IOC Report
e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exe

loading gif

Files

File Path
Type
Category
Malicious
e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\2D42.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\8EC7.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\EF14.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ExtractedLumma\g2m.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ExtractedLumma\lm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ExtractedVenom\g2m.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ExtractedVenom\runvm.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\ExtractedVenom\vm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\rentry-script.ps1
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyStartupScript.vbs
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\adjijwj
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\adjijwj:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_lm.exe_ed6b1a814e4ec1e6e89791b3995c66bc9bb83_5fe582ea_8fc838e2-163f-4116-9bba-412c9028ec49\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_vm.exe_12b9a62f7c411e90f74ee59af3dcf249dad3f7e8_19c5d0bb_9c16da23-e6dd-4840-9566-709d498b9789\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER250C.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 05:44:51 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER26A3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER26D3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3FC8.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Jul 27 05:44:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER40B3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER40D3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\2D42.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vm.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\NotifyIcon\Microsoft.Explorer.Notification.{137FF6BE-F11F-34B5-03D0-7AC7965D6722}.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\ExtractedLumma\data.bin
data
dropped
C:\Users\user\AppData\Local\Temp\ExtractedLumma\run.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ExtractedVenom\data.bin
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ht3mp5vg.n4w.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nsyrnlld.nv3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nw4qc1el.vi5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_syfdm4hx.npq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tvmp1poy.ugs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v5c42fyb.j3w.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\lumma.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\venom.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\{0580D43B-F688-43D3-96A9-BC3E3DB7707D}.png
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{508BF163-DE27-4996-B66D-947C52BD324B}.png
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{8A51086A-8CE2-4D7B-9262-7AED61F7272B}.png
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{A02B2518-0C82-48B8-9014-35CF372AF3DC}.png
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{AADB895B-BE9E-45D9-AC69-B81D7027CD73}.png
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{BCC0B1E6-22C5-4252-9A19-34A345219150}.png
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{E1132966-F788-475E-BA3B-8A61AD4B6C1A}.png
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\MyData\DataLogs.conf
ASCII text
modified
\Device\Null
ASCII text
dropped
There are 35 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exe
"C:\Users\user\Desktop\e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\adjijwj
C:\Users\user\AppData\Roaming\adjijwj
malicious
C:\Users\user\AppData\Local\Temp\8EC7.exe
C:\Users\user\AppData\Local\Temp\8EC7.exe
malicious
C:\Users\user\AppData\Local\Temp\EF14.exe
C:\Users\user\AppData\Local\Temp\EF14.exe
malicious
C:\Users\user\AppData\Local\Temp\2D42.exe
C:\Users\user\AppData\Local\Temp\2D42.exe
malicious
C:\Users\user\AppData\Local\Temp\2D42.exe
"C:\Users\user\AppData\Local\Temp\2D42.exe" -HOSTRUNAS
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\Users\user\AppData\Local\Temp\rentry-script.ps1"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious
C:\Users\user\AppData\Local\Temp\ExtractedVenom\vm.exe
"vm.exe"
malicious
C:\Users\user\AppData\Local\Temp\ExtractedLumma\lm.exe
"lm.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyStartupScript.vbs"
malicious
C:\Users\user\AppData\Local\Temp\ExtractedVenom\vm.exe
"vm.exe"
malicious
C:\Users\user\AppData\Local\Temp\8EC7.exe
"C:\Users\user\AppData\Local\Temp\8EC7.exe"
malicious
C:\Users\user\AppData\Local\Temp\8EC7.exe
"C:\Users\user\AppData\Local\Temp\8EC7.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\ExtractedVenom\runvm.bat
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\ExtractedLumma\run.bat
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ExtractedVenom\runvm.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 1092
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5724 -s 1680
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 15 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://liernessfornicsa.shop/)
unknown
malicious
http://100xmargin.com/tmp/index.php
malicious
http://olinsw.ws/tmp/index.php
malicious
https://callosallsaospz.shop/apiple-sto:s
unknown
malicious
https://callosallsaospz.shop/ly3$
unknown
malicious
http://mzxn.ru/tmp/index.php
malicious
https://liernessfornicsa.shop/E
unknown
malicious
callosallsaospz.shop
malicious
https://liernessfornicsa.shop:443/apiCLSID
unknown
malicious
liernessfornicsa.shop
malicious
https://107.173.160.139/
107.173.160.139
malicious
https://liernessfornicsa.shop/api_
unknown
malicious
https://liernessfornicsa.shop/t
unknown
malicious
shepherdlyopzc.shop
malicious
upknittsoappz.shop
malicious
https://mussangroup.com/wp-content/images/pic1.jpg
185.149.100.242
malicious
https://liernessfornicsa.shop/N
unknown
malicious
https://liernessfornicsa.shop/T
unknown
malicious
https://liernessfornicsa.shop/V
unknown
malicious
unseaffarignsk.shop
malicious
https://liernessfornicsa.shop/a
unknown
malicious
https://liernessfornicsa.shop/f
unknown
malicious
http://wgdnb4rc.xyz/tmp/index.php
malicious
https://aka.ms/odirmr
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://www.fontbureau.com/designers
unknown
https://excel.office.com
unknown
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
https://store4.gofile.io/download/direct/0656c5cf-51b4-4fa4-ae48-8ee5ed3d142e/lm.zip
31.14.70.245
http://www.sajatypeworks.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://callosallsaospz.shop/api5
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
unknown
https://nuget.org/nuget.exe
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://callosallsaospz.shop/api-
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
https://callosallsaospz.shop/api1
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://rentry.co
unknown
http://www.oberhumer.com
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
https://wns.windows.com/L
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://word.office.com
unknown
https://callosallsaospz.shop/d3
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://store4.gofile.io
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://go.micro
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
https://contoso.com/Icon
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://schemas.micr
unknown
https://www.ecosia.org/newtab/
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://github.com/Pester/Pester
unknown
http://www.carterandcone.coml
unknown
https://callosallsaospz.shop:443/api
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://android.notify.windows.com/iOS
unknown
https://store4.gofile.io/download/direct/6b24ec97-2a8d-468d-a24d-c8081cda1dab/vm.zip
31.14.70.245
https://support.microsof
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
unknown
https://outlook.com_
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
unknown
https://callosallsaospz.shop/
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
http://html4/loose.dtd
unknown
https://callosallsaospz.shop/api
188.114.97.3
http://www.fontbureau.com/designersG
unknown
http://schemas.mi
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://callosallsaospz.shop/apidows
unknown
http://www.fontbureau.com/designers?
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
funrecipebooks.com
162.0.235.84
malicious
rentry.co
104.26.2.16
malicious
mzxn.ru
186.145.236.93
malicious
liernessfornicsa.shop
172.67.213.85
malicious
mussangroup.com
185.149.100.242
malicious
callosallsaospz.shop
188.114.97.3
malicious
store4.gofile.io
31.14.70.245

IPs

IP
Domain
Country
Malicious
77.221.157.163
unknown
Russian Federation
malicious
107.173.160.139
unknown
United States
malicious
107.173.160.137
unknown
United States
malicious
172.67.213.85
liernessfornicsa.shop
United States
malicious
162.0.235.84
funrecipebooks.com
Canada
malicious
109.172.114.212
unknown
Russian Federation
malicious
64.190.113.113
unknown
United States
malicious
94.156.79.190
unknown
Bulgaria
malicious
186.145.236.93
mzxn.ru
Colombia
malicious
188.114.97.3
callosallsaospz.shop
European Union
malicious
104.26.2.16
rentry.co
United States
malicious
167.235.128.153
unknown
United States
malicious
193.222.96.24
unknown
Germany
malicious
154.144.253.197
unknown
Morocco
malicious
185.149.100.242
mussangroup.com
Turkey
malicious
31.14.70.245
store4.gofile.io
Virgin Islands (BRITISH)
There are 6 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Update#5685_8yUscnjrUY
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000A0252
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000070262
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000602A6
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000008008E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{9E04CAB2-CC14-11DF-BB8C-A2F1DED72085}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{FA99DFC7-6AC2-453A-A5E2-5E2AFF4507BD}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CAA59E3C-4792-41A5-9909-6A6A8D32490E}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{A3D53349-6E61-4557-8FC7-0028EDCEEBF6}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F2A1CB5A-E3CC-4A2E-AF9D-505A7009D442}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{BCB48336-4DDD-48FF-BB0B-D3190DACB3E2}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
VBSFile
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@C:\Windows\System32\wshext.dll,-4511
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\JFpevcg.rkr
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithList
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithList
MRUList
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030266
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\8RP7.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
b
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030426
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000070422
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000001C0070
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Trgfgnegrq_8jrxlo3q8oojr!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.JvaqbjfSrrqonpxUho_8jrxlo3q8oojr!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.JvaqbjfZncf_8jrxlo3q8oojr!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Crbcyr_8jrxlo3q8oojr!k4p7n3o7ql2188l46q4ln362l19np5n5805r5k
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.ZvpebfbsgFgvpxlAbgrf_8jrxlo3q8oojr!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\FavccvatGbby.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.JvaqbjfPnyphyngbe_8jrxlo3q8oojr!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\zfcnvag.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.PybhqRkcrevraprUbfg_pj5a1u2gklrjl!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.FuryyRkcrevraprUbfg_pj5a1u2gklrjl!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
ZFRqtr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.PbagebyCnary
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Frnepu_pj5a1u2gklrjl!PbegnanHV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Puebzr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
jvaqbjf.vzzrefvirpbagebycnary_pj5a1u2gklrjl!zvpebfbsg.jvaqbjf.vzzrefvirpbagebycnary
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
308046O0NS4N39PO
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{6Q809377-6NS0-444O-8957-N3773S02200R}\Nqbor\Npebong QP\Npebong\Npebong.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\BcraJvgu.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.FgnegZrahRkcrevraprUbfg_pj5a1u2gklrjl!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\pzq.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\Qrfxgbc\BssvprFrghc.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{6Q809377-6NS0-444O-8957-N3773S02200R}\Pbzzba Svyrf\zvpebfbsg funerq\PyvpxGbEha\BssvprPyvpxGbEha.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{6Q809377-6NS0-444O-8957-N3773S02200R}\Pbzzba Svyrf\zvpebfbsg funerq\PyvpxGbEha\BssvprP2EPyvrag.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Bssvpr.RKPRY.RKR.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
R:\Frghc.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
R:\Bssvpr\Frghc32.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
\\192.168.2.1\nyy\bssvprqrcyblzraggbby_16731-20290.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
\\192.168.2.1\nyy\bssvpr2016ibyhzryvprafrcnpx_4324-1002_ra-hf_k86.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{Q65231O0-O2S1-4857-N4PR-N8R7P6RN7Q27}\pfpevcg.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.FrpUrnyguHV_pj5a1u2gklrjl!FrpUrnyguHV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{6Q809377-6NS0-444O-8957-N3773S02200R}\7-Mvc\7mSZ.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\abgrcnq.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\NhgbVg3\NhgbVg3.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.TrgUryc_8jrxlo3q8oojr!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.KobkTnzvatBireynl_8jrxlo3q8oojr!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{Q65231O0-O2S1-4857-N4PR-N8R7P6RN7Q27}\JvaqbjfCbjreFuryy\i1.0\cbjrefuryy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
\\192.168.2.1\nyy\cngputhneq-qvfnoyre-nyy-irefvbaf.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
{0139Q44R-6NSR-49S2-8690-3QNSPNR6SSO8}\Npprffbevrf\Favccvat Gbby.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
{0139Q44R-6NSR-49S2-8690-3QNSPNR6SSO8}\Npprffbevrf\Cnvag.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
{N77S5Q77-2R2O-44P3-N6N2-NON601054N51}\Flfgrz Gbbyf\Pbageby Cnary.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
P:\Hfref\Choyvp\Qrfxgbc\Tbbtyr Puebzr.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
P:\Hfref\Choyvp\Qrfxgbc\Sversbk.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
P:\Hfref\Choyvp\Qrfxgbc\Nqbor Npebong.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
{9R3995NO-1S9P-4S13-O827-48O24O6P7174}\GnfxOne\Svyr Rkcybere.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
{0139Q44R-6NSR-49S2-8690-3QNSPNR6SSO8}\Rkpry.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
P:\Hfref\wbarf\Qrfxgbc\Rkpry 2016.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
P:\Hfref\wbarf\Qrfxgbc\Rkpry.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
{N77S5Q77-2R2O-44P3-N6N2-NON601054N51}\Flfgrz Gbbyf\Pbzznaq Cebzcg.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\8RP7.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\8RP7.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\8RP7.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\8RP7.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2D42_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 341 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF71C180000
unkown
page readonly
malicious
1D1000
unclassified section
page read and write
malicious
7FF71C180000
unkown
page readonly
malicious
1A0000
direct allocation
page read and write
malicious
4E1000
unclassified section
page read and write
malicious
4E40000
trusted library section
page read and write
malicious
4E30000
trusted library section
page read and write
malicious
1E0000
direct allocation
page read and write
malicious
3BCC3FE000
stack
page read and write
1B9B8950000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
3010000
unkown
page read and write
534000
heap
page read and write
9C80000
unkown
page read and write
4F20000
trusted library allocation
page read and write
607D000
stack
page read and write
31A0000
heap
page read and write
54D5000
trusted library allocation
page read and write
53F000
heap
page read and write
54B0000
trusted library allocation
page read and write
E87DB7B000
stack
page read and write
C00024E000
direct allocation
page read and write
60000
direct allocation
page read and write
150000
heap
page read and write
322A000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
66F000
heap
page read and write
320E000
trusted library allocation
page read and write
130000
heap
page read and write
54F3000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BC12000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
965C000
stack
page read and write
7FAEEFE000
stack
page read and write
7DA0000
unkown
page read and write
3010000
unkown
page read and write
7FF5ED295000
unkown
page readonly
7DB0000
unkown
page read and write
3572000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
3010000
unkown
page read and write
2B4D000
trusted library allocation
page read and write
14CA4730000
heap
page read and write
340C000
heap
page read and write
E7000
trusted library allocation
page execute and read and write
FB000
trusted library allocation
page execute and read and write
4F8E000
stack
page read and write
1A27FE000
stack
page read and write
17A3DFB0000
heap
page read and write
55F1000
heap
page read and write
7FF5ED942000
unkown
page readonly
7FF71C15E000
unkown
page write copy
7FFD9BA60000
trusted library allocation
page execute and read and write
7FF5ED714000
unkown
page readonly
4EA6000
trusted library allocation
page read and write
2AB5000
trusted library allocation
page read and write
1B9B8930000
trusted library allocation
page read and write
9560000
unkown
page read and write
C000152000
direct allocation
page read and write
3400000
unkown
page read and write
1E0003B2000
unkown
page readonly
54CD000
trusted library allocation
page read and write
2ABA000
trusted library allocation
page read and write
7FAFFCD000
stack
page read and write
322A000
trusted library allocation
page read and write
B3000
trusted library allocation
page execute and read and write
978E000
unkown
page read and write
2B8F000
trusted library allocation
page read and write
6C90B000
unkown
page read and write
322A000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
54F3000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
7FF5ED2A9000
unkown
page readonly
818E000
stack
page read and write
3010000
unkown
page read and write
7DA0000
unkown
page read and write
B150000
unkown
page read and write
514000
heap
page read and write
3BCB7F5000
stack
page read and write
5502000
trusted library allocation
page read and write
8720000
unkown
page readonly
3107000
trusted library allocation
page read and write
3010000
unkown
page read and write
7FF71C0E1000
unkown
page write copy
400000
unkown
page readonly
7DA0000
unkown
page read and write
14E000
stack
page read and write
3010000
unkown
page read and write
3129000
trusted library allocation
page read and write
9C000
stack
page read and write
7FFD9BB60000
trusted library allocation
page read and write
2A89000
trusted library allocation
page read and write
C000248000
direct allocation
page read and write
5524000
trusted library allocation
page read and write
534000
heap
page read and write
1B9B8F61000
trusted library allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
10C0000
unkown
page readonly
6000000
trusted library allocation
page read and write
1B9C8FCB000
trusted library allocation
page read and write
29C8000
trusted library allocation
page read and write
C84D000
unkown
page read and write
4FD0000
trusted library allocation
page read and write
87C0000
unkown
page read and write
33ED000
heap
page read and write
2A96000
trusted library allocation
page read and write
7FF5ED74A000
unkown
page readonly
54AA000
trusted library allocation
page read and write
2AA3000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
1A2BFF000
stack
page read and write
5E3E000
stack
page read and write
1F556FF000
unkown
page read and write
15F3A555000
heap
page read and write
340C000
heap
page read and write
7DA0000
unkown
page read and write
4EB5000
trusted library allocation
page read and write
312C000
trusted library allocation
page read and write
33DA000
heap
page read and write
322A000
trusted library allocation
page read and write
4CC0000
unkown
page read and write
4C60000
unkown
page read and write
1B9D15A0000
heap
page read and write
3901000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
15F3BFE0000
heap
page execute and read and write
3BCE7FE000
stack
page read and write
1E0026D4000
trusted library allocation
page read and write
7FFD9BA46000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page execute and read and write
3400000
unkown
page read and write
3030000
unkown
page read and write
23AF000
stack
page read and write
7DA0000
unkown
page read and write
401000
unkown
page execute and write copy
3107000
trusted library allocation
page read and write
ED198F9000
stack
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
5505000
trusted library allocation
page read and write
21AE000
stack
page read and write
216F000
stack
page read and write
53F000
heap
page read and write
3BCBBFE000
stack
page read and write
7FF71C162000
unkown
page read and write
316F000
trusted library allocation
page read and write
29B4000
trusted library allocation
page read and write
9F9B000
stack
page read and write
7FFD9BC20000
trusted library allocation
page read and write
A433000
unkown
page read and write
C50A000
unkown
page read and write
7DA0000
unkown
page read and write
56A0000
heap
page read and write
2B73000
trusted library allocation
page read and write
1E0006F0000
trusted library allocation
page read and write
61D000
trusted library allocation
page execute and read and write
7FAFF4E000
stack
page read and write
B3000
trusted library allocation
page execute and read and write
54A5000
trusted library allocation
page read and write
C00000A000
direct allocation
page read and write
7DA0000
unkown
page read and write
7DA0000
unkown
page read and write
29CA000
trusted library allocation
page read and write
9F1E000
stack
page read and write
7FF5ED9BE000
unkown
page readonly
184DB7C0000
heap
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
7E70000
unkown
page read and write
A4AB000
unkown
page read and write
54AF000
trusted library allocation
page read and write
14CA465A000
heap
page read and write
18AD6FF000
unkown
page read and write
7DC0000
unkown
page read and write
C0000
trusted library allocation
page read and write
987D000
unkown
page read and write
3173000
trusted library allocation
page read and write
3010000
unkown
page read and write
9B20000
unkown
page read and write
7DC0000
unkown
page read and write
5CF0000
trusted library allocation
page read and write
1FBFFEF0000
direct allocation
page read and write
2A62000
trusted library allocation
page read and write
184D9CC0000
heap
page read and write
7FE08000
trusted library allocation
page execute and read and write
33D7000
heap
page read and write
6000000
trusted library allocation
page read and write
3A2F000
stack
page read and write
1E002064000
trusted library section
page readonly
7FFD9BB30000
trusted library allocation
page read and write
1E0021C3000
heap
page read and write
3139000
trusted library allocation
page read and write
54B5000
trusted library allocation
page read and write
55F8000
heap
page read and write
7DF4F3030000
unkown
page readonly
2A43000
trusted library allocation
page read and write
1370000
unkown
page read and write
7DC0000
unkown
page read and write
7FF5ED519000
unkown
page readonly
54E000
heap
page read and write
C00016E000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
5D7000
heap
page read and write
54C4000
trusted library allocation
page read and write
17A3DECC000
heap
page read and write
3010000
unkown
page read and write
3121000
trusted library allocation
page read and write
B8B0000
unkown
page read and write
322A000
trusted library allocation
page read and write
440000
heap
page read and write
7FF5ED9CC000
unkown
page readonly
3010000
unkown
page read and write
33F2000
heap
page read and write
7DA0000
unkown
page read and write
7DA0000
unkown
page read and write
7FF6416E2000
unkown
page write copy
7CA0000
unkown
page read and write
315C000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
390A000
trusted library allocation
page read and write
2BAD000
trusted library allocation
page read and write
1B9BA954000
trusted library allocation
page read and write
1B9B8F10000
heap
page execute and read and write
610000
trusted library allocation
page read and write
5D01000
heap
page read and write
54D5000
trusted library allocation
page read and write
785D000
unkown
page read and write
4CE0000
unkown
page read and write
CB60000
unkown
page read and write
534000
heap
page read and write
C000020000
direct allocation
page read and write
405000
unkown
page execute and read and write
2BC4000
trusted library allocation
page read and write
C41F000
stack
page read and write
55A1000
heap
page read and write
3010000
unkown
page read and write
4E80000
trusted library allocation
page read and write
29D5000
trusted library allocation
page read and write
3179000
trusted library allocation
page read and write
7FF5ED77C000
unkown
page readonly
3157000
trusted library allocation
page read and write
7FF5ED97A000
unkown
page readonly
7DA0000
unkown
page read and write
3400000
heap
page read and write
2AAC000
trusted library allocation
page read and write
8108000
stack
page read and write
3140000
trusted library allocation
page read and write
29ED000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
5F0000
heap
page read and write
977A000
unkown
page read and write
7FF5ED5A8000
unkown
page readonly
3010000
unkown
page read and write
3400000
unkown
page read and write
1FBFFC26000
direct allocation
page read and write
33FE000
heap
page read and write
7DA0000
unkown
page read and write
5511000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
29C0000
trusted library allocation
page read and write
316B000
trusted library allocation
page read and write
29BF000
stack
page read and write
573F000
stack
page read and write
3218000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
7FF71C7B7000
unkown
page write copy
7FFD9B9EC000
trusted library allocation
page execute and read and write
9550000
unkown
page readonly
1E01C1EA000
heap
page read and write
14CA4750000
heap
page read and write
3700000
unkown
page read and write
7DB0000
unkown
page read and write
7DA0000
unkown
page read and write
7DA0000
unkown
page read and write
3010000
unkown
page read and write
7FF71C7AE000
unkown
page read and write
7DB0000
unkown
page read and write
37AE000
unkown
page read and write
54E000
heap
page read and write
7DA0000
unkown
page read and write
2A95000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
534000
heap
page read and write
3020000
unkown
page read and write
316B000
trusted library allocation
page read and write
7FF5ED821000
unkown
page readonly
14B0000
unkown
page readonly
54F4000
trusted library allocation
page read and write
C000022000
direct allocation
page read and write
7DA0000
unkown
page read and write
3400000
unkown
page read and write
7FFD9BB40000
trusted library allocation
page read and write
BD1D000
stack
page read and write
7DB0000
unkown
page read and write
4F10000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
3330000
heap
page read and write
587E000
stack
page read and write
55FE000
heap
page read and write
15F56080000
heap
page read and write
3460000
unkown
page read and write
7DA0000
unkown
page read and write
54C6000
trusted library allocation
page read and write
7FF71C17E000
unkown
page write copy
3010000
unkown
page read and write
3BCDFFE000
stack
page read and write
4F10000
trusted library allocation
page read and write
56C3000
unkown
page read and write
1350000
unkown
page readonly
2B97000
trusted library allocation
page read and write
200179F8000
heap
page read and write
C563000
unkown
page read and write
7FFD9BC90000
trusted library allocation
page read and write
540000
heap
page read and write
33EE000
heap
page read and write
410000
heap
page read and write
3010000
unkown
page read and write
29A6000
trusted library allocation
page read and write
4A9E000
stack
page read and write
3BD158E000
stack
page read and write
7DA0000
unkown
page read and write
5505000
trusted library allocation
page read and write
7FF71C178000
unkown
page write copy
2A32000
trusted library allocation
page read and write
F8DD000
unkown
page read and write
87C0000
unkown
page read and write
7DA0000
unkown
page read and write
89E0000
unkown
page read and write
3103000
trusted library allocation
page read and write
A0000
trusted library allocation
page read and write
2B76000
trusted library allocation
page read and write
7FF71C15D000
unkown
page read and write
1E000740000
heap
page read and write
3010000
unkown
page read and write
C000372000
direct allocation
page read and write
311A000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
1370000
unkown
page read and write
2E49F8D4000
heap
page read and write
2A6A000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
87C0000
unkown
page read and write
97AD000
unkown
page read and write
405000
unkown
page readonly
4E9E000
trusted library allocation
page read and write
33F6000
heap
page read and write
3010000
unkown
page read and write
98A8000
unkown
page read and write
5FF0000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
3020000
unkown
page read and write
33EA000
heap
page read and write
7DA0000
unkown
page read and write
1E0006D0000
trusted library allocation
page read and write
1E0026B8000
trusted library allocation
page read and write
29C5000
trusted library allocation
page read and write
53F000
heap
page read and write
7DA0000
unkown
page read and write
316E000
trusted library allocation
page read and write
54B5000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
3010000
unkown
page read and write
9C80000
unkown
page read and write
87C0000
unkown
page read and write
2A0D000
trusted library allocation
page read and write
2B3F000
trusted library allocation
page read and write
7FF71C0DC000
unkown
page read and write
7950000
unkown
page read and write
C88B000
unkown
page read and write
3451000
unkown
page read and write
95DC000
stack
page read and write
1E0004CE000
heap
page read and write
30FA000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
54CD000
trusted library allocation
page read and write
3010000
unkown
page read and write
2E49F8DC000
heap
page read and write
33F4000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
2B78000
trusted library allocation
page read and write
6C90C000
unkown
page write copy
7FFD9BA56000
trusted library allocation
page read and write
313C000
trusted library allocation
page read and write
6C8F8000
unkown
page readonly
2A548710000
heap
page read and write
3400000
unkown
page read and write
7FAF4FB000
stack
page read and write
3107000
trusted library allocation
page read and write
2A11000
trusted library allocation
page read and write
7FF71C0D4000
unkown
page write copy
20017A57000
heap
page read and write
7FDF0000
trusted library allocation
page execute and read and write
1370000
unkown
page read and write
31A0000
trusted library allocation
page read and write
53F000
heap
page read and write
7FF5ED670000
unkown
page readonly
9B20000
unkown
page read and write
2A92000
trusted library allocation
page read and write
15F3A5F0000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
1E0025A8000
trusted library allocation
page read and write
1E002628000
trusted library allocation
page read and write
3580000
unkown
page readonly
54E000
heap
page read and write
4F16000
trusted library allocation
page read and write
299B000
trusted library allocation
page read and write
3010000
unkown
page read and write
7DC0000
unkown
page read and write
33D3000
heap
page read and write
3BCDBFE000
stack
page read and write
54C4000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
3229000
trusted library allocation
page read and write
365F000
stack
page read and write
C0003C2000
direct allocation
page read and write
2A44000
trusted library allocation
page read and write
7857000
unkown
page read and write
1B9B8D00000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
3188000
trusted library allocation
page read and write
2E4A1111000
heap
page read and write
7DA0000
unkown
page read and write
6020000
trusted library allocation
page read and write
1210000
unkown
page readonly
66F000
heap
page read and write
534000
heap
page read and write
53F000
heap
page read and write
3218000
trusted library allocation
page read and write
3010000
unkown
page read and write
C000126000
direct allocation
page read and write
310F000
trusted library allocation
page read and write
7FF5ED1D6000
unkown
page readonly
321A000
trusted library allocation
page read and write
6C90B000
unkown
page read and write
3010000
unkown
page read and write
3422000
trusted library allocation
page read and write
785F000
unkown
page read and write
54E4000
trusted library allocation
page read and write
7FF5ED7E9000
unkown
page readonly
A9F000
stack
page read and write
3905000
trusted library allocation
page read and write
3800000
unkown
page readonly
2AE8000
trusted library allocation
page read and write
3010000
unkown
page read and write
13A0000
unkown
page read and write
3137000
trusted library allocation
page read and write
54E000
heap
page read and write
1370000
unkown
page read and write
9590000
unkown
page read and write
1FBFFD0A000
direct allocation
page read and write
1B9BA7A6000
trusted library allocation
page read and write
33FA000
heap
page read and write
3010000
unkown
page read and write
7FF5ED433000
unkown
page readonly
2B38000
trusted library allocation
page read and write
55F2000
heap
page read and write
7DC0000
unkown
page read and write
7FF5EDA47000
unkown
page readonly
54BA000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
66F000
heap
page read and write
C00004B000
direct allocation
page read and write
54AF000
trusted library allocation
page read and write
9ADE000
stack
page read and write
7FFD9BD03000
trusted library allocation
page read and write
29B7000
trusted library allocation
page read and write
1FBFEF40000
heap
page read and write
1370000
unkown
page read and write
33FE000
heap
page read and write
6C89B000
unkown
page read and write
3010000
unkown
page read and write
54D5000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
55F2000
heap
page read and write
2A9B000
trusted library allocation
page read and write
1380000
unkown
page read and write
C544000
unkown
page read and write
3206000
trusted library allocation
page read and write
C000096000
direct allocation
page read and write
4F10000
trusted library allocation
page read and write
2A17000
trusted library allocation
page read and write
420000
heap
page read and write
14CA48C4000
heap
page read and write
7FF5ED426000
unkown
page readonly
1FBFF130000
heap
page read and write
53F000
heap
page read and write
54BC000
trusted library allocation
page read and write
4CB0000
unkown
page read and write
1E000490000
heap
page read and write
7FAF57B000
stack
page read and write
7DA0000
unkown
page read and write
53F000
heap
page read and write
A50B000
unkown
page read and write
7FF5ED755000
unkown
page readonly
335E000
heap
page read and write
3206000
trusted library allocation
page read and write
7FF5EDA53000
unkown
page readonly
A379000
unkown
page read and write
3400000
unkown
page read and write
C6C1000
unkown
page read and write
7DA0000
unkown
page read and write
2A77000
trusted library allocation
page read and write
29B8000
trusted library allocation
page read and write
7FF6415F0000
unkown
page readonly
2A01000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
3BD298B000
stack
page read and write
3460000
unkown
page read and write
3402000
heap
page read and write
C000142000
direct allocation
page read and write
FA40000
heap
page read and write
C5A0000
unkown
page read and write
15F54A70000
heap
page execute and read and write
7FF6415F0000
unkown
page readonly
7FF5ED3CE000
unkown
page readonly
2241000
heap
page read and write
7FF5ED803000
unkown
page readonly
3BCF3FE000
stack
page read and write
7FFD9BE00000
trusted library allocation
page read and write
3121000
trusted library allocation
page read and write
1E012291000
trusted library allocation
page read and write
404000
unkown
page execute and write copy
3128000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
C6C9000
unkown
page read and write
C00018A000
direct allocation
page read and write
C962000
unkown
page read and write
534000
heap
page read and write
299D000
trusted library allocation
page read and write
54E000
heap
page read and write
7FFD9BD00000
trusted library allocation
page read and write
87C0000
unkown
page read and write
2A48000
trusted library allocation
page read and write
66F000
heap
page read and write
3174000
trusted library allocation
page read and write
1FBFFD19000
direct allocation
page read and write
7FF5ED471000
unkown
page readonly
37CE000
stack
page read and write
C811000
unkown
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
3010000
unkown
page read and write
54D6000
trusted library allocation
page read and write
7FF5ED7DB000
unkown
page readonly
7FF5ED556000
unkown
page readonly
7FF5ED80C000
unkown
page readonly
402000
unkown
page readonly
54E3000
trusted library allocation
page read and write
53F000
heap
page read and write
2A64000
trusted library allocation
page read and write
7FAF179000
stack
page read and write
7FFD9B9AB000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
1370000
unkown
page read and write
1370000
unkown
page read and write
31A5000
heap
page read and write
9D64000
unkown
page read and write
2B14000
trusted library allocation
page read and write
2B81000
trusted library allocation
page read and write
3400000
unkown
page read and write
7D53000
unkown
page read and write
4F10000
remote allocation
page read and write
15F3A6B0000
trusted library section
page readonly
3010000
unkown
page read and write
5DDF000
stack
page read and write
321A000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
5716000
heap
page read and write
5503000
trusted library allocation
page read and write
5D00000
heap
page read and write
33CF000
heap
page read and write
534000
heap
page read and write
6C8F8000
unkown
page readonly
30F5000
trusted library allocation
page read and write
2B87000
trusted library allocation
page read and write
2A4E000
trusted library allocation
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
87C0000
unkown
page read and write
3460000
unkown
page read and write
3218000
trusted library allocation
page read and write
6C8AE000
unkown
page read and write
3400000
unkown
page read and write
7DC0000
unkown
page read and write
787C000
unkown
page read and write
1480000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
6020000
direct allocation
page execute and read and write
49E000
heap
page read and write
3010000
unkown
page read and write
2B35000
trusted library allocation
page read and write
3010000
unkown
page read and write
15F3A785000
heap
page read and write
28E0000
trusted library allocation
page execute and read and write
7DC0000
unkown
page read and write
54BC000
trusted library allocation
page read and write
2C40000
remote allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
7FF5EDA38000
unkown
page readonly
13A0000
unkown
page read and write
7DA0000
unkown
page read and write
2B66000
trusted library allocation
page read and write
1B9B70F0000
heap
page read and write
3010000
unkown
page read and write
2A42000
trusted library allocation
page read and write
C51E000
unkown
page read and write
87C0000
unkown
page read and write
7DC0000
unkown
page read and write
B4000
trusted library allocation
page read and write
7D40000
unkown
page read and write
3130000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
53F000
heap
page read and write
8860000
unkown
page read and write
4FE0000
heap
page execute and read and write
2BA3000
trusted library allocation
page read and write
54E9000
trusted library allocation
page read and write
6C91E000
unkown
page read and write
C89C000
unkown
page read and write
1B9B6F12000
heap
page read and write
C0003D0000
direct allocation
page read and write
1505000
heap
page read and write
321E000
trusted library allocation
page read and write
7FF5ED9D2000
unkown
page readonly
315A000
trusted library allocation
page read and write
37A0000
unkown
page read and write
A361000
unkown
page read and write
1B9D1317000
heap
page read and write
F8D1000
unkown
page read and write
1E01DC10000
heap
page read and write
7DA0000
unkown
page read and write
2E4A1315000
heap
page read and write
3400000
heap
page read and write
7FF71C0D5000
unkown
page write copy
30EF000
stack
page read and write
15F3A4F9000
heap
page read and write
7DA0000
unkown
page read and write
3BD258C000
stack
page read and write
36F0000
unkown
page readonly
7FF71C0DB000
unkown
page write copy
2B01000
trusted library allocation
page read and write
54E000
heap
page read and write
3218000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
697000
heap
page read and write
15F56082000
heap
page read and write
1370000
unkown
page read and write
3010000
unkown
page read and write
7FF6415F0000
unkown
page readonly
1B9B9DF3000
trusted library allocation
page read and write
6C8C1000
unkown
page execute read
54E000
heap
page read and write
9873000
unkown
page read and write
3112000
trusted library allocation
page read and write
71F000
heap
page read and write
7DC0000
unkown
page read and write
2A5487D5000
heap
page read and write
2AB7000
trusted library allocation
page read and write
7FF5ED3EA000
unkown
page readonly
7DC0000
unkown
page read and write
1B9B9A79000
trusted library allocation
page read and write
B4D0000
unkown
page read and write
352F000
stack
page read and write
2B32000
trusted library allocation
page read and write
54D1000
trusted library allocation
page read and write
2BA5000
trusted library allocation
page read and write
987F000
unkown
page read and write
C0000CE000
direct allocation
page read and write
1A1FFE000
stack
page read and write
2AED000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
54EB000
trusted library allocation
page read and write
1370000
unkown
page read and write
5504000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
54EF000
trusted library allocation
page read and write
5C9000
trusted library allocation
page execute and read and write
7FF5ED505000
unkown
page readonly
2856000
trusted library allocation
page execute and read and write
20017C60000
heap
page read and write
D0000
heap
page read and write
1B9D1066000
heap
page read and write
59E000
stack
page read and write
54AF000
trusted library allocation
page read and write
53F000
heap
page read and write
7DA0000
unkown
page read and write
3400000
unkown
page read and write
55A1000
trusted library allocation
page read and write
7FF5ED3A7000
unkown
page readonly
54C4000
trusted library allocation
page read and write
1380000
unkown
page read and write
3319000
stack
page read and write
15F3BFD5000
heap
page read and write
2AFA000
trusted library allocation
page read and write
7FF64167D000
unkown
page readonly
7FF71C175000
unkown
page read and write
3F0D000
stack
page read and write
28AC000
stack
page read and write
314A000
trusted library allocation
page read and write
90000
trusted library section
page read and write
6C89C000
unkown
page write copy
7FF5D1CD4000
unkown
page readonly
1E0025BF000
trusted library allocation
page read and write
312F000
trusted library allocation
page read and write
6CA000
heap
page read and write
1370000
unkown
page read and write
3010000
unkown
page read and write
3010000
unkown
page read and write
400000
unkown
page readonly
54B5000
trusted library allocation
page read and write
54FF000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
5F3D000
stack
page read and write
279E000
unclassified section
page readonly
340C000
heap
page read and write
7FF5ECED2000
unkown
page readonly
5FE0000
trusted library allocation
page read and write
7FF6415F1000
unkown
page execute read
54AE000
trusted library allocation
page read and write
54E000
heap
page read and write
534000
heap
page read and write
53F000
heap
page read and write
3212000
trusted library allocation
page read and write
514000
heap
page read and write
3400000
unkown
page read and write
90819FF000
stack
page read and write
B4000
trusted library allocation
page read and write
1B9D106B000
heap
page read and write
30F8000
trusted library allocation
page read and write
4F27000
trusted library allocation
page read and write
2BAE000
trusted library allocation
page read and write
1FBFFCAA000
direct allocation
page read and write
7FF4B80F0000
trusted library allocation
page execute and read and write
534000
heap
page read and write
79FB000
unkown
page read and write
8EC6000
unkown
page read and write
7FF5ED986000
unkown
page readonly
7FFD9BCE0000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
2B17000
trusted library allocation
page read and write
7FFD9BD29000
trusted library allocation
page read and write
3010000
unkown
page read and write
7FF5ED9F2000
unkown
page readonly
90809FD000
stack
page read and write
320B000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
33F6000
heap
page read and write
7DA0000
unkown
page read and write
2A1D000
trusted library allocation
page read and write
1E01C1ED000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
87C0000
unkown
page read and write
2B1D000
trusted library allocation
page read and write
335E000
heap
page read and write
7FF5ED9A1000
unkown
page readonly
1E000705000
heap
page read and write
1FBFFE50000
direct allocation
page read and write
1FBFFC05000
direct allocation
page read and write
27B1000
unclassified section
page readonly
1370000
unkown
page read and write
4F00000
trusted library allocation
page read and write
5502000
trusted library allocation
page read and write
3188000
trusted library allocation
page read and write
2A548780000
heap
page read and write
7DC0000
unkown
page read and write
3010000
unkown
page read and write
FA4A000
heap
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
54BA000
trusted library allocation
page read and write
87BB000
stack
page read and write
322A000
trusted library allocation
page read and write
3BCEFFB000
stack
page read and write
2B77000
trusted library allocation
page read and write
2B11000
trusted library allocation
page read and write
3010000
unkown
page read and write
3234000
trusted library allocation
page read and write
7FF5ED586000
unkown
page readonly
7DF4C2060000
trusted library allocation
page execute and read and write
15F3A665000
heap
page read and write
1436000
stack
page read and write
13A0000
unkown
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
14CA4630000
heap
page read and write
1B9D13AF000
heap
page read and write
1B9BA797000
trusted library allocation
page read and write
7E70000
unkown
page read and write
3117000
trusted library allocation
page read and write
3758000
unkown
page read and write
7FF6416E2000
unkown
page read and write
CA7C000
unkown
page read and write
8740000
unkown
page read and write
1370000
unkown
page read and write
7FF5ED4E8000
unkown
page readonly
7DA0000
unkown
page read and write
7DA0000
unkown
page read and write
784A000
unkown
page read and write
3010000
unkown
page read and write
2ACC000
trusted library allocation
page read and write
87C0000
unkown
page read and write
7FF71C0E2000
unkown
page read and write
29F6000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
29E5000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
63E000
heap
page read and write
3020000
unkown
page read and write
7DC0000
unkown
page read and write
9B20000
unkown
page read and write
7FF5ED337000
unkown
page readonly
3400000
unkown
page read and write
7FF5ED85F000
unkown
page readonly
3218000
trusted library allocation
page read and write
3010000
unkown
page read and write
534000
heap
page read and write
3179000
trusted library allocation
page read and write
3010000
unkown
page read and write
1F0000
unclassified section
page read and write
3400000
heap
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
2A14000
trusted library allocation
page read and write
7FFD9BB72000
trusted library allocation
page read and write
2728000
stack
page read and write
7DA0000
unkown
page read and write
88EE000
stack
page read and write
33E7000
heap
page read and write
3158000
trusted library allocation
page read and write
2AD1000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1B9D10AB000
heap
page read and write
3020000
unkown
page read and write
2BA8000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7FF5ED8F9000
unkown
page readonly
2A23000
trusted library allocation
page read and write
54E000
heap
page read and write
54E000
heap
page read and write
1B9C8F91000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
F8EC000
unkown
page read and write
716000
heap
page read and write
1370000
unkown
page read and write
54D9000
trusted library allocation
page read and write
15F3A58D000
heap
page read and write
3243000
trusted library allocation
page read and write
A4A1000
unkown
page read and write
4FCE000
stack
page read and write
534000
heap
page read and write
2B92000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
7FF5ED76D000
unkown
page readonly
923E000
stack
page read and write
33E8000
heap
page read and write
321E000
trusted library allocation
page read and write
681000
heap
page read and write
521000
heap
page read and write
3219000
trusted library allocation
page read and write
C00010A000
direct allocation
page read and write
7FF5ED71B000
unkown
page readonly
7DA0000
unkown
page read and write
2E49F8DD000
heap
page read and write
1B9BA745000
trusted library allocation
page read and write
1A23FE000
stack
page read and write
9B20000
unkown
page read and write
DD000
stack
page read and write
7FFD9BD38000
trusted library allocation
page read and write
55F2000
heap
page read and write
29D8000
trusted library allocation
page read and write
7FF5ED86B000
unkown
page readonly
7FF5ED4A1000
unkown
page readonly
4E80000
trusted library allocation
page read and write
7FF5ED695000
unkown
page readonly
53F000
heap
page read and write
3400000
unkown
page read and write
29A4000
trusted library allocation
page read and write
2A65000
trusted library allocation
page read and write
54E000
heap
page read and write
1E002080000
heap
page read and write
322A000
trusted library allocation
page read and write
54E4000
trusted library allocation
page read and write
1370000
unkown
page read and write
14E000
stack
page read and write
3320000
heap
page read and write
315C000
trusted library allocation
page read and write
534000
heap
page read and write
1370000
unkown
page read and write
1095000
stack
page read and write
3010000
unkown
page read and write
CA42000
unkown
page read and write
33FE000
heap
page read and write
2B5C000
trusted library allocation
page read and write
7FF5D1CCD000
unkown
page readonly
B10D000
stack
page read and write
2A33000
trusted library allocation
page read and write
54A8000
trusted library allocation
page read and write
54E000
heap
page read and write
7DC0000
unkown
page read and write
4F10000
remote allocation
page read and write
906E000
stack
page read and write
C0002E2000
direct allocation
page read and write
15F3A460000
heap
page read and write
7FF5ED77E000
unkown
page readonly
299A000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
87C0000
unkown
page read and write
6020000
trusted library allocation
page read and write
97B5000
unkown
page read and write
53F000
heap
page read and write
3400000
unkown
page read and write
C5A3000
unkown
page read and write
3240000
unkown
page read and write
3109000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
3010000
unkown
page read and write
1E01A960000
heap
page read and write
534000
heap
page read and write
7DA0000
unkown
page read and write
3142000
trusted library allocation
page read and write
2B3C000
trusted library allocation
page read and write
100000
heap
page read and write
2AB1000
trusted library allocation
page read and write
7FF71C71D000
unkown
page read and write
3010000
unkown
page read and write
29FD000
stack
page read and write
2A08000
trusted library allocation
page read and write
8DA0000
unkown
page read and write
7DA0000
unkown
page read and write
54A5000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
3215000
trusted library allocation
page read and write
2E4A1319000
heap
page read and write
7FF6415F0000
unkown
page readonly
3010000
unkown
page read and write
2B89000
trusted library allocation
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
2A13000
trusted library allocation
page read and write
C10A000
stack
page read and write
299F000
trusted library allocation
page read and write
A29E000
stack
page read and write
33E9000
heap
page read and write
1370000
unkown
page read and write
379E000
unkown
page read and write
2998000
trusted library allocation
page read and write
9B20000
unkown
page read and write
401000
unkown
page execute and read and write
A4AE000
unkown
page read and write
7FFD9BC40000
trusted library allocation
page read and write
313B000
trusted library allocation
page read and write
340C000
heap
page read and write
6010000
trusted library allocation
page read and write
15F3A660000
heap
page read and write
9560000
unkown
page read and write
2AFD000
stack
page read and write
71F000
heap
page read and write
534000
heap
page read and write
3590000
unkown
page read and write
C000052000
direct allocation
page read and write
54C5000
trusted library allocation
page read and write
8730000
unkown
page read and write
33EF000
heap
page read and write
2E49F8CE000
heap
page read and write
3400000
unkown
page read and write
7C90000
unkown
page read and write
7FFD9BC20000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7FF5ED71E000
unkown
page readonly
316E000
trusted library allocation
page read and write
54AC000
trusted library allocation
page read and write
47E000
stack
page read and write
20017A25000
heap
page read and write
7DA0000
unkown
page read and write
93BE000
stack
page read and write
54D5000
trusted library allocation
page read and write
2A18000
trusted library allocation
page read and write
54ED000
trusted library allocation
page read and write
3010000
unkown
page read and write
2860000
trusted library allocation
page read and write
1370000
unkown
page read and write
54C4000
trusted library allocation
page read and write
2BAA000
trusted library allocation
page read and write
33D3000
heap
page read and write
5A60000
heap
page read and write
3157000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
3107000
trusted library allocation
page read and write
3010000
unkown
page read and write
3400000
unkown
page read and write
1E0026AB000
trusted library allocation
page read and write
54DC000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7FF5ED39B000
unkown
page readonly
4E84000
trusted library allocation
page read and write
2B9F000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
3400000
heap
page read and write
5BA0000
trusted library allocation
page read and write
C00005B000
direct allocation
page read and write
5CF0000
trusted library allocation
page read and write
B728000
stack
page read and write
1451000
unkown
page readonly
534000
heap
page read and write
7FF6415F0000
unkown
page readonly
1B9BA7A0000
trusted library allocation
page read and write
29C2000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
2A06000
trusted library allocation
page read and write
7FF5ED6A5000
unkown
page readonly
7FF5ED93E000
unkown
page readonly
7FF5ED404000
unkown
page readonly
1B9C8F81000
trusted library allocation
page read and write
7DB0000
unkown
page read and write
4ED0000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
7FF5ED4B4000
unkown
page readonly
1B9B9FE8000
trusted library allocation
page read and write
9560000
unkown
page read and write
33E8000
heap
page read and write
2A68000
trusted library allocation
page read and write
528000
heap
page read and write
C4000
trusted library allocation
page read and write
31A7000
trusted library allocation
page read and write
254A000
stack
page read and write
54B5000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
534000
heap
page read and write
7FF5EDA69000
unkown
page readonly
2B1C000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
3010000
unkown
page read and write
9B20000
unkown
page read and write
7FFD9BC30000
trusted library allocation
page read and write
7FF5ED9E1000
unkown
page readonly
3400000
unkown
page read and write
7865000
unkown
page read and write
15F3A580000
heap
page read and write
3212000
trusted library allocation
page read and write
3010000
unkown
page read and write
7DF4F3051000
unkown
page execute read
7DC0000
unkown
page read and write
54AC000
trusted library allocation
page read and write
7FB010E000
stack
page read and write
3218000
trusted library allocation
page read and write
33EF000
heap
page read and write
7DA0000
unkown
page read and write
7DF4F3050000
unkown
page readonly
7953000
unkown
page read and write
C000150000
direct allocation
page read and write
3460000
unkown
page read and write
528000
heap
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
2B72000
trusted library allocation
page read and write
4FE0000
remote allocation
page read and write
1B9BA61B000
trusted library allocation
page read and write
13A0000
unkown
page read and write
90811FF000
stack
page read and write
C000303000
direct allocation
page read and write
87C0000
unkown
page read and write
9B20000
unkown
page read and write
15F3A6F0000
heap
page read and write
7FF5EDA2A000
unkown
page readonly
1B9B6F49000
heap
page read and write
C000038000
direct allocation
page read and write
4F30000
heap
page execute and read and write
80000
trusted library section
page read and write
3010000
unkown
page read and write
89A0000
unkown
page read and write
7DA0000
unkown
page read and write
54C5000
trusted library allocation
page read and write
A4B8000
unkown
page read and write
3400000
unkown
page read and write
7DA0000
unkown
page read and write
14CA465A000
heap
page read and write
7FF5ED915000
unkown
page readonly
54BC000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
4EC6000
trusted library allocation
page read and write
29D7000
trusted library allocation
page read and write
1E01D889000
heap
page read and write
37F6000
unkown
page read and write
315E000
trusted library allocation
page read and write
54E000
heap
page read and write
7DB0000
unkown
page read and write
7DC0000
unkown
page read and write
30F0000
trusted library allocation
page read and write
2B31000
trusted library allocation
page read and write
2B53000
trusted library allocation
page read and write
3010000
unkown
page read and write
2A56000
trusted library allocation
page read and write
1B9B8900000
trusted library section
page read and write
7FF5ED4DF000
unkown
page readonly
C5AA000
unkown
page read and write
7FF5ED4FD000
unkown
page readonly
15F548D0000
heap
page read and write
C0000FA000
direct allocation
page read and write
3112000
trusted library allocation
page read and write
1B9B6F08000
heap
page read and write
320A000
trusted library allocation
page read and write
7B80000
unkown
page read and write
2E49F870000
heap
page read and write
33E5000
heap
page read and write
3010000
unkown
page read and write
3010000
unkown
page read and write
54AC000
trusted library allocation
page read and write
3400000
unkown
page read and write
7DB0000
unkown
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
7FF64167D000
unkown
page readonly
87C0000
unkown
page read and write
310F000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
17A3E1B0000
heap
page read and write
54CE000
trusted library allocation
page read and write
BC9B000
stack
page read and write
2901000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
7FF71BC41000
unkown
page execute read
9C80000
unkown
page read and write
29BE000
trusted library allocation
page read and write
2901000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
54E000
heap
page read and write
1E0026B6000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
54B0000
trusted library allocation
page read and write
3234000
trusted library allocation
page read and write
1B9D1260000
heap
page read and write
2AE6000
trusted library allocation
page read and write
2A0A000
trusted library allocation
page read and write
3170000
heap
page read and write
C0003A4000
direct allocation
page read and write
3BCD7FE000
stack
page read and write
14CA4540000
heap
page read and write
3400000
unkown
page read and write
7FF5ED52F000
unkown
page readonly
C0002A8000
direct allocation
page read and write
20017BC0000
heap
page read and write
534000
heap
page read and write
2B55000
trusted library allocation
page read and write
54C3000
trusted library allocation
page read and write
6C90C000
unkown
page write copy
EB000
trusted library allocation
page execute and read and write
A3BE000
unkown
page read and write
C000128000
direct allocation
page read and write
570000
trusted library allocation
page execute and read and write
2E4A1230000
heap
page read and write
534000
heap
page read and write
1B9BA5F8000
trusted library allocation
page read and write
1370000
unkown
page read and write
33FC000
heap
page read and write
3118000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
1E01C1C5000
heap
page read and write
C6F2000
unkown
page read and write
3460000
unkown
page read and write
2A9F000
trusted library allocation
page read and write
7FF71BC40000
unkown
page readonly
6000000
trusted library allocation
page read and write
54E000
heap
page read and write
3163000
trusted library allocation
page read and write
9C000
stack
page read and write
B0000
trusted library allocation
page read and write
3188000
trusted library allocation
page read and write
4A9E000
stack
page read and write
1E01C21C000
heap
page read and write
27A1000
unclassified section
page write copy
2B96000
trusted library allocation
page read and write
3400000
heap
page read and write
54E000
heap
page read and write
7DA0000
unkown
page read and write
3400000
unkown
page read and write
314A000
trusted library allocation
page read and write
3010000
unkown
page read and write
3010000
unkown
page read and write
2ADB000
trusted library allocation
page read and write
2AD3000
trusted library allocation
page read and write
340D000
heap
page read and write
9B20000
unkown
page read and write
54C4000
trusted library allocation
page read and write
3010000
unkown
page read and write
1370000
unkown
page read and write
C0003B6000
direct allocation
page read and write
2120000
heap
page read and write
54C4000
trusted library allocation
page read and write
7FF5ED867000
unkown
page readonly
3BCB19F000
stack
page read and write
87C0000
unkown
page read and write
2A71000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7E11000
unkown
page read and write
A310000
unkown
page read and write
7FF6416E2000
unkown
page write copy
8740000
unkown
page read and write
534000
heap
page read and write
C000800000
direct allocation
page read and write
54EB000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
2870000
heap
page execute and read and write
511000
heap
page read and write
B4D0000
unkown
page read and write
C00028A000
direct allocation
page read and write
3010000
unkown
page read and write
54AA000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
1370000
unkown
page read and write
7FF5ED65C000
unkown
page readonly
322A000
trusted library allocation
page read and write
55E000
stack
page read and write
3010000
unkown
page read and write
1FBFFC23000
direct allocation
page read and write
7FF6415F0000
unkown
page readonly
54E000
heap
page read and write
2B15000
trusted library allocation
page read and write
5CC000
trusted library allocation
page execute and read and write
C000132000
direct allocation
page read and write
DE0000
unkown
page readonly
54CD000
trusted library allocation
page read and write
2B36000
trusted library allocation
page read and write
3010000
unkown
page read and write
54C5000
trusted library allocation
page read and write
33EB000
heap
page read and write
550000
direct allocation
page execute and read and write
322A000
trusted library allocation
page read and write
1E000460000
heap
page read and write
3117000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
34E2000
trusted library allocation
page read and write
7FF5EDA70000
unkown
page readonly
3010000
unkown
page read and write
3010000
unkown
page read and write
7DC0000
unkown
page read and write
3209000
stack
page read and write
2AC8000
trusted library allocation
page read and write
36CE000
stack
page read and write
C00001E000
direct allocation
page read and write
7DA0000
unkown
page read and write
625000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
5678000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
3219000
trusted library allocation
page read and write
7E70000
unkown
page read and write
79D3000
unkown
page read and write
943E000
stack
page read and write
3010000
unkown
page read and write
3010000
unkown
page read and write
1FBFFBD0000
direct allocation
page read and write
7DA0000
unkown
page read and write
7DA0000
unkown
page read and write
3010000
unkown
page read and write
3128000
trusted library allocation
page read and write
15E000
stack
page read and write
53F000
heap
page read and write
7867000
unkown
page read and write
312C000
trusted library allocation
page read and write
1B9B961B000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
400000
unkown
page readonly
1DE000
stack
page read and write
9798000
unkown
page read and write
87C0000
unkown
page read and write
3142000
trusted library allocation
page read and write
54D1000
trusted library allocation
page read and write
1B9BA18D000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
405000
unkown
page execute and read and write
7FF5ED3F3000
unkown
page readonly
3010000
unkown
page read and write
68A000
heap
page read and write
4B56000
unkown
page read and write
3403000
heap
page read and write
14CA465A000
heap
page read and write
534000
heap
page read and write
322A000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
7DB0000
unkown
page read and write
4EF0000
trusted library allocation
page read and write
87C0000
unkown
page read and write
7FF5ED7E0000
unkown
page readonly
2AC7000
trusted library allocation
page read and write
2B93000
trusted library allocation
page read and write
3152000
trusted library allocation
page read and write
4F25000
trusted library allocation
page read and write
1370000
unkown
page read and write
F644000
unkown
page read and write
7DA0000
unkown
page read and write
3FB1000
unclassified section
page write copy
C000064000
direct allocation
page read and write
54E000
heap
page read and write
7DA0000
unkown
page read and write
7DA0000
unkown
page read and write
3010000
unkown
page read and write
5590000
unkown
page write copy
5B9F000
stack
page read and write
9080BFF000
stack
page read and write
5520000
trusted library allocation
page read and write
54E000
heap
page read and write
C00002C000
direct allocation
page read and write
2AF7000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
A33E000
unkown
page read and write
80000
trusted library section
page read and write
33FA000
heap
page read and write
2B0F000
trusted library allocation
page read and write
1370000
unkown
page read and write
54D4000
trusted library allocation
page read and write
528000
heap
page read and write
9792000
unkown
page read and write
C0003CD000
direct allocation
page read and write
3377000
heap
page read and write
53F000
heap
page read and write
54E000
heap
page read and write
3010000
unkown
page read and write
402000
unkown
page readonly
54A7000
trusted library allocation
page read and write
13A0000
unkown
page read and write
2A1F000
trusted library allocation
page read and write
312F000
trusted library allocation
page read and write
7FF5ED4C2000
unkown
page readonly
7FF5ED980000
unkown
page readonly
1B9D129C000
heap
page read and write
54D5000
trusted library allocation
page read and write
7FF5ED849000
unkown
page readonly
54E000
heap
page read and write
7FFD9BDF0000
trusted library allocation
page execute and read and write
7DB0000
unkown
page read and write
1370000
unkown
page read and write
1B9D135E000
heap
page read and write
4E80000
trusted library allocation
page read and write
C503000
unkown
page read and write
54B5000
trusted library allocation
page read and write
53F000
heap
page read and write
1B9B934E000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
3179000
trusted library allocation
page read and write
308A000
stack
page read and write
2E49F8F8000
heap
page read and write
1500000
heap
page read and write
303A000
stack
page read and write
1370000
unkown
page read and write
6030000
trusted library allocation
page read and write
3010000
unkown
page read and write
4908000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
401000
unkown
page execute read
3200000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
33F6000
heap
page read and write
29A2000
trusted library allocation
page read and write
2B1E000
trusted library allocation
page read and write
3010000
unkown
page read and write
9B20000
unkown
page read and write
7DA0000
unkown
page read and write
2850000
trusted library allocation
page read and write
1E002B2E000
trusted library allocation
page read and write
3BCFBFE000
stack
page read and write
29F4000
trusted library allocation
page read and write
CB53000
unkown
page read and write
37F9000
unkown
page read and write
9B20000
unkown
page read and write
321A000
trusted library allocation
page read and write
33E5000
heap
page read and write
54A9000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
3460000
unkown
page read and write
7FF5ED5EB000
unkown
page readonly
1E01A98C000
heap
page read and write
7DF4F3031000
unkown
page execute read
54B5000
trusted library allocation
page read and write
2B22000
trusted library allocation
page read and write
1B9B938D000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
6C850000
unkown
page readonly
54AF000
trusted library allocation
page read and write
A09D000
stack
page read and write
190000
trusted library allocation
page read and write
3010000
unkown
page read and write
29B6000
trusted library allocation
page read and write
3010000
unkown
page read and write
3400000
unkown
page read and write
87C0000
unkown
page read and write
7DC0000
unkown
page read and write
6000000
trusted library allocation
page read and write
29BB000
trusted library allocation
page read and write
2AA5000
trusted library allocation
page read and write
3010000
unkown
page read and write
3010000
unkown
page read and write
7DA0000
unkown
page read and write
33FC000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FF71C7E6000
unkown
page readonly
F682000
unkown
page read and write
7FF64167D000
unkown
page readonly
2B3B000
trusted library allocation
page read and write
7FFD9BD60000
trusted library allocation
page read and write
9885000
unkown
page read and write
1B9B7125000
heap
page read and write
29B1000
trusted library allocation
page read and write
AB5B000
unkown
page read and write
7FF64167D000
unkown
page readonly
7FF71C0E0000
unkown
page read and write
3010000
unkown
page read and write
3125000
trusted library allocation
page read and write
3290000
unkown
page read and write
65B000
heap
page read and write
9590000
unkown
page read and write
534000
heap
page read and write
53F000
heap
page read and write
3010000
unkown
page read and write
24BF000
stack
page read and write
896B000
stack
page read and write
5BDE000
stack
page read and write
4C4B000
unkown
page read and write
54E000
heap
page read and write
7FF5ED92C000
unkown
page readonly
17A3DEAA000
heap
page read and write
7FF64167D000
unkown
page readonly
7DA0000
unkown
page read and write
2A9C000
trusted library allocation
page read and write
8740000
unkown
page read and write
58B8000
trusted library allocation
page read and write
4BE3000
unkown
page read and write
C0001A4000
direct allocation
page read and write
87C0000
unkown
page read and write
54DE000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
20E05FD000
stack
page read and write
32DE000
stack
page read and write
7FF5ED503000
unkown
page readonly
20017A35000
heap
page read and write
2BB1000
trusted library allocation
page read and write
A391000
unkown
page read and write
315E000
trusted library allocation
page read and write
968B000
unkown
page read and write
7FF5ED59E000
unkown
page readonly
2E4A11E2000
heap
page read and write
7FF5ED7F1000
unkown
page readonly
7FFD9BD70000
trusted library allocation
page read and write
3791000
unkown
page read and write
1B9D110D000
heap
page read and write
C00003D000
direct allocation
page read and write
3360000
heap
page read and write
8208000
stack
page read and write
1E002BB2000
trusted library allocation
page read and write
7FF5ED40D000
unkown
page readonly
3010000
unkown
page read and write
3400000
unkown
page read and write
3219000
trusted library allocation
page read and write
3C70000
direct allocation
page execute and read and write
7FF6416E2000
unkown
page write copy
3124000
trusted library allocation
page read and write
33D0000
heap
page read and write
87C0000
unkown
page read and write
BAF9000
stack
page read and write
24EF000
stack
page read and write
3184000
trusted library allocation
page read and write
5E4000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
445000
heap
page read and write
7DA0000
unkown
page read and write
FA42000
heap
page read and write
534000
heap
page read and write
3010000
unkown
page read and write
7DA0000
unkown
page read and write
55F2000
heap
page read and write
76C0000
unkown
page read and write
F8EA000
unkown
page read and write
1380000
unkown
page read and write
7FFD9B994000
trusted library allocation
page read and write
54A5000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
3010000
unkown
page read and write
1B9B9334000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
7FF5ED286000
unkown
page readonly
15F3A4CC000
heap
page read and write
7FFD9B9B3000
trusted library allocation
page read and write
3010000
unkown
page read and write
5CF0000
trusted library allocation
page read and write
1E0028C8000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
C00017E000
direct allocation
page read and write
785B000
unkown
page read and write
369C000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
2B33000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
54E4000
trusted library allocation
page read and write
316F000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
3010000
unkown
page read and write
1A13FE000
stack
page read and write
4F00000
trusted library allocation
page read and write
2AFC000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
1370000
unkown
page read and write
7FF5EDA76000
unkown
page readonly
404000
unkown
page execute and write copy
2A97000
trusted library allocation
page read and write
C54A000
unkown
page read and write
28EE000
stack
page read and write
402000
unkown
page readonly
3401000
heap
page read and write
54E000
heap
page read and write
2830000
heap
page read and write
54E000
heap
page read and write
3163000
trusted library allocation
page read and write
7FF5ED73D000
unkown
page readonly
3400000
heap
page read and write
54E000
heap
page read and write
7DC0000
unkown
page read and write
31A4000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
55F2000
heap
page read and write
ED19DFE000
stack
page read and write
3010000
unkown
page read and write
7FF71C7BA000
unkown
page write copy
2A51000
trusted library allocation
page read and write
1FBFFC77000
direct allocation
page read and write
3010000
unkown
page read and write
2A80000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
319D000
trusted library allocation
page read and write
7FF5ED800000
unkown
page readonly
2E49F800000
heap
page read and write
7FF71C0DE000
unkown
page write copy
C0002E0000
direct allocation
page read and write
2B8B000
trusted library allocation
page read and write
55A0000
heap
page read and write
9C80000
unkown
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
1370000
unkown
page read and write
2AC1000
trusted library allocation
page read and write
61B000
heap
page read and write
54C5000
trusted library allocation
page read and write
2B22000
trusted library allocation
page read and write
1A17FD000
stack
page read and write
2B6C000
trusted library allocation
page read and write
9C80000
unkown
page read and write
7DA0000
unkown
page read and write
1FBFFEB0000
direct allocation
page read and write
66F000
heap
page read and write
5D0000
heap
page read and write
7FFD9BD50000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
54FC000
trusted library allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
319A000
trusted library allocation
page read and write
3184000
trusted library allocation
page read and write
1B9B9FAA000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
3010000
unkown
page read and write
54C4000
trusted library allocation
page read and write
3403000
heap
page read and write
3010000
unkown
page read and write
2AEA000
trusted library allocation
page read and write
1370000
unkown
page read and write
2A75000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
54EC000
trusted library allocation
page read and write
7FF5ED62F000
unkown
page readonly
321B000
trusted library allocation
page read and write
340D000
heap
page read and write
1380000
unkown
page read and write
1380000
unkown
page read and write
2AFB000
trusted library allocation
page read and write
8210000
unkown
page read and write
1B9B932A000
trusted library allocation
page read and write
2AE2000
trusted library allocation
page read and write
C000380000
direct allocation
page read and write
548F000
stack
page read and write
1E00269E000
trusted library allocation
page read and write
7FF5ED850000
unkown
page readonly
1B9B8FE5000
trusted library allocation
page read and write
1E0026A2000
trusted library allocation
page read and write
8BEE000
stack
page read and write
7DA0000
unkown
page read and write
7FF5ED5C5000
unkown
page readonly
7DA0000
unkown
page read and write
4F20000
trusted library allocation
page read and write
3400000
unkown
page read and write
4E86000
trusted library allocation
page read and write
29FD000
trusted library allocation
page read and write
9875000
unkown
page read and write
7DA0000
unkown
page read and write
3147000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
7FFD9BE50000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
401000
unkown
page execute and write copy
3400000
unkown
page read and write
55A1000
heap
page read and write
2B91000
trusted library allocation
page read and write
282F000
stack
page read and write
54AC000
trusted library allocation
page read and write
29EF000
trusted library allocation
page read and write
2AB3000
trusted library allocation
page read and write
9881000
unkown
page read and write
5A0000
heap
page read and write
30FB000
trusted library allocation
page read and write
ED19CFF000
stack
page read and write
A11F000
stack
page read and write
7FF6415F1000
unkown
page execute read
7FF5ED853000
unkown
page readonly
1B9D0FE0000
trusted library allocation
page read and write
F6D0DFE000
stack
page read and write
1370000
unkown
page read and write
7FF5ED418000
unkown
page readonly
53F000
heap
page read and write
7FF71C173000
unkown
page write copy
322A000
trusted library allocation
page read and write
87C0000
unkown
page read and write
392C000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
7FF5ED697000
unkown
page readonly
1B9C9254000
trusted library allocation
page read and write
3010000
unkown
page read and write
B190000
unkown
page read and write
B629000
stack
page read and write
54E000
heap
page read and write
1E000470000
heap
page read and write
726000
heap
page read and write
184D9C90000
heap
page read and write
315B000
trusted library allocation
page read and write
E2000
trusted library allocation
page read and write
339B000
heap
page read and write
54B0000
trusted library allocation
page read and write
321F000
trusted library allocation
page read and write
1E0026DD000
trusted library allocation
page read and write
54C5000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
1FBFF170000
direct allocation
page read and write
200179B0000
heap
page read and write
2B18000
trusted library allocation
page read and write
7FF5ED8B4000
unkown
page readonly
3010000
unkown
page read and write
1370000
unkown
page read and write
3157000
trusted library allocation
page read and write
3207000
trusted library allocation
page read and write
3010000
unkown
page read and write
311B000
trusted library allocation
page read and write
2E4A1231000
heap
page read and write
3420000
unkown
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
1370000
unkown
page read and write
3FC1000
unclassified section
page readonly
C000122000
direct allocation
page read and write
54D5000
trusted library allocation
page read and write
2A7D000
trusted library allocation
page read and write
400000
unkown
page readonly
C92D000
unkown
page read and write
7FAEB23000
stack
page read and write
C0000
trusted library allocation
page read and write
2A61000
trusted library allocation
page read and write
4E8B000
trusted library allocation
page read and write
1B9D1057000
heap
page execute and read and write
2AF4000
trusted library allocation
page read and write
7DF4C2050000
trusted library allocation
page execute and read and write
4E70000
trusted library allocation
page read and write
9E6C000
stack
page read and write
2A9A000
trusted library allocation
page read and write
200179F0000
heap
page read and write
3184000
trusted library allocation
page read and write
1FBFFBF0000
direct allocation
page read and write
1B9B88D0000
heap
page read and write
7FF5ED674000
unkown
page readonly
37BD000
unkown
page read and write
54E3000
trusted library allocation
page read and write
2121000
heap
page read and write
2AAD000
trusted library allocation
page read and write
C6CF000
unkown
page read and write
9B20000
unkown
page read and write
7FFD9B9CB000
trusted library allocation
page execute and read and write
2B1F000
trusted library allocation
page read and write
3114000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
2BC6000
trusted library allocation
page read and write
DD0000
unkown
page readonly
2B8C000
trusted library allocation
page read and write
1E002280000
heap
page execute and read and write
5670000
trusted library allocation
page read and write
17A3DEA0000
heap
page read and write
322A000
trusted library allocation
page read and write
3400000
unkown
page read and write
7DA0000
unkown
page read and write
3010000
unkown
page read and write
C0000F4000
direct allocation
page read and write
3201000
trusted library allocation
page read and write
7FB018C000
stack
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
1E01D8F8000
heap
page read and write
5500000
trusted library allocation
page read and write
53F000
heap
page read and write
C000026000
direct allocation
page read and write
3377000
heap
page read and write
3147000
trusted library allocation
page read and write
340C000
heap
page read and write
322A000
trusted library allocation
page read and write
1B9B6F41000
heap
page read and write
7FF64167D000
unkown
page readonly
3010000
unkown
page read and write
7DC0000
unkown
page read and write
2B83000
trusted library allocation
page read and write
2B6D000
trusted library allocation
page read and write
9590000
unkown
page read and write
4FE0000
remote allocation
page read and write
2E49F8CC000
heap
page read and write
1370000
unkown
page read and write
2B8A000
trusted library allocation
page read and write
7DB0000
unkown
page read and write
54B5000
trusted library allocation
page read and write
3137000
trusted library allocation
page read and write
1E01BEFF000
heap
page read and write
1E0021D0000
heap
page read and write
2A0F000
trusted library allocation
page read and write
28F0000
heap
page read and write
C000088000
direct allocation
page read and write
1B9D1072000
heap
page read and write
2853000
trusted library allocation
page read and write
1E000660000
heap
page read and write
4C1E000
unkown
page read and write
1370000
unkown
page read and write
2AB4000
trusted library allocation
page read and write
522000
heap
page read and write
3010000
unkown
page read and write
7900000
unkown
page read and write
3218000
trusted library allocation
page read and write
6C851000
unkown
page execute read
7FF5ED7C4000
unkown
page readonly
4FD0000
trusted library allocation
page read and write
320B000
trusted library allocation
page read and write
2B75000
trusted library allocation
page read and write
33D3000
heap
page read and write
18E000
stack
page read and write
3460000
unkown
page read and write
2E49F7D0000
heap
page read and write
53F000
heap
page read and write
1380000
unkown
page read and write
3400000
unkown
page read and write
312C000
trusted library allocation
page read and write
3010000
unkown
page read and write
2B49000
trusted library allocation
page read and write
55A7000
trusted library allocation
page read and write
C000036000
direct allocation
page read and write
552D000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
1B9BA748000
trusted library allocation
page read and write
3229000
trusted library allocation
page read and write
1B9D13AC000
heap
page read and write
7FF5ED8E2000
unkown
page readonly
521000
heap
page read and write
2B37000
trusted library allocation
page read and write
60E000
stack
page read and write
33D5000
heap
page read and write
1B9B88F0000
trusted library section
page read and write
9977000
unkown
page read and write
716000
heap
page read and write
1E000572000
heap
page read and write
29A6000
trusted library allocation
page read and write
63A000
heap
page read and write
13A0000
unkown
page read and write
2A02000
trusted library allocation
page read and write
9B20000
unkown
page read and write
5BEC000
stack
page read and write
7FF5ED265000
unkown
page readonly
29EA000
trusted library allocation
page read and write
54C5000
trusted library allocation
page read and write
2A77000
trusted library allocation
page read and write
34D2000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
1FBFFF00000
direct allocation
page read and write
7DA0000
unkown
page read and write
3010000
unkown
page read and write
54D9000
trusted library allocation
page read and write
6C8C0000
unkown
page readonly
7FFD9BE20000
trusted library allocation
page read and write
3010000
unkown
page read and write
7FAF1F6000
stack
page read and write
99E000
stack
page read and write
2BA1000
trusted library allocation
page read and write
54F7000
trusted library allocation
page read and write
400000
unkown
page readonly
3180000
unkown
page read and write
54CD000
trusted library allocation
page read and write
29F3000
trusted library allocation
page read and write
1B9D1360000
heap
page read and write
7FFD9BE90000
trusted library allocation
page execute and read and write
1E01C1A3000
heap
page read and write
2E49F87C000
heap
page read and write
316E000
trusted library allocation
page read and write
7FF5ED48A000
unkown
page readonly
9B20000
unkown
page read and write
522000
heap
page read and write
7FF5ED975000
unkown
page readonly
3151000
unkown
page read and write
54C1000
trusted library allocation
page read and write
7FAF37F000
stack
page read and write
1FBFFEA1000
direct allocation
page read and write
33F4000
heap
page read and write
7FFD9BED0000
trusted library allocation
page read and write
55F2000
heap
page read and write
C000185000
direct allocation
page read and write
54E000
heap
page read and write
4E84000
trusted library allocation
page read and write
C0000F6000
direct allocation
page read and write
3BCBFFE000
stack
page read and write
53F000
heap
page read and write
3010000
unkown
page read and write
1380000
unkown
page read and write
340C000
heap
page read and write
1E0020B0000
heap
page read and write
7FF5ED55F000
unkown
page readonly
C000059000
direct allocation
page read and write
6CD000
heap
page read and write
AF8D000
stack
page read and write
7DF4F3040000
unkown
page readonly
400000
unkown
page readonly
3377000
heap
page read and write
3117000
trusted library allocation
page read and write
33D3000
heap
page read and write
C00009A000
direct allocation
page read and write
54B5000
trusted library allocation
page read and write
1B0000
unclassified section
page read and write
9B20000
unkown
page read and write
54B0000
trusted library allocation
page read and write
3BCF7FD000
stack
page read and write
C00035A000
direct allocation
page read and write
A491000
unkown
page read and write
4BC9000
unkown
page read and write
2A49000
trusted library allocation
page read and write
2A79000
trusted library allocation
page read and write
1E01C1FA000
heap
page read and write
3010000
unkown
page read and write
29A0000
trusted library allocation
page read and write
29B9000
trusted library allocation
page read and write
3385000
heap
page read and write
3403000
heap
page read and write
2AE4000
trusted library allocation
page read and write
C000100000
direct allocation
page read and write
7FF5ED885000
unkown
page readonly
7FFD9BEC0000
trusted library allocation
page read and write
1B9B9DB0000
trusted library allocation
page read and write
C00036C000
direct allocation
page read and write
2860000
heap
page read and write
53F000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FF6415F1000
unkown
page execute read
7DA0000
unkown
page read and write
7E70000
unkown
page read and write
7FF5ED872000
unkown
page readonly
17A3DEC5000
heap
page read and write
9B20000
unkown
page read and write
1E01A98E000
heap
page read and write
53F000
heap
page read and write
7DC0000
unkown
page read and write
A323000
unkown
page read and write
7DA0000
unkown
page read and write
3905000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
8EFA000
unkown
page read and write
1370000
unkown
page read and write
3213000
trusted library allocation
page read and write
33FC000
heap
page read and write
3460000
unkown
page read and write
1D0000
heap
page read and write
54AC000
trusted library allocation
page read and write
2A5F000
trusted library allocation
page read and write
C0002EA000
direct allocation
page read and write
3460000
unkown
page read and write
54B5000
trusted library allocation
page read and write
7FF5ED9D9000
unkown
page readonly
255C000
stack
page read and write
7DA0000
unkown
page read and write
1B9BA785000
trusted library allocation
page read and write
87C0000
unkown
page read and write
534000
heap
page read and write
1E002250000
heap
page read and write
3010000
unkown
page read and write
7FFD9BC50000
trusted library allocation
page read and write
15F3BFD0000
heap
page read and write
1370000
unkown
page read and write
53F000
heap
page read and write
1E002291000
trusted library allocation
page read and write
3010000
unkown
page read and write
7863000
unkown
page read and write
7884000
unkown
page read and write
4E80000
trusted library allocation
page read and write
9B20000
unkown
page read and write
3010000
unkown
page read and write
1380000
unkown
page read and write
C000346000
direct allocation
page read and write
C000292000
direct allocation
page read and write
7FF5ED9D6000
unkown
page readonly
54B0000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
3010000
unkown
page read and write
3400000
unkown
page read and write
3147000
trusted library allocation
page read and write
334B000
heap
page read and write
7FFD9BD50000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
53F000
heap
page read and write
322A000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
3030000
unkown
page read and write
9B20000
unkown
page read and write
15F55A80000
heap
page read and write
3391000
heap
page read and write
2A548630000
heap
page read and write
7EF000
stack
page read and write
4EA1000
trusted library allocation
page read and write
7FF5ED9AE000
unkown
page readonly
2A83000
trusted library allocation
page read and write
315E000
trusted library allocation
page read and write
56FE000
stack
page read and write
405000
unkown
page readonly
C0004DE000
direct allocation
page read and write
534000
heap
page read and write
53F000
heap
page read and write
534000
heap
page read and write
3129000
trusted library allocation
page read and write
15F4BFF1000
trusted library allocation
page read and write
630000
heap
page read and write
1E01230A000
trusted library allocation
page read and write
7FFD9BB6B000
trusted library allocation
page read and write
685000
heap
page read and write
400000
unkown
page readonly
C08A000
stack
page read and write
1FBFEF48000
heap
page read and write
3010000
unkown
page read and write
2B20000
trusted library allocation
page read and write
2A81000
trusted library allocation
page read and write
51E000
stack
page read and write
3103000
trusted library allocation
page read and write
F746000
unkown
page read and write
184D9D95000
heap
page read and write
7FF71C7B6000
unkown
page read and write
C557000
unkown
page read and write
140000
heap
page read and write
54D5000
trusted library allocation
page read and write
299C000
trusted library allocation
page read and write
2A9F000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
9A5B000
unkown
page read and write
2B16000
trusted library allocation
page read and write
33FA000
heap
page read and write
7FF71C7BA000
unkown
page write copy
9883000
unkown
page read and write
7DA0000
unkown
page read and write
3402000
heap
page read and write
3157000
trusted library allocation
page read and write
7FF5ED68C000
unkown
page readonly
53F000
heap
page read and write
53F000
heap
page read and write
6C8C0000
unkown
page readonly
1370000
unkown
page read and write
7DA0000
unkown
page read and write
1B9D13C9000
heap
page read and write
7DC0000
unkown
page read and write
322A000
trusted library allocation
page read and write
ED1A3FB000
stack
page read and write
322A000
trusted library allocation
page read and write
3460000
unkown
page read and write
6481000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
9B20000
unkown
page read and write
7FF5ED5C1000
unkown
page readonly
7DF4F3061000
unkown
page execute read
4F00000
trusted library allocation
page read and write
7FFD9BD00000
trusted library allocation
page read and write
7D00000
unkown
page readonly
691000
heap
page read and write
3229000
trusted library allocation
page read and write
5514000
trusted library allocation
page read and write
7E70000
unkown
page read and write
312A000
trusted library allocation
page read and write
7FFD9BF00000
trusted library allocation
page read and write
1370000
unkown
page read and write
1E0026D2000
trusted library allocation
page read and write
1FBFEF30000
heap
page read and write
C0005DC000
direct allocation
page read and write
7FF5ED9ED000
unkown
page readonly
1B9B8DF0000
heap
page read and write
9C80000
unkown
page read and write
1380000
unkown
page read and write
A37B000
unkown
page read and write
534000
heap
page read and write
3237000
trusted library allocation
page read and write
54E000
heap
page read and write
F2000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
7FFD9BD10000
trusted library allocation
page read and write
1B9C9263000
trusted library allocation
page read and write
1E002A5C000
trusted library allocation
page read and write
5D01000
heap
page read and write
7FF5ED933000
unkown
page readonly
3218000
trusted library allocation
page read and write
15F3A4FD000
heap
page read and write
54D6000
trusted library allocation
page read and write
33F4000
heap
page read and write
1370000
unkown
page read and write
1370000
unkown
page read and write
7FF5ED42B000
unkown
page readonly
1B9BA862000
trusted library allocation
page read and write
7FF5ED2A4000
unkown
page readonly
3901000
trusted library allocation
page read and write
7FFD9BD20000
trusted library allocation
page read and write
312E000
stack
page read and write
1380000
unkown
page read and write
31A7000
heap
page read and write
54E000
heap
page read and write
1370000
unkown
page read and write
7DA0000
unkown
page read and write
54B3000
trusted library allocation
page read and write
7FF5ED5F7000
unkown
page readonly
30F6000
trusted library allocation
page read and write
7FF6415F1000
unkown
page execute read
CA20000
unkown
page read and write
1FBFFD44000
direct allocation
page read and write
2B02000
trusted library allocation
page read and write
C000138000
direct allocation
page read and write
55A1000
heap
page read and write
316E000
stack
page read and write
4C34000
unkown
page read and write
599F000
stack
page read and write
C7C5000
unkown
page read and write
54E000
heap
page read and write
3400000
unkown
page read and write
7FF5ED4B0000
unkown
page readonly
7FF5ED4BB000
unkown
page readonly
17A3E090000
heap
page read and write
C49E000
stack
page read and write
29C2000
trusted library allocation
page read and write
1E0004CC000
heap
page read and write
33ED000
heap
page read and write
54E000
heap
page read and write
2C40000
remote allocation
page read and write
7FF5ED844000
unkown
page readonly
1B9B6F87000
heap
page read and write
2B4F000
trusted library allocation
page read and write
51A000
heap
page read and write
2B4A000
trusted library allocation
page read and write
2AB9000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
3030000
unkown
page read and write
7FFD9BB70000
trusted library allocation
page read and write
2AD2000
trusted library allocation
page read and write
7FF5ED97E000
unkown
page readonly
33FA000
heap
page read and write
C000168000
direct allocation
page read and write
3010000
unkown
page read and write
315A000
trusted library allocation
page read and write
1FBFF110000
heap
page read and write
C00011E000
direct allocation
page read and write
7FF5ED669000
unkown
page readonly
7DA0000
unkown
page read and write
C00004D000
direct allocation
page read and write
90813FF000
stack
page read and write
6000000
trusted library allocation
page read and write
7FF71C160000
unkown
page write copy
A502000
unkown
page read and write
7FF5ED279000
unkown
page readonly
160000
heap
page execute and read and write
9B20000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
1380000
unkown
page read and write
2B57000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
5FE0000
trusted library allocation
page read and write
20017C85000
heap
page read and write
B170000
unkown
page readonly
786B000
unkown
page read and write
2B63000
trusted library allocation
page read and write
87C0000
unkown
page read and write
9877000
unkown
page read and write
1E01D886000
heap
page read and write
53F000
heap
page read and write
4E1F000
stack
page read and write
2ADF000
trusted library allocation
page read and write
1E0026DA000
trusted library allocation
page read and write
3460000
unkown
page read and write
54A1000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
5F7E000
trusted library allocation
page read and write
53F000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
7FF5ED7CF000
unkown
page readonly
4EB2000
trusted library allocation
page read and write
8FB9000
stack
page read and write
54B5000
trusted library allocation
page read and write
7FF5ED26E000
unkown
page readonly
7FFD9BD77000
trusted library allocation
page read and write
33FC000
heap
page read and write
B140000
unkown
page readonly
7859000
unkown
page read and write
1A0FFE000
stack
page read and write
3400000
unkown
page read and write
538E000
stack
page read and write
2A19000
trusted library allocation
page read and write
3010000
unkown
page read and write
7FF5ED349000
unkown
page readonly
4F10000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
1B9BA6FE000
trusted library allocation
page read and write
3400000
unkown
page read and write
7FF5ED91A000
unkown
page readonly
C000000000
direct allocation
page read and write
3400000
unkown
page read and write
3400000
unkown
page read and write
1370000
unkown
page read and write
4F00000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
2AF9000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1E0026BF000
trusted library allocation
page read and write
78A0000
unkown
page read and write
3C6F000
stack
page read and write
51D000
heap
page read and write
7DA0000
unkown
page read and write
322B000
trusted library allocation
page read and write
310F000
trusted library allocation
page read and write
7FF5ED28E000
unkown
page readonly
1E0029E9000
trusted library allocation
page read and write
54E000
heap
page read and write
340D000
heap
page read and write
53F000
heap
page read and write
534000
heap
page read and write
61A0000
heap
page read and write
7FFD9BB4A000
trusted library allocation
page read and write
3159000
trusted library allocation
page read and write
C512000
unkown
page read and write
1E0021C0000
heap
page read and write
3010000
unkown
page read and write
8740000
unkown
page read and write
AF0C000
stack
page read and write
2A91000
trusted library allocation
page read and write
4E1F000
stack
page read and write
2A98000
trusted library allocation
page read and write
37AC000
unkown
page read and write
14CA463A000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1B9D1050000
heap
page execute and read and write
7FF5ED64F000
unkown
page readonly
200179C0000
heap
page read and write
53F000
heap
page read and write
3179000
trusted library allocation
page read and write
285C000
trusted library allocation
page execute and read and write
208F000
stack
page read and write
3010000
unkown
page read and write
321A000
trusted library allocation
page read and write
33D4000
heap
page read and write
3BCEBFC000
stack
page read and write
3835000
trusted library allocation
page read and write
3400000
unkown
page read and write
54D1000
trusted library allocation
page read and write
7FAEF7D000
stack
page read and write
55A1000
heap
page read and write
2B5E000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7FF5ED342000
unkown
page readonly
54D5000
trusted library allocation
page read and write
3010000
unkown
page read and write
34E9000
stack
page read and write
405000
unkown
page readonly
7FFD9B9A0000
trusted library allocation
page read and write
54B5000
trusted library allocation
page read and write
627C000
stack
page read and write
60000
direct allocation
page read and write
3400000
unkown
page read and write
9660000
unkown
page read and write
7DC0000
unkown
page read and write
30FF000
trusted library allocation
page read and write
1B9D111D000
heap
page read and write
380E000
stack
page read and write
53F000
heap
page read and write
13A0000
unkown
page read and write
5945000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
29BF000
trusted library allocation
page read and write
15F3A780000
heap
page read and write
7FF5ED810000
unkown
page readonly
2E49F8D9000
heap
page read and write
7FF5ED3D6000
unkown
page readonly
7FFD9BE70000
trusted library allocation
page read and write
4C18000
unkown
page read and write
33E3000
heap
page read and write
340C000
heap
page read and write
C000309000
direct allocation
page read and write
401000
unkown
page execute read
2B74000
trusted library allocation
page read and write
54E000
heap
page read and write
405000
unkown
page readonly
4F20000
trusted library allocation
page read and write
1370000
unkown
page read and write
3010000
unkown
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
7FF5ED68F000
unkown
page readonly
400000
unkown
page readonly
B22B000
stack
page read and write
CBB9000
unkown
page read and write
2BA4000
trusted library allocation
page read and write
3184000
trusted library allocation
page read and write
1490000
unkown
page read and write
7FFD9B990000
trusted library allocation
page read and write
9929000
unkown
page read and write
1E000680000
heap
page read and write
55B000
heap
page read and write
7FF5ED33F000
unkown
page readonly
7FFE000
stack
page read and write
F8E0000
unkown
page read and write
7FF5ED4EF000
unkown
page readonly
1C0000
heap
page read and write
2BA6000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
3010000
unkown
page read and write
3210000
unkown
page read and write
15F3A4CE000
heap
page read and write
2BBC000
trusted library allocation
page read and write
340D000
heap
page read and write
54ED000
trusted library allocation
page read and write
33E5000
heap
page read and write
1FBFF17D000
direct allocation
page read and write
7DA0000
unkown
page read and write
C000028000
direct allocation
page read and write
401000
unkown
page execute read
3460000
unkown
page read and write
3402000
heap
page read and write
1E01C180000
heap
page read and write
C8E1000
unkown
page read and write
1FBFFDC0000
direct allocation
page read and write
7FF5ED205000
unkown
page readonly
C0003AC000
direct allocation
page read and write
4908000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
2B71000
trusted library allocation
page read and write
53F000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
310E000
stack
page read and write
53F000
heap
page read and write
3100000
trusted library allocation
page read and write
33EA000
heap
page read and write
4B78000
unkown
page read and write
7FF5ED781000
unkown
page readonly
BD000
trusted library allocation
page execute and read and write
7FF5ED4F3000
unkown
page readonly
7847000
unkown
page read and write
7E70000
unkown
page read and write
1B9BA58A000
trusted library allocation
page read and write
3010000
unkown
page read and write
2A3B000
trusted library allocation
page read and write
33FA000
heap
page read and write
2B48000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
7DA0000
unkown
page read and write
275A000
stack
page read and write
321A000
trusted library allocation
page read and write
7A34000
unkown
page read and write
2A75000
trusted library allocation
page read and write
54D2000
trusted library allocation
page read and write
30E0000
heap
page read and write
5648000
trusted library allocation
page read and write
1370000
unkown
page read and write
7FF5ED928000
unkown
page readonly
2AFF000
trusted library allocation
page read and write
87C0000
unkown
page read and write
7FF5ED1FF000
unkown
page readonly
F74B000
unkown
page read and write
5514000
trusted library allocation
page read and write
33EB000
heap
page read and write
7FF71BC40000
unkown
page readonly
54E000
heap
page read and write
3BD0D8E000
stack
page read and write
54E4000
trusted library allocation
page read and write
C6D8000
unkown
page read and write
1B9B8E0B000
heap
page read and write
5641000
unkown
page read and write
1B9B9188000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
6C920000
unkown
page readonly
340C000
heap
page read and write
54FE000
trusted library allocation
page read and write
3400000
unkown
page read and write
7FB020B000
stack
page read and write
1FBFFD3E000
direct allocation
page read and write
7DA0000
unkown
page read and write
321E000
trusted library allocation
page read and write
3010000
unkown
page read and write
29D2000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
55F0000
heap
page read and write
15F3A53A000
heap
page read and write
7FF5ED495000
unkown
page readonly
54E000
heap
page read and write
1B9B9391000
trusted library allocation
page read and write
1370000
unkown
page read and write
10D0000
heap
page read and write
7FF5ED625000
unkown
page readonly
7FF5ED779000
unkown
page readonly
2A2E000
trusted library allocation
page read and write
7FF71C15F000
unkown
page read and write
7DA0000
unkown
page read and write
3188000
trusted library allocation
page read and write
4ECD000
stack
page read and write
5515000
trusted library allocation
page read and write
87C0000
unkown
page read and write
2FEE000
stack
page read and write
2E49F6F0000
heap
page read and write
54D5000
trusted library allocation
page read and write
321E000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
3157000
trusted library allocation
page read and write
1A0BFE000
stack
page read and write
9590000
unkown
page read and write
3010000
unkown
page read and write
2AF8000
trusted library allocation
page read and write
13A0000
unkown
page read and write
3BCC7FE000
stack
page read and write
ED19AFF000
stack
page read and write
1E000733000
heap
page execute and read and write
8740000
unkown
page read and write
3400000
unkown
page read and write
18E000
stack
page read and write
2A54A0A0000
heap
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
534000
heap
page read and write
37F2000
unkown
page read and write
7FF5ED644000
unkown
page readonly
BD000
trusted library allocation
page execute and read and write
2BA7000
trusted library allocation
page read and write
7FF5ED735000
unkown
page readonly
E4A0000
unkown
page read and write
2890000
heap
page read and write
96DF000
unkown
page read and write
3218000
trusted library allocation
page read and write
F8E4000
unkown
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
1E01D880000
heap
page read and write
C57F000
unkown
page read and write
5CE000
stack
page read and write
7FFD9B9BB000
trusted library allocation
page execute and read and write
1FBFF174000
direct allocation
page read and write
982D000
unkown
page read and write
7DA0000
unkown
page read and write
7DA0000
unkown
page read and write
87C0000
unkown
page read and write
54D5000
trusted library allocation
page read and write
7FF5ED5C9000
unkown
page readonly
3417000
heap
page read and write
3010000
unkown
page read and write
C000024000
direct allocation
page read and write
ED1A2FE000
stack
page read and write
2E4A1310000
heap
page read and write
1FBFF155000
heap
page read and write
1370000
unkown
page read and write
4B8B000
unkown
page read and write
C00005D000
direct allocation
page read and write
7FF71C73B000
unkown
page read and write
7DA0000
unkown
page read and write
5E0000
heap
page read and write
2A0C000
trusted library allocation
page read and write
3010000
unkown
page read and write
2A31000
trusted library allocation
page read and write
1FBFFCF0000
direct allocation
page read and write
54F4000
trusted library allocation
page read and write
400000
unkown
page readonly
534000
heap
page read and write
322A000
trusted library allocation
page read and write
C00010C000
direct allocation
page read and write
6000000
trusted library allocation
page read and write
2B06000
trusted library allocation
page read and write
54E9000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
534000
heap
page read and write
55F2000
heap
page read and write
313C000
trusted library allocation
page read and write
534000
heap
page read and write
6C8C1000
unkown
page execute read
54EC000
trusted library allocation
page read and write
2B7A000
trusted library allocation
page read and write
5535000
trusted library allocation
page read and write
87C0000
unkown
page read and write
339A000
heap
page read and write
7FF5ED692000
unkown
page readonly
5525000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
54E000
heap
page read and write
29DC000
trusted library allocation
page read and write
7E50000
unkown
page readonly
3010000
unkown
page read and write
3BCCBFA000
stack
page read and write
7FF5ED41C000
unkown
page readonly
7FF5ED9CA000
unkown
page readonly
6000000
trusted library allocation
page read and write
7DB0000
unkown
page read and write
1B9B9338000
trusted library allocation
page read and write
3010000
unkown
page read and write
7FFD9BD3C000
trusted library allocation
page read and write
37A8000
unkown
page read and write
7FFD9BEB0000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
7FF5EDA14000
unkown
page readonly
7FF5ED9C6000
unkown
page readonly
53F000
heap
page read and write
B650000
unkown
page read and write
3010000
unkown
page read and write
9B20000
unkown
page read and write
7FAEBAE000
stack
page read and write
54EB000
trusted library allocation
page read and write
14CA4770000
heap
page read and write
1FBFFD15000
direct allocation
page read and write
315A000
trusted library allocation
page read and write
3118000
trusted library allocation
page read and write
29F1000
trusted library allocation
page read and write
1370000
unkown
page read and write
2A54878B000
heap
page read and write
2A2A000
trusted library allocation
page read and write
54C4000
trusted library allocation
page read and write
9B20000
unkown
page read and write
7FFD9BDE2000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
322A000
trusted library allocation
page read and write
15F54906000
heap
page read and write
15F3A6D0000
heap
page read and write
7DA0000
unkown
page read and write
9560000
unkown
page read and write
C000400000
direct allocation
page read and write
3147000
trusted library allocation
page read and write
340C000
heap
page read and write
A479000
unkown
page read and write
87C0000
unkown
page read and write
90815FF000
stack
page read and write
691000
heap
page read and write
3010000
unkown
page read and write
2BA9000
trusted library allocation
page read and write
3010000
unkown
page read and write
53F000
heap
page read and write
54E000
heap
page read and write
55A0000
heap
page read and write
2ACF000
trusted library allocation
page read and write
528000
heap
page read and write
5520000
trusted library allocation
page read and write
3010000
unkown
page read and write
29A3000
trusted library allocation
page read and write
23EE000
stack
page read and write
53F000
heap
page read and write
2B95000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
7DB0000
unkown
page read and write
7DA0000
unkown
page read and write
1E01C20E000
heap
page read and write
2A4A000
trusted library allocation
page read and write
2E49F8CE000
heap
page read and write
14CA48C0000
heap
page read and write
2E49F8EB000
heap
page read and write
54E000
heap
page read and write
9C80000
unkown
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
C52C000
unkown
page read and write
7DA0000
unkown
page read and write
2B70000
trusted library allocation
page read and write
551D000
trusted library allocation
page read and write
312A000
trusted library allocation
page read and write
7FAF07E000
stack
page read and write
F703000
unkown
page read and write
30FF000
trusted library allocation
page read and write
1FBFFBFC000
direct allocation
page read and write
4EAD000
trusted library allocation
page read and write
715000
heap
page read and write
3220000
unkown
page readonly
7FF5ED39E000
unkown
page readonly
C6BF000
unkown
page read and write
1370000
unkown
page read and write
2B67000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
4B50000
unkown
page read and write
3237000
trusted library allocation
page read and write
29D3000
trusted library allocation
page read and write
1FBFFC21000
direct allocation
page read and write
1370000
unkown
page read and write
3966000
trusted library allocation
page read and write
1B9B6F85000
heap
page read and write
33FC000
heap
page read and write
ED199FE000
stack
page read and write
1B9B6EE0000
heap
page read and write
54D0000
trusted library allocation
page read and write
7DF4F3041000
unkown
page execute read
3010000
unkown
page read and write
A327000
unkown
page read and write
2AFE000
trusted library allocation
page read and write
1B9BA5AC000
trusted library allocation
page read and write
362E000
stack
page read and write
3210000
trusted library allocation
page read and write
7FF5ED3D0000
unkown
page readonly
7FFD9BEA0000
trusted library allocation
page read and write
331D000
stack
page read and write
AAF2000
unkown
page read and write
2A9D000
trusted library allocation
page read and write
7FF5ED9C8000
unkown
page readonly
C00001C000
direct allocation
page read and write
4B93000
unkown
page read and write
2B05000
trusted library allocation
page read and write
87C0000
unkown
page read and write
534000
heap
page read and write
2E49F8CC000
heap
page read and write
1B9BAF00000
trusted library allocation
page read and write
3010000
unkown
page read and write
3030000
unkown
page read and write
90817FF000
stack
page read and write
13A0000
unkown
page read and write
7DC0000
unkown
page read and write
7FFD9B994000
trusted library allocation
page read and write
ED1A0FE000
stack
page read and write
29F0000
trusted library allocation
page read and write
550C000
trusted library allocation
page read and write
C6F8000
unkown
page read and write
87C0000
unkown
page read and write
1E002060000
trusted library section
page readonly
A364000
unkown
page read and write
5D01000
heap
page read and write
37D2000
unkown
page read and write
1E0026D6000
trusted library allocation
page read and write
54C5000
trusted library allocation
page read and write
55F2000
heap
page read and write
3010000
unkown
page read and write
3010000
unkown
page read and write
A494000
unkown
page read and write
53F000
heap
page read and write
534000
heap
page read and write
3118000
trusted library allocation
page read and write
33CE000
heap
page read and write
2B39000
trusted library allocation
page read and write
2BC2000
trusted library allocation
page read and write
53F000
heap
page read and write
3010000
unkown
page read and write
2A7F000
trusted library allocation
page read and write
C0002A4000
direct allocation
page read and write
3010000
unkown
page read and write
7FF5ED534000
unkown
page readonly
7FFD9BEF0000
trusted library allocation
page execute and read and write
7DC0000
unkown
page read and write
C000392000
direct allocation
page read and write
2B30000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
2BC0000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
7FF5ED847000
unkown
page readonly
9B20000
unkown
page read and write
533000
heap
page read and write
7CD0000
unkown
page read and write
3403000
heap
page read and write
C0008E6000
direct allocation
page read and write
4BA6000
unkown
page read and write
7FF5ED87D000
unkown
page readonly
5A0000
direct allocation
page execute and read and write
54C5000
trusted library allocation
page read and write
54E000
heap
page read and write
5CF0000
trusted library allocation
page read and write
33D0000
heap
page read and write
1B9B8DE0000
trusted library allocation
page read and write
30F7000
trusted library allocation
page read and write
9B20000
unkown
page read and write
313B000
trusted library allocation
page read and write
2B90000
trusted library allocation
page read and write
1E0122A9000
trusted library allocation
page read and write
2E49F8B6000
heap
page read and write
50B000
heap
page read and write
9871000
unkown
page read and write
1380000
unkown
page read and write
3239000
trusted library allocation
page read and write
2B08000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
3365000
heap
page read and write
54AE000
trusted library allocation
page read and write
3010000
unkown
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
7FF71C7B6000
unkown
page write copy
A37D000
unkown
page read and write
AAD1000
unkown
page read and write
7FF5ED4C6000
unkown
page readonly
54AE000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
694000
heap
page read and write
1A07F5000
stack
page read and write
54AF000
trusted library allocation
page read and write
3400000
heap
page read and write
53F000
heap
page read and write
3010000
unkown
page read and write
3010000
unkown
page read and write
54E000
heap
page read and write
7FF5ED1CB000
unkown
page readonly
1440000
unkown
page read and write
7FF5ED451000
unkown
page readonly
3010000
unkown
page read and write
2A04000
trusted library allocation
page read and write
C00023A000
direct allocation
page read and write
3010000
unkown
page read and write
3129000
trusted library allocation
page read and write
3010000
unkown
page read and write
54E000
heap
page read and write
2A4D000
trusted library allocation
page read and write
6C888000
unkown
page readonly
3010000
unkown
page read and write
1E01A2C0000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
7DA0000
unkown
page read and write
314A000
trusted library allocation
page read and write
7FFD9BD40000
trusted library allocation
page read and write
54B5000
trusted library allocation
page read and write
400000
unkown
page readonly
3010000
unkown
page read and write
3010000
unkown
page read and write
55D8000
trusted library allocation
page read and write
3010000
unkown
page read and write
7FFD9BB90000
trusted library allocation
page read and write
1370000
unkown
page read and write
5557000
stack
page read and write
2A4B000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7FFD9BE4B000
trusted library allocation
page read and write
C0003C4000
direct allocation
page read and write
54BD000
trusted library allocation
page read and write
1370000
unkown
page read and write
29B5000
trusted library allocation
page read and write
13A0000
unkown
page read and write
C000046000
direct allocation
page read and write
3460000
unkown
page read and write
C00095A000
direct allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
534000
heap
page read and write
7FF5ED449000
unkown
page readonly
3010000
unkown
page read and write
7DA0000
unkown
page read and write
5CEB000
stack
page read and write
17A3E1A4000
heap
page read and write
321A000
trusted library allocation
page read and write
7FF5ED7FD000
unkown
page readonly
C561000
unkown
page read and write
3219000
trusted library allocation
page read and write
3152000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
2AB2000
trusted library allocation
page read and write
4246000
trusted library allocation
page read and write
2A548740000
heap
page read and write
2AC9000
trusted library allocation
page read and write
C00011C000
direct allocation
page read and write
2B51000
trusted library allocation
page read and write
7FF5EDA0D000
unkown
page readonly
3010000
unkown
page read and write
7FFD9BC90000
trusted library allocation
page read and write
401000
unkown
page execute read
C6E3000
unkown
page read and write
9590000
unkown
page read and write
5BA0000
trusted library allocation
page read and write
316E000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
C0003B8000
direct allocation
page read and write
3010000
unkown
page read and write
7FB030E000
stack
page read and write
9139000
stack
page read and write
322A000
trusted library allocation
page read and write
7FF5ED3DA000
unkown
page readonly
355E000
stack
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
7DC0000
unkown
page read and write
7FF5EDA31000
unkown
page readonly
7FF5ED818000
unkown
page readonly
3010000
unkown
page read and write
322A000
trusted library allocation
page read and write
29EE000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7DA0000
unkown
page read and write
C507000
unkown
page read and write
9B20000
unkown
page read and write
2A2F000
trusted library allocation
page read and write
4E84000
trusted library allocation
page read and write
54DC000
trusted library allocation
page read and write
7FFD9BDE4000
trusted library allocation
page read and write
1370000
unkown
page read and write
15F3A610000
trusted library allocation
page read and write
7FFD9B9C4000
trusted library allocation
page read and write
7FF5ED7D6000
unkown
page readonly
36D3000
stack
page read and write
7978000
unkown
page read and write
7FF5EDA11000
unkown
page readonly
4E50000
trusted library allocation
page execute and read and write
29C7000
trusted library allocation
page read and write
1B9B8940000
heap
page readonly
1E01D900000
heap
page read and write
7FAF0FD000
stack
page read and write
8740000
stack
page read and write
F902000
unkown
page read and write
3400000
unkown
page read and write
3010000
unkown
page read and write
87C0000
unkown
page read and write
5FF0000
trusted library allocation
page read and write
2748000
stack
page read and write
1380000
unkown
page read and write
1B9B9654000
trusted library allocation
page read and write
3748000
unkown
page read and write
534000
heap
page read and write
54C3000
trusted library allocation
page read and write
C857000
unkown
page read and write
4E80000
trusted library allocation
page read and write
28F0000
heap
page read and write
1370000
unkown
page read and write
184D9D40000
heap
page read and write
7F30000
unkown
page read and write
4EF0000
trusted library allocation
page read and write
2DDB000
stack
page read and write
184D9D4B000
heap
page read and write
F784000
unkown
page read and write
1B9B8CD0000
trusted library allocation
page read and write
54FC000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
54D5000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7DA0000
unkown
page read and write
7DA0000
unkown
page read and write
3010000
unkown
page read and write
3218000
trusted library allocation
page read and write
3403000
heap
page read and write
321D000
trusted library allocation
page read and write
8710000
unkown
page readonly
2A30000
trusted library allocation
page read and write
18E000
stack
page read and write
7FF5ED445000
unkown
page readonly
7DC0000
unkown
page read and write
1B9B6F5D000
heap
page read and write
1B9B6F8A000
heap
page read and write
33DF000
heap
page read and write
C000080000
direct allocation
page read and write
36D5000
stack
page read and write
7DA0000
unkown
page read and write
311A000
trusted library allocation
page read and write
4FE0000
remote allocation
page read and write
8740000
unkown
page read and write
4F00000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
54B6000
trusted library allocation
page read and write
490000
heap
page read and write
33F6000
heap
page read and write
3117000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7FFD9BB41000
trusted library allocation
page read and write
312F000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
7E70000
unkown
page read and write
7FAFEFF000
stack
page read and write
54DB000
trusted library allocation
page read and write
430000
heap
page read and write
528000
heap
page read and write
7DC0000
unkown
page read and write
F7000
trusted library allocation
page execute and read and write
320D000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
6C91E000
unkown
page read and write
2B8E000
trusted library allocation
page read and write
1E01BED0000
heap
page read and write
7DC0000
unkown
page read and write
6C8B0000
unkown
page readonly
7FFD9BD40000
trusted library allocation
page read and write
BDD0000
unkown
page readonly
3010000
unkown
page read and write
1FBFF150000
heap
page read and write
7FF71C0D6000
unkown
page read and write
311C000
trusted library allocation
page read and write
B08D000
stack
page read and write
54E000
heap
page read and write
34DA000
trusted library allocation
page read and write
9560000
unkown
page read and write
3229000
trusted library allocation
page read and write
7FF5ED750000
unkown
page readonly
B82A000
stack
page read and write
3218000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
299E000
trusted library allocation
page read and write
2E4A1110000
heap
page read and write
534000
heap
page read and write
9C80000
unkown
page read and write
7FFD9BD90000
trusted library allocation
page read and write
7FF5ED793000
unkown
page readonly
2B03000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
7FF5ED956000
unkown
page readonly
3010000
unkown
page read and write
2C40000
remote allocation
page read and write
534000
heap
page read and write
53F000
heap
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
2761000
unclassified section
page execute read
2A21000
trusted library allocation
page read and write
3820000
heap
page read and write
620000
trusted library allocation
page read and write
310D000
trusted library allocation
page read and write
1B9B933C000
trusted library allocation
page read and write
2A94000
trusted library allocation
page read and write
1370000
unkown
page read and write
7FF6415F1000
unkown
page execute read
54D6000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7FAEE7F000
stack
page read and write
54B5000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
87C0000
unkown
page read and write
1B9B9E90000
trusted library allocation
page read and write
B5AE000
stack
page read and write
54EA000
trusted library allocation
page read and write
C000031000
direct allocation
page read and write
A19F000
stack
page read and write
7869000
unkown
page read and write
2A12000
trusted library allocation
page read and write
1B9B70D0000
heap
page read and write
322A000
trusted library allocation
page read and write
56D9000
unkown
page read and write
7FF71C7E6000
unkown
page readonly
2B88000
trusted library allocation
page read and write
7FF71C0D4000
unkown
page read and write
33ED000
heap
page read and write
23CF000
stack
page read and write
3010000
unkown
page read and write
7CC0000
unkown
page readonly
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B992000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
3050000
remote allocation
page execute and read and write
534000
heap
page read and write
54E000
heap
page read and write
53F000
heap
page read and write
A0000
trusted library allocation
page read and write
78AD000
unkown
page read and write
C0003C6000
direct allocation
page read and write
9B20000
unkown
page read and write
97D4000
unkown
page read and write
3010000
unkown
page read and write
54BC000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
54EC000
trusted library allocation
page read and write
9B20000
unkown
page read and write
3400000
unkown
page read and write
7E70000
unkown
page read and write
3123000
trusted library allocation
page read and write
B8C0000
unkown
page readonly
2AAE000
trusted library allocation
page read and write
2E4A1220000
heap
page read and write
7DA0000
unkown
page read and write
7FF5ED8C6000
unkown
page readonly
3010000
unkown
page read and write
54D5000
trusted library allocation
page read and write
C000006000
direct allocation
page read and write
321D000
trusted library allocation
page read and write
315A000
trusted library allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
2850000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
22BE000
stack
page read and write
3124000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
1B9D1180000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
7FF5ED8FF000
unkown
page readonly
7DB0000
unkown
page read and write
5566000
heap
page read and write
24C0000
direct allocation
page execute and read and write
1B9C9261000
trusted library allocation
page read and write
54FA000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
AADB000
unkown
page read and write
2999000
trusted library allocation
page read and write
9893000
unkown
page read and write
15F3BF30000
heap
page read and write
1E01C214000
heap
page read and write
29B3000
trusted library allocation
page read and write
33FF000
heap
page read and write
3010000
unkown
page read and write
3118000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
1E002707000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
13A0000
unkown
page read and write
311B000
trusted library allocation
page read and write
7FF5ED806000
unkown
page readonly
627000
heap
page read and write
53F000
heap
page read and write
9869000
unkown
page read and write
7DB0000
unkown
page read and write
1B9B931C000
trusted library allocation
page read and write
6CB000
heap
page read and write
4E60000
trusted library allocation
page read and write
15F3A499000
heap
page read and write
3010000
unkown
page read and write
2A7E000
trusted library allocation
page read and write
7CE0000
unkown
page read and write
54E000
heap
page read and write
9C80000
unkown
page read and write
7FFD9BA46000
trusted library allocation
page read and write
54C5000
trusted library allocation
page read and write
2B19000
trusted library allocation
page read and write
54DC000
trusted library allocation
page read and write
1E0020A0000
trusted library allocation
page read and write
7FFD9BD60000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
534000
heap
page read and write
4E84000
trusted library allocation
page read and write
7FF5ED8A4000
unkown
page readonly
7FB028C000
stack
page read and write
1370000
unkown
page read and write
7DC0000
unkown
page read and write
322A000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
15F3A590000
heap
page read and write
9A10000
unkown
page read and write
1B9B8985000
heap
page read and write
3400000
heap
page read and write
ED1A1FF000
stack
page read and write
1B9D1060000
heap
page read and write
1380000
unkown
page read and write
1B9D13B8000
heap
page read and write
7FAF47F000
stack
page read and write
7FF5ED9B8000
unkown
page readonly
3010000
unkown
page read and write
5CF0000
trusted library allocation
page read and write
3121000
trusted library allocation
page read and write
7FFD9BD20000
trusted library allocation
page read and write
C0002F6000
direct allocation
page read and write
7DA0000
unkown
page read and write
55F2000
heap
page read and write
7DB0000
unkown
page read and write
29E2000
trusted library allocation
page read and write
1370000
unkown
page read and write
29F5000
trusted library allocation
page read and write
55F2000
heap
page read and write
402000
unkown
page readonly
4E60000
trusted library allocation
page read and write
3738000
unkown
page read and write
231F000
stack
page read and write
7FF5ED81B000
unkown
page readonly
54C4000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
3D0C000
stack
page read and write
7C80000
unkown
page read and write
7FF5ED990000
unkown
page readonly
534000
heap
page read and write
54B5000
trusted library allocation
page read and write
1E0025C4000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
322A000
trusted library allocation
page read and write
534000
heap
page read and write
7FF5ED814000
unkown
page readonly
3010000
unkown
page read and write
9B20000
unkown
page read and write
3212000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
C4D0000
unkown
page read and write
75F000
stack
page read and write
7DA0000
unkown
page read and write
5A9F000
stack
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
1483000
heap
page read and write
322A000
trusted library allocation
page read and write
3229000
trusted library allocation
page read and write
DD000
stack
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
5710000
trusted library allocation
page read and write
7E60000
unkown
page read and write
29BA000
trusted library allocation
page read and write
B8AB000
stack
page read and write
54E000
heap
page read and write
184D9BB0000
heap
page read and write
B640000
unkown
page read and write
3030000
unkown
page read and write
54B5000
trusted library allocation
page read and write
17A3E1A0000
heap
page read and write
28DE000
stack
page read and write
3338000
heap
page read and write
340C000
heap
page read and write
54C1000
trusted library allocation
page read and write
1B9BA850000
trusted library allocation
page read and write
3365000
heap
page read and write
53F000
heap
page read and write
7FF5ED93B000
unkown
page readonly
1B9C9259000
trusted library allocation
page read and write
1370000
unkown
page read and write
322A000
trusted library allocation
page read and write
7FF5ED8C1000
unkown
page readonly
321A000
trusted library allocation
page read and write
29A1000
trusted library allocation
page read and write
29BD000
trusted library allocation
page read and write
7FAF279000
stack
page read and write
54ED000
trusted library allocation
page read and write
3400000
unkown
page read and write
7FAF2F8000
stack
page read and write
54F4000
trusted library allocation
page read and write
521000
heap
page read and write
2A93000
trusted library allocation
page read and write
54B5000
trusted library allocation
page read and write
2B1A000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
3010000
unkown
page read and write
3439000
stack
page read and write
6020000
trusted library allocation
page read and write
F7C4000
unkown
page read and write
7FDF0000
trusted library allocation
page execute and read and write
322A000
trusted library allocation
page read and write
53F000
heap
page read and write
3659000
stack
page read and write
15F3BFC0000
trusted library allocation
page read and write
1A1BFD000
stack
page read and write
140000
heap
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
7FF71C17C000
unkown
page read and write
2E49F8EA000
heap
page read and write
3141000
trusted library allocation
page read and write
7FF5ED602000
unkown
page readonly
190000
heap
page read and write
1E000730000
heap
page execute and read and write
5CF0000
trusted library allocation
page read and write
8B60000
unkown
page readonly
322A000
trusted library allocation
page read and write
311A000
trusted library allocation
page read and write
2A7C000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
33E5000
heap
page read and write
15F548D3000
heap
page read and write
321A000
trusted library allocation
page read and write
7FFD9BEE0000
trusted library allocation
page read and write
9080DFE000
stack
page read and write
7DA0000
unkown
page read and write
2A2C000
trusted library allocation
page read and write
AAFC000
unkown
page read and write
3010000
unkown
page read and write
2ACB000
trusted library allocation
page read and write
2A29000
trusted library allocation
page read and write
3010000
unkown
page read and write
55F1000
heap
page read and write
30A1000
remote allocation
page execute and read and write
C846000
unkown
page read and write
54BB000
trusted library allocation
page read and write
54F0000
heap
page read and write
3385000
heap
page read and write
1E01C1C7000
heap
page read and write
3184000
trusted library allocation
page read and write
3BCD3FF000
stack
page read and write
1370000
unkown
page read and write
5FF0000
trusted library allocation
page execute and read and write
3420000
unkown
page read and write
54D8000
trusted library allocation
page read and write
33FA000
heap
page read and write
97A9000
unkown
page read and write
3124000
trusted library allocation
page read and write
2B8D000
trusted library allocation
page read and write
3010000
unkown
page read and write
2ACA000
trusted library allocation
page read and write
C000057000
direct allocation
page read and write
312B000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
686000
heap
page read and write
7FF5ED46A000
unkown
page readonly
7FF5ED409000
unkown
page readonly
4B90000
unkown
page read and write
405000
unkown
page readonly
3385000
heap
page read and write
7DA0000
unkown
page read and write
1D5000
heap
page read and write
54B5000
trusted library allocation
page read and write
C000104000
direct allocation
page read and write
3400000
unkown
page read and write
3010000
unkown
page read and write
7FF5ED412000
unkown
page readonly
2B6E000
trusted library allocation
page read and write
1B9B8F50000
heap
page execute and read and write
60000
direct allocation
page read and write
3010000
unkown
page read and write
AB49000
unkown
page read and write
C0000
heap
page read and write
7DA0000
unkown
page read and write
534000
heap
page read and write
3010000
unkown
page read and write
3010000
unkown
page read and write
7E70000
unkown
page read and write
3797000
unkown
page read and write
3400000
unkown
page read and write
1370000
unkown
page read and write
2AD5000
trusted library allocation
page read and write
2AFD000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
534000
heap
page read and write
1E01A950000
heap
page read and write
AA90000
unkown
page read and write
7DA0000
unkown
page read and write
528000
heap
page read and write
79B1000
unkown
page read and write
A21E000
stack
page read and write
7FFD9BB89000
trusted library allocation
page read and write
BDC0000
unkown
page readonly
339A000
heap
page read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
3125000
trusted library allocation
page read and write
29F8000
trusted library allocation
page read and write
2A15000
trusted library allocation
page read and write
1370000
unkown
page read and write
4BE1000
unkown
page read and write
54E000
heap
page read and write
54CD000
trusted library allocation
page read and write
33E2000
heap
page read and write
9B20000
unkown
page read and write
AAF6000
unkown
page read and write
15F3BFF1000
trusted library allocation
page read and write
7D20000
unkown
page readonly
7F40000
unkown
page readonly
2A28000
trusted library allocation
page read and write
534000
heap
page read and write
322A000
trusted library allocation
page read and write
97C3000
unkown
page read and write
986F000
unkown
page read and write
54E000
heap
page read and write
312B000
trusted library allocation
page read and write
1FBFFCB2000
direct allocation
page read and write
C0003B2000
direct allocation
page read and write
3FB7000
unclassified section
page read and write
2BC3000
trusted library allocation
page read and write
4C50000
unkown
page read and write
14CA4655000
heap
page read and write
33FC000
heap
page read and write
2A83000
trusted library allocation
page read and write
3010000
unkown
page read and write
6C0000
heap
page read and write
2B00000
trusted library allocation
page read and write
C000307000
direct allocation
page read and write
5526000
trusted library allocation
page read and write
C000004000
direct allocation
page read and write
8000000
unkown
page read and write
2240000
heap
page read and write
54E000
heap
page read and write
90000
trusted library section
page read and write
3206000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
9815000
unkown
page read and write
7FF5ED94A000
unkown
page readonly
311B000
trusted library allocation
page read and write
34AA000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
3460000
unkown
page read and write
A32A000
unkown
page read and write
2A4C000
trusted library allocation
page read and write
87C0000
unkown
page read and write
53F000
heap
page read and write
1E0026CE000
trusted library allocation
page read and write
3176000
trusted library allocation
page read and write
29DB000
trusted library allocation
page read and write
2AE1000
trusted library allocation
page read and write
15F3A5B0000
heap
page read and write
7FF5ED43A000
unkown
page readonly
5680000
trusted library allocation
page read and write
4F10000
remote allocation
page read and write
33FC000
heap
page read and write
3365000
heap
page read and write
7FF5ED50A000
unkown
page readonly
310E000
trusted library allocation
page read and write
3010000
unkown
page read and write
1FBFFD80000
direct allocation
page read and write
1E01BAF2000
trusted library allocation
page read and write
3F10000
direct allocation
page read and write
11C0000
unkown
page readonly
987B000
unkown
page read and write
7FF5ED8AC000
unkown
page readonly
7DC0000
unkown
page read and write
3218000
trusted library allocation
page read and write
1D7000
heap
page read and write
2A63000
trusted library allocation
page read and write
2B53000
trusted library allocation
page read and write
1B9B6F3D000
heap
page read and write
87C0000
unkown
page read and write
401000
unkown
page execute and read and write
3F71000
unclassified section
page execute read
33D2000
heap
page read and write
7FF5ED6B9000
unkown
page readonly
3010000
unkown
page read and write
7FFD9BC70000
trusted library allocation
page read and write
15F3C09A000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7DA0000
unkown
page read and write
3208000
trusted library allocation
page read and write
3010000
unkown
page read and write
1370000
unkown
page read and write
322A000
trusted library allocation
page read and write
5C3000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
7852000
unkown
page read and write
2A7B000
trusted library allocation
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
13A0000
unkown
page read and write
C0000F8000
direct allocation
page read and write
2C3F000
stack
page read and write
1B9BA741000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
C00027C000
direct allocation
page read and write
3209000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
534000
heap
page read and write
7FFD9BF10000
trusted library allocation
page read and write
7FF5ED476000
unkown
page readonly
7DD0000
unkown
page read and write
130000
heap
page read and write
7FFD9BD74000
trusted library allocation
page read and write
7FB000E000
stack
page read and write
3117000
trusted library allocation
page read and write
BD98000
stack
page read and write
340C000
heap
page read and write
7DC0000
unkown
page read and write
20017C80000
heap
page read and write
3010000
unkown
page read and write
4F4E000
stack
page read and write
C4000
trusted library allocation
page read and write
15F3A490000
heap
page read and write
3400000
unkown
page read and write
7DA0000
unkown
page read and write
2A35000
trusted library allocation
page read and write
580000
heap
page read and write
20019A00000
heap
page read and write
7FF5ED507000
unkown
page readonly
7DC0000
unkown
page read and write
9B20000
unkown
page read and write
7695000
stack
page read and write
54E000
heap
page read and write
322A000
trusted library allocation
page read and write
1E001EFE000
heap
page read and write
15F548F0000
heap
page read and write
7DA0000
unkown
page read and write
AAF9000
unkown
page read and write
3010000
unkown
page read and write
1E01BAD0000
trusted library allocation
page read and write
8740000
unkown
page read and write
7FF5ED939000
unkown
page readonly
33CE000
heap
page read and write
1E00074E000
heap
page read and write
3206000
trusted library allocation
page read and write
33B9000
stack
page read and write
54E000
heap
page read and write
C0003BA000
direct allocation
page read and write
1B9B8DE3000
trusted library allocation
page read and write
29EB000
trusted library allocation
page read and write
3229000
trusted library allocation
page read and write
13A0000
unkown
page read and write
27A7000
unclassified section
page read and write
2A99000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
284F000
stack
page read and write
2E49F8D0000
heap
page read and write
7DF4F3071000
unkown
page execute read
7DA0000
unkown
page read and write
3403000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
979C000
unkown
page read and write
53F000
heap
page read and write
C000260000
direct allocation
page read and write
310F000
trusted library allocation
page read and write
54E000
heap
page read and write
3010000
unkown
page read and write
7DA0000
unkown
page read and write
3010000
unkown
page read and write
54BE000
trusted library allocation
page read and write
87C0000
unkown
page read and write
1B9B8910000
trusted library allocation
page read and write
2A03000
trusted library allocation
page read and write
2A2B000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
1E0004F8000
heap
page read and write
3460000
unkown
page read and write
3460000
unkown
page read and write
3218000
trusted library allocation
page read and write
C0000EC000
direct allocation
page read and write
7FFD9BD80000
trusted library allocation
page read and write
2B5A000
trusted library allocation
page read and write
54E000
heap
page read and write
5CF0000
trusted library allocation
page read and write
577E000
stack
page read and write
530000
heap
page read and write
1B9BA3C3000
trusted library allocation
page read and write
883B000
stack
page read and write
1E01D94A000
heap
page read and write
3280000
heap
page read and write
2A7A000
trusted library allocation
page read and write
1E002796000
trusted library allocation
page read and write
534000
heap
page read and write
3218000
trusted library allocation
page read and write
29BC000
trusted library allocation
page read and write
9C80000
unkown
page read and write
7FF71C7A9000
unkown
page read and write
8740000
unkown
page read and write
4E8E000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7DF4C2070000
trusted library allocation
page execute and read and write
3165000
trusted library allocation
page read and write
54E000
heap
page read and write
3020000
unkown
page read and write
33FE000
heap
page read and write
3691000
trusted library allocation
page read and write
19E000
stack
page read and write
54C4000
trusted library allocation
page read and write
3FAE000
unclassified section
page readonly
2B4E000
trusted library allocation
page read and write
2A16000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
316E000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
C00000C000
direct allocation
page read and write
2A5D000
trusted library allocation
page read and write
CA63000
unkown
page read and write
1E00231E000
trusted library allocation
page read and write
C00006E000
direct allocation
page read and write
401000
unkown
page execute read
7DC0000
unkown
page read and write
C964000
unkown
page read and write
54D8000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
C000068000
direct allocation
page read and write
A375000
unkown
page read and write
312F000
trusted library allocation
page read and write
76A0000
unkown
page read and write
3D3E000
trusted library allocation
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
3756000
unkown
page read and write
3BCE3FE000
stack
page read and write
4BDC000
unkown
page read and write
7DA0000
unkown
page read and write
9B20000
unkown
page read and write
2997000
trusted library allocation
page read and write
C0000D0000
direct allocation
page read and write
15F3A380000
heap
page read and write
797D000
unkown
page read and write
1B9C9246000
trusted library allocation
page read and write
C000172000
direct allocation
page read and write
7CF000
stack
page read and write
7FFD9BC00000
trusted library allocation
page read and write
315A000
trusted library allocation
page read and write
C00003A000
direct allocation
page read and write
7FF5ED516000
unkown
page readonly
54C5000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
1F557FF000
stack
page read and write
35A0000
unkown
page readonly
C00001A000
direct allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
7FF5ED996000
unkown
page readonly
7FFD9BAB0000
trusted library allocation
page execute and read and write
A01C000
stack
page read and write
405000
unkown
page readonly
7FE08000
trusted library allocation
page execute and read and write
420000
heap
page read and write
7DA0000
unkown
page read and write
C0003BE000
direct allocation
page read and write
320C000
trusted library allocation
page read and write
2BAC000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
53F000
heap
page read and write
7DC0000
unkown
page read and write
401000
unkown
page execute read
3403000
heap
page read and write
F68B000
unkown
page read and write
560000
heap
page read and write
313C000
trusted library allocation
page read and write
2A0B000
trusted library allocation
page read and write
C4A0000
unkown
page read and write
4F10000
trusted library allocation
page read and write
87C0000
unkown
page read and write
3A6E000
stack
page read and write
2B1B000
trusted library allocation
page read and write
ED19FFD000
stack
page read and write
C0000D2000
direct allocation
page read and write
2B4B000
trusted library allocation
page read and write
3030000
unkown
page read and write
54E000
heap
page read and write
3460000
unkown
page read and write
1E012357000
trusted library allocation
page read and write
C00030C000
direct allocation
page read and write
33FE000
heap
page read and write
7FF5EDA08000
unkown
page readonly
534000
heap
page read and write
3010000
unkown
page read and write
3158000
trusted library allocation
page read and write
4CD0000
unkown
page read and write
7FF6416E2000
unkown
page read and write
C893000
unkown
page read and write
3400000
unkown
page read and write
A39B000
unkown
page read and write
7FF71BC41000
unkown
page execute read
87C0000
unkown
page read and write
5514000
trusted library allocation
page read and write
3239000
trusted library allocation
page read and write
1E000700000
heap
page read and write
7DA0000
unkown
page read and write
3BCB15F000
stack
page read and write
3199000
trusted library allocation
page read and write
AB01000
unkown
page read and write
3460000
unkown
page read and write
3157000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7FF5ED1CF000
unkown
page readonly
1370000
unkown
page read and write
3218000
trusted library allocation
page read and write
345A000
trusted library allocation
page read and write
7861000
unkown
page read and write
BDA0000
unkown
page readonly
3118000
trusted library allocation
page read and write
33D6000
heap
page read and write
7DA0000
unkown
page read and write
33F2000
heap
page read and write
3141000
trusted library allocation
page read and write
C516000
unkown
page read and write
3117000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
4F0000
heap
page read and write
3112000
trusted library allocation
page read and write
3010000
unkown
page read and write
C00026F000
direct allocation
page read and write
2B6F000
trusted library allocation
page read and write
2E4A1318000
heap
page read and write
534000
heap
page read and write
C700000
unkown
page read and write
3010000
unkown
page read and write
715000
heap
page read and write
3400000
unkown
page read and write
2BBF000
trusted library allocation
page read and write
15F3A4FF000
heap
page read and write
2B50000
trusted library allocation
page read and write
B0000
trusted library allocation
page read and write
15F4BFF7000
trusted library allocation
page read and write
C0000B8000
direct allocation
page read and write
7DA0000
unkown
page read and write
3010000
unkown
page read and write
7FF5ED8E7000
unkown
page readonly
7FFD9BC70000
trusted library allocation
page read and write
2BCC000
trusted library allocation
page read and write
9B60000
unkown
page readonly
C89A000
unkown
page read and write
1B9C925B000
trusted library allocation
page read and write
55F8000
trusted library allocation
page read and write
2BBE000
trusted library allocation
page read and write
17A3E0B0000
heap
page read and write
3BD118D000
stack
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
3159000
trusted library allocation
page read and write
2E49F879000
heap
page read and write
7DB0000
unkown
page read and write
3010000
unkown
page read and write
A49E000
unkown
page read and write
54BB000
trusted library allocation
page read and write
986B000
unkown
page read and write
49A000
heap
page read and write
6000000
trusted library allocation
page read and write
3128000
trusted library allocation
page read and write
6C920000
unkown
page readonly
7FF5ED46E000
unkown
page readonly
1370000
unkown
page read and write
54D5000
trusted library allocation
page read and write
7FFD9BD24000
trusted library allocation
page read and write
33D3000
heap
page read and write
1370000
unkown
page read and write
1E0003B0000
unkown
page readonly
1B9B6F00000
heap
page read and write
3460000
unkown
page read and write
3157000
trusted library allocation
page read and write
7FF5ED6DB000
unkown
page readonly
3010000
unkown
page read and write
54B9000
trusted library allocation
page read and write
9590000
unkown
page read and write
18AD7FF000
stack
page read and write
2A36000
trusted library allocation
page read and write
18A0000
unkown
page readonly
7FF5ED937000
unkown
page readonly
C000164000
direct allocation
page read and write
1230000
unkown
page read and write
7DD0000
unkown
page read and write
ED19EF7000
stack
page read and write
F699000
unkown
page read and write
F8A0000
unkown
page read and write
54E000
heap
page read and write
2B79000
trusted library allocation
page read and write
1B9D136B000
heap
page read and write
3010000
unkown
page read and write
C00012C000
direct allocation
page read and write
3010000
unkown
page read and write
510000
heap
page read and write
33EF000
heap
page read and write
8740000
unkown
page read and write
1B9B8980000
heap
page read and write
87C0000
unkown
page read and write
312C000
trusted library allocation
page read and write
9879000
unkown
page read and write
91B8000
stack
page read and write
3010000
unkown
page read and write
1FBFF178000
direct allocation
page read and write
B6A0000
heap
page read and write
54A1000
trusted library allocation
page read and write
7FF5EDA0B000
unkown
page readonly
3206000
trusted library allocation
page read and write
343A000
trusted library allocation
page read and write
3400000
unkown
page read and write
15F548E0000
heap
page read and write
322A000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
402000
unkown
page readonly
7FF5ED961000
unkown
page readonly
3795000
unkown
page read and write
3402000
heap
page read and write
1E0024F7000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
3162000
trusted library allocation
page read and write
2A2D000
trusted library allocation
page read and write
53F000
heap
page read and write
7FF5ED9FF000
unkown
page readonly
5FE0000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
21CF000
stack
page read and write
B510000
heap
page read and write
252C000
stack
page read and write
7F2E000
stack
page read and write
3BD2D8B000
stack
page read and write
53F000
heap
page read and write
33FA000
heap
page read and write
1E000745000
heap
page read and write
7DC0000
unkown
page read and write
7FF5ED9A6000
unkown
page readonly
1370000
unkown
page read and write
1B9B6F45000
heap
page read and write
87C0000
unkown
page read and write
15F3A560000
heap
page read and write
3400000
unkown
page read and write
2AD4000
trusted library allocation
page read and write
3010000
unkown
page read and write
7DC0000
unkown
page read and write
3010000
unkown
page read and write
5E1E000
stack
page read and write
3121000
trusted library allocation
page read and write
3010000
unkown
page read and write
8BF0000
unkown
page readonly
3010000
unkown
page read and write
7DC0000
unkown
page read and write
3107000
trusted library allocation
page read and write
7FF5ED743000
unkown
page readonly
1B9C8F61000
trusted library allocation
page read and write
7FAEFFF000
stack
page read and write
1E01D890000
heap
page read and write
4E92000
trusted library allocation
page read and write
C000190000
direct allocation
page read and write
53F000
heap
page read and write
7FF71C17E000
unkown
page write copy
2B3E000
stack
page read and write
2ACE000
trusted library allocation
page read and write
585000
heap
page read and write
6030000
trusted library allocation
page read and write
7DB0000
unkown
page read and write
2B2F000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
A4FC000
unkown
page read and write
3460000
unkown
page read and write
3010000
unkown
page read and write
7FFD9BB4E000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7DA0000
unkown
page read and write
54E9000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
1370000
unkown
page read and write
3205000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
9795000
unkown
page read and write
170000
trusted library allocation
page execute and read and write
3BCCFFD000
stack
page read and write
33F6000
heap
page read and write
54C2000
trusted library allocation
page read and write
18AD32B000
stack
page read and write
3400000
unkown
page read and write
2AB0000
trusted library allocation
page read and write
28BD000
stack
page read and write
7FF5ED660000
unkown
page readonly
3403000
heap
page read and write
7DA0000
unkown
page read and write
410000
heap
page read and write
7FAF3FE000
stack
page read and write
53F000
heap
page read and write
7DC0000
unkown
page read and write
7FF5ED1BC000
unkown
page readonly
321A000
trusted library allocation
page read and write
54E000
heap
page read and write
7FF5ED864000
unkown
page readonly
534000
heap
page read and write
3010000
unkown
page read and write
3030000
unkown
page read and write
35D0000
unkown
page read and write
87C0000
unkown
page read and write
20017C8E000
heap
page read and write
54F1000
heap
page read and write
2BC5000
trusted library allocation
page read and write
7FFD9BE80000
trusted library allocation
page read and write
89C0000
unkown
page read and write
29EC000
trusted library allocation
page read and write
33E2000
heap
page read and write
7FF71C0E3000
unkown
page write copy
9C80000
unkown
page read and write
7FFD9BE60000
trusted library allocation
page read and write
53F000
heap
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
534000
heap
page read and write
C0003D4000
direct allocation
page read and write
4E70000
trusted library allocation
page read and write
7FF6415F1000
unkown
page execute read
1220000
unkown
page readonly
322A000
trusted library allocation
page read and write
53F000
heap
page read and write
4FD0000
trusted library allocation
page read and write
2859000
trusted library allocation
page execute and read and write
321A000
trusted library allocation
page read and write
3010000
unkown
page read and write
601F000
stack
page read and write
8A6E000
stack
page read and write
C6F4000
unkown
page read and write
2B0D000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
1510000
unkown
page readonly
4E20000
heap
page read and write
4E80000
trusted library allocation
page read and write
9081BFC000
stack
page read and write
F6C4000
unkown
page read and write
1E01A9A7000
heap
page read and write
1E002254000
heap
page read and write
7DA0000
unkown
page read and write
29D9000
trusted library allocation
page read and write
2A27000
trusted library allocation
page read and write
7DA0000
unkown
page read and write
7FB008E000
stack
page read and write
402000
unkown
page readonly
7CF000
stack
page read and write
1F5532B000
stack
page read and write
9080FFF000
stack
page read and write
3165000
trusted library allocation
page read and write
9DED000
stack
page read and write
1B9B7120000
heap
page read and write
7FFD9B992000
trusted library allocation
page read and write
2A0E000
trusted library allocation
page read and write
4FCD000
stack
page read and write
7FF6416E2000
unkown
page read and write
4F10000
trusted library allocation
page read and write
1E002220000
heap
page execute and read and write
37B0000
unkown
page read and write
C0000DA000
direct allocation
page read and write
3400000
unkown
page read and write
33CE000
heap
page read and write
1370000
unkown
page read and write
1240000
heap
page read and write
3187000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
There are 3669 hidden memdumps, click here to show them.