IOC Report
OCYe9qcxiM.exe

loading gif

Files

File Path
Type
Category
Malicious
OCYe9qcxiM.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\354F.exe
PE32+ executable (GUI) x86-64, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\4470.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fihcrfb
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\hehcrfb
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\hehcrfb:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\E276.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\E276.tmp-shm
data
dropped
C:\Users\user\AppData\Local\Temp\E7F5.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ECAA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\ED86.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\EE52.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\EF9B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\F0F4.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\F1A1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Roaming\dugwjjb
data
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OCYe9qcxiM.exe
"C:\Users\user\Desktop\OCYe9qcxiM.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\hehcrfb
C:\Users\user\AppData\Roaming\hehcrfb
malicious
C:\Users\user\AppData\Local\Temp\4470.exe
C:\Users\user\AppData\Local\Temp\4470.exe
malicious
C:\Users\user\AppData\Roaming\fihcrfb
C:\Users\user\AppData\Roaming\fihcrfb
malicious
C:\Users\user\AppData\Local\Temp\354F.exe
C:\Users\user\AppData\Local\Temp\354F.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\System32\cmd.exe
cmd
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv
malicious
C:\Users\user\AppData\Roaming\hehcrfb
C:\Users\user\AppData\Roaming\hehcrfb
malicious
C:\Users\user\AppData\Roaming\fihcrfb
C:\Users\user\AppData\Roaming\fihcrfb
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /displaydns
malicious
C:\Windows\System32\netsh.exe
netsh firewall show state
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\ROUTE.EXE
route print
C:\Windows\System32\tasklist.exe
tasklist /v /fo csv
There are 26 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.145.40.164/ksa9104.exe
23.145.40.164
malicious
http://unicea.ws/tmp/index.php
malicious
http://nwgrus.ru/tmp/index.php
malicious
https://calvinandhalls.com/search.php
23.145.40.162
malicious
http://tech-servers.in.net/tmp/index.php
malicious
https://api.msn.com/v1/news/Feed/Windows?
unknown
https://calvinandhalls.com/
unknown
https://calvinandhalls.com/WN/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://powerpoint.office.comer
unknown
https://calvinandhalls.com/application/x-www-form-urlencodedMozilla/5.0
unknown
https://duckduckgo.com/ac/?q=
unknown
https://android.notify.windows.com/iOSA4
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://calvinandhalls.com/search.phpMozilla/5.0
unknown
https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://java.co
unknown
https://www.msn.com/en-us/weather/topstories/first-map-of-earth-s-lost-continent-has-been-published/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
unknown
https://excel.office.com
unknown
https://www.msn.com/en-us/money/personalfinance/the-big-3-mistakes-financial-advisors-say-that-the-1
unknown
https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
unknown
http://schemas.micro
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svg
unknown
https://wns.windows.com/EM0
unknown
https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
unknown
https://calvinandhalls.com/search.php=
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zeal
unknown
https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
unknown
http://www.microsoft.c
unknown
https://www.msn.com/en-us/weather/topstories/stop-planting-new-forests-scientists-say/ar-AA1hFI09
unknown
https://android.notify.windows.com/iOSd
unknown
https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
unknown
https://calvinandhalls.com/earch.php
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-al
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.ecosia.org/newtab/
unknown
http://ns.adobeS
unknown
https://outlook.com
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA-dark
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=0E948A694F8C48079B908C8EA9DDF9EA&timeOut=5000&oc
unknown
https://calvinandhalls.com:443/search.phpt
unknown
https://android.notify.windows.com/iOS
unknown
https://word.office.com48
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
unknown
https://api.msn.com/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA
unknown
https://www.msn.com/en-us/sports/other/washington-state-ad-asks-ncaa-for-compassion-and-understandin
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
unknown
https://www.msn.com:443/en-us/feed
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k-dark
unknown
https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
unknown
There are 57 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
calvinandhalls.com
23.145.40.162
malicious
nwgrus.ru
187.228.112.175
malicious

IPs

IP
Domain
Country
Malicious
109.121.204.14
unknown
Bulgaria
malicious
187.228.112.175
nwgrus.ru
Mexico
malicious
23.145.40.164
unknown
Reserved
malicious
23.145.40.162
calvinandhalls.com
Reserved
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.M2V\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
There are 176 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2191000
unclassified section
page read and write
malicious
600000
direct allocation
page read and write
malicious
2430000
direct allocation
page read and write
malicious
2170000
direct allocation
page read and write
malicious
2191000
unclassified section
page read and write
malicious
351000
system
page execute and read and write
malicious
2191000
unclassified section
page read and write
malicious
2451000
unclassified section
page read and write
malicious
6D0000
direct allocation
page read and write
malicious
C21000
system
page execute and read and write
malicious
2170000
direct allocation
page read and write
malicious
6D0000
direct allocation
page read and write
malicious
68E917E000
stack
page read and write
7FF50323B000
unkown
page readonly
680000
trusted library allocation
page read and write
A720000
unkown
page read and write
2E79000
stack
page read and write
20208F74000
heap
page read and write
B40000
unkown
page read and write
29451235000
heap
page read and write
24EE7600000
heap
page read and write
84A0000
unkown
page read and write
7FF502F7A000
unkown
page readonly
43FD000
unkown
page read and write
87B0000
unkown
page read and write
24D1000
heap
page read and write
DC0000
trusted library allocation
page read and write
1B605CFE000
heap
page read and write
2ADB46B9000
heap
page read and write
12A3E782000
heap
page read and write
4378000
unkown
page read and write
360000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
243073F8000
heap
page read and write
1B7AAD2A000
heap
page read and write
5BAD000
heap
page read and write
3590000
trusted library allocation
page read and write
5E20000
heap
page read and write
1CB5DDE8000
heap
page read and write
2BE264B0000
heap
page read and write
2333BCE4000
heap
page read and write
7FF503154000
unkown
page readonly
A710000
unkown
page read and write
19E5B062000
heap
page read and write
24EE5D5E000
heap
page read and write
196FB630000
heap
page read and write
2430768E000
heap
page read and write
87A0000
unkown
page read and write
B40000
unkown
page read and write
7750000
unkown
page read and write
BDCB000
unkown
page read and write
2BE26460000
heap
page read and write
239AEF90000
heap
page read and write
2ADB4DD4000
heap
page read and write
DC0000
trusted library allocation
page read and write
90DA000
unkown
page read and write
24307B6B000
heap
page read and write
3F0000
trusted library allocation
page read and write
21C6848C000
heap
page read and write
2210000
heap
page read and write
87B0000
unkown
page read and write
19E5AA94000
heap
page read and write
680000
trusted library allocation
page read and write
7FF502DC8000
unkown
page readonly
43B4000
unkown
page read and write
12A3E035000
heap
page read and write
29451867000
heap
page read and write
2ADB4713000
heap
page read and write
2333BCEA000
heap
page read and write
9B83000
unkown
page read and write
3400000
trusted library allocation
page read and write
B40000
unkown
page read and write
5DCC000
heap
page read and write
24307590000
trusted library allocation
page read and write
19D000
stack
page read and write
2B986089000
heap
page read and write
243073FA000
heap
page read and write
7FF5030A3000
unkown
page readonly
7750000
unkown
page read and write
24F0000
unkown
page read and write
5DE7000
heap
page read and write
6ECB000
unkown
page read and write
7750000
unkown
page read and write
2333D690000
heap
page read and write
A710000
unkown
page read and write
9800000
stack
page read and write
2BE26577000
heap
page read and write
2C90000
unkown
page read and write
7FF502EC9000
unkown
page readonly
2BE25F82000
heap
page read and write
24EE5D8E000
heap
page read and write
DC0000
trusted library allocation
page read and write
20208F6F000
heap
page read and write
2BE25F54000
heap
page read and write
B40000
unkown
page read and write
24EE563D000
heap
page read and write
2BE2657A000
heap
page read and write
20208DD4000
heap
page read and write
7370000
unkown
page read and write
12A3FF41000
heap
page read and write
24F0000
unkown
page read and write
24EE5D60000
heap
page read and write
3067000
unkown
page read and write
2ADB46E3000
heap
page read and write
294518B0000
heap
page read and write
87B0000
unkown
page read and write
7FF780B60000
unkown
page readonly
2BE266D9000
heap
page read and write
ABD0000
unkown
page read and write
B40000
unkown
page read and write
2BE26570000
heap
page read and write
239AEF92000
heap
page read and write
2ADB4DF3000
heap
page read and write
680000
trusted library allocation
page read and write
BB50000
unkown
page read and write
B80000
unkown
page read and write
600000
trusted library allocation
page read and write
3670000
remote allocation
page read and write
12A3E6A7000
heap
page read and write
12A3E6DE000
heap
page read and write
BFEE000
unkown
page read and write
D88000
heap
page read and write
12A3E06F000
heap
page read and write
2608D199000
heap
page read and write
2333BD02000
heap
page read and write
19E5AA50000
heap
page read and write
20208F7E000
heap
page read and write
7FF5032B5000
unkown
page readonly
936E000
unkown
page read and write
2B9867D8000
heap
page read and write
5DCC000
heap
page read and write
CAA1BD7000
stack
page read and write
12A3E6AE000
heap
page read and write
29451862000
heap
page read and write
41C000
unkown
page read and write
7FF502C2E000
unkown
page readonly
196FBC69000
heap
page read and write
7750000
unkown
page read and write
85E0000
unkown
page read and write
600000
trusted library allocation
page read and write
515000
unkown
page readonly
9C000
stack
page read and write
2ADB4704000
heap
page read and write
24307412000
heap
page read and write
7750000
unkown
page read and write
6F0000
heap
page read and write
BEE6000
unkown
page read and write
39C60FF000
stack
page read and write
3F0000
trusted library allocation
page read and write
24EE57D0000
trusted library allocation
page read and write
29451170000
trusted library allocation
page read and write
2ADB4DF1000
heap
page read and write
19E5A990000
heap
page read and write
3F0000
trusted library allocation
page read and write
C00A000
unkown
page read and write
B50000
unkown
page read and write
680000
trusted library allocation
page read and write
21C67E08000
heap
page read and write
2550000
unkown
page read and write
33CE000
stack
page read and write
9B8A000
unkown
page read and write
2B9867E5000
heap
page read and write
12A3E043000
heap
page read and write
EBBDAFE000
stack
page read and write
DC0000
trusted library allocation
page read and write
12A3E741000
heap
page read and write
516000
unkown
page readonly
21C67E12000
heap
page read and write
7FF780B71000
unkown
page readonly
239AEDDC000
heap
page read and write
12A3E007000
heap
page read and write
20208F89000
heap
page read and write
400000
unkown
page readonly
620000
heap
page read and write
2BE25F77000
heap
page read and write
9330000
unkown
page read and write
594000
heap
page read and write
59B1000
heap
page read and write
239AE750000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
1B605CF7000
heap
page read and write
7FF0000
unkown
page read and write
2510000
heap
page read and write
5F85CFE000
stack
page read and write
D8F000
heap
page read and write
7750000
unkown
page read and write
2608D0F0000
heap
page read and write
2530000
unkown
page read and write
400000
unkown
page readonly
2945124B000
heap
page read and write
2B986250000
trusted library allocation
page read and write
2530000
unkown
page read and write
3F0000
trusted library allocation
page read and write
6ED9000
unkown
page read and write
12A3E6C1000
heap
page read and write
DB4000
heap
page read and write
12A3E733000
heap
page read and write
516000
unkown
page readonly
1B605D04000
heap
page read and write
7AA000
heap
page read and write
12A3E053000
heap
page read and write
2ADB4DCF000
heap
page read and write
2430741C000
heap
page read and write
DED000
stack
page read and write
21C6848A000
heap
page read and write
2BE25F65000
heap
page read and write
1B606010000
heap
page read and write
4402000
unkown
page read and write
89B0000
unkown
page read and write
2500000
unkown
page read and write
B80000
unkown
page read and write
2500000
unkown
page read and write
6EE4000
unkown
page read and write
196FB666000
heap
page read and write
24EE5D50000
heap
page read and write
B40000
unkown
page read and write
A710000
unkown
page read and write
12A3FF92000
heap
page read and write
24F0000
unkown
page read and write
5DA9000
heap
page read and write
B40000
unkown
page read and write
516000
unkown
page readonly
2333BD18000
heap
page read and write
CFB000
stack
page read and write
2BE2657B000
heap
page read and write
7FF5030C4000
unkown
page readonly
20208DA7000
heap
page read and write
2945122F000
heap
page read and write
E66C77E000
stack
page read and write
202094C4000
heap
page read and write
7FF502D10000
unkown
page readonly
7750000
unkown
page read and write
680000
trusted library allocation
page read and write
3560000
heap
page read and write
12A3E741000
heap
page read and write
2333B527000
heap
page read and write
87A0000
unkown
page read and write
196FBB07000
heap
page read and write
24EE5D79000
heap
page read and write
600000
trusted library allocation
page read and write
A710000
unkown
page read and write
202094C7000
heap
page read and write
1B7AAD3A000
heap
page read and write
2ADB45E0000
heap
page read and write
C31000
system
page execute and read and write
EBBDBFF000
stack
page read and write
7750000
unkown
page read and write
5DA9000
heap
page read and write
B40000
unkown
page read and write
21C68494000
heap
page read and write
DB3000
heap
page read and write
7FF0000
unkown
page read and write
12A3DFB0000
heap
page read and write
239AEF9A000
heap
page read and write
5DD0000
heap
page read and write
7FF5030AA000
unkown
page readonly
2530000
unkown
page read and write
57B5000
heap
page read and write
87C0000
unkown
page read and write
12A3E093000
heap
page read and write
24307B50000
heap
page read and write
2B60000
unkown
page read and write
2550000
unkown
page read and write
7750000
unkown
page read and write
8100000
unkown
page readonly
2260000
heap
page read and write
24F0000
unkown
page read and write
12A3E06F000
heap
page read and write
3400000
trusted library allocation
page read and write
19E5B04A000
heap
page read and write
7750000
unkown
page read and write
A710000
unkown
page read and write
87B0000
unkown
page read and write
243073C0000
heap
page read and write
20208F8D000
heap
page read and write
2E00000
unkown
page read and write
C96C0FE000
stack
page read and write
2530000
unkown
page read and write
B40000
unkown
page read and write
24EE5634000
heap
page read and write
DBB000
heap
page read and write
1004FE000
stack
page read and write
19E5AAB0000
heap
page read and write
1B7AAD3C000
heap
page read and write
1B7AA5FE000
heap
page read and write
DDCD000
stack
page read and write
400000
unkown
page execute and read and write
3F0000
trusted library allocation
page read and write
12A3E093000
heap
page read and write
D88000
heap
page read and write
BEA9000
unkown
page read and write
EB62000
heap
page read and write
87A0000
unkown
page read and write
B30000
unkown
page read and write
29451170000
trusted library allocation
page read and write
2020906A000
heap
page read and write
BA0000
unkown
page read and write
E49A000
unkown
page read and write
B90000
unkown
page read and write
AD1000
system
page execute and read and write
7FF502F2C000
unkown
page readonly
7750000
unkown
page read and write
620000
heap
page read and write
2ADB4A7A000
heap
page read and write
A720000
unkown
page read and write
294518CB000
heap
page read and write
7FF0000
unkown
page read and write
A820000
unkown
page read and write
24EE5631000
heap
page read and write
2B986083000
heap
page read and write
EBBDB7E000
stack
page read and write
610000
heap
page read and write
87A0000
unkown
page read and write
29451170000
trusted library allocation
page read and write
24307B6A000
heap
page read and write
9D58000
unkown
page read and write
2ADB4A70000
heap
page read and write
B50000
unkown
page read and write
BDF5000
unkown
page read and write
B40000
unkown
page read and write
2BE266DA000
heap
page read and write
7DF411EE1000
unkown
page execute read
C96C17E000
stack
page read and write
9BB000
stack
page read and write
C20000
heap
page read and write
1180000
heap
page read and write
24EE5625000
heap
page read and write
B30000
unkown
page read and write
7750000
unkown
page read and write
7750000
unkown
page read and write
2ADB4722000
heap
page read and write
600000
trusted library allocation
page read and write
19E5AA87000
heap
page read and write
3590000
trusted library allocation
page read and write
19E5B04A000
heap
page read and write
12A3E713000
heap
page read and write
2ADB4DE1000
heap
page read and write
2B9867F8000
heap
page read and write
BDA9000
unkown
page read and write
76C0000
unkown
page read and write
89B0000
unkown
page read and write
6EC0000
unkown
page read and write
3F0000
trusted library allocation
page read and write
D96000
heap
page read and write
2333BD19000
heap
page read and write
DB2000
heap
page read and write
12A3E0B9000
heap
page read and write
12A3E74E000
heap
page read and write
B80000
unkown
page read and write
2550000
unkown
page read and write
1B7AA5C6000
heap
page read and write
24EE5D68000
heap
page read and write
12A3E6C4000
heap
page read and write
1FAD75B0000
heap
page read and write
196FB663000
heap
page read and write
2B986250000
trusted library allocation
page read and write
B60000
unkown
page read and write
196FBC57000
heap
page read and write
1FAD7621000
heap
page read and write
FEB4000
unkown
page read and write
44B0000
unkown
page read and write
12A3E6FA000
heap
page read and write
243073F2000
heap
page read and write
3F0000
trusted library allocation
page read and write
12A3E0B1000
heap
page read and write
20208D30000
trusted library allocation
page read and write
12A3E043000
heap
page read and write
340E000
stack
page read and write
DC0000
trusted library allocation
page read and write
515000
unkown
page readonly
600000
trusted library allocation
page read and write
21C67E40000
heap
page read and write
29453300000
heap
page read and write
2ADB6702000
heap
page read and write
600000
trusted library allocation
page read and write
BFB9000
unkown
page read and write
9CF4000
unkown
page read and write
5DBC000
heap
page read and write
7FF502D15000
unkown
page readonly
2B60000
unkown
page read and write
7750000
unkown
page read and write
1CB5DE38000
heap
page read and write
9193000
unkown
page read and write
2ADB4DF0000
heap
page read and write
2BE25F46000
heap
page read and write
5DA9000
heap
page read and write
1B7AA5F4000
heap
page read and write
12A3E041000
heap
page read and write
DC0000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
2BE25F65000
heap
page read and write
B07000
heap
page read and write
7FF503257000
unkown
page readonly
A720000
unkown
page read and write
B80000
unkown
page read and write
12A3E6BB000
heap
page read and write
680000
trusted library allocation
page read and write
5DB8000
heap
page read and write
2B9867D0000
heap
page read and write
1F0000
heap
page read and write
89B0000
unkown
page read and write
11DB000
heap
page read and write
84A0000
unkown
page read and write
2BE266F1000
heap
page read and write
B70000
unkown
page read and write
A710000
unkown
page read and write
218F000
stack
page read and write
87B0000
unkown
page read and write
87A0000
unkown
page read and write
E29000
heap
page read and write
196FBC79000
heap
page read and write
12A3E751000
heap
page read and write
29D9000
stack
page read and write
12A3FF41000
heap
page read and write
21C6848E000
heap
page read and write
20208DF8000
heap
page read and write
DC0000
trusted library allocation
page read and write
E66C67F000
stack
page read and write
2B60000
unkown
page read and write
24EE5D70000
heap
page read and write
360000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
20208F70000
heap
page read and write
29451884000
heap
page read and write
7651000
unkown
page read and write
21C67E44000
heap
page read and write
87A0000
unkown
page read and write
A34D000
unkown
page read and write
59AE27F000
stack
page read and write
8450000
unkown
page read and write
B40000
unkown
page read and write
20208F93000
heap
page read and write
20208DE9000
heap
page read and write
24307370000
heap
page read and write
680000
trusted library allocation
page read and write
B40000
unkown
page read and write
3400000
trusted library allocation
page read and write
7FF502EBB000
unkown
page readonly
7FF5030E4000
unkown
page readonly
A720000
unkown
page read and write
3400000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
B80000
unkown
page read and write
2BE266F9000
heap
page read and write
821B000
stack
page read and write
2ADB4715000
heap
page read and write
5DE5000
heap
page read and write
20208F89000
heap
page read and write
ABE0000
unkown
page read and write
59AE47E000
stack
page read and write
A710000
unkown
page read and write
12A3E071000
heap
page read and write
2ADB46E7000
heap
page read and write
84A0000
unkown
page read and write
196FB685000
heap
page read and write
DAF000
heap
page read and write
24307B5C000
heap
page read and write
24307B5C000
heap
page read and write
87A0000
unkown
page read and write
5DDC000
heap
page read and write
8889000
stack
page read and write
A710000
unkown
page read and write
294518C6000
heap
page read and write
2430768E000
heap
page read and write
19E5AA87000
heap
page read and write
2B986083000
heap
page read and write
5DA9000
heap
page read and write
2BE25F4E000
heap
page read and write
B40000
unkown
page read and write
62E000
heap
page read and write
1B7AAD27000
heap
page read and write
12A3DED0000
heap
page read and write
2BE266DC000
heap
page read and write
B80000
unkown
page read and write
3F0000
trusted library allocation
page read and write
9450000
unkown
page readonly
294518C6000
heap
page read and write
12A3E0A1000
heap
page read and write
35ED000
stack
page read and write
24307B49000
heap
page read and write
B80000
unkown
page read and write
A710000
unkown
page read and write
2945187D000
heap
page read and write
2C80000
unkown
page readonly
360000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
2ADB4A0A000
heap
page read and write
24E0000
unkown
page read and write
239AEDE5000
heap
page read and write
3F0000
trusted library allocation
page read and write
A710000
unkown
page read and write
C70000
heap
page read and write
7750000
unkown
page read and write
20208F93000
heap
page read and write
12A3E04A000
heap
page read and write
4370000
unkown
page read and write
21C67DC7000
heap
page read and write
20208DC3000
heap
page read and write
2BE25F62000
heap
page read and write
2ADB4610000
heap
page read and write
239AE807000
heap
page read and write
5DA9000
heap
page read and write
21C68110000
heap
page read and write
795D000
stack
page read and write
A710000
unkown
page read and write
1FAD78E5000
heap
page read and write
7FF502DD1000
unkown
page readonly
21C68491000
heap
page read and write
2ADB4DDC000
heap
page read and write
7750000
unkown
page read and write
614000
heap
page read and write
19E5B082000
heap
page read and write
2530000
unkown
page read and write
B50000
unkown
page read and write
7FF5031DA000
unkown
page readonly
400000
unkown
page readonly
7FF502F8A000
unkown
page readonly
7750000
unkown
page read and write
24EE5825000
heap
page read and write
D82000
heap
page read and write
24EE5800000
heap
page read and write
2CD0000
unkown
page read and write
2ADB4DEF000
heap
page read and write
239AE82F000
heap
page read and write
2C70000
unkown
page readonly
29451226000
heap
page read and write
12A3E007000
heap
page read and write
24307415000
heap
page read and write
74B0000
unkown
page read and write
2B9867D7000
heap
page read and write
87A0000
unkown
page read and write
19E5AA3A000
heap
page read and write
41A000
unkown
page readonly
2B986086000
heap
page read and write
196FBC64000
heap
page read and write
BB50000
unkown
page read and write
12A3E0F0000
trusted library allocation
page read and write
1B7AAD04000
heap
page read and write
7750000
unkown
page read and write
7FF0000
unkown
page read and write
2BE25F62000
heap
page read and write
2BE25F00000
trusted library allocation
page read and write
B90000
unkown
page read and write
7DF411F11000
unkown
page execute read
2B60000
unkown
page read and write
B50000
unkown
page read and write
B80000
unkown
page read and write
21C67DD0000
heap
page read and write
7FF503216000
unkown
page readonly
24307412000
heap
page read and write
7FF502CD4000
unkown
page readonly
BC5C000
unkown
page read and write
29451245000
heap
page read and write
196FB677000
heap
page read and write
243073B0000
trusted library allocation
page read and write
2550000
unkown
page read and write
19E5AAA4000
heap
page read and write
294518A0000
heap
page read and write
12A3FF69000
heap
page read and write
B40000
unkown
page read and write
A820000
unkown
page read and write
9CCF000
unkown
page read and write
19E5B058000
heap
page read and write
B40000
unkown
page read and write
A710000
unkown
page read and write
7FF0000
unkown
page read and write
1CB5DE34000
heap
page read and write
360000
trusted library allocation
page read and write
2B60000
unkown
page read and write
20208DC6000
heap
page read and write
196FB730000
trusted library allocation
page read and write
2333B6E0000
trusted library allocation
page read and write
12A3E081000
heap
page read and write
2AC0000
unkown
page readonly
84A0000
unkown
page read and write
1CB5E180000
heap
page read and write
680000
trusted library allocation
page read and write
659000
heap
page read and write
A710000
unkown
page read and write
87B0000
unkown
page read and write
84A0000
unkown
page read and write
239AE7D0000
heap
page read and write
29451887000
heap
page read and write
7750000
unkown
page read and write
B80000
unkown
page read and write
2530000
unkown
page read and write
614000
heap
page read and write
DA7000
heap
page read and write
87A0000
unkown
page read and write
243076BA000
heap
page read and write
24E0000
unkown
page read and write
680000
trusted library allocation
page read and write
1FAD7625000
heap
page read and write
2F20000
unkown
page readonly
29451865000
heap
page read and write
84E0000
unkown
page read and write
2333BCFE000
heap
page read and write
12A3E0B2000
heap
page read and write
43C7000
unkown
page read and write
1B7AA5EE000
heap
page read and write
7FF502E8F000
unkown
page readonly
12A3E04D000
heap
page read and write
B40000
unkown
page read and write
A820000
unkown
page read and write
19E5B040000
heap
page read and write
41D000
unkown
page read and write
1FAD7600000
heap
page read and write
680000
trusted library allocation
page read and write
34DD000
stack
page read and write
239AE823000
heap
page read and write
DB4000
heap
page read and write
2B9867C7000
heap
page read and write
7FF502EC2000
unkown
page readonly
1B7AAD27000
heap
page read and write
294518CB000
heap
page read and write
A710000
unkown
page read and write
2B9867F8000
heap
page read and write
2BE266C0000
heap
page read and write
309D000
unkown
page read and write
2333BCE7000
heap
page read and write
196FBC7C000
heap
page read and write
7FF502D45000
unkown
page readonly
5DE5000
heap
page read and write
7FF502CF2000
unkown
page readonly
196FBC82000
heap
page read and write
7FF5032C2000
unkown
page readonly
24EE5636000
heap
page read and write
24EE5D54000
heap
page read and write
20208F73000
heap
page read and write
196FBC79000
heap
page read and write
3AAA97E000
stack
page read and write
84A0000
stack
page read and write
A710000
unkown
page read and write
B40000
unkown
page read and write
BA8B000
stack
page read and write
2ADB4630000
trusted library allocation
page read and write
B80000
unkown
page read and write
401000
unkown
page execute read
24E0000
unkown
page read and write
A820000
unkown
page read and write
7FF503333000
unkown
page readonly
7FF5032EB000
unkown
page readonly
1CB5DE02000
heap
page read and write
21C67E57000
heap
page read and write
2B986030000
heap
page read and write
E30000
unkown
page read and write
1B6079A0000
heap
page read and write
9C2C000
unkown
page read and write
7750000
unkown
page read and write
21C67DC4000
heap
page read and write
12A3FF69000
heap
page read and write
29451894000
heap
page read and write
24EE5615000
heap
page read and write
12A3E06F000
heap
page read and write
21C68474000
heap
page read and write
21C6847F000
heap
page read and write
12A3FF41000
heap
page read and write
243073D2000
heap
page read and write
12A3E06F000
heap
page read and write
3400000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
9CF2000
unkown
page read and write
24EE5D91000
heap
page read and write
2BE25F85000
heap
page read and write
2510000
unkown
page read and write
9D6B000
unkown
page read and write
7FF502B88000
unkown
page readonly
A820000
unkown
page read and write
360000
trusted library allocation
page read and write
239AEF93000
heap
page read and write
2510000
unkown
page read and write
2BE25F48000
heap
page read and write
29451273000
heap
page read and write
12A3E120000
heap
page read and write
3400000
trusted library allocation
page read and write
2ADB4712000
heap
page read and write
7FF5032FE000
unkown
page readonly
21C67E5C000
heap
page read and write
24EE5D7C000
heap
page read and write
2F20000
trusted library allocation
page read and write
2ADB4630000
trusted library allocation
page read and write
A710000
unkown
page read and write
3400000
trusted library allocation
page read and write
515000
unkown
page readonly
20208F89000
heap
page read and write
B40000
unkown
page read and write
68E91FE000
stack
page read and write
7FF502F94000
unkown
page readonly
A720000
unkown
page read and write
B40000
unkown
page read and write
12A3E06F000
heap
page read and write
12A3E70E000
heap
page read and write
E49A000
unkown
page read and write
20208DC2000
heap
page read and write
2ADB4A0A000
heap
page read and write
540000
heap
page read and write
2945186A000
heap
page read and write
12A3E751000
heap
page read and write
2333BD08000
heap
page read and write
DC0000
trusted library allocation
page read and write
1B7AA5F6000
heap
page read and write
3400000
trusted library allocation
page read and write
516000
unkown
page readonly
19E5AA67000
heap
page read and write
7FF780B61000
unkown
page execute read
84A0000
unkown
page read and write
21C67D70000
heap
page read and write
12A3E046000
heap
page read and write
EB02077000
stack
page read and write
87A0000
unkown
page read and write
24EE5D79000
heap
page read and write
680000
trusted library allocation
page read and write
1B605CD2000
heap
page read and write
2333BCEB000
heap
page read and write
239AE828000
heap
page read and write
21C67E57000
heap
page read and write
2550000
unkown
page read and write
24EE55F7000
heap
page read and write
B40000
unkown
page read and write
B80000
unkown
page read and write
87A0000
unkown
page read and write
7FF502D6B000
unkown
page readonly
1FAD78E0000
heap
page read and write
7FF503231000
unkown
page readonly
2B60000
unkown
page read and write
24EE5D5A000
heap
page read and write
239AEDBC000
heap
page read and write
12A3E050000
heap
page read and write
2945189E000
heap
page read and write
2B986083000
heap
page read and write
12A3E06F000
heap
page read and write
12A3E05F000
heap
page read and write
F7EF2FF000
stack
page read and write
12A3E6C2000
heap
page read and write
2431000
heap
page read and write
DC0000
trusted library allocation
page read and write
6BE000
stack
page read and write
2B60000
unkown
page read and write
84A0000
unkown
page read and write
680000
trusted library allocation
page read and write
2ADB4DEF000
heap
page read and write
69EA27F000
stack
page read and write
BC08000
unkown
page read and write
4398000
unkown
page read and write
B40000
unkown
page read and write
600000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
D8F000
heap
page read and write
2530000
unkown
page read and write
BFF000
unkown
page read and write
12A3DFD0000
heap
page read and write
7630000
unkown
page readonly
CAA1E7F000
stack
page read and write
196FBC50000
heap
page read and write
196FB688000
heap
page read and write
E1F307F000
stack
page read and write
B40000
unkown
page read and write
29451242000
heap
page read and write
701D000
unkown
page read and write
A710000
unkown
page read and write
C96BD8F000
stack
page read and write
12A3E703000
heap
page read and write
12A3E06F000
heap
page read and write
EBEB000
stack
page read and write
12A3E093000
heap
page read and write
D60000
heap
page read and write
2945188F000
heap
page read and write
2333B56C000
heap
page read and write
2500000
unkown
page read and write
5DC7000
heap
page read and write
239AE710000
heap
page read and write
24EE5631000
heap
page read and write
7550000
unkown
page read and write
D89000
heap
page read and write
360000
trusted library allocation
page read and write
A710000
unkown
page read and write
2BE25F86000
heap
page read and write
2ADB4DCF000
heap
page read and write
EBBD76A000
stack
page read and write
24EE5D5B000
heap
page read and write
21C67E57000
heap
page read and write
69EA3FE000
stack
page read and write
B30000
unkown
page read and write
196FBC69000
heap
page read and write
87B0000
unkown
page read and write
D50000
heap
page read and write
39C607F000
stack
page read and write
21C6847F000
heap
page read and write
29451860000
heap
page read and write
9AFF000
stack
page read and write
B40000
unkown
page read and write
2F20000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
7FF50334D000
unkown
page readonly
12A3E071000
heap
page read and write
7FF502CDD000
unkown
page readonly
239AEF97000
heap
page read and write
A36E000
unkown
page read and write
243073C9000
heap
page read and write
600000
trusted library allocation
page read and write
2608D1AC000
heap
page read and write
24EE5820000
heap
page read and write
2ADB4A0A000
heap
page read and write
24EE5D7C000
heap
page read and write
7FF5032CF000
unkown
page readonly
B010000
unkown
page read and write
24307B6D000
heap
page read and write
239AE7E7000
heap
page read and write
12A3E071000
heap
page read and write
360000
trusted library allocation
page read and write
196FB688000
heap
page read and write
12A3E025000
heap
page read and write
7FF5031BC000
unkown
page readonly
1B7AA510000
heap
page read and write
3400000
trusted library allocation
page read and write
2ADB470D000
heap
page read and write
5DDB000
heap
page read and write
12A40040000
heap
page read and write
680000
trusted library allocation
page read and write
12A3E70E000
heap
page read and write
9D0000
unkown
page read and write
3400000
trusted library allocation
page read and write
A710000
unkown
page read and write
9C09000
unkown
page read and write
24307B55000
heap
page read and write
7FA0000
unkown
page read and write
A710000
unkown
page read and write
24307428000
heap
page read and write
360000
trusted library allocation
page read and write
1B7AA5A2000
heap
page read and write
3400000
trusted library allocation
page read and write
5DA9000
heap
page read and write
2333BCEA000
heap
page read and write
3099000
unkown
page read and write
7FF5031AD000
unkown
page readonly
2ADB4DD0000
heap
page read and write
A710000
unkown
page read and write
DC0000
trusted library allocation
page read and write
511E12F000
stack
page read and write
12A3E093000
heap
page read and write
21C67DCA000
heap
page read and write
987B000
stack
page read and write
7750000
unkown
page read and write
29451150000
heap
page read and write
19E5AA87000
heap
page read and write
202094C7000
heap
page read and write
7FF502D84000
unkown
page readonly
12A3E05D000
heap
page read and write
DB4000
heap
page read and write
12A3E071000
heap
page read and write
FF89000
unkown
page read and write
7FF503354000
unkown
page readonly
2510000
unkown
page read and write
3400000
trusted library allocation
page read and write
11E2000
heap
page read and write
600000
trusted library allocation
page read and write
19E5B078000
heap
page read and write
12A3E024000
heap
page read and write
1FAD7590000
heap
page read and write
E492000
unkown
page read and write
12A3E0B2000
heap
page read and write
1B7AA870000
heap
page read and write
20208D30000
trusted library allocation
page read and write
84A0000
unkown
page read and write
7FF5030A5000
unkown
page readonly
3AAA5DF000
stack
page read and write
12A3E071000
heap
page read and write
239AE823000
heap
page read and write
2333BD05000
heap
page read and write
19E5AAA7000
heap
page read and write
2ADB4DE1000
heap
page read and write
7FF50322D000
unkown
page readonly
20208F67000
heap
page read and write
202094CA000
heap
page read and write
89B0000
unkown
page read and write
AD8000
system
page execute and read and write
24F0000
unkown
page read and write
7FF502D41000
unkown
page readonly
2333B548000
heap
page read and write
600000
trusted library allocation
page read and write
A710000
unkown
page read and write
12A3E769000
heap
page read and write
1B7AA5C7000
heap
page read and write
7810000
unkown
page readonly
1B605CAC000
heap
page read and write
1FAD7667000
heap
page read and write
24307404000
heap
page read and write
1B7AAD45000
heap
page read and write
680000
trusted library allocation
page read and write
76A0000
unkown
page readonly
2333BD08000
heap
page read and write
87A0000
unkown
page read and write
401000
unkown
page execute read
12A3E093000
heap
page read and write
3400000
trusted library allocation
page read and write
1B7AAD3A000
heap
page read and write
309F000
unkown
page read and write
DC0000
trusted library allocation
page read and write
21C67E57000
heap
page read and write
24EE5D52000
heap
page read and write
E44000
heap
page read and write
24307415000
heap
page read and write
12A3E764000
heap
page read and write
A710000
unkown
page read and write
3400000
trusted library allocation
page read and write
B60000
unkown
page read and write
6ED7000
unkown
page read and write
E9769BD000
stack
page read and write
239AEDD0000
heap
page read and write
B560000
unkown
page read and write
24F0000
unkown
page read and write
20209400000
heap
page read and write
12A3E071000
heap
page read and write
2540000
unkown
page read and write
1B7AAD3A000
heap
page read and write
2BE266CC000
heap
page read and write
12A3E6C7000
heap
page read and write
2ADB4DDC000
heap
page read and write
12A3E05D000
heap
page read and write
2B60000
unkown
page read and write
B50000
unkown
page read and write
1B7AAD3B000
heap
page read and write
24EE5642000
heap
page read and write
202094C0000
heap
page read and write
294518CB000
heap
page read and write
3400000
trusted library allocation
page read and write
9BDE000
unkown
page read and write
29451867000
heap
page read and write
1FAD7698000
heap
page read and write
2B986210000
heap
page read and write
2333BCF7000
heap
page read and write
239AEDDA000
heap
page read and write
BB50000
unkown
page read and write
2333B527000
heap
page read and write
7FF502D68000
unkown
page readonly
2550000
unkown
page read and write
239AE807000
heap
page read and write
3F0000
trusted library allocation
page read and write
2945186E000
heap
page read and write
29451882000
heap
page read and write
7FF503158000
unkown
page readonly
2B986086000
heap
page read and write
C0DE000
unkown
page read and write
7FF50324D000
unkown
page readonly
7FF502B67000
unkown
page readonly
24EE5D55000
heap
page read and write
2160000
direct allocation
page execute and read and write
202094CE000
heap
page read and write
2B9867DC000
heap
page read and write
5DE7000
heap
page read and write
2ADB4630000
trusted library allocation
page read and write
1B7AAD2E000
heap
page read and write
1B7AA560000
trusted library allocation
page read and write
7FF502D20000
unkown
page readonly
680000
trusted library allocation
page read and write
7FA0000
unkown
page read and write
12A3E1DA000
heap
page read and write
3F0000
trusted library allocation
page read and write
12A3E093000
heap
page read and write
12A3E1DA000
heap
page read and write
2ADB4DE1000
heap
page read and write
2B60000
unkown
page read and write
7750000
unkown
page read and write
3F0000
trusted library allocation
page read and write
12A3E043000
heap
page read and write
12A3E071000
heap
page read and write
362D000
stack
page read and write
1CB5DE0E000
heap
page read and write
2B60000
unkown
page read and write
8EF000
stack
page read and write
12A3E06F000
heap
page read and write
7FF4ECBEF000
unkown
page readonly
2ADB4A03000
heap
page read and write
2ADB4660000
heap
page read and write
20208DC6000
heap
page read and write
400000
unkown
page execute and read and write
3590000
trusted library allocation
page read and write
2C90000
unkown
page read and write
19E5AAA7000
heap
page read and write
2ADB4DC9000
heap
page read and write
7FF502D48000
unkown
page readonly
239AEDB9000
heap
page read and write
7FF5031E8000
unkown
page readonly
600000
trusted library allocation
page read and write
239AEDEA000
heap
page read and write
7FF50328B000
unkown
page readonly
5DC5000
heap
page read and write
3400000
trusted library allocation
page read and write
19E5AAA7000
heap
page read and write
20208DD5000
heap
page read and write
7750000
unkown
page read and write
3F0000
trusted library allocation
page read and write
19E5AAB3000
heap
page read and write
12A3E707000
heap
page read and write
A710000
unkown
page read and write
4E49000
unkown
page read and write
2ADB4DC0000
heap
page read and write
7FF502D33000
unkown
page readonly
3400000
trusted library allocation
page read and write
DB2000
heap
page read and write
2B60000
unkown
page read and write
2BE25F10000
heap
page read and write
2430768A000
heap
page read and write
2B9867EA000
heap
page read and write
A710000
unkown
page read and write
196FBC82000
heap
page read and write
24EE5613000
heap
page read and write
12A3E04A000
heap
page read and write
19E5B078000
heap
page read and write
1B605CEF000
heap
page read and write
2BE25F1E000
heap
page read and write
196FB690000
heap
page read and write
B40000
unkown
page read and write
2540000
unkown
page read and write
2608D190000
heap
page read and write
2333B7F0000
heap
page read and write
3400000
trusted library allocation
page read and write
B30000
unkown
page read and write
680000
trusted library allocation
page read and write
87A0000
unkown
page read and write
A710000
unkown
page read and write
24EE5D6F000
heap
page read and write
DC0000
trusted library allocation
page read and write
2945125A000
heap
page read and write
7470000
unkown
page read and write
D84000
heap
page read and write
1B7AAD43000
heap
page read and write
7FF503110000
unkown
page readonly
360000
trusted library allocation
page read and write
3490000
heap
page read and write
3590000
trusted library allocation
page read and write
7DF411ED1000
unkown
page execute read
294518B9000
heap
page read and write
B009000
stack
page read and write
B40000
unkown
page read and write
3400000
trusted library allocation
page read and write
7DF411F01000
unkown
page execute read
B09B000
stack
page read and write
8AE000
stack
page read and write
B40000
unkown
page read and write
12A3E071000
heap
page read and write
E1F317F000
stack
page read and write
202094CA000
heap
page read and write
84A0000
unkown
page read and write
84A0000
unkown
page read and write
680000
trusted library allocation
page read and write
B40000
unkown
page read and write
3400000
trusted library allocation
page read and write
29451278000
heap
page read and write
7FF503161000
unkown
page readonly
4C80000
heap
page read and write
620000
heap
page read and write
D98000
heap
page read and write
2945189C000
heap
page read and write
7FA0000
unkown
page read and write
A820000
unkown
page read and write
2333BD04000
heap
page read and write
2530000
unkown
page read and write
D88000
heap
page read and write
12A3E06F000
heap
page read and write
9A7F000
stack
page read and write
89B0000
unkown
page read and write
6B0000
heap
page read and write
919C000
unkown
page read and write
919F000
unkown
page read and write
2550000
unkown
page read and write
19E5A9B0000
trusted library allocation
page read and write
24F0000
unkown
page read and write
20208F90000
heap
page read and write
2BE266F7000
heap
page read and write
12A3E05D000
heap
page read and write
680000
trusted library allocation
page read and write
24EE5D57000
heap
page read and write
12A3FF41000
heap
page read and write
1B7AAD19000
heap
page read and write
2BE26574000
heap
page read and write
D91000
heap
page read and write
196FBB0E000
heap
page read and write
1B7AAD1F000
heap
page read and write
20208D10000
heap
page read and write
1B7AAD1E000
heap
page read and write
21C67DC7000
heap
page read and write
29451251000
heap
page read and write
7FF780B74000
unkown
page read and write
11DB000
heap
page read and write
8440000
unkown
page read and write
294518C6000
heap
page read and write
515000
unkown
page readonly
1B7AA5EB000
heap
page read and write
E49A000
unkown
page read and write
6AE000
stack
page read and write
DA8000
heap
page read and write
7610000
unkown
page readonly
19E5AA35000
heap
page read and write
6BE000
heap
page read and write
12A3E1DE000
heap
page read and write
7FF780B71000
unkown
page readonly
239AEA6A000
heap
page read and write
12A3E1DA000
heap
page read and write
B50000
unkown
page read and write
294518B6000
heap
page read and write
2BE25F00000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
ABCB000
stack
page read and write
3400000
trusted library allocation
page read and write
2020ADB0000
heap
page read and write
5DC3000
heap
page read and write
12A3E6F6000
heap
page read and write
2ADB4DDD000
heap
page read and write
600000
direct allocation
page read and write
7FF50328F000
unkown
page readonly
F7EF27F000
stack
page read and write
2A90000
unkown
page readonly
2BE266DD000
heap
page read and write
A710000
unkown
page read and write
B90000
unkown
page read and write
A710000
unkown
page read and write
DC0000
trusted library allocation
page read and write
A820000
unkown
page read and write
B80000
unkown
page read and write
5F85C77000
stack
page read and write
7FF503365000
unkown
page readonly
DC0000
trusted library allocation
page read and write
7FF503189000
unkown
page readonly
3F0000
trusted library allocation
page read and write
196FB5C0000
heap
page read and write
19E5B04E000
heap
page read and write
308F000
unkown
page read and write
43EA000
unkown
page read and write
3400000
trusted library allocation
page read and write
24EE582A000
heap
page read and write
84E0000
unkown
page read and write
20208F7E000
heap
page read and write
29451879000
heap
page read and write
239AEDD0000
heap
page read and write
BC15000
unkown
page read and write
DA7000
heap
page read and write
B40000
unkown
page read and write
2BE266E2000
heap
page read and write
6ED0000
unkown
page read and write
1F0000
heap
page read and write
12A3E6B1000
heap
page read and write
24307B58000
heap
page read and write
5DA9000
heap
page read and write
1B7AA602000
heap
page read and write
24307B40000
heap
page read and write
2530000
unkown
page read and write
A5C000
stack
page read and write
19E5B04A000
heap
page read and write
1B7AA5E3000
heap
page read and write
DC0000
trusted library allocation
page read and write
B80000
unkown
page read and write
7FF503360000
unkown
page readonly
91A7000
unkown
page read and write
12A3E714000
heap
page read and write
5DAA000
heap
page read and write
24307415000
heap
page read and write
6F09000
unkown
page read and write
87A0000
unkown
page read and write
3F0000
trusted library allocation
page read and write
580000
heap
page read and write
DA8000
heap
page read and write
19E5AA87000
heap
page read and write
3086000
unkown
page read and write
9BE6000
unkown
page read and write
2B9867CA000
heap
page read and write
401000
unkown
page execute read
19E5AAA7000
heap
page read and write
3400000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
24EE5D89000
heap
page read and write
5CAB000
heap
page read and write
202094C3000
heap
page read and write
21C67E69000
heap
page read and write
A710000
unkown
page read and write
6FE000
heap
page read and write
294518B0000
heap
page read and write
7FF502DB3000
unkown
page readonly
DC0000
trusted library allocation
page read and write
5DC3000
heap
page read and write
9D54000
unkown
page read and write
29451885000
heap
page read and write
3F0000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
24307412000
heap
page read and write
7750000
unkown
page read and write
A710000
unkown
page read and write
1B7AA5FE000
heap
page read and write
84A0000
unkown
page read and write
19E5B079000
heap
page read and write
A820000
unkown
page read and write
12A3E093000
heap
page read and write
66E000
stack
page read and write
12A3E06F000
heap
page read and write
7FF502B5F000
unkown
page readonly
202094CA000
heap
page read and write
1B7AAD3A000
heap
page read and write
84E0000
unkown
page read and write
84E0000
unkown
page read and write
7FA0000
unkown
page read and write
2C90000
unkown
page read and write
41A000
unkown
page readonly
29451888000
heap
page read and write
B60000
unkown
page read and write
2945128F000
heap
page read and write
600000
trusted library allocation
page read and write
1B7AAD2E000
heap
page read and write
B50000
unkown
page read and write
196FB688000
heap
page read and write
A820000
unkown
page read and write
21C6847F000
heap
page read and write
21C6848A000
heap
page read and write
24EE55F7000
heap
page read and write
21C67D40000
heap
page read and write
7FF780B61000
unkown
page execute read
7750000
unkown
page read and write
C97000
system
page execute and read and write
1B7AAD23000
heap
page read and write
12A3E0F0000
trusted library allocation
page read and write
7FF50270A000
unkown
page readonly
7750000
unkown
page read and write
2530000
unkown
page read and write
1B7AA5C6000
heap
page read and write
24EE5D74000
heap
page read and write
7710000
unkown
page readonly
24307360000
heap
page read and write
7F70000
unkown
page readonly
7FF503235000
unkown
page readonly
8460000
unkown
page read and write
2BE266C7000
heap
page read and write
2333B561000
heap
page read and write
3F0000
trusted library allocation
page read and write
2945122F000
heap
page read and write
239AEF9A000
heap
page read and write
2B986130000
heap
page read and write
9237000
unkown
page read and write
21C6847F000
heap
page read and write
84A0000
unkown
page read and write
2B60000
unkown
page read and write
2B60000
unkown
page read and write
29451870000
heap
page read and write
2BE25EF5000
heap
page read and write
2ADB4DD5000
heap
page read and write
600000
trusted library allocation
page read and write
239AEF97000
heap
page read and write
19D000
stack
page read and write
12A3E036000
heap
page read and write
19E5AA67000
heap
page read and write
12A3E071000
heap
page read and write
41C000
unkown
page read and write
B90000
unkown
page read and write
24307415000
heap
page read and write
351E000
stack
page read and write
2BE25F7D000
heap
page read and write
2C90000
unkown
page read and write
A710000
unkown
page read and write
7750000
unkown
page read and write
1CB5E185000
heap
page read and write
3400000
trusted library allocation
page read and write
2B60000
unkown
page read and write
5DA9000
heap
page read and write
A820000
unkown
page read and write
39C5D9F000
stack
page read and write
196FBA80000
heap
page read and write
19E5AA89000
heap
page read and write
7750000
unkown
page read and write
2430741E000
heap
page read and write
6DB000
heap
page read and write
2F10000
unkown
page readonly
21C67E54000
heap
page read and write
A32F000
unkown
page read and write
B90000
unkown
page read and write
294518C6000
heap
page read and write
8A49000
stack
page read and write
2333BD1E000
heap
page read and write
3590000
trusted library allocation
page read and write
D36000
system
page execute and read and write
20208F71000
heap
page read and write
7750000
unkown
page read and write
2430768A000
heap
page read and write
7FF502DC0000
unkown
page readonly
24EE5D5A000
heap
page read and write
B50000
unkown
page read and write
7750000
unkown
page read and write
21C6847A000
heap
page read and write
2ADB45F0000
heap
page read and write
B90000
unkown
page read and write
360000
trusted library allocation
page read and write
2ADB4A07000
heap
page read and write
294518B7000
heap
page read and write
239AE730000
heap
page read and write
9416000
unkown
page read and write
7FF0000
unkown
page read and write
600000
trusted library allocation
page read and write
2333B561000
heap
page read and write
2B9867C5000
heap
page read and write
12A3E093000
heap
page read and write
19E5B068000
heap
page read and write
DAA000
heap
page read and write
2BE25F27000
heap
page read and write
B30000
unkown
page read and write
12A3E738000
heap
page read and write
A710000
unkown
page read and write
B80000
unkown
page read and write
21C6847A000
heap
page read and write
5F85D7F000
stack
page read and write
12A3E06F000
heap
page read and write
2CD0000
unkown
page read and write
12A3E06F000
heap
page read and write
BC21000
unkown
page read and write
2BE266F0000
heap
page read and write
7FF5032BD000
unkown
page readonly
21C68493000
heap
page read and write
DAE000
heap
page read and write
2BE25ED0000
heap
page read and write
294518C3000
heap
page read and write
680000
trusted library allocation
page read and write
1B7AA560000
trusted library allocation
page read and write
2550000
unkown
page read and write
2BE266DD000
heap
page read and write
239AEDDB000
heap
page read and write
B40000
unkown
page read and write
DC0000
trusted library allocation
page read and write
918D000
unkown
page read and write
19E5AAA4000
heap
page read and write
FEF3000
unkown
page read and write
E493000
unkown
page read and write
2333BCFF000
heap
page read and write
1B7AAD17000
heap
page read and write
2E00000
unkown
page read and write
DC0000
trusted library allocation
page read and write
A720000
unkown
page read and write
196FB685000
heap
page read and write
4D00000
unkown
page write copy
A710000
unkown
page read and write
1B7AA5B8000
heap
page read and write
2BDA000
stack
page read and write
19E5A9E0000
heap
page read and write
7FF502D18000
unkown
page readonly
3F0000
trusted library allocation
page read and write
E01000
system
page execute and read and write
7FF0000
unkown
page read and write
7609000
stack
page read and write
7FF5032F7000
unkown
page readonly
BFF4000
unkown
page read and write
87A0000
unkown
page read and write
DB4000
heap
page read and write
2ADB470B000
heap
page read and write
20208F7E000
heap
page read and write
B40000
unkown
page read and write
1B605D46000
heap
page read and write
1F0000
heap
page read and write
2A59000
stack
page read and write
B40000
unkown
page read and write
B570000
unkown
page read and write
A710000
unkown
page read and write
2BE25F7D000
heap
page read and write
3330000
heap
page read and write
7FF502B8B000
unkown
page readonly
1B605CA0000
heap
page read and write
DC0000
trusted library allocation
page read and write
1CB5DE2F000
heap
page read and write
19E5B05E000
heap
page read and write
9B87000
unkown
page read and write
B80000
unkown
page read and write
2333B561000
heap
page read and write
B30000
unkown
page read and write
A2F0000
unkown
page read and write
D88000
heap
page read and write
24307425000
heap
page read and write
2333BD18000
heap
page read and write
12A3E74E000
heap
page read and write
3F0000
trusted library allocation
page read and write
12A3E083000
heap
page read and write
2540000
unkown
page read and write
2E00000
unkown
page read and write
84A0000
unkown
page read and write
2ADB4DEF000
heap
page read and write
9CF6000
unkown
page read and write
84E0000
unkown
page read and write
A98F000
stack
page read and write
2BE266E2000
heap
page read and write
87A0000
unkown
page read and write
77E000
heap
page read and write
20208F6C000
heap
page read and write
C1AE000
unkown
page read and write
2BE25F22000
heap
page read and write
F7EEEA7000
stack
page read and write
12A3E04B000
heap
page read and write
7750000
unkown
page read and write
819F000
stack
page read and write
2608D0C0000
heap
page read and write
1B605D99000
heap
page read and write
B30000
unkown
page read and write
2333BCE0000
heap
page read and write
2BE27F60000
heap
page read and write
D96000
heap
page read and write
196FBC79000
heap
page read and write
239AEF94000
heap
page read and write
3400000
trusted library allocation
page read and write
A710000
unkown
page read and write
21C67E1D000
heap
page read and write
1CB5DE29000
heap
page read and write
12A3E0B2000
heap
page read and write
34C0000
heap
page read and write
2F20000
trusted library allocation
page read and write
12A3E0F0000
trusted library allocation
page read and write
B40000
unkown
page read and write
8610000
unkown
page read and write
B40000
unkown
page read and write
E49A000
unkown
page read and write
12A3E6A2000
heap
page read and write
1B7AA760000
heap
page read and write
B80000
unkown
page read and write
87A0000
unkown
page read and write
D88000
heap
page read and write
9D03000
unkown
page read and write
196FBB04000
heap
page read and write
B80000
unkown
page read and write
BDD5000
unkown
page read and write
39C5D1F000
stack
page read and write
24D0000
heap
page read and write
DC4000
heap
page read and write
1CB5DD60000
heap
page read and write
196FBB07000
heap
page read and write
24EE5620000
heap
page read and write
7750000
unkown
page read and write
7FF503223000
unkown
page readonly
239AEA60000
heap
page read and write
7580000
unkown
page read and write
85E0000
unkown
page read and write
1B7AAD1C000
heap
page read and write
B40000
unkown
page read and write
39C5C97000
stack
page read and write
41D000
unkown
page read and write
2C90000
unkown
page read and write
360000
trusted library allocation
page read and write
2945186E000
heap
page read and write
8D48000
stack
page read and write
12A3DFF8000
heap
page read and write
2560000
unkown
page read and write
7FF502FA2000
unkown
page readonly
7750000
unkown
page read and write
1B7AA875000
heap
page read and write
41D000
unkown
page read and write
21C69D70000
heap
page read and write
964E000
stack
page read and write
202094CB000
heap
page read and write
2B98606B000
heap
page read and write
21C67D90000
trusted library allocation
page read and write
87A0000
unkown
page read and write
BC30000
unkown
page read and write
1B7AAD05000
heap
page read and write
19E5C970000
heap
page read and write
A820000
unkown
page read and write
12A3E0B8000
heap
page read and write
3400000
trusted library allocation
page read and write
7FF502E02000
unkown
page readonly
360000
trusted library allocation
page read and write
2550000
unkown
page read and write
19E5AA95000
heap
page read and write
DC0000
trusted library allocation
page read and write
19E5B047000
heap
page read and write
24307687000
heap
page read and write
516000
unkown
page readonly
2945187C000
heap
page read and write
2333BD08000
heap
page read and write
C70000
heap
page read and write
12A3E734000
heap
page read and write
41D000
unkown
page write copy
29451228000
heap
page read and write
F7EF37F000
stack
page read and write
516000
unkown
page readonly
B40000
unkown
page read and write
B60000
unkown
page read and write
2BE25F42000
heap
page read and write
2DF0000
unkown
page read and write
12A3E6B1000
heap
page read and write
2BE25F76000
heap
page read and write
680000
trusted library allocation
page read and write
87A0000
unkown
page read and write
4C81000
heap
page read and write
12A3E6B9000
heap
page read and write
29451284000
heap
page read and write
7FF5032DB000
unkown
page readonly
A720000
unkown
page read and write
29451245000
heap
page read and write
89B0000
unkown
page read and write
2F20000
trusted library allocation
page read and write
2540000
unkown
page read and write
3AAA55F000
stack
page read and write
7FF0000
unkown
page read and write
B80000
unkown
page read and write
2ADB46FF000
heap
page read and write
7FF0000
unkown
page read and write
B70000
unkown
page read and write
D9C000
heap
page read and write
24307B74000
heap
page read and write
2AA0000
unkown
page read and write
B40000
unkown
page read and write
2540000
unkown
page read and write
43B0000
unkown
page read and write
2BE25EC0000
heap
page read and write
2B60000
unkown
page read and write
12A3E06F000
heap
page read and write
3590000
trusted library allocation
page read and write
2470000
heap
page read and write
360000
trusted library allocation
page read and write
A820000
unkown
page read and write
24E0000
unkown
page read and write
2550000
unkown
page read and write
24E0000
unkown
page read and write
7FF0000
unkown
page read and write
7FF502E43000
unkown
page readonly
1090000
unkown
page readonly
68E8DC7000
stack
page read and write
84A0000
unkown
page read and write
2ADB4DDF000
heap
page read and write
3400000
trusted library allocation
page read and write
87A0000
unkown
page read and write
600000
trusted library allocation
page read and write
2333BD1C000
heap
page read and write
A710000
unkown
page read and write
24F0000
unkown
page read and write
3F0000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
2ADB4DEF000
heap
page read and write
21C6848F000
heap
page read and write
98FC000
stack
page read and write
239AE834000
heap
page read and write
B40000
unkown
page read and write
21C67E0E000
heap
page read and write
21C68478000
heap
page read and write
1B7AAD00000
heap
page read and write
24307B4C000
heap
page read and write
21C6848A000
heap
page read and write
21C67D90000
trusted library allocation
page read and write
B40000
unkown
page read and write
DAD000
heap
page read and write
1CB5DE29000
heap
page read and write
4CCCFE000
stack
page read and write
69EA2FF000
stack
page read and write
87A0000
unkown
page read and write
20208DC7000
heap
page read and write
21C67DC2000
heap
page read and write
2550000
unkown
page read and write
A820000
unkown
page read and write
19E5AAA4000
heap
page read and write
7FF5031B7000
unkown
page readonly
64C000
heap
page read and write
12A3E06F000
heap
page read and write
2550000
unkown
page read and write
12A3E071000
heap
page read and write
7FF503032000
unkown
page readonly
A710000
unkown
page read and write
24EE5D6C000
heap
page read and write
12A3E1DE000
heap
page read and write
5DA9000
heap
page read and write
196FBC5C000
heap
page read and write
A710000
unkown
page read and write
BDE0000
unkown
page read and write
7FF502B7F000
unkown
page readonly
B90000
unkown
page read and write
7FF5032AF000
unkown
page readonly
C96BD07000
stack
page read and write
2333D590000
heap
page read and write
600000
trusted library allocation
page read and write
1B7AAD2E000
heap
page read and write
34D0000
heap
page read and write
24EE5D93000
heap
page read and write
24307B72000
heap
page read and write
3400000
trusted library allocation
page read and write
B11B000
stack
page read and write
2540000
unkown
page read and write
9191000
unkown
page read and write
2B9867E1000
heap
page read and write
2BE266F0000
heap
page read and write
24307B4F000
heap
page read and write
2BE25F65000
heap
page read and write
22B0000
heap
page read and write
255A000
stack
page read and write
680000
trusted library allocation
page read and write
7FF503245000
unkown
page readonly
6C0000
direct allocation
page execute and read and write
1B605D99000
heap
page read and write
B40000
unkown
page read and write
2B60000
unkown
page read and write
2B986250000
trusted library allocation
page read and write
89B0000
unkown
page read and write
7FF502E0D000
unkown
page readonly
21C6847F000
heap
page read and write
A710000
unkown
page read and write
5DCC000
heap
page read and write
19D000
stack
page read and write
10D0000
heap
page read and write
12A3E071000
heap
page read and write
84A0000
unkown
page read and write
7FF4ECBF5000
unkown
page readonly
5DA9000
heap
page read and write
20208F79000
heap
page read and write
2B9867F8000
heap
page read and write
12A3FF41000
heap
page read and write
239AE7E2000
heap
page read and write
5DC3000
heap
page read and write
3670000
remote allocation
page read and write
FFB4000
unkown
page read and write
202094C5000
heap
page read and write
239AE823000
heap
page read and write
B40000
unkown
page read and write
9050000
unkown
page read and write
239AE750000
trusted library allocation
page read and write
87A0000
unkown
page read and write
4405000
unkown
page read and write
1B7AAD24000
heap
page read and write
294511A0000
heap
page read and write
702D000
unkown
page read and write
400000
unkown
page execute and read and write
21C68471000
heap
page read and write
7750000
unkown
page read and write
1B605D3F000
heap
page read and write
DA7000
heap
page read and write
2BE266E2000
heap
page read and write
2333BD18000
heap
page read and write
2B60000
unkown
page read and write
B30000
unkown
page read and write
2B90000
unkown
page read and write
57B5000
heap
page read and write
12A3E05D000
heap
page read and write
B40000
unkown
page read and write
69EA37E000
stack
page read and write
5DCC000
heap
page read and write
89B0000
unkown
page read and write
390000
heap
page read and write
2430741E000
heap
page read and write
680000
trusted library allocation
page read and write
21C67E57000
heap
page read and write
7FF502E0A000
unkown
page readonly
20208F74000
heap
page read and write
A710000
unkown
page read and write
E66C6FE000
stack
page read and write
239AEDC5000
heap
page read and write
239AEDE0000
heap
page read and write
12A3E6BF000
heap
page read and write
5DDC000
heap
page read and write
21C68477000
heap
page read and write
2B986067000
heap
page read and write
29451260000
heap
page read and write
7FF502C8C000
unkown
page readonly
2B9867C2000
heap
page read and write
20208CF0000
heap
page read and write
1B7AA5F3000
heap
page read and write
2BE26575000
heap
page read and write
1130000
heap
page read and write
2B986047000
heap
page read and write
24EE5D7C000
heap
page read and write
7FF503108000
unkown
page readonly
7750000
unkown
page read and write
2BE25EF0000
heap
page read and write
89B0000
unkown
page read and write
68E907F000
stack
page read and write
7FF502DBC000
unkown
page readonly
19E5B047000
heap
page read and write
89B0000
unkown
page read and write
B5E0000
unkown
page read and write
7750000
unkown
page read and write
3010000
unkown
page read and write
7FFB000
stack
page read and write
2590000
heap
page read and write
1B7AAD0A000
heap
page read and write
2BE266D4000
heap
page read and write
A710000
unkown
page read and write
12A3E0F0000
trusted library allocation
page read and write
24F0000
unkown
page read and write
29451864000
heap
page read and write
DA0000
heap
page read and write
196FBC5F000
heap
page read and write
20208F77000
heap
page read and write
2540000
unkown
page read and write
2ADB46F6000
heap
page read and write
A710000
unkown
page read and write
2E00000
unkown
page read and write
196FBC82000
heap
page read and write
11DF000
heap
page read and write
66E000
stack
page read and write
7FF502EF3000
unkown
page readonly
680000
trusted library allocation
page read and write
1B7AA5E5000
heap
page read and write
1B7AAD50000
heap
page read and write
7750000
unkown
page read and write
7FF502F88000
unkown
page readonly
20208D99000
heap
page read and write
7FF502C4B000
unkown
page readonly
24F0000
unkown
page read and write
24F0000
unkown
page read and write
19E5B045000
heap
page read and write
294511F8000
heap
page read and write
12A3E06F000
heap
page read and write
239AE816000
heap
page read and write
7FF502D04000
unkown
page readonly
2333BCFC000
heap
page read and write
24EE5D53000
heap
page read and write
7FF502D9D000
unkown
page readonly
21C68115000
heap
page read and write
12A3E06F000
heap
page read and write
3400000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
87B0000
unkown
page read and write
12A3E093000
heap
page read and write
511E1AF000
stack
page read and write
294518BA000
heap
page read and write
40B000
unkown
page execute read
24307B5C000
heap
page read and write
2B9862B5000
heap
page read and write
12A3E06F000
heap
page read and write
AA8E000
stack
page read and write
24307B4C000
heap
page read and write
DC0000
trusted library allocation
page read and write
24307B5C000
heap
page read and write
12A3E180000
heap
page read and write
31C000
stack
page read and write
1B605D99000
heap
page read and write
D96000
heap
page read and write
7FF503055000
unkown
page readonly
24E0000
heap
page read and write
2B60000
unkown
page read and write
294518C3000
heap
page read and write
419000
unkown
page readonly
2B986071000
heap
page read and write
A710000
unkown
page read and write
680000
trusted library allocation
page read and write
5DA9000
heap
page read and write
2ADB4A0E000
heap
page read and write
24EE5D75000
heap
page read and write
12A3E06F000
heap
page read and write
24EE5636000
heap
page read and write
2ADB4DE1000
heap
page read and write
B50000
unkown
page read and write
B50000
unkown
page read and write
9CEA000
unkown
page read and write
366E000
stack
page read and write
1001FE000
stack
page read and write
24EE5D57000
heap
page read and write
A710000
unkown
page read and write
3F0000
trusted library allocation
page read and write
19E5B043000
heap
page read and write
3400000
trusted library allocation
page read and write
7750000
unkown
page read and write
DC0000
trusted library allocation
page read and write
12A3E210000
heap
page read and write
BE96000
unkown
page read and write
294518B0000
heap
page read and write
2B60000
unkown
page read and write
2B986086000
heap
page read and write
202094C2000
heap
page read and write
2ADB4DE1000
heap
page read and write
2BE266E2000
heap
page read and write
7FF503126000
unkown
page readonly
239AEDDA000
heap
page read and write
21C67E45000
heap
page read and write
3F0000
trusted library allocation
page read and write
2ADB46C7000
heap
page read and write
2B986089000
heap
page read and write
12A3E06F000
heap
page read and write
2B9867CA000
heap
page read and write
BB50000
unkown
page read and write
12A3E751000
heap
page read and write
3F0000
trusted library allocation
page read and write
D31000
system
page execute and read and write
44A0000
unkown
page read and write
360000
trusted library allocation
page read and write
294513A5000
heap
page read and write
12A3E06F000
heap
page read and write
7FF502DD3000
unkown
page readonly
2333B4C0000
heap
page read and write
E9D0000
unkown
page read and write
2ADB4DD4000
heap
page read and write
A820000
unkown
page read and write
B40000
unkown
page read and write
A720000
unkown
page read and write
1CB5DE09000
heap
page read and write
2530000
unkown
page read and write
196FBB03000
heap
page read and write
24EE5D90000
heap
page read and write
21C67E3A000
heap
page read and write
2B60000
unkown
page read and write
A710000
unkown
page read and write
12A3E002000
heap
page read and write
12A3E071000
heap
page read and write
29451170000
trusted library allocation
page read and write
BA6000
stack
page read and write
401000
unkown
page execute read
96CC000
stack
page read and write
B40000
unkown
page read and write
21C67E1D000
heap
page read and write
19D000
stack
page read and write
1FAD7608000
heap
page read and write
8B5000
stack
page read and write
BE14000
unkown
page read and write
2333B700000
heap
page read and write
2945187C000
heap
page read and write
7750000
unkown
page read and write
A710000
unkown
page read and write
1B7AA5E9000
heap
page read and write
5B0000
heap
page read and write
20208F7E000
heap
page read and write
360000
trusted library allocation
page read and write
7FF503167000
unkown
page readonly
84A0000
unkown
page read and write
5DE5000
heap
page read and write
515000
unkown
page readonly
294518CB000
heap
page read and write
EA34000
unkown
page read and write
2BE25F55000
heap
page read and write
196FB4E0000
heap
page read and write
A710000
unkown
page read and write
85E0000
unkown
page read and write
2540000
unkown
page read and write
76E0000
unkown
page readonly
68E90FF000
stack
page read and write
239AE7D8000
heap
page read and write
196FB647000
heap
page read and write
7FF503185000
unkown
page readonly
BFAE000
unkown
page read and write
680000
trusted library allocation
page read and write
1B7AAD45000
heap
page read and write
401000
unkown
page execute read
1B7AAD46000
heap
page read and write
7FF502E62000
unkown
page readonly
2530000
unkown
page read and write
4E33000
unkown
page read and write
2ADB4DF6000
heap
page read and write
12A3E763000
heap
page read and write
87A0000
unkown
page read and write
680000
trusted library allocation
page read and write
7DF411EE0000
unkown
page readonly
24307B57000
heap
page read and write
3AAA87E000
stack
page read and write
7FF503335000
unkown
page readonly
2333BCE7000
heap
page read and write
7FF0000
unkown
page read and write
196FBB05000
heap
page read and write
A710000
unkown
page read and write
77B000
heap
page read and write
24EE5D70000
heap
page read and write
12A3E026000
heap
page read and write
5DA9000
heap
page read and write
5DC6000
heap
page read and write
24EE5631000
heap
page read and write
196FB62B000
heap
page read and write
12A3E081000
heap
page read and write
A810000
heap
page read and write
B30000
unkown
page read and write
20208DC6000
heap
page read and write
600000
trusted library allocation
page read and write
29451130000
heap
page read and write
2333BD22000
heap
page read and write
A710000
unkown
page read and write
BBB0000
unkown
page read and write
87A0000
unkown
page read and write
19E5B065000
heap
page read and write
8E0000
unkown
page readonly
29451202000
heap
page read and write
24EE563C000
heap
page read and write
3F0000
trusted library allocation
page read and write
196FD580000
heap
page read and write
EBBDA7F000
stack
page read and write
20208D30000
trusted library allocation
page read and write
11E2000
heap
page read and write
239AEDDA000
heap
page read and write
24F0000
unkown
page read and write
1B605CC8000
heap
page read and write
B40000
unkown
page read and write
12A3E6B1000
heap
page read and write
84A0000
unkown
page read and write
7FF503187000
unkown
page readonly
5C0000
heap
page read and write
2EF0000
stack
page read and write
B40000
unkown
page read and write
7750000
unkown
page read and write
2333B555000
heap
page read and write
360000
trusted library allocation
page read and write
2ADB4E00000
heap
page read and write
B40000
unkown
page read and write
A710000
unkown
page read and write
7FF502E53000
unkown
page readonly
5DA9000
heap
page read and write
D90000
heap
page read and write
196FB620000
heap
page read and write
19E5B042000
heap
page read and write
7FF780B74000
unkown
page write copy
400000
unkown
page readonly
2BE2657E000
heap
page read and write
7800000
unkown
page readonly
2BE26577000
heap
page read and write
2ADB66F0000
heap
page read and write
B40000
unkown
page read and write
1B7AA5C9000
heap
page read and write
87A0000
unkown
page read and write
19E5A970000
heap
page read and write
89B0000
unkown
page read and write
7750000
unkown
page read and write
A710000
unkown
page read and write
239AE828000
heap
page read and write
A710000
unkown
page read and write
5DC7000
heap
page read and write
87B0000
unkown
page read and write
A710000
unkown
page read and write
5DC5000
heap
page read and write
294518CB000
heap
page read and write
2BE266D0000
heap
page read and write
2BE266F0000
heap
page read and write
19E5A9B0000
trusted library allocation
page read and write
9AF000
stack
page read and write
7490000
unkown
page read and write
2540000
unkown
page read and write
1B607AD0000
heap
page read and write
21C67E66000
heap
page read and write
511E57E000
stack
page read and write
12A3E06F000
heap
page read and write
1CB5DE2D000
heap
page read and write
7720000
unkown
page readonly
1B7AA5F9000
heap
page read and write
19E5B06B000
heap
page read and write
AAA0000
unkown
page readonly
A720000
unkown
page read and write
2333BCEA000
heap
page read and write
2B9867DE000
heap
page read and write
2BE266D9000
heap
page read and write
196FBC58000
heap
page read and write
2540000
unkown
page read and write
9BE3000
unkown
page read and write
BC80000
unkown
page read and write
9D01000
unkown
page read and write
2ADB4DD1000
heap
page read and write
2B9867CE000
heap
page read and write
A710000
unkown
page read and write
239AEDBF000
heap
page read and write
2B60000
unkown
page read and write
2BE25F62000
heap
page read and write
87A0000
unkown
page read and write
1B7AAD03000
heap
page read and write
3400000
trusted library allocation
page read and write
29451255000
heap
page read and write
19E5B081000
heap
page read and write
7750000
unkown
page read and write
12A3E714000
heap
page read and write
20208DED000
heap
page read and write
19E5AA30000
heap
page read and write
C0FD000
unkown
page read and write
2481000
heap
page read and write
12A3E093000
heap
page read and write
BF2E000
unkown
page read and write
600000
trusted library allocation
page read and write
7FF50301B000
unkown
page readonly
7FF503114000
unkown
page readonly
FE74000
unkown
page read and write
29451278000
heap
page read and write
79DE000
stack
page read and write
24EE5634000
heap
page read and write
5DA9000
heap
page read and write
239AEDC1000
heap
page read and write
6F0000
heap
page read and write
B40000
unkown
page read and write
7FF502E06000
unkown
page readonly
E20000
heap
page read and write
DC0000
trusted library allocation
page read and write
11D4000
heap
page read and write
DC0000
trusted library allocation
page read and write
7FF502E5E000
unkown
page readonly
24EE5D71000
heap
page read and write
12A3E732000
heap
page read and write
A710000
unkown
page read and write
BE99000
unkown
page read and write
511E47E000
stack
page read and write
E1F2DC7000
stack
page read and write
7750000
unkown
page read and write
24EE5D89000
heap
page read and write
1330000
heap
page read and write
A710000
unkown
page read and write
12A3E6AD000
heap
page read and write
12A3E07A000
heap
page read and write
3F0000
trusted library allocation
page read and write
21C6848C000
heap
page read and write
B40000
unkown
page read and write
AB4E000
stack
page read and write
7FF502F6A000
unkown
page readonly
2B60000
unkown
page read and write
600000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
DA7000
heap
page read and write
7FF0000
unkown
page read and write
196FB600000
trusted library allocation
page read and write
BF7A000
unkown
page read and write
24F0000
unkown
page read and write
2333BD18000
heap
page read and write
29451050000
heap
page read and write
20208DC6000
heap
page read and write
2333B522000
heap
page read and write
B40000
unkown
page read and write
2530000
unkown
page read and write
7750000
unkown
page read and write
7750000
unkown
page read and write
12A3E6D7000
heap
page read and write
9AF000
stack
page read and write
5E0000
heap
page read and write
2B986042000
heap
page read and write
EA10000
unkown
page read and write
5DA9000
heap
page read and write
B70000
unkown
page read and write
7FF0000
unkown
page read and write
7FF50332C000
unkown
page readonly
EB022FF000
stack
page read and write
7FF50316E000
unkown
page readonly
2ADB4E00000
heap
page read and write
24EE5636000
heap
page read and write
24EE5639000
heap
page read and write
294518C3000
heap
page read and write
8596000
unkown
page read and write
196FBC65000
heap
page read and write
12A3E6B9000
heap
page read and write
12A3E6AC000
heap
page read and write
360000
trusted library allocation
page read and write
7FF50308A000
unkown
page readonly
4CC967000
stack
page read and write
12A3E6BE000
heap
page read and write
7FF5030DE000
unkown
page readonly
12A3E093000
heap
page read and write
196FB688000
heap
page read and write
2ADB4DD5000
heap
page read and write
2BE266E2000
heap
page read and write
12A3E071000
heap
page read and write
A710000
unkown
page read and write
7FF5030C9000
unkown
page readonly
2BE25F6B000
heap
page read and write
7750000
unkown
page read and write
1B7AAD0B000
heap
page read and write
3400000
trusted library allocation
page read and write
20208F70000
heap
page read and write
3F0000
trusted library allocation
page read and write
12A3E1D4000
heap
page read and write
12A3E74E000
heap
page read and write
19E5A890000
heap
page read and write
2ADB4DCC000
heap
page read and write
B30000
unkown
page read and write
A710000
unkown
page read and write
A710000
unkown
page read and write
20208DC6000
heap
page read and write
7750000
unkown
page read and write
348E000
stack
page read and write
DB4000
heap
page read and write
12A40141000
heap
page read and write
7FF502F47000
unkown
page readonly
12A3E6FA000
heap
page read and write
7548000
stack
page read and write
B90000
unkown
page read and write
24F0000
unkown
page read and write
2B9867EA000
heap
page read and write
2BE25F4E000
heap
page read and write
12A3E071000
heap
page read and write
1B7AAD24000
heap
page read and write
24EE5620000
heap
page read and write
20208DC3000
heap
page read and write
19E5B07C000
heap
page read and write
7FF503195000
unkown
page readonly
2B986069000
heap
page read and write
3400000
trusted library allocation
page read and write
1CB5DE29000
heap
page read and write
A710000
unkown
page read and write
3F0000
trusted library allocation
page read and write
A710000
unkown
page read and write
DB9000
heap
page read and write
8710000
unkown
page read and write
7FF50335D000
unkown
page readonly
2BE266F2000
heap
page read and write
D8F000
heap
page read and write
2540000
unkown
page read and write
E1F327F000
stack
page read and write
7FF502D61000
unkown
page readonly
400000
unkown
page readonly
580000
heap
page read and write
600000
trusted library allocation
page read and write
7750000
unkown
page read and write
84A0000
unkown
page read and write
360000
trusted library allocation
page read and write
A720000
unkown
page read and write
6FDA000
unkown
page read and write
B30000
unkown
page read and write
2BE26100000
trusted library allocation
page read and write
84A0000
unkown
page read and write
344E000
stack
page read and write
7FF502EE3000
unkown
page readonly
12A3E6E3000
heap
page read and write
2333B561000
heap
page read and write
7FF0000
unkown
page read and write
20208F7E000
heap
page read and write
CAA1F7E000
stack
page read and write
41D000
unkown
page write copy
360000
trusted library allocation
page read and write
39C617F000
stack
page read and write
2BE25F6B000
heap
page read and write
B40000
unkown
page read and write
9FC000
stack
page read and write
E66C317000
stack
page read and write
600000
trusted library allocation
page read and write
12A3E751000
heap
page read and write
12A3E74E000
heap
page read and write
12A3E1DB000
heap
page read and write
7FF503006000
unkown
page readonly
FF72000
unkown
page read and write
30CD000
unkown
page read and write
78F000
heap
page execute and read and write
400000
unkown
page execute and read and write
1CB5DE04000
heap
page read and write
1B605CD8000
heap
page read and write
1FAD7698000
heap
page read and write
294518C6000
heap
page read and write
2BE26701000
heap
page read and write
7FF502C9D000
unkown
page readonly
59AE3FE000
stack
page read and write
24307B6A000
heap
page read and write
2ADB4DCC000
heap
page read and write
3400000
trusted library allocation
page read and write
2550000
unkown
page read and write
5DD0000
heap
page read and write
600000
trusted library allocation
page read and write
84A0000
unkown
page read and write
B40000
unkown
page read and write
E66C7FF000
stack
page read and write
196FBC80000
heap
page read and write
EB021FE000
stack
page read and write
7FF503130000
unkown
page readonly
B5D0000
unkown
page readonly
680000
trusted library allocation
page read and write
239AEDC8000
heap
page read and write
12A3E6E6000
heap
page read and write
24EE5D8A000
heap
page read and write
B60000
unkown
page read and write
C87000
heap
page read and write
2945189E000
heap
page read and write
294518BD000
heap
page read and write
401000
unkown
page execute read
20208F94000
heap
page read and write
DC0000
trusted library allocation
page read and write
C80000
heap
page read and write
2ADB471F000
heap
page read and write
2B9867F8000
heap
page read and write
3F0000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
BBE8000
unkown
page read and write
97F9000
stack
page read and write
24EE57D0000
trusted library allocation
page read and write
12A3E0BB000
heap
page read and write
12A3E06F000
heap
page read and write
2530000
unkown
page read and write
3AAA4D7000
stack
page read and write
24EE55C0000
heap
page read and write
2BE266F0000
heap
page read and write
CAA1EFF000
stack
page read and write
7FF502F86000
unkown
page readonly
2200000
heap
page read and write
A710000
unkown
page read and write
19E5AAA4000
heap
page read and write
B40000
unkown
page read and write
87C0000
unkown
page read and write
2B986083000
heap
page read and write
59ADFE7000
stack
page read and write
239AE82C000
heap
page read and write
3F0000
trusted library allocation
page read and write
84A0000
unkown
page read and write
294518BC000
heap
page read and write
12A3E025000
heap
page read and write
2ADB4DD5000
heap
page read and write
9B70000
unkown
page read and write
419000
unkown
page readonly
2530000
unkown
page read and write
21C0000
heap
page read and write
EA01000
unkown
page read and write
2530000
unkown
page read and write
2B986071000
heap
page read and write
7FF5032D7000
unkown
page readonly
359A000
heap
page read and write
1CB5DE29000
heap
page read and write
12A3E052000
heap
page read and write
239AE828000
heap
page read and write
2540000
unkown
page read and write
5DA9000
heap
page read and write
7FF502FA9000
unkown
page readonly
3F0000
trusted library allocation
page read and write
59AE2FF000
stack
page read and write
1B7AAD4B000
heap
page read and write
12A3E071000
heap
page read and write
7DF411EF0000
unkown
page readonly
B40000
unkown
page read and write
B50000
unkown
page read and write
29451883000
heap
page read and write
84A0000
unkown
page read and write
B90000
unkown
page read and write
4435000
unkown
page read and write
2170000
direct allocation
page read and write
196FBC79000
heap
page read and write
7620000
unkown
page readonly
600000
trusted library allocation
page read and write
A20000
heap
page read and write
41C000
unkown
page write copy
1B7AA5E3000
heap
page read and write
2BE25F65000
heap
page read and write
9AC000
stack
page read and write
A710000
unkown
page read and write
21C67E17000
heap
page read and write
A820000
unkown
page read and write
3F0000
trusted library allocation
page read and write
5DD0000
heap
page read and write
7750000
unkown
page read and write
2B98603E000
heap
page read and write
6C9000
heap
page read and write
360000
trusted library allocation
page read and write
239AEDC9000
heap
page read and write
12A40170000
heap
page read and write
24307B6A000
heap
page read and write
A710000
unkown
page read and write
2B986086000
heap
page read and write
24307590000
trusted library allocation
page read and write
7FF503227000
unkown
page readonly
2B60000
unkown
page read and write
12A3E1D2000
heap
page read and write
B80000
unkown
page read and write
2B9862B0000
heap
page read and write
3400000
trusted library allocation
page read and write
12A3E1D5000
heap
page read and write
A820000
unkown
page read and write
196FBC69000
heap
page read and write
1B7AA5E3000
heap
page read and write
B5F0000
unkown
page readonly
360000
trusted library allocation
page read and write
24EE5D89000
heap
page read and write
24EE5D67000
heap
page read and write
5F85E7F000
stack
page read and write
196FBB02000
heap
page read and write
5240000
heap
page read and write
C0A7000
unkown
page read and write
3F0000
trusted library allocation
page read and write
196FB688000
heap
page read and write
1B605D13000
heap
page read and write
29451899000
heap
page read and write
7FF503277000
unkown
page readonly
2B986094000
heap
page read and write
2945128F000
heap
page read and write
B80000
unkown
page read and write
12A3E071000
heap
page read and write
680000
trusted library allocation
page read and write
2B60000
unkown
page read and write
9ED000
stack
page read and write
680000
trusted library allocation
page read and write
24307422000
heap
page read and write
2B9867EA000
heap
page read and write
A720000
unkown
page read and write
24307B47000
heap
page read and write
10047E000
stack
page read and write
1B605CA9000
heap
page read and write
243073B0000
trusted library allocation
page read and write
12A3E046000
heap
page read and write
12A3E732000
heap
page read and write
4431000
unkown
page read and write
74C2000
unkown
page read and write
B1B000
heap
page read and write
1B7AAD02000
heap
page read and write
DB4000
heap
page read and write
360000
trusted library allocation
page read and write
7750000
unkown
page read and write
419000
unkown
page readonly
3420000
heap
page read and write
7FF503010000
unkown
page readonly
A710000
unkown
page read and write
680000
trusted library allocation
page read and write
32B0000
heap
page read and write
24307687000
heap
page read and write
196FBB0B000
heap
page read and write
24EE5D89000
heap
page read and write
1B7AA598000
heap
page read and write
2540000
unkown
page read and write
7750000
unkown
page read and write
2BE266DD000
heap
page read and write
2B986083000
heap
page read and write
19E5A9B0000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
196FBB0A000
heap
page read and write
997F000
stack
page read and write
19E5C960000
heap
page read and write
540000
heap
page read and write
12A3E1D7000
heap
page read and write
A710000
unkown
page read and write
12A3E6DE000
heap
page read and write
E493000
unkown
page read and write
294513AA000
heap
page read and write
196FBB00000
heap
page read and write
3400000
trusted library allocation
page read and write
84A0000
unkown
page read and write
8EF000
stack
page read and write
239AEDCA000
heap
page read and write
5DC7000
heap
page read and write
2530000
unkown
page read and write
1F0000
heap
page read and write
24307425000
heap
page read and write
6C0000
heap
page read and write
21C6848A000
heap
page read and write
1B605D1A000
heap
page read and write
41D000
unkown
page write copy
DC0000
trusted library allocation
page read and write
1B7AA5E3000
heap
page read and write
3F0000
trusted library allocation
page read and write
5DC7000
heap
page read and write
11DC000
heap
page read and write
3F0000
trusted library allocation
page read and write
239AEDD0000
heap
page read and write
2540000
unkown
page read and write
2550000
unkown
page read and write
3400000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
1B7AAD0E000
heap
page read and write
DC0000
trusted library allocation
page read and write
11EC000
heap
page read and write
24307B6A000
heap
page read and write
196FBC7A000
heap
page read and write
2ADB46C2000
heap
page read and write
B5A1000
unkown
page read and write
5DA9000
heap
page read and write
2333B561000
heap
page read and write
24307412000
heap
page read and write
59AE37E000
stack
page read and write
2B60000
unkown
page read and write
A710000
unkown
page read and write
2ADB4716000
heap
page read and write
24EE5617000
heap
page read and write
1B7AAD27000
heap
page read and write
AF7F000
stack
page read and write
2333B554000
heap
page read and write
239AE808000
heap
page read and write
C96C1FE000
stack
page read and write
12A3E0C0000
heap
page read and write
7FF5032C0000
unkown
page readonly
6F8000
heap
page read and write
7750000
unkown
page read and write
B40000
unkown
page read and write
7FF0000
unkown
page read and write
24EE563A000
heap
page read and write
2945188A000
heap
page read and write
2F20000
trusted library allocation
page read and write
239AEDC8000
heap
page read and write
360000
trusted library allocation
page read and write
29451236000
heap
page read and write
6FD6000
unkown
page read and write
360000
trusted library allocation
page read and write
12D0000
heap
page read and write
2333B544000
heap
page read and write
2BE25F4E000
heap
page read and write
2510000
unkown
page read and write
B40000
unkown
page read and write
196FB663000
heap
page read and write
1B7AAD3A000
heap
page read and write
A710000
unkown
page read and write
24EE5D76000
heap
page read and write
89B0000
unkown
page read and write
DC0000
trusted library allocation
page read and write
21C67DCB000
heap
page read and write
2333BCFC000
heap
page read and write
29451242000
heap
page read and write
21C67DC0000
heap
page read and write
19E5B068000
heap
page read and write
1B7AA760000
trusted library allocation
page read and write
DB0000
heap
page read and write
19E5B06B000
heap
page read and write
D96000
heap
page read and write
7FF503368000
unkown
page readonly
600000
trusted library allocation
page read and write
B60000
unkown
page read and write
21C67E17000
heap
page read and write
21C67DC3000
heap
page read and write
196FB730000
trusted library allocation
page read and write
24EE5D5E000
heap
page read and write
1B7AA540000
heap
page read and write
294513A0000
heap
page read and write
7750000
unkown
page read and write
7FF50310B000
unkown
page readonly
DB4000
heap
page read and write
2B986038000
heap
page read and write
A710000
unkown
page read and write
2ADB4E00000
heap
page read and write
6EE1000
unkown
page read and write
B40000
unkown
page read and write
600000
trusted library allocation
page read and write
A710000
unkown
page read and write
B30000
stack
page read and write
2333B6E0000
trusted library allocation
page read and write
239AEF9E000
heap
page read and write
600000
trusted library allocation
page read and write
511E4FE000
stack
page read and write
12A3E6EF000
heap
page read and write
680000
trusted library allocation
page read and write
12A3E6AC000
heap
page read and write
D96000
heap
page read and write
87A0000
unkown
page read and write
B40000
unkown
page read and write
29451207000
heap
page read and write
B40000
unkown
page read and write
7FF5026FF000
unkown
page readonly
20208F89000
heap
page read and write
2550000
unkown
page read and write
2BE266CF000
heap
page read and write
7FF503298000
unkown
page readonly
4E3D0FF000
stack
page read and write
2ADB4DEF000
heap
page read and write
1B7AAD40000
heap
page read and write
401000
unkown
page execute read
89B0000
unkown
page read and write
2BE266D3000
heap
page read and write
239AEA65000
heap
page read and write
3580000
heap
page read and write
EA1C000
unkown
page read and write
B40000
unkown
page read and write
12A40160000
heap
page read and write
24307424000
heap
page read and write
12A3E093000
heap
page read and write
1B7AA5C6000
heap
page read and write
2E00000
unkown
page read and write
29451254000
heap
page read and write
1170000
heap
page read and write
2B60000
unkown
page read and write
24307685000
heap
page read and write
196FB68C000
heap
page read and write
12A3E071000
heap
page read and write
B40000
unkown
page read and write
7FF780B60000
unkown
page readonly
BC19000
unkown
page read and write
2B60000
unkown
page read and write
2BE25F6C000
heap
page read and write
2BA0000
unkown
page read and write
2B60000
unkown
page read and write
B40000
unkown
page read and write
294518C3000
heap
page read and write
11E2000
heap
page read and write
24EE5624000
heap
page read and write
B70000
unkown
page read and write
F7EEFAF000
stack
page read and write
2550000
unkown
page read and write
680000
trusted library allocation
page read and write
3088000
unkown
page read and write
12A3E05D000
heap
page read and write
B80000
unkown
page read and write
DC0000
trusted library allocation
page read and write
7FF5032F2000
unkown
page readonly
B40000
unkown
page read and write
12A3E071000
heap
page read and write
36A0000
heap
page read and write
6E0000
unclassified section
page read and write
7FF5030D9000
unkown
page readonly
2945188D000
heap
page read and write
2550000
unkown
page read and write
7FF50326B000
unkown
page readonly
3400000
trusted library allocation
page read and write
24EE5D7C000
heap
page read and write
196FBB0E000
heap
page read and write
3590000
trusted library allocation
page read and write
DB4000
heap
page read and write
2BE25F74000
heap
page read and write
D96000
heap
page read and write
EB020FF000
stack
page read and write
B80000
unkown
page read and write
1F0000
heap
page read and write
7FA0000
unkown
page read and write
20208DEA000
heap
page read and write
87A0000
unkown
page read and write
294518BC000
heap
page read and write
2BE25F85000
heap
page read and write
A8EA000
stack
page read and write
2ADB4DD8000
heap
page read and write
239AEF9A000
heap
page read and write
87A0000
unkown
page read and write
51CD000
stack
page read and write
2DA0000
unkown
page readonly
24EE5634000
heap
page read and write
2ADB46E4000
heap
page read and write
3400000
trusted library allocation
page read and write
12A3E06F000
heap
page read and write
3F0000
trusted library allocation
page read and write
5F85DFE000
stack
page read and write
2270000
heap
page read and write
12A3E071000
heap
page read and write
A34A000
unkown
page read and write
24307B5C000
heap
page read and write
2945186B000
heap
page read and write
24E0000
unkown
page read and write
1B605D33000
heap
page read and write
243094F0000
heap
page read and write
DC0000
trusted library allocation
page read and write
29451885000
heap
page read and write
2945125A000
heap
page read and write
B40000
unkown
page read and write
2B9867EA000
heap
page read and write
12A3E769000
heap
page read and write
E1F31FF000
stack
page read and write
12A3E0AB000
heap
page read and write
12A3E046000
heap
page read and write
2530000
unkown
page read and write
360000
trusted library allocation
page read and write
2B986750000
heap
page read and write
DA0000
heap
page read and write
B30000
unkown
page read and write
A710000
unkown
page read and write
DA8000
heap
page read and write
B80000
unkown
page read and write
7FF502E60000
unkown
page readonly
84A0000
unkown
page read and write
7FF502CCE000
unkown
page readonly
196FB638000
heap
page read and write
24E0000
stack
page read and write
CAA1FFF000
stack
page read and write
600000
trusted library allocation
page read and write
2BE266E0000
heap
page read and write
7FF503326000
unkown
page readonly
19E5B07E000
heap
page read and write
12A40140000
heap
page read and write
6E15000
stack
page read and write
29451242000
heap
page read and write
DC0000
trusted library allocation
page read and write
29451245000
heap
page read and write
2430741B000
heap
page read and write
2B60000
unkown
page read and write
CAA207E000
stack
page read and write
A710000
unkown
page read and write
3F0000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
B30000
unkown
page read and write
20208DC3000
heap
page read and write
1B7AAD0A000
heap
page read and write
2530000
unkown
page read and write
21C6848A000
heap
page read and write
A820000
unkown
page read and write
DC0000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
12A3E06F000
heap
page read and write
9C000
stack
page read and write
2430768A000
heap
page read and write
7840000
unkown
page read and write
831E000
stack
page read and write
BBFA000
unkown
page read and write
A710000
unkown
page read and write
3400000
trusted library allocation
page read and write
12A3E74E000
heap
page read and write
680000
trusted library allocation
page read and write
7FF0000
unkown
page read and write
12A3E071000
heap
page read and write
2B986801000
heap
page read and write
24EE5636000
heap
page read and write
7FF502DB8000
unkown
page readonly
C96C07F000
stack
page read and write
1CB5DE09000
heap
page read and write
239AEF95000
heap
page read and write
7FF502B7D000
unkown
page readonly
3400000
trusted library allocation
page read and write
239AEDDA000
heap
page read and write
3400000
trusted library allocation
page read and write
1B7AAD42000
heap
page read and write
1B7AA5C6000
heap
page read and write
1CB5DE35000
heap
page read and write
7FF502F22000
unkown
page readonly
1CB5DE16000
heap
page read and write
2ADB46C3000
heap
page read and write
44D0000
unkown
page read and write
19E5B057000
heap
page read and write
D85000
heap
page read and write
2ADB4DF7000
heap
page read and write
2BE266F4000
heap
page read and write
12A3E043000
heap
page read and write
12A3E071000
heap
page read and write
58E000
stack
page read and write
84E0000
stack
page read and write
680000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
243076B5000
heap
page read and write
1F0000
heap
page read and write
7FF502D29000
unkown
page readonly
DAC000
heap
page read and write
5DA9000
heap
page read and write
2540000
unkown
page read and write
1B7AAD07000
heap
page read and write
B80000
unkown
page read and write
2540000
unkown
page read and write
B40000
unkown
page read and write
2B986047000
heap
page read and write
B40000
unkown
page read and write
2B60000
unkown
page read and write
A710000
unkown
page read and write
2B9867C4000
heap
page read and write
12A3E6B4000
heap
page read and write
1090000
heap
page read and write
2333BD21000
heap
page read and write
24EE57D0000
trusted library allocation
page read and write
239AE780000
heap
page read and write
2B986066000
heap
page read and write
21C67E54000
heap
page read and write
3400000
trusted library allocation
page read and write
12A3E044000
heap
page read and write
2ADB4722000
heap
page read and write
24307405000
heap
page read and write
7FF502DF9000
unkown
page readonly
2BE266DF000
heap
page read and write
B40000
unkown
page read and write
239AE80A000
heap
page read and write
196FBC82000
heap
page read and write
600000
trusted library allocation
page read and write
7FF780B75000
unkown
page readonly
24EE5636000
heap
page read and write
2BE260E0000
heap
page read and write
21C68460000
heap
page read and write
2440000
unclassified section
page read and write
DBF000
heap
page read and write
7750000
unkown
page read and write
C60000
unkown
page readonly
2B986803000
heap
page read and write
2ADB4A02000
heap
page read and write
BEF6000
unkown
page read and write
2550000
unkown
page read and write
21C6848C000
heap
page read and write
2E00000
unkown
page read and write
2ADB4DCE000
heap
page read and write
3F0000
trusted library allocation
page read and write
12A3E028000
heap
page read and write
12A3E0A2000
heap
page read and write
2333B545000
heap
page read and write
11DF000
heap
page read and write
D9E000
heap
page read and write
FF7B000
unkown
page read and write
7FF502B63000
unkown
page readonly
6BB000
heap
page read and write
196FBC7C000
heap
page read and write
196FBC5E000
heap
page read and write
B40000
unkown
page read and write
3400000
trusted library allocation
page read and write
2ADB46C7000
heap
page read and write
2DB0000
unkown
page read and write
7FF502DDC000
unkown
page readonly
12A3E071000
heap
page read and write
B40000
unkown
page read and write
D80000
heap
page read and write
DC0000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
A820000
unkown
page read and write
2BE266E2000
heap
page read and write
9364000
unkown
page read and write
3AAA8FF000
stack
page read and write
12A3E071000
heap
page read and write
A710000
unkown
page read and write
12A3E046000
heap
page read and write
B549000
stack
page read and write
89B0000
unkown
page read and write
12A3E093000
heap
page read and write
7FF780B75000
unkown
page readonly
5F5F000
stack
page read and write
9255000
unkown
page read and write
12A3E081000
heap
page read and write
B40000
unkown
page read and write
851E000
stack
page read and write
5DCC000
heap
page read and write
7FF0000
unkown
page read and write
1B7AA5EE000
heap
page read and write
2480000
heap
page read and write
294518CB000
heap
page read and write
B60000
unkown
page read and write
362D000
heap
page read and write
8710000
unkown
page read and write
12D5000
heap
page read and write
7FF5032C8000
unkown
page readonly
2333BCE3000
heap
page read and write
5DD0000
heap
page read and write
5DC1000
heap
page read and write
2430741E000
heap
page read and write
6FE3000
unkown
page read and write
20209060000
heap
page read and write
2333B563000
heap
page read and write
B40000
unkown
page read and write
239AEDDA000
heap
page read and write
B90000
unkown
page read and write
2BE25F27000
heap
page read and write
21C6846F000
heap
page read and write
3F0000
trusted library allocation
page read and write
2B9867DC000
heap
page read and write
7FF0000
unkown
page read and write
239AEF9B000
heap
page read and write
2B90000
unkown
page read and write
5DD0000
heap
page read and write
2550000
unkown
page read and write
3091000
unkown
page read and write
7FF503239000
unkown
page readonly
E0A000
system
page execute and read and write
12A3E0B9000
heap
page read and write
12A3E06F000
heap
page read and write
9F5000
heap
page read and write
19E5AA62000
heap
page read and write
680000
trusted library allocation
page read and write
24EE5D6C000
heap
page read and write
2530000
unkown
page read and write
1CB5DE29000
heap
page read and write
EB0217F000
stack
page read and write
3F0000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
7750000
unkown
page read and write
12A3E06F000
heap
page read and write
2B90000
unkown
page read and write
196FB663000
heap
page read and write
2ADB4630000
trusted library allocation
page read and write
95C4000
unkown
page read and write
30B4000
unkown
page read and write
2BA0000
unkown
page read and write
7FF502291000
unkown
page readonly
B40000
unkown
page read and write
89B0000
unkown
page read and write
2BE2657E000
heap
page read and write
19E5B044000
heap
page read and write
24EE5D78000
heap
page read and write
7FF5030FF000
unkown
page readonly
A346000
unkown
page read and write
196FB688000
heap
page read and write
7FF50331B000
unkown
page readonly
12A3E071000
heap
page read and write
AF80000
unkown
page read and write
D8B000
heap
page read and write
A710000
unkown
page read and write
600000
trusted library allocation
page read and write
B40000
unkown
page read and write
600000
trusted library allocation
page read and write
A720000
unkown
page read and write
40B000
unkown
page execute read
24EE5614000
heap
page read and write
21C67E54000
heap
page read and write
239AEDC5000
heap
page read and write
84A0000
unkown
page read and write
24EE57D0000
trusted library allocation
page read and write
294518C3000
heap
page read and write
12A3E21B000
heap
page read and write
7FF502B76000
unkown
page readonly
12A3E0AD000
heap
page read and write
1CB5DD70000
heap
page read and write
2550000
unkown
page read and write
1B7AA5FA000
heap
page read and write
3F0000
trusted library allocation
page read and write
19E5B064000
heap
page read and write
7750000
unkown
page read and write
B90000
unkown
page read and write
11E2000
heap
page read and write
243073F7000
heap
page read and write
43AC000
unkown
page read and write
2ADB4DD3000
heap
page read and write
3400000
trusted library allocation
page read and write
12A3E6B4000
heap
page read and write
239AEDC0000
heap
page read and write
2ADB471E000
heap
page read and write
2333BCE5000
heap
page read and write
419000
unkown
page readonly
21C6846C000
heap
page read and write
357000
system
page execute and read and write
307E000
unkown
page read and write
B90000
unkown
page read and write
2B9867EA000
heap
page read and write
600000
trusted library allocation
page read and write
A820000
unkown
page read and write
B40000
unkown
page read and write
3400000
trusted library allocation
page read and write
1CB5DE0E000
heap
page read and write
2E00000
stack
page read and write
2B9867E4000
heap
page read and write
239AEDB0000
heap
page read and write
7FF503287000
unkown
page readonly
12A3E025000
heap
page read and write
A720000
unkown
page read and write
A9D000
stack
page read and write
3F0000
trusted library allocation
page read and write
21C67DC5000
heap
page read and write
3592000
heap
page read and write
21C67E40000
heap
page read and write
2ADB4DD5000
heap
page read and write
12A3E071000
heap
page read and write
DDDB000
unkown
page read and write
5DBD000
heap
page read and write
A710000
unkown
page read and write
30A1000
unkown
page read and write
5DA9000
heap
page read and write
D39000
system
page execute and read and write
B40000
unkown
page read and write
12A3E769000
heap
page read and write
12A3E6AF000
heap
page read and write
7FF503087000
unkown
page readonly
520E000
stack
page read and write
58E000
stack
page read and write
2B90000
unkown
page read and write
2B60000
unkown
page read and write
7FF502D3E000
unkown
page readonly
68E927E000
stack
page read and write
87B0000
unkown
page read and write
294518CB000
heap
page read and write
239AEDD0000
heap
page read and write
B80000
unkown
page read and write
71B000
heap
page read and write
2945124C000
heap
page read and write
196FB600000
trusted library allocation
page read and write
E49A000
unkown
page read and write
41A000
unkown
page readonly
D58000
heap
page read and write
2E00000
unkown
page read and write
12A3E215000
heap
page read and write
2B60000
unkown
page read and write
2B9867F9000
heap
page read and write
2BE25F18000
heap
page read and write
239AE807000
heap
page read and write
B40000
unkown
page read and write
7FF502DAD000
unkown
page readonly
DC0000
trusted library allocation
page read and write
7A60000
unkown
page read and write
2B90000
unkown
page read and write
2B9867C3000
heap
page read and write
2B60000
unkown
page read and write
2333B56E000
heap
page read and write
B60000
unkown
page read and write
2B9862BA000
heap
page read and write
400000
unkown
page readonly
2333B7FA000
heap
page read and write
87C0000
unkown
page read and write
7FF503175000
unkown
page readonly
24E0000
unkown
page read and write
7750000
unkown
page read and write
24EE5631000
heap
page read and write
21C67E54000
heap
page read and write
20208DA2000
heap
page read and write
2ADB4A05000
heap
page read and write
20208F60000
heap
page read and write
20208DF5000
heap
page read and write
BEA3000
unkown
page read and write
196FB676000
heap
page read and write
1B7AAD0A000
heap
page read and write
243076B0000
heap
page read and write
5DA9000
heap
page read and write
21C68469000
heap
page read and write
3B0000
heap
page read and write
B90000
unkown
page read and write
DA6000
heap
page read and write
2BE25F75000
heap
page read and write
D88000
heap
page read and write
A710000
unkown
page read and write
84A0000
unkown
page read and write
21C67E61000
heap
page read and write
3590000
trusted library allocation
page read and write
B30000
unkown
page read and write
6F0F000
unkown
page read and write
B40000
unkown
page read and write
12A3E071000
heap
page read and write
2ADB4A00000
heap
page read and write
239AE630000
heap
page read and write
7750000
unkown
page read and write
1B605CF9000
heap
page read and write
600000
trusted library allocation
page read and write
24EE5D74000
heap
page read and write
2550000
unkown
page read and write
3F0000
trusted library allocation
page read and write
2330000
heap
page read and write
1B7AA760000
trusted library allocation
page read and write
2BE266F0000
heap
page read and write
7FF5030CE000
unkown
page readonly
196FB647000
heap
page read and write
6EB0000
unkown
page read and write
D84000
heap
page read and write
7FF50312D000
unkown
page readonly
1CB5DE0E000
heap
page read and write
2B98608C000
heap
page read and write
2BE266F0000
heap
page read and write
1B7AAD2E000
heap
page read and write
2B60000
unkown
page read and write
2B986280000
heap
page read and write
202094CE000
heap
page read and write
B30000
unkown
page read and write
A710000
unkown
page read and write
2430000
heap
page read and write
3400000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
8BC9000
stack
page read and write
3F0000
trusted library allocation
page read and write
7FF502D1B000
unkown
page readonly
243093E0000
heap
page read and write
2B9867FC000
heap
page read and write
1B6079B8000
heap
page read and write
21C67D90000
trusted library allocation
page read and write
9C000
stack
page read and write
6FBF000
unkown
page read and write
2B98608B000
heap
page read and write
B40000
unkown
page read and write
3400000
trusted library allocation
page read and write
2BA0000
unkown
page read and write
21C6847F000
heap
page read and write
12A3E741000
heap
page read and write
29451245000
heap
page read and write
87A0000
unkown
page read and write
87C0000
unkown
page read and write
87A0000
unkown
page read and write
89B0000
unkown
page read and write
5E4000
heap
page read and write
7560000
unkown
page readonly
3670000
remote allocation
page read and write
E85000
heap
page read and write
628000
heap
page read and write
7750000
unkown
page read and write
8AF000
stack
page read and write
2333B518000
heap
page read and write
20208F93000
heap
page read and write
24307415000
heap
page read and write
5DE7000
heap
page read and write
24EE5634000
heap
page read and write
D98000
heap
page read and write
106C1000
unkown
page read and write
2310000
heap
page read and write
2BE266DE000
heap
page read and write
9D60000
unkown
page read and write
2ADB4DEF000
heap
page read and write
7FF502DCF000
unkown
page readonly
10017F000
stack
page read and write
3F0000
trusted library allocation
page read and write
7FF502DC3000
unkown
page readonly
196FB685000
heap
page read and write
2B9867DF000
heap
page read and write
84A0000
unkown
page read and write
B40000
unkown
page read and write
3400000
trusted library allocation
page read and write
1B7AA5F7000
heap
page read and write
87A0000
unkown
page read and write
7FF502F9F000
unkown
page readonly
B40000
unkown
page read and write
829B000
stack
page read and write
2333BD01000
heap
page read and write
12A3E093000
heap
page read and write
B40000
unkown
page read and write
12A3E071000
heap
page read and write
400000
unkown
page readonly
239AEDC4000
heap
page read and write
2333B4B0000
heap
page read and write
2BE266DD000
heap
page read and write
7FF5026F7000
unkown
page readonly
7FF502FAF000
unkown
page readonly
12A3E1D0000
heap
page read and write
9BAA000
unkown
page read and write
239AE750000
trusted library allocation
page read and write
7FF50318B000
unkown
page readonly
2BE25F43000
heap
page read and write
7750000
unkown
page read and write
7FF0000
unkown
page read and write
2945128A000
heap
page read and write
1B605D32000
heap
page read and write
2BE25EFA000
heap
page read and write
5DA9000
heap
page read and write
7FF502D25000
unkown
page readonly
12A3E093000
heap
page read and write
5C0000
heap
page read and write
2945188C000
heap
page read and write
7FF5030E6000
unkown
page readonly
12A3E6DA000
heap
page read and write
680000
trusted library allocation
page read and write
2BE25F79000
heap
page read and write
7FF5031C3000
unkown
page readonly
2B60000
unkown
page read and write
1B7AAD3A000
heap
page read and write
1B7AA5B8000
heap
page read and write
91DE000
unkown
page read and write
4DB1000
unkown
page read and write
2B986069000
heap
page read and write
1B7AAD21000
heap
page read and write
7FF0000
unkown
page read and write
41A000
unkown
page readonly
B70000
unkown
page read and write
7FA0000
unkown
page read and write
12A3E09E000
heap
page read and write
40B000
unkown
page execute read
1B7AAD29000
heap
page read and write
2333BCEE000
heap
page read and write
2550000
unkown
page read and write
600000
trusted library allocation
page read and write
20208DA7000
heap
page read and write
12A3E06F000
heap
page read and write
239AE839000
heap
page read and write
12A3E09F000
heap
page read and write
12A3E6B0000
heap
page read and write
84E0000
unkown
page read and write
294518B0000
heap
page read and write
12A3E704000
heap
page read and write
12A3E071000
heap
page read and write
89B0000
unkown
page read and write
D81000
heap
page read and write
DC1000
heap
page read and write
2ADB4A07000
heap
page read and write
BDCD000
unkown
page read and write
20208DEC000
heap
page read and write
7FF5032DF000
unkown
page readonly
2BE266F0000
heap
page read and write
20208DC9000
heap
page read and write
7FF50331F000
unkown
page readonly
2333B565000
heap
page read and write
9F0000
heap
page read and write
2945122F000
heap
page read and write
7FF502FB7000
unkown
page readonly
24F0000
unkown
page read and write
87A0000
unkown
page read and write
7750000
unkown
page read and write
24F0000
unkown
page read and write
239AEDD0000
heap
page read and write
21C67E38000
heap
page read and write
B70000
unkown
page read and write
EB6A000
heap
page read and write
21C6848A000
heap
page read and write
9F1000
unkown
page readonly
400000
unkown
page readonly
7FF5031B0000
unkown
page readonly
2ADB4DF9000
heap
page read and write
2945186A000
heap
page read and write
B237000
stack
page read and write
2B60000
unkown
page read and write
1CB5DDE0000
heap
page read and write
B30000
unkown
page read and write
196FB625000
heap
page read and write
7FF502B93000
unkown
page readonly
2EF2000
stack
page read and write
3400000
trusted library allocation
page read and write
E50000
unkown
page readonly
680000
trusted library allocation
page read and write
7FF502D91000
unkown
page readonly
1FAD766A000
heap
page read and write
29453110000
heap
page read and write
7750000
unkown
page read and write
2ADB4DEF000
heap
page read and write
680000
trusted library allocation
page read and write
2540000
unkown
page read and write
239AEF9E000
heap
page read and write
5F0000
direct allocation
page execute and read and write
7FF503129000
unkown
page readonly
12A3E071000
heap
page read and write
E976CFF000
stack
page read and write
21C69D20000
heap
page read and write
2B986800000
heap
page read and write
5DA9000
heap
page read and write
9BF7000
unkown
page read and write
29451891000
heap
page read and write
12A3E6D9000
heap
page read and write
3F0000
trusted library allocation
page read and write
11E2000
heap
page read and write
2945188C000
heap
page read and write
7FF502EB7000
unkown
page readonly
2B60000
unkown
page read and write
2B9867CA000
heap
page read and write
243073F7000
heap
page read and write
91FB000
unkown
page read and write
360000
trusted library allocation
page read and write
5DBF000
heap
page read and write
196FBC79000
heap
page read and write
294511F0000
heap
page read and write
4E3CB79000
stack
page read and write
2B9867CB000
heap
page read and write
7FF0000
unkown
page read and write
20209065000
heap
page read and write
24307B6A000
heap
page read and write
2F20000
trusted library allocation
page read and write
D95000
heap
page read and write
B33000
heap
page read and write
B80000
unkown
page read and write
3400000
trusted library allocation
page read and write
DA8000
heap
page read and write
680000
trusted library allocation
page read and write
6FA000
heap
page read and write
2DE0000
unkown
page read and write
7750000
unkown
page read and write
B40000
unkown
page read and write
29451242000
heap
page read and write
B40000
unkown
page read and write
9E0000
unkown
page read and write
A710000
unkown
page read and write
21C6811A000
heap
page read and write
B00000
heap
page read and write
2593000
heap
page read and write
2540000
unkown
page read and write
196FB68E000
heap
page read and write
2608D150000
heap
page read and write
243073F7000
heap
page read and write
A710000
unkown
page read and write
A710000
unkown
page read and write
5DA9000
heap
page read and write
24F0000
unkown
page read and write
59B1000
heap
page read and write
11E2000
heap
page read and write
7FF502CF5000
unkown
page readonly
2ADB4702000
heap
page read and write
2B9867E8000
heap
page read and write
87A0000
unkown
page read and write
7480000
unkown
page read and write
19E5AA85000
heap
page read and write
24307684000
heap
page read and write
3635000
heap
page read and write
2BE266D8000
heap
page read and write
3F0000
trusted library allocation
page read and write
19D000
stack
page read and write
1B605C00000
heap
page read and write
1B7AC740000
heap
page read and write
BFB4000
unkown
page read and write
BC0C000
unkown
page read and write
20208F89000
heap
page read and write
3F0000
trusted library allocation
page read and write
BEAF000
unkown
page read and write
12A3E0A1000
heap
page read and write
2B986089000
heap
page read and write
12A3E6A8000
heap
page read and write
29451877000
heap
page read and write
E80000
heap
page read and write
B40000
unkown
page read and write
2B986086000
heap
page read and write
243073D7000
heap
page read and write
2B9867FE000
heap
page read and write
243075B0000
heap
page read and write
30AC000
unkown
page read and write
7FF5032A5000
unkown
page readonly
A710000
unkown
page read and write
62A000
heap
page read and write
2331000
heap
page read and write
24307B54000
heap
page read and write
2530000
unkown
page read and write
24307680000
heap
page read and write
2B988070000
heap
page read and write
7FF502F4B000
unkown
page readonly
3400000
trusted library allocation
page read and write
1B7AA520000
heap
page read and write
1B605D5E000
heap
page read and write
1CB5DE02000
heap
page read and write
196FB685000
heap
page read and write
DA8000
heap
page read and write
610000
unclassified section
page read and write
5CE000
stack
page read and write
2ADB4DC7000
heap
page read and write
E66C39E000
stack
page read and write
12A3DFF0000
heap
page read and write
24307B4D000
heap
page read and write
680000
trusted library allocation
page read and write
1CB5DE14000
heap
page read and write
360000
trusted library allocation
page read and write
FF3B000
unkown
page read and write
A820000
unkown
page read and write
7FF503151000
unkown
page readonly
294518C3000
heap
page read and write
DC0000
trusted library allocation
page read and write
2945128F000
heap
page read and write
BC27000
unkown
page read and write
239AE815000
heap
page read and write
2945189E000
heap
page read and write
2B9867F8000
heap
page read and write
7FF502D00000
unkown
page readonly
239AEDE3000
heap
page read and write
E49A000
unkown
page read and write
5DD0000
heap
page read and write
1B605D58000
heap
page read and write
BB0E000
stack
page read and write
A7ED000
stack
page read and write
A820000
unkown
page read and write
2ADB4700000
heap
page read and write
B80000
unkown
page read and write
439B000
unkown
page read and write
239AEDC7000
heap
page read and write
3400000
trusted library allocation
page read and write
B30000
unkown
page read and write
4CCC7F000
stack
page read and write
19E5B05C000
heap
page read and write
B78F000
stack
page read and write
53BD000
heap
page read and write
2608D0D0000
heap
page read and write
9C8A000
unkown
page read and write
D89000
heap
page read and write
2250000
heap
page read and write
11E2000
heap
page read and write
12A3E1D3000
heap
page read and write
87A0000
unkown
page read and write
20208DE3000
heap
page read and write
12A3E6EA000
heap
page read and write
20208F6C000
heap
page read and write
84A0000
unkown
page read and write
A710000
unkown
page read and write
2430768B000
heap
page read and write
21E0000
heap
page read and write
680000
trusted library allocation
page read and write
2ADB4DE1000
heap
page read and write
7FF0000
unkown
page read and write
5BAD000
heap
page read and write
294518B0000
heap
page read and write
7FA0000
unkown
page read and write
41A000
unkown
page readonly
9092000
unkown
page read and write
93F6000
unkown
page read and write
2ADB4A0E000
heap
page read and write
1B7AAD2E000
heap
page read and write
B40000
unkown
page read and write
21C67D50000
heap
page read and write
2B58000
stack
page read and write
2BE26572000
heap
page read and write
21C6846E000
heap
page read and write
12A3E740000
heap
page read and write
20208F7E000
heap
page read and write
12A3E046000
heap
page read and write
2B60000
unkown
page read and write
DBE000
heap
page read and write
76F000
stack
page read and write
12A40151000
heap
page read and write
24EE55E0000
heap
page read and write
243073F3000
heap
page read and write
21C67DCE000
heap
page read and write
24EE5D89000
heap
page read and write
401000
unkown
page execute read
B580000
unkown
page read and write
3400000
trusted library allocation
page read and write
2530000
unkown
page read and write
116E000
stack
page read and write
239AE7DE000
heap
page read and write
3400000
trusted library allocation
page read and write
7FF503206000
unkown
page readonly
12A3E71E000
heap
page read and write
E49A000
unkown
page read and write
87A0000
unkown
page read and write
12A3E6AE000
heap
page read and write
A710000
unkown
page read and write
20208D30000
trusted library allocation
page read and write
12A3E772000
heap
page read and write
196FB5E0000
heap
page read and write
11C3000
heap
page read and write
2160000
direct allocation
page execute and read and write
19E5AA59000
heap
page read and write
B30000
unkown
page read and write
196FB642000
heap
page read and write
5F85EFE000
stack
page read and write
7750000
unkown
page read and write
B1BF000
stack
page read and write
1335000
heap
page read and write
24307B58000
heap
page read and write
7FF502FB4000
unkown
page readonly
2B9867E8000
heap
page read and write
1B605C30000
heap
page read and write
7750000
unkown
page read and write
620000
heap
page read and write
515000
unkown
page readonly
19E5B05F000
heap
page read and write
2333B500000
trusted library allocation
page read and write
2B9867C0000
heap
page read and write
2BE266E2000
heap
page read and write
2BE26100000
trusted library allocation
page read and write
12A3E71D000
heap
page read and write
5DA9000
heap
page read and write
3F0000
trusted library allocation
page read and write
5210000
direct allocation
page execute and read and write
2B60000
unkown
page read and write
2ADB46F5000
heap
page read and write
7FF503118000
unkown
page readonly
DC0000
trusted library allocation
page read and write
84A0000
unkown
page read and write
2B60000
unkown
page read and write
2ADB4DDC000
heap
page read and write
680000
trusted library allocation
page read and write
5DCC000
heap
page read and write
1CB5DE16000
heap
page read and write
24EE55EE000
heap
page read and write
419000
unkown
page readonly
2B986089000
heap
page read and write
2333B571000
heap
page read and write
19E5B06B000
heap
page read and write
9C000
stack
page read and write
2945128F000
heap
page read and write
B30000
unkown
page read and write
B90000
unkown
page read and write
1B7AAD2E000
heap
page read and write
21C67E57000
heap
page read and write
7FF502E3F000
unkown
page readonly
6CD000
heap
page execute and read and write
2333BCF8000
heap
page read and write
12A3E06F000
heap
page read and write
2945188E000
heap
page read and write
2B60000
unkown
page read and write
239AE823000
heap
page read and write
24EE5D5A000
heap
page read and write
B40000
unkown
page read and write
24F0000
unkown
page read and write
F30000
heap
page read and write
2333B7F5000
heap
page read and write
84A0000
unkown
page read and write
E90000
unkown
page readonly
2ADB4719000
heap
page read and write
B40000
unkown
page read and write
12A3E046000
heap
page read and write
21C68478000
heap
page read and write
B70000
unkown
page read and write
2B986089000
heap
page read and write
2BE2657A000
heap
page read and write
5DBC000
heap
page read and write
B80000
unkown
page read and write
85E0000
unkown
page read and write
24F0000
unkown
page read and write
12A3E071000
heap
page read and write
1B7AAD45000
heap
page read and write
24307390000
heap
page read and write
24307682000
heap
page read and write
87A0000
unkown
page read and write
680000
trusted library allocation
page read and write
20208DC6000
heap
page read and write
1000FF000
stack
page read and write
24EE55B0000
heap
page read and write
12A3E751000
heap
page read and write
1B7AAD3D000
heap
page read and write
87A0000
unkown
page read and write
B30000
unkown
page read and write
600000
trusted library allocation
page read and write
800000
unkown
page readonly
106FE000
unkown
page read and write
3F0000
trusted library allocation
page read and write
1B7AAD0E000
heap
page read and write
21C6848A000
heap
page read and write
24EE55F2000
heap
page read and write
24F0000
unkown
page read and write
7FF0000
unkown
page read and write
19E5AA87000
heap
page read and write
3590000
heap
page read and write
680000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
2B9867CE000
heap
page read and write
3F0000
trusted library allocation
page read and write
B590000
heap
page read and write
A710000
unkown
page read and write
BCC000
stack
page read and write
19E5B04B000
heap
page read and write
1B7AA5A7000
heap
page read and write
2ADB6700000
heap
page read and write
6EE6000
unkown
page read and write
7FF50303F000
unkown
page readonly
9366000
unkown
page read and write
D96000
heap
page read and write
24307B6A000
heap
page read and write
12A3E6C2000
heap
page read and write
196FBC5C000
heap
page read and write
5DC6000
heap
page read and write
600000
trusted library allocation
page read and write
7DF411ED0000
unkown
page readonly
84E0000
unkown
page read and write
20208F69000
heap
page read and write
196FBB0A000
heap
page read and write
2B986077000
heap
page read and write
2BE25F65000
heap
page read and write
A820000
unkown
page read and write
2608D155000
heap
page read and write
85E0000
unkown
page read and write
3082000
unkown
page read and write
1B605CC8000
heap
page read and write
810000
unkown
page readonly
19E5B078000
heap
page read and write
20208F79000
heap
page read and write
19E5B04E000
heap
page read and write
7750000
unkown
page read and write
2945186A000
heap
page read and write
2530000
unkown
page read and write
12A3E6A0000
heap
page read and write
239AEDBC000
heap
page read and write
2B986076000
heap
page read and write
3F0000
trusted library allocation
page read and write
12A3FF40000
heap
page read and write
2F20000
trusted library allocation
page read and write
12A0000
heap
page read and write
C26000
system
page execute and read and write
A710000
unkown
page read and write
7FF502CFA000
unkown
page readonly
DD6000
heap
page read and write
12A3E06F000
heap
page read and write
600000
trusted library allocation
page read and write
41C000
unkown
page write copy
2D0B000
stack
page read and write
24EE5620000
heap
page read and write
20208DC6000
heap
page read and write
84A0000
unkown
page read and write
7750000
unkown
page read and write
2180000
unclassified section
page read and write
2430741E000
heap
page read and write
99FF000
stack
page read and write
12A3E6DF000
heap
page read and write
295E000
stack
page read and write
380000
heap
page read and write
21C67DCA000
heap
page read and write
76C0000
unkown
page read and write
2BE25F86000
heap
page read and write
3F0000
trusted library allocation
page read and write
12A3E0AA000
heap
page read and write
24EE5634000
heap
page read and write
24F0000
unkown
page read and write
2540000
unkown
page read and write
7FF50317C000
unkown
page readonly
2BE25F65000
heap
page read and write
196FBC83000
heap
page read and write
D35000
heap
page read and write
90BD000
unkown
page read and write
A820000
unkown
page read and write
2E00000
unkown
page read and write
2540000
unkown
page read and write
12A3E067000
heap
page read and write
243073F7000
heap
page read and write
294518C6000
heap
page read and write
77FE000
stack
page read and write
5CAB000
heap
page read and write
239B0740000
heap
page read and write
12A3E72F000
heap
page read and write
1B7AAD40000
heap
page read and write
7DF411EF1000
unkown
page execute read
12A3E6E6000
heap
page read and write
A710000
unkown
page read and write
A820000
unkown
page read and write
2BE26700000
heap
page read and write
21C68475000
heap
page read and write
2333BCEE000
heap
page read and write
294518C6000
heap
page read and write
2BE2657A000
heap
page read and write
243073D7000
heap
page read and write
21C67E5D000
heap
page read and write
2BE26573000
heap
page read and write
2333BCF0000
heap
page read and write
21C6846C000
heap
page read and write
610000
heap
page read and write
360000
trusted library allocation
page read and write
7FF502C30000
unkown
page readonly
3400000
trusted library allocation
page read and write
2DC0000
unkown
page read and write
24307B70000
heap
page read and write
239AEA30000
heap
page read and write
2530000
unkown
page read and write
A720000
unkown
page read and write
41A000
unkown
page readonly
12A3E6B7000
heap
page read and write
19E5B050000
heap
page read and write
B40000
unkown
page read and write
600000
trusted library allocation
page read and write
7750000
unkown
page read and write
7FF503082000
unkown
page readonly
3400000
trusted library allocation
page read and write
21C6848B000
heap
page read and write
2333BCE2000
heap
page read and write
2ADB4DDF000
heap
page read and write
2ADB4A0B000
heap
page read and write
196FD590000
heap
page read and write
9BCB000
unkown
page read and write
2ADB4DD7000
heap
page read and write
21C67D90000
trusted library allocation
page read and write
7FF5032EE000
unkown
page readonly
196FB665000
heap
page read and write
12A40160000
heap
page read and write
1B7AAD1C000
heap
page read and write
D96000
heap
page read and write
29451880000
heap
page read and write
3F0000
trusted library allocation
page read and write
20208CE0000
heap
page read and write
360000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
87A0000
unkown
page read and write
21C67DCA000
heap
page read and write
7FF502F96000
unkown
page readonly
2B986230000
heap
page read and write
1B7AA590000
heap
page read and write
DC0000
trusted library allocation
page read and write
2BE25F62000
heap
page read and write
A820000
unkown
page read and write
9C000
stack
page read and write
8F0000
heap
page read and write
600000
trusted library allocation
page read and write
12A3E732000
heap
page read and write
600000
trusted library allocation
page read and write
E1F30FF000
stack
page read and write
4CCDFE000
stack
page read and write
4CC9EF000
stack
page read and write
2320000
heap
page read and write
24EE7720000
heap
page read and write
1CB5DE29000
heap
page read and write
84A0000
unkown
page read and write
9C000
stack
page read and write
11A0000
heap
page read and write
A710000
unkown
page read and write
3400000
trusted library allocation
page read and write
239AEDB7000
heap
page read and write
12A3E06F000
heap
page read and write
239AE823000
heap
page read and write
B40000
unkown
page read and write
2540000
unkown
page read and write
B80000
unkown
page read and write
79D000
heap
page read and write
19E5B06B000
heap
page read and write
12A3E0C0000
heap
page read and write
3F0000
trusted library allocation
page read and write
196FB667000
heap
page read and write
BE1C000
unkown
page read and write
B40000
unkown
page read and write
85E0000
unkown
page read and write
4463000
unkown
page read and write
19E5AA8B000
heap
page read and write
E49A000
unkown
page read and write
2530000
unkown
page read and write
2B9867E7000
heap
page read and write
1B7AAD40000
heap
page read and write
21C68475000
heap
page read and write
3F0000
trusted library allocation
page read and write
1CB5DD90000
heap
page read and write
A710000
unkown
page read and write
2ADB4A04000
heap
page read and write
7FF503347000
unkown
page readonly
24307421000
heap
page read and write
239AEDBD000
heap
page read and write
7FF503270000
unkown
page readonly
3F0000
trusted library allocation
page read and write
89B0000
unkown
page read and write
196FBC81000
heap
page read and write
4CCD7F000
stack
page read and write
B40000
unkown
page read and write
24F0000
unkown
page read and write
A710000
unkown
page read and write
9D0D000
unkown
page read and write
2540000
unkown
page read and write
19E5AAA7000
heap
page read and write
2BE266C9000
heap
page read and write
2BE266F0000
heap
page read and write
19E5B078000
heap
page read and write
24307B55000
heap
page read and write
7FF5030EF000
unkown
page readonly
2B60000
unkown
page read and write
7FF503051000
unkown
page readonly
7FF5031FF000
unkown
page readonly
A710000
unkown
page read and write
24EE5D8C000
heap
page read and write
243073F7000
heap
page read and write
12A3E6B9000
heap
page read and write
1B605D1E000
heap
page read and write
11CE000
heap
page read and write
84A0000
unkown
page read and write
21C6847F000
heap
page read and write
40B000
unkown
page execute read
A710000
unkown
page read and write
BEE8000
unkown
page read and write
1B7AAD07000
heap
page read and write
2240000
heap
page read and write
BD6C000
unkown
page read and write
2B60000
unkown
page read and write
B2BA000
stack
page read and write
87B0000
unkown
page read and write
7FF502F5E000
unkown
page readonly
7FF502B9A000
unkown
page readonly
B80000
unkown
page read and write
2BE266E2000
heap
page read and write
EB0227E000
stack
page read and write
87A0000
unkown
page read and write
AA0B000
stack
page read and write
2ADB4DDB000
heap
page read and write
E976C7F000
stack
page read and write
FF36000
unkown
page read and write
2B60000
unkown
page read and write
19D000
stack
page read and write
1B7AAD2A000
heap
page read and write
E3CF000
stack
page read and write
B80000
unkown
page read and write
2ADB46B0000
heap
page read and write
F7EEF2F000
stack
page read and write
2510000
unkown
page read and write
7FF0000
unkown
page read and write
24307683000
heap
page read and write
600000
trusted library allocation
page read and write
12A3FF41000
heap
page read and write
B70000
unkown
page read and write
21C67DCE000
heap
page read and write
20208D90000
heap
page read and write
24EE5D7C000
heap
page read and write
3400000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
770000
heap
page read and write
12A3E06F000
heap
page read and write
24EE5631000
heap
page read and write
BDF0000
unkown
page read and write
1B605D5F000
heap
page read and write
D93000
heap
page read and write
19E5B068000
heap
page read and write
359C000
heap
page read and write
196FB685000
heap
page read and write
69EA47F000
stack
page read and write
A710000
unkown
page read and write
24EE5636000
heap
page read and write
A720000
unkown
page read and write
20208F89000
heap
page read and write
1B7AA87B000
heap
page read and write
6E99000
stack
page read and write
12A3E08A000
heap
page read and write
7FF502F50000
unkown
page readonly
511E0A7000
stack
page read and write
680000
trusted library allocation
page read and write
B33A000
stack
page read and write
2945188C000
heap
page read and write
85E0000
unkown
page read and write
3590000
trusted library allocation
page read and write
21B0000
heap
page read and write
BDC7000
unkown
page read and write
2BE25F62000
heap
page read and write
41C000
unkown
page read and write
12A3E071000
heap
page read and write
19E5AAAE000
heap
page read and write
84E0000
unkown
page read and write
3F0000
trusted library allocation
page read and write
20208DE4000
heap
page read and write
2A60000
unkown
page readonly
2945189B000
heap
page read and write
E49A000
unkown
page read and write
1B7AC5B0000
heap
page read and write
2ADB46E5000
heap
page read and write
2B60000
unkown
page read and write
EB49000
stack
page read and write
2ADB4DE1000
heap
page read and write
7750000
unkown
page read and write
19E5B05C000
heap
page read and write
3F0000
trusted library allocation
page read and write
419000
unkown
page readonly
29451863000
heap
page read and write
5DA9000
heap
page read and write
7FF502EF7000
unkown
page readonly
30A5000
unkown
page read and write
B50000
unkown
page read and write
2ADB4A75000
heap
page read and write
21C68467000
heap
page read and write
196FBC7C000
heap
page read and write
21C67E00000
heap
page read and write
12A3FFBC000
heap
page read and write
A710000
unkown
page read and write
11A9000
heap
page read and write
12A3E6A1000
heap
page read and write
2333B4E0000
heap
page read and write
12A3E751000
heap
page read and write
B90000
unkown
page read and write
BC55000
unkown
page read and write
2B9867E1000
heap
page read and write
2B986071000
heap
page read and write
2ADB4DEF000
heap
page read and write
87A0000
unkown
page read and write
1B7AAD48000
heap
page read and write
7FF50302D000
unkown
page readonly
B40000
unkown
page read and write
360000
trusted library allocation
page read and write
2270000
heap
page read and write
24EE57B0000
heap
page read and write
1B605C10000
heap
page read and write
41C000
unkown
page write copy
2B60000
unkown
page read and write
B40000
unkown
page read and write
7750000
unkown
page read and write
7FF502D65000
unkown
page readonly
A710000
unkown
page read and write
600000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
2333B510000
heap
page read and write
24EE5D6E000
heap
page read and write
B80000
unkown
page read and write
E08000
system
page execute and read and write
2430741E000
heap
page read and write
7FF503020000
unkown
page readonly
A820000
unkown
page read and write
2ADB4DE1000
heap
page read and write
EB60000
heap
page read and write
A710000
unkown
page read and write
1B7AAD10000
heap
page read and write
2540000
unkown
page read and write
2B9867C7000
heap
page read and write
A710000
unkown
page read and write
7FF503275000
unkown
page readonly
680000
trusted library allocation
page read and write
8110000
unkown
page read and write
2B60000
unkown
page read and write
7750000
unkown
page read and write
EA1A000
unkown
page read and write
EA0D000
unkown
page read and write
69E9F87000
stack
page read and write
2540000
unkown
page read and write
19E5A9B0000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
B70E000
stack
page read and write
243073F7000
heap
page read and write
A36B000
unkown
page read and write
B50000
unkown
page read and write
54BB000
heap
page read and write
12A3E1D7000
heap
page read and write
24F0000
unkown
page read and write
2B986250000
trusted library allocation
page read and write
19E5B061000
heap
page read and write
2333B500000
trusted library allocation
page read and write
12A3E74E000
heap
page read and write
590000
heap
page read and write
20208D60000
heap
page read and write
977E000
stack
page read and write
7FF50327C000
unkown
page readonly
2B60000
unkown
page read and write
2F20000
trusted library allocation
page read and write
2550000
unkown
page read and write
24F0000
unkown
page read and write
10007B000
stack
page read and write
6E3000
heap
page read and write
B40000
unkown
page read and write
6ECE000
unkown
page read and write
12A3FF41000
heap
page read and write
84A0000
unkown
page read and write
4C81000
heap
page read and write
7FF502E9C000
unkown
page readonly
EBBD7EF000
stack
page read and write
12A3E043000
heap
page read and write
84E0000
unkown
page read and write
70D000
heap
page execute and read and write
12A3FF41000
heap
page read and write
D30000
heap
page read and write
3400000
trusted library allocation
page read and write
7FF502D8F000
unkown
page readonly
7A58000
stack
page read and write
1FAD74B0000
heap
page read and write
5DE7000
heap
page read and write
87A0000
unkown
page read and write
A710000
unkown
page read and write
7FF502F66000
unkown
page readonly
63E000
heap
page execute and read and write
84A0000
unkown
page read and write
600000
trusted library allocation
page read and write
21C67E54000
heap
page read and write
7FF502D70000
unkown
page readonly
A801000
unkown
page read and write
B80000
unkown
page read and write
9EF000
stack
page read and write
12A3E0A1000
heap
page read and write
6EF3000
unkown
page read and write
2333B546000
heap
page read and write
294518BF000
heap
page read and write
196FBB0A000
heap
page read and write
24307B5C000
heap
page read and write
196FB669000
heap
page read and write
21C67E1D000
heap
page read and write
24F0000
unkown
page read and write
2BE266CC000
heap
page read and write
7FF5030B4000
unkown
page readonly
B40000
unkown
page read and write
B40000
unkown
page read and write
19E5AAB4000
heap
page read and write
B40000
unkown
page read and write
85E0000
unkown
page read and write
BB50000
unkown
page read and write
30A3000
unkown
page read and write
1B606015000
heap
page read and write
600000
trusted library allocation
page read and write
239AE750000
trusted library allocation
page read and write
B40000
unkown
page read and write
21C67E40000
heap
page read and write
There are 3744 hidden memdumps, click here to show them.