IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\huge[1].dat
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\23E4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\5371.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
modified
malicious
C:\Users\user\AppData\Local\Temp\nsp4EBF.tmp\blowfish.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsr4CB.tmp\liteFirewall.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Del.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\libcef.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\aggtjfs
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\aggtjfs:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsk4E9F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsp4EBF.tmp\INetC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsp4EBF.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nst9548.tmp
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\DawnCache\data_3
data
modified
C:\Users\user\AppData\Roaming\GamePall\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\GamePall\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\cef.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_extensions.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\cef_sandbox.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\GamePall\devtools_resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\icudtl.dat
data
dropped
C:\Users\user\AppData\Roaming\GamePall\libcef.lib
current ar archive
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\af.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\am.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ar.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bg.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\bn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ca.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\cs.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\da.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\de.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\el.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\es.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\et.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fa.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fil.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\fr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\gu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\he.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\hu.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\id.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\it.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ja.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\kn.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ko.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lt.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\lv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ml.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\mr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ms.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nb.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\nl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ro.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ru.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sl.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sv.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\sw.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ta.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\te.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\th.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\tr.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\uk.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\ur.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\vi.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\log4net.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\natives_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\resources.pak
data
dropped
C:\Users\user\AppData\Roaming\GamePall\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\start.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\GamePall\swiftshader\Xilium.CefGlue.pdb
MSVC program database ver 7.00, 512*4023 bytes
dropped
C:\Users\user\AppData\Roaming\GamePall\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 105 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\aggtjfs
C:\Users\user\AppData\Roaming\aggtjfs
malicious
C:\Users\user\AppData\Local\Temp\23E4.exe
C:\Users\user\AppData\Local\Temp\23E4.exe
malicious
C:\Users\user\AppData\Local\Temp\5371.exe
C:\Users\user\AppData\Local\Temp\5371.exe
malicious
C:\Users\user\AppData\Local\Temp\setup.exe
"C:\Users\user\AppData\Local\Temp\setup.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3472 --field-trial-handle=3476,i,3252441317310229410,1173011674787013367,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3660 --field-trial-handle=3476,i,3252441317310229410,1173011674787013367,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Mobile Safari/537.36" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3592 --field-trial-handle=3476,i,3252441317310229410,1173011674787013367,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1720115578234356 --launch-time-ticks=4603408239 --mojo-platform-channel-handle=3948 --field-trial-handle=3476,i,3252441317310229410,1173011674787013367,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Mobile Safari/537.36" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1720115578234356 --launch-time-ticks=4603422960 --mojo-platform-channel-handle=4012 --field-trial-handle=3476,i,3252441317310229410,1173011674787013367,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
malicious
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://cx5519.com/tmp/index.php
malicious
http://evilos.cc/tmp/index.php
malicious
ellaboratepwsz.xyz
malicious
swellfrrgwwos.xyz
malicious
foodypannyjsud.shop
malicious
https://anglebug.com/4674
unknown
https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://www.google.com/chrome/privacy/eula_text.htmlA&judaGestionat
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://anglebug.com/8280enableTranslatedShaderSubstitutionCheck
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://www.google.com/chrome/privacy/eula_text.htmlP&al
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://issuetracker.google.com/284462263
unknown
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
unknown
http://api.install-stat.debug.world/clients/activity=4P
unknown
http://crbug.com/550292
unknown
https://foodypannyjsud.shop/piy
unknown
https://chrome.google.com/webstore?hl=urCtrl$2
unknown
http://crbug.com/883276
unknown
https://crbug.com/1356053
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://anglebug.com/5536
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://crbug.com/705865
unknown
http://crbug.com/110263
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
unknown
http://anglebug.com/5281
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://bageyou.xyz
unknown
http://logging.apache.org/log4ne
unknown
https://issuetracker.google.com/255411748
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://chrome.google.com/webstore?hl=arCtrl$1
unknown
https://crbug.com/593024
unknown
https://crbug.com/1137851
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://issuetracker.google.com/161903006
unknown
https://www.google.com/chrome/privacy/eula_text.html&
unknown
http://anglebug.com/2152skipVSConstantRegisterZeroIn
unknown
https://crbug.com/1300575
unknown
https://www.google.com/chrome/privacy/eula_text.htmlT&r
unknown
https://www.ecosia.org/newtab/
unknown
http://xiexie.wf/22_551/huge.dat
unknown
https://crbug.com/710443
unknown
https://crbug.com/1042393
unknown
https://crbug.com/1060012
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://xiexie.wf/22_551/huge.datF$
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/3246allowClearForRobustResourceInitSome
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
unknown
https://foodypannyjsud.shop/apiP
unknown
http://anglebug.com/5371
unknown
https://chrome.google.com/webstore?hl=ukCtrl$1
unknown
http://anglebug.com/3997
unknown
http://anglebug.com/4722
unknown
http://crbug.com/642605
unknown
http://anglebug.com/1452
unknown
http://anglebug.com/7556
unknown
https://support.google.com/chrome/a/answer/9122284
unknown
https://chrome.google.com/webstore?hl=caCtrl$1
unknown
http://api.install-stat.debug.world/clients/activity=4
unknown
https://crbug.com/650547callClearTwiceUsing
unknown
https://chrome.google.com/webstore?hl=teCtrl$1
unknown
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
unknown
https://word.office.comon
unknown
http://crbug.com/1420130
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
https://chrome.google.com/webstore?hl=ar&category=theme81https://myactivity.google.com/myactivity/?u
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://www.unicode.org/copyright.html
unknown
http://anglebug.com/5007
unknown
http://crbug.com/1181068
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://anglebug.com/2894
unknown
http://anglebug.com/3862
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://foodypannyjsud.shop:443/apiOYFBOLXA.pdfPK
unknown
http://bageyou.xyz/c/g
unknown
http://schemas.micro
unknown
http://api.install-stat.debug.world/clients/activity
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
77.221.157.163
unknown
Russian Federation
malicious
152.231.127.132
unknown
Chile
malicious
188.114.96.3
unknown
European Union
malicious
185.149.100.242
unknown
Turkey
malicious
127.0.0.127
unknown
unknown
malicious
104.21.45.251
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000002043E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020460
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\GamePall
Sid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Pid
HKEY_CURRENT_USER\SOFTWARE\GamePall
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GamePall
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Windows Error Reporting
DontShowUI
HKEY_CURRENT_USER\SOFTWARE\GamePall
tmp_uid
HKEY_CURRENT_USER\SOFTWARE\GamePall
reg
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GamePall_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\GamePall
uid
HKEY_CURRENT_USER\Control Panel\Cursors
AppStarting
There are 194 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C20000
direct allocation
page read and write
malicious
2DA1000
unclassified section
page read and write
malicious
2D80000
direct allocation
page read and write
malicious
4851000
unclassified section
page read and write
malicious
39BE000
trusted library allocation
page read and write
57D1000
trusted library allocation
page read and write
5011000
trusted library allocation
page read and write
10E0000
unkown
page read and write
9A96000
unkown
page read and write
1250000
unkown
page read and write
F53B000
unkown
page read and write
10F0000
unkown
page read and write
BD0000
heap
page read and write
3180000
unkown
page read and write
12BE000
trusted library allocation
page read and write
2D5E000
stack
page read and write
12B0000
trusted library allocation
page read and write
13C0000
heap
page read and write
7FF5D723F000
unkown
page readonly
9780000
unkown
page read and write
A02E000
stack
page read and write
BD1000
heap
page read and write
142E000
trusted library allocation
page read and write
5920000
heap
page read and write
2D8E000
heap
page execute and read and write
AB7000
trusted library allocation
page execute and read and write
BCC000
heap
page read and write
547E000
trusted library allocation
page read and write
1240000
unkown
page read and write
9AA0000
unkown
page read and write
40A000
unkown
page read and write
7FF5D7455000
unkown
page readonly
30CE000
trusted library allocation
page read and write
E3D000
trusted library allocation
page execute and read and write
3D5000
heap
page read and write
843F000
stack
page read and write
1240000
unkown
page read and write
9ADB000
unkown
page read and write
10EB1000
unkown
page read and write
49C0000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
35D1000
trusted library allocation
page read and write
1270000
unkown
page read and write
39D9000
trusted library allocation
page read and write
B9E000
heap
page read and write
5037000
trusted library allocation
page read and write
363D000
trusted library allocation
page read and write
1386000
stack
page read and write
8390000
unkown
page read and write
94E000
stack
page read and write
5CFE000
stack
page read and write
4AA0000
unkown
page read and write
58ED000
stack
page read and write
39EC000
trusted library allocation
page read and write
12DD000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
C54B000
unkown
page read and write
663D000
stack
page read and write
BA9000
heap
page read and write
401000
unkown
page execute read
7C80000
unkown
page read and write
3370000
unkown
page read and write
8870000
unkown
page readonly
3DD4000
trusted library allocation
page read and write
16AE000
stack
page read and write
400000
unkown
page readonly
3991000
trusted library allocation
page read and write
176D000
trusted library allocation
page execute and read and write
3986000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
30D7000
trusted library allocation
page read and write
9780000
unkown
page read and write
4C27000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
1280000
heap
page read and write
24CF000
stack
page read and write
6D3E000
stack
page read and write
52D0000
heap
page execute and read and write
B9C000
heap
page read and write
10F0000
unkown
page read and write
630B000
stack
page read and write
41E000
unkown
page readonly
85BE000
stack
page read and write
1033000
trusted library allocation
page read and write
37F2000
trusted library allocation
page read and write
B17000
heap
page read and write
8390000
unkown
page read and write
408000
unkown
page readonly
3991000
trusted library allocation
page read and write
A2A2000
unkown
page read and write
3981000
trusted library allocation
page read and write
31DC000
stack
page read and write
8980000
unkown
page read and write
10E0000
unkown
page read and write
9780000
unkown
page read and write
BF0000
heap
page read and write
EB0000
heap
page read and write
3991000
trusted library allocation
page read and write
3180000
unkown
page read and write
5B5E000
stack
page read and write
3ED7000
trusted library allocation
page read and write
1240000
unkown
page read and write
2CA0000
trusted library allocation
page execute and read and write
870000
trusted library allocation
page read and write
19A000
stack
page read and write
BCD000
heap
page read and write
52EE000
stack
page read and write
760D000
unkown
page read and write
544E000
stack
page read and write
3A73000
trusted library allocation
page read and write
C0BA000
stack
page read and write
4A06000
trusted library allocation
page read and write
10F0000
unkown
page read and write
3B07000
trusted library allocation
page read and write
67D8000
heap
page read and write
B3D000
heap
page read and write
1035000
heap
page read and write
1281000
unkown
page readonly
3980000
trusted library allocation
page read and write
45B000
unkown
page readonly
7FF5D71CC000
unkown
page readonly
9700000
unkown
page read and write
5092000
trusted library allocation
page read and write
3C33000
trusted library allocation
page read and write
F5B4000
unkown
page read and write
9EE0000
unkown
page read and write
7FF5D77F0000
unkown
page readonly
3B52000
trusted library allocation
page read and write
142B000
trusted library allocation
page read and write
8A70000
unkown
page read and write
C11000
trusted library allocation
page read and write
C50000
heap
page read and write
8D9000
heap
page read and write
39CF000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
10E0000
unkown
page read and write
1260000
heap
page read and write
4AD1000
trusted library allocation
page read and write
2B0D000
trusted library allocation
page read and write
8980000
unkown
page read and write
39B1000
trusted library allocation
page read and write
5BFE000
stack
page read and write
2CC0000
heap
page read and write
A7D000
trusted library allocation
page execute and read and write
2B94000
trusted library allocation
page read and write
A237000
unkown
page read and write
AFA000
heap
page read and write
3989000
trusted library allocation
page read and write
5FCE000
stack
page read and write
A264000
unkown
page read and write
F78000
heap
page read and write
1240000
unkown
page read and write
8980000
unkown
page read and write
F40000
heap
page read and write
2F6F000
stack
page read and write
29FD000
trusted library allocation
page read and write
7FF5D7429000
unkown
page readonly
9A7000
trusted library allocation
page read and write
12C8000
trusted library allocation
page read and write
10E0000
unkown
page read and write
23B6000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
B47000
heap
page read and write
52F0000
trusted library allocation
page read and write
5D02000
trusted library allocation
page read and write
561E000
stack
page read and write
8980000
unkown
page read and write
7DF4F2481000
unkown
page execute read
36F1000
trusted library allocation
page read and write
A3B9000
unkown
page read and write
3991000
trusted library allocation
page read and write
399A000
trusted library allocation
page read and write
22FE000
stack
page read and write
10F0000
unkown
page read and write
9AE000
stack
page read and write
8980000
unkown
page read and write
4D3F000
stack
page read and write
112B2000
unkown
page read and write
399E000
trusted library allocation
page read and write
7FF5D77B6000
unkown
page readonly
11F1000
trusted library allocation
page read and write
22D0000
trusted library allocation
page execute and read and write
87F2000
heap
page read and write
4BC4000
trusted library allocation
page read and write
CA9000
heap
page read and write
118E000
heap
page read and write
BD0000
heap
page read and write
2E90000
unkown
page read and write
4EFE000
stack
page read and write
7FF5D732D000
unkown
page readonly
5AEB000
stack
page read and write
7C31000
unkown
page read and write
3180000
unkown
page read and write
9EE0000
unkown
page read and write
10E0000
unkown
page read and write
BD7000
heap
page read and write
10E0000
unkown
page read and write
3999000
trusted library allocation
page read and write
7FF5D7215000
unkown
page readonly
10E0000
unkown
page read and write
2E90000
unkown
page read and write
7FF5D71E0000
unkown
page readonly
A9DF000
unkown
page read and write
3060000
heap
page read and write
2DD5000
trusted library allocation
page read and write
484F000
stack
page read and write
C908000
unkown
page read and write
3BB7000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
50B6000
trusted library allocation
page read and write
57C8000
trusted library allocation
page read and write
2E90000
unkown
page read and write
BB1000
heap
page read and write
398F000
trusted library allocation
page read and write
BB10000
heap
page read and write
ADE000
stack
page read and write
8ED000
heap
page read and write
8980000
unkown
page read and write
BEE000
stack
page read and write
B76000
stack
page read and write
7E58000
stack
page read and write
760F000
unkown
page read and write
10001000
unkown
page execute read
7FF5D748C000
unkown
page readonly
B3D000
heap
page read and write
7DC0000
unkown
page readonly
4B0000
heap
page read and write
8980000
unkown
page read and write
9EE0000
unkown
page read and write
C17000
trusted library allocation
page read and write
8390000
unkown
page read and write
3B14000
trusted library allocation
page read and write
10B91000
unkown
page read and write
7FF5D775C000
unkown
page readonly
8980000
unkown
page read and write
B3D000
heap
page read and write
B47000
heap
page read and write
53FF000
stack
page read and write
E33000
trusted library allocation
page execute and read and write
4D5E000
trusted library allocation
page read and write
9780000
unkown
page read and write
2E90000
unkown
page read and write
35B5000
unkown
page read and write
942C000
stack
page read and write
460000
heap
page read and write
1515000
heap
page read and write
9A72000
unkown
page read and write
10E0000
unkown
page read and write
97B0000
unkown
page read and write
B3D000
heap
page read and write
5860000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
2E90000
unkown
page read and write
7FF5D7593000
unkown
page readonly
1210000
unkown
page read and write
CA4000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
BE0000
heap
page read and write
2EB0000
trusted library allocation
page read and write
1210000
unkown
page read and write
10E0000
unkown
page read and write
10C3000
trusted library allocation
page execute and read and write
C609000
unkown
page read and write
546E000
trusted library allocation
page read and write
1098000
heap
page read and write
3D0000
heap
page read and write
249C000
trusted library allocation
page read and write
1037000
heap
page read and write
2941000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
10E0000
unkown
page read and write
2EA0000
unkown
page read and write
7FF5D77E0000
unkown
page readonly
7FF5D74C3000
unkown
page readonly
9AAA000
unkown
page read and write
39CD000
trusted library allocation
page read and write
4BD4000
trusted library allocation
page read and write
95FD000
stack
page read and write
88F000
heap
page read and write
7EB000
trusted library allocation
page execute and read and write
1350000
unkown
page readonly
815000
heap
page read and write
3991000
trusted library allocation
page read and write
45D8000
trusted library allocation
page read and write
39C2000
trusted library allocation
page read and write
E90000
heap
page read and write
9A6A000
unkown
page read and write
1498000
heap
page read and write
8980000
unkown
page read and write
C7CB000
unkown
page read and write
30F0000
trusted library allocation
page read and write
1340000
unkown
page read and write
C9A7000
unkown
page read and write
101F000
heap
page read and write
A286000
unkown
page read and write
E7D5000
unkown
page read and write
6F6000
stack
page read and write
BD2000
heap
page read and write
10E0000
unkown
page read and write
9780000
unkown
page read and write
E6E000
stack
page read and write
13D0000
heap
page read and write
476E000
stack
page read and write
5E32000
heap
page read and write
FDE000
stack
page read and write
4025000
trusted library allocation
page read and write
616E000
stack
page read and write
362D000
unkown
page read and write
1001000
trusted library allocation
page read and write
3180000
unkown
page read and write
BD0000
heap
page read and write
4FFF000
stack
page read and write
7BD000
trusted library allocation
page execute and read and write
B28000
heap
page read and write
5285000
trusted library allocation
page read and write
2E90000
unkown
page read and write
3991000
trusted library allocation
page read and write
8390000
unkown
page read and write
9780000
unkown
page read and write
49CE000
trusted library allocation
page read and write
436000
unkown
page readonly
740000
heap
page read and write
8390000
unkown
page read and write
422000
unkown
page read and write
39C1000
trusted library allocation
page read and write
50F2000
trusted library allocation
page read and write
27B1000
trusted library allocation
page read and write
4DBE000
stack
page read and write
2498000
trusted library allocation
page read and write
39B7000
trusted library allocation
page read and write
10F0000
unkown
page read and write
817000
heap
page read and write
5863000
trusted library allocation
page read and write
825000
heap
page read and write
C73E000
unkown
page read and write
7FF5D751F000
unkown
page readonly
3981000
trusted library allocation
page read and write
73E000
stack
page read and write
566E000
stack
page read and write
570E000
stack
page read and write
853B000
stack
page read and write
7DBD000
stack
page read and write
3990000
trusted library allocation
page read and write
4AC8000
trusted library allocation
page read and write
7FF5D72D3000
unkown
page readonly
680000
heap
page read and write
5D24000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
5790000
heap
page read and write
39A9000
trusted library allocation
page read and write
10E0000
unkown
page read and write
1400000
trusted library allocation
page read and write
E7D6000
unkown
page read and write
9780000
unkown
page read and write
1430000
trusted library allocation
page read and write
300D000
stack
page read and write
5780000
heap
page read and write
AE1D000
stack
page read and write
F536000
unkown
page read and write
1360000
unkown
page readonly
73E000
stack
page read and write
7AB0000
unkown
page read and write
7FF5D76CD000
unkown
page readonly
630000
heap
page read and write
61CE000
stack
page read and write
9EE0000
unkown
page read and write
E30000
trusted library allocation
page read and write
3520000
trusted library allocation
page read and write
840000
heap
page read and write
7FF5D770F000
unkown
page readonly
3991000
trusted library allocation
page read and write
BFB8000
stack
page read and write
27C9000
heap
page read and write
3979000
trusted library allocation
page read and write
E87000
trusted library allocation
page read and write
7B0000
trusted library allocation
page read and write
C20000
remote allocation
page read and write
7FF5D706E000
unkown
page readonly
1070000
trusted library allocation
page read and write
1240000
unkown
page read and write
7FF5D77C7000
unkown
page readonly
10E0000
unkown
page read and write
7FF5D76D7000
unkown
page readonly
8980000
unkown
page read and write
7EEC0000
trusted library allocation
page execute and read and write
5912000
unkown
page readonly
5E4D000
stack
page read and write
9780000
unkown
page read and write
BEA0000
unkown
page readonly
10F7000
trusted library allocation
page execute and read and write
E6B000
trusted library allocation
page execute and read and write
3D00000
trusted library allocation
page read and write
10E0000
unkown
page read and write
10F0000
unkown
page read and write
2460000
heap
page read and write
10F0000
unkown
page read and write
7CD000
trusted library allocation
page execute and read and write
E7D5000
unkown
page read and write
1A2000
unkown
page readonly
513C000
trusted library allocation
page read and write
81E000
stack
page read and write
33F0000
unkown
page read and write
7FF5D76C8000
unkown
page readonly
7FF5D738E000
unkown
page readonly
2E90000
unkown
page read and write
10E0000
unkown
page read and write
2F9E000
stack
page read and write
19D000
stack
page read and write
B20000
heap
page read and write
7FF5D7442000
unkown
page readonly
2FF9000
stack
page read and write
319E000
stack
page read and write
3BEC000
trusted library allocation
page read and write
1540000
heap
page read and write
2E90000
unkown
page read and write
3994000
trusted library allocation
page read and write
7FF5D72D7000
unkown
page readonly
2B5B000
trusted library allocation
page read and write
1240000
unkown
page read and write
75F8000
unkown
page read and write
2B85000
trusted library allocation
page read and write
7E5000
trusted library allocation
page execute and read and write
8980000
unkown
page read and write
3290000
unkown
page read and write
4E47000
trusted library allocation
page read and write
4D61000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
178A000
trusted library allocation
page execute and read and write
5875000
trusted library allocation
page read and write
E7DC000
unkown
page read and write
E7D4000
unkown
page read and write
10E0000
unkown
page read and write
4D80000
heap
page execute and read and write
3D0D000
trusted library allocation
page read and write
E7D0000
unkown
page read and write
7D3E000
stack
page read and write
7FF5D7760000
unkown
page readonly
2EA0000
unkown
page read and write
1763000
trusted library allocation
page execute and read and write
4FE2000
unkown
page readonly
9EAB000
stack
page read and write
E67000
trusted library allocation
page execute and read and write
8980000
unkown
page read and write
7FF5D7284000
unkown
page readonly
E10000
unkown
page readonly
2FE4000
trusted library allocation
page read and write
1150000
unkown
page read and write
39A6000
trusted library allocation
page read and write
401000
unkown
page execute read
8390000
unkown
page read and write
5E2E000
stack
page read and write
7D6000
trusted library allocation
page execute and read and write
27D7000
trusted library allocation
page read and write
A39C000
unkown
page read and write
39AA000
trusted library allocation
page read and write
C8C8000
unkown
page read and write
1770000
trusted library allocation
page read and write
100C000
heap
page read and write
16E0000
heap
page read and write
1300000
trusted library allocation
page read and write
50AE000
trusted library allocation
page read and write
DB0000
heap
page read and write
23B4000
trusted library allocation
page read and write
1302000
trusted library allocation
page read and write
11A6000
trusted library allocation
page execute and read and write
4D7E000
stack
page read and write
3991000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
3992000
trusted library allocation
page read and write
12C4000
trusted library allocation
page read and write
BDC0000
unkown
page read and write
C1CC000
stack
page read and write
49FA000
unkown
page read and write
2BA5000
trusted library allocation
page read and write
7D0000
heap
page read and write
7FF5D7280000
unkown
page readonly
CC5000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
8390000
unkown
page read and write
2C9E000
stack
page read and write
35E4000
unkown
page read and write
84C000
heap
page read and write
3E0000
heap
page read and write
C20000
remote allocation
page read and write
3A92000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
BE0000
heap
page read and write
1240000
unkown
page read and write
7FF5D77DA000
unkown
page readonly
39ED000
trusted library allocation
page read and write
54EC000
trusted library allocation
page read and write
24CE000
stack
page read and write
AFE000
heap
page read and write
2E90000
unkown
page read and write
39A8000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
5356000
trusted library allocation
page read and write
2D80000
direct allocation
page read and write
BEB000
stack
page read and write
2E90000
unkown
page read and write
5A6E000
stack
page read and write
3050000
trusted library allocation
page read and write
9EE0000
unkown
page read and write
31F1000
trusted library allocation
page read and write
7FF5D7745000
unkown
page readonly
12A0000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
13D0000
heap
page read and write
7FF5D710B000
unkown
page readonly
2B03000
trusted library allocation
page read and write
10F0000
unkown
page read and write
541C000
trusted library allocation
page read and write
4AE2000
trusted library allocation
page read and write
7FF5D779E000
unkown
page readonly
5D30000
trusted library allocation
page execute and read and write
8980000
unkown
page read and write
17C0000
trusted library allocation
page read and write
22F0000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
7686000
unkown
page read and write
1200000
heap
page read and write
7FF5D77CD000
unkown
page readonly
C7BE000
unkown
page read and write
5195000
trusted library allocation
page read and write
2A09000
trusted library allocation
page read and write
E34000
trusted library allocation
page read and write
7C0000
trusted library allocation
page read and write
17EF000
stack
page read and write
5761000
trusted library allocation
page read and write
5403000
heap
page execute and read and write
10BF000
stack
page read and write
857000
heap
page read and write
2280000
trusted library allocation
page read and write
7B10000
unkown
page read and write
9A84000
unkown
page read and write
52F0000
heap
page execute and read and write
2EA0000
unkown
page read and write
112BE000
unkown
page read and write
10DE1000
unkown
page read and write
9EE0000
unkown
page read and write
8A0000
heap
page read and write
34DE000
trusted library allocation
page read and write
574C000
stack
page read and write
400000
unkown
page readonly
7AF1000
unkown
page read and write
7FF5D758D000
unkown
page readonly
7989000
stack
page read and write
2490000
trusted library allocation
page read and write
10E0000
unkown
page read and write
86E0000
unkown
page readonly
7FF5D7272000
unkown
page readonly
10F6000
stack
page read and write
3370000
unkown
page read and write
26BE000
stack
page read and write
8980000
unkown
page read and write
8AB000
heap
page read and write
3F0000
heap
page read and write
C615000
unkown
page read and write
397F000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
4A04000
trusted library allocation
page read and write
7D6000
trusted library allocation
page execute and read and write
777000
heap
page read and write
F70000
heap
page read and write
673E000
stack
page read and write
9A8E000
unkown
page read and write
EA7000
trusted library allocation
page read and write
7D2000
trusted library allocation
page read and write
2717000
trusted library allocation
page read and write
8360000
unkown
page read and write
8980000
unkown
page read and write
C60000
heap
page read and write
400000
unkown
page execute and read and write
434000
unkown
page read and write
7FF5D7385000
unkown
page readonly
8CB8000
stack
page read and write
69F0000
heap
page read and write
1534000
heap
page read and write
7FF5D7438000
unkown
page readonly
2B90000
trusted library allocation
page read and write
9700000
unkown
page read and write
4C60000
trusted library allocation
page read and write
446000
unkown
page readonly
B21000
heap
page read and write
7DA000
trusted library allocation
page execute and read and write
39AB000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
125E000
stack
page read and write
BD4000
heap
page read and write
7FF5D7837000
unkown
page readonly
50BC000
stack
page read and write
92E000
stack
page read and write
7FF5D72E9000
unkown
page readonly
5080000
trusted library allocation
page read and write
2E90000
unkown
page read and write
647000
heap
page read and write
371E000
stack
page read and write
9EE0000
unkown
page read and write
243C000
stack
page read and write
585A000
trusted library allocation
page read and write
3971000
trusted library allocation
page read and write
3046000
trusted library allocation
page read and write
60CD000
stack
page read and write
769A000
unkown
page read and write
1000000
heap
page read and write
63DC000
stack
page read and write
A40E000
unkown
page read and write
3988000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
2B28000
trusted library allocation
page read and write
24B0000
heap
page read and write
E3F000
heap
page read and write
CA0000
heap
page execute and read and write
687B000
stack
page read and write
7FF5D7682000
unkown
page readonly
7FF5D7523000
unkown
page readonly
8BA000
heap
page read and write
7110000
heap
page read and write
A60000
trusted library allocation
page read and write
10E0000
unkown
page read and write
9780000
unkown
page read and write
7FF5D7309000
unkown
page readonly
69FC000
stack
page read and write
8980000
unkown
page read and write
9AF9000
unkown
page read and write
1150000
unkown
page read and write
42D000
unkown
page read and write
8980000
unkown
page read and write
2BA1000
trusted library allocation
page read and write
41E000
unkown
page readonly
7AE000
stack
page read and write
EB5000
stack
page read and write
A1AF000
stack
page read and write
4ADD000
trusted library allocation
page read and write
8E4E000
stack
page read and write
1470000
heap
page read and write
E5D0000
unkown
page read and write
6EAE000
stack
page read and write
5F4E000
stack
page read and write
1F0000
heap
page read and write
9780000
unkown
page read and write
27B7000
trusted library allocation
page read and write
5297000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
2267000
trusted library allocation
page execute and read and write
9780000
unkown
page read and write
A12F000
stack
page read and write
10E0000
unkown
page read and write
7FF5D769E000
unkown
page readonly
102B000
heap
page read and write
1470000
heap
page read and write
18D1000
trusted library allocation
page read and write
7FF5D72BF000
unkown
page readonly
4BFE000
stack
page read and write
5D20000
trusted library allocation
page read and write
68FC000
stack
page read and write
385E000
stack
page read and write
560F000
stack
page read and write
768E000
unkown
page read and write
1150000
unkown
page read and write
32A9000
trusted library allocation
page read and write
511E000
stack
page read and write
142A000
trusted library allocation
page execute and read and write
3981000
trusted library allocation
page read and write
5316000
trusted library allocation
page read and write
2A16000
trusted library allocation
page read and write
2BAF000
trusted library allocation
page read and write
4E55000
trusted library allocation
page read and write
3BE2000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
1437000
trusted library allocation
page execute and read and write
130B000
trusted library allocation
page execute and read and write
3BA1000
trusted library allocation
page read and write
10E0000
unkown
page read and write
10E0000
unkown
page read and write
35D3000
unkown
page read and write
E56000
trusted library allocation
page execute and read and write
49A8000
unkown
page read and write
9780000
unkown
page read and write
50C5000
trusted library allocation
page read and write
E14000
trusted library allocation
page read and write
9EE0000
unkown
page read and write
39A7000
trusted library allocation
page read and write
7DF4F2480000
unkown
page readonly
10E0000
unkown
page read and write
A3AC000
unkown
page read and write
1130000
unkown
page read and write
39D8000
trusted library allocation
page read and write
10F0000
unkown
page read and write
C20000
heap
page read and write
149C000
heap
page read and write
1210000
unkown
page read and write
10E0000
unkown
page read and write
621A000
heap
page read and write
29D0000
trusted library allocation
page read and write
8390000
unkown
page read and write
4C20000
trusted library allocation
page read and write
10E0000
unkown
page read and write
4873000
trusted library allocation
page read and write
7FF5D66E8000
unkown
page readonly
9EE0000
unkown
page read and write
8980000
unkown
page read and write
23B0000
trusted library allocation
page read and write
1150000
unkown
page read and write
50C2000
trusted library allocation
page read and write
873000
trusted library allocation
page execute and read and write
7FF5D7425000
unkown
page readonly
57B4000
trusted library allocation
page read and write
7FF5D7462000
unkown
page readonly
1780000
trusted library allocation
page read and write
B59000
heap
page read and write
7FF5D71F9000
unkown
page readonly
645000
heap
page read and write
7FF5D7336000
unkown
page readonly
3991000
trusted library allocation
page read and write
50D4000
trusted library allocation
page read and write
9780000
unkown
page read and write
35B3000
unkown
page read and write
35D1000
unkown
page read and write
128B000
stack
page read and write
462000
unkown
page readonly
52E5000
trusted library allocation
page read and write
10F0000
unkown
page read and write
3180000
unkown
page read and write
5153000
trusted library allocation
page read and write
5463000
unkown
page read and write
2EA0000
unkown
page read and write
5A70000
heap
page execute and read and write
768C000
unkown
page read and write
A9A0000
unkown
page read and write
50B1000
trusted library allocation
page read and write
7FF5D7820000
unkown
page readonly
39F4000
trusted library allocation
page read and write
1250000
heap
page read and write
11B0000
trusted library allocation
page read and write
9EE0000
unkown
page read and write
BC8000
heap
page read and write
10E0000
unkown
page read and write
66FE000
stack
page read and write
10E6000
trusted library allocation
page execute and read and write
10F0000
unkown
page read and write
136B000
heap
page read and write
367D000
trusted library allocation
page read and write
39AC000
trusted library allocation
page read and write
AA92000
unkown
page read and write
9D5000
heap
page read and write
11ED000
trusted library allocation
page execute and read and write
131F000
heap
page read and write
761E000
unkown
page read and write
7FF5D781A000
unkown
page readonly
10E0000
unkown
page read and write
42A000
unkown
page read and write
7FF5D75BF000
unkown
page readonly
7FF5D74FA000
unkown
page readonly
9EE0000
unkown
page read and write
A73000
trusted library allocation
page execute and read and write
3BB1000
trusted library allocation
page read and write
BE0000
heap
page read and write
5D0C000
stack
page read and write
2FC0000
heap
page read and write
53DE000
stack
page read and write
9AC3000
unkown
page read and write
9B000
stack
page read and write
BD2000
heap
page read and write
ABF000
stack
page read and write
9EE0000
unkown
page read and write
39C1000
trusted library allocation
page read and write
3EF7000
trusted library allocation
page read and write
CF0000
heap
page read and write
50E0000
trusted library allocation
page read and write
8980000
unkown
page read and write
8390000
unkown
page read and write
2BC8000
trusted library allocation
page read and write
BD6000
heap
page read and write
9780000
unkown
page read and write
39A9000
trusted library allocation
page read and write
9780000
unkown
page read and write
39C7000
trusted library allocation
page read and write
8390000
unkown
page read and write
3980000
trusted library allocation
page read and write
1184000
trusted library allocation
page read and write
462000
unkown
page readonly
2EA0000
unkown
page read and write
7691000
unkown
page read and write
7FF5D72C8000
unkown
page readonly
39B0000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
51B0000
heap
page read and write
12A0000
heap
page read and write
2EA0000
unkown
page read and write
9780000
unkown
page read and write
62C0000
heap
page read and write
397A000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
C20000
heap
page read and write
5192000
trusted library allocation
page read and write
9D0000
heap
page read and write
140D000
trusted library allocation
page execute and read and write
3971000
trusted library allocation
page read and write
112B4000
unkown
page read and write
91F0000
unkown
page readonly
36A5000
trusted library allocation
page read and write
7FF5D72BD000
unkown
page readonly
1150000
unkown
page read and write
4DCE000
stack
page read and write
574E000
stack
page read and write
35CF000
unkown
page read and write
9C0000
heap
page read and write
3991000
trusted library allocation
page read and write
7FF5D720F000
unkown
page readonly
4277000
trusted library allocation
page read and write
7FF5D745B000
unkown
page readonly
48A0000
heap
page read and write
35B0000
unkown
page read and write
470000
heap
page read and write
7B0000
trusted library allocation
page read and write
49E1000
trusted library allocation
page read and write
7FF5D7808000
unkown
page readonly
3180000
unkown
page read and write
10E0000
unkown
page read and write
3471000
trusted library allocation
page read and write
E7D0000
unkown
page read and write
9EE0000
unkown
page read and write
3991000
trusted library allocation
page read and write
13EE000
stack
page read and write
F0C000
heap
page read and write
BCA000
heap
page read and write
1380000
heap
page read and write
B28000
heap
page read and write
7FF5D77A8000
unkown
page readonly
2E90000
unkown
page read and write
E7DF000
unkown
page read and write
24C0000
trusted library allocation
page read and write
566E000
stack
page read and write
500E000
stack
page read and write
4C93000
heap
page execute and read and write
3B1A000
trusted library allocation
page read and write
18D7000
trusted library allocation
page read and write
3153000
trusted library allocation
page read and write
8980000
unkown
page read and write
4B8F000
stack
page read and write
9EE0000
unkown
page read and write
7FF5D783B000
unkown
page readonly
3B42000
trusted library allocation
page read and write
BA9000
heap
page read and write
592E000
stack
page read and write
3A79000
trusted library allocation
page read and write
3370000
unkown
page read and write
519E000
trusted library allocation
page read and write
8390000
unkown
page read and write
14C7000
heap
page read and write
510000
heap
page read and write
12E0000
trusted library allocation
page read and write
10002000
unkown
page readonly
40B000
unkown
page execute read
851000
heap
page read and write
7FF5D777A000
unkown
page readonly
7631000
unkown
page read and write
AD0000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
5345000
trusted library allocation
page read and write
39BE000
trusted library allocation
page read and write
11B7000
trusted library allocation
page execute and read and write
E95000
heap
page read and write
1460000
trusted library allocation
page execute and read and write
3180000
unkown
page read and write
64BE000
stack
page read and write
2E90000
unkown
page read and write
6AFD000
stack
page read and write
7B60000
unkown
page readonly
10E0000
unkown
page read and write
36C1000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
50A8000
trusted library allocation
page read and write
4920000
heap
page read and write
3988000
trusted library allocation
page read and write
9780000
unkown
page read and write
52BE000
stack
page read and write
7FF5D7700000
unkown
page readonly
1030000
trusted library allocation
page read and write
5340000
heap
page execute and read and write
143E000
stack
page read and write
1240000
unkown
page read and write
86D0000
unkown
page readonly
1420000
trusted library allocation
page read and write
866000
heap
page read and write
12F6000
trusted library allocation
page execute and read and write
6790000
heap
page read and write
58DE000
stack
page read and write
879000
heap
page read and write
180E000
stack
page read and write
B43000
heap
page read and write
CD6000
trusted library allocation
page read and write
4ECF000
stack
page read and write
4A80000
heap
page read and write
3988000
trusted library allocation
page read and write
10C4000
trusted library allocation
page read and write
6C3D000
stack
page read and write
2E0A000
heap
page read and write
57BB000
trusted library allocation
page read and write
7FF5D7289000
unkown
page readonly
8980000
unkown
page read and write
98FD000
stack
page read and write
87F0000
heap
page read and write
7FF5D752F000
unkown
page readonly
3785000
trusted library allocation
page read and write
1544000
unkown
page readonly
515000
heap
page read and write
4990000
heap
page read and write
2878000
heap
page read and write
112B9000
unkown
page read and write
C00000
trusted library allocation
page read and write
29F5000
trusted library allocation
page read and write
397D000
trusted library allocation
page read and write
651E000
stack
page read and write
2B0F000
trusted library allocation
page read and write
2D10000
heap
page read and write
2B05000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
10F0000
unkown
page read and write
3180000
unkown
page read and write
AF0000
heap
page read and write
9A8C000
unkown
page read and write
B3D000
heap
page read and write
48A1000
heap
page read and write
10E0000
unkown
page read and write
47A000
stack
page read and write
AE0000
trusted library allocation
page execute and read and write
112B8000
unkown
page read and write
35D5000
unkown
page read and write
9EE0000
unkown
page read and write
C460000
unkown
page read and write
740000
heap
page read and write
7FF5D7764000
unkown
page readonly
1351000
heap
page read and write
770000
heap
page read and write
1240000
unkown
page read and write
3980000
trusted library allocation
page read and write
8980000
unkown
page read and write
41E000
unkown
page readonly
1410000
heap
page execute and read and write
39B0000
trusted library allocation
page read and write
FBE000
stack
page read and write
7FF5D7398000
unkown
page readonly
4AEA000
unkown
page read and write
5026000
unkown
page readonly
7FF5D765F000
unkown
page readonly
25D1000
trusted library allocation
page read and write
8390000
unkown
page read and write
8980000
unkown
page read and write
4AE5000
trusted library allocation
page read and write
10E0000
unkown
page read and write
3981000
trusted library allocation
page read and write
E13000
trusted library allocation
page execute and read and write
5CED000
stack
page read and write
10F0000
unkown
page read and write
8390000
unkown
page read and write
2C30000
heap
page read and write
12F7000
trusted library allocation
page read and write
5910000
unkown
page readonly
35BD000
unkown
page read and write
9780000
unkown
page read and write
3971000
trusted library allocation
page read and write
10F0000
unkown
page read and write
30E5000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
2AF0000
heap
page execute and read and write
57A0000
heap
page read and write
498E000
stack
page read and write
39EC000
trusted library allocation
page read and write
BD2000
heap
page read and write
10E0000
unkown
page read and write
9A90000
unkown
page read and write
77DB000
unkown
page read and write
25CF000
stack
page read and write
9EE0000
unkown
page read and write
1240000
unkown
page read and write
62DD000
stack
page read and write
6DAE000
stack
page read and write
2E90000
unkown
page read and write
1240000
unkown
page read and write
1460000
trusted library allocation
page read and write
54DF000
stack
page read and write
CD4000
trusted library allocation
page read and write
10E0000
unkown
page read and write
585E000
trusted library allocation
page read and write
49DE000
trusted library allocation
page read and write
BD2000
heap
page read and write
1150000
unkown
page read and write
8F0000
heap
page read and write
1170000
trusted library allocation
page read and write
93E000
stack
page read and write
39A8000
trusted library allocation
page read and write
7FF5D75DF000
unkown
page readonly
12D0000
unkown
page readonly
3981000
trusted library allocation
page read and write
7FF5D77F7000
unkown
page readonly
41F7000
trusted library allocation
page read and write
112BC000
unkown
page read and write
7A0000
trusted library allocation
page read and write
2EAD000
stack
page read and write
7FF5D7558000
unkown
page readonly
BB3000
heap
page read and write
398C000
trusted library allocation
page read and write
7B4000
trusted library allocation
page read and write
4DCE000
stack
page read and write
640000
heap
page read and write
2E90000
unkown
page read and write
BAE000
heap
page read and write
6EA000
heap
page read and write
10CD000
trusted library allocation
page execute and read and write
E60000
trusted library allocation
page read and write
2BE3000
unkown
page readonly
1210000
unkown
page read and write
13A7000
heap
page read and write
4E80000
heap
page read and write
7C0000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
E7D3000
unkown
page read and write
10F0000
unkown
page read and write
9EE0000
unkown
page read and write
57B6000
trusted library allocation
page read and write
112B2000
unkown
page read and write
7FF5D75C1000
unkown
page readonly
5870000
heap
page read and write
39DB000
trusted library allocation
page read and write
7FF5D76D5000
unkown
page readonly
1240000
unkown
page read and write
9C000
stack
page read and write
10F0000
unkown
page read and write
10000000
unkown
page readonly
4E2E000
trusted library allocation
page read and write
EF0000
heap
page read and write
C47000
heap
page read and write
9BE000
stack
page read and write
118D000
trusted library allocation
page execute and read and write
1210000
unkown
page read and write
C9CD000
unkown
page read and write
39A1000
trusted library allocation
page read and write
7FF5D72CE000
unkown
page readonly
BC7000
heap
page read and write
4DE0000
heap
page execute and read and write
E7D9000
unkown
page read and write
1240000
unkown
page read and write
9AB4000
unkown
page read and write
A3B6000
unkown
page read and write
436000
unkown
page readonly
9D7000
heap
page read and write
7F0000
heap
page read and write
87B000
heap
page read and write
8980000
unkown
page read and write
B30000
heap
page read and write
AB2000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
BA3000
heap
page read and write
39A1000
trusted library allocation
page read and write
24F2000
trusted library allocation
page read and write
BC5000
heap
page read and write
4A00000
trusted library allocation
page read and write
10E0000
unkown
page read and write
4DD5000
trusted library allocation
page read and write
584E000
stack
page read and write
9EE0000
unkown
page read and write
12F7000
heap
page read and write
400000
unkown
page readonly
7E0000
heap
page read and write
7FF5D705D000
unkown
page readonly
5479000
unkown
page read and write
2DD0000
trusted library allocation
page read and write
CF6000
stack
page read and write
E47000
trusted library allocation
page execute and read and write
50FC000
trusted library allocation
page read and write
5263000
trusted library allocation
page read and write
7FF5D719C000
unkown
page readonly
7FF5D7722000
unkown
page readonly
57CE000
trusted library allocation
page read and write
D0B000
stack
page read and write
5023000
trusted library allocation
page read and write
E70000
trusted library allocation
page execute and read and write
C5F4000
unkown
page read and write
39A7000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
1090000
heap
page read and write
F65000
unkown
page execute read
5030000
trusted library allocation
page read and write
2BE3000
unkown
page readonly
2E90000
unkown
page read and write
2D70000
heap
page read and write
E4B000
trusted library allocation
page execute and read and write
E81000
trusted library allocation
page read and write
BF0000
trusted library allocation
page read and write
E7DF000
unkown
page read and write
7FF5D6ABD000
unkown
page readonly
3CCF000
stack
page read and write
BC3000
heap
page read and write
7FF5D7065000
unkown
page readonly
A251000
unkown
page read and write
4D8E000
stack
page read and write
1327000
heap
page read and write
2CF0000
heap
page read and write
3981000
trusted library allocation
page read and write
4ADE000
stack
page read and write
2EA0000
unkown
page read and write
5495000
trusted library allocation
page read and write
3D79000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
35DC000
unkown
page read and write
1406000
trusted library allocation
page read and write
1792000
trusted library allocation
page read and write
3996000
trusted library allocation
page read and write
4ADA000
unkown
page read and write
8390000
unkown
page read and write
3B6D000
trusted library allocation
page read and write
3975000
trusted library allocation
page read and write
BD7000
heap
page read and write
8980000
unkown
page read and write
1300000
heap
page read and write
526E000
trusted library allocation
page read and write
B20000
heap
page read and write
3988000
trusted library allocation
page read and write
399A000
trusted library allocation
page read and write
9B0B000
unkown
page read and write
9780000
unkown
page read and write
18F7000
heap
page read and write
9780000
unkown
page read and write
2A48000
trusted library allocation
page read and write
B9E000
heap
page read and write
6990000
heap
page read and write
7FF5D6A4B000
unkown
page readonly
49ED000
trusted library allocation
page read and write
7FF5D7450000
unkown
page readonly
3BD1000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
2BF0000
heap
page read and write
39E9000
trusted library allocation
page read and write
10C5000
heap
page read and write
262E000
stack
page read and write
C5FA000
unkown
page read and write
39C0000
trusted library allocation
page read and write
10F0000
unkown
page read and write
2EA0000
unkown
page read and write
24ED000
trusted library allocation
page read and write
640000
heap
page read and write
7FF5D744E000
unkown
page readonly
1434000
trusted library allocation
page read and write
B85A000
stack
page read and write
7FF5D75F6000
unkown
page readonly
4EB000
stack
page read and write
6740000
heap
page read and write
3991000
trusted library allocation
page read and write
874000
trusted library allocation
page read and write
4B00000
unkown
page read and write
12D4000
trusted library allocation
page read and write
F3E000
stack
page read and write
1F0000
heap
page read and write
4BE7000
trusted library allocation
page read and write
7FF5D75CB000
unkown
page readonly
7FF5D76E8000
unkown
page readonly
B43000
heap
page read and write
3EF5000
trusted library allocation
page read and write
39B2000
trusted library allocation
page read and write
14FE000
stack
page read and write
3ED1000
trusted library allocation
page read and write
1070000
heap
page read and write
A233000
unkown
page read and write
4931000
heap
page read and write
439000
unkown
page readonly
7DF4F2461000
unkown
page execute read
9EE0000
unkown
page read and write
362A000
unkown
page read and write
5466000
trusted library allocation
page read and write
19D000
stack
page read and write
B4D0000
unkown
page readonly
1040000
trusted library allocation
page read and write
8390000
unkown
page read and write
277F000
stack
page read and write
84E000
heap
page read and write
7618000
unkown
page read and write
67EB000
heap
page read and write
81B000
heap
page read and write
39EE000
trusted library allocation
page read and write
30D0000
direct allocation
page read and write
2E0E000
heap
page read and write
5A5E000
stack
page read and write
BD1000
heap
page read and write
1090000
heap
page read and write
7D0000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
B28000
heap
page read and write
1200000
heap
page read and write
2473000
trusted library allocation
page read and write
7FF5D7075000
unkown
page readonly
668E000
stack
page read and write
49D8000
trusted library allocation
page read and write
4C24000
trusted library allocation
page read and write
BC7000
heap
page read and write
7FF5D770A000
unkown
page readonly
882000
heap
page read and write
90B000
stack
page read and write
8390000
unkown
page read and write
2EA0000
unkown
page read and write
9EE0000
unkown
page read and write
8980000
unkown
page read and write
5400000
heap
page execute and read and write
3021000
trusted library allocation
page read and write
4BDE000
trusted library allocation
page read and write
10E0000
unkown
page read and write
9EE0000
unkown
page read and write
2EC0000
unkown
page readonly
10F0000
unkown
page read and write
345E000
stack
page read and write
13D5000
heap
page read and write
30FF000
stack
page read and write
7FF5D748A000
unkown
page readonly
57B2000
trusted library allocation
page read and write
BF4000
trusted library allocation
page read and write
9780000
unkown
page read and write
5487000
trusted library allocation
page read and write
1490000
heap
page read and write
827000
heap
page read and write
B3D000
heap
page read and write
1790000
trusted library allocation
page read and write
3180000
unkown
page read and write
97FF000
stack
page read and write
1080000
heap
page read and write
25B0000
heap
page execute and read and write
1150000
unkown
page read and write
7FF5D6BEF000
unkown
page readonly
5271000
trusted library allocation
page read and write
29FA000
trusted library allocation
page read and write
584E000
stack
page read and write
1240000
unkown
page read and write
960000
heap
page read and write
1183000
trusted library allocation
page execute and read and write
990000
trusted library allocation
page execute and read and write
1404000
trusted library allocation
page read and write
54E2000
trusted library allocation
page read and write
AA0F000
unkown
page read and write
8FD9000
stack
page read and write
B99000
heap
page read and write
3520000
unkown
page readonly
7FF5D69BB000
unkown
page readonly
1098000
heap
page read and write
7FF5D7244000
unkown
page readonly
1430000
trusted library allocation
page read and write
3BA7000
trusted library allocation
page read and write
AFBE000
stack
page read and write
509E000
trusted library allocation
page read and write
536E000
stack
page read and write
6EA000
heap
page read and write
3991000
trusted library allocation
page read and write
C5FD000
unkown
page read and write
BCB000
heap
page read and write
E00000
trusted library allocation
page read and write
1130000
unkown
page read and write
BE0000
heap
page read and write
7FF5D77D2000
unkown
page readonly
9780000
unkown
page read and write
10F7000
heap
page read and write
7FF5D728E000
unkown
page readonly
47BE000
stack
page read and write
8980000
unkown
page read and write
40A000
unkown
page write copy
7FF5D7262000
unkown
page readonly
529E000
stack
page read and write
57B0000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
570E000
stack
page read and write
1308000
heap
page read and write
39A1000
trusted library allocation
page read and write
7FF5D7458000
unkown
page readonly
BF0000
trusted library allocation
page execute and read and write
865000
heap
page read and write
7654000
unkown
page read and write
10E0000
unkown
page read and write
5084000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
3975000
trusted library allocation
page read and write
18E0000
trusted library allocation
page read and write
9700000
unkown
page read and write
4D9F000
stack
page read and write
7B80000
unkown
page readonly
1267000
trusted library allocation
page execute and read and write
7FF5D774C000
unkown
page readonly
11E0000
trusted library allocation
page read and write
8980000
unkown
page read and write
FAB000
heap
page read and write
2EA1000
unkown
page read and write
7FF5D7604000
unkown
page readonly
3650000
trusted library allocation
page read and write
5A0E000
stack
page read and write
1440000
heap
page read and write
8980000
unkown
page read and write
12CE000
trusted library allocation
page read and write
927D000
stack
page read and write
112B3000
unkown
page read and write
7FF5D7404000
unkown
page readonly
2B50000
trusted library allocation
page read and write
BD2000
heap
page read and write
9780000
unkown
page read and write
2EA0000
unkown
page read and write
FF0000
unkown
page readonly
C1E000
stack
page read and write
258F000
stack
page read and write
2EA0000
unkown
page read and write
AAA9000
unkown
page read and write
1240000
unkown
page read and write
7FF5D720A000
unkown
page readonly
4A70000
heap
page read and write
314E000
stack
page read and write
9780000
unkown
page read and write
2E90000
unkown
page read and write
2CB1000
trusted library allocation
page read and write
7FF5D71D7000
unkown
page readonly
3980000
trusted library allocation
page read and write
CA3000
trusted library allocation
page execute and read and write
29F7000
trusted library allocation
page read and write
11BB000
trusted library allocation
page execute and read and write
B3D000
heap
page read and write
C40000
heap
page read and write
2D4E000
stack
page read and write
B43000
heap
page read and write
7BD000
trusted library allocation
page execute and read and write
1150000
unkown
page read and write
3180000
unkown
page read and write
2EA0000
unkown
page read and write
882000
heap
page read and write
7B4000
trusted library allocation
page read and write
3630000
unkown
page readonly
2B01000
trusted library allocation
page read and write
138E000
stack
page read and write
39B7000
trusted library allocation
page read and write
7C90000
unkown
page read and write
3981000
trusted library allocation
page read and write
10E14000
unkown
page read and write
C5F0000
unkown
page read and write
7FF5D7077000
unkown
page readonly
52DE000
stack
page read and write
3110000
unkown
page readonly
3787000
trusted library allocation
page read and write
9780000
unkown
page read and write
10E0000
unkown
page read and write
24E6000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
C48000
heap
page read and write
3E66000
trusted library allocation
page read and write
6207000
heap
page read and write
BA0000
heap
page read and write
1383000
heap
page read and write
87D000
trusted library allocation
page execute and read and write
3981000
trusted library allocation
page read and write
697C000
stack
page read and write
1403000
trusted library allocation
page execute and read and write
39A5000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
3B01000
trusted library allocation
page read and write
C31000
unkown
page execute read
BC5000
heap
page read and write
8ECC000
stack
page read and write
5250000
trusted library allocation
page read and write
1240000
unkown
page read and write
F4F3000
unkown
page read and write
9780000
unkown
page read and write
33C0000
unkown
page read and write
8980000
unkown
page read and write
10F0000
unkown
page read and write
1A0000
unkown
page readonly
8D1000
heap
page read and write
7FF5D7202000
unkown
page readonly
9780000
unkown
page read and write
3A71000
heap
page read and write
C14000
heap
page read and write
C4E000
stack
page read and write
4BCE000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
1166000
heap
page read and write
BE0000
heap
page read and write
26C5000
trusted library allocation
page read and write
5283000
trusted library allocation
page read and write
1240000
unkown
page read and write
3981000
trusted library allocation
page read and write
B43000
heap
page read and write
487D000
stack
page read and write
3160000
unkown
page read and write
F60000
heap
page read and write
1544000
unkown
page readonly
641D000
stack
page read and write
39A6000
trusted library allocation
page read and write
BCB000
heap
page read and write
7FF5CE343000
unkown
page readonly
57C0000
heap
page read and write
1150000
unkown
page read and write
2DC0000
trusted library allocation
page read and write
8980000
unkown
page read and write
2B6E000
trusted library allocation
page read and write
B43000
heap
page read and write
436C000
trusted library allocation
page read and write
8980000
unkown
page read and write
F70000
heap
page read and write
115E000
stack
page read and write
2E90000
unkown
page read and write
9A76000
unkown
page read and write
49B5000
trusted library allocation
page read and write
4264000
trusted library allocation
page read and write
7FF5D71E6000
unkown
page readonly
3040000
trusted library allocation
page read and write
7FF5D7795000
unkown
page readonly
3991000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
B43000
heap
page read and write
2B4E000
stack
page read and write
10E0000
unkown
page read and write
35CD000
unkown
page read and write
87D000
heap
page read and write
27C0000
heap
page read and write
4A10000
trusted library allocation
page read and write
8390000
unkown
page read and write
7FF5D7534000
unkown
page readonly
12D3000
trusted library allocation
page execute and read and write
A80000
trusted library allocation
page read and write
55DE000
stack
page read and write
24DA000
trusted library allocation
page read and write
355F000
stack
page read and write
10F0000
unkown
page read and write
39F4000
trusted library allocation
page read and write
10E0000
unkown
page read and write
879000
heap
page read and write
3100000
heap
page execute and read and write
39F4000
trusted library allocation
page read and write
7DF4F24A1000
unkown
page execute read
C46F000
unkown
page read and write
5300000
trusted library allocation
page execute and read and write
3155000
trusted library allocation
page read and write
4ABC000
trusted library allocation
page read and write
1150000
unkown
page read and write
10E0000
unkown
page read and write
39F4000
trusted library allocation
page read and write
7FF5D75D6000
unkown
page readonly
2EA0000
unkown
page read and write
1150000
unkown
page read and write
1008000
heap
page read and write
5474000
trusted library allocation
page read and write
9AAC000
unkown
page read and write
2BA3000
trusted library allocation
page read and write
3041000
unkown
page read and write
5050000
trusted library allocation
page read and write
7FF5D6BE4000
unkown
page readonly
5085000
trusted library allocation
page read and write
39EC000
trusted library allocation
page read and write
4A12000
unkown
page read and write
399F000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
1171000
trusted library allocation
page read and write
BD3000
heap
page read and write
3981000
trusted library allocation
page read and write
4EEF000
stack
page read and write
3997000
trusted library allocation
page read and write
13C3000
heap
page read and write
B28000
heap
page read and write
4AB0000
unkown
page read and write
3981000
trusted library allocation
page read and write
9A92000
unkown
page read and write
590000
heap
page read and write
10E0000
unkown
page read and write
3980000
trusted library allocation
page read and write
564F000
stack
page read and write
2EF1000
trusted library allocation
page read and write
57C4000
trusted library allocation
page read and write
7FF5D72D0000
unkown
page readonly
1400000
trusted library allocation
page read and write
4BC6000
trusted library allocation
page read and write
134E000
stack
page read and write
10DF0000
unkown
page read and write
57E2000
trusted library allocation
page read and write
38A1000
trusted library allocation
page read and write
3180000
unkown
page read and write
6B13000
heap
page read and write
64E000
heap
page read and write
531B000
trusted library allocation
page read and write
2EEF000
stack
page read and write
B9C000
heap
page read and write
10E0000
unkown
page read and write
7FF5D71C8000
unkown
page readonly
326F000
stack
page read and write
97E000
stack
page read and write
2FA0000
heap
page read and write
8980000
unkown
page read and write
1150000
unkown
page read and write
1150000
unkown
page read and write
5410000
trusted library allocation
page read and write
8391000
unkown
page read and write
1150000
heap
page read and write
4FF0000
trusted library allocation
page read and write
8DCB000
stack
page read and write
9B2C000
unkown
page read and write
3992000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
253E000
stack
page read and write
900000
trusted library allocation
page read and write
7FF5D723C000
unkown
page readonly
2440000
heap
page execute and read and write
AF1000
trusted library allocation
page read and write
C617000
unkown
page read and write
10F0000
trusted library allocation
page read and write
5369000
trusted library allocation
page read and write
CE0000
heap
page read and write
FF0000
heap
page read and write
BA9000
heap
page read and write
401000
unkown
page execute read
5D27000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
3180000
unkown
page read and write
5354000
trusted library allocation
page read and write
10FB000
trusted library allocation
page execute and read and write
3180000
unkown
page read and write
10E0000
unkown
page read and write
EB0000
heap
page read and write
8C0000
heap
page read and write
3977000
trusted library allocation
page read and write
10F0000
unkown
page read and write
5460000
trusted library allocation
page read and write
4AC5000
trusted library allocation
page read and write
1478000
heap
page read and write
7F8000
heap
page read and write
DAE000
stack
page read and write
8390000
unkown
page read and write
B980000
unkown
page readonly
2D1F000
stack
page read and write
5025000
trusted library allocation
page read and write
3340000
unkown
page read and write
3E50000
heap
page read and write
399B000
trusted library allocation
page read and write
10E0000
unkown
page read and write
7FF5D7507000
unkown
page readonly
40A000
unkown
page write copy
BD2000
heap
page read and write
3271000
trusted library allocation
page read and write
B8F000
stack
page read and write
C8C5000
unkown
page read and write
5040000
trusted library allocation
page execute and read and write
9D0000
heap
page read and write
97B0000
unkown
page read and write
9EE0000
unkown
page read and write
10E0000
unkown
page read and write
7693000
unkown
page read and write
554E000
stack
page read and write
7FF5D77E3000
unkown
page readonly
CEB000
trusted library allocation
page execute and read and write
9780000
unkown
page read and write
41F1000
trusted library allocation
page read and write
57B0000
heap
page read and write
7FF5D7488000
unkown
page readonly
B00000
trusted library allocation
page read and write
7FF5D75B3000
unkown
page readonly
2EA0000
unkown
page read and write
9700000
unkown
page read and write
3991000
trusted library allocation
page read and write
12BB000
trusted library allocation
page read and write
9B41000
unkown
page read and write
9700000
unkown
page read and write
7FF5D77DD000
unkown
page readonly
3981000
trusted library allocation
page read and write
CC0000
heap
page read and write
3976000
trusted library allocation
page read and write
FDE000
stack
page read and write
6DE000
heap
page read and write
B28000
heap
page read and write
10F0000
unkown
page read and write
7DF4F2460000
unkown
page readonly
4BCB000
trusted library allocation
page read and write
7DA000
trusted library allocation
page execute and read and write
53BE000
stack
page read and write
5017000
trusted library allocation
page read and write
11F7000
trusted library allocation
page read and write
6020000
unkown
page readonly
C621000
unkown
page read and write
D60000
heap
page read and write
9FE000
stack
page read and write
3706000
trusted library allocation
page read and write
E44000
heap
page read and write
2E00000
heap
page read and write
157A000
heap
page read and write
7C70000
unkown
page readonly
89A000
trusted library allocation
page execute and read and write
3976000
trusted library allocation
page read and write
35D7000
trusted library allocation
page read and write
7FF5D7691000
unkown
page readonly
1410000
trusted library allocation
page read and write
7E7000
trusted library allocation
page execute and read and write
3180000
unkown
page read and write
AA40000
unkown
page read and write
7FF5D7641000
unkown
page readonly
2B60000
trusted library allocation
page read and write
10F0000
unkown
page read and write
C61B000
unkown
page read and write
BCD000
heap
page read and write
57BE000
trusted library allocation
page read and write
C806000
unkown
page read and write
12F0000
trusted library allocation
page read and write
10F0000
unkown
page read and write
8980000
unkown
page read and write
10C7000
heap
page read and write
4A90000
unkown
page read and write
3044000
trusted library allocation
page read and write
4C1E000
stack
page read and write
2CB7000
trusted library allocation
page read and write
10004000
unkown
page readonly
10E0000
unkown
page read and write
49F2000
trusted library allocation
page read and write
9D67000
unkown
page read and write
57F6000
trusted library allocation
page read and write
8980000
unkown
page read and write
B3D000
heap
page read and write
8A46000
unkown
page read and write
4C3E000
stack
page read and write
3991000
trusted library allocation
page read and write
B03B000
stack
page read and write
2E90000
unkown
page read and write
5370000
heap
page read and write
13CD000
stack
page read and write
5DD0000
heap
page read and write
BAF000
heap
page read and write
1C0000
unkown
page readonly
2F7E000
stack
page read and write
EF5000
heap
page read and write
3981000
trusted library allocation
page read and write
4C4E000
stack
page read and write
EA1000
trusted library allocation
page read and write
7FF5D71EA000
unkown
page readonly
3ACA000
trusted library allocation
page read and write
3180000
unkown
page read and write
8EB000
heap
page read and write
2DA4000
heap
page read and write
8B0000
heap
page read and write
E7D0000
unkown
page read and write
FB6000
stack
page read and write
ABB000
trusted library allocation
page execute and read and write
10F0000
unkown
page read and write
8980000
unkown
page read and write
3981000
trusted library allocation
page read and write
2A3E000
stack
page read and write
1150000
unkown
page read and write
629E000
stack
page read and write
C83000
unkown
page execute read
7DD0000
heap
page read and write
9780000
unkown
page read and write
33B0000
unkown
page readonly
BA2000
heap
page read and write
7FF5D743F000
unkown
page readonly
EF6000
stack
page read and write
35FF000
trusted library allocation
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
5A6E000
stack
page read and write
5752000
trusted library allocation
page read and write
BA5000
heap
page read and write
1571000
heap
page read and write
7FF5D776F000
unkown
page readonly
4FEE000
stack
page read and write
BCC000
heap
page read and write
2E90000
unkown
page read and write
7FF5D778A000
unkown
page readonly
EBB000
stack
page read and write
856000
heap
page read and write
11E3000
trusted library allocation
page execute and read and write
B9E000
heap
page read and write
9780000
unkown
page read and write
1260000
heap
page read and write
12F0000
heap
page read and write
30FB000
stack
page read and write
2BA0000
heap
page execute and read and write
3530000
unkown
page read and write
10E0000
unkown
page read and write
2DE0000
heap
page read and write
5D05000
trusted library allocation
page read and write
606E000
stack
page read and write
8F9000
heap
page read and write
10E0000
unkown
page read and write
422000
unkown
page read and write
42E000
unkown
page readonly
1066000
heap
page read and write
13BE000
stack
page read and write
7DB000
stack
page read and write
B7DC000
stack
page read and write
1010000
heap
page read and write
C00000
heap
page read and write
9700000
unkown
page read and write
3991000
trusted library allocation
page read and write
E0E000
stack
page read and write
9700000
unkown
page read and write
FBF000
stack
page read and write
1060000
trusted library allocation
page read and write
94F4000
unkown
page read and write
4986000
unkown
page read and write
1280000
trusted library allocation
page read and write
35C3000
unkown
page read and write
F9C000
heap
page read and write
8390000
unkown
page read and write
35B0000
trusted library allocation
page read and write
C65E000
unkown
page read and write
C496000
unkown
page read and write
2EA0000
unkown
page read and write
617C000
stack
page read and write
2BB1000
trusted library allocation
page read and write
7FF5D75A6000
unkown
page readonly
8390000
unkown
page read and write
7FF5D749B000
unkown
page readonly
5280000
trusted library allocation
page read and write
C81C000
unkown
page read and write
BB0B000
stack
page read and write
1210000
unkown
page read and write
B559000
stack
page read and write
8C8000
heap
page read and write
24C6000
trusted library allocation
page read and write
39D4000
trusted library allocation
page read and write
2040000
heap
page read and write
842000
heap
page read and write
12B4000
trusted library allocation
page read and write
10D7000
heap
page read and write
35FA000
unkown
page read and write
55A0000
trusted library allocation
page read and write
143B000
trusted library allocation
page execute and read and write
5331000
trusted library allocation
page read and write
BD0000
heap
page read and write
7FF5D766E000
unkown
page readonly
5770000
heap
page read and write
381F000
stack
page read and write
BE5000
trusted library allocation
page read and write
10F0000
unkown
page read and write
2EA0000
unkown
page read and write
C625000
unkown
page read and write
10E0000
unkown
page read and write
39A7000
trusted library allocation
page read and write
4478000
trusted library allocation
page read and write
7FF5D774A000
unkown
page readonly
7FF5D7485000
unkown
page readonly
2E90000
unkown
page read and write
3942000
trusted library allocation
page read and write
8C8000
heap
page read and write
C70000
heap
page read and write
7FF5D7394000
unkown
page readonly
25CF000
stack
page read and write
57D9000
trusted library allocation
page read and write
10F0000
unkown
page read and write
64E000
heap
page read and write
7FF5D75AF000
unkown
page readonly
1240000
unkown
page read and write
12AF000
stack
page read and write
3290000
unkown
page read and write
10E0000
unkown
page read and write
1080000
trusted library allocation
page read and write
112B5000
unkown
page read and write
1150000
unkown
page read and write
7FF5D7694000
unkown
page readonly
BA0000
heap
page read and write
4B80000
heap
page read and write
C70000
unkown
page read and write
3981000
trusted library allocation
page read and write
2BE3000
unkown
page readonly
3751000
trusted library allocation
page read and write
10F0000
unkown
page read and write
7FF5D7482000
unkown
page readonly
5160000
heap
page read and write
9A9E000
unkown
page read and write
10E0000
unkown
page read and write
A220000
unkown
page read and write
4027000
trusted library allocation
page read and write
8980000
unkown
page read and write
1320000
heap
page read and write
3945000
trusted library allocation
page read and write
7FF5D6BDB000
unkown
page readonly
23C0000
heap
page execute and read and write
10E0000
unkown
page read and write
B10000
heap
page read and write
3848000
trusted library allocation
page read and write
6480000
heap
page read and write
8890000
unkown
page readonly
96B000
stack
page read and write
8B7000
trusted library allocation
page execute and read and write
7FD50000
trusted library allocation
page execute and read and write
8980000
unkown
page read and write
54F1000
trusted library allocation
page read and write
3280000
heap
page read and write
42B6000
trusted library allocation
page read and write
395E000
stack
page read and write
68A000
heap
page read and write
7E60000
unkown
page read and write
CF5000
heap
page read and write
39A9000
trusted library allocation
page read and write
658E000
stack
page read and write
10E0000
unkown
page read and write
7FF5D7236000
unkown
page readonly
5320000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
7FF5D768B000
unkown
page readonly
397F000
trusted library allocation
page read and write
3290000
unkown
page read and write
1210000
unkown
page read and write
5090000
trusted library allocation
page read and write
7FF5D77B9000
unkown
page readonly
7FF5D7589000
unkown
page readonly
2EA0000
unkown
page read and write
3981000
trusted library allocation
page read and write
5620000
heap
page execute and read and write
50A5000
trusted library allocation
page read and write
10F0000
unkown
page read and write
27C9000
heap
page read and write
A90000
trusted library allocation
page read and write
2BE3000
unkown
page readonly
2B0E000
stack
page read and write
9EE0000
unkown
page read and write
4D75000
trusted library allocation
page read and write
19A000
stack
page read and write
10E0000
unkown
page read and write
BE3000
trusted library allocation
page read and write
7FF5D75FF000
unkown
page readonly
E20000
trusted library allocation
page read and write
408000
unkown
page readonly
42A000
unkown
page read and write
1240000
unkown
page read and write
EA0000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
8980000
unkown
page read and write
2DA7000
heap
page read and write
7FF5D71AF000
unkown
page readonly
3010000
heap
page read and write
3180000
unkown
page read and write
12ED000
trusted library allocation
page execute and read and write
7FF5D76DA000
unkown
page readonly
49C4000
trusted library allocation
page read and write
BE0000
heap
page read and write
75E0000
unkown
page read and write
1424000
trusted library allocation
page read and write
9700000
unkown
page read and write
3781000
trusted library allocation
page read and write
E7DC000
unkown
page read and write
55DE000
stack
page read and write
57D6000
trusted library allocation
page read and write
AA9C000
unkown
page read and write
4C30000
trusted library allocation
page execute and read and write
7E8000
heap
page read and write
10F2000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
7FF5D75F9000
unkown
page readonly
3601000
trusted library allocation
page read and write
9D0000
heap
page read and write
9780000
unkown
page read and write
7FF5D7396000
unkown
page readonly
10E0000
unkown
page read and write
7FF5D7407000
unkown
page readonly
39A6000
trusted library allocation
page read and write
1210000
unkown
page read and write
BD5000
heap
page read and write
2E90000
unkown
page read and write
7FF5D762F000
unkown
page readonly
8980000
unkown
page read and write
10F0000
unkown
page read and write
8390000
unkown
page read and write
39EC000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
2BB1000
trusted library allocation
page read and write
3AAA000
trusted library allocation
page read and write
8980000
unkown
page read and write
3975000
trusted library allocation
page read and write
7DF4F2470000
unkown
page readonly
2C10000
direct allocation
page execute and read and write
9A80000
unkown
page read and write
9780000
unkown
page read and write
8980000
unkown
page read and write
4BD0000
trusted library allocation
page read and write
AAF000
stack
page read and write
460E000
stack
page read and write
3991000
trusted library allocation
page read and write
1447000
trusted library allocation
page read and write
F64000
unkown
page write copy
BD2000
heap
page read and write
2E90000
unkown
page read and write
EF6000
stack
page read and write
7FF5D77C2000
unkown
page readonly
13F5000
trusted library allocation
page read and write
5855000
trusted library allocation
page read and write
10AF000
heap
page read and write
2B71000
trusted library allocation
page read and write
2B54000
trusted library allocation
page read and write
E62000
trusted library allocation
page read and write
9700000
unkown
page read and write
89F9000
stack
page read and write
A2B5000
unkown
page read and write
401000
unkown
page execute read
4ACE000
trusted library allocation
page read and write
26F7000
trusted library allocation
page read and write
582E000
stack
page read and write
293E000
stack
page read and write
8980000
unkown
page read and write
24CB000
trusted library allocation
page read and write
A313000
unkown
page read and write
9700000
unkown
page read and write
2A06000
trusted library allocation
page read and write
1240000
unkown
page read and write
5873000
trusted library allocation
page read and write
9EE0000
unkown
page read and write
1555000
heap
page read and write
2E37000
heap
page read and write
5C0C000
stack
page read and write
7DF4F2471000
unkown
page execute read
97B0000
unkown
page read and write
9EE0000
unkown
page read and write
1187000
heap
page read and write
C20000
remote allocation
page read and write
112B3000
unkown
page read and write
1320000
trusted library allocation
page read and write
41E000
unkown
page readonly
A74000
trusted library allocation
page read and write
C48B000
unkown
page read and write
8980000
unkown
page read and write
9B7000
heap
page read and write
E4B000
heap
page read and write
C6E000
stack
page read and write
BB5000
heap
page read and write
56C0000
heap
page execute and read and write
39EE000
trusted library allocation
page read and write
A2D7000
unkown
page read and write
5020000
trusted library allocation
page execute and read and write
16B7000
trusted library allocation
page read and write
249E000
trusted library allocation
page read and write
103E000
stack
page read and write
7FF5D7648000
unkown
page readonly
126B000
trusted library allocation
page execute and read and write
10D0000
trusted library allocation
page read and write
1455000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
F50000
heap
page read and write
17A0000
heap
page read and write
1110000
unkown
page read and write
408000
unkown
page readonly
23FF000
stack
page read and write
39B9000
trusted library allocation
page read and write
B20000
heap
page read and write
AA0000
heap
page read and write
2B5E000
trusted library allocation
page read and write
4275000
trusted library allocation
page read and write
45B000
unkown
page readonly
576000
stack
page read and write
338F000
stack
page read and write
3BCE000
stack
page read and write
30B0000
trusted library allocation
page read and write
8C39000
stack
page read and write
24F5000
trusted library allocation
page read and write
3971000
trusted library allocation
page read and write
1786000
trusted library allocation
page execute and read and write
3991000
trusted library allocation
page read and write
5880000
heap
page execute and read and write
2E1F000
heap
page execute and read and write
7FF5D7292000
unkown
page readonly
39F1000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
553E000
stack
page read and write
2E34000
heap
page read and write
4FEE000
stack
page read and write
A30000
heap
page read and write
24D8000
trusted library allocation
page read and write
9EE0000
unkown
page read and write
12B0000
unkown
page read and write
80F000
heap
page read and write
52E3000
trusted library allocation
page read and write
9780000
unkown
page read and write
39ED000
trusted library allocation
page read and write
1240000
unkown
page read and write
8980000
unkown
page read and write
12DE000
stack
page read and write
1019000
heap
page read and write
E00000
unkown
page readonly
9B0000
heap
page read and write
8980000
unkown
page read and write
2FD5000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
E58000
heap
page read and write
13B3000
heap
page read and write
37B000
stack
page read and write
7FF5CE33D000
unkown
page readonly
3180000
unkown
page read and write
3971000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
3B4A000
trusted library allocation
page read and write
835000
heap
page read and write
C605000
unkown
page read and write
BBE000
stack
page read and write
24D4000
trusted library allocation
page read and write
2FFF000
stack
page read and write
779E000
unkown
page read and write
503E000
stack
page read and write
585C000
trusted library allocation
page read and write
422000
unkown
page write copy
328E000
stack
page read and write
28C6000
heap
page read and write
4BE1000
trusted library allocation
page read and write
12FA000
trusted library allocation
page execute and read and write
2670000
heap
page read and write
2EA0000
unkown
page read and write
2E90000
unkown
page read and write
10E0000
unkown
page read and write
2FAD000
stack
page read and write
3991000
trusted library allocation
page read and write
8980000
unkown
page read and write
39A4000
trusted library allocation
page read and write
C663000
unkown
page read and write
674E000
stack
page read and write
49F5000
trusted library allocation
page read and write
FE8000
heap
page read and write
A7B000
stack
page read and write
AA01000
unkown
page read and write
BDE000
heap
page read and write
9EE0000
unkown
page read and write
120A000
stack
page read and write
3977000
trusted library allocation
page read and write
5141000
trusted library allocation
page read and write
10F0000
unkown
page read and write
7FF5D764F000
unkown
page readonly
1210000
unkown
page read and write
3C7E000
trusted library allocation
page read and write
C4DC000
unkown
page read and write
1567000
heap
page read and write
10E0000
unkown
page read and write
7FF5D72DF000
unkown
page readonly
3059000
trusted library allocation
page read and write
3994000
trusted library allocation
page read and write
2E90000
unkown
page read and write
14AF000
heap
page read and write
30D1000
trusted library allocation
page read and write
B5E000
heap
page read and write
2A19000
trusted library allocation
page read and write
BD4000
heap
page read and write
3991000
trusted library allocation
page read and write
C653000
unkown
page read and write
69DC000
stack
page read and write
9827000
unkown
page read and write
4B3E000
stack
page read and write
5101000
trusted library allocation
page read and write
30BE000
trusted library allocation
page read and write
400000
unkown
page readonly
849000
heap
page read and write
5861000
trusted library allocation
page read and write
536E000
stack
page read and write
39B000
stack
page read and write
16CE000
stack
page read and write
948000
heap
page read and write
2471000
trusted library allocation
page read and write
12E0000
trusted library allocation
page execute and read and write
3489000
stack
page read and write
808000
heap
page read and write
24C4000
trusted library allocation
page read and write
10F0000
unkown
page read and write
2300000
heap
page read and write
11AA000
trusted library allocation
page execute and read and write
10F0000
unkown
page read and write
39B7000
trusted library allocation
page read and write
3A78000
trusted library allocation
page read and write
1210000
unkown
page read and write
546B000
trusted library allocation
page read and write
540E000
stack
page read and write
175F000
stack
page read and write
4FE0000
unkown
page readonly
C483000
unkown
page read and write
123C000
stack
page read and write
7FF5D71BF000
unkown
page readonly
39A1000
trusted library allocation
page read and write
511E000
stack
page read and write
7FF5D74F2000
unkown
page readonly
7FF5D7799000
unkown
page readonly
9EE0000
unkown
page read and write
4D3E000
stack
page read and write
57A5000
trusted library allocation
page read and write
50BD000
trusted library allocation
page read and write
1395000
heap
page read and write
30C4000
trusted library allocation
page read and write
49BB000
unkown
page read and write
1210000
unkown
page read and write
1076000
trusted library allocation
page read and write
112BB000
unkown
page read and write
3BA3000
trusted library allocation
page read and write
F13000
heap
page read and write
1210000
unkown
page read and write
4E60000
heap
page execute and read and write
1150000
unkown
page read and write
5D11000
trusted library allocation
page read and write
C33000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
7F0000
heap
page read and write
9700000
unkown
page read and write
A23A000
unkown
page read and write
2EA0000
unkown
page read and write
11F0000
trusted library allocation
page read and write
61AB000
stack
page read and write
3991000
trusted library allocation
page read and write
12F1000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
7F1E0000
trusted library allocation
page execute and read and write
29F0000
trusted library allocation
page read and write
4A70000
heap
page execute and read and write
7FF5D74B8000
unkown
page readonly
4D55000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
10E0000
unkown
page read and write
4980000
unkown
page read and write
760B000
unkown
page read and write
7460000
unkown
page read and write
7FF5D76F5000
unkown
page readonly
7FF5D75E9000
unkown
page readonly
3989000
trusted library allocation
page read and write
BD2000
heap
page read and write
C035000
stack
page read and write
2B78000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
A9FD000
unkown
page read and write
39C9000
trusted library allocation
page read and write
1731000
unkown
page readonly
1337000
heap
page read and write
49E9000
trusted library allocation
page read and write
1240000
unkown
page read and write
7FF5D77A4000
unkown
page readonly
B20000
heap
page read and write
B43000
heap
page read and write
760000
heap
page read and write
B9C000
heap
page read and write
7CB0000
unkown
page readonly
776000
stack
page read and write
2EA0000
unkown
page read and write
5F7E000
stack
page read and write
B0E0000
unkown
page readonly
10F0000
unkown
page read and write
7FF5D77FD000
unkown
page readonly
50B9000
trusted library allocation
page read and write
B0BD000
stack
page read and write
143E000
trusted library allocation
page read and write
7FF5D72FB000
unkown
page readonly
3000000
trusted library allocation
page read and write
C5F8000
unkown
page read and write
10DB0000
unkown
page read and write
750000
heap
page read and write
4A0E000
unkown
page read and write
49C2000
unkown
page read and write
9ABD000
unkown
page read and write
8980000
unkown
page read and write
3728000
trusted library allocation
page read and write
50DE000
stack
page read and write
8980000
unkown
page read and write
80E000
heap
page read and write
53FE000
stack
page read and write
FFF000
stack
page read and write
5155000
trusted library allocation
page read and write
3140000
unkown
page read and write
5BEC000
stack
page read and write
30BB000
trusted library allocation
page read and write
9780000
unkown
page read and write
6420000
heap
page read and write
276E000
stack
page read and write
B28000
heap
page read and write
3971000
trusted library allocation
page read and write
4A40000
unkown
page read and write
C6D000
unkown
page readonly
C40000
heap
page read and write
454000
unkown
page readonly
9FAF000
stack
page read and write
F64000
unkown
page read and write
8D3B000
stack
page read and write
3980000
trusted library allocation
page read and write
8390000
unkown
page read and write
640C000
stack
page read and write
8980000
unkown
page read and write
4C90000
heap
page execute and read and write
68DC000
stack
page read and write
BA9000
heap
page read and write
627C000
stack
page read and write
9EE0000
unkown
page read and write
57A0000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
E5A000
trusted library allocation
page execute and read and write
30C0000
trusted library allocation
page read and write
87FA000
heap
page read and write
1210000
unkown
page read and write
BE70000
unkown
page readonly
3990000
trusted library allocation
page read and write
7FF5D717C000
unkown
page readonly
7605000
unkown
page read and write
8390000
unkown
page read and write
B9E000
heap
page read and write
8390000
unkown
page read and write
2E90000
unkown
page read and write
8980000
unkown
page read and write
9EE0000
unkown
page read and write
10E0000
unkown
page read and write
76F8000
unkown
page read and write
400000
unkown
page readonly
5430000
heap
page read and write
2C20000
direct allocation
page read and write
1450000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
12A5000
trusted library allocation
page read and write
26EF000
trusted library allocation
page read and write
1390000
heap
page read and write
2B9F000
stack
page read and write
4AFA000
unkown
page read and write
89D000
heap
page read and write
272F000
stack
page read and write
7FF5D74A6000
unkown
page readonly
49FD000
unkown
page read and write
8980000
unkown
page read and write
1210000
unkown
page read and write
3500000
stack
page read and write
7FF5D7792000
unkown
page readonly
1210000
heap
page read and write
5A5E000
stack
page read and write
57CE000
stack
page read and write
9700000
unkown
page read and write
8DF000
heap
page read and write
7FF5D73F5000
unkown
page readonly
860000
trusted library allocation
page read and write
7FF5D77EB000
unkown
page readonly
BE0000
trusted library allocation
page read and write
A39F000
unkown
page read and write
8BB000
trusted library allocation
page execute and read and write
B8B000
stack
page read and write
1210000
unkown
page read and write
1797000
trusted library allocation
page execute and read and write
BC1000
heap
page read and write
3977000
trusted library allocation
page read and write
F5E000
stack
page read and write
A416000
unkown
page read and write
9780000
unkown
page read and write
23A5000
trusted library allocation
page read and write
1043000
trusted library allocation
page read and write
474E000
stack
page read and write
A0A9000
stack
page read and write
3100000
unkown
page read and write
454000
unkown
page readonly
BD0000
heap
page read and write
BCF000
heap
page read and write
A3AA000
unkown
page read and write
56AC000
stack
page read and write
9EE0000
unkown
page read and write
3C13000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
4BA8000
trusted library allocation
page read and write
E20000
heap
page read and write
5850000
trusted library allocation
page read and write
3978000
trusted library allocation
page read and write
4D4E000
stack
page read and write
4D50000
heap
page read and write
C47F000
unkown
page read and write
36C0000
trusted library allocation
page read and write
398B000
trusted library allocation
page read and write
8980000
unkown
page read and write
10EE000
heap
page read and write
50EF000
stack
page read and write
5350000
trusted library allocation
page read and write
7FF5D76AF000
unkown
page readonly
576F000
stack
page read and write
401000
unkown
page execute read
4DD0000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
820000
heap
page read and write
1426000
trusted library allocation
page read and write
10F0000
unkown
page read and write
9578000
stack
page read and write
3980000
trusted library allocation
page read and write
422000
unkown
page read and write
7FF5D7230000
unkown
page readonly
C79000
heap
page read and write
C30000
unkown
page readonly
2D90000
unclassified section
page read and write
BE49000
stack
page read and write
3990000
trusted library allocation
page read and write
2ED1000
trusted library allocation
page read and write
9A000
stack
page read and write
9780000
unkown
page read and write
39FB000
trusted library allocation
page read and write
B220000
unkown
page read and write
2785000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
11E4000
trusted library allocation
page read and write
C7C6000
unkown
page read and write
7FF5D7452000
unkown
page readonly
B48000
heap
page read and write
4AB4000
trusted library allocation
page read and write
39A0000
trusted library allocation
page read and write
B9C000
heap
page read and write
543E000
stack
page read and write
BC8000
heap
page read and write
1290000
heap
page execute and read and write
10F0000
unkown
page read and write
1050000
heap
page read and write
13AE000
stack
page read and write
39B9000
trusted library allocation
page read and write
2D70000
direct allocation
page execute and read and write
9EE0000
unkown
page read and write
5086000
trusted library allocation
page read and write
512E000
stack
page read and write
9AA8000
unkown
page read and write
62AC000
stack
page read and write
CC0000
trusted library allocation
page read and write
F65000
unkown
page execute read
39C1000
trusted library allocation
page read and write
FF0000
trusted library allocation
page execute and read and write
E36000
trusted library allocation
page execute and read and write
B43000
heap
page read and write
7FF5D776D000
unkown
page readonly
24CE000
trusted library allocation
page read and write
C10000
heap
page read and write
14BB000
heap
page read and write
2EB5000
trusted library allocation
page read and write
84BB000
stack
page read and write
5470000
trusted library allocation
page read and write
49C2000
trusted library allocation
page read and write
2E90000
unkown
page read and write
132B000
heap
page read and write
BD1000
heap
page read and write
10F0000
unkown
page read and write
C40000
heap
page read and write
10F0000
unkown
page read and write
1150000
unkown
page read and write
3180000
unkown
page read and write
A33F000
unkown
page read and write
8980000
unkown
page read and write
397A000
trusted library allocation
page read and write
70FC000
stack
page read and write
E7D0000
unkown
page read and write
4DD3000
trusted library allocation
page read and write
9A98000
unkown
page read and write
1820000
heap
page read and write
10F0000
unkown
page read and write
A9A000
trusted library allocation
page execute and read and write
B28000
heap
page read and write
8980000
unkown
page read and write
5850000
trusted library allocation
page read and write
1426000
trusted library allocation
page execute and read and write
5421000
trusted library allocation
page read and write
2B64000
trusted library allocation
page read and write
8390000
unkown
page read and write
3B31000
trusted library allocation
page read and write
30AE000
stack
page read and write
BD4000
heap
page read and write
39AD000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
7FF5D7257000
unkown
page readonly
10F0000
unkown
page read and write
10E0000
unkown
page read and write
7FF5D7669000
unkown
page readonly
5080000
trusted library allocation
page read and write
11A0000
trusted library allocation
page read and write
324F000
stack
page read and write
C4C6000
unkown
page read and write
4ABE000
trusted library allocation
page read and write
10E0000
unkown
page read and write
8980000
unkown
page read and write
10F0000
unkown
page read and write
1810000
trusted library allocation
page execute and read and write
52F7000
trusted library allocation
page read and write
7FF000
heap
page read and write
8980000
unkown
page read and write
88F000
heap
page read and write
3981000
trusted library allocation
page read and write
7E2000
trusted library allocation
page read and write
8980000
unkown
page read and write
3180000
unkown
page read and write
1240000
trusted library allocation
page read and write
C4BD000
unkown
page read and write
7FF5D716B000
unkown
page readonly
4F8F000
stack
page read and write
B8DB000
stack
page read and write
BCA000
heap
page read and write
1764000
trusted library allocation
page read and write
1240000
unkown
page read and write
16B1000
trusted library allocation
page read and write
9E2E000
stack
page read and write
39B8000
trusted library allocation
page read and write
2D0E000
stack
page read and write
9780000
unkown
page read and write
880000
trusted library allocation
page read and write
E7D5000
unkown
page read and write
BD4000
heap
page read and write
524E000
stack
page read and write
39B9000
trusted library allocation
page read and write
AA04000
unkown
page read and write
1240000
unkown
page read and write
1210000
unkown
page read and write
5865000
trusted library allocation
page read and write
14A9000
heap
page read and write
5A4E000
stack
page read and write
1240000
unkown
page read and write
3030000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
40B000
unkown
page execute read
E80000
trusted library allocation
page read and write
7FF5D729E000
unkown
page readonly
3565000
trusted library allocation
page read and write
B28000
heap
page read and write
48D0000
heap
page read and write
10E0F000
unkown
page read and write
7AA0000
unkown
page read and write
3BAB000
trusted library allocation
page read and write
B4BF000
stack
page read and write
3991000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
226B000
trusted library allocation
page execute and read and write
39B7000
trusted library allocation
page read and write
55A5000
trusted library allocation
page read and write
9EE0000
unkown
page read and write
6FE000
stack
page read and write
D50000
heap
page read and write
8980000
unkown
page read and write
1240000
unkown
page read and write
4BF5000
trusted library allocation
page read and write
10DF8000
unkown
page read and write
4271000
trusted library allocation
page read and write
55A3000
trusted library allocation
page read and write
7FF5D7705000
unkown
page readonly
2FE6000
trusted library allocation
page read and write
15FF000
stack
page read and write
10FCF000
unkown
page read and write
37A0000
trusted library allocation
page read and write
94AB000
stack
page read and write
647000
heap
page read and write
BCD000
heap
page read and write
1180000
heap
page read and write
87C1000
unkown
page read and write
58CE000
stack
page read and write
9EE0000
unkown
page read and write
115E000
stack
page read and write
9780000
unkown
page read and write
98E000
stack
page read and write
13F0000
trusted library allocation
page read and write
12E5000
trusted library allocation
page read and write
18F0000
heap
page read and write
10F0000
unkown
page read and write
4AD9000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
12E2000
trusted library allocation
page read and write
24E1000
trusted library allocation
page read and write
DF0000
heap
page read and write
2262000
trusted library allocation
page read and write
42E000
unkown
page readonly
1180000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
4BDE000
stack
page read and write
3150000
trusted library allocation
page read and write
1307000
trusted library allocation
page execute and read and write
5090000
trusted library allocation
page read and write
9700000
unkown
page read and write
7637000
unkown
page read and write
7440000
unkown
page read and write
D56000
heap
page read and write
39BC000
trusted library allocation
page read and write
1000000
heap
page read and write
8390000
unkown
page read and write
C6B000
heap
page read and write
4AB0000
trusted library allocation
page read and write
530F000
stack
page read and write
26C1000
trusted library allocation
page read and write
7609000
unkown
page read and write
BC7000
heap
page read and write
F574000
unkown
page read and write
35F4000
unkown
page read and write
EF8000
heap
page read and write
C62D000
unkown
page read and write
C30000
unkown
page readonly
7B3000
trusted library allocation
page execute and read and write
16C0000
trusted library allocation
page read and write
1110000
unkown
page read and write
3A70000
heap
page read and write
10E0000
unkown
page read and write
1076000
heap
page read and write
3999000
trusted library allocation
page read and write
1240000
unkown
page read and write
3120000
unkown
page read and write
4EBE000
stack
page read and write
112B2000
unkown
page read and write
8390000
unkown
page read and write
6B0000
heap
page read and write
1210000
unkown
page read and write
10E0000
unkown
page read and write
3991000
trusted library allocation
page read and write
2475000
trusted library allocation
page read and write
439000
unkown
page readonly
BD4000
heap
page read and write
39B9000
trusted library allocation
page read and write
3170000
unkown
page read and write
FE0000
heap
page execute and read and write
10DED000
unkown
page read and write
C61D000
unkown
page read and write
3991000
trusted library allocation
page read and write
8A5000
heap
page read and write
51A1000
trusted library allocation
page read and write
1160000
unkown
page read and write
7FF5D7267000
unkown
page readonly
10F0000
unkown
page read and write
10CA000
heap
page read and write
8980000
stack
page read and write
1250000
trusted library allocation
page read and write
10E0000
unkown
page read and write
1441000
trusted library allocation
page read and write
A273000
unkown
page read and write
B5F000
heap
page read and write
9679000
stack
page read and write
10EA000
trusted library allocation
page execute and read and write
BCD000
heap
page read and write
BF0000
heap
page read and write
5F0000
heap
page read and write
8390000
unkown
page read and write
1490000
heap
page read and write
397F000
trusted library allocation
page read and write
1838000
trusted library allocation
page read and write
10E0000
unkown
page read and write
10E0000
trusted library allocation
page read and write
4CAE000
stack
page read and write
55D0000
heap
page read and write
4A71000
unkown
page read and write
30B4000
trusted library allocation
page read and write
2E9E000
stack
page read and write
12A6000
heap
page read and write
3981000
trusted library allocation
page read and write
A408000
unkown
page read and write
BE90000
unkown
page read and write
2B96000
trusted library allocation
page read and write
55E0000
heap
page read and write
F9F000
stack
page read and write
882000
heap
page read and write
7FF5D71A6000
unkown
page readonly
1210000
unkown
page read and write
9780000
unkown
page read and write
2AFA000
trusted library allocation
page read and write
5132000
trusted library allocation
page read and write
7FF5D75EE000
unkown
page readonly
8390000
unkown
page read and write
2EA0000
unkown
page read and write
5800000
trusted library allocation
page read and write
1210000
unkown
page read and write
E42000
trusted library allocation
page read and write
BA9000
heap
page read and write
57F0000
trusted library allocation
page read and write
745000
heap
page read and write
4C40000
heap
page read and write
2E90000
unkown
page read and write
7FF5D71EF000
unkown
page readonly
1240000
unkown
page read and write
63BE000
stack
page read and write
E3A000
trusted library allocation
page execute and read and write
2B11000
trusted library allocation
page read and write
39A1000
trusted library allocation
page read and write
88F000
heap
page read and write
401000
unkown
page execute read
39F3000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
422000
unkown
page read and write
5ABE000
stack
page read and write
BCC000
heap
page read and write
35C1000
unkown
page read and write
8980000
unkown
page read and write
3370000
unkown
page read and write
7FF5D7784000
unkown
page readonly
39A2000
trusted library allocation
page read and write
112BB000
unkown
page read and write
3280000
unkown
page read and write
1160000
trusted library allocation
page execute and read and write
9700000
stack
page read and write
3CCE000
trusted library allocation
page read and write
7FF5D772C000
unkown
page readonly
408000
unkown
page readonly
7FBB0000
trusted library allocation
page execute and read and write
2EA0000
unkown
page read and write
7FF5D6AB6000
unkown
page readonly
124E000
stack
page read and write
BF3E000
stack
page read and write
E30000
trusted library allocation
page read and write
3EF1000
trusted library allocation
page read and write
A96000
trusted library allocation
page execute and read and write
2E70000
trusted library allocation
page read and write
13F6000
heap
page read and write
7FF5D7546000
unkown
page readonly
2E90000
unkown
page read and write
40A000
unkown
page read and write
9B0000
heap
page read and write
507E000
stack
page read and write
C669000
unkown
page read and write
10F0000
unkown
page read and write
3980000
trusted library allocation
page read and write
9EE0000
unkown
page read and write
1240000
unkown
page read and write
310D000
stack
page read and write
1210000
unkown
page read and write
519C000
trusted library allocation
page read and write
4930000
heap
page read and write
A28D000
unkown
page read and write
3BB5000
trusted library allocation
page read and write
8B2000
trusted library allocation
page read and write
10F0000
unkown
page read and write
9780000
unkown
page read and write
3991000
trusted library allocation
page read and write
9780000
unkown
page read and write
3971000
trusted library allocation
page read and write
3180000
unkown
page read and write
575C000
trusted library allocation
page read and write
42D000
unkown
page read and write
5330000
unkown
page write copy
10E0000
unkown
page read and write
3970000
trusted library allocation
page read and write
5A1E000
stack
page read and write
39AF000
trusted library allocation
page read and write
8A00000
unkown
page read and write
22CE000
stack
page read and write
5020000
trusted library allocation
page read and write
879000
heap
page read and write
7F8000
heap
page read and write
9EE0000
unkown
page read and write
9780000
unkown
page read and write
EF0000
heap
page read and write
107C000
stack
page read and write
10E0000
unkown
page read and write
1150000
unkown
page read and write
3A1E000
trusted library allocation
page read and write
B20000
heap
page read and write
10BB000
heap
page read and write
8980000
unkown
page read and write
11E0000
trusted library allocation
page execute and read and write
13F0000
trusted library allocation
page read and write
E90000
trusted library allocation
page execute and read and write
E20000
trusted library allocation
page read and write
11B2000
trusted library allocation
page read and write
234E000
stack
page read and write
36FE000
trusted library allocation
page read and write
BCD000
heap
page read and write
C642000
unkown
page read and write
2CC0000
heap
page read and write
9C000
stack
page read and write
B950000
unkown
page readonly
7FF5D75F2000
unkown
page readonly
9EB0000
unkown
page readonly
39A1000
trusted library allocation
page read and write
12D6000
trusted library allocation
page read and write
49E6000
trusted library allocation
page read and write
2A74000
trusted library allocation
page read and write
1210000
unkown
page read and write
5DCC000
stack
page read and write
39C5000
trusted library allocation
page read and write
397A000
trusted library allocation
page read and write
49D6000
unkown
page read and write
8390000
unkown
page read and write
3477000
trusted library allocation
page read and write
977E000
stack
page read and write
9700000
unkown
page read and write
C90000
trusted library allocation
page read and write
56AE000
stack
page read and write
9EE0000
unkown
page read and write
39A8000
trusted library allocation
page read and write
591E000
stack
page read and write
49C0000
heap
page read and write
1007000
trusted library allocation
page read and write
7FF5D760B000
unkown
page readonly
B5F000
heap
page read and write
BC7000
heap
page read and write
8980000
unkown
page read and write
CF6000
stack
page read and write
572E000
stack
page read and write
4A16000
unkown
page read and write
3035000
trusted library allocation
page read and write
2EC0000
heap
page execute and read and write
3C6E000
trusted library allocation
page read and write
1150000
unkown
page read and write
1240000
unkown
page read and write
7FF5D7073000
unkown
page readonly
23A0000
trusted library allocation
page read and write
238C000
stack
page read and write
2260000
trusted library allocation
page read and write
BC5000
heap
page read and write
399E000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
3160000
heap
page execute and read and write
39AA000
trusted library allocation
page read and write
99C0000
unkown
page read and write
4B5000
heap
page read and write
A384000
unkown
page read and write
6B00000
heap
page read and write
3971000
trusted library allocation
page read and write
1240000
unkown
page read and write
24DE000
trusted library allocation
page read and write
59CE000
stack
page read and write
12D1000
trusted library allocation
page read and write
C78A000
unkown
page read and write
13F0000
heap
page read and write
12B6000
trusted library allocation
page read and write
9EE0000
unkown
page read and write
1205000
heap
page read and write
8980000
unkown
page read and write
10F0000
unkown
page read and write
7FF5D7639000
unkown
page readonly
BBF000
heap
page read and write
54DE000
stack
page read and write
39CE000
trusted library allocation
page read and write
27AF000
trusted library allocation
page read and write
7FF5D7740000
unkown
page readonly
39C2000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
7FF5D7752000
unkown
page readonly
7B00000
unkown
page readonly
E50000
trusted library allocation
page read and write
4AC0000
unkown
page read and write
8AC000
heap
page read and write
10E0000
unkown
page read and write
6B3D000
heap
page read and write
5870000
trusted library allocation
page read and write
5E0D000
stack
page read and write
CB4000
trusted library allocation
page read and write
3180000
unkown
page read and write
130F000
stack
page read and write
8980000
unkown
page read and write
2781000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
470000
heap
page read and write
800000
heap
page read and write
9700000
unkown
page read and write
8390000
unkown
page read and write
7611000
unkown
page read and write
2EA0000
unkown
page read and write
8390000
unkown
page read and write
2EA0000
unkown
page read and write
F76000
heap
page read and write
31E0000
heap
page execute and read and write
96FE000
stack
page read and write
8390000
unkown
page read and write
8980000
unkown
page read and write
CD0000
trusted library allocation
page read and write
BCD000
heap
page read and write
247F000
trusted library allocation
page read and write
5265000
trusted library allocation
page read and write
10E0000
unkown
page read and write
880000
heap
page read and write
C44F000
stack
page read and write
50DC000
stack
page read and write
61D0000
heap
page read and write
7FF5D7797000
unkown
page readonly
C800000
unkown
page read and write
5D0E000
trusted library allocation
page read and write
997C000
stack
page read and write
39AA000
trusted library allocation
page read and write
3D21000
trusted library allocation
page read and write
EC0000
heap
page read and write
2D7A000
heap
page read and write
FE0000
heap
page execute and read and write
50D6000
trusted library allocation
page read and write
125A000
trusted library allocation
page execute and read and write
9780000
unkown
page read and write
5D0C000
trusted library allocation
page read and write
920000
heap
page read and write
7B20000
unkown
page read and write
C450000
unkown
page read and write
7810000
unkown
page read and write
13D0000
trusted library allocation
page read and write
4A5E000
stack
page read and write
EF3000
stack
page read and write
2A00000
heap
page read and write
9780000
unkown
page read and write
4E9F000
stack
page read and write
F9D000
stack
page read and write
1177000
trusted library allocation
page read and write
7FF5D771A000
unkown
page readonly
619C000
stack
page read and write
7FF5D75D9000
unkown
page readonly
C46000
heap
page read and write
8980000
unkown
page read and write
3991000
trusted library allocation
page read and write
30B6000
trusted library allocation
page read and write
12DD000
trusted library allocation
page execute and read and write
B20000
heap
page read and write
2EA0000
unkown
page read and write
400000
unkown
page readonly
3991000
trusted library allocation
page read and write
2DD3000
trusted library allocation
page read and write
52A0000
trusted library allocation
page execute and read and write
9AB2000
unkown
page read and write
5BBE000
stack
page read and write
897E000
stack
page read and write
52E0000
trusted library allocation
page read and write
BD1000
heap
page read and write
8880000
unkown
page readonly
2E90000
unkown
page read and write
C24E000
stack
page read and write
E1D000
trusted library allocation
page execute and read and write
7FF5D71DA000
unkown
page readonly
4AD6000
trusted library allocation
page read and write
7FF5D7376000
unkown
page readonly
398F000
trusted library allocation
page read and write
7FF5D66E3000
unkown
page readonly
26BE000
stack
page read and write
5D2E000
stack
page read and write
166E000
stack
page read and write
7FF5D75B8000
unkown
page readonly
8390000
unkown
page read and write
39CA000
trusted library allocation
page read and write
9A94000
unkown
page read and write
EE0000
trusted library allocation
page read and write
4D53000
trusted library allocation
page read and write
266D000
stack
page read and write
BA7000
heap
page read and write
34A1000
trusted library allocation
page read and write
3380000
unkown
page read and write
E7DA000
unkown
page read and write
75FD000
unkown
page read and write
5E9000
stack
page read and write
2D50000
unclassified section
page read and write
7FF5D7591000
unkown
page readonly
896000
trusted library allocation
page execute and read and write
10F0000
unkown
page read and write
1150000
unkown
page read and write
9780000
unkown
page read and write
2D7E000
heap
page read and write
4221000
trusted library allocation
page read and write
7FF5D7703000
unkown
page readonly
BDE000
heap
page read and write
3981000
trusted library allocation
page read and write
4F0E000
stack
page read and write
10E0000
unkown
page read and write
16B0000
heap
page read and write
2481000
trusted library allocation
page read and write
2D14000
heap
page read and write
53E1000
unkown
page read and write
57F4000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
286F000
stack
page read and write
11FF000
stack
page read and write
AF7000
stack
page read and write
27BD000
stack
page read and write
FE0000
heap
page read and write
4D73000
trusted library allocation
page read and write
2C34000
heap
page read and write
BC7000
heap
page read and write
16A0000
trusted library allocation
page read and write
1074000
trusted library allocation
page read and write
422000
unkown
page write copy
AF7000
trusted library allocation
page read and write
7FF5D7643000
unkown
page readonly
2F5F000
stack
page read and write
3F0000
heap
page read and write
5D0000
heap
page read and write
A70000
trusted library allocation
page read and write
2BAD000
trusted library allocation
page read and write
8980000
unkown
page read and write
446000
unkown
page readonly
39B2000
trusted library allocation
page read and write
7FF5D77E9000
unkown
page readonly
B95000
heap
page read and write
7AC0000
unkown
page read and write
1177000
heap
page read and write
A3C3000
unkown
page read and write
5094000
trusted library allocation
page read and write
7B3000
trusted library allocation
page execute and read and write
1760000
trusted library allocation
page read and write
7AE0000
unkown
page read and write
3180000
unkown
page read and write
864000
heap
page read and write
2B56000
trusted library allocation
page read and write
13F0000
heap
page read and write
1432000
trusted library allocation
page read and write
22E7000
trusted library allocation
page read and write
A2F000
stack
page read and write
5412000
trusted library allocation
page read and write
E70000
heap
page read and write
C472000
unkown
page read and write
7FF5D7360000
unkown
page readonly
7FF5D7391000
unkown
page readonly
5310000
trusted library allocation
page read and write
4021000
trusted library allocation
page read and write
22E1000
trusted library allocation
page read and write
3626000
unkown
page read and write
179B000
trusted library allocation
page execute and read and write
7F520000
trusted library allocation
page execute and read and write
8390000
unkown
page read and write
35C9000
unkown
page read and write
26F1000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
4A60000
trusted library allocation
page read and write
BD0000
heap
page read and write
8980000
unkown
page read and write
DFF000
stack
page read and write
A9E9000
unkown
page read and write
247D000
trusted library allocation
page read and write
1000000
heap
page read and write
A391000
unkown
page read and write
9EE0000
unkown
page read and write
136E000
stack
page read and write
398D000
trusted library allocation
page read and write
39D1000
trusted library allocation
page read and write
99B0000
unkown
page read and write
755000
heap
page read and write
8CC000
heap
page read and write
4A44000
unkown
page read and write
1256000
trusted library allocation
page execute and read and write
1262000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
2E90000
unkown
page read and write
49D5000
trusted library allocation
page read and write
3978000
trusted library allocation
page read and write
C35000
trusted library allocation
page read and write
6FFB000
stack
page read and write
AA0C000
unkown
page read and write
314E000
stack
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
7FF5D747F000
unkown
page readonly
F90000
heap
page read and write
13A0000
unkown
page readonly
BCA000
heap
page read and write
50D0000
trusted library allocation
page read and write
80B000
heap
page read and write
3400000
unkown
page read and write
5E7E000
heap
page read and write
67B000
stack
page read and write
6F6000
stack
page read and write
7DF4F2491000
unkown
page execute read
B330000
unkown
page read and write
750000
heap
page read and write
10F0000
unkown
page read and write
3997000
trusted library allocation
page read and write
637E000
stack
page read and write
E28000
heap
page read and write
BE0000
heap
page read and write
8F49000
stack
page read and write
8980000
unkown
page read and write
8390000
unkown
page read and write
7435000
stack
page read and write
10F0000
unkown
page read and write
2EA0000
unkown
page read and write
5DC0000
heap
page read and write
8980000
unkown
page read and write
There are 2932 hidden memdumps, click here to show them.