IOC Report
setup.exe

loading gif

Files

File Path
Type
Category
Malicious
setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\34vgn892c.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
modified
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\ZharkBOT[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\crypt6[1].exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\newlogs[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\streamer[1].exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\Freshbuild[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\newbuild[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\1[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\stealc_zov[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\whiteheroin[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000030001\1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000111001\streamer.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\50EC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\786A.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\d3d9.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\dcbedta
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAKKECFBGIIIEBGDGDAK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\AEBAFBGI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\AEBAFBGIDHCBFHIECFCB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EHCFBFBAEBKJKEBGCAEHCFCBAE
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\GIIIIJDHJEGIECBGHIJEHIIDGD
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\HJDHCFCBGIDGHJJKJJDGHDGDHI
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HJJEHJJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\IJKJDAFHJDHIEBGCFIDB
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\ProgramData\JJJEGHDAECBFHJKEGIJKKJKKKF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_crypt6.exe_cd17514591b3bc37d71eaa3f790d8eca63aa32e_82e71a1c_2df57086-53da-4793-9d55-300da09beec2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA616.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Jul 1 23:50:27 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA6E2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA721.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TpWWMUpe0LEV.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\newbuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\1000115001\build.exe
HTML document, ASCII text, with very long lines (13449)
dropped
C:\Users\user\AppData\Local\Temp\1000116001\FILE1.exe
HTML document, ASCII text, with very long lines (13449)
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\Hkbsse.job
data
dropped
C:\Windows\Tasks\axplong.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 55 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\setup.exe
"C:\Users\user\Desktop\setup.exe"
malicious
C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
"C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000111001\streamer.exe
"C:\Users\user~1\AppData\Local\Temp\1000111001\streamer.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
"C:\Users\user~1\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exe
"C:\Users\user~1\AppData\Local\Temp\1000125001\Freshbuild.exe"
malicious
C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
"C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"
malicious
C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
malicious
C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exe
"C:\Users\user~1\AppData\Local\Temp\1000128001\crypt6.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe
"C:\Users\user~1\AppData\Local\Temp\1000130001\newlogs.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000030001\1.exe
"C:\Users\user~1\AppData\Local\Temp\1000030001\1.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
"C:\Users\user~1\AppData\Local\Temp\1000131001\stealc_zov.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious
C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe
"C:\Users\user~1\AppData\Local\Temp\1000132001\newbuild.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exe
"C:\Users\user~1\AppData\Local\Temp\1000144001\ZharkBOT.exe"
malicious
C:\ProgramData\34vgn892c.exe
"C:\ProgramData\34vgn892c.exe"
malicious
C:\Users\user\AppData\Roaming\dcbedta
C:\Users\user\AppData\Roaming\dcbedta
malicious
C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
malicious
C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\50EC.exe
C:\Users\user~1\AppData\Local\Temp\50EC.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 312
There are 15 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://40.86.87.10/108e010e8f91c38c.php#
unknown
malicious
http://65.21.175.0
unknown
malicious
http://77.91.77.81/Kiru9gu/index.phpX
unknown
malicious
http://65.21.175.0/b13597c85f807692/sqlite3.dllen-GB
unknown
malicious
http://cx5519.com/tmp/index.php
malicious
http://evilos.cc/tmp/index.php
malicious
http://65.21.175.0/108e010e8f91c38c.
unknown
malicious
http://65.21.175.0/b13597c85f807692/sqlite3.dll$
unknown
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://tempuri.org/Entity/Id24LR
unknown
http://tempuri.org/Entity/Id20ResponsehM
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
https://api.msn.com:443/v1/news/Feed/Windows?t
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
http://40.86.87.10/b13597c85f807692/vcruntime140.dllqk
unknown
http://40.86.87.10/108e010e8f91c38c.php=
unknown
http://40.86.87.10/108e010e8f91c38c.php:
unknown
http://77.91.77.81/Kiru9gu/index.phpo
unknown
http://40.86.87.10/b13597c85f807692/freebl3.dll
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://40.86.87.10/108e010e8f91c38c.php9
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://40.86.87.10/108e010e8f91c38c.php7
unknown
http://77.91.77.81/Kiru9gu/index.phpl
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://40.86.87.10/108e010e8f91c38c.php4
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://40.86.87.10
unknown
http://77.91.77.81/Kiru9gu/index.phpd
unknown
https://login.chinacloudapi.cn/mergeRuneSets
unknown
http://tempuri.org/Entity/Id13LR
unknown
http://77.91.77.81/lend/stealc_zov.exeu
unknown
http://tempuri.org/Entity/Id13ResponsehM
unknown
https://bitbucket.org/sdgdf/fbghhj/downloads/build.exe3456789
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://40.86.87.10/b13597c85f807692/msvcp140.dllGIECBGHIJEHIIDGD4
unknown
http://77.91.77.81/Kiru9gu/index.php~1
unknown
http://tempuri.org/Entity/Id5LR
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://40.86.87.10/b13597c85f807692/vcruntime140.dll
unknown
https://wns.windows.com/
unknown
https://bitbucket.org
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://tempuri.org/Entity/Id4ResponsehM
unknown
http://40.86.87.10/108e010e8f91c38c.phpg
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://40.86.87.10/108e010e8f91c38c.phps
unknown
https://id.atlassian.com/manage-profile/
unknown
https://sylhetvoice.com/tmp/1.exe4c6d8c1b3aeaJz
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://40.86.87.10/108e010e8f91c38c.phpL
unknown
http://40.86.87.10/108e010e8f91c38c.phpM
unknown
https://potterryisiw.shop/apim
unknown
http://tempuri.org/Entity/Id14LR
unknown
http://tempuri.org/Entity/Id6LR
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://40.86.87.10/108e010e8f91c38c.phpD
unknown
https://cdn.cookielaw.org/
unknown
https://potterryisiw.shop/apik
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id11ResponsehM
unknown
https://d136azpfpnge1l.cloudfront.net/
unknown
http://40.86.87.d
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://40.86.87.10/108e010e8f91c38c.phpU
unknown
http://40.86.87.10/108e010e8f91c38c.phpR
unknown
https://bitbucket.org/sdgdf/fbghhj/downloads/FILE1.exe
unknown
https://potterryisiw.shop/apiX
unknown
http://40.86.87.10/108e010e8f91c38c.phpS
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://40.86.87.10/108e010e8f91c38c.phpO
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://crl.micros8i
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://tempuri.org/Entity/Id22LR
unknown
http://tempuri.org/Entity/Id6ResponsehM
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
https://admin.atlassian.com
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.micro
unknown
http://tempuri.org/Entity/Id15ResponsehM
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/Entity/Id7LR
unknown
http://tempuri.org/Entity/Id11LR
unknown
https://bitbucket.org/709b9568a348ca9adec25b3fbf8b44263e4ab627c65d1729
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
https://potterryisiw.shop/api4
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
https://sylhetvoice.com/tmp/1.exe
unknown
https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.172.128.116
unknown
Russian Federation
malicious
4.185.56.82
unknown
United States
malicious
65.21.175.0
unknown
United States
malicious
176.29.154.25
unknown
Jordan
malicious
127.0.0.127
unknown
unknown
malicious
141.8.192.6
unknown
Russian Federation
malicious
102.187.252.37
unknown
Egypt
malicious
188.114.96.3
unknown
European Union
malicious
43.153.49.49
unknown
Japan
185.215.113.67
unknown
Portugal
20.189.173.20
unknown
United States
104.192.141.1
unknown
United States
188.114.97.3
unknown
European Union
40.86.87.10
unknown
United States
77.91.77.81
unknown
Russian Federation
16.182.97.49
unknown
United States
85.28.47.7
unknown
Russian Federation
62.171.132.76
unknown
United Kingdom
There are 8 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
ProgramId
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
FileId
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
LowerCaseLongPath
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
LongPathHash
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
Name
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
OriginalFileName
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
Publisher
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
Version
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
BinFileVersion
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
BinaryType
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
ProductName
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
ProductVersion
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
LinkDate
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
BinProductVersion
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
AppxPackageFullName
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
AppxPackageRelativeId
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
Size
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
Language
\REGISTRY\A\{05b6bbc2-be7d-656f-b8f6-ae8a09839e8a}\Root\InventoryApplicationFile\crypt6.exe|9cf477a99a75ce1c
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000090274
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\NccQngn\Ybpny\Grzc\1000144001\MunexOBG.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080434
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\NccQngn\Ybpny\Hdjtt.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000007042C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{S38OS404-1Q43-42S2-9305-67QR0O28SP23}\Zvpebfbsg.ARG\Senzrjbex\i4.0.30319\pigerf.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000A026A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000B0430
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000A02A0
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
b
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000004043C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\NccQngn\Ybpny\Hdjtt.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{S38OS404-1Q43-42S2-9305-67QR0O28SP23}\Zvpebfbsg.ARG\Senzrjbex\i4.0.30319\pigerf.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.M2V\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\NccQngn\Ebnzvat\TnzrCnyy\TnzrCnyy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
3v82v2vcc2
There are 254 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A1000
unkown
page execute read
malicious
A1000
unkown
page execute read
malicious
D97000
heap
page read and write
malicious
31000
unkown
page execute read
malicious
781000
unkown
page execute and read and write
malicious
5430000
direct allocation
page read and write
malicious
32CD000
heap
page read and write
malicious
4751000
unclassified section
page read and write
malicious
D51000
unkown
page execute and read and write
malicious
28D9000
heap
page read and write
malicious
960000
remote allocation
page execute and read and write
malicious
2DA1000
unclassified section
page read and write
malicious
5450000
direct allocation
page read and write
malicious
671000
unkown
page execute and write copy
malicious
671000
unkown
page execute and write copy
malicious
A1000
unkown
page execute read
malicious
984000
unkown
page read and write
malicious
A1000
unkown
page execute read
malicious
2D80000
direct allocation
page read and write
malicious
A1000
unkown
page execute read
malicious
32CD000
heap
page read and write
malicious
242000
unkown
page readonly
malicious
28CB000
heap
page read and write
malicious
421000
remote allocation
page execute and read and write
malicious
EFE000
heap
page read and write
malicious
D51000
unkown
page execute and read and write
malicious
A1000
unkown
page execute read
malicious
6CB1E000
unkown
page read and write
malicious
2E50000
direct allocation
page read and write
malicious
4D30000
direct allocation
page read and write
malicious
9A5000
remote allocation
page execute and read and write
malicious
31000
unkown
page execute read
malicious
31000
unkown
page execute read
malicious
C000158000
direct allocation
page read and write
BB3F000
stack
page read and write
1384000
heap
page read and write
670000
unkown
page readonly
7BD000
stack
page read and write
3860000
heap
page read and write
3723000
trusted library allocation
page read and write
55E0000
direct allocation
page execute and read and write
1384000
heap
page read and write
8710000
unkown
page read and write
3051000
heap
page read and write
6540000
heap
page read and write
694000
unkown
page write copy
35CF000
stack
page read and write
944000
heap
page read and write
944000
heap
page read and write
90DB000
unkown
page read and write
370C000
heap
page read and write
3051000
heap
page read and write
4891000
heap
page read and write
4E0F000
stack
page read and write
C24F000
unkown
page read and write
A88000
heap
page read and write
3051000
heap
page read and write
369C000
heap
page read and write
319F000
heap
page read and write
26A0000
heap
page read and write
59CA000
trusted library allocation
page read and write
1384000
heap
page read and write
1275000
heap
page read and write
138E000
heap
page read and write
32D3000
unkown
page read and write
A90000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
31D9000
heap
page read and write
7DF468990000
unkown
page readonly
13F4000
heap
page read and write
1384000
heap
page read and write
C4FA000
unkown
page read and write
F044000
unkown
page read and write
94000
unkown
page write copy
35F0000
heap
page read and write
8940000
unkown
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
1E9A1C40000
heap
page read and write
365C000
heap
page read and write
32AC000
heap
page read and write
AFFF000
stack
page read and write
944000
heap
page read and write
C000164000
direct allocation
page read and write
5A70000
trusted library allocation
page execute and read and write
A88000
heap
page read and write
BBD0000
unkown
page readonly
944000
heap
page read and write
944000
heap
page read and write
7FF5572B6000
unkown
page readonly
1384000
heap
page read and write
944000
heap
page read and write
8720000
unkown
page read and write
8700000
unkown
page read and write
3D4E000
stack
page read and write
31A7000
heap
page read and write
13F4000
heap
page read and write
A0FC000
unkown
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
C0000BC000
direct allocation
page read and write
788B000
stack
page read and write
E4C000
unkown
page readonly
7FF557103000
unkown
page readonly
11AD000
stack
page read and write
32AC000
heap
page read and write
328E000
stack
page read and write
74C8000
trusted library allocation
page read and write
39AE000
stack
page read and write
457D000
trusted library allocation
page read and write
8940000
unkown
page read and write
1E9A1CD0000
direct allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
331A000
heap
page read and write
3051000
heap
page read and write
7276000
unkown
page read and write
7FF557594000
unkown
page readonly
13D0000
direct allocation
page read and write
27FC000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
3715000
heap
page read and write
5B0E000
stack
page read and write
4B40000
trusted library allocation
page read and write
8940000
unkown
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
31D5000
heap
page read and write
8720000
unkown
page read and write
944000
heap
page read and write
319A000
heap
page read and write
1384000
heap
page read and write
8940000
unkown
page read and write
3215000
trusted library allocation
page read and write
7FF5569F1000
unkown
page readonly
620C000
heap
page read and write
3178000
heap
page read and write
8A5000
trusted library allocation
page execute and read and write
31A5000
heap
page read and write
109000
unkown
page readonly
1384000
heap
page read and write
31C6000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
5966000
trusted library allocation
page read and write
13F4000
heap
page read and write
2C10000
direct allocation
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
30000
unkown
page readonly
31F8000
heap
page read and write
330A000
unkown
page read and write
5998000
trusted library allocation
page read and write
A4D000
heap
page read and write
273C2000
heap
page read and write
4305000
trusted library allocation
page read and write
5EFD000
stack
page read and write
1384000
heap
page read and write
123C000
stack
page read and write
325A000
heap
page read and write
1E9E72A0000
direct allocation
page read and write
8271000
heap
page read and write
7FF5574BD000
unkown
page readonly
6640000
trusted library allocation
page read and write
944000
heap
page read and write
1640000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
404C000
trusted library allocation
page read and write
3259000
heap
page read and write
944000
heap
page read and write
7FF55702F000
unkown
page readonly
1384000
heap
page read and write
1384000
heap
page read and write
3251000
heap
page read and write
3110000
heap
page read and write
944000
heap
page read and write
453F000
trusted library allocation
page read and write
7FF5570C5000
unkown
page readonly
84CF000
trusted library allocation
page read and write
21344000
heap
page read and write
944000
heap
page read and write
1416000
trusted library allocation
page execute and read and write
3404000
trusted library allocation
page read and write
31D5000
heap
page read and write
3051000
heap
page read and write
8730000
unkown
page read and write
2921000
heap
page read and write
405F000
heap
page read and write
8700000
unkown
page read and write
438E000
trusted library allocation
page read and write
944000
heap
page read and write
7FF557065000
unkown
page readonly
944000
heap
page read and write
CC0000
heap
page readonly
3C0E000
stack
page read and write
6670000
heap
page read and write
38FF000
stack
page read and write
7FF5574F9000
unkown
page readonly
2133F000
heap
page read and write
944000
heap
page read and write
91AC000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
3169000
heap
page read and write
8720000
unkown
page read and write
944000
heap
page read and write
4D0E000
stack
page read and write
944000
heap
page read and write
309E000
stack
page read and write
C550000
unkown
page read and write
944000
heap
page read and write
8540000
trusted library allocation
page read and write
C000172000
direct allocation
page read and write
2836000
heap
page read and write
151F000
stack
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
4C4E000
stack
page read and write
1E9E7103000
direct allocation
page read and write
32FA000
heap
page read and write
1384000
heap
page read and write
32AC000
heap
page read and write
C0F3000
unkown
page read and write
292E000
heap
page read and write
944000
heap
page read and write
7FF556E47000
unkown
page readonly
13A4000
unkown
page readonly
8F99000
heap
page read and write
AA9000
unkown
page execute and write copy
32AC000
heap
page read and write
59F6000
trusted library allocation
page read and write
1384000
heap
page read and write
2C10000
direct allocation
page read and write
1365000
heap
page read and write
944000
heap
page read and write
36E2000
heap
page read and write
1384000
heap
page read and write
59B1000
trusted library allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
910000
heap
page read and write
3051000
heap
page read and write
C3E7000
unkown
page read and write
1069000
unkown
page execute and read and write
7AC000
stack
page read and write
944000
heap
page read and write
66A4000
heap
page read and write
35ED000
stack
page read and write
1384000
heap
page read and write
944000
heap
page read and write
7FF55708D000
unkown
page readonly
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
28C5000
heap
page read and write
4653000
trusted library allocation
page read and write
C000059000
direct allocation
page read and write
30F0000
direct allocation
page execute and read and write
8700000
unkown
page read and write
2DB8000
trusted library allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
4063000
trusted library allocation
page read and write
1EE000
stack
page read and write
1384000
heap
page read and write
59D3000
trusted library allocation
page read and write
3051000
heap
page read and write
2849000
heap
page read and write
27B7000
heap
page read and write
5A81000
trusted library allocation
page read and write
1384000
heap
page read and write
31BB000
heap
page read and write
42C5000
trusted library allocation
page read and write
28A1000
heap
page read and write
3716000
heap
page read and write
14AF000
heap
page read and write
1384000
heap
page read and write
8F40000
heap
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
1384000
heap
page read and write
5592000
trusted library allocation
page read and write
944000
heap
page read and write
329C000
heap
page read and write
3251000
heap
page read and write
2893000
heap
page read and write
1384000
heap
page read and write
2133F000
heap
page read and write
4FD1000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
717A000
unkown
page read and write
6F90000
trusted library allocation
page execute and read and write
A8B000
heap
page read and write
8710000
unkown
page read and write
36F6000
heap
page read and write
1CDEE000
stack
page read and write
1270000
heap
page read and write
42A4000
trusted library allocation
page read and write
84F0000
unkown
page read and write
3051000
heap
page read and write
3B6F000
stack
page read and write
4891000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
32AC000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
26A1000
heap
page read and write
8F7D000
heap
page read and write
8290000
heap
page read and write
3051000
heap
page read and write
2132A000
heap
page read and write
31B8000
heap
page read and write
944000
heap
page read and write
1644000
trusted library allocation
page read and write
4891000
heap
page read and write
4658000
trusted library allocation
page read and write
2F20000
unkown
page read and write
27A7000
heap
page read and write
5743000
heap
page execute and read and write
175E000
stack
page read and write
59A1000
trusted library allocation
page read and write
3060000
heap
page read and write
3051000
heap
page read and write
FA5000
heap
page read and write
1384000
heap
page read and write
C3A8000
unkown
page read and write
3051000
heap
page read and write
599A000
trusted library allocation
page read and write
8940000
unkown
page read and write
4C50000
trusted library allocation
page read and write
59C5000
trusted library allocation
page read and write
944000
heap
page read and write
14FD000
heap
page read and write
131B000
heap
page read and write
A8DE000
unkown
page read and write
7046000
heap
page read and write
996000
remote allocation
page execute and read and write
944000
heap
page read and write
2817000
heap
page read and write
33AB000
trusted library allocation
page read and write
59A6000
heap
page read and write
7FF7E60ED000
unkown
page read and write
27380000
heap
page read and write
8710000
unkown
page read and write
944000
heap
page read and write
13D0000
direct allocation
page read and write
44AF000
stack
page read and write
41AF000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
A8B000
heap
page read and write
A0BD000
unkown
page read and write
8700000
unkown
page read and write
18B0000
direct allocation
page read and write
8295000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
14F7000
heap
page read and write
664A000
heap
page read and write
50A0000
trusted library allocation
page read and write
59A8000
trusted library allocation
page read and write
4990000
trusted library allocation
page read and write
C00009C000
direct allocation
page read and write
984000
remote allocation
page execute and read and write
3275000
heap
page read and write
C214000
unkown
page read and write
53C0000
trusted library allocation
page read and write
3051000
heap
page read and write
4331000
trusted library allocation
page read and write
3151000
heap
page read and write
59B7000
trusted library allocation
page read and write
C3AE000
unkown
page read and write
944000
heap
page read and write
944000
heap
page read and write
4891000
heap
page read and write
6200000
heap
page read and write
1384000
heap
page read and write
593F000
heap
page read and write
A0000
unkown
page readonly
A61000
unkown
page execute and read and write
1384000
heap
page read and write
3051000
heap
page read and write
5DD3E000
unkown
page read and write
4891000
heap
page read and write
99000
unkown
page readonly
3878000
heap
page read and write
4F50000
direct allocation
page execute and read and write
1384000
heap
page read and write
7FF557426000
unkown
page readonly
3715000
heap
page read and write
486A000
unkown
page read and write
7FF5575BB000
unkown
page readonly
944000
heap
page read and write
C000564000
direct allocation
page read and write
84F0000
unkown
page read and write
3788000
heap
page read and write
10601000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
5A30000
heap
page execute and read and write
8A2000
trusted library allocation
page read and write
1384000
heap
page read and write
944000
heap
page read and write
8940000
unkown
page read and write
87D000
trusted library allocation
page execute and read and write
34FF000
trusted library allocation
page read and write
16CE000
stack
page read and write
375C000
heap
page read and write
8710000
unkown
page read and write
509E000
stack
page read and write
3251000
heap
page read and write
370A000
heap
page read and write
8710000
unkown
page read and write
7FF557589000
unkown
page readonly
7FF55714F000
unkown
page readonly
C000147000
direct allocation
page read and write
8740000
unkown
page read and write
8710000
unkown
page read and write
4891000
heap
page read and write
3182000
heap
page read and write
EEF000
stack
page read and write
357D000
stack
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
C328000
unkown
page read and write
944000
heap
page read and write
AAA000
unkown
page execute and write copy
944000
heap
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
4D61000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
59A9000
trusted library allocation
page read and write
BFD0000
unkown
page read and write
31DE000
heap
page read and write
1384000
heap
page read and write
3683000
heap
page read and write
4880000
unkown
page read and write
31B9000
heap
page read and write
8940000
unkown
page read and write
944000
heap
page read and write
3151000
heap
page read and write
56AB000
trusted library allocation
page read and write
59B3000
trusted library allocation
page read and write
3A7D000
stack
page read and write
3051000
heap
page read and write
7FF5570C1000
unkown
page readonly
32C8000
heap
page read and write
1440000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
31D5000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
27E1000
heap
page read and write
A79000
heap
page read and write
31F8000
heap
page read and write
657E000
stack
page read and write
5978000
trusted library allocation
page read and write
5740000
heap
page execute and read and write
2C10000
direct allocation
page read and write
345B000
trusted library allocation
page read and write
944000
heap
page read and write
3051000
heap
page read and write
7390000
heap
page read and write
7FF7E58D1000
unkown
page execute read
4891000
heap
page read and write
34FD000
trusted library allocation
page read and write
2836000
heap
page read and write
368B000
heap
page read and write
8950000
unkown
page read and write
944000
heap
page read and write
284C000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
960000
heap
page read and write
2882000
heap
page read and write
48CF000
stack
page read and write
944000
heap
page read and write
1384000
heap
page read and write
7FF546F35000
unkown
page readonly
7FF55745B000
unkown
page readonly
1384000
heap
page read and write
65D0000
trusted library allocation
page read and write
7FF557239000
unkown
page readonly
65F0000
heap
page read and write
27F6000
heap
page read and write
1384000
heap
page read and write
27E1000
heap
page read and write
21316000
heap
page read and write
9C5000
heap
page read and write
3535000
heap
page read and write
944000
heap
page read and write
575F000
stack
page read and write
598F000
trusted library allocation
page read and write
27BD000
heap
page read and write
7FF5570CF000
unkown
page readonly
12D1000
heap
page read and write
84A5000
trusted library allocation
page read and write
1500000
heap
page read and write
31D5000
heap
page read and write
1384000
heap
page read and write
31CE000
heap
page read and write
347F000
stack
page read and write
1384000
heap
page read and write
32AC000
heap
page read and write
8720000
unkown
page read and write
944000
heap
page read and write
14F7000
heap
page read and write
4891000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
3430000
remote allocation
page read and write
82A9000
heap
page read and write
31D5000
heap
page read and write
311F000
stack
page read and write
C3A8000
unkown
page read and write
31FA000
heap
page read and write
2EEE000
stack
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
32AC000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
8940000
unkown
page read and write
1384000
heap
page read and write
26F6000
trusted library allocation
page read and write
91D9000
stack
page read and write
1384000
heap
page read and write
C00016C000
direct allocation
page read and write
1384000
heap
page read and write
3F69000
heap
page read and write
944000
heap
page read and write
32BC000
heap
page read and write
4D7E000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
913F000
unkown
page read and write
7FF7E6109000
unkown
page readonly
E13B000
stack
page read and write
31E4000
heap
page read and write
C4A2000
unkown
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
C000800000
direct allocation
page read and write
1384000
heap
page read and write
2E6E000
heap
page read and write
47EE000
unkown
page read and write
7FF7E5BBA000
unkown
page read and write
429000
unkown
page write copy
4891000
heap
page read and write
287F000
heap
page read and write
31D5000
heap
page read and write
81F000
heap
page read and write
1384000
heap
page read and write
8940000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
3215000
heap
page read and write
A0B9000
unkown
page read and write
1384000
heap
page read and write
59A1000
heap
page read and write
488F000
stack
page read and write
4891000
heap
page read and write
4A70000
trusted library allocation
page read and write
2F20000
unkown
page read and write
3715000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
2E4F000
stack
page read and write
36CF000
stack
page read and write
59B8000
trusted library allocation
page read and write
4890000
heap
page read and write
8710000
unkown
page read and write
3672000
heap
page read and write
5983000
trusted library allocation
page read and write
7FF556E7B000
unkown
page readonly
5990000
trusted library allocation
page read and write
32AC000
heap
page read and write
7DF468980000
unkown
page readonly
3051000
heap
page read and write
1094D000
unkown
page read and write
1384000
heap
page read and write
4A87000
trusted library allocation
page read and write
3051000
heap
page read and write
8940000
unkown
page read and write
3F02000
heap
page read and write
D7A000
stack
page read and write
944000
heap
page read and write
A118000
unkown
page read and write
10871000
unkown
page read and write
3443000
trusted library allocation
page read and write
944000
heap
page read and write
9AE000
heap
page read and write
1384000
heap
page read and write
2468000
trusted library allocation
page read and write
1CAEE000
stack
page read and write
C3F7000
unkown
page read and write
3300000
heap
page read and write
84A2000
trusted library allocation
page read and write
4891000
heap
page read and write
953B000
unkown
page read and write
6B8000
unkown
page read and write
2893000
heap
page read and write
7FF7E60EF000
unkown
page read and write
4221000
trusted library allocation
page read and write
357F000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
944000
heap
page read and write
C00004B000
direct allocation
page read and write
5720000
heap
page read and write
961A000
stack
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
E6FF000
stack
page read and write
8700000
unkown
page read and write
5FAE000
stack
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
131F000
heap
page read and write
2801000
heap
page read and write
A50000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
4024000
heap
page read and write
1485000
heap
page read and write
944000
heap
page read and write
70C1000
heap
page read and write
3163000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
27C9000
heap
page read and write
7908000
stack
page read and write
8950000
unkown
page read and write
7FF5573C1000
unkown
page readonly
A79000
heap
page read and write
31D5000
heap
page read and write
3715000
heap
page read and write
1384000
heap
page read and write
4730000
unkown
page read and write
667A000
heap
page read and write
21330000
heap
page read and write
27430000
heap
page read and write
7FF557099000
unkown
page readonly
7FF557235000
unkown
page readonly
C000080000
direct allocation
page read and write
370C000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
44C9000
trusted library allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
9D1000
unkown
page readonly
3051000
heap
page read and write
A74000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
7FF557429000
unkown
page readonly
3169000
heap
page read and write
A8B000
heap
page read and write
4AD0000
heap
page read and write
7FF556E85000
unkown
page readonly
3713000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
4891000
heap
page read and write
C101000
unkown
page read and write
1384000
heap
page read and write
DC7000
heap
page read and write
8700000
unkown
page read and write
3051000
heap
page read and write
464C000
trusted library allocation
page read and write
21344000
heap
page read and write
30DB000
trusted library allocation
page read and write
318F000
heap
page read and write
8740000
unkown
page read and write
944000
heap
page read and write
36F0000
heap
page read and write
C000076000
direct allocation
page read and write
944000
heap
page read and write
13F4000
heap
page read and write
4173000
heap
page read and write
8950000
unkown
page read and write
27A0000
heap
page read and write
7FF556E6C000
unkown
page readonly
1384000
heap
page read and write
18A7000
heap
page read and write
4891000
heap
page read and write
A7F000
heap
page read and write
A81000
heap
page read and write
5995000
trusted library allocation
page read and write
2F20000
unkown
page read and write
A8B000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
14F2000
heap
page read and write
3169000
heap
page read and write
8940000
unkown
page read and write
BBE0000
unkown
page readonly
4DA0000
trusted library allocation
page read and write
36E2000
heap
page read and write
F6C000
stack
page read and write
31D9000
heap
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
31D3000
heap
page read and write
4E50000
trusted library allocation
page read and write
944000
heap
page read and write
317E000
heap
page read and write
1384000
heap
page read and write
14F2000
heap
page read and write
1384000
heap
page read and write
7FF557302000
unkown
page readonly
6F60000
trusted library allocation
page read and write
1384000
heap
page read and write
5755000
trusted library allocation
page read and write
269D000
trusted library allocation
page read and write
C5C6000
unkown
page read and write
3690000
trusted library allocation
page read and write
59C1000
trusted library allocation
page read and write
31D2000
heap
page read and write
31EF000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1486000
heap
page read and write
316F000
stack
page read and write
1160000
heap
page read and write
343D000
trusted library allocation
page read and write
59B8000
trusted library allocation
page read and write
1384000
heap
page read and write
1079000
unkown
page execute and write copy
315E000
stack
page read and write
944000
heap
page read and write
A156000
unkown
page read and write
42E2000
trusted library allocation
page read and write
944000
heap
page read and write
27E1000
heap
page read and write
3F02000
heap
page read and write
944000
heap
page read and write
EEA000
stack
page read and write
83AB000
stack
page read and write
3F0D000
heap
page read and write
597C000
trusted library allocation
page read and write
1384000
heap
page read and write
3709000
heap
page read and write
1710000
heap
page read and write
51D9000
stack
page read and write
C000733000
direct allocation
page read and write
944000
heap
page read and write
13D0000
direct allocation
page read and write
3051000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
3685000
heap
page read and write
3051000
heap
page read and write
3CFE000
stack
page read and write
1384000
heap
page read and write
401000
unkown
page execute read
4C60000
heap
page read and write
944000
heap
page read and write
8700000
unkown
page read and write
7380000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
28A1000
heap
page read and write
149E000
heap
page read and write
5770000
trusted library allocation
page read and write
1384000
heap
page read and write
8E6000
heap
page read and write
16E4000
heap
page read and write
1384000
heap
page read and write
40B000
unkown
page execute read
C374000
unkown
page read and write
944000
heap
page read and write
3051000
heap
page read and write
C0007F4000
direct allocation
page read and write
2FAE000
stack
page read and write
1384000
heap
page read and write
7D0E000
stack
page read and write
10884000
unkown
page read and write
321B000
heap
page read and write
9086000
unkown
page read and write
415E000
trusted library allocation
page read and write
2921000
heap
page read and write
27E2000
heap
page read and write
104CD000
unkown
page read and write
944000
heap
page read and write
D30000
heap
page read and write
9E0F000
stack
page read and write
32E0000
remote allocation
page execute and read and write
7FF000
heap
page read and write
4891000
heap
page read and write
718B000
unkown
page read and write
31E7000
heap
page read and write
3051000
heap
page read and write
2926000
heap
page read and write
C233000
unkown
page read and write
4FD1000
heap
page read and write
59B2000
trusted library allocation
page read and write
1384000
heap
page read and write
944000
heap
page read and write
26A1000
heap
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
8700000
unkown
page read and write
8940000
unkown
page read and write
944000
heap
page read and write
3169000
heap
page read and write
4026000
heap
page read and write
21344000
heap
page read and write
2806000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
8730000
unkown
page read and write
944000
heap
page read and write
3280000
heap
page read and write
13F4000
heap
page read and write
359F000
trusted library allocation
page read and write
7FF557285000
unkown
page readonly
A80000
heap
page read and write
944000
heap
page read and write
5977000
trusted library allocation
page read and write
72FE000
unkown
page read and write
3DFF000
stack
page read and write
1521000
heap
page read and write
3165000
heap
page read and write
1384000
heap
page read and write
59A8000
trusted library allocation
page read and write
73D0000
unkown
page read and write
C000170000
direct allocation
page read and write
944000
heap
page read and write
9F4000
heap
page read and write
944000
heap
page read and write
37BF000
stack
page read and write
4D75000
trusted library allocation
page read and write
1384000
heap
page read and write
21345000
heap
page read and write
27FA000
heap
page read and write
D10000
heap
page read and write
8740000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
4DB0000
trusted library allocation
page read and write
944000
heap
page read and write
643C000
stack
page read and write
44CE000
stack
page read and write
944000
heap
page read and write
27A7000
heap
page read and write
3646000
trusted library allocation
page read and write
33B3000
trusted library allocation
page read and write
DC0000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
35B0000
heap
page read and write
5976000
trusted library allocation
page read and write
417D000
trusted library allocation
page read and write
1C229FE000
stack
page read and write
8700000
unkown
page read and write
2F6F000
stack
page read and write
433D000
trusted library allocation
page read and write
C000112000
direct allocation
page read and write
1546000
trusted library allocation
page read and write
D60000
heap
page read and write
4263000
trusted library allocation
page read and write
2817000
heap
page read and write
C22B000
unkown
page read and write
2924000
heap
page read and write
27BA000
heap
page read and write
54B1000
direct allocation
page read and write
C000000000
direct allocation
page read and write
1384000
heap
page read and write
944000
heap
page read and write
7FF556F26000
unkown
page readonly
944000
heap
page read and write
2817000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
6231000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
55B0000
direct allocation
page execute and read and write
1384000
heap
page read and write
59A8000
trusted library allocation
page read and write
A81000
heap
page read and write
944000
heap
page read and write
8720000
unkown
page read and write
31D5000
heap
page read and write
1384000
heap
page read and write
4EE0000
trusted library allocation
page execute and read and write
7FF557583000
unkown
page readonly
599A000
trusted library allocation
page read and write
1C9ED000
stack
page read and write
1384000
heap
page read and write
944000
heap
page read and write
390000
heap
page read and write
59A8000
trusted library allocation
page read and write
31A9000
heap
page read and write
31D5000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
C00003D000
direct allocation
page read and write
1384000
heap
page read and write
32AC000
heap
page read and write
694000
unkown
page write copy
74B0000
trusted library allocation
page read and write
4732000
unkown
page read and write
843E000
trusted library allocation
page read and write
2816000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
A7A000
heap
page read and write
321E000
heap
page read and write
8700000
unkown
page read and write
4552000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
7FF557669000
unkown
page readonly
3166000
heap
page read and write
1384000
heap
page read and write
3803000
heap
page read and write
13D0000
direct allocation
page read and write
C50000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
8940000
unkown
page read and write
9A60000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
4F20000
direct allocation
page execute and read and write
36A8000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
32B9000
heap
page read and write
3251000
heap
page read and write
32AC000
heap
page read and write
170E000
stack
page read and write
1384000
heap
page read and write
21330000
heap
page read and write
14E0000
heap
page read and write
41BF000
stack
page read and write
3180000
heap
page read and write
3051000
heap
page read and write
325A000
heap
page read and write
944000
heap
page read and write
3198000
heap
page read and write
18B0000
direct allocation
page read and write
944000
heap
page read and write
3051000
heap
page read and write
1094B000
unkown
page read and write
944000
heap
page read and write
3178000
heap
page read and write
43CF000
unkown
page read and write
59EB000
trusted library allocation
page read and write
2F1E000
stack
page read and write
A64000
heap
page read and write
3191000
trusted library allocation
page read and write
5975000
trusted library allocation
page read and write
84A9000
trusted library allocation
page read and write
A08D000
stack
page read and write
1384000
heap
page read and write
3118000
stack
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
C0000DC000
direct allocation
page read and write
944000
heap
page read and write
8940000
unkown
page read and write
1384000
heap
page read and write
380F000
stack
page read and write
6660000
trusted library allocation
page execute and read and write
1E9E710A000
direct allocation
page read and write
8700000
unkown
page read and write
18B0000
direct allocation
page read and write
3051000
heap
page read and write
C5A0000
unkown
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
A85000
heap
page read and write
32AC000
heap
page read and write
944000
heap
page read and write
9A60000
unkown
page read and write
1384000
heap
page read and write
46F6000
unkown
page read and write
FD0000
unkown
page readonly
4399000
trusted library allocation
page read and write
28C5000
heap
page read and write
3153000
heap
page read and write
3430000
remote allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
2884000
heap
page read and write
14F9000
heap
page read and write
2133F000
heap
page read and write
1C22DFC000
stack
page read and write
8700000
unkown
page read and write
1087D000
unkown
page read and write
125B000
stack
page read and write
1384000
heap
page read and write
34CE000
stack
page read and write
2890000
heap
page read and write
2836000
heap
page read and write
4FD1000
heap
page read and write
4891000
heap
page read and write
3290000
heap
page read and write
570E000
stack
page read and write
7FF5569CB000
unkown
page readonly
7140000
unkown
page read and write
1384000
heap
page read and write
367D000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
817000
heap
page read and write
27FC000
heap
page read and write
10B0000
unkown
page readonly
1384000
heap
page read and write
32AA000
trusted library allocation
page read and write
14FD000
heap
page read and write
1384000
heap
page read and write
32E3000
unkown
page read and write
59C9000
trusted library allocation
page read and write
6210000
trusted library allocation
page read and write
DB2000
unkown
page execute and read and write
A0000
unkown
page readonly
4121000
trusted library allocation
page read and write
472F000
stack
page read and write
5BA0000
trusted library allocation
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
1720000
heap
page read and write
1384000
heap
page read and write
396F000
stack
page read and write
2134C000
heap
page read and write
1720000
heap
page read and write
944000
heap
page read and write
4891000
heap
page read and write
2C10000
direct allocation
page read and write
59C8000
trusted library allocation
page read and write
7FF557642000
unkown
page readonly
7FF557437000
unkown
page readonly
BE0000
heap
page read and write
5BD0000
trusted library allocation
page read and write
1384000
heap
page read and write
944000
heap
page read and write
285B000
heap
page read and write
4222000
trusted library allocation
page read and write
1E9E70F0000
direct allocation
page read and write
27C9000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
693C000
stack
page read and write
6A9C000
trusted library allocation
page read and write
27F2000
heap
page read and write
10EF000
stack
page read and write
32AC000
heap
page read and write
34CF000
trusted library allocation
page read and write
1384000
heap
page read and write
5A0F000
trusted library allocation
page read and write
13DF000
heap
page read and write
59BE000
trusted library allocation
page read and write
335D000
stack
page read and write
3FAE000
stack
page read and write
59AA000
trusted library allocation
page read and write
7FF557487000
unkown
page readonly
385E000
stack
page read and write
C000084000
direct allocation
page read and write
3FC4000
heap
page read and write
1020000
heap
page read and write
317B000
heap
page read and write
7FF55751D000
unkown
page readonly
1165000
heap
page read and write
944000
heap
page read and write
26A1000
heap
page read and write
31D9000
heap
page read and write
14F9000
heap
page read and write
1384000
heap
page read and write
8700000
unkown
page read and write
2D4C6000
heap
page read and write
7FF55753D000
unkown
page readonly
3509000
trusted library allocation
page read and write
1384000
heap
page read and write
425000
unkown
page readonly
EB9000
unkown
page readonly
944000
heap
page read and write
3715000
heap
page read and write
30F0000
trusted library allocation
page read and write
2818000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
59A9000
trusted library allocation
page read and write
8ED5000
unkown
page read and write
4119000
heap
page read and write
633E000
stack
page read and write
944000
heap
page read and write
C0007C4000
direct allocation
page read and write
3530000
heap
page read and write
944000
heap
page read and write
C1F5000
unkown
page read and write
66A0000
trusted library allocation
page read and write
688F000
stack
page read and write
1465000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
2858000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
102000
unkown
page write copy
1E9E7210000
direct allocation
page read and write
32DB000
unkown
page read and write
3251000
heap
page read and write
3F7E000
stack
page read and write
4FD1000
heap
page read and write
31E0000
heap
page read and write
8710000
unkown
page read and write
104C0000
unkown
page read and write
C00029A000
direct allocation
page read and write
944000
heap
page read and write
31F0000
heap
page read and write
944000
heap
page read and write
329E000
heap
page read and write
54E4000
trusted library allocation
page read and write
AD10000
unkown
page readonly
4891000
heap
page read and write
E370000
unkown
page read and write
F41000
heap
page read and write
1384000
heap
page read and write
9050000
unkown
page read and write
1384000
heap
page read and write
8E97000
heap
page read and write
32E4000
trusted library allocation
page read and write
3656000
heap
page read and write
27CA000
heap
page read and write
1384000
heap
page read and write
2F70000
heap
page read and write
1480000
heap
page read and write
1384000
heap
page read and write
3151000
heap
page read and write
1517000
heap
page read and write
944000
heap
page read and write
122E000
stack
page read and write
944000
heap
page read and write
944000
heap
page read and write
1C21FFD000
stack
page read and write
35AF000
heap
page read and write
4321000
trusted library allocation
page read and write
3F00000
direct allocation
page execute and read and write
3193000
heap
page read and write
944000
heap
page read and write
3326000
heap
page read and write
3F85000
heap
page read and write
59AE000
trusted library allocation
page read and write
37BB000
heap
page read and write
3F91000
trusted library allocation
page read and write
9B6000
stack
page read and write
1740000
heap
page read and write
1384000
heap
page read and write
47C0000
unkown
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
36EA000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
4FD1000
heap
page read and write
C9C000
stack
page read and write
15BE000
stack
page read and write
2818000
heap
page read and write
8720000
unkown
page read and write
1384000
heap
page read and write
7FF5570A6000
unkown
page readonly
944000
heap
page read and write
2F20000
unkown
page read and write
5B52000
trusted library allocation
page read and write
4FD1000
heap
page read and write
3051000
heap
page read and write
A85E000
unkown
page read and write
C7F000
stack
page read and write
2836000
heap
page read and write
59A9000
trusted library allocation
page read and write
8940000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
5992000
trusted library allocation
page read and write
3051000
heap
page read and write
944000
heap
page read and write
61ED4000
direct allocation
page readonly
284C000
heap
page read and write
7160000
unkown
page read and write
705C000
heap
page read and write
90F2000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
2A0E000
heap
page read and write
273E2000
heap
page read and write
1384000
heap
page read and write
7FF5569E8000
unkown
page readonly
B7E000
stack
page read and write
1384000
heap
page read and write
32A0000
direct allocation
page execute and read and write
1384000
heap
page read and write
681E000
stack
page read and write
944000
heap
page read and write
4FD1000
heap
page read and write
7FF5571E6000
unkown
page readonly
1384000
heap
page read and write
589A000
trusted library allocation
page read and write
28A1000
heap
page read and write
1384000
heap
page read and write
F3F000
stack
page read and write
944000
heap
page read and write
75D0000
trusted library allocation
page read and write
7FF55752A000
unkown
page readonly
944000
heap
page read and write
A86000
heap
page read and write
4781000
unkown
page read and write
944000
heap
page read and write
C30000
heap
page read and write
31CE000
heap
page read and write
8710000
unkown
page read and write
54DE000
stack
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
B6E000
stack
page read and write
1490000
heap
page read and write
792E000
stack
page read and write
1E9E7118000
direct allocation
page read and write
4FD1000
heap
page read and write
3051000
heap
page read and write
A8B000
heap
page read and write
7FF557083000
unkown
page readonly
944000
heap
page read and write
21315000
heap
page read and write
26A1000
heap
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
9086000
unkown
page read and write
5983000
trusted library allocation
page read and write
E60000
unkown
page readonly
4FD1000
heap
page read and write
32B9000
unkown
page read and write
7FF556FF3000
unkown
page readonly
2F20000
unkown
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
AF6E000
stack
page read and write
8940000
unkown
page read and write
32AC000
heap
page read and write
8710000
unkown
page read and write
8940000
unkown
page read and write
3715000
heap
page read and write
52DB000
stack
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
4FD1000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
318E000
heap
page read and write
944000
heap
page read and write
31A9000
heap
page read and write
31A000
stack
page read and write
1384000
heap
page read and write
C0001B6000
direct allocation
page read and write
944000
heap
page read and write
A129000
unkown
page read and write
36F9000
heap
page read and write
163E000
stack
page read and write
1384000
heap
page read and write
316C000
heap
page read and write
1640000
direct allocation
page read and write
27E1000
heap
page read and write
8700000
unkown
page read and write
3051000
heap
page read and write
C31000
unkown
page readonly
40FF000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
27B2000
heap
page read and write
132B000
heap
page read and write
1384000
heap
page read and write
4548000
trusted library allocation
page read and write
8940000
unkown
page read and write
4085000
heap
page read and write
21345000
heap
page read and write
151F000
heap
page read and write
EF0000
heap
page read and write
5971000
trusted library allocation
page read and write
32AC000
heap
page read and write
390000
unkown
page readonly
1384000
heap
page read and write
19C1000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
32AC000
heap
page read and write
43AB000
trusted library allocation
page read and write
335F000
stack
page read and write
173B000
heap
page read and write
6CB17000
unkown
page readonly
944000
heap
page read and write
4300000
trusted library allocation
page read and write
4587000
trusted library allocation
page read and write
7FF55748F000
unkown
page readonly
8530000
unkown
page readonly
944000
heap
page read and write
59B8000
trusted library allocation
page read and write
106FC000
unkown
page read and write
31B4000
heap
page read and write
1384000
heap
page read and write
5971000
trusted library allocation
page read and write
102000
unkown
page read and write
4BAD000
stack
page read and write
944000
heap
page read and write
41EA000
trusted library allocation
page read and write
944000
heap
page read and write
7FF55741A000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
8298000
heap
page read and write
944000
heap
page read and write
2836000
heap
page read and write
940000
heap
page read and write
3051000
heap
page read and write
E52000
unkown
page readonly
A76000
heap
page read and write
1384000
heap
page read and write
98E000
stack
page read and write
1384000
heap
page read and write
177F000
stack
page read and write
944000
heap
page read and write
8700000
unkown
page read and write
4217000
trusted library allocation
page read and write
340D000
stack
page read and write
7FF5572BD000
unkown
page readonly
3051000
heap
page read and write
A91000
unkown
page execute read
65BA000
trusted library allocation
page read and write
32AC000
heap
page read and write
7FF556F84000
unkown
page readonly
8940000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
10A5000
heap
page read and write
3051000
heap
page read and write
4F00000
direct allocation
page execute and read and write
F91000
heap
page read and write
26A1000
heap
page read and write
3051000
heap
page read and write
A8C0000
unkown
page read and write
1384000
heap
page read and write
31CE000
heap
page read and write
1384000
heap
page read and write
31FA000
heap
page read and write
1384000
heap
page read and write
A8E3000
unkown
page read and write
144A000
heap
page read and write
427D000
trusted library allocation
page read and write
9052000
unkown
page read and write
32AC000
heap
page read and write
350F000
trusted library allocation
page read and write
18B0000
direct allocation
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
3169000
heap
page read and write
8940000
unkown
page read and write
4226000
heap
page read and write
1384000
heap
page read and write
1677000
heap
page read and write
D50000
unkown
page read and write
1384000
heap
page read and write
8F09000
unkown
page read and write
3051000
heap
page read and write
944000
heap
page read and write
357A000
trusted library allocation
page read and write
1384000
heap
page read and write
7FF7E6061000
unkown
page read and write
383D000
stack
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
438E000
stack
page read and write
944000
heap
page read and write
31C3000
heap
page read and write
8DA6000
unkown
page read and write
5420000
direct allocation
page read and write
27B2000
heap
page read and write
3A5F000
stack
page read and write
944000
heap
page read and write
1330000
heap
page read and write
A8DB000
unkown
page read and write
8700000
unkown
page read and write
31D5000
heap
page read and write
6B50000
heap
page read and write
6650000
trusted library allocation
page read and write
944000
heap
page read and write
780000
unkown
page read and write
1384000
heap
page read and write
45AA000
trusted library allocation
page read and write
4891000
heap
page read and write
338D000
trusted library allocation
page read and write
1384000
heap
page read and write
7FF5574A9000
unkown
page readonly
E57D000
stack
page read and write
65F0000
trusted library allocation
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
3CBD000
stack
page read and write
2E6E000
stack
page read and write
13F4000
heap
page read and write
42CF000
trusted library allocation
page read and write
1384000
heap
page read and write
944000
heap
page read and write
C0000C6000
direct allocation
page read and write
8940000
unkown
page read and write
944000
heap
page read and write
C00013E000
direct allocation
page read and write
1384000
heap
page read and write
4512000
trusted library allocation
page read and write
128D000
trusted library allocation
page execute and read and write
8E80000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
3656000
heap
page read and write
6EE0D000
unkown
page read and write
BFBE000
stack
page read and write
944000
heap
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
4297000
trusted library allocation
page read and write
B010000
unkown
page readonly
1B3AA000
heap
page read and write
7FF557661000
unkown
page readonly
9A0000
heap
page read and write
8710000
unkown
page read and write
8FC000
stack
page read and write
5983000
trusted library allocation
page read and write
1330000
heap
page read and write
1384000
heap
page read and write
8700000
unkown
page read and write
944000
heap
page read and write
1C221FF000
stack
page read and write
3E8E000
stack
page read and write
944000
heap
page read and write
360C000
heap
page read and write
7FF55764C000
unkown
page readonly
FFB000
stack
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
59D9000
trusted library allocation
page read and write
2834000
heap
page read and write
7FF5575BD000
unkown
page readonly
19BE000
heap
page read and write
8700000
unkown
page read and write
5590000
direct allocation
page execute and read and write
31A8000
heap
page read and write
1384000
heap
page read and write
59BD000
trusted library allocation
page read and write
36F5000
trusted library allocation
page read and write
1640000
direct allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
325A000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
28A1000
heap
page read and write
68C000
unkown
page readonly
32AC000
heap
page read and write
2F20000
unkown
page read and write
3251000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
7FF5573E6000
unkown
page readonly
1384000
heap
page read and write
1384000
heap
page read and write
91B0000
trusted library allocation
page execute and read and write
2E88000
stack
page read and write
597E000
trusted library allocation
page read and write
8700000
unkown
page read and write
2F20000
unkown
page read and write
8932000
heap
page read and write
598F000
trusted library allocation
page read and write
4FA1000
heap
page read and write
4891000
heap
page read and write
3051000
heap
page read and write
7DD000
heap
page read and write
944000
heap
page read and write
8AB000
trusted library allocation
page execute and read and write
C0000D6000
direct allocation
page read and write
4E6F000
stack
page read and write
C000036000
direct allocation
page read and write
E330000
unkown
page read and write
1384000
heap
page read and write
13B5000
heap
page read and write
7FF55765C000
unkown
page readonly
944000
heap
page read and write
21321000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
9004000
unkown
page read and write
944000
heap
page read and write
1384000
heap
page read and write
8700000
unkown
page read and write
13F4000
heap
page read and write
1384000
heap
page read and write
12CB000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
32AC000
heap
page read and write
944000
heap
page read and write
C559000
unkown
page read and write
944000
heap
page read and write
1384000
heap
page read and write
14FA000
heap
page read and write
944000
heap
page read and write
5720000
trusted library allocation
page read and write
31D5000
heap
page read and write
31D5000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
314B000
trusted library allocation
page read and write
28C5000
heap
page read and write
43B6000
trusted library allocation
page read and write
3ABE000
stack
page read and write
1910000
heap
page read and write
26A1000
heap
page read and write
32AB000
heap
page read and write
31A9000
heap
page read and write
4FD1000
heap
page read and write
3134000
trusted library allocation
page read and write
1384000
heap
page read and write
31D5000
heap
page read and write
1384000
heap
page read and write
27FC000
heap
page read and write
27F7000
heap
page read and write
7FF55721C000
unkown
page readonly
31D5000
heap
page read and write
5610000
direct allocation
page execute and read and write
944000
heap
page read and write
80A000
heap
page read and write
32AC000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
3272000
heap
page read and write
3051000
heap
page read and write
1089E000
unkown
page read and write
944000
heap
page read and write
2E50000
direct allocation
page read and write
31D9000
heap
page read and write
3305000
trusted library allocation
page read and write
32C9000
unkown
page read and write
7FF557293000
unkown
page readonly
1384000
heap
page read and write
2D0B000
stack
page read and write
7FF55731B000
unkown
page readonly
27F7000
heap
page read and write
1384000
heap
page read and write
531F000
stack
page read and write
2D00000
heap
page read and write
59B0000
trusted library allocation
page read and write
3051000
heap
page read and write
2817000
heap
page read and write
4891000
heap
page read and write
2856000
heap
page read and write
2D4C0000
heap
page read and write
8710000
unkown
page read and write
2134C000
heap
page read and write
4F30000
direct allocation
page execute and read and write
5B5A000
trusted library allocation
page read and write
3173000
heap
page read and write
3447000
trusted library allocation
page read and write
944000
heap
page read and write
40B000
unkown
page execute read
1384000
heap
page read and write
1050000
heap
page read and write
944000
heap
page read and write
3715000
heap
page read and write
8950000
unkown
page read and write
8940000
unkown
page read and write
944000
heap
page read and write
476E000
stack
page read and write
329B000
heap
page read and write
944000
heap
page read and write
1705000
heap
page read and write
C53000
unkown
page execute and read and write
C23A000
unkown
page read and write
144E000
heap
page read and write
13D0000
direct allocation
page read and write
1AABF000
stack
page read and write
944000
heap
page read and write
317B000
heap
page read and write
4337000
trusted library allocation
page read and write
C000162000
direct allocation
page read and write
1384000
heap
page read and write
598F000
trusted library allocation
page read and write
944000
heap
page read and write
F42000
unkown
page readonly
944000
heap
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1332000
heap
page read and write
3151000
heap
page read and write
5DCFF000
unkown
page readonly
11EF000
stack
page read and write
36FC000
trusted library allocation
page read and write
944000
heap
page read and write
462D000
trusted library allocation
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
3159000
heap
page read and write
944000
heap
page read and write
2935000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
9F0E000
stack
page read and write
944000
heap
page read and write
32CC000
heap
page read and write
3450000
unkown
page read and write
A280000
unkown
page read and write
944000
heap
page read and write
6545000
heap
page read and write
13F4000
heap
page read and write
1384000
heap
page read and write
8720000
unkown
page read and write
2133F000
heap
page read and write
317B000
heap
page read and write
31DD000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
5501000
trusted library allocation
page read and write
B26000
heap
page read and write
4E7E000
stack
page read and write
944000
heap
page read and write
3051000
heap
page read and write
275000
unkown
page readonly
27D5000
heap
page read and write
575A000
trusted library allocation
page read and write
F9F000
heap
page read and write
59C8000
trusted library allocation
page read and write
2A08000
heap
page read and write
12D9000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
59D0000
trusted library allocation
page read and write
5998000
trusted library allocation
page read and write
7FF556E75000
unkown
page readonly
944000
heap
page read and write
319F000
heap
page read and write
31D5000
heap
page read and write
3BBE000
stack
page read and write
F80000
heap
page read and write
35CF000
stack
page read and write
8940000
unkown
page read and write
8700000
unkown
page read and write
53D0000
heap
page read and write
4891000
heap
page read and write
3169000
heap
page read and write
27B4000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
8710000
unkown
page read and write
1742000
heap
page read and write
944000
heap
page read and write
49CE000
stack
page read and write
59C0000
trusted library allocation
page read and write
2A11000
heap
page read and write
42BC000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
944000
heap
page read and write
7DF468981000
unkown
page execute read
944000
heap
page read and write
4046000
trusted library allocation
page read and write
944000
heap
page read and write
325A000
heap
page read and write
59C8000
trusted library allocation
page read and write
325A000
heap
page read and write
944000
heap
page read and write
56A0000
trusted library allocation
page read and write
4891000
heap
page read and write
31AD000
heap
page read and write
9A60000
unkown
page read and write
8940000
unkown
page read and write
1384000
heap
page read and write
DC6000
heap
page read and write
1384000
heap
page read and write
5971000
trusted library allocation
page read and write
14F0000
heap
page read and write
56F0000
heap
page read and write
325A000
heap
page read and write
130E000
stack
page read and write
7FF55714D000
unkown
page readonly
2E60000
heap
page read and write
944000
heap
page read and write
4BB000
unkown
page readonly
2132F000
heap
page read and write
3E3E000
stack
page read and write
7C70000
unkown
page readonly
45CD000
trusted library allocation
page read and write
45C2000
trusted library allocation
page read and write
2D1E000
stack
page read and write
3D0F000
stack
page read and write
4528000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
1031000
unkown
page execute and read and write
1384000
heap
page read and write
772000
heap
page read and write
84F0000
unkown
page read and write
4B20000
trusted library allocation
page read and write
325A000
heap
page read and write
944000
heap
page read and write
C04F000
unkown
page read and write
4220000
trusted library allocation
page read and write
28A1000
heap
page read and write
3251000
heap
page read and write
1384000
heap
page read and write
8720000
unkown
page read and write
325A000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
596F000
stack
page read and write
1384000
heap
page read and write
944000
heap
page read and write
2BEB000
unkown
page readonly
4D20000
direct allocation
page read and write
71B2000
unkown
page read and write
31D5000
heap
page read and write
3221000
heap
page read and write
1384000
heap
page read and write
4FD1000
heap
page read and write
372E000
stack
page read and write
99000
unkown
page readonly
6681000
heap
page read and write
ED4000
unkown
page readonly
2330000
heap
page read and write
550D000
trusted library allocation
page read and write
8A7000
trusted library allocation
page execute and read and write
27E1000
heap
page read and write
7FF557535000
unkown
page readonly
8D78000
unkown
page read and write
944000
heap
page read and write
3F73000
heap
page read and write
32AC000
heap
page read and write
8940000
unkown
page read and write
4BB000
unkown
page readonly
4012000
heap
page read and write
873000
trusted library allocation
page read and write
C000031000
direct allocation
page read and write
132B000
heap
page read and write
36F4000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
54E0000
trusted library allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
4891000
heap
page read and write
32AC000
heap
page read and write
597B000
trusted library allocation
page read and write
1384000
heap
page read and write
A56000
heap
page read and write
1384000
heap
page read and write
7C00000
unkown
page readonly
425000
unkown
page readonly
45C8000
trusted library allocation
page read and write
1384000
heap
page read and write
42C8000
trusted library allocation
page read and write
42FF000
stack
page read and write
3449000
trusted library allocation
page read and write
1384000
heap
page read and write
3183000
heap
page read and write
7FF55719C000
unkown
page readonly
27E1000
heap
page read and write
21326000
heap
page read and write
5941000
trusted library allocation
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
12A5000
heap
page read and write
A218000
unkown
page read and write
12A5000
trusted library allocation
page execute and read and write
7FF557113000
unkown
page readonly
3AEE000
stack
page read and write
1384000
heap
page read and write
2876000
heap
page read and write
7FF5573BB000
unkown
page readonly
1089E000
unkown
page read and write
357F000
stack
page read and write
109000
unkown
page readonly
2141E000
heap
page read and write
102000
unkown
page read and write
59BD000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
416B000
trusted library allocation
page read and write
1500000
heap
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
70A5000
heap
page read and write
31D5000
heap
page read and write
284C000
heap
page read and write
944000
heap
page read and write
3F0C000
heap
page read and write
1384000
heap
page read and write
3251000
heap
page read and write
333D000
stack
page read and write
944000
heap
page read and write
5420000
direct allocation
page read and write
1384000
heap
page read and write
8700000
unkown
page read and write
4B45000
trusted library allocation
page read and write
1F0000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
59DF000
trusted library allocation
page read and write
1384000
heap
page read and write
3310000
trusted library allocation
page read and write
5B4A000
trusted library allocation
page read and write
1500000
heap
page read and write
3383000
trusted library allocation
page read and write
2817000
heap
page read and write
1384000
heap
page read and write
6231000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
3174000
heap
page read and write
5A1C000
trusted library allocation
page read and write
3051000
heap
page read and write
4FD1000
heap
page read and write
27F5000
heap
page read and write
1723000
heap
page read and write
1080000
heap
page read and write
3169000
heap
page read and write
640000
heap
page read and write
1500000
heap
page read and write
8940000
unkown
page read and write
1384000
heap
page read and write
7FF55710A000
unkown
page readonly
8730000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
3268000
heap
page read and write
31B4000
trusted library allocation
page read and write
4A74000
trusted library allocation
page read and write
7FF557463000
unkown
page readonly
8700000
unkown
page read and write
3051000
heap
page read and write
99A000
remote allocation
page execute and read and write
2F20000
unkown
page read and write
197A000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
1384000
heap
page read and write
1384000
heap
page read and write
A6E000
heap
page read and write
944000
heap
page read and write
4ACF000
stack
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
7FF55720D000
unkown
page readonly
3A8F000
stack
page read and write
A23B000
unkown
page read and write
944000
heap
page read and write
1384000
heap
page read and write
3531000
trusted library allocation
page read and write
59A5000
trusted library allocation
page read and write
4310000
trusted library allocation
page read and write
4D8E000
stack
page read and write
7FF557148000
unkown
page readonly
944000
heap
page read and write
2924000
heap
page read and write
436D000
trusted library allocation
page read and write
AE3000
unkown
page execute read
3456000
heap
page read and write
860000
trusted library allocation
page read and write
4FD1000
heap
page read and write
734D000
stack
page read and write
1384000
heap
page read and write
36ED000
heap
page read and write
A286000
unkown
page read and write
8740000
unkown
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
8F60000
heap
page read and write
DE0000
heap
page read and write
598E000
heap
page read and write
944000
heap
page read and write
E330000
unkown
page read and write
32D0000
heap
page read and write
944000
heap
page read and write
4BA000
unkown
page write copy
1384000
heap
page read and write
5990000
trusted library allocation
page read and write
1384000
heap
page read and write
1280000
trusted library allocation
page read and write
66B0000
heap
page read and write
3FC8000
heap
page read and write
1384000
heap
page read and write
7FF7E60F6000
unkown
page write copy
3BA0000
heap
page read and write
623B000
heap
page read and write
32F1000
trusted library allocation
page read and write
71FC000
unkown
page read and write
944000
heap
page read and write
170E000
stack
page read and write
2816000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
13C0000
heap
page read and write
1425000
trusted library allocation
page execute and read and write
A87000
heap
page read and write
DB9000
unkown
page read and write
2D2F000
stack
page read and write
7E10000
unkown
page read and write
283A000
heap
page read and write
1384000
heap
page read and write
9E8E000
stack
page read and write
18CB000
heap
page read and write
3F0C000
heap
page read and write
36FA000
heap
page read and write
4C16000
trusted library allocation
page read and write
21340000
heap
page read and write
DC7000
heap
page read and write
8940000
unkown
page read and write
3051000
heap
page read and write
318B000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
30E1000
trusted library allocation
page read and write
31D5000
heap
page read and write
1384000
heap
page read and write
995E000
stack
page read and write
1503000
heap
page read and write
169B000
heap
page read and write
7FF55756D000
unkown
page readonly
3709000
heap
page read and write
7D8E000
stack
page read and write
3350000
unkown
page readonly
7078000
heap
page read and write
7FF557250000
unkown
page readonly
84F0000
unkown
page read and write
21340000
heap
page read and write
3230000
unkown
page read and write
27E1000
heap
page read and write
544C000
stack
page read and write
33A7000
trusted library allocation
page read and write
32A0000
heap
page read and write
4F80000
heap
page read and write
27FA000
heap
page read and write
3051000
heap
page read and write
3709000
heap
page read and write
312A000
trusted library allocation
page read and write
A87000
heap
page read and write
944000
heap
page read and write
4D70000
trusted library allocation
page read and write
1384000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
E30000
unkown
page readonly
5990000
trusted library allocation
page read and write
A8B000
heap
page read and write
7FF557571000
unkown
page readonly
FBA000
unkown
page read and write
944000
heap
page read and write
3179000
heap
page read and write
1384000
heap
page read and write
A81000
heap
page read and write
31D5000
heap
page read and write
122E000
stack
page read and write
4E80000
direct allocation
page execute and read and write
1384000
heap
page read and write
2D80000
direct allocation
page read and write
944000
heap
page read and write
5DD40000
unkown
page read and write
32AC000
heap
page read and write
285F000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1089F000
unkown
page read and write
3568000
trusted library allocation
page read and write
1970000
heap
page read and write
944000
heap
page read and write
815000
heap
page read and write
7FF5575E3000
unkown
page readonly
3251000
heap
page read and write
407B000
heap
page read and write
8700000
unkown
page read and write
3121000
trusted library allocation
page read and write
4EA0000
direct allocation
page execute and read and write
10F7000
stack
page read and write
4141000
trusted library allocation
page read and write
4614000
trusted library allocation
page read and write
6380000
heap
page read and write
59A7000
trusted library allocation
page read and write
A86000
heap
page read and write
2A0F000
heap
page read and write
C00001E000
direct allocation
page read and write
42BA000
trusted library allocation
page read and write
8700000
unkown
page read and write
32AC000
heap
page read and write
36E6000
heap
page read and write
8EEE000
unkown
page read and write
7028000
heap
page read and write
31CE000
heap
page read and write
4D20000
direct allocation
page read and write
3709000
heap
page read and write
1384000
heap
page read and write
8950000
unkown
page read and write
4AA2000
trusted library allocation
page read and write
2D420000
trusted library allocation
page read and write
412A000
heap
page read and write
944000
heap
page read and write
27A1000
heap
page read and write
4A97000
trusted library allocation
page read and write
1503000
heap
page read and write
B5D000
heap
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
3186000
heap
page read and write
7FF55738F000
unkown
page readonly
2CF0000
direct allocation
page execute and read and write
1384000
heap
page read and write
598A000
trusted library allocation
page read and write
3037000
trusted library allocation
page execute and read and write
5995000
trusted library allocation
page read and write
1384000
heap
page read and write
59A9000
trusted library allocation
page read and write
3288000
heap
page read and write
3194000
heap
page read and write
3184000
heap
page read and write
1384000
heap
page read and write
31D2000
heap
page read and write
4891000
heap
page read and write
3051000
heap
page read and write
43BF000
trusted library allocation
page read and write
132D000
stack
page read and write
36DC000
heap
page read and write
3888000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
32AC000
heap
page read and write
8740000
unkown
page read and write
10600000
unkown
page read and write
1384000
heap
page read and write
A154000
unkown
page read and write
13A4000
unkown
page readonly
1384000
heap
page read and write
325A000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
4891000
heap
page read and write
D14000
heap
page read and write
944000
heap
page read and write
3150000
heap
page read and write
3606000
trusted library allocation
page read and write
3051000
heap
page read and write
50B0000
unkown
page write copy
944000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
5A00000
trusted library allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
32C0000
heap
page read and write
10A0000
heap
page read and write
5978000
trusted library allocation
page read and write
A225000
unkown
page read and write
944000
heap
page read and write
A0000
unkown
page readonly
3410000
trusted library allocation
page read and write
944000
heap
page read and write
599A000
trusted library allocation
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
7FF7E5C0B000
unkown
page readonly
1384000
heap
page read and write
150D000
heap
page read and write
21344000
heap
page read and write
7169000
unkown
page read and write
944000
heap
page read and write
944000
heap
page read and write
45BE000
stack
page read and write
2817000
heap
page read and write
7FF5574EF000
unkown
page readonly
434000
unkown
page read and write
C10000
unkown
page read and write
6F62000
trusted library allocation
page read and write
2132A000
heap
page read and write
8D6C000
unkown
page read and write
1384000
heap
page read and write
3716000
heap
page read and write
944000
heap
page read and write
4111000
heap
page read and write
27D3000
heap
page read and write
436F000
stack
page read and write
1384000
heap
page read and write
C00015A000
direct allocation
page read and write
27E1000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1130000
heap
page read and write
473E000
stack
page read and write
31D2000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
F47000
unkown
page execute and read and write
1384000
heap
page read and write
3F19000
heap
page read and write
965B000
heap
page read and write
3051000
heap
page read and write
31CD000
heap
page read and write
59B4000
trusted library allocation
page read and write
2C10000
direct allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
43A6000
trusted library allocation
page read and write
4FD1000
heap
page read and write
4FD1000
heap
page read and write
902C000
unkown
page read and write
E1B9000
stack
page read and write
5BC0000
trusted library allocation
page read and write
3169000
heap
page read and write
4FD1000
heap
page read and write
8940000
unkown
page read and write
12A0000
trusted library allocation
page read and write
368B000
heap
page read and write
2A05000
heap
page read and write
13B0000
heap
page read and write
4203000
trusted library allocation
page read and write
176E000
stack
page read and write
6EDF0000
unkown
page readonly
B094000
unkown
page read and write
1521000
heap
page read and write
1384000
heap
page read and write
9F8F000
stack
page read and write
3051000
heap
page read and write
763E000
stack
page read and write
7FF5571B3000
unkown
page readonly
3051000
heap
page read and write
27F7000
heap
page read and write
4891000
heap
page read and write
595A000
heap
page read and write
944000
heap
page read and write
4FD1000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
8700000
unkown
page read and write
3051000
heap
page read and write
3440000
heap
page read and write
5580000
direct allocation
page execute and read and write
319C000
heap
page read and write
1384000
heap
page read and write
32AC000
heap
page read and write
61E01000
direct allocation
page execute read
325A000
heap
page read and write
7FF55703F000
unkown
page readonly
3162000
heap
page read and write
3169000
heap
page read and write
3051000
heap
page read and write
32AC000
heap
page read and write
336E000
stack
page read and write
3BCF000
stack
page read and write
1384000
heap
page read and write
32AC000
heap
page read and write
3151000
heap
page read and write
A0A5000
unkown
page read and write
1384000
heap
page read and write
5FAC000
stack
page read and write
944000
heap
page read and write
456B000
trusted library allocation
page read and write
370E000
stack
page read and write
944000
heap
page read and write
2FAE000
stack
page read and write
3F48000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
59CE000
trusted library allocation
page read and write
1384000
heap
page read and write
FBB000
unkown
page readonly
2480000
heap
page read and write
5620000
direct allocation
page execute and read and write
944000
heap
page read and write
3173000
heap
page read and write
27F6000
heap
page read and write
1384000
heap
page read and write
19D000
stack
page read and write
4214000
trusted library allocation
page read and write
944000
heap
page read and write
3F71000
trusted library allocation
page read and write
1E9A1EB0000
direct allocation
page read and write
1654000
trusted library allocation
page read and write
4598000
trusted library allocation
page read and write
A8B000
heap
page read and write
4891000
heap
page read and write
4FD1000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
75C0000
trusted library allocation
page read and write
367D000
trusted library allocation
page read and write
8EC2000
heap
page read and write
2960000
heap
page read and write
B4A6000
stack
page read and write
55B0000
direct allocation
page execute and read and write
131A000
heap
page read and write
6EE0F000
unkown
page readonly
944000
heap
page read and write
C80000
heap
page read and write
8970000
unkown
page read and write
2801000
heap
page read and write
418E000
trusted library allocation
page read and write
197E000
heap
page read and write
8700000
unkown
page read and write
31D5000
heap
page read and write
1384000
heap
page read and write
36E0000
heap
page read and write
3F90000
heap
page read and write
7DC0000
heap
page read and write
8EB8000
unkown
page read and write
8700000
unkown
page read and write
5989000
trusted library allocation
page read and write
944000
heap
page read and write
132B000
heap
page read and write
2F20000
unkown
page read and write
C00004D000
direct allocation
page read and write
1384000
heap
page read and write
EA0000
heap
page read and write
1384000
heap
page read and write
5758000
trusted library allocation
page read and write
7360000
heap
page read and write
1384000
heap
page read and write
120B000
stack
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
E32000
unkown
page readonly
3051000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
3221000
heap
page read and write
3F09000
heap
page read and write
6F3C000
stack
page read and write
A84000
heap
page read and write
31F4000
heap
page read and write
4FD1000
heap
page read and write
8296000
heap
page read and write
4E90000
direct allocation
page execute and read and write
31F5000
heap
page read and write
329B000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
FE0000
heap
page read and write
8710000
unkown
page read and write
1500000
heap
page read and write
3FE8000
heap
page read and write
37C8000
heap
page read and write
32AC000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
C00031A000
direct allocation
page read and write
7FF7E60F2000
unkown
page write copy
4153000
heap
page read and write
3F1A000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
C000024000
direct allocation
page read and write
1384000
heap
page read and write
944000
heap
page read and write
66F0000
trusted library allocation
page execute and read and write
944000
heap
page read and write
58C0000
heap
page read and write
31CD000
heap
page read and write
4740000
unclassified section
page read and write
3735000
heap
page read and write
59C8000
trusted library allocation
page read and write
2DC0000
heap
page read and write
944000
heap
page read and write
E330000
unkown
page read and write
1384000
heap
page read and write
36F5000
heap
page read and write
957E000
stack
page read and write
5895000
trusted library allocation
page read and write
4891000
heap
page read and write
8D68000
unkown
page read and write
1384000
heap
page read and write
14E9000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
2133F000
heap
page read and write
36F2000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1AFBE000
stack
page read and write
2816000
heap
page read and write
2E96000
heap
page read and write
42FB000
trusted library allocation
page read and write
2134D000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
3589000
trusted library allocation
page read and write
944000
heap
page read and write
3051000
heap
page read and write
36EE000
heap
page read and write
944000
heap
page read and write
8720000
unkown
page read and write
84F0000
unkown
page read and write
A64000
heap
page read and write
944000
heap
page read and write
2DC4000
heap
page read and write
107A000
unkown
page execute and write copy
1384000
heap
page read and write
14F5000
heap
page read and write
1384000
heap
page read and write
1160000
heap
page read and write
105000
unkown
page read and write
5A09000
trusted library allocation
page read and write
2881000
heap
page read and write
593E000
trusted library allocation
page read and write
2F7A000
heap
page read and write
73F0000
unkown
page read and write
32BF000
heap
page read and write
3716000
heap
page read and write
303B000
trusted library allocation
page execute and read and write
8700000
unkown
page read and write
105000
unkown
page read and write
7FF557009000
unkown
page readonly
C0000F0000
direct allocation
page read and write
5491000
direct allocation
page read and write
1480000
heap
page read and write
4210000
trusted library allocation
page read and write
8720000
unkown
page read and write
1384000
heap
page read and write
A64000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
3771000
heap
page read and write
21341000
heap
page read and write
7DF4689B1000
unkown
page execute read
B2C000
heap
page read and write
1384000
heap
page read and write
2892000
heap
page read and write
497E000
stack
page read and write
1384000
heap
page read and write
5926000
trusted library allocation
page read and write
4B30000
trusted library allocation
page execute and read and write
27FC000
heap
page read and write
1384000
heap
page read and write
4D66000
trusted library allocation
page read and write
1384000
heap
page read and write
A64000
heap
page read and write
BAE000
stack
page read and write
4154000
heap
page read and write
5610000
direct allocation
page execute and read and write
C1DB000
unkown
page read and write
892000
trusted library allocation
page read and write
3C2E000
stack
page read and write
41FE000
stack
page read and write
74F5000
trusted library allocation
page read and write
28F8000
heap
page read and write
7FF7E5BEE000
unkown
page read and write
18B0000
direct allocation
page read and write
1384000
heap
page read and write
8710000
unkown
page read and write
31D5000
heap
page read and write
27C9000
heap
page read and write
1384000
heap
page read and write
36C1000
heap
page read and write
4891000
heap
page read and write
944000
heap
page read and write
27E2000
heap
page read and write
34C9000
trusted library allocation
page read and write
27FA000
heap
page read and write
1384000
heap
page read and write
2D4CA000
heap
page read and write
978000
unkown
page readonly
36F3000
heap
page read and write
7B0000
heap
page read and write
4FA000
stack
page read and write
84F0000
unkown
page read and write
1384000
heap
page read and write
32B9000
heap
page read and write
1384000
heap
page read and write
4023000
heap
page read and write
8F27000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
4284000
trusted library allocation
page read and write
1720000
heap
page read and write
401A000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
8710000
unkown
page read and write
3051000
heap
page read and write
65B1000
trusted library allocation
page read and write
27F6000
heap
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
74E4000
trusted library allocation
page read and write
944000
heap
page read and write
2C10000
direct allocation
page read and write
1384000
heap
page read and write
56C1000
trusted library allocation
page read and write
EF83000
unkown
page read and write
1384000
heap
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
598A000
heap
page read and write
2F20000
unkown
page read and write
944000
heap
page read and write
32D7000
unkown
page read and write
2C04000
stack
page read and write
6EE06000
unkown
page readonly
A00A000
stack
page read and write
1384000
heap
page read and write
68B0000
heap
page read and write
2816000
heap
page read and write
8BD9000
stack
page read and write
6B90000
trusted library allocation
page read and write
7FF5573FF000
unkown
page readonly
944000
heap
page read and write
8700000
unkown
page read and write
31D2000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
1384000
heap
page read and write
8700000
unkown
page read and write
7FF5575E0000
unkown
page readonly
60FD000
stack
page read and write
1384000
heap
page read and write
5DB52000
unkown
page readonly
1384000
heap
page read and write
944000
heap
page read and write
8740000
unkown
page read and write
910E000
unkown
page read and write
8940000
unkown
page read and write
4212000
heap
page read and write
1384000
heap
page read and write
7FF7E60F6000
unkown
page write copy
3051000
heap
page read and write
8940000
unkown
page read and write
3118000
trusted library allocation
page read and write
1E9E7100000
direct allocation
page read and write
599A000
trusted library allocation
page read and write
32C3000
heap
page read and write
3709000
heap
page read and write
1384000
heap
page read and write
2C20000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
31F8000
heap
page read and write
32C7000
unkown
page read and write
27B4000
heap
page read and write
3B7F000
stack
page read and write
1384000
heap
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
7FF55707D000
unkown
page readonly
343E000
stack
page read and write
32AC000
trusted library allocation
page read and write
8870000
unkown
page read and write
1384000
heap
page read and write
1C22FFF000
stack
page read and write
1384000
heap
page read and write
31CD000
heap
page read and write
944000
heap
page read and write
1740000
heap
page read and write
1740000
heap
page read and write
34F0000
heap
page read and write
7FF557352000
unkown
page readonly
944000
heap
page read and write
61ED3000
direct allocation
page read and write
1384000
heap
page read and write
7FF557210000
unkown
page readonly
BA7000
heap
page read and write
880000
heap
page read and write
4565000
trusted library allocation
page read and write
1225000
unkown
page execute and write copy
944000
heap
page read and write
1486000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
2F20000
unkown
page read and write
84C5000
trusted library allocation
page read and write
8720000
unkown
page read and write
13CA000
heap
page read and write
325A000
heap
page read and write
1384000
heap
page read and write
37B8000
heap
page read and write
4FD1000
heap
page read and write
4891000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
8710000
unkown
page read and write
5720000
heap
page read and write
31B9000
heap
page read and write
2817000
heap
page read and write
5590000
direct allocation
page execute and read and write
944000
heap
page read and write
32C5000
trusted library allocation
page read and write
C40D000
unkown
page read and write
3169000
heap
page read and write
623B000
heap
page read and write
2859000
heap
page read and write
8870000
unkown
page read and write
31AD000
heap
page read and write
6EE0000
heap
page read and write
188E000
stack
page read and write
4ADE000
heap
page read and write
398E000
stack
page read and write
944000
heap
page read and write
944000
heap
page read and write
309D000
stack
page read and write
944000
heap
page read and write
1384000
heap
page read and write
15FE000
stack
page read and write
348E000
stack
page read and write
4078000
trusted library allocation
page read and write
2E7F000
heap
page execute and read and write
4891000
heap
page read and write
C553000
unkown
page read and write
674F000
stack
page read and write
1384000
heap
page read and write
2893000
heap
page read and write
3051000
heap
page read and write
3FEE000
stack
page read and write
1384000
heap
page read and write
7E9000
unkown
page read and write
7FF5573ED000
unkown
page readonly
358D000
stack
page read and write
1079000
unkown
page execute and read and write
8700000
unkown
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
C000114000
direct allocation
page read and write
10884000
unkown
page read and write
FEC1000
unkown
page read and write
A810000
unkown
page read and write
944000
heap
page read and write
5732000
trusted library allocation
page read and write
5590000
direct allocation
page execute and read and write
2872000
heap
page read and write
27C9000
heap
page read and write
59B0000
trusted library allocation
page read and write
4578000
trusted library allocation
page read and write
19E0000
heap
page read and write
329C000
heap
page read and write
77F0000
unkown
page read and write
598F000
trusted library allocation
page read and write
2836000
heap
page read and write
44EF000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1440000
unkown
page readonly
3712000
heap
page read and write
2A05000
heap
page read and write
3221000
heap
page read and write
372B000
heap
page read and write
15A6000
heap
page read and write
136E000
stack
page read and write
944000
heap
page read and write
13FD000
trusted library allocation
page execute and read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
2470000
trusted library allocation
page read and write
1384000
heap
page read and write
102000
unkown
page write copy
944000
heap
page read and write
7BA000
unkown
page read and write
27F7000
heap
page read and write
944000
heap
page read and write
283C000
heap
page read and write
1384000
heap
page read and write
287F000
heap
page read and write
944000
heap
page read and write
8700000
unkown
page read and write
5937000
heap
page read and write
2DA0000
heap
page execute and read and write
1384000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
2C40000
heap
page read and write
8940000
unkown
page read and write
21330000
heap
page read and write
429E000
trusted library allocation
page read and write
CEB000
stack
page read and write
DB5000
heap
page read and write
C480000
unkown
page read and write
944000
heap
page read and write
950000
unkown
page readonly
7FF5573A9000
unkown
page readonly
8940000
unkown
page read and write
3182000
heap
page read and write
8730000
unkown
page read and write
1384000
heap
page read and write
1346000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
27F2000
heap
page read and write
56C6000
trusted library allocation
page read and write
3699000
trusted library allocation
page read and write
1384000
heap
page read and write
7FF7E60F2000
unkown
page read and write
3163000
heap
page read and write
4189000
trusted library allocation
page read and write
E4FD000
stack
page read and write
1384000
heap
page read and write
4891000
heap
page read and write
28C5000
heap
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
367F000
stack
page read and write
4891000
heap
page read and write
3169000
heap
page read and write
59B7000
trusted library allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
59DF000
trusted library allocation
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
75B0000
trusted library allocation
page read and write
2816000
heap
page read and write
7A4B000
stack
page read and write
2132F000
heap
page read and write
32AC000
heap
page read and write
1745000
heap
page read and write
1089E000
unkown
page read and write
9F0000
trusted library allocation
page execute and read and write
1384000
heap
page read and write
C00007B000
direct allocation
page read and write
37EE000
heap
page read and write
895000
unkown
page read and write
3490000
remote allocation
page read and write
7FF557280000
unkown
page readonly
944000
heap
page read and write
2862000
heap
page read and write
36D5000
heap
page read and write
2134D000
heap
page read and write
348D000
stack
page read and write
944000
heap
page read and write
944000
heap
page read and write
5506000
trusted library allocation
page read and write
27DE000
heap
page read and write
1384000
heap
page read and write
8740000
unkown
page read and write
944000
heap
page read and write
2F20000
unkown
page read and write
3051000
heap
page read and write
3168000
heap
page read and write
31AA000
heap
page read and write
E91000
unkown
page execute read
3673000
heap
page read and write
31D5000
heap
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
C04B000
unkown
page read and write
13F4000
heap
page read and write
1384000
heap
page read and write
5997000
trusted library allocation
page read and write
944000
heap
page read and write
1640000
direct allocation
page read and write
4891000
heap
page read and write
32AC000
heap
page read and write
27E1000
heap
page read and write
10888000
unkown
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1560000
trusted library allocation
page read and write
422F000
trusted library allocation
page read and write
944000
heap
page read and write
506B000
stack
page read and write
1384000
heap
page read and write
14F2000
heap
page read and write
944000
heap
page read and write
C22F000
unkown
page read and write
3051000
heap
page read and write
3874000
heap
page read and write
12B5000
heap
page read and write
3715000
heap
page read and write
D70000
heap
page read and write
61ED0000
direct allocation
page read and write
944000
heap
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
32AC000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
3715000
heap
page read and write
8950000
unkown
page read and write
36F1000
heap
page read and write
8730000
unkown
page read and write
944000
heap
page read and write
32C7000
heap
page read and write
3159000
heap
page read and write
21344000
heap
page read and write
1745000
heap
page read and write
3638000
heap
page read and write
944000
heap
page read and write
8F90000
heap
page read and write
4FE4000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
59B6000
trusted library allocation
page read and write
A110000
unkown
page read and write
3193000
heap
page read and write
A8B000
heap
page read and write
8940000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
3506000
trusted library allocation
page read and write
74D5000
trusted library allocation
page read and write
8930000
heap
page read and write
798E000
stack
page read and write
8710000
unkown
page read and write
384E000
stack
page read and write
31E7000
heap
page read and write
647E000
stack
page read and write
372F000
trusted library allocation
page read and write
48A2000
heap
page read and write
944000
heap
page read and write
317F000
heap
page read and write
13F4000
heap
page read and write
919F000
stack
page read and write
1384000
heap
page read and write
3490000
remote allocation
page read and write
944000
heap
page read and write
4891000
heap
page read and write
1069000
unkown
page execute and read and write
7FF7E5BB9000
unkown
page write copy
CF3000
stack
page read and write
944000
heap
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
368D000
heap
page read and write
59FA000
stack
page read and write
4FD1000
heap
page read and write
40DF000
heap
page read and write
7FF557174000
unkown
page readonly
4891000
heap
page read and write
1384000
heap
page read and write
E91000
unkown
page execute read
413A000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
358B000
trusted library allocation
page read and write
56A4000
trusted library allocation
page read and write
8710000
unkown
page read and write
944000
heap
page read and write
1384000
heap
page read and write
59C6000
trusted library allocation
page read and write
55B0000
direct allocation
page execute and read and write
944000
heap
page read and write
B050000
unkown
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
7FF556FFF000
unkown
page readonly
4891000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
1E9A1CC0000
heap
page read and write
4DC0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
428A000
trusted library allocation
page read and write
32B9000
heap
page read and write
C00000C000
direct allocation
page read and write
1384000
heap
page read and write
59D6000
trusted library allocation
page read and write
4A7E000
trusted library allocation
page read and write
3F17000
heap
page read and write
1384000
heap
page read and write
38C4000
heap
page read and write
4891000
heap
page read and write
821000
heap
page read and write
1384000
heap
page read and write
B5AD000
stack
page read and write
944000
heap
page read and write
2F90000
unkown
page readonly
4ECE000
stack
page read and write
1384000
heap
page read and write
4891000
heap
page read and write
32ED000
stack
page read and write
7FF55730C000
unkown
page readonly
3709000
heap
page read and write
7FF5570D4000
unkown
page readonly
944000
heap
page read and write
8700000
unkown
page read and write
47C6000
unkown
page read and write
3A3F000
stack
page read and write
8710000
unkown
page read and write
3163000
heap
page read and write
1384000
heap
page read and write
3AAF000
stack
page read and write
313F000
trusted library allocation
page read and write
4668000
trusted library allocation
page read and write
1384000
heap
page read and write
2880000
heap
page read and write
4FD1000
heap
page read and write
3F3F000
stack
page read and write
74F0000
trusted library allocation
page read and write
28C5000
heap
page read and write
8370000
heap
page read and write
2D4C0000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
4EE0000
heap
page read and write
4E60000
trusted library allocation
page read and write
4AD0000
heap
page read and write
91E0000
trusted library allocation
page execute and read and write
9410000
heap
page read and write
1384000
heap
page read and write
104C0000
unkown
page read and write
5982000
trusted library allocation
page read and write
32A5000
heap
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
A131000
unkown
page read and write
8940000
unkown
page read and write
8700000
unkown
page read and write
5700000
heap
page read and write
1384000
heap
page read and write
5978000
heap
page read and write
1384000
heap
page read and write
3715000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
32AC000
heap
page read and write
58D0000
heap
page read and write
1471000
heap
page read and write
1384000
heap
page read and write
A74000
heap
page read and write
3FDD000
heap
page read and write
7DBC000
trusted library allocation
page read and write
22DC000
stack
page read and write
944000
heap
page read and write
434000
unkown
page read and write
8940000
unkown
page read and write
31D5000
heap
page read and write
781000
unkown
page execute and write copy
A5F000
heap
page read and write
1330000
heap
page read and write
8700000
unkown
page read and write
944000
heap
page read and write
3169000
heap
page read and write
C0000E6000
direct allocation
page read and write
1384000
heap
page read and write
944000
heap
page read and write
288E000
heap
page read and write
30DE000
trusted library allocation
page read and write
7FF5571DF000
unkown
page readonly
A60000
heap
page read and write
104000
unkown
page write copy
5990000
trusted library allocation
page read and write
400000
unkown
page readonly
C00003B000
direct allocation
page read and write
944000
heap
page read and write
1A0000
heap
page read and write
8700000
unkown
page read and write
50D0000
trusted library allocation
page read and write
21330000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
F09000
stack
page read and write
A8B000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
7FF556E98000
unkown
page readonly
944000
heap
page read and write
4C3A000
trusted library allocation
page read and write
1521000
heap
page read and write
42F4000
trusted library allocation
page read and write
7FF7E5C04000
unkown
page read and write
104CA000
unkown
page read and write
4C22000
trusted library allocation
page read and write
31B5000
heap
page read and write
663F000
heap
page read and write
944000
heap
page read and write
599F000
trusted library allocation
page read and write
944000
heap
page read and write
28C5000
heap
page read and write
350B000
trusted library allocation
page read and write
944000
heap
page read and write
1464000
heap
page read and write
1384000
heap
page read and write
243C000
stack
page read and write
7F6F0000
trusted library allocation
page execute and read and write
325A000
heap
page read and write
1384000
heap
page read and write
4A82000
trusted library allocation
page read and write
944000
heap
page read and write
31AE000
heap
page read and write
8730000
unkown
page read and write
7FF55704A000
unkown
page readonly
944000
heap
page read and write
1384000
heap
page read and write
104CA000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
B37000
heap
page read and write
2133F000
heap
page read and write
1384000
heap
page read and write
31B6000
heap
page read and write
27A1000
heap
page read and write
21330000
heap
page read and write
621C000
heap
page read and write
4FD1000
heap
page read and write
8510000
unkown
page read and write
290C000
heap
page read and write
1384000
heap
page read and write
8940000
unkown
page read and write
9580000
unkown
page readonly
151D000
heap
page read and write
3750000
heap
page read and write
60EE000
stack
page read and write
6638000
heap
page read and write
32F3000
unkown
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
5978000
trusted library allocation
page read and write
C072000
unkown
page read and write
1384000
heap
page read and write
32AC000
heap
page read and write
32B0000
direct allocation
page execute and read and write
32AC000
heap
page read and write
420F000
stack
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
A5F000
heap
page read and write
31D5000
heap
page read and write
CFD000
stack
page read and write
638C000
heap
page read and write
4167000
heap
page read and write
3111000
trusted library allocation
page read and write
132D000
stack
page read and write
27BB000
heap
page read and write
3186000
heap
page read and write
2836000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
31A9000
heap
page read and write
944000
heap
page read and write
8700000
unkown
page read and write
944000
heap
page read and write
7FF557026000
unkown
page readonly
1400000
trusted library allocation
page read and write
31B9000
heap
page read and write
7FF55760F000
unkown
page readonly
4241000
trusted library allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
7FF7E60F3000
unkown
page write copy
14F8000
heap
page read and write
597D000
trusted library allocation
page read and write
1384000
heap
page read and write
8870000
unkown
page read and write
270000
unkown
page readonly
7176000
unkown
page read and write
46F0000
unkown
page read and write
944000
heap
page read and write
8720000
unkown
page read and write
1521000
heap
page read and write
179E000
stack
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
944000
heap
page read and write
27F7000
heap
page read and write
59A8000
trusted library allocation
page read and write
3169000
heap
page read and write
1384000
heap
page read and write
978000
unkown
page readonly
CF9000
stack
page read and write
A1FD000
unkown
page read and write
A4D000
heap
page read and write
36E8000
trusted library allocation
page read and write
6ED0000
heap
page read and write
4E50000
remote allocation
page read and write
C00001A000
direct allocation
page read and write
C559000
unkown
page read and write
DFC000
heap
page read and write
F0000
unkown
page readonly
944000
heap
page read and write
97C000
stack
page read and write
40B0000
heap
page read and write
8720000
unkown
page read and write
392F000
stack
page read and write
3051000
heap
page read and write
C000780000
direct allocation
page read and write
944000
heap
page read and write
9210000
heap
page read and write
14F2000
heap
page read and write
36DC000
heap
page read and write
944000
heap
page read and write
3287000
heap
page read and write
382F000
stack
page read and write
3370000
heap
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
811000
heap
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
59C1000
trusted library allocation
page read and write
1507000
heap
page read and write
944000
heap
page read and write
7FF55720B000
unkown
page readonly
1384000
heap
page read and write
5998000
trusted library allocation
page read and write
3051000
heap
page read and write
DEA000
stack
page read and write
C23A000
unkown
page read and write
7FF557456000
unkown
page readonly
944000
heap
page read and write
14F2000
heap
page read and write
21330000
heap
page read and write
548B000
stack
page read and write
1384000
heap
page read and write
4CAC000
stack
page read and write
E55000
unkown
page readonly
2803000
heap
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
6F7000
stack
page read and write
9853000
unkown
page read and write
944000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
C000760000
direct allocation
page read and write
36EE000
heap
page read and write
8740000
unkown
page read and write
109000
unkown
page readonly
7FF55732D000
unkown
page readonly
C0000EA000
direct allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
31B9000
heap
page read and write
448F000
stack
page read and write
42B5000
trusted library allocation
page read and write
21316000
heap
page read and write
944000
heap
page read and write
A280000
unkown
page read and write
283D000
heap
page read and write
32AC000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
36FA000
heap
page read and write
4106000
heap
page read and write
36F2000
heap
page read and write
328F000
heap
page read and write
65C0000
trusted library allocation
page execute and read and write
3151000
heap
page read and write
1384000
heap
page read and write
13F4000
heap
page read and write
27F6000
heap
page read and write
E260000
unkown
page read and write
3051000
heap
page read and write
31A4000
heap
page read and write
31FD000
stack
page read and write
4574000
trusted library allocation
page read and write
35A6000
heap
page read and write
C5B8000
unkown
page read and write
36AA000
trusted library allocation
page read and write
3179000
heap
page read and write
944000
heap
page read and write
75F0000
trusted library allocation
page execute and read and write
3051000
heap
page read and write
27A1000
heap
page read and write
944000
heap
page read and write
8940000
unkown
page read and write
2FFE000
stack
page read and write
8700000
unkown
page read and write
8720000
unkown
page read and write
88A0000
unkown
page read and write
8700000
unkown
page read and write
8700000
unkown
page read and write
27B2000
heap
page read and write
4558000
trusted library allocation
page read and write
FEE000
heap
page read and write
944000
heap
page read and write
4600000
trusted library allocation
page read and write
8740000
unkown
page read and write
7FF557434000
unkown
page readonly
9CDC000
stack
page read and write
4891000
heap
page read and write
1223000
unkown
page execute and read and write
8700000
unkown
page read and write
105000
unkown
page read and write
1264000
trusted library allocation
page read and write
E330000
unkown
page read and write
1384000
heap
page read and write
3178000
heap
page read and write
1384000
heap
page read and write
65E5000
heap
page read and write
7FF557045000
unkown
page readonly
338B000
trusted library allocation
page read and write
5C7F000
stack
page read and write
7A60000
unkown
page readonly
D10000
heap
page read and write
9CC000
heap
page read and write
41F6000
trusted library allocation
page read and write
7FF5574BA000
unkown
page readonly
2C10000
direct allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
7FF557476000
unkown
page readonly
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
76B0000
unkown
page read and write
331A000
heap
page read and write
391000
unkown
page execute read
944000
heap
page read and write
3170000
heap
page read and write
26A1000
heap
page read and write
9C000
stack
page read and write
944000
heap
page read and write
84D0000
trusted library allocation
page read and write
4184000
trusted library allocation
page read and write
1384000
heap
page read and write
41DD000
heap
page read and write
1384000
heap
page read and write
5D00000
heap
page read and write
C000094000
direct allocation
page read and write
1384000
heap
page read and write
14DE000
stack
page read and write
8870000
unkown
page read and write
35B5000
heap
page read and write
1384000
heap
page read and write
326B000
heap
page read and write
1384000
heap
page read and write
229B000
stack
page read and write
944000
heap
page read and write
7FF7E607B000
unkown
page read and write
104C4000
unkown
page read and write
59B0000
trusted library allocation
page read and write
31B9000
heap
page read and write
1384000
heap
page read and write
38CE000
heap
page read and write
944000
heap
page read and write
4114000
trusted library allocation
page read and write
8700000
unkown
page read and write
2836000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
32AC000
heap
page read and write
32AC000
heap
page read and write
EFC000
stack
page read and write
318F000
heap
page read and write
2A1E000
heap
page read and write
31D7000
heap
page read and write
1384000
heap
page read and write
44EE000
stack
page read and write
2D5E000
stack
page read and write
457F000
stack
page read and write
3322000
heap
page read and write
1384000
heap
page read and write
C12D000
unkown
page read and write
944000
heap
page read and write
104000
unkown
page write copy
52CC000
stack
page read and write
3763000
heap
page read and write
1C225FE000
stack
page read and write
7FF5575B9000
unkown
page readonly
36F4000
heap
page read and write
59B7000
trusted library allocation
page read and write
59AE000
heap
page read and write
59BA000
heap
page read and write
944000
heap
page read and write
31E0000
heap
page read and write
597B000
trusted library allocation
page read and write
59B8000
trusted library allocation
page read and write
8740000
unkown
page read and write
A64000
heap
page read and write
944000
heap
page read and write
A78000
heap
page read and write
1384000
heap
page read and write
7FF55728F000
unkown
page readonly
132B000
heap
page read and write
3251000
heap
page read and write
3051000
heap
page read and write
59C1000
trusted library allocation
page read and write
4891000
heap
page read and write
3051000
heap
page read and write
4116000
heap
page read and write
8700000
unkown
page read and write
944000
heap
page read and write
7F8000
heap
page read and write
75CB000
trusted library allocation
page read and write
8700000
unkown
page read and write
944000
heap
page read and write
8EC5000
unkown
page read and write
5976000
trusted library allocation
page read and write
2841000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
3716000
heap
page read and write
8720000
unkown
page read and write
37FE000
heap
page read and write
A64000
heap
page read and write
434F000
stack
page read and write
32AC000
heap
page read and write
3051000
heap
page read and write
55C0000
direct allocation
page execute and read and write
944000
heap
page read and write
1384000
heap
page read and write
8700000
unkown
page read and write
1ABFF000
stack
page read and write
3051000
heap
page read and write
2133F000
heap
page read and write
BC10000
unkown
page read and write
32AC000
heap
page read and write
944000
heap
page read and write
3169000
heap
page read and write
81A000
heap
page read and write
1384000
heap
page read and write
8710000
unkown
page read and write
8710000
unkown
page read and write
2F6E000
stack
page read and write
944000
heap
page read and write
36FA000
heap
page read and write
8710000
unkown
page read and write
1384000
heap
page read and write
5B41000
trusted library allocation
page read and write
944000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
104C8000
unkown
page read and write
74B5000
trusted library allocation
page read and write
944000
heap
page read and write
4891000
heap
page read and write
158E000
heap
page read and write
27E2000
heap
page read and write
2876000
heap
page read and write
455E000
trusted library allocation
page read and write
1384000
heap
page read and write
35AE000
heap
page read and write
944000
heap
page read and write
400000
unkown
page execute and read and write
3051000
heap
page read and write
944000
heap
page read and write
370D000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
107A000
unkown
page execute and write copy
493F000
stack
page read and write
27CA000
heap
page read and write
3051000
heap
page read and write
28C5000
heap
page read and write
2D20000
heap
page read and write
C000064000
direct allocation
page read and write
5CBE000
stack
page read and write
1302000
heap
page read and write
1384000
heap
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
14F2000
heap
page read and write
4891000
heap
page read and write
5DB60000
unkown
page readonly
3051000
heap
page read and write
31CE000
heap
page read and write
C18A000
unkown
page read and write
80000
unkown
page readonly
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
A858000
unkown
page read and write
3051000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1085000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
2804000
heap
page read and write
317C000
heap
page read and write
31D5000
heap
page read and write
2C50000
heap
page read and write
2843000
heap
page read and write
36F9000
heap
page read and write
C59000
heap
page read and write
41C2000
heap
page read and write
8700000
unkown
page read and write
5520000
trusted library allocation
page read and write
2C10000
direct allocation
page read and write
3051000
heap
page read and write
8A0000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
E5FD000
stack
page read and write
944000
heap
page read and write
944000
heap
page read and write
9400000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
5980000
trusted library allocation
page read and write
8D74000
unkown
page read and write
B29000
heap
page read and write
31CD000
heap
page read and write
423F000
heap
page read and write
2816000
heap
page read and write
31D5000
heap
page read and write
944000
heap
page read and write
326E000
heap
page read and write
3051000
heap
page read and write
2859000
heap
page read and write
4891000
heap
page read and write
7FF557264000
unkown
page readonly
5975000
trusted library allocation
page read and write
9FF000
heap
page read and write
944000
heap
page read and write
8720000
unkown
page read and write
21346000
heap
page read and write
8940000
unkown
page read and write
8940000
unkown
page read and write
370C000
heap
page read and write
4891000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
7FF55710F000
unkown
page readonly
1384000
heap
page read and write
1384000
heap
page read and write
8EDD000
unkown
page read and write
A81000
heap
page read and write
7FF557602000
unkown
page readonly
2132B000
heap
page read and write
1291000
heap
page read and write
1384000
heap
page read and write
6546000
heap
page read and write
3177000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
31A1000
heap
page read and write
4891000
heap
page read and write
AA6000
heap
page read and write
944000
heap
page read and write
34CE000
stack
page read and write
8700000
unkown
page read and write
3051000
heap
page read and write
C244000
unkown
page read and write
1518000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
370E000
trusted library allocation
page read and write
324E000
stack
page read and write
34D8000
trusted library allocation
page read and write
A8B000
heap
page read and write
944000
heap
page read and write
8950000
unkown
page read and write
3050000
heap
page read and write
65BC000
stack
page read and write
1384000
heap
page read and write
5BB0000
trusted library allocation
page execute and read and write
27E2000
heap
page read and write
330A000
unkown
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
A0BF000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
D51000
unkown
page execute and write copy
33F70000
heap
page read and write
7FF5571A1000
unkown
page readonly
944000
heap
page read and write
1384000
heap
page read and write
C000057000
direct allocation
page read and write
FEC0000
unkown
page read and write
A64000
heap
page read and write
5A11000
trusted library allocation
page read and write
3051000
heap
page read and write
31F8000
heap
page read and write
3672000
heap
page read and write
4891000
heap
page read and write
944000
heap
page read and write
8E0000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
40A0000
trusted library allocation
page read and write
5590000
direct allocation
page execute and read and write
7010000
heap
page read and write
89A000
trusted library allocation
page execute and read and write
7FF55726A000
unkown
page readonly
8710000
unkown
page read and write
944000
heap
page read and write
1384000
heap
page read and write
3249000
unkown
page read and write
944000
heap
page read and write
4C11000
trusted library allocation
page read and write
158B000
heap
page read and write
6EE06000
unkown
page readonly
318E000
heap
page read and write
C0000EE000
direct allocation
page read and write
3322000
heap
page read and write
401C000
heap
page read and write
C1DF000
unkown
page read and write
35CE000
stack
page read and write
2FB3000
heap
page read and write
1384000
heap
page read and write
A0A8000
unkown
page read and write
944000
heap
page read and write
3051000
heap
page read and write
9A0000
heap
page read and write
3051000
heap
page read and write
12FC000
stack
page read and write
711F000
heap
page read and write
2A10000
heap
page read and write
7FF7E5BBE000
unkown
page write copy
40D0000
trusted library allocation
page read and write
60AF000
stack
page read and write
370C000
heap
page read and write
31AE000
heap
page read and write
944000
heap
page read and write
2134C000
heap
page read and write
27E1000
heap
page read and write
7FF557382000
unkown
page readonly
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
8940000
unkown
page read and write
18B0000
direct allocation
page read and write
1384000
heap
page read and write
28C5000
heap
page read and write
17CF000
stack
page read and write
625C000
stack
page read and write
7EB000
unkown
page execute and read and write
4271000
trusted library allocation
page read and write
1520000
heap
page read and write
944000
heap
page read and write
2893000
heap
page read and write
5A10000
trusted library allocation
page read and write
3169000
heap
page read and write
45A4000
trusted library allocation
page read and write
36FA000
heap
page read and write
422F000
stack
page read and write
944000
heap
page read and write
7FF557467000
unkown
page readonly
1384000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
8E65000
heap
page read and write
8940000
unkown
page read and write
412F000
trusted library allocation
page read and write
1422000
trusted library allocation
page read and write
36A4000
heap
page read and write
92000
unkown
page read and write
5890000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
C000046000
direct allocation
page read and write
3051000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
556F000
stack
page read and write
3191000
heap
page read and write
1384000
heap
page read and write
A92000
unkown
page execute and read and write
1384000
heap
page read and write
8700000
unkown
page read and write
3051000
heap
page read and write
18D9000
heap
page read and write
C5AC000
unkown
page read and write
8700000
unkown
page read and write
944000
heap
page read and write
1530000
trusted library allocation
page read and write
944000
heap
page read and write
1060000
unkown
page read and write
4830000
unkown
page read and write
3051000
heap
page read and write
32AC000
heap
page read and write
59CA000
trusted library allocation
page read and write
6667000
heap
page read and write
1094D000
unkown
page read and write
DB9000
unkown
page read and write
7FF556FE3000
unkown
page readonly
3051000
heap
page read and write
1521000
heap
page read and write
8700000
unkown
page read and write
40E2000
heap
page read and write
31F4000
heap
page read and write
4FA1000
heap
page read and write
80B000
heap
page read and write
370C000
heap
page read and write
1384000
heap
page read and write
A873000
unkown
page read and write
59D8000
trusted library allocation
page read and write
64EE000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
8810000
unkown
page readonly
32BF000
heap
page read and write
4B22000
trusted library allocation
page read and write
13BE000
stack
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
8720000
unkown
page read and write
16C7000
heap
page read and write
B3D000
heap
page read and write
5990000
trusted library allocation
page read and write
1384000
heap
page read and write
7AEE000
stack
page read and write
1384000
heap
page read and write
CAE000
stack
page read and write
1384000
heap
page read and write
C000026000
direct allocation
page read and write
D50000
unkown
page readonly
4891000
heap
page read and write
32B8000
trusted library allocation
page read and write
3151000
heap
page read and write
990000
heap
page read and write
31D5000
heap
page read and write
474E000
stack
page read and write
5590000
direct allocation
page execute and read and write
3051000
heap
page read and write
900000
unkown
page readonly
C0000F6000
direct allocation
page read and write
2831000
trusted library allocation
page read and write
1384000
heap
page read and write
A218000
unkown
page read and write
7FF7E5C07000
unkown
page write copy
4384000
trusted library allocation
page read and write
2893000
heap
page read and write
31D2000
heap
page read and write
4FD1000
heap
page read and write
1E9A1C50000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
56FE000
stack
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
13D0000
direct allocation
page read and write
4891000
heap
page read and write
8720000
unkown
page read and write
10888000
unkown
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
36EF000
stack
page read and write
42CF000
stack
page read and write
1384000
heap
page read and write
5984000
trusted library allocation
page read and write
1384000
heap
page read and write
8D60000
unkown
page read and write
381E000
stack
page read and write
3169000
heap
page read and write
32E6000
unkown
page read and write
27402000
heap
page read and write
31B8000
heap
page read and write
27B8000
heap
page read and write
944000
heap
page read and write
13F4000
heap
page read and write
6EE0F000
unkown
page readonly
5A1B000
trusted library allocation
page read and write
32A0000
trusted library allocation
page read and write
944000
heap
page read and write
C0000B0000
direct allocation
page read and write
8700000
unkown
page read and write
8720000
unkown
page read and write
34F9000
trusted library allocation
page read and write
329D000
heap
page read and write
944000
heap
page read and write
8940000
unkown
page read and write
7FF556E7E000
unkown
page readonly
3187000
heap
page read and write
370C000
heap
page read and write
12AB000
trusted library allocation
page execute and read and write
944000
heap
page read and write
1384000
heap
page read and write
30EA000
trusted library allocation
page read and write
31D5000
heap
page read and write
21341000
heap
page read and write
944000
heap
page read and write
7FF5570BB000
unkown
page readonly
1384000
heap
page read and write
3051000
heap
page read and write
1521000
heap
page read and write
B30000
heap
page read and write
1384000
heap
page read and write
4891000
heap
page read and write
EFA000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
321D000
heap
page read and write
A94000
heap
page read and write
3051000
heap
page read and write
7FF556F90000
unkown
page readonly
1384000
heap
page read and write
27FF000
heap
page read and write
4C40000
trusted library allocation
page read and write
84F0000
unkown
page read and write
944000
heap
page read and write
3718000
trusted library allocation
page read and write
944000
heap
page read and write
36ED000
heap
page read and write
141E000
stack
page read and write
1320000
heap
page read and write
944000
heap
page read and write
E7C000
unkown
page readonly
9BA000
heap
page read and write
944000
heap
page read and write
C374000
unkown
page read and write
4891000
heap
page read and write
DD8000
heap
page read and write
3440000
unkown
page readonly
362D000
stack
page read and write
7FF7E5C09000
unkown
page read and write
8E9E000
heap
page read and write
2E94000
heap
page read and write
3051000
heap
page read and write
97FE000
stack
page read and write
55D5000
heap
page read and write
944000
heap
page read and write
4BBF000
stack
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
1B6F000
stack
page read and write
E37000
unkown
page readonly
C06D000
unkown
page read and write
8440000
trusted library allocation
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
2887000
heap
page read and write
462E000
stack
page read and write
8460000
trusted library allocation
page read and write
1384000
heap
page read and write
10888000
unkown
page read and write
36A7000
heap
page read and write
434A000
trusted library allocation
page read and write
586E000
stack
page read and write
4891000
heap
page read and write
4891000
heap
page read and write
8710000
unkown
page read and write
598F000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
32AC000
heap
page read and write
8D7A000
unkown
page read and write
1384000
heap
page read and write
59C1000
trusted library allocation
page read and write
1220000
heap
page read and write
379D000
stack
page read and write
8940000
unkown
page read and write
3715000
heap
page read and write
3169000
heap
page read and write
8710000
unkown
page read and write
944000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
7FF556F31000
unkown
page readonly
A8B000
heap
page read and write
12B000
stack
page read and write
3163000
heap
page read and write
A74000
heap
page read and write
3697000
heap
page read and write
C00005D000
direct allocation
page read and write
944000
heap
page read and write
31D2000
heap
page read and write
3181000
heap
page read and write
DC4000
unkown
page read and write
3702000
heap
page read and write
86D000
trusted library allocation
page execute and read and write
34D5000
trusted library allocation
page read and write
321E000
stack
page read and write
944000
heap
page read and write
59D2000
trusted library allocation
page read and write
3690000
heap
page read and write
944000
heap
page read and write
2875000
heap
page read and write
1384000
heap
page read and write
3151000
heap
page read and write
365C000
heap
page read and write
35A4000
heap
page read and write
2A0B000
heap
page read and write
6EE0D000
unkown
page read and write
4FD1000
heap
page read and write
8720000
unkown
page read and write
B095000
unkown
page read and write
1223000
unkown
page execute and read and write
80B000
heap
page read and write
944000
heap
page read and write
35B2000
trusted library allocation
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1E9A1CE8000
heap
page read and write
84B8000
trusted library allocation
page read and write
A6B000
heap
page read and write
27B4000
heap
page read and write
570E000
stack
page read and write
944000
heap
page read and write
4A76000
trusted library allocation
page read and write
3318000
heap
page read and write
A158000
unkown
page read and write
F0000
unkown
page readonly
1384000
heap
page read and write
4891000
heap
page read and write
55F0000
direct allocation
page execute and read and write
3051000
heap
page read and write
84A0000
trusted library allocation
page read and write
31D5000
heap
page read and write
1384000
heap
page read and write
31EF000
heap
page read and write
79A0000
unkown
page read and write
3590000
trusted library allocation
page read and write
2834000
heap
page read and write
59C1000
trusted library allocation
page read and write
4891000
heap
page read and write
4FD1000
heap
page read and write
7FF5575A1000
unkown
page readonly
944000
heap
page read and write
C0000C8000
direct allocation
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
1384000
heap
page read and write
4FA0000
heap
page read and write
30C9000
trusted library allocation
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
C00000
heap
page read and write
5998000
trusted library allocation
page read and write
B97000
remote allocation
page readonly
7FF7E5BEC000
unkown
page read and write
13E8000
heap
page read and write
C0007D4000
direct allocation
page read and write
D50000
unkown
page read and write
3190000
heap
page read and write
4CC0000
heap
page read and write
304F000
stack
page read and write
13F4000
heap
page read and write
1384000
heap
page read and write
40A0000
heap
page read and write
E290000
unkown
page read and write
C4A2000
unkown
page read and write
1384000
heap
page read and write
45C0000
trusted library allocation
page read and write
4A7C000
trusted library allocation
page read and write
44F6000
trusted library allocation
page read and write
944000
heap
page read and write
2C06000
stack
page read and write
944000
heap
page read and write
904C000
unkown
page read and write
DC4000
unkown
page write copy
472E000
stack
page read and write
944000
heap
page read and write
A7D000
heap
page read and write
5998000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
30DD000
stack
page read and write
74A0000
trusted library allocation
page execute and read and write
1384000
heap
page read and write
1310000
heap
page read and write
1384000
heap
page read and write
1263000
trusted library allocation
page execute and read and write
21340000
heap
page read and write
4EA0000
trusted library allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
31B8000
heap
page read and write
2803000
heap
page read and write
8870000
unkown
page read and write
3050000
trusted library allocation
page read and write
750000
heap
page read and write
7FF55722A000
unkown
page readonly
5983000
trusted library allocation
page read and write
102000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
32AB000
heap
page read and write
1350000
heap
page read and write
C000176000
direct allocation
page read and write
3051000
heap
page read and write
944000
heap
page read and write
15B4000
heap
page read and write
5EAC000
stack
page read and write
367D000
heap
page read and write
A64000
heap
page read and write
5902000
heap
page read and write
F0000
unkown
page readonly
31D5000
heap
page read and write
1384000
heap
page read and write
186E000
stack
page read and write
944000
heap
page read and write
821000
heap
page read and write
944000
heap
page read and write
1507000
heap
page read and write
1384000
heap
page read and write
8710000
unkown
page read and write
944000
heap
page read and write
9259000
stack
page read and write
7FF5571E2000
unkown
page readonly
59BB000
trusted library allocation
page read and write
5DB4E000
unkown
page read and write
1384000
heap
page read and write
7FF7E5BBB000
unkown
page write copy
9013000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
2861000
heap
page read and write
31B4000
heap
page read and write
27B4000
heap
page read and write
66BC000
heap
page read and write
28CB000
heap
page read and write
1384000
heap
page read and write
796E000
stack
page read and write
65AE000
trusted library allocation
page read and write
13F4000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
27E1000
heap
page read and write
3151000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
368D000
heap
page read and write
C233000
unkown
page read and write
59E1000
trusted library allocation
page read and write
C54E000
unkown
page read and write
4186000
heap
page read and write
944000
heap
page read and write
8700000
unkown
page read and write
32B9000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
27E2000
heap
page read and write
4199000
trusted library allocation
page read and write
370C000
heap
page read and write
82A1000
heap
page read and write
152B000
heap
page read and write
4FD1000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
13F4000
heap
page read and write
1384000
heap
page read and write
1E9A1EBD000
direct allocation
page read and write
33BA000
trusted library allocation
page read and write
367D000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
2C0F000
stack
page read and write
944000
heap
page read and write
C1E9000
unkown
page read and write
59F0000
trusted library allocation
page execute and read and write
28D2000
trusted library allocation
page read and write
1384000
heap
page read and write
1517000
heap
page read and write
1520000
trusted library allocation
page read and write
91A0000
trusted library allocation
page read and write
3572000
trusted library allocation
page read and write
944000
heap
page read and write
3051000
heap
page read and write
4891000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
32AC000
heap
page read and write
7FF556F2A000
unkown
page readonly
3051000
heap
page read and write
28A1000
heap
page read and write
944000
heap
page read and write
45CF000
stack
page read and write
5BEA000
trusted library allocation
page read and write
5984000
trusted library allocation
page read and write
1AFFE000
stack
page read and write
944000
heap
page read and write
8940000
unkown
page read and write
C3ED000
unkown
page read and write
5989000
trusted library allocation
page read and write
1384000
heap
page read and write
30AE000
stack
page read and write
2836000
heap
page read and write
1384000
heap
page read and write
4891000
heap
page read and write
1460000
heap
page read and write
8EB8000
heap
page read and write
944000
heap
page read and write
C3B3000
unkown
page read and write
8740000
unkown
page read and write
44C000
remote allocation
page execute and read and write
944000
heap
page read and write
2C1A000
heap
page read and write
3715000
heap
page read and write
3F41000
heap
page read and write
E91000
heap
page read and write
3191000
heap
page read and write
8700000
unkown
page read and write
8940000
unkown
page read and write
7FF557501000
unkown
page readonly
32A8000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
16CE000
stack
page read and write
3172000
heap
page read and write
2817000
heap
page read and write
26A1000
heap
page read and write
B030000
unkown
page readonly
27B4000
heap
page read and write
8950000
unkown
page read and write
944000
heap
page read and write
FEC0000
unkown
page read and write
1702000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
4891000
heap
page read and write
424E000
stack
page read and write
944000
heap
page read and write
14F9000
heap
page read and write
7FF557387000
unkown
page readonly
944000
heap
page read and write
3051000
heap
page read and write
8710000
unkown
page read and write
2836000
heap
page read and write
41D3000
trusted library allocation
page read and write
32AC000
heap
page read and write
A74000
heap
page read and write
1384000
heap
page read and write
2D70000
direct allocation
page execute and read and write
9640000
heap
page read and write
5BE0000
trusted library allocation
page execute and read and write
321D000
heap
page read and write
3051000
heap
page read and write
36AF000
trusted library allocation
page read and write
2887000
heap
page read and write
C000104000
direct allocation
page read and write
370C000
heap
page read and write
31D5000
heap
page read and write
8710000
unkown
page read and write
FE6000
heap
page read and write
27BD000
heap
page read and write
3CBF000
stack
page read and write
21326000
heap
page read and write
3EAD000
stack
page read and write
48D0000
heap
page read and write
3051000
heap
page read and write
32AC000
heap
page read and write
944000
heap
page read and write
4FD1000
heap
page read and write
27B4000
heap
page read and write
944000
heap
page read and write
41C0000
heap
page read and write
5984000
heap
page read and write
3051000
heap
page read and write
13C0000
heap
page read and write
C00012C000
direct allocation
page read and write
27F6000
heap
page read and write
2591000
trusted library allocation
page read and write
3051000
heap
page read and write
9AA000
heap
page read and write
31EE000
heap
page read and write
396F000
stack
page read and write
55D0000
direct allocation
page execute and read and write
2887000
heap
page read and write
32AC000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1517000
heap
page read and write
944000
heap
page read and write
40D1000
heap
page read and write
27FC000
heap
page read and write
32AC000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1306000
heap
page read and write
A8B000
heap
page read and write
3051000
heap
page read and write
2875000
heap
page read and write
1A1A000
heap
page read and write
3479000
trusted library allocation
page read and write
1E9E7370000
direct allocation
page read and write
59F7000
trusted library allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
27E0000
heap
page read and write
8940000
unkown
page read and write
5710000
heap
page read and write
1384000
heap
page read and write
4259000
trusted library allocation
page read and write
124E000
stack
page read and write
1384000
heap
page read and write
2132F000
heap
page read and write
163E000
stack
page read and write
C00009A000
direct allocation
page read and write
32AC000
heap
page read and write
5F70000
remote allocation
page read and write
31A5000
heap
page read and write
429000
unkown
page write copy
1384000
heap
page read and write
7FF557106000
unkown
page readonly
3051000
heap
page read and write
5A7B000
trusted library allocation
page read and write
7FF557627000
unkown
page readonly
1062000
unkown
page execute and read and write
27CA000
heap
page read and write
32AC000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
2EDD000
stack
page read and write
944000
heap
page read and write
7FF557416000
unkown
page readonly
944000
heap
page read and write
164C000
heap
page read and write
370E000
stack
page read and write
27B2000
heap
page read and write
155B000
stack
page read and write
36E2000
heap
page read and write
8940000
unkown
page read and write
7FF7E60E9000
unkown
page read and write
32AB000
heap
page read and write
DC5000
unkown
page execute read
423F000
trusted library allocation
page read and write
98DA000
stack
page read and write
5932000
trusted library allocation
page read and write
4F40000
direct allocation
page execute and read and write
3051000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
8740000
unkown
page read and write
1384000
heap
page read and write
4D7B000
trusted library allocation
page read and write
885C000
stack
page read and write
8700000
unkown
page read and write
944000
heap
page read and write
151E000
stack
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
135A000
stack
page read and write
59D6000
trusted library allocation
page read and write
944000
heap
page read and write
C8A000
heap
page read and write
3A7E000
stack
page read and write
3716000
heap
page read and write
4FD1000
heap
page read and write
3051000
heap
page read and write
8700000
unkown
page read and write
13A8000
heap
page read and write
4FA1000
heap
page read and write
329D000
heap
page read and write
3051000
heap
page read and write
36C9000
heap
page read and write
12A8000
heap
page read and write
1384000
heap
page read and write
27E2000
heap
page read and write
2F20000
unkown
page read and write
3870000
heap
page read and write
944000
heap
page read and write
7117000
heap
page read and write
66CB000
heap
page read and write
3FFB000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
963E000
stack
page read and write
32AC000
heap
page read and write
2893000
heap
page read and write
944000
heap
page read and write
26A1000
heap
page read and write
944000
heap
page read and write
13F4000
heap
page read and write
4800000
unkown
page read and write
558F000
stack
page read and write
2850000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
6A8D000
stack
page read and write
1384000
heap
page read and write
5A80000
trusted library allocation
page read and write
84F0000
unkown
page read and write
316C000
heap
page read and write
4FD1000
heap
page read and write
1384000
heap
page read and write
131A000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
4940000
heap
page read and write
730A000
unkown
page read and write
5992000
trusted library allocation
page read and write
1521000
heap
page read and write
8710000
unkown
page read and write
32C4000
heap
page read and write
C00013C000
direct allocation
page read and write
A74000
heap
page read and write
944000
heap
page read and write
13F4000
heap
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
1384000
heap
page read and write
3715000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
8700000
unkown
page read and write
C0000CC000
direct allocation
page read and write
8940000
unkown
page read and write
A88000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
74B9000
trusted library allocation
page read and write
7FF55725B000
unkown
page readonly
1384000
heap
page read and write
104C4000
unkown
page read and write
1725000
heap
page read and write
F0000
unkown
page readonly
8700000
unkown
page read and write
660F000
heap
page read and write
8F4D000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
4229000
trusted library allocation
page read and write
546E000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
1E9E7300000
direct allocation
page read and write
3612000
trusted library allocation
page read and write
4387000
trusted library allocation
page read and write
FFDF000
unkown
page read and write
59E9000
trusted library allocation
page read and write
1346000
heap
page read and write
A5F000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
21323000
heap
page read and write
944000
heap
page read and write
6580000
trusted library allocation
page read and write
1384000
heap
page read and write
1517000
heap
page read and write
2805000
heap
page read and write
944000
heap
page read and write
4FD1000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
C40000
heap
page read and write
9F0000
unkown
page readonly
2E2F000
stack
page read and write
573E000
stack
page read and write
54FE000
trusted library allocation
page read and write
32E3000
unkown
page read and write
74DA000
trusted library allocation
page read and write
1384000
heap
page read and write
3922000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
1F0000
heap
page read and write
5DB3D000
unkown
page readonly
944000
heap
page read and write
944000
heap
page read and write
A22F000
unkown
page read and write
8720000
unkown
page read and write
1340000
heap
page read and write
910000
unkown
page readonly
8710000
unkown
page read and write
4B0E000
stack
page read and write
944000
heap
page read and write
664F000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
31BF000
heap
page read and write
7FF5570CA000
unkown
page readonly
1384000
heap
page read and write
C00008E000
direct allocation
page read and write
3151000
heap
page read and write
6EE0D000
unkown
page read and write
317B000
heap
page read and write
3051000
heap
page read and write
319E000
stack
page read and write
104C2000
unkown
page read and write
DEE000
stack
page read and write
944000
heap
page read and write
318A000
heap
page read and write
1384000
heap
page read and write
1E9A1EB4000
direct allocation
page read and write
4254000
trusted library allocation
page read and write
1C227FE000
stack
page read and write
7FF55700F000
unkown
page readonly
6CB00000
unkown
page readonly
59BE000
trusted library allocation
page read and write
944000
heap
page read and write
77C0000
unkown
page read and write
902C000
unkown
page read and write
3CFE000
stack
page read and write
1742000
heap
page read and write
3100000
trusted library allocation
page read and write
31A2000
heap
page read and write
13D0000
direct allocation
page read and write
1228000
heap
page read and write
375F000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
10871000
unkown
page read and write
4891000
heap
page read and write
4120000
heap
page read and write
1384000
heap
page read and write
21341000
heap
page read and write
27FC000
heap
page read and write
8700000
unkown
page read and write
4FD1000
heap
page read and write
3E6F000
stack
page read and write
1384000
heap
page read and write
3715000
heap
page read and write
59A8000
trusted library allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
5AD2000
trusted library allocation
page read and write
41CF000
stack
page read and write
7FF546F2F000
unkown
page readonly
8700000
unkown
page read and write
331F000
trusted library allocation
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
18FF000
stack
page read and write
8720000
unkown
page read and write
7FF5575D5000
unkown
page readonly
1E9A1CC4000
heap
page read and write
3051000
heap
page read and write
670000
unkown
page readonly
C55000
unkown
page execute and write copy
1384000
heap
page read and write
944000
heap
page read and write
393E000
stack
page read and write
35E2000
heap
page read and write
944000
heap
page read and write
710E000
heap
page read and write
FAC000
heap
page read and write
944000
heap
page read and write
454A000
trusted library allocation
page read and write
5DBD000
stack
page read and write
13D0000
direct allocation
page read and write
944000
heap
page read and write
2883000
heap
page read and write
944000
heap
page read and write
8710000
unkown
page read and write
944000
heap
page read and write
27B2000
heap
page read and write
10874000
unkown
page read and write
F004000
unkown
page read and write
40F6000
heap
page read and write
3996000
heap
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
C0000FE000
direct allocation
page read and write
944000
heap
page read and write
1427000
trusted library allocation
page execute and read and write
169E000
heap
page read and write
1384000
heap
page read and write
34CC000
trusted library allocation
page read and write
7FF5570E7000
unkown
page readonly
717E000
unkown
page read and write
32AC000
heap
page read and write
3051000
heap
page read and write
33A6000
trusted library allocation
page read and write
1384000
heap
page read and write
12A7000
trusted library allocation
page execute and read and write
3705000
heap
page read and write
4019000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
521C000
stack
page read and write
944000
heap
page read and write
F70000
heap
page read and write
662A000
heap
page read and write
26A1000
heap
page read and write
FBB000
unkown
page readonly
4151000
heap
page read and write
321D000
heap
page read and write
944000
heap
page read and write
36E2000
heap
page read and write
944000
heap
page read and write
4BA000
unkown
page read and write
7FF55724C000
unkown
page readonly
6627000
heap
page read and write
2836000
heap
page read and write
8820000
unkown
page readonly
1384000
heap
page read and write
716B000
unkown
page read and write
8940000
unkown
page read and write
598A000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
4151000
trusted library allocation
page read and write
2DEE000
stack
page read and write
2F61000
unkown
page read and write
33CF000
stack
page read and write
1384000
heap
page read and write
D13000
heap
page read and write
55A0000
direct allocation
page execute and read and write
1384000
heap
page read and write
C468000
unkown
page read and write
422A000
trusted library allocation
page read and write
8700000
unkown
page read and write
4C00000
trusted library allocation
page read and write
944000
heap
page read and write
31E1000
heap
page read and write
A73000
heap
page read and write
5710000
heap
page execute and read and write
36CC000
heap
page read and write
944000
heap
page read and write
7FF55726C000
unkown
page readonly
1328000
heap
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
7FF557607000
unkown
page readonly
7803000
unkown
page read and write
288B000
heap
page read and write
1384000
heap
page read and write
30F2000
trusted library allocation
page read and write
8700000
unkown
page read and write
3051000
heap
page read and write
3251000
heap
page read and write
1384000
heap
page read and write
4891000
heap
page read and write
6622000
heap
page read and write
8EAC000
heap
page read and write
944000
heap
page read and write
59DF000
trusted library allocation
page read and write
3051000
heap
page read and write
DF0000
heap
page read and write
61EB4000
direct allocation
page read and write
4D6E000
stack
page read and write
394F000
stack
page read and write
13D0000
direct allocation
page read and write
31B4000
heap
page read and write
1384000
heap
page read and write
454D000
trusted library allocation
page read and write
3051000
heap
page read and write
31F8000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
26A1000
heap
page read and write
36DB000
heap
page read and write
1521000
heap
page read and write
3199000
heap
page read and write
1580000
heap
page read and write
1384000
heap
page read and write
2893000
heap
page read and write
3051000
heap
page read and write
131A000
heap
page read and write
432E000
trusted library allocation
page read and write
3BEF000
stack
page read and write
9EE000
stack
page read and write
944000
heap
page read and write
1384000
heap
page read and write
31D5000
heap
page read and write
CEC000
stack
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1570000
trusted library allocation
page read and write
951000
unkown
page execute read
27F6000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
70AF000
heap
page read and write
4EB0000
trusted library allocation
page execute and read and write
1384000
heap
page read and write
944000
heap
page read and write
1292000
trusted library allocation
page read and write
13D0000
direct allocation
page read and write
3318000
heap
page read and write
AEE7000
stack
page read and write
312F000
trusted library allocation
page read and write
944000
heap
page read and write
A0FF000
unkown
page read and write
853D000
stack
page read and write
4891000
heap
page read and write
36DC000
heap
page read and write
5983000
trusted library allocation
page read and write
2132F000
heap
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
4B4B000
trusted library allocation
page read and write
35B1000
trusted library allocation
page read and write
21330000
heap
page read and write
4D0D000
stack
page read and write
4327000
trusted library allocation
page read and write
32AC000
heap
page read and write
32AC000
heap
page read and write
594A000
trusted library allocation
page read and write
370C000
heap
page read and write
8700000
unkown
page read and write
36ED000
heap
page read and write
2C10000
direct allocation
page read and write
E871000
unkown
page read and write
40BE000
stack
page read and write
3169000
heap
page read and write
5693000
heap
page read and write
1AEBE000
stack
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
7FF557579000
unkown
page readonly
27F7000
heap
page read and write
A73000
heap
page read and write
31A9000
heap
page read and write
3051000
heap
page read and write
55B0000
direct allocation
page execute and read and write
944000
heap
page read and write
977000
unkown
page execute and read and write
5630000
direct allocation
page execute and read and write
1384000
heap
page read and write
2876000
heap
page read and write
1384000
heap
page read and write
3F8F000
stack
page read and write
2875000
heap
page read and write
4237000
trusted library allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
484F000
stack
page read and write
944000
heap
page read and write
944000
heap
page read and write
32B9000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
182F000
stack
page read and write
E90000
unkown
page readonly
3715000
heap
page read and write
944000
heap
page read and write
14FC000
heap
page read and write
9013000
unkown
page read and write
9651000
heap
page read and write
A1FD000
unkown
page read and write
33EF000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
7FF557568000
unkown
page readonly
597B000
trusted library allocation
page read and write
4891000
heap
page read and write
944000
heap
page read and write
A4C000
heap
page read and write
1384000
heap
page read and write
31E8000
heap
page read and write
2794000
trusted library allocation
page read and write
55E0000
direct allocation
page execute and read and write
4FD1000
heap
page read and write
4AE0000
heap
page read and write
7E2000
unkown
page execute and read and write
59B2000
trusted library allocation
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
6EE0000
heap
page read and write
A10000
heap
page read and write
7300000
unkown
page read and write
433F000
trusted library allocation
page read and write
12CA000
heap
page read and write
944000
heap
page read and write
9C6000
heap
page read and write
944000
heap
page read and write
4FD1000
heap
page read and write
8450000
trusted library allocation
page execute and read and write
14F7000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
2CDE000
stack
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
3188000
heap
page read and write
855C000
unkown
page read and write
7FF55703C000
unkown
page readonly
8700000
unkown
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
3169000
heap
page read and write
3CAF000
stack
page read and write
34AE000
stack
page read and write
4F7F000
stack
page read and write
944000
heap
page read and write
5998000
trusted library allocation
page read and write
CED000
heap
page read and write
2132F000
heap
page read and write
13F4000
heap
page read and write
A7F000
heap
page read and write
36E2000
heap
page read and write
1384000
heap
page read and write
6657000
heap
page read and write
6EDF1000
unkown
page execute read
3051000
heap
page read and write
1384000
heap
page read and write
3169000
heap
page read and write
C000166000
direct allocation
page read and write
1384000
heap
page read and write
357D000
trusted library allocation
page read and write
1550000
heap
page read and write
2132F000
heap
page read and write
7FF557187000
unkown
page readonly
944000
heap
page read and write
6670000
trusted library allocation
page execute and read and write
59E3000
trusted library allocation
page read and write
4C2E000
trusted library allocation
page read and write
390000
unkown
page readonly
C2E4000
unkown
page read and write
4FD1000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
8940000
unkown
page read and write
944000
heap
page read and write
1384000
heap
page read and write
3670000
heap
page read and write
895C000
stack
page read and write
3630000
heap
page read and write
375E000
trusted library allocation
page read and write
3716000
heap
page read and write
5978000
trusted library allocation
page read and write
1E9A1CEF000
heap
page read and write
3629000
heap
page read and write
4535000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
437A000
trusted library allocation
page read and write
1384000
heap
page read and write
5950000
trusted library allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1560000
heap
page read and write
3F16000
heap
page read and write
3E4F000
stack
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1AD3F000
stack
page read and write
1AC3E000
stack
page read and write
35E3000
heap
page read and write
27E1000
heap
page read and write
1384000
heap
page read and write
C00002C000
direct allocation
page read and write
4891000
heap
page read and write
944000
heap
page read and write
1A00000
heap
page read and write
2855000
heap
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
6CB45000
unkown
page read and write
A4C000
heap
page read and write
27D4000
heap
page read and write
5DAC1000
unkown
page execute read
3215000
heap
page read and write
1560000
trusted library allocation
page execute and read and write
7FF5572AC000
unkown
page readonly
7BC1000
unkown
page read and write
3430000
remote allocation
page read and write
5A9A000
trusted library allocation
page read and write
944000
heap
page read and write
6205000
heap
page read and write
7178000
unkown
page read and write
4FD1000
heap
page read and write
2806000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1050000
heap
page read and write
59D8000
trusted library allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
2860000
heap
page read and write
1A1C000
heap
page read and write
944000
heap
page read and write
C1DD000
unkown
page read and write
37EB000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
59F6000
trusted library allocation
page read and write
944000
heap
page read and write
4039000
trusted library allocation
page read and write
7FF5573E2000
unkown
page readonly
4A8E000
trusted library allocation
page read and write
3029000
stack
page read and write
944000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
360E000
stack
page read and write
A7C000
stack
page read and write
27E2000
trusted library allocation
page read and write
1742000
heap
page read and write
2890000
heap
page read and write
32FC000
heap
page read and write
944000
heap
page read and write
65C0000
trusted library allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
59A7000
trusted library allocation
page read and write
4E50000
remote allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
400F000
heap
page read and write
1384000
heap
page read and write
3580000
remote allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
2A20000
heap
page read and write
1705000
heap
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
7B2E000
stack
page read and write
7FF557413000
unkown
page readonly
151F000
heap
page read and write
131A000
heap
page read and write
452E000
trusted library allocation
page read and write
1380000
heap
page read and write
1384000
heap
page read and write
A85A000
unkown
page read and write
3051000
heap
page read and write
27BB000
heap
page read and write
59D8000
trusted library allocation
page read and write
944000
heap
page read and write
7FF5570F7000
unkown
page readonly
1384000
heap
page read and write
A0000
unkown
page readonly
944000
heap
page read and write
9C000
stack
page read and write
8372000
heap
page read and write
3FD2000
heap
page read and write
843B000
trusted library allocation
page read and write
944000
heap
page read and write
9050000
unkown
page read and write
40EF000
stack
page read and write
2F20000
unkown
page read and write
4620000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
61ECD000
direct allocation
page readonly
391000
unkown
page execute read
C000004000
direct allocation
page read and write
3169000
heap
page read and write
A64000
heap
page read and write
C0007E4000
direct allocation
page read and write
5420000
direct allocation
page read and write
30000
unkown
page readonly
3051000
heap
page read and write
C00014B000
direct allocation
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1575000
trusted library allocation
page read and write
BF3F000
stack
page read and write
1B290000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
8940000
unkown
page read and write
5971000
trusted library allocation
page read and write
258E000
stack
page read and write
944000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
4810000
unkown
page read and write
321D000
heap
page read and write
B7AA000
stack
page read and write
61EB7000
direct allocation
page readonly
38AA000
heap
page read and write
1384000
heap
page read and write
678E000
stack
page read and write
450E000
trusted library allocation
page read and write
4FD1000
heap
page read and write
1384000
heap
page read and write
37DE000
stack
page read and write
C0000F2000
direct allocation
page read and write
4E89000
trusted library allocation
page execute and read and write
2C24000
heap
page read and write
4CFF000
stack
page read and write
42A000
unkown
page write copy
8720000
unkown
page read and write
DB9000
unkown
page write copy
1384000
heap
page read and write
382F000
stack
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
6EDF1000
unkown
page execute read
8700000
unkown
page read and write
3051000
heap
page read and write
7FF557246000
unkown
page readonly
140E000
stack
page read and write
2D04000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
152B000
heap
page read and write
C00012E000
direct allocation
page read and write
13EC000
heap
page read and write
339E000
stack
page read and write
683E000
stack
page read and write
4345000
trusted library allocation
page read and write
35BB000
heap
page read and write
32D7000
unkown
page read and write
53D3000
heap
page read and write
1306000
heap
page read and write
8435000
trusted library allocation
page read and write
E2A0000
heap
page read and write
3104000
trusted library allocation
page read and write
59A8000
trusted library allocation
page read and write
8710000
unkown
page read and write
8700000
unkown
page read and write
A8CD000
unkown
page read and write
3169000
heap
page read and write
3F68000
heap
page read and write
8710000
unkown
page read and write
944000
heap
page read and write
28A0000
heap
page read and write
8D0000
heap
page read and write
21327000
heap
page read and write
58D4000
heap
page read and write
944000
heap
page read and write
3281000
heap
page read and write
8940000
unkown
page read and write
32AC000
heap
page read and write
2893000
heap
page read and write
4891000
heap
page read and write
1500000
heap
page read and write
3051000
heap
page read and write
8950000
unkown
page read and write
E51000
unkown
page readonly
623E000
stack
page read and write
14A1000
heap
page read and write
944000
heap
page read and write
8940000
unkown
page read and write
59A5000
trusted library allocation
page read and write
944000
heap
page read and write
174D000
heap
page read and write
1384000
heap
page read and write
370C000
heap
page read and write
4891000
heap
page read and write
646000
heap
page read and write
FB1000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
67CC000
stack
page read and write
4B10000
heap
page read and write
8ED0000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
909F000
stack
page read and write
32C6000
heap
page read and write
A8B000
heap
page read and write
944000
heap
page read and write
284F000
heap
page read and write
2132F000
heap
page read and write
C559000
unkown
page read and write
8710000
unkown
page read and write
4FD1000
heap
page read and write
35AB000
heap
page read and write
2D90000
unclassified section
page read and write
14F5000
heap
page read and write
944000
heap
page read and write
59A9000
trusted library allocation
page read and write
5992000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
65A2000
trusted library allocation
page read and write
643E000
stack
page read and write
944000
heap
page read and write
7FF556E8D000
unkown
page readonly
3BAE000
stack
page read and write
27B7000
heap
page read and write
2D4E000
stack
page read and write
413D000
heap
page read and write
944000
heap
page read and write
8940000
unkown
page read and write
3617000
trusted library allocation
page read and write
2134D000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
443F000
stack
page read and write
2860000
heap
page read and write
4AB0000
trusted library allocation
page read and write
7FF557531000
unkown
page readonly
3287000
heap
page read and write
1384000
heap
page read and write
2D7D000
stack
page read and write
3627000
heap
page read and write
1384000
heap
page read and write
C0000F8000
direct allocation
page read and write
12CA000
heap
page read and write
7E03000
stack
page read and write
5A01000
trusted library allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
8740000
unkown
page read and write
1384000
heap
page read and write
2C10000
direct allocation
page read and write
8940000
unkown
page read and write
1384000
heap
page read and write
36BF000
heap
page read and write
311D000
stack
page read and write
59FC000
trusted library allocation
page read and write
3441000
trusted library allocation
page read and write
1384000
heap
page read and write
2C9E000
stack
page read and write
944000
heap
page read and write
319F000
heap
page read and write
7FF557330000
unkown
page readonly
1325000
heap
page read and write
4891000
heap
page read and write
4FD1000
heap
page read and write
4B48000
trusted library allocation
page read and write
987E000
stack
page read and write
842F000
stack
page read and write
EFC6000
unkown
page read and write
18C0000
heap
page read and write
2934000
heap
page read and write
7FF55733F000
unkown
page readonly
1B23F000
stack
page read and write
84DC000
stack
page read and write
1384000
heap
page read and write
7FF5571AC000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
175A000
heap
page read and write
21316000
heap
page read and write
31D5000
heap
page read and write
7FF556E4B000
unkown
page readonly
32D3000
unkown
page read and write
4508000
trusted library allocation
page read and write
27C9000
heap
page read and write
1384000
heap
page read and write
7DF4689A1000
unkown
page execute read
457A000
trusted library allocation
page read and write
ED4000
unkown
page readonly
C000038000
direct allocation
page read and write
944000
heap
page read and write
698E000
stack
page read and write
944000
heap
page read and write
30AF000
stack
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
8710000
unkown
page read and write
26A1000
heap
page read and write
453B000
trusted library allocation
page read and write
7FF5572A4000
unkown
page readonly
944000
heap
page read and write
944000
heap
page read and write
A82000
heap
page read and write
27BE000
heap
page read and write
430000
remote allocation
page execute and read and write
41B2000
trusted library allocation
page read and write
2893000
heap
page read and write
74B2000
trusted library allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
7FF557617000
unkown
page readonly
1997000
heap
page read and write
4019000
heap
page read and write
59BF000
trusted library allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
36FA000
heap
page read and write
1384000
heap
page read and write
2F20000
unkown
page read and write
8940000
unkown
page read and write
3051000
heap
page read and write
433A000
trusted library allocation
page read and write
365C000
heap
page read and write
3586000
trusted library allocation
page read and write
35E5000
heap
page read and write
48A1000
heap
page read and write
5985000
trusted library allocation
page read and write
1E9A1CE0000
heap
page read and write
716E000
unkown
page read and write
3169000
heap
page read and write
3672000
heap
page read and write
C000098000
direct allocation
page read and write
944000
heap
page read and write
41C000
remote allocation
page execute and read and write
944000
heap
page read and write
1087E000
unkown
page read and write
3051000
heap
page read and write
7F7C0000
trusted library allocation
page execute and read and write
944000
heap
page read and write
59DF000
trusted library allocation
page read and write
31B4000
heap
page read and write
C10B000
unkown
page read and write
13F4000
heap
page read and write
BBC0000
unkown
page read and write
59D7000
trusted library allocation
page read and write
13F4000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
709E000
heap
page read and write
944000
heap
page read and write
12F7000
stack
page read and write
4FA1000
heap
page read and write
C550000
unkown
page read and write
944000
heap
page read and write
31CE000
heap
page read and write
40F4000
heap
page read and write
A87A000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
3169000
heap
page read and write
1384000
heap
page read and write
36D6000
heap
page read and write
31A9000
heap
page read and write
90C9000
unkown
page read and write
288E000
heap
page read and write
3300000
heap
page read and write
1384000
heap
page read and write
40E6000
heap
page read and write
C2E4000
unkown
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
7FF5573D3000
unkown
page readonly
90A0000
trusted library allocation
page read and write
2893000
heap
page read and write
31E7000
heap
page read and write
2E0A000
stack
page read and write
944000
heap
page read and write
370C000
heap
page read and write
8940000
unkown
page read and write
7FF7E6082000
unkown
page read and write
3051000
heap
page read and write
32AC000
heap
page read and write
944000
heap
page read and write
2F20000
unkown
page read and write
1500000
heap
page read and write
E90000
unkown
page readonly
26A1000
heap
page read and write
35E9000
trusted library allocation
page read and write
8710000
unkown
page read and write
27F6000
heap
page read and write
3051000
heap
page read and write
3456000
trusted library allocation
page read and write
3988000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
405B000
trusted library allocation
page read and write
2C10000
direct allocation
page read and write
4891000
heap
page read and write
620A000
heap
page read and write
944000
heap
page read and write
C3B3000
unkown
page read and write
27CA000
heap
page read and write
32F3000
unkown
page read and write
2803000
heap
page read and write
7306000
unkown
page read and write
8940000
unkown
page read and write
C550000
unkown
page read and write
2855000
heap
page read and write
C22B000
unkown
page read and write
27C9000
heap
page read and write
10706000
unkown
page read and write
C000028000
direct allocation
page read and write
2D80000
trusted library allocation
page read and write
C0000BE000
direct allocation
page read and write
C0FB000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
80E000
heap
page read and write
4027000
heap
page read and write
26A1000
heap
page read and write
7FF7E5C0B000
unkown
page readonly
1384000
heap
page read and write
32D4000
heap
page read and write
A73000
heap
page read and write
8710000
unkown
page read and write
944000
heap
page read and write
F0000
unkown
page readonly
2440000
trusted library allocation
page read and write
1343000
heap
page read and write
5BD6000
trusted library allocation
page read and write
31D2000
heap
page read and write
13D0000
direct allocation
page read and write
1384000
heap
page read and write
32EB000
trusted library allocation
page read and write
5A10000
trusted library allocation
page execute and read and write
31F5000
heap
page read and write
325A000
heap
page read and write
944000
heap
page read and write
2460000
trusted library allocation
page read and write
6645000
heap
page read and write
329A000
heap
page read and write
C3FB000
unkown
page read and write
7FF557062000
unkown
page readonly
1269000
heap
page read and write
3716000
heap
page read and write
140E000
heap
page read and write
2FA3000
heap
page read and write
1384000
heap
page read and write
1089000
heap
page read and write
1384000
heap
page read and write
34D9000
trusted library allocation
page read and write
3720000
heap
page read and write
55B0000
direct allocation
page execute and read and write
85AC000
stack
page read and write
1384000
heap
page read and write
27C9000
heap
page read and write
84AB000
stack
page read and write
8710000
unkown
page read and write
4FF0000
heap
page read and write
368B000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
6601000
heap
page read and write
7A50000
unkown
page readonly
32C0000
heap
page read and write
27E0000
heap
page read and write
365C000
heap
page read and write
41D3000
heap
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
59B9000
trusted library allocation
page read and write
CD3000
heap
page read and write
3159000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
477D000
unkown
page read and write
3169000
heap
page read and write
6596000
trusted library allocation
page read and write
C3AE000
unkown
page read and write
8950000
unkown
page read and write
1384000
heap
page read and write
B3B000
heap
page read and write
31D5000
heap
page read and write
3221000
heap
page read and write
944000
heap
page read and write
DBB000
unkown
page execute and read and write
944000
heap
page read and write
5730000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
C553000
unkown
page read and write
2134D000
heap
page read and write
31D6000
heap
page read and write
8710000
unkown
page read and write
59CA000
trusted library allocation
page read and write
3F10000
heap
page read and write
31AD000
heap
page read and write
36F1000
heap
page read and write
1384000
heap
page read and write
37FB000
heap
page read and write
1384000
heap
page read and write
27A7000
heap
page read and write
8940000
unkown
page read and write
2817000
heap
page read and write
944000
heap
page read and write
8940000
unkown
page read and write
1507000
heap
page read and write
4891000
heap
page read and write
36CE000
heap
page read and write
13D0000
direct allocation
page read and write
325F000
trusted library allocation
page read and write
8710000
unkown
page read and write
1384000
heap
page read and write
16F7000
heap
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
13F4000
heap
page read and write
C3F7000
unkown
page read and write
2D90000
trusted library allocation
page read and write
3051000
heap
page read and write
1B2A0000
heap
page read and write
944000
heap
page read and write
8ECE000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
2870000
heap
page read and write
1384000
heap
page read and write
6EDE000
heap
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
5670000
trusted library allocation
page read and write
1384000
heap
page read and write
DFA000
heap
page read and write
431A000
trusted library allocation
page read and write
1384000
heap
page read and write
8C59000
stack
page read and write
42E9000
trusted library allocation
page read and write
7FF556E66000
unkown
page readonly
1384000
heap
page read and write
364B000
heap
page read and write
D10000
heap
page read and write
31E7000
heap
page read and write
E3F000
stack
page read and write
1384000
heap
page read and write
8940000
unkown
page read and write
944000
heap
page read and write
944000
heap
page read and write
1720000
heap
page read and write
3169000
heap
page read and write
27E2000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
28C0000
heap
page read and write
55D0000
heap
page read and write
944000
heap
page read and write
2836000
heap
page read and write
4FD1000
heap
page read and write
1326000
heap
page read and write
5590000
direct allocation
page execute and read and write
904C000
unkown
page read and write
370C000
heap
page read and write
1384000
heap
page read and write
5750000
trusted library allocation
page read and write
944000
heap
page read and write
2935000
heap
page read and write
7FF5573F3000
unkown
page readonly
3051000
heap
page read and write
7AB000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
4062000
heap
page read and write
4501000
trusted library allocation
page read and write
4112000
heap
page read and write
75AE000
stack
page read and write
4734000
unkown
page read and write
27B8000
heap
page read and write
1384000
heap
page read and write
C000770000
direct allocation
page read and write
426E000
stack
page read and write
1E9A1EB8000
direct allocation
page read and write
C20000
unkown
page read and write
2816000
heap
page read and write
486F000
stack
page read and write
944000
heap
page read and write
3D4000
unkown
page readonly
31B4000
heap
page read and write
1384000
heap
page read and write
4FD1000
heap
page read and write
124C000
heap
page read and write
2818000
heap
page read and write
B59000
heap
page read and write
7FF557554000
unkown
page readonly
7A6E000
stack
page read and write
66B0000
trusted library allocation
page execute and read and write
1384000
heap
page read and write
21310000
heap
page read and write
3005000
trusted library allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
B6AA000
stack
page read and write
498F000
stack
page read and write
913F000
unkown
page read and write
27A2000
heap
page read and write
3051000
heap
page read and write
105E1000
unkown
page read and write
7FF557393000
unkown
page readonly
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
13F4000
heap
page read and write
7FF5575B1000
unkown
page readonly
4FD1000
heap
page read and write
1544000
trusted library allocation
page read and write
8870000
unkown
page read and write
C000354000
direct allocation
page read and write
325A000
heap
page read and write
944000
heap
page read and write
A64000
heap
page read and write
27E1000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
3677000
heap
page read and write
2F40000
unkown
page readonly
84E0000
unkown
page readonly
1384000
heap
page read and write
1384000
heap
page read and write
284F000
heap
page read and write
1384000
heap
page read and write
2F20000
unkown
page read and write
37BE000
heap
page read and write
5B7E000
stack
page read and write
83C000
stack
page read and write
1384000
heap
page read and write
5990000
trusted library allocation
page read and write
944000
heap
page read and write
780000
unkown
page readonly
944000
heap
page read and write
4FD1000
heap
page read and write
2132F000
heap
page read and write
ACD000
unkown
page readonly
C9C000
stack
page read and write
944000
heap
page read and write
2818000
heap
page read and write
3051000
heap
page read and write
31B4000
heap
page read and write
31D5000
heap
page read and write
944000
heap
page read and write
4FCF000
stack
page read and write
151B000
stack
page read and write
317D000
heap
page read and write
2BEB000
unkown
page readonly
3D0000
heap
page read and write
1384000
heap
page read and write
6A99000
trusted library allocation
page read and write
6249000
heap
page read and write
C000400000
direct allocation
page read and write
1384000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
984000
unkown
page write copy
13CE000
heap
page read and write
6EDF0000
unkown
page readonly
910E000
stack
page read and write
1507000
heap
page read and write
3F3A000
heap
page read and write
944000
heap
page read and write
8940000
unkown
page read and write
32FA000
trusted library allocation
page read and write
31E7000
heap
page read and write
A5F000
heap
page read and write
429000
unkown
page read and write
89C0000
unkown
page read and write
1384000
heap
page read and write
2134C000
heap
page read and write
3F7F000
trusted library allocation
page read and write
2F09000
stack
page read and write
6231000
heap
page read and write
1384000
heap
page read and write
463A000
trusted library allocation
page read and write
4AD0000
trusted library allocation
page read and write
8700000
unkown
page read and write
433E000
stack
page read and write
2836000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
400000
remote allocation
page execute and read and write
1384000
heap
page read and write
944000
heap
page read and write
318D000
heap
page read and write
1346000
heap
page read and write
79B0000
unkown
page read and write
34E8000
trusted library allocation
page read and write
1384000
heap
page read and write
465D000
trusted library allocation
page read and write
1384000
heap
page read and write
407000
remote allocation
page execute and read and write
31D5000
heap
page read and write
8D72000
unkown
page read and write
45BD000
trusted library allocation
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
80000
unkown
page readonly
285D000
heap
page read and write
27FA000
heap
page read and write
1384000
heap
page read and write
46FE000
stack
page read and write
1521000
heap
page read and write
2132D000
heap
page read and write
8700000
unkown
page read and write
944000
heap
page read and write
944000
heap
page read and write
C553000
unkown
page read and write
1C3F0000
trusted library allocation
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
7FF5574F1000
unkown
page readonly
414D000
heap
page read and write
56CD000
trusted library allocation
page read and write
75E000
heap
page read and write
3051000
heap
page read and write
34E1000
trusted library allocation
page read and write
361B000
trusted library allocation
page read and write
150D000
heap
page read and write
3646000
heap
page read and write
8940000
unkown
page read and write
944000
heap
page read and write
944000
heap
page read and write
32AC000
heap
page read and write
4891000
heap
page read and write
21344000
heap
page read and write
4050000
trusted library allocation
page read and write
3F10000
heap
page read and write
944000
heap
page read and write
4E40000
trusted library allocation
page execute and read and write
2881000
heap
page read and write
3672000
heap
page read and write
7FF7E5C01000
unkown
page write copy
944000
heap
page read and write
3188000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
821000
heap
page read and write
70BF000
heap
page read and write
944000
heap
page read and write
4780000
heap
page read and write
13F4000
heap
page read and write
8940000
unkown
page read and write
6EE0D000
unkown
page read and write
A64000
heap
page read and write
5A1B000
trusted library allocation
page read and write
424A000
trusted library allocation
page read and write
42A9000
trusted library allocation
page read and write
4891000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
36CE000
stack
page read and write
8710000
unkown
page read and write
1384000
heap
page read and write
30ED000
trusted library allocation
page read and write
485A000
unkown
page read and write
3051000
heap
page read and write
A8BA000
unkown
page read and write
3D4000
unkown
page readonly
B39000
heap
page read and write
4D4F000
stack
page read and write
8700000
unkown
page read and write
A225000
unkown
page read and write
196E000
stack
page read and write
32C7000
unkown
page read and write
74CF000
trusted library allocation
page read and write
8EF8000
heap
page read and write
3051000
heap
page read and write
3175000
heap
page read and write
944000
heap
page read and write
27DA000
heap
page read and write
4C90000
heap
page read and write
13F4000
heap
page read and write
1384000
heap
page read and write
C24F000
unkown
page read and write
2921000
heap
page read and write
55D7000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
4FD1000
heap
page read and write
36E2000
heap
page read and write
647E000
stack
page read and write
D00000
heap
page read and write
35AF000
stack
page read and write
5512000
trusted library allocation
page read and write
32AC000
heap
page read and write
95000
unkown
page read and write
BEBF000
stack
page read and write
3FCE000
stack
page read and write
1384000
heap
page read and write
4FD1000
heap
page read and write
59B1000
trusted library allocation
page read and write
1384000
heap
page read and write
8472000
trusted library allocation
page read and write
944000
heap
page read and write
33A1000
trusted library allocation
page read and write
944000
heap
page read and write
A64000
heap
page read and write
715C000
unkown
page read and write
2893000
heap
page read and write
1384000
heap
page read and write
4870000
heap
page read and write
944000
heap
page read and write
125A000
heap
page read and write
53C5000
trusted library allocation
page read and write
8940000
unkown
page read and write
5970000
trusted library allocation
page read and write
944000
heap
page read and write
2C8E000
stack
page read and write
13F3000
trusted library allocation
page execute and read and write
BC00000
unkown
page readonly
2875000
heap
page read and write
944000
heap
page read and write
4FD1000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
C00005B000
direct allocation
page read and write
593B000
heap
page read and write
6EDF1000
unkown
page execute read
C000096000
direct allocation
page read and write
2D4C8000
heap
page read and write
8740000
unkown
page read and write
1384000
heap
page read and write
7FF5575EA000
unkown
page readonly
47DB000
unkown
page read and write
386E000
stack
page read and write
2F20000
unkown
page read and write
21346000
heap
page read and write
1630000
trusted library allocation
page read and write
90C0000
trusted library allocation
page execute and read and write
27E1000
heap
page read and write
A215000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
32FC000
stack
page read and write
2AAB000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
36A1000
heap
page read and write
8430000
trusted library allocation
page read and write
3F03000
heap
page read and write
14F7000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
7500000
trusted library allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
8940000
unkown
page read and write
9B6000
heap
page read and write
1384000
heap
page read and write
38D1000
heap
page read and write
8E60000
heap
page read and write
944000
heap
page read and write
1094E000
unkown
page read and write
16A0000
heap
page read and write
944000
heap
page read and write
45B4000
trusted library allocation
page read and write
1384000
heap
page read and write
7FF556FFB000
unkown
page readonly
3ACE000
stack
page read and write
370C000
heap
page read and write
1384000
heap
page read and write
C214000
unkown
page read and write
6680000
trusted library allocation
page execute and read and write
2C10000
direct allocation
page read and write
944000
heap
page read and write
3865000
heap
page read and write
31E7000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
5DD3F000
unkown
page write copy
1384000
heap
page read and write
2F7E000
heap
page read and write
318E000
heap
page read and write
944000
heap
page read and write
1B13E000
stack
page read and write
65D0000
heap
page read and write
672E000
trusted library allocation
page read and write
2D8A000
stack
page read and write
12B3000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
5DB61000
unkown
page execute read
5AB2000
trusted library allocation
page read and write
944000
heap
page read and write
4FD0000
heap
page read and write
16F7000
heap
page read and write
1384000
heap
page read and write
8940000
unkown
page read and write
8700000
unkown
page read and write
59A7000
trusted library allocation
page read and write
3051000
heap
page read and write
72C3000
unkown
page read and write
429000
unkown
page read and write
823000
heap
page read and write
4891000
heap
page read and write
27B4000
heap
page read and write
3051000
heap
page read and write
104C0000
unkown
page read and write
3051000
heap
page read and write
15C0000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
3179000
heap
page read and write
1384000
heap
page read and write
4164000
heap
page read and write
109000
unkown
page readonly
B35000
heap
page read and write
8D76000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
3716000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1440000
trusted library allocation
page read and write
285C000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
14E9000
heap
page read and write
944000
heap
page read and write
240000
unkown
page readonly
4891000
heap
page read and write
7DB0000
trusted library allocation
page read and write
944000
heap
page read and write
1503000
heap
page read and write
8DFE000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
141A000
trusted library allocation
page execute and read and write
C22F000
unkown
page read and write
31D2000
heap
page read and write
1344000
heap
page read and write
54EB000
trusted library allocation
page read and write
3051000
heap
page read and write
32AC000
heap
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
105E9000
unkown
page read and write
1384000
heap
page read and write
A877000
unkown
page read and write
13F0000
heap
page read and write
3051000
heap
page read and write
947C000
stack
page read and write
5161000
unkown
page read and write
3000000
trusted library allocation
page read and write
36DB000
trusted library allocation
page read and write
944000
heap
page read and write
8710000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
425000
unkown
page readonly
944000
heap
page read and write
61FE000
stack
page read and write
4891000
heap
page read and write
1570000
heap
page read and write
370C000
heap
page read and write
944000
heap
page read and write
44D5000
trusted library allocation
page read and write
4229000
trusted library allocation
page read and write
944000
heap
page read and write
1306000
heap
page read and write
33B3000
trusted library allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
59AA000
trusted library allocation
page read and write
1384000
heap
page read and write
7E1000
heap
page read and write
13F0000
trusted library allocation
page read and write
32AC000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
31D7000
heap
page read and write
4891000
heap
page read and write
944000
heap
page read and write
92000
unkown
page write copy
4891000
heap
page read and write
920000
heap
page read and write
470E000
stack
page read and write
944000
heap
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
43AE000
stack
page read and write
944000
heap
page read and write
1384000
heap
page read and write
3334000
remote allocation
page execute and read and write
B42E000
stack
page read and write
7FF55763D000
unkown
page readonly
423D000
trusted library allocation
page read and write
8700000
unkown
page read and write
3FCB000
heap
page read and write
2862000
heap
page read and write
3151000
heap
page read and write
59A0000
trusted library allocation
page read and write
944000
heap
page read and write
30EE000
stack
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
597B000
trusted library allocation
page read and write
370C000
heap
page read and write
1AAFE000
stack
page read and write
944000
heap
page read and write
4C31000
trusted library allocation
page read and write
944000
heap
page read and write
1296000
trusted library allocation
page execute and read and write
1384000
heap
page read and write
1384000
heap
page read and write
4140000
heap
page read and write
4891000
heap
page read and write
3707000
heap
page read and write
2134D000
heap
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
3196000
heap
page read and write
8940000
unkown
page read and write
6A90000
trusted library allocation
page read and write
8740000
unkown
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
1332000
heap
page read and write
5FEE000
stack
page read and write
1062000
unkown
page execute and read and write
1384000
heap
page read and write
944000
heap
page read and write
7350000
trusted library allocation
page read and write
944000
heap
page read and write
1412000
trusted library allocation
page read and write
4FD1000
heap
page read and write
13F4000
heap
page read and write
31A6000
heap
page read and write
1384000
heap
page read and write
2D4C0000
heap
page read and write
2F20000
unkown
page read and write
3F0D000
heap
page read and write
2807000
heap
page read and write
5A1B000
trusted library allocation
page read and write
4E70000
trusted library allocation
page execute and read and write
75E0000
trusted library allocation
page execute and read and write
4E3F000
stack
page read and write
75A000
heap
page read and write
1384000
heap
page read and write
7FF7E5BB4000
unkown
page write copy
944000
heap
page read and write
716000
unkown
page read and write
A8DE000
unkown
page read and write
C244000
unkown
page read and write
8700000
unkown
page read and write
944000
heap
page read and write
4891000
heap
page read and write
4DD0000
heap
page execute and read and write
F9A000
heap
page read and write
944000
heap
page read and write
13F4000
heap
page read and write
1384000
heap
page read and write
329C000
heap
page read and write
3594000
trusted library allocation
page read and write
160E000
stack
page read and write
1384000
heap
page read and write
7FF5573D5000
unkown
page readonly
142B000
trusted library allocation
page execute and read and write
890000
trusted library allocation
page read and write
4891000
heap
page read and write
2893000
heap
page read and write
288A000
heap
page read and write
2875000
heap
page read and write
7FF556FC4000
unkown
page readonly
13A0000
heap
page read and write
850000
trusted library allocation
page read and write
18B0000
direct allocation
page read and write
77D0000
unkown
page read and write
1384000
heap
page read and write
405E000
trusted library allocation
page read and write
3370000
heap
page read and write
4051000
heap
page read and write
1250000
heap
page read and write
2803000
heap
page read and write
944000
heap
page read and write
FEC0000
unkown
page read and write
325A000
heap
page read and write
55C0000
direct allocation
page execute and read and write
944000
heap
page read and write
1384000
heap
page read and write
5C30000
trusted library allocation
page execute and read and write
109000
unkown
page readonly
635C000
stack
page read and write
C000066000
direct allocation
page read and write
326F000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
3591000
trusted library allocation
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
35A8000
heap
page read and write
31CD000
heap
page read and write
1B3A0000
trusted library allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
5A20000
trusted library allocation
page execute and read and write
1384000
heap
page read and write
799000
heap
page read and write
1384000
heap
page read and write
58B0000
heap
page read and write
93B000
stack
page read and write
C0F9000
unkown
page read and write
1B2A1000
heap
page read and write
5740000
trusted library allocation
page execute and read and write
4746000
unkown
page read and write
944000
heap
page read and write
2132B000
heap
page read and write
7FF5572B4000
unkown
page readonly
4891000
heap
page read and write
944000
heap
page read and write
597B000
trusted library allocation
page read and write
104C8000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1410000
trusted library allocation
page read and write
424F000
trusted library allocation
page read and write
3197000
heap
page read and write
472C000
unkown
page read and write
148F000
heap
page read and write
A4C000
heap
page read and write
2875000
heap
page read and write
3163000
heap
page read and write
3051000
heap
page read and write
8740000
unkown
page read and write
A222000
unkown
page read and write
31F5000
heap
page read and write
59C0000
trusted library allocation
page read and write
7C2E000
stack
page read and write
232B000
stack
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
A286000
unkown
page read and write
45B1000
trusted library allocation
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
A83000
heap
page read and write
424C000
trusted library allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1338000
stack
page read and write
A231000
unkown
page read and write
37FE000
stack
page read and write
1384000
heap
page read and write
C480000
unkown
page read and write
1474000
heap
page read and write
27BD000
heap
page read and write
2F71000
trusted library allocation
page read and write
6AC000
stack
page read and write
944000
heap
page read and write
1384000
heap
page read and write
2893000
heap
page read and write
7FF557257000
unkown
page readonly
5A1B000
trusted library allocation
page read and write
7FF557420000
unkown
page readonly
31D5000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
14F2000
heap
page read and write
61ECC000
direct allocation
page read and write
7FF5574B3000
unkown
page readonly
5690000
heap
page read and write
46E0000
unkown
page read and write
288E000
heap
page read and write
10884000
unkown
page read and write
32AC000
heap
page read and write
2834000
heap
page read and write
6FB0000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
944000
heap
page read and write
59A2000
trusted library allocation
page read and write
71A4000
unkown
page read and write
370C000
heap
page read and write
B070000
unkown
page read and write
8270000
heap
page read and write
8700000
unkown
page read and write
319A000
heap
page read and write
32B9000
heap
page read and write
8464000
trusted library allocation
page read and write
1384000
heap
page read and write
4248000
trusted library allocation
page read and write
8475000
trusted library allocation
page read and write
31E7000
heap
page read and write
7FF5572D4000
unkown
page readonly
1380000
heap
page read and write
1464000
heap
page read and write
131A000
heap
page read and write
4C0B000
trusted library allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
4059000
trusted library allocation
page read and write
31D5000
heap
page read and write
8D3000
heap
page read and write
319A000
heap
page read and write
657E000
stack
page read and write
10618000
unkown
page read and write
316C000
heap
page read and write
864F000
stack
page read and write
31F5000
heap
page read and write
3715000
heap
page read and write
1384000
heap
page read and write
105FD000
unkown
page read and write
4230000
trusted library allocation
page read and write
1384000
heap
page read and write
3296000
trusted library allocation
page read and write
1384000
heap
page read and write
3151000
heap
page read and write
13F5000
heap
page read and write
944000
heap
page read and write
3580000
remote allocation
page read and write
166E000
heap
page read and write
59DF000
trusted library allocation
page read and write
AE2B000
stack
page read and write
1384000
heap
page read and write
944000
heap
page read and write
4891000
heap
page read and write
27C9000
heap
page read and write
4FD1000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
8E8D000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
DAE000
stack
page read and write
3010000
heap
page read and write
1384000
heap
page read and write
10840000
unkown
page read and write
31E8000
heap
page read and write
1384000
heap
page read and write
332F000
stack
page read and write
3189000
heap
page read and write
4A7F000
stack
page read and write
1384000
heap
page read and write
32AC000
heap
page read and write
1384000
heap
page read and write
1477000
heap
page read and write
34D0000
heap
page read and write
992000
remote allocation
page execute and read and write
944000
heap
page read and write
4AC0000
heap
page read and write
42D5000
trusted library allocation
page read and write
192F000
stack
page read and write
36BE000
heap
page read and write
4641000
trusted library allocation
page read and write
410E000
stack
page read and write
1384000
heap
page read and write
C0008C3000
direct allocation
page read and write
66D0000
trusted library allocation
page read and write
8AE6000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
C000883000
direct allocation
page read and write
285B000
heap
page read and write
717C000
unkown
page read and write
62FF000
stack
page read and write
1450000
trusted library allocation
page execute and read and write
8700000
unkown
page read and write
32A0000
heap
page read and write
31B8000
heap
page read and write
31D7000
heap
page read and write
84BF000
trusted library allocation
page read and write
7FF5575BF000
unkown
page readonly
8940000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
8940000
unkown
page read and write
3051000
heap
page read and write
944000
heap
page read and write
31D5000
heap
page read and write
10618000
unkown
page read and write
944000
heap
page read and write
3051000
heap
page read and write
321B000
heap
page read and write
2872000
heap
page read and write
944000
heap
page read and write
1AE7F000
stack
page read and write
1306000
heap
page read and write
1384000
heap
page read and write
1517000
heap
page read and write
8700000
unkown
page read and write
944000
heap
page read and write
28A1000
heap
page read and write
2844000
heap
page read and write
A85000
heap
page read and write
A8B000
heap
page read and write
32AC000
heap
page read and write
7FF7E58D0000
unkown
page readonly
1384000
heap
page read and write
944000
heap
page read and write
31F8000
heap
page read and write
53B0000
trusted library allocation
page read and write
944000
heap
page read and write
7E05000
stack
page read and write
944000
heap
page read and write
1720000
heap
page read and write
1C223FF000
stack
page read and write
1384000
heap
page read and write
2F20000
unkown
page read and write
2F20000
unkown
page read and write
3342000
trusted library allocation
page read and write
1384000
heap
page read and write
944000
heap
page read and write
32E6000
unkown
page read and write
A5F000
heap
page read and write
4124000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
C2D3000
unkown
page read and write
387E000
stack
page read and write
C0000CE000
direct allocation
page read and write
3198000
heap
page read and write
14E9000
heap
page read and write
1384000
heap
page read and write
27E1000
heap
page read and write
1384000
heap
page read and write
27E1000
heap
page read and write
1643000
trusted library allocation
page execute and read and write
433B000
trusted library allocation
page read and write
13F4000
heap
page read and write
3179000
heap
page read and write
21326000
heap
page read and write
2A05000
heap
page read and write
B040000
unkown
page readonly
A76000
heap
page read and write
36EE000
heap
page read and write
72FC000
unkown
page read and write
36B5000
trusted library allocation
page read and write
C000142000
direct allocation
page read and write
C48000
heap
page read and write
1384000
heap
page read and write
3698000
heap
page read and write
3051000
heap
page read and write
59AA000
trusted library allocation
page read and write
1384000
heap
page read and write
13F4000
heap
page read and write
32D9000
trusted library allocation
page read and write
1384000
heap
page read and write
1E9A1C70000
heap
page read and write
35B0000
heap
page read and write
519E000
stack
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
2475000
trusted library allocation
page read and write
7FF55747D000
unkown
page readonly
368D000
heap
page read and write
45BA000
trusted library allocation
page read and write
31B9000
heap
page read and write
944000
heap
page read and write
7FF55733B000
unkown
page readonly
1031000
unkown
page execute and read and write
944000
heap
page read and write
412E000
stack
page read and write
5ACE000
stack
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
13F4000
heap
page read and write
A64000
heap
page read and write
45EF000
stack
page read and write
950000
unkown
page readonly
944000
heap
page read and write
2134C000
heap
page read and write
447E000
stack
page read and write
4FD1000
heap
page read and write
3051000
heap
page read and write
28C5000
heap
page read and write
F47000
unkown
page execute and read and write
1384000
heap
page read and write
36B1000
heap
page read and write
8940000
unkown
page read and write
31D5000
heap
page read and write
31B5000
heap
page read and write
5988000
trusted library allocation
page read and write
55B0000
direct allocation
page execute and read and write
E90000
heap
page read and write
359D000
stack
page read and write
94E000
stack
page read and write
483E000
stack
page read and write
2D4B8000
heap
page read and write
90DB000
unkown
page read and write
2134C000
heap
page read and write
36EE000
heap
page read and write
4FD1000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
623B000
heap
page read and write
6CB47000
unkown
page readonly
33E8000
trusted library allocation
page read and write
1384000
heap
page read and write
9052000
unkown
page read and write
19D000
stack
page read and write
8700000
unkown
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
31A3000
heap
page read and write
1384000
heap
page read and write
32AC000
heap
page read and write
321D000
trusted library allocation
page read and write
1384000
heap
page read and write
3DFE000
stack
page read and write
944000
heap
page read and write
32DB000
unkown
page read and write
1384000
heap
page read and write
3580000
remote allocation
page read and write
2F30000
unkown
page readonly
DBB000
unkown
page execute and read and write
1384000
heap
page read and write
8470000
trusted library allocation
page read and write
2816000
heap
page read and write
8940000
unkown
page read and write
1060A000
unkown
page read and write
1384000
heap
page read and write
8F21000
heap
page read and write
2818000
heap
page read and write
7FF5570FE000
unkown
page readonly
944000
heap
page read and write
32C2000
heap
page read and write
140D000
trusted library allocation
page execute and read and write
31EF000
heap
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
5984000
trusted library allocation
page read and write
2F20000
unkown
page read and write
26A1000
heap
page read and write
1384000
heap
page read and write
3169000
heap
page read and write
3051000
heap
page read and write
C000052000
direct allocation
page read and write
94FE000
stack
page read and write
7492000
trusted library allocation
page read and write
7FF557095000
unkown
page readonly
1384000
heap
page read and write
944000
heap
page read and write
2ECF000
stack
page read and write
1079000
unkown
page execute and read and write
7FF556A1B000
unkown
page readonly
8940000
unkown
page read and write
FEC0000
unkown
page read and write
2745000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
42A000
unkown
page write copy
1384000
heap
page read and write
4233000
trusted library allocation
page read and write
19A7000
heap
page read and write
1384000
heap
page read and write
2836000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
321C000
heap
page read and write
944000
heap
page read and write
31EF000
stack
page read and write
944000
heap
page read and write
51CD000
stack
page read and write
944000
heap
page read and write
4FD1000
heap
page read and write
C328000
unkown
page read and write
8720000
unkown
page read and write
12C0000
trusted library allocation
page read and write
944000
heap
page read and write
1736000
heap
page read and write
30F0000
heap
page execute and read and write
7AAE000
stack
page read and write
13D0000
direct allocation
page read and write
7FF5570B5000
unkown
page readonly
3051000
heap
page read and write
5983000
trusted library allocation
page read and write
7185000
unkown
page read and write
3051000
heap
page read and write
13F4000
heap
page read and write
105EF000
unkown
page read and write
944000
heap
page read and write
1358000
heap
page read and write
944000
heap
page read and write
4891000
heap
page read and write
36B8000
heap
page read and write
944000
heap
page read and write
2804000
heap
page read and write
1384000
heap
page read and write
C8E000
heap
page read and write
6B80000
trusted library allocation
page read and write
8940000
unkown
page read and write
DED000
stack
page read and write
1384000
heap
page read and write
573B000
stack
page read and write
944000
heap
page read and write
806000
heap
page read and write
944000
heap
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
85EE000
stack
page read and write
3051000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
D00000
heap
page read and write
C0000B3000
direct allocation
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
59E0000
trusted library allocation
page read and write
7FF5575C5000
unkown
page readonly
30E0000
trusted library allocation
page execute and read and write
84F0000
unkown
page read and write
944000
heap
page read and write
944000
heap
page read and write
3490000
remote allocation
page read and write
A8B000
heap
page read and write
13C3000
heap
page read and write
38B6000
heap
page read and write
4E50000
heap
page read and write
4891000
heap
page read and write
4891000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
138B000
heap
page read and write
3221000
trusted library allocation
page read and write
82A5000
heap
page read and write
1087D000
unkown
page read and write
4FD1000
heap
page read and write
5910000
trusted library allocation
page read and write
32AA000
stack
page read and write
3163000
heap
page read and write
4891000
heap
page read and write
3051000
heap
page read and write
322E000
stack
page read and write
944000
heap
page read and write
C000160000
direct allocation
page read and write
288F000
heap
page read and write
27CA000
heap
page read and write
944000
heap
page read and write
126D000
trusted library allocation
page execute and read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
59C5000
trusted library allocation
page read and write
3051000
heap
page read and write
2132B000
heap
page read and write
316F000
heap
page read and write
4718000
unkown
page read and write
599F000
trusted library allocation
page read and write
3051000
heap
page read and write
944000
heap
page read and write
8940000
unkown
page read and write
944000
heap
page read and write
1C22BFE000
stack
page read and write
456F000
trusted library allocation
page read and write
320C000
stack
page read and write
37AE000
heap
page read and write
42B0000
trusted library allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
283E000
heap
page read and write
5985000
trusted library allocation
page read and write
35B8000
heap
page read and write
613E000
stack
page read and write
4891000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
34CF000
stack
page read and write
4A91000
trusted library allocation
page read and write
28C5000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
7C30000
unkown
page readonly
1384000
heap
page read and write
8710000
unkown
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
367D000
heap
page read and write
2132F000
heap
page read and write
6EE06000
unkown
page readonly
288E000
heap
page read and write
3621000
trusted library allocation
page read and write
944000
heap
page read and write
2334000
heap
page read and write
2C10000
direct allocation
page read and write
104000
unkown
page write copy
56BE000
trusted library allocation
page read and write
8700000
unkown
page read and write
944000
heap
page read and write
B1A0000
unkown
page read and write
C000022000
direct allocation
page read and write
3707000
trusted library allocation
page read and write
3745000
heap
page read and write
B46000
heap
page read and write
3FFF000
heap
page read and write
32B9000
heap
page read and write
1B2A1000
heap
page read and write
1384000
heap
page read and write
3178000
heap
page read and write
35EE000
stack
page read and write
8710000
unkown
page read and write
4544000
trusted library allocation
page read and write
C3ED000
unkown
page read and write
8740000
unkown
page read and write
2860000
heap
page read and write
1384000
heap
page read and write
364B000
heap
page read and write
4769000
unkown
page read and write
35B3000
heap
page read and write
944000
heap
page read and write
E50000
unkown
page readonly
325A000
heap
page read and write
944000
heap
page read and write
2F20000
unkown
page read and write
344B000
trusted library allocation
page read and write
18A0000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
97C000
remote allocation
page readonly
935000
stack
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
2E50000
trusted library allocation
page read and write
1470000
heap
page read and write
14F9000
heap
page read and write
2134C000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
C00017C000
direct allocation
page read and write
8940000
unkown
page read and write
8EF5000
unkown
page read and write
1384000
heap
page read and write
36FE000
heap
page read and write
90F2000
unkown
page read and write
8940000
unkown
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
3193000
heap
page read and write
407F000
stack
page read and write
C000178000
direct allocation
page read and write
36F5000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
48E0000
heap
page read and write
944000
heap
page read and write
131A000
heap
page read and write
410D000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
2926000
heap
page read and write
1384000
heap
page read and write
A8B000
heap
page read and write
8940000
unkown
page read and write
1660000
heap
page read and write
2859000
heap
page read and write
DAE000
stack
page read and write
8D86000
unkown
page read and write
1384000
heap
page read and write
1370000
heap
page read and write
3051000
heap
page read and write
DC5000
unkown
page execute read
325A000
heap
page read and write
3051000
heap
page read and write
273A0000
heap
page read and write
7FF5573B0000
unkown
page readonly
944000
heap
page read and write
7FF557653000
unkown
page readonly
91C0000
trusted library allocation
page read and write
1384000
heap
page read and write
13D8000
heap
page read and write
1384000
heap
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
2816000
heap
page read and write
3215000
heap
page read and write
8D6A000
unkown
page read and write
32D2000
trusted library allocation
page read and write
6689000
heap
page read and write
1384000
heap
page read and write
377C000
heap
page read and write
2876000
heap
page read and write
104CE000
unkown
page read and write
380000
heap
page read and write
C000006000
direct allocation
page read and write
944000
heap
page read and write
4FD1000
heap
page read and write
1384000
heap
page read and write
2199000
stack
page read and write
3220000
unkown
page readonly
3672000
heap
page read and write
1384000
heap
page read and write
41E0000
heap
page read and write
580E000
stack
page read and write
944000
heap
page read and write
31F1000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
2836000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
27F2000
heap
page read and write
D12000
heap
page read and write
1660000
heap
page read and write
31D5000
heap
page read and write
59B8000
trusted library allocation
page read and write
2454000
trusted library allocation
page read and write
7FF5573D8000
unkown
page readonly
4076000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
2836000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
5C2E000
stack
page read and write
3123000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
31D5000
heap
page read and write
1384000
heap
page read and write
ADAD000
stack
page read and write
21327000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
3F0F000
heap
page read and write
74DF000
trusted library allocation
page read and write
3188000
heap
page read and write
8940000
unkown
page read and write
3180000
heap
page read and write
944000
heap
page read and write
C000124000
direct allocation
page read and write
6BC000
stack
page read and write
33C1000
trusted library allocation
page read and write
C4FA000
unkown
page read and write
1384000
heap
page read and write
8720000
unkown
page read and write
31D5000
heap
page read and write
1496000
heap
page read and write
1384000
heap
page read and write
2817000
heap
page read and write
3269000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
34484000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
55D0000
direct allocation
page execute and read and write
FB0000
unkown
page read and write
14F0000
heap
page read and write
5A60000
trusted library allocation
page execute and read and write
1384000
heap
page read and write
3172000
heap
page read and write
26A1000
heap
page read and write
1384000
heap
page read and write
2134D000
heap
page read and write
35B1000
heap
page read and write
3179000
heap
page read and write
31A3000
heap
page read and write
2816000
heap
page read and write
59FF000
trusted library allocation
page read and write
36ED000
heap
page read and write
944000
heap
page read and write
8F6C000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
36E6000
heap
page read and write
3250000
heap
page read and write
13F4000
trusted library allocation
page read and write
5978000
trusted library allocation
page read and write
488E000
stack
page read and write
5590000
trusted library allocation
page read and write
4A30000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
11EE000
stack
page read and write
A8C0000
unkown
page read and write
5921000
trusted library allocation
page read and write
591B000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
4785000
unkown
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
30ED000
stack
page read and write
1023000
heap
page read and write
27B8000
heap
page read and write
1130000
heap
page read and write
A850000
unkown
page read and write
8700000
unkown
page read and write
31D5000
heap
page read and write
37CB000
heap
page read and write
3720000
heap
page read and write
8940000
unkown
page read and write
8D70000
unkown
page read and write
27FA000
heap
page read and write
A222000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
401000
unkown
page execute read
2892000
heap
page read and write
13EE000
heap
page read and write
5985000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
1384000
heap
page read and write
1384000
heap
page read and write
9B0000
heap
page read and write
4F10000
direct allocation
page execute and read and write
1384000
heap
page read and write
4F20000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
18B0000
direct allocation
page read and write
84BA000
trusted library allocation
page read and write
2817000
heap
page read and write
1384000
heap
page read and write
7FF557328000
unkown
page readonly
1384000
heap
page read and write
1384000
heap
page read and write
2CD0000
heap
page read and write
317B000
heap
page read and write
31D7000
heap
page read and write
404E000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
370C000
heap
page read and write
8940000
unkown
page read and write
31D5000
heap
page read and write
8700000
unkown
page read and write
8940000
unkown
page read and write
756D000
stack
page read and write
944000
heap
page read and write
38BA000
heap
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
2817000
heap
page read and write
944000
heap
page read and write
28C5000
heap
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
3215000
heap
page read and write
8710000
unkown
page read and write
A4E000
stack
page read and write
4E2E000
stack
page read and write
8700000
unkown
page read and write
2859000
heap
page read and write
4E8F000
stack
page read and write
4FD1000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
1E9E7108000
direct allocation
page read and write
788000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
7FF7E5BBD000
unkown
page read and write
5B0F000
stack
page read and write
328D000
heap
page read and write
337A000
trusted library allocation
page read and write
944000
heap
page read and write
36F1000
heap
page read and write
B20000
heap
page read and write
944000
heap
page read and write
3169000
heap
page read and write
505F000
stack
page read and write
12A2000
trusted library allocation
page read and write
104C4000
unkown
page read and write
1384000
heap
page read and write
77B0000
unkown
page read and write
1384000
heap
page read and write
5998000
trusted library allocation
page read and write
13F4000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
7FF557042000
unkown
page readonly
4D91000
direct allocation
page read and write
1384000
heap
page read and write
283E000
heap
page read and write
32AC000
heap
page read and write
1384000
heap
page read and write
A20000
heap
page read and write
6ED1000
heap
page read and write
1384000
heap
page read and write
4891000
heap
page read and write
4FD1000
heap
page read and write
3051000
heap
page read and write
32C4000
unkown
page read and write
3051000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1250000
trusted library allocation
page read and write
A8B000
heap
page read and write
8700000
unkown
page read and write
F50000
heap
page read and write
8940000
unkown
page read and write
1384000
heap
page read and write
18B0000
direct allocation
page read and write
66E0000
trusted library allocation
page read and write
319D000
heap
page read and write
1384000
heap
page read and write
2F8E000
heap
page execute and read and write
3D2F000
stack
page read and write
944000
heap
page read and write
7FF556F9E000
unkown
page readonly
8950000
unkown
page read and write
7FF55742B000
unkown
page readonly
977E000
stack
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1AD7E000
stack
page read and write
5983000
trusted library allocation
page read and write
319D000
heap
page read and write
346F000
stack
page read and write
1384000
heap
page read and write
944000
heap
page read and write
8E7B000
heap
page read and write
6CB01000
unkown
page execute read
3F4C000
heap
page read and write
8940000
unkown
page read and write
93E000
stack
page read and write
27CA000
heap
page read and write
18AE000
stack
page read and write
3169000
heap
page read and write
3051000
heap
page read and write
893A000
heap
page read and write
13F4000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
2134D000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
3169000
heap
page read and write
944000
heap
page read and write
3FCF000
heap
page read and write
31E9000
heap
page read and write
3EFD000
stack
page read and write
2883000
trusted library allocation
page read and write
8710000
unkown
page read and write
2816000
heap
page read and write
27E1000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
36FA000
heap
page read and write
31F8000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
164D000
trusted library allocation
page execute and read and write
1384000
heap
page read and write
A8B000
heap
page read and write
1384000
heap
page read and write
13F4000
heap
page read and write
944000
heap
page read and write
27F6000
heap
page read and write
944000
heap
page read and write
4FD1000
heap
page read and write
68C000
unkown
page readonly
3221000
heap
page read and write
BBBB000
stack
page read and write
3686000
trusted library allocation
page read and write
4246000
trusted library allocation
page read and write
7A80000
unkown
page readonly
944000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1670000
heap
page read and write
4E60000
trusted library allocation
page read and write
3051000
heap
page read and write
C000002000
direct allocation
page read and write
59DA000
trusted library allocation
page read and write
55A0000
direct allocation
page execute and read and write
5630000
direct allocation
page execute and read and write
5B22000
trusted library allocation
page read and write
3460000
unkown
page read and write
380F000
stack
page read and write
944000
heap
page read and write
59B1000
trusted library allocation
page read and write
944000
heap
page read and write
1521000
heap
page read and write
EFCB000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
3169000
heap
page read and write
598F000
trusted library allocation
page read and write
31D5000
heap
page read and write
4891000
heap
page read and write
944000
heap
page read and write
3813000
heap
page read and write
944000
heap
page read and write
3CFE000
stack
page read and write
65E0000
trusted library allocation
page read and write
3178000
heap
page read and write
8F0A000
heap
page read and write
51F9000
unkown
page read and write
4FD1000
heap
page read and write
284000
unkown
page readonly
27B6000
heap
page read and write
5640000
direct allocation
page execute and read and write
31D5000
heap
page read and write
27BB000
heap
page read and write
36ED000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
6360000
heap
page read and write
A09000
heap
page read and write
31CD000
heap
page read and write
A0000
unkown
page readonly
8D80000
unkown
page read and write
7FF7E5BED000
unkown
page write copy
7E9000
unkown
page write copy
3698000
heap
page read and write
3051000
heap
page read and write
41AD000
heap
page read and write
28C5000
heap
page read and write
944000
heap
page read and write
38C3000
heap
page read and write
A8B000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
8700000
unkown
page read and write
944000
heap
page read and write
4891000
heap
page read and write
9D1000
unkown
page readonly
59B4000
trusted library allocation
page read and write
325A000
heap
page read and write
31D5000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
C74000
heap
page read and write
32B9000
heap
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
9A60000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1E9A1CC9000
heap
page read and write
944000
heap
page read and write
8740000
unkown
page read and write
1CD8F000
stack
page read and write
944000
heap
page read and write
8EEE000
heap
page read and write
2E6A000
heap
page read and write
40D6000
heap
page read and write
591F000
heap
page read and write
8940000
unkown
page read and write
944000
heap
page read and write
5B9000
stack
page read and write
1521000
heap
page read and write
3715000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
109000
unkown
page readonly
4224000
trusted library allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
36B4000
heap
page read and write
3051000
heap
page read and write
21315000
heap
page read and write
708C000
heap
page read and write
32C4000
unkown
page read and write
3377000
heap
page read and write
3175000
heap
page read and write
944000
heap
page read and write
84F0000
unkown
page read and write
38C0000
heap
page read and write
2E60000
heap
page read and write
1316000
heap
page read and write
7FF5575AB000
unkown
page readonly
18B0000
direct allocation
page read and write
8940000
unkown
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
3D6E000
stack
page read and write
1384000
heap
page read and write
8740000
unkown
page read and write
4264000
heap
page read and write
31CD000
heap
page read and write
13F4000
heap
page read and write
51E3000
unkown
page read and write
944000
heap
page read and write
C00000A000
direct allocation
page read and write
2836000
heap
page read and write
5600000
direct allocation
page execute and read and write
74CA000
trusted library allocation
page read and write
2878000
heap
page read and write
1384000
heap
page read and write
21323000
heap
page read and write
27F2000
heap
page read and write
7DF468991000
unkown
page execute read
1384000
heap
page read and write
56BE000
stack
page read and write
B82A000
stack
page read and write
944000
heap
page read and write
1000000
heap
page read and write
31AD000
heap
page read and write
4FD1000
heap
page read and write
19AD000
heap
page read and write
1384000
heap
page read and write
8421000
trusted library allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
4E50000
remote allocation
page read and write
4891000
heap
page read and write
4D3E000
stack
page read and write
32B9000
heap
page read and write
21326000
heap
page read and write
61E00000
direct allocation
page execute and read and write
8740000
unkown
page read and write
F5C000
heap
page read and write
944000
heap
page read and write
7FF5575D0000
unkown
page readonly
1079000
unkown
page execute and write copy
16FE000
heap
page read and write
319F000
heap
page read and write
1384000
heap
page read and write
319E000
heap
page read and write
32AC000
heap
page read and write
1384000
heap
page read and write
C0000FA000
direct allocation
page read and write
8700000
unkown
page read and write
A64000
heap
page read and write
944000
heap
page read and write
6EE0F000
unkown
page readonly
8660000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
59D3000
trusted library allocation
page read and write
4582000
trusted library allocation
page read and write
2134D000
heap
page read and write
4891000
heap
page read and write
944000
heap
page read and write
A8CD000
unkown
page read and write
317B000
heap
page read and write
AD0000
unkown
page read and write
47CE000
stack
page read and write
8700000
unkown
page read and write
36FB000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
2A04000
heap
page read and write
11CE000
stack
page read and write
8940000
unkown
page read and write
7FF55714A000
unkown
page readonly
944000
heap
page read and write
5F70000
remote allocation
page read and write
944000
heap
page read and write
8F33000
heap
page read and write
1384000
heap
page read and write
1240000
heap
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
55F0000
direct allocation
page execute and read and write
8710000
unkown
page read and write
59A0000
trusted library allocation
page read and write
5580000
heap
page read and write
90B0000
trusted library allocation
page read and write
944000
heap
page read and write
28C5000
heap
page read and write
5670000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
944000
heap
page read and write
8B53000
unkown
page read and write
3FEA000
heap
page read and write
403F000
trusted library allocation
page read and write
FBA000
unkown
page write copy
944000
heap
page read and write
35FA000
trusted library allocation
page read and write
21311000
heap
page read and write
31D5000
heap
page read and write
944000
heap
page read and write
E270000
unkown
page read and write
5DAC0000
unkown
page readonly
652E000
stack
page read and write
4E54000
heap
page read and write
599F000
trusted library allocation
page read and write
C063000
unkown
page read and write
944000
heap
page read and write
59D9000
trusted library allocation
page read and write
944000
heap
page read and write
3051000
heap
page read and write
6249000
heap
page read and write
8940000
unkown
page read and write
32F5000
trusted library allocation
page read and write
1384000
heap
page read and write
31D2000
heap
page read and write
A7A000
heap
page read and write
5A00000
trusted library allocation
page read and write
1384000
heap
page read and write
7FF556E9A000
unkown
page readonly
365C000
heap
page read and write
31E7000
heap
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
32C6000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
5F70000
remote allocation
page read and write
944000
heap
page read and write
1521000
heap
page read and write
C5CC000
unkown
page read and write
944000
heap
page read and write
7FF7E58D1000
unkown
page execute read
55A0000
trusted library allocation
page execute and read and write
8940000
unkown
page read and write
1E9E71EF000
direct allocation
page read and write
4891000
heap
page read and write
AA9000
unkown
page execute and read and write
1384000
heap
page read and write
35B5000
heap
page read and write
2854000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
2807000
heap
page read and write
129A000
trusted library allocation
page execute and read and write
944000
heap
page read and write
4D20000
direct allocation
page read and write
3051000
heap
page read and write
8940000
unkown
page read and write
C000020000
direct allocation
page read and write
2134C000
heap
page read and write
944000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
D13000
heap
page read and write
10615000
unkown
page read and write
1384000
heap
page read and write
2F4E000
stack
page read and write
32AC000
heap
page read and write
4145000
trusted library allocation
page read and write
944000
heap
page read and write
944000
heap
page read and write
2836000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
C00001C000
direct allocation
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
376F000
heap
page read and write
4AD1000
heap
page read and write
944000
heap
page read and write
14FA000
heap
page read and write
944000
heap
page read and write
4840000
unkown
page read and write
944000
heap
page read and write
3151000
heap
page read and write
21323000
heap
page read and write
944000
heap
page read and write
A0000
unkown
page readonly
292E000
heap
page read and write
3051000
heap
page read and write
190000
heap
page read and write
18B0000
direct allocation
page read and write
1384000
heap
page read and write
31E8000
heap
page read and write
3051000
heap
page read and write
A22F000
unkown
page read and write
7FF5574C6000
unkown
page readonly
FCE000
stack
page read and write
3715000
heap
page read and write
2132B000
heap
page read and write
C00010C000
direct allocation
page read and write
944000
heap
page read and write
2134D000
heap
page read and write
3FDF000
heap
page read and write
318A000
heap
page read and write
27B2000
heap
page read and write
8700000
unkown
page read and write
27FC000
heap
page read and write
4FA1000
heap
page read and write
8294000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
31B4000
trusted library allocation
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
3213000
stack
page read and write
3B0000
heap
page read and write
290C000
heap
page read and write
2893000
heap
page read and write
C0007B4000
direct allocation
page read and write
1CC8E000
stack
page read and write
1384000
heap
page read and write
36BE000
stack
page read and write
7FF55706A000
unkown
page readonly
4C0F000
stack
page read and write
944000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1490000
heap
page execute and read and write
4361000
trusted library allocation
page read and write
13AC000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
863000
trusted library allocation
page execute and read and write
D90000
heap
page read and write
5971000
trusted library allocation
page read and write
8940000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
400000
unkown
page execute and read and write
7014000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
4FD1000
heap
page read and write
1384000
heap
page read and write
AF0000
heap
page read and write
6609000
heap
page read and write
73C5000
stack
page read and write
944000
heap
page read and write
319B000
heap
page read and write
C00002A000
direct allocation
page read and write
1384000
heap
page read and write
944000
heap
page read and write
166A000
heap
page read and write
3051000
heap
page read and write
284C000
heap
page read and write
DB2000
unkown
page execute and read and write
DB9000
unkown
page write copy
A114000
unkown
page read and write
14F7000
heap
page read and write
7FF5572C9000
unkown
page readonly
1384000
heap
page read and write
944000
heap
page read and write
7FF5575FC000
unkown
page readonly
320C000
trusted library allocation
page read and write
3914000
heap
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
5961000
trusted library allocation
page read and write
6255000
heap
page read and write
8940000
unkown
page read and write
FEC000
stack
page read and write
7FF557411000
unkown
page readonly
360A000
heap
page read and write
90B4000
trusted library allocation
page read and write
1384000
heap
page read and write
C091000
unkown
page read and write
A7A000
heap
page read and write
944000
heap
page read and write
167E000
stack
page read and write
8700000
unkown
page read and write
7FF7E5BB4000
unkown
page read and write
326B000
stack
page read and write
944000
heap
page read and write
5590000
direct allocation
page execute and read and write
4ED0000
trusted library allocation
page read and write
425000
unkown
page readonly
3251000
heap
page read and write
5978000
trusted library allocation
page read and write
896000
trusted library allocation
page execute and read and write
27FA000
heap
page read and write
48E1000
heap
page read and write
36FA000
heap
page read and write
664F000
heap
page read and write
8700000
unkown
page read and write
F0000
unkown
page readonly
1384000
heap
page read and write
5977000
trusted library allocation
page read and write
370C000
heap
page read and write
A0DA000
unkown
page read and write
944000
heap
page read and write
8700000
unkown
page read and write
8A7000
unkown
page readonly
1384000
heap
page read and write
1384000
heap
page read and write
27FC000
heap
page read and write
7FF5570D6000
unkown
page readonly
3051000
heap
page read and write
168F000
stack
page read and write
31D5000
heap
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
31B5000
heap
page read and write
90CF000
unkown
page read and write
4249000
heap
page read and write
944000
heap
page read and write
26A1000
heap
page read and write
944000
heap
page read and write
2F28000
trusted library allocation
page read and write
102000
unkown
page write copy
4172000
trusted library allocation
page read and write
8940000
unkown
page read and write
3051000
heap
page read and write
3163000
heap
page read and write
4FD1000
heap
page read and write
7F850000
trusted library allocation
page execute and read and write
1470000
heap
page read and write
633E000
stack
page read and write
944000
heap
page read and write
944000
heap
page read and write
90CF000
unkown
page read and write
28A1000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
40BA000
heap
page read and write
2A0C000
heap
page read and write
A81000
heap
page read and write
944000
heap
page read and write
6690000
trusted library allocation
page read and write
1CEEE000
stack
page read and write
1384000
heap
page read and write
8950000
unkown
page read and write
5995000
trusted library allocation
page read and write
14FD000
heap
page read and write
3251000
heap
page read and write
944000
heap
page read and write
E860000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
9D8E000
stack
page read and write
8A7000
unkown
page readonly
59F0000
trusted library allocation
page execute and read and write
3051000
heap
page read and write
26A1000
heap
page read and write
7FF55752E000
unkown
page readonly
7FF5569FA000
unkown
page readonly
1384000
heap
page read and write
27FA000
heap
page read and write
E67E000
stack
page read and write
32AC000
heap
page read and write
8940000
unkown
page read and write
3051000
heap
page read and write
4FD1000
heap
page read and write
4019000
heap
page read and write
8E70000
heap
page read and write
B00000
heap
page read and write
E280000
unkown
page read and write
C2D3000
unkown
page read and write
318A000
heap
page read and write
658B000
trusted library allocation
page read and write
7FF5572A2000
unkown
page readonly
944000
heap
page read and write
86EE000
stack
page read and write
944000
heap
page read and write
36F2000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
2817000
heap
page read and write
5998000
trusted library allocation
page read and write
3657000
heap
page read and write
4E90000
trusted library allocation
page read and write
944000
heap
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
2C18000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
6EDF0000
unkown
page readonly
4891000
heap
page read and write
3179000
heap
page read and write
A23B000
unkown
page read and write
53BE000
stack
page read and write
1384000
heap
page read and write
2817000
heap
page read and write
8700000
unkown
page read and write
8700000
unkown
page read and write
32AC000
heap
page read and write
8940000
unkown
page read and write
33F4000
trusted library allocation
page read and write
1384000
heap
page read and write
35A0000
heap
page read and write
319B000
heap
page read and write
105F1000
unkown
page read and write
3706000
heap
page read and write
4055000
trusted library allocation
page read and write
2132B000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
8700000
unkown
page read and write
151B000
heap
page read and write
B080000
unkown
page read and write
46BF000
stack
page read and write
F96000
heap
page read and write
8710000
unkown
page read and write
BA6000
heap
page read and write
944000
heap
page read and write
8F29000
heap
page read and write
2836000
heap
page read and write
5600000
direct allocation
page execute and read and write
31D5000
heap
page read and write
370C000
heap
page read and write
7FF557037000
unkown
page readonly
4BFE000
stack
page read and write
944000
heap
page read and write
1384000
heap
page read and write
59C1000
trusted library allocation
page read and write
43CF000
trusted library allocation
page read and write
4891000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
14F2000
heap
page read and write
18B0000
direct allocation
page read and write
1384000
heap
page read and write
5971000
trusted library allocation
page read and write
944000
heap
page read and write
1517000
heap
page read and write
7DB9000
trusted library allocation
page read and write
32AC000
heap
page read and write
36A5000
trusted library allocation
page read and write
283E000
heap
page read and write
35F3000
trusted library allocation
page read and write
3698000
heap
page read and write
944000
heap
page read and write
3169000
heap
page read and write
A8B000
heap
page read and write
32AC000
heap
page read and write
18B0000
direct allocation
page read and write
32AC000
heap
page read and write
7FF7E58D0000
unkown
page readonly
1384000
heap
page read and write
59AE000
trusted library allocation
page read and write
4FD1000
heap
page read and write
3399000
trusted library allocation
page read and write
B628000
stack
page read and write
A90000
unkown
page readonly
944000
heap
page read and write
7FF556FD2000
unkown
page readonly
13D0000
direct allocation
page read and write
669A000
heap
page read and write
55B0000
direct allocation
page execute and read and write
944000
heap
page read and write
370C000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
32B9000
unkown
page read and write
59A4000
trusted library allocation
page read and write
5A14000
trusted library allocation
page read and write
1384000
heap
page read and write
2A05000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
7162000
unkown
page read and write
487A000
unkown
page read and write
3514000
trusted library allocation
page read and write
1503000
heap
page read and write
3290000
direct allocation
page execute and read and write
60E000
stack
page read and write
A215000
unkown
page read and write
1384000
heap
page read and write
5989000
trusted library allocation
page read and write
3051000
heap
page read and write
7FF557599000
unkown
page readonly
277F000
stack
page read and write
5DD45000
unkown
page readonly
1E9E72F4000
direct allocation
page read and write
944000
heap
page read and write
4A9E000
trusted library allocation
page read and write
944000
heap
page read and write
3A60000
heap
page read and write
367D000
heap
page read and write
3051000
heap
page read and write
DF0000
heap
page read and write
8870000
unkown
page read and write
864000
trusted library allocation
page read and write
1B0FD000
stack
page read and write
32C9000
unkown
page read and write
1420000
trusted library allocation
page read and write
321E000
heap
page read and write
3884000
heap
page read and write
32B9000
heap
page read and write
5A16000
trusted library allocation
page read and write
317B000
heap
page read and write
1384000
heap
page read and write
335F000
trusted library allocation
page read and write
1384000
heap
page read and write
283E000
heap
page read and write
1745000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
1E9E7340000
direct allocation
page read and write
28A1000
heap
page read and write
944000
heap
page read and write
8700000
unkown
page read and write
C6D000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
2818000
heap
page read and write
1384000
heap
page read and write
3051000
heap
page read and write
3151000
heap
page read and write
4891000
heap
page read and write
3740000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
8700000
unkown
page read and write
1384000
heap
page read and write
A5F000
heap
page read and write
C00011A000
direct allocation
page read and write
8710000
unkown
page read and write
7FF5573EA000
unkown
page readonly
4891000
heap
page read and write
1384000
heap
page read and write
7FF556F87000
unkown
page readonly
1384000
heap
page read and write
59A8000
trusted library allocation
page read and write
90C9000
unkown
page read and write
3197000
heap
page read and write
1225000
unkown
page execute and write copy
BA0000
heap
page read and write
8940000
unkown
page read and write
944000
heap
page read and write
8700000
unkown
page read and write
451E000
trusted library allocation
page read and write
7FF7E6109000
unkown
page readonly
84CA000
trusted library allocation
page read and write
7FF556FEE000
unkown
page readonly
A231000
unkown
page read and write
7FF5573DE000
unkown
page readonly
9D1000
heap
page read and write
2133F000
heap
page read and write
1384000
heap
page read and write
8940000
unkown
page read and write
2BEB000
unkown
page readonly
3051000
heap
page read and write
1384000
heap
page read and write
47FF000
stack
page read and write
3051000
heap
page read and write
870000
trusted library allocation
page read and write
1384000
heap
page read and write
13C0000
heap
page read and write
1384000
heap
page read and write
5A7C000
stack
page read and write
2132F000
heap
page read and write
31AF000
heap
page read and write
A00000
heap
page execute and read and write
8700000
unkown
page read and write
31D5000
heap
page read and write
27E1000
heap
page read and write
8940000
unkown
page read and write
6F40000
trusted library allocation
page read and write
285D000
heap
page read and write
944000
heap
page read and write
3188000
heap
page read and write
4ABE000
stack
page read and write
944000
heap
page read and write
2850000
heap
page read and write
8F1A000
heap
page read and write
6591000
trusted library allocation
page read and write
21348000
heap
page read and write
1384000
heap
page read and write
5B4D000
trusted library allocation
page read and write
1384000
heap
page read and write
7FF557493000
unkown
page readonly
1384000
heap
page read and write
1384000
heap
page read and write
27C7000
heap
page read and write
18B0000
direct allocation
page read and write
3701000
heap
page read and write
8940000
unkown
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
32B9000
heap
page read and write
6EE06000
unkown
page readonly
2817000
heap
page read and write
4820000
unkown
page read and write
8710000
unkown
page read and write
186E000
stack
page read and write
3FC8000
heap
page read and write
7FF557549000
unkown
page readonly
8940000
unkown
page read and write
C00007D000
direct allocation
page read and write
7FF55750F000
unkown
page readonly
3051000
heap
page read and write
2BEB000
unkown
page readonly
105DE000
unkown
page read and write
1384000
heap
page read and write
67FC000
stack
page read and write
944000
heap
page read and write
32A7000
heap
page read and write
8710000
unkown
page read and write
32AC000
heap
page read and write
12CE000
heap
page read and write
44E2000
trusted library allocation
page read and write
7FF55761F000
unkown
page readonly
27E1000
heap
page read and write
2F20000
unkown
page read and write
26A1000
heap
page read and write
36E3000
heap
page read and write
C000088000
direct allocation
page read and write
8710000
unkown
page read and write
A8B000
heap
page read and write
C00010A000
direct allocation
page read and write
31A2000
heap
page read and write
B10000
heap
page read and write
D50000
unkown
page readonly
C6E000
stack
page read and write
14DE000
stack
page read and write
1384000
heap
page read and write
8700000
unkown
page read and write
43A0000
trusted library allocation
page read and write
1384000
heap
page read and write
3183000
heap
page read and write
D1D000
heap
page read and write
4D80000
trusted library allocation
page read and write
2CD0000
heap
page read and write
1384000
heap
page read and write
4153000
trusted library allocation
page read and write
7FF5574F4000
unkown
page readonly
5620000
direct allocation
page execute and read and write
3A6F000
stack
page read and write
1519000
heap
page read and write
33F9000
trusted library allocation
page read and write
1384000
heap
page read and write
8720000
unkown
page read and write
944000
heap
page read and write
3717000
heap
page read and write
1384000
heap
page read and write
5DFD000
stack
page read and write
944000
heap
page read and write
3051000
heap
page read and write
944000
heap
page read and write
36F4000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
D07000
heap
page read and write
21330000
heap
page read and write
944000
heap
page read and write
702C000
heap
page read and write
58A0000
trusted library allocation
page read and write
1384000
heap
page read and write
27C9000
heap
page read and write
8940000
unkown
page read and write
944000
heap
page read and write
4FA1000
heap
page read and write
1384000
heap
page read and write
3181000
heap
page read and write
2F20000
unkown
page read and write
951000
unkown
page execute read
21330000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
4FD1000
heap
page read and write
944000
heap
page read and write
A8BA000
unkown
page read and write
944000
heap
page read and write
5A0E000
stack
page read and write
944000
heap
page read and write
58DC000
heap
page read and write
2858000
heap
page read and write
C3E7000
unkown
page read and write
944000
heap
page read and write
3251000
heap
page read and write
8740000
unkown
page read and write
3051000
heap
page read and write
1384000
heap
page read and write
2450000
trusted library allocation
page read and write
1384000
heap
page read and write
31D5000
heap
page read and write
8740000
unkown
page read and write
4140000
trusted library allocation
page read and write
7173000
unkown
page read and write
2C10000
direct allocation
page read and write
400000
unkown
page readonly
7DF468971000
unkown
page execute read
1ABF000
stack
page read and write
40CF000
stack
page read and write
372A000
heap
page read and write
A99000
unkown
page execute and read and write
724B000
stack
page read and write
D51000
unkown
page execute and write copy
7DF468970000
unkown
page readonly
4E80000
trusted library allocation
page execute and read and write
74E000
stack
page read and write
3051000
heap
page read and write
460D000
stack
page read and write
944000
heap
page read and write
13F4000
heap
page read and write
1384000
heap
page read and write
944000
heap
page read and write
1384000
heap
page read and write
9CA000
heap
page read and write
319A000
stack
page read and write
1384000
heap
page read and write
7B99000
stack
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
B72B000
stack
page read and write
944000
heap
page read and write
There are 7464 hidden memdumps, click here to show them.