IOC Report
ctMI3TYXpX.exe

loading gif

Files

File Path
Type
Category
Malicious
ctMI3TYXpX.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\35DB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\B972.exe
PE32+ executable (GUI) x86-64, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\hdhruer
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\jghruer
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\jghruer:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\B099.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\B099.tmp-shm
data
dropped
C:\Users\user\AppData\Local\Temp\B473.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\B724.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\BCB3.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\BD9E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\BE0D.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\BE5C.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Roaming\dcvjdff
OpenPGP Public Key
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ctMI3TYXpX.exe
"C:\Users\user\Desktop\ctMI3TYXpX.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\jghruer
C:\Users\user\AppData\Roaming\jghruer
malicious
C:\Users\user\AppData\Local\Temp\35DB.exe
C:\Users\user\AppData\Local\Temp\35DB.exe
malicious
C:\Users\user\AppData\Roaming\hdhruer
C:\Users\user\AppData\Roaming\hdhruer
malicious
C:\Users\user\AppData\Local\Temp\B972.exe
C:\Users\user\AppData\Local\Temp\B972.exe
malicious
C:\Windows\System32\cmd.exe
cmd
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /displaydns
malicious
C:\Windows\System32\netsh.exe
netsh firewall show state
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\ROUTE.EXE
route print
C:\Windows\System32\tasklist.exe
tasklist /v /fo csv
C:\Windows\System32\net.exe
net accounts /domain
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 accounts /domain
C:\Windows\System32\net.exe
net share
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 share
C:\Windows\System32\net.exe
net user
There are 29 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.145.40.164/ksa9104.exe
23.145.40.164
malicious
https://ninjahallnews.com/search.php
23.145.40.168
malicious
https://ninjahallnews.com/
unknown
malicious
https://fallhandbat.com/search.php
malicious
https://aka.ms/odirmr
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.mi
unknown
https://duckduckgo.com/ac/?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://ninjahallnews.com/earch.php
unknown
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
https://powerpoint.office.comcember
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://ninjahallnews.com/search.phpMozilla/5.0
unknown
https://ninjahallnews.com/search.php(
unknown
https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://excel.office.com
unknown
http://schemas.micro
unknown
https://ninjahallnews.com:443/search.phpge
unknown
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
https://api.msn.com/q
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
unknown
https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
unknown
https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
https://wns.windows.com/L
unknown
https://word.office.com
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ninjahallnews.com/application/x-www-form-urlencodedMozilla/5.0
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://schemas.micr
unknown
https://www.ecosia.org/newtab/
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
https://aka.ms/Vh5j3k
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
https://api.msn.com/v1/news/Feed/Windows?&
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://ninjahallnews.com/search.phpb
unknown
https://android.notify.windows.com/iOS
unknown
https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
unknown
https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
unknown
https://api.msn.com/
unknown
https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
unknown
https://outlook.com_
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
unknown
https://www.msn.com:443/en-us/feed
unknown
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
unknown
There are 58 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ninjahallnews.com
23.145.40.168
malicious
nwgrus.ru
180.75.11.133
malicious
globalviewsnature.com
23.145.40.113
malicious
bg.microsoft.map.fastly.net
199.232.214.172
s-part-0017.t-0009.t-msedge.net
13.107.246.45
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
201.103.8.135
unknown
Mexico
malicious
23.145.40.168
ninjahallnews.com
Reserved
malicious
180.75.11.133
nwgrus.ru
Malaysia
malicious
23.145.40.164
unknown
Reserved
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
There are 219 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1FF1000
unclassified section
page read and write
malicious
5C0000
direct allocation
page read and write
malicious
21D1000
unclassified section
page read and write
malicious
731000
unclassified section
page read and write
malicious
4C0000
direct allocation
page read and write
malicious
141000
system
page execute and read and write
malicious
21D1000
unclassified section
page read and write
malicious
771000
system
page execute and read and write
malicious
1FB0000
direct allocation
page read and write
malicious
540000
direct allocation
page read and write
malicious
17516DD0000
heap
page read and write
2E960E48000
heap
page read and write
53D1000
heap
page read and write
1FA9D999000
heap
page read and write
A00000
trusted library allocation
page read and write
F3D2FA7000
stack
page read and write
3060000
unkown
page read and write
2C468020000
heap
page read and write
18F35B50000
heap
page read and write
8D00000
unkown
page read and write
1095000
stack
page read and write
8F5387F000
stack
page read and write
2C468604000
heap
page read and write
24603682000
heap
page read and write
1DD5A4EB000
heap
page read and write
2C4680D7000
heap
page read and write
1ADDA8F0000
heap
page read and write
65616FF000
stack
page read and write
18F35D3F000
heap
page read and write
13FA0943000
heap
page read and write
EB3000
heap
page read and write
6DF000
stack
page read and write
1F0900D7000
heap
page read and write
A00000
trusted library allocation
page read and write
13FA0952000
heap
page read and write
2C468600000
heap
page read and write
76A0000
unkown
page read and write
2C468600000
heap
page read and write
A00000
trusted library allocation
page read and write
23D27D70000
heap
page read and write
20ECB610000
heap
page read and write
8740000
unkown
page read and write
246038AA000
heap
page read and write
17516DDC000
heap
page read and write
7FF5ED86B000
unkown
page readonly
7FF5ED349000
unkown
page readonly
7FF5ED516000
unkown
page readonly
13FA0952000
heap
page read and write
7CB5D9B000
stack
page read and write
2C90000
heap
page read and write
2C4685B0000
heap
page read and write
451000
unkown
page read and write
266E1FC3000
heap
page read and write
13FA08F3000
heap
page read and write
7FF5ED933000
unkown
page readonly
25F4000
heap
page read and write
1ADDA6EC000
heap
page read and write
1F0000
heap
page read and write
1DD5A4D8000
heap
page read and write
3010000
unkown
page read and write
13FA08F3000
heap
page read and write
3010000
unkown
page read and write
24603620000
trusted library allocation
page read and write
B8AB000
stack
page read and write
3050000
unkown
page read and write
8D00000
unkown
page read and write
13FA0FB9000
heap
page read and write
7FF5ED942000
unkown
page readonly
37BD000
unkown
page read and write
149BC9F0000
heap
page read and write
1010000
heap
page read and write
1240000
heap
page read and write
3250000
unkown
page read and write
1FA9D94B000
heap
page read and write
1941E34E000
heap
page read and write
1DD5A3C7000
heap
page read and write
23D2787A000
heap
page read and write
149BC450000
heap
page read and write
7E70000
unkown
page read and write
7E70000
unkown
page read and write
3170000
unkown
page read and write
43B0000
trusted library allocation
page read and write
93DF7EF000
stack
page read and write
266E235B000
heap
page read and write
7DF000
stack
page read and write
8D00000
unkown
page read and write
C700000
unkown
page read and write
1941E9B0000
heap
page read and write
23430320000
heap
page read and write
43B0000
trusted library allocation
page read and write
1F0900B9000
heap
page read and write
149BC4C7000
heap
page read and write
2342E5FE000
heap
page read and write
8D00000
unkown
page read and write
A00000
trusted library allocation
page read and write
1DD5A350000
heap
page read and write
C6C1000
unkown
page read and write
13FA090F000
heap
page read and write
2C468106000
heap
page read and write
7E50000
unkown
page readonly
2800000
trusted library allocation
page read and write
8740000
unkown
page read and write
149BC4A7000
heap
page read and write
13FA0EFC000
heap
page read and write
149BC9FC000
heap
page read and write
8D00000
unkown
page read and write
1941E994000
heap
page read and write
7E70000
unkown
page read and write
24603C8F000
heap
page read and write
10DA4000
unkown
page read and write
379E000
unkown
page read and write
7FF5ED412000
unkown
page readonly
C6E3000
unkown
page read and write
1DD5A3C1000
heap
page read and write
7FF5ED7FD000
unkown
page readonly
7D90000
unkown
page read and write
149BC2A0000
heap
page read and write
2342E632000
heap
page read and write
13FA0F3A000
heap
page read and write
1ADDA719000
heap
page read and write
3170000
unkown
page read and write
23D2778E000
heap
page read and write
3170000
unkown
page read and write
8D00000
unkown
page read and write
588000
heap
page read and write
18F36346000
heap
page read and write
266E27F4000
heap
page read and write
57F0000
heap
page read and write
1941E991000
heap
page read and write
A00000
trusted library allocation
page read and write
3020000
unkown
page read and write
9873000
unkown
page read and write
2E960DB0000
trusted library allocation
page read and write
266E27FB000
heap
page read and write
149BC3F0000
heap
page read and write
1DD5A3CB000
heap
page read and write
8A6E000
stack
page read and write
7FF5ED3D0000
unkown
page readonly
7E70000
unkown
page read and write
13FA09A0000
heap
page read and write
13FA0F01000
heap
page read and write
43B0000
trusted library allocation
page read and write
24603685000
heap
page read and write
37F2000
unkown
page read and write
1941E490000
heap
page read and write
4BE3000
unkown
page read and write
8740000
unkown
page read and write
1941E97E000
heap
page read and write
2C4685D9000
heap
page read and write
40B000
unkown
page execute read
8D00000
unkown
page read and write
2DC4000
heap
page read and write
149BC44E000
heap
page read and write
24603C8F000
heap
page read and write
8740000
unkown
page read and write
3010000
unkown
page read and write
18F3635C000
heap
page read and write
1FA9D950000
heap
page read and write
1FA9D945000
heap
page read and write
6F82EFE000
stack
page read and write
1DD5A3B5000
heap
page read and write
9815000
unkown
page read and write
56C3000
unkown
page read and write
8D00000
unkown
page read and write
7FF5ED9E1000
unkown
page readonly
18F36328000
heap
page read and write
13FA284E000
heap
page read and write
13FA0943000
heap
page read and write
3170000
unkown
page read and write
A00000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
24603C6E000
heap
page read and write
3080000
unkown
page read and write
13FA0990000
trusted library allocation
page read and write
1ADDA75F000
heap
page read and write
18F36360000
heap
page read and write
8D00000
unkown
page read and write
7E70000
unkown
page read and write
57E5000
heap
page read and write
17516910000
heap
page read and write
1751668B000
heap
page read and write
1DD5A3C1000
heap
page read and write
A00000
trusted library allocation
page read and write
5805000
heap
page read and write
1DD5A3D4000
heap
page read and write
E188DFF000
stack
page read and write
1DD5A4EA000
heap
page read and write
29388D6E000
heap
page read and write
43B0000
trusted library allocation
page read and write
2D80000
heap
page read and write
3170000
unkown
page read and write
16C05099000
heap
page read and write
8D00000
unkown
page read and write
2800000
trusted library allocation
page read and write
1DD5C290000
heap
page read and write
AA90000
unkown
page read and write
A00000
trusted library allocation
page read and write
7847000
unkown
page read and write
2C46A010000
heap
page read and write
1FA9DA80000
heap
page read and write
8750000
unkown
page read and write
D10000
trusted library allocation
page read and write
8D00000
unkown
page read and write
266E200C000
heap
page read and write
A00000
trusted library allocation
page read and write
43B0000
trusted library allocation
page read and write
3170000
unkown
page read and write
24603C92000
heap
page read and write
2C6F000
stack
page read and write
17516DC1000
heap
page read and write
1DD5A3A5000
heap
page read and write
CBF000
stack
page read and write
EAD000
heap
page read and write
293885D0000
heap
page read and write
B6A0000
heap
page read and write
9C4E7E000
stack
page read and write
309F000
stack
page read and write
A00000
trusted library allocation
page read and write
5557000
stack
page read and write
1FA9DA85000
heap
page read and write
2E96157A000
heap
page read and write
8CBC000
unkown
page read and write
F3D337E000
stack
page read and write
1ADDA72B000
heap
page read and write
13FA090F000
heap
page read and write
EB3000
heap
page read and write
7FF5ED503000
unkown
page readonly
2C6AEFE000
stack
page read and write
23D27D5F000
heap
page read and write
2DAB000
heap
page read and write
3170000
unkown
page read and write
A00000
trusted library allocation
page read and write
3030000
unkown
page read and write
8D00000
unkown
page read and write
1DD5A4EA000
heap
page read and write
44B000
unkown
page read and write
13FA098E000
heap
page read and write
2C4685EA000
heap
page read and write
17516917000
heap
page read and write
750000
heap
page read and write
29388D62000
heap
page read and write
2C468600000
heap
page read and write
13FA0F09000
heap
page read and write
3050000
unkown
page read and write
24603C71000
heap
page read and write
3060000
unkown
page read and write
8D00000
unkown
page read and write
7C477AF000
stack
page read and write
266E2803000
heap
page read and write
2E96158F000
heap
page read and write
3170000
unkown
page read and write
A00000
trusted library allocation
page read and write
266E27EC000
heap
page read and write
1DD5A5C4000
heap
page read and write
7FF5ED3A7000
unkown
page readonly
8D00000
unkown
page read and write
13FA0946000
heap
page read and write
19C000
stack
page read and write
13FA090F000
heap
page read and write
E89150F000
stack
page read and write
7E70000
unkown
page read and write
A00000
trusted library allocation
page read and write
13FA0F11000
heap
page read and write
2460369C000
heap
page read and write
17516664000
heap
page read and write
7FF5ED8C6000
unkown
page readonly
149BC3C0000
trusted library allocation
page read and write
18F37C40000
heap
page read and write
149BCA05000
heap
page read and write
1F0900D7000
heap
page read and write
18F36321000
heap
page read and write
A00000
trusted library allocation
page read and write
8D00000
unkown
page read and write
2342E5DF000
heap
page read and write
2DB0000
heap
page read and write
EAD000
heap
page read and write
8D00000
unkown
page read and write
7FF5ED91A000
unkown
page readonly
3010000
unkown
page read and write
24603C74000
heap
page read and write
1220000
unkown
page readonly
7FF5ED714000
unkown
page readonly
987B000
unkown
page read and write
2C4680E9000
heap
page read and write
A00000
trusted library allocation
page read and write
E9E000
heap
page read and write
3040000
unkown
page read and write
149BCA0A000
heap
page read and write
45F0000
trusted library allocation
page read and write
AC0000
heap
page read and write
149BC4A7000
heap
page read and write
1F0900B9000
heap
page read and write
B728000
stack
page read and write
7FF6F2D71000
unkown
page readonly
A00000
trusted library allocation
page read and write
43B0000
trusted library allocation
page read and write
13FA090F000
heap
page read and write
16C04B46000
heap
page read and write
3170000
unkown
page read and write
7D00000
unkown
page readonly
22FEDB39000
heap
page read and write
16C04B2E000
heap
page read and write
2180000
heap
page read and write
A00000
trusted library allocation
page read and write
1941E374000
heap
page read and write
13FA08E7000
heap
page read and write
7FF5ED821000
unkown
page readonly
8D00000
unkown
page read and write
EA4000
heap
page read and write
8D00000
unkown
page read and write
C6F8000
unkown
page read and write
D10000
trusted library allocation
page read and write
24603682000
heap
page read and write
1ADDA75E000
heap
page read and write
16C04B42000
heap
page read and write
A00000
trusted library allocation
page read and write
3040000
unkown
page read and write
A00000
trusted library allocation
page read and write
13FA0F77000
heap
page read and write
C507000
unkown
page read and write
3030000
unkown
page read and write
3170000
unkown
page read and write
2800000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
3020000
unkown
page read and write
7863000
unkown
page read and write
8D00000
unkown
page read and write
1FA9F710000
heap
page read and write
18F36338000
heap
page read and write
3170000
unkown
page read and write
8740000
unkown
page read and write
7FF5ED68F000
unkown
page readonly
23D27D54000
heap
page read and write
FDE8000
unkown
page read and write
18F35D8F000
heap
page read and write
4DA000
heap
page read and write
1DD5A5D0000
heap
page read and write
16C0509A000
heap
page read and write
3411000
unkown
page read and write
29388D67000
heap
page read and write
2C468106000
heap
page read and write
13FA0950000
heap
page read and write
1F0000
heap
page read and write
18F3634F000
heap
page read and write
57C9000
heap
page read and write
43B0000
trusted library allocation
page read and write
1FA9D9A2000
heap
page read and write
2800000
trusted library allocation
page read and write
13FA0F04000
heap
page read and write
13FA08E1000
heap
page read and write
7CB617E000
stack
page read and write
29388D63000
heap
page read and write
A4FC000
unkown
page read and write
7FF5ED996000
unkown
page readonly
3050000
unkown
page read and write
13FA2821000
heap
page read and write
246038AE000
heap
page read and write
13FA08F2000
heap
page read and write
29388607000
heap
page read and write
3170000
unkown
page read and write
7C47BFF000
stack
page read and write
8D00000
unkown
page read and write
2800000
trusted library allocation
page read and write
13FA090F000
heap
page read and write
44B000
unkown
page write copy
13FA0F09000
heap
page read and write
C54A000
unkown
page read and write
45F0000
trusted library allocation
page read and write
8D00000
unkown
page read and write
1941E38E000
heap
page read and write
7FF5ED8E7000
unkown
page readonly
7FF5ED847000
unkown
page readonly
2E960E46000
heap
page read and write
74A8527000
stack
page read and write
18F3631E000
heap
page read and write
29388BD3000
heap
page read and write
43B0000
trusted library allocation
page read and write
8D00000
unkown
page read and write
2C4686DA000
heap
page read and write
7DF4F3030000
unkown
page readonly
29388D6A000
heap
page read and write
2C4686D7000
heap
page read and write
1941E9A9000
heap
page read and write
470E000
stack
page read and write
7FF5ED7E0000
unkown
page readonly
1DD5A4FA000
heap
page read and write
43B0000
trusted library allocation
page read and write
69D23FF000
stack
page read and write
3030000
unkown
page read and write
266E2005000
heap
page read and write
2E960E10000
heap
page read and write
23D27D6A000
heap
page read and write
13FA0F03000
heap
page read and write
7FF5ED7C4000
unkown
page readonly
2E960E56000
heap
page read and write
266E27FC000
heap
page read and write
149BCA01000
heap
page read and write
36D3000
stack
page read and write
2342E5D8000
heap
page read and write
23D27880000
heap
page read and write
2C468010000
heap
page read and write
23D27830000
trusted library allocation
page read and write
149BC45A000
heap
page read and write
1FA9D99C000
heap
page read and write
3010000
unkown
page read and write
18F3632C000
heap
page read and write
44C000
unkown
page write copy
1DD5A3C4000
heap
page read and write
13FA287B000
heap
page read and write
A00000
trusted library allocation
page read and write
7DF4F3061000
unkown
page execute read
7E70000
unkown
page read and write
8D00000
unkown
page read and write
24603685000
heap
page read and write
7E70000
unkown
page read and write
8D00000
unkown
page read and write
3050000
unkown
page read and write
1941E97E000
heap
page read and write
7D60000
unkown
page read and write
57C9000
heap
page read and write
7D53000
unkown
page read and write
43B0000
trusted library allocation
page read and write
4A0000
heap
page execute and read and write
246038A5000
heap
page read and write
22A0000
heap
page read and write
8740000
unkown
page read and write
14718FE000
stack
page read and write
13FA0F77000
heap
page read and write
18F35D61000
heap
page read and write
23D27799000
heap
page read and write
16C04A40000
trusted library allocation
page read and write
780000
trusted library allocation
page read and write
23D27D6A000
heap
page read and write
2E961572000
heap
page read and write
2C4685D0000
heap
page read and write
3050000
unkown
page read and write
9C4997000
stack
page read and write
97AD000
unkown
page read and write
8D20000
unkown
page read and write
780000
trusted library allocation
page read and write
13FA098E000
heap
page read and write
7E70000
unkown
page read and write
2800000
trusted library allocation
page read and write
BD28BFF000
stack
page read and write
2D20000
trusted library allocation
page read and write
266E280D000
heap
page read and write
149BC4A4000
heap
page read and write
3030000
unkown
page read and write
24603C7B000
heap
page read and write
7FF5ED7CF000
unkown
page readonly
43B0000
trusted library allocation
page read and write
27A20B98000
heap
page read and write
18F36331000
heap
page read and write
24603C94000
heap
page read and write
8D00000
unkown
page read and write
17516630000
heap
page read and write
3040000
unkown
page read and write
2421000
heap
page read and write
7E70000
unkown
page read and write
4710000
direct allocation
page execute and read and write
56CB000
heap
page read and write
69D1F07000
stack
page read and write
266E1FE9000
heap
page read and write
CD1000
system
page execute and read and write
2E9610BA000
heap
page read and write
17516647000
heap
page read and write
8D00000
unkown
page read and write
13FA090F000
heap
page read and write
A00000
trusted library allocation
page read and write
2E961588000
heap
page read and write
13FA09AA000
heap
page read and write
A00000
trusted library allocation
page read and write
4C0000
direct allocation
page read and write
7FF5ED5CE000
unkown
page readonly
8740000
unkown
page read and write
18F3632E000
heap
page read and write
13FA090F000
heap
page read and write
23D27D57000
heap
page read and write
2E960E61000
heap
page read and write
17516DE1000
heap
page read and write
2D50000
heap
page read and write
2800000
trusted library allocation
page read and write
18F35D35000
heap
page read and write
46AD000
stack
page read and write
20C1000
heap
page read and write
8D00000
unkown
page read and write
2C4680FC000
heap
page read and write
17516DD0000
heap
page read and write
8D00000
unkown
page read and write
13FA0F35000
heap
page read and write
1FA9D9A0000
heap
page read and write
7FF6F2D74000
unkown
page write copy
23D27783000
heap
page read and write
D10000
trusted library allocation
page read and write
2C4685EC000
heap
page read and write
7E70000
unkown
page read and write
7E70000
unkown
page read and write
37B0000
unkown
page read and write
1440000
unkown
page read and write
8D10000
unkown
page read and write
8740000
unkown
page read and write
1F090190000
heap
page read and write
7FF5ED92C000
unkown
page readonly
8D00000
unkown
page read and write
1941E376000
heap
page read and write
7FF5ED937000
unkown
page readonly
3290000
unkown
page read and write
27A20B80000
heap
page read and write
7FF5ED50A000
unkown
page readonly
3170000
unkown
page read and write
24603C74000
heap
page read and write
2E9615A8000
heap
page read and write
13FA098E000
heap
page read and write
A00000
trusted library allocation
page read and write
23D27873000
heap
page read and write
7E70000
unkown
page read and write
24603682000
heap
page read and write
7E70000
unkown
page read and write
2E960E61000
heap
page read and write
17516DBE000
heap
page read and write
1451000
unkown
page readonly
4C34000
unkown
page read and write
A00000
trusted library allocation
page read and write
8D00000
unkown
page read and write
13FA094C000
heap
page read and write
780000
trusted library allocation
page read and write
18F35D79000
heap
page read and write
A00000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
8740000
unkown
page read and write
57C9000
heap
page read and write
8D00000
unkown
page read and write
266E22C5000
heap
page read and write
7FF5ED1FC000
unkown
page readonly
A327000
unkown
page read and write
B190000
unkown
page read and write
C5E6000
unkown
page read and write
8D00000
unkown
page read and write
13FA09A3000
heap
page read and write
8F539FF000
stack
page read and write
780000
trusted library allocation
page read and write
17516DDA000
heap
page read and write
2E960DB0000
trusted library allocation
page read and write
24603C99000
heap
page read and write
23D27783000
heap
page read and write
7FF5ED449000
unkown
page readonly
149BC470000
heap
page read and write
43B0000
trusted library allocation
page read and write
43B0000
trusted library allocation
page read and write
7FF5ED85F000
unkown
page readonly
18F3634A000
heap
page read and write
34E04FE000
stack
page read and write
7D90000
unkown
page read and write
57C9000
heap
page read and write
7CE0000
unkown
page read and write
13FA0F63000
heap
page read and write
17516DE3000
heap
page read and write
780000
trusted library allocation
page read and write
18F36310000
heap
page read and write
7FF5ED8FF000
unkown
page readonly
2E961577000
heap
page read and write
A00000
trusted library allocation
page read and write
3010000
unkown
page read and write
23D27D57000
heap
page read and write
3460000
unkown
page read and write
1FA9D98C000
heap
page read and write
2C468060000
trusted library allocation
page read and write
A50B000
unkown
page read and write
8740000
unkown
page read and write
5DD12FF000
stack
page read and write
2E961598000
heap
page read and write
7C90000
unkown
page read and write
2E961574000
heap
page read and write
18F35C70000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
7FF5ED806000
unkown
page readonly
8D00000
unkown
page read and write
13FA0EF0000
heap
page read and write
8740000
unkown
page read and write
2D87000
heap
page read and write
29388BA7000
heap
page read and write
1FA9D99B000
heap
page read and write
149BC3A0000
heap
page read and write
2800000
trusted library allocation
page read and write
23D27870000
heap
page read and write
71E000
stack
page read and write
A00000
trusted library allocation
page read and write
2938860C000
heap
page read and write
780000
trusted library allocation
page read and write
149BCA19000
heap
page read and write
57C9000
heap
page read and write
17516DBC000
heap
page read and write
16C04AA0000
heap
page read and write
8D00000
unkown
page read and write
2C468106000
heap
page read and write
266E201E000
heap
page read and write
2D97000
heap
page read and write
16C04B4A000
heap
page read and write
43B0000
trusted library allocation
page read and write
13FA0972000
heap
page read and write
3010000
unkown
page read and write
1ADDA728000
heap
page read and write
149BC4AC000
heap
page read and write
5B0000
direct allocation
page execute and read and write
1FA9D6F0000
heap
page read and write
A00000
trusted library allocation
page read and write
AC8000
heap
page read and write
266E27F8000
heap
page read and write
466D000
stack
page read and write
11C0000
unkown
page readonly
2E960E61000
heap
page read and write
93BE000
stack
page read and write
7FF5ED418000
unkown
page readonly
7FF5ED1CB000
unkown
page readonly
2DBD000
heap
page read and write
5EAB97F000
stack
page read and write
13FA08E1000
heap
page read and write
2342E608000
heap
page read and write
23D2787B000
heap
page read and write
16C05084000
heap
page read and write
16C04AAE000
heap
page read and write
13FA09A5000
heap
page read and write
13FA0936000
heap
page read and write
1F0900D7000
heap
page read and write
460000
unkown
page readonly
40F000
unkown
page readonly
7E70000
unkown
page read and write
23D27872000
heap
page read and write
7E70000
unkown
page read and write
D10000
trusted library allocation
page read and write
7E70000
unkown
page read and write
3060000
unkown
page read and write
2460368C000
heap
page read and write
2DAA000
heap
page read and write
C6D8000
unkown
page read and write
1ADDA5B0000
heap
page read and write
2C6AE7F000
stack
page read and write
8D00000
unkown
page read and write
2342E510000
heap
page read and write
18F35D34000
heap
page read and write
18F35D8B000
heap
page read and write
785B000
unkown
page read and write
29388BC9000
heap
page read and write
1DD5A3C7000
heap
page read and write
13FA0F54000
heap
page read and write
7FF5ED4FD000
unkown
page readonly
16C05099000
heap
page read and write
17516666000
heap
page read and write
8740000
unkown
page read and write
1F0900EB000
heap
page read and write
13FA0F05000
heap
page read and write
8D00000
unkown
page read and write
7869000
unkown
page read and write
7E70000
unkown
page read and write
13FA0F14000
heap
page read and write
1941E9B3000
heap
page read and write
43B0000
trusted library allocation
page read and write
149BC380000
heap
page read and write
5DD137F000
stack
page read and write
7FF5ED961000
unkown
page readonly
A00000
trusted library allocation
page read and write
A323000
unkown
page read and write
480000
heap
page read and write
8740000
unkown
page read and write
7FF5ED59E000
unkown
page readonly
16C04AA7000
heap
page read and write
EB0000
heap
page read and write
3170000
unkown
page read and write
13FA090F000
heap
page read and write
266E27E9000
heap
page read and write
1FA9D94E000
heap
page read and write
A310000
unkown
page read and write
A00000
trusted library allocation
page read and write
8D00000
unkown
page read and write
13FA09A7000
heap
page read and write
13FA2A21000
heap
page read and write
2800000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
13FA0EF9000
heap
page read and write
460000
unkown
page readonly
2E960D60000
heap
page read and write
7E70000
unkown
page read and write
43B0000
trusted library allocation
page read and write
2D9C000
heap
page read and write
266E22CA000
heap
page read and write
3170000
unkown
page read and write
57EC000
heap
page read and write
27A20B85000
heap
page read and write
18F35FC0000
heap
page read and write
2C4680E3000
heap
page read and write
7FF5ED8F9000
unkown
page readonly
19420290000
heap
page read and write
1FA9D807000
heap
page read and write
2800000
trusted library allocation
page read and write
780000
trusted library allocation
page read and write
149BC4CA000
heap
page read and write
1ADDA767000
heap
page read and write
7852000
unkown
page read and write
17516682000
heap
page read and write
BAF9000
stack
page read and write
C41F000
stack
page read and write
2A80000
heap
page read and write
A09B000
stack
page read and write
23D27D6A000
heap
page read and write
20D1000
heap
page read and write
13FA0936000
heap
page read and write
18F35D3F000
heap
page read and write
24603682000
heap
page read and write
A00000
trusted library allocation
page read and write
16C050A3000
heap
page read and write
2938885A000
heap
page read and write
149BC3C0000
trusted library allocation
page read and write
8D00000
unkown
page read and write
3170000
unkown
page read and write
17516DD0000
heap
page read and write
1DD5A4D8000
heap
page read and write
3170000
unkown
page read and write
8D00000
unkown
page read and write
7FF5ED810000
unkown
page readonly
550000
unclassified section
page read and write
13FA0955000
heap
page read and write
1FA9D987000
heap
page read and write
13FA0F2F000
heap
page read and write
2E960E6A000
heap
page read and write
266E2180000
heap
page read and write
7D20000
unkown
page readonly
3209000
stack
page read and write
149BC9FF000
heap
page read and write
266E2803000
heap
page read and write
3440000
unkown
page read and write
2C4686D0000
heap
page read and write
17516DDA000
heap
page read and write
13FA0936000
heap
page read and write
1941E3A3000
heap
page read and write
7FF5ED5C1000
unkown
page readonly
1500000
heap
page read and write
2751000
system
page execute and read and write
13FA0880000
trusted library allocation
page read and write
1490000
unkown
page read and write
2C4680EE000
heap
page read and write
A00000
trusted library allocation
page read and write
3010000
unkown
page read and write
22B0000
heap
page read and write
7F50000
unkown
page read and write
3010000
unkown
page read and write
57DF000
heap
page read and write
3030000
unkown
page read and write
3170000
unkown
page read and write
883E000
stack
page read and write
2A4F000
stack
page read and write
13FA09A7000
heap
page read and write
7E70000
unkown
page read and write
3050000
unkown
page read and write
1FA9D826000
heap
page read and write
2C4685ED000
heap
page read and write
F31A56F000
stack
page read and write
8D00000
unkown
page read and write
3440000
unkown
page read and write
13FA0F17000
heap
page read and write
74A887F000
stack
page read and write
2C4685ED000
heap
page read and write
3010000
unkown
page read and write
266E22CB000
heap
page read and write
73C000
stack
page read and write
2C1E000
stack
page read and write
310E000
stack
page read and write
2800000
trusted library allocation
page read and write
B82A000
stack
page read and write
17516620000
trusted library allocation
page read and write
57C9000
heap
page read and write
2800000
trusted library allocation
page read and write
8860000
unkown
page read and write
246038A4000
heap
page read and write
A364000
unkown
page read and write
24603C7B000
heap
page read and write
1DD5A470000
trusted library allocation
page read and write
1FE654D0000
heap
page read and write
3170000
unkown
page read and write
CB6A000
unkown
page read and write
8740000
unkown
page read and write
7F50000
unkown
page read and write
266E2803000
heap
page read and write
2DA3000
heap
page read and write
2DA7000
heap
page read and write
3748000
unkown
page read and write
1FA9D843000
heap
page read and write
7FF5D1CCD000
unkown
page readonly
24603C7C000
heap
page read and write
C5A0000
unkown
page read and write
3170000
unkown
page read and write
8740000
unkown
page read and write
30F0000
heap
page read and write
2D82000
heap
page read and write
7AA000
heap
page read and write
1DD5A4D4000
heap
page read and write
23D27786000
heap
page read and write
4E10000
heap
page read and write
A00000
trusted library allocation
page read and write
4740000
heap
page read and write
7FF5ED779000
unkown
page readonly
57EC000
heap
page read and write
8D00000
unkown
page read and write
87BB000
stack
page read and write
5D0000
heap
page read and write
1ADDA6E6000
heap
page read and write
1DD5A4D0000
heap
page read and write
8740000
unkown
page read and write
3170000
unkown
page read and write
1480000
heap
page read and write
1DD5A330000
heap
page read and write
18F36346000
heap
page read and write
8D00000
unkown
page read and write
3170000
unkown
page read and write
4B8B000
unkown
page read and write
7FF5ED3F3000
unkown
page readonly
24603662000
heap
page read and write
5EABAFE000
stack
page read and write
1DD5A3C7000
heap
page read and write
24603CA0000
heap
page read and write
7FF5ED93E000
unkown
page readonly
18F35D38000
heap
page read and write
2C468098000
heap
page read and write
8D00000
unkown
page read and write
18F35D52000
heap
page read and write
43B0000
trusted library allocation
page read and write
18F35C70000
trusted library allocation
page read and write
2D8E000
heap
page read and write
4BDC000
unkown
page read and write
149BC3C0000
trusted library allocation
page read and write
3440000
unkown
page read and write
24603730000
trusted library allocation
page read and write
29388625000
heap
page read and write
1DD5A5CE000
heap
page read and write
8D00000
unkown
page read and write
8D00000
unkown
page read and write
43B0000
trusted library allocation
page read and write
3070000
unkown
page read and write
1941E996000
heap
page read and write
AADB000
unkown
page read and write
4C60000
heap
page read and write
24603500000
heap
page read and write
7FF5ED586000
unkown
page readonly
A00000
trusted library allocation
page read and write
17516DE4000
heap
page read and write
2938A510000
heap
page read and write
149BC4CA000
heap
page read and write
3010000
unkown
page read and write
343A000
heap
page read and write
2E961570000
heap
page read and write
18F35D5C000
heap
page read and write
29388560000
heap
page read and write
A00000
trusted library allocation
page read and write
1FA9D802000
heap
page read and write
149BC4CA000
heap
page read and write
8D00000
unkown
page read and write
17516685000
heap
page read and write
2D94000
heap
page read and write
2938862A000
heap
page read and write
3060000
unkown
page read and write
3220000
unkown
page readonly
43B0000
trusted library allocation
page read and write
4D1000
system
page execute and read and write
1ADDA761000
heap
page read and write
1DD5A4EC000
heap
page read and write
7FF5ED445000
unkown
page readonly
2D94000
heap
page read and write
8EF0000
unkown
page read and write
400000
unkown
page execute and read and write
13FA2821000
heap
page read and write
25F4000
heap
page read and write
20ECB618000
heap
page read and write
40B000
unkown
page execute read
F31A4E7000
stack
page read and write
7FF5ED674000
unkown
page readonly
EAD000
heap
page read and write
1ADDA6F7000
heap
page read and write
A00000
trusted library allocation
page read and write
13FA08FD000
heap
page read and write
A00000
trusted library allocation
page read and write
20ECB440000
heap
page read and write
266E280C000
heap
page read and write
7FF5ED814000
unkown
page readonly
A00000
trusted library allocation
page read and write
C52C000
unkown
page read and write
1941E310000
heap
page read and write
44B000
unkown
page write copy
29388BC9000
heap
page read and write
8710000
unkown
page readonly
7E70000
unkown
page read and write
23D27D54000
heap
page read and write
266E1FEA000
heap
page read and write
A4B8000
unkown
page read and write
7E70000
unkown
page read and write
23D27799000
heap
page read and write
7FF5ED265000
unkown
page readonly
3170000
unkown
page read and write
4B0000
direct allocation
page execute and read and write
3010000
unkown
page read and write
2E960D70000
heap
page read and write
2D20000
trusted library allocation
page read and write
43B0000
trusted library allocation
page read and write
3020000
unkown
page read and write
A00000
trusted library allocation
page read and write
20ECB550000
heap
page read and write
17516925000
heap
page read and write
13FA2A50000
heap
page read and write
A00000
trusted library allocation
page read and write
24603C69000
heap
page read and write
13FA0F0A000
heap
page read and write
246038A7000
heap
page read and write
18F35D27000
heap
page read and write
7E70000
unkown
page read and write
266E2814000
heap
page read and write
16C050A2000
heap
page read and write
7FF5ED97E000
unkown
page readonly
18F35D52000
heap
page read and write
149BC443000
heap
page read and write
1ADDA6F9000
heap
page read and write
A00000
trusted library allocation
page read and write
1ADDA723000
heap
page read and write
A00000
trusted library allocation
page read and write
65613BD000
stack
page read and write
1ADDA762000
heap
page read and write
2C468106000
heap
page read and write
A37B000
unkown
page read and write
3060000
unkown
page read and write
27F0000
heap
page read and write
2E96158C000
heap
page read and write
FDA0000
unkown
page read and write
18F35D00000
heap
page read and write
13FA0F47000
heap
page read and write
1941E97B000
heap
page read and write
23D27796000
heap
page read and write
7FF5ED5EB000
unkown
page readonly
3170000
unkown
page read and write
979A000
unkown
page read and write
1DD5A3C7000
heap
page read and write
D43238E000
stack
page read and write
18F36325000
heap
page read and write
3170000
unkown
page read and write
16C04AA7000
heap
page read and write
3170000
unkown
page read and write
13FA0F47000
heap
page read and write
1941E994000
heap
page read and write
4CD0000
unkown
page read and write
1FE657D5000
heap
page read and write
7FF5ED755000
unkown
page readonly
1DD5A387000
heap
page read and write
22FEDB00000
heap
page read and write
EAB000
heap
page read and write
2E961573000
heap
page read and write
8D00000
unkown
page read and write
3010000
unkown
page read and write
266E2013000
heap
page read and write
271C000
stack
page read and write
44C000
unkown
page write copy
22FEDE05000
heap
page read and write
3040000
unkown
page read and write
2C4680C6000
heap
page read and write
3170000
unkown
page read and write
24603C8F000
heap
page read and write
B8C0000
unkown
page readonly
57CA000
heap
page read and write
246038A2000
heap
page read and write
13FA098E000
heap
page read and write
3020000
unkown
page read and write
7FF5ED9C6000
unkown
page readonly
3170000
unkown
page read and write
1DD5A5C0000
heap
page read and write
9875000
unkown
page read and write
13FA091D000
heap
page read and write
3170000
unkown
page read and write
149BC4B6000
heap
page read and write
A00000
trusted library allocation
page read and write
266E2005000
heap
page read and write
56D9000
unkown
page read and write
8D00000
unkown
page read and write
3030000
unkown
page read and write
C56F000
unkown
page read and write
13FA08C5000
heap
page read and write
8740000
unkown
page read and write
18F35D63000
heap
page read and write
18F35C50000
heap
page read and write
10E24000
unkown
page read and write
13FA0936000
heap
page read and write
7E70000
unkown
page read and write
7E70000
unkown
page read and write
580000
heap
page read and write
13FA0936000
heap
page read and write
13FA08D4000
heap
page read and write
400000
unkown
page readonly
48E000
heap
page read and write
2C4680D6000
heap
page read and write
3170000
unkown
page read and write
8F5350B000
stack
page read and write
13FA2821000
heap
page read and write
57EC000
heap
page read and write
3050000
unkown
page read and write
A00000
trusted library allocation
page read and write
2DA6000
heap
page read and write
1DD5A5D5000
heap
page read and write
7FF5ED4BB000
unkown
page readonly
13FA0F0F000
heap
page read and write
A00000
trusted library allocation
page read and write
C88B000
unkown
page read and write
8740000
unkown
page read and write
3700000
unkown
page read and write
1941E4A0000
trusted library allocation
page read and write
8D00000
unkown
page read and write
2C4685E9000
heap
page read and write
43B0000
trusted library allocation
page read and write
1DD5A3C7000
heap
page read and write
23D27772000
heap
page read and write
18F36353000
heap
page read and write
57C9000
heap
page read and write
A00000
trusted library allocation
page read and write
7B0000
heap
page read and write
2D88000
heap
page read and write
C503000
unkown
page read and write
EB3000
heap
page read and write
13FA0F27000
heap
page read and write
7FF5ED26E000
unkown
page readonly
16C04AF0000
heap
page read and write
23D27D5F000
heap
page read and write
5806000
heap
page read and write
16C04B31000
heap
page read and write
8D00000
unkown
page read and write
1ADDA75C000
heap
page read and write
18F36321000
heap
page read and write
1FA9D98C000
heap
page read and write
7FF5ED928000
unkown
page readonly
906E000
stack
page read and write
4E0000
heap
page read and write
C5AA000
unkown
page read and write
7FF5ED8B4000
unkown
page readonly
27A20B90000
heap
page read and write
A00000
trusted library allocation
page read and write
29388D60000
heap
page read and write
4CE000
stack
page read and write
23D27798000
heap
page read and write
21F0000
heap
page read and write
1DD5A4D7000
heap
page read and write
7FF5ED803000
unkown
page readonly
16C04A40000
trusted library allocation
page read and write
3050000
unkown
page read and write
1941E38E000
heap
page read and write
57C9000
heap
page read and write
2D94000
heap
page read and write
1ADDA76F000
heap
page read and write
18F36338000
heap
page read and write
1751668C000
heap
page read and write
3020000
unkown
page read and write
3050000
unkown
page read and write
EAB000
heap
page read and write
2C4686DA000
heap
page read and write
A00000
trusted library allocation
page read and write
17516642000
heap
page read and write
7FF5ED279000
unkown
page readonly
266E2803000
heap
page read and write
7FF6F2D60000
unkown
page readonly
13FA2A20000
heap
page read and write
2E9615A9000
heap
page read and write
8740000
unkown
page read and write
1DD5A4DA000
heap
page read and write
149BCA0A000
heap
page read and write
266E2013000
heap
page read and write
7FF5ED864000
unkown
page readonly
24603663000
heap
page read and write
794F000
unkown
page read and write
13FA0966000
heap
page read and write
43B0000
trusted library allocation
page read and write
460000
unkown
page readonly
18F35F7A000
heap
page read and write
149BC44A000
heap
page read and write
1DD5A3D0000
heap
page read and write
44B000
unkown
page read and write
23D27767000
heap
page read and write
A00000
trusted library allocation
page read and write
24603668000
heap
page read and write
2E963010000
heap
page read and write
10DF9000
unkown
page read and write
3170000
unkown
page read and write
7FF5ED9C8000
unkown
page readonly
29388605000
heap
page read and write
581000
heap
page execute and read and write
7E70000
unkown
page read and write
A00000
trusted library allocation
page read and write
2C4680D2000
heap
page read and write
246038B0000
heap
page read and write
3030000
unkown
page read and write
24603C7F000
heap
page read and write
B08D000
stack
page read and write
49C000
stack
page read and write
1FE0000
heap
page read and write
7FF5EDA0D000
unkown
page readonly
7FF5ED40D000
unkown
page readonly
9792000
unkown
page read and write
780000
trusted library allocation
page read and write
9883000
unkown
page read and write
45F0000
trusted library allocation
page read and write
3010000
unkown
page read and write
7FF5ED1CF000
unkown
page readonly
1FE655B0000
heap
page read and write
266E280C000
heap
page read and write
2C468601000
heap
page read and write
7FF5ED519000
unkown
page readonly
2E96157B000
heap
page read and write
18F35D6D000
heap
page read and write
17516917000
heap
page read and write
69D227F000
stack
page read and write
17516693000
heap
page read and write
3050000
unkown
page read and write
34E057F000
stack
page read and write
57C9000
heap
page read and write
17516913000
heap
page read and write
7FF5ED975000
unkown
page readonly
A00000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
266E21A0000
trusted library allocation
page read and write
87B0000
unkown
page read and write
149BC4A9000
heap
page read and write
2C4685F7000
heap
page read and write
3170000
unkown
page read and write
1751691E000
heap
page read and write
43B0000
trusted library allocation
page read and write
1FE656D0000
heap
page read and write
5D4000
heap
page read and write
3060000
unkown
page read and write
A4AE000
unkown
page read and write
17516880000
heap
page read and write
79FB000
unkown
page read and write
3050000
unkown
page read and write
13FA2821000
heap
page read and write
3030000
unkown
page read and write
1DD5A370000
heap
page read and write
16C04AA4000
heap
page read and write
3060000
unkown
page read and write
79D000
heap
page read and write
2460369E000
heap
page read and write
29388625000
heap
page read and write
57E3000
heap
page read and write
2342E678000
heap
page read and write
D10000
trusted library allocation
page read and write
293886D0000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
149BC447000
heap
page read and write
3010000
unkown
page read and write
7FF5ED2A9000
unkown
page readonly
C89C000
unkown
page read and write
1510000
unkown
page readonly
A00000
trusted library allocation
page read and write
7E70000
unkown
page read and write
23D27766000
heap
page read and write
266E2019000
heap
page read and write
23D27783000
heap
page read and write
18F36360000
heap
page read and write
9C000
stack
page read and write
16C04AAB000
heap
page read and write
266E21A0000
trusted library allocation
page read and write
8D00000
unkown
page read and write
91F000
stack
page read and write
23D27D4E000
heap
page read and write
16C04AAE000
heap
page read and write
18F36333000
heap
page read and write
1DE9BB40000
heap
page read and write
8D00000
unkown
page read and write
2800000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
7FF5ED9ED000
unkown
page readonly
3020000
unkown
page read and write
1DD5A4F3000
heap
page read and write
2080000
heap
page read and write
13FA2A40000
heap
page read and write
AB60000
unkown
page read and write
16C04B46000
heap
page read and write
A00000
trusted library allocation
page read and write
13FA0F0E000
heap
page read and write
2E7C000
stack
page read and write
7FF6F2D75000
unkown
page readonly
7E70000
unkown
page read and write
1DD5A5CE000
heap
page read and write
8D00000
unkown
page read and write
51D000
heap
page read and write
1390000
unkown
page read and write
14B0000
unkown
page readonly
18F36347000
heap
page read and write
57F0000
heap
page read and write
266E4163000
heap
page read and write
F70000
heap
page read and write
13FA08EF000
heap
page read and write
16C04920000
heap
page read and write
18F35D54000
heap
page read and write
29388BB0000
heap
page read and write
CBB1000
unkown
page read and write
2EBD000
stack
page read and write
24605690000
heap
page read and write
2C4685E3000
heap
page read and write
16C0507C000
heap
page read and write
2C4685F7000
heap
page read and write
1FA9D99C000
heap
page read and write
2C4680E3000
heap
page read and write
23D27D75000
heap
page read and write
A29E000
stack
page read and write
13FA090F000
heap
page read and write
23430321000
heap
page read and write
3170000
unkown
page read and write
7FF5ED9A6000
unkown
page readonly
16C05099000
heap
page read and write
37F6000
unkown
page read and write
8D00000
unkown
page read and write
7CF000
stack
page read and write
175165E0000
heap
page read and write
266E27F5000
heap
page read and write
35D0000
unkown
page read and write
1ADDA764000
heap
page read and write
8D00000
unkown
page read and write
4DA000
system
page execute and read and write
3010000
unkown
page read and write
2D9B000
heap
page read and write
7CD0000
unkown
page read and write
1FA9D829000
heap
page read and write
1FA9D999000
heap
page read and write
987F000
unkown
page read and write
400000
unkown
page readonly
7FF5ED76D000
unkown
page readonly
BD289FF000
stack
page read and write
E89148D000
stack
page read and write
32B5000
heap
page read and write
2A50000
heap
page read and write
C893000
unkown
page read and write
2C4685F7000
heap
page read and write
A00000
trusted library allocation
page read and write
7FF5ED750000
unkown
page readonly
7978000
unkown
page read and write
3060000
unkown
page read and write
7E70000
unkown
page read and write
22FEDB30000
heap
page read and write
1DD5A470000
trusted library allocation
page read and write
149BC9F7000
heap
page read and write
A00000
trusted library allocation
page read and write
2C4685E8000
heap
page read and write
16C04AAA000
heap
page read and write
2DC2000
heap
page read and write
7F50000
unkown
page read and write
16C04A80000
heap
page read and write
23D27D5A000
heap
page read and write
A00000
trusted library allocation
page read and write
1F0900B2000
heap
page read and write
7FF5ED286000
unkown
page readonly
C6BF000
unkown
page read and write
C563000
unkown
page read and write
7FF5ED39B000
unkown
page readonly
8D00000
unkown
page read and write
1F090060000
heap
page read and write
1941E440000
heap
page read and write
A491000
unkown
page read and write
44B000
unkown
page read and write
9CA0000
heap
page read and write
5DD127F000
stack
page read and write
13FA0F8D000
heap
page read and write
3170000
unkown
page read and write
1ADDA6C0000
heap
page read and write
D10000
trusted library allocation
page read and write
E4A0000
unkown
page read and write
9F9E000
stack
page read and write
17516685000
heap
page read and write
23D27777000
heap
page read and write
29388BB0000
heap
page read and write
18F3632F000
heap
page read and write
40F000
unkown
page readonly
1DE9BDF5000
heap
page read and write
E1889E7000
stack
page read and write
780000
trusted library allocation
page read and write
3758000
unkown
page read and write
17516685000
heap
page read and write
3170000
unkown
page read and write
8D00000
unkown
page read and write
22FEDB10000
heap
page read and write
2C4685F7000
heap
page read and write
2280000
heap
page read and write
A00000
trusted library allocation
page read and write
2C4680F8000
heap
page read and write
17516685000
heap
page read and write
266E22C3000
heap
page read and write
29388BB4000
heap
page read and write
16C04AA3000
heap
page read and write
7F2E000
stack
page read and write
18F35FCA000
heap
page read and write
8D00000
unkown
page read and write
8D00000
unkown
page read and write
8D00000
unkown
page read and write
7FF5ED980000
unkown
page readonly
24603C6F000
heap
page read and write
7FF5ED6A5000
unkown
page readonly
13FA0760000
heap
page read and write
1ADDA71E000
heap
page read and write
16C04AAA000
heap
page read and write
7FF5D1CD4000
unkown
page readonly
8750000
unkown
page read and write
7E70000
unkown
page read and write
24603CA1000
heap
page read and write
1FA9D999000
heap
page read and write
3030000
unkown
page read and write
52E000
stack
page read and write
3010000
unkown
page read and write
98A8000
unkown
page read and write
780000
trusted library allocation
page read and write
3010000
unkown
page read and write
1ADDA6F7000
heap
page read and write
1941E977000
heap
page read and write
923E000
stack
page read and write
23D27D5F000
heap
page read and write
1ADDA711000
heap
page read and write
57C9000
heap
page read and write
2191000
heap
page read and write
296C04E0000
heap
page read and write
1DD5A5C2000
heap
page read and write
1941E383000
heap
page read and write
1941E39E000
heap
page read and write
A00000
trusted library allocation
page read and write
2E9610B5000
heap
page read and write
A00000
trusted library allocation
page read and write
1941E357000
heap
page read and write
1941E990000
heap
page read and write
23D27730000
heap
page read and write
1DD5A4C0000
heap
page read and write
13FA090F000
heap
page read and write
43B0000
trusted library allocation
page read and write
13FA0F00000
heap
page read and write
7FF5ED62F000
unkown
page readonly
23D27794000
heap
page read and write
3010000
unkown
page read and write
1FA9D843000
heap
page read and write
24603C7B000
heap
page read and write
8D00000
unkown
page read and write
3050000
unkown
page read and write
8740000
unkown
page read and write
C6F2000
unkown
page read and write
2D87000
heap
page read and write
2C468260000
trusted library allocation
page read and write
29388BAF000
heap
page read and write
1941E340000
heap
page read and write
3170000
unkown
page read and write
1ADDA70A000
heap
page read and write
A00000
trusted library allocation
page read and write
88EE000
stack
page read and write
8D00000
unkown
page read and write
23D27D78000
heap
page read and write
45F0000
trusted library allocation
page read and write
24603C6C000
heap
page read and write
2C4686DA000
heap
page read and write
7FF5ED660000
unkown
page readonly
C523D7F000
stack
page read and write
3010000
unkown
page read and write
18F36356000
heap
page read and write
3020000
unkown
page read and write
A4A1000
unkown
page read and write
5CE000
stack
page read and write
2E96158C000
heap
page read and write
1390000
unkown
page read and write
17516DC7000
heap
page read and write
13FA0F3F000
heap
page read and write
F31A87E000
stack
page read and write
266E2816000
heap
page read and write
266E2355000
heap
page read and write
A49E000
unkown
page read and write
490000
heap
page read and write
29388BB7000
heap
page read and write
9B60000
unkown
page readonly
10EAB000
unkown
page read and write
13FA09A4000
heap
page read and write
41D000
unkown
page readonly
149BC9FE000
heap
page read and write
8D00000
unkown
page read and write
A11F000
stack
page read and write
149BC440000
heap
page read and write
8D00000
unkown
page read and write
986F000
unkown
page read and write
2C4680C9000
heap
page read and write
A00000
trusted library allocation
page read and write
2342E540000
heap
page read and write
29388855000
heap
page read and write
29388580000
heap
page read and write
1ADDA731000
heap
page read and write
17516DC5000
heap
page read and write
3030000
unkown
page read and write
7FF5ED3EA000
unkown
page readonly
2342E7B0000
heap
page read and write
2C4685F7000
heap
page read and write
13FA0F2E000
heap
page read and write
24603730000
trusted library allocation
page read and write
57FC000
heap
page read and write
7FF5ED1F6000
unkown
page readonly
7FF5ED9A1000
unkown
page readonly
40F000
unkown
page readonly
16C04B2E000
heap
page read and write
1DD5A4CD000
heap
page read and write
266E22C0000
heap
page read and write
8F538FF000
stack
page read and write
59E000
stack
page read and write
18F35D45000
heap
page read and write
1FA9D985000
heap
page read and write
18F36346000
heap
page read and write
100F000
stack
page read and write
2800000
trusted library allocation
page read and write
860000
heap
page read and write
2D87000
heap
page read and write
24603C92000
heap
page read and write
1ADDA72E000
heap
page read and write
57C9000
heap
page read and write
3170000
unkown
page read and write
2E961598000
heap
page read and write
7E70000
unkown
page read and write
17516915000
heap
page read and write
2E9615A8000
heap
page read and write
29388622000
heap
page read and write
1DD5A382000
heap
page read and write
29388BC9000
heap
page read and write
175165D0000
heap
page read and write
8D00000
unkown
page read and write
A00000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
3040000
unkown
page read and write
C962000
unkown
page read and write
13FA090F000
heap
page read and write
8740000
unkown
page read and write
7FF5ED2A4000
unkown
page readonly
149BC4B7000
heap
page read and write
16C04A20000
heap
page read and write
13FA0F33000
heap
page read and write
A479000
unkown
page read and write
7FF5ED65C000
unkown
page readonly
43B0000
trusted library allocation
page read and write
23D27D4F000
heap
page read and write
4F1000
heap
page execute and read and write
3432000
heap
page read and write
13FA090F000
heap
page read and write
23D27D49000
heap
page read and write
8D00000
unkown
page read and write
CD6000
system
page execute and read and write
10C0000
unkown
page readonly
29388625000
heap
page read and write
3170000
unkown
page read and write
2E960E61000
heap
page read and write
1941E920000
heap
page read and write
23D27830000
trusted library allocation
page read and write
3287000
heap
page read and write
13FA0FA6000
heap
page read and write
8D00000
unkown
page read and write
23D27742000
heap
page read and write
1ADDA76D000
heap
page read and write
13FA08C6000
heap
page read and write
266E27FC000
heap
page read and write
18A0000
unkown
page readonly
13FA0916000
heap
page read and write
2800000
trusted library allocation
page read and write
3020000
unkown
page read and write
3040000
unkown
page read and write
1DD5A4EA000
heap
page read and write
45F0000
trusted library allocation
page read and write
1ADDA71E000
heap
page read and write
16C05099000
heap
page read and write
13FA0943000
heap
page read and write
D10000
trusted library allocation
page read and write
1DE9BBCA000
heap
page read and write
3319000
stack
page read and write
13FA091F000
heap
page read and write
2D87000
heap
page read and write
7D60000
unkown
page read and write
16C04AA2000
heap
page read and write
2C468260000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
2BD0000
heap
page read and write
480000
heap
page read and write
56A000
heap
page read and write
720000
unclassified section
page read and write
18F36360000
heap
page read and write
2D97000
heap
page read and write
2800000
trusted library allocation
page read and write
3030000
unkown
page read and write
24603C91000
heap
page read and write
2C468607000
heap
page read and write
16C04B2E000
heap
page read and write
13FA0F01000
heap
page read and write
8D00000
unkown
page read and write
A00000
trusted library allocation
page read and write
13FA0F2A000
heap
page read and write
24603C96000
heap
page read and write
8D00000
unkown
page read and write
3170000
unkown
page read and write
8740000
unkown
page read and write
18F36346000
heap
page read and write
18F36336000
heap
page read and write
1941E995000
heap
page read and write
8D00000
unkown
page read and write
A00000
trusted library allocation
page read and write
A502000
unkown
page read and write
2800000
trusted library allocation
page read and write
18F36324000
heap
page read and write
B150000
unkown
page read and write
2C46807B000
heap
page read and write
7FF5ED7D6000
unkown
page readonly
149BC9F8000
heap
page read and write
13FA0EFC000
heap
page read and write
149BC44A000
heap
page read and write
96DF000
unkown
page read and write
1FA9D97C000
heap
page read and write
194202A0000
heap
page read and write
29388622000
heap
page read and write
A00000
trusted library allocation
page read and write
13FA0F6F000
heap
page read and write
3050000
unkown
page read and write
24603C71000
heap
page read and write
266E280C000
heap
page read and write
7E70000
unkown
page read and write
8D00000
unkown
page read and write
3170000
unkown
page read and write
3460000
unkown
page read and write
266E27FB000
heap
page read and write
2400000
heap
page read and write
13FA098E000
heap
page read and write
CA63000
unkown
page read and write
13FA08E1000
heap
page read and write
2342E5FE000
heap
page read and write
780000
trusted library allocation
page read and write
266E21A0000
trusted library allocation
page read and write
18F36346000
heap
page read and write
C811000
unkown
page read and write
2EF8000
system
page execute and read and write
13FA08FD000
heap
page read and write
3050000
unkown
page read and write
1941E378000
heap
page read and write
A00000
trusted library allocation
page read and write
2C4680EC000
heap
page read and write
7CA0000
unkown
page read and write
23D2787A000
heap
page read and write
8740000
unkown
page read and write
1751691A000
heap
page read and write
2E960E6C000
heap
page read and write
3010000
unkown
page read and write
8740000
unkown
page read and write
18F35F77000
heap
page read and write
1F08FF80000
heap
page read and write
A00000
trusted library allocation
page read and write
7FF5ED695000
unkown
page readonly
29388603000
heap
page read and write
13FA2820000
heap
page read and write
2C6AFFE000
stack
page read and write
3060000
unkown
page read and write
3030000
unkown
page read and write
4C4B000
unkown
page read and write
7E60000
unkown
page read and write
8D00000
unkown
page read and write
25F4000
heap
page read and write
149BCA08000
heap
page read and write
19C000
stack
page read and write
24603C90000
heap
page read and write
2C4680E3000
heap
page read and write
17516682000
heap
page read and write
3170000
unkown
page read and write
266E21D0000
heap
page read and write
3020000
unkown
page read and write
3030000
unkown
page read and write
7FF5ED46A000
unkown
page readonly
451000
unkown
page read and write
16C04A00000
heap
page read and write
1FA9F830000
heap
page read and write
F31A97E000
stack
page read and write
2342E580000
heap
page read and write
149BC4CA000
heap
page read and write
8740000
unkown
page read and write
146EECD000
stack
page read and write
13FA0EFD000
heap
page read and write
2E960E65000
heap
page read and write
8D00000
unkown
page read and write
780000
trusted library allocation
page read and write
A361000
unkown
page read and write
2CD0000
heap
page read and write
57C9000
heap
page read and write
149BCA18000
heap
page read and write
D10000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
3030000
unkown
page read and write
13FA0F87000
heap
page read and write
35A0000
unkown
page readonly
8740000
unkown
page read and write
7FF5ED7DB000
unkown
page readonly
8D00000
unkown
page read and write
8D00000
unkown
page read and write
13FA0954000
heap
page read and write
2C4680F3000
heap
page read and write
A00000
trusted library allocation
page read and write
43B0000
trusted library allocation
page read and write
3030000
unkown
page read and write
7FF5ED404000
unkown
page readonly
1DD5A5C5000
heap
page read and write
2342E5FA000
heap
page read and write
7F30000
unkown
page read and write
C8E1000
unkown
page read and write
16C04B55000
heap
page read and write
1FA9D999000
heap
page read and write
451000
unkown
page read and write
7FF5ED8E2000
unkown
page readonly
2D94000
heap
page read and write
3010000
unkown
page read and write
7E70000
unkown
page read and write
2C4685E0000
heap
page read and write
9877000
unkown
page read and write
19C000
stack
page read and write
4C50000
unkown
page read and write
7C80000
unkown
page read and write
8D00000
unkown
page read and write
3170000
unkown
page read and write
B8B0000
unkown
page read and write
2C4685DF000
heap
page read and write
43B0000
trusted library allocation
page read and write
8D00000
unkown
page read and write
16C0509C000
heap
page read and write
3060000
unkown
page read and write
266E2350000
heap
page read and write
23D27D5F000
heap
page read and write
2DAB000
heap
page read and write
2800000
trusted library allocation
page read and write
13FA0FC9000
heap
page read and write
34E011F000
stack
page read and write
784A000
unkown
page read and write
780000
trusted library allocation
page read and write
2E96159A000
heap
page read and write
24603642000
heap
page read and write
1210000
unkown
page readonly
3030000
unkown
page read and write
BDD0000
unkown
page readonly
8740000
unkown
page read and write
266E280C000
heap
page read and write
24603696000
heap
page read and write
8D00000
unkown
page read and write
16C050A2000
heap
page read and write
8D00000
unkown
page read and write
57DC000
heap
page read and write
24603915000
heap
page read and write
2342E63B000
heap
page read and write
2DC4000
heap
page read and write
7FF5ED33F000
unkown
page readonly
3010000
unkown
page read and write
23D27772000
heap
page read and write
5DD0F77000
stack
page read and write
1FA9D9A3000
heap
page read and write
266E1F90000
heap
page read and write
13FA08EC000
heap
page read and write
8740000
unkown
page read and write
13FA098E000
heap
page read and write
34E0097000
stack
page read and write
13FA0F70000
heap
page read and write
3170000
unkown
page read and write
A00000
trusted library allocation
page read and write
1F0900D7000
heap
page read and write
17516DB9000
heap
page read and write
1941E330000
trusted library allocation
page read and write
7E70000
unkown
page read and write
1ADDA76C000
heap
page read and write
7FF5EDA11000
unkown
page readonly
2C468600000
heap
page read and write
18F35F75000
heap
page read and write
EB0000
heap
page read and write
18F35F73000
heap
page read and write
2C4685F0000
heap
page read and write
3060000
unkown
page read and write
2B80000
heap
page read and write
2800000
trusted library allocation
page read and write
57C9000
heap
page read and write
57C9000
heap
page read and write
2C4686DE000
heap
page read and write
8740000
unkown
page read and write
26DB000
stack
page read and write
2DB2000
heap
page read and write
8EF0000
unkown
page read and write
2E960DB0000
trusted library allocation
page read and write
13FA0955000
heap
page read and write
149BC44A000
heap
page read and write
A00000
trusted library allocation
page read and write
3795000
unkown
page read and write
8D00000
unkown
page read and write
8D00000
unkown
page read and write
580A000
heap
page read and write
1ADDA70E000
heap
page read and write
3060000
unkown
page read and write
3050000
unkown
page read and write
2800000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
1390000
unkown
page read and write
7E70000
unkown
page read and write
D10000
trusted library allocation
page read and write
3030000
unkown
page read and write
2E9615AC000
heap
page read and write
2DCE000
heap
page read and write
57C9000
heap
page read and write
74A89FF000
stack
page read and write
4D0000
heap
page read and write
7FF5ED956000
unkown
page readonly
293885E7000
heap
page read and write
266E27E7000
heap
page read and write
8D00000
unkown
page read and write
7DF4F3050000
unkown
page readonly
16C04B4C000
heap
page read and write
7E70000
unkown
page read and write
29388850000
heap
page read and write
2342E5CF000
heap
page read and write
A00000
trusted library allocation
page read and write
16C06A60000
heap
page read and write
2E960E22000
heap
page read and write
7D40000
unkown
page read and write
97D4000
unkown
page read and write
149BCA08000
heap
page read and write
18F36352000
heap
page read and write
78A0000
unkown
page read and write
A00000
trusted library allocation
page read and write
18F35D12000
heap
page read and write
149BCA02000
heap
page read and write
13FA090F000
heap
page read and write
982D000
unkown
page read and write
1ADDA76D000
heap
page read and write
3010000
unkown
page read and write
16C04AA5000
heap
page read and write
2800000
trusted library allocation
page read and write
8D00000
unkown
page read and write
1DD5A4CC000
heap
page read and write
8740000
unkown
page read and write
18F35D46000
heap
page read and write
23D27D5F000
heap
page read and write
7F50000
unkown
page read and write
37AE000
unkown
page read and write
13FA090F000
heap
page read and write
1941E98F000
heap
page read and write
78AD000
unkown
page read and write
13FA0936000
heap
page read and write
AEBE57F000
stack
page read and write
8D00000
unkown
page read and write
13FA0FD9000
heap
page read and write
20D0000
heap
page read and write
57F0000
heap
page read and write
13FA0936000
heap
page read and write
7FF5ED5A8000
unkown
page readonly
3030000
unkown
page read and write
A00000
trusted library allocation
page read and write
2847000
heap
page read and write
17516692000
heap
page read and write
41D000
unkown
page readonly
7FF5ED42B000
unkown
page readonly
1941E999000
heap
page read and write
246038A3000
heap
page read and write
401000
unkown
page execute read
21C0000
unclassified section
page read and write
2D92000
heap
page read and write
266E4150000
heap
page read and write
1941E97A000
heap
page read and write
2938860C000
heap
page read and write
57DD000
heap
page read and write
16C04B46000
heap
page read and write
13FA08EA000
heap
page read and write
13FA091D000
heap
page read and write
1941E972000
heap
page read and write
29388622000
heap
page read and write
2E960E55000
heap
page read and write
266E27EC000
heap
page read and write
460000
unkown
page readonly
24603C6C000
heap
page read and write
A00000
trusted library allocation
page read and write
7FF5ED9D9000
unkown
page readonly
8D00000
unkown
page read and write
656167F000
stack
page read and write
36D5000
stack
page read and write
13FA08EE000
heap
page read and write
1DD5A4A0000
heap
page read and write
6F82BFF000
stack
page read and write
7FF5ED990000
unkown
page readonly
18F3632A000
heap
page read and write
17516DC4000
heap
page read and write
16C04B42000
heap
page read and write
2D91000
heap
page read and write
8740000
unkown
page read and write
18F3632D000
heap
page read and write
2938860C000
heap
page read and write
17516820000
heap
page read and write
24603638000
heap
page read and write
7FF5ED8A4000
unkown
page readonly
1751691A000
heap
page read and write
3040000
unkown
page read and write
13FA08F3000
heap
page read and write
24603C78000
heap
page read and write
2E960E6C000
heap
page read and write
8D00000
unkown
page read and write
13FA0936000
heap
page read and write
2E9615B1000
heap
page read and write
23D2778C000
heap
page read and write
13FA090F000
heap
page read and write
3010000
unkown
page read and write
8740000
unkown
page read and write
7D90000
unkown
page read and write
1941E393000
heap
page read and write
1941E9A9000
heap
page read and write
780000
trusted library allocation
page read and write
18F36337000
heap
page read and write
37D2000
unkown
page read and write
24603697000
heap
page read and write
B5AE000
stack
page read and write
91B9000
stack
page read and write
43B0000
trusted library allocation
page read and write
18F3632E000
heap
page read and write
7E70000
unkown
page read and write
43B0000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
23D27766000
heap
page read and write
7C47A7F000
stack
page read and write
7FF5ED939000
unkown
page readonly
8740000
unkown
page read and write
2C4680F5000
heap
page read and write
16C05078000
heap
page read and write
A00000
trusted library allocation
page read and write
17516DDB000
heap
page read and write
2C4680FE000
heap
page read and write
1FA9D910000
trusted library allocation
page read and write
8720000
unkown
page readonly
8D00000
unkown
page read and write
8D00000
unkown
page read and write
2D2E000
stack
page read and write
149BC488000
heap
page read and write
7861000
unkown
page read and write
3170000
unkown
page read and write
1941E396000
heap
page read and write
945000
heap
page read and write
B2AC000
stack
page read and write
293885A0000
trusted library allocation
page read and write
780000
trusted library allocation
page read and write
1F0900DB000
heap
page read and write
37F9000
unkown
page read and write
13FA0FB7000
heap
page read and write
23D27766000
heap
page read and write
1DD5C280000
heap
page read and write
9E6C000
stack
page read and write
1ADDA76D000
heap
page read and write
3440000
unkown
page read and write
8D00000
unkown
page read and write
2E9615A8000
heap
page read and write
7E70000
unkown
page read and write
7884000
unkown
page read and write
7F50000
unkown
page read and write
1941E384000
heap
page read and write
13FA090F000
heap
page read and write
2DAD000
heap
page read and write
3040000
unkown
page read and write
1FA9D970000
heap
page read and write
780000
trusted library allocation
page read and write
23D27D6A000
heap
page read and write
8D00000
unkown
page read and write
13FA090D000
heap
page read and write
13FA0FA7000
heap
page read and write
780000
trusted library allocation
page read and write
1FE655B8000
heap
page read and write
29388BBD000
heap
page read and write
8740000
unkown
page read and write
3040000
unkown
page read and write
7F50000
unkown
page read and write
1F0902C0000
heap
page read and write
8D00000
unkown
page read and write
1DD5A5CA000
heap
page read and write
1DD5A387000
heap
page read and write
13FA0EFF000
heap
page read and write
9A5B000
unkown
page read and write
13FA0966000
heap
page read and write
13FA0942000
heap
page read and write
3040000
unkown
page read and write
7C47727000
stack
page read and write
296C0750000
heap
page read and write
3060000
unkown
page read and write
4BC9000
unkown
page read and write
B22B000
stack
page read and write
1ADDA712000
heap
page read and write
780000
trusted library allocation
page read and write
7E70000
unkown
page read and write
29388D6E000
heap
page read and write
C557000
unkown
page read and write
7A0000
heap
page read and write
17516DBC000
heap
page read and write
18F35D55000
heap
page read and write
18F35D5D000
heap
page read and write
3170000
unkown
page read and write
266E2818000
heap
page read and write
266E2811000
heap
page read and write
3797000
unkown
page read and write
3280000
heap
page read and write
29388D6A000
heap
page read and write
3070000
unkown
page read and write
2800000
trusted library allocation
page read and write
43B0000
trusted library allocation
page read and write
1FA9D7F8000
heap
page read and write
13FA090F000
heap
page read and write
146000
system
page execute and read and write
13FA0EF1000
heap
page read and write
7E70000
unkown
page read and write
2D94000
heap
page read and write
13FA090F000
heap
page read and write
3170000
unkown
page read and write
2E961591000
heap
page read and write
1FA9D99C000
heap
page read and write
A00000
trusted library allocation
page read and write
7FF5ED46E000
unkown
page readonly
3170000
unkown
page read and write
3060000
unkown
page read and write
8D00000
unkown
page read and write
13FA0936000
heap
page read and write
13FA08D3000
heap
page read and write
57C9000
heap
page read and write
9C4C7F000
stack
page read and write
7CC0000
unkown
page readonly
A00000
trusted library allocation
page read and write
8D00000
unkown
page read and write
2D20000
trusted library allocation
page read and write
296C06B0000
heap
page read and write
8D00000
unkown
page read and write
13FA09A2000
heap
page read and write
1390000
unkown
page read and write
3440000
unkown
page read and write
818E000
stack
page read and write
13FA0A65000
heap
page read and write
57DC000
heap
page read and write
BD1D000
stack
page read and write
17516DDA000
heap
page read and write
29388634000
heap
page read and write
16C04B36000
heap
page read and write
A00000
trusted library allocation
page read and write
1DD5A3A6000
heap
page read and write
57E4000
heap
page read and write
43B0000
trusted library allocation
page read and write
C57F000
unkown
page read and write
1941E973000
heap
page read and write
2C468600000
heap
page read and write
1ADDA72E000
heap
page read and write
2E960E27000
heap
page read and write
8740000
unkown
page read and write
2D20000
trusted library allocation
page read and write
2C4685E4000
heap
page read and write
7857000
unkown
page read and write
1FA0000
direct allocation
page execute and read and write
7FF5EDA08000
unkown
page readonly
F3D347E000
stack
page read and write
246038AE000
heap
page read and write
3170000
unkown
page read and write
1350000
unkown
page readonly
87B0000
unkown
page read and write
3050000
unkown
page read and write
149BCA08000
heap
page read and write
23D27D6A000
heap
page read and write
149BC4C6000
heap
page read and write
2C468611000
heap
page read and write
18F36354000
heap
page read and write
18F35C70000
trusted library allocation
page read and write
17516DDA000
heap
page read and write
F31A5EF000
stack
page read and write
57C9000
heap
page read and write
13FA0F36000
heap
page read and write
8740000
unkown
page read and write
C523C7D000
stack
page read and write
13FA284D000
heap
page read and write
965C000
stack
page read and write
1941E9A9000
heap
page read and write
4C60000
unkown
page read and write
3010000
unkown
page read and write
1941E98C000
heap
page read and write
D43267F000
stack
page read and write
E188E7F000
stack
page read and write
3170000
unkown
page read and write
7FF6F2D60000
unkown
page readonly
13FA0FC0000
heap
page read and write
2E96157A000
heap
page read and write
3020000
unkown
page read and write
3030000
unkown
page read and write
266E27F1000
heap
page read and write
13FA0936000
heap
page read and write
8740000
unkown
page read and write
1FA9D981000
heap
page read and write
A00000
trusted library allocation
page read and write
CA42000
unkown
page read and write
C6C9000
unkown
page read and write
1ADDA709000
heap
page read and write
2E961594000
heap
page read and write
3050000
unkown
page read and write
18F3631F000
heap
page read and write
7FF6F2D61000
unkown
page execute read
7FF5EDA14000
unkown
page readonly
41D000
unkown
page readonly
8740000
unkown
page read and write
E95000
heap
page read and write
8D00000
unkown
page read and write
460000
unkown
page readonly
1941E97A000
heap
page read and write
1FA9D9A2000
heap
page read and write
3010000
unkown
page read and write
149BC4D2000
heap
page read and write
43B0000
trusted library allocation
page read and write
2D94000
heap
page read and write
8740000
unkown
page read and write
3030000
unkown
page read and write
20ECB555000
heap
page read and write
3050000
unkown
page read and write
3460000
unkown
page read and write
2460391B000
heap
page read and write
7CB60FF000
stack
page read and write
13FA098E000
heap
page read and write
13FA0840000
heap
page read and write
23D27738000
heap
page read and write
8D00000
unkown
page read and write
23D27D80000
heap
page read and write
7FF5ED3DA000
unkown
page readonly
18F35F74000
heap
page read and write
1941E990000
heap
page read and write
530000
direct allocation
page execute and read and write
3040000
unkown
page read and write
16C04A60000
trusted library allocation
page read and write
C92D000
unkown
page read and write
16C05077000
heap
page read and write
87B0000
unkown
page read and write
7FF5ED986000
unkown
page readonly
2E961595000
heap
page read and write
23D2778E000
heap
page read and write
1DD5A4EA000
heap
page read and write
18F35F7A000
heap
page read and write
943E000
stack
page read and write
3170000
unkown
page read and write
3040000
unkown
page read and write
44C000
unkown
page write copy
1F0902C5000
heap
page read and write
A00000
trusted library allocation
page read and write
34E019F000
stack
page read and write
3030000
unkown
page read and write
29388480000
heap
page read and write
13FA0962000
heap
page read and write
7859000
unkown
page read and write
460000
unkown
page readonly
3170000
unkown
page read and write
149BE3B0000
heap
page read and write
7FF5ED534000
unkown
page readonly
3010000
unkown
page read and write
1230000
unkown
page read and write
7FF5EDA47000
unkown
page readonly
1941E98E000
heap
page read and write
43B0000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
23D2778A000
heap
page read and write
13FA0EF7000
heap
page read and write
BD98000
stack
page read and write
C857000
unkown
page read and write
16C04AF8000
heap
page read and write
8210000
unkown
page read and write
1F0900B4000
heap
page read and write
510000
heap
page read and write
7FF5ED9B8000
unkown
page readonly
2C4680E6000
heap
page read and write
143B000
stack
page read and write
2EF1000
system
page execute and read and write
C89A000
unkown
page read and write
2343036C000
heap
page read and write
2E960E46000
heap
page read and write
7E70000
unkown
page read and write
7FF5ED4B0000
unkown
page readonly
1ADDA6E6000
heap
page read and write
18F35F70000
heap
page read and write
2E960DB0000
trusted library allocation
page read and write
2E96159A000
heap
page read and write
13FA2821000
heap
page read and write
8D00000
unkown
page read and write
1F0900E5000
heap
page read and write
2C4686D5000
heap
page read and write
1941E38E000
heap
page read and write
296C04A0000
heap
page read and write
40B000
unkown
page execute read
C7C5000
unkown
page read and write
1DD5A4CF000
heap
page read and write
13FA08E7000
heap
page read and write
16C05099000
heap
page read and write
16C05070000
heap
page read and write
13FA0F57000
heap
page read and write
1FA9D826000
heap
page read and write
8BEE000
stack
page read and write
2C4686DB000
heap
page read and write
57F3000
heap
page read and write
7E70000
unkown
page read and write
7E70000
unkown
page read and write
7FF5ED818000
unkown
page readonly
2DA7000
heap
page read and write
2E9615AE000
heap
page read and write
7FF5ED68C000
unkown
page readonly
7FF5ED9BE000
unkown
page readonly
1DD5A3D7000
heap
page read and write
780000
trusted library allocation
page read and write
1FA9D98C000
heap
page read and write
D10000
trusted library allocation
page read and write
11F5000
heap
page read and write
27A20A80000
heap
page read and write
20ECB560000
heap
page read and write
4BE1000
unkown
page read and write
7FF5ED4C6000
unkown
page readonly
18F35D08000
heap
page read and write
A00000
trusted library allocation
page read and write
3240000
unkown
page read and write
A00000
trusted library allocation
page read and write
EBC000
heap
page read and write
8D00000
unkown
page read and write
13FA2A31000
heap
page read and write
2840000
heap
page read and write
57E7000
heap
page read and write
401000
unkown
page execute read
95DB000
stack
page read and write
7E70000
unkown
page read and write
13FA08A2000
heap
page read and write
8740000
unkown
page read and write
29388BD4000
heap
page read and write
149BC445000
heap
page read and write
13FA0F29000
heap
page read and write
8D00000
unkown
page read and write
A00000
trusted library allocation
page read and write
16C04A60000
trusted library allocation
page read and write
A19F000
stack
page read and write
2DB2000
heap
page read and write
17516DCA000
heap
page read and write
23D27D59000
heap
page read and write
23D27D40000
heap
page read and write
13FA090F000
heap
page read and write
CA20000
unkown
page read and write
18F35FC5000
heap
page read and write
1ADDA769000
heap
page read and write
17516600000
heap
page read and write
9869000
unkown
page read and write
8D00000
unkown
page read and write
13FA08FE000
heap
page read and write
1FA9D84D000
heap
page read and write
2342E645000
heap
page read and write
1941E495000
heap
page read and write
16C04B42000
heap
page read and write
2D20000
trusted library allocation
page read and write
29388BAC000
heap
page read and write
8740000
unkown
page read and write
17516DDA000
heap
page read and write
18F3632D000
heap
page read and write
149BCA04000
heap
page read and write
1FA9D98C000
heap
page read and write
2C4680E9000
heap
page read and write
3060000
unkown
page read and write
3060000
unkown
page read and write
A00000
trusted library allocation
page read and write
2C6ABCF000
stack
page read and write
8D00000
unkown
page read and write
3210000
unkown
page read and write
7FF5EDA31000
unkown
page readonly
1FA9D826000
heap
page read and write
E188C7F000
stack
page read and write
4DE000
heap
page read and write
8D00000
unkown
page read and write
9550000
unkown
page readonly
3030000
unkown
page read and write
A00000
trusted library allocation
page read and write
8D00000
unkown
page read and write
7FF5ECED2000
unkown
page readonly
13FA08E7000
heap
page read and write
16C04B42000
heap
page read and write
5590000
unkown
page write copy
8740000
unkown
page read and write
4470000
heap
page read and write
23D27D47000
heap
page read and write
8D00000
unkown
page read and write
18F3634E000
heap
page read and write
2D91000
heap
page read and write
3050000
unkown
page read and write
3460000
unkown
page read and write
2E960E61000
heap
page read and write
7FF5EDA76000
unkown
page readonly
8D00000
unkown
page read and write
23D27D70000
heap
page read and write
7FF5ED71E000
unkown
page readonly
149BC4A7000
heap
page read and write
8D00000
unkown
page read and write
1F0900D7000
heap
page read and write
266E2012000
heap
page read and write
7D60000
unkown
page read and write
10D000
stack
page read and write
13FA0936000
heap
page read and write
17516DD0000
heap
page read and write
3020000
unkown
page read and write
940000
heap
page read and write
29388BBD000
heap
page read and write
29388BAC000
heap
page read and write
2C468070000
heap
page read and write
1FA9D977000
heap
page read and write
8D00000
unkown
page read and write
2800000
trusted library allocation
page read and write
18F36320000
heap
page read and write
2C4685DC000
heap
page read and write
1941E4A0000
trusted library allocation
page read and write
2C4680E3000
heap
page read and write
3010000
unkown
page read and write
57FC000
heap
page read and write
401000
unkown
page execute read
1941E39C000
heap
page read and write
7FF5ED4A1000
unkown
page readonly
CD9000
system
page execute and read and write
7FF5ED41C000
unkown
page readonly
41D000
unkown
page readonly
14719FF000
stack
page read and write
9893000
unkown
page read and write
293885E2000
heap
page read and write
18F36338000
heap
page read and write
7E70000
unkown
page read and write
D10000
trusted library allocation
page read and write
13FA0F54000
heap
page read and write
149BC488000
heap
page read and write
9C000
stack
page read and write
B640000
unkown
page read and write
44C000
unkown
page write copy
18F36336000
heap
page read and write
1751691A000
heap
page read and write
D43277E000
stack
page read and write
18F36338000
heap
page read and write
A37D000
unkown
page read and write
13FA0FB7000
heap
page read and write
1FA9D910000
trusted library allocation
page read and write
5EAB877000
stack
page read and write
3800000
unkown
page readonly
3170000
unkown
page read and write
A00000
trusted library allocation
page read and write
266E2803000
heap
page read and write
3050000
unkown
page read and write
9795000
unkown
page read and write
8740000
unkown
page read and write
7E70000
unkown
page read and write
2800000
trusted library allocation
page read and write
1DD5A4CC000
heap
page read and write
266E4160000
heap
page read and write
2D87000
heap
page read and write
16C0507E000
heap
page read and write
2C4686D3000
heap
page read and write
23D27D76000
heap
page read and write
1FA9D845000
heap
page read and write
8740000
unkown
page read and write
B140000
unkown
page readonly
3440000
unkown
page read and write
13FA0936000
heap
page read and write
3440000
unkown
page read and write
7E70000
unkown
page read and write
2E96157E000
heap
page read and write
8750000
unkown
page read and write
18F35D8F000
heap
page read and write
AB51000
unkown
page read and write
2D40000
remote allocation
page read and write
E188D7E000
stack
page read and write
1DD5A3B4000
heap
page read and write
7FF5ED476000
unkown
page readonly
18F35D36000
heap
page read and write
7F40000
unkown
page readonly
1ADDA761000
heap
page read and write
149BC44B000
heap
page read and write
3170000
unkown
page read and write
3040000
unkown
page read and write
1FA9D940000
heap
page read and write
13FA0936000
heap
page read and write
7FF5ED55F000
unkown
page readonly
24603682000
heap
page read and write
2D94000
heap
page read and write
24603C60000
heap
page read and write
43B0000
trusted library allocation
page read and write
C08A000
stack
page read and write
1DD5A5C7000
heap
page read and write
16C06940000
heap
page read and write
7FF5ED71B000
unkown
page readonly
43B0000
trusted library allocation
page read and write
A21E000
stack
page read and write
3050000
unkown
page read and write
7FF5ED9CC000
unkown
page readonly
57DF000
heap
page read and write
57E3000
heap
page read and write
7FF5ED9D6000
unkown
page readonly
8D00000
unkown
page read and write
1DD5A250000
heap
page read and write
2C468600000
heap
page read and write
266E22C2000
heap
page read and write
500000
heap
page read and write
3010000
unkown
page read and write
1FA9D97C000
heap
page read and write
266E21A0000
trusted library allocation
page read and write
45F0000
trusted library allocation
page read and write
2938862C000
heap
page read and write
A00000
trusted library allocation
page read and write
8D00000
unkown
page read and write
79B1000
unkown
page read and write
29388CF0000
heap
page read and write
2D97000
heap
page read and write
40F000
unkown
page readonly
2800000
trusted library allocation
page read and write
43B0000
trusted library allocation
page read and write
E89158F000
stack
page read and write
266E2803000
heap
page read and write
8D00000
unkown
page read and write
3170000
unkown
page read and write
3170000
unkown
page read and write
3060000
unkown
page read and write
29388614000
heap
page read and write
8D00000
unkown
page read and write
13FA0F07000
heap
page read and write
1DD5A4F0000
heap
page read and write
C544000
unkown
page read and write
8740000
unkown
page read and write
8740000
unkown
page read and write
8D00000
unkown
page read and write
13FA08EA000
heap
page read and write
3030000
unkown
page read and write
23D27D5F000
heap
page read and write
17516668000
heap
page read and write
3050000
unkown
page read and write
3170000
unkown
page read and write
20C0000
heap
page read and write
2E960DE0000
heap
page read and write
266E22C4000
heap
page read and write
296C0755000
heap
page read and write
23D27D5A000
heap
page read and write
1ADDA6C8000
heap
page read and write
A433000
unkown
page read and write
2C20000
heap
page read and write
2800000
trusted library allocation
page read and write
3060000
unkown
page read and write
3010000
unkown
page read and write
7FF5ED28E000
unkown
page readonly
218F000
stack
page read and write
2E961587000
heap
page read and write
3080000
unkown
page read and write
A00000
trusted library allocation
page read and write
7FF5ED602000
unkown
page readonly
3060000
unkown
page read and write
55CD000
heap
page read and write
8D00000
unkown
page read and write
A00000
trusted library allocation
page read and write
17516DD0000
heap
page read and write
29388BD0000
heap
page read and write
13FA08E1000
heap
page read and write
48A000
heap
page read and write
2342E600000
heap
page read and write
8D00000
unkown
page read and write
4EDB000
heap
page read and write
10EA6000
unkown
page read and write
3030000
unkown
page read and write
13FA0964000
heap
page read and write
C9B000
stack
page read and write
3060000
unkown
page read and write
2C4680EC000
heap
page read and write
29388D6B000
heap
page read and write
8740000
unkown
page read and write
8D00000
unkown
page read and write
43B0000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
17516DB0000
heap
page read and write
2C468075000
heap
page read and write
3070000
unkown
page read and write
8EF0000
unkown
page read and write
8740000
unkown
page read and write
EB3000
heap
page read and write
8D00000
unkown
page read and write
2DAA000
heap
page read and write
266E2001000
heap
page read and write
8D00000
unkown
page read and write
266E2803000
heap
page read and write
23D27D51000
heap
page read and write
9798000
unkown
page read and write
1DD5A5CA000
heap
page read and write
2C468602000
heap
page read and write
29388BD3000
heap
page read and write
1ADDA6F7000
heap
page read and write
3430000
heap
page read and write
D10000
trusted library allocation
page read and write
8D00000
unkown
page read and write
16C05089000
heap
page read and write
3460000
unkown
page read and write
13FA0F01000
heap
page read and write
13FA09AE000
heap
page read and write
44B000
unkown
page read and write
11F0000
heap
page read and write
7FF5ED52F000
unkown
page readonly
3010000
unkown
page read and write
1941E97A000
heap
page read and write
3170000
unkown
page read and write
13FA0F09000
heap
page read and write
3170000
unkown
page read and write
1FA9D84B000
heap
page read and write
25F4000
heap
page read and write
9C000
stack
page read and write
8D00000
unkown
page read and write
8740000
unkown
page read and write
24603C72000
heap
page read and write
29388622000
heap
page read and write
3030000
unkown
page read and write
777000
system
page execute and read and write
3170000
unkown
page read and write
7DF4F3041000
unkown
page execute read
9C4DFF000
stack
page read and write
1DD5A3A8000
heap
page read and write
1F0900B2000
heap
page read and write
986B000
unkown
page read and write
3010000
unkown
page read and write
2C4680E9000
heap
page read and write
29388BBD000
heap
page read and write
1FA9D9A1000
heap
page read and write
29388BB3000
heap
page read and write
7FF5ED6B9000
unkown
page readonly
8740000
unkown
page read and write
3060000
unkown
page read and write
C516000
unkown
page read and write
17516DB7000
heap
page read and write
7FF5ED800000
unkown
page readonly
3060000
unkown
page read and write
93DFA7F000
stack
page read and write
8740000
unkown
page read and write
3010000
unkown
page read and write
BDC0000
unkown
page readonly
3050000
unkown
page read and write
13FA08A7000
heap
page read and write
18F36346000
heap
page read and write
3030000
unkown
page read and write
8D00000
unkown
page read and write
D10000
trusted library allocation
page read and write
7A34000
unkown
page read and write
25F4000
heap
page read and write
8000000
unkown
page read and write
29388BBD000
heap
page read and write
E90000
heap
page read and write
1FA9D7D0000
heap
page read and write
1FA9D846000
heap
page read and write
17516DDC000
heap
page read and write
2D94000
heap
page read and write
3050000
unkown
page read and write
146EF4F000
stack
page read and write
43B0000
trusted library allocation
page read and write
9881000
unkown
page read and write
3030000
unkown
page read and write
2D8F000
heap
page read and write
1DD5A470000
trusted library allocation
page read and write
1DD5A5CA000
heap
page read and write
18F35D3F000
heap
page read and write
2342E5E6000
heap
page read and write
17516DDA000
heap
page read and write
24603C78000
heap
page read and write
13FA090D000
heap
page read and write
18F35D68000
heap
page read and write
293886D0000
trusted library allocation
page read and write
460000
unkown
page readonly
266E2005000
heap
page read and write
2E96157E000
heap
page read and write
29388810000
heap
page read and write
23D29670000
heap
page read and write
18F35D52000
heap
page read and write
8D00000
unkown
page read and write
16C04B02000
heap
page read and write
17516DDE000
heap
page read and write
45F0000
trusted library allocation
page read and write
18F36338000
heap
page read and write
1FA9DA8A000
heap
page read and write
3010000
unkown
page read and write
23D27747000
heap
page read and write
1941E988000
heap
page read and write
8B60000
unkown
page readonly
780000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
1F0900D7000
heap
page read and write
1FA9D9A2000
heap
page read and write
18F3635C000
heap
page read and write
266E22CE000
heap
page read and write
A391000
unkown
page read and write
8D00000
unkown
page read and write
987D000
unkown
page read and write
3050000
unkown
page read and write
266E280C000
heap
page read and write
7E70000
unkown
page read and write
7D60000
unkown
page read and write
17516620000
trusted library allocation
page read and write
149BE3A0000
heap
page read and write
7FF5ED64F000
unkown
page readonly
3030000
unkown
page read and write
24603600000
heap
page read and write
27B7000
system
page execute and read and write
41D000
unkown
page readonly
43B0000
trusted library allocation
page read and write
3010000
unkown
page read and write
8740000
unkown
page read and write
D10000
trusted library allocation
page read and write
8D00000
unkown
page read and write
7FF5ED337000
unkown
page readonly
16C04A5B000
heap
page read and write
8740000
unkown
page read and write
3040000
unkown
page read and write
1FA9D8F0000
heap
page read and write
1DE9BBB8000
heap
page read and write
780000
trusted library allocation
page read and write
10EE4000
unkown
page read and write
7FF5ED743000
unkown
page readonly
2E961575000
heap
page read and write
977A000
unkown
page read and write
1ADDA6EC000
heap
page read and write
7FF000
stack
page read and write
43B0000
trusted library allocation
page read and write
4C18000
unkown
page read and write
23D27D6D000
heap
page read and write
1ADDA727000
heap
page read and write
24603C8F000
heap
page read and write
C51E000
unkown
page read and write
1ADDA6F7000
heap
page read and write
43B0000
trusted library allocation
page read and write
2C4680E9000
heap
page read and write
9879000
unkown
page read and write
3010000
unkown
page read and write
2C468600000
heap
page read and write
A00000
trusted library allocation
page read and write
3010000
unkown
page read and write
7FF5ED3CE000
unkown
page readonly
18F35C70000
trusted library allocation
page read and write
2E9615A8000
heap
page read and write
C846000
unkown
page read and write
16C04B35000
heap
page read and write
7FF5ED867000
unkown
page readonly
13FA0A6A000
heap
page read and write
3070000
unkown
page read and write
23D27877000
heap
page read and write
13FA0F09000
heap
page read and write
7FF5ED94A000
unkown
page readonly
97C3000
unkown
page read and write
266E201C000
heap
page read and write
A39B000
unkown
page read and write
1FA9D999000
heap
page read and write
43B0000
trusted library allocation
page read and write
3170000
unkown
page read and write
266E22C7000
heap
page read and write
780000
trusted library allocation
page read and write
7E70000
unkown
page read and write
25F4000
heap
page read and write
266E27F5000
heap
page read and write
1F0000
heap
page read and write
3060000
unkown
page read and write
13FA0F77000
heap
page read and write
1941E974000
heap
page read and write
8D00000
unkown
page read and write
13FA2821000
heap
page read and write
24603620000
trusted library allocation
page read and write
16C050A2000
heap
page read and write
18F36338000
heap
page read and write
8D00000
unkown
page read and write
1941E49A000
heap
page read and write
17516914000
heap
page read and write
A00000
trusted library allocation
page read and write
2C4685DC000
heap
page read and write
8D00000
unkown
page read and write
51D5000
heap
page read and write
8D00000
unkown
page read and write
787C000
unkown
page read and write
3170000
unkown
page read and write
1941E987000
heap
page read and write
3170000
unkown
page read and write
13FA090F000
heap
page read and write
1941E9AA000
heap
page read and write
5DD0FFF000
stack
page read and write
24603696000
heap
page read and write
8740000
unkown
page read and write
1DD5A378000
heap
page read and write
1ADDA724000
heap
page read and write
5EABA7E000
stack
page read and write
A00000
trusted library allocation
page read and write
A379000
unkown
page read and write
8EF0000
unkown
page read and write
2E961580000
heap
page read and write
480000
heap
page read and write
1FA9D826000
heap
page read and write
7FF5EDA0B000
unkown
page readonly
9A10000
unkown
page read and write
CB5A000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
18F35D59000
heap
page read and write
29388BBD000
heap
page read and write
41D000
unkown
page readonly
17516DDF000
heap
page read and write
7FF5ED9D2000
unkown
page readonly
53D1000
heap
page read and write
4ACF000
stack
page read and write
1941E9A9000
heap
page read and write
3060000
unkown
page read and write
7E70000
unkown
page read and write
13FA0A60000
heap
page read and write
3460000
unkown
page read and write
18F35D59000
heap
page read and write
3050000
unkown
page read and write
18F36325000
heap
page read and write
13FA08F5000
heap
page read and write
8740000
unkown
page read and write
A375000
unkown
page read and write
460000
unkown
page readonly
13FA0F0C000
heap
page read and write
9F1E000
stack
page read and write
7867000
unkown
page read and write
6F82FFE000
stack
page read and write
40F000
unkown
page readonly
1ADDA75C000
heap
page read and write
1DD5A5C7000
heap
page read and write
8D00000
unkown
page read and write
1941E230000
heap
page read and write
7D60000
unkown
page read and write
7FF5ED3D6000
unkown
page readonly
45F0000
trusted library allocation
page read and write
10F24000
unkown
page read and write
1ADDA690000
heap
page read and write
1DD5A37E000
heap
page read and write
29388BB9000
heap
page read and write
43B0000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
7C47B7F000
stack
page read and write
8740000
unkown
page read and write
400000
unkown
page execute and read and write
17516690000
heap
page read and write
7DF4F3071000
unkown
page execute read
3170000
unkown
page read and write
23D27793000
heap
page read and write
23D29680000
heap
page read and write
7FF5ED9CA000
unkown
page readonly
1941E999000
heap
page read and write
17516DBF000
heap
page read and write
2C4685D7000
heap
page read and write
7FF5ED872000
unkown
page readonly
2C4680C7000
heap
page read and write
AB5A000
unkown
page read and write
3020000
unkown
page read and write
7FF5ED77C000
unkown
page readonly
24603C67000
heap
page read and write
7FF5ED692000
unkown
page readonly
266E22CE000
heap
page read and write
3170000
unkown
page read and write
9D64000
unkown
page read and write
1FA9D910000
trusted library allocation
page read and write
AEBE47D000
stack
page read and write
2B8D000
stack
page read and write
13FA0904000
heap
page read and write
293885A0000
trusted library allocation
page read and write
5C0000
direct allocation
page read and write
4B56000
unkown
page read and write
7E70000
unkown
page read and write
FDE4000
unkown
page read and write
4C1E000
unkown
page read and write
7FFE000
stack
page read and write
13FA08F3000
heap
page read and write
3010000
unkown
page read and write
23D27830000
trusted library allocation
page read and write
8D00000
unkown
page read and write
13FA08C5000
heap
page read and write
7F50000
unkown
page read and write
29388BB1000
heap
page read and write
2C4686D4000
heap
page read and write
AAF2000
unkown
page read and write
3010000
unkown
page read and write
2C4685F7000
heap
page read and write
22FEDE00000
heap
page read and write
C84D000
unkown
page read and write
3170000
unkown
page read and write
1941E373000
heap
page read and write
24603C8F000
heap
page read and write
13FA0F94000
heap
page read and write
13FA0FB7000
heap
page read and write
2D88000
heap
page read and write
8740000
unkown
page read and write
147187F000
stack
page read and write
A00000
trusted library allocation
page read and write
16C0507C000
heap
page read and write
23D27D7B000
heap
page read and write
7FF5ED80C000
unkown
page readonly
40F000
unkown
page readonly
2C468090000
heap
page read and write
8208000
stack
page read and write
7FF5EDA38000
unkown
page readonly
D10000
trusted library allocation
page read and write
2C6AB47000
stack
page read and write
23D27710000
heap
page read and write
8740000
unkown
page read and write
8D00000
unkown
page read and write
57FC000
heap
page read and write
23D2778E000
heap
page read and write
F3D327F000
stack
page read and write
57C9000
heap
page read and write
E188CFF000
stack
page read and write
400000
unkown
page readonly
C512000
unkown
page read and write
2C4680A7000
heap
page read and write
13FA28D8000
heap
page read and write
8D00000
unkown
page read and write
2260000
heap
page read and write
A00000
trusted library allocation
page read and write
3010000
unkown
page read and write
8D00000
unkown
page read and write
1ADDA717000
heap
page read and write
9C4D7E000
stack
page read and write
13FA0F12000
heap
page read and write
266E27F4000
heap
page read and write
18F3631E000
heap
page read and write
2C4680E9000
heap
page read and write
7FF5ED505000
unkown
page readonly
3170000
unkown
page read and write
16C04B26000
heap
page read and write
2C4680E9000
heap
page read and write
1483000
heap
page read and write
13FA090F000
heap
page read and write
7FF5ED644000
unkown
page readonly
7CB607F000
stack
page read and write
13FA098E000
heap
page read and write
3460000
unkown
page read and write
82F000
stack
page read and write
1DE9BBB0000
heap
page read and write
246038AA000
heap
page read and write
1FA9D989000
heap
page read and write
A494000
unkown
page read and write
4330000
unclassified section
page read and write
780000
trusted library allocation
page read and write
8740000
unkown
page read and write
2E960D90000
heap
page read and write
149BC4AA000
heap
page read and write
2E960E64000
heap
page read and write
3440000
unkown
page read and write
23D27D53000
heap
page read and write
797D000
unkown
page read and write
EAF000
heap
page read and write
18F3632B000
heap
page read and write
6F82F7E000
stack
page read and write
1DD5A3D1000
heap
page read and write
23D278BB000
heap
page read and write
8F5358F000
stack
page read and write
1F090098000
heap
page read and write
17516638000
heap
page read and write
93DF76D000
stack
page read and write
246038A0000
heap
page read and write
7DF4F3051000
unkown
page execute read
A00000
trusted library allocation
page read and write
40F000
unkown
page readonly
43B0000
trusted library allocation
page read and write
8740000
unkown
page read and write
786B000
unkown
page read and write
2DAF000
heap
page read and write
57C9000
heap
page read and write
57E7000
heap
page read and write
43B0000
trusted library allocation
page read and write
24603685000
heap
page read and write
2D88000
heap
page read and write
246038AA000
heap
page read and write
18F37C50000
heap
page read and write
7FF5ED87D000
unkown
page readonly
1FA9D84D000
heap
page read and write
57C9000
heap
page read and write
400000
unkown
page readonly
4CE0000
unkown
page read and write
29388BC9000
heap
page read and write
A00000
trusted library allocation
page read and write
25F0000
heap
page read and write
149BC444000
heap
page read and write
23D27799000
heap
page read and write
8740000
unkown
page read and write
2DDC000
heap
page read and write
13FA0FC0000
heap
page read and write
149BC3C0000
trusted library allocation
page read and write
17516DD0000
heap
page read and write
8D00000
unkown
page read and write
8D00000
unkown
page read and write
1ADDA71C000
heap
page read and write
7695000
stack
page read and write
7FF5ED844000
unkown
page readonly
A00000
trusted library allocation
page read and write
2D9E000
heap
page read and write
2C6AF7E000
stack
page read and write
530000
heap
page read and write
A00000
trusted library allocation
page read and write
16C050A1000
heap
page read and write
1751691B000
heap
page read and write
2D40000
remote allocation
page read and write
266E2002000
heap
page read and write
1FA9D947000
heap
page read and write
2D94000
heap
page read and write
1941E330000
trusted library allocation
page read and write
24603C8F000
heap
page read and write
13FA09AA000
heap
page read and write
3460000
unkown
page read and write
8EF0000
unkown
page read and write
17516912000
heap
page read and write
8BF0000
unkown
page readonly
7E70000
unkown
page read and write
1FA9D98C000
heap
page read and write
266E27F2000
heap
page read and write
69D22FF000
stack
page read and write
D10000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
1E4000
heap
page read and write
7B80000
unkown
page read and write
24603696000
heap
page read and write
2800000
trusted library allocation
page read and write
1F0900DC000
heap
page read and write
7FF5ED5C5000
unkown
page readonly
7FF5ED625000
unkown
page readonly
8D00000
unkown
page read and write
C523CFF000
stack
page read and write
780000
trusted library allocation
page read and write
8EC6000
unkown
page read and write
1751691E000
heap
page read and write
13FA09AA000
heap
page read and write
266E1F80000
heap
page read and write
7FF5ED556000
unkown
page readonly
1941E98C000
heap
page read and write
2E96159A000
heap
page read and write
2E961592000
heap
page read and write
AAF6000
unkown
page read and write
7FF5EDA70000
unkown
page readonly
246035E0000
heap
page read and write
A00000
trusted library allocation
page read and write
780000
trusted library allocation
page read and write
3170000
unkown
page read and write
23D27610000
heap
page read and write
57C9000
heap
page read and write
3170000
unkown
page read and write
8740000
unkown
page read and write
2380000
heap
page read and write
3060000
unkown
page read and write
2800000
trusted library allocation
page read and write
293885D8000
heap
page read and write
266E1FB0000
heap
page read and write
2342E650000
heap
page read and write
24603C8F000
heap
page read and write
9C4CFF000
stack
page read and write
8D00000
unkown
page read and write
2E961598000
heap
page read and write
266E27E0000
heap
page read and write
16C05089000
heap
page read and write
13FA098E000
heap
page read and write
1DD5A3C7000
heap
page read and write
8D00000
unkown
page read and write
16C04A55000
heap
page read and write
16C04B31000
heap
page read and write
B00E000
stack
page read and write
780000
trusted library allocation
page read and write
1DD5A4D5000
heap
page read and write
69D237E000
stack
page read and write
C10A000
stack
page read and write
2342E589000
heap
page read and write
A00000
trusted library allocation
page read and write
29388BCD000
heap
page read and write
8D00000
unkown
page read and write
2D89000
heap
page read and write
8EF0000
unkown
page read and write
23D2787E000
heap
page read and write
7FF5ED74A000
unkown
page readonly
620000
heap
page read and write
550000
heap
page read and write
18F35D17000
heap
page read and write
29388BA0000
heap
page read and write
13FA098E000
heap
page read and write
4CC000
heap
page read and write
10E63000
unkown
page read and write
CB78000
unkown
page read and write
8740000
unkown
page read and write
43B0000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
13FA0EF2000
heap
page read and write
23D278B5000
heap
page read and write
43B0000
trusted library allocation
page read and write
293885E7000
heap
page read and write
13FA08F2000
heap
page read and write
13FA09AE000
heap
page read and write
44B000
unkown
page write copy
FDDD000
unkown
page read and write
401000
unkown
page execute read
3170000
unkown
page read and write
266E27FB000
heap
page read and write
23D276F0000
heap
page read and write
29388BB9000
heap
page read and write
2E9615B2000
heap
page read and write
A00000
trusted library allocation
page read and write
D4327FE000
stack
page read and write
3580000
unkown
page readonly
2C468610000
heap
page read and write
18F3632B000
heap
page read and write
24603666000
heap
page read and write
1DD5A4D5000
heap
page read and write
76C0000
unkown
page read and write
3010000
unkown
page read and write
1DE9BB20000
heap
page read and write
23D27D73000
heap
page read and write
1ADDA7C0000
heap
page read and write
56CB000
heap
page read and write
3756000
unkown
page read and write
18F35C30000
heap
page read and write
7D90000
unkown
page read and write
A00000
trusted library allocation
page read and write
8D00000
unkown
page read and write
55CD000
heap
page read and write
1ADDA720000
heap
page read and write
18F36346000
heap
page read and write
CA7C000
unkown
page read and write
8740000
unkown
page read and write
23D27766000
heap
page read and write
4B90000
unkown
page read and write
1941E9AC000
heap
page read and write
266E2803000
heap
page read and write
13FA0890000
heap
page read and write
4CC0000
unkown
page read and write
1751692B000
heap
page read and write
7FF5ED8C1000
unkown
page readonly
2C4680A2000
heap
page read and write
7E70000
unkown
page read and write
2C4685F7000
heap
page read and write
17516685000
heap
page read and write
B10D000
stack
page read and write
3170000
unkown
page read and write
8750000
unkown
page read and write
149BC442000
heap
page read and write
7E70000
unkown
page read and write
7FF5ED8AC000
unkown
page readonly
3050000
unkown
page read and write
A00000
trusted library allocation
page read and write
266E27F0000
heap
page read and write
3791000
unkown
page read and write
13FA09AB000
heap
page read and write
13FA09C0000
heap
page read and write
EAF000
heap
page read and write
AF0B000
stack
page read and write
57F0000
heap
page read and write
451000
unkown
page read and write
2D8E000
heap
page read and write
2C4685ED000
heap
page read and write
E5F000
stack
page read and write
89E0000
unkown
page read and write
2F40000
heap
page read and write
16C04B07000
heap
page read and write
1DD5A4D9000
heap
page read and write
7E70000
unkown
page read and write
400000
unkown
page execute and read and write
57C9000
heap
page read and write
13FA090F000
heap
page read and write
2420000
heap
page read and write
29388625000
heap
page read and write
3050000
unkown
page read and write
149BC455000
heap
page read and write
2E96159A000
heap
page read and write
13FA0899000
heap
page read and write
1FA9D97E000
heap
page read and write
43B0000
trusted library allocation
page read and write
57E7000
heap
page read and write
8D00000
unkown
page read and write
1FA9D852000
heap
page read and write
2DBD000
heap
page read and write
24605520000
heap
page read and write
8D00000
unkown
page read and write
3659000
stack
page read and write
8740000
unkown
page read and write
23D27786000
heap
page read and write
45F0000
trusted library allocation
page read and write
7FF5ED451000
unkown
page readonly
2C4686DE000
heap
page read and write
2800000
trusted library allocation
page read and write
3060000
unkown
page read and write
43B0000
trusted library allocation
page read and write
25F4000
heap
page read and write
89A0000
unkown
page read and write
2800000
trusted library allocation
page read and write
23D27783000
heap
page read and write
A00000
trusted library allocation
page read and write
13FA090F000
heap
page read and write
8D00000
unkown
page read and write
3170000
unkown
page read and write
3738000
unkown
page read and write
C964000
unkown
page read and write
17516665000
heap
page read and write
29388D67000
heap
page read and write
16C04A50000
heap
page read and write
29388BA9000
heap
page read and write
2DAB000
heap
page read and write
52A000
heap
page read and write
146EFCF000
stack
page read and write
7865000
unkown
page read and write
7E70000
unkown
page read and write
43B0000
trusted library allocation
page read and write
3040000
unkown
page read and write
2190000
heap
page read and write
B629000
stack
page read and write
23D2779E000
heap
page read and write
C561000
unkown
page read and write
17516800000
trusted library allocation
page read and write
2342E520000
heap
page read and write
3170000
unkown
page read and write
57E7000
heap
page read and write
7FF5ED4E8000
unkown
page readonly
61E000
stack
page read and write
1DD5A4D1000
heap
page read and write
7E11000
unkown
page read and write
18F35F77000
heap
page read and write
1FE656B0000
heap
page read and write
4BA6000
unkown
page read and write
13FA0880000
trusted library allocation
page read and write
3460000
unkown
page read and write
17516DC8000
heap
page read and write
308A000
stack
page read and write
57EC000
heap
page read and write
3010000
unkown
page read and write
8740000
unkown
page read and write
13FA0F66000
heap
page read and write
4698000
heap
page read and write
2342E835000
heap
page read and write
13FA28A9000
heap
page read and write
560000
heap
page read and write
2D40000
remote allocation
page read and write
13FA098E000
heap
page read and write
3060000
unkown
page read and write
8D00000
unkown
page read and write
2D94000
heap
page read and write
B650000
unkown
page read and write
1FA9D942000
heap
page read and write
24603910000
heap
page read and write
A00000
trusted library allocation
page read and write
29388632000
heap
page read and write
A00000
trusted library allocation
page read and write
4B78000
unkown
page read and write
3060000
unkown
page read and write
37AC000
unkown
page read and write
3060000
unkown
page read and write
17516920000
heap
page read and write
18F3631C000
heap
page read and write
75E000
heap
page read and write
1ADDA8F5000
heap
page read and write
7FF5ED507000
unkown
page readonly
8D00000
unkown
page read and write
24603647000
heap
page read and write
8EF0000
unkown
page read and write
24603C97000
heap
page read and write
74A85AE000
stack
page read and write
7FF5ED849000
unkown
page readonly
7D0000
heap
page read and write
2D8B000
heap
page read and write
17516687000
heap
page read and write
1DE9BA40000
heap
page read and write
3050000
unkown
page read and write
16C0509C000
heap
page read and write
AE3000
heap
page read and write
43B0000
trusted library allocation
page read and write
23D27772000
heap
page read and write
2342E58C000
heap
page read and write
1DD5A4F5000
heap
page read and write
1FA9D94E000
heap
page read and write
1FA9D807000
heap
page read and write
8D00000
unkown
page read and write
7F50000
unkown
page read and write
34E047E000
stack
page read and write
7FF5ED426000
unkown
page readonly
18F35F7A000
heap
page read and write
24603685000
heap
page read and write
3050000
unkown
page read and write
266E22CA000
heap
page read and write
8D00000
unkown
page read and write
A00000
trusted library allocation
page read and write
29388622000
heap
page read and write
13FA0957000
heap
page read and write
8740000
unkown
page read and write
2C25000
heap
page read and write
7FF5ED4C2000
unkown
page readonly
17516675000
heap
page read and write
8EF0000
unkown
page read and write
2DB6000
heap
page read and write
314F000
unkown
page read and write
2460368B000
heap
page read and write
A00000
trusted library allocation
page read and write
7C47AFE000
stack
page read and write
7FF5ED781000
unkown
page readonly
57F0000
heap
page read and write
5641000
unkown
page read and write
780000
trusted library allocation
page read and write
2C468060000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
1941E38E000
heap
page read and write
3040000
unkown
page read and write
1941E975000
heap
page read and write
8D00000
unkown
page read and write
305E000
stack
page read and write
1FA9D94A000
heap
page read and write
1941E348000
heap
page read and write
2800000
trusted library allocation
page read and write
DE0000
unkown
page readonly
13FA2821000
heap
page read and write
1DD5A3C1000
heap
page read and write
43B0000
trusted library allocation
page read and write
8D00000
unkown
page read and write
1ADDA75C000
heap
page read and write
8FB9000
stack
page read and write
10DE2000
unkown
page read and write
2E960E70000
heap
page read and write
266E2816000
heap
page read and write
13FA0F78000
heap
page read and write
3460000
unkown
page read and write
8740000
unkown
page read and write
24603676000
heap
page read and write
2C468106000
heap
page read and write
37A0000
unkown
page read and write
D10000
trusted library allocation
page read and write
57C9000
heap
page read and write
5DD13FF000
stack
page read and write
29388D64000
heap
page read and write
29388BC9000
heap
page read and write
13FA0936000
heap
page read and write
94F000
stack
page read and write
1ADDA6E7000
heap
page read and write
8D00000
unkown
page read and write
1DE9BDF0000
heap
page read and write
18F36328000
heap
page read and write
266E27F3000
heap
page read and write
8740000
unkown
page read and write
23D27D75000
heap
page read and write
17516DCA000
heap
page read and write
FDFE000
unkown
page read and write
8D00000
unkown
page read and write
A00000
trusted library allocation
page read and write
18F35D52000
heap
page read and write
A00000
trusted library allocation
page read and write
3170000
unkown
page read and write
7FF5ED6DB000
unkown
page readonly
F3D32FF000
stack
page read and write
22FEDD00000
heap
page read and write
7FF5ED670000
unkown
page readonly
1941E998000
heap
page read and write
A00000
trusted library allocation
page read and write
1FA9D843000
heap
page read and write
51D5000
heap
page read and write
18F35D27000
heap
page read and write
74A897F000
stack
page read and write
17516676000
heap
page read and write
43B0000
trusted library allocation
page read and write
18F35D27000
heap
page read and write
7E70000
unkown
page read and write
29388625000
heap
page read and write
1DD5A3C9000
heap
page read and write
27A20C90000
heap
page read and write
2D20000
trusted library allocation
page read and write
2C4686D7000
heap
page read and write
979C000
unkown
page read and write
3440000
unkown
page read and write
7FF5ED669000
unkown
page readonly
1941E376000
heap
page read and write
2460369C000
heap
page read and write
3050000
unkown
page read and write
30A0000
heap
page read and write
13FA0945000
heap
page read and write
23D27747000
heap
page read and write
3170000
unkown
page read and write
57E5000
heap
page read and write
97A9000
unkown
page read and write
2D8E000
heap
page read and write
266E27F7000
heap
page read and write
7FF5ED735000
unkown
page readonly
8740000
unkown
page read and write
7FF5ED9F2000
unkown
page readonly
3030000
unkown
page read and write
2800000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
6F82B77000
stack
page read and write
29388D65000
heap
page read and write
7CB627F000
stack
page read and write
7FF6F2D74000
unkown
page read and write
2342E600000
heap
page read and write
3050000
unkown
page read and write
149BC478000
heap
page read and write
8D00000
unkown
page read and write
1DD5A5DB000
heap
page read and write
2C4686D2000
heap
page read and write
EAF000
heap
page read and write
C6CF000
unkown
page read and write
18F36335000
heap
page read and write
29388604000
heap
page read and write
7FF5ED342000
unkown
page readonly
41D000
unkown
page readonly
266E22C7000
heap
page read and write
13FA0860000
heap
page read and write
8D00000
unkown
page read and write
17516800000
trusted library allocation
page read and write
6F82E7F000
stack
page read and write
43B0000
trusted library allocation
page read and write
19C000
stack
page read and write
A00000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
E78000
heap
page read and write
785F000
unkown
page read and write
2C4685F7000
heap
page read and write
29388630000
heap
page read and write
A01C000
stack
page read and write
5EAB9FE000
stack
page read and write
8740000
unkown
page read and write
7E70000
unkown
page read and write
266E27F5000
heap
page read and write
2C468609000
heap
page read and write
1F0900C2000
heap
page read and write
A00000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
2BCE000
stack
page read and write
5AD000
heap
page read and write
2C4680C5000
heap
page read and write
8D00000
unkown
page read and write
3030000
unkown
page read and write
7FF5ED850000
unkown
page readonly
2C4680E3000
heap
page read and write
149BCA0A000
heap
page read and write
2C4680A7000
heap
page read and write
266E2022000
heap
page read and write
7FF5ED853000
unkown
page readonly
13FA0F49000
heap
page read and write
9871000
unkown
page read and write
7F50000
unkown
page read and write
8D00000
unkown
page read and write
4690000
heap
page read and write
43B0000
trusted library allocation
page read and write
2E96157A000
heap
page read and write
18F36338000
heap
page read and write
3170000
unkown
page read and write
780000
trusted library allocation
page read and write
3030000
unkown
page read and write
1ADDA70C000
heap
page read and write
7FF5ED793000
unkown
page readonly
27A20B60000
heap
page read and write
8740000
unkown
page read and write
13FA2810000
heap
page read and write
23D27874000
heap
page read and write
2C4685E9000
heap
page read and write
C5A3000
unkown
page read and write
A00000
trusted library allocation
page read and write
296C04B0000
heap
page read and write
2200000
heap
page read and write
16C04B28000
heap
page read and write
771000
heap
page execute and read and write
17516DD0000
heap
page read and write
A00000
trusted library allocation
page read and write
8740000
unkown
page read and write
1FA9D84C000
heap
page read and write
7DF4F3031000
unkown
page execute read
23D2787A000
heap
page read and write
2800000
trusted library allocation
page read and write
13FA0F12000
heap
page read and write
A00000
trusted library allocation
page read and write
18F36324000
heap
page read and write
7E70000
unkown
page read and write
1941E357000
heap
page read and write
D4326FF000
stack
page read and write
3070000
unkown
page read and write
A00000
trusted library allocation
page read and write
16C0507F000
heap
page read and write
7FF6F2D75000
unkown
page readonly
3060000
unkown
page read and write
13FA2A40000
heap
page read and write
1941E977000
heap
page read and write
7E70000
unkown
page read and write
3170000
unkown
page read and write
7CB61FF000
stack
page read and write
16C04B46000
heap
page read and write
AAD1000
unkown
page read and write
43B0000
trusted library allocation
page read and write
6DE000
stack
page read and write
1FA9D94A000
heap
page read and write
8D00000
unkown
page read and write
9885000
unkown
page read and write
13FA0F2E000
heap
page read and write
785D000
unkown
page read and write
17516DC8000
heap
page read and write
A4AB000
unkown
page read and write
23D27791000
heap
page read and write
8740000
unkown
page read and write
1941E3A0000
heap
page read and write
8740000
unkown
page read and write
7FF5ED5F7000
unkown
page readonly
A00000
trusted library allocation
page read and write
2C468040000
heap
page read and write
7900000
unkown
page read and write
24603C7F000
heap
page read and write
74A88FE000
stack
page read and write
43B0000
trusted library allocation
page read and write
24603692000
heap
page read and write
149BCA18000
heap
page read and write
18F35F7E000
heap
page read and write
E70000
heap
page read and write
1FA9D843000
heap
page read and write
3020000
unkown
page read and write
13FA08E1000
heap
page read and write
1471547000
stack
page read and write
2C4680E5000
heap
page read and write
C50A000
unkown
page read and write
57FB000
heap
page read and write
A00000
trusted library allocation
page read and write
1DD5A5C3000
heap
page read and write
17516DDA000
heap
page read and write
149BC4A8000
heap
page read and write
1FA9D826000
heap
page read and write
8740000
unkown
page read and write
13FA090F000
heap
page read and write
8D00000
unkown
page read and write
7D60000
unkown
page read and write
2E960E27000
heap
page read and write
1941E394000
heap
page read and write
8D00000
unkown
page read and write
8740000
unkown
page read and write
A00000
trusted library allocation
page read and write
3060000
unkown
page read and write
8D00000
unkown
page read and write
EAC000
heap
page read and write
8740000
unkown
page read and write
23D27D6A000
heap
page read and write
AEBE4FF000
stack
page read and write
8D00000
unkown
page read and write
1941E980000
heap
page read and write
149BCA1E000
heap
page read and write
1F0900C2000
heap
page read and write
1941E9B1000
heap
page read and write
1FA9D944000
heap
page read and write
43B0000
trusted library allocation
page read and write
7FF5ED4DF000
unkown
page readonly
13FA0EFE000
heap
page read and write
2A81000
heap
page read and write
2800000
trusted library allocation
page read and write
23D27D72000
heap
page read and write
13FA0FB8000
heap
page read and write
A00000
trusted library allocation
page read and write
7FF5ED495000
unkown
page readonly
FDD1000
unkown
page read and write
8D00000
unkown
page read and write
1941E9AE000
heap
page read and write
266E27F5000
heap
page read and write
3170000
unkown
page read and write
7FF5ED73D000
unkown
page readonly
23D27D4C000
heap
page read and write
81E000
stack
page read and write
14715CE000
stack
page read and write
24603C7B000
heap
page read and write
1DD5A4C7000
heap
page read and write
29388BD3000
heap
page read and write
18F35F7E000
heap
page read and write
8740000
unkown
page read and write
1941E970000
heap
page read and write
69D1F8F000
stack
page read and write
23D27D6C000
heap
page read and write
D10000
trusted library allocation
page read and write
43B0000
trusted library allocation
page read and write
9DED000
stack
page read and write
1F0900C0000
heap
page read and write
2C4680D2000
heap
page read and write
40B000
unkown
page execute read
266E27FC000
heap
page read and write
1941E9A9000
heap
page read and write
2E961577000
heap
page read and write
8EF0000
unkown
page read and write
36F0000
unkown
page readonly
16C050A0000
heap
page read and write
2E9610B0000
heap
page read and write
2460369F000
heap
page read and write
18F36319000
heap
page read and write
18F35D17000
heap
page read and write
1ADDA6FB000
heap
page read and write
8D00000
unkown
page read and write
13FA0F09000
heap
page read and write
57E6000
heap
page read and write
2800000
trusted library allocation
page read and write
8740000
unkown
page read and write
8D00000
unkown
page read and write
23D27D57000
heap
page read and write
13FA2920000
heap
page read and write
9C000
stack
page read and write
147197F000
stack
page read and write
24603696000
heap
page read and write
18F35D81000
heap
page read and write
13FA0936000
heap
page read and write
18F3632D000
heap
page read and write
896B000
stack
page read and write
1FC0000
unclassified section
page read and write
3170000
unkown
page read and write
1DD5A3D2000
heap
page read and write
A33E000
unkown
page read and write
580000
heap
page read and write
149BCA21000
heap
page read and write
7FF5ED93B000
unkown
page readonly
29388BB4000
heap
page read and write
23D27875000
heap
page read and write
3050000
unkown
page read and write
3170000
unkown
page read and write
7FF5ED1BC000
unkown
page readonly
4E4000
heap
page read and write
18F36317000
heap
page read and write
A00000
trusted library allocation
page read and write
1FA9D827000
heap
page read and write
13FA08C5000
heap
page read and write
7E70000
unkown
page read and write
24603630000
heap
page read and write
C49E000
stack
page read and write
23D27D6B000
heap
page read and write
23D27D70000
heap
page read and write
9977000
unkown
page read and write
8760000
unkown
page read and write
8D00000
unkown
page read and write
3050000
unkown
page read and write
13FA0F66000
heap
page read and write
29388615000
heap
page read and write
1FA9D99A000
heap
page read and write
2342E830000
heap
page read and write
2800000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
13FA08EC000
heap
page read and write
2E960E18000
heap
page read and write
2938862E000
heap
page read and write
2C468600000
heap
page read and write
2C4685EF000
heap
page read and write
2D82000
heap
page read and write
AB02000
unkown
page read and write
33B9000
stack
page read and write
8740000
unkown
page read and write
13FA092E000
heap
page read and write
24603C71000
heap
page read and write
CB2F000
unkown
page read and write
2DAA000
heap
page read and write
3170000
unkown
page read and write
9660000
unkown
page read and write
A00000
trusted library allocation
page read and write
7FF5ED4B4000
unkown
page readonly
2C4680D2000
heap
page read and write
1FA9D97F000
heap
page read and write
3050000
unkown
page read and write
3170000
unkown
page read and write
7E70000
unkown
page read and write
13FA08EB000
heap
page read and write
7E70000
unkown
page read and write
1FA9D978000
heap
page read and write
8D30000
unkown
page read and write
7DF4F3040000
unkown
page readonly
1F090090000
heap
page read and write
13FA090F000
heap
page read and write
3050000
unkown
page read and write
2CC0000
heap
page read and write
23D278B0000
heap
page read and write
57EC000
heap
page read and write
7FF5ED433000
unkown
page readonly
7FF5EDA69000
unkown
page readonly
3170000
unkown
page read and write
C4A0000
unkown
page read and write
25E0000
heap
page read and write
283E000
stack
page read and write
13FA08C8000
heap
page read and write
7FF5ED9AE000
unkown
page readonly
A00000
trusted library allocation
page read and write
BDA0000
unkown
page readonly
13FA287B000
heap
page read and write
34C0000
heap
page read and write
3060000
unkown
page read and write
7FF5EDA53000
unkown
page readonly
2D9F000
heap
page read and write
23D27877000
heap
page read and write
16C04B46000
heap
page read and write
25F4000
heap
page read and write
3170000
unkown
page read and write
266E2010000
heap
page read and write
29388BC9000
heap
page read and write
149BCA0A000
heap
page read and write
A00000
trusted library allocation
page read and write
8D00000
unkown
page read and write
13FA098E000
heap
page read and write
296C04E8000
heap
page read and write
17516DC5000
heap
page read and write
C6F4000
unkown
page read and write
8740000
unkown
page read and write
43B0000
trusted library allocation
page read and write
149BCA18000
heap
page read and write
43B0000
trusted library allocation
page read and write
23D27830000
trusted library allocation
page read and write
7FF6F2D61000
unkown
page execute read
7FF5ED48A000
unkown
page readonly
43B0000
trusted library allocation
page read and write
3050000
unkown
page read and write
A00000
trusted library allocation
page read and write
13FA090F000
heap
page read and write
17516682000
heap
page read and write
3040000
unkown
page read and write
3040000
unkown
page read and write
8D00000
unkown
page read and write
1DD5A4EA000
heap
page read and write
978E000
unkown
page read and write
8740000
unkown
page read and write
5EAB8FF000
stack
page read and write
B170000
unkown
page readonly
D10000
trusted library allocation
page read and write
780000
trusted library allocation
page read and write
1FE657D0000
heap
page read and write
16C04B31000
heap
page read and write
8740000
unkown
page read and write
7FF5ED97A000
unkown
page readonly
16C05089000
heap
page read and write
462F000
stack
page read and write
29D0000
heap
page read and write
79D3000
unkown
page read and write
1FB0000
direct allocation
page read and write
97B5000
unkown
page read and write
149BCA18000
heap
page read and write
57C9000
heap
page read and write
8740000
unkown
page read and write
13FA0F5E000
heap
page read and write
1FA9D94A000
heap
page read and write
A00000
trusted library allocation
page read and write
CC000
stack
page read and write
3590000
unkown
page read and write
18F35CA0000
heap
page read and write
780000
trusted library allocation
page read and write
266E280C000
heap
page read and write
7FF5ED471000
unkown
page readonly
17516682000
heap
page read and write
13FA0F27000
heap
page read and write
8D00000
unkown
page read and write
7FF5ED915000
unkown
page readonly
16C04B22000
heap
page read and write
23D27769000
heap
page read and write
2E96158E000
heap
page read and write
C4D0000
unkown
page read and write
266E280C000
heap
page read and write
8F5397F000
stack
page read and write
4CB0000
unkown
page read and write
57DC000
heap
page read and write
18F35F72000
heap
page read and write
4B93000
unkown
page read and write
149BC483000
heap
page read and write
7D60000
stack
page read and write
540000
direct allocation
page read and write
13FA0953000
heap
page read and write
89C0000
unkown
page read and write
7FF5ED77E000
unkown
page readonly
2E962E20000
heap
page read and write
4DDD000
heap
page read and write
13FA090F000
heap
page read and write
8D00000
unkown
page read and write
17516682000
heap
page read and write
8D00000
unkown
page read and write
1DD5A3C1000
heap
page read and write
1DD5A3C4000
heap
page read and write
266E280F000
heap
page read and write
1941E352000
heap
page read and write
7FF5ED4F3000
unkown
page readonly
8D00000
unkown
page read and write
75A000
heap
page read and write
1DD5A4C9000
heap
page read and write
2D20000
trusted library allocation
page read and write
149BC44E000
heap
page read and write
17518650000
heap
page read and write
3170000
unkown
page read and write
1FA9D989000
heap
page read and write
8770000
unkown
page read and write
913A000
stack
page read and write
13FA098E000
heap
page read and write
1DD5A5CB000
heap
page read and write
3170000
unkown
page read and write
8740000
unkown
page read and write
41D000
unkown
page readonly
A32A000
unkown
page read and write
56E000
heap
page read and write
57F0000
heap
page read and write
2DB7000
heap
page read and write
18F36327000
heap
page read and write
3010000
unkown
page read and write
13FA0F4C000
heap
page read and write
29388D6A000
heap
page read and write
8108000
stack
page read and write
780000
trusted library allocation
page read and write
2820000
heap
page read and write
266E1FC7000
heap
page read and write
149BC4CA000
heap
page read and write
8750000
unkown
page read and write
7FF5ED7E9000
unkown
page readonly
45F0000
trusted library allocation
page read and write
4B50000
unkown
page read and write
F31A8FE000
stack
page read and write
7FF5ED7F1000
unkown
page readonly
BC9B000
stack
page read and write
7FF5ED9FF000
unkown
page readonly
23D27783000
heap
page read and write
7DD9000
stack
page read and write
4D8000
system
page execute and read and write
780000
trusted library allocation
page read and write
7FF5ED43A000
unkown
page readonly
17516DDC000
heap
page read and write
23D27D75000
heap
page read and write
F3D33FE000
stack
page read and write
3170000
unkown
page read and write
149BC447000
heap
page read and write
A3BE000
unkown
page read and write
18F35D59000
heap
page read and write
A00000
trusted library allocation
page read and write
3050000
unkown
page read and write
34E9000
stack
page read and write
3460000
unkown
page read and write
1FA9D947000
heap
page read and write
D432307000
stack
page read and write
16C05085000
heap
page read and write
8740000
unkown
page read and write
7FF6F2D71000
unkown
page readonly
8D00000
unkown
page read and write
149BCA1C000
heap
page read and write
24603647000
heap
page read and write
40F000
unkown
page readonly
13FA098E000
heap
page read and write
2C46A040000
heap
page read and write
266E27FA000
heap
page read and write
3060000
unkown
page read and write
EAD000
heap
page read and write
29388BBD000
heap
page read and write
149BC9FC000
heap
page read and write
266E22CA000
heap
page read and write
7FF5ED4EF000
unkown
page readonly
43B0000
trusted library allocation
page read and write
1DD5A3A4000
heap
page read and write
624000
heap
page read and write
24603685000
heap
page read and write
2342E678000
heap
page read and write
13FA0926000
heap
page read and write
BD288F8000
stack
page read and write
266E1FC7000
heap
page read and write
3170000
unkown
page read and write
1FA9D7F0000
heap
page read and write
16C0509C000
heap
page read and write
8730000
unkown
page read and write
3010000
unkown
page read and write
3040000
unkown
page read and write
E93000
heap
page read and write
3460000
unkown
page read and write
266E280C000
heap
page read and write
266E2005000
heap
page read and write
149BC4D0000
heap
page read and write
AF8D000
stack
page read and write
10D0000
heap
page read and write
246038AB000
heap
page read and write
780000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
7FF5ED5C9000
unkown
page readonly
A7F000
stack
page read and write
13FA0904000
heap
page read and write
246038A7000
heap
page read and write
3030000
unkown
page read and write
7FF5ED885000
unkown
page readonly
37A8000
unkown
page read and write
149BCA22000
heap
page read and write
23D27D4C000
heap
page read and write
DD0000
unkown
page readonly
1FA9D943000
heap
page read and write
2C4680F7000
heap
page read and write
3170000
unkown
page read and write
16C04AAA000
heap
page read and write
23D27766000
heap
page read and write
1DD5A3C1000
heap
page read and write
20ECB520000
heap
page read and write
3020000
unkown
page read and write
2C4685ED000
heap
page read and write
3010000
unkown
page read and write
1941E39B000
heap
page read and write
2400000
heap
page read and write
13FA0936000
heap
page read and write
16C04B42000
heap
page read and write
2E960E71000
heap
page read and write
149BC4A7000
heap
page read and write
8DA0000
unkown
page read and write
44B000
unkown
page write copy
3460000
unkown
page read and write
7FF5ED1D6000
unkown
page readonly
1E0000
heap
page read and write
57C9000
heap
page read and write
16C050A2000
heap
page read and write
18F35F7B000
heap
page read and write
7FF5EDA2A000
unkown
page readonly
2C4685EE000
heap
page read and write
2342E5F5000
heap
page read and write
10DEB000
unkown
page read and write
8D00000
unkown
page read and write
D10000
trusted library allocation
page read and write
23D2787E000
heap
page read and write
1DD5A470000
trusted library allocation
page read and write
D00000
heap
page read and write
1FA9D910000
trusted library allocation
page read and write
13FA08F3000
heap
page read and write
23D27776000
heap
page read and write
7FF5ED697000
unkown
page readonly
2D20000
trusted library allocation
page read and write
AAF9000
unkown
page read and write
1DD5A3D2000
heap
page read and write
1505000
heap
page read and write
3170000
unkown
page read and write
7FF5ED81B000
unkown
page readonly
1941E397000
heap
page read and write
2A81000
heap
page read and write
13FA0963000
heap
page read and write
7FF5ED409000
unkown
page readonly
1FA9D984000
heap
page read and write
7FF5ED295000
unkown
page readonly
13FA0990000
trusted library allocation
page read and write
24603677000
heap
page read and write
13FA098E000
heap
page read and write
8D00000
unkown
page read and write
17516647000
heap
page read and write
There are 3690 hidden memdumps, click here to show them.