IOC Report
172823964570053a59b24ac6432eba9d1852681850b7ea6d06bd275c12bfed591157d7099b818.dat-decoded.exe

loading gif

Files

File Path
Type
Category
Malicious
172823964570053a59b24ac6432eba9d1852681850b7ea6d06bd275c12bfed591157d7099b818.dat-decoded.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\hfetwhc
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\hfetwhc:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\BD1F.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\BD1F.tmp-shm
data
dropped
C:\Users\user\AppData\Local\Temp\C08B.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\C281.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\C699.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\C794.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\C96A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\CA26.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\CB6F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\D700.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\Mini-Wallet\mini-wallet.html
HTML document, ASCII text, with very long lines (506)
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\Mini-Wallet\miniwallet.bundle.js
ASCII text, with very long lines (65461)
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\Mini-Wallet\miniwallet.bundle.js.LICENSE.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\Wallet-Checkout\wallet-drawer.bundle.js
ASCII text, with very long lines (65458)
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\Wallet-Checkout\wallet-drawer.bundle.js.LICENSE.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\Wallet-Checkout\wallet-drawer.html
HTML document, ASCII text, with very long lines (589)
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\json\wallet\wallet-checkout-eligible-sites-pre-stable.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\json\wallet\wallet-checkout-eligible-sites.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\json\wallet\wallet-notification-config.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\json\wallet\wallet-pre-stable.json
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\json\wallet\wallet-stable.json
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\json\wallet\wallet-tokenization-config.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\wallet-crypto.html
HTML document, ASCII text, with very long lines (560)
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\wallet-icon.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\wallet.bundle.js
Unicode text, UTF-8 text, with very long lines (65534), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\wallet.html
HTML document, ASCII text, with very long lines (560)
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\116.16385.16360.19\wallet_donation_driver.js
ASCII text, with very long lines (865), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\SysWOW64\WalletBackgroundServiceProxy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\SysWOW64\WalletProxy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\SysWOW64\Windows.ApplicationModel.Wallet.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\System32\WalletBackgroundServiceProxy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\System32\WalletProxy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\System32\Windows.ApplicationModel.Wallet.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\Manifests\amd64_microsoft-windows-wallet-service.proxy_31bf3856ad364e35_10.0.19041.1_none_5f44912b33b38332.manifest
data
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\Manifests\amd64_microsoft-windows-wallet-service_31bf3856ad364e35_10.0.19041.985_none_61f85cc11deb0ddb.manifest
data
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\Manifests\amd64_microsoft-windows-wallet-winrt_31bf3856ad364e35_10.0.19041.746_none_a953dd8b163491ed.manifest
data
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\Manifests\wow64_microsoft-windows-wallet-service.proxy_31bf3856ad364e35_10.0.19041.1_none_69993b7d6814452d.manifest
data
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\Manifests\wow64_microsoft-windows-wallet-winrt_31bf3856ad364e35_10.0.19041.746_none_b3a887dd4a9553e8.manifest
data
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\amd64_microsoft-windows-w..-service.deployment_31bf3856ad364e35_10.0.19041.985_none_b6bad888bc038c2c\WalletService.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\amd64_microsoft-windows-w..-service.deployment_31bf3856ad364e35_10.0.19041.985_none_b6bad888bc038c2c\f\WalletService.dll
data
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\amd64_microsoft-windows-w..-service.deployment_31bf3856ad364e35_10.0.19041.985_none_b6bad888bc038c2c\r\WalletService.dll
data
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\amd64_microsoft-windows-w..ice.backgroundproxy_31bf3856ad364e35_10.0.19041.1_none_fa16cd4ceba3021a\WalletBackgroundServiceProxy.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\amd64_microsoft-windows-w..t-service.resources_31bf3856ad364e35_10.0.19041.1_en-us_0e357aa451e0d2d7\WalletService.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\amd64_microsoft-windows-wallet-service.proxy_31bf3856ad364e35_10.0.19041.1_none_5f44912b33b38332\WalletProxy.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\amd64_microsoft-windows-wallet-winrt_31bf3856ad364e35_10.0.19041.746_none_a953dd8b163491ed\Windows.ApplicationModel.Wallet.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\amd64_microsoft-windows-wallet-winrt_31bf3856ad364e35_10.0.19041.746_none_a953dd8b163491ed\f\Windows.ApplicationModel.Wallet.dll
data
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\amd64_microsoft-windows-wallet-winrt_31bf3856ad364e35_10.0.19041.746_none_a953dd8b163491ed\r\Windows.ApplicationModel.Wallet.dll
data
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\wow64_microsoft-windows-w..ice.backgroundproxy_31bf3856ad364e35_10.0.19041.1_none_046b779f2003c415\WalletBackgroundServiceProxy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\wow64_microsoft-windows-wallet-service.proxy_31bf3856ad364e35_10.0.19041.1_none_69993b7d6814452d\WalletProxy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\wow64_microsoft-windows-wallet-winrt_31bf3856ad364e35_10.0.19041.746_none_b3a887dd4a9553e8\Windows.ApplicationModel.Wallet.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\wow64_microsoft-windows-wallet-winrt_31bf3856ad364e35_10.0.19041.746_none_b3a887dd4a9553e8\f\Windows.ApplicationModel.Wallet.dll
data
dropped
C:\Users\user\AppData\Local\Temp\D700\C\Windows\WinSxS\wow64_microsoft-windows-wallet-winrt_31bf3856ad364e35_10.0.19041.746_none_b3a887dd4a9553e8\r\Windows.ApplicationModel.Wallet.dll
data
dropped
C:\Users\user\AppData\Roaming\hshstfj
data
modified
There are 46 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\172823964570053a59b24ac6432eba9d1852681850b7ea6d06bd275c12bfed591157d7099b818.dat-decoded.exe
"C:\Users\user\Desktop\172823964570053a59b24ac6432eba9d1852681850b7ea6d06bd275c12bfed591157d7099b818.dat-decoded.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\hfetwhc
C:\Users\user\AppData\Roaming\hfetwhc
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Users\user\AppData\Roaming\hfetwhc
C:\Users\user\AppData\Roaming\hfetwhc
malicious
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://quantumqube.org/index.php
malicious
https://quantumqube.org/index.php
malicious
http://quantumqube.org/
unknown
malicious
http://innovixus.org/index.php
malicious
https://innovixus.org/index.php
malicious
https://api.msn.com/v1/news/Feed/Windows?
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://powerpoint.office.comer
unknown
https://duckduckgo.com/ac/?q=
unknown
https://android.notify.windows.com/iOSA4
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://www.msn.com/en-us/weather/topstories/first-map-of-earth-s-lost-continent-has-been-published/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
unknown
https://excel.office.com
unknown
https://www.msn.com/en-us/money/personalfinance/the-big-3-mistakes-financial-advisors-say-that-the-1
unknown
https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
unknown
http://schemas.micro
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svg
unknown
http://quantumqube.org/application/x-www-form-urlencodedMozilla/5.0
unknown
https://wns.windows.com/EM0
unknown
https://github.com/jsstyles/css-vendor
unknown
https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zeal
unknown
https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
unknown
http://quantumqube.org/ndex.php
unknown
http://www.microsoft.c
unknown
https://www.msn.com/en-us/weather/topstories/stop-planting-new-forests-scientists-say/ar-AA1hFI09
unknown
https://android.notify.windows.com/iOSd
unknown
https://openjsf.org/
unknown
http://jedwatson.github.io/classnames
unknown
https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
unknown
http://quantumqube.org/index.php.
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-al
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://lodash.com/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.ecosia.org/newtab/
unknown
http://ns.adobeS
unknown
https://outlook.com
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA-dark
unknown
http://underscorejs.org/LICENSE
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://quantumqube.org/index.phpMozilla/5.0
unknown
http://quantumqube.org:80/index.phpcrosoft
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=0E948A694F8C48079B908C8EA9DDF9EA&timeOut=5000&oc
unknown
https://android.notify.windows.com/iOS
unknown
https://word.office.com48
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
https://lodash.com/license
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
unknown
https://api.msn.com/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA
unknown
https://www.msn.com/en-us/sports/other/washington-state-ad-asks-ncaa-for-compassion-and-understandin
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
unknown
https://www.msn.com:443/en-us/feed
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k-dark
unknown
https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
unknown
http://quantumqube.org/index.phpn
unknown
There are 61 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
innovixus.org
198.54.117.242
malicious
quantumqube.org
194.87.189.87
malicious

IPs

IP
Domain
Country
Malicious
194.87.189.87
quantumqube.org
Russian Federation
malicious
198.54.117.242
innovixus.org
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.M2V\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
There are 187 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
801000
system
page execute and read and write
malicious
5E0000
direct allocation
page read and write
malicious
4F1000
unclassified section
page read and write
malicious
2261000
unclassified section
page read and write
malicious
3001000
system
page execute and read and write
malicious
1F0000
direct allocation
page read and write
malicious
5310000
heap
page read and write
5260000
heap
page read and write
32D6000
heap
page read and write
3511000
heap
page read and write
B9C0000
unkown
page read and write
7710000
unkown
page readonly
5231000
heap
page read and write
400000
unkown
page readonly
BA0000
unkown
page read and write
B70000
unkown
page read and write
5260000
heap
page read and write
5260000
heap
page read and write
4402000
unkown
page read and write
2A50000
trusted library allocation
page read and write
BA0000
unkown
page read and write
2A50000
trusted library allocation
page read and write
B990000
unkown
page read and write
7690000
unkown
page read and write
B30000
unkown
page read and write
34BE000
heap
page read and write
5260000
heap
page read and write
7FF502DC8000
unkown
page readonly
32C3000
heap
page read and write
52C7000
heap
page read and write
7FF5032FE000
unkown
page readonly
5240000
heap
page read and write
52F3000
heap
page read and write
BB50000
unkown
page read and write
1000000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
52D7000
heap
page read and write
5330000
heap
page read and write
5240000
heap
page read and write
7FF503051000
unkown
page readonly
52D7000
heap
page read and write
52D6000
heap
page read and write
5270000
heap
page read and write
24E0000
unkown
page read and write
7FF502DD3000
unkown
page readonly
B70000
unkown
page read and write
BA0000
unkown
page read and write
7FF502CF2000
unkown
page readonly
A20000
trusted library allocation
page read and write
5270000
heap
page read and write
5C99000
heap
page read and write
8260000
unkown
page read and write
77FE000
stack
page read and write
BA0000
unkown
page read and write
5303000
heap
page read and write
7F80000
unkown
page read and write
BB50000
unkown
page read and write
4FC000
heap
page read and write
5260000
heap
page read and write
3309000
heap
page read and write
5260000
heap
page read and write
52EA000
heap
page read and write
3490000
trusted library allocation
page read and write
52C4000
heap
page read and write
BB50000
unkown
page read and write
B70000
unkown
page read and write
3170000
trusted library allocation
page read and write
5260000
heap
page read and write
5CD7000
heap
page read and write
1000000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
7F80000
unkown
page read and write
3490000
trusted library allocation
page read and write
8220000
stack
page read and write
702D000
unkown
page read and write
5260000
heap
page read and write
5CD5000
heap
page read and write
5260000
heap
page read and write
52C7000
heap
page read and write
52E6000
heap
page read and write
BB50000
unkown
page read and write
5260000
heap
page read and write
B30000
unkown
page read and write
7F80000
unkown
page read and write
AAD0000
unkown
page read and write
52D7000
heap
page read and write
52D6000
heap
page read and write
3490000
trusted library allocation
page read and write
B30000
unkown
page read and write
4B70000
heap
page read and write
AB49000
stack
page read and write
BA0000
unkown
page read and write
7FF502D20000
unkown
page readonly
5264000
heap
page read and write
5240000
heap
page read and write
1000000
trusted library allocation
page read and write
7FF503167000
unkown
page readonly
7FF502F8A000
unkown
page readonly
DB5000
heap
page read and write
52F9000
heap
page read and write
5C99000
heap
page read and write
BA0000
unkown
page read and write
2320000
trusted library allocation
page read and write
BB50000
unkown
page read and write
52E6000
heap
page read and write
7FF502DD1000
unkown
page readonly
7FF5032EB000
unkown
page readonly
5234000
heap
page read and write
BA0000
unkown
page read and write
52C4000
heap
page read and write
5260000
heap
page read and write
5256000
heap
page read and write
BC27000
unkown
page read and write
2DFD000
stack
page read and write
5250000
heap
page read and write
52F9000
heap
page read and write
52D6000
heap
page read and write
2A50000
trusted library allocation
page read and write
5260000
heap
page read and write
5312000
heap
page read and write
2320000
trusted library allocation
page read and write
7FF5030D9000
unkown
page readonly
3370000
trusted library allocation
page read and write
BA0000
unkown
page read and write
5291000
heap
page read and write
7F80000
unkown
page read and write
52E6000
heap
page read and write
526C000
heap
page read and write
5312000
heap
page read and write
5250000
heap
page read and write
5270000
heap
page read and write
2320000
trusted library allocation
page read and write
8050000
unkown
page read and write
DA0000
trusted library allocation
page read and write
523C000
heap
page read and write
5240000
heap
page read and write
5240000
heap
page read and write
3067000
unkown
page read and write
52E6000
heap
page read and write
B1B000
heap
page read and write
7FF502FB7000
unkown
page readonly
BC30000
unkown
page read and write
BA0000
unkown
page read and write
5256000
heap
page read and write
7F80000
unkown
page read and write
DA0000
trusted library allocation
page read and write
B30000
unkown
page read and write
AAB000
heap
page read and write
BA0000
unkown
page read and write
3490000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
24E0000
unkown
page read and write
523C000
heap
page read and write
52A2000
heap
page read and write
5260000
heap
page read and write
52D7000
heap
page read and write
7FF5030E4000
unkown
page readonly
5231000
heap
page read and write
7FF5030A3000
unkown
page readonly
5253000
heap
page read and write
3370000
trusted library allocation
page read and write
B70000
unkown
page read and write
52C7000
heap
page read and write
52F3000
heap
page read and write
52F9000
heap
page read and write
52F9000
heap
page read and write
BA0000
unkown
page read and write
3170000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
8050000
unkown
page read and write
2A50000
trusted library allocation
page read and write
5CD7000
heap
page read and write
7FF503287000
unkown
page readonly
7610000
unkown
page readonly
52DB000
heap
page read and write
BE99000
unkown
page read and write
6ED7000
unkown
page read and write
5C99000
heap
page read and write
2320000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
BB50000
unkown
page read and write
24E0000
unkown
page read and write
52F9000
heap
page read and write
24E0000
unkown
page read and write
DB0000
heap
page read and write
B30000
unkown
page read and write
BA0000
unkown
page read and write
7F80000
unkown
page read and write
523C000
heap
page read and write
BA0000
unkown
page read and write
1435000
heap
page read and write
5260000
heap
page read and write
8050000
unkown
page read and write
3370000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
BA0000
unkown
page read and write
BA0000
unkown
page read and write
BA0000
unkown
page read and write
1410000
trusted library allocation
page read and write
52F9000
heap
page read and write
5250000
heap
page read and write
52E6000
heap
page read and write
32D4000
heap
page read and write
5253000
heap
page read and write
BA0000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
FA93000
unkown
page read and write
3590000
remote allocation
page read and write
C20000
unkown
page read and write
52F9000
heap
page read and write
7F80000
unkown
page read and write
2520000
unkown
page read and write
5270000
heap
page read and write
2DF0000
unkown
page read and write
AAD0000
unkown
page read and write
5340000
heap
page read and write
52F9000
heap
page read and write
B990000
unkown
page read and write
8050000
unkown
page read and write
2A50000
trusted library allocation
page read and write
348C000
heap
page read and write
5CBC000
heap
page read and write
BB50000
unkown
page read and write
2A50000
trusted library allocation
page read and write
5305000
heap
page read and write
5281000
heap
page read and write
810000
trusted library allocation
page read and write
405000
unkown
page execute and read and write
8050000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
52C4000
heap
page read and write
A20000
trusted library allocation
page read and write
295E000
stack
page read and write
5253000
heap
page read and write
829C000
stack
page read and write
5270000
heap
page read and write
DD58000
unkown
page read and write
BA0000
unkown
page read and write
BA0000
unkown
page read and write
5253000
heap
page read and write
52EA000
heap
page read and write
A20000
trusted library allocation
page read and write
52B3000
heap
page read and write
BB50000
unkown
page read and write
B30000
unkown
page read and write
8050000
unkown
page read and write
31BE000
stack
page read and write
6EE6000
unkown
page read and write
523C000
heap
page read and write
BA0000
unkown
page read and write
52C7000
heap
page read and write
34AB000
heap
page read and write
5240000
heap
page read and write
BA0000
unkown
page read and write
5240000
heap
page read and write
B30000
unkown
page read and write
4463000
unkown
page read and write
52A2000
heap
page read and write
5305000
heap
page read and write
B009000
stack
page read and write
5240000
heap
page read and write
8889000
stack
page read and write
18E000
stack
page read and write
6F0F000
unkown
page read and write
52B3000
heap
page read and write
7FF5032CF000
unkown
page readonly
7FF50270A000
unkown
page readonly
52E6000
heap
page read and write
52A2000
heap
page read and write
4398000
unkown
page read and write
E910000
unkown
page read and write
5250000
heap
page read and write
5250000
heap
page read and write
3170000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
5260000
heap
page read and write
BA0000
unkown
page read and write
7FF502D18000
unkown
page readonly
A20000
trusted library allocation
page read and write
BC15000
unkown
page read and write
BB50000
unkown
page read and write
A20000
trusted library allocation
page read and write
BA0000
unkown
page read and write
5CB3000
heap
page read and write
8050000
unkown
page read and write
9B8A000
unkown
page read and write
52C7000
heap
page read and write
D5C000
stack
page read and write
5231000
heap
page read and write
3370000
trusted library allocation
page read and write
5CB7000
heap
page read and write
7FF503275000
unkown
page readonly
7FF50328F000
unkown
page readonly
7FF5032B5000
unkown
page readonly
B70000
unkown
page read and write
5F0000
heap
page read and write
7FF5030A5000
unkown
page readonly
2320000
trusted library allocation
page read and write
B990000
unkown
page read and write
5253000
heap
page read and write
52D6000
heap
page read and write
4BAE000
stack
page read and write
52A1000
heap
page read and write
5231000
heap
page read and write
BA0000
unkown
page read and write
52F9000
heap
page read and write
52F9000
heap
page read and write
3086000
unkown
page read and write
523C000
heap
page read and write
24E0000
unkown
page read and write
5281000
heap
page read and write
A20000
trusted library allocation
page read and write
5CCC000
heap
page read and write
349B000
heap
page read and write
7FF502EC9000
unkown
page readonly
3490000
trusted library allocation
page read and write
B30000
unkown
page read and write
C20000
unkown
page read and write
2320000
trusted library allocation
page read and write
9BF7000
unkown
page read and write
523C000
heap
page read and write
7FF502D45000
unkown
page readonly
523C000
heap
page read and write
1000000
trusted library allocation
page read and write
3297000
heap
page read and write
5270000
heap
page read and write
7FF503185000
unkown
page readonly
523C000
heap
page read and write
52F9000
heap
page read and write
4FF0000
trusted library allocation
page read and write
5250000
heap
page read and write
B70000
unkown
page read and write
5C99000
heap
page read and write
DA0000
trusted library allocation
page read and write
C20000
unkown
page read and write
5250000
heap
page read and write
B70000
unkown
page read and write
7690000
unkown
page read and write
B30000
unkown
page read and write
5270000
heap
page read and write
52B3000
heap
page read and write
5234000
heap
page read and write
BF7A000
unkown
page read and write
52E6000
heap
page read and write
B30000
unkown
page read and write
1410000
trusted library allocation
page read and write
32E6000
heap
page read and write
BA0000
unkown
page read and write
4CB0000
trusted library allocation
page read and write
8050000
unkown
page read and write
523C000
heap
page read and write
2A50000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
5291000
heap
page read and write
1000000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
B40000
heap
page read and write
7550000
unkown
page read and write
1000000
trusted library allocation
page read and write
2C70000
unkown
page readonly
B990000
unkown
page read and write
24E0000
unkown
page read and write
BB50000
unkown
page read and write
2A50000
trusted library allocation
page read and write
5C99000
heap
page read and write
3490000
trusted library allocation
page read and write
7FF5032EE000
unkown
page readonly
9366000
unkown
page read and write
190000
heap
page read and write
52F9000
heap
page read and write
8050000
unkown
page read and write
1000000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
34F7000
heap
page read and write
5270000
heap
page read and write
5256000
heap
page read and write
52E6000
heap
page read and write
5F4000
heap
page read and write
5240000
heap
page read and write
7FF50302D000
unkown
page readonly
2320000
trusted library allocation
page read and write
52E6000
heap
page read and write
1000000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
5231000
heap
page read and write
B70000
unkown
page read and write
32DE000
heap
page read and write
B990000
unkown
page read and write
AB1000
heap
page read and write
7FF50335D000
unkown
page readonly
5270000
heap
page read and write
4B71000
heap
page read and write
BA0000
unkown
page read and write
1000000
trusted library allocation
page read and write
B30000
unkown
page read and write
34BE000
heap
page read and write
2320000
trusted library allocation
page read and write
7FF5032F2000
unkown
page readonly
5231000
heap
page read and write
7FF503110000
unkown
page readonly
5240000
heap
page read and write
52F9000
heap
page read and write
3298000
heap
page read and write
2320000
trusted library allocation
page read and write
BA0000
unkown
page read and write
2320000
trusted library allocation
page read and write
349B000
heap
page read and write
BA0000
unkown
page read and write
B70000
unkown
page read and write
5270000
heap
page read and write
5309000
heap
page read and write
810000
trusted library allocation
page read and write
B570000
unkown
page read and write
7FF503365000
unkown
page readonly
5253000
heap
page read and write
3150000
heap
page read and write
3370000
trusted library allocation
page read and write
5CA8000
heap
page read and write
52A2000
heap
page read and write
52C7000
heap
page read and write
7FF502CF5000
unkown
page readonly
52B4000
heap
page read and write
9364000
unkown
page read and write
2130000
heap
page read and write
525B000
heap
page read and write
C012000
unkown
page read and write
8050000
unkown
page read and write
5260000
heap
page read and write
8050000
unkown
page read and write
3490000
trusted library allocation
page read and write
52F9000
heap
page read and write
5CB3000
heap
page read and write
5281000
heap
page read and write
534C000
heap
page read and write
7F80000
unkown
page read and write
7FF502B5F000
unkown
page readonly
5240000
heap
page read and write
B990000
unkown
page read and write
52A2000
heap
page read and write
8050000
unkown
page read and write
B990000
unkown
page read and write
5260000
heap
page read and write
52E6000
heap
page read and write
404000
unkown
page execute and write copy
52A2000
heap
page read and write
5253000
heap
page read and write
BA0000
unkown
page read and write
1000000
trusted library allocation
page read and write
2DC0000
unkown
page read and write
810000
trusted library allocation
page read and write
BB50000
unkown
page read and write
DD90000
unkown
page read and write
7FF503157000
unkown
page readonly
B30000
unkown
page read and write
5281000
heap
page read and write
9BDE000
unkown
page read and write
1000000
trusted library allocation
page read and write
52F9000
heap
page read and write
52F9000
heap
page read and write
A20000
trusted library allocation
page read and write
B30000
unkown
page read and write
C20000
unkown
page read and write
52E6000
heap
page read and write
7FF502291000
unkown
page readonly
2AA0000
unkown
page read and write
B30000
unkown
page read and write
53AB000
heap
page read and write
1410000
trusted library allocation
page read and write
BB50000
unkown
page read and write
531E000
heap
page read and write
B30000
unkown
page read and write
BB50000
unkown
page read and write
7FF5032AF000
unkown
page readonly
52A2000
heap
page read and write
7F80000
unkown
page read and write
401000
unkown
page execute and write copy
C0DE000
unkown
page read and write
A34A000
unkown
page read and write
5250000
heap
page read and write
BB50000
unkown
page read and write
1000000
trusted library allocation
page read and write
C20000
unkown
page read and write
52DC000
heap
page read and write
4C11000
heap
page read and write
5270000
heap
page read and write
1000000
trusted library allocation
page read and write
5250000
heap
page read and write
810000
trusted library allocation
page read and write
7F80000
unkown
page read and write
7FF502D9D000
unkown
page readonly
BEAF000
unkown
page read and write
52D6000
heap
page read and write
3094000
heap
page read and write
523A000
heap
page read and write
7F80000
unkown
page read and write
52C4000
heap
page read and write
4FF0000
trusted library allocation
page read and write
B30000
unkown
page read and write
9D6B000
unkown
page read and write
52C7000
heap
page read and write
5270000
heap
page read and write
9D54000
unkown
page read and write
9C2C000
unkown
page read and write
5250000
heap
page read and write
7FF502C4B000
unkown
page readonly
2A50000
trusted library allocation
page read and write
8220000
unkown
page read and write
52C4000
heap
page read and write
52D6000
heap
page read and write
4B70000
trusted library allocation
page read and write
BA0000
unkown
page read and write
52E6000
heap
page read and write
52B3000
heap
page read and write
9C000
stack
page read and write
52C4000
heap
page read and write
1000000
trusted library allocation
page read and write
8220000
unkown
page read and write
5262000
heap
page read and write
5253000
heap
page read and write
B70000
unkown
page read and write
3490000
trusted library allocation
page read and write
52F9000
heap
page read and write
BB50000
unkown
page read and write
1000000
trusted library allocation
page read and write
BB50000
unkown
page read and write
32FD000
heap
page read and write
52EA000
heap
page read and write
7FF5030AA000
unkown
page readonly
7FF503298000
unkown
page readonly
5270000
heap
page read and write
5281000
heap
page read and write
1000000
trusted library allocation
page read and write
52F9000
heap
page read and write
52F9000
heap
page read and write
B990000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
24E0000
unkown
page read and write
6F09000
unkown
page read and write
A20000
trusted library allocation
page read and write
8050000
unkown
page read and write
52D7000
heap
page read and write
D60000
heap
page read and write
24E0000
unkown
page read and write
5256000
heap
page read and write
B30000
unkown
page read and write
34BE000
heap
page read and write
52E6000
heap
page read and write
52C7000
heap
page read and write
7840000
unkown
page read and write
52D6000
heap
page read and write
34BE000
heap
page read and write
E90000
unkown
page readonly
5281000
heap
page read and write
54B000
heap
page read and write
5253000
heap
page read and write
2A50000
trusted library allocation
page read and write
52C7000
heap
page read and write
52B3000
heap
page read and write
349B000
heap
page read and write
2320000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
52F9000
heap
page read and write
5270000
heap
page read and write
BB50000
unkown
page read and write
7F80000
unkown
page read and write
2320000
trusted library allocation
page read and write
7FF50303F000
unkown
page readonly
2320000
trusted library allocation
page read and write
52A1000
heap
page read and write
BA0000
unkown
page read and write
52A2000
heap
page read and write
8050000
unkown
page read and write
3370000
trusted library allocation
page read and write
44B0000
unkown
page read and write
B610000
unkown
page read and write
52D6000
heap
page read and write
4FF0000
trusted library allocation
page read and write
5256000
heap
page read and write
5282000
heap
page read and write
BB0E000
stack
page read and write
B70000
unkown
page read and write
5253000
heap
page read and write
B990000
unkown
page read and write
BA0000
unkown
page read and write
BA0000
unkown
page read and write
525B000
heap
page read and write
7FF50301B000
unkown
page readonly
1410000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
5260000
heap
page read and write
5230000
heap
page read and write
52F9000
heap
page read and write
BA0000
unkown
page read and write
7FF503161000
unkown
page readonly
7750000
unkown
page read and write
5346000
heap
page read and write
4FF0000
trusted library allocation
page read and write
7F80000
unkown
page read and write
BB50000
unkown
page read and write
BA0000
unkown
page read and write
5271000
heap
page read and write
5270000
heap
page read and write
7FF502D91000
unkown
page readonly
B30000
unkown
page read and write
7FF50334D000
unkown
page readonly
24E0000
unkown
page read and write
4378000
unkown
page read and write
8050000
unkown
page read and write
BA0000
unkown
page read and write
52A2000
heap
page read and write
7FF50316E000
unkown
page readonly
5256000
heap
page read and write
347A000
heap
page read and write
52DB000
heap
page read and write
5253000
heap
page read and write
DD90000
unkown
page read and write
7FF502F9F000
unkown
page readonly
52A2000
heap
page read and write
2593000
heap
page read and write
BB50000
unkown
page read and write
5240000
heap
page read and write
1000000
trusted library allocation
page read and write
349B000
heap
page read and write
5250000
heap
page read and write
52A1000
heap
page read and write
5260000
heap
page read and write
1410000
trusted library allocation
page read and write
52B3000
heap
page read and write
BA0000
unkown
page read and write
E91A000
unkown
page read and write
5231000
heap
page read and write
A2F0000
unkown
page read and write
BA0000
unkown
page read and write
2320000
trusted library allocation
page read and write
52F9000
heap
page read and write
2A60000
unkown
page readonly
33AB000
stack
page read and write
2F10000
unkown
page readonly
B70000
unkown
page read and write
5260000
heap
page read and write
DA0000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
76F000
stack
page read and write
52C4000
heap
page read and write
BA0000
unkown
page read and write
3370000
trusted library allocation
page read and write
5240000
heap
page read and write
24E0000
unkown
page read and write
B70000
unkown
page read and write
B5E0000
unkown
page read and write
52D6000
heap
page read and write
5316000
heap
page read and write
525B000
heap
page read and write
52F9000
heap
page read and write
5250000
heap
page read and write
52B3000
heap
page read and write
3364000
heap
page read and write
7FF502B5A000
unkown
page readonly
52E6000
heap
page read and write
34BE000
heap
page read and write
530E000
heap
page read and write
5270000
heap
page read and write
D9C000
system
page execute and read and write
29E0000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
B237000
stack
page read and write
55AF000
stack
page read and write
52D6000
heap
page read and write
BB50000
unkown
page read and write
5250000
heap
page read and write
1000000
trusted library allocation
page read and write
B61000
unkown
page read and write
5260000
heap
page read and write
4FF0000
trusted library allocation
page read and write
305B000
stack
page read and write
5C99000
heap
page read and write
5260000
heap
page read and write
4B70000
trusted library allocation
page read and write
BA0000
unkown
page read and write
8090000
unkown
page read and write
52D6000
heap
page read and write
B30000
unkown
page read and write
3290000
heap
page read and write
24E0000
unkown
page read and write
5CBC000
heap
page read and write
BA0000
unkown
page read and write
5240000
heap
page read and write
7FF503114000
unkown
page readonly
5260000
heap
page read and write
2320000
trusted library allocation
page read and write
7690000
unkown
page read and write
9237000
unkown
page read and write
5240000
heap
page read and write
BA0000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
BA0000
unkown
page read and write
52CD000
heap
page read and write
5253000
heap
page read and write
348C000
heap
page read and write
52D6000
heap
page read and write
52EA000
heap
page read and write
9D58000
unkown
page read and write
7750000
unkown
page read and write
BA0000
unkown
page read and write
5CC0000
heap
page read and write
3490000
trusted library allocation
page read and write
C20000
unkown
page read and write
401000
unkown
page execute and read and write
52F9000
heap
page read and write
1000000
trusted library allocation
page read and write
BA0000
unkown
page read and write
5256000
heap
page read and write
34BE000
heap
page read and write
52E6000
heap
page read and write
5270000
heap
page read and write
5281000
heap
page read and write
3370000
trusted library allocation
page read and write
52A2000
heap
page read and write
52EA000
heap
page read and write
BA0000
unkown
page read and write
B70000
unkown
page read and write
533D000
heap
page read and write
BB50000
unkown
page read and write
8050000
unkown
page read and write
3490000
trusted library allocation
page read and write
7F80000
unkown
page read and write
52D6000
heap
page read and write
52E6000
heap
page read and write
DA0000
trusted library allocation
page read and write
7F80000
unkown
page read and write
5260000
heap
page read and write
819F000
stack
page read and write
7620000
unkown
page readonly
52F9000
heap
page read and write
7AC000
stack
page read and write
7F80000
unkown
page read and write
5281000
heap
page read and write
2A50000
trusted library allocation
page read and write
5311000
heap
page read and write
BB50000
unkown
page read and write
1000000
trusted library allocation
page read and write
BA0000
unkown
page read and write
7DF411ED1000
unkown
page execute read
5231000
heap
page read and write
5270000
heap
page read and write
7F80000
unkown
page read and write
7FF50310B000
unkown
page readonly
BA0000
unkown
page read and write
B990000
unkown
page read and write
58D000
heap
page read and write
9D60000
unkown
page read and write
34BE000
heap
page read and write
7720000
unkown
page readonly
4FF0000
trusted library allocation
page read and write
3082000
unkown
page read and write
24E0000
unkown
page read and write
859000
heap
page read and write
1410000
trusted library allocation
page read and write
52B3000
heap
page read and write
5291000
heap
page read and write
7FF502EF7000
unkown
page readonly
8050000
unkown
page read and write
7FF503126000
unkown
page readonly
B30000
unkown
page read and write
2320000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
8050000
unkown
page read and write
1000000
trusted library allocation
page read and write
B70000
unkown
page read and write
7FF502EC2000
unkown
page readonly
5256000
heap
page read and write
1000000
trusted library allocation
page read and write
7800000
unkown
page read and write
3240000
heap
page read and write
5270000
heap
page read and write
52A1000
heap
page read and write
52C7000
heap
page read and write
5250000
heap
page read and write
4D00000
unkown
page write copy
7F60000
unkown
page readonly
BA0000
unkown
page read and write
7370000
unkown
page read and write
24E0000
unkown
page read and write
3099000
stack
page read and write
8260000
unkown
page read and write
7FF503347000
unkown
page readonly
8050000
unkown
page read and write
3490000
trusted library allocation
page read and write
B30000
unkown
page read and write
52B3000
heap
page read and write
6EF3000
unkown
page read and write
B40000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
8050000
unkown
page read and write
3370000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
400000
unkown
page readonly
34BE000
heap
page read and write
810000
trusted library allocation
page read and write
5270000
heap
page read and write
2A50000
trusted library allocation
page read and write
52EA000
heap
page read and write
1AE000
stack
page read and write
24E0000
unkown
page read and write
5250000
heap
page read and write
5231000
heap
page read and write
7FF503235000
unkown
page readonly
7800000
unkown
page read and write
8050000
unkown
page read and write
91DE000
unkown
page read and write
52C4000
heap
page read and write
1410000
trusted library allocation
page read and write
2011000
heap
page read and write
2A90000
unkown
page readonly
BB50000
unkown
page read and write
52B3000
heap
page read and write
5250000
heap
page read and write
3490000
trusted library allocation
page read and write
5240000
heap
page read and write
3490000
trusted library allocation
page read and write
7FF502D15000
unkown
page readonly
5250000
heap
page read and write
ABCB000
stack
page read and write
B70000
unkown
page read and write
8050000
unkown
page read and write
A20000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
BA0000
unkown
page read and write
52F2000
heap
page read and write
7F80000
unkown
page read and write
5250000
heap
page read and write
52B3000
heap
page read and write
52E6000
heap
page read and write
7FF000
stack
page read and write
BA0000
unkown
page read and write
7FF5031B0000
unkown
page readonly
5253000
heap
page read and write
2320000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
7FF5032DF000
unkown
page readonly
52D6000
heap
page read and write
99FF000
stack
page read and write
BA0000
unkown
page read and write
52B3000
heap
page read and write
4CA0000
heap
page read and write
5CC0000
heap
page read and write
52C4000
heap
page read and write
5260000
heap
page read and write
52F9000
heap
page read and write
2320000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
5270000
heap
page read and write
A20000
trusted library allocation
page read and write
B30000
unkown
page read and write
1000000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
52F9000
heap
page read and write
4B71000
heap
page read and write
DA0000
trusted library allocation
page read and write
24E0000
unkown
page read and write
5270000
heap
page read and write
3370000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
7FF5031B7000
unkown
page readonly
5270000
heap
page read and write
5256000
heap
page read and write
7FF502DB3000
unkown
page readonly
5250000
heap
page read and write
4FF0000
trusted library allocation
page read and write
BA0000
unkown
page read and write
52D6000
heap
page read and write
35C6000
heap
page read and write
5231000
heap
page read and write
32D4000
heap
page read and write
BA0000
unkown
page read and write
DD000
stack
page read and write
52F9000
heap
page read and write
BA0000
unkown
page read and write
BA0000
unkown
page read and write
2C80000
unkown
page readonly
2A50000
trusted library allocation
page read and write
3304000
heap
page read and write
523C000
heap
page read and write
2C5B000
stack
page read and write
530E000
heap
page read and write
5250000
heap
page read and write
5291000
heap
page read and write
BB50000
unkown
page read and write
5270000
heap
page read and write
52B3000
heap
page read and write
5234000
heap
page read and write
997F000
stack
page read and write
8110000
unkown
page read and write
96CC000
stack
page read and write
8050000
unkown
page read and write
5260000
heap
page read and write
34BE000
heap
page read and write
5CB5000
heap
page read and write
164000
heap
page read and write
5253000
heap
page read and write
34F0000
heap
page read and write
3170000
trusted library allocation
page read and write
8050000
unkown
page read and write
B30000
unkown
page read and write
5256000
heap
page read and write
52EA000
heap
page read and write
5CC0000
heap
page read and write
52B3000
heap
page read and write
2A50000
trusted library allocation
page read and write
5253000
heap
page read and write
32D4000
heap
page read and write
52B3000
heap
page read and write
B990000
unkown
page read and write
32DE000
heap
page read and write
5260000
heap
page read and write
B990000
unkown
page read and write
5CBC000
heap
page read and write
3550000
heap
page read and write
7FF502B7F000
unkown
page readonly
3490000
trusted library allocation
page read and write
E85000
heap
page read and write
2320000
trusted library allocation
page read and write
5C99000
heap
page read and write
52E6000
heap
page read and write
52D6000
heap
page read and write
52F9000
heap
page read and write
5234000
heap
page read and write
52F9000
heap
page read and write
523C000
heap
page read and write
AAD0000
unkown
page read and write
B990000
unkown
page read and write
B990000
unkown
page read and write
B70000
unkown
page read and write
1000000
trusted library allocation
page read and write
34BE000
heap
page read and write
7FF502EBB000
unkown
page readonly
6ED9000
unkown
page read and write
52C7000
heap
page read and write
5270000
heap
page read and write
52EA000
heap
page read and write
530E000
heap
page read and write
7FF502FA2000
unkown
page readonly
5256000
heap
page read and write
9D03000
unkown
page read and write
7FF502E60000
unkown
page readonly
BA0000
unkown
page read and write
52D6000
heap
page read and write
BF2E000
unkown
page read and write
2320000
trusted library allocation
page read and write
B30000
unkown
page read and write
7FF503223000
unkown
page readonly
5270000
heap
page read and write
7FF5030E6000
unkown
page readonly
5270000
heap
page read and write
BB50000
unkown
page read and write
5256000
heap
page read and write
10A0000
heap
page read and write
7FF502DDC000
unkown
page readonly
52C7000
heap
page read and write
4FF0000
trusted library allocation
page read and write
5C99000
heap
page read and write
5C99000
heap
page read and write
7FF502C9D000
unkown
page readonly
BA0000
unkown
page read and write
52E6000
heap
page read and write
5250000
heap
page read and write
BA0000
unkown
page read and write
5B9B000
heap
page read and write
52C4000
heap
page read and write
523C000
heap
page read and write
52E6000
heap
page read and write
5CB6000
heap
page read and write
BA0000
unkown
page read and write
94D000
stack
page read and write
1000000
trusted library allocation
page read and write
B990000
unkown
page read and write
52F9000
heap
page read and write
A20000
trusted library allocation
page read and write
34BE000
heap
page read and write
7FF502F47000
unkown
page readonly
7FF502D6B000
unkown
page readonly
7FF5030CE000
unkown
page readonly
2320000
trusted library allocation
page read and write
52EA000
heap
page read and write
BA0000
unkown
page read and write
BA0000
unkown
page read and write
2320000
trusted library allocation
page read and write
A7ED000
stack
page read and write
AE1000
unkown
page readonly
A20000
trusted library allocation
page read and write
52D6000
heap
page read and write
5253000
heap
page read and write
7750000
unkown
page read and write
74C2000
unkown
page read and write
7FF502F22000
unkown
page readonly
5260000
heap
page read and write
52E6000
heap
page read and write
52C4000
heap
page read and write
2A50000
trusted library allocation
page read and write
52F9000
heap
page read and write
7FF502F4B000
unkown
page readonly
900000
heap
page read and write
52F9000
heap
page read and write
52C7000
heap
page read and write
52D6000
heap
page read and write
317E000
stack
page read and write
BC08000
unkown
page read and write
7F80000
unkown
page read and write
32C1000
heap
page read and write
2A50000
trusted library allocation
page read and write
BA0000
unkown
page read and write
190000
heap
page read and write
52C7000
heap
page read and write
DD0000
heap
page read and write
5291000
heap
page read and write
2B58000
stack
page read and write
52E6000
heap
page read and write
24E0000
unkown
page read and write
52B3000
heap
page read and write
7690000
unkown
page read and write
A20000
trusted library allocation
page read and write
52EA000
heap
page read and write
810000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
52D6000
heap
page read and write
B60000
heap
page read and write
5270000
heap
page read and write
5256000
heap
page read and write
BB50000
unkown
page read and write
3170000
trusted library allocation
page read and write
5312000
heap
page read and write
2A50000
trusted library allocation
page read and write
5260000
heap
page read and write
52B3000
heap
page read and write
7FF502E0A000
unkown
page readonly
2A50000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
34BE000
heap
page read and write
52B3000
heap
page read and write
32C2000
heap
page read and write
5231000
heap
page read and write
32C5000
heap
page read and write
2A50000
trusted library allocation
page read and write
52F9000
heap
page read and write
5250000
heap
page read and write
5270000
heap
page read and write
3490000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
BBE8000
unkown
page read and write
BA0000
unkown
page read and write
91A7000
unkown
page read and write
52D7000
heap
page read and write
7FF502D41000
unkown
page readonly
AB2000
heap
page read and write
5256000
heap
page read and write
FA54000
unkown
page read and write
52E6000
heap
page read and write
A20000
trusted library allocation
page read and write
B70000
unkown
page read and write
A20000
trusted library allocation
page read and write
BA0000
unkown
page read and write
52E6000
heap
page read and write
C093000
unkown
page read and write
32E9000
heap
page read and write
5331000
heap
page read and write
5291000
heap
page read and write
52B3000
heap
page read and write
24E0000
unkown
page read and write
7F80000
unkown
page read and write
52B3000
heap
page read and write
810000
trusted library allocation
page read and write
2EF0000
stack
page read and write
4FF0000
trusted library allocation
page read and write
987E000
stack
page read and write
349B000
heap
page read and write
2320000
trusted library allocation
page read and write
5250000
heap
page read and write
7FF503087000
unkown
page readonly
A20000
trusted library allocation
page read and write
52E6000
heap
page read and write
B70000
unkown
page read and write
7FF502EF3000
unkown
page readonly
9C000
stack
page read and write
5260000
heap
page read and write
401000
unkown
page execute and read and write
1000000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
5260000
heap
page read and write
5312000
heap
page read and write
7F80000
unkown
page read and write
8050000
unkown
page read and write
DA0000
trusted library allocation
page read and write
5260000
heap
page read and write
3170000
trusted library allocation
page read and write
523C000
heap
page read and write
5270000
heap
page read and write
34BE000
heap
page read and write
9CF2000
unkown
page read and write
52C4000
heap
page read and write
5250000
heap
page read and write
52E6000
heap
page read and write
52D7000
heap
page read and write
5256000
heap
page read and write
52EA000
heap
page read and write
8090000
unkown
page read and write
52F9000
heap
page read and write
BDE0000
unkown
page read and write
5253000
heap
page read and write
4FF0000
trusted library allocation
page read and write
7690000
unkown
page read and write
330C000
heap
page read and write
BA0000
unkown
page read and write
DA0000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
31EF000
stack
page read and write
8220000
unkown
page read and write
404000
unkown
page execute and write copy
BA0000
unkown
page read and write
5250000
heap
page read and write
52E6000
heap
page read and write
2320000
trusted library allocation
page read and write
52F9000
heap
page read and write
3490000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
52D6000
heap
page read and write
BA0000
unkown
page read and write
5270000
heap
page read and write
93C000
stack
page read and write
4FF0000
trusted library allocation
page read and write
BEE8000
unkown
page read and write
5260000
heap
page read and write
34BE000
heap
page read and write
52E6000
heap
page read and write
5234000
heap
page read and write
BA0000
unkown
page read and write
52EA000
heap
page read and write
7FF50317C000
unkown
page readonly
BDCB000
unkown
page read and write
2BDA000
stack
page read and write
B30000
unkown
page read and write
2320000
trusted library allocation
page read and write
5270000
heap
page read and write
5CB3000
heap
page read and write
5240000
heap
page read and write
3364000
heap
page read and write
3490000
trusted library allocation
page read and write
7A60000
unkown
page read and write
35C0000
heap
page read and write
52E1000
heap
page read and write
7FF5031C3000
unkown
page readonly
7549000
stack
page read and write
52D6000
heap
page read and write
52EA000
heap
page read and write
5260000
heap
page read and write
BA0000
unkown
page read and write
2320000
trusted library allocation
page read and write
BA0000
unkown
page read and write
2320000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
52C4000
heap
page read and write
7FF502FAF000
unkown
page readonly
9092000
unkown
page read and write
810000
trusted library allocation
page read and write
977E000
stack
page read and write
B70000
unkown
page read and write
5270000
heap
page read and write
2A50000
trusted library allocation
page read and write
BA0000
unkown
page read and write
3170000
trusted library allocation
page read and write
7FF502C2E000
unkown
page readonly
7F80000
unkown
page read and write
5253000
heap
page read and write
3490000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
5270000
heap
page read and write
2320000
trusted library allocation
page read and write
3090000
heap
page read and write
52C4000
heap
page read and write
2320000
trusted library allocation
page read and write
4E61000
heap
page read and write
5270000
heap
page read and write
52EA000
heap
page read and write
7F80000
unkown
page read and write
5231000
heap
page read and write
A20000
trusted library allocation
page read and write
5CCB000
heap
page read and write
5260000
heap
page read and write
24E0000
unkown
page read and write
6FF000
stack
page read and write
3510000
heap
page read and write
BA0000
unkown
page read and write
52E6000
heap
page read and write
5130000
heap
page read and write
5260000
heap
page read and write
52D6000
heap
page read and write
30F0000
heap
page read and write
B990000
unkown
page read and write
A34D000
unkown
page read and write
A20000
trusted library allocation
page read and write
32E9000
heap
page read and write
34BE000
heap
page read and write
2590000
heap
page read and write
5260000
heap
page read and write
5270000
heap
page read and write
1410000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
BA0000
unkown
page read and write
2320000
trusted library allocation
page read and write
52D6000
heap
page read and write
B990000
unkown
page read and write
3364000
heap
page read and write
52EA000
heap
page read and write
9CF6000
unkown
page read and write
52A2000
heap
page read and write
32C5000
heap
page read and write
24E0000
unkown
page read and write
52D6000
heap
page read and write
6FE3000
unkown
page read and write
5C99000
heap
page read and write
7FF502DC3000
unkown
page readonly
810000
trusted library allocation
page read and write
5250000
heap
page read and write
3060000
heap
page read and write
1000000
trusted library allocation
page read and write
BA0000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
5270000
heap
page read and write
52F9000
heap
page read and write
B30000
unkown
page read and write
52A2000
heap
page read and write
52E6000
heap
page read and write
5291000
heap
page read and write
3170000
trusted library allocation
page read and write
18E000
stack
page read and write
24E0000
unkown
page read and write
327E000
stack
page read and write
8050000
unkown
page read and write
52D6000
heap
page read and write
349B000
heap
page read and write
52D6000
heap
page read and write
32CC000
heap
page read and write
B30000
unkown
page read and write
BFAE000
unkown
page read and write
BA0000
unkown
page read and write
3170000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
5250000
heap
page read and write
A20000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
52D7000
heap
page read and write
7DF411F01000
unkown
page execute read
DA0000
trusted library allocation
page read and write
5270000
heap
page read and write
2320000
trusted library allocation
page read and write
B70000
unkown
page read and write
309D000
unkown
page read and write
BA0000
unkown
page read and write
7690000
unkown
page read and write
1DE000
stack
page read and write
5250000
heap
page read and write
2320000
trusted library allocation
page read and write
80CC000
stack
page read and write
B5F0000
unkown
page readonly
7FF502E8F000
unkown
page readonly
34BE000
heap
page read and write
BB50000
unkown
page read and write
52F9000
heap
page read and write
7FF503187000
unkown
page readonly
BA0000
unkown
page read and write
19A000
heap
page read and write
7A58000
stack
page read and write
3490000
trusted library allocation
page read and write
5362000
heap
page read and write
810000
trusted library allocation
page read and write
B30000
unkown
page read and write
5270000
heap
page read and write
AAA0000
unkown
page readonly
B990000
unkown
page read and write
9CCF000
unkown
page read and write
52F9000
heap
page read and write
7FF502F88000
unkown
page readonly
32D7000
heap
page read and write
BC0C000
unkown
page read and write
BA0000
unkown
page read and write
52A2000
heap
page read and write
5270000
heap
page read and write
52C7000
heap
page read and write
BA0000
unkown
page read and write
7FF502E53000
unkown
page readonly
5270000
heap
page read and write
5250000
heap
page read and write
5305000
heap
page read and write
3170000
trusted library allocation
page read and write
5270000
heap
page read and write
7FF502DAD000
unkown
page readonly
29E0000
trusted library allocation
page read and write
BA0000
unkown
page read and write
2DE0000
unkown
page read and write
31FE000
stack
page read and write
32CC000
heap
page read and write
5240000
heap
page read and write
BB50000
unkown
page read and write
52EA000
heap
page read and write
52D7000
heap
page read and write
7FF5030B4000
unkown
page readonly
B70000
unkown
page read and write
120000
heap
page read and write
BA0000
unkown
page read and write
5260000
heap
page read and write
8A49000
stack
page read and write
34BE000
heap
page read and write
3170000
trusted library allocation
page read and write
52CB000
heap
page read and write
52D6000
heap
page read and write
5314000
heap
page read and write
5253000
heap
page read and write
5270000
heap
page read and write
5270000
heap
page read and write
A20000
trusted library allocation
page read and write
7FF502E03000
unkown
page readonly
3490000
trusted library allocation
page read and write
52C4000
heap
page read and write
2320000
trusted library allocation
page read and write
5270000
heap
page read and write
530A000
heap
page read and write
7651000
unkown
page read and write
BA0000
unkown
page read and write
32F7000
heap
page read and write
52C4000
heap
page read and write
B70000
unkown
page read and write
810000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
B70000
unkown
page read and write
52F9000
heap
page read and write
D9A000
system
page execute and read and write
BA0000
unkown
page read and write
7F80000
unkown
page read and write
52D6000
heap
page read and write
5C99000
heap
page read and write
5260000
heap
page read and write
BC21000
unkown
page read and write
810000
trusted library allocation
page read and write
8050000
unkown
page read and write
5281000
heap
page read and write
52D7000
heap
page read and write
5270000
heap
page read and write
B9C0000
unkown
page read and write
79DE000
stack
page read and write
5270000
heap
page read and write
3350000
heap
page read and write
3490000
trusted library allocation
page read and write
BA0000
unkown
page read and write
160000
heap
page read and write
5253000
heap
page read and write
5256000
heap
page read and write
52A2000
heap
page read and write
BA0000
unkown
page read and write
52E6000
heap
page read and write
523C000
heap
page read and write
52C7000
heap
page read and write
5C99000
heap
page read and write
5A9D000
heap
page read and write
B30000
unkown
page read and write
5234000
heap
page read and write
7FF502DBC000
unkown
page readonly
1000000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
5260000
heap
page read and write
2A50000
trusted library allocation
page read and write
5250000
heap
page read and write
5253000
heap
page read and write
8050000
unkown
page read and write
32C0000
heap
page read and write
7FF502E62000
unkown
page readonly
52E6000
heap
page read and write
821B000
stack
page read and write
5250000
heap
page read and write
5231000
heap
page read and write
2A50000
trusted library allocation
page read and write
8220000
unkown
page read and write
A20000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
5C99000
heap
page read and write
2A50000
trusted library allocation
page read and write
526C000
heap
page read and write
5250000
heap
page read and write
52C4000
heap
page read and write
BB50000
unkown
page read and write
5264000
heap
page read and write
5270000
heap
page read and write
B990000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
5C99000
heap
page read and write
5253000
heap
page read and write
32C4000
heap
page read and write
E80000
heap
page read and write
BA0000
unkown
page read and write
8050000
unkown
page read and write
1000000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
24E0000
unkown
page read and write
76B000
stack
page read and write
BB50000
unkown
page read and write
5240000
heap
page read and write
52C7000
heap
page read and write
B30000
unkown
page read and write
ABD0000
unkown
page read and write
4B70000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
7F80000
unkown
page read and write
C20000
unkown
page read and write
5270000
heap
page read and write
DD90000
unkown
page read and write
BA0000
unkown
page read and write
533B000
heap
page read and write
5270000
heap
page read and write
24E0000
unkown
page read and write
43AC000
unkown
page read and write
BBFA000
unkown
page read and write
34AB000
heap
page read and write
24E0000
unkown
page read and write
A20000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
52E6000
heap
page read and write
1080000
heap
page read and write
7FF502D8F000
unkown
page readonly
5A9D000
heap
page read and write
348C000
heap
page read and write
32C7000
heap
page read and write
52E6000
heap
page read and write
32DF000
heap
page read and write
52A2000
heap
page read and write
1000000
trusted library allocation
page read and write
3290000
heap
page read and write
7470000
unkown
page read and write
B30000
unkown
page read and write
52EA000
heap
page read and write
BA0000
unkown
page read and write
5240000
heap
page read and write
52D6000
heap
page read and write
8D48000
stack
page read and write
8220000
unkown
page read and write
5260000
heap
page read and write
52F9000
heap
page read and write
52A2000
heap
page read and write
5270000
heap
page read and write
5231000
heap
page read and write
A20000
trusted library allocation
page read and write
8603000
unkown
page read and write
5270000
heap
page read and write
5280000
heap
page read and write
BA8B000
stack
page read and write
523C000
heap
page read and write
7FF502CCE000
unkown
page readonly
52A2000
heap
page read and write
DA0000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
7FF5026FF000
unkown
page readonly
52D6000
heap
page read and write
7FF502D25000
unkown
page readonly
3170000
trusted library allocation
page read and write
5270000
heap
page read and write
5260000
heap
page read and write
5281000
heap
page read and write
32E2000
heap
page read and write
2320000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
5C99000
heap
page read and write
BA0000
unkown
page read and write
4B70000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
52F9000
heap
page read and write
24E0000
unkown
page read and write
52A2000
heap
page read and write
8050000
unkown
page read and write
1000000
trusted library allocation
page read and write
CBE000
stack
page read and write
1410000
trusted library allocation
page read and write
43FD000
unkown
page read and write
7FF502CDD000
unkown
page readonly
34BE000
heap
page read and write
BB50000
unkown
page read and write
B70000
unkown
page read and write
7F80000
unkown
page read and write
BA0000
unkown
page read and write
52D7000
heap
page read and write
5270000
heap
page read and write
5250000
heap
page read and write
7FF502F66000
unkown
page readonly
52C7000
heap
page read and write
2320000
trusted library allocation
page read and write
6EC0000
unkown
page read and write
8050000
unkown
page read and write
3490000
trusted library allocation
page read and write
5240000
heap
page read and write
BA0000
unkown
page read and write
3364000
heap
page read and write
5291000
heap
page read and write
526C000
heap
page read and write
52C4000
heap
page read and write
24E0000
unkown
page read and write
5341000
heap
page read and write
BA0000
unkown
page read and write
52D7000
heap
page read and write
BDF0000
unkown
page read and write
B70000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
B990000
unkown
page read and write
A20000
trusted library allocation
page read and write
5270000
heap
page read and write
52B3000
heap
page read and write
8050000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
8F0000
heap
page read and write
7F80000
unkown
page read and write
5270000
heap
page read and write
52F9000
heap
page read and write
3170000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
5231000
heap
page read and write
531E000
heap
page read and write
7F80000
unkown
page read and write
A8EA000
stack
page read and write
43C7000
unkown
page read and write
52DB000
heap
page read and write
7FF502D65000
unkown
page readonly
EA52000
heap
page read and write
5270000
heap
page read and write
52F9000
heap
page read and write
1090000
unkown
page readonly
E901000
unkown
page read and write
BD6C000
unkown
page read and write
BA0000
unkown
page read and write
BA0000
unkown
page read and write
5240000
heap
page read and write
32C2000
heap
page read and write
BA0000
unkown
page read and write
5260000
heap
page read and write
2320000
trusted library allocation
page read and write
BA0000
unkown
page read and write
52B3000
heap
page read and write
B30000
unkown
page read and write
B30000
unkown
page read and write
404000
unkown
page execute and write copy
130000
heap
page read and write
7FF503239000
unkown
page readonly
BA0000
unkown
page read and write
BA0000
unkown
page read and write
8260000
stack
page read and write
AB1000
heap
page read and write
5260000
heap
page read and write
56D000
heap
page read and write
2A50000
trusted library allocation
page read and write
BA0000
unkown
page read and write
5281000
heap
page read and write
5281000
heap
page read and write
3490000
trusted library allocation
page read and write
52E6000
heap
page read and write
5256000
heap
page read and write
8050000
unkown
page read and write
FB14000
unkown
page read and write
5CB1000
heap
page read and write
5234000
heap
page read and write
349B000
heap
page read and write
56E0000
heap
page read and write
52A3000
heap
page read and write
B70000
unkown
page read and write
3094000
heap
page read and write
830000
heap
page read and write
BFB9000
unkown
page read and write
7FF502D00000
unkown
page readonly
34BE000
heap
page read and write
3490000
trusted library allocation
page read and write
A35E000
unkown
page read and write
1000000
trusted library allocation
page read and write
3270000
heap
page read and write
B990000
unkown
page read and write
A39000
system
page execute and read and write
32F0000
heap
page read and write
7490000
unkown
page read and write
24E0000
unkown
page read and write
6EB0000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
AAB000
heap
page read and write
A20000
trusted library allocation
page read and write
52B5000
heap
page read and write
A20000
trusted library allocation
page read and write
7FF5032C2000
unkown
page readonly
3490000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
52B3000
heap
page read and write
2320000
trusted library allocation
page read and write
BB50000
unkown
page read and write
5260000
heap
page read and write
5260000
heap
page read and write
52C4000
heap
page read and write
52E6000
heap
page read and write
5250000
heap
page read and write
DA0000
trusted library allocation
page read and write
34BE000
heap
page read and write
5270000
heap
page read and write
8050000
unkown
page read and write
5260000
heap
page read and write
95C4000
unkown
page read and write
5291000
heap
page read and write
3364000
heap
page read and write
52A2000
heap
page read and write
A20000
trusted library allocation
page read and write
5260000
heap
page read and write
7FF503216000
unkown
page readonly
B990000
unkown
page read and write
5260000
heap
page read and write
2A50000
trusted library allocation
page read and write
5250000
heap
page read and write
5260000
heap
page read and write
B30000
unkown
page read and write
5CAC000
heap
page read and write
5291000
heap
page read and write
10A9000
heap
page read and write
59A8000
heap
page read and write
52E6000
heap
page read and write
9D000
stack
page read and write
E30000
unkown
page read and write
7FF502D61000
unkown
page readonly
2C40000
heap
page read and write
9B83000
unkown
page read and write
531E000
heap
page read and write
9D01000
unkown
page read and write
A20000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
DE90000
unkown
page read and write
7FF50318B000
unkown
page readonly
5253000
heap
page read and write
2320000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
5260000
heap
page read and write
BA0000
unkown
page read and write
B65000
heap
page read and write
5260000
heap
page read and write
D40000
heap
page read and write
3094000
heap
page read and write
B990000
unkown
page read and write
7FF503231000
unkown
page readonly
DD90000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
5240000
heap
page read and write
7480000
unkown
page read and write
3370000
trusted library allocation
page read and write
5270000
heap
page read and write
9A7F000
stack
page read and write
BA0000
unkown
page read and write
5253000
heap
page read and write
52C7000
heap
page read and write
B990000
unkown
page read and write
DE90000
unkown
page read and write
5250000
heap
page read and write
5240000
heap
page read and write
7FF50331F000
unkown
page readonly
7FF502B5D000
unkown
page readonly
5CB7000
heap
page read and write
524B000
heap
page read and write
B990000
unkown
page read and write
349B000
heap
page read and write
B30000
unkown
page read and write
52B3000
heap
page read and write
4B71000
heap
page read and write
8050000
unkown
page read and write
2F20000
unkown
page readonly
B590000
heap
page read and write
B30000
unkown
page read and write
5234000
heap
page read and write
8050000
unkown
page read and write
32E5000
heap
page read and write
5256000
heap
page read and write
24E0000
unkown
page read and write
531E000
heap
page read and write
2320000
trusted library allocation
page read and write
52E6000
heap
page read and write
4E60000
heap
page read and write
349B000
heap
page read and write
DA0000
trusted library allocation
page read and write
3006000
system
page execute and read and write
3088000
unkown
page read and write
523C000
heap
page read and write
DD000
stack
page read and write
2320000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
BA0000
unkown
page read and write
5CAF000
heap
page read and write
5270000
heap
page read and write
DA0000
trusted library allocation
page read and write
7FF502D04000
unkown
page readonly
52D6000
heap
page read and write
5310000
heap
page read and write
4FF0000
trusted library allocation
page read and write
52E6000
heap
page read and write
9330000
unkown
page read and write
AAD0000
unkown
page read and write
8050000
unkown
page read and write
34AB000
heap
page read and write
52C4000
heap
page read and write
810000
trusted library allocation
page read and write
5253000
heap
page read and write
401000
unkown
page execute and write copy
B70000
unkown
page read and write
5C99000
heap
page read and write
7F80000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
BEE6000
unkown
page read and write
9450000
unkown
page readonly
3490000
trusted library allocation
page read and write
3590000
remote allocation
page read and write
52C4000
heap
page read and write
43B0000
unkown
page read and write
52EA000
heap
page read and write
3094000
heap
page read and write
5240000
heap
page read and write
93F6000
unkown
page read and write
7FF502B6E000
unkown
page readonly
5256000
heap
page read and write
32D4000
heap
page read and write
7FF503335000
unkown
page readonly
43EA000
unkown
page read and write
BB50000
unkown
page read and write
B30000
unkown
page read and write
7F80000
unkown
page read and write
2A50000
trusted library allocation
page read and write
52F9000
heap
page read and write
831E000
stack
page read and write
4FF0000
trusted library allocation
page read and write
52CD000
heap
page read and write
52E6000
heap
page read and write
5256000
heap
page read and write
1000000
trusted library allocation
page read and write
52F9000
heap
page read and write
90DA000
unkown
page read and write
DA0000
trusted library allocation
page read and write
52C4000
heap
page read and write
52B3000
heap
page read and write
5260000
heap
page read and write
A79000
heap
page read and write
7FF502E5E000
unkown
page readonly
5250000
heap
page read and write
530C000
heap
page read and write
7F80000
unkown
page read and write
BA0000
unkown
page read and write
5253000
heap
page read and write
3370000
trusted library allocation
page read and write
BA0000
unkown
page read and write
52E6000
heap
page read and write
34BE000
heap
page read and write
8E0000
unkown
page readonly
A20000
trusted library allocation
page read and write
52C4000
heap
page read and write
2320000
trusted library allocation
page read and write
24E0000
unkown
page read and write
30AC000
unkown
page read and write
BA0000
unkown
page read and write
B990000
unkown
page read and write
5250000
heap
page read and write
5250000
heap
page read and write
9AFF000
stack
page read and write
439B000
unkown
page read and write
7FF50327C000
unkown
page readonly
B990000
unkown
page read and write
52AD000
heap
page read and write
5270000
heap
page read and write
34AB000
heap
page read and write
5270000
heap
page read and write
2A50000
trusted library allocation
page read and write
BA0000
unkown
page read and write
5316000
heap
page read and write
1000000
trusted library allocation
page read and write
7FB000
stack
page read and write
B2BA000
stack
page read and write
8090000
unkown
page read and write
52E6000
heap
page read and write
3305000
heap
page read and write
7FF503257000
unkown
page readonly
5240000
heap
page read and write
5281000
heap
page read and write
A364000
unkown
page read and write
810000
trusted library allocation
page read and write
5270000
heap
page read and write
32F7000
heap
page read and write
32D6000
heap
page read and write
5270000
heap
page read and write
2A50000
trusted library allocation
page read and write
BB50000
unkown
page read and write
5250000
heap
page read and write
80D0000
unkown
page read and write
1EE000
stack
page read and write
56A5000
heap
page read and write
52F9000
heap
page read and write
5256000
heap
page read and write
52EA000
heap
page read and write
8050000
unkown
page read and write
52C4000
heap
page read and write
7FF502D29000
unkown
page readonly
BA0000
unkown
page read and write
7FF502D68000
unkown
page readonly
BA0000
unkown
page read and write
1000000
trusted library allocation
page read and write
8BC8000
stack
page read and write
8050000
unkown
page read and write
5CD5000
heap
page read and write
1410000
trusted library allocation
page read and write
BB50000
unkown
page read and write
BA0000
unkown
page read and write
1000000
trusted library allocation
page read and write
5250000
heap
page read and write
8050000
unkown
page read and write
5240000
heap
page read and write
5C99000
heap
page read and write
BB50000
unkown
page read and write
523C000
heap
page read and write
5250000
heap
page read and write
1000000
trusted library allocation
page read and write
4E61000
heap
page read and write
1000000
trusted library allocation
page read and write
52EA000
heap
page read and write
8050000
unkown
page read and write
5260000
heap
page read and write
5270000
heap
page read and write
8070000
unkown
page read and write
810000
unkown
page readonly
5270000
heap
page read and write
5240000
heap
page read and write
5260000
heap
page read and write
5260000
heap
page read and write
810000
trusted library allocation
page read and write
5253000
heap
page read and write
BA0000
unkown
page read and write
7FF5032BD000
unkown
page readonly
B549000
stack
page read and write
52F9000
heap
page read and write
BA0000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
52E6000
heap
page read and write
3520000
remote allocation
page read and write
2250000
unclassified section
page read and write
29D6000
stack
page read and write
A98F000
stack
page read and write
BDA9000
unkown
page read and write
9D0D000
unkown
page read and write
130000
heap
page read and write
24E0000
unkown
page read and write
52D6000
heap
page read and write
34BE000
heap
page read and write
34BE000
heap
page read and write
BA0000
unkown
page read and write
3170000
trusted library allocation
page read and write
52F9000
heap
page read and write
2AC0000
unkown
page readonly
7FF503360000
unkown
page readonly
B990000
unkown
page read and write
BA0000
unkown
page read and write
1000000
trusted library allocation
page read and write
BA0000
unkown
page read and write
52CC000
heap
page read and write
32D4000
heap
page read and write
32C3000
heap
page read and write
5270000
heap
page read and write
BB50000
unkown
page read and write
3490000
trusted library allocation
page read and write
5250000
heap
page read and write
52F9000
heap
page read and write
5256000
heap
page read and write
24E0000
unkown
page read and write
3370000
trusted library allocation
page read and write
7FF502B93000
unkown
page readonly
58A1000
heap
page read and write
52E6000
heap
page read and write
AA3000
heap
page read and write
7FF50324D000
unkown
page readonly
B30000
unkown
page read and write
2320000
trusted library allocation
page read and write
560000
heap
page read and write
3490000
trusted library allocation
page read and write
5260000
heap
page read and write
52D6000
heap
page read and write
5250000
heap
page read and write
8050000
unkown
page read and write
52D6000
heap
page read and write
7FF503108000
unkown
page readonly
4FF0000
trusted library allocation
page read and write
5260000
heap
page read and write
BB50000
unkown
page read and write
5270000
heap
page read and write
2010000
heap
page read and write
400000
unkown
page readonly
7FF503082000
unkown
page readonly
BA0000
unkown
page read and write
BA0000
unkown
page read and write
B70000
unkown
page read and write
BA0000
unkown
page read and write
5231000
heap
page read and write
9C09000
unkown
page read and write
5250000
heap
page read and write
2A50000
trusted library allocation
page read and write
52E1000
heap
page read and write
BB50000
unkown
page read and write
3490000
trusted library allocation
page read and write
52D6000
heap
page read and write
52C4000
heap
page read and write
52D6000
heap
page read and write
B30000
unkown
page read and write
AAD0000
unkown
page read and write
5231000
heap
page read and write
BA0000
unkown
page read and write
4E49000
unkown
page read and write
5C99000
heap
page read and write
24E0000
unkown
page read and write
8220000
unkown
page read and write
5270000
heap
page read and write
5CAD000
heap
page read and write
2320000
trusted library allocation
page read and write
52E6000
heap
page read and write
6FBF000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
307E000
unkown
page read and write
1430000
heap
page read and write
3490000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
5260000
heap
page read and write
A20000
trusted library allocation
page read and write
5270000
heap
page read and write
523C000
heap
page read and write
52F9000
heap
page read and write
52D6000
heap
page read and write
950000
heap
page read and write
9BAA000
unkown
page read and write
52B3000
heap
page read and write
BA0000
unkown
page read and write
5291000
heap
page read and write
3490000
trusted library allocation
page read and write
BA0000
unkown
page read and write
A20000
trusted library allocation
page read and write
52F9000
heap
page read and write
30A3000
unkown
page read and write
BB50000
unkown
page read and write
5253000
heap
page read and write
7FF5032F7000
unkown
page readonly
5270000
heap
page read and write
5270000
heap
page read and write
5260000
heap
page read and write
2A50000
trusted library allocation
page read and write
B9C0000
unkown
page read and write
BA0000
unkown
page read and write
7690000
unkown
page read and write
4B7A000
heap
page read and write
5C99000
heap
page read and write
BA0000
unkown
page read and write
B72000
unkown
page read and write
52A2000
heap
page read and write
5250000
heap
page read and write
533A000
heap
page read and write
A20000
trusted library allocation
page read and write
7FF50312D000
unkown
page readonly
5250000
heap
page read and write
B30000
unkown
page read and write
8050000
unkown
page read and write
C00A000
unkown
page read and write
52F9000
heap
page read and write
24E0000
unkown
page read and write
A20000
trusted library allocation
page read and write
34BE000
heap
page read and write
8050000
unkown
page read and write
7FF50331B000
unkown
page readonly
5240000
heap
page read and write
3364000
heap
page read and write
34BE000
heap
page read and write
DE90000
unkown
page read and write
2320000
trusted library allocation
page read and write
52E6000
heap
page read and write
34BE000
heap
page read and write
BA0000
unkown
page read and write
7FF502F94000
unkown
page readonly
52C4000
heap
page read and write
52E6000
heap
page read and write
5270000
heap
page read and write
A20000
trusted library allocation
page read and write
5240000
heap
page read and write
52CD000
heap
page read and write
4B70000
trusted library allocation
page read and write
3790000
heap
page read and write
A20000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
BA0000
unkown
page read and write
52B3000
heap
page read and write
52E6000
heap
page read and write
523C000
heap
page read and write
847000
system
page execute and read and write
3490000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
7FF5031AD000
unkown
page readonly
52D6000
heap
page read and write
DA0000
trusted library allocation
page read and write
52D6000
heap
page read and write
BB50000
unkown
page read and write
5253000
heap
page read and write
5270000
heap
page read and write
7F80000
unkown
page read and write
8050000
unkown
page read and write
3370000
trusted library allocation
page read and write
BB50000
unkown
page read and write
B30000
unkown
page read and write
BA0000
unkown
page read and write
8540000
heap
page read and write
5256000
heap
page read and write
52D6000
heap
page read and write
52C7000
heap
page read and write
2A50000
trusted library allocation
page read and write
52E6000
heap
page read and write
1410000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
5260000
heap
page read and write
52E6000
heap
page read and write
2320000
trusted library allocation
page read and write
34BE000
heap
page read and write
5270000
heap
page read and write
5256000
heap
page read and write
1410000
trusted library allocation
page read and write
BC19000
unkown
page read and write
1000000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
24E0000
unkown
page read and write
7FF5032D7000
unkown
page readonly
6EE4000
unkown
page read and write
5256000
heap
page read and write
4FF0000
trusted library allocation
page read and write
52A2000
heap
page read and write
2320000
trusted library allocation
page read and write
A346000
unkown
page read and write
BA0000
unkown
page read and write
A20000
trusted library allocation
page read and write
BB50000
unkown
page read and write
7FF502FA9000
unkown
page readonly
32F2000
heap
page read and write
5240000
heap
page read and write
52EA000
heap
page read and write
BA0000
unkown
page read and write
52F9000
heap
page read and write
3100000
heap
page read and write
DA0000
trusted library allocation
page read and write
52C4000
heap
page read and write
52D7000
heap
page read and write
52EA000
heap
page read and write
5256000
heap
page read and write
34AB000
heap
page read and write
5270000
heap
page read and write
2150000
heap
page read and write
B1BF000
stack
page read and write
8050000
unkown
page read and write
BB50000
unkown
page read and write
2A50000
trusted library allocation
page read and write
5240000
heap
page read and write
3170000
trusted library allocation
page read and write
7560000
unkown
page readonly
5270000
heap
page read and write
BA0000
unkown
page read and write
2A50000
trusted library allocation
page read and write
AAF000
heap
page read and write
4FF0000
trusted library allocation
page read and write
BB50000
unkown
page read and write
B990000
unkown
page read and write
BA0000
unkown
page read and write
5260000
heap
page read and write
1000000
trusted library allocation
page read and write
5CB5000
heap
page read and write
526A000
heap
page read and write
34BE000
heap
page read and write
BA0000
unkown
page read and write
7DF411F11000
unkown
page execute read
52A2000
heap
page read and write
BA0000
unkown
page read and write
8050000
unkown
page read and write
52A2000
heap
page read and write
5291000
heap
page read and write
523C000
heap
page read and write
7FF502B9A000
unkown
page readonly
7F80000
unkown
page read and write
7800000
unkown
page read and write
3220000
heap
page read and write
BB50000
unkown
page read and write
5250000
heap
page read and write
7FF502D48000
unkown
page readonly
A20000
trusted library allocation
page read and write
7FF5031BC000
unkown
page readonly
6ECE000
unkown
page read and write
BA0000
unkown
page read and write
52A1000
heap
page read and write
8050000
unkown
page read and write
30A1000
unkown
page read and write
30A5000
unkown
page read and write
7750000
unkown
page read and write
5250000
heap
page read and write
525B000
heap
page read and write
B990000
unkown
page read and write
5CD7000
heap
page read and write
B990000
unkown
page read and write
5270000
heap
page read and write
3170000
trusted library allocation
page read and write
C20000
unkown
page read and write
1000000
trusted library allocation
page read and write
35B0000
direct allocation
page execute and read and write
7580000
unkown
page read and write
8050000
unkown
page read and write
8450000
unkown
page read and write
52DB000
heap
page read and write
6EE1000
unkown
page read and write
5260000
heap
page read and write
BA0000
unkown
page read and write
8050000
unkown
page read and write
24E0000
unkown
page read and write
5281000
heap
page read and write
5253000
heap
page read and write
BA0000
unkown
page read and write
2320000
trusted library allocation
page read and write
52F9000
heap
page read and write
52C7000
heap
page read and write
A20000
trusted library allocation
page read and write
5260000
heap
page read and write
8050000
unkown
page read and write
52A2000
heap
page read and write
B30000
unkown
page read and write
BA0000
unkown
page read and write
BB50000
unkown
page read and write
52B3000
heap
page read and write
5256000
heap
page read and write
3490000
trusted library allocation
page read and write
B990000
unkown
page read and write
BB50000
unkown
page read and write
5231000
heap
page read and write
52D7000
heap
page read and write
A60000
heap
page read and write
DE90000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
52EA000
heap
page read and write
52D6000
heap
page read and write
24E0000
unkown
page read and write
5291000
heap
page read and write
3170000
trusted library allocation
page read and write
7F80000
unkown
page read and write
8050000
unkown
page read and write
6E15000
stack
page read and write
B30000
unkown
page read and write
52D6000
heap
page read and write
52F9000
heap
page read and write
7FF503333000
unkown
page readonly
52F9000
heap
page read and write
52C7000
heap
page read and write
8050000
unkown
page read and write
5256000
heap
page read and write
B70000
unkown
page read and write
52B3000
heap
page read and write
29E0000
trusted library allocation
page read and write
5250000
heap
page read and write
5256000
heap
page read and write
401000
unkown
page execute and read and write
52F9000
heap
page read and write
30C1000
system
page execute and read and write
2A50000
trusted library allocation
page read and write
7FF503277000
unkown
page readonly
2A50000
trusted library allocation
page read and write
B30000
unkown
page read and write
BA0000
unkown
page read and write
98FC000
stack
page read and write
B70000
unkown
page read and write
5256000
heap
page read and write
AF7F000
stack
page read and write
A20000
trusted library allocation
page read and write
52F9000
heap
page read and write
32C4000
heap
page read and write
810000
trusted library allocation
page read and write
52F9000
heap
page read and write
5270000
heap
page read and write
5270000
heap
page read and write
EA50000
heap
page read and write
90BD000
unkown
page read and write
52A2000
heap
page read and write
BA0000
unkown
page read and write
52D7000
heap
page read and write
810000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
7FF50332C000
unkown
page readonly
556E000
stack
page read and write
4B71000
heap
page read and write
3245000
heap
page read and write
2320000
trusted library allocation
page read and write
B70000
unkown
page read and write
B70000
unkown
page read and write
34BE000
heap
page read and write
9416000
unkown
page read and write
7FF5032C0000
unkown
page readonly
30E3000
system
page execute and read and write
2460000
heap
page read and write
5270000
heap
page read and write
5270000
heap
page read and write
2A50000
trusted library allocation
page read and write
B30000
unkown
page read and write
919F000
unkown
page read and write
5C9A000
heap
page read and write
5CD7000
heap
page read and write
2A50000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
52D6000
heap
page read and write
5231000
heap
page read and write
B990000
unkown
page read and write
52C7000
heap
page read and write
A20000
trusted library allocation
page read and write
523C000
heap
page read and write
3490000
trusted library allocation
page read and write
32CF000
heap
page read and write
525B000
heap
page read and write
8050000
unkown
page read and write
BB50000
unkown
page read and write
5253000
heap
page read and write
5268000
heap
page read and write
1000000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
34AB000
heap
page read and write
24E0000
unkown
page read and write
3170000
trusted library allocation
page read and write
B30000
unkown
page read and write
3170000
trusted library allocation
page read and write
52B3000
heap
page read and write
BFB4000
unkown
page read and write
851E000
stack
page read and write
52C4000
heap
page read and write
3370000
trusted library allocation
page read and write
52C5000
heap
page read and write
BB50000
unkown
page read and write
5270000
heap
page read and write
B30000
unkown
page read and write
29E0000
trusted library allocation
page read and write
B30000
unkown
page read and write
3490000
trusted library allocation
page read and write
52C7000
heap
page read and write
52B3000
heap
page read and write
9BE6000
unkown
page read and write
24E0000
unkown
page read and write
BA0000
unkown
page read and write
52E6000
heap
page read and write
4B70000
trusted library allocation
page read and write
8050000
unkown
page read and write
7DF411EF0000
unkown
page readonly
B70000
unkown
page read and write
32C2000
heap
page read and write
52D6000
heap
page read and write
3490000
trusted library allocation
page read and write
7F70000
unkown
page readonly
B70000
unkown
page read and write
7FF502CFA000
unkown
page readonly
BA0000
unkown
page read and write
5256000
heap
page read and write
523C000
heap
page read and write
8520000
unkown
page readonly
1410000
trusted library allocation
page read and write
5240000
heap
page read and write
5253000
heap
page read and write
7FF503006000
unkown
page readonly
3490000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
A9E000
heap
page read and write
349B000
heap
page read and write
52E1000
heap
page read and write
5250000
heap
page read and write
A9F000
stack
page read and write
BA0000
unkown
page read and write
7F80000
unkown
page read and write
BB50000
unkown
page read and write
BB50000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
BA0000
unkown
page read and write
2320000
trusted library allocation
page read and write
919C000
unkown
page read and write
52E6000
heap
page read and write
A20000
trusted library allocation
page read and write
400000
unkown
page readonly
52D7000
heap
page read and write
5260000
heap
page read and write
52F9000
heap
page read and write
B30000
unkown
page read and write
348C000
heap
page read and write
5256000
heap
page read and write
52F9000
heap
page read and write
349B000
heap
page read and write
5260000
heap
page read and write
52C7000
heap
page read and write
1000000
trusted library allocation
page read and write
24E0000
unkown
page read and write
5260000
heap
page read and write
B990000
unkown
page read and write
BA0000
unkown
page read and write
52E6000
heap
page read and write
34BE000
heap
page read and write
873000
heap
page read and write
B990000
unkown
page read and write
7FF502CD4000
unkown
page readonly
BA0000
unkown
page read and write
7FF5032DB000
unkown
page readonly
3490000
trusted library allocation
page read and write
B70000
unkown
page read and write
52C7000
heap
page read and write
5C99000
heap
page read and write
DA0000
trusted library allocation
page read and write
52D6000
heap
page read and write
52D6000
heap
page read and write
5253000
heap
page read and write
52F9000
heap
page read and write
1000000
trusted library allocation
page read and write
19E000
heap
page read and write
5270000
heap
page read and write
2E79000
stack
page read and write
7FF50322D000
unkown
page readonly
52E6000
heap
page read and write
2A50000
trusted library allocation
page read and write
5270000
heap
page read and write
351C000
heap
page read and write
5270000
heap
page read and write
2520000
unkown
page read and write
3370000
trusted library allocation
page read and write
BA0000
unkown
page read and write
52C4000
heap
page read and write
3050000
heap
page read and write
7FF503368000
unkown
page readonly
3520000
remote allocation
page read and write
BA0000
unkown
page read and write
B70000
unkown
page read and write
8050000
unkown
page read and write
7F80000
unkown
page read and write
5250000
heap
page read and write
4FF0000
trusted library allocation
page read and write
52C4000
heap
page read and write
52D6000
heap
page read and write
7F80000
unkown
page read and write
FB90000
unkown
page read and write
7FF5031FF000
unkown
page readonly
5270000
heap
page read and write
5240000
heap
page read and write
3370000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
7FF503032000
unkown
page readonly
7F80000
unkown
page read and write
34BE000
heap
page read and write
A20000
trusted library allocation
page read and write
4E0000
unclassified section
page read and write
A20000
trusted library allocation
page read and write
24E0000
unkown
page read and write
5250000
heap
page read and write
32D4000
heap
page read and write
2320000
trusted library allocation
page read and write
9E0000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
5260000
heap
page read and write
2320000
trusted library allocation
page read and write
7FF502E0D000
unkown
page readonly
52C4000
heap
page read and write
52E6000
heap
page read and write
3170000
trusted library allocation
page read and write
BA0000
unkown
page read and write
52E6000
heap
page read and write
AB2000
heap
page read and write
52F9000
heap
page read and write
5260000
heap
page read and write
5260000
heap
page read and write
5240000
heap
page read and write
DA0000
trusted library allocation
page read and write
531E000
heap
page read and write
52D9000
heap
page read and write
5260000
heap
page read and write
52EA000
heap
page read and write
52F9000
heap
page read and write
2320000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
52F9000
heap
page read and write
52EA000
heap
page read and write
52E6000
heap
page read and write
4E33000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
BB50000
unkown
page read and write
B990000
unkown
page read and write
AB2000
heap
page read and write
BA0000
unkown
page read and write
A20000
trusted library allocation
page read and write
5314000
heap
page read and write
3309000
heap
page read and write
2320000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
BA0000
unkown
page read and write
918D000
unkown
page read and write
5234000
heap
page read and write
44A0000
unkown
page read and write
8050000
unkown
page read and write
7FF502E07000
unkown
page readonly
3490000
trusted library allocation
page read and write
24E0000
unkown
page read and write
B990000
unkown
page read and write
52D6000
heap
page read and write
5270000
heap
page read and write
4DB1000
unkown
page read and write
5250000
heap
page read and write
A20000
trusted library allocation
page read and write
5270000
heap
page read and write
349B000
heap
page read and write
52D6000
heap
page read and write
A20000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
B30000
unkown
page read and write
52D6000
heap
page read and write
BA0000
unkown
page read and write
5240000
heap
page read and write
BB50000
unkown
page read and write
5270000
heap
page read and write
32E9000
heap
page read and write
52E6000
heap
page read and write
4370000
unkown
page read and write
8100000
unkown
page readonly
30CD000
unkown
page read and write
1000000
trusted library allocation
page read and write
140000
heap
page read and write
4EE0000
heap
page read and write
5270000
heap
page read and write
34BE000
heap
page read and write
3370000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
3228000
system
page execute and read and write
A93000
heap
page read and write
32D4000
heap
page read and write
52F9000
heap
page read and write
52F9000
heap
page read and write
52F9000
heap
page read and write
7FF502B8B000
unkown
page readonly
52E6000
heap
page read and write
523C000
heap
page read and write
5270000
heap
page read and write
B990000
unkown
page read and write
8050000
unkown
page read and write
531E000
heap
page read and write
52C7000
heap
page read and write
52EA000
heap
page read and write
B70000
unkown
page read and write
34BE000
heap
page read and write
4FF0000
trusted library allocation
page read and write
3250000
heap
page read and write
3550000
heap
page read and write
52D6000
heap
page read and write
52E6000
heap
page read and write
52D7000
heap
page read and write
52F9000
heap
page read and write
5C99000
heap
page read and write
5270000
heap
page read and write
B70000
unkown
page read and write
3010000
unkown
page read and write
BA0000
unkown
page read and write
52E6000
heap
page read and write
5240000
heap
page read and write
52D6000
heap
page read and write
5250000
heap
page read and write
810000
trusted library allocation
page read and write
525B000
heap
page read and write
52CF000
heap
page read and write
5270000
heap
page read and write
52E6000
heap
page read and write
24E0000
unkown
page read and write
32FC000
heap
page read and write
DE90000
unkown
page read and write
29E0000
trusted library allocation
page read and write
5291000
heap
page read and write
B30000
unkown
page read and write
52F9000
heap
page read and write
255A000
stack
page read and write
5250000
heap
page read and write
29E0000
trusted library allocation
page read and write
BA0000
unkown
page read and write
24E0000
unkown
page read and write
7630000
unkown
page readonly
401000
unkown
page execute and write copy
BA0000
unkown
page read and write
BA0000
unkown
page read and write
52D6000
heap
page read and write
3490000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
52F9000
heap
page read and write
5CC0000
heap
page read and write
1000000
trusted library allocation
page read and write
DD90000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
52F9000
heap
page read and write
5253000
heap
page read and write
52EA000
heap
page read and write
5270000
heap
page read and write
7FF502F7A000
unkown
page readonly
7FF503129000
unkown
page readonly
52F9000
heap
page read and write
5281000
heap
page read and write
5270000
heap
page read and write
BB50000
unkown
page read and write
7FF502DB8000
unkown
page readonly
BDC7000
unkown
page read and write
BB50000
unkown
page read and write
5347000
heap
page read and write
52F9000
heap
page read and write
52EA000
heap
page read and write
7FF502D84000
unkown
page readonly
5253000
heap
page read and write
52D6000
heap
page read and write
24E0000
unkown
page read and write
3370000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
5CBC000
heap
page read and write
5CB7000
heap
page read and write
5270000
heap
page read and write
5281000
heap
page read and write
B70000
unkown
page read and write
5270000
heap
page read and write
7FF503154000
unkown
page readonly
8050000
unkown
page read and write
1000000
trusted library allocation
page read and write
5250000
heap
page read and write
5234000
heap
page read and write
A20000
trusted library allocation
page read and write
7FF50328B000
unkown
page readonly
34AB000
heap
page read and write
5256000
heap
page read and write
1410000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
5253000
heap
page read and write
B70000
unkown
page read and write
5281000
heap
page read and write
BB50000
unkown
page read and write
2A50000
trusted library allocation
page read and write
52EA000
heap
page read and write
52A2000
heap
page read and write
5260000
heap
page read and write
52B3000
heap
page read and write
7FF503020000
unkown
page readonly
B990000
unkown
page read and write
5C99000
heap
page read and write
52F9000
heap
page read and write
BA0000
unkown
page read and write
5240000
heap
page read and write
BC80000
unkown
page read and write
52D6000
heap
page read and write
DA0000
trusted library allocation
page read and write
7F80000
unkown
page read and write
E92E000
unkown
page read and write
140000
heap
page read and write
140000
heap
page read and write
2320000
trusted library allocation
page read and write
52C4000
heap
page read and write
3370000
trusted library allocation
page read and write
5256000
heap
page read and write
2320000
trusted library allocation
page read and write
5231000
heap
page read and write
5256000
heap
page read and write
1410000
trusted library allocation
page read and write
2FAC000
stack
page read and write
5250000
heap
page read and write
BA0000
unkown
page read and write
7FF502D3E000
unkown
page readonly
4FF0000
trusted library allocation
page read and write
52D7000
heap
page read and write
7F80000
unkown
page read and write
52F9000
heap
page read and write
8596000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
5270000
heap
page read and write
2320000
trusted library allocation
page read and write
52E6000
heap
page read and write
86F000
stack
page read and write
BB50000
unkown
page read and write
7DF411EF1000
unkown
page execute read
DA0000
trusted library allocation
page read and write
5231000
heap
page read and write
534D000
heap
page read and write
5533000
heap
page read and write
5270000
heap
page read and write
52C4000
heap
page read and write
52B3000
heap
page read and write
32C7000
heap
page read and write
5305000
heap
page read and write
E90D000
unkown
page read and write
BBB0000
unkown
page read and write
7FF502E9C000
unkown
page readonly
A20000
trusted library allocation
page read and write
BB50000
unkown
page read and write
3170000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
52E6000
heap
page read and write
530E000
heap
page read and write
7FF4ECBEF000
unkown
page readonly
52D6000
heap
page read and write
BA0000
unkown
page read and write
5316000
heap
page read and write
32C1000
heap
page read and write
52C4000
heap
page read and write
5250000
heap
page read and write
7FF502E1A000
unkown
page readonly
BB50000
unkown
page read and write
ABE0000
unkown
page read and write
349B000
heap
page read and write
BA0000
unkown
page read and write
5270000
heap
page read and write
B30000
unkown
page read and write
7FF502DCF000
unkown
page readonly
B70D000
stack
page read and write
3490000
trusted library allocation
page read and write
BB50000
unkown
page read and write
AA0B000
stack
page read and write
BA0000
unkown
page read and write
5270000
heap
page read and write
BDD5000
unkown
page read and write
9191000
unkown
page read and write
3170000
trusted library allocation
page read and write
3091000
unkown
page read and write
52C4000
heap
page read and write
52F9000
heap
page read and write
308F000
stack
page read and write
5260000
heap
page read and write
52A2000
heap
page read and write
349C000
heap
page read and write
2320000
trusted library allocation
page read and write
5250000
heap
page read and write
5260000
heap
page read and write
4C2D000
stack
page read and write
8050000
unkown
page read and write
3490000
trusted library allocation
page read and write
5256000
heap
page read and write
64F000
stack
page read and write
B010000
unkown
page read and write
52A2000
heap
page read and write
7FF502C30000
unkown
page readonly
A20000
trusted library allocation
page read and write
76E0000
unkown
page readonly
B70000
unkown
page read and write
BB50000
unkown
page read and write
2320000
trusted library allocation
page read and write
3520000
remote allocation
page read and write
B70000
unkown
page read and write
5270000
heap
page read and write
52D6000
heap
page read and write
B30000
unkown
page read and write
5256000
heap
page read and write
5291000
heap
page read and write
BA0000
unkown
page read and write
5270000
heap
page read and write
BB50000
unkown
page read and write
5270000
heap
page read and write
B30000
unkown
page read and write
52E6000
heap
page read and write
D91000
system
page execute and read and write
8090000
unkown
page read and write
52F9000
heap
page read and write
BA0000
unkown
page read and write
52A1000
heap
page read and write
5316000
heap
page read and write
BDCD000
unkown
page read and write
5250000
heap
page read and write
2A50000
trusted library allocation
page read and write
5260000
heap
page read and write
7F80000
unkown
page read and write
5256000
heap
page read and write
52F9000
heap
page read and write
2A50000
trusted library allocation
page read and write
34BE000
heap
page read and write
7FF502F2C000
unkown
page readonly
5270000
heap
page read and write
8090000
unkown
page read and write
B30000
unkown
page read and write
52E6000
heap
page read and write
A20000
trusted library allocation
page read and write
D3F000
stack
page read and write
52EA000
heap
page read and write
AAE000
heap
page read and write
3170000
trusted library allocation
page read and write
BA0000
unkown
page read and write
A20000
trusted library allocation
page read and write
BFEE000
unkown
page read and write
4BED000
stack
page read and write
5281000
heap
page read and write
349C000
heap
page read and write
52C7000
heap
page read and write
24E0000
unkown
page read and write
BA0000
unkown
page read and write
29E0000
trusted library allocation
page read and write
5260000
heap
page read and write
7FF50308A000
unkown
page readonly
3490000
trusted library allocation
page read and write
5270000
heap
page read and write
ABC000
heap
page read and write
E8D0000
unkown
page read and write
9062000
unkown
page read and write
B30000
unkown
page read and write
4405000
unkown
page read and write
7690000
unkown
page read and write
BA0000
unkown
page read and write
8050000
unkown
page read and write
24E0000
unkown
page read and write
5260000
heap
page read and write
348C000
heap
page read and write
5270000
heap
page read and write
349D000
heap
page read and write
9193000
unkown
page read and write
7FF502EE3000
unkown
page readonly
7FF5030C9000
unkown
page readonly
9CF4000
unkown
page read and write
5231000
heap
page read and write
A20000
trusted library allocation
page read and write
8220000
unkown
page read and write
4435000
unkown
page read and write
BB50000
unkown
page read and write
B70000
unkown
page read and write
DA0000
trusted library allocation
page read and write
BA0000
unkown
page read and write
5270000
heap
page read and write
5343000
heap
page read and write
BA0000
unkown
page read and write
B70000
unkown
page read and write
5250000
heap
page read and write
4FF0000
trusted library allocation
page read and write
B580000
unkown
page read and write
7FF502D10000
unkown
page readonly
9C8A000
unkown
page read and write
5C99000
heap
page read and write
BA0000
unkown
page read and write
7FF502D33000
unkown
page readonly
2A50000
trusted library allocation
page read and write
B70000
unkown
page read and write
8050000
unkown
page read and write
BA0000
unkown
page read and write
964E000
stack
page read and write
52F9000
heap
page read and write
BA0000
unkown
page read and write
850000
heap
page read and write
BA0000
unkown
page read and write
1000000
trusted library allocation
page read and write
349B000
heap
page read and write
3364000
heap
page read and write
525B000
heap
page read and write
348C000
heap
page read and write
7FF502EB7000
unkown
page readonly
7FF50323B000
unkown
page readonly
2A50000
trusted library allocation
page read and write
5282000
heap
page read and write
B30000
unkown
page read and write
DD000
stack
page read and write
32C9000
heap
page read and write
BA0000
unkown
page read and write
2A50000
trusted library allocation
page read and write
A86E000
stack
page read and write
7FF502E43000
unkown
page readonly
3370000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
34AD000
heap
page read and write
52E6000
heap
page read and write
4FF0000
trusted library allocation
page read and write
32F2000
heap
page read and write
BB50000
unkown
page read and write
5281000
heap
page read and write
7F80000
unkown
page read and write
7FF503189000
unkown
page readonly
9255000
unkown
page read and write
DA0000
trusted library allocation
page read and write
52D7000
heap
page read and write
936E000
unkown
page read and write
1410000
trusted library allocation
page read and write
B70000
unkown
page read and write
9B70000
unkown
page read and write
52B3000
heap
page read and write
8050000
unkown
page read and write
5253000
heap
page read and write
B990000
unkown
page read and write
2320000
trusted library allocation
page read and write
BB50000
unkown
page read and write
A20000
trusted library allocation
page read and write
5270000
heap
page read and write
810000
trusted library allocation
page read and write
32E5000
heap
page read and write
7FF5030FF000
unkown
page readonly
B560000
unkown
page read and write
7E1000
system
page execute and read and write
52EA000
heap
page read and write
7FF503245000
unkown
page readonly
A20000
trusted library allocation
page read and write
5312000
heap
page read and write
5256000
heap
page read and write
BE96000
unkown
page read and write
308F000
unkown
page read and write
5313000
heap
page read and write
A20000
trusted library allocation
page read and write
BDF5000
unkown
page read and write
5241000
heap
page read and write
52F9000
heap
page read and write
52EA000
heap
page read and write
5250000
heap
page read and write
5250000
heap
page read and write
2A50000
trusted library allocation
page read and write
1F0000
heap
page read and write
A70000
heap
page read and write
5240000
heap
page read and write
350D000
stack
page read and write
32F2000
heap
page read and write
5270000
heap
page read and write
7F80000
unkown
page read and write
7FF503175000
unkown
page readonly
C20000
unkown
page read and write
6ECB000
unkown
page read and write
7FF503055000
unkown
page readonly
24E0000
unkown
page read and write
5231000
heap
page read and write
5280000
heap
page read and write
5240000
heap
page read and write
3490000
trusted library allocation
page read and write
B30000
unkown
page read and write
5270000
heap
page read and write
24E0000
unkown
page read and write
C60000
unkown
page readonly
701D000
unkown
page read and write
BA0000
unkown
page read and write
5359000
heap
page read and write
5234000
heap
page read and write
2A50000
trusted library allocation
page read and write
5253000
heap
page read and write
BA0000
unkown
page read and write
B30000
unkown
page read and write
34BE000
heap
page read and write
B70000
unkown
page read and write
1410000
trusted library allocation
page read and write
B30000
unkown
page read and write
4E0000
heap
page read and write
8050000
unkown
page read and write
4B70000
trusted library allocation
page read and write
BA0000
unkown
page read and write
BA0000
unkown
page read and write
7FF503118000
unkown
page readonly
52A2000
heap
page read and write
4FF0000
trusted library allocation
page read and write
52C5000
heap
page read and write
5253000
heap
page read and write
8B5000
stack
page read and write
BB50000
unkown
page read and write
7FF503354000
unkown
page readonly
BB50000
unkown
page read and write
A20000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
52B3000
heap
page read and write
8220000
unkown
page read and write
5240000
heap
page read and write
52D6000
heap
page read and write
1000000
trusted library allocation
page read and write
5260000
heap
page read and write
7DF411EE1000
unkown
page execute read
BA0000
unkown
page read and write
A20000
trusted library allocation
page read and write
7FF5031DA000
unkown
page readonly
BA0000
unkown
page read and write
3170000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
BA0000
unkown
page read and write
A20000
trusted library allocation
page read and write
BB50000
unkown
page read and write
52D6000
heap
page read and write
B990000
unkown
page read and write
5260000
heap
page read and write
30B4000
unkown
page read and write
8220000
unkown
page read and write
8050000
unkown
page read and write
A36000
system
page execute and read and write
5231000
heap
page read and write
A20000
trusted library allocation
page read and write
BB50000
unkown
page read and write
52F9000
heap
page read and write
52F9000
heap
page read and write
7FFB000
stack
page read and write
B990000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
5312000
heap
page read and write
5250000
heap
page read and write
DC0000
heap
page read and write
B30000
unkown
page read and write
52E6000
heap
page read and write
DA0000
trusted library allocation
page read and write
6E99000
stack
page read and write
BB50000
unkown
page read and write
8050000
unkown
page read and write
5270000
heap
page read and write
9BCB000
unkown
page read and write
52C4000
heap
page read and write
523C000
heap
page read and write
BA0000
unkown
page read and write
2560000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
E50000
unkown
page readonly
BA0000
unkown
page read and write
5256000
heap
page read and write
5250000
heap
page read and write
FADB000
unkown
page read and write
1000000
trusted library allocation
page read and write
5270000
heap
page read and write
8050000
unkown
page read and write
5256000
heap
page read and write
24E0000
unkown
page read and write
1000000
trusted library allocation
page read and write
52E6000
heap
page read and write
349B000
heap
page read and write
52F9000
heap
page read and write
BB50000
unkown
page read and write
3490000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
32D1000
heap
page read and write
BB50000
unkown
page read and write
5240000
heap
page read and write
5270000
heap
page read and write
7FF503270000
unkown
page readonly
AAD0000
unkown
page read and write
C20000
unkown
page read and write
BA0000
unkown
page read and write
5270000
heap
page read and write
52A2000
heap
page read and write
3490000
trusted library allocation
page read and write
7FF502F86000
unkown
page readonly
E3CF000
stack
page read and write
570000
heap
page read and write
5281000
heap
page read and write
BA0000
unkown
page read and write
24E0000
unkown
page read and write
5234000
heap
page read and write
2320000
trusted library allocation
page read and write
C0FD000
unkown
page read and write
525B000
heap
page read and write
52D6000
heap
page read and write
5250000
heap
page read and write
7F80000
unkown
page read and write
3490000
trusted library allocation
page read and write
BA0000
unkown
page read and write
1410000
trusted library allocation
page read and write
5C99000
heap
page read and write
1000000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
24E0000
unkown
page read and write
56A5000
heap
page read and write
52DB000
heap
page read and write
5256000
heap
page read and write
3370000
trusted library allocation
page read and write
7FF502FB4000
unkown
page readonly
BB50000
unkown
page read and write
BA0000
unkown
page read and write
330E000
heap
page read and write
5C99000
heap
page read and write
32E5000
heap
page read and write
BB50000
unkown
page read and write
7FF502B88000
unkown
page readonly
5270000
heap
page read and write
5260000
heap
page read and write
52F9000
heap
page read and write
3370000
trusted library allocation
page read and write
52E6000
heap
page read and write
3170000
trusted library allocation
page read and write
BB50000
unkown
page read and write
B9C0000
unkown
page read and write
B30000
unkown
page read and write
5CD5000
heap
page read and write
5260000
heap
page read and write
A20000
trusted library allocation
page read and write
AAD000
heap
page read and write
52D6000
heap
page read and write
5FC9000
heap
page read and write
52D6000
heap
page read and write
B70000
unkown
page read and write
BA0000
unkown
page read and write
52C4000
heap
page read and write
34BE000
heap
page read and write
2320000
trusted library allocation
page read and write
52A2000
heap
page read and write
5270000
heap
page read and write
5250000
heap
page read and write
BA0000
unkown
page read and write
B70000
unkown
page read and write
B70000
unkown
page read and write
32D4000
heap
page read and write
31AE000
stack
page read and write
810000
trusted library allocation
page read and write
400000
unkown
page readonly
7FF502D70000
unkown
page readonly
34BE000
heap
page read and write
BA0000
unkown
page read and write
2320000
trusted library allocation
page read and write
7FF502D1B000
unkown
page readonly
34AB000
heap
page read and write
52A2000
heap
page read and write
DA0000
trusted library allocation
page read and write
7FF503195000
unkown
page readonly
52E6000
heap
page read and write
3094000
heap
page read and write
34BE000
heap
page read and write
2690000
heap
page read and write
52B3000
heap
page read and write
34AB000
heap
page read and write
52D6000
heap
page read and write
BA0000
unkown
page read and write
1000000
trusted library allocation
page read and write
5CBC000
heap
page read and write
1000000
trusted library allocation
page read and write
BB50000
unkown
page read and write
52C4000
heap
page read and write
52E6000
heap
page read and write
B70000
unkown
page read and write
B20000
heap
page read and write
BA0000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
3210000
heap
page read and write
52F9000
heap
page read and write
1000000
trusted library allocation
page read and write
7FF502F96000
unkown
page readonly
52EA000
heap
page read and write
B70000
unkown
page read and write
5231000
heap
page read and write
5360000
heap
page read and write
BA0000
unkown
page read and write
9D0000
unkown
page read and write
7FF5026F7000
unkown
page readonly
B70000
unkown
page read and write
2320000
trusted library allocation
page read and write
BB50000
unkown
page read and write
2A50000
trusted library allocation
page read and write
7F80000
unkown
page read and write
52E6000
heap
page read and write
DA0000
trusted library allocation
page read and write
BA0000
unkown
page read and write
34BE000
heap
page read and write
32D4000
heap
page read and write
A31000
system
page execute and read and write
4FF0000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
52C4000
heap
page read and write
52E6000
heap
page read and write
32E9000
heap
page read and write
1410000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
BB50000
unkown
page read and write
32F2000
heap
page read and write
52E6000
heap
page read and write
807000
system
page execute and read and write
BA0000
unkown
page read and write
5260000
heap
page read and write
3230000
heap
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
309F000
unkown
page read and write
AAC000
heap
page read and write
52E6000
heap
page read and write
B30000
unkown
page read and write
5281000
heap
page read and write
8050000
unkown
page read and write
5319000
heap
page read and write
B09B000
stack
page read and write
B30000
unkown
page read and write
5260000
heap
page read and write
1000000
trusted library allocation
page read and write
BA0000
unkown
page read and write
5231000
heap
page read and write
5319000
heap
page read and write
5270000
heap
page read and write
BA0000
unkown
page read and write
52D6000
heap
page read and write
52E6000
heap
page read and write
B5D0000
unkown
page readonly
4E50000
heap
page read and write
3590000
remote allocation
page read and write
34BE000
heap
page read and write
52F9000
heap
page read and write
5250000
heap
page read and write
7FF5030DE000
unkown
page readonly
2320000
trusted library allocation
page read and write
B70000
unkown
page read and write
B70000
unkown
page read and write
91FB000
unkown
page read and write
3170000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
5250000
heap
page read and write
52E6000
heap
page read and write
3360000
heap
page read and write
BA0000
unkown
page read and write
1000000
trusted library allocation
page read and write
5270000
heap
page read and write
2A50000
trusted library allocation
page read and write
32E9000
heap
page read and write
BA0000
unkown
page read and write
7609000
stack
page read and write
5313000
heap
page read and write
1410000
trusted library allocation
page read and write
BA0000
unkown
page read and write
5270000
heap
page read and write
4FF0000
trusted library allocation
page read and write
52C4000
heap
page read and write
32FD000
heap
page read and write
AAD0000
stack
page read and write
2A50000
trusted library allocation
page read and write
BE14000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
B70000
unkown
page read and write
5250000
heap
page read and write
52F9000
heap
page read and write
BC5C000
unkown
page read and write
BEA9000
unkown
page read and write
EA5A000
heap
page read and write
5234000
heap
page read and write
24E0000
unkown
page read and write
BA0000
unkown
page read and write
8050000
unkown
page read and write
6FDB000
unkown
page read and write
5CC0000
heap
page read and write
34BE000
heap
page read and write
BEA3000
unkown
page read and write
BB50000
unkown
page read and write
5234000
heap
page read and write
BB50000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
405000
unkown
page execute and read and write
3490000
trusted library allocation
page read and write
52E6000
heap
page read and write
BA0000
unkown
page read and write
52E6000
heap
page read and write
43B4000
unkown
page read and write
531E000
heap
page read and write
2320000
trusted library allocation
page read and write
9BE3000
unkown
page read and write
A20000
heap
page read and write
810000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
7FF503227000
unkown
page readonly
52A2000
heap
page read and write
5270000
heap
page read and write
5260000
heap
page read and write
B9C0000
unkown
page read and write
5270000
heap
page read and write
3490000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
5270000
heap
page read and write
52E6000
heap
page read and write
2320000
trusted library allocation
page read and write
B30000
unkown
page read and write
52C7000
heap
page read and write
2320000
trusted library allocation
page read and write
5260000
heap
page read and write
5270000
heap
page read and write
2320000
trusted library allocation
page read and write
7FF503151000
unkown
page readonly
5250000
heap
page read and write
4FF0000
trusted library allocation
page read and write
52E6000
heap
page read and write
1000000
trusted library allocation
page read and write
5281000
heap
page read and write
C1AB000
unkown
page read and write
DA0000
trusted library allocation
page read and write
24E0000
unkown
page read and write
5260000
heap
page read and write
4FF0000
trusted library allocation
page read and write
8050000
unkown
page read and write
52C4000
heap
page read and write
7FF503326000
unkown
page readonly
523C000
heap
page read and write
5260000
heap
page read and write
5260000
heap
page read and write
BFF4000
unkown
page read and write
B990000
unkown
page read and write
BB50000
unkown
page read and write
2A50000
trusted library allocation
page read and write
7FF502F6A000
unkown
page readonly
349B000
heap
page read and write
810000
trusted library allocation
page read and write
34BE000
heap
page read and write
52EA000
heap
page read and write
1000000
trusted library allocation
page read and write
5234000
heap
page read and write
7FF502E3F000
unkown
page readonly
AF80000
unkown
page read and write
5CB7000
heap
page read and write
32D6000
heap
page read and write
52F9000
heap
page read and write
7F80000
unkown
page read and write
BA0000
unkown
page read and write
3490000
trusted library allocation
page read and write
5250000
heap
page read and write
34BE000
heap
page read and write
1000000
trusted library allocation
page read and write
5250000
heap
page read and write
52B3000
heap
page read and write
5253000
heap
page read and write
810000
trusted library allocation
page read and write
8050000
unkown
page read and write
5270000
heap
page read and write
2320000
trusted library allocation
page read and write
B30000
unkown
page read and write
810000
trusted library allocation
page read and write
5270000
heap
page read and write
1000000
trusted library allocation
page read and write
BA0000
unkown
page read and write
5CB6000
heap
page read and write
52C7000
heap
page read and write
5312000
heap
page read and write
5CAC000
heap
page read and write
52F9000
heap
page read and write
52A2000
heap
page read and write
BB50000
unkown
page read and write
7F80000
unkown
page read and write
5240000
heap
page read and write
4FF0000
trusted library allocation
page read and write
52B3000
heap
page read and write
52C7000
heap
page read and write
DE90000
unkown
page read and write
7FF503130000
unkown
page readonly
52C4000
heap
page read and write
8220000
unkown
page read and write
BB50000
unkown
page read and write
8050000
unkown
page read and write
3304000
heap
page read and write
5256000
heap
page read and write
52D7000
heap
page read and write
7FF502C8C000
unkown
page readonly
5240000
heap
page read and write
4FF0000
trusted library allocation
page read and write
52D6000
heap
page read and write
2151000
heap
page read and write
5281000
heap
page read and write
B30000
unkown
page read and write
BB50000
unkown
page read and write
1000000
trusted library allocation
page read and write
32F7000
heap
page read and write
B78F000
stack
page read and write
7FF5032C8000
unkown
page readonly
B70000
unkown
page read and write
7F80000
unkown
page read and write
5250000
heap
page read and write
530E000
heap
page read and write
523C000
heap
page read and write
52C7000
heap
page read and write
33D0000
heap
page read and write
B610000
unkown
page read and write
A3AC000
unkown
page read and write
BB50000
unkown
page read and write
34AB000
heap
page read and write
34BE000
heap
page read and write
5291000
heap
page read and write
5270000
heap
page read and write
795D000
stack
page read and write
AB1000
heap
page read and write
5253000
heap
page read and write
BB50000
unkown
page read and write
1000000
trusted library allocation
page read and write
2DA0000
unkown
page readonly
7FF5031E8000
unkown
page readonly
5260000
heap
page read and write
32F2000
heap
page read and write
52D6000
heap
page read and write
5CC000
stack
page read and write
5260000
heap
page read and write
A20000
trusted library allocation
page read and write
56A000
heap
page read and write
5CCC000
heap
page read and write
9B87000
unkown
page read and write
8050000
unkown
page read and write
5240000
heap
page read and write
52A1000
heap
page read and write
3094000
heap
page read and write
2320000
trusted library allocation
page read and write
52D6000
heap
page read and write
52B3000
heap
page read and write
4C19000
heap
page read and write
2DFE000
stack
page read and write
3370000
trusted library allocation
page read and write
7FF5032A5000
unkown
page readonly
5231000
heap
page read and write
3221000
system
page execute and read and write
BA0000
unkown
page read and write
2EF2000
stack
page read and write
32CD000
heap
page read and write
3364000
heap
page read and write
52F9000
heap
page read and write
24E0000
unkown
page read and write
BA0000
unkown
page read and write
5240000
heap
page read and write
52DB000
heap
page read and write
2A50000
trusted library allocation
page read and write
BEF6000
unkown
page read and write
3490000
trusted library allocation
page read and write
7FF4ECBF5000
unkown
page readonly
7FF5030EF000
unkown
page readonly
B30000
unkown
page read and write
52F9000
heap
page read and write
9CEA000
unkown
page read and write
5260000
heap
page read and write
29E0000
trusted library allocation
page read and write
8050000
unkown
page read and write
9F1000
unkown
page readonly
1000000
trusted library allocation
page read and write
BB50000
unkown
page read and write
313E000
stack
page read and write
810000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
52EA000
heap
page read and write
5270000
heap
page read and write
5270000
heap
page read and write
400000
unkown
page readonly
8050000
unkown
page read and write
1410000
trusted library allocation
page read and write
C126000
unkown
page read and write
8440000
unkown
page read and write
3170000
trusted library allocation
page read and write
32E6000
heap
page read and write
52EA000
heap
page read and write
5270000
heap
page read and write
6ED0000
unkown
page read and write
32F2000
heap
page read and write
3094000
heap
page read and write
1000000
trusted library allocation
page read and write
2DB0000
unkown
page read and write
1000000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
7690000
unkown
page read and write
52D6000
heap
page read and write
A20000
trusted library allocation
page read and write
523C000
heap
page read and write
B70000
unkown
page read and write
7DF411ED0000
unkown
page readonly
3490000
trusted library allocation
page read and write
5270000
heap
page read and write
52F9000
heap
page read and write
52EA000
heap
page read and write
52A2000
heap
page read and write
8610000
unkown
page read and write
5253000
heap
page read and write
4431000
unkown
page read and write
5272000
heap
page read and write
2A59000
stack
page read and write
30F5000
heap
page read and write
8050000
unkown
page read and write
7FF502DC0000
unkown
page readonly
3094000
heap
page read and write
52A2000
heap
page read and write
34BE000
heap
page read and write
5231000
heap
page read and write
B30000
unkown
page read and write
52D6000
heap
page read and write
BA0000
unkown
page read and write
74B0000
unkown
page read and write
800000
unkown
page readonly
58A1000
heap
page read and write
B30000
unkown
page read and write
5240000
heap
page read and write
523C000
heap
page read and write
5250000
heap
page read and write
DA0000
trusted library allocation
page read and write
525B000
heap
page read and write
3370000
trusted library allocation
page read and write
5B9B000
heap
page read and write
52D6000
heap
page read and write
5260000
heap
page read and write
5250000
heap
page read and write
B990000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
24E0000
unkown
page read and write
5260000
heap
page read and write
8050000
unkown
page read and write
52C4000
heap
page read and write
BB50000
unkown
page read and write
7FF502DF9000
unkown
page readonly
52B3000
heap
page read and write
2A50000
trusted library allocation
page read and write
7F80000
unkown
page read and write
52E6000
heap
page read and write
8220000
unkown
page read and write
52F9000
heap
page read and write
C20000
unkown
page read and write
BA0000
unkown
page read and write
34BE000
heap
page read and write
76A0000
unkown
page readonly
2320000
trusted library allocation
page read and write
5305000
heap
page read and write
7DF411EE0000
unkown
page readonly
BA0000
unkown
page read and write
7FF503206000
unkown
page readonly
4FF0000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
52F9000
heap
page read and write
1000000
trusted library allocation
page read and write
5253000
heap
page read and write
3490000
trusted library allocation
page read and write
52F9000
heap
page read and write
FAD6000
unkown
page read and write
2320000
trusted library allocation
page read and write
5253000
heap
page read and write
540000
heap
page read and write
BE1C000
unkown
page read and write
2320000
trusted library allocation
page read and write
52F9000
heap
page read and write
2320000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
5270000
heap
page read and write
52EA000
heap
page read and write
5234000
heap
page read and write
B70000
unkown
page read and write
B33A000
stack
page read and write
B30000
unkown
page read and write
5240000
heap
page read and write
24E0000
unkown
page read and write
7FF50326B000
unkown
page readonly
FB54000
unkown
page read and write
24E0000
unkown
page read and write
AA8D000
stack
page read and write
34BE000
heap
page read and write
4FF0000
trusted library allocation
page read and write
32DF000
heap
page read and write
347B000
heap
page read and write
523C000
heap
page read and write
8050000
unkown
page read and write
5250000
heap
page read and write
1000000
trusted library allocation
page read and write
52E6000
heap
page read and write
7FF5030C4000
unkown
page readonly
5270000
heap
page read and write
B30000
unkown
page read and write
7690000
unkown
page read and write
34BE000
heap
page read and write
24E0000
unkown
page read and write
BC55000
unkown
page read and write
5270000
heap
page read and write
52D6000
heap
page read and write
3099000
unkown
page read and write
44D0000
unkown
page read and write
2FED000
stack
page read and write
5CC0000
heap
page read and write
5CBC000
heap
page read and write
3490000
trusted library allocation
page read and write
7690000
unkown
page read and write
32CD000
heap
page read and write
52F9000
heap
page read and write
7FF503010000
unkown
page readonly
A20000
trusted library allocation
page read and write
34BE000
heap
page read and write
5256000
heap
page read and write
1410000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
7F80000
unkown
page read and write
52C4000
heap
page read and write
A32F000
unkown
page read and write
9050000
unkown
page read and write
2320000
trusted library allocation
page read and write
5250000
heap
page read and write
There are 3471 hidden memdumps, click here to show them.