page read and write
3180000
unkown
page read and write
9EFB000
heap
page read and write
578A000
trusted library allocation
page read and write
94AB000
stack
page read and write
10504000
unkown
page read and write
C54000
heap
page read and write
CDD000
heap
page read and write
3180000
unkown
page read and write
A358000
heap
page read and write
7FF5D7236000
unkown
page readonly
C84000
heap
page read and write
10699000
unkown
page read and write
A1B1000
heap
page read and write
2F70000
heap
page read and write
1383000
heap
page read and write
7FF5D7404000
unkown
page readonly
126D000
trusted library allocation
page execute and read and write
434000
unkown
page read and write
A409000
heap
page read and write
B8DB000
stack
page read and write
597000
heap
page read and write
11A5F000
unkown
page read and write
59E000
heap
page read and write
3F51000
trusted library allocation
page read and write
C7C6000
unkown
page read and write
9D36000
heap
page read and write
DC0000
heap
page read and write
3180000
unkown
page read and write
59E000
heap
page read and write
62CC1000
unkown
page execute read
11E0000
unkown
page read and write
26A40000
direct allocation
page read and write
1220000
unkown
page read and write
1170000
unkown
page read and write
3180000
unkown
page read and write
3F56000
trusted library allocation
page read and write
7FF5D6BEF000
unkown
page readonly
9F2B000
heap
page read and write
26AC8000
direct allocation
page read and write
1220000
heap
page read and write
3180000
unkown
page read and write
A081000
heap
page read and write
7C4000
heap
page read and write
A3B9000
unkown
page read and write
401000
unkown
page execute read
597000
heap
page read and write
7FF5D7604000
unkown
page readonly
59E000
heap
page read and write
A142000
heap
page read and write
AAA7000
unkown
page read and write
5380000
trusted library allocation
page read and write
A3A0000
heap
page read and write
AB01000
heap
page read and write
1220000
unkown
page read and write
7FF5D7455000
unkown
page readonly
A1FE000
heap
page read and write
C48B000
unkown
page read and write
C24E000
stack
page read and write
2CB5000
trusted library allocation
page read and write
4CBE000
stack
page read and write
3F61000
trusted library allocation
page read and write
111CB000
unkown
page read and write
597000
heap
page read and write
59E000
heap
page read and write
A6DF000
heap
page read and write
CC0000
heap
page read and write
9CE6000
heap
page read and write
A554000
heap
page read and write
C4DC000
unkown
page read and write
1480000
heap
page read and write
7B10000
unkown
page read and write
11A0000
unkown
page read and write
C9E3000
unkown
page read and write
DC0000
heap
page read and write
35B0000
unkown
page read and write
1350000
heap
page read and write
31B1000
trusted library allocation
page read and write
1BA0000
heap
page read and write
CE0000
heap
page read and write
9F29000
heap
page read and write
1220000
unkown
page read and write
E54D000
stack
page read and write
C23000
heap
page read and write
11A0000
unkown
page read and write
7A0000
heap
page read and write
95FC000
stack
page read and write
597000
heap
page read and write
59E000
heap
page read and write
9FDA000
heap
page read and write
3FF5000
trusted library allocation
page read and write
7FF5D77DD000
unkown
page readonly
AB38000
heap
page read and write
4AB0000
unkown
page read and write
7FF5D7398000
unkown
page readonly
9EE000
heap
page read and write
59E000
heap
page read and write
A569000
heap
page read and write
9EFB000
heap
page read and write
D7E000
stack
page read and write
C625000
unkown
page read and write
8DB000
stack
page read and write
CA5000
heap
page read and write
A222000
heap
page read and write
33F0000
unkown
page read and write
11D0000
unkown
page read and write
A521000
heap
page read and write
A2D7000
unkown
page read and write
966000
trusted library allocation
page execute and read and write
A02E000
stack
page read and write
45B000
unkown
page readonly
254E000
stack
page read and write
1220000
heap
page read and write
1267000
trusted library allocation
page execute and read and write
42C7000
trusted library allocation
page read and write
454000
unkown
page readonly
9F10000
heap
page read and write
7FF5D75D9000
unkown
page readonly
19A000
stack
page read and write
7FF5D66E8000
unkown
page readonly
7FF5D75A6000
unkown
page readonly
ACB000
trusted library allocation
page execute and read and write
A1A3000
heap
page read and write
C75000
trusted library allocation
page execute and read and write
C621000
unkown
page read and write
7FF5D720A000
unkown
page readonly
4116000
trusted library allocation
page read and write
11A0000
unkown
page read and write
128A000
trusted library allocation
page execute and read and write
5246C000
direct allocation
page read and write
1260000
heap
page read and write
C4D000
trusted library allocation
page execute and read and write
3FBE000
trusted library allocation
page read and write
A67C000
heap
page read and write
9F1F000
heap
page read and write
11A0000
unkown
page read and write
A495000
heap
page read and write
5004000
trusted library allocation
page read and write
C5F0000
unkown
page read and write
A4B2000
heap
page read and write
32C5000
trusted library allocation
page read and write
A456000
heap
page read and write
5002000
trusted library allocation
page read and write
59E000
heap
page read and write
9EF3000
heap
page read and write
8360000
unkown
page read and write
CC8000
heap
page read and write
7FF5D74A6000
unkown
page readonly
E5CE000
stack
page read and write
59E000
heap
page read and write
460000
heap
page read and write
CC2000
heap
page read and write
A408000
unkown
page read and write
597000
heap
page read and write
A4F6000
heap
page read and write
A1C6000
heap
page read and write
3F71000
trusted library allocation
page read and write
49FD000
unkown
page read and write
8ECB000
stack
page read and write
7C70000
unkown
page readonly
3F46000
trusted library allocation
page read and write
2AF5000
trusted library allocation
page read and write
3F63000
trusted library allocation
page read and write
3180000
unkown
page read and write
5320000
trusted library allocation
page read and write
7FF5D716B000
unkown
page readonly
3F61000
trusted library allocation
page read and write
636C1000
unkown
page execute read
59E000
heap
page read and write
597000
heap
page read and write
59E000
heap
page read and write
E2A000
trusted library allocation
page execute and read and write
5046000
trusted library allocation
page read and write
77C000
heap
page read and write
7FF5D770F000
unkown
page readonly
9FF8000
heap
page read and write
CD4000
heap
page read and write
11A53000
unkown
page read and write
7FF5D717C000
unkown
page readonly
C23000
heap
page read and write
597000
heap
page read and write
597000
heap
page read and write
111CD000
unkown
page read and write
597000
heap
page read and write
9F04000
heap
page read and write
10584000
unkown
page read and write
1140000
unkown
page read and write
A1B9000
heap
page read and write
407E000
trusted library allocation
page read and write
5190000
heap
page read and write
9EFE000
heap
page read and write
1140000
unkown
page read and write
10D0000
trusted library allocation
page read and write
9F29000
heap
page read and write
2B06000
trusted library allocation
page read and write
9D07000
heap
page read and write
A667000
heap
page read and write
853B000
stack
page read and write
9F1D000
heap
page read and write
A247000
heap
page read and write
9F3B000
heap
page read and write
F64000
heap
page read and write
3F50000
trusted library allocation
page read and write
12FC000
stack
page read and write
C28000
heap
page read and write
9BF8000
heap
page read and write
CAC000
heap
page read and write
7FF5D72DF000
unkown
page readonly
3180000
unkown
page read and write
7B60000
unkown
page readonly
10B4000
unkown
page read and write
59E000
heap
page read and write
3FED000
trusted library allocation
page read and write
3F9000
stack
page read and write
AB01000
heap
page read and write
C64000
heap
page read and write
1150000
unkown
page read and write
9AFA000
heap
page read and write
3F67000
trusted library allocation
page read and write
570000
heap
page read and write
3230000
unkown
page read and write
533B000
trusted library allocation
page read and write
58D3000
trusted library allocation
page read and write
A42D000
heap
page read and write
AA92000
unkown
page read and write
9F27000
heap
page read and write
9B8000
heap
page read and write
27E0000
trusted library allocation
page read and write
5044000
trusted library allocation
page read and write
4A40000
unkown
page read and write
32F0000
remote allocation
page read and write
AA0E000
unkown
page read and write
258F000
stack
page read and write
3170000
unkown
page read and write
6F6000
stack
page read and write
5D0000
heap
page read and write
CD8000
heap
page read and write
59E000
heap
page read and write
7FF5D751F000
unkown
page readonly
35C3000
unkown
page read and write
9F24000
heap
page read and write
5727000
trusted library allocation
page read and write
3180000
unkown
page read and write
3180000
unkown
page read and write
3180000
unkown
page read and write
1150000
unkown
page read and write
9EFA000
heap
page read and write
A4F9000
heap
page read and write
9F27000
heap
page read and write
1430000
heap
page read and write
A40E000
heap
page read and write
550E000
stack
page read and write
A4AA000
heap
page read and write
BFA000
heap
page read and write
C2E000
stack
page read and write
1AFF000
stack
page read and write
9CD9000
heap
page read and write
A84000
trusted library allocation
page read and write
59E000
heap
page read and write
3E81000
trusted library allocation
page read and write
59E000
heap
page read and write
77C000
heap
page read and write
3F57000
trusted library allocation
page read and write
597000
heap
page read and write
59E000
heap
page read and write
9EF9000
heap
page read and write
3180000
unkown
page read and write
400000
unkown
page readonly
54E0000
trusted library allocation
page read and write
5830000
heap
page read and write
2FF9000
stack
page read and write
425000
unkown
page readonly
C54000
heap
page read and write
C3C000
heap
page read and write
3180000
unkown
page read and write
7DE000
stack
page read and write
59E000
heap
page read and write
3180000
unkown
page read and write
1350000
unkown
page readonly
C3F000
heap
page read and write
A88A000
heap
page read and write
7FF5D76F5000
unkown
page readonly
3180000
unkown
page read and write
3FA4000
trusted library allocation
page read and write
5018000
trusted library allocation
page read and write
2F80000
heap
page read and write
11A0000
unkown
page read and write
27F3000
trusted library allocation
page read and write
3180000
unkown
page read and write
4850000
unclassified section
page read and write
3F5F000
trusted library allocation
page read and write
9EA4000
heap
page read and write
563E000
stack
page read and write
7435000
stack
page read and write
9F04000
heap
page read and write
35D1000
unkown
page read and write
A573000
heap
page read and write
35B3000
unkown
page read and write
52444000
direct allocation
page read and write
7FF5D7745000
unkown
page readonly
3180000
unkown
page read and write
C3C000
heap
page read and write
C90000
trusted library allocation
page read and write
7B20000
unkown
page read and write
7FF5D71AF000
unkown
page readonly
A635000
heap
page read and write
11A0000
unkown
page read and write
772000
heap
page read and write
A368000
heap
page read and write
522E000
stack
page read and write
9F33000
heap
page read and write
2DA0000
unclassified section
page read and write
A053000
heap
page read and write
11E0000
unkown
page read and write
597000
heap
page read and write
3170000
heap
page execute and read and write
2080000
trusted library allocation
page read and write
273D000
heap
page read and write
9C05000
heap
page read and write
9F3A000
heap
page read and write
6031E000
unkown
page readonly
4FF0000
trusted library allocation
page read and write
CCC000
heap
page read and write
3F7A000
trusted library allocation
page read and write
3489000
stack
page read and write
7FF5D7837000
unkown
page readonly
4420000
heap
page read and write
13C5000
heap
page read and write
597000
heap
page read and write
CD4000
heap
page read and write
9F1E000
heap
page read and write
7FF5D71C4000
unkown
page readonly
2DB6000
heap
page read and write
3E87000
trusted library allocation
page read and write
3F61000
trusted library allocation
page read and write
9FD2000
heap
page read and write
3180000
unkown
page read and write
3180000
unkown
page read and write
3F4B000
trusted library allocation
page read and write
3630000
unkown
page readonly
A2F0000
heap
page read and write
3F40000
trusted library allocation
page read and write
26AD4000
direct allocation
page read and write
3F51000
trusted library allocation
page read and write
9F1E000
heap
page read and write
5C42000
trusted library allocation
page read and write
A6D9000
heap
page read and write
1570000
trusted library allocation
page execute and read and write
C7B000
heap
page read and write
11A53000
unkown
page read and write
11A0000
unkown
page read and write
1630000
heap
page read and write
9EF2000
heap
page read and write
A33F000
unkown
page read and write
40B000
unkown
page execute read
59E000
heap
page read and write
4882C000
direct allocation
page read and write
11C1000
unkown
page read and write
2280000
trusted library allocation
page read and write
41B1000
trusted library allocation
page read and write
7340000
unkown
page readonly
1690000
trusted library allocation
page read and write
7FF5D774C000
unkown
page readonly
A59E000
heap
page read and write
AFBE000
stack
page read and write
9C10000
heap
page read and write
2BEB000
unkown
page readonly
597000
heap
page read and write
7FF5D7764000
unkown
page readonly
59E000
heap
page read and write
A518000
heap
page read and write
3F89000
trusted library allocation
page read and write
59E000
heap
page read and write
20A0000
trusted library allocation
page read and write
3180000
unkown
page read and write
597000
heap
page read and write
DC0000
unkown
page read and write
320000
unkown
page readonly
1297000
trusted library allocation
page execute and read and write
A5AF000
heap
page read and write
597000
heap
page read and write
11A0000
unkown
page read and write
CDB000
heap
page read and write
D70000
heap
page read and write
CA5000
heap
page read and write
1BA7000
heap
page read and write
10E0000
stack
page read and write
9EFC000
heap
page read and write
5710000
trusted library allocation
page read and write
1220000
unkown
page read and write
A1C9000
heap
page read and write
3F8B000
trusted library allocation
page read and write
C3C000
heap
page read and write
429000
unkown
page write copy
32C1000
trusted library allocation
page read and write
CE7000
heap
page read and write
2850000
trusted library allocation
page read and write
C7B000
heap
page read and write
3180000
unkown
page read and write
9F44000
heap
page read and write
9A90000
unkown
page read and write
35C1000
unkown
page read and write
A341000
heap
page read and write
3180000
unkown
page read and write
59E000
heap
page read and write
64AC1000
unkown
page execute read
3180000
unkown
page read and write
C7B000
heap
page read and write
48818000
direct allocation
page read and write
3280000
unkown
page read and write
A5A3000
heap
page read and write
3180000
unkown
page read and write
344E000
stack
page read and write
59E000
heap
page read and write
7FF5D75F6000
unkown
page readonly
11A0000
unkown
page read and write
7DF4F2461000
unkown
page execute read
A205000
heap
page read and write
2421000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
A63E000
heap
page read and write
E10000
trusted library allocation
page read and write
11A0000
unkown
page read and write
11A0000
unkown
page read and write
2F61000
heap
page read and write
7FF5D7760000
unkown
page readonly
20E0000
trusted library allocation
page read and write
9E0000
heap
page read and write
3F50000
trusted library allocation
page read and write
42E000
unkown
page readonly
9F04000
heap
page read and write
A639000
heap
page read and write
A690000
heap
page read and write
3F99000
trusted library allocation
page read and write
747E000
stack
page read and write
A5CE000
heap
page read and write
15FB000
trusted library allocation
page execute and read and write
A00000
heap
page read and write
A365000
heap
page read and write
2D8A000
heap
page read and write
3F9A000
trusted library allocation
page read and write
9CDB000
heap
page read and write
14C5000
heap
page read and write
A42A000
heap
page read and write
2857000
trusted library allocation
page execute and read and write
3F61000
trusted library allocation
page read and write
59E000
heap
page read and write
2840000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
597000
heap
page read and write
CD9000
heap
page read and write
C54000
heap
page read and write
944000
trusted library allocation
page read and write
A34A000
heap
page read and write
419E000
stack
page read and write
411E000
trusted library allocation
page read and write
A506000
heap
page read and write
7FF5D748A000
unkown
page readonly
9AB2000
unkown
page read and write
A0AA000
heap
page read and write
3190000
trusted library allocation
page read and write
52424000
direct allocation
page read and write
9F3A000
heap
page read and write
3F41000
trusted library allocation
page read and write
597000
heap
page read and write
718000
heap
page read and write
59E000
heap
page read and write
5330000
unkown
page write copy
A31D000
heap
page read and write
AAA000
trusted library allocation
page execute and read and write
1810000
heap
page read and write
A0C1000
heap
page read and write
597000
heap
page read and write
59E000
heap
page read and write
3F91000
trusted library allocation
page read and write
F58A000
heap
page read and write
2B40000
heap
page execute and read and write
CC1000
heap
page read and write
D81000
unkown
page execute read
7FF5D7065000
unkown
page readonly
A1F0000
heap
page read and write
1150000
unkown
page read and write
105C3000
unkown
page read and write
3180000
unkown
page read and write
108E000
stack
page read and write
2EA1000
unkown
page read and write
26AA0000
direct allocation
page read and write
3180000
unkown
page read and write
529000
heap
page read and write
3F61000
trusted library allocation
page read and write
12A0000
heap
page read and write
5050000
trusted library allocation
page read and write
A1E1000
heap
page read and write
7FF5D77B9000
unkown
page readonly
443C000
trusted library allocation
page read and write
CA5000
heap
page read and write
5434000
trusted library allocation
page read and write
3F4F000
trusted library allocation
page read and write
7D5000
heap
page read and write
A270000
heap
page read and write
11E0000
unkown
page read and write
9ADB000
unkown
page read and write
C3C000
heap
page read and write
A416000
unkown
page read and write
2811000
trusted library allocation
page read and write
7FF5D7376000
unkown
page readonly
3F67000
trusted library allocation
page read and write
355F000
stack
page read and write
597000
heap
page read and write
8D3C000
stack
page read and write
15E6000
trusted library allocation
page execute and read and write
49FA000
unkown
page read and write
4FEE000
stack
page read and write
3F6F000
trusted library allocation
page read and write
C54000
heap
page read and write
13A0000
unkown
page readonly
5721000
trusted library allocation
page read and write
C3C000
heap
page read and write
59E000
heap
page read and write
59E000
heap
page read and write
597000
heap
page read and write
59E000
heap
page read and write
8F6000
stack
page read and write
3F61000
trusted library allocation
page read and write
A276000
heap
page read and write
C035000
stack
page read and write
59E000
heap
page read and write
59E000
heap
page read and write
C615000
unkown
page read and write
5451000
trusted library allocation
page read and write
2FCD000
trusted library allocation
page execute and read and write
11E0000
unkown
page read and write
59E000
heap
page read and write
9CD3000
heap
page read and write
298E000
stack
page read and write
59E000
heap
page read and write
7FF5D6ABD000
unkown
page readonly
9BE0000
heap
page read and write
4A44000
unkown
page read and write
3230000
unkown
page read and write
9EF7000
heap
page read and write
A0CF000
heap
page read and write
9F27000
heap
page read and write
3F7A000
trusted library allocation
page read and write
A177000
heap
page read and write
15F0000
trusted library allocation
page read and write
DBD000
trusted library allocation
page execute and read and write
26A90000
direct allocation
page read and write
2E50000
heap
page read and write
7FF5D77C2000
unkown
page readonly
10000000
unkown
page readonly
CBB000
heap
page read and write
2D9E000
stack
page read and write
3F61000
trusted library allocation
page read and write
7FF5D760B000
unkown
page readonly
9F2F000
heap
page read and write
C5D000
trusted library allocation
page execute and read and write
A2F3000
heap
page read and write
A528000
heap
page read and write
5D5000
heap
page read and write
C5F4000
unkown
page read and write
5465000
trusted library allocation
page read and write
A27D000
heap
page read and write
3F71000
trusted library allocation
page read and write
5351000
trusted library allocation
page read and write
6A0000
heap
page read and write
A3E5000
heap
page read and write
6F0000
heap
page read and write
A280000
heap
page read and write
9F31000
heap
page read and write
9B89000
unkown
page read and write
A316000
heap
page read and write
3180000
unkown
page read and write
3180000
unkown
page read and write
C891000
unkown
page read and write
11A0000
unkown
page read and write
4FBE000
stack
page read and write
2F7F000
stack
page read and write
7FF5D7280000
unkown
page readonly
3F48000
trusted library allocation
page read and write
3F77000
trusted library allocation
page read and write
E37000
trusted library allocation
page execute and read and write
49C2000
unkown
page read and write
F44A000
unkown
page read and write
2C4E000
stack
page read and write
F36000
stack
page read and write
3F58000
trusted library allocation
page read and write
E71000
trusted library allocation
page read and write
3180000
unkown
page read and write
9CFD000
heap
page read and write
597000
heap
page read and write
3F80000
trusted library allocation
page read and write
9CE3000
heap
page read and write
A162000
heap
page read and write
26A70000
direct allocation
page read and write
9F12000
heap
page read and write
3F61000
trusted library allocation
page read and write
B4BF000
stack
page read and write
A0A2000
heap
page read and write
59E000
heap
page read and write
A07C000
heap
page read and write
C50000
heap
page read and write
501E000
trusted library allocation
page read and write
11E0000
unkown
page read and write
5032000
trusted library allocation
page read and write
5336000
trusted library allocation
page read and write
5479000
unkown
page read and write
3FBD000
trusted library allocation
page read and write
BFB8000
stack
page read and write
769A000
unkown
page read and write
49D0000
heap
page read and write
27C0000
trusted library allocation
page read and write
3FB9000
trusted library allocation
page read and write
C54000
heap
page read and write
F9F000
stack
page read and write
526E000
stack
page read and write
15E0000
trusted library allocation
page read and write
CA5000
heap
page read and write
9FCA000
heap
page read and write
3F51000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
3F41000
trusted library allocation
page read and write
F400000
unkown
page read and write
3180000
unkown
page read and write
7FF5D71EA000
unkown
page readonly
B023000
heap
page read and write
241F000
trusted library allocation
page read and write
1347000
heap
page read and write
A4E4000
heap
page read and write
3230000
unkown
page read and write
C50000
heap
page read and write
4BD5000
trusted library allocation
page read and write
A22F000
heap
page read and write
58CF000
stack
page read and write
5444000
trusted library allocation
page read and write
40A000
unkown
page read and write
11A0000
unkown
page read and write
620000
unkown
page readonly
CA8000
heap
page read and write
1610000
trusted library allocation
page read and write
4F96000
trusted library allocation
page read and write
8D9000
heap
page read and write
40EE000
trusted library allocation
page read and write
60304000
unkown
page write copy
CA0000
heap
page read and write
A451000
heap
page read and write
11E0000
unkown
page read and write
7FF5D7669000
unkown
page readonly
7654000
unkown
page read and write
597000
heap
page read and write
3180000
unkown
page read and write
2FE0000
trusted library allocation
page read and write
11A0000
unkown
page read and write
597000
heap
page read and write
9F24000
heap
page read and write
48884000
direct allocation
page read and write
7AF1000
unkown
page read and write
3F59000
trusted library allocation
page read and write
3F61000
trusted library allocation
page read and write
20CB000
trusted library allocation
page execute and read and write
2E5E000
heap
page read and write
9F32000
heap
page read and write
9C0D000
heap
page read and write
D30000
trusted library allocation
page read and write
977000
trusted library allocation
page execute and read and write
10E0000
unkown
page read and write
C44F000
stack
page read and write
59E000
heap
page read and write
2AC7000
trusted library allocation
page read and write
9A8E000
unkown
page read and write
20C7000
trusted library allocation
page execute and read and write
429000
unkown
page read and write
A35A000
heap
page read and write
3F51000
trusted library allocation
page read and write
788000
heap
page read and write
597000
heap
page read and write
597000
heap
page read and write
E4CD000
stack
page read and write
9A0000
trusted library allocation
page execute and read and write
9EF1000
heap
page read and write
7FF5D748C000
unkown
page readonly
4126000
trusted library allocation
page read and write
590000
heap
page read and write
505C000
trusted library allocation
page read and write
3F48000
trusted library allocation
page read and write
597000
heap
page read and write
11A57000
unkown
page read and write
597000
heap
page read and write
C7B000
trusted library allocation
page execute and read and write
A3ED000
heap
page read and write
59E000
heap
page read and write
9A9E000
unkown
page read and write
C3F000
heap
page read and write
11A0000
unkown
page read and write
5463000
unkown
page read and write
176E000
stack
page read and write
48888000
direct allocation
page read and write
597000
heap
page read and write
C50000
heap
page read and write
CFC000
stack
page read and write
621000
unkown
page execute read
597000
heap
page read and write
9F1F000
heap
page read and write
A80000
trusted library allocation
page read and write
D20000
heap
page read and write
B330000
unkown
page read and write
15F7000
trusted library allocation
page execute and read and write
4AC0000
unkown
page read and write
CC0000
heap
page read and write
CAF000
heap
page read and write
A662000
heap
page read and write
9F3D000
heap
page read and write
BE0000
heap
page read and write
4181000
trusted library allocation
page read and write
10001000
unkown
page execute read
1C4000
heap
page read and write
15BD000
trusted library allocation
page execute and read and write
4BA0000
trusted library allocation
page read and write
A3B6000
unkown
page read and write
59E000
heap
page read and write
D10000
heap
page read and write
A0A5000
heap
page read and write
CBE000
heap
page read and write
3180000
unkown
page read and write
59E000
heap
page read and write
2DAE000
stack
page read and write
1694000
unkown
page readonly
9F3B000
heap
page read and write
3F4F000
trusted library allocation
page read and write
7FF5D774A000
unkown
page readonly
9EB2000
heap
page read and write
59E000
heap
page read and write
5035000
trusted library allocation
page read and write
3F5A000
trusted library allocation
page read and write
2B2E000
stack
page read and write
149E000
stack
page read and write
76F000
heap
page read and write
7C80000
unkown
page read and write
26B28000
direct allocation
page read and write
7DF4F2481000
unkown
page execute read
2F67000
trusted library allocation
page read and write
7D8000
heap
page read and write
10B5000
unkown
page execute read
CDE000
heap
page read and write
BA0000
heap
page read and write
75E0000
unkown
page read and write
3F51000
trusted library allocation
page read and write
111C6000
unkown
page read and write
3B57000
trusted library allocation
page read and write
22C4000
trusted library allocation
page read and write
597000
heap
page read and write
2094000
trusted library allocation
page read and write
10002000
unkown
page readonly
33C0000
unkown
page read and write
597000
heap
page read and write
9BF0000
heap
page read and write
950000
trusted library allocation
page read and write
4BD3000
trusted library allocation
page read and write
3180000
unkown
page read and write
AB2B000
heap
page read and write
A231000
heap
page read and write
11E0000
heap
page read and write
5000000
trusted library allocation
page read and write
2B27000
trusted library allocation
page read and write
11A0000
unkown
page read and write
55D5000
trusted library allocation
page read and write
B03B000
stack
page read and write
12A8000
heap
page read and write
1000000
heap
page read and write
77C000
heap
page read and write
A3A6000
heap
page read and write
11FE000
stack
page read and write
3180000
unkown
page read and write
CAB000
heap
page read and write
EC8000
heap
page read and write
9F04000
heap
page read and write
7DF5F46E1000
unkown
page readonly
11A0000
unkown
page read and write
699000
unkown
page readonly
597000
heap
page read and write
4AA0000
unkown
page read and write
11E0000
unkown
page read and write
107D000
stack
page read and write
59E000
heap
page read and write
59E000
heap
page read and write
9E8000
heap
page read and write
9F0F000
heap
page read and write
529000
heap
page read and write
362A000
unkown
page read and write
786000
heap
page read and write
32EF000
trusted library allocation
page read and write
3554000
unkown
page read and write
26AB8000
direct allocation
page read and write
570E000
trusted library allocation
page read and write
2090000
trusted library allocation
page read and write
6AB0000
unkown
page readonly
7FF5D7396000
unkown
page readonly
3180000
unkown
page read and write
1310000
heap
page read and write
B20000
heap
page read and write
7FF5D7784000
unkown
page readonly
3940000
remote allocation
page read and write
A5EF000
heap
page read and write
5170000
trusted library allocation
page read and write
22C0000
trusted library allocation
page read and write
9F10000
heap
page read and write
3F60000
trusted library allocation
page read and write
597000
heap
page read and write
A23A000
heap
page read and write
4E40000
trusted library allocation
page read and write
348B000
stack
page read and write
9E1C000
heap
page read and write
3F61000
trusted library allocation
page read and write
9B0B000
unkown
page read and write
3F80000
trusted library allocation
page read and write
340000
unkown
page readonly
3180000
unkown
page read and write
111CE000
unkown
page read and write
10ED000
trusted library allocation
page execute and read and write
9BC000
stack
page read and write
345C000
trusted library allocation
page read and write
7FF5D7523000
unkown
page readonly
3180000
unkown
page read and write
3230000
unkown
page read and write
55E2000
trusted library allocation
page read and write
59E000
heap
page read and write
C48000
heap
page read and write
760B000
unkown
page read and write
550E000
stack
page read and write
A6C7000
heap
page read and write
11A58000
unkown
page read and write
11A0000
unkown
page read and write
3180000
unkown
page read and write
52440000
direct allocation
page read and write
7AC0000
unkown
page read and write
3F68000
trusted library allocation
page read and write
1220000
unkown
page read and write
3F43000
trusted library allocation
page read and write
3180000
unkown
page read and write
15B0000
trusted library allocation
page read and write
3F58000
trusted library allocation
page read and write
2277000
trusted library allocation
page read and write
C51000
heap
page read and write
AA40000
unkown
page read and write
5247C000
direct allocation
page read and write
1EDE000
unkown
page read and write
4FA0000
trusted library allocation
page read and write
35CD000
unkown
page read and write
A441000
heap
page read and write
A5BE000
heap
page read and write
3180000
unkown
page read and write
7FF5D723C000
unkown
page readonly
C3CE000
stack
page read and write
A595000
heap
page read and write
A6AC000
heap
page read and write
3F4E000
trusted library allocation
page read and write
7FF5D6BDB000
unkown
page readonly
C28000
heap
page read and write
3FA1000
trusted library allocation
page read and write
304F000
stack
page read and write
3F76000
trusted library allocation
page read and write
AAFB000
heap
page read and write
15B3000
trusted library allocation
page execute and read and write
7480000
unclassified section
page readonly
59E000
heap
page read and write
3180000
unkown
page read and write
BE70000
unkown
page readonly
7611000
unkown
page read and write
59E000
heap
page read and write
9F1C000
heap
page read and write
3180000
unkown
page read and write
A08000
heap
page read and write
7FF5D720F000
unkown
page readonly
597000
heap
page read and write
68D000
heap
page read and write
11A0000
unkown
page read and write
2B14000
trusted library allocation
page read and write
CAB000
heap
page read and write
11E0000
unkown
page read and write
8A46000
unkown
page read and write
A524000
heap
page read and write
C54000
heap
page read and write
A4C7000
heap
page read and write
597000
heap
page read and write
A575000
heap
page read and write
422000
unkown
page read and write
3F9E000
trusted library allocation
page read and write
95FB000
heap
page read and write
A9D000
trusted library allocation
page execute and read and write
A0D2000
heap
page read and write
11A0000
unkown
page read and write
AB31000
heap
page read and write
3F76000
trusted library allocation
page read and write
A530000
heap
page read and write
CA8000
heap
page read and write
1068B000
unkown
page read and write
1292000
trusted library allocation
page read and write
66BD3000
unkown
page execute read
3F71000
trusted library allocation
page read and write
3F45000
trusted library allocation
page read and write
A18B000
heap
page read and write
10544000
unkown
page read and write
C78A000
unkown
page read and write
A1FC000
heap
page read and write
48834000
direct allocation
page read and write
9F1D000
heap
page read and write
8980000
stack
page read and write
A659000
heap
page read and write
4F00000
heap
page execute and read and write
A0F1000
heap
page read and write
BEE000
stack
page read and write
10E0000
unkown
page read and write
7FF5D728E000
unkown
page readonly
11A5D000
unkown
page read and write
332E000
stack
page read and write
2FC0000
trusted library allocation
page read and write
143F000
heap
page read and write
11A0000
unkown
page read and write
DB4000
trusted library allocation
page read and write
53EE000
stack
page read and write
89FC000
stack
page read and write
4B70000
heap
page read and write
2F4F000
stack
page read and write
597000
heap
page read and write
A431000
heap
page read and write
A4D9000
heap
page read and write
52401000
direct allocation
page read and write
7FF5D7643000
unkown
page readonly
59E000
heap
page read and write
7DD0000
heap
page read and write
481F000
stack
page read and write
2B1E000
trusted library allocation
page read and write
59E000
heap
page read and write
1150000
unkown
page read and write
3180000
unkown
page read and write
A2F2000
heap
page read and write
26A6C000
direct allocation
page read and write
3180000
unkown
page read and write
597000
heap
page read and write
9F17000
heap
page read and write
DB3000
trusted library allocation
page execute and read and write
B40000
heap
page read and write
4B50000
trusted library allocation
page read and write
7FF5D77E0000
unkown
page readonly
59E000
heap
page read and write
8A70000
unkown
page read and write
3F61000
trusted library allocation
page read and write
59E000
heap
page read and write
26A24000
direct allocation
page read and write
3180000
unkown
page read and write
9EF0000
heap
page read and write
11A0000
unkown
page read and write
BFE000
heap
page read and write
11A0000
unkown
page read and write
59E000
heap
page read and write
A4B4000
heap
page read and write
3FEE000
trusted library allocation
page read and write
11A0000
unkown
page read and write
7DBC000
stack
page read and write
9D67000
unkown
page read and write
7693000
unkown
page read and write
7FF5D7792000
unkown
page readonly
A171000
heap
page read and write
602EC000
unkown
page write copy
10004000
unkown
page readonly
11A0000
unkown
page read and write
C43000
trusted library allocation
page execute and read and write
C20000
heap
page read and write
7FF5D7691000
unkown
page readonly
595000
heap
page read and write
AF0000
trusted library allocation
page execute and read and write
C496000
unkown
page read and write
A0AE000
heap
page read and write
4066000
trusted library allocation
page read and write
7FF5D7593000
unkown
page readonly
3591000
heap
page read and write
7FF5D7648000
unkown
page readonly
3F6C000
trusted library allocation
page read and write
354A000
unkown
page read and write
40A000
unkown
page read and write
3180000
unkown
page read and write
500E000
trusted library allocation
page read and write
A546000
heap
page read and write
2800000
heap
page execute and read and write
CD2000
heap
page read and write
6AA000
unkown
page read and write
59E000
heap
page read and write
436000
unkown
page readonly
3180000
unkown
page read and write
7FF5D758D000
unkown
page readonly
597000
heap
page read and write
7FF5D7230000
unkown
page readonly
9F23000
heap
page read and write
11A0000
unkown
page read and write
543B000
trusted library allocation
page read and write
A264000
unkown
page read and write
AF8000
stack
page read and write
5880000
trusted library allocation
page read and write
59E000
heap
page read and write
2B0B000
trusted library allocation
page read and write
5242C000
direct allocation
page read and write
4FF0000
trusted library allocation
page read and write
40B000
unkown
page execute read
11E0000
unkown
page read and write
A1AF000
heap
page read and write
CBB000
heap
page read and write
32F0000
remote allocation
page read and write
3F89000
trusted library allocation
page read and write
A130000
heap
page read and write
C17000
heap
page read and write
A051000
heap
page read and write
8870000
unkown
page readonly
7FF5D71BF000
unkown
page readonly
C7B000
heap
page read and write
B7DF000
unkown
page read and write
4EC1000
trusted library allocation
page read and write
3317000
trusted library allocation
page read and write
3F4B000
trusted library allocation
page read and write
12C7000
heap
page read and write
9BFE000
heap
page read and write
9F27000
heap
page read and write
A106000
heap
page read and write
9B0000
heap
page read and write
3F51000
trusted library allocation
page read and write
4EBC000
trusted library allocation
page read and write
CDF000
heap
page read and write
2271000
trusted library allocation
page read and write
3180000
unkown
page read and write
A0C8000
heap
page read and write
48830000
direct allocation
page read and write
There are 3358 hidden memdumps, click here to show them.