IOC Report
bCnarg2O62.exe

loading gif

Files

File Path
Type
Category
Malicious
bCnarg2O62.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\1D0F.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\9245.exe
PE32+ executable (GUI) x86-64, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\derhswe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\derhswe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\jfrhswe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\CD06.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\CD06.tmp-shm
data
dropped
C:\Users\user\AppData\Local\Temp\D515.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\D805.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\DDC3.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\DF4B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\E0D2.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\E19E.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Roaming\hbtujbr
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\bCnarg2O62.exe
"C:\Users\user\Desktop\bCnarg2O62.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\derhswe
C:\Users\user\AppData\Roaming\derhswe
malicious
C:\Users\user\AppData\Roaming\derhswe
C:\Users\user\AppData\Roaming\derhswe
malicious
C:\Users\user\AppData\Local\Temp\1D0F.exe
C:\Users\user\AppData\Local\Temp\1D0F.exe
malicious
C:\Users\user\AppData\Roaming\jfrhswe
C:\Users\user\AppData\Roaming\jfrhswe
malicious
C:\Users\user\AppData\Local\Temp\9245.exe
C:\Users\user\AppData\Local\Temp\9245.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\System32\cmd.exe
cmd
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /displaydns
malicious
C:\Windows\System32\netsh.exe
netsh firewall show state
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\ROUTE.EXE
route print
C:\Windows\System32\tasklist.exe
tasklist /v /fo csv
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ninjahallnews.com/search.php
23.145.40.168
malicious
https://ninjahallnews.com/
unknown
malicious
https://fallhandbat.com/search.php
malicious
https://aka.ms/odirmr
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://23.145.40.164/ksa9104.exe
23.145.40.164
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://ninjahallnews.com/earch.php
unknown
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
https://powerpoint.office.comcember
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://ninjahallnews.com/search.phpMozilla/5.0
unknown
https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://excel.office.com
unknown
http://schemas.micro
unknown
https://ninjahallnews.com:443/search.phpge
unknown
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
https://api.msn.com/q
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
unknown
https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
unknown
https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://wns.windows.com/L
unknown
https://word.office.com
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ninjahallnews.com/application/x-www-form-urlencodedMozilla/5.0
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.ecosia.org/newtab/
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
https://aka.ms/Vh5j3k
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
https://api.msn.com/v1/news/Feed/Windows?&
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://android.notify.windows.com/iOS
unknown
https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
unknown
https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
unknown
https://api.msn.com/
unknown
https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
unknown
https://outlook.com_
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
unknown
https://www.msn.com:443/en-us/feed
unknown
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
unknown
There are 55 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ninjahallnews.com
23.145.40.168
malicious
nwgrus.ru
109.175.29.39
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
23.145.40.168
ninjahallnews.com
Reserved
malicious
211.171.233.129
unknown
Korea Republic of
malicious
109.175.29.39
nwgrus.ru
Bosnia and Herzegowina
malicious
23.145.40.164
unknown
Reserved

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
There are 200 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
581000
system
page execute and read and write
malicious
710000
direct allocation
page read and write
malicious
1FE1000
unclassified section
page read and write
malicious
540000
direct allocation
page read and write
malicious
2101000
unclassified section
page read and write
malicious
20D1000
unclassified section
page read and write
malicious
821000
system
page execute and read and write
malicious
530000
direct allocation
page read and write
malicious
20E1000
unclassified section
page read and write
malicious
4B0000
direct allocation
page read and write
malicious
561000
unclassified section
page read and write
malicious
710000
direct allocation
page read and write
malicious
2340000
trusted library allocation
page read and write
1BC25D70000
heap
page read and write
9F0000
heap
page read and write
710000
direct allocation
page read and write
3440000
unkown
page read and write
2418D40C000
heap
page read and write
44C000
unkown
page write copy
26455EEF000
heap
page read and write
7FF5ED4C2000
unkown
page readonly
930000
trusted library allocation
page read and write
9200000
unkown
page read and write
23A3FE40000
trusted library allocation
page read and write
53DD47E000
stack
page read and write
540000
heap
page read and write
1BC26517000
heap
page read and write
1BC25D52000
heap
page read and write
50C000
heap
page execute and read and write
33C0000
unkown
page read and write
1BC264F1000
heap
page read and write
1390000
unkown
page read and write
72A000
heap
page read and write
264556C8000
heap
page read and write
9CA0000
unkown
page read and write
181CEDAA000
heap
page read and write
40F000
unkown
page readonly
2340000
trusted library allocation
page read and write
181CEDAD000
heap
page read and write
9CA0000
unkown
page read and write
1BD14C47000
heap
page read and write
32A0000
unkown
page read and write
1FBD77BE000
heap
page read and write
1370000
unkown
page read and write
1D5EACF2000
heap
page read and write
210E383C000
heap
page read and write
2B997822000
heap
page read and write
26A46470000
heap
page read and write
1BD15283000
heap
page read and write
3130000
unkown
page read and write
210E383F000
heap
page read and write
2340000
trusted library allocation
page read and write
2DD51052000
heap
page read and write
3010000
unkown
page read and write
3060000
unkown
page read and write
A177DFF000
stack
page read and write
5D80000
heap
page read and write
2B997809000
heap
page read and write
26A46157000
heap
page read and write
26A46157000
heap
page read and write
91C0000
unkown
page read and write
9875000
unkown
page read and write
181CED9C000
heap
page read and write
2DD51233000
heap
page read and write
7FF5ED986000
unkown
page readonly
3010000
unkown
page read and write
26455ED1000
heap
page read and write
1390000
unkown
page read and write
884000
heap
page read and write
26455EF7000
heap
page read and write
930000
trusted library allocation
page read and write
1BD1527C000
heap
page read and write
930000
trusted library allocation
page read and write
7FF5ED46A000
unkown
page readonly
C413AFE000
stack
page read and write
2340000
trusted library allocation
page read and write
20F0000
heap
page read and write
210E36B0000
trusted library allocation
page read and write
1BD14C76000
heap
page read and write
3440000
unkown
page read and write
91C0000
unkown
page read and write
212ABA7000
stack
page read and write
181CEDC0000
heap
page read and write
20BC37D7000
heap
page read and write
1BD16BE0000
heap
page read and write
2370000
heap
page read and write
26455830000
heap
page read and write
2D0DB9DA000
heap
page read and write
23A403F0000
heap
page read and write
2418EDA3000
heap
page read and write
9CA0000
unkown
page read and write
1D5EACC0000
heap
page read and write
26A46157000
heap
page read and write
181CE6C4000
heap
page read and write
1BC26517000
heap
page read and write
26455EF2000
heap
page read and write
9550000
unkown
page readonly
1FBD7DE0000
heap
page read and write
9CA0000
unkown
page read and write
7FF5ED80C000
unkown
page readonly
5D6C000
heap
page read and write
C350000
unkown
page read and write
20BC3EC9000
heap
page read and write
3080000
unkown
page read and write
5641000
unkown
page read and write
2418CD85000
heap
page read and write
9C8000
heap
page read and write
1FBD7A80000
heap
page read and write
2418CD78000
heap
page read and write
20BC3E94000
heap
page read and write
7FF5ED9E1000
unkown
page readonly
32A0000
unkown
page read and write
A37D000
unkown
page read and write
3010000
unkown
page read and write
2340000
trusted library allocation
page read and write
4771000
heap
page read and write
7857000
unkown
page read and write
6AF62FE000
stack
page read and write
CB8E000
unkown
page read and write
2B9970C0000
trusted library allocation
page read and write
1FBD77B4000
heap
page read and write
B650000
unkown
page read and write
1F1545B1000
heap
page read and write
401000
unkown
page execute read
37D2000
unkown
page read and write
7FF5ED646000
unkown
page readonly
1BC26561000
heap
page read and write
1BC25D4F000
heap
page read and write
26A4690C000
heap
page read and write
7FF5ED9D9000
unkown
page readonly
3080000
unkown
page read and write
1BC25DB9000
heap
page read and write
9893000
unkown
page read and write
2F70000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
2DD51236000
heap
page read and write
3020000
unkown
page read and write
2418CCF0000
trusted library allocation
page read and write
1BC264F1000
heap
page read and write
26A46153000
heap
page read and write
1BC25DB5000
heap
page read and write
1BC25DE4000
heap
page read and write
181CE6F1000
heap
page read and write
CA7C000
unkown
page read and write
C89C000
unkown
page read and write
2418CF07000
heap
page read and write
181CE7D0000
heap
page read and write
9CA0000
unkown
page read and write
91C0000
unkown
page read and write
26A46137000
heap
page read and write
1BD153A0000
heap
page read and write
7F50000
unkown
page read and write
7FF5ED534000
unkown
page readonly
23A40419000
heap
page read and write
1BC25D2B000
heap
page read and write
1BC264FE000
heap
page read and write
7FF5ED433000
unkown
page readonly
A21E000
stack
page read and write
26A46907000
heap
page read and write
181D0630000
heap
page read and write
26455EF9000
heap
page read and write
830000
trusted library allocation
page read and write
1F154C08000
heap
page read and write
9CA0000
unkown
page read and write
40F000
unkown
page readonly
7D60000
unkown
page read and write
1390000
unkown
page read and write
41D000
unkown
page readonly
1BC25DB4000
heap
page read and write
536D000
heap
page read and write
5D8B000
heap
page read and write
91C0000
unkown
page read and write
1AA697E000
stack
page read and write
44B000
unkown
page read and write
1F1545C5000
heap
page read and write
4D0000
unclassified section
page read and write
930000
trusted library allocation
page read and write
1BD15270000
heap
page read and write
FEC8000
unkown
page read and write
930000
trusted library allocation
page read and write
720000
heap
page read and write
2418D3FC000
heap
page read and write
9CA0000
unkown
page read and write
340D000
heap
page read and write
181CEDD0000
heap
page read and write
8DA0000
unkown
page read and write
181CEDAD000
heap
page read and write
7F50000
unkown
page read and write
1F154C17000
heap
page read and write
3756000
unkown
page read and write
72FD3F7000
stack
page read and write
2DD51097000
heap
page read and write
73D000
heap
page execute and read and write
91C0000
unkown
page read and write
9CA0000
unkown
page read and write
9CA0000
unkown
page read and write
1FBD7DE4000
heap
page read and write
116F000
stack
page read and write
1D5EACE4000
heap
page read and write
210E55C0000
heap
page read and write
460000
unkown
page readonly
72FD7FE000
stack
page read and write
2340000
trusted library allocation
page read and write
181CE6F2000
heap
page read and write
1370000
unkown
page read and write
32D0000
heap
page read and write
91C0000
unkown
page read and write
181CE6F1000
heap
page read and write
340D000
heap
page read and write
930000
trusted library allocation
page read and write
40F000
unkown
page readonly
2418CD71000
heap
page read and write
9879000
unkown
page read and write
3010000
unkown
page read and write
C6BF000
unkown
page read and write
9CA0000
unkown
page read and write
40B000
unkown
page execute read
9873000
unkown
page read and write
72FD87F000
stack
page read and write
1BC26593000
heap
page read and write
3010000
unkown
page read and write
1FBD7DF9000
heap
page read and write
3030000
unkown
page read and write
9200000
stack
page read and write
23A3FE40000
trusted library allocation
page read and write
40B000
unkown
page execute read
A310000
unkown
page read and write
1BD14BF0000
heap
page read and write
930000
trusted library allocation
page read and write
9977000
unkown
page read and write
1BC25D53000
heap
page read and write
3415000
heap
page read and write
1F1545A4000
heap
page read and write
2DD510A7000
heap
page read and write
10C0000
unkown
page readonly
5D59000
heap
page read and write
1F1544D0000
heap
page read and write
7FF5ED818000
unkown
page readonly
C413B7E000
stack
page read and write
97C3000
unkown
page read and write
194DA0A1000
heap
page read and write
29887410000
heap
page read and write
9CA0000
unkown
page read and write
2DD51220000
heap
page read and write
1BD1525C000
heap
page read and write
13B0000
unkown
page read and write
9885000
unkown
page read and write
340B000
heap
page read and write
7FF5ED6A5000
unkown
page readonly
194DA09E000
heap
page read and write
1BC26395000
heap
page read and write
1FBD77F8000
heap
page read and write
9200000
unkown
page read and write
3060000
unkown
page read and write
7FF5ED9B8000
unkown
page readonly
2DD510B8000
heap
page read and write
8750000
unkown
page read and write
8820000
unkown
page read and write
2418CF0A000
heap
page read and write
7953000
unkown
page read and write
1F1545C7000
heap
page read and write
17983D35000
heap
page read and write
3440000
unkown
page read and write
70F000
stack
page read and write
194DA0A4000
heap
page read and write
2418D411000
heap
page read and write
C962000
unkown
page read and write
26455A3B000
heap
page read and write
2B99714B000
heap
page read and write
210E3727000
heap
page read and write
5D59000
heap
page read and write
181CEDC0000
heap
page read and write
7FF5ED64F000
unkown
page readonly
830000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
1BC25D88000
heap
page read and write
2B997825000
heap
page read and write
26A463CE000
heap
page read and write
2418D3F0000
heap
page read and write
2340000
trusted library allocation
page read and write
2DD5124A000
heap
page read and write
7D60000
unkown
page read and write
4E80000
remote allocation
page read and write
AAF6000
unkown
page read and write
1370000
unkown
page read and write
2F70000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
1390000
unkown
page read and write
2418CCD0000
heap
page read and write
1FBD7810000
heap
page read and write
23A403FE000
heap
page read and write
5D59000
heap
page read and write
91C0000
unkown
page read and write
26455EEF000
heap
page read and write
5D7C000
heap
page read and write
89C0000
unkown
page read and write
9560000
unkown
page read and write
7FF5ED286000
unkown
page readonly
32E0000
heap
page read and write
4CE0000
unkown
page read and write
1FBD77FD000
heap
page read and write
1BD15434000
heap
page read and write
2340000
trusted library allocation
page read and write
1F1545C9000
heap
page read and write
13B0000
unkown
page read and write
1BC25D9F000
heap
page read and write
210E37E0000
heap
page read and write
1BD14F05000
heap
page read and write
1BD15285000
heap
page read and write
2F70000
trusted library allocation
page read and write
2DD5122C000
heap
page read and write
9CA0000
unkown
page read and write
2E70000
heap
page read and write
9CA0000
unkown
page read and write
2B9977FE000
heap
page read and write
7DF4F3051000
unkown
page execute read
2418D050000
heap
page read and write
1BC26392000
heap
page read and write
5D75000
heap
page read and write
33D0000
unkown
page read and write
29887350000
heap
page read and write
37A0000
unkown
page read and write
7FF5ED68C000
unkown
page readonly
30F1000
system
page execute and read and write
1BC25D70000
heap
page read and write
2B9970A0000
heap
page read and write
9CA0000
unkown
page read and write
2F70000
trusted library allocation
page read and write
212AEFF000
stack
page read and write
1BC25DE4000
heap
page read and write
2DD5121E000
heap
page read and write
33C0000
unkown
page read and write
930000
trusted library allocation
page read and write
210E3861000
heap
page read and write
32A0000
unkown
page read and write
1F154460000
heap
page read and write
2B9971C4000
heap
page read and write
181CE6E0000
heap
page read and write
181CEC4A000
heap
page read and write
7FF5ED76D000
unkown
page readonly
1AA687F000
stack
page read and write
A11F000
stack
page read and write
1BC25D70000
heap
page read and write
23A3FF5E000
heap
page read and write
2F70000
trusted library allocation
page read and write
1D5EACF2000
heap
page read and write
1F154C29000
heap
page read and write
1BC25D9F000
heap
page read and write
9CA0000
unkown
page read and write
7FF5ED669000
unkown
page readonly
1BC26556000
heap
page read and write
9CA0000
unkown
page read and write
1FBD7DF9000
heap
page read and write
930000
trusted library allocation
page read and write
1BC25DCA000
heap
page read and write
930000
trusted library allocation
page read and write
7FFE000
stack
page read and write
20BC3E92000
heap
page read and write
3440000
unkown
page read and write
1390000
unkown
page read and write
1200000
unkown
page readonly
2645596A000
heap
page read and write
194D9832000
heap
page read and write
2F70000
trusted library allocation
page read and write
194DA0BE000
heap
page read and write
930000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
9CA0000
unkown
page read and write
9200000
unkown
page read and write
20BC3EAC000
heap
page read and write
26E0000
trusted library allocation
page read and write
1BD14C89000
heap
page read and write
1BC25D66000
heap
page read and write
181CEDA9000
heap
page read and write
800000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
7FF5ED4BB000
unkown
page readonly
3020000
unkown
page read and write
2340000
trusted library allocation
page read and write
2B9971E4000
heap
page read and write
2DD51217000
heap
page read and write
1BC265C8000
heap
page read and write
3440000
unkown
page read and write
91C0000
unkown
page read and write
2D0DBA08000
heap
page read and write
2F70000
trusted library allocation
page read and write
3010000
unkown
page read and write
1BC27DAC000
heap
page read and write
1370000
unkown
page read and write
2DD51094000
heap
page read and write
830000
trusted library allocation
page read and write
194DA090000
heap
page read and write
26A46140000
heap
page read and write
40F000
unkown
page readonly
341B000
heap
page read and write
7FF5ED7E0000
unkown
page readonly
1F1545BC000
heap
page read and write
2DD51097000
heap
page read and write
2DD51210000
heap
page read and write
7DF4F3071000
unkown
page execute read
210E383E000
heap
page read and write
7FF5ED81B000
unkown
page readonly
181CE680000
heap
page read and write
2418D0A0000
heap
page read and write
210E3721000
heap
page read and write
8730000
unkown
page read and write
C88B000
unkown
page read and write
1FBD77D7000
heap
page read and write
7D53000
unkown
page read and write
2D0DB970000
heap
page read and write
1BC2803D000
heap
page read and write
1BC25D70000
heap
page read and write
5D59000
heap
page read and write
2F70000
trusted library allocation
page read and write
44C000
unkown
page write copy
9560000
stack
page read and write
1380000
unkown
page read and write
44B000
unkown
page write copy
7D0000
heap
page read and write
26455967000
heap
page read and write
930000
trusted library allocation
page read and write
7FF5ED9A1000
unkown
page readonly
1F154C07000
heap
page read and write
9E6C000
stack
page read and write
264556AA000
heap
page read and write
23A403F7000
heap
page read and write
35CE000
stack
page read and write
2418D0AB000
heap
page read and write
2418CF04000
heap
page read and write
930000
trusted library allocation
page read and write
2418D40F000
heap
page read and write
194D9870000
heap
page read and write
341E000
heap
page read and write
20BC3E93000
heap
page read and write
820000
heap
page read and write
785B000
unkown
page read and write
7FF5ED7E9000
unkown
page readonly
26455964000
heap
page read and write
400000
unkown
page readonly
212AFFE000
stack
page read and write
1BC25CF8000
heap
page read and write
7FF5ED8C1000
unkown
page readonly
9CA0000
unkown
page read and write
9200000
unkown
page read and write
1F1545B1000
heap
page read and write
7FF5ED975000
unkown
page readonly
B2D0000
unkown
page read and write
884000
heap
page read and write
1BC26593000
heap
page read and write
4B56000
unkown
page read and write
7FF5ED5EB000
unkown
page readonly
210E384A000
heap
page read and write
41D000
unkown
page readonly
C512000
unkown
page read and write
C561000
unkown
page read and write
26455ED1000
heap
page read and write
210E3830000
heap
page read and write
1BD14C68000
heap
page read and write
33D0000
heap
page read and write
36D3000
stack
page read and write
26A46911000
heap
page read and write
2B9971D9000
heap
page read and write
3240000
heap
page read and write
9200000
unkown
page read and write
B22B000
stack
page read and write
33C0000
unkown
page read and write
7FF5ED586000
unkown
page readonly
A491000
unkown
page read and write
1BC27D81000
heap
page read and write
7FF5ED449000
unkown
page readonly
EFF577F000
stack
page read and write
1BC2651F000
heap
page read and write
1BC26504000
heap
page read and write
2B9976A5000
heap
page read and write
2B99781A000
heap
page read and write
2DD5182E000
heap
page read and write
1BC27D81000
heap
page read and write
3010000
unkown
page read and write
3060000
unkown
page read and write
1F154C31000
heap
page read and write
1380000
unkown
page read and write
181CE7A0000
heap
page read and write
7FF5EDA08000
unkown
page readonly
20BC5900000
heap
page read and write
26455EEF000
heap
page read and write
B2D0000
unkown
page read and write
EFF567F000
stack
page read and write
26A4615F000
heap
page read and write
800000
trusted library allocation
page read and write
7FF5ED8B4000
unkown
page readonly
210E382E000
heap
page read and write
20BC3802000
heap
page read and write
1BC25D9F000
heap
page read and write
340E000
heap
page read and write
B2D0000
unkown
page read and write
590000
heap
page read and write
9660000
unkown
page read and write
7FF5ED418000
unkown
page readonly
13BA000
stack
page read and write
26A462D0000
heap
page read and write
2B997811000
heap
page read and write
33F0000
unkown
page read and write
9CA0000
unkown
page read and write
1FBD7810000
heap
page read and write
19C000
stack
page read and write
1370000
unkown
page read and write
3434000
heap
page read and write
1BC25D91000
heap
page read and write
91C0000
unkown
page read and write
1BC25CF0000
heap
page read and write
9CA0000
unkown
page read and write
20BC3ED2000
heap
page read and write
C503000
unkown
page read and write
26A48270000
heap
page read and write
20BC37A0000
heap
page read and write
7FF5ED882000
unkown
page readonly
20BC3E9A000
heap
page read and write
A4B8000
unkown
page read and write
33D0000
unkown
page read and write
26A460F0000
trusted library allocation
page read and write
194D9A30000
trusted library allocation
page read and write
7CF000
stack
page read and write
1380000
unkown
page read and write
1380000
unkown
page read and write
181CEDAD000
heap
page read and write
5D59000
heap
page read and write
340E000
heap
page read and write
C6F2000
unkown
page read and write
3010000
unkown
page read and write
340A000
heap
page read and write
91B9000
stack
page read and write
212AF7E000
stack
page read and write
1FBD7819000
heap
page read and write
181CEDA0000
heap
page read and write
2F70000
trusted library allocation
page read and write
1240000
heap
page read and write
3010000
unkown
page read and write
2418CF07000
heap
page read and write
F9A6000
unkown
page read and write
800000
trusted library allocation
page read and write
44C000
unkown
page write copy
33C0000
unkown
page read and write
2B9971B5000
heap
page read and write
5D95000
heap
page read and write
1F154597000
heap
page read and write
194DA0A9000
heap
page read and write
91C0000
stack
page read and write
2B9977F9000
heap
page read and write
72E000
heap
page read and write
194D9872000
heap
page read and write
7F30000
unkown
page read and write
23A40409000
heap
page read and write
2DD5121C000
heap
page read and write
2120000
heap
page read and write
1BC25DE4000
heap
page read and write
20BC37D5000
heap
page read and write
1BD14C8C000
heap
page read and write
1380000
unkown
page read and write
7FF5ED872000
unkown
page readonly
7884000
unkown
page read and write
1380000
unkown
page read and write
930000
trusted library allocation
page read and write
210E3844000
heap
page read and write
2418D411000
heap
page read and write
546B000
heap
page read and write
181CEC43000
heap
page read and write
2B9971E8000
heap
page read and write
930000
trusted library allocation
page read and write
F33000
heap
page read and write
23A41D30000
heap
page read and write
1BC25D66000
heap
page read and write
1BC264F4000
heap
page read and write
5D83000
heap
page read and write
194D99F0000
heap
page read and write
1F154C2A000
heap
page read and write
EFF53D7000
stack
page read and write
1BC2651E000
heap
page read and write
3140000
unkown
page read and write
33D0000
unkown
page read and write
9CA0000
unkown
page read and write
26455689000
heap
page read and write
26455967000
heap
page read and write
2B9976A3000
heap
page read and write
20BC3EB1000
heap
page read and write
9560000
unkown
page read and write
B9BE47F000
stack
page read and write
A494000
unkown
page read and write
3080000
unkown
page read and write
930000
trusted library allocation
page read and write
20BC37B2000
heap
page read and write
7FF5ED48A000
unkown
page readonly
2340000
trusted library allocation
page read and write
181CEDB3000
heap
page read and write
460000
unkown
page readonly
13B0000
unkown
page read and write
7FF5ED8F9000
unkown
page readonly
9CA0000
unkown
page read and write
91C0000
unkown
page read and write
7852000
unkown
page read and write
2418D41F000
heap
page read and write
7FF5ED28E000
unkown
page readonly
7FF5EDA0B000
unkown
page readonly
2DD51097000
heap
page read and write
91C0000
unkown
page read and write
181CE7C0000
trusted library allocation
page read and write
FA24000
unkown
page read and write
1FBD9730000
heap
page read and write
194D9870000
heap
page read and write
26A46153000
heap
page read and write
2131000
heap
page read and write
800000
trusted library allocation
page read and write
CB02000
unkown
page read and write
8000000
unkown
page read and write
2F70000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
460000
unkown
page readonly
181CEC47000
heap
page read and write
2418CF00000
heap
page read and write
1FBD77C8000
heap
page read and write
181CE6B3000
heap
page read and write
26A463C3000
heap
page read and write
1BC26565000
heap
page read and write
7FF5ED77E000
unkown
page readonly
3404000
heap
page read and write
1BC26523000
heap
page read and write
53DCFFB000
stack
page read and write
298873E0000
heap
page read and write
2418CD62000
heap
page read and write
1BC264F3000
heap
page read and write
830000
trusted library allocation
page read and write
7F40000
unkown
page readonly
930000
trusted library allocation
page read and write
1380000
unkown
page read and write
53DD27F000
stack
page read and write
1380000
unkown
page read and write
2340000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
2DD5121F000
heap
page read and write
2645596A000
heap
page read and write
13B0000
unkown
page read and write
3C9000
system
page execute and read and write
C413A7F000
stack
page read and write
7FF5ED471000
unkown
page readonly
2340000
trusted library allocation
page read and write
33D0000
unkown
page read and write
5D59000
heap
page read and write
2260000
heap
page read and write
1F1544A0000
trusted library allocation
page read and write
342F000
heap
page read and write
2F70000
trusted library allocation
page read and write
23A40421000
heap
page read and write
194D9864000
heap
page read and write
3429000
heap
page read and write
194DBA00000
heap
page read and write
32A0000
unkown
page read and write
1390000
unkown
page read and write
2418D40F000
heap
page read and write
DACBDF7000
stack
page read and write
23A3FF60000
heap
page read and write
13B0000
unkown
page read and write
520000
direct allocation
page execute and read and write
2418CF05000
heap
page read and write
23A3FC91000
heap
page read and write
9CA0000
unkown
page read and write
1FBD7E00000
heap
page read and write
26A46134000
heap
page read and write
800000
trusted library allocation
page read and write
210E3670000
heap
page read and write
1BD15432000
heap
page read and write
9200000
unkown
page read and write
1380000
unkown
page read and write
26455ED1000
heap
page read and write
3440000
unkown
page read and write
5DD0000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
2418CD56000
heap
page read and write
210E55D0000
heap
page read and write
3210000
unkown
page read and write
9CA0000
unkown
page read and write
B08D000
stack
page read and write
B450000
unkown
page read and write
7D20000
unkown
page readonly
9CA0000
unkown
page read and write
26A462F0000
heap
page read and write
9CA0000
unkown
page read and write
9CA0000
unkown
page read and write
830000
trusted library allocation
page read and write
26A46163000
heap
page read and write
97B5000
unkown
page read and write
181CEDC0000
heap
page read and write
7FF5ED755000
unkown
page readonly
1BD1543E000
heap
page read and write
1390000
unkown
page read and write
181CED99000
heap
page read and write
6AF000
stack
page read and write
2DD5125C000
heap
page read and write
2DD5182A000
heap
page read and write
1BD14E80000
heap
page read and write
AF0C000
stack
page read and write
33C0000
unkown
page read and write
C8E1000
unkown
page read and write
91C0000
unkown
page read and write
7FF5ED71B000
unkown
page readonly
9200000
unkown
page read and write
4D90000
heap
page read and write
1BC25D02000
heap
page read and write
194D9A30000
trusted library allocation
page read and write
33D0000
unkown
page read and write
210E370E000
heap
page read and write
1BC25D70000
heap
page read and write
797D000
unkown
page read and write
3402000
heap
page read and write
91C0000
unkown
page read and write
1BC25DE4000
heap
page read and write
1FBD7DD9000
heap
page read and write
20BC37D8000
heap
page read and write
1BC25D9F000
heap
page read and write
23A4040E000
heap
page read and write
9CA0000
unkown
page read and write
8820000
unkown
page read and write
5D8C000
heap
page read and write
7FF5ED65C000
unkown
page readonly
91C0000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
2DD51221000
heap
page read and write
5D9A000
heap
page read and write
830000
trusted library allocation
page read and write
210E36D8000
heap
page read and write
78A0000
unkown
page read and write
40B000
unkown
page execute read
91C0000
unkown
page read and write
3432000
heap
page read and write
23A40405000
heap
page read and write
32A0000
unkown
page read and write
20BC3E9A000
heap
page read and write
1BC27D81000
heap
page read and write
1F154568000
heap
page read and write
21E0000
heap
page read and write
26A463CB000
heap
page read and write
1BD1525F000
heap
page read and write
1BC27D81000
heap
page read and write
35D0000
unkown
page read and write
1BD15435000
heap
page read and write
3157000
system
page execute and read and write
1BC27D81000
heap
page read and write
930000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
2418D426000
heap
page read and write
800000
trusted library allocation
page read and write
1F154724000
heap
page read and write
26455662000
heap
page read and write
5D5A000
heap
page read and write
2418CD27000
heap
page read and write
1BD15261000
heap
page read and write
21B0000
heap
page read and write
34F0000
heap
page read and write
2340000
trusted library allocation
page read and write
2B997807000
heap
page read and write
8710000
unkown
page readonly
194D986F000
heap
page read and write
7FF5ED821000
unkown
page readonly
26455EC0000
heap
page read and write
29887419000
heap
page read and write
4E2D000
stack
page read and write
5D59000
heap
page read and write
3405000
heap
page read and write
2B9971B7000
heap
page read and write
930000
trusted library allocation
page read and write
451000
unkown
page read and write
2418D405000
heap
page read and write
7FF5ED97A000
unkown
page readonly
830000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
C507000
unkown
page read and write
91C0000
unkown
page read and write
7F2E000
stack
page read and write
3020000
unkown
page read and write
7FF5ED507000
unkown
page readonly
7FF5EDA31000
unkown
page readonly
EFF56FF000
stack
page read and write
1F154775000
heap
page read and write
2B9971EB000
heap
page read and write
91C0000
unkown
page read and write
1F1545B3000
heap
page read and write
2340000
trusted library allocation
page read and write
7FF5ED5C5000
unkown
page readonly
2418D407000
heap
page read and write
2DD51221000
heap
page read and write
20BC3EAE000
heap
page read and write
33C0000
unkown
page read and write
26A463C5000
heap
page read and write
1BC26526000
heap
page read and write
210E384A000
heap
page read and write
BD1D000
stack
page read and write
863000
heap
page read and write
212AE7F000
stack
page read and write
340A000
heap
page read and write
264556AB000
heap
page read and write
26455ED8000
heap
page read and write
786B000
unkown
page read and write
2233E7D000
stack
page read and write
26455EDF000
heap
page read and write
3800000
unkown
page readonly
33D0000
unkown
page read and write
44B000
unkown
page write copy
7FF5ED3EA000
unkown
page readonly
1BC25D70000
heap
page read and write
2B997811000
heap
page read and write
2418CD7B000
heap
page read and write
930000
trusted library allocation
page read and write
91C0000
unkown
page read and write
A479000
unkown
page read and write
9CA0000
unkown
page read and write
1BC25D41000
heap
page read and write
9CA0000
unkown
page read and write
4E0000
heap
page read and write
800000
trusted library allocation
page read and write
5D59000
heap
page read and write
3440000
unkown
page read and write
210E385E000
heap
page read and write
930000
trusted library allocation
page read and write
2DD51057000
heap
page read and write
1F154577000
heap
page read and write
3030000
unkown
page read and write
5D80000
heap
page read and write
9CA0000
unkown
page read and write
3080000
unkown
page read and write
7FF5ED85F000
unkown
page readonly
2B9970C0000
trusted library allocation
page read and write
550000
unclassified section
page read and write
194DA0A5000
heap
page read and write
194D9A10000
heap
page read and write
91C0000
unkown
page read and write
2DD51048000
heap
page read and write
884000
heap
page read and write
1380000
unkown
page read and write
3440000
unkown
page read and write
26E0000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
53DD3FF000
stack
page read and write
3080000
unkown
page read and write
20BC3EA8000
heap
page read and write
1210000
heap
page read and write
863000
heap
page read and write
884000
heap
page read and write
91C0000
unkown
page read and write
1BC26390000
heap
page read and write
6AF61FE000
stack
page read and write
181CEDB3000
heap
page read and write
B2D0000
unkown
page read and write
B5AE000
stack
page read and write
194D982E000
heap
page read and write
2DD5125C000
heap
page read and write
181CE6D2000
heap
page read and write
2B9971E6000
heap
page read and write
A177AF8000
stack
page read and write
210E385A000
heap
page read and write
3C6000
system
page execute and read and write
33F0000
unkown
page read and write
9CA0000
unkown
page read and write
A50B000
unkown
page read and write
930000
trusted library allocation
page read and write
91C0000
unkown
page read and write
1AA68FF000
stack
page read and write
3430000
unkown
page read and write
7DA0000
unkown
page read and write
32A0000
unkown
page read and write
2340000
trusted library allocation
page read and write
A177BFF000
stack
page read and write
91C0000
unkown
page read and write
400000
unkown
page readonly
3700000
unkown
page read and write
9CA0000
unkown
page read and write
B82A000
stack
page read and write
20BC37F7000
heap
page read and write
91C0000
unkown
page read and write
1D5EAD0D000
heap
page read and write
26455ECC000
heap
page read and write
2DD51262000
heap
page read and write
5D7C000
heap
page read and write
1170000
heap
page read and write
480000
heap
page read and write
C700000
unkown
page read and write
23A3FC84000
heap
page read and write
1BC25DE4000
heap
page read and write
1D5EAD1A000
heap
page read and write
264556C4000
heap
page read and write
1F154480000
heap
page read and write
20BC3EC8000
heap
page read and write
264556B8000
heap
page read and write
1F154C19000
heap
page read and write
9CA0000
unkown
page read and write
20BC38A0000
heap
page read and write
930000
trusted library allocation
page read and write
1FBD77B2000
heap
page read and write
210E36E2000
heap
page read and write
26A46147000
heap
page read and write
2EED000
stack
page read and write
1BC25DB8000
heap
page read and write
2B9971D2000
heap
page read and write
210E3841000
heap
page read and write
2418D40C000
heap
page read and write
2340000
trusted library allocation
page read and write
20F0000
heap
page read and write
91C0000
unkown
page read and write
2418CD46000
heap
page read and write
26A48280000
heap
page read and write
1FBD7DF9000
heap
page read and write
C50A000
unkown
page read and write
2360000
heap
page read and write
7FF5D1CD4000
unkown
page readonly
2F70000
trusted library allocation
page read and write
1BC25D28000
heap
page read and write
930000
trusted library allocation
page read and write
1BC2803D000
heap
page read and write
930000
trusted library allocation
page read and write
3010000
unkown
page read and write
2988746C000
heap
page read and write
9CA0000
unkown
page read and write
54C3AFF000
stack
page read and write
3010000
unkown
page read and write
33C0000
unkown
page read and write
2F70000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
BDC0000
unkown
page readonly
3010000
unkown
page read and write
8EC6000
unkown
page read and write
210E3727000
heap
page read and write
9439000
stack
page read and write
33D0000
unkown
page read and write
1FBD76C0000
heap
page read and write
26455962000
heap
page read and write
1BC264EC000
heap
page read and write
21E1000
heap
page read and write
1BD14C68000
heap
page read and write
2B9976A2000
heap
page read and write
33D0000
unkown
page read and write
1FBD7810000
heap
page read and write
9CA0000
unkown
page read and write
1F154725000
heap
page read and write
3416000
heap
page read and write
2DD51330000
heap
page read and write
29889100000
heap
page read and write
26455ED2000
heap
page read and write
2F70000
trusted library allocation
page read and write
1FBD7DD0000
heap
page read and write
7FF7327B4000
unkown
page write copy
3440000
unkown
page read and write
DC1687B000
stack
page read and write
2F70000
trusted library allocation
page read and write
1370000
unkown
page read and write
210E382A000
heap
page read and write
1BD14D30000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
91C0000
unkown
page read and write
7FF5ED939000
unkown
page readonly
863000
heap
page read and write
7FF5ED52F000
unkown
page readonly
7FF5ED8FF000
unkown
page readonly
3010000
unkown
page read and write
1BD14C10000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
91C0000
unkown
page read and write
830000
trusted library allocation
page read and write
1BC2650D000
heap
page read and write
20BC37B7000
heap
page read and write
2418D40C000
heap
page read and write
3440000
unkown
page read and write
9560000
unkown
page read and write
194DB9F0000
heap
page read and write
830000
trusted library allocation
page read and write
2418CF02000
heap
page read and write
1BC25D43000
heap
page read and write
210E3715000
heap
page read and write
33D0000
unkown
page read and write
210E3847000
heap
page read and write
7FF7327A0000
unkown
page readonly
1BC25D70000
heap
page read and write
3060000
unkown
page read and write
827000
system
page execute and read and write
41D000
unkown
page readonly
22A0000
heap
page read and write
23A3FF5B000
heap
page read and write
930000
trusted library allocation
page read and write
520000
direct allocation
page execute and read and write
8208000
stack
page read and write
1380000
unkown
page read and write
54C3A7F000
stack
page read and write
AAD1000
unkown
page read and write
B2D0000
unkown
page read and write
3440000
unkown
page read and write
1390000
unkown
page read and write
500000
heap
page read and write
830000
trusted library allocation
page read and write
401000
unkown
page execute read
44B000
unkown
page read and write
800000
trusted library allocation
page read and write
3440000
unkown
page read and write
23A3FC4D000
heap
page read and write
3440000
unkown
page read and write
26A46155000
heap
page read and write
2B997192000
heap
page read and write
7FF5ED9AE000
unkown
page readonly
DC169FE000
stack
page read and write
194D9B65000
heap
page read and write
1FBD77FD000
heap
page read and write
26A460E0000
heap
page read and write
2418D420000
heap
page read and write
3590000
unkown
page read and write
9B5000
heap
page read and write
2418CD55000
heap
page read and write
26455EDB000
heap
page read and write
460000
unkown
page readonly
4C4B000
unkown
page read and write
33C0000
unkown
page read and write
2B997807000
heap
page read and write
2340000
trusted library allocation
page read and write
2DD5124F000
heap
page read and write
26A463C2000
heap
page read and write
1BC25D9F000
heap
page read and write
830000
trusted library allocation
page read and write
3070000
unkown
page read and write
26455EF0000
heap
page read and write
23A3FC89000
heap
page read and write
1FBD7A8A000
heap
page read and write
7FF5ED7FD000
unkown
page readonly
33D0000
unkown
page read and write
1BC2803F000
heap
page read and write
830000
trusted library allocation
page read and write
3020000
unkown
page read and write
8BF0000
unkown
page readonly
1BD15250000
heap
page read and write
1390000
unkown
page read and write
3010000
unkown
page read and write
2B9970C0000
trusted library allocation
page read and write
23A40422000
heap
page read and write
2988745E000
heap
page read and write
1FBD7DF9000
heap
page read and write
5DA000
heap
page read and write
26A46914000
heap
page read and write
210E3863000
heap
page read and write
5D80000
heap
page read and write
2DD51225000
heap
page read and write
91C0000
unkown
page read and write
3404000
heap
page read and write
298873E5000
heap
page read and write
26A4647A000
heap
page read and write
930000
trusted library allocation
page read and write
1BC2639A000
heap
page read and write
3440000
unkown
page read and write
FE7A000
heap
page read and write
181CEDB3000
heap
page read and write
2418D429000
heap
page read and write
1BC25D5D000
heap
page read and write
31E457F000
stack
page read and write
987B000
unkown
page read and write
2F70000
trusted library allocation
page read and write
2418CD75000
heap
page read and write
7FF5ED59E000
unkown
page readonly
A33E000
unkown
page read and write
2B9971DC000
heap
page read and write
5D73000
heap
page read and write
23A40419000
heap
page read and write
210E385B000
heap
page read and write
2340000
trusted library allocation
page read and write
194DA09F000
heap
page read and write
2DD510CE000
heap
page read and write
1BC26397000
heap
page read and write
91C0000
unkown
page read and write
1BC25D43000
heap
page read and write
210E3845000
heap
page read and write
4B93000
unkown
page read and write
194D9B60000
heap
page read and write
17983AA0000
heap
page read and write
1370000
unkown
page read and write
29887492000
heap
page read and write
89A0000
unkown
page read and write
A375000
unkown
page read and write
83E000
stack
page read and write
51E0000
trusted library allocation
page read and write
26A46928000
heap
page read and write
3416000
heap
page read and write
7FF5ED71E000
unkown
page readonly
FEE1000
unkown
page read and write
1F154C15000
heap
page read and write
1D5EAD08000
heap
page read and write
23A3FE00000
heap
page read and write
9CA0000
unkown
page read and write
2B997820000
heap
page read and write
194D9855000
heap
page read and write
26455EDF000
heap
page read and write
2B9971E2000
heap
page read and write
23A4041C000
heap
page read and write
5D59000
heap
page read and write
194DA083000
heap
page read and write
7D60000
unkown
page read and write
B4D0000
unkown
page read and write
1BC25D70000
heap
page read and write
2340000
trusted library allocation
page read and write
1BD1543A000
heap
page read and write
5DD0000
trusted library allocation
page read and write
A39B000
unkown
page read and write
3440000
unkown
page read and write
1BC28000000
heap
page read and write
33D0000
unkown
page read and write
DC16AFE000
stack
page read and write
DD0000
unkown
page readonly
1BC26550000
heap
page read and write
29887270000
heap
page read and write
830000
trusted library allocation
page read and write
2418CD6F000
heap
page read and write
7DA0000
unkown
page read and write
7DA0000
unkown
page read and write
3580000
unkown
page readonly
194DA0B9000
heap
page read and write
C52C000
unkown
page read and write
3010000
unkown
page read and write
2418D421000
heap
page read and write
9CA0000
unkown
page read and write
2418D41F000
heap
page read and write
DACC0FF000
stack
page read and write
3020000
unkown
page read and write
9CA0000
unkown
page read and write
23A3FC47000
heap
page read and write
181CEDC7000
heap
page read and write
210E385A000
heap
page read and write
1370000
unkown
page read and write
32A0000
unkown
page read and write
194D9856000
heap
page read and write
91C0000
unkown
page read and write
2DD50FD0000
trusted library allocation
page read and write
91C0000
unkown
page read and write
9C000
stack
page read and write
3020000
unkown
page read and write
7FF5ED4FD000
unkown
page readonly
194DA08A000
heap
page read and write
264556A6000
heap
page read and write
2DD51084000
heap
page read and write
3440000
unkown
page read and write
9CA0000
unkown
page read and write
3010000
unkown
page read and write
2F70000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
9200000
unkown
page read and write
9CA0000
unkown
page read and write
2418CD7E000
heap
page read and write
73F000
heap
page execute and read and write
1BC25F25000
heap
page read and write
1BC264FF000
heap
page read and write
350E000
stack
page read and write
210E385C000
heap
page read and write
26A46310000
trusted library allocation
page read and write
9200000
unkown
page read and write
B450000
unkown
page read and write
800000
trusted library allocation
page read and write
1BC264EE000
heap
page read and write
3080000
unkown
page read and write
C41F000
stack
page read and write
2B997197000
heap
page read and write
1390000
unkown
page read and write
1230000
unkown
page read and write
720000
unclassified section
page read and write
CB0E000
unkown
page read and write
2418CCF0000
trusted library allocation
page read and write
93BE000
stack
page read and write
194D9837000
heap
page read and write
7FF7327A0000
unkown
page readonly
1BD15280000
heap
page read and write
1F1545B1000
heap
page read and write
7FF5ED4C6000
unkown
page readonly
2370000
heap
page read and write
33C0000
unkown
page read and write
C49E000
stack
page read and write
9CA0000
unkown
page read and write
2DD51820000
heap
page read and write
7E11000
unkown
page read and write
20BC3EAC000
heap
page read and write
930000
trusted library allocation
page read and write
1BC25D9F000
heap
page read and write
5DE000
stack
page read and write
3440000
unkown
page read and write
3440000
unkown
page read and write
20BC5740000
heap
page read and write
26455960000
heap
page read and write
210E36E7000
heap
page read and write
20BC3760000
trusted library allocation
page read and write
785F000
unkown
page read and write
800000
trusted library allocation
page read and write
33D0000
unkown
page read and write
2B996FA0000
heap
page read and write
3010000
unkown
page read and write
7DF4F3040000
unkown
page readonly
930000
trusted library allocation
page read and write
2DD51227000
heap
page read and write
72FD6FF000
stack
page read and write
930000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
194D986F000
heap
page read and write
20D0000
heap
page read and write
1FBD7DF9000
heap
page read and write
4C60000
unkown
page read and write
29887443000
heap
page read and write
7CE0000
unkown
page read and write
181CEC44000
heap
page read and write
181CEC47000
heap
page read and write
91C0000
unkown
page read and write
91C0000
unkown
page read and write
DC16A7E000
stack
page read and write
86D000
heap
page read and write
96DF000
unkown
page read and write
1BD1527A000
heap
page read and write
23A3FC4D000
heap
page read and write
3440000
unkown
page read and write
91C0000
unkown
page read and write
DACC1FF000
stack
page read and write
3403000
heap
page read and write
33D0000
unkown
page read and write
906E000
stack
page read and write
210E3714000
heap
page read and write
2DD51225000
heap
page read and write
4E90000
heap
page read and write
91F000
stack
page read and write
1451000
unkown
page readonly
1BD15260000
heap
page read and write
2F70000
trusted library allocation
page read and write
2F21000
system
page execute and read and write
2F70000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
32A0000
unkown
page read and write
1BC2653C000
heap
page read and write
1BD14C89000
heap
page read and write
2B9976A0000
heap
page read and write
3415000
heap
page read and write
1BC264F4000
heap
page read and write
26455EEF000
heap
page read and write
1BD14C92000
heap
page read and write
3070000
unkown
page read and write
26A463C4000
heap
page read and write
720000
heap
page read and write
1BC25D4B000
heap
page read and write
6FE000
stack
page read and write
1BC25D88000
heap
page read and write
1BC25DAA000
heap
page read and write
1BC25D9F000
heap
page read and write
2F70000
trusted library allocation
page read and write
8820000
unkown
page read and write
264556A6000
heap
page read and write
A364000
unkown
page read and write
3440000
unkown
page read and write
2418D41F000
heap
page read and write
1BD14C47000
heap
page read and write
3440000
unkown
page read and write
194DA082000
heap
page read and write
264556AE000
heap
page read and write
181CEDA8000
heap
page read and write
3440000
unkown
page read and write
33D0000
unkown
page read and write
7FF5ED697000
unkown
page readonly
1BC25D70000
heap
page read and write
2D0DBCF5000
heap
page read and write
210E382E000
heap
page read and write
2DD51825000
heap
page read and write
33D0000
unkown
page read and write
33D0000
unkown
page read and write
358E000
stack
page read and write
1BC25D07000
heap
page read and write
1FBD7804000
heap
page read and write
B9BE5FE000
stack
page read and write
1BC25D9F000
heap
page read and write
830000
trusted library allocation
page read and write
17983BA0000
heap
page read and write
33C0000
unkown
page read and write
210E3721000
heap
page read and write
2B9976A7000
heap
page read and write
A09C000
stack
page read and write
9CA0000
unkown
page read and write
9CA0000
unkown
page read and write
1BD14C83000
heap
page read and write
1490000
unkown
page read and write
3010000
unkown
page read and write
2DD51237000
heap
page read and write
181CE6F2000
heap
page read and write
1BC25D4E000
heap
page read and write
930000
trusted library allocation
page read and write
863000
heap
page read and write
3440000
unkown
page read and write
1BD14C89000
heap
page read and write
3415000
heap
page read and write
1F0000
heap
page read and write
2B9971B6000
heap
page read and write
B4D0000
unkown
page read and write
930000
trusted library allocation
page read and write
181CE6CF000
heap
page read and write
26ED0FE000
stack
page read and write
7FF7327B1000
unkown
page readonly
8820000
unkown
page read and write
308A000
stack
page read and write
9B60000
unkown
page readonly
210E3732000
heap
page read and write
2B997811000
heap
page read and write
1BD15267000
heap
page read and write
23A3FC42000
heap
page read and write
20BC39A0000
heap
page read and write
2418CD10000
heap
page read and write
930000
trusted library allocation
page read and write
2DD50FD0000
trusted library allocation
page read and write
23A3FC87000
heap
page read and write
3414000
heap
page read and write
1BC25D9F000
heap
page read and write
9200000
unkown
page read and write
181CEC4E000
heap
page read and write
400000
unkown
page execute and read and write
987D000
unkown
page read and write
B6A0000
heap
page read and write
DACC27E000
stack
page read and write
7FF5ED9C6000
unkown
page readonly
26A463CA000
heap
page read and write
2D0DB978000
heap
page read and write
1BC25D70000
heap
page read and write
1BD15270000
heap
page read and write
2DD51224000
heap
page read and write
3440000
unkown
page read and write
33F0000
unkown
page read and write
400000
unkown
page readonly
1380000
unkown
page read and write
9792000
unkown
page read and write
7FF5ED660000
unkown
page readonly
3080000
unkown
page read and write
7FF5ED42B000
unkown
page readonly
194DA087000
heap
page read and write
1BC27DAB000
heap
page read and write
3080000
unkown
page read and write
7D60000
unkown
page read and write
2F70000
trusted library allocation
page read and write
2371000
heap
page read and write
23A4041C000
heap
page read and write
1F154C0E000
heap
page read and write
2DD51094000
heap
page read and write
1500000
heap
page read and write
33C0000
unkown
page read and write
340D000
heap
page read and write
2DD51090000
heap
page read and write
95F000
stack
page read and write
3080000
unkown
page read and write
9CA0000
unkown
page read and write
9CA0000
unkown
page read and write
210E3727000
heap
page read and write
982D000
unkown
page read and write
2F70000
trusted library allocation
page read and write
3440000
unkown
page read and write
3010000
unkown
page read and write
1BC25D26000
heap
page read and write
2DD51254000
heap
page read and write
1F1565F0000
heap
page read and write
13B0000
unkown
page read and write
33C0000
unkown
page read and write
1FBD7E04000
heap
page read and write
EFF587F000
stack
page read and write
FE72000
heap
page read and write
7FF5ED735000
unkown
page readonly
20BC37F6000
heap
page read and write
26A46932000
heap
page read and write
33F0000
unkown
page read and write
9CA0000
unkown
page read and write
20BC3ED1000
heap
page read and write
33C0000
unkown
page read and write
2340000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
210E385A000
heap
page read and write
4B78000
unkown
page read and write
800000
trusted library allocation
page read and write
181CED97000
heap
page read and write
7FF5ED670000
unkown
page readonly
7FF5ED9CC000
unkown
page readonly
181CE6B5000
heap
page read and write
1095000
stack
page read and write
194D9870000
heap
page read and write
2DD5109B000
heap
page read and write
181D0780000
heap
page read and write
B190000
unkown
page read and write
26A463C7000
heap
page read and write
210E3590000
heap
page read and write
2D0DB991000
heap
page read and write
7FF5ED980000
unkown
page readonly
26A46475000
heap
page read and write
20BC37F4000
heap
page read and write
800000
trusted library allocation
page read and write
79FB000
unkown
page read and write
1210000
unkown
page readonly
930000
trusted library allocation
page read and write
29887370000
heap
page read and write
3440000
unkown
page read and write
930000
trusted library allocation
page read and write
1BC2803F000
heap
page read and write
210E382A000
heap
page read and write
3010000
unkown
page read and write
264556A6000
heap
page read and write
7FF5ED8E7000
unkown
page readonly
7950000
unkown
page read and write
9871000
unkown
page read and write
9CA0000
unkown
page read and write
1FBD77BB000
heap
page read and write
23A40409000
heap
page read and write
1BC25DC9000
heap
page read and write
3010000
unkown
page read and write
930000
trusted library allocation
page read and write
7FF5ED928000
unkown
page readonly
A391000
unkown
page read and write
2B997180000
heap
page read and write
26A4691A000
heap
page read and write
2B997825000
heap
page read and write
1FBD7DE9000
heap
page read and write
1BC2651E000
heap
page read and write
1370000
unkown
page read and write
3401000
heap
page read and write
3440000
unkown
page read and write
1380000
unkown
page read and write
7FF5ED961000
unkown
page readonly
800000
trusted library allocation
page read and write
2B99781A000
heap
page read and write
2340000
trusted library allocation
page read and write
5D76000
heap
page read and write
930000
trusted library allocation
page read and write
194DA08A000
heap
page read and write
1BC26593000
heap
page read and write
1BD1527A000
heap
page read and write
2B999200000
heap
page read and write
4CE000
stack
page read and write
B2D0000
unkown
page read and write
9176F7E000
stack
page read and write
1AA69FE000
stack
page read and write
2B997807000
heap
page read and write
800000
trusted library allocation
page read and write
181CE6D2000
heap
page read and write
1FBD7700000
trusted library allocation
page read and write
7FF5ED1CF000
unkown
page readonly
2DD51827000
heap
page read and write
23A3FC69000
heap
page read and write
B9BE4FE000
stack
page read and write
33C0000
unkown
page read and write
1BC28011000
heap
page read and write
2418CF0A000
heap
page read and write
91C0000
unkown
page read and write
3010000
unkown
page read and write
930000
trusted library allocation
page read and write
1F154577000
heap
page read and write
800000
trusted library allocation
page read and write
2D0DB9A6000
heap
page read and write
26455696000
heap
page read and write
20BC3ECC000
heap
page read and write
2340000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
7FF5ED1CB000
unkown
page readonly
1FBD77F6000
heap
page read and write
800000
trusted library allocation
page read and write
7FF5ED445000
unkown
page readonly
23A3FC84000
heap
page read and write
32A0000
unkown
page read and write
23A3FC93000
heap
page read and write
26A46928000
heap
page read and write
1FBD76E0000
heap
page read and write
26A46164000
heap
page read and write
3010000
unkown
page read and write
1480000
heap
page read and write
1BD1525D000
heap
page read and write
2DD51228000
heap
page read and write
194DA0B9000
heap
page read and write
1BD14D30000
trusted library allocation
page read and write
26455870000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
3080000
unkown
page read and write
26455EF6000
heap
page read and write
181CE6D2000
heap
page read and write
2DD5122B000
heap
page read and write
2B997145000
heap
page read and write
26455870000
trusted library allocation
page read and write
91C0000
unkown
page read and write
20BC3EA7000
heap
page read and write
210E3864000
heap
page read and write
2DD51075000
heap
page read and write
401000
unkown
page execute read
B2D0000
unkown
page read and write
11B0000
unkown
page readonly
20BC37F4000
heap
page read and write
2340000
trusted library allocation
page read and write
1BC26519000
heap
page read and write
1BC25D9F000
heap
page read and write
1D5EACC8000
heap
page read and write
9C000
stack
page read and write
194DA08E000
heap
page read and write
33F0000
unkown
page read and write
143B000
stack
page read and write
20BC3EBE000
heap
page read and write
4C18000
unkown
page read and write
1D5EAD0C000
heap
page read and write
C6F4000
unkown
page read and write
1BC26593000
heap
page read and write
9ADB000
stack
page read and write
91C0000
unkown
page read and write
3010000
unkown
page read and write
4A0000
direct allocation
page execute and read and write
1370000
unkown
page read and write
5961000
heap
page read and write
2418CD62000
heap
page read and write
7DA0000
unkown
page read and write
800000
trusted library allocation
page read and write
2DD5182B000
heap
page read and write
979C000
unkown
page read and write
5E0D000
stack
page read and write
40F000
unkown
page readonly
1FBD7DE4000
heap
page read and write
1BD15265000
heap
page read and write
181CE692000
heap
page read and write
6AF617E000
stack
page read and write
56C3000
unkown
page read and write
2418CD68000
heap
page read and write
26A4691A000
heap
page read and write
23A3FE40000
trusted library allocation
page read and write
B150000
unkown
page read and write
7FF5ED74A000
unkown
page readonly
23A3FE70000
heap
page read and write
8A6E000
stack
page read and write
1F1564A0000
heap
page read and write
1BC25DA9000
heap
page read and write
1F15472B000
heap
page read and write
20BC3EB5000
heap
page read and write
1FBD7DDC000
heap
page read and write
1BD14C85000
heap
page read and write
210E3851000
heap
page read and write
AA90000
unkown
page read and write
1370000
unkown
page read and write
23A3FF50000
heap
page read and write
20BC39AA000
heap
page read and write
2988744A000
heap
page read and write
26A46915000
heap
page read and write
2DD50F80000
heap
page read and write
1F154722000
heap
page read and write
2DD5182A000
heap
page read and write
194D9863000
heap
page read and write
7FF000
stack
page read and write
7D60000
unkown
page read and write
2DD51827000
heap
page read and write
2B997811000
heap
page read and write
1BC25DE4000
heap
page read and write
1BC2803F000
heap
page read and write
1390000
unkown
page read and write
2418D430000
heap
page read and write
2B997804000
heap
page read and write
9CA0000
unkown
page read and write
2DD51246000
heap
page read and write
3060000
unkown
page read and write
7FF5ED503000
unkown
page readonly
7F50000
unkown
page read and write
91C0000
unkown
page read and write
AADB000
unkown
page read and write
181CEDAD000
heap
page read and write
9CA0000
unkown
page read and write
1F15472A000
heap
page read and write
1F154C2B000
heap
page read and write
33C0000
unkown
page read and write
20BC3760000
trusted library allocation
page read and write
91C0000
unkown
page read and write
91C0000
unkown
page read and write
9A5B000
unkown
page read and write
84E000
heap
page read and write
3440000
unkown
page read and write
2F70000
trusted library allocation
page read and write
7FF5EDA11000
unkown
page readonly
3010000
unkown
page read and write
2418CD76000
heap
page read and write
210E3823000
heap
page read and write
3060000
unkown
page read and write
181CE6CF000
heap
page read and write
26455870000
trusted library allocation
page read and write
1FBD9720000
heap
page read and write
1F1544A0000
trusted library allocation
page read and write
91C0000
unkown
page read and write
2418D3FF000
heap
page read and write
800000
trusted library allocation
page read and write
210E3733000
heap
page read and write
33D0000
unkown
page read and write
2B99781A000
heap
page read and write
1BC2651B000
heap
page read and write
930000
trusted library allocation
page read and write
7FF7327A1000
unkown
page execute read
2988745E000
heap
page read and write
17983990000
heap
page read and write
2340000
trusted library allocation
page read and write
19C000
stack
page read and write
87F000
stack
page read and write
2DD51078000
heap
page read and write
A19F000
stack
page read and write
930000
trusted library allocation
page read and write
2DD5122D000
heap
page read and write
930000
trusted library allocation
page read and write
3010000
unkown
page read and write
9CA0000
unkown
page read and write
7FF5ED93E000
unkown
page readonly
2DD5109C000
heap
page read and write
33D0000
unkown
page read and write
3080000
unkown
page read and write
3748000
unkown
page read and write
800000
trusted library allocation
page read and write
C413737000
stack
page read and write
9CA0000
unkown
page read and write
1BC27DD7000
heap
page read and write
59E000
heap
page read and write
2B9971E6000
heap
page read and write
5D9000
heap
page read and write
23A3FC30000
heap
page read and write
3440000
unkown
page read and write
1F154599000
heap
page read and write
2F70000
trusted library allocation
page read and write
194DA0C0000
heap
page read and write
2233EFF000
stack
page read and write
1BC25D79000
heap
page read and write
3440000
unkown
page read and write
341C000
heap
page read and write
1370000
unkown
page read and write
1BD15433000
heap
page read and write
53DD37E000
stack
page read and write
1390000
unkown
page read and write
2340000
trusted library allocation
page read and write
1BC27EF0000
heap
page read and write
26455965000
heap
page read and write
710000
direct allocation
page read and write
44B000
unkown
page write copy
181CE6E9000
heap
page read and write
1F154770000
heap
page read and write
7FF5ED5F7000
unkown
page readonly
23A3FC85000
heap
page read and write
181CEDC0000
heap
page read and write
181CE6CF000
heap
page read and write
5E5E000
stack
page read and write
9CA0000
unkown
page read and write
72FD67D000
stack
page read and write
331E000
stack
page read and write
5D6F000
heap
page read and write
7FF5ED4A1000
unkown
page readonly
5EA0000
direct allocation
page execute and read and write
2340000
trusted library allocation
page read and write
23A3FC87000
heap
page read and write
9CA0000
unkown
page read and write
264556A3000
heap
page read and write
21DF000
stack
page read and write
19C000
stack
page read and write
20BC37F5000
heap
page read and write
7C80000
unkown
page read and write
A433000
unkown
page read and write
20BC37E5000
heap
page read and write
2418CD68000
heap
page read and write
20BC37A8000
heap
page read and write
1BC25D88000
heap
page read and write
B170000
unkown
page readonly
A4AB000
unkown
page read and write
5D59000
heap
page read and write
9CA0000
unkown
page read and write
2B9971D2000
heap
page read and write
2F70000
trusted library allocation
page read and write
5D59000
heap
page read and write
9CA0000
unkown
page read and write
26455EF1000
heap
page read and write
26A460F0000
trusted library allocation
page read and write
1F154C00000
heap
page read and write
181CEC4A000
heap
page read and write
2B997828000
heap
page read and write
1380000
unkown
page read and write
3440000
unkown
page read and write
863000
heap
page read and write
2DD5133A000
heap
page read and write
CA42000
unkown
page read and write
7FF5EDA38000
unkown
page readonly
1BC25D70000
heap
page read and write
1BC25DA9000
heap
page read and write
91C0000
unkown
page read and write
3080000
unkown
page read and write
210E37D0000
trusted library allocation
page read and write
2418D404000
heap
page read and write
31E467F000
stack
page read and write
FEB1000
unkown
page read and write
930000
trusted library allocation
page read and write
1BD1543A000
heap
page read and write
1BC265B8000
heap
page read and write
3070000
unkown
page read and write
26A46108000
heap
page read and write
1BC25DBB000
heap
page read and write
A3BE000
unkown
page read and write
9B0000
heap
page read and write
9CA0000
unkown
page read and write
3080000
unkown
page read and write
194D9882000
heap
page read and write
1370000
unkown
page read and write
451000
unkown
page read and write
2645596E000
heap
page read and write
B4D0000
unkown
page read and write
2418CD65000
heap
page read and write
1440000
unkown
page read and write
C57F000
unkown
page read and write
451000
unkown
page read and write
2B9977F0000
heap
page read and write
3010000
unkown
page read and write
5D6F000
heap
page read and write
3770000
heap
page read and write
3440000
unkown
page read and write
26455EEF000
heap
page read and write
3030000
unkown
page read and write
28DDE7D000
stack
page read and write
2F70000
trusted library allocation
page read and write
7859000
unkown
page read and write
2418CCB0000
heap
page read and write
181CE7C0000
trusted library allocation
page read and write
210E385A000
heap
page read and write
26A46140000
heap
page read and write
7FF5ED426000
unkown
page readonly
20BC3E97000
heap
page read and write
9CA0000
unkown
page read and write
1390000
unkown
page read and write
1BC264F8000
heap
page read and write
7FF5ED5A8000
unkown
page readonly
4FA000
heap
page read and write
29887462000
heap
page read and write
33D0000
unkown
page read and write
26455963000
heap
page read and write
2D0DBB60000
heap
page read and write
DACC07F000
stack
page read and write
1370000
unkown
page read and write
1BC28020000
heap
page read and write
800000
trusted library allocation
page read and write
181CE7E0000
trusted library allocation
page read and write
AAF2000
unkown
page read and write
181CEDC0000
heap
page read and write
2418D408000
heap
page read and write
2DD51236000
heap
page read and write
1D5EAD07000
heap
page read and write
1BD15437000
heap
page read and write
30BC000
stack
page read and write
7FF5ED8C6000
unkown
page readonly
3030000
unkown
page read and write
23A3FC87000
heap
page read and write
9CA0000
unkown
page read and write
7865000
unkown
page read and write
23A403FC000
heap
page read and write
1FBD77C0000
heap
page read and write
210E3724000
heap
page read and write
7CA0000
unkown
page read and write
800000
trusted library allocation
page read and write
1BC2803D000
heap
page read and write
1BD15265000
heap
page read and write
A4A1000
unkown
page read and write
2DD51246000
heap
page read and write
2B9971D4000
heap
page read and write
884000
heap
page read and write
9CA0000
unkown
page read and write
3080000
unkown
page read and write
3080000
unkown
page read and write
AB4C000
unkown
page read and write
2418D405000
heap
page read and write
20BC3EC8000
heap
page read and write
210E3837000
heap
page read and write
3245000
heap
page read and write
26A46137000
heap
page read and write
7DF4F3041000
unkown
page execute read
3440000
unkown
page read and write
830000
trusted library allocation
page read and write
210E3820000
heap
page read and write
4C0000
heap
page read and write
23A3FC47000
heap
page read and write
1FBD7730000
heap
page read and write
3040000
unkown
page read and write
7FF5ED779000
unkown
page readonly
C6C1000
unkown
page read and write
33C0000
unkown
page read and write
2F70000
trusted library allocation
page read and write
2B999090000
heap
page read and write
210E395B000
heap
page read and write
1BC25D5D000
heap
page read and write
1370000
unkown
page read and write
3030000
unkown
page read and write
194DA0BC000
heap
page read and write
1BD15268000
heap
page read and write
26457860000
heap
page read and write
7DDC000
stack
page read and write
33B9000
stack
page read and write
3080000
unkown
page read and write
830000
trusted library allocation
page read and write
8820000
unkown
page read and write
7FF5ED9D2000
unkown
page readonly
354F000
stack
page read and write
2B99782B000
heap
page read and write
181CEDA4000
heap
page read and write
930000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
26A46908000
heap
page read and write
2418CF0E000
heap
page read and write
1BC25D9F000
heap
page read and write
5D59000
heap
page read and write
A361000
unkown
page read and write
7FF5ED674000
unkown
page readonly
9CA0000
unkown
page read and write
9CA0000
unkown
page read and write
1BC25D4B000
heap
page read and write
1BC26501000
heap
page read and write
181CE6F2000
heap
page read and write
20BC3E97000
heap
page read and write
23A3FF65000
heap
page read and write
1370000
unkown
page read and write
4FE000
heap
page read and write
2340000
trusted library allocation
page read and write
460000
unkown
page readonly
21A1000
heap
page read and write
401000
unkown
page execute read
1FBD7DE0000
heap
page read and write
1D5EACF3000
heap
page read and write
23A40419000
heap
page read and write
1BC25D9F000
heap
page read and write
56D9000
unkown
page read and write
33D0000
unkown
page read and write
BC9B000
stack
page read and write
40F000
unkown
page readonly
2B997804000
heap
page read and write
1370000
unkown
page read and write
210E36D0000
heap
page read and write
530000
heap
page read and write
1BC25D9F000
heap
page read and write
181CE6D8000
heap
page read and write
1FBD7DFD000
heap
page read and write
1BC26593000
heap
page read and write
23A3FF52000
heap
page read and write
181CEDC2000
heap
page read and write
1FBD7E03000
heap
page read and write
930000
trusted library allocation
page read and write
20BC3EB8000
heap
page read and write
7FF5ED695000
unkown
page readonly
91C0000
unkown
page read and write
3080000
unkown
page read and write
33C0000
unkown
page read and write
14B0000
unkown
page readonly
23A3FF6B000
heap
page read and write
2B9976AA000
heap
page read and write
BD98000
stack
page read and write
3440000
unkown
page read and write
210E3723000
heap
page read and write
1F1544A0000
trusted library allocation
page read and write
1BD14C89000
heap
page read and write
4E38000
heap
page read and write
1FBD77BA000
heap
page read and write
1FBD7DE3000
heap
page read and write
76A0000
unkown
page read and write
2F70000
trusted library allocation
page read and write
26A46918000
heap
page read and write
3080000
unkown
page read and write
9C90000
heap
page read and write
23A3FC8C000
heap
page read and write
1BC2657B000
heap
page read and write
194D9883000
heap
page read and write
2B99780A000
heap
page read and write
5D6D000
heap
page read and write
7FF5ED43A000
unkown
page readonly
2418CF0A000
heap
page read and write
2DD50F90000
heap
page read and write
8BE9000
stack
page read and write
264556AF000
heap
page read and write
23A40423000
heap
page read and write
23A3FF57000
heap
page read and write
23A3FC87000
heap
page read and write
3446000
heap
page read and write
23A3FC66000
heap
page read and write
3209000
stack
page read and write
3040000
unkown
page read and write
1FBD781A000
heap
page read and write
930000
trusted library allocation
page read and write
7FF5ED750000
unkown
page readonly
210E37D0000
trusted library allocation
page read and write
181CE697000
heap
page read and write
2340000
trusted library allocation
page read and write
5D96000
heap
page read and write
2B9971D9000
heap
page read and write
7FF5EDA0D000
unkown
page readonly
2F70000
trusted library allocation
page read and write
1BC26393000
heap
page read and write
210E3845000
heap
page read and write
2B997811000
heap
page read and write
2B9971D9000
heap
page read and write
194D9A60000
heap
page read and write
2FFF000
stack
page read and write
20BC3740000
heap
page read and write
7FF5ED404000
unkown
page readonly
1F154C19000
heap
page read and write
1F0000
heap
page read and write
2645596B000
heap
page read and write
818D000
stack
page read and write
210E3690000
heap
page read and write
3010000
unkown
page read and write
3010000
unkown
page read and write
3010000
unkown
page read and write
2F70000
trusted library allocation
page read and write
1BC26593000
heap
page read and write
5D59000
heap
page read and write
2340000
trusted library allocation
page read and write
8820000
unkown
page read and write
3290000
unkown
page read and write
26A46310000
trusted library allocation
page read and write
1BC25D70000
heap
page read and write
1BC26502000
heap
page read and write
181CE6D8000
heap
page read and write
1390000
unkown
page read and write
1BD14BD0000
heap
page read and write
3010000
unkown
page read and write
87E1000
unkown
page read and write
1BD15437000
heap
page read and write
7FF5ED412000
unkown
page readonly
194DA0B9000
heap
page read and write
1BC25D66000
heap
page read and write
1D5EAEB0000
heap
page read and write
20BC3EAF000
heap
page read and write
23A3FE40000
trusted library allocation
page read and write
EEA000
system
page execute and read and write
2B99781C000
heap
page read and write
1F154380000
heap
page read and write
2418CD68000
heap
page read and write
2418CD84000
heap
page read and write
3070000
unkown
page read and write
2340000
trusted library allocation
page read and write
2DD51246000
heap
page read and write
8454FE000
stack
page read and write
2DD51262000
heap
page read and write
2418D3FE000
heap
page read and write
26A46153000
heap
page read and write
29887481000
heap
page read and write
1BC25D5D000
heap
page read and write
2645596A000
heap
page read and write
9CA0000
unkown
page read and write
2B9976A4000
heap
page read and write
33C0000
unkown
page read and write
3440000
unkown
page read and write
B2D0000
unkown
page read and write
7FF5ED9D6000
unkown
page readonly
7FF5ED519000
unkown
page readonly
7FF5ED849000
unkown
page readonly
26A46157000
heap
page read and write
194DA08A000
heap
page read and write
210E3706000
heap
page read and write
B8C0000
unkown
page readonly
830000
trusted library allocation
page read and write
210E3825000
heap
page read and write
33D0000
unkown
page read and write
23A3FC87000
heap
page read and write
181CEDA3000
heap
page read and write
26455695000
heap
page read and write
1BC26575000
heap
page read and write
451000
unkown
page read and write
194DA0B9000
heap
page read and write
1BC264FE000
heap
page read and write
538000
heap
page read and write
2B9971D9000
heap
page read and write
26455ED4000
heap
page read and write
85E000
heap
page read and write
1380000
unkown
page read and write
1BC265A4000
heap
page read and write
194DA098000
heap
page read and write
3220000
heap
page read and write
2F70000
trusted library allocation
page read and write
210E3705000
heap
page read and write
7977000
unkown
page read and write
13B0000
unkown
page read and write
54C3877000
stack
page read and write
9CA0000
unkown
page read and write
26ED17E000
stack
page read and write
3440000
unkown
page read and write
23A40422000
heap
page read and write
91C0000
unkown
page read and write
A37B000
unkown
page read and write
7FF5ED409000
unkown
page readonly
1FBD77BA000
heap
page read and write
2B997825000
heap
page read and write
1BC25D9F000
heap
page read and write
5B5D000
heap
page read and write
1BC27D80000
heap
page read and write
3060000
unkown
page read and write
2418CCA0000
heap
page read and write
3440000
unkown
page read and write
2F70000
trusted library allocation
page read and write
181CE6B4000
heap
page read and write
4BE3000
unkown
page read and write
1380000
unkown
page read and write
37BD000
unkown
page read and write
264556A3000
heap
page read and write
32A0000
stack
page read and write
830000
trusted library allocation
page read and write
7E60000
unkown
page read and write
32A0000
unkown
page read and write
2DD5182A000
heap
page read and write
3080000
unkown
page read and write
340B000
heap
page read and write
5B5D000
heap
page read and write
13B0000
unkown
page read and write
210E3851000
heap
page read and write
1BC26593000
heap
page read and write
C6F8000
unkown
page read and write
7FF5ED516000
unkown
page readonly
B2D0000
unkown
page read and write
2B9976AB000
heap
page read and write
1FBD77FD000
heap
page read and write
1BC27DBA000
heap
page read and write
26A46928000
heap
page read and write
33D0000
unkown
page read and write
5C5B000
heap
page read and write
3440000
unkown
page read and write
181CEDB3000
heap
page read and write
400000
unkown
page readonly
2418CF0B000
heap
page read and write
1FDE000
stack
page read and write
2DD510CB000
heap
page read and write
2340000
trusted library allocation
page read and write
5D77000
heap
page read and write
A323000
unkown
page read and write
1BD14C42000
heap
page read and write
4C34000
unkown
page read and write
3409000
heap
page read and write
3020000
unkown
page read and write
1BC25D4C000
heap
page read and write
2F70000
trusted library allocation
page read and write
1BC26550000
heap
page read and write
23A3FF5A000
heap
page read and write
3426000
heap
page read and write
4FE000
stack
page read and write
23A4040E000
heap
page read and write
9877000
unkown
page read and write
26457760000
heap
page read and write
84567F000
stack
page read and write
1BD14C39000
heap
page read and write
342A000
heap
page read and write
3080000
unkown
page read and write
7FF5ED9CA000
unkown
page readonly
1370000
unkown
page read and write
7FF5ED94A000
unkown
page readonly
9CA0000
unkown
page read and write
9CA0000
unkown
page read and write
4CB0000
unkown
page read and write
1F154C32000
heap
page read and write
194D9820000
heap
page read and write
181CEC40000
heap
page read and write
1390000
unkown
page read and write
7F50000
unkown
page read and write
9200000
unkown
page read and write
1FBD77B7000
heap
page read and write
2DD510CE000
heap
page read and write
7CC0000
unkown
page readonly
1D5EAEA0000
heap
page read and write
2340000
trusted library allocation
page read and write
4BA6000
unkown
page read and write
9CA0000
unkown
page read and write
3440000
unkown
page read and write
85D000
heap
page read and write
2B99781A000
heap
page read and write
3210000
heap
page read and write
2645596E000
heap
page read and write
9DED000
stack
page read and write
930000
trusted library allocation
page read and write
181CEB40000
heap
page read and write
3430000
unkown
page read and write
1BC25D28000
heap
page read and write
9176BCF000
stack
page read and write
C5A0000
unkown
page read and write
C557000
unkown
page read and write
2100000
heap
page read and write
7FF5ED46E000
unkown
page readonly
1FBD7DD7000
heap
page read and write
2DD510C1000
heap
page read and write
264558A0000
heap
page read and write
2340000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
7FF5ED8AC000
unkown
page readonly
1AA6547000
stack
page read and write
2F70000
trusted library allocation
page read and write
264556A1000
heap
page read and write
B629000
stack
page read and write
9CA0000
unkown
page read and write
1BD14C83000
heap
page read and write
7FF5ED451000
unkown
page readonly
91C0000
unkown
page read and write
9CA0000
unkown
page read and write
B8B0000
unkown
page read and write
1D5EACE2000
heap
page read and write
51E0000
trusted library allocation
page read and write
2988745E000
heap
page read and write
2FBE000
stack
page read and write
33F0000
unkown
page read and write
181CE6F2000
heap
page read and write
26A46112000
heap
page read and write
9CA0000
unkown
page read and write
210E3955000
heap
page read and write
3412000
heap
page read and write
1FBD77B5000
heap
page read and write
91C0000
unkown
page read and write
26A46153000
heap
page read and write
1BD1527A000
heap
page read and write
342F000
heap
page read and write
2340000
trusted library allocation
page read and write
210E372A000
heap
page read and write
3440000
unkown
page read and write
B9BE1CF000
stack
page read and write
9F5000
heap
page read and write
1F1545B9000
heap
page read and write
181CEDB0000
heap
page read and write
7FF5ED9A6000
unkown
page readonly
20BC37F5000
heap
page read and write
7E50000
unkown
page readonly
2340000
trusted library allocation
page read and write
2DD51247000
heap
page read and write
20BC3E9A000
heap
page read and write
1FBD7821000
heap
page read and write
930000
trusted library allocation
page read and write
CB42000
unkown
page read and write
2B9971D9000
heap
page read and write
7FF5ED942000
unkown
page readonly
29887481000
heap
page read and write
C964000
unkown
page read and write
965C000
stack
page read and write
FEC2000
unkown
page read and write
7FF5ED4B4000
unkown
page readonly
1BC264EC000
heap
page read and write
1FBD7DDC000
heap
page read and write
4E6D000
stack
page read and write
41D000
unkown
page readonly
1BC26280000
heap
page read and write
3060000
unkown
page read and write
3404000
heap
page read and write
530000
direct allocation
page read and write
26A463CE000
heap
page read and write
20BC3E9E000
heap
page read and write
26A46117000
heap
page read and write
1D5EACF2000
heap
page read and write
7FF5ED625000
unkown
page readonly
2DD50FD0000
trusted library allocation
page read and write
3440000
unkown
page read and write
7FF5ED6BC000
unkown
page readonly
2418D0A5000
heap
page read and write
194D9879000
heap
page read and write
3758000
unkown
page read and write
2B9971B5000
heap
page read and write
1BC28030000
heap
page read and write
210E3827000
heap
page read and write
23A40419000
heap
page read and write
1BC25DBB000
heap
page read and write
2D0DBB40000
heap
page read and write
298874A9000
heap
page read and write
40B000
unkown
page execute read
3440000
unkown
page read and write
1BD14C10000
trusted library allocation
page read and write
91C0000
unkown
page read and write
2418D3FF000
heap
page read and write
76C0000
unkown
page read and write
3440000
unkown
page read and write
1D5EAC90000
heap
page read and write
9CA0000
unkown
page read and write
33C0000
unkown
page read and write
84557E000
stack
page read and write
3020000
unkown
page read and write
2B9977FC000
heap
page read and write
3440000
unkown
page read and write
3738000
unkown
page read and write
9CA0000
unkown
page read and write
7FF5ED77C000
unkown
page readonly
29887466000
heap
page read and write
800000
trusted library allocation
page read and write
2418D411000
heap
page read and write
44B000
unkown
page write copy
7FF5ED810000
unkown
page readonly
730000
unclassified section
page read and write
210E3721000
heap
page read and write
32A0000
unkown
page read and write
210E382B000
heap
page read and write
3323000
heap
page read and write
1BC27DD7000
heap
page read and write
B00B000
stack
page read and write
7FF5ED4DF000
unkown
page readonly
789000
heap
page read and write
9CA0000
unkown
page read and write
26455750000
heap
page read and write
7FF7327B5000
unkown
page readonly
91C0000
unkown
page read and write
7FF5ED6B9000
unkown
page readonly
26A46135000
heap
page read and write
72FD77E000
stack
page read and write
3440000
unkown
page read and write
586000
system
page execute and read and write
C08A000
stack
page read and write
181CEDC0000
heap
page read and write
2B9971EB000
heap
page read and write
194DA08B000
heap
page read and write
C6E3000
unkown
page read and write
1F154C29000
heap
page read and write
2418D40D000
heap
page read and write
1BC26394000
heap
page read and write
3415000
heap
page read and write
194DA0A4000
heap
page read and write
2233FFF000
stack
page read and write
1BC26556000
heap
page read and write
95DF000
stack
page read and write
23A403FC000
heap
page read and write
20BC3EBE000
heap
page read and write
3440000
unkown
page read and write
2340000
trusted library allocation
page read and write
1FBD7DE9000
heap
page read and write
210E3727000
heap
page read and write
800000
trusted library allocation
page read and write
896B000
stack
page read and write
7863000
unkown
page read and write
2988747E000
heap
page read and write
20BC3E95000
heap
page read and write
29887476000
heap
page read and write
91C0000
unkown
page read and write
9CA0000
unkown
page read and write
EE8000
system
page execute and read and write
1F1545C4000
heap
page read and write
2DD51228000
heap
page read and write
9CA0000
unkown
page read and write
C544000
unkown
page read and write
9CA0000
unkown
page read and write
1FBD7DE7000
heap
page read and write
181CE6CF000
heap
page read and write
3441000
heap
page read and write
1BC25D70000
heap
page read and write
2DD51094000
heap
page read and write
1BC2803D000
heap
page read and write
32A0000
unkown
page read and write
1AA65CF000
stack
page read and write
26455F01000
heap
page read and write
20BC37E6000
heap
page read and write
7CD0000
unkown
page read and write
210E385C000
heap
page read and write
3020000
unkown
page read and write
2B9977FC000
heap
page read and write
26455EC7000
heap
page read and write
2DD51092000
heap
page read and write
20BC37D4000
heap
page read and write
31E4197000
stack
page read and write
40F000
unkown
page readonly
181CEDAE000
heap
page read and write
91C0000
unkown
page read and write
9CA0000
unkown
page read and write
1F1545B4000
heap
page read and write
2B9971C5000
heap
page read and write
85D000
heap
page read and write
1330000
heap
page read and write
181CE7DB000
heap
page read and write
7FF5ED6DB000
unkown
page readonly
2DD53130000
heap
page read and write
2F70000
trusted library allocation
page read and write
1BC25CE0000
heap
page read and write
26ED1FF000
stack
page read and write
7FF5ED4F3000
unkown
page readonly
1FBD7810000
heap
page read and write
4E30000
heap
page read and write
23A3FC66000
heap
page read and write
1BD14C96000
heap
page read and write
1BC26512000
heap
page read and write
3030000
unkown
page read and write
1BD14C8F000
heap
page read and write
7FF5ED62F000
unkown
page readonly
3080000
unkown
page read and write
181CE6E9000
heap
page read and write
181CE6CF000
heap
page read and write
1BC264EF000
heap
page read and write
1FBD77BE000
heap
page read and write
9CA0000
unkown
page read and write
1380000
unkown
page read and write
37AE000
unkown
page read and write
3010000
unkown
page read and write
1370000
unkown
page read and write
2418CF03000
heap
page read and write
33C0000
unkown
page read and write
5D0000
heap
page read and write
91C0000
unkown
page read and write
2418D40B000
heap
page read and write
2B997188000
heap
page read and write
26A463C7000
heap
page read and write
7FF5EDA14000
unkown
page readonly
9CA0000
unkown
page read and write
2418D411000
heap
page read and write
800000
trusted library allocation
page read and write
194D9A30000
trusted library allocation
page read and write
7FF7327B1000
unkown
page readonly
93F000
stack
page read and write
23A3FC84000
heap
page read and write
29887465000
heap
page read and write
1FBD7E03000
heap
page read and write
1F1545A5000
heap
page read and write
3010000
unkown
page read and write
13B0000
unkown
page read and write
7FF5ED556000
unkown
page readonly
7F50000
unkown
page read and write
738000
heap
page read and write
2988741C000
heap
page read and write
9CA0000
unkown
page read and write
223407E000
stack
page read and write
2340000
trusted library allocation
page read and write
33D0000
unkown
page read and write
2F70000
trusted library allocation
page read and write
92E000
stack
page read and write
1BD1527A000
heap
page read and write
5D8C000
heap
page read and write
3010000
unkown
page read and write
23A3FC66000
heap
page read and write
41D000
unkown
page readonly
3020000
unkown
page read and write
4D30000
heap
page read and write
9CA0000
unkown
page read and write
97A9000
unkown
page read and write
828000
heap
page read and write
1BC25D88000
heap
page read and write
91C0000
unkown
page read and write
9CA0000
unkown
page read and write
2340000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
1D5EACE9000
heap
page read and write
9200000
unkown
page read and write
5DD0000
trusted library allocation
page read and write
7FF5ED844000
unkown
page readonly
26A463CA000
heap
page read and write
7FF5D1CCD000
unkown
page readonly
88EE000
stack
page read and write
2418D3F7000
heap
page read and write
51E0000
trusted library allocation
page read and write
2B9971D2000
heap
page read and write
1BD14AF0000
heap
page read and write
9200000
unkown
page read and write
2418D423000
heap
page read and write
3443000
heap
page read and write
194D9877000
heap
page read and write
2101000
heap
page read and write
830000
trusted library allocation
page read and write
1BC25D66000
heap
page read and write
5DD0000
trusted library allocation
page read and write
2B997803000
heap
page read and write
1380000
unkown
page read and write
1BC26565000
heap
page read and write
2340000
trusted library allocation
page read and write
210E3721000
heap
page read and write
7FF5EDA70000
unkown
page readonly
C4D0000
unkown
page read and write
7FF5ED39B000
unkown
page readonly
23A40409000
heap
page read and write
2418D41F000
heap
page read and write
33C0000
unkown
page read and write
181CE6B7000
heap
page read and write
31E44FE000
stack
page read and write
9CA0000
unkown
page read and write
3020000
unkown
page read and write
20BC3640000
heap
page read and write
1F15477A000
heap
page read and write
2B9970F0000
heap
page read and write
800000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
2418ED90000
heap
page read and write
4BE1000
unkown
page read and write
54C39FF000
stack
page read and write
7FF5ED9ED000
unkown
page readonly
194DA09C000
heap
page read and write
C893000
unkown
page read and write
A32A000
unkown
page read and write
9F1E000
stack
page read and write
26455ED4000
heap
page read and write
1BC26561000
heap
page read and write
F9E4000
unkown
page read and write
2B997140000
heap
page read and write
194DA087000
heap
page read and write
AAF9000
unkown
page read and write
17983999000
heap
page read and write
20BC3EB2000
heap
page read and write
5D7C000
heap
page read and write
B9BE147000
stack
page read and write
740000
heap
page read and write
800000
trusted library allocation
page read and write
1BC2651E000
heap
page read and write
7695000
stack
page read and write
CA63000
unkown
page read and write
59A000
heap
page read and write
210E3708000
heap
page read and write
13B0000
unkown
page read and write
1D5EAEA5000
heap
page read and write
2F70000
trusted library allocation
page read and write
9A10000
unkown
page read and write
830000
trusted library allocation
page read and write
2418CD48000
heap
page read and write
3010000
unkown
page read and write
7FF5ED996000
unkown
page readonly
C7C5000
unkown
page read and write
2B9977FF000
heap
page read and write
91C0000
unkown
page read and write
7FF7327B4000
unkown
page read and write
2340000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
2B9977F7000
heap
page read and write
1FBD7810000
heap
page read and write
1BC25DE4000
heap
page read and write
7FF5ED3DA000
unkown
page readonly
F10000
heap
page read and write
26A4690C000
heap
page read and write
A4FC000
unkown
page read and write
23A3FC39000
heap
page read and write
2340000
trusted library allocation
page read and write
9176E7F000
stack
page read and write
9200000
unkown
page read and write
7B80000
unkown
page read and write
554000
heap
page read and write
181CED9C000
heap
page read and write
1BD1543E000
heap
page read and write
2418D401000
heap
page read and write
20BC3E9E000
heap
page read and write
1FBD77B7000
heap
page read and write
91C0000
unkown
page read and write
210E3851000
heap
page read and write
26A46139000
heap
page read and write
480000
heap
page read and write
9AF000
stack
page read and write
3030000
unkown
page read and write
1F1545B1000
heap
page read and write
2B9976AA000
heap
page read and write
2B9976A7000
heap
page read and write
FEBD000
unkown
page read and write
40F000
unkown
page readonly
3402000
heap
page read and write
23A4040E000
heap
page read and write
2D0DBA08000
heap
page read and write
2DD5122D000
heap
page read and write
3010000
unkown
page read and write
26455ECE000
heap
page read and write
880000
heap
page read and write
181CEDC1000
heap
page read and write
3440000
unkown
page read and write
5D59000
heap
page read and write
194DA084000
heap
page read and write
33D0000
unkown
page read and write
26ED07F000
stack
page read and write
1FBD7DF9000
heap
page read and write
9CA0000
unkown
page read and write
342A000
heap
page read and write
1BD14C8B000
heap
page read and write
194DA0A8000
heap
page read and write
7D00000
unkown
page readonly
1F1544A0000
trusted library allocation
page read and write
2988747B000
heap
page read and write
1BC26593000
heap
page read and write
3F0000
heap
page read and write
194DA0C1000
heap
page read and write
7FF5ED41C000
unkown
page readonly
26A463CA000
heap
page read and write
20C0000
unclassified section
page read and write
7FF5ED602000
unkown
page readonly
2418D430000
heap
page read and write
7FF5ED26E000
unkown
page readonly
C51E000
unkown
page read and write
3060000
unkown
page read and write
9CA0000
unkown
page read and write
7F0000
heap
page read and write
5D80000
heap
page read and write
44B000
unkown
page read and write
9CA0000
unkown
page read and write
7FF5ED86B000
unkown
page readonly
1BC25DE4000
heap
page read and write
33C0000
unkown
page read and write
3440000
unkown
page read and write
1D5EACE9000
heap
page read and write
33C0000
unkown
page read and write
A379000
unkown
page read and write
C563000
unkown
page read and write
7FF5ED7C4000
unkown
page readonly
2DD51057000
heap
page read and write
3020000
unkown
page read and write
9CA0000
unkown
page read and write
33D0000
unkown
page read and write
210E3822000
heap
page read and write
3080000
unkown
page read and write
2290000
heap
page read and write
C413BFE000
stack
page read and write
210E372F000
heap
page read and write
20BC37B7000
heap
page read and write
7DF4F3050000
unkown
page readonly
1370000
unkown
page read and write
9CA0000
unkown
page read and write
26E0000
trusted library allocation
page read and write
91C0000
unkown
page read and write
5D74000
heap
page read and write
2F70000
trusted library allocation
page read and write
181CEDC4000
heap
page read and write
194D9880000
heap
page read and write
194D9854000
heap
page read and write
33C0000
stack
page read and write
1FBD7DE1000
heap
page read and write
3020000
unkown
page read and write
29889191000
heap
page read and write
1BC25D28000
heap
page read and write
3080000
unkown
page read and write
1BC265AF000
heap
page read and write
7F50000
unkown
page read and write
2B9971DB000
heap
page read and write
4B90000
unkown
page read and write
335D000
stack
page read and write
C5AA000
unkown
page read and write
2340000
trusted library allocation
page read and write
91C0000
unkown
page read and write
210E385C000
heap
page read and write
978E000
unkown
page read and write
23A3FF57000
heap
page read and write
51E0000
trusted library allocation
page read and write
26455EDB000
heap
page read and write
1FBD7700000
trusted library allocation
page read and write
29887473000
heap
page read and write
26455EEF000
heap
page read and write
930000
trusted library allocation
page read and write
3440000
unkown
page read and write
44B000
unkown
page read and write
7FF5ED7D6000
unkown
page readonly
76F000
heap
page read and write
3020000
unkown
page read and write
1BC25F30000
trusted library allocation
page read and write
604000
heap
page read and write
7D40000
unkown
page read and write
1F154C2C000
heap
page read and write
67B000
stack
page read and write
1BC27D81000
heap
page read and write
1BC25D29000
heap
page read and write
3010000
unkown
page read and write
26A4691A000
heap
page read and write
8B60000
unkown
page readonly
91C0000
unkown
page read and write
830000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
9869000
unkown
page read and write
460000
unkown
page readonly
1370000
unkown
page read and write
2F70000
trusted library allocation
page read and write
264556A6000
heap
page read and write
9176EFE000
stack
page read and write
3415000
heap
page read and write
2DD5124E000
heap
page read and write
20BC3E9B000
heap
page read and write
1483000
heap
page read and write
2DD51000000
heap
page read and write
2DD510A0000
heap
page read and write
2340000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
2B99781A000
heap
page read and write
1BC2639A000
heap
page read and write
1BC25EC0000
heap
page read and write
2F70000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
29889110000
heap
page read and write
9CA0000
unkown
page read and write
2DD5122B000
heap
page read and write
210E3851000
heap
page read and write
9B5D000
stack
page read and write
26E0000
trusted library allocation
page read and write
1BC25D5D000
heap
page read and write
84547F000
stack
page read and write
550000
heap
page read and write
7FF5ECED2000
unkown
page readonly
2418D403000
heap
page read and write
29887483000
heap
page read and write
3797000
unkown
page read and write
930000
trusted library allocation
page read and write
1F154C0F000
heap
page read and write
460000
unkown
page readonly
26A46931000
heap
page read and write
6EE000
stack
page read and write
1BC25DE4000
heap
page read and write
37F2000
unkown
page read and write
91C0000
unkown
page read and write
7FF5ED9BE000
unkown
page readonly
8820000
unkown
page read and write
FE80000
unkown
page read and write
460000
unkown
page readonly
3440000
unkown
page read and write
5D6C000
heap
page read and write
9883000
unkown
page read and write
2340000
trusted library allocation
page read and write
20BC3760000
trusted library allocation
page read and write
3080000
unkown
page read and write
1BC26556000
heap
page read and write
1BC25D9F000
heap
page read and write
5765000
heap
page read and write
36D5000
stack
page read and write
181CEDC0000
heap
page read and write
7FF5ED68F000
unkown
page readonly
2DD51253000
heap
page read and write
930000
trusted library allocation
page read and write
1370000
unkown
page read and write
E4A0000
unkown
page read and write
1BD1543B000
heap
page read and write
2B9971E1000
heap
page read and write
40B000
unkown
page execute read
181CED9F000
heap
page read and write
5AD000
heap
page execute and read and write
33F0000
unkown
page read and write
26455A30000
heap
page read and write
210E3721000
heap
page read and write
3431000
heap
page read and write
6AF60FF000
stack
page read and write
8820000
unkown
page read and write
7FF7327A1000
unkown
page execute read
1BD14C89000
heap
page read and write
26A4690F000
heap
page read and write
9138000
stack
page read and write
2B997801000
heap
page read and write
1BD14F0B000
heap
page read and write
1370000
unkown
page read and write
44B000
unkown
page write copy
7FF5ED9F2000
unkown
page readonly
41D000
unkown
page readonly
9CA0000
unkown
page read and write
33C0000
unkown
page read and write
1F154C29000
heap
page read and write
2F70000
trusted library allocation
page read and write
1BD14C6A000
heap
page read and write
9CA0000
unkown
page read and write
1FBD7700000
trusted library allocation
page read and write
194DA0A0000
heap
page read and write
1BC26593000
heap
page read and write
181CE6D9000
heap
page read and write
3440000
unkown
page read and write
26455ECC000
heap
page read and write
1BC25D70000
heap
page read and write
9CA0000
unkown
page read and write
194DA0A0000
heap
page read and write
1BC2652A000
heap
page read and write
33C0000
unkown
page read and write
2DD51246000
heap
page read and write
23A3FC67000
heap
page read and write
2DD51246000
heap
page read and write
A29E000
stack
page read and write
5D59000
heap
page read and write
1BC26593000
heap
page read and write
5DD0000
trusted library allocation
page read and write
2B9971E9000
heap
page read and write
2DD51823000
heap
page read and write
3010000
unkown
page read and write
2DD51090000
heap
page read and write
181CED90000
heap
page read and write
8F33000
unkown
page read and write
9CA0000
unkown
page read and write
20BC39A5000
heap
page read and write
2418CD64000
heap
page read and write
26A46157000
heap
page read and write
2B997820000
heap
page read and write
B2D0000
unkown
page read and write
13B0000
unkown
page read and write
7C90000
unkown
page read and write
5590000
unkown
page write copy
C4137BF000
stack
page read and write
9CA0000
unkown
page read and write
3020000
unkown
page read and write
9C000
stack
page read and write
1BD15270000
heap
page read and write
2DD50FB0000
heap
page read and write
79B1000
unkown
page read and write
181CEDC9000
heap
page read and write
3440000
unkown
page read and write
2418D41F000
heap
page read and write
41D000
unkown
page readonly
4E80000
remote allocation
page read and write
1370000
unkown
page read and write
1F154C0C000
heap
page read and write
930000
trusted library allocation
page read and write
5D59000
heap
page read and write
26455ECF000
heap
page read and write
7FF5ED743000
unkown
page readonly
2340000
trusted library allocation
page read and write
1BC25D35000
heap
page read and write
1BC27E03000
heap
page read and write
1390000
unkown
page read and write
2F70000
trusted library allocation
page read and write
3010000
unkown
page read and write
7D60000
unkown
page read and write
9CA0000
unkown
page read and write
181CE697000
heap
page read and write
1BC25DE4000
heap
page read and write
930000
trusted library allocation
page read and write
5D59000
heap
page read and write
2418D3FC000
heap
page read and write
91C0000
unkown
page read and write
9176B4F000
stack
page read and write
91C0000
unkown
page read and write
2DD51040000
heap
page read and write
1BC25D70000
heap
page read and write
1F154727000
heap
page read and write
930000
trusted library allocation
page read and write
91C0000
unkown
page read and write
2B997811000
heap
page read and write
181CE6E4000
heap
page read and write
13B0000
unkown
page read and write
32F7000
heap
page read and write
2B9976AE000
heap
page read and write
7FF5ED847000
unkown
page readonly
2DD51076000
heap
page read and write
33C0000
unkown
page read and write
37F9000
unkown
page read and write
181CEC45000
heap
page read and write
9CA0000
unkown
page read and write
91C0000
unkown
page read and write
3010000
unkown
page read and write
1380000
unkown
page read and write
2DD510C6000
heap
page read and write
DACC17E000
stack
page read and write
7FF5ED349000
unkown
page readonly
23A3FC4D000
heap
page read and write
9CA0000
unkown
page read and write
3760000
heap
page read and write
7FF5ED806000
unkown
page readonly
29887477000
heap
page read and write
2DD5122F000
heap
page read and write
2F28000
system
page execute and read and write
13B0000
unkown
page read and write
26455850000
heap
page read and write
3440000
unkown
page read and write
2DD51256000
heap
page read and write
1BC2639A000
heap
page read and write
830000
trusted library allocation
page read and write
32F0000
heap
page read and write
4C50000
unkown
page read and write
2DD52FD0000
heap
page read and write
210E372B000
heap
page read and write
3120000
unkown
page readonly
1FBD7A85000
heap
page read and write
1BC28001000
heap
page read and write
2418CD22000
heap
page read and write
26A46918000
heap
page read and write
26455EC9000
heap
page read and write
1BC264ED000
heap
page read and write
C6D9000
unkown
page read and write
800000
trusted library allocation
page read and write
1BC264F7000
heap
page read and write
9CA0000
unkown
page read and write
400000
unkown
page execute and read and write
26455EDB000
heap
page read and write
21A0000
heap
page read and write
1BC26547000
heap
page read and write
9CA0000
unkown
page read and write
4B8B000
unkown
page read and write
2340000
trusted library allocation
page read and write
1BC25D43000
heap
page read and write
210E385A000
heap
page read and write
1BC25D81000
heap
page read and write
23A4040E000
heap
page read and write
3240000
unkown
page read and write
930000
trusted library allocation
page read and write
210E385A000
heap
page read and write
33D0000
unkown
page read and write
9CA0000
unkown
page read and write
C516000
unkown
page read and write
8820000
unkown
page read and write
9CA0000
unkown
page read and write
9CA0000
unkown
page read and write
5C5B000
heap
page read and write
210E382A000
heap
page read and write
99F000
stack
page read and write
930000
trusted library allocation
page read and write
33C0000
unkown
page read and write
181CEC4B000
heap
page read and write
2FC0000
heap
page read and write
2B9971D2000
heap
page read and write
23A40420000
heap
page read and write
9CA0000
unkown
page read and write
3080000
unkown
page read and write
1BC26537000
heap
page read and write
3440000
unkown
page read and write
7FF5EDA53000
unkown
page readonly
930000
trusted library allocation
page read and write
986B000
unkown
page read and write
930000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
BAF9000
stack
page read and write
9CA0000
unkown
page read and write
9CA0000
unkown
page read and write
26A4692C000
heap
page read and write
C6CF000
unkown
page read and write
1F154727000
heap
page read and write
20BC37DA000
heap
page read and write
930000
trusted library allocation
page read and write
C4A0000
unkown
page read and write
1BC26537000
heap
page read and write
400000
unkown
page execute and read and write
1F154C2C000
heap
page read and write
1BD1526A000
heap
page read and write
9795000
unkown
page read and write
1FBD781F000
heap
page read and write
264556BE000
heap
page read and write
26A46330000
heap
page read and write
730000
heap
page read and write
340A000
heap
page read and write
9CA0000
unkown
page read and write
20BC3EBE000
heap
page read and write
20BC3EBE000
heap
page read and write
1BC25F00000
trusted library allocation
page read and write
700000
direct allocation
page execute and read and write
1BC25F20000
heap
page read and write
400000
unkown
page readonly
264556C1000
heap
page read and write
7FF5ED5C1000
unkown
page readonly
194DA080000
heap
page read and write
2418D41F000
heap
page read and write
1BC27F00000
heap
page read and write
26A46900000
heap
page read and write
7A34000
unkown
page read and write
23A3FF5A000
heap
page read and write
3440000
unkown
page read and write
210E3851000
heap
page read and write
7FF5EDA2A000
unkown
page readonly
194DA09C000
heap
page read and write
C5A3000
unkown
page read and write
3440000
unkown
page read and write
2418D3F9000
heap
page read and write
20BC3EB4000
heap
page read and write
3402000
heap
page read and write
91C0000
unkown
page read and write
2DD510AC000
heap
page read and write
1BC26502000
heap
page read and write
1D5EACF4000
heap
page read and write
8108000
stack
page read and write
930000
trusted library allocation
page read and write
50C000
stack
page read and write
6AF6077000
stack
page read and write
7FF5EDA69000
unkown
page readonly
7FF5ED2A9000
unkown
page readonly
930000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
5557000
stack
page read and write
2130000
heap
page read and write
32A0000
unkown
page read and write
2DD51094000
heap
page read and write
3020000
unkown
page read and write
91C0000
unkown
page read and write
8750000
unkown
page read and write
C857000
unkown
page read and write
1BC264FA000
heap
page read and write
8720000
unkown
page readonly
26455ED8000
heap
page read and write
59E000
stack
page read and write
181CE6D5000
heap
page read and write
3060000
unkown
page read and write
3411000
heap
page read and write
2DD51246000
heap
page read and write
26E0000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
1390000
unkown
page read and write
2B99781A000
heap
page read and write
1BD1528A000
heap
page read and write
20BC3EA0000
heap
page read and write
26A46912000
heap
page read and write
20BC37D4000
heap
page read and write
930000
trusted library allocation
page read and write
7FF5ED850000
unkown
page readonly
1BD14C8E000
heap
page read and write
C89A000
unkown
page read and write
194D986D000
heap
page read and write
923E000
stack
page read and write
4BC9000
unkown
page read and write
3070000
unkown
page read and write
343C000
heap
page read and write
23A3FC8D000
heap
page read and write
930000
trusted library allocation
page read and write
3405000
heap
page read and write
1F154C2C000
heap
page read and write
2B997826000
heap
page read and write
7FF5ED2A4000
unkown
page readonly
76B000
heap
page read and write
3440000
unkown
page read and write
8210000
unkown
page read and write
3010000
unkown
page read and write
26455A35000
heap
page read and write
85C000
heap
page read and write
1D5EACF2000
heap
page read and write
1BC26517000
heap
page read and write
26455EF2000
heap
page read and write
1F154560000
heap
page read and write
1BD15259000
heap
page read and write
7F50000
unkown
page read and write
1BD15257000
heap
page read and write
3080000
unkown
page read and write
2418CD68000
heap
page read and write
5D7C000
heap
page read and write
5D59000
heap
page read and write
C846000
unkown
page read and write
9CA0000
unkown
page read and write
2340000
trusted library allocation
page read and write
20BC3760000
trusted library allocation
page read and write
26A46117000
heap
page read and write
5D59000
heap
page read and write
3080000
unkown
page read and write
9CA0000
unkown
page read and write
3030000
unkown
page read and write
1BC25DE4000
heap
page read and write
3440000
unkown
page read and write
9200000
unkown
page read and write
181CEDB3000
heap
page read and write
26A46157000
heap
page read and write
181CE6C3000
heap
page read and write
2DD51252000
heap
page read and write
2B9971B5000
heap
page read and write
9CA0000
unkown
page read and write
4B0000
direct allocation
page read and write
3010000
unkown
page read and write
32A0000
unkown
page read and write
7FF5ED9C8000
unkown
page readonly
2DD51824000
heap
page read and write
2418CD74000
heap
page read and write
830000
trusted library allocation
page read and write
40F000
unkown
page readonly
1BC26593000
heap
page read and write
89E0000
unkown
page read and write
342A000
heap
page read and write
7FF5ED781000
unkown
page readonly
3010000
unkown
page read and write
930000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
7FF5ED295000
unkown
page readonly
550000
heap
page read and write
26A4691A000
heap
page read and write
2DD51262000
heap
page read and write
2418D41F000
heap
page read and write
930000
trusted library allocation
page read and write
1BD14C83000
heap
page read and write
3010000
unkown
page read and write
1F154C14000
heap
page read and write
91C0000
unkown
page read and write
3415000
heap
page read and write
23A40422000
heap
page read and write
7FF5ED714000
unkown
page readonly
1370000
unkown
page read and write
1BC25D34000
heap
page read and write
2F70000
trusted library allocation
page read and write
32A0000
unkown
page read and write
20BC3720000
heap
page read and write
26A46929000
heap
page read and write
9C0000
heap
page read and write
2418CD19000
heap
page read and write
1BC25D5F000
heap
page read and write
7FF5EDA47000
unkown
page readonly
2F70000
trusted library allocation
page read and write
33C0000
unkown
page read and write
194DA08E000
heap
page read and write
1BC2803F000
heap
page read and write
800000
trusted library allocation
page read and write
1FBD7700000
trusted library allocation
page read and write
5D77000
heap
page read and write
1BD14C89000
heap
page read and write
91C0000
unkown
page read and write
9200000
unkown
page read and write
600000
heap
page read and write
20BC3E90000
heap
page read and write
91C0000
unkown
page read and write
23A3FF54000
heap
page read and write
9798000
unkown
page read and write
210E370E000
heap
page read and write
3020000
unkown
page read and write
1F1545BE000
heap
page read and write
8FB9000
stack
page read and write
26A46140000
heap
page read and write
181CE780000
heap
page read and write
2F70000
trusted library allocation
page read and write
26455658000
heap
page read and write
EBC000
stack
page read and write
2490000
heap
page read and write
31E447E000
stack
page read and write
1BD1525C000
heap
page read and write
2DD51235000
heap
page read and write
930000
trusted library allocation
page read and write
7DF4F3061000
unkown
page execute read
181CE6B4000
heap
page read and write
B640000
unkown
page read and write
930000
trusted library allocation
page read and write
8860000
unkown
page read and write
7FF7327B5000
unkown
page readonly
1BC26593000
heap
page read and write
3402000
heap
page read and write
2B997830000
heap
page read and write
451000
unkown
page read and write
9CA0000
unkown
page read and write
9CA0000
unkown
page read and write
9CA0000
unkown
page read and write
5EC000
stack
page read and write
7900000
unkown
page read and write
930000
trusted library allocation
page read and write
2DD51085000
heap
page read and write
4CC0000
unkown
page read and write
930000
trusted library allocation
page read and write
7FF5ED92C000
unkown
page readonly
23A3FF55000
heap
page read and write
342A000
heap
page read and write
C811000
unkown
page read and write
2DD51231000
heap
page read and write
3010000
unkown
page read and write
5D59000
heap
page read and write
23A4041A000
heap
page read and write
7847000
unkown
page read and write
1F154C32000
heap
page read and write
4771000
heap
page read and write
7FF5ED4EF000
unkown
page readonly
379E000
unkown
page read and write
2F70000
trusted library allocation
page read and write
2418CD62000
heap
page read and write
2418CD45000
heap
page read and write
3080000
unkown
page read and write
181CEDD1000
heap
page read and write
2F70000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
B2D0000
unkown
page read and write
91C0000
unkown
page read and write
768000
heap
page read and write
194DA097000
heap
page read and write
23A4040E000
heap
page read and write
26455F00000
heap
page read and write
2B9976AE000
heap
page read and write
A502000
unkown
page read and write
23A4041C000
heap
page read and write
3010000
unkown
page read and write
C6C9000
unkown
page read and write
7FF5ED3D6000
unkown
page readonly
3060000
unkown
page read and write
B450000
unkown
page read and write
5F0000
direct allocation
page execute and read and write
3010000
unkown
page read and write
3440000
unkown
page read and write
181CEDB3000
heap
page read and write
23A3FF5E000
heap
page read and write
1BD1527A000
heap
page read and write
181CE7E0000
trusted library allocation
page read and write
2418D41F000
heap
page read and write
194D9873000
heap
page read and write
1BD15270000
heap
page read and write
13B0000
unkown
page read and write
2B997080000
heap
page read and write
7FF5ED87D000
unkown
page readonly
26A46148000
heap
page read and write
340D000
heap
page read and write
1BC26520000
heap
page read and write
2DD51094000
heap
page read and write
800000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
13B0000
unkown
page read and write
33D0000
unkown
page read and write
930000
trusted library allocation
page read and write
3010000
unkown
page read and write
194D9858000
heap
page read and write
2340000
trusted library allocation
page read and write
7FF5ED3CE000
unkown
page readonly
987F000
unkown
page read and write
3411000
heap
page read and write
3010000
unkown
page read and write
2418CEE0000
trusted library allocation
page read and write
194D9828000
heap
page read and write
7FF5ED8E2000
unkown
page readonly
7FF5ED915000
unkown
page readonly
26E0000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
AE0000
heap
page read and write
2DD51097000
heap
page read and write
210E3824000
heap
page read and write
10D0000
heap
page read and write
1BC25EE0000
heap
page read and write
26455EF4000
heap
page read and write
181CE688000
heap
page read and write
210E3704000
heap
page read and write
210E36B0000
trusted library allocation
page read and write
194DA0C3000
heap
page read and write
9D64000
unkown
page read and write
3010000
unkown
page read and write
1F154C0C000
heap
page read and write
2340000
trusted library allocation
page read and write
2418CD62000
heap
page read and write
9CA0000
unkown
page read and write
3070000
unkown
page read and write
2418D411000
heap
page read and write
930000
trusted library allocation
page read and write
4F0000
heap
page read and write
5D59000
heap
page read and write
1FBD7DDF000
heap
page read and write
26ED27E000
stack
page read and write
860000
heap
page read and write
1BC25DE4000
heap
page read and write
7FF5ED73D000
unkown
page readonly
9CA0000
unkown
page read and write
3411000
heap
page read and write
33D0000
unkown
page read and write
310E000
stack
page read and write
181CEDAC000
heap
page read and write
2418CEE0000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
1380000
unkown
page read and write
7FF5ED853000
unkown
page readonly
2DD51094000
heap
page read and write
2418CD4A000
heap
page read and write
26A46153000
heap
page read and write
2DD5122A000
heap
page read and write
7869000
unkown
page read and write
2DD5122D000
heap
page read and write
20BC37D7000
heap
page read and write
930000
trusted library allocation
page read and write
33D0000
unkown
page read and write
210E3848000
heap
page read and write
5765000
heap
page read and write
2DD51335000
heap
page read and write
26455870000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
91C0000
unkown
page read and write
2F70000
trusted library allocation
page read and write
28DDEFF000
stack
page read and write
2340000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
B8AB000
stack
page read and write
54C38FF000
stack
page read and write
460000
unkown
page readonly
3020000
unkown
page read and write
1BC2652F000
heap
page read and write
5D80000
heap
page read and write
3415000
heap
page read and write
194D9B6A000
heap
page read and write
91C0000
unkown
page read and write
2B99781D000
heap
page read and write
1BC26593000
heap
page read and write
9CA0000
unkown
page read and write
3440000
unkown
page read and write
7FF5ED814000
unkown
page readonly
7FF5ED1B6000
unkown
page readonly
5D77000
heap
page read and write
1FBD7805000
heap
page read and write
23A40419000
heap
page read and write
3415000
heap
page read and write
2418CF0E000
heap
page read and write
3440000
unkown
page read and write
2233F7E000
stack
page read and write
2F70000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
3408000
heap
page read and write
5D7C000
heap
page read and write
9C000
stack
page read and write
CA20000
unkown
page read and write
930000
trusted library allocation
page read and write
23A3FF53000
heap
page read and write
5D80000
heap
page read and write
23A3FF5A000
heap
page read and write
13B0000
unkown
page read and write
1370000
unkown
page read and write
1390000
unkown
page read and write
1BC2639B000
heap
page read and write
2418CD27000
heap
page read and write
71F000
stack
page read and write
20BC37D7000
heap
page read and write
97AD000
unkown
page read and write
2F70000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
26A4692E000
heap
page read and write
23A3FC94000
heap
page read and write
91C0000
unkown
page read and write
1BD15268000
heap
page read and write
210E36E7000
heap
page read and write
4BDC000
unkown
page read and write
26455EDB000
heap
page read and write
87BE000
stack
page read and write
2DD51090000
heap
page read and write
7FF5ED337000
unkown
page readonly
9CA0000
unkown
page read and write
863000
heap
page read and write
181CE5A0000
heap
page read and write
4B50000
unkown
page read and write
7D60000
unkown
page read and write
4770000
heap
page read and write
31E45FE000
stack
page read and write
20BC37F5000
heap
page read and write
34E9000
stack
page read and write
41D000
unkown
page readonly
1380000
unkown
page read and write
1F154720000
heap
page read and write
FEC4000
unkown
page read and write
37F6000
unkown
page read and write
2DD51224000
heap
page read and write
210E3839000
heap
page read and write
800000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
210E385F000
heap
page read and write
1BC25D70000
heap
page read and write
540000
direct allocation
page read and write
7FF5ED93B000
unkown
page readonly
1BC25F2A000
heap
page read and write
44C000
unkown
page write copy
1BC25D54000
heap
page read and write
20BC3ECE000
heap
page read and write
560000
heap
page read and write
33D0000
unkown
page read and write
1260000
heap
page read and write
3440000
unkown
page read and write
1380000
unkown
page read and write
20BC3EC8000
heap
page read and write
3440000
unkown
page read and write
AC0000
heap
page read and write
3440000
unkown
page read and write
9CA0000
unkown
page read and write
85F000
stack
page read and write
26E0000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
1335000
heap
page read and write
9CA0000
unkown
page read and write
C84D000
unkown
page read and write
1BC25D70000
heap
page read and write
2B9971D2000
heap
page read and write
A327000
unkown
page read and write
7FF5ED3F3000
unkown
page readonly
212B07E000
stack
page read and write
1BC25D70000
heap
page read and write
181CEC4A000
heap
page read and write
7FF5ED7F1000
unkown
page readonly
35A0000
unkown
page readonly
340A000
heap
page read and write
345A000
heap
page read and write
930000
trusted library allocation
page read and write
7DF4F3031000
unkown
page execute read
9CA0000
unkown
page read and write
7F50000
unkown
page read and write
181CEDAF000
heap
page read and write
2DD5122E000
heap
page read and write
9200000
unkown
page read and write
7D60000
unkown
page read and write
863000
heap
page read and write
6AF627E000
stack
page read and write
1F154C11000
heap
page read and write
194DA0A6000
heap
page read and write
7FF5ED937000
unkown
page readonly
2418D430000
heap
page read and write
3440000
unkown
page read and write
1380000
unkown
page read and write
41D000
unkown
page readonly
32A0000
unkown
page read and write
1D5EACF4000
heap
page read and write
75D000
heap
page execute and read and write
91C0000
unkown
page read and write
2D0DB950000
heap
page read and write
830000
trusted library allocation
page read and write
1D5EACE2000
heap
page read and write
5E9F000
stack
page read and write
20BC3EC8000
heap
page read and write
40F000
unkown
page readonly
830000
trusted library allocation
page read and write
19C000
stack
page read and write
986F000
unkown
page read and write
2233BE7000
stack
page read and write
2418CD68000
heap
page read and write
2B9976AA000
heap
page read and write
26A4690E000
heap
page read and write
830000
trusted library allocation
page read and write
1BC25DE4000
heap
page read and write
5E0000
heap
page read and write
3429000
heap
page read and write
F18000
heap
page read and write
A4AE000
unkown
page read and write
7FF5ED33F000
unkown
page readonly
2418D405000
heap
page read and write
20BC3803000
heap
page read and write
7DF4F3030000
unkown
page readonly
7FF5ED886000
unkown
page readonly
181CE7D5000
heap
page read and write
23A3FC20000
heap
page read and write
2418D411000
heap
page read and write
1370000
unkown
page read and write
400000
unkown
page execute and read and write
9CA0000
unkown
page read and write
1F1545BB000
heap
page read and write
19C000
stack
page read and write
98A8000
unkown
page read and write
3070000
unkown
page read and write
23A3FE20000
heap
page read and write
1BC25D9F000
heap
page read and write
F924000
unkown
page read and write
1F154C29000
heap
page read and write
3440000
unkown
page read and write
26E0000
trusted library allocation
page read and write
91C0000
unkown
page read and write
54C397F000
stack
page read and write
3440000
unkown
page read and write
181CE6B4000
heap
page read and write
401000
unkown
page execute read
1010000
heap
page read and write
1BC26575000
heap
page read and write
1BC25D96000
heap
page read and write
7FF5ED495000
unkown
page readonly
2260000
heap
page read and write
3416000
heap
page read and write
850000
heap
page read and write
785D000
unkown
page read and write
2340000
trusted library allocation
page read and write
17983D30000
heap
page read and write
41D000
unkown
page readonly
7FF5ED342000
unkown
page readonly
7FF5ED933000
unkown
page readonly
930000
trusted library allocation
page read and write
AF8D000
stack
page read and write
7FF5ED7CF000
unkown
page readonly
2DD5182E000
heap
page read and write
7FF5ED864000
unkown
page readonly
4DED000
stack
page read and write
2F70000
trusted library allocation
page read and write
53DD2FF000
stack
page read and write
2340000
trusted library allocation
page read and write
7D60000
unkown
page read and write
210E385A000
heap
page read and write
1BD14C83000
heap
page read and write
1FBD7E03000
heap
page read and write
EFF57FE000
stack
page read and write
20BC37FC000
heap
page read and write
2340000
trusted library allocation
page read and write
340D000
heap
page read and write
7FF5ED279000
unkown
page readonly
7867000
unkown
page read and write
264556BE000
heap
page read and write
194DA085000
heap
page read and write
28DDF7F000
stack
page read and write
26ECDC7000
stack
page read and write
930000
trusted library allocation
page read and write
2190000
heap
page read and write
7FF5ED803000
unkown
page readonly
1510000
unkown
page readonly
2340000
trusted library allocation
page read and write
23A40404000
heap
page read and write
977A000
unkown
page read and write
3440000
unkown
page read and write
1BC25F00000
trusted library allocation
page read and write
4890000
heap
page read and write
787C000
unkown
page read and write
3440000
unkown
page read and write
1F154723000
heap
page read and write
1BC25D53000
heap
page read and write
210E383C000
heap
page read and write
32A0000
unkown
page read and write
2DD50FD0000
trusted library allocation
page read and write
5D59000
heap
page read and write
1BC265A7000
heap
page read and write
2DD51246000
heap
page read and write
784A000
unkown
page read and write
C54A000
unkown
page read and write
800000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
2418D404000
heap
page read and write
800000
trusted library allocation
page read and write
8820000
unkown
page read and write
26455EEF000
heap
page read and write
1BD1527B000
heap
page read and write
1BD14C86000
heap
page read and write
9CA0000
unkown
page read and write
23A3FC84000
heap
page read and write
1BC264EE000
heap
page read and write
23A403FF000
heap
page read and write
F9AB000
unkown
page read and write
1390000
unkown
page read and write
1BC25D9F000
heap
page read and write
20E0000
heap
page read and write
2B9970C0000
trusted library allocation
page read and write
5D59000
heap
page read and write
181CE6D3000
heap
page read and write
91C0000
unkown
page read and write
7FF5ED97E000
unkown
page readonly
210E3727000
heap
page read and write
181CEC4E000
heap
page read and write
7FF5ED505000
unkown
page readonly
2DD51097000
heap
page read and write
1505000
heap
page read and write
3415000
heap
page read and write
26A463C0000
heap
page read and write
855000
heap
page read and write
9CA0000
unkown
page read and write
2340000
trusted library allocation
page read and write
2418EDA0000
heap
page read and write
BDA0000
unkown
page readonly
2418D405000
heap
page read and write
2DD510A3000
heap
page read and write
74A000
heap
page read and write
3659000
stack
page read and write
1BC25D70000
heap
page read and write
210E3851000
heap
page read and write
800000
trusted library allocation
page read and write
2418CD62000
heap
page read and write
1BD14C75000
heap
page read and write
1BC25D60000
heap
page read and write
3020000
unkown
page read and write
2D0DBCF0000
heap
page read and write
5AE000
stack
page read and write
1BD15269000
heap
page read and write
2B997197000
heap
page read and write
1F0000
heap
page read and write
1BC25D43000
heap
page read and write
2F70000
trusted library allocation
page read and write
3440000
unkown
page read and write
1F15472A000
heap
page read and write
3060000
unkown
page read and write
3C1000
system
page execute and read and write
2340000
trusted library allocation
page read and write
2DD5122E000
heap
page read and write
1BC27DC9000
heap
page read and write
307B000
stack
page read and write
1F0000
heap
page read and write
2418CD48000
heap
page read and write
1BD15430000
heap
page read and write
800000
trusted library allocation
page read and write
9CA0000
unkown
page read and write
3440000
unkown
page read and write
194D9810000
heap
page read and write
830000
trusted library allocation
page read and write
3010000
unkown
page read and write
FEEE000
unkown
page read and write
800000
trusted library allocation
page read and write
BDD0000
unkown
page readonly
3429000
heap
page read and write
7F50000
unkown
page read and write
264556B4000
heap
page read and write
1D5EACA0000
heap
page read and write
210E3851000
heap
page read and write
1BC2639E000
heap
page read and write
845187000
stack
page read and write
1F15472E000
heap
page read and write
3440000
unkown
page read and write
3080000
unkown
page read and write
7FF5ED990000
unkown
page readonly
1BC27D81000
heap
page read and write
7FF5ED3D0000
unkown
page readonly
91C0000
unkown
page read and write
51F0000
heap
page read and write
2B9971D5000
heap
page read and write
B9BE57E000
stack
page read and write
91C0000
unkown
page read and write
B140000
unkown
page readonly
4C1E000
unkown
page read and write
343C000
stack
page read and write
5D77000
heap
page read and write
7FF5ED793000
unkown
page readonly
194D9A30000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
20BC37D4000
heap
page read and write
B450000
unkown
page read and write
930000
trusted library allocation
page read and write
B10D000
stack
page read and write
B450000
unkown
page read and write
343C000
heap
page read and write
50E000
stack
page read and write
1BC28020000
heap
page read and write
7FF5ED5C9000
unkown
page readonly
7FF5ED800000
unkown
page readonly
3440000
unkown
page read and write
1BC264F8000
heap
page read and write
210E3950000
heap
page read and write
2DD51090000
heap
page read and write
26455667000
heap
page read and write
7FF5ED4B0000
unkown
page readonly
2418CD80000
heap
page read and write
1FBD77BA000
heap
page read and write
534000
heap
page read and write
37A8000
unkown
page read and write
3791000
unkown
page read and write
2340000
trusted library allocation
page read and write
26455EDC000
heap
page read and write
1BD14C94000
heap
page read and write
37AC000
unkown
page read and write
1FBD77D2000
heap
page read and write
2340000
trusted library allocation
page read and write
1BC26397000
heap
page read and write
9CEB000
unkown
page read and write
2340000
trusted library allocation
page read and write
3060000
unkown
page read and write
7FF5ED4E8000
unkown
page readonly
91C0000
unkown
page read and write
1380000
unkown
page read and write
2B99781B000
heap
page read and write
1F15472E000
heap
page read and write
1F0000
heap
page read and write
2DD51219000
heap
page read and write
91C0000
unkown
page read and write
9C000
stack
page read and write
5D75000
heap
page read and write
3220000
unkown
page readonly
2B9971B5000
heap
page read and write
860000
heap
page read and write
13B0000
unkown
page read and write
194DA0A9000
heap
page read and write
7FF5ED50A000
unkown
page readonly
9815000
unkown
page read and write
3010000
unkown
page read and write
830000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
1FBD7823000
heap
page read and write
2340000
trusted library allocation
page read and write
7861000
unkown
page read and write
7FF5ED9FF000
unkown
page readonly
7FF5ED1BC000
unkown
page readonly
2340000
trusted library allocation
page read and write
32A0000
unkown
page read and write
3440000
unkown
page read and write
2DD5121E000
heap
page read and write
1FBD781C000
heap
page read and write
7F50000
unkown
page read and write
181CEDB3000
heap
page read and write
2F70000
trusted library allocation
page read and write
26A46100000
heap
page read and write
1BD1543A000
heap
page read and write
194D9837000
heap
page read and write
9CA0000
unkown
page read and write
37B0000
unkown
page read and write
1F154C32000
heap
page read and write
9CA0000
unkown
page read and write
4CD0000
unkown
page read and write
9CA0000
unkown
page read and write
3440000
unkown
page read and write
7FF5ED3A7000
unkown
page readonly
194DA0B9000
heap
page read and write
2D0DB995000
heap
page read and write
1FBD77B0000
heap
page read and write
2F70000
heap
page read and write
91C0000
unkown
page read and write
EE1000
system
page execute and read and write
3010000
unkown
page read and write
3421000
heap
page read and write
7FF5ED7DB000
unkown
page readonly
2EAC000
stack
page read and write
F963000
unkown
page read and write
2DD51090000
heap
page read and write
339E000
stack
page read and write
23A403F8000
heap
page read and write
1FBD75E0000
heap
page read and write
2B997820000
heap
page read and write
23A41D40000
heap
page read and write
2F70000
trusted library allocation
page read and write
26A46918000
heap
page read and write
342E000
heap
page read and write
2B99780A000
heap
page read and write
1F154C29000
heap
page read and write
44C000
unkown
page write copy
1380000
unkown
page read and write
23A3FC66000
heap
page read and write
181CEC42000
heap
page read and write
23A40422000
heap
page read and write
1F154C33000
heap
page read and write
2F70000
trusted library allocation
page read and write
1BC25D70000
heap
page read and write
5D59000
heap
page read and write
44B000
unkown
page read and write
20BC37FE000
heap
page read and write
32A0000
unkown
page read and write
1FBD77B3000
heap
page read and write
74E000
heap
page read and write
2340000
trusted library allocation
page read and write
2DD51097000
heap
page read and write
8455FE000
stack
page read and write
51E0000
trusted library allocation
page read and write
2418D427000
heap
page read and write
264556A6000
heap
page read and write
9200000
unkown
page read and write
3401000
heap
page read and write
4BE000
stack
page read and write
20BC3EB8000
heap
page read and write
36F0000
unkown
page readonly
2F70000
trusted library allocation
page read and write
C10A000
stack
page read and write
7FF5ED476000
unkown
page readonly
1BC25F30000
trusted library allocation
page read and write
26455650000
heap
page read and write
930000
trusted library allocation
page read and write
3440000
unkown
page read and write
DE0000
unkown
page readonly
2418CD68000
heap
page read and write
930000
trusted library allocation
page read and write
2418D411000
heap
page read and write
7FF5ED867000
unkown
page readonly
1BC25D43000
heap
page read and write
1BD14F00000
heap
page read and write
1BC26555000
heap
page read and write
26455687000
heap
page read and write
13B0000
unkown
page read and write
9881000
unkown
page read and write
5D73000
heap
page read and write
3080000
unkown
page read and write
78AD000
unkown
page read and write
544000
heap
page read and write
884000
heap
page read and write
1BD15270000
heap
page read and write
1F15472A000
heap
page read and write
181CE6E2000
heap
page read and write
B728000
stack
page read and write
181CEDB3000
heap
page read and write
930000
trusted library allocation
page read and write
5D6C000
heap
page read and write
7F50000
unkown
page read and write
3440000
unkown
page read and write
2E77000
heap
page read and write
2DD51074000
heap
page read and write
4E80000
remote allocation
page read and write
3795000
unkown
page read and write
1BC25DAA000
heap
page read and write
9200000
unkown
page read and write
7FF5EDA76000
unkown
page readonly
7FF5ED265000
unkown
page readonly
26A46928000
heap
page read and write
2B997823000
heap
page read and write
1BC25D66000
heap
page read and write
2DD51822000
heap
page read and write
1F154572000
heap
page read and write
5D8C000
heap
page read and write
210E3848000
heap
page read and write
884000
heap
page read and write
91C0000
unkown
page read and write
7FF5ED8A4000
unkown
page readonly
2B9971D9000
heap
page read and write
17983B80000
heap
page read and write
1BD14C30000
heap
page read and write
930000
trusted library allocation
page read and write
194DA0BA000
heap
page read and write
54D000
stack
page read and write
210E3827000
heap
page read and write
23A3FC88000
heap
page read and write
210E370E000
heap
page read and write
7FF5ED91A000
unkown
page readonly
3440000
unkown
page read and write
460000
unkown
page readonly
1F154C30000
heap
page read and write
884000
heap
page read and write
5961000
heap
page read and write
79D3000
unkown
page read and write
1BC26539000
heap
page read and write
18A0000
unkown
page readonly
9176AC7000
stack
page read and write
7FF5ED40D000
unkown
page readonly
1BC25D6F000
heap
page read and write
91C0000
unkown
page read and write
1BC264F8000
heap
page read and write
C92D000
unkown
page read and write
830000
trusted library allocation
page read and write
2460000
heap
page read and write
4C4000
heap
page read and write
1BC25DE4000
heap
page read and write
1BD15264000
heap
page read and write
3440000
unkown
page read and write
9CA0000
unkown
page read and write
1BC26582000
heap
page read and write
91C0000
unkown
page read and write
181CEDC0000
heap
page read and write
2D0DB9DD000
heap
page read and write
1BC25DE4000
heap
page read and write
1BC264E0000
heap
page read and write
23A3FC66000
heap
page read and write
5D59000
heap
page read and write
7FF5ED956000
unkown
page readonly
9CA0000
unkown
page read and write
3010000
unkown
page read and write
1BC2655F000
heap
page read and write
2340000
trusted library allocation
page read and write
1BD14C83000
heap
page read and write
FE70000
heap
page read and write
1BC265AF000
heap
page read and write
2B9971B5000
heap
page read and write
800000
trusted library allocation
page read and write
26A4615D000
heap
page read and write
20BC3EB8000
heap
page read and write
97D4000
unkown
page read and write
33C0000
unkown
page read and write
A49E000
unkown
page read and write
7FF5ED55F000
unkown
page readonly
210E3727000
heap
page read and write
2340000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
7FF5ED692000
unkown
page readonly
340E000
heap
page read and write
2418D411000
heap
page read and write
7FF5ED1D6000
unkown
page readonly
181CEDA9000
heap
page read and write
2418D400000
heap
page read and write
There are 3669 hidden memdumps, click here to show them.