IOC Report
9VgIkx4su0.exe

loading gif

Files

File Path
Type
Category
Malicious
9VgIkx4su0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\3E40.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\FDDB.exe
PE32+ executable (GUI) x86-64, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\dghchav
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\eihchav
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\eihchav:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\9F0D.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\9F0D.tmp-shm
data
dropped
C:\Users\user\AppData\Local\Temp\A5E4.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\A7E9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\AAB9.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\AB18.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\AF9D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\B04A.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\B126.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Roaming\jgjwsvj
data
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\9VgIkx4su0.exe
"C:\Users\user\Desktop\9VgIkx4su0.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\eihchav
C:\Users\user\AppData\Roaming\eihchav
malicious
C:\Users\user\AppData\Local\Temp\3E40.exe
C:\Users\user\AppData\Local\Temp\3E40.exe
malicious
C:\Users\user\AppData\Roaming\dghchav
C:\Users\user\AppData\Roaming\dghchav
malicious
C:\Users\user\AppData\Local\Temp\FDDB.exe
C:\Users\user\AppData\Local\Temp\FDDB.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\System32\cmd.exe
cmd
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /displaydns
malicious
C:\Windows\System32\netsh.exe
netsh firewall show state
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Users\user\AppData\Roaming\dghchav
C:\Users\user\AppData\Roaming\dghchav
malicious
C:\Users\user\AppData\Roaming\eihchav
C:\Users\user\AppData\Roaming\eihchav
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\ROUTE.EXE
route print
C:\Windows\System32\tasklist.exe
tasklist /v /fo csv
There are 26 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.145.40.164/ksa9104.exe
23.145.40.164
malicious
http://unicea.ws/tmp/index.php
malicious
http://nwgrus.ru/tmp/index.php
malicious
https://calvinandhalls.com/search.php
23.145.40.162
malicious
http://tech-servers.in.net/tmp/index.php
malicious
https://calvinandhalls.com/
unknown
https://calvinandhalls.com/earch.php
unknown
https://word.office.comon
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://calvinandhalls.com/application/x-www-form-urlencodedMozilla/5.0
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://calvinandhalls.com/search.phpMozilla/5.0
unknown
https://powerpoint.office.comcember
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://excel.office.com
unknown
http://schemas.micro
unknown
https://www.ecosia.org/newtab/
unknown
https://outlook.com
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://calvinandhalls.com/search.php8
unknown
https://calvinandhalls.com/;
unknown
https://android.notify.windows.com/iOS
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
https://api.msn.com/
unknown
http://crl.v
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://wns.windows.com/)s
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
calvinandhalls.com
23.145.40.162
malicious
nwgrus.ru
190.224.203.37
malicious
bg.microsoft.map.fastly.net
199.232.210.172
s-part-0017.t-0009.t-msedge.net
13.107.246.45
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
187.131.253.169
unknown
Mexico
malicious
190.224.203.37
nwgrus.ru
Argentina
malicious
23.145.40.164
unknown
Reserved
malicious
23.145.40.162
calvinandhalls.com
Reserved
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
There are 191 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2370000
direct allocation
page read and write
malicious
600000
direct allocation
page read and write
malicious
600000
direct allocation
page read and write
malicious
8C1000
system
page execute and read and write
malicious
5F0000
direct allocation
page read and write
malicious
5F0000
direct allocation
page read and write
malicious
20E1000
unclassified section
page read and write
malicious
191000
system
page execute and read and write
malicious
20B0000
direct allocation
page read and write
malicious
2391000
unclassified section
page read and write
malicious
20D1000
unclassified section
page read and write
malicious
621000
unclassified section
page read and write
malicious
222CE00F000
heap
page read and write
30B0000
unkown
page read and write
4C10000
trusted library allocation
page read and write
3240000
unkown
page read and write
30C0000
unkown
page read and write
4C10000
trusted library allocation
page read and write
1650A464000
heap
page read and write
C4BD000
unkown
page read and write
30A0000
unkown
page read and write
2BC292AF000
heap
page read and write
30A0000
unkown
page read and write
1A47FECA000
heap
page read and write
7FF5D7438000
unkown
page readonly
228632C0000
trusted library allocation
page read and write
10E0000
unkown
page read and write
1650A44A000
heap
page read and write
4E0647F000
stack
page read and write
7FF5D7808000
unkown
page readonly
4E0627E000
stack
page read and write
23E0000
trusted library allocation
page read and write
3180000
unkown
page read and write
2147E204000
heap
page read and write
853B000
stack
page read and write
17DCB275000
heap
page read and write
3240000
unkown
page read and write
1AAB2DBD000
heap
page read and write
23E0000
trusted library allocation
page read and write
2440000
heap
page read and write
1A47FECA000
heap
page read and write
1A47FEFA000
heap
page read and write
10E0000
unkown
page read and write
2286368A000
heap
page read and write
1230000
unkown
page read and write
222CDE47000
heap
page read and write
2D20000
trusted library allocation
page read and write
1FDDE9C0000
heap
page read and write
8D0000
trusted library allocation
page read and write
13542479000
heap
page read and write
19EFFF26000
heap
page read and write
B559000
stack
page read and write
2BC28AC0000
trusted library allocation
page read and write
17DCAD04000
heap
page read and write
1150000
unkown
page read and write
1AAB2DAA000
heap
page read and write
13542AAE000
heap
page read and write
1F1168F3000
heap
page read and write
7FF5D75E9000
unkown
page readonly
22863517000
heap
page read and write
1AAB277B000
heap
page read and write
7FF5D778A000
unkown
page readonly
2F1D000
stack
page read and write
30A0000
unkown
page read and write
2EB0000
unkown
page read and write
17DCAD07000
heap
page read and write
2380000
unclassified section
page read and write
8B70000
unkown
page read and write
2EB0000
unkown
page read and write
3200000
unkown
page read and write
600000
trusted library allocation
page read and write
135423A1000
heap
page read and write
19E8057C000
heap
page read and write
B00000
trusted library allocation
page read and write
135423A1000
heap
page read and write
1FDDCB5D000
heap
page read and write
7DF4F2491000
unkown
page execute read
2147E881000
heap
page read and write
8D0000
trusted library allocation
page read and write
5899000
heap
page read and write
3210000
unkown
page read and write
7FF5D741F000
unkown
page readonly
3042000
heap
page read and write
B00000
trusted library allocation
page read and write
22863634000
heap
page read and write
75F8000
unkown
page read and write
23E0000
trusted library allocation
page read and write
3240000
unkown
page read and write
2147E884000
heap
page read and write
3240000
unkown
page read and write
21DDD8E5000
heap
page read and write
17DCB288000
heap
page read and write
19EFFF29000
heap
page read and write
1650A464000
heap
page read and write
1C756605000
heap
page read and write
222CE013000
heap
page read and write
5899000
heap
page read and write
D22C07E000
stack
page read and write
1230000
unkown
page read and write
10E0000
unkown
page read and write
222CDFF4000
heap
page read and write
241947B8000
heap
page read and write
58C0000
heap
page read and write
7FF5D71EF000
unkown
page readonly
1120000
unkown
page read and write
600000
trusted library allocation
page read and write
1650AB39000
heap
page read and write
3240000
unkown
page read and write
17DCB288000
heap
page read and write
1230000
unkown
page read and write
23E0000
trusted library allocation
page read and write
3006000
heap
page read and write
1AAB488F000
heap
page read and write
8B70000
unkown
page read and write
19E8056E000
heap
page read and write
7FF5D7648000
unkown
page readonly
17DCB2AF000
heap
page read and write
5B0000
heap
page read and write
2EE6000
heap
page read and write
1AAB2719000
heap
page read and write
77DB000
unkown
page read and write
30A0000
unkown
page read and write
1A47FECE000
heap
page read and write
9A92000
unkown
page read and write
1F116B22000
heap
page read and write
222CDFEC000
heap
page read and write
8B70000
unkown
page read and write
17DCB288000
heap
page read and write
2147E8A9000
heap
page read and write
19E80598000
heap
page read and write
7FF5D76AF000
unkown
page readonly
4D0000
trusted library allocation
page read and write
C483000
unkown
page read and write
3240000
unkown
page read and write
2147E87E000
heap
page read and write
9DD0DDF000
stack
page read and write
1C756623000
heap
page read and write
30A0000
unkown
page read and write
3030000
unkown
page read and write
2EA0000
unkown
page read and write
30E0000
unkown
page read and write
1FDDCB30000
heap
page read and write
44F000
unkown
page readonly
19E8056A000
heap
page read and write
202EF82B000
heap
page read and write
3240000
unkown
page read and write
1AAB2773000
heap
page read and write
1AAB2DCE000
heap
page read and write
1AAB2DFA000
heap
page read and write
1AAB2768000
heap
page read and write
49FD000
unkown
page read and write
2516777000
stack
page read and write
1A47FEC5000
heap
page read and write
B00000
trusted library allocation
page read and write
1FDDCB6A000
heap
page read and write
1C7564A4000
heap
page read and write
2147E89F000
heap
page read and write
B00000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
222CDFF1000
heap
page read and write
CA2F000
unkown
page read and write
2147E87C000
heap
page read and write
1FDDCB00000
trusted library allocation
page read and write
1A47F737000
heap
page read and write
2286363A000
heap
page read and write
222CDFF5000
heap
page read and write
19EFFF35000
heap
page read and write
2BC292B5000
heap
page read and write
1A47FEEF000
heap
page read and write
B00000
trusted library allocation
page read and write
3290000
unkown
page read and write
3100000
unkown
page read and write
17DCAD0A000
heap
page read and write
8B70000
unkown
page read and write
43F000
unkown
page write copy
8B70000
unkown
page read and write
A3B9000
unkown
page read and write
3240000
unkown
page read and write
3240000
unkown
page read and write
30A0000
unkown
page read and write
3520000
unkown
page readonly
1F116898000
heap
page read and write
43E000
unkown
page read and write
7FF5D7442000
unkown
page readonly
35B3000
unkown
page read and write
1AAB2790000
heap
page read and write
30B0000
unkown
page read and write
600000
trusted library allocation
page read and write
2BC292B4000
heap
page read and write
17DCB27E000
heap
page read and write
1410000
heap
page read and write
21DDD8E9000
heap
page read and write
7FF5D7376000
unkown
page readonly
17DCAB67000
heap
page read and write
21DDD8ED000
heap
page read and write
8D0000
trusted library allocation
page read and write
1AAB277C000
heap
page read and write
1AAB2768000
heap
page read and write
1650AB60000
heap
page read and write
CA3B000
unkown
page read and write
4D0000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
3240000
unkown
page read and write
21F0000
heap
page read and write
C78A000
unkown
page read and write
B00000
trusted library allocation
page read and write
2EB0000
unkown
page read and write
2147E203000
heap
page read and write
7FF5D7760000
unkown
page readonly
4D0000
trusted library allocation
page read and write
1C756604000
heap
page read and write
1C7565F0000
heap
page read and write
1F1168EB000
heap
page read and write
2147E219000
heap
page read and write
19C000
stack
page read and write
4D0000
trusted library allocation
page read and write
524000
heap
page read and write
1F116B19000
heap
page read and write
3240000
unkown
page read and write
1FDDCB3A000
heap
page read and write
C73E000
unkown
page read and write
23E0000
trusted library allocation
page read and write
2147E867000
heap
page read and write
400000
unkown
page readonly
1FDDCB5D000
heap
page read and write
30A0000
unkown
page read and write
19E8056A000
heap
page read and write
7FF5D75CB000
unkown
page readonly
2147E1C8000
heap
page read and write
7DBC000
stack
page read and write
7FF5D76D5000
unkown
page readonly
10E0000
unkown
page read and write
1FDDCB7B000
heap
page read and write
9C0000
heap
page read and write
620000
heap
page read and write
202EFB97000
heap
page read and write
3240000
unkown
page read and write
B85A000
stack
page read and write
35B5000
unkown
page read and write
3240000
unkown
page read and write
8B70000
unkown
page read and write
2147E205000
heap
page read and write
3039000
heap
page read and write
8B70000
unkown
page read and write
10F0000
unkown
page read and write
7FF5D7523000
unkown
page readonly
3240000
unkown
page read and write
1AAB272B000
heap
page read and write
E3B000
heap
page read and write
222CDFD3000
heap
page read and write
302F000
heap
page read and write
4B0000
heap
page read and write
202EF825000
heap
page read and write
3240000
unkown
page read and write
3240000
unkown
page read and write
1A47FEFC000
heap
page read and write
3090000
unkown
page read and write
19EFFF56000
heap
page read and write
2147E867000
heap
page read and write
1AAB26F7000
heap
page read and write
19E80562000
heap
page read and write
A3B6000
unkown
page read and write
1BF53A80000
heap
page read and write
600000
trusted library allocation
page read and write
C973000
unkown
page read and write
23E0000
trusted library allocation
page read and write
2147E89F000
heap
page read and write
1A47FEE5000
heap
page read and write
362D000
unkown
page read and write
2F79000
heap
page read and write
301D000
heap
page read and write
2B8CE7F000
stack
page read and write
3337000
heap
page read and write
5899000
heap
page read and write
3240000
unkown
page read and write
2EB0000
unkown
page read and write
7FF5D748C000
unkown
page readonly
C7BE000
unkown
page read and write
30A0000
unkown
page read and write
3240000
unkown
page read and write
524000
heap
page read and write
C7CB000
unkown
page read and write
1AAB272B000
heap
page read and write
1A47F772000
heap
page read and write
2286352C000
heap
page read and write
30A0000
unkown
page read and write
30B0000
unkown
page read and write
19EFFEF0000
heap
page read and write
10F0000
unkown
page read and write
8B70000
unkown
page read and write
7FF5D7244000
unkown
page readonly
30A0000
unkown
page read and write
1AAB26B0000
trusted library allocation
page read and write
1AAB272B000
heap
page read and write
1FDDCA53000
heap
page read and write
2147E231000
heap
page read and write
13542359000
heap
page read and write
19E8059C000
heap
page read and write
7FF5D781A000
unkown
page readonly
33F0000
unkown
page read and write
35D1000
unkown
page read and write
8B70000
unkown
page read and write
B00000
trusted library allocation
page read and write
1FDDCA63000
heap
page read and write
2EB0000
unkown
page read and write
3210000
unkown
page read and write
2147E030000
heap
page read and write
3090000
unkown
page read and write
5FE000
heap
page read and write
12B1000
system
page execute and read and write
1AAB2DC7000
heap
page read and write
1A47F737000
heap
page read and write
1650AB54000
heap
page read and write
2147E89F000
heap
page read and write
1AAB279D000
heap
page read and write
2BC292A0000
heap
page read and write
3009000
heap
page read and write
1A47FEDE000
heap
page read and write
24194B25000
heap
page read and write
CA29000
unkown
page read and write
A286000
unkown
page read and write
3240000
unkown
page read and write
8890000
unkown
page readonly
9DD0D5F000
stack
page read and write
7EE000
stack
page read and write
8D3F000
stack
page read and write
1F116B22000
heap
page read and write
2147E88C000
heap
page read and write
7FF5D748A000
unkown
page readonly
1AAB2E13000
heap
page read and write
22863348000
heap
page read and write
4C10000
trusted library allocation
page read and write
D22BE7B000
stack
page read and write
1062B000
unkown
page read and write
8D0000
trusted library allocation
page read and write
789000
heap
page read and write
7FF5D66E3000
unkown
page readonly
7FF5D71BF000
unkown
page readonly
9430000
unkown
page read and write
222CE016000
heap
page read and write
A9FD000
unkown
page read and write
2BC28B04000
heap
page read and write
1230000
unkown
page read and write
222CE00F000
heap
page read and write
1C756625000
heap
page read and write
4D30000
heap
page read and write
8965000
unkown
page read and write
1AAB286B000
heap
page read and write
2EB0000
unkown
page read and write
650000
heap
page read and write
1AAB274F000
heap
page read and write
7FF5D7837000
unkown
page readonly
B00000
trusted library allocation
page read and write
22863540000
heap
page read and write
30D0000
unkown
page read and write
1F1167E0000
heap
page read and write
1F1168E5000
heap
page read and write
7FF5D7546000
unkown
page readonly
21DDF5E4000
heap
page read and write
3240000
unkown
page read and write
2EB0000
unkown
page read and write
5899000
heap
page read and write
1650AB60000
heap
page read and write
10E0000
unkown
page read and write
23E0000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
3240000
unkown
page read and write
8A70000
unkown
page read and write
600000
trusted library allocation
page read and write
3290000
unkown
page read and write
1A47FEFC000
heap
page read and write
3030000
unkown
page read and write
85BE000
stack
page read and write
BE49000
stack
page read and write
CA25000
unkown
page read and write
44F000
unkown
page readonly
3240000
unkown
page read and write
7FF5D6A4B000
unkown
page readonly
1FDDCB5D000
heap
page read and write
589A000
heap
page read and write
4A71000
unkown
page read and write
17DCB278000
heap
page read and write
8B70000
unkown
page read and write
1A47F8F0000
heap
page read and write
1A47FEE4000
heap
page read and write
1FDDCB5D000
heap
page read and write
30B0000
unkown
page read and write
17DCB29A000
heap
page read and write
35C9000
unkown
page read and write
8D0000
trusted library allocation
page read and write
C20000
heap
page read and write
3014000
heap
page read and write
1FDDCA39000
heap
page read and write
17DCAB8F000
heap
page read and write
7FF5D769E000
unkown
page readonly
7FF5D7455000
unkown
page readonly
600000
trusted library allocation
page read and write
2EB0000
unkown
page read and write
1650AB44000
heap
page read and write
7FF5D74FA000
unkown
page readonly
3090000
unkown
page read and write
17DCB27D000
heap
page read and write
3052000
heap
page read and write
1AAB4651000
heap
page read and write
600000
trusted library allocation
page read and write
3240000
unkown
page read and write
2EA0000
unkown
page read and write
4FAB000
heap
page read and write
20A0000
direct allocation
page read and write
1F116C20000
heap
page read and write
1FDDC9B0000
heap
page read and write
2BC29293000
heap
page read and write
30B0000
unkown
page read and write
CA33000
unkown
page read and write
10E0000
unkown
page read and write
1230000
unkown
page read and write
C65E000
unkown
page read and write
1230000
unkown
page read and write
24194794000
heap
page read and write
5DE000
stack
page read and write
2EB0000
unkown
page read and write
17DCAB51000
heap
page read and write
600000
trusted library allocation
page read and write
2286352C000
heap
page read and write
4E062FE000
stack
page read and write
222CDFD5000
heap
page read and write
CA39000
unkown
page read and write
1F116AEE000
heap
page read and write
1A47FEEA000
heap
page read and write
5899000
heap
page read and write
2147E355000
heap
page read and write
400000
unkown
page readonly
338C000
stack
page read and write
7C387E000
stack
page read and write
AA01000
unkown
page read and write
7FF6DFE31000
unkown
page readonly
C800000
unkown
page read and write
3090000
unkown
page read and write
202EFBAA000
heap
page read and write
3030000
unkown
page read and write
600000
trusted library allocation
page read and write
3170000
unkown
page read and write
2EB0000
unkown
page read and write
1AAB272B000
heap
page read and write
23E0000
trusted library allocation
page read and write
C00000
heap
page read and write
222CDE65000
heap
page read and write
2BC292BC000
heap
page read and write
600000
trusted library allocation
page read and write
1A47F77C000
heap
page read and write
8D0000
trusted library allocation
page read and write
202EF518000
heap
page read and write
105A2000
unkown
page read and write
20A0000
heap
page read and write
1F116B09000
heap
page read and write
30B0000
unkown
page read and write
17DCCBF0000
heap
page read and write
17DCACD0000
trusted library allocation
page read and write
1FDDCA59000
heap
page read and write
9C000
stack
page read and write
1C756608000
heap
page read and write
B00000
trusted library allocation
page read and write
3240000
unkown
page read and write
15D000
stack
page read and write
222CDFEE000
heap
page read and write
17DCB26E000
heap
page read and write
2147E864000
heap
page read and write
A33F000
unkown
page read and write
222CDFD7000
heap
page read and write
19EFFF4B000
heap
page read and write
2EB0000
unkown
page read and write
2D20000
trusted library allocation
page read and write
17DCB270000
heap
page read and write
1FDDCB32000
heap
page read and write
1C756060000
heap
page read and write
24194799000
heap
page read and write
B00000
trusted library allocation
page read and write
6481DBF000
stack
page read and write
8D0000
trusted library allocation
page read and write
F0C000
heap
page read and write
3626000
unkown
page read and write
1C7564A0000
heap
page read and write
19E8057E000
heap
page read and write
19E81E20000
heap
page read and write
7FF5D732D000
unkown
page readonly
7FF5D75B3000
unkown
page readonly
3090000
unkown
page read and write
8B70000
unkown
page read and write
3280000
unkown
page read and write
10E0000
unkown
page read and write
1F116B19000
heap
page read and write
1FDDCB6B000
heap
page read and write
3240000
unkown
page read and write
17DCB271000
heap
page read and write
600000
trusted library allocation
page read and write
22863358000
heap
page read and write
3240000
unkown
page read and write
1F1168A2000
heap
page read and write
17DCAB60000
heap
page read and write
3240000
unkown
page read and write
35D3000
unkown
page read and write
B00000
trusted library allocation
page read and write
2147E892000
heap
page read and write
10E0000
unkown
page read and write
2EB0000
unkown
page read and write
5BE12FF000
stack
page read and write
3240000
unkown
page read and write
3180000
unkown
page read and write
202EF517000
heap
page read and write
17DCB2AC000
heap
page read and write
7FF5D7391000
unkown
page readonly
4D0000
trusted library allocation
page read and write
7FF5D74B8000
unkown
page readonly
3200000
unkown
page read and write
9A76000
unkown
page read and write
5479000
unkown
page read and write
32B0000
heap
page read and write
222CE00F000
heap
page read and write
19E80020000
trusted library allocation
page read and write
10F0000
unkown
page read and write
1AAB2DD2000
heap
page read and write
222CE020000
heap
page read and write
2EA0000
unkown
page read and write
8B70000
unkown
page read and write
7DC0000
unkown
page readonly
22863378000
heap
page read and write
1FDDCA36000
heap
page read and write
202EFB9E000
heap
page read and write
3240000
unkown
page read and write
A39C000
unkown
page read and write
2147E86E000
heap
page read and write
1650AB62000
heap
page read and write
21DDD8CF000
heap
page read and write
10E0000
unkown
page read and write
13542450000
heap
page read and write
4571000
heap
page read and write
3240000
unkown
page read and write
2147E877000
heap
page read and write
3240000
unkown
page read and write
B0BD000
stack
page read and write
222CDE8C000
heap
page read and write
10F0000
unkown
page read and write
17DCB29E000
heap
page read and write
4D0000
trusted library allocation
page read and write
1C755FB5000
heap
page read and write
10E0000
unkown
page read and write
1F116AF8000
heap
page read and write
135422D0000
trusted library allocation
page read and write
222CDFFF000
heap
page read and write
1AAB2711000
heap
page read and write
540000
heap
page read and write
5899000
heap
page read and write
1230000
unkown
page read and write
443000
unkown
page read and write
1650AB60000
heap
page read and write
8D0000
trusted library allocation
page read and write
1100000
unkown
page read and write
1AAB272B000
heap
page read and write
24194B20000
heap
page read and write
C0BA000
stack
page read and write
A313000
unkown
page read and write
302B000
heap
page read and write
30A0000
unkown
page read and write
95F000
stack
page read and write
40E000
unkown
page readonly
84C0000
unkown
page read and write
17DCCC00000
heap
page read and write
1C755FB6000
heap
page read and write
A9B1CFF000
stack
page read and write
1A47F72E000
heap
page read and write
7FF5D7215000
unkown
page readonly
3014000
heap
page read and write
74A000
heap
page read and write
58BC000
heap
page read and write
B7DD000
stack
page read and write
C9A7000
unkown
page read and write
7FF5D776D000
unkown
page readonly
21DDF523000
heap
page read and write
4B0000
heap
page read and write
7FF5D723F000
unkown
page readonly
30B0000
unkown
page read and write
A416000
unkown
page read and write
222CDFE9000
heap
page read and write
1AAB272B000
heap
page read and write
CB6000
system
page execute and read and write
2EB0000
unkown
page read and write
1AAB27B0000
heap
page read and write
1AAB272D000
heap
page read and write
BE90000
unkown
page read and write
17DCAB35000
heap
page read and write
600000
trusted library allocation
page read and write
5BA000
heap
page read and write
1F116B0E000
heap
page read and write
524000
heap
page read and write
30B0000
unkown
page read and write
3006000
heap
page read and write
B00000
trusted library allocation
page read and write
1650AB60000
heap
page read and write
17DCB2AC000
heap
page read and write
8B70000
unkown
page read and write
12B0000
unkown
page read and write
30A0000
unkown
page read and write
40E000
unkown
page readonly
1383000
heap
page read and write
F51C000
unkown
page read and write
8B70000
unkown
page read and write
600000
trusted library allocation
page read and write
2EB0000
unkown
page read and write
115E000
stack
page read and write
2147E88B000
heap
page read and write
B00000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
893D000
unkown
page read and write
600000
trusted library allocation
page read and write
2EB0000
unkown
page read and write
40B000
unkown
page execute read
8B70000
unkown
page read and write
1AAB26F5000
heap
page read and write
1230000
unkown
page read and write
B00000
trusted library allocation
page read and write
4C4E000
stack
page read and write
58CC000
heap
page read and write
13542367000
heap
page read and write
4D0000
trusted library allocation
page read and write
7FF5D75F2000
unkown
page readonly
3240000
unkown
page read and write
B00000
trusted library allocation
page read and write
11C1000
unkown
page read and write
B00000
trusted library allocation
page read and write
7FF5D76DA000
unkown
page readonly
8870000
unkown
page readonly
1C7560C0000
heap
page read and write
7FF5D7396000
unkown
page readonly
1AAB2DF6000
heap
page read and write
7FF5D747F000
unkown
page readonly
1AAB2DBE000
heap
page read and write
B80CF7F000
stack
page read and write
58D5000
heap
page read and write
17DCAB54000
heap
page read and write
1F116B0E000
heap
page read and write
13542AAA000
heap
page read and write
401000
unkown
page execute read
7FF5D71E0000
unkown
page readonly
2EB0000
unkown
page read and write
1AAB4892000
heap
page read and write
1A47FEE7000
heap
page read and write
600000
trusted library allocation
page read and write
22863396000
heap
page read and write
1650C530000
heap
page read and write
4D0000
trusted library allocation
page read and write
3160000
unkown
page read and write
1F116AE2000
heap
page read and write
22863637000
heap
page read and write
58AC000
heap
page read and write
C1CC000
stack
page read and write
1354245F000
heap
page read and write
30A0000
unkown
page read and write
3240000
unkown
page read and write
1AAB488F000
heap
page read and write
1C7564AE000
heap
page read and write
7FF5D71C8000
unkown
page readonly
7FF5D7398000
unkown
page readonly
13542386000
heap
page read and write
E2E000
heap
page read and write
1C755F68000
heap
page read and write
23E0000
trusted library allocation
page read and write
7FF5D77E9000
unkown
page readonly
B00000
trusted library allocation
page read and write
3080000
unkown
page read and write
6481D3F000
stack
page read and write
1F116C25000
heap
page read and write
81F000
stack
page read and write
E4C000
heap
page read and write
30B0000
unkown
page read and write
58C0000
heap
page read and write
2147E1F8000
heap
page read and write
23E0000
trusted library allocation
page read and write
135423A1000
heap
page read and write
1AAB272B000
heap
page read and write
443000
unkown
page read and write
23E0000
trusted library allocation
page read and write
3140000
unkown
page read and write
1FDDCB4F000
heap
page read and write
7FF5D71A6000
unkown
page readonly
1AAB2758000
heap
page read and write
1AAB2714000
heap
page read and write
2BC29297000
heap
page read and write
1C755F92000
heap
page read and write
8B70000
unkown
page read and write
1650A9E3000
heap
page read and write
7FF5D76F5000
unkown
page readonly
2EB0000
unkown
page read and write
17DCAB45000
heap
page read and write
997C000
stack
page read and write
21DDD860000
heap
page read and write
1AAB2781000
heap
page read and write
1FDDCA68000
heap
page read and write
21DDD6F0000
heap
page read and write
1C755F20000
trusted library allocation
page read and write
7AC0000
unkown
page read and write
1395000
heap
page read and write
579B000
heap
page read and write
30D0000
unkown
page read and write
524000
heap
page read and write
E0FF5FF000
stack
page read and write
8B70000
unkown
page read and write
1AAB26D7000
heap
page read and write
13542483000
heap
page read and write
222CDFF5000
heap
page read and write
B00000
trusted library allocation
page read and write
1AAB2E47000
heap
page read and write
2516A7F000
stack
page read and write
2EB0000
unkown
page read and write
19E80000000
heap
page read and write
5899000
heap
page read and write
8D0000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
202EFBBE000
heap
page read and write
9E2E000
stack
page read and write
2EA0000
unkown
page read and write
1A47FEE5000
heap
page read and write
222CDE42000
heap
page read and write
2EB0000
unkown
page read and write
F797DFF000
stack
page read and write
17DCAB54000
heap
page read and write
1AAB2E0A000
heap
page read and write
1650A454000
heap
page read and write
1AAB27B0000
heap
page read and write
9D67000
unkown
page read and write
69E000
heap
page read and write
1FDDCA6F000
heap
page read and write
B1F000
stack
page read and write
8B70000
unkown
page read and write
1A47F772000
heap
page read and write
2EB0000
unkown
page read and write
2F7E000
stack
page read and write
2147E870000
heap
page read and write
7FF5D77B6000
unkown
page readonly
1C7565FD000
heap
page read and write
2090000
direct allocation
page execute and read and write
30E0000
unkown
page read and write
600000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
3090000
unkown
page read and write
17DCAD05000
heap
page read and write
13544420000
heap
page read and write
2147E110000
heap
page read and write
222CDFFC000
heap
page read and write
1FDDCB6A000
heap
page read and write
3240000
unkown
page read and write
3240000
unkown
page read and write
202EFBA4000
heap
page read and write
1C75661B000
heap
page read and write
1A47FED9000
heap
page read and write
600000
trusted library allocation
page read and write
7FF6DFE21000
unkown
page execute read
1650A464000
heap
page read and write
8B70000
unkown
page read and write
3027000
heap
page read and write
2EB0000
unkown
page read and write
1F116B19000
heap
page read and write
3240000
unkown
page read and write
21DDD8E2000
heap
page read and write
1F116B1C000
heap
page read and write
5BE0FBF000
stack
page read and write
1650A5BA000
heap
page read and write
4D0000
trusted library allocation
page read and write
222CDDE0000
heap
page read and write
E4CB000
stack
page read and write
1F116B1C000
heap
page read and write
21DDF523000
heap
page read and write
1A47FEFB000
heap
page read and write
19E8008A000
heap
page read and write
1E4000
heap
page read and write
7FF5D779E000
unkown
page readonly
8D0000
trusted library allocation
page read and write
2EB0000
unkown
page read and write
58B7000
heap
page read and write
1FDDCB76000
heap
page read and write
8931000
unkown
page read and write
1AAB2DE7000
heap
page read and write
3008000
heap
page read and write
2BC292B6000
heap
page read and write
17DCB296000
heap
page read and write
222CE00F000
heap
page read and write
8D0000
trusted library allocation
page read and write
2FA0000
remote allocation
page read and write
3240000
unkown
page read and write
A391000
unkown
page read and write
AA07000
unkown
page read and write
2286339F000
heap
page read and write
3240000
unkown
page read and write
1C755F9E000
heap
page read and write
1C755F20000
trusted library allocation
page read and write
1FDDCB70000
heap
page read and write
3240000
unkown
page read and write
222CDE96000
heap
page read and write
B00000
trusted library allocation
page read and write
7FF5D7284000
unkown
page readonly
2BC292AC000
heap
page read and write
5FA000
heap
page read and write
21DDD91C000
heap
page read and write
2EB0000
unkown
page read and write
1A47F786000
heap
page read and write
1F1168E2000
heap
page read and write
1C755F60000
heap
page read and write
600000
trusted library allocation
page read and write
4A90000
unkown
page read and write
8B70000
unkown
page read and write
7FF5D7792000
unkown
page readonly
202EFB9F000
heap
page read and write
3090000
unkown
page read and write
7B20000
unkown
page read and write
A3AC000
unkown
page read and write
1AAB272B000
heap
page read and write
13542470000
heap
page read and write
1C7560CA000
heap
page read and write
3240000
unkown
page read and write
40E000
unkown
page readonly
7AA0000
unkown
page read and write
1A47FEFA000
heap
page read and write
7FF5D75F6000
unkown
page readonly
1AAB2DEE000
heap
page read and write
1FDDCB51000
heap
page read and write
1AAB272B000
heap
page read and write
84F000
stack
page read and write
7FF5D775C000
unkown
page readonly
8B70000
unkown
page read and write
2147E88B000
heap
page read and write
3240000
unkown
page read and write
400000
unkown
page execute and read and write
9AE000
stack
page read and write
3290000
unkown
page read and write
1AAB271A000
heap
page read and write
1BF53D60000
heap
page read and write
8B70000
unkown
page read and write
1650A5B0000
heap
page read and write
30A0000
unkown
page read and write
843F000
stack
page read and write
7FF5D771A000
unkown
page readonly
2BC28B25000
heap
page read and write
1AAB2DEE000
heap
page read and write
1230000
unkown
page read and write
7FF5D7691000
unkown
page readonly
3240000
unkown
page read and write
3240000
unkown
page read and write
84BB000
stack
page read and write
9B41000
unkown
page read and write
1C75661C000
heap
page read and write
228633A8000
heap
page read and write
8D0000
trusted library allocation
page read and write
1C755FBB000
heap
page read and write
30A0000
unkown
page read and write
13542389000
heap
page read and write
1230000
unkown
page read and write
43E000
unkown
page read and write
2EB0000
unkown
page read and write
AAA0000
unkown
page read and write
1FDDCB80000
heap
page read and write
2EB0000
unkown
page read and write
7FF5D738E000
unkown
page readonly
60F000
heap
page execute and read and write
222CDFFC000
heap
page read and write
2516AFF000
stack
page read and write
600000
trusted library allocation
page read and write
1A47F772000
heap
page read and write
23E0000
trusted library allocation
page read and write
8C39000
stack
page read and write
8B70000
unkown
page read and write
2BC292BC000
heap
page read and write
28F87FE000
stack
page read and write
2FD7000
heap
page read and write
5899000
heap
page read and write
222CDE64000
heap
page read and write
769A000
unkown
page read and write
1AAB2E88000
heap
page read and write
1AAB2860000
heap
page read and write
4D0000
trusted library allocation
page read and write
7FF5D7075000
unkown
page readonly
3240000
unkown
page read and write
2EB0000
unkown
page read and write
135423A3000
heap
page read and write
C4C6000
unkown
page read and write
7FF5D772C000
unkown
page readonly
7FF5D77DA000
unkown
page readonly
17DCB283000
heap
page read and write
3240000
unkown
page read and write
C3CD000
stack
page read and write
22863395000
heap
page read and write
49D6000
unkown
page read and write
225B4380000
heap
page read and write
2BC28AB0000
heap
page read and write
22863524000
heap
page read and write
1A47F732000
heap
page read and write
202EF535000
heap
page read and write
5899000
heap
page read and write
7C33D7000
stack
page read and write
30B0000
unkown
page read and write
8B70000
unkown
page read and write
1AAB27B0000
heap
page read and write
3006000
heap
page read and write
1354245C000
heap
page read and write
B00000
trusted library allocation
page read and write
2130000
heap
page read and write
1AAB2E54000
heap
page read and write
600000
trusted library allocation
page read and write
202EF840000
heap
page read and write
8D0000
trusted library allocation
page read and write
3240000
unkown
page read and write
B00000
trusted library allocation
page read and write
10E0000
unkown
page read and write
8D0000
trusted library allocation
page read and write
1AAB2787000
heap
page read and write
58C0000
heap
page read and write
8B70000
unkown
page read and write
B00000
trusted library allocation
page read and write
7618000
unkown
page read and write
A0A9000
stack
page read and write
91F0000
unkown
page readonly
17DCB27C000
heap
page read and write
1650A9E0000
heap
page read and write
222CDD70000
heap
page read and write
747000
system
page execute and read and write
1650AB54000
heap
page read and write
135423B7000
heap
page read and write
7FF5D783B000
unkown
page readonly
22863620000
heap
page read and write
1FDDCC75000
heap
page read and write
2BC292AE000
heap
page read and write
43F000
unkown
page write copy
7C80000
unkown
page read and write
6D9000
heap
page read and write
222CDFDA000
heap
page read and write
4986000
unkown
page read and write
6481CB7000
stack
page read and write
1AAB277B000
heap
page read and write
1C75660E000
heap
page read and write
3080000
unkown
page read and write
CB1000
system
page execute and read and write
1AAB2DE9000
heap
page read and write
9AF9000
unkown
page read and write
600000
trusted library allocation
page read and write
1AAB2E17000
heap
page read and write
A2A2000
unkown
page read and write
600000
trusted library allocation
page read and write
3090000
unkown
page read and write
3240000
unkown
page read and write
7C31000
unkown
page read and write
2147E86A000
heap
page read and write
241947A3000
heap
page read and write
8D0000
trusted library allocation
page read and write
7FF5D71D7000
unkown
page readonly
13542470000
heap
page read and write
1AAB278B000
heap
page read and write
8B70000
unkown
page read and write
600000
trusted library allocation
page read and write
202EFBBC000
heap
page read and write
7FF5D7482000
unkown
page readonly
8B70000
unkown
page read and write
2EA0000
unkown
page read and write
1C75662A000
heap
page read and write
1F116AE7000
heap
page read and write
3007000
heap
page read and write
3014000
heap
page read and write
600000
trusted library allocation
page read and write
3030000
unkown
page read and write
10E0000
unkown
page read and write
2BC28AE7000
heap
page read and write
1A47FEDC000
heap
page read and write
B00000
trusted library allocation
page read and write
3240000
unkown
page read and write
600000
trusted library allocation
page read and write
BFB8000
stack
page read and write
600000
trusted library allocation
page read and write
222CDE68000
heap
page read and write
2EA0000
unkown
page read and write
1AAB2768000
heap
page read and write
401000
unkown
page execute read
4C8F000
stack
page read and write
BF3E000
stack
page read and write
A9E9000
unkown
page read and write
2EB0000
unkown
page read and write
1C75661A000
heap
page read and write
1AAB2711000
heap
page read and write
1AAB2DBC000
heap
page read and write
3240000
unkown
page read and write
8D0000
trusted library allocation
page read and write
1AAB2768000
heap
page read and write
5F0000
heap
page read and write
17DCB286000
heap
page read and write
3240000
unkown
page read and write
1AAB2DA4000
heap
page read and write
1230000
unkown
page read and write
3006000
heap
page read and write
21DDD8E2000
heap
page read and write
58B7000
heap
page read and write
7FF5D7289000
unkown
page readonly
1AAB272B000
heap
page read and write
2BC28B30000
heap
page read and write
94F4000
unkown
page read and write
524000
heap
page read and write
21DDD7D0000
heap
page read and write
7FF5D719C000
unkown
page readonly
17DCAB46000
heap
page read and write
33C0000
unkown
page read and write
1AAB2768000
heap
page read and write
3240000
unkown
page read and write
530000
heap
page read and write
1F116AE5000
heap
page read and write
23E0000
trusted library allocation
page read and write
19E80584000
heap
page read and write
13542386000
heap
page read and write
2EA0000
unkown
page read and write
4E05FA7000
stack
page read and write
600000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
1A47F755000
heap
page read and write
1F116B19000
heap
page read and write
1F116B21000
heap
page read and write
1FDDCB3A000
heap
page read and write
222CDE30000
heap
page read and write
3037000
heap
page read and write
30A0000
unkown
page read and write
44F000
unkown
page readonly
3A1B0FF000
stack
page read and write
21DDF4F1000
heap
page read and write
30A0000
unkown
page read and write
8D0000
trusted library allocation
page read and write
7FF5D7797000
unkown
page readonly
13542290000
heap
page read and write
A50000
heap
page read and write
1AAB2DC1000
heap
page read and write
7FF5D75B8000
unkown
page readonly
1AAB272B000
heap
page read and write
2430000
heap
page read and write
4D0000
trusted library allocation
page read and write
1230000
unkown
page read and write
3080000
unkown
page read and write
44F000
unkown
page readonly
2EA0000
unkown
page read and write
3009000
heap
page read and write
2B8CEFE000
stack
page read and write
2EB0000
unkown
page read and write
9C000
stack
page read and write
CA21000
unkown
page read and write
3A1ACE7000
stack
page read and write
7AE0000
unkown
page read and write
1AAB272B000
heap
page read and write
8DD0000
stack
page read and write
22863520000
heap
page read and write
2BC292B4000
heap
page read and write
3489000
stack
page read and write
3240000
unkown
page read and write
2EB0000
unkown
page read and write
1650AB4D000
heap
page read and write
241947BB000
heap
page read and write
4C10000
trusted library allocation
page read and write
2286351C000
heap
page read and write
2BC28B25000
heap
page read and write
1AAB272B000
heap
page read and write
3240000
unkown
page read and write
7FF5D75FF000
unkown
page readonly
600000
trusted library allocation
page read and write
1FDDCA59000
heap
page read and write
7FF5D7450000
unkown
page readonly
1C755FB6000
heap
page read and write
1650A45A000
heap
page read and write
B00000
trusted library allocation
page read and write
4AE000
stack
page read and write
A237000
unkown
page read and write
600000
trusted library allocation
page read and write
1C7564AA000
heap
page read and write
22863630000
heap
page read and write
1AAB27E0000
trusted library allocation
page read and write
2BC292BC000
heap
page read and write
1A47F765000
heap
page read and write
44F000
unkown
page readonly
17DCAB4F000
heap
page read and write
2EA0000
unkown
page read and write
22863270000
heap
page read and write
10664000
unkown
page read and write
2147E224000
heap
page read and write
3240000
unkown
page read and write
B980000
unkown
page readonly
88F000
stack
page read and write
2F5D000
stack
page read and write
22863353000
heap
page read and write
2147E862000
heap
page read and write
2BC29292000
heap
page read and write
4D0000
trusted library allocation
page read and write
2140000
heap
page read and write
87E8000
unkown
page read and write
1A47F775000
heap
page read and write
222CDEA2000
heap
page read and write
2BC292B9000
heap
page read and write
7FF5D7309000
unkown
page readonly
1A47FEC7000
heap
page read and write
A23A000
unkown
page read and write
1AAB4750000
heap
page read and write
C615000
unkown
page read and write
30B0000
unkown
page read and write
3210000
unkown
page read and write
22863393000
heap
page read and write
202EF824000
heap
page read and write
7FF5D72D7000
unkown
page readonly
1AAB272B000
heap
page read and write
3500000
stack
page read and write
3240000
unkown
page read and write
2147E88F000
heap
page read and write
1FDDCA6C000
heap
page read and write
1C755FC2000
heap
page read and write
2147E88B000
heap
page read and write
2BC28B08000
heap
page read and write
7FF5D72BF000
unkown
page readonly
1C755F77000
heap
page read and write
3090000
unkown
page read and write
3080000
unkown
page read and write
AE1D000
stack
page read and write
23E0000
trusted library allocation
page read and write
24194770000
heap
page read and write
2147E216000
heap
page read and write
3240000
unkown
page read and write
1F0000
heap
page read and write
3240000
unkown
page read and write
202EF533000
heap
page read and write
63B000
heap
page read and write
1AAB2DCE000
heap
page read and write
23E0000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
2147E892000
heap
page read and write
2286351F000
heap
page read and write
30A0000
unkown
page read and write
30B0000
unkown
page read and write
202EF4A0000
trusted library allocation
page read and write
1F116AEB000
heap
page read and write
401000
unkown
page execute read
1F1168D1000
heap
page read and write
40E000
unkown
page readonly
4980000
unkown
page read and write
2D20000
trusted library allocation
page read and write
8B70000
unkown
page read and write
4D0000
trusted library allocation
page read and write
1AAB2DF5000
heap
page read and write
2EA0000
unkown
page read and write
10E0000
unkown
page read and write
443000
unkown
page read and write
1650A9E5000
heap
page read and write
2BC292A8000
heap
page read and write
19E80020000
trusted library allocation
page read and write
1FDDCB4C000
heap
page read and write
CA53000
unkown
page read and write
3240000
unkown
page read and write
7FF5D77C2000
unkown
page readonly
2286337B000
heap
page read and write
3240000
unkown
page read and write
B00000
trusted library allocation
page read and write
1AAB2DAE000
heap
page read and write
19D000
stack
page read and write
B00000
trusted library allocation
page read and write
2EB0000
unkown
page read and write
17DCB26C000
heap
page read and write
202EFBB9000
heap
page read and write
23E0000
trusted library allocation
page read and write
30E0000
unkown
page read and write
22863340000
heap
page read and write
13542300000
heap
page read and write
2EB0000
unkown
page read and write
30A0000
unkown
page read and write
58B3000
heap
page read and write
19E80564000
heap
page read and write
30A0000
unkown
page read and write
7FF5D706E000
unkown
page readonly
19E80563000
heap
page read and write
1F116B0E000
heap
page read and write
10F0000
unkown
page read and write
30A0000
unkown
page read and write
22863525000
heap
page read and write
30B0000
unkown
page read and write
2EB0000
unkown
page read and write
1FDDCB70000
heap
page read and write
4560000
heap
page read and write
1650A9E4000
heap
page read and write
2FE1000
system
page execute and read and write
2286353A000
heap
page read and write
1A47F940000
heap
page read and write
13542460000
heap
page read and write
1650A44B000
heap
page read and write
B00000
trusted library allocation
page read and write
22863528000
heap
page read and write
1AAB2781000
heap
page read and write
1F1167D0000
heap
page read and write
17DCB2AF000
heap
page read and write
302F000
heap
page read and write
3A1B17F000
stack
page read and write
9AB2000
unkown
page read and write
202EF84A000
heap
page read and write
30A0000
unkown
page read and write
1650AB4D000
heap
page read and write
3019000
heap
page read and write
17DCAB51000
heap
page read and write
4A0E000
unkown
page read and write
1250000
unkown
page read and write
AA49000
unkown
page read and write
23E0000
trusted library allocation
page read and write
4D0000
trusted library allocation
page read and write
3014000
heap
page read and write
2147E86E000
heap
page read and write
600000
trusted library allocation
page read and write
1AAB2E7F000
heap
page read and write
C5F8000
unkown
page read and write
1AAB272B000
heap
page read and write
2FA0000
remote allocation
page read and write
13542386000
heap
page read and write
3240000
unkown
page read and write
7FF5D75C1000
unkown
page readonly
17DCB296000
heap
page read and write
600000
trusted library allocation
page read and write
1FDDCA6A000
heap
page read and write
C4DC000
unkown
page read and write
A9B1927000
stack
page read and write
1FDDCA5E000
heap
page read and write
8B70000
unkown
page read and write
7FF6DFE31000
unkown
page readonly
1AAB2DA5000
heap
page read and write
13542AAA000
heap
page read and write
2147E226000
heap
page read and write
8B70000
unkown
page read and write
17DCAB34000
heap
page read and write
19E80085000
heap
page read and write
7FF5D76C8000
unkown
page readonly
9ABD000
unkown
page read and write
17DCAB17000
heap
page read and write
1AAB2DEA000
heap
page read and write
2147E216000
heap
page read and write
4C10000
trusted library allocation
page read and write
2147E216000
heap
page read and write
10E0000
unkown
page read and write
300B000
heap
page read and write
8B70000
unkown
page read and write
CA27000
unkown
page read and write
7FF5D777A000
unkown
page readonly
1A47F775000
heap
page read and write
3030000
unkown
page read and write
1AAB2DB0000
heap
page read and write
8D0000
trusted library allocation
page read and write
1AAB272B000
heap
page read and write
810000
heap
page read and write
58B7000
heap
page read and write
1650A464000
heap
page read and write
1FDDCB75000
heap
page read and write
1100000
unkown
page read and write
222CDFF0000
heap
page read and write
30A0000
unkown
page read and write
7FF5D77A8000
unkown
page readonly
3240000
unkown
page read and write
58BC000
heap
page read and write
2EB0000
unkown
page read and write
6395DFE000
stack
page read and write
202EF4A0000
trusted library allocation
page read and write
1F116B04000
heap
page read and write
8C7000
system
page execute and read and write
1AAB2775000
heap
page read and write
1F116AEA000
heap
page read and write
202EF535000
heap
page read and write
2EB0000
unkown
page read and write
2147E8A0000
heap
page read and write
202EF538000
heap
page read and write
3200000
unkown
page read and write
1650AB49000
heap
page read and write
1AAB2DC1000
heap
page read and write
3240000
unkown
page read and write
3240000
unkown
page read and write
19E8056B000
heap
page read and write
1AAB27E0000
trusted library allocation
page read and write
8B70000
unkown
page read and write
1AAB2703000
heap
page read and write
23E0000
trusted library allocation
page read and write
30B0000
unkown
page read and write
B00000
trusted library allocation
page read and write
1AAB2E56000
heap
page read and write
1650AB4D000
heap
page read and write
7FF5D7820000
unkown
page readonly
1AAB2865000
heap
page read and write
23E0000
trusted library allocation
page read and write
8940000
unkown
page read and write
202EFB9C000
heap
page read and write
35FA000
unkown
page read and write
2EB0000
unkown
page read and write
5899000
heap
page read and write
CA37000
unkown
page read and write
21DDD89B000
heap
page read and write
2147E88F000
heap
page read and write
7FF6DFE21000
unkown
page execute read
1FDDCB54000
heap
page read and write
A40E000
unkown
page read and write
13542480000
heap
page read and write
1C75661A000
heap
page read and write
2F6C000
stack
page read and write
1AAB2714000
heap
page read and write
13542483000
heap
page read and write
1C7564A7000
heap
page read and write
35C1000
unkown
page read and write
3363000
heap
page read and write
3240000
unkown
page read and write
19EFFEF8000
heap
page read and write
1AAB4892000
heap
page read and write
3018000
heap
page read and write
10564000
unkown
page read and write
21DDD8EF000
heap
page read and write
228633A8000
heap
page read and write
1AAB272B000
heap
page read and write
17DCAB51000
heap
page read and write
9DD107E000
stack
page read and write
1AAB2DA2000
heap
page read and write
10E0000
unkown
page read and write
5463000
unkown
page read and write
1A47FECE000
heap
page read and write
30D0000
unkown
page read and write
1AAB2768000
heap
page read and write
5CD000
heap
page execute and read and write
23E0000
trusted library allocation
page read and write
3005000
heap
page read and write
3230000
heap
page read and write
1FDDCB5D000
heap
page read and write
B00000
trusted library allocation
page read and write
19EFFF41000
heap
page read and write
2147E8A6000
heap
page read and write
3014000
heap
page read and write
1AAB27B0000
heap
page read and write
600000
trusted library allocation
page read and write
1650AB61000
heap
page read and write
3240000
unkown
page read and write
1AAB272B000
heap
page read and write
10E0000
unkown
page read and write
10E0000
unkown
page read and write
2EA0000
unkown
page read and write
19EFFF4D000
heap
page read and write
1FDDCB34000
heap
page read and write
1650AB64000
heap
page read and write
13544250000
heap
page read and write
4C299FF000
stack
page read and write
13542479000
heap
page read and write
35B0000
unkown
page read and write
1650AB54000
heap
page read and write
2EA0000
unkown
page read and write
1230000
unkown
page read and write
80F81FE000
stack
page read and write
E10000
unkown
page readonly
1C757E90000
heap
page read and write
3080000
unkown
page read and write
7EF000
stack
page read and write
3090000
stack
page read and write
222CE017000
heap
page read and write
7FF5D7643000
unkown
page readonly
10F0000
unkown
page read and write
2BC292C9000
heap
page read and write
222CFDF0000
heap
page read and write
8B70000
unkown
page read and write
1F116AFE000
heap
page read and write
1A47FEEF000
heap
page read and write
222CDFEF000
heap
page read and write
4D0000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
3240000
unkown
page read and write
1650A44A000
heap
page read and write
202EF538000
heap
page read and write
17DCAAB0000
heap
page read and write
1AAB27B0000
heap
page read and write
3240000
unkown
page read and write
544000
heap
page read and write
1F116890000
heap
page read and write
23E0000
trusted library allocation
page read and write
1A47FEE8000
heap
page read and write
1AAB2714000
heap
page read and write
7605000
unkown
page read and write
13542386000
heap
page read and write
22863685000
heap
page read and write
22863680000
heap
page read and write
30A0000
unkown
page read and write
40E000
unkown
page readonly
19C000
stack
page read and write
7FF5D72D0000
unkown
page readonly
20EF000
stack
page read and write
228633A0000
heap
page read and write
A251000
unkown
page read and write
2EB0000
unkown
page read and write
1AAB272B000
heap
page read and write
202EFBAA000
heap
page read and write
5FA000
heap
page read and write
40E000
unkown
page readonly
202EFBC9000
heap
page read and write
10F0000
unkown
page read and write
2286339C000
heap
page read and write
1F1168ED000
heap
page read and write
1A47FEEF000
heap
page read and write
1650A442000
heap
page read and write
58B7000
heap
page read and write
CA35000
unkown
page read and write
2286353A000
heap
page read and write
10E0000
unkown
page read and write
953000
heap
page read and write
222CE001000
heap
page read and write
600000
trusted library allocation
page read and write
3240000
unkown
page read and write
1650AB3C000
heap
page read and write
2EE6000
heap
page read and write
7FF5D7336000
unkown
page readonly
9A9E000
unkown
page read and write
301F000
heap
page read and write
58B3000
heap
page read and write
1AAB271C000
heap
page read and write
1F116B20000
heap
page read and write
400000
unkown
page execute and read and write
1BF53B80000
heap
page read and write
1AAB26C0000
heap
page read and write
58A8000
heap
page read and write
22863633000
heap
page read and write
3070000
unkown
page read and write
22863378000
heap
page read and write
7FF5D76D7000
unkown
page readonly
2EB0000
unkown
page read and write
1F116B09000
heap
page read and write
1F1168E5000
heap
page read and write
2BC28B22000
heap
page read and write
3090000
unkown
page read and write
3090000
unkown
page read and write
222CDFFD000
heap
page read and write
3290000
unkown
page read and write
13542469000
heap
page read and write
2EA0000
unkown
page read and write
4AB0000
unkown
page read and write
241947B6000
heap
page read and write
4E063FF000
stack
page read and write
2EB0000
unkown
page read and write
30A0000
unkown
page read and write
3240000
unkown
page read and write
13C0000
heap
page read and write
2286351C000
heap
page read and write
3240000
unkown
page read and write
1F1168D6000
heap
page read and write
1419000
heap
page read and write
1AAB278A000
heap
page read and write
1FDDCA5C000
heap
page read and write
222CDE85000
heap
page read and write
9B0B000
unkown
page read and write
1C7564A5000
heap
page read and write
8B70000
unkown
page read and write
2286353A000
heap
page read and write
30FB000
stack
page read and write
1FDDCB6A000
heap
page read and write
2440000
heap
page read and write
7FF5D770F000
unkown
page readonly
1100000
unkown
page read and write
2EA0000
unkown
page read and write
2147E8B1000
heap
page read and write
228633A8000
heap
page read and write
222CDDB0000
trusted library allocation
page read and write
3180000
unkown
page read and write
2BC28B15000
heap
page read and write
657000
heap
page read and write
1AAB2E0A000
heap
page read and write
2EA0000
unkown
page read and write
2EB0000
unkown
page read and write
3240000
unkown
page read and write
40E000
unkown
page readonly
8B70000
unkown
page read and write
2147E860000
heap
page read and write
2EA0000
unkown
page read and write
8B70000
unkown
page read and write
1230000
unkown
page read and write
1AAB272B000
heap
page read and write
9430000
unkown
page read and write
2EB0000
unkown
page read and write
222CDE67000
heap
page read and write
222CDFF5000
heap
page read and write
3240000
unkown
page read and write
2EB0000
unkown
page read and write
17DCB2A6000
heap
page read and write
2EB0000
unkown
page read and write
13542AAA000
heap
page read and write
202EF4F2000
heap
page read and write
17DCAB5C000
heap
page read and write
7FF5D7534000
unkown
page readonly
202EF538000
heap
page read and write
23E0000
trusted library allocation
page read and write
2147E8A4000
heap
page read and write
23E0000
trusted library allocation
page read and write
1FDDCA65000
heap
page read and write
23E0000
trusted library allocation
page read and write
1FDDCB37000
heap
page read and write
7FF5D710B000
unkown
page readonly
3240000
unkown
page read and write
84C0000
unkown
page read and write
3240000
unkown
page read and write
2147E89F000
heap
page read and write
2EA0000
unkown
page read and write
58C0000
heap
page read and write
8B70000
unkown
page read and write
19EFFF50000
heap
page read and write
3014000
heap
page read and write
2EB0000
unkown
page read and write
3240000
unkown
page read and write
1AAB2DD2000
heap
page read and write
2BC292BC000
heap
page read and write
600000
trusted library allocation
page read and write
1AAB2DBF000
heap
page read and write
7DF4F2470000
unkown
page readonly
222CE00F000
heap
page read and write
FFF000
stack
page read and write
222CDFE7000
heap
page read and write
600000
trusted library allocation
page read and write
1F116AE4000
heap
page read and write
30E0000
unkown
page read and write
2D20000
trusted library allocation
page read and write
13542470000
heap
page read and write
B00000
trusted library allocation
page read and write
BE70000
unkown
page readonly
1AAB2760000
heap
page read and write
202EF82A000
heap
page read and write
1BF53D65000
heap
page read and write
228632C0000
trusted library allocation
page read and write
30D0000
unkown
page read and write
1C756450000
heap
page read and write
A9B1C7F000
stack
page read and write
10E0000
unkown
page read and write
2EB0000
unkown
page read and write
127C000
stack
page read and write
1AAB46AD000
heap
page read and write
58C0000
heap
page read and write
9A6A000
unkown
page read and write
222CDE81000
heap
page read and write
1FDDCB75000
heap
page read and write
2290000
heap
page read and write
7FF5D6ABD000
unkown
page readonly
3044000
heap
page read and write
222CDE9C000
heap
page read and write
3090000
unkown
page read and write
443000
unkown
page read and write
2286352C000
heap
page read and write
B00000
trusted library allocation
page read and write
202EF53D000
heap
page read and write
17DCB288000
heap
page read and write
4D0000
trusted library allocation
page read and write
2147E8A2000
heap
page read and write
3080000
unkown
page read and write
401000
unkown
page execute read
C44F000
stack
page read and write
1AAB2E77000
heap
page read and write
2EA0000
unkown
page read and write
1100000
unkown
page read and write
1650A455000
heap
page read and write
1F116B22000
heap
page read and write
2147E892000
heap
page read and write
7C377F000
stack
page read and write
400000
unkown
page readonly
10E0000
unkown
page read and write
1FDDC9D0000
trusted library allocation
page read and write
1100000
unkown
page read and write
610000
unclassified section
page read and write
222CE00F000
heap
page read and write
7FF6DFE35000
unkown
page readonly
13542560000
heap
page read and write
202EF528000
heap
page read and write
3080000
unkown
page read and write
3240000
unkown
page read and write
1A47FEFA000
heap
page read and write
23E0000
trusted library allocation
page read and write
222CE00F000
heap
page read and write
30A0000
unkown
page read and write
E0FF67E000
stack
page read and write
5BE0F3F000
stack
page read and write
1F1168D1000
heap
page read and write
B00000
trusted library allocation
page read and write
58AC000
heap
page read and write
302E000
heap
page read and write
32D0000
heap
page read and write
2286353A000
heap
page read and write
222CDFEF000
heap
page read and write
7810000
unkown
page read and write
1C755FC9000
heap
page read and write
30B0000
unkown
page read and write
1FDDCB6D000
heap
page read and write
2147E202000
heap
page read and write
135423AA000
heap
page read and write
7611000
unkown
page read and write
3240000
unkown
page read and write
58BC000
heap
page read and write
2BC292AC000
heap
page read and write
43E000
unkown
page write copy
942C000
stack
page read and write
2286353B000
heap
page read and write
23E0000
trusted library allocation
page read and write
7DF4F2480000
unkown
page readonly
17DCB260000
heap
page read and write
19E80582000
heap
page read and write
8B70000
unkown
page read and write
2147E228000
heap
page read and write
3090000
unkown
page read and write
2BC292CC000
heap
page read and write
2147E236000
heap
page read and write
2BC292C9000
heap
page read and write
3014000
heap
page read and write
2BC292D1000
heap
page read and write
1AAB272B000
heap
page read and write
540000
heap
page read and write
23E0000
trusted library allocation
page read and write
2147E35A000
heap
page read and write
1FDDCA00000
heap
page read and write
1340000
unkown
page read and write
2286351D000
heap
page read and write
CA31000
unkown
page read and write
1A47FECB000
heap
page read and write
3240000
unkown
page read and write
1AAB2E30000
heap
page read and write
A0F000
stack
page read and write
7FF5D71AF000
unkown
page readonly
3180000
unkown
page read and write
8B70000
unkown
page read and write
1FDDCB00000
trusted library allocation
page read and write
2180000
heap
page read and write
8B70000
unkown
page read and write
E42000
heap
page read and write
760B000
unkown
page read and write
7FF5D7458000
unkown
page readonly
2147E8A7000
heap
page read and write
58B1000
heap
page read and write
1650A310000
heap
page read and write
94AB000
stack
page read and write
24194799000
heap
page read and write
B00000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
19EFFF41000
heap
page read and write
E3F000
heap
page read and write
202EF823000
heap
page read and write
A28D000
unkown
page read and write
3240000
unkown
page read and write
1A4018C0000
heap
page read and write
23E0000
trusted library allocation
page read and write
10F0000
unkown
page read and write
2147E892000
heap
page read and write
1AAB4850000
heap
page read and write
17DCAA80000
heap
page read and write
44F000
unkown
page readonly
3240000
unkown
page read and write
2B8CB87000
stack
page read and write
2147E350000
heap
page read and write
222CDFD0000
heap
page read and write
1C755F72000
heap
page read and write
25167FF000
stack
page read and write
1230000
unkown
page read and write
3019000
heap
page read and write
CA3D000
unkown
page read and write
1AAB2768000
heap
page read and write
7C37FF000
stack
page read and write
228632C0000
trusted library allocation
page read and write
1F116AF7000
heap
page read and write
1FDDCA17000
heap
page read and write
400000
unkown
page readonly
4A44000
unkown
page read and write
202EFBB8000
heap
page read and write
8B70000
unkown
page read and write
E3C000
heap
page read and write
35D5000
unkown
page read and write
6E1000
system
page execute and read and write
17DCAA90000
heap
page read and write
1FDDCB59000
heap
page read and write
7FF5D7360000
unkown
page readonly
2BC292B8000
heap
page read and write
58B5000
heap
page read and write
1650AB69000
heap
page read and write
4E0637F000
stack
page read and write
1650AB4E000
heap
page read and write
1650AB48000
heap
page read and write
222CDDB0000
trusted library allocation
page read and write
43E000
unkown
page write copy
30B0000
unkown
page read and write
17DCB27A000
heap
page read and write
222CE105000
heap
page read and write
1BF53B60000
heap
page read and write
21DDD8E8000
heap
page read and write
21DDD86C000
heap
page read and write
1FDDCB40000
heap
page read and write
1AAB2777000
heap
page read and write
1AAB467F000
heap
page read and write
3240000
unkown
page read and write
1F116AFC000
heap
page read and write
B00000
trusted library allocation
page read and write
E23000
heap
page read and write
17DCB296000
heap
page read and write
A3C3000
unkown
page read and write
7FF5D75EE000
unkown
page readonly
1A47F772000
heap
page read and write
59E000
stack
page read and write
3640000
heap
page read and write
13542AA7000
heap
page read and write
9C000
stack
page read and write
4D0000
trusted library allocation
page read and write
105E3000
unkown
page read and write
3110000
unkown
page readonly
1650A9E2000
heap
page read and write
1740000
heap
page read and write
1FDDCA53000
heap
page read and write
22863386000
heap
page read and write
30A0000
unkown
page read and write
99C0000
unkown
page read and write
17DCB269000
heap
page read and write
23E0000
trusted library allocation
page read and write
1C755F96000
heap
page read and write
1AAB2779000
heap
page read and write
930000
heap
page read and write
21F1000
heap
page read and write
75E0000
unkown
page read and write
1AAB26D2000
heap
page read and write
1AAB2775000
heap
page read and write
1F1168C7000
heap
page read and write
1650A9EB000
heap
page read and write
21DDD8BA000
heap
page read and write
443000
unkown
page read and write
202EF518000
heap
page read and write
8B70000
unkown
page read and write
300B000
heap
page read and write
2147E882000
heap
page read and write
1FDDCB3B000
heap
page read and write
19E80598000
heap
page read and write
96FE000
stack
page read and write
B00000
trusted library allocation
page read and write
1FDDCA37000
heap
page read and write
10E0000
unkown
page read and write
7FF6DFE34000
unkown
page read and write
202EF450000
heap
page read and write
17DCB274000
heap
page read and write
1AAB2E79000
heap
page read and write
1650A427000
heap
page read and write
1A47F910000
trusted library allocation
page read and write
22863519000
heap
page read and write
19E80080000
heap
page read and write
1AAB278C000
heap
page read and write
3240000
unkown
page read and write
1A47F772000
heap
page read and write
97FF000
stack
page read and write
3180000
unkown
page read and write
1650A45A000
heap
page read and write
1FDDCB3E000
heap
page read and write
23E0000
trusted library allocation
page read and write
17DCAB81000
heap
page read and write
1FDDCB6A000
heap
page read and write
21DDD7F0000
heap
page read and write
1650AB4F000
heap
page read and write
3290000
unkown
page read and write
1A47FEFA000
heap
page read and write
8944000
unkown
page read and write
2EA0000
unkown
page read and write
1A47F75F000
heap
page read and write
17DCAD00000
heap
page read and write
1A47FEEF000
heap
page read and write
7FF5D77CD000
unkown
page readonly
3290000
unkown
page read and write
2147E1D2000
heap
page read and write
7FF5D74A6000
unkown
page readonly
2EB0000
unkown
page read and write
C5FD000
unkown
page read and write
1AAB46AD000
heap
page read and write
600000
trusted library allocation
page read and write
1C755F95000
heap
page read and write
7FF5D75DF000
unkown
page readonly
B80CA87000
stack
page read and write
2286339D000
heap
page read and write
7FF6DFE20000
unkown
page readonly
202EF4F7000
heap
page read and write
84C0000
unkown
page read and write
1AAB2E14000
heap
page read and write
17DCAB8F000
heap
page read and write
2BC29290000
heap
page read and write
54A1000
heap
page read and write
33B0000
unkown
page readonly
7FF5D749B000
unkown
page readonly
1650AB37000
heap
page read and write
30A0000
unkown
page read and write
1AAB2DAB000
heap
page read and write
7FF5D77FD000
unkown
page readonly
2147E20F000
heap
page read and write
3240000
unkown
page read and write
77A1000
unkown
page read and write
22863280000
heap
page read and write
22863510000
heap
page read and write
1C75660E000
heap
page read and write
7FF5D7752000
unkown
page readonly
1AAB2E37000
heap
page read and write
3240000
unkown
page read and write
1F0000
heap
page read and write
E00000
heap
page read and write
4B00000
unkown
page read and write
7FF5D72BD000
unkown
page readonly
13542463000
heap
page read and write
1AAB2711000
heap
page read and write
17DCAB38000
heap
page read and write
2EB0000
unkown
page read and write
13542479000
heap
page read and write
202EF518000
heap
page read and write
600000
trusted library allocation
page read and write
58D5000
heap
page read and write
225B4360000
heap
page read and write
1C755FA4000
heap
page read and write
6AC000
stack
page read and write
3630000
unkown
page readonly
23E0000
trusted library allocation
page read and write
19EFFF41000
heap
page read and write
202EFBA8000
heap
page read and write
2147E180000
heap
page read and write
B00000
trusted library allocation
page read and write
7FF5D7065000
unkown
page readonly
30A0000
unkown
page read and write
2EA0000
unkown
page read and write
225B4250000
heap
page read and write
1AAB27B0000
heap
page read and write
1100000
unkown
page read and write
2EA0000
unkown
page read and write
2BC28DF0000
heap
page read and write
7FF5D7425000
unkown
page readonly
1A47FEDF000
heap
page read and write
228633A3000
heap
page read and write
300E000
heap
page read and write
3240000
unkown
page read and write
202F1520000
heap
page read and write
3240000
unkown
page read and write
2B8CF7F000
stack
page read and write
600000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
C7B000
stack
page read and write
6AD000
heap
page execute and read and write
30A0000
unkown
page read and write
1C756605000
heap
page read and write
4AC0000
unkown
page read and write
1C7564AA000
heap
page read and write
A220000
unkown
page read and write
3240000
unkown
page read and write
8DCB000
stack
page read and write
1FDDCA53000
heap
page read and write
3080000
unkown
page read and write
1650AB4A000
heap
page read and write
1650AB60000
heap
page read and write
53E1000
unkown
page read and write
C621000
unkown
page read and write
1FDDC9D0000
trusted library allocation
page read and write
40E000
unkown
page readonly
2147E87F000
heap
page read and write
2BC28DFA000
heap
page read and write
49C2000
unkown
page read and write
17DCB271000
heap
page read and write
202EF480000
heap
page read and write
5EE000
stack
page read and write
17DCAD0A000
heap
page read and write
1C755F20000
trusted library allocation
page read and write
3240000
unkown
page read and write
30A0000
unkown
page read and write
7FF5D716B000
unkown
page readonly
22863393000
heap
page read and write
9A96000
unkown
page read and write
2EA0000
unkown
page read and write
30A0000
unkown
page read and write
1AAB272B000
heap
page read and write
23E0000
trusted library allocation
page read and write
3030000
unkown
page read and write
8B70000
unkown
page read and write
202EF538000
heap
page read and write
22863378000
heap
page read and write
301E000
heap
page read and write
9A94000
unkown
page read and write
19EFFF03000
heap
page read and write
63959EF000
stack
page read and write
1380000
heap
page read and write
1AAB2702000
heap
page read and write
4AE000
stack
page read and write
4C29A7E000
stack
page read and write
1C755FBB000
heap
page read and write
1A47FEE8000
heap
page read and write
241947A3000
heap
page read and write
3240000
unkown
page read and write
1270000
unkown
page read and write
2147E888000
heap
page read and write
B00000
trusted library allocation
page read and write
1C755FB6000
heap
page read and write
135423B0000
heap
page read and write
1AAB2DC4000
heap
page read and write
222CE001000
heap
page read and write
B00000
trusted library allocation
page read and write
1AAB467F000
heap
page read and write
19EFFF4F000
heap
page read and write
8B70000
unkown
page read and write
30B0000
unkown
page read and write
3210000
unkown
page read and write
74E000
heap
page read and write
17DCAD0A000
heap
page read and write
19E80050000
heap
page read and write
84C0000
unkown
page read and write
8F0000
heap
page read and write
2BC292C9000
heap
page read and write
8EF000
stack
page read and write
8B70000
unkown
page read and write
1F116800000
heap
page read and write
30A0000
unkown
page read and write
7FF5D7394000
unkown
page readonly
1A47F995000
heap
page read and write
24194750000
heap
page read and write
1FDDCB54000
heap
page read and write
1AAB277D000
heap
page read and write
B00000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
2BC28CE0000
trusted library allocation
page read and write
202EF460000
heap
page read and write
303B000
heap
page read and write
1650AB4D000
heap
page read and write
30D0000
unkown
page read and write
202F1530000
heap
page read and write
7686000
unkown
page read and write
222CFE02000
heap
page read and write
AA46000
unkown
page read and write
1AAB2719000
heap
page read and write
9679000
stack
page read and write
1A47F778000
heap
page read and write
222CE020000
heap
page read and write
3030000
unkown
page read and write
30A0000
unkown
page read and write
1AAB2768000
heap
page read and write
30B0000
unkown
page read and write
8E4E000
stack
page read and write
135422B0000
heap
page read and write
B330000
unkown
page read and write
2EA0000
unkown
page read and write
BDC0000
unkown
page read and write
3030000
unkown
page read and write
CA59000
unkown
page read and write
7FF5D77F7000
unkown
page readonly
8B70000
unkown
page read and write
1AAB2E66000
heap
page read and write
59E000
stack
page read and write
DE0000
heap
page read and write
3240000
unkown
page read and write
23E0000
trusted library allocation
page read and write
1F116C2B000
heap
page read and write
600000
trusted library allocation
page read and write
1100000
unkown
page read and write
3027000
heap
page read and write
23E0000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
2BC29295000
heap
page read and write
1230000
unkown
page read and write
3006000
heap
page read and write
2147E89F000
heap
page read and write
B00000
trusted library allocation
page read and write
19E805A2000
heap
page read and write
1AAB273F000
heap
page read and write
2BC292BC000
heap
page read and write
2147E863000
heap
page read and write
1AAB26C8000
heap
page read and write
17DCB285000
heap
page read and write
3008000
heap
page read and write
2BC28B29000
heap
page read and write
222CDFF7000
heap
page read and write
7460000
unkown
page read and write
10E0000
unkown
page read and write
1AAB2840000
heap
page read and write
1AAB279D000
heap
page read and write
1C755F9E000
heap
page read and write
7FF5D7795000
unkown
page readonly
23E0000
trusted library allocation
page read and write
C9B7000
unkown
page read and write
84F0000
unkown
page read and write
F13000
heap
page read and write
1FDDCC7B000
heap
page read and write
8B70000
unkown
page read and write
202EF4A0000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
1F116AFF000
heap
page read and write
3014000
heap
page read and write
7FF5D73F5000
unkown
page readonly
7FF5D752F000
unkown
page readonly
13542350000
heap
page read and write
21DDD8F6000
heap
page read and write
3200000
unkown
page read and write
7CB0000
unkown
page readonly
9AB4000
unkown
page read and write
202EF535000
heap
page read and write
3240000
unkown
page read and write
1650A9EE000
heap
page read and write
3240000
unkown
page read and write
5899000
heap
page read and write
C035000
stack
page read and write
1AAB2DA7000
heap
page read and write
1230000
unkown
page read and write
241947C7000
heap
page read and write
10E0000
unkown
page read and write
2EA0000
unkown
page read and write
5899000
heap
page read and write
1AAB2DD9000
heap
page read and write
7FF5D69BB000
unkown
page readonly
B00000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
2147E89F000
heap
page read and write
2EB0000
unkown
page read and write
B00000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
21DDD869000
heap
page read and write
2BC28ADE000
heap
page read and write
B4BF000
stack
page read and write
7FF5D7202000
unkown
page readonly
2EA0000
unkown
page read and write
3030000
unkown
page read and write
2260000
heap
page read and write
7FF5D7280000
unkown
page readonly
21E0000
heap
page read and write
30A0000
unkown
page read and write
B220000
unkown
page read and write
2286363A000
heap
page read and write
1AAB2786000
heap
page read and write
5899000
heap
page read and write
1AAB4892000
heap
page read and write
3240000
unkown
page read and write
4C0000
heap
page read and write
1AAB2E1E000
heap
page read and write
5899000
heap
page read and write
23E0000
trusted library allocation
page read and write
1A47FEE1000
heap
page read and write
2BC29297000
heap
page read and write
19E8056E000
heap
page read and write
10E0000
unkown
page read and write
19C000
stack
page read and write
19E80598000
heap
page read and write
B00000
trusted library allocation
page read and write
2147E203000
heap
page read and write
3030000
unkown
page read and write
1A47FEFC000
heap
page read and write
9A90000
unkown
page read and write
2BC2929E000
heap
page read and write
1FDDCB37000
heap
page read and write
10E0000
unkown
page read and write
1AAB2768000
heap
page read and write
401000
unkown
page execute read
222CDE47000
heap
page read and write
2BC2929E000
heap
page read and write
1F116B19000
heap
page read and write
7FF5D760E000
unkown
page readonly
23E0000
trusted library allocation
page read and write
9DD0CD7000
stack
page read and write
2147E8B0000
heap
page read and write
1650A9EA000
heap
page read and write
30C0000
unkown
page read and write
17DCAB08000
heap
page read and write
1AAB4880000
heap
page read and write
202EF542000
heap
page read and write
9430000
stack
page read and write
2BC28B25000
heap
page read and write
3240000
unkown
page read and write
7AF000
stack
page read and write
19EFFF41000
heap
page read and write
9A72000
unkown
page read and write
1100000
unkown
page read and write
1230000
unkown
page read and write
1FDDCB49000
heap
page read and write
4D0000
trusted library allocation
page read and write
7FF5D7703000
unkown
page readonly
222CDDB0000
trusted library allocation
page read and write
9FAF000
stack
page read and write
2286353D000
heap
page read and write
28F86FF000
stack
page read and write
7FF5D66E8000
unkown
page readonly
7FF5D774A000
unkown
page readonly
1F118850000
heap
page read and write
1AAB4892000
heap
page read and write
5899000
heap
page read and write
5899000
heap
page read and write
5BE0EB7000
stack
page read and write
600000
trusted library allocation
page read and write
3240000
unkown
page read and write
5899000
heap
page read and write
3240000
unkown
page read and write
4ADA000
unkown
page read and write
1C7560C5000
heap
page read and write
1C75660A000
heap
page read and write
30D0000
unkown
page read and write
7FF5D7385000
unkown
page readonly
1C755F98000
heap
page read and write
7FF5D7784000
unkown
page readonly
1AAB27B0000
heap
page read and write
1AAB2DCE000
heap
page read and write
7FF5D6BEF000
unkown
page readonly
3240000
unkown
page read and write
3580000
heap
page read and write
1F116B0E000
heap
page read and write
1650A407000
heap
page read and write
7E58000
stack
page read and write
4D0000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
1AAB25B0000
heap
page read and write
4AFA000
unkown
page read and write
30A0000
unkown
page read and write
202EFB9C000
heap
page read and write
8D0000
trusted library allocation
page read and write
30A0000
unkown
page read and write
7FF5D77C7000
unkown
page readonly
35CD000
unkown
page read and write
2BC2929A000
heap
page read and write
7C70000
unkown
page readonly
1F118960000
heap
page read and write
B00000
trusted library allocation
page read and write
17DCB277000
heap
page read and write
8B70000
unkown
page read and write
779E000
unkown
page read and write
600000
trusted library allocation
page read and write
135423A1000
heap
page read and write
3240000
unkown
page read and write
3030000
unkown
page read and write
D22C0FF000
stack
page read and write
1AAB2E1E000
heap
page read and write
A9B1DFE000
stack
page read and write
6395CFE000
stack
page read and write
2610000
heap
page read and write
600000
trusted library allocation
page read and write
8B70000
unkown
page read and write
58B3000
heap
page read and write
202EF827000
heap
page read and write
2147E150000
trusted library allocation
page read and write
1F116820000
trusted library allocation
page read and write
3290000
unkown
page read and write
4D0000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
3240000
unkown
page read and write
1650A9EE000
heap
page read and write
4D0000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
2BC28CC0000
heap
page read and write
7FF5D75AF000
unkown
page readonly
7DD0000
heap
page read and write
95FB000
stack
page read and write
135422D0000
trusted library allocation
page read and write
3A1ADEF000
stack
page read and write
228633AC000
heap
page read and write
202EF538000
heap
page read and write
13542479000
heap
page read and write
8D0000
trusted library allocation
page read and write
222CDE90000
heap
page read and write
17DCB27E000
heap
page read and write
23E0000
trusted library allocation
page read and write
3027000
heap
page read and write
202EF82A000
heap
page read and write
1E0000
heap
page read and write
1A47F775000
heap
page read and write
13542469000
heap
page read and write
43F000
unkown
page write copy
B00000
trusted library allocation
page read and write
3290000
unkown
page read and write
1650A437000
heap
page read and write
222CDFD7000
heap
page read and write
1FDDCA64000
heap
page read and write
1100000
unkown
page read and write
2286363A000
heap
page read and write
1FDDCA36000
heap
page read and write
3240000
unkown
page read and write
8B70000
unkown
page read and write
2FF9000
stack
page read and write
1C75661A000
heap
page read and write
28F8317000
stack
page read and write
222CE001000
heap
page read and write
86D0000
unkown
page readonly
3005000
heap
page read and write
1230000
unkown
page read and write
1FDDCB5D000
heap
page read and write
600000
unclassified section
page read and write
22863544000
heap
page read and write
202EF51B000
heap
page read and write
7FF5D77DD000
unkown
page readonly
FF0000
unkown
page readonly
1AAB27C0000
heap
page read and write
2516BFE000
stack
page read and write
550000
heap
page read and write
202EFB98000
heap
page read and write
44F000
unkown
page readonly
3240000
unkown
page read and write
2BC29294000
heap
page read and write
30A0000
unkown
page read and write
2147E892000
heap
page read and write
12D0000
unkown
page readonly
1100000
unkown
page read and write
228633A6000
heap
page read and write
7FF5D7589000
unkown
page readonly
19E80581000
heap
page read and write
1AAB2777000
heap
page read and write
1650AB54000
heap
page read and write
8B70000
unkown
page read and write
B00000
trusted library allocation
page read and write
3240000
unkown
page read and write
58CC000
heap
page read and write
2D20000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
1650A350000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
1AAB2DC3000
heap
page read and write
3019000
heap
page read and write
1AAB2DEF000
heap
page read and write
23E0000
trusted library allocation
page read and write
1650A447000
heap
page read and write
4571000
heap
page read and write
3180000
unkown
page read and write
579B000
heap
page read and write
B00000
trusted library allocation
page read and write
A408000
unkown
page read and write
7FF5D7682000
unkown
page readonly
7FF5D7591000
unkown
page readonly
CA2D000
unkown
page read and write
19EFFF34000
heap
page read and write
3240000
unkown
page read and write
2EB0000
unkown
page read and write
8B70000
unkown
page read and write
3A1B07F000
stack
page read and write
19EFFF47000
heap
page read and write
13542AA2000
heap
page read and write
21DDD8B1000
heap
page read and write
1AAB2720000
heap
page read and write
202EFBA2000
heap
page read and write
43E000
unkown
page read and write
23E0000
trusted library allocation
page read and write
DC0000
heap
page read and write
8D0000
trusted library allocation
page read and write
4AA0000
unkown
page read and write
1AAB2714000
heap
page read and write
2147E86A000
heap
page read and write
86E0000
unkown
page readonly
222CDFFB000
heap
page read and write
1650AB54000
heap
page read and write
1A47F99A000
heap
page read and write
17DCADD0000
heap
page read and write
13542470000
heap
page read and write
960000
heap
page read and write
2EB0000
unkown
page read and write
2BC28D00000
heap
page read and write
17DCAB17000
heap
page read and write
7FF5D7407000
unkown
page readonly
22863393000
heap
page read and write
1F116B1A000
heap
page read and write
10F0000
unkown
page read and write
44F000
unkown
page readonly
1A47FEEA000
heap
page read and write
10F0000
unkown
page read and write
22863528000
heap
page read and write
2147E130000
heap
page read and write
4C298FF000
stack
page read and write
58BC000
heap
page read and write
1AAB277A000
heap
page read and write
2EA0000
unkown
page read and write
1FDDCB47000
heap
page read and write
1C755F9E000
heap
page read and write
2EB0000
unkown
page read and write
7B00000
unkown
page readonly
1230000
unkown
page read and write
1FDDC990000
heap
page read and write
303F000
heap
page read and write
1A47F786000
heap
page read and write
30A0000
unkown
page read and write
49A8000
unkown
page read and write
8A46000
unkown
page read and write
302E000
heap
page read and write
17DCAAD0000
trusted library allocation
page read and write
560000
direct allocation
page execute and read and write
43E000
unkown
page read and write
9AA8000
unkown
page read and write
624000
heap
page read and write
1A47F775000
heap
page read and write
1650AB3F000
heap
page read and write
8B70000
unkown
page read and write
7FF5D7700000
unkown
page readonly
1C7564A3000
heap
page read and write
5899000
heap
page read and write
23E0000
trusted library allocation
page read and write
13542470000
heap
page read and write
222CDFF3000
heap
page read and write
300A000
heap
page read and write
8B70000
unkown
page read and write
1FDDCA68000
heap
page read and write
520000
heap
page read and write
8D0000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
3240000
unkown
page read and write
8D0000
trusted library allocation
page read and write
7FF5D75F9000
unkown
page readonly
1AAB2DAA000
heap
page read and write
3240000
unkown
page read and write
22863387000
heap
page read and write
1A47FF04000
heap
page read and write
3080000
unkown
page read and write
3014000
heap
page read and write
3240000
unkown
page read and write
10E0000
unkown
page read and write
8B70000
unkown
page read and write
3240000
unkown
page read and write
4C10000
trusted library allocation
page read and write
7AF1000
unkown
page read and write
1FDDE9B0000
heap
page read and write
1650A447000
heap
page read and write
2147E216000
heap
page read and write
7FF5D7694000
unkown
page readonly
2EA0000
unkown
page read and write
2EA0000
unkown
page read and write
3080000
unkown
page read and write
222CE001000
heap
page read and write
4D0000
trusted library allocation
page read and write
5BE000
heap
page read and write
13542457000
heap
page read and write
3008000
heap
page read and write
17DCB2A2000
heap
page read and write
2F81000
heap
page read and write
228633AA000
heap
page read and write
58CB000
heap
page read and write
7FF5D7236000
unkown
page readonly
A9B1D7F000
stack
page read and write
401000
unkown
page execute read
1AAB2DE7000
heap
page read and write
1AAB2768000
heap
page read and write
3240000
unkown
page read and write
3240000
unkown
page read and write
1FDDCB73000
heap
page read and write
2EA0000
unkown
page read and write
7FF5D744E000
unkown
page readonly
1AAB2E7F000
heap
page read and write
30D0000
unkown
page read and write
2147E1FA000
heap
page read and write
648217F000
stack
page read and write
8B70000
unkown
page read and write
3200000
unkown
page read and write
10A5000
heap
page read and write
202EFBC2000
heap
page read and write
3240000
unkown
page read and write
202EF820000
heap
page read and write
1AAB2751000
heap
page read and write
CA2B000
unkown
page read and write
1C755FBE000
heap
page read and write
2D20000
trusted library allocation
page read and write
3027000
heap
page read and write
362A000
unkown
page read and write
5899000
heap
page read and write
4C10000
trusted library allocation
page read and write
2391000
heap
page read and write
1AAB272B000
heap
page read and write
9C000
stack
page read and write
3024000
heap
page read and write
30A0000
unkown
page read and write
2147E1CE000
heap
page read and write
7FF5D776F000
unkown
page readonly
4C2987F000
stack
page read and write
1AAB46DD000
heap
page read and write
17DCACD0000
trusted library allocation
page read and write
17DCB274000
heap
page read and write
3240000
unkown
page read and write
CB9000
system
page execute and read and write
1F1168A7000
heap
page read and write
202EF827000
heap
page read and write
1C755FB7000
heap
page read and write
2EB0000
unkown
page read and write
23E0000
trusted library allocation
page read and write
650000
heap
page read and write
3240000
unkown
page read and write
19E805A1000
heap
page read and write
1650AB60000
heap
page read and write
1FDDCB3A000
heap
page read and write
2EB0000
unkown
page read and write
540000
heap
page read and write
241947B8000
heap
page read and write
329D000
stack
page read and write
7FF5D77F0000
unkown
page readonly
222CE001000
heap
page read and write
17DCB275000
heap
page read and write
1AAB2E77000
heap
page read and write
3240000
unkown
page read and write
17DCAD0E000
heap
page read and write
30F0000
unkown
page read and write
1650A464000
heap
page read and write
600000
trusted library allocation
page read and write
17DCB286000
heap
page read and write
2D20000
trusted library allocation
page read and write
8B70000
unkown
page read and write
2271000
heap
page read and write
23E0000
trusted library allocation
page read and write
11C000
stack
page read and write
3530000
unkown
page read and write
3240000
unkown
page read and write
1AAB2768000
heap
page read and write
2EA0000
unkown
page read and write
30E0000
unkown
page read and write
19EFFF08000
heap
page read and write
1FDDCA66000
heap
page read and write
13542464000
heap
page read and write
1A47F6F0000
heap
page read and write
30A0000
unkown
page read and write
2EB0000
unkown
page read and write
600000
trusted library allocation
page read and write
44F000
unkown
page readonly
13A0000
unkown
page readonly
241947A1000
heap
page read and write
19EFFF41000
heap
page read and write
2BC2AD10000
heap
page read and write
1A47F910000
trusted library allocation
page read and write
3090000
unkown
page read and write
1650A442000
heap
page read and write
7AB0000
unkown
page read and write
3180000
stack
page read and write
3240000
unkown
page read and write
7C36FF000
stack
page read and write
3028000
heap
page read and write
7FF5D764F000
unkown
page readonly
22863393000
heap
page read and write
B00000
trusted library allocation
page read and write
3240000
unkown
page read and write
19EFFF26000
heap
page read and write
1AAB2DA7000
heap
page read and write
1AAB2747000
heap
page read and write
7DF4F24A1000
unkown
page execute read
1650A442000
heap
page read and write
89C000
stack
page read and write
54A1000
heap
page read and write
C81C000
unkown
page read and write
1FDDCB57000
heap
page read and write
21DDD8C6000
heap
page read and write
4D0000
trusted library allocation
page read and write
222CE010000
heap
page read and write
600000
trusted library allocation
page read and write
7FF5D7272000
unkown
page readonly
202EF82A000
heap
page read and write
5F9000
heap
page read and write
1650A436000
heap
page read and write
30A0000
unkown
page read and write
1C755FB5000
heap
page read and write
4D0000
trusted library allocation
page read and write
7FF5D7764000
unkown
page readonly
13542386000
heap
page read and write
3240000
unkown
page read and write
A2D7000
unkown
page read and write
1F1168E5000
heap
page read and write
2EB0000
unkown
page read and write
2EE4000
heap
page read and write
30A0000
unkown
page read and write
4C29597000
stack
page read and write
24194720000
heap
page read and write
30A0000
unkown
page read and write
1FDDCA12000
heap
page read and write
202EF82E000
heap
page read and write
9700000
unkown
page read and write
C5F0000
unkown
page read and write
9EB0000
unkown
page readonly
222CDE9C000
heap
page read and write
1F1168D5000
heap
page read and write
222CE00F000
heap
page read and write
9C000
stack
page read and write
2EB0000
unkown
page read and write
1AAB272B000
heap
page read and write
6395967000
stack
page read and write
1AAB2E24000
heap
page read and write
222CDE6A000
heap
page read and write
17DCB296000
heap
page read and write
2BC292C9000
heap
page read and write
8D0000
trusted library allocation
page read and write
1C755FA3000
heap
page read and write
1AAB272B000
heap
page read and write
3090000
unkown
page read and write
202EF535000
heap
page read and write
8391000
unkown
page read and write
1FDDCA56000
heap
page read and write
2EA0000
unkown
page read and write
222CDE39000
heap
page read and write
B00000
trusted library allocation
page read and write
228633A8000
heap
page read and write
76F8000
unkown
page read and write
C663000
unkown
page read and write
202EFBA8000
heap
page read and write
1AAB488F000
heap
page read and write
35C3000
unkown
page read and write
80F7EF9000
stack
page read and write
B00000
trusted library allocation
page read and write
17DCAB6C000
heap
page read and write
23E0000
trusted library allocation
page read and write
3240000
unkown
page read and write
13542467000
heap
page read and write
7FF6DFE35000
unkown
page readonly
9AA0000
unkown
page read and write
E09000
heap
page read and write
20A0000
heap
page read and write
1F1168F4000
heap
page read and write
30B0000
unkown
page read and write
7FF5D7745000
unkown
page readonly
2EA0000
unkown
page read and write
222CDE66000
heap
page read and write
202EF519000
heap
page read and write
7FF5D71CC000
unkown
page readonly
1650A350000
trusted library allocation
page read and write
400000
unkown
page readonly
3240000
unkown
page read and write
927D000
stack
page read and write
3059000
heap
page read and write
58D7000
heap
page read and write
7FF5D71E6000
unkown
page readonly
1AAB2E2E000
heap
page read and write
19E80567000
heap
page read and write
1230000
unkown
page read and write
1A47F783000
heap
page read and write
7B60000
unkown
page readonly
600000
trusted library allocation
page read and write
C806000
unkown
page read and write
2EA0000
unkown
page read and write
17DCAB8B000
heap
page read and write
3090000
unkown
page read and write
5899000
heap
page read and write
30A0000
unkown
page read and write
21DDF4F0000
heap
page read and write
1F1168E2000
heap
page read and write
1230000
unkown
page read and write
13542464000
heap
page read and write
222CDFF8000
heap
page read and write
F797C7F000
stack
page read and write
B00000
trusted library allocation
page read and write
1AAB273F000
heap
page read and write
30F0000
unkown
page read and write
7FF5D72CE000
unkown
page readonly
AA40000
unkown
page read and write
2BC28AC0000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
3030000
unkown
page read and write
1F0000
heap
page read and write
939000
heap
page read and write
2BC28CE0000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
17DCAB63000
heap
page read and write
B00000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
7D3E000
stack
page read and write
7FF5D7593000
unkown
page readonly
1100000
unkown
page read and write
A9B19AF000
stack
page read and write
400000
unkown
page readonly
1FDDCA68000
heap
page read and write
22863393000
heap
page read and write
1A47F778000
heap
page read and write
17DCAB5B000
heap
page read and write
7FF5D7507000
unkown
page readonly
1AAB2789000
heap
page read and write
225B43EC000
heap
page read and write
A12F000
stack
page read and write
7FF5D720F000
unkown
page readonly
1F116B1C000
heap
page read and write
10F0000
unkown
page read and write
10F0000
unkown
page read and write
1FDDCA36000
heap
page read and write
2EA0000
unkown
page read and write
3210000
unkown
page read and write
B00000
trusted library allocation
page read and write
740000
heap
page read and write
1FDDCB4C000
heap
page read and write
4D0000
trusted library allocation
page read and write
222CE001000
heap
page read and write
13542AAE000
heap
page read and write
44F000
unkown
page readonly
1AAB2E25000
heap
page read and write
2EB0000
unkown
page read and write
7440000
unkown
page read and write
30A0000
unkown
page read and write
1FDDCB53000
heap
page read and write
8B70000
unkown
page read and write
2147EEF0000
heap
page read and write
2286352C000
heap
page read and write
2EB0000
unkown
page read and write
7FF5D77A4000
unkown
page readonly
19EFFED0000
heap
page read and write
600000
trusted library allocation
page read and write
1A47F728000
heap
page read and write
1C75660E000
heap
page read and write
1AAB2736000
heap
page read and write
7C367F000
stack
page read and write
8360000
unkown
page read and write
3220000
unkown
page read and write
202EF7F0000
heap
page read and write
49FA000
unkown
page read and write
A264000
unkown
page read and write
1F116AF0000
heap
page read and write
1C755FBB000
heap
page read and write
1AAB2E1F000
heap
page read and write
13E0000
heap
page read and write
8B70000
unkown
page read and write
4C2997E000
stack
page read and write
2EA0000
unkown
page read and write
19E82000000
heap
page read and write
1F116820000
trusted library allocation
page read and write
1650A330000
heap
page read and write
3240000
unkown
page read and write
8B70000
unkown
page read and write
10F0000
unkown
page read and write
30D0000
unkown
page read and write
98F000
stack
page read and write
443000
unkown
page read and write
1F1168A7000
heap
page read and write
222CDFF5000
heap
page read and write
A9DF000
unkown
page read and write
600000
trusted library allocation
page read and write
202EF845000
heap
page read and write
17DCAB36000
heap
page read and write
8B70000
unkown
page read and write
C61D000
unkown
page read and write
10E0000
unkown
page read and write
1AAB272B000
heap
page read and write
7FF5D774C000
unkown
page readonly
8B70000
unkown
page read and write
30A0000
unkown
page read and write
657000
heap
page read and write
9C000
stack
page read and write
2147E88B000
heap
page read and write
9DD117E000
stack
page read and write
C472000
unkown
page read and write
30F0000
unkown
page read and write
241947BC000
heap
page read and write
43F000
unkown
page write copy
1C755F00000
heap
page read and write
3240000
unkown
page read and write
1AAB4870000
heap
page read and write
2131000
heap
page read and write
C62D000
unkown
page read and write
1F116B22000
heap
page read and write
1C7565F9000
heap
page read and write
2BC2929B000
heap
page read and write
1650A451000
heap
page read and write
7FF5D705D000
unkown
page readonly
7FF5CE33D000
unkown
page readonly
1FDDCA64000
heap
page read and write
7FF5D71EA000
unkown
page readonly
BB10000
heap
page read and write
1C755EE0000
heap
page read and write
2BC28B22000
heap
page read and write
23E0000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
17DCB296000
heap
page read and write
3080000
unkown
page read and write
1AAB2E32000
heap
page read and write
4D0000
trusted library allocation
page read and write
2EB0000
unkown
page read and write
23E0000
trusted library allocation
page read and write
3210000
unkown
page read and write
AA14000
unkown
page read and write
5899000
heap
page read and write
17DCB27B000
heap
page read and write
1A47FEEF000
heap
page read and write
2147E89F000
heap
page read and write
202EFBC1000
heap
page read and write
600000
trusted library allocation
page read and write
97B0000
unkown
page read and write
9AC3000
unkown
page read and write
3240000
unkown
page read and write
7FF5CE343000
unkown
page readonly
1650A350000
trusted library allocation
page read and write
3240000
unkown
page read and write
35BD000
unkown
page read and write
2147E20F000
heap
page read and write
3030000
unkown
page read and write
1AAB26F4000
heap
page read and write
C496000
unkown
page read and write
400000
unkown
page readonly
3240000
unkown
page read and write
8B70000
unkown
page read and write
1AAB2800000
heap
page read and write
135423A4000
heap
page read and write
2BC292D3000
heap
page read and write
5899000
heap
page read and write
1A47FED7000
heap
page read and write
7FF5D6BE4000
unkown
page readonly
43F000
unkown
page write copy
1FDDCA36000
heap
page read and write
2B8CFFE000
stack
page read and write
2EB0000
unkown
page read and write
1AAB2768000
heap
page read and write
7DF4F2471000
unkown
page execute read
7FF5D72DF000
unkown
page readonly
1354247D000
heap
page read and write
52A5000
heap
page read and write
99B0000
unkown
page read and write
30D0000
unkown
page read and write
52A5000
heap
page read and write
2EA0000
unkown
page read and write
3090000
unkown
page read and write
3210000
unkown
page read and write
8B70000
unkown
page read and write
13542AA5000
heap
page read and write
13542362000
heap
page read and write
1C7565FF000
heap
page read and write
2147E87C000
heap
page read and write
300B000
heap
page read and write
7FF5D7077000
unkown
page readonly
2147E22E000
heap
page read and write
B00000
trusted library allocation
page read and write
3200000
unkown
page read and write
600000
trusted library allocation
page read and write
43E000
unkown
page read and write
7FF5D75D6000
unkown
page readonly
2BC28AD0000
heap
page read and write
1F116AFC000
heap
page read and write
E33000
heap
page read and write
E00000
unkown
page readonly
2286363B000
heap
page read and write
8EF000
stack
page read and write
19E80588000
heap
page read and write
222CDE93000
heap
page read and write
C642000
unkown
page read and write
7FF5D72FB000
unkown
page readonly
B00000
trusted library allocation
page read and write
C669000
unkown
page read and write
1650AB4C000
heap
page read and write
7FF5D71C4000
unkown
page readonly
1650A3F0000
heap
page read and write
66B000
stack
page read and write
3240000
unkown
page read and write
7FF5D7641000
unkown
page readonly
19E80565000
heap
page read and write
7FF5D760B000
unkown
page readonly
1AAB4870000
heap
page read and write
2147E216000
heap
page read and write
600000
trusted library allocation
page read and write
8FD8000
stack
page read and write
1C755FB8000
heap
page read and write
1AAB2797000
heap
page read and write
1C75661A000
heap
page read and write
3290000
unkown
page read and write
10E0000
unkown
page read and write
1650A9E7000
heap
page read and write
9EAD000
stack
page read and write
3240000
unkown
page read and write
470000
heap
page read and write
1650A3FE000
heap
page read and write
3240000
unkown
page read and write
43E000
unkown
page read and write
1650A9EA000
heap
page read and write
3240000
unkown
page read and write
1C756601000
heap
page read and write
58AD000
heap
page read and write
2EE0000
heap
page read and write
1350000
unkown
page readonly
3240000
unkown
page read and write
19E80588000
heap
page read and write
196000
system
page execute and read and write
17DCB2A4000
heap
page read and write
225B4330000
heap
page read and write
58BC000
heap
page read and write
B00000
trusted library allocation
page read and write
5BE127E000
stack
page read and write
1650A447000
heap
page read and write
2BC28B34000
heap
page read and write
43F000
unkown
page write copy
22863525000
heap
page read and write
1AAB2782000
heap
page read and write
C24E000
stack
page read and write
105B9000
unkown
page read and write
1AAB2774000
heap
page read and write
600000
trusted library allocation
page read and write
17DCB287000
heap
page read and write
1C756600000
heap
page read and write
1AAB2DC0000
heap
page read and write
10F0000
unkown
page read and write
7FF5D7404000
unkown
page readonly
1FDDCB75000
heap
page read and write
B00000
trusted library allocation
page read and write
1FDDCA68000
heap
page read and write
1AAB2DA0000
heap
page read and write
7FF5D76CD000
unkown
page readonly
135423AB000
heap
page read and write
4A12000
unkown
page read and write
1650A9E7000
heap
page read and write
24194778000
heap
page read and write
8B70000
unkown
page read and write
19E8056A000
heap
page read and write
2EA0000
unkown
page read and write
30A0000
unkown
page read and write
7FF5D72C8000
unkown
page readonly
5BE000
stack
page read and write
1230000
unkown
page read and write
1230000
unkown
page read and write
3240000
unkown
page read and write
E3C000
heap
page read and write
202EF4E8000
heap
page read and write
3240000
unkown
page read and write
1FDDCB72000
heap
page read and write
43E000
unkown
page write copy
C7C6000
unkown
page read and write
21DDD89C000
heap
page read and write
7FF5D72D3000
unkown
page readonly
2FAD000
stack
page read and write
13542470000
heap
page read and write
3080000
stack
page read and write
7693000
unkown
page read and write
58B5000
heap
page read and write
1C7565FC000
heap
page read and write
19E80598000
heap
page read and write
19D000
stack
page read and write
3A1AD6F000
stack
page read and write
8B70000
unkown
page read and write
1650A442000
heap
page read and write
225B4388000
heap
page read and write
2147E892000
heap
page read and write
1AAB2E4D000
heap
page read and write
2D20000
trusted library allocation
page read and write
7FF5D7639000
unkown
page readonly
1A47FEC7000
heap
page read and write
F7979B7000
stack
page read and write
1650A230000
heap
page read and write
2147E212000
heap
page read and write
2100000
heap
page read and write
222CDFFF000
heap
page read and write
222CDC90000
heap
page read and write
1A47FF01000
heap
page read and write
30B0000
unkown
page read and write
1AAB272B000
heap
page read and write
17DCB27D000
heap
page read and write
E0FF57E000
stack
page read and write
58C0000
heap
page read and write
2147E21A000
heap
page read and write
2286363E000
heap
page read and write
400000
unkown
page execute and read and write
1AAB271D000
heap
page read and write
1A47F754000
heap
page read and write
1BF53BD9000
heap
page read and write
135421B0000
heap
page read and write
30B0000
unkown
page read and write
30B0000
unkown
page read and write
8B70000
unkown
page read and write
7FF5D7267000
unkown
page readonly
8D0000
trusted library allocation
page read and write
2EB0000
unkown
page read and write
3240000
unkown
page read and write
2EA0000
unkown
page read and write
A40000
heap
page read and write
2147E150000
trusted library allocation
page read and write
3080000
unkown
page read and write
1650AB40000
heap
page read and write
8F49000
stack
page read and write
1C755E00000
heap
page read and write
CA23000
unkown
page read and write
32A0000
direct allocation
page execute and read and write
1A47FEFA000
heap
page read and write
30A0000
unkown
page read and write
2270000
heap
page read and write
2BC2929A000
heap
page read and write
2147E86A000
heap
page read and write
1AAB2788000
heap
page read and write
3090000
unkown
page read and write
3240000
unkown
page read and write
2BC2AB40000
heap
page read and write
4D0000
trusted library allocation
page read and write
1281000
unkown
page readonly
1C7565FC000
heap
page read and write
2BC292CA000
heap
page read and write
1C755F77000
heap
page read and write
30B0000
unkown
page read and write
228652B0000
heap
page read and write
3120000
unkown
page read and write
17DCAB51000
heap
page read and write
1650C3D0000
heap
page read and write
1AAB4861000
heap
page read and write
8B70000
unkown
page read and write
800000
heap
page read and write
7FF5D723C000
unkown
page readonly
1A47FEC3000
heap
page read and write
1C755FC6000
heap
page read and write
3240000
unkown
page read and write
13542479000
heap
page read and write
20DF000
stack
page read and write
23E0000
trusted library allocation
page read and write
7FF5D768B000
unkown
page readonly
3006000
heap
page read and write
21D0000
heap
page read and write
23E0000
trusted library allocation
page read and write
C605000
unkown
page read and write
8ECE000
stack
page read and write
2FE8000
system
page execute and read and write
2EB0000
unkown
page read and write
C891000
unkown
page read and write
1F1168D1000
heap
page read and write
BEA0000
unkown
page readonly
524000
heap
page read and write
1FDDCA62000
heap
page read and write
23E0000
trusted library allocation
page read and write
1A47FEFA000
heap
page read and write
222CDFD2000
heap
page read and write
C653000
unkown
page read and write
B00000
trusted library allocation
page read and write
1100000
unkown
page read and write
1650A464000
heap
page read and write
10F0000
unkown
page read and write
1AAB272B000
heap
page read and write
1650AB67000
heap
page read and write
30A0000
unkown
page read and write
1F0000
heap
page read and write
222CDDB0000
trusted library allocation
page read and write
22863542000
heap
page read and write
1FDDCA70000
heap
page read and write
7FF5D7262000
unkown
page readonly
8948000
unkown
page read and write
1A47F778000
heap
page read and write
2EA0000
unkown
page read and write
1FDDCB00000
heap
page read and write
1AAB2DD4000
heap
page read and write
23E0000
trusted library allocation
page read and write
7FF5D751F000
unkown
page readonly
1AAB272B000
heap
page read and write
B00000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
30A0000
unkown
page read and write
1C756620000
heap
page read and write
3240000
unkown
page read and write
84C0000
unkown
page read and write
2EA0000
unkown
page read and write
17DCAB86000
heap
page read and write
3240000
unkown
page read and write
13542484000
heap
page read and write
222CDFF4000
heap
page read and write
3180000
unkown
page read and write
22863637000
heap
page read and write
30A0000
unkown
page read and write
19E80020000
trusted library allocation
page read and write
2147E881000
heap
page read and write
E42000
heap
page read and write
202EFBB8000
heap
page read and write
105AB000
unkown
page read and write
1230000
unkown
page read and write
F530000
heap
page read and write
202EF535000
heap
page read and write
28F867F000
stack
page read and write
40B000
unkown
page execute read
1A47F759000
heap
page read and write
21DDF501000
heap
page read and write
C9C8000
unkown
page read and write
2EA0000
unkown
page read and write
3240000
unkown
page read and write
1FDDCB6A000
heap
page read and write
300A000
heap
page read and write
3240000
unkown
page read and write
13542AA7000
heap
page read and write
222CDFD4000
heap
page read and write
3014000
heap
page read and write
C9F2000
unkown
page read and write
10E0000
stack
page read and write
1AAB272B000
heap
page read and write
648207F000
stack
page read and write
17DCAAD0000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
1A47FEEF000
heap
page read and write
690000
heap
page read and write
3240000
unkown
page read and write
8B70000
unkown
page read and write
72F000
stack
page read and write
7FF5D7452000
unkown
page readonly
1A47F75F000
heap
page read and write
977E000
stack
page read and write
A60000
heap
page read and write
7FF5D7604000
unkown
page readonly
35DC000
unkown
page read and write
17DCB27F000
heap
page read and write
17DCAB78000
heap
page read and write
30A0000
unkown
page read and write
B80CE7E000
stack
page read and write
401000
unkown
page execute read
1230000
unkown
page read and write
1C7564AE000
heap
page read and write
2180000
heap
page read and write
7FF5D77E3000
unkown
page readonly
3240000
unkown
page read and write
135423B3000
heap
page read and write
8D0000
trusted library allocation
page read and write
2BC28AE7000
heap
page read and write
2147ED00000
heap
page read and write
C625000
unkown
page read and write
2390000
heap
page read and write
3240000
unkown
page read and write
569D000
heap
page read and write
1C7564A2000
heap
page read and write
3240000
unkown
page read and write
225B4355000
heap
page read and write
19E80588000
heap
page read and write
E3F000
heap
page read and write
3240000
unkown
page read and write
1AAB2E30000
heap
page read and write
17DCB27D000
heap
page read and write
2EB0000
unkown
page read and write
1650A442000
heap
page read and write
3240000
unkown
page read and write
1F1168E2000
heap
page read and write
1F116B23000
heap
page read and write
19E80585000
heap
page read and write
58D7000
heap
page read and write
2BC292B0000
heap
page read and write
1A47FEFF000
heap
page read and write
30A0000
unkown
page read and write
1F0000
heap
page read and write
21DDD8E5000
heap
page read and write
5DE000
stack
page read and write
7FF5D729E000
unkown
page readonly
30D0000
unkown
page read and write
1390000
heap
page read and write
17DCAB54000
heap
page read and write
7989000
stack
page read and write
B00000
trusted library allocation
page read and write
3240000
unkown
page read and write
3240000
unkown
page read and write
222CDE9C000
heap
page read and write
550000
heap
page read and write
202EFBA8000
heap
page read and write
23E0000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
222CDFEC000
heap
page read and write
17DCACD0000
heap
page read and write
1AAB273F000
heap
page read and write
7FF5D7485000
unkown
page readonly
7FF5D762F000
unkown
page readonly
1230000
unkown
page read and write
8D0000
trusted library allocation
page read and write
43E000
unkown
page write copy
2EA0000
unkown
page read and write
C8D3000
unkown
page read and write
21DDD840000
heap
page read and write
2BC292A7000
heap
page read and write
22863379000
heap
page read and write
1A47F766000
heap
page read and write
13542479000
heap
page read and write
30E0000
unkown
page read and write
30A0000
unkown
page read and write
19EFFF47000
heap
page read and write
17DCB27B000
heap
page read and write
22863527000
heap
page read and write
2BC28AE2000
heap
page read and write
1F116AEA000
heap
page read and write
1745000
heap
page read and write
1230000
unkown
page read and write
B03B000
stack
page read and write
7FF5D717C000
unkown
page readonly
9A8C000
unkown
page read and write
17DCB288000
heap
page read and write
761E000
unkown
page read and write
17DCAD03000
heap
page read and write
19EFFF26000
heap
page read and write
3240000
unkown
page read and write
23E0000
trusted library allocation
page read and write
3000000
heap
page read and write
84C0000
unkown
page read and write
135422D0000
trusted library allocation
page read and write
1F0000
heap
page read and write
4D0000
trusted library allocation
page read and write
2FA0000
remote allocation
page read and write
1650A5B5000
heap
page read and write
75FD000
unkown
page read and write
24194793000
heap
page read and write
2EA0000
unkown
page read and write
C25000
heap
page read and write
2EB0000
unkown
page read and write
A3AA000
unkown
page read and write
58D7000
heap
page read and write
7FF5D74F2000
unkown
page readonly
2FD0000
heap
page read and write
3240000
unkown
page read and write
17DCB29F000
heap
page read and write
10E0000
unkown
page read and write
1230000
unkown
page read and write
2EA0000
unkown
page read and write
2147E881000
heap
page read and write
2D20000
trusted library allocation
page read and write
58E000
stack
page read and write
21DDD91C000
heap
page read and write
8D0000
trusted library allocation
page read and write
1AAB2DC1000
heap
page read and write
1650A429000
heap
page read and write
13542461000
heap
page read and write
1AAB2DBE000
heap
page read and write
627000
heap
page read and write
A1AF000
stack
page read and write
9ADB000
unkown
page read and write
13542387000
heap
page read and write
23E0000
trusted library allocation
page read and write
3014000
heap
page read and write
222CE020000
heap
page read and write
3AEB37D000
stack
page read and write
28F839F000
stack
page read and write
8B70000
unkown
page read and write
1AAB2E98000
heap
page read and write
1F116B05000
heap
page read and write
1FDDCB3E000
heap
page read and write
2EB0000
unkown
page read and write
17DCAB54000
heap
page read and write
49BB000
unkown
page read and write
1650A9EA000
heap
page read and write
30A0000
unkown
page read and write
12BA000
system
page execute and read and write
29D0000
heap
page read and write
1C755FA4000
heap
page read and write
600000
trusted library allocation
page read and write
202EF4F7000
heap
page read and write
E0FF1CB000
stack
page read and write
3240000
unkown
page read and write
3240000
unkown
page read and write
7FF5D75BF000
unkown
page readonly
2147E1D7000
heap
page read and write
30A0000
unkown
page read and write
228632C0000
trusted library allocation
page read and write
C5FA000
unkown
page read and write
1354245C000
heap
page read and write
1731000
unkown
page readonly
F53A000
heap
page read and write
3240000
unkown
page read and write
222CDD90000
heap
page read and write
241947B8000
heap
page read and write
1FDDCB35000
heap
page read and write
3240000
unkown
page read and write
1A47FECA000
heap
page read and write
7FF5D743F000
unkown
page readonly
30D0000
unkown
page read and write
3240000
unkown
page read and write
1AAB2DC4000
heap
page read and write
5FE000
stack
page read and write
23E0000
trusted library allocation
page read and write
222CDE85000
heap
page read and write
9579000
stack
page read and write
1FDDCB57000
heap
page read and write
32C0000
heap
page read and write
22863358000
heap
page read and write
8B70000
unkown
page read and write
13542483000
heap
page read and write
600000
trusted library allocation
page read and write
19EFFDF0000
heap
page read and write
1AAB2DA3000
heap
page read and write
222CDFDB000
heap
page read and write
3240000
unkown
page read and write
1C755F20000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
574000
heap
page read and write
3090000
unkown
page read and write
222CDE9E000
heap
page read and write
23E0000
trusted library allocation
page read and write
1C755FBD000
heap
page read and write
8B70000
unkown
page read and write
4D0000
trusted library allocation
page read and write
13542460000
heap
page read and write
228632A0000
heap
page read and write
6395D7F000
stack
page read and write
8A00000
unkown
page read and write
1AAB2768000
heap
page read and write
202EFB90000
heap
page read and write
600000
trusted library allocation
page read and write
1AAB2E7F000
heap
page read and write
21DDD845000
heap
page read and write
1650AB60000
heap
page read and write
401000
unkown
page execute read
7FF5D770A000
unkown
page readonly
600000
trusted library allocation
page read and write
570000
heap
page read and write
7FF5D71DA000
unkown
page readonly
17DCB288000
heap
page read and write
7FF5D7722000
unkown
page readonly
5E0000
direct allocation
page execute and read and write
2147E20F000
heap
page read and write
2286363E000
heap
page read and write
1A47FEC4000
heap
page read and write
17DCB26F000
heap
page read and write
7FF5D7705000
unkown
page readonly
1A47FF03000
heap
page read and write
1A47F778000
heap
page read and write
222CE001000
heap
page read and write
1C755F99000
heap
page read and write
1C75660E000
heap
page read and write
B00000
trusted library allocation
page read and write
30B0000
unkown
page read and write
1A47F75F000
heap
page read and write
3240000
unkown
page read and write
EB5000
stack
page read and write
9A84000
unkown
page read and write
1F116AE3000
heap
page read and write
1AAB272B000
heap
page read and write
7FF5D765F000
unkown
page readonly
C47F000
unkown
page read and write
7FF5D7740000
unkown
page readonly
1F116AE0000
heap
page read and write
524000
heap
page read and write
3240000
unkown
page read and write
1FDDCB33000
heap
page read and write
202EF527000
heap
page read and write
1650AB54000
heap
page read and write
8D0000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
3240000
unkown
page read and write
7435000
stack
page read and write
30A0000
unkown
page read and write
7FF5D6AB6000
unkown
page readonly
7FF5D75A6000
unkown
page readonly
23E0000
trusted library allocation
page read and write
8B70000
unkown
page read and write
2BC28DF5000
heap
page read and write
17DCAD07000
heap
page read and write
202EFBB8000
heap
page read and write
1A47F700000
heap
page read and write
B00000
trusted library allocation
page read and write
7FF5D77D2000
unkown
page readonly
5899000
heap
page read and write
30B0000
unkown
page read and write
30E0000
unkown
page read and write
17DCADDA000
heap
page read and write
2147E20F000
heap
page read and write
7FF5D7257000
unkown
page readonly
2147E8A1000
heap
page read and write
1FDDC8B0000
heap
page read and write
1C7564AA000
heap
page read and write
2147E865000
heap
page read and write
58B6000
heap
page read and write
BB9C000
stack
page read and write
B8DB000
stack
page read and write
58B6000
heap
page read and write
44F000
unkown
page readonly
F797D7E000
stack
page read and write
98FD000
stack
page read and write
19E80020000
trusted library allocation
page read and write
30B0000
unkown
page read and write
1FDDCB5A000
heap
page read and write
3090000
unkown
page read and write
19EFFF47000
heap
page read and write
1AAB2DCE000
heap
page read and write
2147E1C0000
heap
page read and write
225B43E5000
heap
page read and write
2D20000
trusted library allocation
page read and write
1F1168F2000
heap
page read and write
3014000
heap
page read and write
23E0000
trusted library allocation
page read and write
4EAD000
heap
page read and write
97B0000
unkown
page read and write
C908000
unkown
page read and write
D22BFFE000
stack
page read and write
600000
trusted library allocation
page read and write
4AEA000
unkown
page read and write
2147E86B000
heap
page read and write
8B70000
unkown
page read and write
3240000
unkown
page read and write
30A0000
unkown
page read and write
2BC28B25000
heap
page read and write
300E000
heap
page read and write
30A0000
unkown
page read and write
1AAB2DD1000
heap
page read and write
1C75660E000
heap
page read and write
3240000
unkown
page read and write
2BC2929A000
heap
page read and write
2286352C000
heap
page read and write
135423AF000
heap
page read and write
12E0000
heap
page read and write
1650AB71000
heap
page read and write
1F116B09000
heap
page read and write
1650AB54000
heap
page read and write
1AAB2DF3000
heap
page read and write
222CE10A000
heap
page read and write
225B4350000
heap
page read and write
1AAB2DFF000
heap
page read and write
7FF5D71F9000
unkown
page readonly
2286353A000
heap
page read and write
30E0000
unkown
page read and write
222CDE82000
heap
page read and write
A02E000
stack
page read and write
10E0000
unkown
page read and write
13542565000
heap
page read and write
7FF5D7073000
unkown
page readonly
303E000
heap
page read and write
1AAB26B0000
trusted library allocation
page read and write
3032000
heap
page read and write
3330000
heap
page read and write
1C756608000
heap
page read and write
2147E150000
trusted library allocation
page read and write
1FDDCB5A000
heap
page read and write
222CDE43000
heap
page read and write
7FF5D745B000
unkown
page readonly
1230000
unkown
page read and write
1000000
heap
page read and write
2090000
direct allocation
page execute and read and write
24194792000
heap
page read and write
23E0000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
1A47F781000
heap
page read and write
E54C000
stack
page read and write
23E0000
trusted library allocation
page read and write
5899000
heap
page read and write
3090000
unkown
page read and write
2147E892000
heap
page read and write
3240000
unkown
page read and write
3080000
unkown
page read and write
9C5000
heap
page read and write
2EA0000
unkown
page read and write
B950000
unkown
page readonly
C9AB000
unkown
page read and write
1AAB2786000
heap
page read and write
F532000
heap
page read and write
30A0000
unkown
page read and write
4C10000
trusted library allocation
page read and write
4D0000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
2147E8A2000
heap
page read and write
A384000
unkown
page read and write
620000
heap
page read and write
1FDDCA36000
heap
page read and write
225B43A2000
heap
page read and write
1A47FEC0000
heap
page read and write
900000
heap
page read and write
5899000
heap
page read and write
9A8E000
unkown
page read and write
222CDFDE000
heap
page read and write
600000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
1AAB2690000
heap
page read and write
1F116AE7000
heap
page read and write
2147E222000
heap
page read and write
1A47F77B000
heap
page read and write
7FF5D7419000
unkown
page readonly
C89C000
unkown
page read and write
1354256A000
heap
page read and write
222CFE00000
heap
page read and write
1FDDCA67000
heap
page read and write
CE0000
heap
page read and write
3180000
unkown
page read and write
1AAB488F000
heap
page read and write
2EB0000
unkown
page read and write
1650A402000
heap
page read and write
C617000
unkown
page read and write
1FDDCB78000
heap
page read and write
3180000
unkown
page read and write
7FF5D728E000
unkown
page readonly
2EA0000
unkown
page read and write
19E80567000
heap
page read and write
4A40000
unkown
page read and write
202EFBAA000
heap
page read and write
1650AB3C000
heap
page read and write
1AAB2E06000
heap
page read and write
B00000
trusted library allocation
page read and write
222CE100000
heap
page read and write
600000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
1FDDCA53000
heap
page read and write
1FDDCA55000
heap
page read and write
9430000
unkown
page read and write
1650A380000
heap
page read and write
10E0000
unkown
page read and write
3028000
heap
page read and write
7FF5D75D9000
unkown
page readonly
3027000
heap
page read and write
7FF5D76E8000
unkown
page readonly
1AAB2722000
heap
page read and write
222CDFE0000
heap
page read and write
241947B8000
heap
page read and write
7637000
unkown
page read and write
202EF4E0000
heap
page read and write
8B70000
unkown
page read and write
600000
trusted library allocation
page read and write
2147E216000
heap
page read and write
3240000
unkown
page read and write
301F000
heap
page read and write
10E0000
unkown
page read and write
1A47F910000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
1F116B0E000
heap
page read and write
E42000
heap
page read and write
202EFBA1000
heap
page read and write
17DCAB00000
heap
page read and write
1230000
unkown
page read and write
1F1168E5000
heap
page read and write
7FF5D6BDB000
unkown
page readonly
2286353A000
heap
page read and write
A273000
unkown
page read and write
1A47F910000
trusted library allocation
page read and write
10E0000
unkown
page read and write
1C756607000
heap
page read and write
2147E888000
heap
page read and write
8D0000
trusted library allocation
page read and write
222CE011000
heap
page read and write
1FDDCA08000
heap
page read and write
225B441C000
heap
page read and write
760D000
unkown
page read and write
2EC0000
unkown
page readonly
2EB0000
unkown
page read and write
1E0000
heap
page read and write
21DDF4E0000
heap
page read and write
22863632000
heap
page read and write
19E8057C000
heap
page read and write
222CDE94000
heap
page read and write
B80CB0F000
stack
page read and write
7FF5D766E000
unkown
page readonly
B00000
trusted library allocation
page read and write
1C7565F7000
heap
page read and write
2EB0000
unkown
page read and write
7FF5D77B9000
unkown
page readonly
35F4000
unkown
page read and write
1650A350000
trusted library allocation
page read and write
AA94000
unkown
page read and write
7FF5D720A000
unkown
page readonly
1650AB70000
heap
page read and write
1230000
unkown
page read and write
7FF6DFE20000
unkown
page readonly
222CDFDA000
heap
page read and write
1A47F757000
heap
page read and write
1100000
unkown
page read and write
1160000
unkown
page read and write
2147E211000
heap
page read and write
1F116820000
trusted library allocation
page read and write
3290000
unkown
page read and write
1650AB60000
heap
page read and write
E0FF47F000
stack
page read and write
19E80577000
heap
page read and write
5330000
unkown
page write copy
1A47F775000
heap
page read and write
3240000
unkown
page read and write
1FDDCB70000
heap
page read and write
12B8000
system
page execute and read and write
4D0000
trusted library allocation
page read and write
17DCB288000
heap
page read and write
9A80000
unkown
page read and write
7FF5D7558000
unkown
page readonly
2147E221000
heap
page read and write
91E000
stack
page read and write
19E8057F000
heap
page read and write
8B70000
unkown
page read and write
2EA0000
unkown
page read and write
19E80578000
heap
page read and write
1C755F94000
heap
page read and write
3210000
unkown
page read and write
3090000
unkown
page read and write
17DCB267000
heap
page read and write
19E80560000
heap
page read and write
58BC000
heap
page read and write
2286352C000
heap
page read and write
28F877F000
stack
page read and write
1AAB272B000
heap
page read and write
43E000
unkown
page write copy
760F000
unkown
page read and write
3080000
unkown
page read and write
202EF82E000
heap
page read and write
B00000
trusted library allocation
page read and write
10626000
unkown
page read and write
35E4000
unkown
page read and write
7FF6DFE34000
unkown
page write copy
2147E150000
trusted library allocation
page read and write
30D0000
unkown
page read and write
1AAB2768000
heap
page read and write
202EFBB8000
heap
page read and write
B00000
trusted library allocation
page read and write
2BC292B1000
heap
page read and write
17DCAB51000
heap
page read and write
2BC292D0000
heap
page read and write
17DCB2AF000
heap
page read and write
C460000
unkown
page read and write
2EB0000
unkown
page read and write
30B0000
unkown
page read and write
B00000
trusted library allocation
page read and write
20C0000
unclassified section
page read and write
2147E1D7000
heap
page read and write
2BC292C9000
heap
page read and write
13542367000
heap
page read and write
2EA0000
unkown
page read and write
C48B000
unkown
page read and write
1A47FEFE000
heap
page read and write
2EA0000
unkown
page read and write
2EA0000
unkown
page read and write
1FDDCC70000
heap
page read and write
A2B5000
unkown
page read and write
58D7000
heap
page read and write
1A47F990000
heap
page read and write
2BC28B22000
heap
page read and write
17DCB281000
heap
page read and write
40E000
unkown
page readonly
10F0000
unkown
page read and write
1A47FEEF000
heap
page read and write
3240000
unkown
page read and write
B00000
trusted library allocation
page read and write
2EB0000
unkown
page read and write
24194730000
heap
page read and write
BB0D000
stack
page read and write
2EB0000
unkown
page read and write
600000
trusted library allocation
page read and write
17DCAB12000
heap
page read and write
19C000
stack
page read and write
10E0000
unkown
page read and write
EF0000
heap
page read and write
40B000
unkown
page execute read
3240000
unkown
page read and write
58AF000
heap
page read and write
202EF822000
heap
page read and write
3240000
unkown
page read and write
20A0000
direct allocation
page read and write
222CDFDE000
heap
page read and write
3210000
unkown
page read and write
7FF5D74C3000
unkown
page readonly
1AAB2768000
heap
page read and write
1AAB2DAA000
heap
page read and write
58D5000
heap
page read and write
50E000
stack
page read and write
9AAA000
unkown
page read and write
23E0000
trusted library allocation
page read and write
2EB0000
unkown
page read and write
8B70000
unkown
page read and write
2BC28B22000
heap
page read and write
1AAB2792000
heap
page read and write
228633A3000
heap
page read and write
13542AA4000
heap
page read and write
23E0000
trusted library allocation
page read and write
222CE001000
heap
page read and write
3090000
unkown
page read and write
B4D0000
unkown
page readonly
23E0000
trusted library allocation
page read and write
A9A0000
unkown
page read and write
135422D0000
trusted library allocation
page read and write
4D0000
trusted library allocation
page read and write
1A47F775000
heap
page read and write
3400000
unkown
page read and write
2F9D000
stack
page read and write
222CDEA1000
heap
page read and write
1AAB2DBC000
heap
page read and write
40B000
unkown
page execute read
1AAB2768000
heap
page read and write
3090000
unkown
page read and write
2EA0000
unkown
page read and write
2EB0000
unkown
page read and write
1A47F720000
heap
page read and write
9700000
stack
page read and write
7C90000
unkown
page read and write
19E80599000
heap
page read and write
23E0000
trusted library allocation
page read and write
1AAB2DCF000
heap
page read and write
40E000
unkown
page readonly
30B0000
unkown
page read and write
7FF5D7669000
unkown
page readonly
40E000
unkown
page readonly
1A47F778000
heap
page read and write
A233000
unkown
page read and write
23E0000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
3240000
unkown
page read and write
1AAB2778000
heap
page read and write
241947B8000
heap
page read and write
3030000
unkown
page read and write
17DCB26E000
heap
page read and write
30A0000
unkown
page read and write
3210000
unkown
page read and write
8B70000
unkown
page read and write
30B0000
unkown
page read and write
1650AB30000
heap
page read and write
222CDFDA000
heap
page read and write
896E000
unkown
page read and write
10A0000
heap
page read and write
7DF4F2460000
unkown
page readonly
1F1168C5000
heap
page read and write
7654000
unkown
page read and write
1C756609000
heap
page read and write
64820FE000
stack
page read and write
30B0000
unkown
page read and write
225B43A6000
heap
page read and write
1AAB278E000
heap
page read and write
B80CB8F000
stack
page read and write
1F1168E2000
heap
page read and write
3240000
unkown
page read and write
13542AAB000
heap
page read and write
1AAB2711000
heap
page read and write
569D000
heap
page read and write
1C7564A7000
heap
page read and write
17DCB278000
heap
page read and write
2147E879000
heap
page read and write
1A47F757000
heap
page read and write
3240000
unkown
page read and write
225B441C000
heap
page read and write
400000
unkown
page readonly
7FF5D7799000
unkown
page readonly
2BC28B2A000
heap
page read and write
228633A3000
heap
page read and write
E42000
heap
page read and write
23E0000
trusted library allocation
page read and write
1FDDCB4E000
heap
page read and write
228632F0000
heap
page read and write
3240000
unkown
page read and write
2BC28AD8000
heap
page read and write
13542459000
heap
page read and write
3240000
unkown
page read and write
1A47FEDC000
heap
page read and write
3240000
unkown
page read and write
202EF4A0000
trusted library allocation
page read and write
17DCAB54000
heap
page read and write
1FDDCB57000
heap
page read and write
75D000
heap
page execute and read and write
8B70000
unkown
page read and write
1650AB54000
heap
page read and write
7FF5D77E0000
unkown
page readonly
1F1168C6000
heap
page read and write
7DF4F2481000
unkown
page execute read
3028000
heap
page read and write
7B10000
unkown
page read and write
13542AA3000
heap
page read and write
19E8059E000
heap
page read and write
7691000
unkown
page read and write
202EF53C000
heap
page read and write
7FF5D7230000
unkown
page readonly
222CDFFC000
heap
page read and write
F7E000
stack
page read and write
2BC292B0000
heap
page read and write
895E000
unkown
page read and write
222CE019000
heap
page read and write
2147E884000
heap
page read and write
17DCAD0E000
heap
page read and write
8900000
unkown
page read and write
30A0000
unkown
page read and write
1F116850000
heap
page read and write
1FDDCB6C000
heap
page read and write
23E0000
trusted library allocation
page read and write
1C755FCB000
heap
page read and write
C61B000
unkown
page read and write
8CB8000
stack
page read and write
19EFFF27000
heap
page read and write
13542AA0000
heap
page read and write
1F1168C9000
heap
page read and write
1BF53BD0000
heap
page read and write
1A47FED0000
heap
page read and write
9AAC000
unkown
page read and write
40E000
unkown
page readonly
3240000
unkown
page read and write
C46F000
unkown
page read and write
1A47FEFA000
heap
page read and write
B80CEFE000
stack
page read and write
241947B8000
heap
page read and write
6395C7F000
stack
page read and write
21DDD92C000
heap
page read and write
1AAB2DC1000
heap
page read and write
1AAB2E25000
heap
page read and write
1AAB272B000
heap
page read and write
2BC292CE000
heap
page read and write
2BC292B9000
heap
page read and write
1AAB4651000
heap
page read and write
1AAB2714000
heap
page read and write
43E000
unkown
page write copy
4D0000
trusted library allocation
page read and write
17DCAD02000
heap
page read and write
1AAB2720000
heap
page read and write
9A98000
unkown
page read and write
17DCB296000
heap
page read and write
106A4000
unkown
page read and write
3240000
unkown
page read and write
1100000
unkown
page read and write
3090000
unkown
page read and write
AFBE000
stack
page read and write
7631000
unkown
page read and write
4A16000
unkown
page read and write
23E0000
trusted library allocation
page read and write
1F116AEE000
heap
page read and write
9DD10FF000
stack
page read and write
69A000
heap
page read and write
A39F000
unkown
page read and write
8D0000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
8B70000
unkown
page read and write
2147E20F000
heap
page read and write
7E60000
unkown
page read and write
30A0000
unkown
page read and write
202EF538000
heap
page read and write
7DF4F2461000
unkown
page execute read
4D0000
trusted library allocation
page read and write
3AEB67F000
stack
page read and write
9B2C000
unkown
page read and write
8B70000
unkown
page read and write
30F0000
unkown
page read and write
1A47FEC2000
heap
page read and write
7B80000
unkown
page readonly
B00000
trusted library allocation
page read and write
8880000
unkown
page readonly
7FF5D7488000
unkown
page readonly
10E0000
unkown
page read and write
1FDDCB6A000
heap
page read and write
E0FF4FF000
stack
page read and write
E42000
heap
page read and write
524000
heap
page read and write
1AAB2E68000
heap
page read and write
1650AB49000
heap
page read and write
2BC28B05000
heap
page read and write
1C7564AB000
heap
page read and write
B00000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
1120000
unkown
page read and write
84F0000
unkown
page read and write
7FF5D72E9000
unkown
page readonly
3080000
unkown
page read and write
768C000
unkown
page read and write
3090000
unkown
page read and write
23E0000
trusted library allocation
page read and write
35CF000
unkown
page read and write
2BC28CA0000
heap
page read and write
202EFBA5000
heap
page read and write
10E0000
unkown
page read and write
19E80570000
heap
page read and write
3AEB3FF000
stack
page read and write
3240000
unkown
page read and write
3180000
unkown
page read and write
3240000
unkown
page read and write
2EA0000
unkown
page read and write
44F000
unkown
page readonly
17DCADD5000
heap
page read and write
1A47F778000
heap
page read and write
B00000
trusted library allocation
page read and write
2147E236000
heap
page read and write
C609000
unkown
page read and write
17DCB297000
heap
page read and write
1AAB46AD000
heap
page read and write
5BE137E000
stack
page read and write
1AAB2778000
heap
page read and write
7FF5D758D000
unkown
page readonly
1F116AEA000
heap
page read and write
7FF5D7292000
unkown
page readonly
1AAB272B000
heap
page read and write
1AAB26F3000
heap
page read and write
17DCAD0B000
heap
page read and write
1AAB2768000
heap
page read and write
1AAB2711000
heap
page read and write
202EFBAA000
heap
page read and write
F797E7F000
stack
page read and write
10E0000
unkown
page read and write
2BC28B06000
heap
page read and write
1650AB50000
heap
page read and write
1650AB43000
heap
page read and write
3210000
unkown
page read and write
4D0000
trusted library allocation
page read and write
C5F4000
unkown
page read and write
22F0000
heap
page read and write
2B8D07F000
stack
page read and write
1360000
unkown
page readonly
1C75661A000
heap
page read and write
4570000
heap
page read and write
1AAB2DD6000
heap
page read and write
2EB0000
unkown
page read and write
B0E0000
unkown
page readonly
17DCB296000
heap
page read and write
1AAB2780000
heap
page read and write
23E0000
trusted library allocation
page read and write
C450000
unkown
page read and write
1C755F6E000
heap
page read and write
23E0000
trusted library allocation
page read and write
7609000
unkown
page read and write
22863635000
heap
page read and write
7FF5D77EB000
unkown
page readonly
1AAB4851000
heap
page read and write
1AAB4650000
heap
page read and write
1F116820000
trusted library allocation
page read and write
1FDDCA17000
heap
page read and write
2BC28B14000
heap
page read and write
1A4018B0000
heap
page read and write
2EB0000
unkown
page read and write
1AAB272B000
heap
page read and write
B00000
trusted library allocation
page read and write
17DCB2A3000
heap
page read and write
2516B7F000
stack
page read and write
1AAB27B0000
heap
page read and write
2EA1000
unkown
page read and write
F797CFF000
stack
page read and write
202EF543000
heap
page read and write
There are 3746 hidden memdumps, click here to show them.