IOC Report
SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\5BB2.tmp.x.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7DF0.tmp.zx.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\libffi-7.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\python38.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI14002\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js
ASCII text, with very long lines (1743), with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\{B268D441C1ED2974164258}\{B268D441C1ED2974164258}.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{B268D441C1ED2974164258}\{B268D441C1ED2974164258}.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF, CR line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5BB2.tmp.x.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000015.db
data
dropped
C:\Users\user\AppData\Local\Temp\TH2197.tmp
data
modified
C:\Users\user\AppData\Local\Temp\TH457A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TH6566.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TH8552.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\_MEI14002\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI14002\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI14002\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI14002\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI14002\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MicrosoftEdgeUpdate.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, ctime=Sat Oct 19 11:03:06 2024, mtime=Sat Oct 19 11:03:31 2024, atime=Sat Oct 19 11:03:05 2024, length=285696, window=hide
dropped
There are 55 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\{B268D441C1ED2974164258}\{B268D441C1ED2974164258}.exe
"C:\Users\user\AppData\Roaming\{B268D441C1ED2974164258}\{B268D441C1ED2974164258}.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
malicious
C:\Users\user\AppData\Local\Temp\5BB2.tmp.x.exe
"C:\Users\user\AppData\Local\Temp\5BB2.tmp.x.exe"
malicious
C:\Users\user\AppData\Roaming\{B268D441C1ED2974164258}\{B268D441C1ED2974164258}.exe
"C:\Users\user\AppData\Roaming\{B268D441C1ED2974164258}\{B268D441C1ED2974164258}.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
malicious
C:\Users\user\AppData\Local\Temp\7DF0.tmp.zx.exe
"C:\Users\user\AppData\Local\Temp\7DF0.tmp.zx.exe"
malicious
C:\Users\user\AppData\Roaming\{B268D441C1ED2974164258}\{B268D441C1ED2974164258}.exe
"C:\Users\user\AppData\Roaming\{B268D441C1ED2974164258}\{B268D441C1ED2974164258}.exe"
malicious
C:\Users\user\AppData\Local\Temp\7DF0.tmp.zx.exe
"C:\Users\user\AppData\Local\Temp\7DF0.tmp.zx.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
malicious
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://176.111.174.140/api/loader.bin
176.111.174.140
malicious
http://176.111.174.140/api/bot64.bin
176.111.174.140
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://api.ip.sb/ip
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.datacontract.org/2004/07/System.ServiceModel
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
https://word.office.comon
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://schemas.micro
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://tempuri.org/:hardwares.
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://tempuri.org/Entity/Id13Response
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://tempuri.org/Entity/Id12ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://176.111.174.140/api/bot64.binom
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://tempuri.org/Entity/Id7ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Entity/Id4ResponseD
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2002/12/policy
unknown
http://tempuri.org/Entity/Id22Response
unknown
http://tempuri.org/Entity/Id22ResponseD
unknown
http://tempuri.org/Entity/Id16ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
unknown
http://tempuri.org/Entity/Id19ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc
unknown
http://tempuri.org/Entity/Id18Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
unknown
https://www.openssl.org/H
unknown
http://tempuri.org/Entity/Id3Response
unknown
http://schemas.datacontract.org/2004/07/System.ServiceModelD
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
176.111.174.140
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Hidden
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Services
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ebnzvat\{O268Q441P1RQ2974164258}\{O268Q441P1RQ2974164258}.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000204A2
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020472
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
{N77S5Q77-2R2O-44P3-N6N2-NON601054N51}\Fgneghc\ZvpebfbsgRqtrHcqngr.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
b
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ebnzvat\{O268Q441P1RQ2974164258}\{O268Q441P1RQ2974164258}.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
{N77S5Q77-2R2O-44P3-N6N2-NON601054N51}\Fgneghc\ZvpebfbsgRqtrHcqngr.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ebnzvat\{O268Q441P1RQ2974164258}\{O268Q441P1RQ2974164258}.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 171 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5D2000
unkown
page readonly
malicious
AA42000
unkown
page read and write
malicious
2431721D000
heap
page read and write
20CBCD80000
heap
page read and write
246C8420000
trusted library allocation
page read and write
86D0000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF5D760E000
unkown
page readonly
AC5000
heap
page read and write
7FF5D71C4000
unkown
page readonly
38E1000
trusted library allocation
page read and write
7FF5D7272000
unkown
page readonly
CA34000
unkown
page read and write
1109D000
unkown
page execute and read and write
246C8470000
trusted library allocation
page read and write
7FF5D7429000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
B330000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
5D7C000
heap
page read and write
3535000
unkown
page read and write
7C90000
unkown
page read and write
2431721D000
heap
page read and write
4E02000
trusted library allocation
page read and write
7FF779E90000
unkown
page readonly
25F1AAB0000
trusted library allocation
page read and write
3489000
stack
page read and write
7FF5D77B9000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
7FF5D66E3000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
CA53000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
C90F000
unkown
page read and write
2431721E000
heap
page read and write
246C8470000
trusted library allocation
page read and write
2E90000
unkown
page read and write
9A72000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
95FB000
stack
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
3378000
unkown
page execute and read and write
53E1000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
DF0000
heap
page read and write
C617000
unkown
page read and write
25F1A880000
heap
page read and write
7FF779E91000
unkown
page execute read
54DA000
trusted library allocation
page read and write
7FF6BCCCF000
unkown
page write copy
246C8420000
trusted library allocation
page read and write
2FE2000
trusted library allocation
page read and write
AA06000
unkown
page read and write
7FF5D76AF000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF5D72C8000
unkown
page readonly
8A75000
unkown
page read and write
2CAA000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
5D30000
heap
page read and write
9B2C000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
1000000
heap
page read and write
7FF5D6BE4000
unkown
page readonly
158F7DDD000
heap
page read and write
362D000
unkown
page read and write
CB6B000
unkown
page read and write
6DD8000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
104CD000
stack
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
25F1AAB0000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D744E000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
977E000
stack
page read and write
6B60000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
BB0D000
stack
page read and write
738E000
stack
page read and write
246C8470000
trusted library allocation
page read and write
7FF67F57F000
unkown
page read and write
7AE0000
unkown
page read and write
7FF5D77FD000
unkown
page readonly
7440000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
24385150000
trusted library allocation
page read and write
1160000
unkown
page read and write
B980000
unkown
page readonly
5D00000
heap
page read and write
7C80000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
3120000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
EF0000
heap
page read and write
7FF5CE33D000
unkown
page readonly
C460000
unkown
page read and write
CA30000
unkown
page read and write
7FF5D732D000
unkown
page readonly
35CF000
unkown
page read and write
5DAA000
heap
page read and write
246C8420000
trusted library allocation
page read and write
362A000
unkown
page read and write
4A40000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
4ED5000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
CAD5000
unkown
page read and write
1383000
heap
page read and write
35D3000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D717C000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
6DEA000
trusted library allocation
page read and write
CAE5000
unkown
page read and write
3957000
trusted library allocation
page read and write
7B80000
unkown
page readonly
20B4D5F0000
heap
page read and write
E8CD000
stack
page read and write
1CC9D802000
heap
page read and write
246C8420000
trusted library allocation
page read and write
3975000
trusted library allocation
page read and write
227EABB0000
trusted library allocation
page read and write
A9E9000
unkown
page read and write
20CBCDA0000
trusted library allocation
page read and write
CA30000
unkown
page read and write
7FF5D7764000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
4B00000
unkown
page read and write
20CBCDA0000
trusted library allocation
page read and write
7FF5D7703000
unkown
page readonly
C5F0000
unkown
page read and write
2E90000
unkown
page read and write
B5E28F7000
stack
page read and write
246C8420000
trusted library allocation
page read and write
35D5000
unkown
page read and write
7FF5D743F000
unkown
page readonly
7FF5D7280000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
24385180000
heap
page read and write
158F9E20000
heap
page read and write
227EAC10000
heap
page read and write
4986000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
6ADB000
heap
page read and write
25F1A960000
heap
page read and write
25F1AAB0000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D72CE000
unkown
page readonly
985B000
unclassified section
page read and write
CA32000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
3C7A000
trusted library allocation
page read and write
49B82FE000
stack
page read and write
F0730F7000
stack
page read and write
21940290000
trusted library allocation
page read and write
740E000
stack
page read and write
246C8420000
trusted library allocation
page read and write
A20000
heap
page read and write
4A90000
unkown
page read and write
4AB0000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF779ECE000
unkown
page write copy
7FF5D74F2000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
3B55000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D77EB000
unkown
page readonly
35E4000
unkown
page read and write
5D42000
heap
page read and write
246C8420000
trusted library allocation
page read and write
CA30000
unkown
page read and write
2431721D000
heap
page read and write
C4BD000
unkown
page read and write
24317210000
heap
page read and write
246C8470000
trusted library allocation
page read and write
7FF78FA8F000
unkown
page read and write
B2D000
trusted library allocation
page execute and read and write
C035000
stack
page read and write
49FA000
unkown
page read and write
997C000
stack
page read and write
246C8420000
trusted library allocation
page read and write
158F9D80000
direct allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7244000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
AAA9000
unkown
page read and write
BE90000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
4A0E000
unkown
page read and write
A2D7000
unkown
page read and write
1CC9D82E000
heap
page read and write
24317210000
heap
page read and write
246C8420000
trusted library allocation
page read and write
AD4FDFF000
stack
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7385000
unkown
page readonly
A9FD000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
8BB0000
unkown
page execute and read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
54E2000
trusted library allocation
page read and write
39A2000
trusted library allocation
page read and write
158F7EA4000
heap
page read and write
7FF5D71AF000
unkown
page readonly
F0E2000
heap
page read and write
A237000
unkown
page read and write
7AE0000
unkown
page read and write
24317210000
heap
page read and write
246C8420000
trusted library allocation
page read and write
CA38000
unkown
page read and write
8B70000
unkown
page execute and read and write
C496000
unkown
page read and write
7FF5D77F0000
unkown
page readonly
7CB0000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
C617000
unkown
page read and write
C62D000
unkown
page read and write
5BA0000
trusted library allocation
page read and write
A12F000
stack
page read and write
7B10000
unkown
page read and write
20B4D68A000
heap
page read and write
1009B000
unkown
page read and write
6DC9000
trusted library allocation
page read and write
AE1D000
stack
page read and write
246C8420000
trusted library allocation
page read and write
2B8A000
trusted library allocation
page read and write
A3AA000
unkown
page read and write
9A9E000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D706B000
unkown
page readonly
7FF5D73F5000
unkown
page readonly
C642000
unkown
page read and write
EF72000
unkown
page read and write
C86C000
unkown
page read and write
158F9660000
direct allocation
page read and write
100D3000
unkown
page read and write
C7A000
heap
page read and write
2D76000
trusted library allocation
page read and write
535E000
stack
page read and write
7AA0000
unkown
page read and write
CB46000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
9B2C000
unkown
page read and write
2431721D000
heap
page read and write
C663000
unkown
page read and write
4AC0000
unkown
page read and write
1160000
unkown
page read and write
20B4D655000
heap
page read and write
2EB0000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
BF3E000
stack
page read and write
9A92000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
760F000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
2EAD000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
227EA9AD000
heap
page read and write
5DCC000
heap
page read and write
7FF5D77E0000
unkown
page readonly
6EF0000
trusted library allocation
page execute and read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
C61D000
unkown
page read and write
7FF5D749B000
unkown
page readonly
7FF5D760B000
unkown
page readonly
9AAC000
unkown
page read and write
7FF779EBB000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
84D6000
unkown
page read and write
7FF5D765F000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
EF4D000
unkown
page read and write
7FF5D741F000
unkown
page readonly
A23A000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7206000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
A33F000
unkown
page read and write
9B91000
unkown
page read and write
7FF5D774C000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
3AF2000
trusted library allocation
page read and write
7FF5D776D000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
CA32000
unkown
page read and write
C615000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
3520000
unkown
page readonly
7FF78FA91000
unkown
page write copy
1281000
unkown
page readonly
84E8000
unkown
page read and write
2C50000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
C44F000
stack
page read and write
C8DE000
unkown
page read and write
35C3000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
5B90000
trusted library allocation
page execute and read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
3534000
unkown
page read and write
9AB2000
unkown
page read and write
7FF5D719C000
unkown
page readonly
A237000
unkown
page read and write
10154000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
CAF6000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
9A8C000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
9ABD000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D71D7000
unkown
page readonly
7FF5CE343000
unkown
page readonly
C609000
unkown
page read and write
7E60000
unkown
page read and write
7FF5D72DF000
unkown
page readonly
7618000
unkown
page read and write
7FF5D7745000
unkown
page readonly
158F7E96000
heap
page read and write
3378000
unkown
page execute read
3B12000
trusted library allocation
page read and write
39C9000
trusted library allocation
page read and write
7FF5D7691000
unkown
page readonly
C460000
unkown
page read and write
5AD0000
trusted library allocation
page execute and read and write
7FF5D75AF000
unkown
page readonly
7FF8B8300000
unkown
page readonly
48A5DDF000
stack
page read and write
EF56000
unkown
page read and write
7FF8A8D0A000
unkown
page readonly
3A59000
trusted library allocation
page read and write
2AC6000
trusted library allocation
page read and write
5DBF000
heap
page read and write
AA06000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
39B4000
trusted library allocation
page read and write
8B9A000
unkown
page execute and read and write
246C8470000
trusted library allocation
page read and write
7FF779ED4000
unkown
page read and write
7FF8BFB9E000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
243851ED000
heap
page read and write
35C9000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
9AB4000
unkown
page read and write
49B83FE000
stack
page read and write
246C8470000
trusted library allocation
page read and write
8161CE000
stack
page read and write
7FF5D705D000
unkown
page readonly
7FF779EBB000
unkown
page readonly
3280000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
927E000
stack
page read and write
CA3E000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
2193E813000
heap
page read and write
7FF5D75D9000
unkown
page readonly
98FD000
stack
page read and write
7FF5D7745000
unkown
page readonly
7FF6BCCA1000
unkown
page execute read
390B000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
3CC3000
trusted library allocation
page read and write
7FF8C6F40000
unkown
page execute and read and write
246C8420000
trusted library allocation
page read and write
7FF5D719C000
unkown
page readonly
7FF5D7639000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
C73E000
unkown
page read and write
7FF779E90000
unkown
page readonly
7FF6BCCE3000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7799000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF5D71E0000
unkown
page readonly
CA22000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
158F7E45000
heap
page read and write
7FF5D75BF000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
1350000
unkown
page readonly
EF41000
unkown
page read and write
8A70000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
49FD000
unkown
page read and write
158F7E76000
heap
page read and write
7FF6BCCCF000
unkown
page read and write
246C6560000
trusted library allocation
page read and write
C0BA000
stack
page read and write
158F7E21000
heap
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
C1CC000
stack
page read and write
158F7E96000
heap
page read and write
24317110000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7609000
unkown
page read and write
2431721E000
heap
page read and write
20B4F3E1000
direct allocation
page read and write
24317210000
heap
page read and write
7FF5D7202000
unkown
page readonly
6DDA000
trusted library allocation
page read and write
7FF5D771A000
unkown
page readonly
7FF6BCCA0000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF5D77C2000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF6CF96F000
unkown
page write copy
7DF4F2470000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
3AB8000
trusted library allocation
page read and write
5DF0000
heap
page read and write
246C8420000
trusted library allocation
page read and write
BE49000
stack
page read and write
2CF3000
trusted library allocation
page read and write
F1BBF5C000
stack
page read and write
246C8470000
trusted library allocation
page read and write
25F1AA80000
heap
page read and write
8FD9000
stack
page read and write
246C8470000
trusted library allocation
page read and write
24317210000
heap
page read and write
246C8420000
trusted library allocation
page read and write
3500000
stack
page read and write
CA3E000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D774C000
unkown
page readonly
7FF5D762F000
unkown
page readonly
B0E0000
unkown
page readonly
C94D000
unkown
page read and write
101E000
stack
page read and write
7FF5D7452000
unkown
page readonly
6DEF000
trusted library allocation
page read and write
C615000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
F0E0000
heap
page read and write
7FF5D7438000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
CACB000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
CA8A000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
10092000
unkown
page read and write
7FF5D781A000
unkown
page readonly
7FF5D7705000
unkown
page readonly
769A000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
1270000
unkown
page read and write
EF41000
unkown
page read and write
24317210000
heap
page read and write
7FF6BCCC2000
unkown
page readonly
BC4000
heap
page read and write
1731000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
158F7E97000
heap
page read and write
997C000
stack
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
2F42000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D77DA000
unkown
page readonly
24317210000
heap
page read and write
7FF5D741B000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
227EABB0000
trusted library allocation
page read and write
33F0000
unkown
page read and write
748D000
stack
page read and write
20B4D5D0000
heap
page read and write
607000
unkown
page readonly
CAE9000
unkown
page read and write
9A8E000
unkown
page read and write
7FF67F572000
unkown
page readonly
35CD000
unkown
page read and write
2193E800000
heap
page read and write
77DB000
unkown
page read and write
4A16000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D720A000
unkown
page readonly
25F1AAB0000
trusted library allocation
page read and write
75FD000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
3CED000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
E10000
heap
page read and write
2CA0000
trusted library allocation
page read and write
3280000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D75DF000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
1109B000
unkown
page execute and read and write
35B0000
unkown
page read and write
AA04000
unkown
page read and write
7FF5D7792000
unkown
page readonly
3D50000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D72BD000
unkown
page readonly
7DF4F2460000
unkown
page readonly
B330000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
1CC9F2A0000
trusted library allocation
page read and write
AFBE000
stack
page read and write
246C8420000
trusted library allocation
page read and write
C8BA000
unkown
page read and write
7FF5D7760000
unkown
page readonly
7FF6CF940000
unkown
page readonly
20B4D620000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
2A65000
trusted library allocation
page read and write
760D000
unkown
page read and write
7FF67F593000
unkown
page read and write
158F9E07000
heap
page read and write
7FF5D77C2000
unkown
page readonly
77A1000
unkown
page read and write
CAE0000
unkown
page read and write
9EB0000
unkown
page readonly
24317210000
heap
page read and write
C36000
heap
page read and write
8DCF000
stack
page read and write
246C8470000
trusted library allocation
page read and write
1CC9F2A0000
trusted library allocation
page read and write
3C6E000
trusted library allocation
page read and write
3CEF000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
9AF9000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D775C000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D747F000
unkown
page readonly
A220000
unkown
page read and write
7460000
unkown
page read and write
85BE000
stack
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D778A000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
A28D000
unkown
page read and write
246C6570000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
3170000
unkown
page read and write
A40E000
unkown
page read and write
7FF5D71AF000
unkown
page readonly
2E91000
trusted library allocation
page read and write
8880000
unkown
page readonly
2431721E000
heap
page read and write
6B6E000
heap
page read and write
7FF5D7604000
unkown
page readonly
35B3000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
2A7F000
trusted library allocation
page read and write
CA38000
unkown
page read and write
89FE000
stack
page read and write
246C8420000
trusted library allocation
page read and write
1084E000
stack
page read and write
C8DD000
unkown
page read and write
158F9A40000
direct allocation
page read and write
2431721D000
heap
page read and write
246C8420000
trusted library allocation
page read and write
CB46000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
24385150000
trusted library allocation
page read and write
7FF6BCCE7000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
1064D000
stack
page read and write
C5EC000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
C78A000
unkown
page read and write
7FF5D720F000
unkown
page readonly
6DF0000
trusted library allocation
page read and write
94AB000
stack
page read and write
9EE0000
unkown
page execute read
158F9E01000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF6BCCCF000
unkown
page write copy
246C8470000
trusted library allocation
page read and write
5D6B000
heap
page read and write
2D4A000
trusted library allocation
page read and write
24317210000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
24317210000
heap
page read and write
84BB000
stack
page read and write
10BCE000
stack
page read and write
C65E000
unkown
page read and write
5463000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
EB5000
stack
page read and write
246C8420000
trusted library allocation
page read and write
7C31000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
30FB000
stack
page read and write
246C8470000
trusted library allocation
page read and write
9A98000
unkown
page read and write
7CB0000
unkown
page readonly
6DB3000
trusted library allocation
page read and write
1131000
unkown
page read and write
C47F000
unkown
page read and write
6BA000
stack
page read and write
6B6A000
heap
page read and write
24317210000
heap
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
362A000
unkown
page read and write
CA97000
unkown
page read and write
6AA0000
heap
page read and write
7FF7A34DF000
unkown
page read and write
7FF5D7485000
unkown
page readonly
86D0000
unkown
page readonly
7FF5D72D0000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF6BCCC2000
unkown
page readonly
75FD000
unkown
page read and write
158F9E01000
heap
page read and write
246C8470000
trusted library allocation
page read and write
CA3A000
unkown
page read and write
9E2E000
stack
page read and write
7FF6CF987000
unkown
page readonly
7FF8BFB71000
unkown
page execute read
3530000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
1CC9D800000
heap
page read and write
C4DC000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
C8C2000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
6E8D000
stack
page read and write
20B4F3A0000
direct allocation
page read and write
7FF5D76F5000
unkown
page readonly
1CC9F2A0000
trusted library allocation
page read and write
4DF1000
trusted library allocation
page read and write
1131000
unkown
page read and write
362A000
unkown
page read and write
24386A40000
trusted library allocation
page read and write
7FF5D76C8000
unkown
page readonly
C625000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D66E8000
unkown
page readonly
A3B6000
unkown
page read and write
C605000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7DBD000
stack
page read and write
7987000
stack
page read and write
7FF5D7648000
unkown
page readonly
9D67000
unkown
page read and write
1CC9D813000
heap
page read and write
35CD000
unkown
page read and write
7FF5D71BF000
unkown
page readonly
35CF000
unkown
page read and write
9679000
stack
page read and write
35BD000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
5D45000
heap
page read and write
246C8470000
trusted library allocation
page read and write
12706000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D777A000
unkown
page readonly
9A90000
unkown
page read and write
7FF5D72DF000
unkown
page readonly
24317210000
heap
page read and write
C8DE000
unkown
page read and write
3939000
trusted library allocation
page read and write
24317210000
heap
page read and write
7FF5D72FB000
unkown
page readonly
EF56000
unkown
page read and write
5D0000
unkown
page readonly
B4D0000
unkown
page readonly
4E35000
trusted library allocation
page read and write
7FF5D7442000
unkown
page readonly
7FF5D77C7000
unkown
page readonly
B47000
trusted library allocation
page execute and read and write
B5E2CFE000
stack
page read and write
246C8420000
trusted library allocation
page read and write
7AB0000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7AB0000
unkown
page read and write
24317210000
heap
page read and write
35D3000
unkown
page read and write
5CF0000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
B85A000
stack
page read and write
7FF779ED3000
unkown
page read and write
20CBCDA0000
trusted library allocation
page read and write
3626000
unkown
page read and write
779E000
unkown
page read and write
C85F000
unkown
page read and write
24317210000
heap
page read and write
7FF67F550000
unkown
page readonly
7FF5D74C3000
unkown
page readonly
2C7F000
trusted library allocation
page read and write
A12F000
stack
page read and write
7FF5D76CD000
unkown
page readonly
C653000
unkown
page read and write
B960000
unkown
page readonly
35D1000
unkown
page read and write
7FF5D779E000
unkown
page readonly
C621000
unkown
page read and write
B0E0000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
7FF5D7292000
unkown
page readonly
CB3D000
unkown
page read and write
7FF7A34B0000
unkown
page readonly
3DC1000
trusted library allocation
page read and write
A9DF000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF6BCCD1000
unkown
page write copy
158F7EB5000
heap
page read and write
246C8420000
trusted library allocation
page read and write
6DB6000
trusted library allocation
page read and write
C806000
unkown
page read and write
246C6560000
trusted library allocation
page read and write
7FF5D6A4B000
unkown
page readonly
24317210000
heap
page read and write
CA87000
unkown
page read and write
3140000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
75F8000
unkown
page read and write
10194000
unkown
page read and write
107CD000
stack
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D748A000
unkown
page readonly
11120000
heap
page read and write
24317210000
heap
page read and write
B40000
trusted library allocation
page read and write
35F4000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C6570000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
49FD000
unkown
page read and write
2E8C000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
724E000
stack
page read and write
246C8420000
trusted library allocation
page read and write
C483000
unkown
page read and write
C609000
unkown
page read and write
75E0000
unkown
page read and write
A9E9000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF6BCCE7000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D71DA000
unkown
page readonly
B70000
trusted library allocation
page read and write
CAD0000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7694000
unkown
page readonly
25F1AB50000
heap
page read and write
246C8420000
trusted library allocation
page read and write
246C6570000
trusted library allocation
page read and write
1CC9F2A0000
trusted library allocation
page read and write
CA36000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
21940290000
trusted library allocation
page read and write
10194000
unkown
page read and write
8360000
unkown
page read and write
158F7E02000
heap
page read and write
6A30000
trusted library allocation
page execute and read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
8870000
unkown
page readonly
9A92000
unkown
page read and write
5479000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
C605000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF6BCCE3000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
B4B000
trusted library allocation
page execute and read and write
24385100000
heap
page read and write
13A0000
unkown
page readonly
338B000
unkown
page execute and read and write
7FF8BFBA2000
unkown
page read and write
843F000
stack
page read and write
CA3E000
unkown
page read and write
6B14000
heap
page read and write
7FF5D7593000
unkown
page readonly
7FF5D729E000
unkown
page readonly
7FF5D77B6000
unkown
page readonly
9579000
stack
page read and write
7FF5D75B3000
unkown
page readonly
7FF779E91000
unkown
page execute read
4E10000
trusted library allocation
page read and write
24385120000
heap
page read and write
7AA0000
unkown
page read and write
7FF5D77F7000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
2431721D000
heap
page read and write
A23A000
unkown
page read and write
4A0E000
unkown
page read and write
7FF6BCCA0000
unkown
page readonly
7FF6BCCA0000
unkown
page readonly
24317210000
heap
page read and write
A9DF000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
2EC0000
unkown
page readonly
35E4000
unkown
page read and write
A2D7000
unkown
page read and write
20CBCDA0000
trusted library allocation
page read and write
4A71000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
C617000
unkown
page read and write
7FF5D717C000
unkown
page readonly
7FF5D7419000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
F0C000
heap
page read and write
9C08000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7B60000
unkown
page readonly
1CC9F2A0000
trusted library allocation
page read and write
8890000
unkown
page readonly
10054000
unkown
page read and write
2431721D000
heap
page read and write
158F9E1F000
heap
page read and write
246C8420000
trusted library allocation
page read and write
35D5000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
4A12000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
25F1C690000
direct allocation
page read and write
C8BA000
unkown
page read and write
7FF5D7272000
unkown
page readonly
39D3000
trusted library allocation
page read and write
7FF5D7284000
unkown
page readonly
6B01000
heap
page read and write
7810000
unkown
page read and write
158F7E37000
heap
page read and write
B80000
heap
page read and write
7631000
unkown
page read and write
AA04000
unkown
page read and write
BA9000
heap
page read and write
246C6560000
trusted library allocation
page read and write
7FF5D7648000
unkown
page readonly
7DF5F4666000
unkown
page readonly
7FF6BCCC2000
unkown
page readonly
35BD000
unkown
page read and write
B03B000
stack
page read and write
F0E0000
heap
page read and write
33B0000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
E7CD000
stack
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
9A8C000
unkown
page read and write
815FDE000
stack
page read and write
CB4E000
unkown
page read and write
768C000
unkown
page read and write
2431721E000
heap
page read and write
394A000
trusted library allocation
page read and write
24385420000
heap
page read and write
246C8420000
trusted library allocation
page read and write
99C0000
unkown
page read and write
F0EA000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D751F000
unkown
page readonly
3C9B000
trusted library allocation
page read and write
7FF5D6AB6000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
CAED000
unkown
page read and write
2A72000
trusted library allocation
page read and write
3140000
unkown
page read and write
35CF000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
C862000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF8B8301000
unkown
page execute read
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF8BFB69000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page execute and read and write
54EB000
trusted library allocation
page read and write
35BD000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
6F00000
trusted library allocation
page execute and read and write
7FF5D710B000
unkown
page readonly
7FF78FAA7000
unkown
page readonly
761E000
unkown
page read and write
158F7E60000
heap
page read and write
246C8420000
trusted library allocation
page read and write
A1AF000
stack
page read and write
10092000
unkown
page read and write
7FF5D723F000
unkown
page readonly
158F9A00000
direct allocation
page read and write
85BE000
stack
page read and write
2431721F000
heap
page read and write
511E000
stack
page read and write
246C8420000
trusted library allocation
page read and write
24317210000
heap
page read and write
246C8470000
trusted library allocation
page read and write
C977000
unkown
page read and write
362D000
unkown
page read and write
7C80000
unkown
page read and write
B559000
stack
page read and write
7FF67F581000
unkown
page write copy
54E0000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7292000
unkown
page readonly
158F7E96000
heap
page read and write
3B52000
trusted library allocation
page read and write
BB10000
heap
page read and write
C977000
unkown
page read and write
760B000
unkown
page read and write
3AEF000
trusted library allocation
page read and write
35DC000
unkown
page read and write
C625000
unkown
page read and write
2193E80F000
heap
page read and write
246C8470000
trusted library allocation
page read and write
A7D000
stack
page read and write
5E80000
trusted library allocation
page execute and read and write
158F7E72000
heap
page read and write
3968000
trusted library allocation
page read and write
307C000
stack
page read and write
B8E000
heap
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
35CF000
unkown
page read and write
20CBCDA0000
trusted library allocation
page read and write
243171F8000
heap
page read and write
2E2B000
trusted library allocation
page read and write
7FF5D7257000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7435000
stack
page read and write
48A5BED000
stack
page read and write
3CA6000
trusted library allocation
page read and write
CAA4000
unkown
page read and write
C7BE000
unkown
page read and write
A286000
unkown
page read and write
2431721E000
heap
page read and write
246C8470000
trusted library allocation
page read and write
158F7EB3000
heap
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D764F000
unkown
page readonly
399B000
trusted library allocation
page read and write
F0732FE000
stack
page read and write
7FF5D765F000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
12D0000
unkown
page readonly
3A9A000
trusted library allocation
page read and write
24386A40000
trusted library allocation
page read and write
7FF5D76DA000
unkown
page readonly
A2A2000
unkown
page read and write
7FF779EBB000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
7FF5D7488000
unkown
page readonly
7FF5D7682000
unkown
page readonly
2AA5000
trusted library allocation
page read and write
7FF5D728E000
unkown
page readonly
CB6B000
unkown
page read and write
96FE000
stack
page read and write
246C8420000
trusted library allocation
page read and write
6DE5000
trusted library allocation
page read and write
2ABB000
trusted library allocation
page read and write
2D6B000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
CAF6000
unkown
page read and write
3AF5000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D71CC000
unkown
page readonly
4980000
unkown
page read and write
F090000
unkown
page read and write
3110000
unkown
page readonly
38E5000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
A2DF000
unkown
page read and write
C64000
heap
page read and write
246C8420000
trusted library allocation
page read and write
24386A40000
trusted library allocation
page read and write
9ADB000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D75E9000
unkown
page readonly
7FF5D752F000
unkown
page readonly
35C9000
unkown
page read and write
7FF8A8F04000
unkown
page read and write
158F7E3F000
heap
page read and write
49FA000
unkown
page read and write
10116000
unkown
page read and write
CA36000
unkown
page read and write
158F7EB3000
heap
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D74C3000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
35F4000
unkown
page read and write
A3B6000
unkown
page read and write
7FF5D770A000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
C8F1000
unkown
page read and write
54E5000
trusted library allocation
page read and write
7FF5D716B000
unkown
page readonly
7FF5D7309000
unkown
page readonly
6DF4000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
3B5D000
trusted library allocation
page read and write
3318000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
158F9E00000
heap
page read and write
4DF6000
trusted library allocation
page read and write
7FF8A8B10000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
6E08000
trusted library allocation
page read and write
7FF5CE33D000
unkown
page readonly
7631000
unkown
page read and write
35E4000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7360000
unkown
page readonly
A40E000
unkown
page read and write
158F7E39000
heap
page read and write
CAF6000
unkown
page read and write
7FF5D7546000
unkown
page readonly
2B9F000
trusted library allocation
page read and write
A391000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D75F6000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
5DFA000
heap
page read and write
246C8420000
trusted library allocation
page read and write
7B20000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
2F57000
trusted library allocation
page read and write
CACB000
unkown
page read and write
CA9C000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D77E3000
unkown
page readonly
7FF6BCCE3000
unkown
page write copy
2431721E000
heap
page read and write
7FF5D729E000
unkown
page readonly
7DF4F2471000
unkown
page execute read
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
158F7EA0000
heap
page read and write
105CD000
stack
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7073000
unkown
page readonly
9BE4000
unkown
page read and write
C472000
unkown
page read and write
9AB2000
unkown
page read and write
158F9E2D000
heap
page read and write
7FF5D72D3000
unkown
page readonly
C61D000
unkown
page read and write
35DC000
unkown
page read and write
1390000
heap
page read and write
246C8470000
trusted library allocation
page read and write
10054000
unkown
page read and write
54D1000
trusted library allocation
page read and write
158F7E42000
heap
page read and write
7FF5D7257000
unkown
page readonly
2C2C000
trusted library allocation
page read and write
7FF5D7558000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
3A68000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF8BFB60000
unkown
page readonly
A3C3000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
9E2D000
stack
page read and write
C7CB000
unkown
page read and write
7FF5D77DD000
unkown
page readonly
1390000
heap
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
CA3A000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
158F7E24000
heap
page read and write
7FF5D7837000
unkown
page readonly
158F7E96000
heap
page read and write
246C8470000
trusted library allocation
page read and write
A384000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF6BCCE3000
unkown
page write copy
1380000
heap
page read and write
96FE000
stack
page read and write
7FF5D732D000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
9AA8000
unkown
page read and write
7FF779ECE000
unkown
page write copy
246C8420000
trusted library allocation
page read and write
7FF5D748A000
unkown
page readonly
67DC000
stack
page read and write
4DD0000
trusted library allocation
page read and write
7611000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
C615000
unkown
page read and write
7FF5D7407000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
3D6E000
trusted library allocation
page read and write
20B4EFF0000
trusted library allocation
page read and write
AA1D000
unkown
page read and write
7FF5D71C4000
unkown
page readonly
C81C000
unkown
page read and write
EF42000
unkown
page read and write
7FF5D76E8000
unkown
page readonly
7FF67F597000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
B0BD000
stack
page read and write
9A94000
unkown
page read and write
24385020000
heap
page read and write
246C8420000
trusted library allocation
page read and write
7FF779E91000
unkown
page execute read
246C8420000
trusted library allocation
page read and write
7FF5D72CE000
unkown
page readonly
3A56000
trusted library allocation
page read and write
B5E29FF000
stack
page read and write
246C8470000
trusted library allocation
page read and write
C892000
unkown
page read and write
A39C000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
A416000
unkown
page read and write
2C99000
trusted library allocation
page read and write
CB6F000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
9B80000
unkown
page read and write
158F7E72000
heap
page read and write
3531000
unkown
page read and write
7FF5D7077000
unkown
page readonly
8BAD000
unkown
page execute and read and write
CA3A000
unkown
page read and write
227EABB0000
trusted library allocation
page read and write
35C1000
unkown
page read and write
7FF5D71A6000
unkown
page readonly
20B4D680000
heap
page read and write
5DE9000
heap
page read and write
246C8470000
trusted library allocation
page read and write
CB4E000
unkown
page read and write
9D67000
unkown
page read and write
DD0000
heap
page execute and read and write
24317210000
heap
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
A3B9000
unkown
page read and write
80DE000
stack
page read and write
246C8470000
trusted library allocation
page read and write
4F20000
heap
page execute and read and write
5DBB000
heap
page read and write
7B00000
unkown
page readonly
7FF5D770A000
unkown
page readonly
7FF5D7407000
unkown
page readonly
CB3D000
unkown
page read and write
9A90000
unkown
page read and write
B950000
unkown
page readonly
7FF6BCCE7000
unkown
page readonly
AA01000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
33F0000
unkown
page read and write
E10000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
227EAC15000
heap
page read and write
246C8420000
trusted library allocation
page read and write
35D5000
unkown
page read and write
2431721E000
heap
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
B7DC000
stack
page read and write
B42000
trusted library allocation
page read and write
6B48000
heap
page read and write
2438518C000
heap
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
BEA0000
unkown
page readonly
3DB8000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
2BD9000
trusted library allocation
page read and write
7DF4F24A1000
unkown
page execute read
4F11000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7682000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF5D75F9000
unkown
page readonly
35B3000
unkown
page read and write
246C6560000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
2F7F000
stack
page read and write
3160000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
3CDA000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
2431720F000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7507000
unkown
page readonly
A2A2000
unkown
page read and write
35B0000
unkown
page read and write
75F8000
unkown
page read and write
7435000
stack
page read and write
338B000
unkown
page execute read
5E7C000
stack
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D6BE4000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
9A72000
unkown
page read and write
C5FD000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
CAF6000
unkown
page read and write
48A5BE7000
stack
page read and write
246C8470000
trusted library allocation
page read and write
35C3000
unkown
page read and write
BB7000
heap
page read and write
7FF6BCCE7000
unkown
page readonly
CABE000
unkown
page read and write
7FF5D7700000
unkown
page readonly
2CC4000
trusted library allocation
page read and write
158F7E72000
heap
page read and write
246C8470000
trusted library allocation
page read and write
227EABB0000
trusted library allocation
page read and write
7686000
unkown
page read and write
7FF5D7236000
unkown
page readonly
69DD000
stack
page read and write
7FF5D75DF000
unkown
page readonly
7FF5D7065000
unkown
page readonly
84CC000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
C669000
unkown
page read and write
7FF5D77DD000
unkown
page readonly
C0BA000
stack
page read and write
3CF8000
trusted library allocation
page read and write
6AB0000
heap
page read and write
7F5747C000
stack
page read and write
246C8420000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
C908000
unkown
page read and write
7B60000
unkown
page readonly
8F49000
stack
page read and write
9679000
stack
page read and write
246C8470000
trusted library allocation
page read and write
2F27000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
C8BC000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
97FE000
stack
page read and write
246C8470000
trusted library allocation
page read and write
7FF6BCCA1000
unkown
page execute read
9D42000
unkown
page read and write
3B40AFE000
stack
page read and write
4AC0000
unkown
page read and write
227EC8B0000
heap
page read and write
24317210000
heap
page read and write
246C8420000
trusted library allocation
page read and write
8FDE000
stack
page read and write
246C8420000
trusted library allocation
page read and write
100A9000
unkown
page read and write
7FF5D7396000
unkown
page readonly
CB3D000
unkown
page read and write
7FF5D7740000
unkown
page readonly
A408000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
362D000
unkown
page read and write
91F0000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
CA32000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
5DA0000
heap
page read and write
7FF5D6ABD000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
35C3000
unkown
page read and write
EF0000
heap
page read and write
768C000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
2D82000
trusted library allocation
page read and write
7FF5D76F5000
unkown
page readonly
7FF5D75CB000
unkown
page readonly
7FF5D77B6000
unkown
page readonly
7FF6BCCE7000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
69F3000
trusted library allocation
page read and write
8A77000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
3A5F000
trusted library allocation
page read and write
77DB000
unkown
page read and write
24386E20000
heap
page read and write
158F9A80000
direct allocation
page read and write
7FF5D72BD000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
35D1000
unkown
page read and write
7FF5D7752000
unkown
page readonly
760B000
unkown
page read and write
7FF5D6AB6000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
A391000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF779E90000
unkown
page readonly
20B4F450000
heap
page read and write
7FF5D73F5000
unkown
page readonly
EF4D000
unkown
page read and write
2A50000
trusted library allocation
page read and write
7FF5D7705000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
1024D000
stack
page read and write
7FF5D7309000
unkown
page readonly
227EC7A1000
direct allocation
page read and write
24317210000
heap
page read and write
7FF5D7820000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
94F3000
unkown
page read and write
1104A000
stack
page read and write
B20000
trusted library allocation
page read and write
98FD000
stack
page read and write
7FF5D71E0000
unkown
page readonly
21940290000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
A2B5000
unkown
page read and write
7FF5D66E8000
unkown
page readonly
C472000
unkown
page read and write
3AD9000
trusted library allocation
page read and write
227EC760000
direct allocation
page read and write
9B7E000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
AA40000
unkown
page read and write
246C6570000
trusted library allocation
page read and write
7FF5D71EF000
unkown
page readonly
12B0000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
C5F4000
unkown
page read and write
35FA000
unkown
page read and write
24317210000
heap
page read and write
246C8420000
trusted library allocation
page read and write
AE1D000
stack
page read and write
C642000
unkown
page read and write
3ADF000
trusted library allocation
page read and write
7FF5D7643000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF5D7458000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
24317210000
heap
page read and write
7FF8B83EC000
unkown
page readonly
54A0000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
1250000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7289000
unkown
page readonly
7FF5D7423000
unkown
page readonly
C653000
unkown
page read and write
8A79000
unkown
page read and write
7FF8BFB88000
unkown
page read and write
7FF779ECE000
unkown
page read and write
BE70000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
7DD0000
heap
page read and write
3CE4000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7D3E000
stack
page read and write
2C39000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
A408000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
E94D000
stack
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
9C21000
unkown
page read and write
942B000
stack
page read and write
7FF8A8EBD000
unkown
page read and write
8861000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
1009B000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page execute and read and write
73CE000
stack
page read and write
AAA9000
unkown
page read and write
B950000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
C1CC000
stack
page read and write
12D0000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
608B000
stack
page read and write
246C8470000
trusted library allocation
page read and write
35FA000
unkown
page read and write
38F1000
trusted library allocation
page read and write
2431721E000
heap
page read and write
6ECF000
stack
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7202000
unkown
page readonly
3626000
unkown
page read and write
158F7E59000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
8360000
unkown
page read and write
6F50000
trusted library allocation
page execute and read and write
AFBE000
stack
page read and write
7FF5D7820000
unkown
page readonly
21940290000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7DF4F2481000
unkown
page execute read
2EA2000
trusted library allocation
page read and write
3A42000
trusted library allocation
page read and write
5B80000
trusted library allocation
page execute and read and write
7FF6BCCA1000
unkown
page execute read
C9A7000
unkown
page read and write
158F7EB0000
heap
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7077000
unkown
page readonly
CB4E000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
9D42000
unkown
page read and write
C899000
unkown
page read and write
7C31000
unkown
page read and write
C663000
unkown
page read and write
35B5000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
CA34000
unkown
page read and write
EF45000
unkown
page read and write
49A8000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7534000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7654000
unkown
page read and write
CAA5000
unkown
page read and write
7FF5D6A4B000
unkown
page readonly
111AF000
stack
page read and write
7FF5D72D7000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
391D000
trusted library allocation
page read and write
7FF5D749B000
unkown
page readonly
7B80000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
243851B1000
heap
page read and write
7FF7A34B1000
unkown
page execute read
C5FD000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
5D20000
heap
page read and write
7FF5D752F000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
7FF5D77FD000
unkown
page readonly
49B85FE000
stack
page read and write
2FE6000
trusted library allocation
page read and write
3AAC000
trusted library allocation
page read and write
7FF5D7336000
unkown
page readonly
A2B5000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
25F1AAB0000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
21940290000
trusted library allocation
page read and write
DCC000
stack
page read and write
158F7EB7000
heap
page read and write
7FF5D758D000
unkown
page readonly
35C9000
unkown
page read and write
7FF5D74A6000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
5D26000
heap
page read and write
246C8420000
trusted library allocation
page read and write
7FF6BCCD1000
unkown
page write copy
84FA000
unkown
page read and write
AA84000
unkown
page read and write
E64F000
stack
page read and write
7611000
unkown
page read and write
7FF5D7641000
unkown
page readonly
C450000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
4AA0000
unkown
page read and write
7440000
unkown
page read and write
760D000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
158F7E45000
heap
page read and write
246C8420000
trusted library allocation
page read and write
8C39000
stack
page read and write
7FF5D72E9000
unkown
page readonly
7FF5D71A6000
unkown
page readonly
7FF8B83E9000
unkown
page read and write
BE70000
unkown
page readonly
C44F000
stack
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
C5EB000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
9B0B000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
3120000
unkown
page read and write
7637000
unkown
page read and write
7460000
unkown
page read and write
A408000
unkown
page read and write
7FF5D772C000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
AA24000
unkown
page read and write
C609000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
35D1000
unkown
page read and write
F1E000
stack
page read and write
49C2000
unkown
page read and write
243171A0000
heap
page read and write
C48B000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
158F7EAA000
heap
page read and write
246C8470000
trusted library allocation
page read and write
815DE5000
stack
page read and write
9579000
stack
page read and write
7FF5D776D000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF5D7289000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
35FA000
unkown
page read and write
7FF5D74A9000
unkown
page readonly
7FF779ED6000
unkown
page readonly
BDC0000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7075000
unkown
page readonly
7FF5D7391000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
8861000
unkown
page read and write
20CBCDA0000
trusted library allocation
page read and write
7FF5D7419000
unkown
page readonly
C81C000
unkown
page read and write
7FF78FA82000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
CA34000
unkown
page read and write
3400000
unkown
page read and write
7FF5D7722000
unkown
page readonly
8CB8000
stack
page read and write
1CC9F2A0000
trusted library allocation
page read and write
7FF5D769E000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
B88000
heap
page read and write
1250000
unkown
page read and write
8880000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF6CF983000
unkown
page read and write
AA40000
unkown
page read and write
7FF5D7262000
unkown
page readonly
35BD000
unkown
page read and write
CAD5000
unkown
page read and write
24317210000
heap
page read and write
CA8A000
unkown
page read and write
2B87000
trusted library allocation
page read and write
7FF779ED6000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D706E000
unkown
page readonly
7FF5D7799000
unkown
page readonly
4AB0000
unkown
page read and write
28C1000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
10E4F000
stack
page read and write
2B30000
trusted library allocation
page read and write
7FF5D71C8000
unkown
page readonly
7FF5D769E000
unkown
page readonly
3B40BFE000
stack
page read and write
7FF5D743F000
unkown
page readonly
8C39000
stack
page read and write
F08D000
stack
page read and write
6E00000
trusted library allocation
page read and write
21940290000
trusted library allocation
page read and write
A9FD000
unkown
page read and write
3100000
unkown
page read and write
24317210000
heap
page read and write
AA9F000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
1CC9F2A0000
trusted library allocation
page read and write
9A98000
unkown
page read and write
C7E000
heap
page read and write
7FF5D71D7000
unkown
page readonly
A39C000
unkown
page read and write
7FF5D7703000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
35CD000
unkown
page read and write
A9A0000
unkown
page read and write
227EAB80000
heap
page read and write
246C8420000
trusted library allocation
page read and write
CAE9000
unkown
page read and write
7FF6BCCA0000
unkown
page readonly
9FAF000
stack
page read and write
246C8420000
trusted library allocation
page read and write
744E000
stack
page read and write
246C8470000
trusted library allocation
page read and write
3500000
stack
page read and write
6F4E000
stack
page read and write
362A000
unkown
page read and write
C8E8000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF8A8EBC000
unkown
page write copy
C5FA000
unkown
page read and write
4A90000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
CA34000
unkown
page read and write
CA24000
unkown
page read and write
7FF5D7591000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
942B000
stack
page read and write
2FFE000
stack
page read and write
B4BF000
stack
page read and write
3A03000
trusted library allocation
page read and write
C8DD000
unkown
page read and write
3CE9000
trusted library allocation
page read and write
CACB000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
CAE9000
unkown
page read and write
7FF5D77D2000
unkown
page readonly
3110000
unkown
page readonly
2193E902000
heap
page read and write
246C8470000
trusted library allocation
page read and write
35D1000
unkown
page read and write
C8DD000
unkown
page read and write
11730000
unkown
page read and write
7C90000
unkown
page read and write
7FF5D66E3000
unkown
page readonly
7FF6BCCA1000
unkown
page execute read
7FF5D781A000
unkown
page readonly
EF8000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C6570000
trusted library allocation
page read and write
2431721E000
heap
page read and write
7FF5D7546000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
158F7EB3000
heap
page read and write
246C8470000
trusted library allocation
page read and write
6DC2000
trusted library allocation
page read and write
C5F0000
unkown
page read and write
7FF5D74A6000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
C9A7000
unkown
page read and write
B36000
trusted library allocation
page execute and read and write
246C8420000
trusted library allocation
page read and write
28BF000
stack
page read and write
246C8420000
trusted library allocation
page read and write
7FF779E90000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D76D5000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
A3AC000
unkown
page read and write
7FF5D779E000
unkown
page readonly
5479000
unkown
page read and write
A0A9000
stack
page read and write
1011B000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
158F9E2B000
heap
page read and write
EB5000
stack
page read and write
3160000
unkown
page read and write
B0BD000
stack
page read and write
CAE9000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
1360000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
A3B6000
unkown
page read and write
362D000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
3400000
unkown
page read and write
3630000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
10116000
unkown
page read and write
9A8E000
unkown
page read and write
7FF5D75D6000
unkown
page readonly
396E000
trusted library allocation
page read and write
7FF5D706E000
unkown
page readonly
9BE3000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
C5EC000
unkown
page read and write
CA7C000
unkown
page read and write
7DD0000
heap
page read and write
4A44000
unkown
page read and write
C62D000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
881E000
stack
page read and write
24317210000
heap
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7376000
unkown
page readonly
6B76000
heap
page read and write
246C8470000
trusted library allocation
page read and write
3B40CFE000
stack
page read and write
79C1000
heap
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7236000
unkown
page readonly
79C6000
heap
page read and write
C24E000
stack
page read and write
F1BC2FF000
stack
page read and write
3AE6000
trusted library allocation
page read and write
158F7E08000
heap
page read and write
7FF5D7394000
unkown
page readonly
616000
unkown
page readonly
7FF8BFB91000
unkown
page execute read
246C8420000
trusted library allocation
page read and write
A391000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
A3C3000
unkown
page read and write
6AD2000
heap
page read and write
246C8470000
trusted library allocation
page read and write
3DD0000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D74FA000
unkown
page readonly
1230000
unkown
page read and write
BF3E000
stack
page read and write
9B41000
unkown
page read and write
3D29000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
7FF8A8DFD000
unkown
page readonly
2AB0000
trusted library allocation
page read and write
20CBCCA0000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
2D3B000
trusted library allocation
page read and write
2A05000
trusted library allocation
page read and write
13A0000
unkown
page readonly
7FF5D75F2000
unkown
page readonly
2FD4000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
1CC9F2A0000
trusted library allocation
page read and write
CB7F000
unkown
page read and write
7FF5D772C000
unkown
page readonly
CA8A000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
B66000
heap
page read and write
7FF5D7073000
unkown
page readonly
CA7D000
unkown
page read and write
2431721E000
heap
page read and write
7FF5D77E9000
unkown
page readonly
7FF6BCCCF000
unkown
page read and write
158F7E76000
heap
page read and write
B4D0000
unkown
page readonly
2431721E000
heap
page read and write
2EB0000
unkown
page read and write
2D7D000
trusted library allocation
page read and write
5FDE000
stack
page read and write
7FF779EBB000
unkown
page readonly
20CBCE00000
heap
page read and write
246C8420000
trusted library allocation
page read and write
A416000
unkown
page read and write
7FF5D7752000
unkown
page readonly
158F9E23000
heap
page read and write
158F9E11000
heap
page read and write
246C8420000
trusted library allocation
page read and write
9ADB000
unkown
page read and write
24317210000
heap
page read and write
49B84FE000
stack
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D75CB000
unkown
page readonly
7FF6BCCCF000
unkown
page read and write
5AC0000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7452000
unkown
page readonly
7FF78FAA3000
unkown
page read and write
91F0000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
843F000
stack
page read and write
246C8420000
trusted library allocation
page read and write
BE49000
stack
page read and write
7FF6BCCA0000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
24317210000
heap
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
9C22000
unkown
page read and write
C621000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D71EF000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
C73E000
unkown
page read and write
6090000
trusted library allocation
page execute and read and write
158F7EB1000
heap
page read and write
CAED000
unkown
page read and write
2431721E000
heap
page read and write
7FF6BCCE3000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
49BB000
unkown
page read and write
7FF5D7391000
unkown
page readonly
3A49000
trusted library allocation
page read and write
7FF5D783B000
unkown
page readonly
8A76000
unkown
page read and write
7FF5D7643000
unkown
page readonly
48C8000
trusted library allocation
page read and write
7FF5D7795000
unkown
page readonly
3D73000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7450000
unkown
page readonly
EF56000
unkown
page read and write
7FF5D7589000
unkown
page readonly
243851AC000
heap
page read and write
CA24000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
4986000
unkown
page read and write
5463000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF8A8ECB000
unkown
page write copy
7FF5D762F000
unkown
page readonly
69F0000
trusted library allocation
page read and write
C62D000
unkown
page read and write
4EB2000
trusted library allocation
page read and write
7D3E000
stack
page read and write
24317210000
heap
page read and write
246C8420000
trusted library allocation
page read and write
C61B000
unkown
page read and write
8A46000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
2EDB000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7482000
unkown
page readonly
362D000
unkown
page read and write
35C3000
unkown
page read and write
CAED000
unkown
page read and write
7FF5D71F9000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
20B4D5C0000
heap
page read and write
7FF5D776F000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
BB9D000
stack
page read and write
6ED0000
trusted library allocation
page read and write
7FF6CF940000
unkown
page readonly
C5FA000
unkown
page read and write
158F7D80000
heap
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7065000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7591000
unkown
page readonly
5E20000
trusted library allocation
page execute and read and write
C800000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D77E9000
unkown
page readonly
A3AA000
unkown
page read and write
7FF7A34F7000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
3D43000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D738E000
unkown
page readonly
7FF5D7523000
unkown
page readonly
6E20000
trusted library allocation
page read and write
2D2A000
trusted library allocation
page read and write
2FF9000
stack
page read and write
246C8470000
trusted library allocation
page read and write
C496000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF6BCCC2000
unkown
page readonly
7FF5D77F7000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
158F7E60000
heap
page read and write
F13000
heap
page read and write
C8F8000
unkown
page read and write
35F4000
unkown
page read and write
1000000
heap
page read and write
10C4D000
stack
page read and write
3350000
unkown
page execute read
B00000
trusted library allocation
page read and write
35E4000
unkown
page read and write
8D39000
stack
page read and write
7FF5D748C000
unkown
page readonly
EF5C000
unkown
page read and write
227EAA80000
heap
page read and write
35C3000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
5D88000
heap
page read and write
7FF8BFB66000
unkown
page readonly
1044D000
stack
page read and write
A39C000
unkown
page read and write
7FF8BFB70000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
158F7E97000
heap
page read and write
9A96000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
2CBB000
trusted library allocation
page read and write
9B8A000
unkown
page read and write
2193E7D0000
heap
page read and write
2E96000
trusted library allocation
page read and write
9A80000
unkown
page read and write
7618000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
2E66000
trusted library allocation
page read and write
158F7DC0000
heap
page read and write
C5F4000
unkown
page read and write
158F7E60000
heap
page read and write
2C76000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7989000
stack
page read and write
362A000
unkown
page read and write
109CD000
stack
page read and write
54B6000
trusted library allocation
page read and write
3B3A000
trusted library allocation
page read and write
7B20000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
C61D000
unkown
page read and write
7FF5D751F000
unkown
page readonly
24317210000
heap
page read and write
7C70000
unkown
page readonly
3AC8000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
4DA0000
heap
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D75A6000
unkown
page readonly
246C6560000
trusted library allocation
page read and write
35F4000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
2431721E000
heap
page read and write
AAA9000
unkown
page read and write
7FF5D6BDB000
unkown
page readonly
24317210000
heap
page read and write
7FF67F551000
unkown
page execute read
158F7DDA000
heap
page read and write
7FF5D6BEF000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
100D3000
unkown
page read and write
76F8000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D77B9000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
9EAC000
stack
page read and write
CAED000
unkown
page read and write
158F7EB4000
heap
page read and write
4A71000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
4B00000
unkown
page read and write
2C6E000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D77DA000
unkown
page readonly
81DE000
stack
page read and write
246C8420000
trusted library allocation
page read and write
25F1AAB0000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D71BF000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
C61B000
unkown
page read and write
94F3000
unkown
page read and write
4E30000
trusted library allocation
page read and write
2431721D000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
EF44000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
AAAA000
unkown
page read and write
CAE6000
unkown
page read and write
33B0000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
4A16000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
C5F8000
unkown
page read and write
8D3E000
stack
page read and write
7FF8BFB61000
unkown
page execute read
54AB000
trusted library allocation
page read and write
1395000
heap
page read and write
3B62000
trusted library allocation
page read and write
158F7E72000
heap
page read and write
246C8420000
trusted library allocation
page read and write
20B4D620000
trusted library allocation
page read and write
AA40000
unkown
page read and write
246C6560000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
2D9E000
trusted library allocation
page read and write
7FF5D75FF000
unkown
page readonly
25F1C6D1000
direct allocation
page read and write
24317210000
heap
page read and write
A1AF000
stack
page read and write
7FF5D7244000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
3CB8000
trusted library allocation
page read and write
24317210000
heap
page read and write
246C8420000
trusted library allocation
page read and write
76F8000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
CA2C000
unkown
page read and write
D8E000
stack
page read and write
246C8470000
trusted library allocation
page read and write
B45000
trusted library allocation
page execute and read and write
8A00000
unkown
page read and write
9D67000
unkown
page read and write
7FF5D7639000
unkown
page readonly
79B0000
heap
page read and write
7FF5D75F9000
unkown
page readonly
3963000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
A40E000
unkown
page read and write
6B2B000
heap
page read and write
CA42000
unkown
page read and write
10DCD000
stack
page read and write
7AF1000
unkown
page read and write
6BFE000
heap
page read and write
2193E81E000
heap
page read and write
B220000
unkown
page read and write
24317140000
heap
page read and write
246C8420000
trusted library allocation
page read and write
158F7E24000
heap
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D72D3000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
E00000
unkown
page readonly
7FF5D7360000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF5D723C000
unkown
page readonly
AA92000
unkown
page read and write
7FF6BCCE3000
unkown
page write copy
EF72000
unkown
page read and write
20CBCC80000
heap
page read and write
8890000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
CA53000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
158F7E60000
heap
page read and write
9FAF000
stack
page read and write
246C8470000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
20B4EFF0000
trusted library allocation
page read and write
3CB3000
trusted library allocation
page read and write
2AAB000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
CB6B000
unkown
page read and write
CAA1000
unkown
page read and write
9AB4000
unkown
page read and write
2B0C000
trusted library allocation
page read and write
7FF5D7808000
unkown
page readonly
A39F000
unkown
page read and write
86E0000
unkown
page readonly
3DC3000
trusted library allocation
page read and write
158F7EAC000
heap
page read and write
246C8420000
trusted library allocation
page read and write
B980000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
9B41000
unkown
page read and write
7FF5D75F6000
unkown
page readonly
2F7F000
stack
page read and write
7FF6BCCA1000
unkown
page execute read
158F7E35000
heap
page read and write
CA3E000
unkown
page read and write
7FF5D716B000
unkown
page readonly
C46F000
unkown
page read and write
7FF5D778A000
unkown
page readonly
7FF5D771A000
unkown
page readonly
50D0000
heap
page read and write
1CC9D902000
heap
page read and write
CACB000
unkown
page read and write
54B1000
trusted library allocation
page read and write
C5F4000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
C90A000
unkown
page read and write
9D42000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
3DAD000
trusted library allocation
page read and write
7FF5D75FF000
unkown
page readonly
35CF000
unkown
page read and write
7FF5D7404000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
AA05000
unkown
page read and write
1CC9DA00000
heap
page read and write
7DF4F2461000
unkown
page execute read
3B4F000
trusted library allocation
page read and write
3C94000
trusted library allocation
page read and write
F0EA000
heap
page read and write
246C8420000
trusted library allocation
page read and write
BB10000
heap
page read and write
246C8420000
trusted library allocation
page read and write
CA3C000
unkown
page read and write
AA19000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
A384000
unkown
page read and write
3D87000
trusted library allocation
page read and write
C669000
unkown
page read and write
CB6B000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
C4BD000
unkown
page read and write
CA98000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7669000
unkown
page readonly
5330000
unkown
page write copy
7FF5D77D2000
unkown
page readonly
38CF000
trusted library allocation
page read and write
3554000
unkown
page read and write
C61B000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
1094B000
stack
page read and write
246C8420000
trusted library allocation
page read and write
3540000
unkown
page read and write
7FF5D7604000
unkown
page readonly
1383000
heap
page read and write
7605000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
11050000
unkown
page execute and read and write
3319000
unkown
page read and write
C8CD000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
24385150000
trusted library allocation
page read and write
F0733FE000
stack
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7394000
unkown
page readonly
2CB5000
trusted library allocation
page read and write
3DC6000
trusted library allocation
page read and write
3D38000
trusted library allocation
page read and write
7FF5D775C000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF8A8EE3000
unkown
page read and write
A273000
unkown
page read and write
243171F0000
heap
page read and write
4F00000
trusted library allocation
page read and write
539E000
stack
page read and write
3A65000
trusted library allocation
page read and write
353D000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF6CF941000
unkown
page execute read
7FF5D75BF000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
A39F000
unkown
page read and write
3532000
unkown
page read and write
84EC000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D72BF000
unkown
page readonly
7FF5D7230000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
C8D0000
unkown
page read and write
7FF5D75A6000
unkown
page readonly
7FF5D7593000
unkown
page readonly
20CBCE13000
heap
page read and write
7AF1000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
2431721D000
heap
page read and write
7FF6CF96F000
unkown
page read and write
7E60000
unkown
page read and write
A251000
unkown
page read and write
2A9E000
trusted library allocation
page read and write
2193E82D000
heap
page read and write
246C8420000
trusted library allocation
page read and write
A3B9000
unkown
page read and write
B60000
heap
page read and write
C908000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D783B000
unkown
page readonly
2BE5000
trusted library allocation
page read and write
ABE000
stack
page read and write
7FF5D7215000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
CACB000
unkown
page read and write
B1D000
trusted library allocation
page execute and read and write
246C8470000
trusted library allocation
page read and write
3B58000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
4A40000
unkown
page read and write
6AEC000
heap
page read and write
25F1AB55000
heap
page read and write
4EA0000
heap
page read and write
7FF5D7396000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
68DD000
stack
page read and write
246C8470000
trusted library allocation
page read and write
C800000
unkown
page read and write
A9A0000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
779E000
unkown
page read and write
7DF4F2491000
unkown
page execute read
2DF3000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
5D52000
heap
page read and write
35C9000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
35FA000
unkown
page read and write
6B1F000
heap
page read and write
FF0000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
EF1C000
unkown
page read and write
7FF5D77F0000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
8A00000
unkown
page read and write
2FB2000
trusted library allocation
page read and write
20B4D620000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7425000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
CB6B000
unkown
page read and write
2431721E000
heap
page read and write
246C8420000
trusted library allocation
page read and write
AA9F000
unkown
page read and write
39BE000
trusted library allocation
page read and write
2A8C000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D74B8000
unkown
page readonly
7FF6CF983000
unkown
page write copy
158F7E24000
heap
page read and write
246C8420000
trusted library allocation
page read and write
CA24000
unkown
page read and write
21940290000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
C035000
stack
page read and write
9AAA000
unkown
page read and write
9A76000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
3A6D000
trusted library allocation
page read and write
A233000
unkown
page read and write
4A12000
unkown
page read and write
9B0B000
unkown
page read and write
7DF4F2470000
unkown
page readonly
9A9E000
unkown
page read and write
7FF5D72C8000
unkown
page readonly
33C0000
unkown
page read and write
A33F000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF7A34D2000
unkown
page readonly
158F7E00000
heap
page read and write
9A84000
unkown
page read and write
88B0000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
6B90000
heap
page read and write
246C8420000
trusted library allocation
page read and write
5D75000
heap
page read and write
246C8470000
trusted library allocation
page read and write
7E58000
stack
page read and write
158F7E98000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
1395000
heap
page read and write
B8DB000
stack
page read and write
8E4F000
stack
page read and write
7FF5D7808000
unkown
page readonly
35CD000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
DE0000
trusted library allocation
page execute and read and write
246C8420000
trusted library allocation
page read and write
CAED000
unkown
page read and write
2D93000
trusted library allocation
page read and write
3AF8000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7055000
unkown
page readonly
7FF5D766E000
unkown
page readonly
7FF5D6ABD000
unkown
page readonly
7FF5D7376000
unkown
page readonly
CA3A000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D774A000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
AA92000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7609000
unkown
page read and write
3626000
unkown
page read and write
7FF5D7398000
unkown
page readonly
158F7E9F000
heap
page read and write
39B9000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
35CD000
unkown
page read and write
6B9B000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
C4DC000
unkown
page read and write
3543000
unkown
page read and write
C8C1000
unkown
page read and write
158F9C00000
direct allocation
page read and write
7FF5D770F000
unkown
page readonly
C47F000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
4980000
unkown
page read and write
158F7E22000
heap
page read and write
2431721E000
heap
page read and write
246C8470000
trusted library allocation
page read and write
24317030000
heap
page read and write
1360000
unkown
page readonly
7FF5D7215000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
4A5B000
stack
page read and write
A3B9000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
CA3C000
unkown
page read and write
20B4D650000
heap
page read and write
7FF8A8EA3000
unkown
page read and write
227EABB0000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
EF5C000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF6BCCD1000
unkown
page write copy
20B4EFF0000
trusted library allocation
page read and write
7DF4F24A1000
unkown
page execute read
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
158F9F00000
direct allocation
page read and write
6C05000
heap
page read and write
246C8470000
trusted library allocation
page read and write
9B99000
unkown
page read and write
54EE000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D77A8000
unkown
page readonly
7FF5D71CC000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
24317210000
heap
page read and write
5F8B000
stack
page read and write
7FF5D75D9000
unkown
page readonly
4DDB000
trusted library allocation
page read and write
2DEA000
trusted library allocation
page read and write
7FF5D77CD000
unkown
page readonly
7FF5D75D6000
unkown
page readonly
7FF5D71E6000
unkown
page readonly
99B0000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
AD4F90C000
stack
page read and write
AA40000
unkown
page read and write
CAB9000
unkown
page read and write
4EB0000
trusted library allocation
page read and write
FF0000
unkown
page readonly
4DFD000
trusted library allocation
page read and write
35B3000
unkown
page read and write
25F1A96C000
heap
page read and write
7DF4F2491000
unkown
page execute read
246C8420000
trusted library allocation
page read and write
3CAD000
trusted library allocation
page read and write
A3AC000
unkown
page read and write
7FF5D72BF000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
227EA980000
heap
page read and write
246C8420000
trusted library allocation
page read and write
35DC000
unkown
page read and write
3100000
unkown
page read and write
158F9E10000
heap
page read and write
246C8420000
trusted library allocation
page read and write
7FF6CF987000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
7FF8A8EE7000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
E54D000
stack
page read and write
3929000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
7FF5D71E6000
unkown
page readonly
A313000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D745B000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
9A76000
unkown
page read and write
7FF5D770F000
unkown
page readonly
35B0000
unkown
page read and write
4E2E000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
CA22000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
354B000
unkown
page read and write
3000000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
20B4D6AD000
heap
page read and write
A286000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
3ABD000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
2431721D000
heap
page read and write
6AC2000
heap
page read and write
158F7E60000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
9AAA000
unkown
page read and write
4DEE000
trusted library allocation
page read and write
4A44000
unkown
page read and write
F1BC3FF000
stack
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
158F7E42000
heap
page read and write
246C8420000
trusted library allocation
page read and write
158F7EB4000
heap
page read and write
5AA0000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
3AFD000
trusted library allocation
page read and write
2989000
trusted library allocation
page read and write
3CF2000
trusted library allocation
page read and write
10ACD000
stack
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
2C87000
trusted library allocation
page read and write
3D57000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
48A5FCF000
stack
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7589000
unkown
page readonly
24317210000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D760E000
unkown
page readonly
7605000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D710B000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7AC0000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
20B4EFF0000
trusted library allocation
page read and write
CAE0000
unkown
page read and write
3D7E000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
6B8C000
heap
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
C24E000
stack
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D71F9000
unkown
page readonly
AA99000
unkown
page read and write
7FF5D7507000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
3DCB000
trusted library allocation
page read and write
2431721E000
heap
page read and write
B8DB000
stack
page read and write
7FF5D75E9000
unkown
page readonly
7DC0000
unkown
page readonly
3530000
unkown
page read and write
C916000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7267000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
3A80000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7DC0000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
9C92000
unkown
page read and write
2954000
trusted library allocation
page read and write
5B30000
trusted library allocation
page read and write
2431721E000
heap
page read and write
9A96000
unkown
page read and write
2E85000
trusted library allocation
page read and write
2CA5000
trusted library allocation
page read and write
7FF5D75EE000
unkown
page readonly
CAF6000
unkown
page read and write
760F000
unkown
page read and write
24317210000
heap
page read and write
A02E000
stack
page read and write
7FF5D77A4000
unkown
page readonly
521E000
stack
page read and write
F0731FF000
stack
page read and write
6DDF000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
2BAA000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
6B80000
heap
page read and write
24317210000
heap
page read and write
246C8420000
trusted library allocation
page read and write
2A93000
trusted library allocation
page read and write
7FF5D75C1000
unkown
page readonly
7FF5D7641000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
CAB6000
unkown
page read and write
1731000
unkown
page readonly
C625000
unkown
page read and write
35B5000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
3626000
unkown
page read and write
B14000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
A39F000
unkown
page read and write
9A6A000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
8A7A000
unkown
page read and write
2431721E000
heap
page read and write
2EC0000
unkown
page readonly
7FF5D7336000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
A33F000
unkown
page read and write
6EE0000
trusted library allocation
page read and write
7FF5D75AF000
unkown
page readonly
227EABB0000
trusted library allocation
page read and write
35C9000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
10D4E000
stack
page read and write
35B5000
unkown
page read and write
158F9D40000
direct allocation
page read and write
35C1000
unkown
page read and write
7FF5D7792000
unkown
page readonly
25F1AAE0000
heap
page read and write
158F7E67000
heap
page read and write
246C8470000
trusted library allocation
page read and write
3C87000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
3912000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D75F2000
unkown
page readonly
7FF5D720F000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
2431721E000
heap
page read and write
6CB0000
heap
page read and write
24385186000
heap
page read and write
35B3000
unkown
page read and write
5E30000
trusted library allocation
page execute and read and write
7FF5D7280000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
7FF5D7485000
unkown
page readonly
F0C000
heap
page read and write
2D64000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
24317210000
heap
page read and write
C5F0000
unkown
page read and write
35E4000
unkown
page read and write
7FF5D77CD000
unkown
page readonly
7FF5D72D0000
unkown
page readonly
7FF6CF962000
unkown
page readonly
CA3C000
unkown
page read and write
7FF5D7534000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
3350000
unkown
page execute and read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
7DBD000
stack
page read and write
2C1A000
trusted library allocation
page read and write
A3C3000
unkown
page read and write
7FF5D7284000
unkown
page readonly
C4B000
heap
page read and write
7FF5D71DA000
unkown
page readonly
99B0000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF6BCCA0000
unkown
page readonly
7FF5D766E000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
158F7E45000
heap
page read and write
CB3D000
unkown
page read and write
7FF78FA60000
unkown
page readonly
AC0000
heap
page read and write
20B4D6A8000
heap
page read and write
AA01000
unkown
page read and write
9A94000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7F5757F000
stack
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
49D6000
unkown
page read and write
EF10000
unkown
page read and write
B220000
unkown
page read and write
49BB000
unkown
page read and write
158F7E96000
heap
page read and write
6B06000
heap
page read and write
3943000
trusted library allocation
page read and write
7FF5D77E0000
unkown
page readonly
7FF5D75B8000
unkown
page readonly
C908000
unkown
page read and write
25F1AAB0000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
B13000
trusted library allocation
page execute and read and write
25F1AAB0000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
EF4E000
unkown
page read and write
3CD3000
trusted library allocation
page read and write
2F2E000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
38F3000
trusted library allocation
page read and write
3DBD000
trusted library allocation
page read and write
A264000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
A313000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
C932000
unkown
page read and write
C806000
unkown
page read and write
7FF5D7385000
unkown
page readonly
2F1C000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D7398000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
2C46000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
7FF5D7694000
unkown
page readonly
7B00000
unkown
page readonly
BFB8000
stack
page read and write
7654000
unkown
page read and write
103CE000
stack
page read and write
246C8420000
trusted library allocation
page read and write
100A9000
unkown
page read and write
5DDD000
heap
page read and write
49D6000
unkown
page read and write
158F7E0B000
heap
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
A384000
unkown
page read and write
1350000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF5D745B000
unkown
page readonly
C9F9000
unkown
page read and write
7DF4F2471000
unkown
page execute read
3CE0000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
C7CB000
unkown
page read and write
761E000
unkown
page read and write
927A000
stack
page read and write
84BB000
stack
page read and write
5D66000
heap
page read and write
EF10000
unkown
page read and write
B5E2AFF000
stack
page read and write
1340000
unkown
page read and write
4ED0000
trusted library allocation
page read and write
2431721D000
heap
page read and write
24317210000
heap
page read and write
7FF6CF971000
unkown
page write copy
7FF5D72D7000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
BE90000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7669000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
3B408F7000
stack
page read and write
35DC000
unkown
page read and write
158F9DC0000
direct allocation
page read and write
246C8420000
trusted library allocation
page read and write
CB6B000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
395A000
trusted library allocation
page read and write
74E0000
heap
page read and write
7DF4F2480000
unkown
page readonly
7FF779ED6000
unkown
page readonly
9820000
unclassified section
page read and write
2431721D000
heap
page read and write
246C8420000
trusted library allocation
page read and write
35D3000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
5DAE000
heap
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
158F7E5D000
heap
page read and write
158F7EB6000
heap
page read and write
7FF5D75C1000
unkown
page readonly
7E58000
stack
page read and write
35D1000
unkown
page read and write
4EF0000
trusted library allocation
page read and write
21940290000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
35FA000
unkown
page read and write
3AE9000
trusted library allocation
page read and write
A30000
heap
page read and write
8A74000
unkown
page read and write
7FF5D76DA000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D74F2000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
A273000
unkown
page read and write
7FF5D7784000
unkown
page readonly
B5E2BFD000
stack
page read and write
246C8470000
trusted library allocation
page read and write
602000
unkown
page readonly
10E50000
unkown
page read and write
C4C6000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D747F000
unkown
page readonly
158F7C70000
heap
page read and write
3DB4000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
24385150000
trusted library allocation
page read and write
7FF5D7455000
unkown
page readonly
7FF5D71C8000
unkown
page readonly
CAE6000
unkown
page read and write
2193E7F0000
heap
page read and write
246C8470000
trusted library allocation
page read and write
CA36000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
24317210000
heap
page read and write
B03B000
stack
page read and write
2431721D000
heap
page read and write
9AF9000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
C7C6000
unkown
page read and write
7AC0000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
2431721E000
heap
page read and write
9EB0000
unkown
page readonly
1CC9DAE0000
heap
page read and write
5B10000
trusted library allocation
page read and write
7FF5D7230000
unkown
page readonly
1074E000
stack
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
1CC9D7E0000
heap
page read and write
4DC0000
trusted library allocation
page read and write
CA3C000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
CACB000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
1380000
heap
page read and write
C5FD000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF8BFB81000
unkown
page readonly
1011B000
unkown
page read and write
C78A000
unkown
page read and write
7FF6BCCE7000
unkown
page readonly
C9A7000
unkown
page read and write
7FF5D71EA000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D74B4000
unkown
page readonly
AA24000
unkown
page read and write
35B0000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
227EA98A000
heap
page read and write
9C05000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
2193EAD0000
heap
page read and write
7FF78FA61000
unkown
page execute read
B3A000
trusted library allocation
page execute and read and write
246C8420000
trusted library allocation
page read and write
7FF5D774A000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF6CF941000
unkown
page execute read
246C8420000
trusted library allocation
page read and write
7FF5D72E9000
unkown
page readonly
246C6560000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
AA9F000
unkown
page read and write
24385425000
heap
page read and write
525E000
stack
page read and write
7FF5D7795000
unkown
page readonly
8ECF000
stack
page read and write
24317210000
heap
page read and write
C48B000
unkown
page read and write
6E10000
trusted library allocation
page read and write
10B4E000
stack
page read and write
2431721E000
heap
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D77E3000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF5D7740000
unkown
page readonly
20CBCE02000
heap
page read and write
38C1000
trusted library allocation
page read and write
24317210000
heap
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D77EB000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
CA22000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
35DC000
unkown
page read and write
A251000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
1340000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7C70000
unkown
page readonly
7FF5D7450000
unkown
page readonly
7FF5D74B8000
unkown
page readonly
7FF5D720A000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
8A46000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
4F30000
heap
page read and write
246C8470000
trusted library allocation
page read and write
158F7E67000
heap
page read and write
9C96000
unkown
page read and write
158F7E9A000
heap
page read and write
7FF5D76E8000
unkown
page readonly
20CBCDA0000
trusted library allocation
page read and write
7FF5D7523000
unkown
page readonly
7FF5D75B8000
unkown
page readonly
2D87000
trusted library allocation
page read and write
7FF5D7455000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
9A84000
unkown
page read and write
BEA0000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF8A8B11000
unkown
page execute read
35B5000
unkown
page read and write
7FF5D764F000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
9AA0000
unkown
page read and write
3A74000
trusted library allocation
page read and write
B32000
trusted library allocation
page read and write
24317210000
heap
page read and write
7FF5D738E000
unkown
page readonly
F13000
heap
page read and write
7FF5D777A000
unkown
page readonly
35D3000
unkown
page read and write
B10000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
2C8E000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
7FF5D76C8000
unkown
page readonly
9D67000
unkown
page read and write
C908000
unkown
page read and write
158F96B0000
heap
page read and write
246C8420000
trusted library allocation
page read and write
7FF779E91000
unkown
page execute read
6EDC000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
1270000
unkown
page read and write
1054D000
stack
page read and write
602D000
stack
page read and write
227EA9A7000
heap
page read and write
7B7000
stack
page read and write
A233000
unkown
page read and write
53E1000
unkown
page read and write
C5F8000
unkown
page read and write
7693000
unkown
page read and write
49C2000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D76AF000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
9B91000
unkown
page read and write
35B5000
unkown
page read and write
158F7E72000
heap
page read and write
C4C6000
unkown
page read and write
1034D000
stack
page read and write
CA38000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
3AD2000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7686000
unkown
page read and write
7FF5D7558000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF5D7488000
unkown
page readonly
9EE0000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
108CD000
stack
page read and write
2C24000
trusted library allocation
page read and write
3950000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
E6CB000
stack
page read and write
2D33000
trusted library allocation
page read and write
227EABB0000
trusted library allocation
page read and write
C65E000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
3170000
unkown
page read and write
7FF5D7267000
unkown
page readonly
A313000
unkown
page read and write
7FF5D76CD000
unkown
page readonly
2431721D000
heap
page read and write
C977000
unkown
page read and write
768E000
unkown
page read and write
7FF5D7722000
unkown
page readonly
F0734FE000
stack
page read and write
7FF779ED6000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
E74D000
stack
page read and write
54CE000
trusted library allocation
page read and write
158F7E02000
heap
page read and write
C8EB000
unkown
page read and write
7FF5D7784000
unkown
page readonly
39AD000
trusted library allocation
page read and write
7B10000
unkown
page read and write
5330000
unkown
page write copy
246C8470000
trusted library allocation
page read and write
9848000
unclassified section
page read and write
158F9F3A000
direct allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D744E000
unkown
page readonly
24317210000
heap
page read and write
20CBCE2E000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
24317219000
heap
page read and write
2431721E000
heap
page read and write
246C8470000
trusted library allocation
page read and write
769A000
unkown
page read and write
7FF6CF962000
unkown
page readonly
4E20000
trusted library allocation
page read and write
5D70000
heap
page read and write
F0E2000
heap
page read and write
7FF5CE343000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
7FF5D7482000
unkown
page readonly
7FF5D6BEF000
unkown
page readonly
CA00000
unkown
page read and write
CA38000
unkown
page read and write
3966000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
158F7D50000
heap
page read and write
20B4D620000
trusted library allocation
page read and write
A416000
unkown
page read and write
7FF5D72FB000
unkown
page readonly
2D57000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7442000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
C605000
unkown
page read and write
897E000
stack
page read and write
246C8470000
trusted library allocation
page read and write
2DCD000
trusted library allocation
page read and write
20CBCDA0000
trusted library allocation
page read and write
158F7E96000
heap
page read and write
353F000
unkown
page read and write
10CCD000
stack
page read and write
227EABB0000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
C3CB000
stack
page read and write
227EAB60000
heap
page read and write
158F7E63000
heap
page read and write
2B7F000
trusted library allocation
page read and write
7FF5D7438000
unkown
page readonly
3A62000
trusted library allocation
page read and write
3CFC000
trusted library allocation
page read and write
E4CE000
stack
page read and write
3D62000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
158F7E54000
heap
page read and write
24317210000
heap
page read and write
246C8420000
trusted library allocation
page read and write
35B0000
unkown
page read and write
7F130000
trusted library allocation
page execute and read and write
7FF5D7764000
unkown
page readonly
2431721E000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
A28D000
unkown
page read and write
84F1000
unkown
page read and write
9AAC000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D75B3000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
7FF5D7837000
unkown
page readonly
7FF5D7404000
unkown
page readonly
7FF5D758D000
unkown
page readonly
C5FA000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
B85A000
stack
page read and write
2A0D000
trusted library allocation
page read and write
49A8000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
9AC3000
unkown
page read and write
7FF5D75EE000
unkown
page readonly
7FF5D7075000
unkown
page readonly
106CD000
stack
page read and write
7FF5D7262000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
35D5000
unkown
page read and write
7FF5D768B000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
8A70000
unkown
page read and write
3540000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
158F7E35000
heap
page read and write
EF5C000
unkown
page read and write
38FE000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
C8DD000
unkown
page read and write
7810000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
7FF5D77A4000
unkown
page readonly
7FF5D7797000
unkown
page readonly
3553000
unkown
page read and write
7DF4F2460000
unkown
page readonly
7FF6BCCC2000
unkown
page readonly
7FF8BFB90000
unkown
page readonly
6AB8000
heap
page read and write
A3AA000
unkown
page read and write
392E000
trusted library allocation
page read and write
7FF5D69BB000
unkown
page readonly
2431721E000
heap
page read and write
35F4000
unkown
page read and write
7DF4F2461000
unkown
page execute read
CA32000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
24317210000
heap
page read and write
25F1AA60000
heap
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
3AB3000
trusted library allocation
page read and write
C7BE000
unkown
page read and write
9AA8000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF7A34E1000
unkown
page write copy
246C8470000
trusted library allocation
page read and write
35C1000
unkown
page read and write
49B7F57000
stack
page read and write
3542000
unkown
page read and write
24386E30000
direct allocation
page read and write
E00000
unkown
page readonly
10154000
unkown
page read and write
7FF8BFBA3000
unkown
page readonly
24317210000
heap
page read and write
2FDD000
trusted library allocation
page read and write
7FF5D760B000
unkown
page readonly
C46F000
unkown
page read and write
2431721E000
heap
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7686000
unkown
page readonly
7FF5D776F000
unkown
page readonly
C7C6000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
35D5000
unkown
page read and write
35BD000
unkown
page read and write
7FF6BCCC2000
unkown
page readonly
549E000
stack
page read and write
12B0000
unkown
page read and write
158F7E5D000
heap
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
3630000
unkown
page readonly
C50F000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
CA2E000
unkown
page read and write
20CBCF02000
heap
page read and write
246C8420000
trusted library allocation
page read and write
2FCA000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
7637000
unkown
page read and write
6DC0000
trusted library allocation
page read and write
4F33000
heap
page read and write
8870000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
3520000
unkown
page readonly
C621000
unkown
page read and write
9AA0000
unkown
page read and write
158F7E63000
heap
page read and write
7FF5D7458000
unkown
page readonly
35C1000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
2193E802000
heap
page read and write
102CE000
stack
page read and write
B4BF000
stack
page read and write
9A80000
unkown
page read and write
7DF4F2481000
unkown
page execute read
6BBB000
heap
page read and write
CA36000
unkown
page read and write
7FF5D77A8000
unkown
page readonly
1281000
unkown
page readonly
3AA1000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
9AC3000
unkown
page read and write
7FF8B83B1000
unkown
page readonly
3CCD000
trusted library allocation
page read and write
BFB8000
stack
page read and write
6AE4000
heap
page read and write
A2DD000
unkown
page read and write
7FF5D7691000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
33C0000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
3D69000
trusted library allocation
page read and write
11D0000
unkown
page read and write
3A4F000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
BDC0000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
AA92000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
24317210000
heap
page read and write
246C8470000
trusted library allocation
page read and write
CA30000
unkown
page read and write
3960000
trusted library allocation
page read and write
2431721E000
heap
page read and write
7FF5D76D7000
unkown
page readonly
7FF5D71EA000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
E10000
unkown
page readonly
158F9D80000
direct allocation
page read and write
75E0000
unkown
page read and write
35B3000
unkown
page read and write
7FF5D6BDB000
unkown
page readonly
C8F8000
unkown
page read and write
A3AC000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
24386E71000
direct allocation
page read and write
7FF5D76D5000
unkown
page readonly
7FF5D74FA000
unkown
page readonly
246C8470000
trusted library allocation
page read and write
7DF4F2480000
unkown
page readonly
3B409FE000
stack
page read and write
246C6560000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
4AA0000
unkown
page read and write
35D3000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
C5F8000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7700000
unkown
page readonly
2EA1000
unkown
page read and write
7FF5D748C000
unkown
page readonly
7FF6BCCA1000
unkown
page execute read
7FF5D728E000
unkown
page readonly
7FF5D77C7000
unkown
page readonly
24317210000
heap
page read and write
246C8420000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
10A4D000
stack
page read and write
7FF8A8F0F000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
728E000
stack
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D768B000
unkown
page readonly
8DCB000
stack
page read and write
246C8470000
trusted library allocation
page read and write
E84D000
stack
page read and write
7FF5D7797000
unkown
page readonly
CA42000
unkown
page read and write
9ABD000
unkown
page read and write
9A6A000
unkown
page read and write
246C8470000
trusted library allocation
page read and write
246C8420000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
3D36000
trusted library allocation
page read and write
7FF779ECE000
unkown
page read and write
7FF6BCCCF000
unkown
page write copy
86E0000
unkown
page readonly
C483000
unkown
page read and write
3A8D000
trusted library allocation
page read and write
5D91000
heap
page read and write
7FF5D723C000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
A264000
unkown
page read and write
7FF5D76D7000
unkown
page readonly
6DC5000
trusted library allocation
page read and write
CAE9000
unkown
page read and write
7FF5D705D000
unkown
page readonly
35C1000
unkown
page read and write
158F7E01000
heap
page read and write
AD4FCFF000
stack
page read and write
7FF7A34F3000
unkown
page read and write
327D000
stack
page read and write
246C8420000
trusted library allocation
page read and write
7FF5D7760000
unkown
page readonly
CB3D000
unkown
page read and write
24386A40000
trusted library allocation
page read and write
A220000
unkown
page read and write
3DA7000
trusted library allocation
page read and write
246C8470000
trusted library allocation
page read and write
60B0000
heap
page read and write
7FF5D723F000
unkown
page readonly
246C8420000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
7FF8BFB8C000
unkown
page readonly
A02E000
stack
page read and write
246C8420000
trusted library allocation
page read and write
2A5A000
trusted library allocation
page read and write
3626000
unkown
page read and write
246C8420000
trusted library allocation
page read and write
C450000
unkown
page read and write
398E000
trusted library allocation
page read and write
B6E000
heap
page read and write
246C8470000
trusted library allocation
page read and write
There are 3272 hidden memdumps, click here to show them.