IOC Report
v173TV3V11.exe

loading gif

Files

File Path
Type
Category
Malicious
v173TV3V11.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\451E.exe
PE32+ executable (GUI) x86-64, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\C35.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\bsjhhuh
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\bsjhhuh:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\vejhhuh
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\9AAA.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\9AAA.tmp-shm
data
dropped
C:\Users\user\AppData\Local\Temp\9E35.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\A115.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\A481.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\A4FF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\A5FA.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\A6F5.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Roaming\vssdihe
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\v173TV3V11.exe
"C:\Users\user\Desktop\v173TV3V11.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\bsjhhuh
C:\Users\user\AppData\Roaming\bsjhhuh
malicious
C:\Users\user\AppData\Local\Temp\C35.exe
C:\Users\user\AppData\Local\Temp\C35.exe
malicious
C:\Users\user\AppData\Roaming\vejhhuh
C:\Users\user\AppData\Roaming\vejhhuh
malicious
C:\Users\user\AppData\Local\Temp\451E.exe
C:\Users\user\AppData\Local\Temp\451E.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\System32\cmd.exe
cmd
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /displaydns
malicious
C:\Windows\System32\netsh.exe
netsh firewall show state
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\ROUTE.EXE
route print
C:\Windows\System32\tasklist.exe
tasklist /v /fo csv
C:\Windows\System32\net.exe
net accounts /domain
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 accounts /domain
C:\Windows\System32\net.exe
net share
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 share
C:\Windows\System32\net.exe
net user
There are 29 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://calvinandhalls.com/
unknown
malicious
https://calvinandhalls.com/application/x-www-form-urlencodedMozilla/5.0
unknown
malicious
https://23.145.40.164/ksa9104.exe
23.145.40.164
malicious
https://calvinandhalls.com/search.phpMozilla/5.0
unknown
malicious
http://unicea.ws/tmp/index.php
malicious
http://nwgrus.ru/tmp/index.php
malicious
https://calvinandhalls.com/search.php
23.145.40.162
malicious
https://calvinandhalls.com/5
unknown
malicious
https://calvinandhalls.com/earch.php
unknown
malicious
http://tech-servers.in.net/tmp/index.php
malicious
https://calvinandhalls.com/p
unknown
malicious
https://aka.ms/odirmr
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
https://powerpoint.office.comcember
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://excel.office.com
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://schemas.micro
unknown
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
https://api.msn.com/q
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
unknown
https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
unknown
https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
https://wns.windows.com/L
unknown
https://word.office.com
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17pot
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.ecosia.org/newtab/
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/Vh5j3k
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
https://api.msn.com/v1/news/Feed/Windows?&
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
unknown
https://support.moz
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://android.notify.windows.com/iOS
unknown
https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
unknown
https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
unknown
https://api.msn.com/
unknown
https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
unknown
https://support.mozilla.org
unknown
https://outlook.com_
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
unknown
https://www.msn.com:443/en-us/feed
unknown
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
unknown
There are 65 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
calvinandhalls.com
23.145.40.162
malicious
nwgrus.ru
190.219.117.240
malicious
globalviewsnature.com
23.145.40.113
malicious
bg.microsoft.map.fastly.net
199.232.210.172
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
201.212.52.197
unknown
Argentina
malicious
190.219.117.240
nwgrus.ru
Panama
malicious
23.145.40.164
unknown
Reserved
malicious
23.145.40.162
calvinandhalls.com
Reserved
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
There are 210 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F61000
system
page execute and read and write
malicious
2091000
unclassified section
page read and write
malicious
2070000
direct allocation
page read and write
malicious
6C0000
direct allocation
page read and write
malicious
6E1000
unclassified section
page read and write
malicious
6C0000
direct allocation
page read and write
malicious
801000
unclassified section
page read and write
malicious
6D0000
direct allocation
page read and write
malicious
6F1000
unclassified section
page read and write
malicious
6D0000
direct allocation
page read and write
malicious
34A1000
system
page execute and read and write
malicious
6C0000
direct allocation
page read and write
malicious
1C161604000
heap
page read and write
33C0000
unkown
page read and write
15E3D301000
heap
page read and write
A391000
unkown
page read and write
19527CB0000
heap
page read and write
33C0000
unkown
page read and write
5ACC000
heap
page read and write
5AE0000
heap
page read and write
1C1615A1000
heap
page read and write
3700000
unkown
page read and write
4BA6000
unkown
page read and write
610000
heap
page read and write
193F66F1000
heap
page read and write
3050000
unkown
page read and write
E988CBD000
stack
page read and write
2BA2919D000
heap
page read and write
3110000
unkown
page read and write
200C3C46000
heap
page read and write
401000
unkown
page execute read
9560000
unkown
page read and write
22BAE7B3000
heap
page read and write
FF0000
heap
page read and write
2E002DC9000
heap
page read and write
11A6E7D000
stack
page read and write
21188BF2000
heap
page read and write
3040000
unkown
page read and write
200C3E4A000
heap
page read and write
7FF5EDA08000
unkown
page readonly
282B162A000
heap
page read and write
91C0000
unkown
page read and write
19D000
stack
page read and write
D40000
remote allocation
page read and write
2BA2919A000
heap
page read and write
C10A000
stack
page read and write
C0F000
stack
page read and write
9893000
unkown
page read and write
12E0000
trusted library allocation
page read and write
7C80000
unkown
page read and write
940000
heap
page read and write
4C18000
unkown
page read and write
1EA412B7000
heap
page read and write
3610000
trusted library allocation
page read and write
22BAE73A000
heap
page read and write
7FF5ED4B4000
unkown
page readonly
9560000
unkown
page read and write
193F635A000
heap
page read and write
2BA2919A000
heap
page read and write
2508C4A5000
heap
page read and write
211886EB000
heap
page read and write
2A1533F0000
heap
page read and write
22BAE730000
heap
page read and write
189D5F4C000
heap
page read and write
189D5F5A000
heap
page read and write
7FF5ED9C6000
unkown
page readonly
BDC0000
unkown
page readonly
22BB0781000
heap
page read and write
7FF5ED62F000
unkown
page readonly
193F6360000
heap
page read and write
15E3CB30000
heap
page read and write
2BA29148000
heap
page read and write
189D5F75000
heap
page read and write
33C0000
unkown
page read and write
282B160E000
heap
page read and write
3610000
trusted library allocation
page read and write
282B10F0000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
5557000
stack
page read and write
1EF224B3000
heap
page read and write
1A608530000
heap
page read and write
211886E7000
heap
page read and write
1A6086BE000
heap
page read and write
2E002E34000
heap
page read and write
15E3CB89000
heap
page read and write
282B0F35000
heap
page read and write
5A0000
heap
page read and write
AB5E000
unkown
page read and write
189D5DC9000
heap
page read and write
282B0F32000
heap
page read and write
6DA000
heap
page read and write
91C0000
unkown
page read and write
860000
heap
page read and write
222F561F000
heap
page read and write
21188BEC000
heap
page read and write
37F6000
unkown
page read and write
7DB0000
unkown
page read and write
2508BE5F000
heap
page read and write
22CF000
stack
page read and write
CAB0000
unkown
page read and write
22BAE76C000
heap
page read and write
193F5FDF000
heap
page read and write
331E000
stack
page read and write
1C161604000
heap
page read and write
12E0000
trusted library allocation
page read and write
1A60851F000
heap
page read and write
282EAC2C000
heap
page read and write
2E004FE9000
heap
page read and write
12E0000
trusted library allocation
page read and write
22D0000
heap
page read and write
282EAC17000
heap
page read and write
12E0000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
200C41B0000
heap
page read and write
3020000
unkown
page read and write
7FF5D1CCD000
unkown
page readonly
1EA40D62000
heap
page read and write
A11F000
stack
page read and write
200C3AF0000
heap
page read and write
3050000
unkown
page read and write
193F5F20000
trusted library allocation
page read and write
9560000
unkown
page read and write
9C80000
unkown
page read and write
1EF21FF8000
heap
page read and write
1C1615E9000
heap
page read and write
20D0000
heap
page read and write
189D5F5A000
heap
page read and write
21188BFC000
heap
page read and write
1A607F92000
heap
page read and write
15E3CB85000
heap
page read and write
2BA2917A000
heap
page read and write
91C0000
unkown
page read and write
22BB0991000
heap
page read and write
2E002E66000
heap
page read and write
23F0000
heap
page read and write
7FF5ED3DA000
unkown
page readonly
22BAE713000
heap
page read and write
2E002E2B000
heap
page read and write
1C161CFF000
heap
page read and write
1EF21FA0000
heap
page read and write
9560000
unkown
page read and write
21188BF8000
heap
page read and write
2CB0000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
BE85A7F000
stack
page read and write
1A608532000
heap
page read and write
1EA40D47000
heap
page read and write
2CB0000
trusted library allocation
page read and write
2508BD80000
trusted library allocation
page read and write
3040000
unkown
page read and write
7FF5ED295000
unkown
page readonly
1A607F72000
heap
page read and write
3610000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
9CB000
heap
page read and write
2508BE96000
heap
page read and write
7FF5ED9D6000
unkown
page readonly
1A607F54000
heap
page read and write
7FF763AF0000
unkown
page readonly
2E002EB6000
heap
page read and write
3830000
trusted library allocation
page read and write
7FF5ED669000
unkown
page readonly
282B0F32000
heap
page read and write
7FF5ED781000
unkown
page readonly
2E002E44000
heap
page read and write
22BAE91A000
heap
page read and write
33B9000
stack
page read and write
3610000
trusted library allocation
page read and write
15E3D2C3000
heap
page read and write
7FF5ED85F000
unkown
page readonly
3040000
unkown
page read and write
1410000
trusted library allocation
page read and write
6DE000
heap
page read and write
22BAE796000
heap
page read and write
1C161CE3000
heap
page read and write
22BAE713000
heap
page read and write
33C0000
unkown
page read and write
200C419F000
heap
page read and write
33C0000
unkown
page read and write
C57F000
unkown
page read and write
9560000
unkown
page read and write
7DB0000
unkown
page read and write
7F30000
unkown
page read and write
12E0000
trusted library allocation
page read and write
189D5D40000
heap
page read and write
3040000
unkown
page read and write
222F55D2000
heap
page read and write
2508BD80000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
211967D000
stack
page read and write
282EA6B3000
heap
page read and write
1C1615AC000
heap
page read and write
22BAEE97000
heap
page read and write
14AD6BD0000
heap
page read and write
189D5EE0000
heap
page read and write
2BA29269000
heap
page read and write
1A60852F000
heap
page read and write
1EF21FD9000
heap
page read and write
3040000
unkown
page read and write
2CB0000
trusted library allocation
page read and write
3610000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
222F54C0000
heap
page read and write
15E3CB66000
heap
page read and write
35D0000
unkown
page read and write
200C41C0000
heap
page read and write
A9E167F000
stack
page read and write
3830000
trusted library allocation
page read and write
9869000
unkown
page read and write
F70000
trusted library allocation
page read and write
2391000
heap
page read and write
1C161CE2000
heap
page read and write
C5A3000
unkown
page read and write
9C80000
unkown
page read and write
2BA29196000
heap
page read and write
7FF5ED9CA000
unkown
page readonly
9F9E000
stack
page read and write
15E3CB82000
heap
page read and write
1E3FEA57000
heap
page read and write
1A60850C000
heap
page read and write
282B1641000
heap
page read and write
2CB0000
trusted library allocation
page read and write
5AD3000
heap
page read and write
22BB07D7000
heap
page read and write
7FF5ED87D000
unkown
page readonly
8DA0000
unkown
page read and write
22BAE8D0000
heap
page read and write
3050000
unkown
page read and write
193F66F0000
heap
page read and write
9550000
unkown
page readonly
3050000
unkown
page read and write
22BB07D7000
heap
page read and write
CAAC000
unkown
page read and write
7DF4F3030000
unkown
page readonly
189D5F70000
heap
page read and write
2508BE98000
heap
page read and write
9BA000
heap
page read and write
755E507000
stack
page read and write
9C80000
unkown
page read and write
1EA42DB0000
heap
page read and write
2BA2935A000
heap
page read and write
3610000
trusted library allocation
page read and write
193F6007000
heap
page read and write
2508C325000
heap
page read and write
189D5DE9000
heap
page read and write
22BAE78C000
heap
page read and write
9B1000
heap
page read and write
7DD0000
unkown
page read and write
33C0000
unkown
page read and write
3050000
unkown
page read and write
9560000
unkown
page read and write
1C161510000
trusted library allocation
page read and write
2508BE94000
heap
page read and write
7FF5ED743000
unkown
page readonly
3050000
unkown
page read and write
7FF5ED3D0000
unkown
page readonly
7FF5ED46A000
unkown
page readonly
282B10B0000
trusted library allocation
page read and write
22BAEEDD000
heap
page read and write
21BE5130000
heap
page read and write
1EF225B7000
heap
page read and write
2508C4AA000
heap
page read and write
A4AE000
unkown
page read and write
22BB07B4000
heap
page read and write
41E000
unkown
page read and write
222F54D0000
heap
page read and write
12E0000
trusted library allocation
page read and write
EF1C4FF000
stack
page read and write
7DB0000
unkown
page read and write
9C80000
unkown
page read and write
3050000
unkown
page read and write
22BAEE58000
heap
page read and write
15E3EC30000
heap
page read and write
12E0000
trusted library allocation
page read and write
2BA29196000
heap
page read and write
2CB0000
trusted library allocation
page read and write
9C000
stack
page read and write
3020000
unkown
page read and write
91C0000
unkown
page read and write
33C0000
unkown
page read and write
2E002E41000
heap
page read and write
3830000
trusted library allocation
page read and write
1390000
unkown
page read and write
1210000
unkown
page readonly
22BAE76C000
heap
page read and write
33C0000
unkown
page read and write
2BA2B100000
heap
page read and write
193F5F00000
heap
page read and write
7FF5ED956000
unkown
page readonly
C81000
system
page execute and read and write
3050000
unkown
page read and write
22BAE755000
heap
page read and write
1EF2248E000
heap
page read and write
2E002E85000
heap
page read and write
14559CF000
stack
page read and write
1390000
unkown
page read and write
9C80000
unkown
page read and write
200C41B9000
heap
page read and write
1EA41429000
heap
page read and write
9C9000
heap
page read and write
33C0000
unkown
page read and write
5ACF000
heap
page read and write
3020000
unkown
page read and write
34F0000
heap
page read and write
3030000
unkown
page read and write
1EF224B6000
heap
page read and write
1EA41407000
heap
page read and write
3610000
trusted library allocation
page read and write
1C1615DD000
heap
page read and write
9560000
unkown
page read and write
9815000
unkown
page read and write
22BAEEC7000
heap
page read and write
12E0000
trusted library allocation
page read and write
189D5E00000
heap
page read and write
F7C1CFF000
stack
page read and write
7DB0000
unkown
page read and write
1C161D26000
heap
page read and write
1455D7F000
stack
page read and write
3050000
unkown
page read and write
5AB9000
heap
page read and write
7FF5ED1B6000
unkown
page readonly
2E004FD9000
heap
page read and write
7DB0000
unkown
page read and write
F70000
trusted library allocation
page read and write
22BAE6F5000
heap
page read and write
2E004DAD000
heap
page read and write
7FF5ED9D9000
unkown
page readonly
189D5F6D000
heap
page read and write
31DD000
stack
page read and write
22BAE77A000
heap
page read and write
282B162E000
heap
page read and write
DF92BF7000
stack
page read and write
6AE000
stack
page read and write
7FF5ED697000
unkown
page readonly
189D5F32000
heap
page read and write
1EA40D53000
heap
page read and write
14AD6BF0000
heap
page read and write
7FF000
stack
page read and write
2508C324000
heap
page read and write
1EA40D53000
heap
page read and write
100A0000
heap
page read and write
22BAEE7F000
heap
page read and write
69E000
stack
page read and write
200C4190000
heap
page read and write
282B0F35000
heap
page read and write
41B000
unkown
page readonly
1EF21FF5000
heap
page read and write
15E3D2F9000
heap
page read and write
C6C1000
unkown
page read and write
9B7000
heap
page read and write
1EF21F50000
trusted library allocation
page read and write
2508BD80000
trusted library allocation
page read and write
22BAEF28000
heap
page read and write
51B000
unkown
page readonly
7FF5ED48A000
unkown
page readonly
189D5F6A000
heap
page read and write
3060000
unkown
page read and write
1410000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
33C0000
unkown
page read and write
22BAECFE000
heap
page read and write
9C80000
unkown
page read and write
211885D5000
heap
page read and write
D596D7E000
stack
page read and write
9C80000
unkown
page read and write
22BAEE7E000
heap
page read and write
1EF225BE000
heap
page read and write
12E0000
trusted library allocation
page read and write
1A608518000
heap
page read and write
2BA291A7000
heap
page read and write
4BE1000
unkown
page read and write
193F6357000
heap
page read and write
222F55E9000
heap
page read and write
21188C0C000
heap
page read and write
610000
heap
page read and write
1EA41432000
heap
page read and write
3040000
unkown
page read and write
9C80000
unkown
page read and write
3050000
unkown
page read and write
1095000
stack
page read and write
E30000
heap
page read and write
22BAE915000
heap
page read and write
222F55E1000
heap
page read and write
7DD0000
unkown
page read and write
22BB09A0000
heap
page read and write
5AD6000
heap
page read and write
1EF21FB7000
heap
page read and write
ED1000
heap
page read and write
282B162E000
heap
page read and write
9560000
unkown
page read and write
FA44000
unkown
page read and write
FA0000
heap
page read and write
1C161CE0000
heap
page read and write
1C161D0E000
heap
page read and write
7FF5ED65C000
unkown
page readonly
58BD000
heap
page read and write
282B0EE8000
heap
page read and write
7DB0000
unkown
page read and write
33C0000
unkown
page read and write
710000
heap
page read and write
9C80000
unkown
page read and write
9C80000
unkown
page read and write
7FF5ED882000
unkown
page readonly
1A60A010000
heap
page read and write
3610000
trusted library allocation
page read and write
2508C488000
heap
page read and write
21188BE8000
heap
page read and write
200C3BCE000
heap
page read and write
960000
heap
page read and write
9F7000
heap
page read and write
9881000
unkown
page read and write
7FF5ED46E000
unkown
page readonly
41E000
unkown
page write copy
B4D0000
unkown
page read and write
15E3D2E8000
heap
page read and write
21193DF000
stack
page read and write
3610000
trusted library allocation
page read and write
7DF4F3041000
unkown
page execute read
282EA5D0000
trusted library allocation
page read and write
1EF22487000
heap
page read and write
12E0000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
7E70000
unkown
page read and write
282EAC20000
heap
page read and write
22BAE779000
heap
page read and write
3050000
unkown
page read and write
282B163A000
heap
page read and write
2CB0000
trusted library allocation
page read and write
558000
system
page execute and read and write
BD1D000
stack
page read and write
7DB0000
unkown
page read and write
F7C1AF8000
stack
page read and write
33C0000
unkown
page read and write
9C80000
unkown
page read and write
200C3BF8000
heap
page read and write
22BAE76C000
heap
page read and write
F67000
system
page execute and read and write
FBC4000
unkown
page read and write
282EA490000
heap
page read and write
222F55D4000
heap
page read and write
189D5F4E000
heap
page read and write
7DF4F3051000
unkown
page execute read
5AB9000
heap
page read and write
1EF22008000
heap
page read and write
1A608518000
heap
page read and write
2BA29249000
heap
page read and write
1EA40D00000
heap
page read and write
8F0000
heap
page read and write
200C3BCA000
heap
page read and write
1C161D0B000
heap
page read and write
4B56000
unkown
page read and write
AB08000
unkown
page read and write
F70000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
3060000
unkown
page read and write
33C0000
unkown
page read and write
9C80000
unkown
page read and write
22BAEE41000
heap
page read and write
22BAE730000
heap
page read and write
9B60000
unkown
page readonly
3050000
unkown
page read and write
7DB0000
unkown
page read and write
7FF5ED864000
unkown
page readonly
33C0000
unkown
page read and write
943D000
stack
page read and write
2BA29350000
heap
page read and write
1C2CDED0000
heap
page read and write
37D2000
unkown
page read and write
22BB0802000
heap
page read and write
2CB0000
trusted library allocation
page read and write
1C161CE7000
heap
page read and write
9CD0000
heap
page read and write
22BAE730000
heap
page read and write
3534000
heap
page read and write
21188BEF000
heap
page read and write
950000
heap
page read and write
DF92EFF000
stack
page read and write
15E3D2F8000
heap
page read and write
3020000
unkown
page read and write
22BAE730000
heap
page read and write
282B162E000
heap
page read and write
7FF5ED68C000
unkown
page readonly
3534000
heap
page read and write
1A607F54000
heap
page read and write
22BB0780000
heap
page read and write
9C80000
unkown
page read and write
11A6EFF000
stack
page read and write
33C0000
unkown
page read and write
3610000
trusted library allocation
page read and write
9C80000
unkown
page read and write
1C1615C4000
heap
page read and write
282B1605000
heap
page read and write
12E0000
trusted library allocation
page read and write
7FF5ED4BB000
unkown
page readonly
7FF5ED9CC000
unkown
page readonly
3610000
trusted library allocation
page read and write
22BAECF3000
heap
page read and write
9560000
unkown
page read and write
189D5DF7000
heap
page read and write
15F0000
heap
page read and write
33C0000
unkown
page read and write
3050000
unkown
page read and write
22BAE730000
heap
page read and write
282EA5B0000
trusted library allocation
page read and write
22BAE76C000
heap
page read and write
1C161D1C000
heap
page read and write
3030000
unkown
page read and write
222F55D1000
heap
page read and write
7FF5ED26E000
unkown
page readonly
2BA29250000
heap
page read and write
3070000
unkown
page read and write
282B163A000
heap
page read and write
1EF224C0000
heap
page read and write
3040000
unkown
page read and write
22BAE730000
heap
page read and write
2508BE98000
heap
page read and write
31A0000
trusted library allocation
page read and write
2508C327000
heap
page read and write
21188BFC000
heap
page read and write
91C0000
unkown
page read and write
1E3FEA39000
heap
page read and write
7695000
stack
page read and write
7DD0000
unkown
page read and write
22BAE77B000
heap
page read and write
282B1570000
heap
page read and write
22BAE7B3000
heap
page read and write
200C3E45000
heap
page read and write
2E005079000
heap
page read and write
189D5F30000
heap
page read and write
1E3FEA57000
heap
page read and write
22BAE730000
heap
page read and write
282EAC24000
heap
page read and write
2508BE98000
heap
page read and write
21188BF4000
heap
page read and write
189D5DE3000
heap
page read and write
22BAE7B3000
heap
page read and write
189D5DE9000
heap
page read and write
200C3C2A000
heap
page read and write
1EA412BE000
heap
page read and write
9560000
unkown
page read and write
4C4B000
unkown
page read and write
1C161D1C000
heap
page read and write
282B163F000
heap
page read and write
13A0000
unkown
page read and write
1A607EF0000
heap
page read and write
2CB0000
trusted library allocation
page read and write
7FF5ED8E7000
unkown
page readonly
282EAC29000
heap
page read and write
7FF5ED412000
unkown
page readonly
1EA40D3D000
heap
page read and write
282EAC1F000
heap
page read and write
282EAC0E000
heap
page read and write
6F4000
heap
page read and write
193F5FA0000
heap
page read and write
282EA5C5000
heap
page read and write
3610000
trusted library allocation
page read and write
282B0F14000
heap
page read and write
3070000
unkown
page read and write
C3C8ED8000
stack
page read and write
755E9FE000
stack
page read and write
189D5D90000
heap
page read and write
DF9307E000
stack
page read and write
1EF22495000
heap
page read and write
4CE0000
unkown
page read and write
1EF21FD2000
heap
page read and write
33C0000
unkown
page read and write
40B000
unkown
page execute read
401000
unkown
page execute read
97AD000
unkown
page read and write
81F000
stack
page read and write
200C3C07000
heap
page read and write
7FF5ED1CB000
unkown
page readonly
282EA677000
heap
page read and write
1EF224B1000
heap
page read and write
980000
heap
page read and write
1C161D16000
heap
page read and write
51A0000
heap
page read and write
2BA2917C000
heap
page read and write
7FF5ED3A7000
unkown
page readonly
2E004C76000
heap
page read and write
2508BE9B000
heap
page read and write
1A607F28000
heap
page read and write
22BAE76C000
heap
page read and write
1410000
trusted library allocation
page read and write
4E1F000
stack
page read and write
EAA000
heap
page read and write
1310000
heap
page read and write
12E0000
trusted library allocation
page read and write
22BAE764000
heap
page read and write
2E002DF2000
heap
page read and write
5ACD000
heap
page read and write
22BAE7B3000
heap
page read and write
3020000
unkown
page read and write
2070000
direct allocation
page read and write
1EF2249F000
heap
page read and write
9C4000
heap
page read and write
F70000
trusted library allocation
page read and write
29D3EFF000
stack
page read and write
FF0000
heap
page read and write
22BB07B4000
heap
page read and write
7FF5ED445000
unkown
page readonly
2BA29158000
heap
page read and write
91C0000
unkown
page read and write
2508BE96000
heap
page read and write
7CE0000
unkown
page read and write
5AB9000
heap
page read and write
91C0000
unkown
page read and write
9560000
stack
page read and write
193F5ED0000
heap
page read and write
282EAC39000
heap
page read and write
8720000
unkown
page readonly
3110000
unkown
page read and write
1EA412B0000
heap
page read and write
3830000
trusted library allocation
page read and write
4CD0000
unkown
page read and write
7FF5ED818000
unkown
page readonly
1A607F7B000
heap
page read and write
22BAEE4F000
heap
page read and write
A327000
unkown
page read and write
12E0000
trusted library allocation
page read and write
3F0D8FF000
stack
page read and write
22BAE731000
heap
page read and write
56C1000
heap
page read and write
1C1615C1000
heap
page read and write
3610000
trusted library allocation
page read and write
9B4000
heap
page read and write
1A60852F000
heap
page read and write
189D5DFC000
heap
page read and write
193F66E0000
heap
page read and write
FFD1000
unkown
page read and write
1C161510000
trusted library allocation
page read and write
1C1614F0000
heap
page read and write
211885D3000
heap
page read and write
3030000
unkown
page read and write
520EFF000
stack
page read and write
7DF4F3071000
unkown
page execute read
1410000
trusted library allocation
page read and write
33C0000
unkown
page read and write
31A0000
trusted library allocation
page read and write
1C161825000
heap
page read and write
2CB0000
trusted library allocation
page read and write
2508C48A000
heap
page read and write
15E3CB65000
heap
page read and write
7FF5ED50A000
unkown
page readonly
222F55A4000
heap
page read and write
282EA696000
heap
page read and write
22BAE743000
heap
page read and write
15E3CB10000
heap
page read and write
3610000
trusted library allocation
page read and write
C962000
unkown
page read and write
189D5F49000
heap
page read and write
520F7F000
stack
page read and write
282B1621000
heap
page read and write
189D5F3A000
heap
page read and write
2E003025000
heap
page read and write
33C0000
unkown
page read and write
41E000
unkown
page write copy
1EF21F50000
trusted library allocation
page read and write
193F66C3000
heap
page read and write
9CC000
heap
page read and write
1410000
trusted library allocation
page read and write
22BAEE51000
heap
page read and write
282EA5B0000
trusted library allocation
page read and write
5AD4000
heap
page read and write
785F000
unkown
page read and write
5ACF000
heap
page read and write
8208000
stack
page read and write
7857000
unkown
page read and write
22BB09B7000
heap
page read and write
15E3D2CA000
heap
page read and write
3610000
trusted library allocation
page read and write
15E3D2E8000
heap
page read and write
3020000
unkown
page read and write
193F66BF000
heap
page read and write
91C0000
unkown
page read and write
9560000
unkown
page read and write
3060000
unkown
page read and write
2461000
heap
page read and write
1A6086B3000
heap
page read and write
1390000
unkown
page read and write
200C41B0000
heap
page read and write
1EA40E00000
heap
page read and write
3050000
unkown
page read and write
9C80000
unkown
page read and write
9792000
unkown
page read and write
200C3BCE000
heap
page read and write
2508BDF0000
heap
page read and write
193F66E0000
heap
page read and write
3610000
trusted library allocation
page read and write
7FF5ED986000
unkown
page readonly
987F000
unkown
page read and write
9C80000
unkown
page read and write
22BAE920000
trusted library allocation
page read and write
4C1E000
unkown
page read and write
33C0000
unkown
page read and write
3050000
unkown
page read and write
40B000
unkown
page execute read
4BDC000
unkown
page read and write
1A607F57000
heap
page read and write
15E3CB89000
heap
page read and write
59C000
stack
page read and write
211885D6000
heap
page read and write
9C80000
unkown
page read and write
3020000
unkown
page read and write
89B000
heap
page read and write
7FF5ED670000
unkown
page readonly
193F66E2000
heap
page read and write
1EF21E30000
heap
page read and write
3040000
unkown
page read and write
200C3C49000
heap
page read and write
193F600B000
heap
page read and write
7FF5ED5A8000
unkown
page readonly
22BAECF5000
heap
page read and write
2BA29198000
heap
page read and write
F041F7F000
stack
page read and write
1A6086B2000
heap
page read and write
B86427E000
stack
page read and write
33C0000
unkown
page read and write
282B0F35000
heap
page read and write
2508BE96000
heap
page read and write
9560000
unkown
page read and write
B190000
unkown
page read and write
7FF5ED80C000
unkown
page readonly
7FF5ED77E000
unkown
page readonly
222F5545000
heap
page read and write
3050000
unkown
page read and write
2BA29269000
heap
page read and write
3580000
unkown
page readonly
189D5F3A000
heap
page read and write
33C0000
unkown
page read and write
7DB0000
unkown
page read and write
1C161D2E000
heap
page read and write
7FF763B04000
unkown
page read and write
890000
heap
page read and write
34A6000
system
page execute and read and write
2BA2917A000
heap
page read and write
3070000
unkown
page read and write
211885B7000
heap
page read and write
22BAEE82000
heap
page read and write
5ADC000
heap
page read and write
7FF5ED505000
unkown
page readonly
2C40000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
22BAEE64000
heap
page read and write
5AB9000
heap
page read and write
1EA4140E000
heap
page read and write
200C41BA000
heap
page read and write
2E004F29000
heap
page read and write
282B0F32000
heap
page read and write
19527C90000
heap
page read and write
B5AE000
stack
page read and write
9C4000
heap
page read and write
200C3C53000
heap
page read and write
33C0000
unkown
page read and write
E93000
heap
page read and write
51D000
stack
page read and write
1E3FEA32000
heap
page read and write
10D0000
heap
page read and write
2508C48F000
heap
page read and write
22BAE920000
trusted library allocation
page read and write
7FF5ED9FF000
unkown
page readonly
3110000
unkown
page read and write
2E002EB6000
heap
page read and write
7DB0000
unkown
page read and write
12E0000
trusted library allocation
page read and write
282B163A000
heap
page read and write
7FF5ED68F000
unkown
page readonly
193F6350000
heap
page read and write
2E002EB6000
heap
page read and write
1333000
heap
page read and write
2BA29177000
heap
page read and write
282B0E90000
heap
page read and write
3110000
unkown
page read and write
9138000
stack
page read and write
978E000
unkown
page read and write
87F0000
unkown
page read and write
1C161820000
heap
page read and write
2E004C00000
heap
page read and write
1EA412B7000
heap
page read and write
C89000
system
page execute and read and write
7FF5ED7D6000
unkown
page readonly
211885B4000
heap
page read and write
22BAE6F6000
heap
page read and write
9C80000
unkown
page read and write
3830000
trusted library allocation
page read and write
3020000
unkown
page read and write
33C0000
unkown
page read and write
853000
heap
page read and write
9C80000
unkown
page read and write
2508BE7F000
heap
page read and write
7B80000
unkown
page read and write
9200000
unkown
page read and write
282B163B000
heap
page read and write
193F66B7000
heap
page read and write
E99CEFF000
stack
page read and write
2E004C0B000
heap
page read and write
1190000
heap
page read and write
1390000
unkown
page read and write
200C3C26000
heap
page read and write
3610000
trusted library allocation
page read and write
2599BFD000
stack
page read and write
2CB0000
trusted library allocation
page read and write
3070000
unkown
page read and write
FFD5000
unkown
page read and write
3830000
trusted library allocation
page read and write
9C80000
unkown
page read and write
3060000
unkown
page read and write
1410000
trusted library allocation
page read and write
E4A0000
unkown
page read and write
7FF5ED1CF000
unkown
page readonly
9C80000
unkown
page read and write
1EA40D37000
heap
page read and write
1410000
trusted library allocation
page read and write
C561000
unkown
page read and write
189D5F76000
heap
page read and write
2508C481000
heap
page read and write
3610000
trusted library allocation
page read and write
1A60852F000
heap
page read and write
282EAC39000
heap
page read and write
21188560000
heap
page read and write
91C0000
unkown
page read and write
8D6B000
stack
page read and write
22BAEE67000
heap
page read and write
12E0000
trusted library allocation
page read and write
9E6000
heap
page read and write
9C4000
heap
page read and write
9B2000
heap
page read and write
3610000
trusted library allocation
page read and write
5ACC000
heap
page read and write
282B1624000
heap
page read and write
3050000
unkown
page read and write
15E3D2C7000
heap
page read and write
9560000
unkown
page read and write
22BAE7B3000
heap
page read and write
1A608511000
heap
page read and write
6FB000
heap
page read and write
93BE000
stack
page read and write
7FF5EDA2A000
unkown
page readonly
1A608509000
heap
page read and write
1EF21FB7000
heap
page read and write
5E0000
heap
page read and write
91C0000
unkown
page read and write
7FF5ED2A9000
unkown
page readonly
12E0000
trusted library allocation
page read and write
282B162E000
heap
page read and write
5AFA000
heap
page read and write
7FF763B01000
unkown
page readonly
222F54F0000
heap
page read and write
2CB0000
trusted library allocation
page read and write
36D3000
stack
page read and write
97C3000
unkown
page read and write
41B000
unkown
page readonly
C9D000
stack
page read and write
2E003020000
heap
page read and write
2508BE59000
heap
page read and write
CB4D000
unkown
page read and write
F70000
trusted library allocation
page read and write
21197FE000
stack
page read and write
1EF22135000
heap
page read and write
3110000
unkown
page read and write
21188BF1000
heap
page read and write
282EA660000
heap
page read and write
520FFE000
stack
page read and write
22BB0781000
heap
page read and write
1230000
unkown
page read and write
1EF21F10000
heap
page read and write
1EA41408000
heap
page read and write
12E0000
trusted library allocation
page read and write
200C41A4000
heap
page read and write
9560000
unkown
page read and write
33C0000
unkown
page read and write
7FF5ED933000
unkown
page readonly
12E0000
trusted library allocation
page read and write
91C0000
unkown
page read and write
AFB567F000
stack
page read and write
B8C0000
unkown
page readonly
41B000
unkown
page readonly
1EF225BE000
heap
page read and write
2E002DCC000
heap
page read and write
7E70000
unkown
page read and write
7884000
unkown
page read and write
3610000
trusted library allocation
page read and write
222F55D3000
heap
page read and write
2CB0000
trusted library allocation
page read and write
3110000
unkown
page read and write
7FF5ED714000
unkown
page readonly
7DB0000
unkown
page read and write
7FF5ED806000
unkown
page readonly
AAD1000
unkown
page read and write
12E0000
trusted library allocation
page read and write
7FF5ED8B4000
unkown
page readonly
7FF5ED5F7000
unkown
page readonly
22BAEE7E000
heap
page read and write
9CC000
heap
page read and write
1A6086B7000
heap
page read and write
C4A0000
unkown
page read and write
5AE0000
heap
page read and write
189D5DF3000
heap
page read and write
7FF5ED810000
unkown
page readonly
7FF5ED975000
unkown
page readonly
211977F000
stack
page read and write
2BA29415000
heap
page read and write
3070000
unkown
page read and write
9560000
unkown
page read and write
22BAE743000
heap
page read and write
189D5F35000
heap
page read and write
14B0000
unkown
page readonly
3060000
unkown
page read and write
2BA29080000
trusted library allocation
page read and write
282EAC02000
heap
page read and write
3110000
unkown
page read and write
222F55B9000
heap
page read and write
7C90000
unkown
page read and write
7DB0000
unkown
page read and write
193F6355000
heap
page read and write
1410000
trusted library allocation
page read and write
2508BE7A000
heap
page read and write
7DD0000
unkown
page read and write
BDD0000
unkown
page readonly
3610000
trusted library allocation
page read and write
2BA29274000
heap
page read and write
3110000
unkown
page read and write
5ADC000
heap
page read and write
7A34000
unkown
page read and write
3830000
trusted library allocation
page read and write
91C0000
unkown
page read and write
1A607F64000
heap
page read and write
193F5FDF000
heap
page read and write
2BA290B0000
heap
page read and write
1EA40D59000
heap
page read and write
1EA40E40000
trusted library allocation
page read and write
200C3C49000
heap
page read and write
9DED000
stack
page read and write
65E000
stack
page read and write
3110000
unkown
page read and write
2E002E84000
heap
page read and write
91C000
heap
page read and write
1EA412B2000
heap
page read and write
200C3BC3000
heap
page read and write
282B163C000
heap
page read and write
7DD0000
unkown
page read and write
3040000
unkown
page read and write
12E0000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
22BAE725000
heap
page read and write
282EA6C3000
heap
page read and write
2CB0000
trusted library allocation
page read and write
3050000
unkown
page read and write
3050000
unkown
page read and write
3010000
unkown
page read and write
7FF5ED9F2000
unkown
page readonly
2BA29080000
trusted library allocation
page read and write
3421000
unkown
page read and write
22AF000
stack
page read and write
7FF5ED449000
unkown
page readonly
1410000
trusted library allocation
page read and write
2508C49C000
heap
page read and write
EBC000
heap
page read and write
1410000
trusted library allocation
page read and write
421C57E000
stack
page read and write
1C161790000
heap
page read and write
610000
heap
page read and write
3110000
unkown
page read and write
F041BAE000
stack
page read and write
7DD0000
unkown
page read and write
3610000
trusted library allocation
page read and write
189D5F6A000
heap
page read and write
2BA29198000
heap
page read and write
21188C09000
heap
page read and write
1C161D0C000
heap
page read and write
1EF2248C000
heap
page read and write
33C0000
unkown
page read and write
22BAEE84000
heap
page read and write
2508C327000
heap
page read and write
33C0000
unkown
page read and write
1C161CE4000
heap
page read and write
1EA42CA0000
heap
page read and write
3030000
unkown
page read and write
A9E16FF000
stack
page read and write
2508C322000
heap
page read and write
200C41B9000
heap
page read and write
79FB000
unkown
page read and write
2CB0000
trusted library allocation
page read and write
2E002EB6000
heap
page read and write
21188BEC000
heap
page read and write
9B3000
heap
page read and write
7869000
unkown
page read and write
9F4000
heap
page read and write
3830000
trusted library allocation
page read and write
7852000
unkown
page read and write
5AB9000
heap
page read and write
A9E17FE000
stack
page read and write
193F5FFE000
heap
page read and write
56C3000
unkown
page read and write
3610000
trusted library allocation
page read and write
2BA2926D000
heap
page read and write
3040000
unkown
page read and write
1C161D36000
heap
page read and write
22BAE6D3000
heap
page read and write
2BA29060000
heap
page read and write
282B1602000
heap
page read and write
4B8B000
unkown
page read and write
818E000
stack
page read and write
200C41C2000
heap
page read and write
3610000
trusted library allocation
page read and write
1EA4140C000
heap
page read and write
9CC000
heap
page read and write
1C1615D4000
heap
page read and write
3150000
unkown
page read and write
282B0F45000
heap
page read and write
4CB0000
unkown
page read and write
F90000
heap
page read and write
22BAE753000
heap
page read and write
1C1614C0000
heap
page read and write
CA42000
unkown
page read and write
A32A000
unkown
page read and write
1C161D1C000
heap
page read and write
2E002E50000
heap
page read and write
1EA41429000
heap
page read and write
15E3CD80000
heap
page read and write
15E3D2CE000
heap
page read and write
1A607F7C000
heap
page read and write
12E0000
trusted library allocation
page read and write
3610000
trusted library allocation
page read and write
A479000
unkown
page read and write
22BAEE5E000
heap
page read and write
189D5F72000
heap
page read and write
58E000
stack
page read and write
2508C32A000
heap
page read and write
2508BE9B000
heap
page read and write
189D5DF2000
heap
page read and write
7900000
unkown
page read and write
9C80000
unkown
page read and write
200C3C42000
heap
page read and write
3534000
heap
page read and write
9DA000
heap
page read and write
7DB0000
unkown
page read and write
3050000
unkown
page read and write
4F50000
heap
page read and write
14AD6C60000
heap
page read and write
5E4000
heap
page read and write
189D5DD5000
heap
page read and write
3060000
unkown
page read and write
7FF5ED52F000
unkown
page readonly
189D5F75000
heap
page read and write
210BAC10000
heap
page read and write
9C80000
unkown
page read and write
22BAE76C000
heap
page read and write
FFBA000
unkown
page read and write
1C161D34000
heap
page read and write
41B000
unkown
page readonly
1C161CE7000
heap
page read and write
670000
direct allocation
page execute and read and write
200C41C3000
heap
page read and write
F70000
trusted library allocation
page read and write
1A608536000
heap
page read and write
2E004FD2000
heap
page read and write
3030000
unkown
page read and write
7FF5ED942000
unkown
page readonly
5190000
heap
page read and write
1EF22493000
heap
page read and write
7DF4F3061000
unkown
page execute read
2BA291A4000
heap
page read and write
2E002E7E000
heap
page read and write
193F6354000
heap
page read and write
222F562C000
heap
page read and write
2E002E34000
heap
page read and write
282EA6B6000
heap
page read and write
22BAE727000
heap
page read and write
2508C47F000
heap
page read and write
3030000
unkown
page read and write
7E70000
unkown
page read and write
1A607F53000
heap
page read and write
22BB07AB000
heap
page read and write
2CB0000
trusted library allocation
page read and write
1EA41400000
heap
page read and write
22BAE71E000
heap
page read and write
C3C8FDF000
stack
page read and write
211886EA000
heap
page read and write
33C0000
unkown
page read and write
F70000
trusted library allocation
page read and write
1A607F10000
trusted library allocation
page read and write
982D000
unkown
page read and write
21BE4E80000
heap
page read and write
4B50000
unkown
page read and write
9C80000
unkown
page read and write
22D0000
heap
page read and write
3610000
trusted library allocation
page read and write
520E77000
stack
page read and write
1410000
trusted library allocation
page read and write
2508C4A0000
heap
page read and write
7FF5ED93B000
unkown
page readonly
282B0F32000
heap
page read and write
1A60852F000
heap
page read and write
2E002DC0000
heap
page read and write
3060000
unkown
page read and write
12E0000
trusted library allocation
page read and write
9C80000
unkown
page read and write
1EF22480000
heap
page read and write
2CB0000
trusted library allocation
page read and write
8CED000
stack
page read and write
9C80000
unkown
page read and write
3050000
unkown
page read and write
9CE0000
unkown
page read and write
91C0000
unkown
page read and write
F70000
trusted library allocation
page read and write
3020000
unkown
page read and write
1C161D05000
heap
page read and write
2E004C76000
heap
page read and write
820000
heap
page read and write
3530000
heap
page read and write
1EA40D12000
heap
page read and write
3610000
trusted library allocation
page read and write
9C80000
unkown
page read and write
189D5F3A000
heap
page read and write
7FF5ED97A000
unkown
page readonly
1C161D0D000
heap
page read and write
189D5F3E000
heap
page read and write
200C41C2000
heap
page read and write
3610000
trusted library allocation
page read and write
282EA5D0000
trusted library allocation
page read and write
1EA40D3D000
heap
page read and write
3110000
unkown
page read and write
1A607F8F000
heap
page read and write
C503000
unkown
page read and write
22BB07B4000
heap
page read and write
211885B3000
heap
page read and write
1EA41430000
heap
page read and write
8820000
unkown
page read and write
3050000
unkown
page read and write
15E3CB93000
heap
page read and write
22BAEE62000
heap
page read and write
2E002E84000
heap
page read and write
5AB9000
heap
page read and write
56D9000
unkown
page read and write
7FF5ED8E2000
unkown
page readonly
7FF5ED342000
unkown
page readonly
7FF5EDA53000
unkown
page readonly
7FF5ED4B0000
unkown
page readonly
15E3CD8A000
heap
page read and write
2E002EB6000
heap
page read and write
1A60852F000
heap
page read and write
200C3BF0000
heap
page read and write
2508BD80000
trusted library allocation
page read and write
200C4197000
heap
page read and write
210BAC6B000
heap
page read and write
5AD5000
heap
page read and write
41B000
unkown
page readonly
22BB09B7000
heap
page read and write
210BABE0000
heap
page read and write
1EA41429000
heap
page read and write
282EA6B1000
heap
page read and write
3110000
unkown
page read and write
7FF5ED279000
unkown
page readonly
2E002E7E000
heap
page read and write
3243000
heap
page read and write
2390000
heap
page read and write
400000
unkown
page readonly
7FF763AF1000
unkown
page execute read
1C161582000
heap
page read and write
2CB0000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
755E8FE000
stack
page read and write
1EF2248F000
heap
page read and write
F70000
trusted library allocation
page read and write
5EE000
stack
page read and write
193F636B000
heap
page read and write
1440000
unkown
page read and write
22BB0781000
heap
page read and write
282EAC28000
heap
page read and write
9C80000
unkown
page read and write
2A1534B8000
heap
page read and write
9ED000
heap
page read and write
C50A000
unkown
page read and write
7DD0000
unkown
page read and write
CEF000
stack
page read and write
22BAEED7000
heap
page read and write
193F66E0000
heap
page read and write
200C3BC7000
heap
page read and write
E99CE7F000
stack
page read and write
7DD0000
unkown
page read and write
1C161540000
heap
page read and write
282EAC2C000
heap
page read and write
2508C48F000
heap
page read and write
9560000
unkown
page read and write
3020000
unkown
page read and write
7FF5ED7DB000
unkown
page readonly
F70000
trusted library allocation
page read and write
A364000
unkown
page read and write
6F0000
heap
page read and write
193F5FF4000
heap
page read and write
22BAE8F0000
trusted library allocation
page read and write
1EA40E40000
trusted library allocation
page read and write
8AE000
heap
page execute and read and write
193F6017000
heap
page read and write
1EF21FFD000
heap
page read and write
1E3FEA62000
heap
page read and write
1A607F55000
heap
page read and write
282B10EB000
heap
page read and write
1483000
heap
page read and write
15E3D2C0000
heap
page read and write
189D5F34000
heap
page read and write
282EAC2C000
heap
page read and write
9560000
unkown
page read and write
1C163590000
heap
page read and write
22BAE71F000
heap
page read and write
9C80000
unkown
page read and write
7DB0000
unkown
page read and write
1410000
trusted library allocation
page read and write
9560000
unkown
page read and write
33C0000
unkown
page read and write
282B162A000
heap
page read and write
1410000
trusted library allocation
page read and write
211886E2000
heap
page read and write
7FF5ED7FD000
unkown
page readonly
4BE3000
unkown
page read and write
22BAE777000
heap
page read and write
78A0000
unkown
page read and write
2508C32E000
heap
page read and write
9C80000
unkown
page read and write
CB08000
unkown
page read and write
1C161D0E000
heap
page read and write
1A607F20000
heap
page read and write
9C80000
unkown
page read and write
7FF5ED847000
unkown
page readonly
222F55E7000
heap
page read and write
3610000
trusted library allocation
page read and write
5AD7000
heap
page read and write
4B78000
unkown
page read and write
14AD6F40000
heap
page read and write
1C1614D0000
heap
page read and write
9A60000
stack
page read and write
193F66B9000
heap
page read and write
8210000
unkown
page read and write
421C4FF000
stack
page read and write
1C161D1C000
heap
page read and write
A49E000
unkown
page read and write
189D5DF6000
heap
page read and write
22BAEE77000
heap
page read and write
3590000
unkown
page read and write
347D000
stack
page read and write
3060000
unkown
page read and write
1340000
unkown
page read and write
2508C47C000
heap
page read and write
22BAE713000
heap
page read and write
1A6086BA000
heap
page read and write
3830000
trusted library allocation
page read and write
1C161D0D000
heap
page read and write
3F0D97F000
stack
page read and write
9560000
unkown
page read and write
91C0000
unkown
page read and write
FB04000
unkown
page read and write
9C80000
unkown
page read and write
F70000
trusted library allocation
page read and write
22BAE722000
heap
page read and write
7FF5ED990000
unkown
page readonly
2BA29187000
heap
page read and write
1C161D01000
heap
page read and write
3050000
unkown
page read and write
9C3000
heap
page read and write
2BA29355000
heap
page read and write
50CD000
heap
page read and write
1C161587000
heap
page read and write
9560000
unkown
page read and write
6B0000
direct allocation
page execute and read and write
7FF5ED4E8000
unkown
page readonly
2508BE7F000
heap
page read and write
193F5EE0000
heap
page read and write
551000
system
page execute and read and write
9C80000
unkown
page read and write
1EA412BA000
heap
page read and write
9C80000
unkown
page read and write
22BAE78B000
heap
page read and write
B140000
unkown
page readonly
710000
heap
page read and write
7FF5ED5C5000
unkown
page readonly
3110000
stack
page read and write
9795000
unkown
page read and write
29D3E7F000
stack
page read and write
1C161510000
trusted library allocation
page read and write
9C80000
unkown
page read and write
200C3C42000
heap
page read and write
3070000
unkown
page read and write
22BAECF4000
heap
page read and write
189D5F57000
heap
page read and write
3610000
trusted library allocation
page read and write
AFB518B000
stack
page read and write
3830000
trusted library allocation
page read and write
2E004F62000
heap
page read and write
91C0000
unkown
page read and write
9C80000
unkown
page read and write
7DB0000
unkown
page read and write
9560000
unkown
page read and write
193F5FFD000
heap
page read and write
3534000
heap
page read and write
A37B000
unkown
page read and write
200C3BC2000
heap
page read and write
41E000
unkown
page write copy
22BAE730000
heap
page read and write
3150000
unkown
page read and write
40B000
unkown
page execute read
2508BE96000
heap
page read and write
282EA668000
heap
page read and write
189D5DE3000
heap
page read and write
EB0000
heap
page read and write
189D5F70000
heap
page read and write
9DA000
heap
page read and write
22BAEE51000
heap
page read and write
2BA29196000
heap
page read and write
1C1615AC000
heap
page read and write
3050000
unkown
page read and write
2E002E77000
heap
page read and write
3040000
unkown
page read and write
97D4000
unkown
page read and write
7867000
unkown
page read and write
965C000
stack
page read and write
3050000
unkown
page read and write
A4A1000
unkown
page read and write
3610000
trusted library allocation
page read and write
282EA6BB000
heap
page read and write
1410000
trusted library allocation
page read and write
211886EA000
heap
page read and write
6ED000
heap
page execute and read and write
2E002E2D000
heap
page read and write
1C16182A000
heap
page read and write
401000
unkown
page execute read
22BAEF08000
heap
page read and write
15E3D2D0000
heap
page read and write
1EA412BA000
heap
page read and write
28F0000
heap
page read and write
222F5580000
heap
page read and write
9560000
unkown
page read and write
1A607F65000
heap
page read and write
3110000
unkown
page read and write
2508BE49000
heap
page read and write
7DB0000
unkown
page read and write
1500000
heap
page read and write
1390000
unkown
page read and write
22BAE743000
heap
page read and write
7FF5ED660000
unkown
page readonly
9C80000
unkown
page read and write
282EAC3E000
heap
page read and write
9C80000
unkown
page read and write
F70000
trusted library allocation
page read and write
282EA5C0000
heap
page read and write
22BAE730000
heap
page read and write
282B163A000
heap
page read and write
31A0000
trusted library allocation
page read and write
2508DE00000
heap
page read and write
2E002D10000
heap
page read and write
BDA0000
unkown
page readonly
1A607F85000
heap
page read and write
A37D000
unkown
page read and write
D3E000
stack
page read and write
7FF5ED7E0000
unkown
page readonly
9C80000
unkown
page read and write
7FF5ED849000
unkown
page readonly
9C80000
unkown
page read and write
310E000
stack
page read and write
211885D0000
heap
page read and write
9B4000
heap
page read and write
1C161D04000
heap
page read and write
3830000
trusted library allocation
page read and write
9340000
unkown
page read and write
282B0F16000
heap
page read and write
282B1625000
heap
page read and write
193F66CD000
heap
page read and write
15E3CB85000
heap
page read and write
5F0000
heap
page read and write
189D5DE3000
heap
page read and write
3050000
unkown
page read and write
8710000
unkown
page readonly
193F5FDF000
heap
page read and write
8FB9000
stack
page read and write
41E000
unkown
page read and write
37AE000
unkown
page read and write
21188730000
heap
page read and write
282B1627000
heap
page read and write
F70000
trusted library allocation
page read and write
3110000
unkown
page read and write
33C0000
unkown
page read and write
1A607F89000
heap
page read and write
31A0000
trusted library allocation
page read and write
1505000
heap
page read and write
9C80000
unkown
page read and write
7DF4F3031000
unkown
page execute read
189D5DE9000
heap
page read and write
3040000
unkown
page read and write
3050000
unkown
page read and write
5AB9000
heap
page read and write
91C0000
unkown
page read and write
9C80000
unkown
page read and write
1410000
trusted library allocation
page read and write
2BA29269000
heap
page read and write
1410000
trusted library allocation
page read and write
15E3D2F8000
heap
page read and write
1E3FEA62000
heap
page read and write
76C0000
unkown
page read and write
91C0000
unkown
page read and write
1EF22495000
heap
page read and write
1C1615C1000
heap
page read and write
12E0000
trusted library allocation
page read and write
282B10E0000
heap
page read and write
7F2E000
stack
page read and write
3130000
unkown
page read and write
3070000
unkown
page read and write
1EF2200D000
heap
page read and write
1EA412BE000
heap
page read and write
C4D0000
unkown
page read and write
12E0000
trusted library allocation
page read and write
5AB9000
heap
page read and write
3610000
trusted library allocation
page read and write
EAE000
heap
page read and write
1C161D27000
heap
page read and write
2BA29158000
heap
page read and write
14558C7000
stack
page read and write
193F5FF4000
heap
page read and write
1410000
trusted library allocation
page read and write
FC0000
heap
page read and write
3060000
unkown
page read and write
1C1615CB000
heap
page read and write
BE8597F000
stack
page read and write
33C0000
unkown
page read and write
3610000
trusted library allocation
page read and write
22BAECF7000
heap
page read and write
C846000
unkown
page read and write
193F66E0000
heap
page read and write
F70000
trusted library allocation
page read and write
22BAEF0F000
heap
page read and write
1E3FE930000
heap
page read and write
2508C32B000
heap
page read and write
7DB0000
unkown
page read and write
9C80000
unkown
page read and write
3610000
trusted library allocation
page read and write
222F55A6000
heap
page read and write
3830000
trusted library allocation
page read and write
B10D000
stack
page read and write
282EA6B3000
heap
page read and write
1EF225B0000
heap
page read and write
22BAE706000
heap
page read and write
1EF21FD5000
heap
page read and write
5AB9000
heap
page read and write
FA99000
unkown
page read and write
282EAC07000
heap
page read and write
282EAC20000
heap
page read and write
3791000
unkown
page read and write
9C80000
unkown
page read and write
3050000
unkown
page read and write
200C3C55000
heap
page read and write
C6D8000
unkown
page read and write
1A60852F000
heap
page read and write
22BAE730000
heap
page read and write
211886A0000
trusted library allocation
page read and write
91C0000
unkown
page read and write
F7C1DFF000
stack
page read and write
222F55AB000
heap
page read and write
7FF5EDA70000
unkown
page readonly
22BAEE8A000
heap
page read and write
3610000
trusted library allocation
page read and write
189D5DC6000
heap
page read and write
33C0000
unkown
page read and write
193F635E000
heap
page read and write
1EA4140F000
heap
page read and write
7FF5ED94A000
unkown
page readonly
193F600B000
heap
page read and write
786B000
unkown
page read and write
189D5DF7000
heap
page read and write
9340000
unkown
page read and write
1C161D1C000
heap
page read and write
211885D0000
heap
page read and write
76B000
heap
page read and write
7FF5ED519000
unkown
page readonly
3060000
unkown
page read and write
7FF5EDA69000
unkown
page readonly
A8F000
stack
page read and write
22BAE6D8000
heap
page read and write
282B160A000
heap
page read and write
22BB0770000
heap
page read and write
12E0000
trusted library allocation
page read and write
222F55DA000
heap
page read and write
3060000
unkown
page read and write
1EF21FF8000
heap
page read and write
1C161CF7000
heap
page read and write
9C80000
unkown
page read and write
22BAE76C000
heap
page read and write
21BE4E20000
heap
page read and write
9CF000
heap
page read and write
2080000
unclassified section
page read and write
22BAE76C000
heap
page read and write
22BAE76C000
heap
page read and write
200C3C46000
heap
page read and write
91C0000
unkown
page read and write
200C41B9000
heap
page read and write
5AB9000
heap
page read and write
200C3C25000
heap
page read and write
9560000
unkown
page read and write
785B000
unkown
page read and write
2BA2935B000
heap
page read and write
C54A000
unkown
page read and write
222F55E2000
heap
page read and write
1410000
trusted library allocation
page read and write
8F0000
heap
page read and write
282B10B0000
trusted library allocation
page read and write
3500000
heap
page read and write
7FF5ED86B000
unkown
page readonly
2A1536B5000
heap
page read and write
7DD0000
unkown
page read and write
211885C6000
heap
page read and write
2E004FCA000
heap
page read and write
282EAC2C000
heap
page read and write
9C80000
unkown
page read and write
7DB0000
unkown
page read and write
5AB9000
heap
page read and write
3110000
unkown
page read and write
2E002DF9000
heap
page read and write
33C0000
unkown
page read and write
282EAC39000
heap
page read and write
211886A0000
trusted library allocation
page read and write
2BA29254000
heap
page read and write
282B0F47000
heap
page read and write
22BAE76C000
heap
page read and write
1318000
heap
page read and write
200C3C28000
heap
page read and write
318C000
stack
page read and write
1EA41433000
heap
page read and write
15E3D2FE000
heap
page read and write
1A60851B000
heap
page read and write
193F6353000
heap
page read and write
2508C488000
heap
page read and write
A50B000
unkown
page read and write
CA7C000
unkown
page read and write
222F5540000
heap
page read and write
8BE9000
stack
page read and write
282EAC0A000
heap
page read and write
B86407B000
stack
page read and write
1C1615F2000
heap
page read and write
7DD0000
unkown
page read and write
9DC000
heap
page read and write
200C5A30000
heap
page read and write
15E3CB89000
heap
page read and write
189D5F6A000
heap
page read and write
189D5DF9000
heap
page read and write
21BE4E10000
heap
page read and write
200C41A9000
heap
page read and write
3050000
unkown
page read and write
1EF225B2000
heap
page read and write
7E60000
unkown
page read and write
22BB0980000
heap
page read and write
2BA28F60000
heap
page read and write
282B0EA0000
heap
page read and write
189D5DA7000
heap
page read and write
7FF5ED28E000
unkown
page readonly
F70000
trusted library allocation
page read and write
9340000
stack
page read and write
22BAE730000
heap
page read and write
153F000
stack
page read and write
222F55EA000
heap
page read and write
2508BE9B000
heap
page read and write
1EA41419000
heap
page read and write
200C41BC000
heap
page read and write
91C0000
unkown
page read and write
1C161D16000
heap
page read and write
282EAC0A000
heap
page read and write
1C1615A7000
heap
page read and write
2CB0000
trusted library allocation
page read and write
3060000
unkown
page read and write
5AD7000
heap
page read and write
3050000
unkown
page read and write
22BAE7B3000
heap
page read and write
33C0000
unkown
page read and write
12E0000
trusted library allocation
page read and write
3610000
trusted library allocation
page read and write
A494000
unkown
page read and write
189D5F78000
heap
page read and write
7FF5ED3CE000
unkown
page readonly
7FF5ED9E1000
unkown
page readonly
91C0000
unkown
page read and write
2BA29080000
trusted library allocation
page read and write
1EF224AF000
heap
page read and write
22BAE721000
heap
page read and write
1490000
unkown
page read and write
1A6086B5000
heap
page read and write
1C1615C1000
heap
page read and write
1C1615AC000
heap
page read and write
12E0000
trusted library allocation
page read and write
1F0000
heap
page read and write
33C0000
unkown
page read and write
189D5DFC000
heap
page read and write
21188C0E000
heap
page read and write
A01B000
stack
page read and write
9560000
unkown
page read and write
3110000
unkown
page read and write
F70000
trusted library allocation
page read and write
22BAE8F0000
trusted library allocation
page read and write
22BAE71E000
heap
page read and write
7F40000
unkown
page readonly
1E3FE850000
heap
page read and write
9340000
unkown
page read and write
1410000
trusted library allocation
page read and write
200C3B30000
trusted library allocation
page read and write
3748000
unkown
page read and write
200C41C2000
heap
page read and write
22BAE7D0000
heap
page read and write
FB86000
unkown
page read and write
12E0000
trusted library allocation
page read and write
9340000
unkown
page read and write
222F55E6000
heap
page read and write
D59690F000
stack
page read and write
33C0000
unkown
page read and write
3900000
heap
page read and write
5641000
unkown
page read and write
189D5DE9000
heap
page read and write
7DD0000
unkown
page read and write
15E3CB8E000
heap
page read and write
282B1628000
heap
page read and write
8000000
unkown
page read and write
F70000
trusted library allocation
page read and write
BE858FF000
stack
page read and write
2BA29198000
heap
page read and write
7DD0000
unkown
page read and write
3F0D87D000
stack
page read and write
1EA40D64000
heap
page read and write
9C80000
unkown
page read and write
A491000
unkown
page read and write
3610000
trusted library allocation
page read and write
22BAE78B000
heap
page read and write
282EAC10000
heap
page read and write
3040000
unkown
page read and write
7847000
unkown
page read and write
1EA4142A000
heap
page read and write
210BAC40000
heap
page read and write
364E000
stack
page read and write
9DC000
heap
page read and write
90E000
heap
page execute and read and write
7FF5ED337000
unkown
page readonly
2BA29257000
heap
page read and write
31A0000
trusted library allocation
page read and write
C563000
unkown
page read and write
7FF5ED503000
unkown
page readonly
1A60851F000
heap
page read and write
2BA29269000
heap
page read and write
22BAEEE4000
heap
page read and write
15E3D2DF000
heap
page read and write
1C161CEA000
heap
page read and write
36D5000
stack
page read and write
1E3FEA10000
heap
page read and write
3110000
unkown
page read and write
33C0000
unkown
page read and write
1FD59F000
stack
page read and write
1C2CDE50000
heap
page read and write
7DB0000
unkown
page read and write
1EA41431000
heap
page read and write
193F6017000
heap
page read and write
400000
unkown
page execute and read and write
9C80000
unkown
page read and write
200C41B9000
heap
page read and write
22BB0781000
heap
page read and write
222F5622000
heap
page read and write
A0B000
heap
page read and write
282EAC26000
heap
page read and write
7FF5ED409000
unkown
page readonly
3050000
unkown
page read and write
A502000
unkown
page read and write
2CB0000
trusted library allocation
page read and write
15E3CB92000
heap
page read and write
21188580000
heap
page read and write
2BA2B110000
heap
page read and write
22BAECF7000
heap
page read and write
33C0000
unkown
page read and write
1410000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
95DB000
stack
page read and write
15E3CB85000
heap
page read and write
22BAEE58000
heap
page read and write
3030000
unkown
page read and write
2E002E53000
heap
page read and write
2118875A000
heap
page read and write
3060000
unkown
page read and write
5AEB000
heap
page read and write
3610000
trusted library allocation
page read and write
9C80000
unkown
page read and write
BE859FF000
stack
page read and write
189D5DC6000
heap
page read and write
1A60851B000
heap
page read and write
CA20000
unkown
page read and write
9C80000
unkown
page read and write
7FF5ED7F1000
unkown
page readonly
1410000
trusted library allocation
page read and write
22BB09A0000
heap
page read and write
1EF224B7000
heap
page read and write
2508BEA9000
heap
page read and write
2E002E7E000
heap
page read and write
9873000
unkown
page read and write
C6BF000
unkown
page read and write
3830000
trusted library allocation
page read and write
189D5D98000
heap
page read and write
5AD3000
heap
page read and write
22BAE7B3000
heap
page read and write
7DD0000
unkown
page read and write
22BAEEA4000
heap
page read and write
200C3C42000
heap
page read and write
AAF2000
unkown
page read and write
1390000
unkown
page read and write
22BAE75C000
heap
page read and write
1F0000
heap
page read and write
1A608514000
heap
page read and write
1EF2249B000
heap
page read and write
7DB0000
unkown
page read and write
3030000
unkown
page read and write
14AD6C68000
heap
page read and write
7DC0000
unkown
page read and write
6CE000
stack
page read and write
7FF5ED77C000
unkown
page readonly
1EF225BB000
heap
page read and write
282B0F25000
heap
page read and write
1410000
trusted library allocation
page read and write
F2C000
stack
page read and write
193F7F50000
heap
page read and write
BAF9000
stack
page read and write
E0D000
stack
page read and write
22BAE76C000
heap
page read and write
7DF4F3040000
unkown
page readonly
1C1615C1000
heap
page read and write
222F561C000
heap
page read and write
1EF21FD6000
heap
page read and write
B22B000
stack
page read and write
1EA41429000
heap
page read and write
2380000
heap
page read and write
9C80000
unkown
page read and write
3050000
unkown
page read and write
33C0000
unkown
page read and write
740000
heap
page read and write
1C1615AF000
heap
page read and write
210BAC71000
heap
page read and write
7DB0000
unkown
page read and write
2508BD40000
heap
page read and write
7FF5ED404000
unkown
page readonly
19527CF0000
heap
page read and write
193F66CD000
heap
page read and write
2508C489000
heap
page read and write
7FF5EDA38000
unkown
page readonly
15E3D2DC000
heap
page read and write
9C80000
unkown
page read and write
C89A000
unkown
page read and write
3050000
unkown
page read and write
7DB0000
unkown
page read and write
3110000
unkown
page read and write
D9EE67F000
stack
page read and write
9C80000
unkown
page read and write
1C161D26000
heap
page read and write
421C5FE000
stack
page read and write
979C000
unkown
page read and write
21188C12000
heap
page read and write
9C80000
unkown
page read and write
7859000
unkown
page read and write
21188BFC000
heap
page read and write
211885D0000
heap
page read and write
1EF225BA000
heap
page read and write
12E0000
trusted library allocation
page read and write
1EF225BA000
heap
page read and write
3610000
trusted library allocation
page read and write
3110000
unkown
page read and write
189D5DF7000
heap
page read and write
282B0F26000
heap
page read and write
200C41BC000
heap
page read and write
88EE000
stack
page read and write
2508BE84000
heap
page read and write
3610000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
2508BE9B000
heap
page read and write
3110000
unkown
page read and write
51B000
unkown
page readonly
3040000
unkown
page read and write
2BA2924C000
heap
page read and write
1EF21F50000
trusted library allocation
page read and write
193F6017000
heap
page read and write
9560000
unkown
page read and write
3610000
trusted library allocation
page read and write
2508BE9D000
heap
page read and write
22BAE76C000
heap
page read and write
2CB0000
trusted library allocation
page read and write
1A60850C000
heap
page read and write
3659000
stack
page read and write
4B93000
unkown
page read and write
BE85877000
stack
page read and write
9560000
unkown
page read and write
3830000
trusted library allocation
page read and write
282B0F3C000
heap
page read and write
7FF5ED507000
unkown
page readonly
15E3CB85000
heap
page read and write
51B000
unkown
page readonly
7FF5ED1D6000
unkown
page readonly
EF1C5FE000
stack
page read and write
222F55E0000
heap
page read and write
3040000
unkown
page read and write
2E002E77000
heap
page read and write
282EAC40000
heap
page read and write
7DD0000
unkown
page read and write
19527F15000
heap
page read and write
22BAECF0000
heap
page read and write
1A60851B000
heap
page read and write
10C0000
unkown
page readonly
1EF2249F000
heap
page read and write
1E3FEA42000
heap
page read and write
127C000
stack
page read and write
7D40000
unkown
page read and write
1195000
heap
page read and write
22BAEE55000
heap
page read and write
189D7C80000
heap
page read and write
FF5000
heap
page read and write
9560000
unkown
page read and write
222F5622000
heap
page read and write
EBF000
heap
page read and write
9C000
stack
page read and write
1F0000
heap
page read and write
2BA29196000
heap
page read and write
3060000
unkown
page read and write
1EF22491000
heap
page read and write
33C0000
unkown
page read and write
2E002E52000
heap
page read and write
7DB0000
unkown
page read and write
7FF5ED64F000
unkown
page readonly
33C0000
unkown
page read and write
1C1615FF000
heap
page read and write
2CB0000
trusted library allocation
page read and write
C516000
unkown
page read and write
923E000
stack
page read and write
9560000
unkown
page read and write
3020000
unkown
page read and write
7DF4F3050000
unkown
page readonly
9560000
unkown
page read and write
282EAC00000
heap
page read and write
AAF9000
unkown
page read and write
9560000
unkown
page read and write
7D53000
unkown
page read and write
7DD0000
unkown
page read and write
3060000
unkown
page read and write
E99CB97000
stack
page read and write
15E3CD20000
trusted library allocation
page read and write
7978000
unkown
page read and write
222F562C000
heap
page read and write
3050000
unkown
page read and write
1A607F72000
heap
page read and write
1C161CEA000
heap
page read and write
193F66CE000
heap
page read and write
9C80000
unkown
page read and write
33C0000
unkown
page read and write
22BAEE4C000
heap
page read and write
8860000
unkown
page read and write
9C80000
unkown
page read and write
C92D000
unkown
page read and write
1C1615A5000
heap
page read and write
41B000
unkown
page readonly
7DB0000
unkown
page read and write
B8E000
stack
page read and write
2BA29254000
heap
page read and write
7E70000
unkown
page read and write
189D5F57000
heap
page read and write
9560000
unkown
page read and write
22BB07B4000
heap
page read and write
189D5F6A000
heap
page read and write
7FF5ED59E000
unkown
page readonly
1410000
trusted library allocation
page read and write
3040000
unkown
page read and write
C6F2000
unkown
page read and write
3020000
unkown
page read and write
C700000
unkown
page read and write
1A608020000
trusted library allocation
page read and write
1E3FE950000
heap
page read and write
9883000
unkown
page read and write
1EA4142C000
heap
page read and write
1410000
trusted library allocation
page read and write
282EA695000
heap
page read and write
3610000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
7E70000
unkown
page read and write
FA82000
unkown
page read and write
C3C927F000
stack
page read and write
22BB09B7000
heap
page read and write
1A607F72000
heap
page read and write
22BAE7B3000
heap
page read and write
B4D0000
unkown
page read and write
15E3D2CE000
heap
page read and write
22BAEF07000
heap
page read and write
3110000
unkown
page read and write
22BB07B4000
heap
page read and write
2E002D40000
heap
page read and write
22BAEE57000
heap
page read and write
D9EE3CD000
stack
page read and write
2BA29270000
heap
page read and write
2508BE5F000
heap
page read and write
12E0000
trusted library allocation
page read and write
9C80000
unkown
page read and write
15E3D2E5000
heap
page read and write
1A608180000
heap
page read and write
1E3FEA5B000
heap
page read and write
1A6081B0000
heap
page read and write
2508BDF5000
heap
page read and write
211886E4000
heap
page read and write
3610000
trusted library allocation
page read and write
3060000
unkown
page read and write
98A8000
unkown
page read and write
33C0000
unkown
page read and write
5AE0000
heap
page read and write
51B000
unkown
page readonly
193F66C4000
heap
page read and write
FAC4000
unkown
page read and write
9C4000
heap
page read and write
189D5DD6000
heap
page read and write
1EA41419000
heap
page read and write
3610000
trusted library allocation
page read and write
3070000
unkown
page read and write
9871000
unkown
page read and write
93F000
stack
page read and write
2BA2935E000
heap
page read and write
65E000
stack
page read and write
282B0F35000
heap
page read and write
200C41B0000
heap
page read and write
22BB07B4000
heap
page read and write
8BC000
heap
page read and write
21188BF5000
heap
page read and write
1A607F72000
heap
page read and write
3610000
trusted library allocation
page read and write
3050000
unkown
page read and write
7DD9000
stack
page read and write
3795000
unkown
page read and write
3020000
unkown
page read and write
200C3C52000
heap
page read and write
282EAC25000
heap
page read and write
A433000
unkown
page read and write
3738000
unkown
page read and write
2508BE98000
heap
page read and write
211886A0000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
210BABF0000
heap
page read and write
33C0000
unkown
page read and write
1451000
unkown
page readonly
3830000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
282B1607000
heap
page read and write
9B2000
heap
page read and write
21188BFC000
heap
page read and write
7FF5ED516000
unkown
page readonly
5DE000
stack
page read and write
1EF224B9000
heap
page read and write
EAE000
heap
page read and write
2CB0000
trusted library allocation
page read and write
1390000
unkown
page read and write
9C6000
heap
page read and write
9687000
unkown
page read and write
1410000
trusted library allocation
page read and write
2BA29354000
heap
page read and write
3110000
unkown
page read and write
3130000
unkown
page read and write
21A0000
heap
page read and write
2E002E2D000
heap
page read and write
22BAE77C000
heap
page read and write
F70000
trusted library allocation
page read and write
1EF2249D000
heap
page read and write
B60000
heap
page read and write
4CC0000
unkown
page read and write
5AB9000
heap
page read and write
7DD0000
unkown
page read and write
7FF5ED692000
unkown
page readonly
2508BEA5000
heap
page read and write
1C161CEE000
heap
page read and write
33C0000
unkown
page read and write
24F0000
heap
page read and write
87F0000
unkown
page read and write
F70000
trusted library allocation
page read and write
9B3000
heap
page read and write
B82A000
stack
page read and write
2BA29251000
heap
page read and write
87BE000
stack
page read and write
11B0000
unkown
page readonly
15E3D2E4000
heap
page read and write
7DB0000
unkown
page read and write
3020000
unkown
page read and write
7FF5ED74A000
unkown
page readonly
1C1615B4000
heap
page read and write
22BB07B4000
heap
page read and write
282EA695000
heap
page read and write
A29E000
stack
page read and write
3040000
unkown
page read and write
AFB547F000
stack
page read and write
211885E1000
heap
page read and write
2BA29273000
heap
page read and write
323B000
heap
page read and write
15E3D2FC000
heap
page read and write
2508C47D000
heap
page read and write
189D5DC6000
heap
page read and write
9200000
unkown
page read and write
189D5F54000
heap
page read and write
B629000
stack
page read and write
9C80000
unkown
page read and write
7FF5ED886000
unkown
page readonly
3080000
unkown
page read and write
C88B000
unkown
page read and write
200C41A9000
heap
page read and write
200C41A7000
heap
page read and write
2E002E3B000
heap
page read and write
189D5DF5000
heap
page read and write
222F55A5000
heap
page read and write
1C161D3C000
heap
page read and write
3050000
unkown
page read and write
6D0000
heap
page read and write
282B2FE0000
heap
page read and write
282B1617000
heap
page read and write
1EA40D5E000
heap
page read and write
FED000
stack
page read and write
22BAEEBF000
heap
page read and write
51CB000
heap
page read and write
37BD000
unkown
page read and write
1EF22498000
heap
page read and write
37AC000
unkown
page read and write
5AB9000
heap
page read and write
2BA29259000
heap
page read and write
12E0000
trusted library allocation
page read and write
B8AB000
stack
page read and write
7DD0000
unkown
page read and write
22BAE6C0000
heap
page read and write
2508BE98000
heap
page read and write
200C41BB000
heap
page read and write
2508C49A000
heap
page read and write
1C161D00000
heap
page read and write
22BAEE58000
heap
page read and write
A21E000
stack
page read and write
5AEC000
heap
page read and write
22BAEE79000
heap
page read and write
3070000
unkown
page read and write
DD0000
unkown
page readonly
1410000
trusted library allocation
page read and write
1C2CDED8000
heap
page read and write
EAB000
heap
page read and write
33C0000
unkown
page read and write
210BAED5000
heap
page read and write
21188750000
heap
page read and write
9200000
unkown
page read and write
3050000
unkown
page read and write
A310000
unkown
page read and write
6D0000
unclassified section
page read and write
7FF5ED980000
unkown
page readonly
3040000
unkown
page read and write
7FF5EDA31000
unkown
page readonly
7FF5ED939000
unkown
page readonly
1EF225B3000
heap
page read and write
C49E000
stack
page read and write
22BAEE7A000
heap
page read and write
222F561C000
heap
page read and write
323E000
stack
page read and write
3020000
unkown
page read and write
9CC000
heap
page read and write
7FF5ED93E000
unkown
page readonly
9560000
unkown
page read and write
22BB07B4000
heap
page read and write
89E0000
unkown
page read and write
2CB0000
trusted library allocation
page read and write
3290000
unkown
page read and write
193F5FFB000
heap
page read and write
2BA2935E000
heap
page read and write
222F5588000
heap
page read and write
1C161510000
trusted library allocation
page read and write
3020000
unkown
page read and write
7FF5ED4EF000
unkown
page readonly
9E3000
heap
page read and write
36B0000
heap
page read and write
22BAEE9C000
heap
page read and write
1C1615FC000
heap
page read and write
1EF21FA9000
heap
page read and write
7FF5ED625000
unkown
page readonly
2E002E0E000
heap
page read and write
7FF5ED814000
unkown
page readonly
282EAC1C000
heap
page read and write
7FF5ED4DF000
unkown
page readonly
1410000
trusted library allocation
page read and write
2BA2935A000
heap
page read and write
200C3C42000
heap
page read and write
12E0000
trusted library allocation
page read and write
A4FC000
unkown
page read and write
9CB000
heap
page read and write
93E000
stack
page read and write
1C161D26000
heap
page read and write
7DB0000
unkown
page read and write
C6F8000
unkown
page read and write
12E0000
trusted library allocation
page read and write
193F66CC000
heap
page read and write
3534000
heap
page read and write
400000
unkown
page execute and read and write
189D5F54000
heap
page read and write
282B163C000
heap
page read and write
2508BE84000
heap
page read and write
A9E177F000
stack
page read and write
1A608532000
heap
page read and write
2BA291A3000
heap
page read and write
1EF21FD3000
heap
page read and write
F70000
trusted library allocation
page read and write
1EF224AF000
heap
page read and write
193F5FB7000
heap
page read and write
282EA6C5000
heap
page read and write
1410000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
282B161C000
heap
page read and write
211885D2000
heap
page read and write
2E004C01000
heap
page read and write
9C9000
heap
page read and write
282EAC04000
heap
page read and write
5AB9000
heap
page read and write
1C161CFE000
heap
page read and write
EAE000
heap
page read and write
7FF5ED867000
unkown
page readonly
7FF5ED42B000
unkown
page readonly
189D5F73000
heap
page read and write
3610000
trusted library allocation
page read and write
193F66E0000
heap
page read and write
282EAC03000
heap
page read and write
2BA29273000
heap
page read and write
1A607F10000
trusted library allocation
page read and write
7FF5ED9D2000
unkown
page readonly
3050000
unkown
page read and write
B6A0000
heap
page read and write
F041B27000
stack
page read and write
EBD000
heap
page read and write
282B161E000
heap
page read and write
33C0000
unkown
page read and write
12E0000
trusted library allocation
page read and write
7FF5ED8A4000
unkown
page readonly
9560000
unkown
page read and write
33C0000
unkown
page read and write
1410000
trusted library allocation
page read and write
15E3CB89000
heap
page read and write
7FF5ED793000
unkown
page readonly
1C161D08000
heap
page read and write
22BAE730000
heap
page read and write
3040000
unkown
page read and write
3610000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
33C0000
unkown
page read and write
9C80000
unkown
page read and write
91C0000
unkown
page read and write
3830000
trusted library allocation
page read and write
3060000
unkown
page read and write
B86417F000
stack
page read and write
F041E7F000
stack
page read and write
12E0000
trusted library allocation
page read and write
2508C49A000
heap
page read and write
1C161D26000
heap
page read and write
15E3CB89000
heap
page read and write
1410000
trusted library allocation
page read and write
32F0000
heap
page read and write
33C0000
unkown
page read and write
282EAC0A000
heap
page read and write
200C419E000
heap
page read and write
2508C48F000
heap
page read and write
DF92FFF000
stack
page read and write
1C161D0B000
heap
page read and write
2E004D00000
heap
page read and write
222F5623000
heap
page read and write
9560000
unkown
page read and write
7D00000
unkown
page readonly
22BAE6C8000
heap
page read and write
2508C49B000
heap
page read and write
65E000
stack
page read and write
2E002E16000
heap
page read and write
9C5000
heap
page read and write
3240000
unkown
page read and write
7DB0000
unkown
page read and write
193F6002000
heap
page read and write
200C41C1000
heap
page read and write
21188C11000
heap
page read and write
2508BE96000
heap
page read and write
21188BF8000
heap
page read and write
7FF763B05000
unkown
page readonly
3110000
unkown
page read and write
CB0000
heap
page read and write
8EFA000
unkown
page read and write
282EAC41000
heap
page read and write
33C0000
unkown
page read and write
797D000
unkown
page read and write
22BAE7B3000
heap
page read and write
15E3CB82000
heap
page read and write
200C3BCA000
heap
page read and write
193F635E000
heap
page read and write
6C0000
direct allocation
page execute and read and write
193F5FDA000
heap
page read and write
AFB55FE000
stack
page read and write
3030000
unkown
page read and write
200C3B60000
heap
page read and write
21188C08000
heap
page read and write
22BAEE51000
heap
page read and write
7FF5ED265000
unkown
page readonly
9560000
unkown
page read and write
2A1536B0000
heap
page read and write
51B000
unkown
page readonly
2BA29253000
heap
page read and write
32BE000
stack
page read and write
282B162E000
heap
page read and write
C56F000
unkown
page read and write
9C80000
unkown
page read and write
1C1615C1000
heap
page read and write
22BAE798000
heap
page read and write
8F9000
heap
page read and write
91C0000
unkown
page read and write
36B7000
heap
page read and write
36F0000
unkown
page readonly
1E3FEA34000
heap
page read and write
784A000
unkown
page read and write
2C40000
trusted library allocation
page read and write
22BAEEB6000
heap
page read and write
1EA4142C000
heap
page read and write
9660000
unkown
page read and write
A323000
unkown
page read and write
22BAE77C000
heap
page read and write
7FF5ED33F000
unkown
page readonly
1E3FEA32000
heap
page read and write
3610000
trusted library allocation
page read and write
200C3C37000
heap
page read and write
193F66E4000
heap
page read and write
7DD0000
unkown
page read and write
22BAE7B3000
heap
page read and write
193F5FF4000
heap
page read and write
15E3D2D8000
heap
page read and write
200C3C4E000
heap
page read and write
21188480000
heap
page read and write
22BAEEC7000
heap
page read and write
193F635A000
heap
page read and write
32C0000
direct allocation
page execute and read and write
7950000
unkown
page read and write
3050000
unkown
page read and write
3020000
unkown
page read and write
282EA6C4000
heap
page read and write
3020000
unkown
page read and write
193F5FD8000
heap
page read and write
211885B4000
heap
page read and write
9C4000
heap
page read and write
2508C48F000
heap
page read and write
211885B5000
heap
page read and write
282B10F0000
trusted library allocation
page read and write
9C80000
unkown
page read and write
3050000
unkown
page read and write
F70000
trusted library allocation
page read and write
7E70000
unkown
page read and write
C811000
unkown
page read and write
7FF5ED602000
unkown
page readonly
3830000
trusted library allocation
page read and write
1A607F78000
heap
page read and write
282EAC43000
heap
page read and write
1C1615C4000
heap
page read and write
B4D0000
unkown
page read and write
1EF224AF000
heap
page read and write
1C161CF9000
heap
page read and write
1A6086BB000
heap
page read and write
3830000
trusted library allocation
page read and write
9C80000
unkown
page read and write
211885BC000
heap
page read and write
9C80000
unkown
page read and write
5ADC000
heap
page read and write
33C0000
unkown
page read and write
211886A0000
trusted library allocation
page read and write
189D5DC6000
heap
page read and write
193F66E1000
heap
page read and write
33C0000
unkown
page read and write
9C80000
unkown
page read and write
9C80000
unkown
page read and write
9C4000
heap
page read and write
282B161F000
heap
page read and write
7FF5ED97E000
unkown
page readonly
282B160A000
heap
page read and write
22BAE76C000
heap
page read and write
A375000
unkown
page read and write
193F80B0000
heap
page read and write
2C40000
trusted library allocation
page read and write
1A608507000
heap
page read and write
A4B8000
unkown
page read and write
22BAE910000
heap
page read and write
3050000
unkown
page read and write
33C0000
unkown
page read and write
89A0000
unkown
page read and write
1C161D0D000
heap
page read and write
7FF5ED5C9000
unkown
page readonly
211885DD000
heap
page read and write
1510000
unkown
page readonly
12E0000
trusted library allocation
page read and write
3030000
unkown
page read and write
282B0F15000
heap
page read and write
22BAE76C000
heap
page read and write
18A0000
unkown
page readonly
1240000
heap
page read and write
C40000
heap
page read and write
282B1643000
heap
page read and write
59BB000
heap
page read and write
421C67E000
stack
page read and write
4DC000
stack
page read and write
282B163A000
heap
page read and write
282EAC39000
heap
page read and write
9C80000
unkown
page read and write
1C161D01000
heap
page read and write
22BAE77C000
heap
page read and write
22BAEE8F000
heap
page read and write
7FF5ED39E000
unkown
page readonly
5AEC000
heap
page read and write
22D1000
heap
page read and write
987D000
unkown
page read and write
2508C32A000
heap
page read and write
1EA412BB000
heap
page read and write
200C3C02000
heap
page read and write
22BAECFA000
heap
page read and write
9A5B000
unkown
page read and write
1C161D1C000
heap
page read and write
41E000
unkown
page write copy
1C161D13000
heap
page read and write
21BE4E40000
heap
page read and write
282EAC07000
heap
page read and write
193F66C9000
heap
page read and write
7FF5ED644000
unkown
page readonly
21188BE7000
heap
page read and write
7CD0000
unkown
page read and write
3110000
unkown
page read and write
211886E3000
heap
page read and write
9E2000
heap
page read and write
9C80000
unkown
page read and write
1A6086B0000
heap
page read and write
33C0000
unkown
page read and write
22BAE730000
heap
page read and write
189D5DE6000
heap
page read and write
1A607DF0000
heap
page read and write
282B1619000
heap
page read and write
3050000
unkown
page read and write
3050000
unkown
page read and write
1370000
heap
page read and write
282EAC2C000
heap
page read and write
1C161D1C000
heap
page read and write
7FF5ED9A1000
unkown
page readonly
200C3A10000
heap
page read and write
34E6000
stack
page read and write
193F6017000
heap
page read and write
22BAE76C000
heap
page read and write
7CA0000
unkown
page read and write
3060000
unkown
page read and write
C8E1000
unkown
page read and write
222F55E4000
heap
page read and write
7FF5ED6A5000
unkown
page readonly
11A6F7F000
stack
page read and write
9560000
unkown
page read and write
1C161CFC000
heap
page read and write
2CB0000
trusted library allocation
page read and write
1E3FEA5C000
heap
page read and write
3610000
trusted library allocation
page read and write
9C80000
unkown
page read and write
282EA6B3000
heap
page read and write
22BAEEC0000
heap
page read and write
52107E000
stack
page read and write
2508BDB0000
heap
page read and write
21196FE000
stack
page read and write
1C161CE5000
heap
page read and write
9ED000
heap
page read and write
5AE3000
heap
page read and write
22BAEE5E000
heap
page read and write
AF8D000
stack
page read and write
15E3CB83000
heap
page read and write
3050000
unkown
page read and write
9C80000
unkown
page read and write
3610000
trusted library allocation
page read and write
9C80000
unkown
page read and write
BCE000
stack
page read and write
6FC000
heap
page read and write
7FF763AF0000
unkown
page readonly
1F0000
heap
page read and write
9D1000
heap
page read and write
193F66C0000
heap
page read and write
9E2000
heap
page read and write
7FF5ED4FD000
unkown
page readonly
3070000
unkown
page read and write
3610000
trusted library allocation
page read and write
2E002E34000
heap
page read and write
282B10E5000
heap
page read and write
1EA40CF0000
heap
page read and write
2E004C1F000
heap
page read and write
22BB0981000
heap
page read and write
189D5E90000
heap
page read and write
282EAC1C000
heap
page read and write
211886E5000
heap
page read and write
22BAECFA000
heap
page read and write
3050000
unkown
page read and write
7FF5ED755000
unkown
page readonly
FFAD000
unkown
page read and write
2BA29178000
heap
page read and write
B8642FE000
stack
page read and write
22BAE730000
heap
page read and write
9C80000
unkown
page read and write
2E004F41000
heap
page read and write
7DD0000
unkown
page read and write
1EA40C10000
heap
page read and write
7FF5ED8F9000
unkown
page readonly
222F55E6000
heap
page read and write
C857000
unkown
page read and write
193F5F50000
heap
page read and write
3050000
unkown
page read and write
15E3CB68000
heap
page read and write
12E0000
trusted library allocation
page read and write
1A608514000
heap
page read and write
15E3D2F8000
heap
page read and write
FB43000
unkown
page read and write
91C0000
unkown
page read and write
7FF5D1CD4000
unkown
page readonly
2BA29240000
heap
page read and write
22BAEF06000
heap
page read and write
21188C08000
heap
page read and write
193F66C9000
heap
page read and write
189D5F70000
heap
page read and write
2CB0000
trusted library allocation
page read and write
3050000
unkown
page read and write
15E3D2DE000
heap
page read and write
1A608511000
heap
page read and write
2E002E3B000
heap
page read and write
1EA411B0000
heap
page read and write
222F562E000
heap
page read and write
1E3FEC45000
heap
page read and write
282B160B000
heap
page read and write
282B1607000
heap
page read and write
282EAC1E000
heap
page read and write
1A6086BE000
heap
page read and write
3050000
unkown
page read and write
1EF225B5000
heap
page read and write
2A1532F0000
heap
page read and write
9560000
unkown
page read and write
3040000
unkown
page read and write
189D5F40000
heap
page read and write
2E004FE2000
heap
page read and write
7FF5ED4C6000
unkown
page readonly
1455CFF000
stack
page read and write
200C41B0000
heap
page read and write
3050000
unkown
page read and write
5ADC000
heap
page read and write
189D5DE3000
heap
page read and write
200C3B30000
trusted library allocation
page read and write
54C5000
heap
page read and write
1EF224AF000
heap
page read and write
7FF5ED821000
unkown
page readonly
B640000
unkown
page read and write
1A607F7F000
heap
page read and write
9560000
unkown
page read and write
1C161D11000
heap
page read and write
9C9000
heap
page read and write
33C0000
unkown
page read and write
12E0000
trusted library allocation
page read and write
22BAE730000
heap
page read and write
22BB0880000
heap
page read and write
3150000
unkown
page read and write
2BA29273000
heap
page read and write
896B000
stack
page read and write
189D6050000
heap
page read and write
222F5625000
heap
page read and write
15E3CB42000
heap
page read and write
21188597000
heap
page read and write
2CB0000
trusted library allocation
page read and write
189D5F37000
heap
page read and write
1410000
trusted library allocation
page read and write
7FF5ED996000
unkown
page readonly
22BB07BA000
heap
page read and write
41E000
unkown
page read and write
282B1604000
heap
page read and write
22BB0781000
heap
page read and write
C6F4000
unkown
page read and write
1410000
trusted library allocation
page read and write
21188755000
heap
page read and write
31A0000
trusted library allocation
page read and write
96DF000
unkown
page read and write
200C41B0000
heap
page read and write
189D5DF7000
heap
page read and write
3060000
unkown
page read and write
7FF5ED735000
unkown
page readonly
2380000
heap
page read and write
222F55EA000
heap
page read and write
12E0000
trusted library allocation
page read and write
211885C5000
heap
page read and write
22BAEE4C000
heap
page read and write
222F55EE000
heap
page read and write
7DD0000
unkown
page read and write
282EA698000
heap
page read and write
2BA29153000
heap
page read and write
1C1615A2000
heap
page read and write
282EA6B6000
heap
page read and write
97A9000
unkown
page read and write
1EF21FD4000
heap
page read and write
1C161D15000
heap
page read and write
9B1000
heap
page read and write
986F000
unkown
page read and write
3050000
unkown
page read and write
33C0000
unkown
page read and write
22BAE726000
heap
page read and write
5AB9000
heap
page read and write
200C3C07000
heap
page read and write
1A6081BB000
heap
page read and write
7FF5ED4A1000
unkown
page readonly
12E0000
trusted library allocation
page read and write
35A0000
unkown
page readonly
2E004C29000
heap
page read and write
3040000
unkown
page read and write
3050000
unkown
page read and write
714000
heap
page read and write
1C161D26000
heap
page read and write
2E004C01000
heap
page read and write
2BA2919A000
heap
page read and write
282B0F45000
heap
page read and write
211886EE000
heap
page read and write
1C161D26000
heap
page read and write
22BB0781000
heap
page read and write
2CB0000
trusted library allocation
page read and write
1E3FEA39000
heap
page read and write
2BA2924C000
heap
page read and write
9C4000
heap
page read and write
1C161D2A000
heap
page read and write
91C0000
unkown
page read and write
3800000
unkown
page readonly
2E002E53000
heap
page read and write
189D5D60000
trusted library allocation
page read and write
7FF5ED3D6000
unkown
page readonly
9C80000
unkown
page read and write
7FF5EDA11000
unkown
page readonly
1EA40E20000
heap
page read and write
1EA4140C000
heap
page read and write
51B000
unkown
page readonly
2E002E66000
heap
page read and write
189D5DF1000
heap
page read and write
1EF225BA000
heap
page read and write
200C3BC0000
heap
page read and write
2CB0000
trusted library allocation
page read and write
3060000
unkown
page read and write
1EA40D46000
heap
page read and write
97B5000
unkown
page read and write
C7B000
stack
page read and write
33C0000
unkown
page read and write
2C40000
trusted library allocation
page read and write
189D5F3E000
heap
page read and write
2508BE78000
heap
page read and write
22BAEEC8000
heap
page read and write
1EF22130000
heap
page read and write
9C80000
unkown
page read and write
9C80000
unkown
page read and write
2E004C29000
heap
page read and write
15E3CB85000
heap
page read and write
282B0F37000
heap
page read and write
22BAE730000
heap
page read and write
22BAE781000
heap
page read and write
2E002E0F000
heap
page read and write
7FF5ED471000
unkown
page readonly
9C80000
unkown
page read and write
1EA412B3000
heap
page read and write
12E0000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
7FF5ED9BE000
unkown
page readonly
1A607F37000
heap
page read and write
E99CFFF000
stack
page read and write
7DD0000
unkown
page read and write
14AD6F45000
heap
page read and write
282EAC29000
heap
page read and write
C7C5000
unkown
page read and write
1390000
unkown
page read and write
91C0000
unkown
page read and write
22BB09B7000
heap
page read and write
308A000
stack
page read and write
1350000
heap
page read and write
867000
system
page execute and read and write
193F5FB2000
heap
page read and write
282B1610000
heap
page read and write
21188BF8000
heap
page read and write
7FF5ED872000
unkown
page readonly
1A608512000
heap
page read and write
3020000
unkown
page read and write
15E3CB38000
heap
page read and write
906E000
stack
page read and write
7DD0000
unkown
page read and write
22BAEE4D000
heap
page read and write
EA4000
heap
page read and write
3110000
unkown
page read and write
210BAED0000
heap
page read and write
CB0000
heap
page read and write
22BAEEC7000
heap
page read and write
1EA41432000
heap
page read and write
200C3C38000
heap
page read and write
787C000
unkown
page read and write
5AF5000
heap
page read and write
1E3FEA57000
heap
page read and write
22BAEEA7000
heap
page read and write
1A60851B000
heap
page read and write
368F000
stack
page read and write
3110000
unkown
page read and write
29D3BED000
stack
page read and write
343C000
stack
page read and write
2BA291A0000
heap
page read and write
33C0000
unkown
page read and write
22BAE730000
heap
page read and write
421C47F000
stack
page read and write
193F66BC000
heap
page read and write
3110000
unkown
page read and write
3610000
trusted library allocation
page read and write
15E3CB65000
heap
page read and write
200C3E40000
heap
page read and write
19D000
stack
page read and write
D40000
remote allocation
page read and write
FC1000
system
page execute and read and write
211885B4000
heap
page read and write
7FF5ED40D000
unkown
page readonly
15E3D2C4000
heap
page read and write
3830000
trusted library allocation
page read and write
BE85AFE000
stack
page read and write
3610000
trusted library allocation
page read and write
9C6000
heap
page read and write
189D5E90000
trusted library allocation
page read and write
C6C9000
unkown
page read and write
400000
unkown
page execute and read and write
987B000
unkown
page read and write
827000
heap
page read and write
1EF21FB3000
heap
page read and write
33C0000
unkown
page read and write
3110000
unkown
page read and write
2E004FB1000
heap
page read and write
2BA29040000
heap
page read and write
3040000
unkown
page read and write
9885000
unkown
page read and write
7FF5ED3F3000
unkown
page readonly
189D5F4F000
heap
page read and write
3610000
trusted library allocation
page read and write
1EF22497000
heap
page read and write
2508C484000
heap
page read and write
1EF22494000
heap
page read and write
2E004C08000
heap
page read and write
2CB0000
trusted library allocation
page read and write
2508C485000
heap
page read and write
9C80000
unkown
page read and write
193F5F20000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
1EA412BA000
heap
page read and write
9C80000
unkown
page read and write
5AD5000
heap
page read and write
B150000
unkown
page read and write
7FF5ED3EA000
unkown
page readonly
9560000
unkown
page read and write
2BA291A7000
heap
page read and write
C5A0000
unkown
page read and write
22BAE7B3000
heap
page read and write
200C3BC7000
heap
page read and write
1A60851C000
heap
page read and write
91C0000
unkown
page read and write
91C0000
unkown
page read and write
9C80000
unkown
page read and write
9D64000
unkown
page read and write
282B0EE0000
heap
page read and write
2CB0000
trusted library allocation
page read and write
200C419C000
heap
page read and write
2508C479000
heap
page read and write
9C80000
unkown
page read and write
D40000
remote allocation
page read and write
5AB9000
heap
page read and write
7FF5ED92C000
unkown
page readonly
2E002E7E000
heap
page read and write
7FF5ED8C1000
unkown
page readonly
1EF2213B000
heap
page read and write
189D5F6C000
heap
page read and write
5AB9000
heap
page read and write
1C161D04000
heap
page read and write
1C161CEE000
heap
page read and write
2CB0000
trusted library allocation
page read and write
200C3B30000
trusted library allocation
page read and write
189D5DE9000
heap
page read and write
955000
heap
page read and write
51B000
unkown
page readonly
1A608020000
trusted library allocation
page read and write
2508C477000
heap
page read and write
3430000
unkown
page read and write
7FF763B05000
unkown
page readonly
41E000
unkown
page read and write
2600000
heap
page read and write
1C161D08000
heap
page read and write
55B000
stack
page read and write
2BA29140000
heap
page read and write
3070000
unkown
page read and write
2BA2941A000
heap
page read and write
189D5DA7000
heap
page read and write
9977000
unkown
page read and write
282EAC3C000
heap
page read and write
3610000
trusted library allocation
page read and write
7E70000
unkown
page read and write
C08A000
stack
page read and write
2508C4A3000
heap
page read and write
22BAE713000
heap
page read and write
33C0000
unkown
page read and write
200C3C56000
heap
page read and write
3110000
unkown
page read and write
193F635A000
heap
page read and write
7FF5ED7CF000
unkown
page readonly
9560000
unkown
page read and write
193F66C8000
heap
page read and write
3110000
unkown
page read and write
1EF224C0000
heap
page read and write
7953000
unkown
page read and write
193F66CD000
heap
page read and write
1EA40D5C000
heap
page read and write
F70000
trusted library allocation
page read and write
3050000
unkown
page read and write
22BAEE86000
heap
page read and write
15E3CB82000
heap
page read and write
1EA40D53000
heap
page read and write
2BA29352000
heap
page read and write
2119357000
stack
page read and write
2CB0000
trusted library allocation
page read and write
2508C485000
heap
page read and write
F70000
trusted library allocation
page read and write
7FFE000
stack
page read and write
33C0000
unkown
page read and write
3610000
trusted library allocation
page read and write
1C161578000
heap
page read and write
41B000
unkown
page readonly
7FF763AF1000
unkown
page execute read
282B161C000
heap
page read and write
15E3D302000
heap
page read and write
7FF5ED71E000
unkown
page readonly
100AA000
heap
page read and write
1EA41432000
heap
page read and write
22BAE786000
heap
page read and write
15F5000
heap
page read and write
5AE0000
heap
page read and write
9560000
unkown
page read and write
51A1000
heap
page read and write
7DD0000
unkown
page read and write
282EAC0B000
heap
page read and write
193F6357000
heap
page read and write
FB8B000
unkown
page read and write
3610000
trusted library allocation
page read and write
3110000
unkown
page read and write
2508C49A000
heap
page read and write
3110000
unkown
page read and write
1EA41432000
heap
page read and write
91C0000
unkown
page read and write
56C1000
heap
page read and write
282B1625000
heap
page read and write
222F55E7000
heap
page read and write
6D0000
unclassified section
page read and write
9C80000
unkown
page read and write
9C80000
unkown
page read and write
1C161D26000
heap
page read and write
21188588000
heap
page read and write
7FF5ED937000
unkown
page readonly
3150000
unkown
page read and write
1C161D2F000
heap
page read and write
DF92F7E000
stack
page read and write
1E3FEA6B000
heap
page read and write
15E3CD20000
trusted library allocation
page read and write
1EA40D17000
heap
page read and write
1A608539000
heap
page read and write
2A1533D0000
heap
page read and write
E8C000
heap
page read and write
7E11000
unkown
page read and write
193F5F20000
trusted library allocation
page read and write
222F55B8000
heap
page read and write
7861000
unkown
page read and write
2E002E41000
heap
page read and write
193F66E0000
heap
page read and write
1350000
unkown
page readonly
2CB0000
trusted library allocation
page read and write
211885BC000
heap
page read and write
2BA2919A000
heap
page read and write
9F1E000
stack
page read and write
145594F000
stack
page read and write
2BA29198000
heap
page read and write
7FF763B04000
unkown
page write copy
1EA412B5000
heap
page read and write
7FF5ED43A000
unkown
page readonly
4BC9000
unkown
page read and write
282B0EC0000
heap
page read and write
1C161D33000
heap
page read and write
22BAE730000
heap
page read and write
2BA29269000
heap
page read and write
2BA29188000
heap
page read and write
1EF224AF000
heap
page read and write
400000
unkown
page execute and read and write
2E004F3A000
heap
page read and write
22BAEE97000
heap
page read and write
5AB9000
heap
page read and write
33C0000
unkown
page read and write
977A000
unkown
page read and write
9C80000
unkown
page read and write
22BAE730000
heap
page read and write
3040000
unkown
page read and write
7DB0000
unkown
page read and write
282EA672000
heap
page read and write
3110000
unkown
page read and write
3830000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
C3C8F5F000
stack
page read and write
7DD0000
unkown
page read and write
189D5DE9000
heap
page read and write
9560000
unkown
page read and write
282EA5CA000
heap
page read and write
1C161CEB000
heap
page read and write
A379000
unkown
page read and write
7FF5EDA0B000
unkown
page readonly
3050000
unkown
page read and write
3040000
unkown
page read and write
33C0000
unkown
page read and write
33C0000
unkown
page read and write
33C0000
unkown
page read and write
7FF5ED8C6000
unkown
page readonly
9C80000
unkown
page read and write
282B162E000
heap
page read and write
1410000
trusted library allocation
page read and write
F041EFE000
stack
page read and write
1410000
trusted library allocation
page read and write
9560000
unkown
page read and write
22BAE78D000
heap
page read and write
9C5000
heap
page read and write
9560000
unkown
page read and write
9C80000
unkown
page read and write
8A6E000
stack
page read and write
3020000
unkown
page read and write
3050000
unkown
page read and write
21BE4E88000
heap
page read and write
C512000
unkown
page read and write
1C161D05000
heap
page read and write
33C0000
unkown
page read and write
7FF5ED800000
unkown
page readonly
222F55CC000
heap
page read and write
1C161D3C000
heap
page read and write
21188597000
heap
page read and write
79D3000
unkown
page read and write
3110000
unkown
page read and write
7FF5ED853000
unkown
page readonly
189D5DC7000
heap
page read and write
22BAE77B000
heap
page read and write
12E0000
trusted library allocation
page read and write
3040000
unkown
page read and write
22BAE7B3000
heap
page read and write
282B1644000
heap
page read and write
15E3D2D7000
heap
page read and write
7DD0000
unkown
page read and write
7FF5ED4F3000
unkown
page readonly
9C80000
unkown
page read and write
1C1615C4000
heap
page read and write
7DB0000
unkown
page read and write
3610000
trusted library allocation
page read and write
ED3000
heap
page read and write
5AB9000
heap
page read and write
15E3D2E2000
heap
page read and write
200C3BCB000
heap
page read and write
1A607F97000
heap
page read and write
3830000
trusted library allocation
page read and write
E988D3F000
stack
page read and write
5AB9000
heap
page read and write
9C9000
heap
page read and write
9C80000
unkown
page read and write
33C0000
unkown
page read and write
3070000
unkown
page read and write
21188BEE000
heap
page read and write
AADB000
unkown
page read and write
C86000
system
page execute and read and write
3610000
trusted library allocation
page read and write
91C0000
unkown
page read and write
91C0000
unkown
page read and write
2508BEA6000
heap
page read and write
4C34000
unkown
page read and write
7DB0000
unkown
page read and write
15E3D2CA000
heap
page read and write
22BAEEB3000
heap
page read and write
1A608541000
heap
page read and write
282B1603000
heap
page read and write
5AB9000
heap
page read and write
1FD497000
stack
page read and write
282B0EF2000
heap
page read and write
2508C32E000
heap
page read and write
33C0000
unkown
page read and write
1C2CE100000
heap
page read and write
7FF5ED71B000
unkown
page readonly
9C80000
unkown
page read and write
189D5F59000
heap
page read and write
6E0000
unclassified section
page read and write
FC8000
system
page execute and read and write
21BE5135000
heap
page read and write
15E3CB47000
heap
page read and write
91C0000
unkown
page read and write
22BAECFE000
heap
page read and write
7863000
unkown
page read and write
222F55EA000
heap
page read and write
2BA29080000
trusted library allocation
page read and write
222F55CD000
heap
page read and write
9C80000
unkown
page read and write
540000
heap
page read and write
7E70000
unkown
page read and write
19D000
stack
page read and write
1410000
trusted library allocation
page read and write
3830000
trusted library allocation
page read and write
22BAE730000
heap
page read and write
9560000
unkown
page read and write
12E0000
trusted library allocation
page read and write
91B9000
stack
page read and write
2601000
heap
page read and write
7FF5ED426000
unkown
page readonly
5ADC000
heap
page read and write
3030000
unkown
page read and write
5590000
unkown
page write copy
33C0000
unkown
page read and write
6C0000
direct allocation
page read and write
3050000
unkown
page read and write
9B5C000
stack
page read and write
A9E13AF000
stack
page read and write
193F66CD000
heap
page read and write
7FF5ED556000
unkown
page readonly
5ACC000
heap
page read and write
2508BE40000
heap
page read and write
2508BE54000
heap
page read and write
22BAE7B3000
heap
page read and write
785D000
unkown
page read and write
1E3FEA57000
heap
page read and write
15E3D2C2000
heap
page read and write
B08D000
stack
page read and write
22BAE743000
heap
page read and write
7DB0000
unkown
page read and write
282B163A000
heap
page read and write
BC9B000
stack
page read and write
379E000
unkown
page read and write
9C80000
unkown
page read and write
2508C47C000
heap
page read and write
C3C937F000
stack
page read and write
9C80000
unkown
page read and write
22BAE74B000
heap
page read and write
76A0000
unkown
page read and write
2508BD60000
heap
page read and write
3610000
trusted library allocation
page read and write
9C80000
unkown
page read and write
33C0000
unkown
page read and write
2CB0000
trusted library allocation
page read and write
282B0F44000
heap
page read and write
801000
system
page execute and read and write
3610000
trusted library allocation
page read and write
EC1000
heap
page read and write
3758000
unkown
page read and write
2508DE10000
heap
page read and write
211885D0000
heap
page read and write
15E3D2C5000
heap
page read and write
5AF6000
heap
page read and write
2CB0000
trusted library allocation
page read and write
3050000
unkown
page read and write
9E1000
heap
page read and write
22BAE782000
heap
page read and write
193F66B0000
heap
page read and write
9C80000
unkown
page read and write
200C3BC5000
heap
page read and write
9C80000
unkown
page read and write
15E3D2E1000
heap
page read and write
9DC000
heap
page read and write
8FE000
heap
page read and write
8BF0000
unkown
page readonly
CB1C000
unkown
page read and write
51B000
unkown
page readonly
9200000
unkown
page read and write
22BAEE42000
heap
page read and write
1410000
trusted library allocation
page read and write
B170000
unkown
page readonly
B650000
unkown
page read and write
3020000
unkown
page read and write
2508BE9B000
heap
page read and write
9340000
unkown
page read and write
9560000
unkown
page read and write
7FF5ED41C000
unkown
page readonly
2BA2919E000
heap
page read and write
9879000
unkown
page read and write
193F66CA000
heap
page read and write
1390000
unkown
page read and write
1C2CE105000
heap
page read and write
21188C08000
heap
page read and write
3020000
unkown
page read and write
8B60000
unkown
page readonly
189D5F47000
heap
page read and write
8CF000
stack
page read and write
19D000
stack
page read and write
7FF5ED495000
unkown
page readonly
22BAECFB000
heap
page read and write
EF1C67E000
stack
page read and write
33C0000
unkown
page read and write
F7C1EFD000
stack
page read and write
222F55EA000
heap
page read and write
2E002E77000
heap
page read and write
189D5C40000
heap
page read and write
22BAEE77000
heap
page read and write
1410000
trusted library allocation
page read and write
3209000
stack
page read and write
C6E3000
unkown
page read and write
3030000
unkown
page read and write
9ADA000
stack
page read and write
1A607F74000
heap
page read and write
7E70000
unkown
page read and write
7FF5ECED2000
unkown
page readonly
189D5DFF000
heap
page read and write
1A607F37000
heap
page read and write
400000
unkown
page readonly
1EF22012000
heap
page read and write
327F000
stack
page read and write
22BAE730000
heap
page read and write
5AEC000
heap
page read and write
F70000
trusted library allocation
page read and write
755E87F000
stack
page read and write
282B0F32000
heap
page read and write
2508C49A000
heap
page read and write
C89C000
unkown
page read and write
22BAE6F9000
heap
page read and write
193F66E9000
heap
page read and write
282EAC39000
heap
page read and write
189D5E90000
trusted library allocation
page read and write
7FF5ED418000
unkown
page readonly
7FF5ED961000
unkown
page readonly
5AD7000
heap
page read and write
1FD97E000
stack
page read and write
12E0000
trusted library allocation
page read and write
22BAE730000
heap
page read and write
75D000
heap
page execute and read and write
2118A4B0000
heap
page read and write
7FF5ED5C1000
unkown
page readonly
7FF5ED5EB000
unkown
page readonly
22BAEEAE000
heap
page read and write
22BAECFA000
heap
page read and write
9C80000
unkown
page read and write
9560000
unkown
page read and write
7FF5ED803000
unkown
page readonly
22BAEE58000
heap
page read and write
E99D07F000
stack
page read and write
2508BE9F000
heap
page read and write
1E3FEA18000
heap
page read and write
189D5DEB000
heap
page read and write
1C2CDE70000
heap
page read and write
282EA6B6000
heap
page read and write
282EA5F0000
heap
page read and write
2BA29357000
heap
page read and write
22BAE71F000
heap
page read and write
3050000
unkown
page read and write
9C80000
unkown
page read and write
282B0EF7000
heap
page read and write
4C50000
unkown
page read and write
200C419C000
heap
page read and write
7FF5ED844000
unkown
page readonly
37A0000
unkown
page read and write
91C0000
unkown
page read and write
15E3CD20000
trusted library allocation
page read and write
33C0000
unkown
page read and write
189D5F53000
heap
page read and write
2599E7F000
stack
page read and write
3110000
unkown
page read and write
7FF5ED6B8000
unkown
page readonly
1C161CEA000
heap
page read and write
9F3000
heap
page read and write
200C3BCA000
heap
page read and write
2508BE83000
heap
page read and write
189D5DC6000
heap
page read and write
22BAE776000
heap
page read and write
22BAEF09000
heap
page read and write
401000
unkown
page execute read
200C3C28000
heap
page read and write
9C80000
unkown
page read and write
1410000
trusted library allocation
page read and write
9C80000
unkown
page read and write
A33E000
unkown
page read and write
2E002E7F000
heap
page read and write
3610000
trusted library allocation
page read and write
189D5DED000
heap
page read and write
222F561D000
heap
page read and write
7DD0000
unkown
page read and write
BD98000
stack
page read and write
2E004C02000
heap
page read and write
193F6017000
heap
page read and write
222F562A000
heap
page read and write
2C40000
trusted library allocation
page read and write
282B1628000
heap
page read and write
7FF5EDA47000
unkown
page readonly
1EF22495000
heap
page read and write
1C161CF0000
heap
page read and write
1EF224C0000
heap
page read and write
7FF5ED6DB000
unkown
page readonly
9C000
stack
page read and write
3110000
unkown
page read and write
3070000
unkown
page read and write
143B000
stack
page read and write
B728000
stack
page read and write
3020000
unkown
page read and write
282B1600000
heap
page read and write
2CB0000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
D9EE6FF000
stack
page read and write
7FF5ED5CE000
unkown
page readonly
282B163E000
heap
page read and write
7FF5ED915000
unkown
page readonly
1EF2248C000
heap
page read and write
22BAEE4E000
heap
page read and write
A9E1327000
stack
page read and write
7FF5ED286000
unkown
page readonly
2E004BF0000
heap
page read and write
211886F0000
heap
page read and write
1A608500000
heap
page read and write
7FF5EDA76000
unkown
page readonly
282EAC18000
heap
page read and write
3110000
unkown
page read and write
1C1615AF000
heap
page read and write
9E1000
heap
page read and write
22BAEF0F000
heap
page read and write
21188680000
heap
page read and write
91C0000
unkown
page read and write
282B2EB0000
heap
page read and write
7DD0000
unkown
page read and write
F7C1BFF000
stack
page read and write
33C0000
unkown
page read and write
C6CF000
unkown
page read and write
78AD000
unkown
page read and write
3830000
trusted library allocation
page read and write
1200000
unkown
page readonly
CFE000
stack
page read and write
12E0000
trusted library allocation
page read and write
C84D000
unkown
page read and write
9BD000
heap
page read and write
1EF2249C000
heap
page read and write
3030000
unkown
page read and write
2440000
heap
page read and write
9C000
stack
page read and write
D596CFF000
stack
page read and write
9C80000
unkown
page read and write
9DA000
heap
page read and write
1A60852F000
heap
page read and write
C52C000
unkown
page read and write
EBD000
heap
page read and write
3040000
unkown
page read and write
3070000
unkown
page read and write
91C0000
unkown
page read and write
FCA000
system
page execute and read and write
7FF5ED8FF000
unkown
page readonly
3110000
unkown
page read and write
1A607F32000
heap
page read and write
1C1615FF000
heap
page read and write
37A8000
unkown
page read and write
3070000
unkown
page read and write
7FF5ED476000
unkown
page readonly
2E002E85000
heap
page read and write
2508C470000
heap
page read and write
9200000
unkown
page read and write
91C0000
unkown
page read and write
282EA590000
heap
page read and write
7FF5ED76D000
unkown
page readonly
1410000
trusted library allocation
page read and write
87F0000
unkown
page read and write
12E0000
trusted library allocation
page read and write
1C161D0F000
heap
page read and write
1A6081B5000
heap
page read and write
15E3CB82000
heap
page read and write
B8B0000
unkown
page read and write
87D1000
unkown
page read and write
3080000
unkown
page read and write
1A6086B4000
heap
page read and write
22BAE707000
heap
page read and write
282B160E000
heap
page read and write
22BAEE49000
heap
page read and write
22BAEE5A000
heap
page read and write
F70000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
3610000
trusted library allocation
page read and write
9200000
unkown
page read and write
9C80000
unkown
page read and write
7FF5EDA14000
unkown
page readonly
3610000
trusted library allocation
page read and write
189D5F51000
heap
page read and write
C964000
unkown
page read and write
1C161570000
heap
page read and write
22BAE7B3000
heap
page read and write
2460000
heap
page read and write
9E6000
heap
page read and write
282B0F35000
heap
page read and write
1A6086BA000
heap
page read and write
9FF000
heap
page read and write
211886E0000
heap
page read and write
7FF5EDA0D000
unkown
page readonly
DF92E7E000
stack
page read and write
5AB9000
heap
page read and write
91C0000
unkown
page read and write
282EAC24000
heap
page read and write
33C0000
unkown
page read and write
E99CF7E000
stack
page read and write
3050000
unkown
page read and write
282EA695000
heap
page read and write
2508C320000
heap
page read and write
D596C7E000
stack
page read and write
1EF2248F000
heap
page read and write
2BA29269000
heap
page read and write
1EF23FE0000
heap
page read and write
189D5F37000
heap
page read and write
282EAC21000
heap
page read and write
9C80000
unkown
page read and write
1A608511000
heap
page read and write
7DD0000
unkown
page read and write
1EA40D59000
heap
page read and write
9C6000
heap
page read and write
2BA29247000
heap
page read and write
1410000
trusted library allocation
page read and write
680000
heap
page read and write
A39B000
unkown
page read and write
3830000
trusted library allocation
page read and write
1A607F81000
heap
page read and write
5AB9000
heap
page read and write
CA63000
unkown
page read and write
3110000
unkown
page read and write
1EF22005000
heap
page read and write
2BA29259000
heap
page read and write
3610000
trusted library allocation
page read and write
1E3FEA44000
heap
page read and write
7FF5ED9A6000
unkown
page readonly
1EF21F80000
heap
page read and write
22BAEE40000
heap
page read and write
3210000
unkown
page read and write
2508BE98000
heap
page read and write
AA90000
unkown
page read and write
2E004C18000
heap
page read and write
3020000
unkown
page read and write
22BAE778000
heap
page read and write
12E0000
trusted library allocation
page read and write
C30000
heap
page read and write
3050000
unkown
page read and write
22BAE730000
heap
page read and write
12E0000
trusted library allocation
page read and write
282EAC05000
heap
page read and write
19527C80000
heap
page read and write
9560000
unkown
page read and write
3040000
unkown
page read and write
7FF5ED674000
unkown
page readonly
1FD51F000
stack
page read and write
9560000
unkown
page read and write
189D5D60000
trusted library allocation
page read and write
1A6086B7000
heap
page read and write
189D5F6B000
heap
page read and write
9C80000
unkown
page read and write
7E70000
unkown
page read and write
EF1C6FE000
stack
page read and write
2CB0000
trusted library allocation
page read and write
3030000
unkown
page read and write
15E3CD50000
heap
page read and write
193F5FF4000
heap
page read and write
3610000
trusted library allocation
page read and write
21C0000
heap
page read and write
58BD000
heap
page read and write
189D5DA2000
heap
page read and write
41B000
unkown
page readonly
1EA41415000
heap
page read and write
7DB0000
unkown
page read and write
22BAE7B3000
heap
page read and write
193F6352000
heap
page read and write
1EA41429000
heap
page read and write
9798000
unkown
page read and write
22BAE6F7000
heap
page read and write
1EA40D08000
heap
page read and write
91C0000
unkown
page read and write
AFB54FF000
stack
page read and write
7FF5ED55F000
unkown
page readonly
1EA41419000
heap
page read and write
A3BE000
unkown
page read and write
12E0000
trusted library allocation
page read and write
3610000
trusted library allocation
page read and write
3610000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
22BAE730000
heap
page read and write
33C0000
unkown
page read and write
1A607ED0000
heap
page read and write
2508C487000
heap
page read and write
1EF2200A000
heap
page read and write
222F55E2000
heap
page read and write
A19F000
stack
page read and write
200C3B10000
heap
page read and write
2D60000
heap
page read and write
19527F10000
heap
page read and write
282B0F3B000
heap
page read and write
3830000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
9C80000
unkown
page read and write
200C3B30000
trusted library allocation
page read and write
19527CF8000
heap
page read and write
2E002E77000
heap
page read and write
7DB0000
unkown
page read and write
1A608531000
heap
page read and write
A361000
unkown
page read and write
F70000
trusted library allocation
page read and write
3070000
unkown
page read and write
282EA6B6000
heap
page read and write
193F66CF000
heap
page read and write
F70000
trusted library allocation
page read and write
1A607F78000
heap
page read and write
15E3CD00000
heap
page read and write
CA75000
unkown
page read and write
33C0000
unkown
page read and write
282EC4B0000
heap
page read and write
33C0000
unkown
page read and write
2BA29357000
heap
page read and write
7DD0000
unkown
page read and write
200C3C4C000
heap
page read and write
15E3D2E8000
heap
page read and write
193F6007000
heap
page read and write
3050000
unkown
page read and write
211886EA000
heap
page read and write
9560000
unkown
page read and write
FA8B000
unkown
page read and write
22BAEE99000
heap
page read and write
755E58F000
stack
page read and write
7DD0000
unkown
page read and write
3070000
unkown
page read and write
282B0F18000
heap
page read and write
9C80000
unkown
page read and write
33C0000
unkown
page read and write
189D5F80000
heap
page read and write
7FF5ED39B000
unkown
page readonly
1E3FEA57000
heap
page read and write
2E002E1D000
heap
page read and write
79B1000
unkown
page read and write
9C80000
unkown
page read and write
100A2000
heap
page read and write
3070000
unkown
page read and write
9875000
unkown
page read and write
15E3D2CA000
heap
page read and write
1A608534000
heap
page read and write
14AD6BC0000
heap
page read and write
22BAEE5F000
heap
page read and write
89E000
heap
page read and write
1C161587000
heap
page read and write
222F562A000
heap
page read and write
22BAEE61000
heap
page read and write
1EA41414000
heap
page read and write
1EA40CF5000
heap
page read and write
31A0000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
7FF763B01000
unkown
page readonly
2E002E2B000
heap
page read and write
95F000
stack
page read and write
755E97F000
stack
page read and write
9877000
unkown
page read and write
12E0000
trusted library allocation
page read and write
22BAE76C000
heap
page read and write
282EA66E000
heap
page read and write
282EC680000
heap
page read and write
CAA7000
unkown
page read and write
193F5F20000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
3110000
unkown
page read and write
1EA40E40000
trusted library allocation
page read and write
1EA40D65000
heap
page read and write
7FF5ED534000
unkown
page readonly
189D5F3B000
heap
page read and write
9C80000
unkown
page read and write
12E0000
trusted library allocation
page read and write
AAF6000
unkown
page read and write
DE0000
unkown
page readonly
AB55000
unkown
page read and write
12E0000
trusted library allocation
page read and write
87F0000
unkown
page read and write
33C0000
unkown
page read and write
200C5C00000
heap
page read and write
3797000
unkown
page read and write
1EA4142C000
heap
page read and write
22BAE730000
heap
page read and write
282EA570000
heap
page read and write
1EF224B0000
heap
page read and write
3030000
unkown
page read and write
1C1615CD000
heap
page read and write
9C80000
unkown
page read and write
3050000
unkown
page read and write
3050000
unkown
page read and write
AFB557E000
stack
page read and write
54C5000
heap
page read and write
7E70000
unkown
page read and write
193F66E0000
heap
page read and write
200C41B9000
heap
page read and write
5AE0000
heap
page read and write
7FF5ED2A4000
unkown
page readonly
5210FE000
stack
page read and write
2CB0000
trusted library allocation
page read and write
B4D0000
unkown
page read and write
7FF5ED779000
unkown
page readonly
12E0000
trusted library allocation
page read and write
3080000
unkown
page read and write
2CB0000
trusted library allocation
page read and write
400000
unkown
page readonly
F041FFE000
stack
page read and write
193F6017000
heap
page read and write
3610000
trusted library allocation
page read and write
2BA29250000
heap
page read and write
200C41A1000
heap
page read and write
22BAEC70000
heap
page read and write
A4AB000
unkown
page read and write
91C0000
unkown
page read and write
3060000
unkown
page read and write
9560000
unkown
page read and write
282EA6BC000
heap
page read and write
1A60850E000
heap
page read and write
13C0000
heap
page read and write
6B0000
direct allocation
page execute and read and write
22BB09B0000
heap
page read and write
7FF5ED349000
unkown
page readonly
3070000
unkown
page read and write
22BB0781000
heap
page read and write
189D5F57000
heap
page read and write
1EA40D59000
heap
page read and write
2E002E1E000
heap
page read and write
13C8000
heap
page read and write
7D20000
unkown
page readonly
211885BC000
heap
page read and write
2A1534B0000
heap
page read and write
1A60850F000
heap
page read and write
22BAEE47000
heap
page read and write
7FF5ED7C4000
unkown
page readonly
C51E000
unkown
page read and write
3050000
unkown
page read and write
3534000
heap
page read and write
1EA40D3D000
heap
page read and write
12E0000
trusted library allocation
page read and write
189D5F7B000
heap
page read and write
32A0000
unkown
page read and write
22BAE8B0000
heap
page read and write
AF0C000
stack
page read and write
189D6055000
heap
page read and write
33C0000
unkown
page read and write
684000
heap
page read and write
1EA40D53000
heap
page read and write
1EF225B7000
heap
page read and write
74A000
heap
page read and write
9C80000
unkown
page read and write
9560000
unkown
page read and write
193F66E7000
heap
page read and write
1A607F54000
heap
page read and write
2E002D20000
heap
page read and write
1A607F75000
heap
page read and write
189D5D20000
heap
page read and write
22BAE713000
heap
page read and write
7FF5ED1BC000
unkown
page readonly
1A607F78000
heap
page read and write
3830000
trusted library allocation
page read and write
22BAEE62000
heap
page read and write
200C3C49000
heap
page read and write
15E3D2F8000
heap
page read and write
3110000
unkown
page read and write
2BA29196000
heap
page read and write
2BA2924F000
heap
page read and write
E70000
heap
page read and write
1A609E60000
heap
page read and write
22BAE76C000
heap
page read and write
3130000
unkown
page read and write
3060000
unkown
page read and write
8EC6000
unkown
page read and write
E78000
heap
page read and write
9C80000
unkown
page read and write
7FF5ED451000
unkown
page readonly
22BAE76C000
heap
page read and write
189D5F4C000
heap
page read and write
211885D0000
heap
page read and write
33C0000
unkown
page read and write
7DB0000
unkown
page read and write
1FD87E000
stack
page read and write
2CB0000
trusted library allocation
page read and write
1EA412B4000
heap
page read and write
3610000
trusted library allocation
page read and write
189D5F6A000
heap
page read and write
9C80000
unkown
page read and write
8108000
stack
page read and write
200C41A5000
heap
page read and write
15E3CD85000
heap
page read and write
1EA40E40000
trusted library allocation
page read and write
15E3EC20000
heap
page read and write
FF70000
unkown
page read and write
EBD000
heap
page read and write
1A6086BA000
heap
page read and write
AB0C000
unkown
page read and write
2508BDFB000
heap
page read and write
2508BEAB000
heap
page read and write
33C0000
unkown
page read and write
3050000
unkown
page read and write
7FF5ED8AC000
unkown
page readonly
9E6C000
stack
page read and write
2E004C76000
heap
page read and write
2BA2919A000
heap
page read and write
3070000
unkown
page read and write
210BAC49000
heap
page read and write
2BA2935A000
heap
page read and write
193F5FFB000
heap
page read and write
9560000
unkown
page read and write
22BAE7B3000
heap
page read and write
9C80000
unkown
page read and write
7DB0000
unkown
page read and write
D596887000
stack
page read and write
3020000
unkown
page read and write
22BAECF2000
heap
page read and write
3050000
unkown
page read and write
7FF5ED81B000
unkown
page readonly
91C0000
unkown
page read and write
3610000
trusted library allocation
page read and write
1E3FEA61000
heap
page read and write
33C0000
unkown
page read and write
12E0000
trusted library allocation
page read and write
189D5F75000
heap
page read and write
1EF21FFB000
heap
page read and write
15E3D2C7000
heap
page read and write
3534000
heap
page read and write
2E002E23000
heap
page read and write
3050000
unkown
page read and write
5AB9000
heap
page read and write
1EF21FD7000
heap
page read and write
193F5FFD000
heap
page read and write
31A0000
trusted library allocation
page read and write
1C161D0A000
heap
page read and write
1FD8FE000
stack
page read and write
3050000
unkown
page read and write
282B162E000
heap
page read and write
1EF21FF4000
heap
page read and write
22BAEEA4000
heap
page read and write
9C80000
unkown
page read and write
1C1615B5000
heap
page read and write
211885DA000
heap
page read and write
2508C49A000
heap
page read and write
2CB0000
trusted library allocation
page read and write
A46000
heap
page read and write
2508BC60000
heap
page read and write
FFA1000
unkown
page read and write
22BAEE58000
heap
page read and write
1C161D17000
heap
page read and write
9560000
unkown
page read and write
3110000
unkown
page read and write
15E3CB00000
heap
page read and write
282EAC3A000
heap
page read and write
7FF5ED9ED000
unkown
page readonly
B8640FF000
stack
page read and write
2C40000
trusted library allocation
page read and write
7FF5ED9B8000
unkown
page readonly
1455C7E000
stack
page read and write
7865000
unkown
page read and write
1EF21FD3000
heap
page read and write
2CB0000
trusted library allocation
page read and write
15E3CB47000
heap
page read and write
7FF5ED850000
unkown
page readonly
8730000
unkown
page read and write
7DB0000
unkown
page read and write
211886EE000
heap
page read and write
193F6365000
heap
page read and write
22BAE76C000
heap
page read and write
1EF224AF000
heap
page read and write
1399000
unkown
page read and write
37F9000
unkown
page read and write
9C80000
unkown
page read and write
33C0000
unkown
page read and write
282B163A000
heap
page read and write
2C40000
trusted library allocation
page read and write
21188BE0000
heap
page read and write
4850000
heap
page read and write
2140000
heap
page read and write
3220000
unkown
page readonly
2CB0000
trusted library allocation
page read and write
21188592000
heap
page read and write
9C80000
unkown
page read and write
9C80000
unkown
page read and write
1C161CFE000
heap
page read and write
59BB000
heap
page read and write
222F55D4000
heap
page read and write
22BAEE54000
heap
page read and write
193F66BC000
heap
page read and write
211886E7000
heap
page read and write
3610000
trusted library allocation
page read and write
9C80000
unkown
page read and write
2508C32A000
heap
page read and write
1EF22490000
heap
page read and write
200C41BC000
heap
page read and write
7DD0000
unkown
page read and write
C41F000
stack
page read and write
211885DF000
heap
page read and write
22BAE730000
heap
page read and write
3120000
unkown
page read and write
3050000
unkown
page read and write
3110000
unkown
page read and write
2508BE9E000
heap
page read and write
2E002E85000
heap
page read and write
1C2CDE40000
heap
page read and write
15E3CB65000
heap
page read and write
9C80000
unkown
page read and write
282EA6B3000
heap
page read and write
2E002E50000
heap
page read and write
9C80000
unkown
page read and write
EF1C57F000
stack
page read and write
3040000
unkown
page read and write
E988DBF000
stack
page read and write
2E002E2B000
heap
page read and write
91C0000
unkown
page read and write
51A1000
heap
page read and write
15E3CD20000
trusted library allocation
page read and write
89C0000
unkown
page read and write
22BAEE53000
heap
page read and write
7FF5ED9AE000
unkown
page readonly
EF1C477000
stack
page read and write
400000
unkown
page readonly
1EA40D35000
heap
page read and write
C557000
unkown
page read and write
189D5DE3000
heap
page read and write
2BA2919A000
heap
page read and write
3534000
heap
page read and write
7DB0000
unkown
page read and write
33C0000
unkown
page read and write
282B0F40000
heap
page read and write
1C161D32000
heap
page read and write
193F66E0000
heap
page read and write
1C1615AF000
heap
page read and write
15E3CB8C000
heap
page read and write
193F635B000
heap
page read and write
22BAEE50000
heap
page read and write
1410000
trusted library allocation
page read and write
C5AA000
unkown
page read and write
7DB0000
unkown
page read and write
1480000
heap
page read and write
200C4198000
heap
page read and write
EAB000
heap
page read and write
2508BE9B000
heap
page read and write
3070000
unkown
page read and write
1A608540000
heap
page read and write
91C0000
unkown
page read and write
22BB07B4000
heap
page read and write
CBA0000
unkown
page read and write
7FF5ED73D000
unkown
page readonly
7DB0000
unkown
page read and write
B8641FE000
stack
page read and write
7DD0000
unkown
page read and write
9560000
unkown
page read and write
7FF5ED4C2000
unkown
page readonly
3050000
unkown
page read and write
15E3D2CB000
heap
page read and write
22BAE730000
heap
page read and write
91C0000
unkown
page read and write
2E004C26000
heap
page read and write
2CB0000
trusted library allocation
page read and write
9560000
unkown
page read and write
7E50000
unkown
page readonly
12E0000
trusted library allocation
page read and write
1C161D07000
heap
page read and write
1A607F72000
heap
page read and write
222F561C000
heap
page read and write
4B90000
unkown
page read and write
5ABA000
heap
page read and write
1EF21F30000
heap
page read and write
2CB0000
trusted library allocation
page read and write
1EA40CFB000
heap
page read and write
2CB0000
trusted library allocation
page read and write
1A607F8F000
heap
page read and write
7FF5ED750000
unkown
page readonly
200C3BC4000
heap
page read and write
12E0000
trusted library allocation
page read and write
3050000
unkown
page read and write
1C1615D2000
heap
page read and write
2E004F22000
heap
page read and write
40B000
unkown
page execute read
3050000
unkown
page read and write
1EA40D59000
heap
page read and write
1EF2249C000
heap
page read and write
33C0000
unkown
page read and write
2CB0000
trusted library allocation
page read and write
C544000
unkown
page read and write
1EF225B4000
heap
page read and write
2BA29410000
heap
page read and write
2508C323000
heap
page read and write
9C80000
unkown
page read and write
3040000
unkown
page read and write
12E0000
trusted library allocation
page read and write
7DB0000
unkown
page read and write
7DD0000
unkown
page read and write
421C187000
stack
page read and write
3070000
unkown
page read and write
3020000
unkown
page read and write
22BAEE51000
heap
page read and write
3830000
trusted library allocation
page read and write
1390000
unkown
page read and write
1EF224AF000
heap
page read and write
7FF5ED928000
unkown
page readonly
1EF22489000
heap
page read and write
1EF22494000
heap
page read and write
9C4000
heap
page read and write
22BB0781000
heap
page read and write
211885DB000
heap
page read and write
1EF2249C000
heap
page read and write
9C1000
heap
page read and write
1EF21F50000
trusted library allocation
page read and write
1C1615D8000
heap
page read and write
22BB07B4000
heap
page read and write
21188C08000
heap
page read and write
22BAEEB6000
heap
page read and write
22BAE787000
heap
page read and write
1EF22495000
heap
page read and write
22BAE730000
heap
page read and write
2508C48F000
heap
page read and write
2CB0000
trusted library allocation
page read and write
2E90000
heap
page read and write
282B163C000
heap
page read and write
2BA29198000
heap
page read and write
986B000
unkown
page read and write
7FF5ED695000
unkown
page readonly
282B0F41000
heap
page read and write
5AB9000
heap
page read and write
3130000
unkown
page read and write
3610000
trusted library allocation
page read and write
9A10000
unkown
page read and write
2BA29353000
heap
page read and write
9560000
unkown
page read and write
3610000
trusted library allocation
page read and write
1EF23EA3000
heap
page read and write
210BAC65000
heap
page read and write
C507000
unkown
page read and write
12E0000
trusted library allocation
page read and write
9560000
unkown
page read and write
3020000
unkown
page read and write
1E3FEC40000
heap
page read and write
2508BE9E000
heap
page read and write
3756000
unkown
page read and write
7CC0000
unkown
page readonly
7FF5ED91A000
unkown
page readonly
282EAC0E000
heap
page read and write
200C3C42000
heap
page read and write
37F2000
unkown
page read and write
C893000
unkown
page read and write
3060000
unkown
page read and write
5AE0000
heap
page read and write
2C40000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
3060000
unkown
page read and write
F70000
trusted library allocation
page read and write
189D605B000
heap
page read and write
15E3CB65000
heap
page read and write
2E004F0A000
heap
page read and write
3050000
unkown
page read and write
7FF5ED586000
unkown
page readonly
193F5FA9000
heap
page read and write
1EF23EA0000
heap
page read and write
2CB0000
trusted library allocation
page read and write
282B0EF7000
heap
page read and write
1A608537000
heap
page read and write
12E0000
trusted library allocation
page read and write
189D5DE6000
heap
page read and write
4C60000
unkown
page read and write
2E004F10000
heap
page read and write
193F66D0000
heap
page read and write
7FF5ED9C8000
unkown
page readonly
148F000
stack
page read and write
C3C92FF000
stack
page read and write
282B160A000
heap
page read and write
189D5F33000
heap
page read and write
E10000
heap
page read and write
5AD7000
heap
page read and write
15E3CB65000
heap
page read and write
3050000
unkown
page read and write
74E000
heap
page read and write
37B0000
unkown
page read and write
3050000
unkown
page read and write
189D5F6A000
heap
page read and write
7FF5ED433000
unkown
page readonly
1EF224AF000
heap
page read and write
3460000
unkown
page read and write
9C80000
unkown
page read and write
2508C480000
heap
page read and write
12E0000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
15E3D2DC000
heap
page read and write
7FF5ED7E9000
unkown
page readonly
33C0000
unkown
page read and write
D59698F000
stack
page read and write
91C0000
unkown
page read and write
3110000
unkown
page read and write
3060000
unkown
page read and write
22BAEF18000
heap
page read and write
There are 3757 hidden memdumps, click here to show them.