IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\4A64.tmp.x.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7405.tmp.zx.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI26522\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI26522\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI26522\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI26522\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI26522\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI26522\libffi-7.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI26522\python38.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI26522\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI26522\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI26522\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\7D3ED97FB83B796922796\7D3ED97FB83B796922796.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\7D3ED97FB83B796922796\7D3ED97FB83B796922796.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4A64.tmp.x.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI26522\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
There are 47 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\audiodg.exe
"C:\Windows\system32\audiodg.exe"
malicious
C:\Windows\System32\svchost.exe
"C:\Windows\system32\svchost.exe"
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\system32\msiexec.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\7D3ED97FB83B796922796\7D3ED97FB83B796922796.exe
"C:\Users\user\AppData\Roaming\7D3ED97FB83B796922796\7D3ED97FB83B796922796.exe"
malicious
C:\Windows\System32\svchost.exe
"C:\Windows\system32\svchost.exe"
malicious
C:\Windows\System32\audiodg.exe
"C:\Windows\system32\audiodg.exe"
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\system32\msiexec.exe"
malicious
C:\Users\user\AppData\Local\Temp\4A64.tmp.x.exe
"C:\Users\user\AppData\Local\Temp\4A64.tmp.x.exe"
malicious
C:\Users\user\AppData\Roaming\7D3ED97FB83B796922796\7D3ED97FB83B796922796.exe
"C:\Users\user\AppData\Roaming\7D3ED97FB83B796922796\7D3ED97FB83B796922796.exe"
malicious
C:\Windows\System32\audiodg.exe
"C:\Windows\system32\audiodg.exe"
malicious
C:\Windows\System32\svchost.exe
"C:\Windows\system32\svchost.exe"
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\system32\msiexec.exe"
malicious
C:\Users\user\AppData\Local\Temp\7405.tmp.zx.exe
"C:\Users\user\AppData\Local\Temp\7405.tmp.zx.exe"
malicious
C:\Users\user\AppData\Local\Temp\7405.tmp.zx.exe
"C:\Users\user\AppData\Local\Temp\7405.tmp.zx.exe"
malicious
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://aka.ms/odirmr
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
http://tempuri.org/Entity/Id12Response
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://176.111.174.140/dy/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://wns.windows.com/L
unknown
https://api.ip.sb/ip
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.datacontract.org/2004/07/System.ServiceModel
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
https://outlook.com_
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://schemas.micro
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://tempuri.org/:hardwares.
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
http://176.111.174.140/bin/bot64.binID
unknown
http://tempuri.org/Entity/Id13Response
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://tempuri.org/Entity/Id12ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
unknown
https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://tempuri.org/Entity/Id7ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Entity/Id4ResponseD
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2002/12/policy
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
176.111.174.140
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Hidden
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Services
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010426
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ebnzvat\7Q3RQ97SO83O796922796\7Q3RQ97SO83O796922796.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000040422
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ebnzvat\7Q3RQ97SO83O796922796\7Q3RQ97SO83O796922796.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 57 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
AB61000
unkown
page read and write
malicious
A92000
unkown
page readonly
malicious
1C2B5AA0000
trusted library allocation
page read and write
1510000
unkown
page readonly
62B1000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
B8AB000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED714000
unkown
page readonly
F3A3000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
A50B000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED495000
unkown
page readonly
787C000
unkown
page read and write
3137000
trusted library allocation
page read and write
7FF5ED73D000
unkown
page readonly
759E000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
41E6000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED4E8000
unkown
page readonly
7FF5ED4FD000
unkown
page readonly
C6C1000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
A33E000
unkown
page read and write
2F23000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
5590000
unkown
page write copy
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED821000
unkown
page readonly
97AD000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
88EE000
stack
page read and write
1EE22A43000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
8210000
unkown
page read and write
58A2000
trusted library allocation
page read and write
1EE229B3000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
AB4B000
unkown
page read and write
68095DE000
stack
page read and write
7FF63A835000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
37A0000
unkown
page read and write
7FF5ED46E000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
411A000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE22999000
heap
page read and write
9B0000
direct allocation
page read and write
7FFE148B9000
unkown
page readonly
B10C000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1301CEB0000
heap
page read and write
2DA4000
trusted library allocation
page read and write
7FF5ED81B000
unkown
page readonly
1EE22A0E000
heap
page read and write
C5A0000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED2A9000
unkown
page readonly
B08D000
stack
page read and write
C51E000
unkown
page read and write
1BBE519D000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED781000
unkown
page readonly
40D2000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
8730000
unkown
page read and write
7FF5ED342000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF63A838000
unkown
page readonly
C52C000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
10DAA000
unkown
page execute and read and write
100F000
stack
page read and write
32CA000
trusted library allocation
page read and write
7FF5ED810000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5EDA14000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7FFE13321000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
B170000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1350000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
A4AB000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
810000
direct allocation
page read and write
32EE000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
4114000
trusted library allocation
page read and write
C9A4000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
C557000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
580000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
EBC000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED556000
unkown
page readonly
1EE24730000
direct allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
CA63000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
E938000
unkown
page execute and read and write
9871000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7B80000
unkown
page read and write
8710000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
409F000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
713F000
trusted library allocation
page read and write
AADB000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
6210000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED77C000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1EE22A15000
heap
page read and write
943C000
stack
page read and write
62DF000
heap
page read and write
6320000
trusted library allocation
page read and write
7FF5ED939000
unkown
page readonly
4C7A000
unkown
page read and write
4B93000
unkown
page read and write
7FF5D1CD4000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
9A5B000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
BC9B000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE229E1000
heap
page read and write
1BBE519D000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1EE22A55000
heap
page read and write
30C1000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF6EEF21000
remote allocation
page execute read
40DF000
trusted library allocation
page read and write
7FF5ED1CC000
unkown
page readonly
7865000
unkown
page read and write
9881000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
318E000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
CA64000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED40D000
unkown
page readonly
B629000
stack
page read and write
1040000
direct allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
B629000
stack
page read and write
7FF5ED5C9000
unkown
page readonly
4B50000
unkown
page read and write
A11F000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
906E000
stack
page read and write
7FF5ED803000
unkown
page readonly
7FF5ED64F000
unkown
page readonly
B08CE7C000
stack
page read and write
7FF5ED847000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE24AC1000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
28E3E413000
heap
page read and write
1EE229E4000
heap
page read and write
1301CF90000
heap
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1EE229D9000
heap
page read and write
1BBE519D000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
10D0000
heap
page read and write
E93A000
unkown
page execute and read and write
4FAB000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
337A000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3E45000
trusted library allocation
page read and write
9875000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1EB71770000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
4283000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
A11F000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
7DF4F3041000
unkown
page execute read
7100000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
CA20000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1301CE90000
heap
page read and write
97B5000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
10760000
unkown
page read and write
A502000
unkown
page read and write
7FF5ED850000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
A494000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
6D65000
heap
page read and write
8208000
stack
page read and write
7FF5ED59E000
unkown
page readonly
3FC4000
trusted library allocation
page read and write
1EE24AC0000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE229C9000
heap
page read and write
1C2B5A00000
trusted library allocation
page read and write
1EE246F0000
direct allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
7FF5ED503000
unkown
page readonly
7865000
unkown
page read and write
1EE24AD0000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
797D000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
402A000
trusted library allocation
page read and write
9C0000
direct allocation
page read and write
A323000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED28E000
unkown
page readonly
7FF5ED961000
unkown
page readonly
7FFDFFC20000
unkown
page readonly
9977000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5EDA08000
unkown
page readonly
3E4F000
trusted library allocation
page read and write
AF8D000
stack
page read and write
7FF5ED4DF000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
76A0000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1FFAF7A0000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
6DCB000
heap
page read and write
7D00000
unkown
page readonly
6D30000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
B6A0000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5A00000
trusted library allocation
page read and write
7FF6EEF27000
remote allocation
page execute and read and write
F364000
unkown
page read and write
7FFDFB11D000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5EDA11000
unkown
page readonly
41E3000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C4D0000
unkown
page read and write
1BBE519D000
heap
page read and write
7FF5ED814000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5EDA69000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1EE22A11000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
B8AB000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE22A06000
heap
page read and write
7FFE13310000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
C811000
unkown
page read and write
7FF7821C0000
unkown
page readonly
6D60000
heap
page read and write
31F8000
trusted library allocation
page read and write
7FF5ED93E000
unkown
page readonly
3797000
unkown
page read and write
7FF7821C8000
unkown
page readonly
307C000
trusted library allocation
page read and write
62F5000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1480000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
9893000
unkown
page read and write
7FF6EEF21000
remote allocation
page execute read
7FF5ED71E000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
F11F000
stack
page read and write
36D3000
stack
page read and write
28E3E350000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
B1E000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED996000
unkown
page readonly
C40000
heap
page read and write
7FF5ED4A1000
unkown
page readonly
CAAA000
unkown
page read and write
96DF000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED674000
unkown
page readonly
7FF5ED507000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED9CA000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
4193000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE22A01000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2FFE000
trusted library allocation
page read and write
7FF5ED1F3000
unkown
page readonly
8D5B000
stack
page read and write
41FB000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
986F000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
311D000
trusted library allocation
page read and write
9E6C000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
F3E6000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
C9D3000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
9A10000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7DF4F3051000
unkown
page execute read
7C80000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7244AFF000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
10DA8000
unkown
page execute and read and write
1C2B5AA0000
trusted library allocation
page read and write
ED9000
heap
page read and write
BDC0000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
8DA0000
unkown
page read and write
7FF7821C5000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF7821C5000
unkown
page readonly
7FF5ED9C8000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
408B000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A494000
unkown
page read and write
B8C0000
unkown
page readonly
714F000
trusted library allocation
page read and write
979C000
unkown
page read and write
62FB000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
3145000
trusted library allocation
page read and write
F4EA000
unkown
page execute and read and write
F8E8000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C846000
unkown
page read and write
4B56000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF7F2D05000
remote allocation
page readonly
2290AF50000
trusted library allocation
page read and write
7FF5ED516000
unkown
page readonly
7FF5ED4BB000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5EDA38000
unkown
page readonly
1EE22A3B000
heap
page read and write
987B000
unkown
page read and write
E61C000
stack
page read and write
7FF5ED7F1000
unkown
page readonly
7FF5ED814000
unkown
page readonly
5320000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED46A000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED4B4000
unkown
page readonly
1301D07A000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
379E000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
4CE0000
unkown
page read and write
7FF5ED534000
unkown
page readonly
C50A000
unkown
page read and write
7FF5ED850000
unkown
page readonly
7FF6626D0000
remote allocation
page execute and read and write
36D5000
stack
page read and write
C512000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3E40000
trusted library allocation
page read and write
B190000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1510000
unkown
page readonly
F5D0000
unclassified section
page read and write
4281000
trusted library allocation
page read and write
7FF5ED939000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED4A1000
unkown
page readonly
1BBE5190000
heap
page read and write
3387000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
CA42000
unkown
page read and write
4227000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9869000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7E11000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED996000
unkown
page readonly
30C6000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED4B0000
unkown
page readonly
7FF69F3E0000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2F87000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
AC2000
unkown
page readonly
30B3000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED8C6000
unkown
page readonly
52F0000
trusted library allocation
page read and write
2290AEB0000
trusted library allocation
page read and write
7FF5ED26E000
unkown
page readonly
1E8CD560000
heap
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C503000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C5A3000
unkown
page read and write
7FF5ED7E0000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
B640000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5A00000
trusted library allocation
page read and write
7FF5ED4E8000
unkown
page readonly
1C2B5A00000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
9881000
unkown
page read and write
42F9000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
7FF6626D5000
remote allocation
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C893000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
F424000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C503000
unkown
page read and write
7695000
stack
page read and write
79D3000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1EE22A3B000
heap
page read and write
7FF5ED1FB000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
89A0000
unkown
page read and write
4B93000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C84D000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED4DF000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
9CA000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7F30000
unkown
page read and write
7FF5ED1D2000
unkown
page readonly
4CC0000
unkown
page read and write
4133000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
425D000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE22A35000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED5A8000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED4C2000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
36F0000
unkown
page readonly
7FF5ED2A4000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A375000
unkown
page read and write
7B80000
unkown
page read and write
F903000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7168000
trusted library allocation
page read and write
F4E8000
unkown
page execute and read and write
1EE22A53000
heap
page read and write
13A1000
unkown
page read and write
7FF6EEF25000
remote allocation
page readonly
A092000
heap
page read and write
1EE22A02000
heap
page read and write
3580000
unkown
page readonly
1EE229D9000
heap
page read and write
F5CE000
stack
page read and write
A37D000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
7FF5ED4C2000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED735000
unkown
page readonly
41C1000
trusted library allocation
page read and write
8DA0000
unkown
page read and write
1265000
heap
page read and write
7FF5ED9F2000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1EE22A35000
heap
page read and write
7FF5ED806000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
149F000
stack
page read and write
6D71000
heap
page read and write
7FF69F426000
unkown
page readonly
626E000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3192000
trusted library allocation
page read and write
9815000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED476000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
4288000
trusted library allocation
page read and write
B150000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
30DF000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED55F000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED5C5000
unkown
page readonly
4189000
trusted library allocation
page read and write
438EFE000
stack
page read and write
7FF5ED872000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
8000000
unkown
page read and write
E61C000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
10C60000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED7C4000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
F8D1000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
4037000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
1301D000000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
AAF6000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE50C0000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED1F7000
unkown
page readonly
E71D000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
4BE3000
unkown
page read and write
7FF5ED781000
unkown
page readonly
7FF5ED980000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
AB5C000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
7FF5ED755000
unkown
page readonly
54A000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
30B6000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
10D5E000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE24670000
direct allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3E11000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
7FF5ED8F9000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
C7C5000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5D1CCD000
unkown
page readonly
1BBE519D000
heap
page read and write
7FF5ED97E000
unkown
page readonly
F09A000
unkown
page read and write
7FF5ED793000
unkown
page readonly
7FF5ED349000
unkown
page readonly
7FF5ED50A000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1EB716A0000
heap
page read and write
7FF5ED853000
unkown
page readonly
8108000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5EDA11000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF7F2D00000
remote allocation
page execute and read and write
2290AF50000
trusted library allocation
page read and write
1301D095000
heap
page read and write
1F5FB530000
heap
page read and write
89E0000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
12EA000
trusted library allocation
page execute and read and write
4198000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
36D3000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
1EE24310000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3800000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
A323000
unkown
page read and write
7F2E0000
trusted library allocation
page execute and read and write
10EC0000
unkown
page read and write
89C0000
unkown
page read and write
7FF5EDA53000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED867000
unkown
page readonly
9879000
unkown
page read and write
3FCA000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
784A000
unkown
page read and write
407E000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
4045000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
C5A3000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED76D000
unkown
page readonly
6D14000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
C10A000
stack
page read and write
C9B0000
unkown
page read and write
7FF7821C1000
unkown
page execute read
101E000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED7DB000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7FF5ED714000
unkown
page readonly
A29E000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
7E60000
unkown
page read and write
C561000
unkown
page read and write
A21E000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
411F000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
714A000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1EE248B0000
direct allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
97D4000
unkown
page read and write
1EB7177B000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
B08D000
stack
page read and write
C5AA000
unkown
page read and write
586B000
trusted library allocation
page read and write
40D8000
trusted library allocation
page read and write
3240000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
AADB000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
62D6000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7695000
stack
page read and write
9792000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
6279000
heap
page read and write
9815000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF69F40B000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
3658000
stack
page read and write
B8C0000
unkown
page readonly
7FFDFB147000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
4077000
trusted library allocation
page read and write
7CC0000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2DBE000
trusted library allocation
page read and write
322B000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C6BF000
unkown
page read and write
7FF5ED62F000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED5A8000
unkown
page readonly
2EE4000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7953000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FFE13311000
unkown
page execute read
5555000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
785F000
unkown
page read and write
7A34000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
62E6000
heap
page read and write
2290AEB0000
trusted library allocation
page read and write
65BC000
stack
page read and write
1FFAF7FB000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
422D000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
11B0000
unkown
page readonly
8210000
unkown
page read and write
4E18000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page read and write
7FF5ED942000
unkown
page readonly
3FFF000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7977000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
818E000
stack
page read and write
CBD9000
unkown
page read and write
8CA7000
unkown
page read and write
7FF6EEF25000
remote allocation
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
6200000
trusted library allocation
page read and write
7FF5ED942000
unkown
page readonly
98E0000
unkown
page read and write
1BBE5190000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FFDFB103000
unkown
page read and write
6D7B000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
A49E000
unkown
page read and write
404B000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1EE22A3A000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED9E1000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
F464000
unkown
page read and write
C88B000
unkown
page read and write
BD98000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
BD98000
stack
page read and write
7FF5ED286000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED9A1000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AEB0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page execute and read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED4C6000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED3F3000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED8FF000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7FF7821C1000
unkown
page execute read
F8A0000
unkown
page read and write
4BA6000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
10BD000
heap
page read and write
7FF5ED9B8000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
412C000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
7FF5ED7D6000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
8730000
unkown
page read and write
3327000
trusted library allocation
page read and write
7DF4F3040000
unkown
page readonly
7869000
unkown
page read and write
7F30000
unkown
page read and write
A37B000
unkown
page read and write
7FF5ED8AC000
unkown
page readonly
9792000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
CB63000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A90000
unkown
page readonly
7FF5ED9D6000
unkown
page readonly
7FF69F3E0000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
135E000
stack
page read and write
7DF4F3061000
unkown
page execute read
8BE9000
stack
page read and write
779D000
stack
page read and write
10D0000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
8DAC000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
B7A000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
40B3000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
37BD000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
C4A0000
unkown
page read and write
4BDC000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
E8F0000
unkown
page execute and read and write
1C2B5AA0000
trusted library allocation
page read and write
36F0000
unkown
page readonly
1BBE5190000
heap
page read and write
2F62000
trusted library allocation
page read and write
41A5000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED3F3000
unkown
page readonly
5860000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1230000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3FDC000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
12F7000
trusted library allocation
page execute and read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7D53000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1EE22A5E000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF7F2D07000
remote allocation
page execute and read and write
2290AF50000
trusted library allocation
page read and write
12E2000
trusted library allocation
page read and write
428E000
trusted library allocation
page read and write
1C2B5A00000
trusted library allocation
page read and write
7FF5ED476000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7D40000
unkown
page read and write
7FF5ED68F000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FFE13330000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1301D093000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
10C0000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
8EC6000
unkown
page read and write
250F3CD0000
heap
page readonly
1C2B5AA0000
trusted library allocation
page read and write
8208000
stack
page read and write
6090000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3290000
unkown
page read and write
A29E000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3748000
unkown
page read and write
6259000
heap
page read and write
5FF0000
trusted library allocation
page read and write
A37B000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED4B4000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
BD1D000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3580000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED9D9000
unkown
page readonly
1BBE5190000
heap
page read and write
1EE24AC1000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED39B000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1EE24A80000
direct allocation
page read and write
7FF5ED4BB000
unkown
page readonly
7CE0000
unkown
page read and write
C89C000
unkown
page read and write
C5A0000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A50B000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A364000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED915000
unkown
page readonly
5FCE000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
6232000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED9D6000
unkown
page readonly
3209000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
1BBE519D000
heap
page read and write
3168000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
4053000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3291000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AEB0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
338B000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3FE7000
trusted library allocation
page read and write
3206000
trusted library allocation
page read and write
B500000
heap
page read and write
A433000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FFDFAD71000
unkown
page execute read
1C2B5AA0000
trusted library allocation
page read and write
3360000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED43A000
unkown
page readonly
7FF63A838000
unkown
page readonly
42F6000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
42CA000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED9BE000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1301D036000
heap
page read and write
1BBE5190000
heap
page read and write
7FF5ED33F000
unkown
page readonly
C4C000
heap
page read and write
E938000
unkown
page execute and read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
60C0000
trusted library allocation
page execute and read and write
7FF5ED779000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1676000
heap
page read and write
CA63000
unkown
page read and write
1BBE519D000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
5363000
heap
page read and write
7FF5ED9FF000
unkown
page readonly
60B0000
trusted library allocation
page execute and read and write
1C2B5AA0000
trusted library allocation
page read and write
1301D063000
heap
page read and write
7FF5ED3DA000
unkown
page readonly
7FF5ED6A5000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
8BE9000
stack
page read and write
7FF5ED975000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1230000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
76A0000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3234000
trusted library allocation
page read and write
7FF5ED202000
unkown
page readonly
7FF5ED1BE000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1301D044000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
143B000
stack
page read and write
64BD000
stack
page read and write
CA20000
unkown
page read and write
31A1000
trusted library allocation
page read and write
7FF6EEF27000
remote allocation
page execute and read and write
2290AF50000
trusted library allocation
page read and write
FFD000
trusted library allocation
page execute and read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED937000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
305D000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
775E000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9929000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
250F3B02000
heap
page read and write
7FF5ED519000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
1FFAF7F0000
heap
page read and write
93BE000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED692000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
432A000
trusted library allocation
page read and write
A4A1000
unkown
page read and write
7DF4F3051000
unkown
page execute read
1BBE5190000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE229C4000
heap
page read and write
C51E000
unkown
page read and write
9929000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED445000
unkown
page readonly
2E00000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1EE229D5000
heap
page read and write
5380000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
2290AEB0000
trusted library allocation
page read and write
325F000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
41B3000
trusted library allocation
page read and write
7FF5ED92C000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9893000
unkown
page read and write
8BF0000
unkown
page readonly
7FF5ED87D000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7FF5ED3D0000
unkown
page readonly
8F33000
unkown
page read and write
BDA0000
unkown
page readonly
8108000
stack
page read and write
7FF5ED8C1000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
C6C1000
unkown
page read and write
9873000
unkown
page read and write
76C0000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE22930000
heap
page read and write
42A9000
trusted library allocation
page read and write
978E000
unkown
page read and write
1BBE6BB0000
heap
page read and write
7FF5ED9C6000
unkown
page readonly
7FF5ED9A6000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7F40000
unkown
page readonly
C6C9000
unkown
page read and write
42D7000
trusted library allocation
page read and write
7FFDFFD0F000
unkown
page read and write
BF0000
heap
page read and write
1301D05F000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
76DE000
stack
page read and write
3E53000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED412000
unkown
page readonly
1BBE5190000
heap
page read and write
1EE22A36000
heap
page read and write
FE0000
trusted library allocation
page read and write
7FF5ED449000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5EDA0D000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AEB0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED8F9000
unkown
page readonly
AAD1000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
4CC0000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9550000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED670000
unkown
page readonly
DE0000
unkown
page readonly
55E0000
trusted library allocation
page read and write
1365000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF7F2D07000
remote allocation
page execute and read and write
2290AF50000
trusted library allocation
page read and write
10ED3000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
9885000
unkown
page read and write
1018000
heap
page read and write
3203000
trusted library allocation
page read and write
9929000
unkown
page read and write
405F000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
33B9000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3121000
trusted library allocation
page read and write
1EE24AD3000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1EE22A11000
heap
page read and write
7FF5ED864000
unkown
page readonly
1BBE5178000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
9977000
unkown
page read and write
E81D000
stack
page read and write
987F000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C41F000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1050000
heap
page read and write
DE0000
unkown
page readonly
7FF5ED43A000
unkown
page readonly
1EE24AD6000
heap
page read and write
987B000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
913A000
stack
page read and write
7FFDFFCD5000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
42D5000
trusted library allocation
page read and write
A3BE000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3240000
unkown
page read and write
7E11000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF6EEF20000
remote allocation
page execute and read and write
7FF5ED418000
unkown
page readonly
1EE22A38000
heap
page read and write
1200000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
53C0000
heap
page execute and read and write
2DA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A491000
unkown
page read and write
438CFD000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FFDFB164000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
42A3000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED5C1000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
BC9B000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3756000
unkown
page read and write
4268000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
CA20000
unkown
page read and write
1E8CD7D0000
heap
page read and write
35D0000
unkown
page read and write
3758000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED844000
unkown
page readonly
9885000
unkown
page read and write
CA08000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
97C3000
unkown
page read and write
C1F000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C10A000
stack
page read and write
C54A000
unkown
page read and write
2290AEB0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C962000
unkown
page read and write
7125000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3700000
unkown
page read and write
297E000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED625000
unkown
page readonly
7FF5ED505000
unkown
page readonly
37AC000
unkown
page read and write
7FF5ED74A000
unkown
page readonly
7FFDFB05D000
unkown
page readonly
F3D000
stack
page read and write
A020000
unkown
page execute read
AAF2000
unkown
page read and write
1EE22A55000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF69F41E000
unkown
page read and write
9B7FC7B000
stack
page read and write
7FF5ED507000
unkown
page readonly
1BBE5190000
heap
page read and write
62EF000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED86B000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE24BC0000
direct allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF69F41E000
unkown
page write copy
1301D102000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2F3C000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
10F3000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE229C4000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED9F2000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED556000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
A33E000
unkown
page read and write
7DF4F3050000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF63A837000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
AAF6000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7CD0000
unkown
page read and write
7FF69F3E1000
unkown
page execute read
1C2B5AA0000
trusted library allocation
page read and write
2290AEB0000
trusted library allocation
page read and write
1050000
direct allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
FA0000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED9AE000
unkown
page readonly
310E000
stack
page read and write
1EE22A11000
heap
page read and write
5871000
trusted library allocation
page read and write
3E1F000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
28E3E380000
heap
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
AB0D000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1EE229FB000
heap
page read and write
7FF5ED342000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
978E000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
4C4B000
unkown
page read and write
9883000
unkown
page read and write
986F000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7847000
unkown
page read and write
10F1000
heap
page read and write
1FFAF680000
heap
page read and write
304B000
trusted library allocation
page read and write
C893000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
C6F8000
unkown
page read and write
9877000
unkown
page read and write
4295000
trusted library allocation
page read and write
9792000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
AB4B000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
AAF2000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1301D077000
heap
page read and write
9DED000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
4023000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE249F0000
direct allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
4C4B000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
4201000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5EDA70000
unkown
page readonly
1090000
heap
page read and write
250F39F0000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
9893000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1360000
heap
page execute and read and write
1361000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
4BE1000
unkown
page read and write
9795000
unkown
page read and write
7FF5ED8A4000
unkown
page readonly
14B0000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
626B000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
A4A1000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
637C000
stack
page read and write
52F5000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
10FA1E7000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C6F8000
unkown
page read and write
C6D8000
unkown
page read and write
4307000
trusted library allocation
page read and write
9879000
unkown
page read and write
1BBE519D000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C999000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
4B78000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1EE229E2000
heap
page read and write
1EE2298E000
heap
page read and write
97A9000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE22A35000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED586000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED97A000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
ABA3000
unkown
page read and write
7FF5ED503000
unkown
page readonly
7FF5ED6A5000
unkown
page readonly
789F000
stack
page read and write
970000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
C350000
remote allocation
page execute read
1483000
heap
page read and write
7FF5ED3CE000
unkown
page readonly
A391000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
5360000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1EE22A11000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
6248000
heap
page read and write
1BBE5190000
heap
page read and write
C700000
unkown
page read and write
7FF7821C1000
unkown
page execute read
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
9875000
unkown
page read and write
7FF5ED692000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
B009000
stack
page read and write
AB5D000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9701000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
F364000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7C90000
unkown
page read and write
40C6000
trusted library allocation
page read and write
C846000
unkown
page read and write
1BBE5190000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
4C60000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
E8A0000
remote allocation
page execute read
2290AF50000
trusted library allocation
page read and write
7129000
trusted library allocation
page read and write
7FF5ED885000
unkown
page readonly
7FF5ED9E1000
unkown
page readonly
7FF7F2D05000
remote allocation
page readonly
CB43000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C50A000
unkown
page read and write
786B000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A32A000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
8D5B000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
409C000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
AC7000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
F4A0000
unkown
page execute and read and write
1C2B5AA0000
trusted library allocation
page read and write
F500000
unclassified section
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C516000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1EE24A40000
direct allocation
page read and write
2290AF50000
trusted library allocation
page read and write
CA08000
unkown
page read and write
E51D000
stack
page read and write
4C1E000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
314C000
trusted library allocation
page read and write
C6CF000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9A10000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1200000
unkown
page readonly
7A34000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE22A11000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
6327000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3756000
unkown
page read and write
53A5000
trusted library allocation
page read and write
2290AEB0000
trusted library allocation
page read and write
8EC6000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE50D0000
heap
page read and write
7FF5ED750000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF6EEF25000
remote allocation
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C46000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED844000
unkown
page readonly
6F20000
trusted library allocation
page execute and read and write
250F39D0000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1240000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
784A000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED933000
unkown
page readonly
8B60000
unkown
page readonly
7FF5ED5C9000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7FF5ED71E000
unkown
page readonly
7FFDFB16F000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
F7E000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED451000
unkown
page readonly
2E11000
trusted library allocation
page read and write
7FF5D1CD4000
unkown
page readonly
7869000
unkown
page read and write
F4E8000
unkown
page execute and read and write
1FFAF770000
heap
page read and write
7FF5ED97E000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
BDA0000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
F8A0000
unkown
page read and write
40F0000
trusted library allocation
page read and write
41CE000
trusted library allocation
page read and write
7FF5ED65C000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7DF4F3071000
unkown
page execute read
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
250F3A13000
heap
page read and write
7FFE1332C000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5EDA08000
unkown
page readonly
7FF5ED471000
unkown
page readonly
1BBE5100000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
7FF6626D8000
remote allocation
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
37A8000
unkown
page read and write
97B5000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
722E000
stack
page read and write
28E3E402000
heap
page read and write
1480000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF6626D1000
remote allocation
page execute read
1E8CD480000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
4234000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
12F5000
trusted library allocation
page execute and read and write
C8E1000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1F5FB540000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C507000
unkown
page read and write
F464000
unkown
page read and write
CA66000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
AA90000
unkown
page read and write
7FF5ED86B000
unkown
page readonly
7FF69F3E1000
unkown
page execute read
4145000
trusted library allocation
page read and write
1301ED50000
trusted library allocation
page read and write
C4D0000
unkown
page read and write
F3EB000
unkown
page read and write
1BBE518F000
heap
page read and write
1EE22A01000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
12F2000
trusted library allocation
page read and write
7FF5ED3D6000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7857000
unkown
page read and write
3FAB000
trusted library allocation
page read and write
10D0000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3791000
unkown
page read and write
7FF5ED80C000
unkown
page readonly
AB4B000
unkown
page read and write
C6C9000
unkown
page read and write
B5AE000
stack
page read and write
401E000
trusted library allocation
page read and write
7861000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
923E000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
4245000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED286000
unkown
page readonly
7FF5ED5CE000
unkown
page readonly
7FF5ED337000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF69F3E1000
unkown
page execute read
4BE1000
unkown
page read and write
7FF69F424000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7230000
trusted library allocation
page read and write
75DE000
stack
page read and write
C512000
unkown
page read and write
7FF5ED779000
unkown
page readonly
1BBE519D000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
C857000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
31C5000
trusted library allocation
page read and write
71ED000
stack
page read and write
58D0000
trusted library allocation
page read and write
7FFDFB12B000
unkown
page write copy
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
6D58000
heap
page read and write
7FF5ED818000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
AA90000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
11F14000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
324D000
trusted library allocation
page read and write
42D0000
trusted library allocation
page read and write
7FF7F2D01000
remote allocation
page execute read
1C2B5AA0000
trusted library allocation
page read and write
97AD000
unkown
page read and write
32D5000
trusted library allocation
page read and write
1F5FB340000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE5170000
heap
page read and write
7FF6EEF20000
remote allocation
page execute and read and write
97B5000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE22A56000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
5B0000
heap
page read and write
13A1000
unkown
page read and write
7FF5ED52F000
unkown
page readonly
7CA0000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C9CF000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE229D5000
heap
page read and write
12DE000
stack
page read and write
7FF7821C7000
unkown
page read and write
1C2B5A00000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5A00000
trusted library allocation
page read and write
10CD0000
heap
page read and write
8A6E000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
800000
direct allocation
page read and write
AB15000
unkown
page read and write
1EE22A55000
heap
page read and write
1EB716C0000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED433000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF7F2D01000
remote allocation
page execute read
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7CD0000
unkown
page read and write
7FF5ED1D2000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
4048000
trusted library allocation
page read and write
F3EB000
unkown
page read and write
7FF5EDA0D000
unkown
page readonly
5382000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
8CA9000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5EDA53000
unkown
page readonly
9A10000
unkown
page read and write
7FF5ED74A000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
906E000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
10ED1000
unkown
page read and write
7FF6EEF28000
remote allocation
page readonly
1C2B5AA0000
trusted library allocation
page read and write
9D64000
unkown
page read and write
58E0000
trusted library allocation
page execute and read and write
1C2B5AA0000
trusted library allocation
page read and write
9977000
unkown
page read and write
9A5B000
unkown
page read and write
A19F000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1365000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
987F000
unkown
page read and write
7FF6626D7000
remote allocation
page execute and read and write
8720000
unkown
page readonly
1EB716F0000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
6D22000
heap
page read and write
7FF5ED46A000
unkown
page readonly
7FF5ED5EB000
unkown
page readonly
7FF5ED750000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
4CB0000
unkown
page read and write
1BBE519F000
heap
page read and write
41F1000
trusted library allocation
page read and write
1EE229E4000
heap
page read and write
1EE22A15000
heap
page read and write
1301CFA0000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
40A7000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
7FF5ED85F000
unkown
page readonly
4255000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
7FF5ED803000
unkown
page readonly
1EE229E4000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3FF7000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
4311000
trusted library allocation
page read and write
E71D000
stack
page read and write
A4B8000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7DF4F3030000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1EE22940000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
F80000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED93B000
unkown
page readonly
C6F4000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3FE3000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3220000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7D00000
unkown
page readonly
1451000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5EDA38000
unkown
page readonly
1EE229D5000
heap
page read and write
7FF5ED853000
unkown
page readonly
7FF69F41E000
unkown
page read and write
30A8000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF7821C0000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1EE229F3000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
312C000
trusted library allocation
page read and write
3209000
trusted library allocation
page read and write
7FF5ED85F000
unkown
page readonly
3758000
unkown
page read and write
7FFE13328000
unkown
page read and write
7CA0000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
6C10000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1EE22A11000
heap
page read and write
4107000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED4C6000
unkown
page readonly
585E000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
A3BE000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED41C000
unkown
page readonly
1E8CD570000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
E950000
unclassified section
page read and write
7FFDFAF6A000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
A4FC000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
5641000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
41B6000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
A19F000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C9E4000
unkown
page read and write
79B1000
unkown
page read and write
422F000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED990000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1037000
heap
page read and write
AD6000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED800000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
6080000
trusted library allocation
page execute and read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C9D9000
unkown
page read and write
E59D000
stack
page read and write
4B90000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
571F000
stack
page read and write
7F2E000
stack
page read and write
978E000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FFE1333E000
unkown
page readonly
AB5C000
unkown
page read and write
987F000
unkown
page read and write
7FF5ED516000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1095000
stack
page read and write
7950000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED849000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
78AD000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
965C000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED418000
unkown
page readonly
7884000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
CFA000
stack
page read and write
3700000
unkown
page read and write
4C50000
unkown
page read and write
7FF5ED65C000
unkown
page readonly
7FF5ED91A000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
E69D000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
10EE0000
unkown
page read and write
1301D02F000
heap
page read and write
98E3000
unkown
page read and write
7978000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A4AE000
unkown
page read and write
713A000
trusted library allocation
page read and write
7FF5ED7E9000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2F95000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1EE242E0000
heap
page read and write
785B000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
C57F000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
EF7000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED3A7000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED2A9000
unkown
page readonly
7FF5ED4B0000
unkown
page readonly
7FF5ED864000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF6626D0000
remote allocation
page execute and read and write
37F2000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE22A35000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
37BD000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED6DB000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7FF5ED265000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED349000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
FF3000
trusted library allocation
page execute and read and write
1BBE519D000
heap
page read and write
B22B000
stack
page read and write
6300000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2042D7C000
stack
page read and write
C57F000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED5CE000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
F8E4000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
97A9000
unkown
page read and write
1EE22A11000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
1F5FB320000
heap
page read and write
4241000
trusted library allocation
page read and write
4B8B000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED409000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
42E9000
trusted library allocation
page read and write
36D5000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
979C000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
B650000
unkown
page read and write
4B78000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A375000
unkown
page read and write
28E3E390000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
628D000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
79FB000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1EE22A35000
heap
page read and write
1C2B5A00000
trusted library allocation
page read and write
A32A000
unkown
page read and write
7FF5ED404000
unkown
page readonly
2FDB000
trusted library allocation
page read and write
E8F0000
unkown
page execute and read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED64F000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1EE22A35000
heap
page read and write
1FFAF9B0000
heap
page read and write
10E3E000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
403B000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
336B000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF69F40B000
unkown
page readonly
58AE000
trusted library allocation
page read and write
986B000
unkown
page read and write
A39B000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
4B56000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
100D000
trusted library allocation
page execute and read and write
7FF7821C7000
unkown
page read and write
7FF5ED43D000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED9FF000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED48A000
unkown
page readonly
7FF5ED602000
unkown
page readonly
B5AE000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
F903000
unkown
page read and write
896B000
stack
page read and write
A020000
unkown
page execute and read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
42DC000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7C80000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED426000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7D40000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
A479000
unkown
page read and write
589A000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
97A9000
unkown
page read and write
8800000
unkown
page read and write
10D60000
unkown
page execute and read and write
7852000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED7D6000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
C10000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3075000
trusted library allocation
page read and write
2290AEB0000
trusted library allocation
page read and write
2F2D000
trusted library allocation
page read and write
3053000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C700000
unkown
page read and write
9885000
unkown
page read and write
C563000
unkown
page read and write
2F6D000
trusted library allocation
page read and write
3FCF000
trusted library allocation
page read and write
2F9C000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
5610000
heap
page read and write
7FF5ED0D1000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7FF7821C8000
unkown
page readonly
7FF7821C8000
unkown
page readonly
7FF7F2D08000
remote allocation
page readonly
10FA5CF000
stack
page read and write
2290AEB0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
818E000
stack
page read and write
BDC0000
unkown
page readonly
7250000
trusted library allocation
page execute and read and write
1C2B5AA0000
trusted library allocation
page read and write
438DF8000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
37AE000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED71B000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
C6D8000
unkown
page read and write
2290AEB0000
trusted library allocation
page read and write
7FF69F3E1000
unkown
page execute read
2290AF50000
trusted library allocation
page read and write
A092000
heap
page read and write
62B6000
heap
page read and write
58A5000
trusted library allocation
page read and write
1EE229BF000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
417E000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3FF4000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5A00000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
10C0000
unkown
page readonly
1500000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
4B8B000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
1EE229C1000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED9A1000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED519000
unkown
page readonly
1BBE5190000
heap
page read and write
3E4C000
trusted library allocation
page read and write
C00000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
F85000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7DF4F3071000
unkown
page execute read
1C2B5AA0000
trusted library allocation
page read and write
97AD000
unkown
page read and write
9E6C000
stack
page read and write
A433000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF7F2D08000
remote allocation
page readonly
33B9000
stack
page read and write
1C2B5A00000
trusted library allocation
page read and write
40E3000
trusted library allocation
page read and write
7FF5ED810000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3E39000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
F4A0000
unkown
page execute and read and write
7FF5ED433000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5A00000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED986000
unkown
page readonly
7FF5ED295000
unkown
page readonly
7FF5ED5F7000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7FF5ED94A000
unkown
page readonly
9795000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1BBE5199000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C964000
unkown
page read and write
C54A000
unkown
page read and write
1BBE519D000
heap
page read and write
9F1E000
stack
page read and write
F3A3000
unkown
page read and write
7D20000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
4276000
trusted library allocation
page read and write
BAF9000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7D53000
unkown
page read and write
977A000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
14B0000
unkown
page readonly
56D9000
unkown
page read and write
58AB000
trusted library allocation
page read and write
7FF5ED9C6000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED9CC000
unkown
page readonly
1361000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AEB0000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED28E000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
3220000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
3210000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5EDA2A000
unkown
page readonly
12E0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7E60000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1490000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C9B1000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
250F3CE0000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FFDFFC21000
unkown
page execute read
427B000
trusted library allocation
page read and write
7FF6EEF28000
remote allocation
page readonly
1BBE519D000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C563000
unkown
page read and write
167E000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C89A000
unkown
page read and write
3F9D000
trusted library allocation
page read and write
1500000
heap
page read and write
1EE22A06000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5EDA76000
unkown
page readonly
5F0000
direct allocation
page read and write
629C000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED4F3000
unkown
page readonly
F8E4000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
982D000
unkown
page read and write
C9DC000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
10AF000
stack
page read and write
1BBE5190000
heap
page read and write
2DFE000
trusted library allocation
page read and write
7FF63A831000
unkown
page execute read
1C2B5A00000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
A327000
unkown
page read and write
7FF5ED505000
unkown
page readonly
9A5B000
unkown
page read and write
7FF69F40B000
unkown
page readonly
878000
heap
page read and write
2DC1000
trusted library allocation
page read and write
55DE000
stack
page read and write
42A6000
trusted library allocation
page read and write
431D000
trusted library allocation
page read and write
7FFE148B1000
unkown
page execute read
7FF5ED0C9000
unkown
page readonly
AB06000
unkown
page read and write
87BE000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
B140000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7106000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
EB6000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9660000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
423A000
trusted library allocation
page read and write
1EB719C0000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
E89E000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C857000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
CA42000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7CE0000
unkown
page read and write
C89A000
unkown
page read and write
CBD9000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED602000
unkown
page readonly
424F000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A39B000
unkown
page read and write
78A0000
unkown
page read and write
CA20000
unkown
page read and write
F11F000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED449000
unkown
page readonly
7FF5ED7E0000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED41C000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF69F40B000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7FF6EEF28000
remote allocation
page readonly
7FF5ED1F7000
unkown
page readonly
6FEB000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED847000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED7F1000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C544000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
35A0000
unkown
page readonly
30D1000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED743000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE229A1000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED495000
unkown
page readonly
70EE000
stack
page read and write
AF0C000
stack
page read and write
723B000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
913A000
stack
page read and write
1EE22990000
heap
page read and write
A49E000
unkown
page read and write
4222000
trusted library allocation
page read and write
7FF5EDA0B000
unkown
page readonly
7FF5EDA69000
unkown
page readonly
1BBE5190000
heap
page read and write
97D4000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED1FB000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C49E000
stack
page read and write
977A000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7DF4F3040000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1341000
unkown
page read and write
1EE229E2000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A364000
unkown
page read and write
7FF5ED8B4000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
785D000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
5891000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
F0F000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
4C9A000
unkown
page read and write
7FF7821C5000
unkown
page readonly
7FF5ED33F000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED3A7000
unkown
page readonly
53AA000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FFD000
stack
page read and write
859000
heap
page read and write
305A000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3194000
trusted library allocation
page read and write
C08A000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
79B1000
unkown
page read and write
1BBE519D000
heap
page read and write
AAF9000
unkown
page read and write
7FF5ED8FF000
unkown
page readonly
8000000
unkown
page read and write
9869000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
308A000
stack
page read and write
7FF5ED94A000
unkown
page readonly
3800000
unkown
page readonly
C41F000
stack
page read and write
B82A000
stack
page read and write
321E000
trusted library allocation
page read and write
41FE000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
37F2000
unkown
page read and write
91BB000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
F8D1000
unkown
page read and write
7FF5ED9A6000
unkown
page readonly
DD0000
unkown
page readonly
7FF5ED0C9000
unkown
page readonly
4C34000
unkown
page read and write
982D000
unkown
page read and write
7FF5EDA76000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
A391000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
4BA6000
unkown
page read and write
1BBE5190000
heap
page read and write
1490000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
4CB0000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9DED000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED80C000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
B10C000
stack
page read and write
C5AA000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
F424000
unkown
page read and write
7FF5ED42B000
unkown
page readonly
7FF5ED933000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
8021000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7852000
unkown
page read and write
7154000
trusted library allocation
page read and write
4BE3000
unkown
page read and write
7FFE000
stack
page read and write
7C90000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
68097CE000
stack
page read and write
1EE229C4000
heap
page read and write
7FF5ED3EA000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
4C8A000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9A10000
unkown
page read and write
CA6A000
unkown
page read and write
987D000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
3067000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5A00000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
4C1E000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF6626D5000
remote allocation
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A361000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
987D000
unkown
page read and write
7145000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE24AEF000
heap
page read and write
7FF5ED59E000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
724478C000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
7859000
unkown
page read and write
7FF69F41E000
unkown
page write copy
8F33000
unkown
page read and write
F500000
unclassified section
page read and write
2290AF50000
trusted library allocation
page read and write
7DF4F3030000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
6330000
trusted library allocation
page execute and read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF63A830000
unkown
page readonly
1BBE5190000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
379E000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1F5FB348000
heap
page read and write
2F7B000
trusted library allocation
page read and write
7FF5ED6BE000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
30E7000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5A00000
trusted library allocation
page read and write
F5CE000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
986B000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED975000
unkown
page readonly
CA7C000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1350000
unkown
page readonly
C52C000
unkown
page read and write
AAF9000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
4390FF000
stack
page read and write
62CE000
heap
page read and write
1E8CD590000
heap
page read and write
88EE000
stack
page read and write
3FA0000
trusted library allocation
page read and write
31A4000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
12FB000
trusted library allocation
page execute and read and write
BAF9000
stack
page read and write
37B0000
unkown
page read and write
7FF5ED5C1000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
28E3E502000
heap
page read and write
7FF5ED2A4000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
4BC9000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
408F000
trusted library allocation
page read and write
7953000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
40ED000
trusted library allocation
page read and write
7861000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF63A835000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
590000
heap
page read and write
C08A000
stack
page read and write
438FFE000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
A37D000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
3791000
unkown
page read and write
8720000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
2F71000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5EDA31000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2D8E000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED928000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9795000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3210000
unkown
page read and write
A4FC000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
4C9A000
unkown
page read and write
7FF63A831000
unkown
page execute read
2290AF50000
trusted library allocation
page read and write
6272000
heap
page read and write
2DCD000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE22A02000
heap
page read and write
CB43000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED4FD000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9977000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED87D000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AEB0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED9AE000
unkown
page readonly
7FF5ED5EB000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED8AC000
unkown
page readonly
1505000
heap
page read and write
1310000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
CC07000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1EE22A0C000
heap
page read and write
B650000
unkown
page read and write
3E31000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AEB0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED818000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED660000
unkown
page readonly
7FF5ED8C6000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
CB4D000
unkown
page read and write
8B60000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED77E000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
7FF5ED68F000
unkown
page readonly
2DAB000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
B6A0000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED9BE000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF7821C1000
unkown
page execute read
62A4000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED697000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FFE13343000
unkown
page readonly
C49E000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
1BBE5190000
heap
page read and write
8000000
heap
page read and write
1260000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
BD1D000
stack
page read and write
7D20000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
B728000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C92D000
unkown
page read and write
7FF5ED204000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
CA86000
unkown
page read and write
3212000
trusted library allocation
page read and write
7FF5ED5F7000
unkown
page readonly
250F3A02000
heap
page read and write
1483000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A491000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
370D000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1EE22A56000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
5370000
heap
page read and write
5FD0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5EDA47000
unkown
page readonly
18A0000
unkown
page readonly
96DF000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
4CD0000
unkown
page read and write
89C0000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED50A000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
B8B0000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
987B000
unkown
page read and write
7DF4F3061000
unkown
page execute read
2290AF50000
trusted library allocation
page read and write
7FF5ED62F000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
982D000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
785D000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED97A000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1670000
heap
page read and write
8025000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
B640000
unkown
page read and write
72AE000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
37F9000
unkown
page read and write
9881000
unkown
page read and write
977A000
unkown
page read and write
A327000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7DDB000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
89E0000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED81B000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED793000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
4BDC000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9F1E000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
8010000
heap
page read and write
6299000
heap
page read and write
35D0000
unkown
page read and write
CA83000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED821000
unkown
page readonly
5641000
unkown
page read and write
7FFDFFD12000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7FF5ED937000
unkown
page readonly
1060000
direct allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
8710000
unkown
page readonly
7110000
trusted library allocation
page execute and read and write
7FF69F426000
unkown
page readonly
319E000
trusted library allocation
page read and write
1370000
trusted library allocation
page execute and read and write
E79C000
stack
page read and write
3FB7000
trusted library allocation
page read and write
C6F2000
unkown
page read and write
7FF69F426000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
9D63000
unkown
page read and write
4303000
trusted library allocation
page read and write
143B000
stack
page read and write
7FF5ED8BB000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1045000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9702000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED625000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
41CB000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
7F40000
unkown
page readonly
7FF5ED660000
unkown
page readonly
785F000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
6000000
trusted library allocation
page execute and read and write
2290AF50000
trusted library allocation
page read and write
7FF7821C5000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
F3E6000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
DD0000
unkown
page readonly
5590000
unkown
page write copy
979C000
unkown
page read and write
7FF5ED695000
unkown
page readonly
B22B000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED928000
unkown
page readonly
7FF5ED39E000
unkown
page readonly
8860000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
2290AEB0000
trusted library allocation
page read and write
323F000
trusted library allocation
page read and write
400B000
trusted library allocation
page read and write
C89C000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
CA7C000
unkown
page read and write
2290AEB0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
40FB000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3124000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
968B000
unkown
page read and write
1E8CD600000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1EE229E4000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2DC6000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
18A0000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
6070000
trusted library allocation
page read and write
1EE24A40000
direct allocation
page read and write
2290AF50000
trusted library allocation
page read and write
250F3A00000
heap
page read and write
7FFE13331000
unkown
page execute read
3F93000
trusted library allocation
page read and write
7138000
trusted library allocation
page read and write
7FF5EDA31000
unkown
page readonly
7FF5ED39B000
unkown
page readonly
7180000
trusted library allocation
page read and write
7FF5ED77C000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
F4EA000
unkown
page execute and read and write
1BBE519D000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
B190000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
A502000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
30B9000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
3FA3000
trusted library allocation
page read and write
7FF6626D8000
remote allocation
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7CC0000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED73D000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
78A0000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED872000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
BDD0000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1301D013000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
AAD1000
unkown
page read and write
7FF5D1CCD000
unkown
page readonly
C25000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1440000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
940000
heap
page read and write
7FF5ED204000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3290000
unkown
page read and write
1C2B5A00000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
4084000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1EE229F8000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7884000
unkown
page read and write
1EE22A54000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C6F4000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
56C3000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A310000
unkown
page read and write
4252000
trusted library allocation
page read and write
1BBE519D000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A4B8000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
98A8000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE229F3000
heap
page read and write
97C3000
unkown
page read and write
4214000
trusted library allocation
page read and write
7FF5ED7E9000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C6BF000
unkown
page read and write
4B50000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7E50000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FFE13342000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
986B000
unkown
page read and write
9660000
unkown
page read and write
4C60000
unkown
page read and write
C7C5000
unkown
page read and write
4C7A000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
28E3E400000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C561000
unkown
page read and write
C964000
unkown
page read and write
7FF5ED7C4000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED412000
unkown
page readonly
7859000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
37D2000
unkown
page read and write
1C2B5A00000
trusted library allocation
page read and write
6D45000
heap
page read and write
7FF7821C8000
unkown
page readonly
8860000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
406C000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
95DB000
stack
page read and write
7FF5ED8E7000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
986F000
unkown
page read and write
7FFE211D0000
unkown
page execute and read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
9B0000
direct allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF69F423000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
588E000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C811000
unkown
page read and write
7FFE148B6000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED93E000
unkown
page readonly
7DF4F3031000
unkown
page execute read
7FF5ED295000
unkown
page readonly
7FF5ED8E2000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
98A8000
unkown
page read and write
7FF5ED670000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
6282000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED92C000
unkown
page readonly
7847000
unkown
page read and write
4CD0000
unkown
page read and write
7FF5ED867000
unkown
page readonly
7FF5ED5C5000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FFDFB143000
unkown
page read and write
A09A000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE229F3000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
41A0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
9869000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
43868A000
stack
page read and write
4C34000
unkown
page read and write
10F91000
unkown
page read and write
97D4000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
8BF0000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED265000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
42E2000
trusted library allocation
page read and write
7F2E000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
1E8CD608000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
9550000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF6EEF27000
remote allocation
page execute and read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED451000
unkown
page readonly
7FF5ED68C000
unkown
page readonly
4B90000
unkown
page read and write
8800000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A379000
unkown
page read and write
7FF5ED849000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
4030000
trusted library allocation
page read and write
7FF5ED7CF000
unkown
page readonly
1390000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED68B000
unkown
page readonly
10FA1ED000
stack
page read and write
9883000
unkown
page read and write
785B000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
5876000
trusted library allocation
page read and write
1EE22A50000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3738000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED534000
unkown
page readonly
10FA3DF000
stack
page read and write
7FF5ED6B8000
unkown
page readonly
37AE000
unkown
page read and write
7FF5ED42B000
unkown
page readonly
9687000
unkown
page read and write
ED0000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3FF1000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
89A0000
unkown
page read and write
7FF5EDA14000
unkown
page readonly
1BBE5190000
heap
page read and write
7FF5ED52F000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
37B0000
unkown
page read and write
7FF5ED4EF000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5A00000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
987D000
unkown
page read and write
1BBE5190000
heap
page read and write
4018000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED669000
unkown
page readonly
1BBE5190000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1F5FB330000
heap
page readonly
7260000
trusted library allocation
page execute and read and write
1301ED50000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
E59B000
stack
page read and write
9879000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED3CE000
unkown
page readonly
C4A0000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
F09D000
unkown
page read and write
B82A000
stack
page read and write
C516000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
97C3000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2EA6000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED8C1000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
E69D000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED956000
unkown
page readonly
B170000
unkown
page readonly
A21E000
stack
page read and write
1C2B5A00000
trusted library allocation
page read and write
1301D080000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE24AE1000
heap
page read and write
B150000
unkown
page read and write
1EE22A3B000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1010000
heap
page read and write
7867000
unkown
page read and write
37F9000
unkown
page read and write
7FF5ED409000
unkown
page readonly
BDD0000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
37F6000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1EB716B0000
heap
page readonly
7FF6626D7000
remote allocation
page execute and read and write
2290AF50000
trusted library allocation
page read and write
1EE22A5E000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5EDA47000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
B8B0000
unkown
page read and write
E8A0000
remote allocation
page execute read
1C2B5AA0000
trusted library allocation
page read and write
1440000
unkown
page read and write
7FFDFAD70000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
6F50000
trusted library allocation
page read and write
56C3000
unkown
page read and write
7FF5ED404000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED9ED000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C8E1000
unkown
page read and write
7FF7821C0000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1EE22960000
heap
page read and write
79FB000
unkown
page read and write
1EE22A48000
heap
page read and write
4072000
trusted library allocation
page read and write
C6F2000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3795000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
37F6000
unkown
page read and write
31B8000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
310E000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED7FD000
unkown
page readonly
7FF5EDA2A000
unkown
page readonly
7FF5ED755000
unkown
page readonly
C20000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED4F3000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
9B60000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1EE22A35000
heap
page read and write
7FF5ED26E000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
1010000
heap
page read and write
7FF5ED55F000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3048000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
E93A000
unkown
page execute and read and write
1C2B5AA0000
trusted library allocation
page read and write
4C18000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
12E6000
trusted library allocation
page execute and read and write
1EE24AE2000
heap
page read and write
7FF5ED471000
unkown
page readonly
581E000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7DF4F3041000
unkown
page execute read
1C2B5AA0000
trusted library allocation
page read and write
3590000
unkown
page read and write
1F5FB510000
heap
page read and write
7FF5ED279000
unkown
page readonly
4309000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED279000
unkown
page readonly
68093E5000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
647C000
stack
page read and write
9873000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7857000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
CA6A000
unkown
page read and write
7FF5EDA70000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7FF6626D1000
remote allocation
page execute read
7FF5ED885000
unkown
page readonly
6D55000
heap
page read and write
1EE22A5D000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
540E000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED3EA000
unkown
page readonly
4BC9000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
3590000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
E950000
unclassified section
page read and write
C962000
unkown
page read and write
9871000
unkown
page read and write
37D2000
unkown
page read and write
771E000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C507000
unkown
page read and write
A090000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3748000
unkown
page read and write
7FF5ED91A000
unkown
page readonly
7FF5ED9CC000
unkown
page readonly
9883000
unkown
page read and write
76C0000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED674000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
34EA000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2F74000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
786B000
unkown
page read and write
C92D000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED48A000
unkown
page readonly
B140000
unkown
page readonly
6050000
trusted library allocation
page execute and read and write
1BBE519D000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7E50000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7FF5ED961000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1301D059000
heap
page read and write
1EE2299A000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C6CF000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
9873000
unkown
page read and write
7FF5ED3D6000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED8E7000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7FF5ED9C8000
unkown
page readonly
8A6E000
stack
page read and write
7FF5ED980000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
896B000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
56D9000
unkown
page read and write
7FF6EEF21000
remote allocation
page execute read
7FF5ED7DB000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1451000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF63A830000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED6DB000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
17E0C7C000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED4EF000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED915000
unkown
page readonly
78AD000
unkown
page read and write
C88B000
unkown
page read and write
40C0000
trusted library allocation
page read and write
42B1000
trusted library allocation
page read and write
4099000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C84D000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
B08CF7E000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
91BB000
stack
page read and write
3795000
unkown
page read and write
7FF5ED697000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED806000
unkown
page readonly
1BBE519D000
heap
page read and write
7FF5ED7CF000
unkown
page readonly
1BBE519D000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED669000
unkown
page readonly
1EE22A47000
heap
page read and write
5557000
stack
page read and write
7DF4F3031000
unkown
page execute read
2290AF50000
trusted library allocation
page read and write
1EE246B0000
direct allocation
page read and write
1BBE519D000
heap
page read and write
3110000
trusted library allocation
page read and write
1210000
unkown
page readonly
7FF5ED3D0000
unkown
page readonly
343E000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED695000
unkown
page readonly
7122000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9871000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED77E000
unkown
page readonly
42F0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
10ED000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
9877000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1095000
heap
page read and write
37A8000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1EE22A01000
heap
page read and write
BE0000
heap
page read and write
7FFE148B0000
unkown
page readonly
2F38000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
4C50000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1240000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A361000
unkown
page read and write
7FF69F426000
unkown
page readonly
60A0000
trusted library allocation
page read and write
9875000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
9877000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1EE229E2000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
C9E1000
unkown
page read and write
28E3E370000
heap
page read and write
7FF5ED6B8000
unkown
page readonly
7FF5ED3DA000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
4C8A000
unkown
page read and write
1BBE5190000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
34EA000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
CA6A000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
787C000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
37AC000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED9CA000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED800000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
41A9000
trusted library allocation
page read and write
2290AEB0000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
4C18000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
7FF5ED956000
unkown
page readonly
7FF5ED337000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED7FD000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
C557000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED586000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
70F0000
heap
page read and write
1052000
heap
page read and write
C350000
remote allocation
page execute read
C544000
unkown
page read and write
2DD2000
trusted library allocation
page read and write
850000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3658000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
8FB9000
stack
page read and write
F8DD000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
AF8D000
stack
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF69F3E0000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
A310000
unkown
page read and write
7FF5ED1F3000
unkown
page readonly
1EE22A01000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
41D9000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3797000
unkown
page read and write
CA08000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1505000
heap
page read and write
7FF5ED9D2000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED8E2000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
B728000
stack
page read and write
32F5000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1301D048000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1210000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1340000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A4AE000
unkown
page read and write
416D000
trusted library allocation
page read and write
6D10000
heap
page read and write
9815000
unkown
page read and write
7FF5ED8A4000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
62A0000
heap
page read and write
7FF5ED743000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
ABAB000
unkown
page read and write
1EE22A36000
heap
page read and write
40CB000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
F8DD000
unkown
page read and write
166C000
stack
page read and write
7863000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
9B60000
unkown
page readonly
7900000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
32E3000
trusted library allocation
page read and write
797D000
unkown
page read and write
4126000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
1EE229B4000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED9D9000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
A090000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A4AB000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED202000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AEB0000
trusted library allocation
page read and write
CB72000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
40F3000
trusted library allocation
page read and write
7FF7F2D00000
remote allocation
page execute and read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5EDA0B000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1FFAF760000
heap
page readonly
1C2B5AA0000
trusted library allocation
page read and write
42BC000
trusted library allocation
page read and write
4CE0000
unkown
page read and write
7FF5ED735000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ECED2000
unkown
page readonly
9A5B000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
B500000
heap
page read and write
C99C000
unkown
page read and write
79D3000
unkown
page read and write
1EE24AE0000
heap
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
F8E8000
unkown
page read and write
31CD000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7DF4F3050000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED9ED000
unkown
page readonly
37A0000
unkown
page read and write
4299000
trusted library allocation
page read and write
1BBE5190000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
CA7C000
unkown
page read and write
EB0000
heap
page read and write
7103000
trusted library allocation
page read and write
7867000
unkown
page read and write
1EE22A35000
heap
page read and write
1095000
stack
page read and write
331E000
stack
page read and write
7FF5ED9D2000
unkown
page readonly
7FF69F3E0000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
7FF5ED71B000
unkown
page readonly
7FF6EEF20000
remote allocation
page execute and read and write
7FF5ED9B8000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF7821C0000
unkown
page readonly
7FF5ED445000
unkown
page readonly
7FF5ED990000
unkown
page readonly
7FF5ED40D000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
965C000
stack
page read and write
35A0000
unkown
page readonly
5390000
trusted library allocation
page execute and read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
11B0000
unkown
page readonly
FF4000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
3FD6000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1108000
heap
page read and write
7863000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
950000
heap
page read and write
2290AF50000
trusted library allocation
page read and write
7FFDFB11C000
unkown
page write copy
2290AF50000
trusted library allocation
page read and write
7FF5ED8B4000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
C246B4B000
stack
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED76D000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
7FF5ED426000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
7950000
unkown
page read and write
4209000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
65E0000
trusted library allocation
page read and write
7FF5ED986000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
7900000
unkown
page read and write
2290AF50000
trusted library allocation
page read and write
1EE229A0000
heap
page read and write
A479000
unkown
page read and write
7FF5ED93B000
unkown
page readonly
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
A09A000
heap
page read and write
7FF5ED46E000
unkown
page readonly
2290AF50000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
A379000
unkown
page read and write
1C2B5AA0000
trusted library allocation
page read and write
2290AF50000
trusted library allocation
page read and write
There are 4029 hidden memdumps, click here to show them.