IOC Report
O4zPA1oI9Y.exe

loading gif

Files

File Path
Type
Category
Malicious
O4zPA1oI9Y.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\8CAE.exe
PE32+ executable (GUI) x86-64, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\DE97.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\jvgasii
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\jvgasii:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\uegasii
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\8C4C.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\8C4C.tmp-shm
data
dropped
C:\Users\user\AppData\Local\Temp\916D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\9690.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\97BA.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\98A5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\9A0D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\9B47.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\9C13.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Roaming\fftwvdb
data
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\O4zPA1oI9Y.exe
"C:\Users\user\Desktop\O4zPA1oI9Y.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\jvgasii
C:\Users\user\AppData\Roaming\jvgasii
malicious
C:\Users\user\AppData\Local\Temp\DE97.exe
C:\Users\user\AppData\Local\Temp\DE97.exe
malicious
C:\Users\user\AppData\Roaming\uegasii
C:\Users\user\AppData\Roaming\uegasii
malicious
C:\Users\user\AppData\Local\Temp\8CAE.exe
C:\Users\user\AppData\Local\Temp\8CAE.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\System32\cmd.exe
cmd
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /displaydns
malicious
C:\Windows\System32\netsh.exe
netsh firewall show state
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\ROUTE.EXE
route print
C:\Windows\System32\tasklist.exe
tasklist /v /fo csv
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.145.40.164/ksa9104.exe
23.145.40.164
malicious
https://ninjahallnews.com/search.php
23.145.40.168
malicious
https://ninjahallnews.com/
unknown
malicious
https://fallhandbat.com/search.php
malicious
https://api.msn.com/v1/news/Feed/Windows?
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.msn.com/I
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://ninjahallnews.com/search.phpMozilla/5.0
unknown
https://word.office.comM
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
unknown
http://schemas.micro
unknown
https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h
unknown
https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
unknown
https://wns.windows.com/e
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ninjahallnews.com/application/x-www-form-urlencodedMozilla/5.0
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
unknown
https://excel.office.com-
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
unknown
https://ninjahallnews.com/search.phpo
unknown
https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
unknown
https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
unknown
https://powerpoint.office.comEMd
unknown
https://ninjahallnews.com/earch.php;L
unknown
https://android.notify.windows.com/iOS
unknown
https://outlook.come
unknown
https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
https://api.msn.com/
unknown
https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
unknown
https://www.msn.com:443/en-us/feed
unknown
https://www.msn.com/en-us/news/world/us-supplies-ukraine-with-a-million-rounds-of-ammunition-seized-
unknown
https://www.msn.com/en-us/money/personalfinance/10-things-rich-people-never-buy-and-you-shouldn-t-ei
unknown
https://ninjahallnews.com//
unknown
There are 45 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ninjahallnews.com
23.145.40.168
malicious
nwgrus.ru
160.177.223.165
malicious
18.31.95.13.in-addr.arpa
unknown
malicious
bg.microsoft.map.fastly.net
199.232.214.172

IPs

IP
Domain
Country
Malicious
23.145.40.168
ninjahallnews.com
Reserved
malicious
190.249.249.14
unknown
Colombia
malicious
23.145.40.164
unknown
Reserved
malicious
160.177.223.165
nwgrus.ru
Morocco
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.M2V\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
There are 202 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6F1000
unclassified section
page read and write
malicious
6B0000
direct allocation
page read and write
malicious
6B0000
direct allocation
page read and write
malicious
2170000
direct allocation
page read and write
malicious
5C1000
system
page execute and read and write
malicious
2F01000
system
page execute and read and write
malicious
2191000
unclassified section
page read and write
malicious
6D0000
direct allocation
page read and write
malicious
8D1000
unclassified section
page read and write
malicious
6D1000
unclassified section
page read and write
malicious
561D000
heap
page read and write
2001672F000
heap
page read and write
5D0000
trusted library allocation
page read and write
12B48400000
heap
page read and write
5160000
unkown
page read and write
C8B7E7F000
stack
page read and write
29254C1D000
heap
page read and write
7FF5DEE43000
unkown
page readonly
5837000
heap
page read and write
2C90000
unkown
page read and write
23F0C6D1000
heap
page read and write
2FE0000
unkown
page read and write
41A000
unkown
page readonly
241310F0000
trusted library allocation
page read and write
16DDBBD7000
heap
page read and write
7FF5DF3C2000
unkown
page readonly
2202903A000
heap
page read and write
75B000
heap
page read and write
7FF5DF3B9000
unkown
page readonly
1A51DB56000
heap
page read and write
790000
heap
page read and write
24131385000
heap
page read and write
4B60000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
9260000
unkown
page read and write
5160000
unkown
page read and write
5160000
unkown
page read and write
5837000
heap
page read and write
24131164000
heap
page read and write
2001672F000
heap
page read and write
17F37907000
heap
page read and write
17F37946000
heap
page read and write
418000
unkown
page write copy
4B60000
trusted library allocation
page read and write
2C40000
unkown
page read and write
1E22CEA7000
heap
page read and write
1FB29C3B000
heap
page read and write
18EC4620000
heap
page read and write
200166BF000
heap
page read and write
7A40000
unkown
page readonly
2C40000
unkown
page read and write
7FF5DF4F3000
unkown
page readonly
16DDBBE4000
heap
page read and write
12B47EDA000
heap
page read and write
2360000
trusted library allocation
page read and write
7FF5DF3FC000
unkown
page readonly
7FF5DF380000
unkown
page readonly
12B48401000
heap
page read and write
2B60000
heap
page read and write
2FE0000
heap
page read and write
E31000
system
page execute and read and write
4AC0000
trusted library allocation
page read and write
489A000
unkown
page read and write
9260000
unkown
page read and write
6C4000
heap
page read and write
5160000
unkown
page read and write
BE80000
unkown
page read and write
C192000
unkown
page read and write
2C20000
unkown
page read and write
2360000
trusted library allocation
page read and write
1A51DAF0000
heap
page read and write
7FF7CBCA0000
unkown
page readonly
7FF5DF07D000
unkown
page readonly
2C50000
unkown
page read and write
18EC3E70000
trusted library allocation
page read and write
7DF4E6771000
unkown
page execute read
2FE0000
unkown
page read and write
5856000
heap
page read and write
2360000
trusted library allocation
page read and write
9564000
unkown
page read and write
233C6FEE000
heap
page read and write
2B2D3964000
heap
page read and write
220296D0000
heap
page read and write
1FB2BBD0000
heap
page read and write
2EB0000
unkown
page readonly
DDB7CE7000
stack
page read and write
2C90000
unkown
page read and write
AE6F000
stack
page read and write
16DDB4CD000
heap
page read and write
2C9A000
stack
page read and write
20015FBB000
heap
page read and write
9260000
unkown
page read and write
C8B7B5A000
stack
page read and write
2FE0000
unkown
page read and write
7FF5DF5CC000
unkown
page readonly
5856000
heap
page read and write
12B48426000
heap
page read and write
1A51DB62000
heap
page read and write
18EC4120000
heap
page read and write
1E22CEE8000
heap
page read and write
18EC464D000
heap
page read and write
233C6D85000
heap
page read and write
7FF5DF435000
unkown
page readonly
C183000
unkown
page read and write
4750000
remote allocation
page read and write
EB2000
heap
page read and write
2001652A000
heap
page read and write
19D000
stack
page read and write
F50000
unkown
page read and write
5819000
heap
page read and write
B11E000
stack
page read and write
16DDB4B6000
heap
page read and write
2360000
trusted library allocation
page read and write
2A73000
heap
page read and write
2C20000
unkown
page read and write
2C60000
unkown
page read and write
98A7000
unkown
page read and write
16DDB44E000
heap
page read and write
22029029000
heap
page read and write
2A76000
heap
page read and write
24133280000
heap
page read and write
1FB29B16000
heap
page read and write
BE80000
unkown
page read and write
3010000
unkown
page read and write
7FF5DF53F000
unkown
page readonly
2001600B000
heap
page read and write
23F0C6DB000
heap
page read and write
7FF5DF39C000
unkown
page readonly
7FF5DF21F000
unkown
page readonly
2404C8A8000
heap
page read and write
6AE000
stack
page read and write
3281000
stack
page read and write
2B2D331E000
heap
page read and write
2360000
trusted library allocation
page read and write
7FF5DF21B000
unkown
page readonly
83F0000
unkown
page read and write
2A97000
heap
page read and write
230814FA000
heap
page read and write
7FF5DF507000
unkown
page readonly
2B2D32D7000
heap
page read and write
4750000
unkown
page read and write
F50000
unkown
page read and write
4AC0000
trusted library allocation
page read and write
20015FCF000
heap
page read and write
17F37F0C000
heap
page read and write
5160000
unkown
page read and write
5160000
unkown
page read and write
880000
trusted library allocation
page read and write
1E22C8E5000
heap
page read and write
BF98000
unkown
page read and write
2A8B000
heap
page read and write
16DDB4B6000
heap
page read and write
2FE0000
unkown
page read and write
4F6000
unkown
page readonly
31C8000
heap
page read and write
9260000
unkown
page read and write
2001652A000
heap
page read and write
9260000
unkown
page read and write
5D0000
trusted library allocation
page read and write
7FF5DF41B000
unkown
page readonly
2360000
trusted library allocation
page read and write
22029743000
heap
page read and write
22029743000
heap
page read and write
2B2D3930000
heap
page read and write
18EC3EDE000
heap
page read and write
31C0000
heap
page read and write
BFAD000
unkown
page read and write
336C000
unkown
page read and write
5160000
unkown
page read and write
1A51DB6A000
heap
page read and write
200181E0000
heap
page read and write
77F0000
unkown
page read and write
87DC7F7000
stack
page read and write
2001600B000
heap
page read and write
7FF5DF2F3000
unkown
page readonly
3010000
unkown
page read and write
233C6D9C000
heap
page read and write
7FF5DF045000
unkown
page readonly
478000
system
page execute and read and write
2C90000
unkown
page read and write
2C50000
unkown
page read and write
9C000
stack
page read and write
2B2D3311000
heap
page read and write
1E22C8D7000
heap
page read and write
1FB29D25000
heap
page read and write
20015FCF000
heap
page read and write
9F92000
unkown
page read and write
2C20000
unkown
page read and write
9B1E000
stack
page read and write
16DDBBE4000
heap
page read and write
20016683000
heap
page read and write
880000
trusted library allocation
page read and write
2404C807000
heap
page read and write
2C60000
unkown
page read and write
18EC4090000
trusted library allocation
page read and write
A80000
heap
page read and write
1FB29D20000
heap
page read and write
22029046000
heap
page read and write
7FF5DE531000
unkown
page readonly
7FF5DF349000
unkown
page readonly
4B60000
trusted library allocation
page read and write
2A62000
heap
page read and write
4B60000
trusted library allocation
page read and write
BE80000
unkown
page read and write
9C000
stack
page read and write
2B2D3947000
heap
page read and write
1FB2A1DC000
heap
page read and write
4B60000
trusted library allocation
page read and write
18EC3EDE000
heap
page read and write
1748572E000
heap
page read and write
23F0C0A5000
heap
page read and write
17484FC7000
heap
page read and write
23F0C0C2000
heap
page read and write
BE80000
unkown
page read and write
18EC3ED2000
heap
page read and write
C4D7000
unkown
page read and write
2C90000
unkown
page read and write
2360000
trusted library allocation
page read and write
17F37EFF000
heap
page read and write
2F60000
trusted library allocation
page read and write
22029023000
heap
page read and write
20016003000
heap
page read and write
2404E439000
heap
page read and write
23F0C000000
trusted library allocation
page read and write
2B2D393C000
heap
page read and write
7FF5DF5BE000
unkown
page readonly
12B4842F000
heap
page read and write
3107000
stack
page read and write
2C80000
unkown
page read and write
1A51DB71000
heap
page read and write
5B9317F000
stack
page read and write
17F37946000
heap
page read and write
7FF5DF45A000
unkown
page readonly
4756000
heap
page read and write
2C40000
unkown
page read and write
17485015000
heap
page read and write
23F0C05E000
heap
page read and write
7FF7CBCA0000
unkown
page readonly
4B60000
trusted library allocation
page read and write
8662000
heap
page read and write
6CE000
heap
page read and write
3E1D27F000
stack
page read and write
18EC3E97000
heap
page read and write
18EC3E80000
heap
page read and write
20016711000
heap
page read and write
5160000
unkown
page read and write
3190000
unkown
page read and write
2413139C000
heap
page read and write
2A75000
heap
page read and write
910000
heap
page read and write
20016015000
heap
page read and write
5B930FF000
stack
page read and write
1FB2A1E2000
heap
page read and write
730000
heap
page read and write
18EC4630000
heap
page read and write
2001600B000
heap
page read and write
1FB2A1D8000
heap
page read and write
516000
unkown
page readonly
5B92CF7000
stack
page read and write
24131156000
heap
page read and write
17485737000
heap
page read and write
61F000
heap
page execute and read and write
3185000
stack
page read and write
2A75000
heap
page read and write
C4D9000
unkown
page read and write
C319000
unkown
page read and write
5160000
unkown
page read and write
23F0C0B9000
heap
page read and write
4B60000
trusted library allocation
page read and write
22029727000
heap
page read and write
4860000
unkown
page read and write
2C90000
unkown
page read and write
E60000
heap
page read and write
20016029000
heap
page read and write
2404C760000
heap
page read and write
3304000
unkown
page read and write
1E22CEAE000
heap
page read and write
768000
heap
page read and write
7830000
unkown
page read and write
F50000
unkown
page read and write
5819000
heap
page read and write
83F0000
unkown
page read and write
22029713000
heap
page read and write
18EC412E000
heap
page read and write
20015FCF000
heap
page read and write
17485714000
heap
page read and write
7DF5E895F000
unkown
page readonly
73B8000
unkown
page read and write
2B2D32B0000
trusted library allocation
page read and write
17F37F0C000
heap
page read and write
7FF5DF47E000
unkown
page readonly
2FE0000
unkown
page read and write
16DDBC00000
heap
page read and write
5840000
heap
page read and write
1FB29C37000
heap
page read and write
2FE0000
unkown
page read and write
2C60000
unkown
page read and write
17F37F00000
heap
page read and write
BF8C000
unkown
page read and write
18EC4070000
heap
page read and write
2B2D3304000
heap
page read and write
2A7D000
heap
page read and write
2202971E000
heap
page read and write
BE80000
unkown
page read and write
5160000
unkown
page read and write
6EC000
heap
page read and write
1F0000
heap
page read and write
C003000
unkown
page read and write
7FF5DF48B000
unkown
page readonly
3AA114F000
stack
page read and write
5819000
heap
page read and write
2F60000
trusted library allocation
page read and write
8670000
unkown
page read and write
22029751000
heap
page read and write
914B000
stack
page read and write
2FE0000
unkown
page read and write
1E22CF01000
heap
page read and write
1FB29B22000
heap
page read and write
2A9D000
heap
page read and write
880000
trusted library allocation
page read and write
16DDB3E0000
heap
page read and write
416000
unkown
page readonly
17485016000
heap
page read and write
550000
heap
page read and write
BFA1000
unkown
page read and write
200166AE000
heap
page read and write
8400000
heap
page read and write
C013000
unkown
page read and write
200166E5000
heap
page read and write
12B47F80000
heap
page read and write
200166B6000
heap
page read and write
1E22C8E3000
heap
page read and write
2360000
trusted library allocation
page read and write
7840000
unkown
page read and write
17485011000
heap
page read and write
20016022000
heap
page read and write
7FF5DF01B000
unkown
page readonly
7230000
unkown
page read and write
2A74000
heap
page read and write
9F7C000
unkown
page read and write
24A0000
heap
page read and write
5835000
heap
page read and write
BE80000
unkown
page read and write
7FF5DF361000
unkown
page readonly
7FF5DF16B000
unkown
page readonly
2360000
trusted library allocation
page read and write
7FF5DF4D5000
unkown
page readonly
BE80000
unkown
page read and write
23081498000
heap
page read and write
6E1000
heap
page read and write
2C60000
unkown
page read and write
40B000
unkown
page execute read
46B0000
heap
page read and write
7FF5DEFF0000
unkown
page readonly
233C6FE7000
heap
page read and write
17F37EF0000
heap
page read and write
2411000
heap
page read and write
E0F000
heap
page read and write
880000
trusted library allocation
page read and write
5160000
unkown
page read and write
9260000
unkown
page read and write
1A51E148000
heap
page read and write
400000
unkown
page readonly
BE80000
unkown
page read and write
233C6D7B000
heap
page read and write
2B2D3314000
heap
page read and write
9260000
unkown
page read and write
2202900A000
heap
page read and write
1E22C8D6000
heap
page read and write
5160000
unkown
page read and write
2B2D3328000
heap
page read and write
5160000
unkown
page read and write
2B2D32B0000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
2A65000
heap
page read and write
7FF5DF537000
unkown
page readonly
23F0C055000
heap
page read and write
17484FBE000
heap
page read and write
2C60000
unkown
page read and write
2C90000
unkown
page read and write
2C60000
unkown
page read and write
880000
trusted library allocation
page read and write
24131156000
heap
page read and write
5D0000
trusted library allocation
page read and write
1A51DB4B000
heap
page read and write
233C6FF7000
heap
page read and write
32B0000
unkown
page read and write
1FB29BD0000
trusted library allocation
page read and write
B5B98FF000
stack
page read and write
22029015000
heap
page read and write
B120000
unkown
page readonly
58E000
stack
page read and write
2C50000
unkown
page read and write
3010000
unkown
page read and write
1E22CEA5000
heap
page read and write
2F60000
trusted library allocation
page read and write
1FB29C33000
heap
page read and write
1FB29B35000
heap
page read and write
5819000
heap
page read and write
51A0000
unkown
page read and write
880000
trusted library allocation
page read and write
C8B7EFE000
stack
page read and write
BFC3000
unkown
page read and write
A0B1000
unkown
page read and write
1A51FAE0000
heap
page read and write
2360000
trusted library allocation
page read and write
431000
system
page execute and read and write
5170000
unkown
page read and write
12B47EFC000
heap
page read and write
9260000
unkown
page read and write
2F60000
trusted library allocation
page read and write
18EC463E000
heap
page read and write
7380000
unkown
page read and write
17F37F04000
heap
page read and write
17F37F0C000
heap
page read and write
7FF5DF0CC000
unkown
page readonly
151BAFF000
stack
page read and write
4983BFE000
stack
page read and write
400000
unkown
page readonly
7DF4E6780000
unkown
page readonly
900000
heap
page read and write
2FE0000
unkown
page read and write
5160000
unkown
page read and write
F50000
unkown
page read and write
5160000
unkown
page read and write
1E22CEE1000
heap
page read and write
16DDBBD5000
heap
page read and write
2B2D3325000
heap
page read and write
2C80000
unkown
page read and write
2C20000
unkown
page read and write
5170000
unkown
page read and write
230815D0000
heap
page read and write
F50000
unkown
page read and write
F50000
unkown
page read and write
47EC000
unkown
page read and write
113C3FE000
stack
page read and write
2FE0000
unkown
page read and write
2FE0000
unkown
page read and write
880000
trusted library allocation
page read and write
EEA1000
unkown
page read and write
2C90000
unkown
page read and write
233C6FF9000
heap
page read and write
60B000
heap
page read and write
24131153000
heap
page read and write
C354000
unkown
page read and write
2B2D3311000
heap
page read and write
17485731000
heap
page read and write
16DDBBDC000
heap
page read and write
2A8C000
heap
page read and write
BE80000
unkown
page read and write
7FF5DF04D000
unkown
page readonly
23F0C370000
heap
page read and write
2B2D32D7000
heap
page read and write
22029743000
heap
page read and write
2360000
trusted library allocation
page read and write
5837000
heap
page read and write
516000
unkown
page readonly
8C0000
unclassified section
page read and write
9F60000
unkown
page read and write
2404C82D000
heap
page read and write
2E20000
trusted library allocation
page read and write
2001668E000
heap
page read and write
5D0000
trusted library allocation
page read and write
1A51FAD0000
heap
page read and write
7FF5DE539000
unkown
page readonly
2360000
trusted library allocation
page read and write
1FB29C3E000
heap
page read and write
5160000
unkown
page read and write
1A51DAFE000
heap
page read and write
2404C82F000
heap
page read and write
2F60000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
2001673D000
heap
page read and write
BE80000
unkown
page read and write
880000
trusted library allocation
page read and write
17485670000
heap
page read and write
16DDB44A000
heap
page read and write
1A51E147000
heap
page read and write
16DDB4BC000
heap
page read and write
7FF5DEF87000
unkown
page readonly
2A65000
heap
page read and write
F50000
unkown
page read and write
12B48408000
heap
page read and write
600000
direct allocation
page execute and read and write
9F27000
unkown
page read and write
5840000
heap
page read and write
2C40000
unkown
page read and write
2B2D3A67000
heap
page read and write
16DDB3B0000
heap
page read and write
5225000
heap
page read and write
7FF5DF0F6000
unkown
page readonly
BE80000
unkown
page read and write
F50000
unkown
page read and write
174851E5000
heap
page read and write
2FE0000
unkown
page read and write
20015FBB000
heap
page read and write
10003000
unkown
page read and write
16DDBBDB000
heap
page read and write
20015FCF000
heap
page read and write
4B60000
trusted library allocation
page read and write
2404C82C000
heap
page read and write
5160000
unkown
page read and write
17F37F0C000
heap
page read and write
1FB29B08000
heap
page read and write
1A51DB65000
heap
page read and write
17485753000
heap
page read and write
18EC4653000
heap
page read and write
1E22CF02000
heap
page read and write
2360000
trusted library allocation
page read and write
12B48416000
heap
page read and write
11E5000
heap
page read and write
D69000
heap
page read and write
20015FCF000
heap
page read and write
880000
trusted library allocation
page read and write
A0F7000
unkown
page read and write
98AD000
unkown
page read and write
F50000
unkown
page read and write
24131388000
heap
page read and write
1FB29AD8000
heap
page read and write
2C20000
unkown
page read and write
2C90000
unkown
page read and write
2FE0000
unkown
page read and write
18EC3EE3000
heap
page read and write
BE80000
unkown
page read and write
22029200000
trusted library allocation
page read and write
7FF5DE535000
unkown
page readonly
880000
trusted library allocation
page read and write
29254C19000
heap
page read and write
12B47F0A000
heap
page read and write
980000
unkown
page readonly
9E9E000
stack
page read and write
22029047000
heap
page read and write
2C90000
unkown
page read and write
743000
heap
page execute and read and write
233C6F60000
trusted library allocation
page read and write
999457E000
stack
page read and write
2B2D3A65000
heap
page read and write
17485740000
heap
page read and write
24131117000
heap
page read and write
16DDBBD3000
heap
page read and write
2A9F000
heap
page read and write
5819000
heap
page read and write
2501000
heap
page read and write
1A51DB62000
heap
page read and write
17485755000
heap
page read and write
2B2D394D000
heap
page read and write
1A51E14C000
heap
page read and write
2404C844000
heap
page read and write
7FF5DF392000
unkown
page readonly
22029036000
heap
page read and write
87DCA7F000
stack
page read and write
7FF5DEF4B000
unkown
page readonly
3010000
unkown
page read and write
20015FF5000
heap
page read and write
17486FC0000
heap
page read and write
2C50000
unkown
page read and write
2202972F000
heap
page read and write
AC16917000
stack
page read and write
1A51DB48000
heap
page read and write
9C0000
heap
page read and write
18EC4170000
heap
page read and write
20015FB3000
heap
page read and write
233C6D99000
heap
page read and write
BFA3000
unkown
page read and write
BE80000
unkown
page read and write
19D000
stack
page read and write
233C7004000
heap
page read and write
5160000
unkown
page read and write
9330000
unkown
page read and write
2A8B000
heap
page read and write
4B60000
trusted library allocation
page read and write
5160000
unkown
page read and write
16DDBBF1000
heap
page read and write
233C6DA0000
heap
page read and write
920000
heap
page read and write
880000
trusted library allocation
page read and write
220291C0000
heap
page read and write
18EC3EB8000
heap
page read and write
4B60000
trusted library allocation
page read and write
2B2D3A62000
heap
page read and write
12B47EBA000
heap
page read and write
BE80000
unkown
page read and write
2C20000
unkown
page read and write
23F0C6E9000
heap
page read and write
16DDB447000
heap
page read and write
233C7110000
heap
page read and write
3120000
heap
page read and write
BE80000
unkown
page read and write
29254BD0000
heap
page read and write
3382000
unkown
page read and write
16DDBBCE000
heap
page read and write
233C6FF0000
heap
page read and write
5160000
unkown
page read and write
17F37944000
heap
page read and write
79E0000
unkown
page readonly
7FF5DF5D6000
unkown
page readonly
2FE0000
unkown
page read and write
17F38025000
heap
page read and write
7FF5DF519000
unkown
page readonly
10180000
unkown
page read and write
3190000
stack
page read and write
2404C86A000
heap
page read and write
5160000
unkown
page read and write
3010000
unkown
page read and write
1E22C8F2000
heap
page read and write
9260000
unkown
page read and write
18EC4649000
heap
page read and write
9F10000
unkown
page read and write
20015FCF000
heap
page read and write
F45000
heap
page read and write
16DDBBEF000
heap
page read and write
BE80000
unkown
page read and write
2C90000
unkown
page read and write
5421000
heap
page read and write
416000
unkown
page readonly
22029750000
heap
page read and write
2A65000
heap
page read and write
2360000
trusted library allocation
page read and write
2B2D3314000
heap
page read and write
5840000
heap
page read and write
2B2D3311000
heap
page read and write
1FB2A1D8000
heap
page read and write
20016028000
heap
page read and write
29254BF4000
heap
page read and write
7FF7CBCB1000
unkown
page readonly
16DDB4CB000
heap
page read and write
99945FF000
stack
page read and write
20015FD0000
heap
page read and write
4B60000
trusted library allocation
page read and write
C1EC27B000
stack
page read and write
7FF5DF2CB000
unkown
page readonly
2C80000
unkown
page read and write
5160000
unkown
page read and write
49837DE000
stack
page read and write
5D0000
trusted library allocation
page read and write
34C0000
unkown
page read and write
2C40000
unkown
page read and write
1A51DCB0000
heap
page read and write
2B2D331B000
heap
page read and write
1A51DB6A000
heap
page read and write
7FF5DF3EA000
unkown
page readonly
5160000
unkown
page read and write
5160000
unkown
page read and write
880000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
18EC4190000
heap
page read and write
5160000
unkown
page read and write
24131153000
heap
page read and write
16DDBBF6000
heap
page read and write
2A8E000
heap
page read and write
18EC419A000
heap
page read and write
22028FF9000
heap
page read and write
2FE0000
unkown
page read and write
F50000
unkown
page read and write
7D89000
stack
page read and write
2C90000
unkown
page read and write
7FF5C0B6B000
unkown
page readonly
7FF5DF3DF000
unkown
page readonly
17485013000
heap
page read and write
1E22C8CA000
heap
page read and write
5160000
unkown
page read and write
5160000
unkown
page read and write
2F60000
trusted library allocation
page read and write
233C7115000
heap
page read and write
20015F68000
heap
page read and write
5819000
heap
page read and write
7FF5DF1CD000
unkown
page readonly
A09A000
unkown
page read and write
4BCF000
stack
page read and write
1FB29B22000
heap
page read and write
A6EA000
unkown
page read and write
7DF4E6770000
unkown
page readonly
2400000
heap
page read and write
2A65000
heap
page read and write
5160000
unkown
page read and write
1FB29A80000
heap
page read and write
18EC462F000
heap
page read and write
3356000
unkown
page read and write
2FE0000
unkown
page read and write
17485756000
heap
page read and write
5160000
unkown
page read and write
3010000
unkown
page read and write
7FF5DF5F6000
unkown
page readonly
4B60000
trusted library allocation
page read and write
1FB29B22000
heap
page read and write
22029734000
heap
page read and write
2C40000
unkown
page read and write
1F0000
heap
page read and write
4828000
unkown
page read and write
880000
trusted library allocation
page read and write
5D0000
trusted library allocation
page read and write
2C80000
unkown
page read and write
17F37EFC000
heap
page read and write
2B40000
heap
page read and write
16DDB49A000
heap
page read and write
880000
trusted library allocation
page read and write
200166AF000
heap
page read and write
EA7000
heap
page read and write
2B2D3A6E000
heap
page read and write
2A8C000
heap
page read and write
2B2D3318000
heap
page read and write
866A000
heap
page read and write
29254C26000
heap
page read and write
F50000
unkown
page read and write
24131384000
heap
page read and write
16DDBBD1000
heap
page read and write
24131347000
heap
page read and write
2F60000
trusted library allocation
page read and write
C19D000
unkown
page read and write
233C6FE7000
heap
page read and write
2C80000
unkown
page read and write
16DDBBD8000
heap
page read and write
7FF5DF45C000
unkown
page readonly
4760000
unkown
page read and write
F3613FF000
stack
page read and write
16DDB495000
heap
page read and write
2FE0000
unkown
page read and write
2404C821000
heap
page read and write
2C90000
unkown
page read and write
2360000
trusted library allocation
page read and write
C474000
unkown
page read and write
1748573A000
heap
page read and write
10E0000
heap
page read and write
174851A0000
trusted library allocation
page read and write
1A51DAD0000
trusted library allocation
page read and write
8B6C000
unkown
page read and write
174851E0000
heap
page read and write
29254C05000
heap
page read and write
10C0000
heap
page read and write
20015FDA000
heap
page read and write
2AA8000
heap
page read and write
23F0C09B000
heap
page read and write
1FB29980000
heap
page read and write
200166E5000
heap
page read and write
2A92000
heap
page read and write
7FF5DF54D000
unkown
page readonly
16DDB443000
heap
page read and write
2C90000
unkown
page read and write
2C90000
unkown
page read and write
12B48407000
heap
page read and write
848E000
stack
page read and write
3004000
heap
page read and write
594000
heap
page read and write
5160000
unkown
page read and write
20015FB3000
heap
page read and write
5225000
heap
page read and write
74F1000
unkown
page read and write
1E22C8CD000
heap
page read and write
1748500B000
heap
page read and write
17485750000
heap
page read and write
17F37F04000
heap
page read and write
18EC4090000
trusted library allocation
page read and write
2404C660000
heap
page read and write
B9E0000
unkown
page read and write
1FB29C30000
heap
page read and write
2404E3E0000
heap
page read and write
BE80000
unkown
page read and write
2360000
trusted library allocation
page read and write
44B857F000
stack
page read and write
7FF5DF458000
unkown
page readonly
23F0C000000
trusted library allocation
page read and write
2C20000
unkown
page read and write
2D1E000
stack
page read and write
22029046000
heap
page read and write
2BAE000
stack
page read and write
F50000
unkown
page read and write
22029750000
heap
page read and write
9F0000
heap
page read and write
4983757000
stack
page read and write
1748500C000
heap
page read and write
B5B987F000
stack
page read and write
7910000
unkown
page readonly
233C6FE3000
heap
page read and write
5160000
unkown
page read and write
9FC3000
unkown
page read and write
3362000
unkown
page read and write
2C60000
unkown
page read and write
233C7000000
heap
page read and write
29254BF9000
heap
page read and write
2202B0C0000
heap
page read and write
9260000
unkown
page read and write
2A65000
heap
page read and write
18EC412B000
heap
page read and write
7FF5DF08B000
unkown
page readonly
2C50000
unkown
page read and write
7FF7CBCB1000
unkown
page readonly
2A74000
heap
page read and write
838B000
stack
page read and write
2A8B000
heap
page read and write
22029759000
heap
page read and write
1E22C8A2000
heap
page read and write
22029743000
heap
page read and write
17485727000
heap
page read and write
F50000
unkown
page read and write
2F60000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
474D000
stack
page read and write
5160000
unkown
page read and write
1A51E15A000
heap
page read and write
2C90000
unkown
page read and write
5D0000
trusted library allocation
page read and write
2C90000
unkown
page read and write
2C90000
unkown
page read and write
3190000
unkown
page read and write
4B60000
trusted library allocation
page read and write
29254C03000
heap
page read and write
9A6C000
stack
page read and write
99944FF000
stack
page read and write
8590000
unkown
page readonly
2413139B000
heap
page read and write
7FF5DF5B0000
unkown
page readonly
17F37941000
heap
page read and write
5160000
unkown
page read and write
BE80000
unkown
page read and write
F50000
unkown
page read and write
320C000
stack
page read and write
12B483FE000
heap
page read and write
23F0C0B2000
heap
page read and write
20015F97000
heap
page read and write
2B2D32F9000
heap
page read and write
7FF5DF577000
unkown
page readonly
12B47EB7000
heap
page read and write
16DDB447000
heap
page read and write
233C701A000
heap
page read and write
1FB2A1E1000
heap
page read and write
1A51DB49000
heap
page read and write
2F60000
trusted library allocation
page read and write
2C90000
unkown
page read and write
A6F1000
unkown
page read and write
1A51E151000
heap
page read and write
24131388000
heap
page read and write
5819000
heap
page read and write
2A7E000
heap
page read and write
2B2D331C000
heap
page read and write
9C000
stack
page read and write
EB0000
heap
page read and write
9260000
unkown
page read and write
2FE0000
unkown
page read and write
F50000
unkown
page read and write
23F0C6E8000
heap
page read and write
16DDBBDF000
heap
page read and write
12B48426000
heap
page read and write
20015F50000
trusted library allocation
page read and write
BF40000
unkown
page read and write
20015FA6000
heap
page read and write
20016702000
heap
page read and write
9260000
unkown
page read and write
83F0000
unkown
page read and write
2404C80D000
heap
page read and write
5170000
unkown
page read and write
2413139A000
heap
page read and write
880000
trusted library allocation
page read and write
17F37BA0000
heap
page read and write
4AC0000
trusted library allocation
page read and write
7FF5DF551000
unkown
page readonly
1A51DB6B000
heap
page read and write
F50000
unkown
page read and write
47B6000
unkown
page read and write
2C80000
unkown
page read and write
23F0C6D8000
heap
page read and write
1FB2A1E0000
heap
page read and write
880000
trusted library allocation
page read and write
A08A000
unkown
page read and write
1A51DAD0000
trusted library allocation
page read and write
5B9307E000
stack
page read and write
F50000
unkown
page read and write
416000
unkown
page readonly
16DDBBD5000
heap
page read and write
B5B9A7E000
stack
page read and write
18EC4122000
heap
page read and write
EBD000
heap
page read and write
17485017000
heap
page read and write
83E0000
unkown
page read and write
2202900A000
heap
page read and write
4B60000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
2202971A000
heap
page read and write
F50000
unkown
page read and write
7FF5DF50F000
unkown
page readonly
1E22C990000
heap
page read and write
7FF5DF0F1000
unkown
page readonly
F50000
unkown
page read and write
2B2D395A000
heap
page read and write
16DDB442000
heap
page read and write
16DDB49C000
heap
page read and write
29254C19000
heap
page read and write
1FB29C3E000
heap
page read and write
2404C80D000
heap
page read and write
2360000
trusted library allocation
page read and write
7991000
unkown
page read and write
17485758000
heap
page read and write
5840000
heap
page read and write
96F5000
unkown
page read and write
C13D000
unkown
page read and write
2C40000
unkown
page read and write
BE80000
unkown
page read and write
2360000
trusted library allocation
page read and write
2404E410000
heap
page read and write
7FF5DF5A8000
unkown
page readonly
5160000
unkown
page read and write
2360000
trusted library allocation
page read and write
20016523000
heap
page read and write
2FE0000
unkown
page read and write
7DF4E67A1000
unkown
page execute read
2C80000
unkown
page read and write
29254C19000
heap
page read and write
BE80000
unkown
page read and write
4B60000
trusted library allocation
page read and write
2C20000
unkown
page read and write
20016160000
heap
page read and write
73B4000
unkown
page read and write
20015FCF000
heap
page read and write
2202973D000
heap
page read and write
5D0000
trusted library allocation
page read and write
22028FE7000
heap
page read and write
23081470000
heap
page read and write
200181E0000
heap
page read and write
23F0C0C5000
heap
page read and write
20016739000
heap
page read and write
233C6D9B000
heap
page read and write
241310F0000
trusted library allocation
page read and write
5819000
heap
page read and write
1FB29BD0000
trusted library allocation
page read and write
8860000
stack
page read and write
22029750000
heap
page read and write
7FF5DF4AB000
unkown
page readonly
1A51DAB0000
heap
page read and write
20015FCF000
heap
page read and write
23F0C099000
heap
page read and write
1A51E15A000
heap
page read and write
880000
trusted library allocation
page read and write
5851000
heap
page read and write
233C7001000
heap
page read and write
24131144000
heap
page read and write
2C20000
unkown
page read and write
7FF5DF3A1000
unkown
page readonly
2B2D3940000
heap
page read and write
16DDB400000
trusted library allocation
page read and write
83D0000
unkown
page read and write
A6CF000
unkown
page read and write
20015FC3000
heap
page read and write
16DDB498000
heap
page read and write
AB8C000
stack
page read and write
400000
unkown
page execute and read and write
2FE0000
unkown
page read and write
16DDBC00000
heap
page read and write
4766000
unkown
page read and write
20017FC1000
heap
page read and write
2B2D3960000
heap
page read and write
978C000
unkown
page read and write
2C50000
unkown
page read and write
7FF5DF23A000
unkown
page readonly
2F60000
trusted library allocation
page read and write
2360000
trusted library allocation
page read and write
1FB29C3A000
heap
page read and write
2B2D3A6B000
heap
page read and write
2C60000
unkown
page read and write
B9BF000
stack
page read and write
21D0000
heap
page read and write
5160000
unkown
page read and write
2C20000
unkown
page read and write
2C60000
unkown
page read and write
BE80000
unkown
page read and write
28D3000
heap
page read and write
2C20000
unkown
page read and write
F50000
unkown
page read and write
2404C86A000
heap
page read and write
2A66000
heap
page read and write
3349000
unkown
page read and write
29F337E000
stack
page read and write
17F38020000
heap
page read and write
2202900A000
heap
page read and write
230814FD000
heap
page read and write
23F0C375000
heap
page read and write
2360000
trusted library allocation
page read and write
16DDB4C2000
heap
page read and write
9260000
unkown
page read and write
22D0000
heap
page read and write
2A68000
heap
page read and write
1E22CEAA000
heap
page read and write
1A51E168000
heap
page read and write
2C20000
unkown
page read and write
2F60000
trusted library allocation
page read and write
584000
heap
page read and write
2FE0000
unkown
page read and write
7FF5DF0C3000
unkown
page readonly
BE80000
unkown
page read and write
174851A0000
trusted library allocation
page read and write
3010000
unkown
page read and write
83F0000
unkown
page read and write
2B2D3314000
heap
page read and write
2FE0000
unkown
page read and write
22029743000
heap
page read and write
16DDBBC7000
heap
page read and write
17F37F19000
heap
page read and write
3010000
unkown
page read and write
2360000
trusted library allocation
page read and write
2413139F000
heap
page read and write
22029743000
heap
page read and write
7FF5DEFF8000
unkown
page readonly
5160000
unkown
page read and write
2A76000
heap
page read and write
F50000
unkown
page read and write
BE80000
unkown
page read and write
F50000
unkown
page read and write
2202973D000
heap
page read and write
7C0000
heap
page read and write
2FE0000
unkown
page read and write
A1F000
stack
page read and write
2360000
trusted library allocation
page read and write
874C000
stack
page read and write
2A74000
heap
page read and write
17484FE9000
heap
page read and write
F3614FE000
stack
page read and write
2EE38DD0000
heap
page read and write
12B47ED2000
heap
page read and write
5160000
unkown
page read and write
2C20000
unkown
page read and write
4B60000
trusted library allocation
page read and write
29254C19000
heap
page read and write
971A000
unkown
page read and write
200166CA000
heap
page read and write
880000
trusted library allocation
page read and write
83F0000
unkown
page read and write
2360000
trusted library allocation
page read and write
98A1000
unkown
page read and write
BE80000
unkown
page read and write
2B2D3318000
heap
page read and write
2C90000
unkown
page read and write
2FE0000
unkown
page read and write
EAC000
heap
page read and write
4B60000
trusted library allocation
page read and write
5160000
unkown
page read and write
2B2D3A6A000
heap
page read and write
AC16C7F000
stack
page read and write
230815D5000
heap
page read and write
24131167000
heap
page read and write
12B48426000
heap
page read and write
29254BC0000
heap
page read and write
23F0C0B2000
heap
page read and write
7FF5DF5FC000
unkown
page readonly
18EC3E97000
heap
page read and write
23F0C0BD000
heap
page read and write
7FF5DF571000
unkown
page readonly
F50000
unkown
page read and write
5160000
unkown
page read and write
12B480AA000
heap
page read and write
2360000
trusted library allocation
page read and write
29254C19000
heap
page read and write
2413147A000
heap
page read and write
4855000
unkown
page read and write
18EC3E8E000
heap
page read and write
880000
trusted library allocation
page read and write
3010000
unkown
page read and write
17F37890000
trusted library allocation
page read and write
16DDBBE4000
heap
page read and write
17F37947000
heap
page read and write
2360000
trusted library allocation
page read and write
7FF5DF2BA000
unkown
page readonly
16DDBBEF000
heap
page read and write
24131345000
heap
page read and write
16DDBBEF000
heap
page read and write
2C90000
unkown
page read and write
16DDB4C6000
heap
page read and write
5819000
heap
page read and write
2202972C000
heap
page read and write
83F0000
unkown
page read and write
BE80000
unkown
page read and write
233C6DA1000
heap
page read and write
7FF5DF5B5000
unkown
page readonly
1748571A000
heap
page read and write
87DCAFF000
stack
page read and write
2FE0000
unkown
page read and write
2001600B000
heap
page read and write
20015FCF000
heap
page read and write
12B48527000
heap
page read and write
1FB2A1C0000
heap
page read and write
23F0C6C0000
heap
page read and write
1A51DAF5000
heap
page read and write
2C80000
unkown
page read and write
51A0000
unkown
page read and write
20016705000
heap
page read and write
7FF5DF3BE000
unkown
page readonly
23F0C6CC000
heap
page read and write
3010000
unkown
page read and write
5819000
heap
page read and write
2C70000
unkown
page read and write
BE80000
unkown
page read and write
7FF5DF229000
unkown
page readonly
7FF5DF12A000
unkown
page readonly
B589000
stack
page read and write
2360000
trusted library allocation
page read and write
3190000
unkown
page read and write
7FF5DF55A000
unkown
page readonly
2001600B000
heap
page read and write
BE80000
unkown
page read and write
151BB7F000
stack
page read and write
2A69000
heap
page read and write
1FB29B08000
heap
page read and write
F50000
unkown
page read and write
2A8B000
heap
page read and write
9700000
unkown
page read and write
BE80000
unkown
page read and write
9260000
unkown
page read and write
AAA000
system
page execute and read and write
2360000
trusted library allocation
page read and write
5833000
heap
page read and write
88E0000
unkown
page read and write
7FF5DF3F7000
unkown
page readonly
7399000
unkown
page read and write
EAC000
heap
page read and write
2001668F000
heap
page read and write
2001672F000
heap
page read and write
3371000
unkown
page read and write
233C7025000
heap
page read and write
E70000
heap
page read and write
2F60000
trusted library allocation
page read and write
9260000
unkown
page read and write
12B48405000
heap
page read and write
650000
heap
page read and write
2C20000
unkown
page read and write
18EC4634000
heap
page read and write
EB2000
heap
page read and write
12B47ED2000
heap
page read and write
9260000
unkown
page read and write
2D63000
unkown
page read and write
4F6000
unkown
page readonly
16DDB400000
trusted library allocation
page read and write
BE80000
unkown
page read and write
4B60000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
2C80000
unkown
page read and write
2B2D393F000
heap
page read and write
5819000
heap
page read and write
2A66000
heap
page read and write
17485717000
heap
page read and write
7FF5DF0D2000
unkown
page readonly
1FC000
stack
page read and write
29F33FE000
stack
page read and write
2A75000
heap
page read and write
F80000
unkown
page read and write
AB0D000
stack
page read and write
2413139C000
heap
page read and write
200166E2000
heap
page read and write
5D0000
trusted library allocation
page read and write
7FF5DF5B3000
unkown
page readonly
2FE0000
unkown
page read and write
5B92DFF000
stack
page read and write
23F0C098000
heap
page read and write
20015FBB000
heap
page read and write
20016692000
heap
page read and write
18EC4650000
heap
page read and write
5D0000
trusted library allocation
page read and write
23F0C0BF000
heap
page read and write
7FF5DF4E3000
unkown
page readonly
9260000
unkown
page read and write
16DDBC00000
heap
page read and write
12B48405000
heap
page read and write
5D0000
trusted library allocation
page read and write
1748574C000
heap
page read and write
5160000
unkown
page read and write
233C6F20000
heap
page read and write
BE80000
unkown
page read and write
41A000
unkown
page readonly
20015FD0000
heap
page read and write
18EC463E000
heap
page read and write
BE80000
unkown
page read and write
18EC462C000
heap
page read and write
5D0000
trusted library allocation
page read and write
2413134B000
heap
page read and write
200166AE000
heap
page read and write
12B47EFC000
heap
page read and write
18EC4653000
heap
page read and write
83F0000
unkown
page read and write
2A74000
heap
page read and write
22029200000
trusted library allocation
page read and write
24131165000
heap
page read and write
7FF5DF532000
unkown
page readonly
1E22C9E0000
trusted library allocation
page read and write
1E22CEA0000
heap
page read and write
17F37944000
heap
page read and write
9260000
unkown
page read and write
3004000
heap
page read and write
22029740000
heap
page read and write
2001667C000
heap
page read and write
BFAB000
unkown
page read and write
2404C844000
heap
page read and write
6C0000
heap
page read and write
12B47FA0000
heap
page read and write
7FF5DF623000
unkown
page readonly
5160000
unkown
page read and write
20015FBD000
heap
page read and write
1FB2A1CB000
heap
page read and write
2E8C000
stack
page read and write
1FB29C32000
heap
page read and write
BE80000
unkown
page read and write
4A60000
heap
page read and write
12B48525000
heap
page read and write
3BB000
stack
page read and write
2A81000
heap
page read and write
23F0C6DB000
heap
page read and write
10180000
unkown
page read and write
2B2D32FB000
heap
page read and write
880000
trusted library allocation
page read and write
9260000
unkown
page read and write
2C80000
unkown
page read and write
23F0C098000
heap
page read and write
5160000
unkown
page read and write
18EC4631000
heap
page read and write
6AE000
stack
page read and write
9260000
unkown
page read and write
2F60000
trusted library allocation
page read and write
5160000
unkown
page read and write
2360000
trusted library allocation
page read and write
5160000
unkown
page read and write
24131343000
heap
page read and write
1E22E870000
heap
page read and write
9260000
unkown
page read and write
22029754000
heap
page read and write
2A6C000
heap
page read and write
1A51DAF7000
heap
page read and write
1E22CEF9000
heap
page read and write
12B47E80000
heap
page read and write
5170000
unkown
page read and write
581A000
heap
page read and write
5241000
unkown
page read and write
2F60000
trusted library allocation
page read and write
BE80000
unkown
page read and write
7FF5DF343000
unkown
page readonly
AC16CFF000
stack
page read and write
BE80000
unkown
page read and write
22029037000
heap
page read and write
16DDB4CB000
heap
page read and write
16DDB3C0000
heap
page read and write
17485740000
heap
page read and write
2001667D000
heap
page read and write
29254BFE000
heap
page read and write
12B48426000
heap
page read and write
3190000
unkown
page read and write
51A0000
unkown
page read and write
2A65000
heap
page read and write
23F0C05B000
heap
page read and write
880000
trusted library allocation
page read and write
909C000
stack
page read and write
5F0000
direct allocation
page execute and read and write
6B0000
direct allocation
page execute and read and write
7FF5DF539000
unkown
page readonly
2E20000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
2B2D34B0000
trusted library allocation
page read and write
BFDF000
unkown
page read and write
4B60000
trusted library allocation
page read and write
BE80000
unkown
page read and write
12B48436000
heap
page read and write
17F37890000
trusted library allocation
page read and write
2413137C000
heap
page read and write
2404C7E2000
heap
page read and write
EAE000
heap
page read and write
2F60000
trusted library allocation
page read and write
2360000
trusted library allocation
page read and write
7FF7CBCA1000
unkown
page execute read
2C40000
unkown
page read and write
233C6D79000
heap
page read and write
5D0000
trusted library allocation
page read and write
233C6D59000
heap
page read and write
BF6D000
unkown
page read and write
17F37EF8000
heap
page read and write
B9F0000
unkown
page read and write
2C20000
unkown
page read and write
2C60000
unkown
page read and write
5160000
unkown
page read and write
BE80000
unkown
page read and write
5840000
heap
page read and write
18EC4627000
heap
page read and write
9F3E000
unkown
page read and write
4AC0000
trusted library allocation
page read and write
23F0C0B2000
heap
page read and write
22029046000
heap
page read and write
1748571E000
heap
page read and write
880000
trusted library allocation
page read and write
5819000
heap
page read and write
AC1699F000
stack
page read and write
5160000
unkown
page read and write
7FF5DF3C6000
unkown
page readonly
1E22CEAB000
heap
page read and write
9716000
unkown
page read and write
73AF000
unkown
page read and write
18EC4633000
heap
page read and write
29254C28000
heap
page read and write
EC4000
heap
page read and write
1E22C8E7000
heap
page read and write
970C000
unkown
page read and write
5160000
unkown
page read and write
2C50000
unkown
page read and write
22029009000
heap
page read and write
C01A000
unkown
page read and write
17F37952000
heap
page read and write
2413134E000
heap
page read and write
DDB80FE000
stack
page read and write
C1EC3FF000
stack
page read and write
BE80000
unkown
page read and write
4B60000
trusted library allocation
page read and write
1748501C000
heap
page read and write
3190000
unkown
page read and write
2C90000
unkown
page read and write
5F0000
heap
page read and write
4B60000
trusted library allocation
page read and write
20018018000
heap
page read and write
17F37F19000
heap
page read and write
16DDBBEF000
heap
page read and write
18EC4649000
heap
page read and write
17485717000
heap
page read and write
12B47F06000
heap
page read and write
BE80000
unkown
page read and write
17F37902000
heap
page read and write
F50000
unkown
page read and write
2F60000
trusted library allocation
page read and write
12B47ED2000
heap
page read and write
5160000
unkown
page read and write
2001672F000
heap
page read and write
73BA000
unkown
page read and write
6E0000
unclassified section
page read and write
5160000
unkown
page read and write
1A51DB74000
heap
page read and write
17F37941000
heap
page read and write
233C6D54000
heap
page read and write
16DDB444000
heap
page read and write
7FF5DF396000
unkown
page readonly
17485734000
heap
page read and write
F50000
unkown
page read and write
7FF5DF067000
unkown
page readonly
880000
trusted library allocation
page read and write
1FB2A1DC000
heap
page read and write
1FB2A1BF000
heap
page read and write
880000
trusted library allocation
page read and write
2001616B000
heap
page read and write
2360000
trusted library allocation
page read and write
20016522000
heap
page read and write
10180000
unkown
page read and write
6AE000
stack
page read and write
12B48411000
heap
page read and write
2C40000
unkown
page read and write
2413139A000
heap
page read and write
3364000
unkown
page read and write
989F000
unkown
page read and write
17484FB8000
heap
page read and write
2F60000
trusted library allocation
page read and write
17F378C0000
heap
page read and write
9260000
unkown
page read and write
7FF5DF08F000
unkown
page readonly
2FE0000
unkown
page read and write
1E22C8ED000
heap
page read and write
27D0000
unkown
page read and write
17484F90000
heap
page read and write
2A84000
heap
page read and write
4AFD000
stack
page read and write
24131156000
heap
page read and write
F50000
unkown
page read and write
7FF5DF626000
unkown
page readonly
17485018000
heap
page read and write
17F3802A000
heap
page read and write
2C90000
unkown
page read and write
4B60000
trusted library allocation
page read and write
17F37926000
heap
page read and write
200166AA000
heap
page read and write
17F37952000
heap
page read and write
7FF5DF4EC000
unkown
page readonly
AF7E000
stack
page read and write
23F0C068000
heap
page read and write
1FB2A1DC000
heap
page read and write
23F0C6C7000
heap
page read and write
F50000
unkown
page read and write
5160000
unkown
page read and write
F40000
heap
page read and write
6CB000
heap
page read and write
43D000
stack
page read and write
7FF5DF207000
unkown
page readonly
17F378F0000
heap
page read and write
17F37F06000
heap
page read and write
2FE0000
unkown
page read and write
2C20000
unkown
page read and write
16DDB44E000
heap
page read and write
2404C8A8000
heap
page read and write
A072000
unkown
page read and write
2202973E000
heap
page read and write
2C90000
unkown
page read and write
880000
trusted library allocation
page read and write
233C700A000
heap
page read and write
2C40000
unkown
page read and write
95EE000
stack
page read and write
2C80000
unkown
page read and write
2C90000
unkown
page read and write
BF7E000
unkown
page read and write
880000
trusted library allocation
page read and write
AD0000
heap
page read and write
9260000
unkown
page read and write
20016028000
heap
page read and write
22028FD8000
heap
page read and write
BF84000
unkown
page read and write
20016019000
heap
page read and write
4B60000
trusted library allocation
page read and write
5160000
unkown
page read and write
2FE0000
unkown
page read and write
2C80000
unkown
page read and write
F50000
unkown
page read and write
23F0E030000
heap
page read and write
7B50000
unkown
page readonly
2FE0000
unkown
page read and write
20017FC1000
heap
page read and write
20015F40000
heap
page read and write
23F0C6DB000
heap
page read and write
9260000
unkown
page read and write
4B60000
trusted library allocation
page read and write
9C1D000
stack
page read and write
2FE0000
unkown
page read and write
17F37941000
heap
page read and write
20016677000
heap
page read and write
83F0000
unkown
page read and write
C8B7FFE000
stack
page read and write
3E1D37E000
stack
page read and write
7FF5DF017000
unkown
page readonly
880000
trusted library allocation
page read and write
2C20000
unkown
page read and write
9260000
unkown
page read and write
12B47EDC000
heap
page read and write
C1EC37F000
stack
page read and write
880000
trusted library allocation
page read and write
2A74000
heap
page read and write
7FF5DF422000
unkown
page readonly
2C40000
unkown
page read and write
7C89000
stack
page read and write
20015F9B000
heap
page read and write
5160000
unkown
page read and write
3010000
unkown
page read and write
17485004000
heap
page read and write
52C3000
unkown
page read and write
2FE0000
unkown
page read and write
2C90000
unkown
page read and write
5D0000
trusted library allocation
page read and write
233C701C000
heap
page read and write
1748574A000
heap
page read and write
2360000
trusted library allocation
page read and write
1FB29B35000
heap
page read and write
F50000
unkown
page read and write
24131344000
heap
page read and write
5160000
unkown
page read and write
C2E4000
unkown
page read and write
5160000
unkown
page read and write
BE80000
unkown
page read and write
5160000
unkown
page read and write
17485750000
heap
page read and write
200166D6000
heap
page read and write
7FF5DF248000
unkown
page readonly
1A51DCBA000
heap
page read and write
17F37890000
trusted library allocation
page read and write
12B49F10000
heap
page read and write
BD7F000
stack
page read and write
2360000
trusted library allocation
page read and write
22029026000
heap
page read and write
2413139A000
heap
page read and write
7FF5DEF84000
unkown
page readonly
17F37941000
heap
page read and write
1FB29AD0000
heap
page read and write
29254DE5000
heap
page read and write
17485009000
heap
page read and write
23F0C053000
heap
page read and write
4B8E000
stack
page read and write
2202971E000
heap
page read and write
2360000
trusted library allocation
page read and write
12B483FE000
heap
page read and write
3004000
heap
page read and write
BE80000
unkown
page read and write
AEF0000
unkown
page read and write
17F38022000
heap
page read and write
516000
unkown
page readonly
1748571A000
heap
page read and write
F80000
unkown
page read and write
1A51E168000
heap
page read and write
2E20000
trusted library allocation
page read and write
7FF5DEFFC000
unkown
page readonly
2E20000
trusted library allocation
page read and write
A02D000
unkown
page read and write
F50000
unkown
page read and write
1E22C898000
heap
page read and write
5819000
heap
page read and write
561D000
heap
page read and write
22029761000
heap
page read and write
22029733000
heap
page read and write
1A51DAFB000
heap
page read and write
2413134A000
heap
page read and write
F50000
unkown
page read and write
151BC7E000
stack
page read and write
2A92000
heap
page read and write
22029033000
heap
page read and write
BE80000
unkown
page read and write
2202973A000
heap
page read and write
2C90000
unkown
page read and write
F50000
unkown
page read and write
2FE0000
unkown
page read and write
EEAE000
unkown
page read and write
2FE0000
unkown
page read and write
1E22C8E3000
heap
page read and write
880000
trusted library allocation
page read and write
2202973D000
heap
page read and write
418000
unkown
page write copy
233C6D95000
heap
page read and write
5160000
unkown
page read and write
2FE0000
unkown
page read and write
7FF5DF211000
unkown
page readonly
2413113B000
heap
page read and write
6D3000
heap
page execute and read and write
1748574A000
heap
page read and write
582B000
heap
page read and write
1E22CEED000
heap
page read and write
BE80000
unkown
page read and write
2B2D3311000
heap
page read and write
2413139C000
heap
page read and write
20016019000
heap
page read and write
17485020000
heap
page read and write
1E22CEAE000
heap
page read and write
2FE0000
unkown
page read and write
488A000
unkown
page read and write
16DDB4B3000
heap
page read and write
2202903E000
heap
page read and write
16DDBBDC000
heap
page read and write
5C7000
system
page execute and read and write
16DDB496000
heap
page read and write
BE80000
unkown
page read and write
20016705000
heap
page read and write
880000
trusted library allocation
page read and write
18EC4127000
heap
page read and write
16DDBBC9000
heap
page read and write
2404C86C000
heap
page read and write
1FB29B08000
heap
page read and write
2B2D395A000
heap
page read and write
2B2D32F8000
heap
page read and write
233C6F40000
heap
page read and write
18EC3EBB000
heap
page read and write
9260000
unkown
page read and write
12B48426000
heap
page read and write
17F39910000
heap
page read and write
24131156000
heap
page read and write
12B48434000
heap
page read and write
7DF4E6761000
unkown
page execute read
23F0C6E8000
heap
page read and write
4AC0000
trusted library allocation
page read and write
3373000
unkown
page read and write
4B60000
trusted library allocation
page read and write
2404C7FF000
heap
page read and write
4B60000
trusted library allocation
page read and write
2A74000
heap
page read and write
2C60000
unkown
page read and write
2A68000
heap
page read and write
2202900D000
heap
page read and write
880000
trusted library allocation
page read and write
16DDB4B1000
heap
page read and write
1E22CEFE000
heap
page read and write
20015FCF000
heap
page read and write
AA1000
system
page execute and read and write
16DDB497000
heap
page read and write
5160000
unkown
page read and write
1FB29C35000
heap
page read and write
2360000
trusted library allocation
page read and write
1E22CEDC000
heap
page read and write
9C000
stack
page read and write
16DDBBF0000
heap
page read and write
880000
trusted library allocation
page read and write
5160000
unkown
page read and write
9260000
unkown
page read and write
233C6DA7000
heap
page read and write
BE80000
unkown
page read and write
880000
trusted library allocation
page read and write
5160000
unkown
page read and write
233C7007000
heap
page read and write
2413137E000
heap
page read and write
9260000
unkown
page read and write
2AD0000
heap
page read and write
22029757000
heap
page read and write
2FE0000
unkown
page read and write
600000
heap
page read and write
23F0E040000
heap
page read and write
401000
unkown
page execute read
2404C740000
heap
page read and write
18EC4649000
heap
page read and write
3010000
unkown
page read and write
23F0C6DB000
heap
page read and write
2001672F000
heap
page read and write
4A61000
heap
page read and write
2360000
trusted library allocation
page read and write
F50000
unkown
page read and write
113C4FE000
stack
page read and write
2FE0000
unkown
page read and write
880000
trusted library allocation
page read and write
20016692000
heap
page read and write
4B60000
trusted library allocation
page read and write
2C80000
unkown
page read and write
12B4843C000
heap
page read and write
22029717000
heap
page read and write
23F0C09F000
heap
page read and write
2B2D3944000
heap
page read and write
2404C832000
heap
page read and write
200181C1000
heap
page read and write
2F60000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
5160000
unkown
page read and write
8660000
heap
page read and write
2404C821000
heap
page read and write
233C6DA5000
heap
page read and write
12B48527000
heap
page read and write
16DDBBD4000
heap
page read and write
119F000
stack
page read and write
880000
trusted library allocation
page read and write
F50000
unkown
page read and write
2B2D393D000
heap
page read and write
2413139A000
heap
page read and write
5160000
unkown
page read and write
3004000
heap
page read and write
400000
unkown
page execute and read and write
23A0000
heap
page read and write
571B000
heap
page read and write
BE80000
unkown
page read and write
A106000
unkown
page read and write
1E22C8EF000
heap
page read and write
5160000
unkown
page read and write
9330000
unkown
page read and write
16DDBBD0000
heap
page read and write
2490000
heap
page read and write
233C6F60000
trusted library allocation
page read and write
23F0C0B9000
heap
page read and write
5839000
heap
page read and write
8A36000
unkown
page read and write
A7C000
stack
page read and write
1A51DB62000
heap
page read and write
1A51DB48000
heap
page read and write
7FF5DF5A3000
unkown
page readonly
5160000
unkown
page read and write
2B2D395A000
heap
page read and write
44B85FE000
stack
page read and write
A0A5000
unkown
page read and write
A744000
unkown
page read and write
23F0C05A000
heap
page read and write
41D000
unkown
page write copy
2FE0000
unkown
page read and write
2413139E000
heap
page read and write
487A000
unkown
page read and write
DDB7DEF000
stack
page read and write
23F0C6D7000
heap
page read and write
2C40000
unkown
page read and write
4B60000
trusted library allocation
page read and write
10100000
unkown
page read and write
9260000
unkown
page read and write
F50000
unkown
page read and write
233C6D96000
heap
page read and write
2B2D3314000
heap
page read and write
23081490000
heap
page read and write
5160000
unkown
page read and write
47A2000
unkown
page read and write
880000
trusted library allocation
page read and write
2C60000
unkown
page read and write
F50000
unkown
page read and write
BE80000
unkown
page read and write
2202902E000
heap
page read and write
24131138000
heap
page read and write
5160000
unkown
page read and write
9E1E000
stack
page read and write
17F37944000
heap
page read and write
12B48416000
heap
page read and write
51A0000
unkown
page read and write
590000
heap
page read and write
18EC4124000
heap
page read and write
18EC4649000
heap
page read and write
22029016000
heap
page read and write
19D000
stack
page read and write
1FB29AA0000
trusted library allocation
page read and write
2C90000
unkown
page read and write
12B48426000
heap
page read and write
24131475000
heap
page read and write
880000
trusted library allocation
page read and write
17F37928000
heap
page read and write
F50000
unkown
page read and write
12B4840E000
heap
page read and write
1FB2A1CB000
heap
page read and write
20015FCF000
heap
page read and write
2A75000
heap
page read and write
2FE0000
unkown
page read and write
BE80000
unkown
page read and write
2F60000
trusted library allocation
page read and write
2360000
trusted library allocation
page read and write
2C60000
unkown
page read and write
20017FC0000
heap
page read and write
2E01000
unkown
page read and write
22029023000
heap
page read and write
233C701A000
heap
page read and write
5160000
unkown
page read and write
880000
trusted library allocation
page read and write
12B48415000
heap
page read and write
12B47E88000
heap
page read and write
5160000
unkown
page read and write
1FB2A1B8000
heap
page read and write
20017FB0000
heap
page read and write
2360000
trusted library allocation
page read and write
233C6D91000
heap
page read and write
65E000
stack
page read and write
AFFC000
stack
page read and write
9330000
unkown
page read and write
47F3000
unkown
page read and write
12B48404000
heap
page read and write
5160000
unkown
page read and write
1748574D000
heap
page read and write
20015FDA000
heap
page read and write
22A0000
heap
page read and write
2C60000
unkown
page read and write
7FF7CBCB5000
unkown
page readonly
1A51DB74000
heap
page read and write
7FF5DF60D000
unkown
page readonly
17485755000
heap
page read and write
24131347000
heap
page read and write
5160000
unkown
page read and write
1A51E168000
heap
page read and write
9D1F000
stack
page read and write
F50000
unkown
page read and write
48B0000
unkown
page read and write
739B000
unkown
page read and write
16DDB4B6000
heap
page read and write
7FF5DF2ED000
unkown
page readonly
17F3794C000
heap
page read and write
23F0BFC0000
heap
page read and write
2C60000
unkown
page read and write
2C80000
unkown
page read and write
BE80000
unkown
page read and write
1E22CEF8000
heap
page read and write
23081450000
heap
page read and write
2360000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
1FB2A1B7000
heap
page read and write
23F0C0B9000
heap
page read and write
2404C81E000
heap
page read and write
17485733000
heap
page read and write
880000
trusted library allocation
page read and write
18EC3EDE000
heap
page read and write
24131342000
heap
page read and write
5D0000
trusted library allocation
page read and write
BE80000
unkown
page read and write
3E1D2FF000
stack
page read and write
29254C19000
heap
page read and write
987C000
unkown
page read and write
EA2000
heap
page read and write
5160000
unkown
page read and write
C1CC000
unkown
page read and write
400000
unkown
page readonly
22029023000
heap
page read and write
40B000
unkown
page execute read
474E000
heap
page read and write
BF10000
unkown
page readonly
C149000
unkown
page read and write
5160000
unkown
page read and write
2410000
heap
page read and write
1FB2A1BC000
heap
page read and write
2FE0000
unkown
page read and write
99AB000
unkown
page read and write
5170000
unkown
page read and write
880000
trusted library allocation
page read and write
20016524000
heap
page read and write
33C0000
unkown
page readonly
2404C7B0000
heap
page read and write
12B47FF0000
heap
page read and write
20016190000
trusted library allocation
page read and write
16DDBBDD000
heap
page read and write
F50000
unkown
page read and write
5160000
unkown
page read and write
18EC3EDC000
heap
page read and write
880000
trusted library allocation
page read and write
5160000
unkown
page read and write
20015FB3000
heap
page read and write
BE80000
unkown
page read and write
9FA0000
unkown
page read and write
2B2D3962000
heap
page read and write
18EC412A000
heap
page read and write
4B60000
trusted library allocation
page read and write
A6EE000
unkown
page read and write
2C20000
unkown
page read and write
2C60000
unkown
page read and write
22029729000
heap
page read and write
2E30000
unkown
page read and write
9F23000
unkown
page read and write
1A51E14F000
heap
page read and write
901B000
stack
page read and write
2FE0000
unkown
page read and write
2360000
trusted library allocation
page read and write
B5B99FE000
stack
page read and write
B010000
unkown
page read and write
12B47F10000
heap
page read and write
1FB2BA50000
heap
page read and write
F80000
unkown
page read and write
16DDBBD4000
heap
page read and write
17485720000
heap
page read and write
582F000
heap
page read and write
5819000
heap
page read and write
16DDBBD5000
heap
page read and write
12B4852E000
heap
page read and write
2001600B000
heap
page read and write
2B2D3311000
heap
page read and write
880000
trusted library allocation
page read and write
2B2D3290000
heap
page read and write
5160000
unkown
page read and write
1E22C8CB000
heap
page read and write
7FF5DF2E2000
unkown
page readonly
4F2B000
heap
page read and write
5D0000
trusted library allocation
page read and write
18EC3ED2000
heap
page read and write
20016680000
heap
page read and write
5160000
unkown
page read and write
2202973C000
heap
page read and write
880000
trusted library allocation
page read and write
3190000
unkown
page read and write
2F60000
trusted library allocation
page read and write
9509000
stack
page read and write
17485737000
heap
page read and write
2FE0000
unkown
page read and write
17F3802E000
heap
page read and write
2B2D3939000
heap
page read and write
654000
heap
page read and write
5160000
unkown
page read and write
233C6FEA000
heap
page read and write
2413138A000
heap
page read and write
20016722000
heap
page read and write
497000
system
page execute and read and write
16DDBBCC000
heap
page read and write
17F3792A000
heap
page read and write
16DDB730000
heap
page read and write
1748571A000
heap
page read and write
20015FCF000
heap
page read and write
2A8D000
heap
page read and write
2308152A000
heap
page read and write
BE80000
unkown
page read and write
20016016000
heap
page read and write
516000
unkown
page readonly
2360000
trusted library allocation
page read and write
7930000
unkown
page readonly
880000
trusted library allocation
page read and write
5160000
unkown
page read and write
18EC4123000
heap
page read and write
7FF5DF606000
unkown
page readonly
17485740000
heap
page read and write
2A7C000
heap
page read and write
16DDB4B3000
heap
page read and write
530000
direct allocation
page execute and read and write
17487110000
heap
page read and write
2202971A000
heap
page read and write
44B84FF000
stack
page read and write
5857000
heap
page read and write
17F37F08000
heap
page read and write
1A51E15A000
heap
page read and write
2C90000
unkown
page read and write
20016525000
heap
page read and write
2001652E000
heap
page read and write
4CB0000
heap
page read and write
5160000
unkown
page read and write
C525000
unkown
page read and write
233C6FFF000
heap
page read and write
1A51E14C000
heap
page read and write
4B60000
trusted library allocation
page read and write
2A84000
heap
page read and write
BFA7000
unkown
page read and write
16DDB440000
heap
page read and write
F50000
unkown
page read and write
1E22CED8000
heap
page read and write
880000
trusted library allocation
page read and write
73A000
heap
page read and write
F50000
unkown
page read and write
2C20000
unkown
page read and write
5160000
unkown
page read and write
5819000
heap
page read and write
17485009000
heap
page read and write
233C6FFC000
heap
page read and write
BF90000
unkown
page read and write
BE80000
unkown
page read and write
20015F99000
heap
page read and write
24131350000
heap
page read and write
2360000
trusted library allocation
page read and write
1A51D9B0000
heap
page read and write
18EC3ED2000
heap
page read and write
51A0000
unkown
page read and write
7FF5DF0A2000
unkown
page readonly
C146000
unkown
page read and write
12B48520000
heap
page read and write
233C6D47000
heap
page read and write
16DDB4C4000
heap
page read and write
2FE0000
unkown
page read and write
2500000
heap
page read and write
8860000
unkown
page read and write
151BA77000
stack
page read and write
2B2D395A000
heap
page read and write
EE82000
unkown
page read and write
7940000
unkown
page readonly
5160000
unkown
page read and write
16DDBBC0000
heap
page read and write
8910000
unkown
page read and write
571B000
heap
page read and write
18EC3ED6000
heap
page read and write
83F0000
unkown
page read and write
7FF5DF341000
unkown
page readonly
C1EC4FF000
stack
page read and write
20015FC0000
heap
page read and write
2A70000
heap
page read and write
2404C825000
heap
page read and write
1FB29B2D000
heap
page read and write
7FF5DF452000
unkown
page readonly
F50000
unkown
page read and write
2A74000
heap
page read and write
1FB2A1D9000
heap
page read and write
B830000
unkown
page readonly
7FF5DF582000
unkown
page readonly
2360000
trusted library allocation
page read and write
22028FF9000
heap
page read and write
12B4840C000
heap
page read and write
1748574A000
heap
page read and write
233C6E40000
heap
page read and write
1E22CEE4000
heap
page read and write
23F0C0B5000
heap
page read and write
24131370000
heap
page read and write
7810000
unkown
page read and write
3010000
unkown
page read and write
BF82000
unkown
page read and write
1FB29C34000
heap
page read and write
1FB29B30000
heap
page read and write
3FC000
stack
page read and write
1E22C8F7000
heap
page read and write
BE80000
unkown
page read and write
2B2D3A63000
heap
page read and write
20016705000
heap
page read and write
23F0C6D4000
heap
page read and write
580000
heap
page read and write
C8B7BDF000
stack
page read and write
233C6D79000
heap
page read and write
880000
trusted library allocation
page read and write
9260000
unkown
page read and write
16DDBBCC000
heap
page read and write
17F37953000
heap
page read and write
9260000
unkown
page read and write
584C000
heap
page read and write
2C90000
unkown
page read and write
3290000
unkown
page readonly
880000
trusted library allocation
page read and write
5835000
heap
page read and write
18EC3EB9000
heap
page read and write
880000
trusted library allocation
page read and write
23F0C6F1000
heap
page read and write
20016756000
heap
page read and write
7FF5DF156000
unkown
page readonly
12B48524000
heap
page read and write
16DDBBCF000
heap
page read and write
BE80000
unkown
page read and write
24131164000
heap
page read and write
DD0000
heap
page read and write
16DDB400000
trusted library allocation
page read and write
10BF000
stack
page read and write
57E000
stack
page read and write
2B2D3314000
heap
page read and write
F36147F000
stack
page read and write
1FB2A1C8000
heap
page read and write
940F000
stack
page read and write
230814B5000
heap
page read and write
22029200000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
2FE0000
unkown
page read and write
2C80000
unkown
page read and write
233C6FEA000
heap
page read and write
2F60000
trusted library allocation
page read and write
2A8C000
heap
page read and write
16DDBBDF000
heap
page read and write
17F37F00000
heap
page read and write
FFC4000
unkown
page read and write
610000
heap
page read and write
23F0C6E8000
heap
page read and write
12B48413000
heap
page read and write
2360000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
520000
heap
page read and write
1E22CEF8000
heap
page read and write
12B480A0000
heap
page read and write
2360000
trusted library allocation
page read and write
BE80000
unkown
page read and write
7FF7CBCB4000
unkown
page read and write
5160000
unkown
page read and write
2413139A000
heap
page read and write
C298000
unkown
page read and write
29254BF9000
heap
page read and write
2FE0000
unkown
page read and write
9260000
unkown
page read and write
7D90000
unkown
page read and write
5819000
heap
page read and write
5D0000
trusted library allocation
page read and write
7FF5DF43C000
unkown
page readonly
2F60000
trusted library allocation
page read and write
5840000
heap
page read and write
96ED000
unkown
page read and write
2A68000
heap
page read and write
1A51DA90000
heap
page read and write
5160000
unkown
page read and write
1FB2A1BC000
heap
page read and write
83F0000
unkown
page read and write
23F0C000000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
BE80000
unkown
page read and write
2001670A000
heap
page read and write
2A6C000
heap
page read and write
1A51DB55000
heap
page read and write
1E22CEE8000
heap
page read and write
2A74000
heap
page read and write
5160000
unkown
page read and write
2001672F000
heap
page read and write
29254DA0000
heap
page read and write
23F0C054000
heap
page read and write
17F37F19000
heap
page read and write
2ECD000
stack
page read and write
1FB2A1DC000
heap
page read and write
A0FC000
unkown
page read and write
20016694000
heap
page read and write
20017FC1000
heap
page read and write
7FF5DF3D4000
unkown
page readonly
1748572C000
heap
page read and write
1A51DAF3000
heap
page read and write
3010000
unkown
page read and write
416000
unkown
page readonly
233C6D91000
heap
page read and write
16DDB4D1000
heap
page read and write
20015FCF000
heap
page read and write
2C60000
unkown
page read and write
1FB2A1E3000
heap
page read and write
17F37952000
heap
page read and write
7FF5DF584000
unkown
page readonly
B500000
unkown
page readonly
5D0000
trusted library allocation
page read and write
7ACE000
stack
page read and write
2413134A000
heap
page read and write
12B47EB7000
heap
page read and write
9260000
unkown
page read and write
2001600B000
heap
page read and write
2B2D3318000
heap
page read and write
20015FCF000
heap
page read and write
2001672F000
heap
page read and write
12B4852A000
heap
page read and write
4B60000
trusted library allocation
page read and write
20016684000
heap
page read and write
2B2D3318000
heap
page read and write
5160000
unkown
page read and write
7FF5DF52D000
unkown
page readonly
18EC3ED4000
heap
page read and write
3010000
unkown
page read and write
200166F1000
heap
page read and write
3375000
unkown
page read and write
5160000
unkown
page read and write
BE80000
unkown
page read and write
2202B0D0000
heap
page read and write
2C80000
unkown
page read and write
12B483FF000
heap
page read and write
16DDBBE4000
heap
page read and write
1E22CEF8000
heap
page read and write
5DE000
stack
page read and write
4AC0000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
E79000
heap
page read and write
5D0000
trusted library allocation
page read and write
2202973D000
heap
page read and write
7FF5DF089000
unkown
page readonly
23F0BFB0000
heap
page read and write
22029730000
heap
page read and write
16DDB400000
trusted library allocation
page read and write
22029046000
heap
page read and write
200166A7000
heap
page read and write
12B47EB7000
heap
page read and write
752000
heap
page read and write
F80000
unkown
page read and write
2A75000
heap
page read and write
12B47FC0000
trusted library allocation
page read and write
12B48401000
heap
page read and write
2B2D331E000
heap
page read and write
880000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
1FB2A1C6000
heap
page read and write
999467E000
stack
page read and write
5160000
unkown
page read and write
95F0000
unkown
page read and write
2B2D3280000
heap
page read and write
2C40000
unkown
page read and write
3E1CF3F000
stack
page read and write
BE80000
unkown
page read and write
7DF4E6781000
unkown
page execute read
2C60000
unkown
page read and write
5160000
unkown
page read and write
5160000
unkown
page read and write
97D0000
unkown
page read and write
4B60000
trusted library allocation
page read and write
2B50000
heap
page read and write
1E22CEDF000
heap
page read and write
2A65000
heap
page read and write
7FF5DF1D1000
unkown
page readonly
AEEE000
stack
page read and write
2FE0000
unkown
page read and write
F80000
unkown
page read and write
BB0000
heap
page read and write
2EE38DC0000
heap
page read and write
880000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
17485755000
heap
page read and write
7FF5DF26F000
unkown
page readonly
2F50000
heap
page read and write
2B2D3318000
heap
page read and write
17485740000
heap
page read and write
47D9000
unkown
page read and write
1FB2A1C6000
heap
page read and write
7FF5DF4E7000
unkown
page readonly
4B60000
trusted library allocation
page read and write
5160000
unkown
page read and write
5170000
unkown
page read and write
20015F72000
heap
page read and write
1E22C8A7000
heap
page read and write
BE80000
unkown
page read and write
100C4000
unkown
page read and write
1A51DB48000
heap
page read and write
7FF5DF382000
unkown
page readonly
13A0000
unkown
page readonly
5819000
heap
page read and write
23F0C6D8000
heap
page read and write
7FF5DF478000
unkown
page readonly
20015FD2000
heap
page read and write
5160000
unkown
page read and write
2C60000
unkown
page read and write
9489000
stack
page read and write
16DDBBEF000
heap
page read and write
830F000
stack
page read and write
F50000
unkown
page read and write
2001652A000
heap
page read and write
5D0000
trusted library allocation
page read and write
4A61000
heap
page read and write
2C60000
unkown
page read and write
2A74000
heap
page read and write
F50000
unkown
page read and write
2A8B000
heap
page read and write
20015F50000
trusted library allocation
page read and write
2C90000
unkown
page read and write
1A51DAFA000
heap
page read and write
17F3802A000
heap
page read and write
20016527000
heap
page read and write
2FE0000
unkown
page read and write
1FB29B08000
heap
page read and write
87DCC7E000
stack
page read and write
3394000
unkown
page read and write
17F37F09000
heap
page read and write
2C80000
unkown
page read and write
2FE0000
unkown
page read and write
5819000
heap
page read and write
7FF7CBCB4000
unkown
page write copy
935B000
stack
page read and write
F50000
unkown
page read and write
2F60000
trusted library allocation
page read and write
2B2D393C000
heap
page read and write
7FF5DEFBD000
unkown
page readonly
FE0000
unkown
page read and write
1E22CEA3000
heap
page read and write
17F37F09000
heap
page read and write
2202924A000
heap
page read and write
5170000
unkown
page read and write
1A51E171000
heap
page read and write
17F38027000
heap
page read and write
2FE0000
unkown
page read and write
20016699000
heap
page read and write
92DB000
stack
page read and write
12B483F9000
heap
page read and write
2404C7FF000
heap
page read and write
BE80000
unkown
page read and write
2FE0000
unkown
page read and write
2C40000
unkown
page read and write
17485013000
heap
page read and write
1748572C000
heap
page read and write
F361277000
stack
page read and write
2A74000
heap
page read and write
1FB2A1CB000
heap
page read and write
7FF5DF3E4000
unkown
page readonly
2E20000
trusted library allocation
page read and write
F50000
unkown
page read and write
2B2D395D000
heap
page read and write
233C702A000
heap
page read and write
24131137000
heap
page read and write
2180000
unclassified section
page read and write
2B2D3945000
heap
page read and write
7FF5DF09B000
unkown
page readonly
12B4852A000
heap
page read and write
BE80000
unkown
page read and write
885E000
stack
page read and write
10180000
unkown
page read and write
940000
heap
page read and write
23F0C0B2000
heap
page read and write
23F0C052000
heap
page read and write
2FE0000
unkown
page read and write
20016025000
heap
page read and write
24B0000
heap
page read and write
2360000
trusted library allocation
page read and write
5160000
unkown
page read and write
12B47FC0000
trusted library allocation
page read and write
7FF5DF3B5000
unkown
page readonly
1FB29A60000
heap
page read and write
233C6D79000
heap
page read and write
51A0000
unkown
page read and write
174851A0000
trusted library allocation
page read and write
1E22C8CA000
heap
page read and write
9260000
unkown
page read and write
3AA11CF000
stack
page read and write
20017FED000
heap
page read and write
23F0C6D1000
heap
page read and write
29254BFE000
heap
page read and write
73B2000
unkown
page read and write
23F0C0BB000
heap
page read and write
2C50000
unkown
page read and write
9260000
unkown
page read and write
1A51E172000
heap
page read and write
BE80000
unkown
page read and write
5160000
unkown
page read and write
BE80000
unkown
page read and write
200166D3000
heap
page read and write
20017FC1000
heap
page read and write
16DDBBDC000
heap
page read and write
17F37F01000
heap
page read and write
9E0000
unkown
page readonly
2C90000
unkown
page read and write
23F0C6EC000
heap
page read and write
7D0D000
stack
page read and write
5160000
unkown
page read and write
EB2000
heap
page read and write
5160000
unkown
page read and write
12B4852B000
heap
page read and write
7FF5DF038000
unkown
page readonly
5A0000
heap
page read and write
BE80000
unkown
page read and write
2C20000
unkown
page read and write
24131379000
heap
page read and write
241312D0000
heap
page read and write
51A0000
unkown
page read and write
5840000
heap
page read and write
5160000
unkown
page read and write
1A51DB6D000
heap
page read and write
17F37F19000
heap
page read and write
200166CA000
heap
page read and write
12B4840A000
heap
page read and write
2404C807000
heap
page read and write
5160000
unkown
page read and write
2C20000
unkown
page read and write
2001600B000
heap
page read and write
7FF5DF25E000
unkown
page readonly
1FB2A1E2000
heap
page read and write
335B000
unkown
page read and write
880000
trusted library allocation
page read and write
17F37F20000
heap
page read and write
2404E439000
heap
page read and write
2202900B000
heap
page read and write
8390000
unkown
page read and write
12B483F7000
heap
page read and write
9F74000
unkown
page read and write
2404C875000
heap
page read and write
18EC3ED2000
heap
page read and write
2EE38E50000
heap
page read and write
5160000
unkown
page read and write
1A51DB1E000
heap
page read and write
3010000
unkown
page read and write
1A51DB27000
heap
page read and write
7DF4E6791000
unkown
page execute read
1FB2A1D8000
heap
page read and write
17F37952000
heap
page read and write
9260000
unkown
page read and write
12B4852E000
heap
page read and write
BE80000
unkown
page read and write
5160000
unkown
page read and write
18EC4195000
heap
page read and write
16DDB44B000
heap
page read and write
23F0C0B9000
heap
page read and write
2A75000
heap
page read and write
2001668E000
heap
page read and write
2A69000
heap
page read and write
48E0000
unkown
page read and write
1FB29B08000
heap
page read and write
12B48427000
heap
page read and write
7FF5DEEEB000
unkown
page readonly
20016170000
heap
page read and write
1A51E169000
heap
page read and write
17F37F23000
heap
page read and write
EC4000
heap
page read and write
23F0C6CE000
heap
page read and write
5190000
unkown
page read and write
336F000
unkown
page read and write
10100000
unkown
page read and write
17484FF2000
heap
page read and write
233C6FFD000
heap
page read and write
BE80000
unkown
page read and write
17F37950000
heap
page read and write
233C7005000
heap
page read and write
418000
unkown
page read and write
2360000
trusted library allocation
page read and write
5B92D7F000
stack
page read and write
F50000
unkown
page read and write
2F06000
system
page execute and read and write
73CD000
unkown
page read and write
5D0000
trusted library allocation
page read and write
5160000
unkown
page read and write
20016165000
heap
page read and write
E36000
system
page execute and read and write
BE80000
unkown
page read and write
5160000
unkown
page read and write
2C80000
unkown
page read and write
2001672F000
heap
page read and write
1E22C9D0000
heap
page read and write
BE80000
unkown
page read and write
24131153000
heap
page read and write
7FF5DEE52000
unkown
page readonly
18EC4629000
heap
page read and write
22029739000
heap
page read and write
18EC3ED2000
heap
page read and write
17F37F05000
heap
page read and write
2C40000
unkown
page read and write
2404C80D000
heap
page read and write
7FF5DF081000
unkown
page readonly
16DDB4CB000
heap
page read and write
23F0C057000
heap
page read and write
16DDBBE4000
heap
page read and write
44B81EF000
stack
page read and write
4750000
remote allocation
page read and write
2C60000
unkown
page read and write
4B60000
trusted library allocation
page read and write
1E22C8F7000
heap
page read and write
1FB2A1B0000
heap
page read and write
5160000
unkown
page read and write
F80000
unkown
page read and write
BFEF000
unkown
page read and write
233C7005000
heap
page read and write
6C0000
unclassified section
page read and write
2413139A000
heap
page read and write
16DDBBE4000
heap
page read and write
F50000
unkown
page read and write
4B60000
trusted library allocation
page read and write
20017FED000
heap
page read and write
E91000
unkown
page read and write
1E22CEED000
heap
page read and write
4B60000
trusted library allocation
page read and write
7499000
unkown
page read and write
5160000
unkown
page read and write
24131145000
heap
page read and write
BF9F000
unkown
page read and write
27F0000
unkown
page readonly
5160000
unkown
page read and write
17485180000
heap
page read and write
A098000
unkown
page read and write
4B60000
trusted library allocation
page read and write
4770000
heap
page read and write
9260000
unkown
page read and write
2360000
trusted library allocation
page read and write
20016679000
heap
page read and write
20015FBD000
heap
page read and write
9260000
unkown
page read and write
BFB000
stack
page read and write
582C000
heap
page read and write
C159000
unkown
page read and write
5D0000
trusted library allocation
page read and write
1A51DB74000
heap
page read and write
2C60000
unkown
page read and write
2C80000
unkown
page read and write
EAD000
heap
page read and write
22029200000
trusted library allocation
page read and write
12B48523000
heap
page read and write
23F0C6F3000
heap
page read and write
2404C7BC000
heap
page read and write
1A51DB48000
heap
page read and write
5170000
unkown
page read and write
7EB000
heap
page read and write
20016685000
heap
page read and write
2A8B000
heap
page read and write
7FF5DEF94000
unkown
page readonly
20016130000
heap
page read and write
2AA2000
heap
page read and write
17F37F1A000
heap
page read and write
2B2D394D000
heap
page read and write
241310E0000
heap
page read and write
200166C6000
heap
page read and write
233C7023000
heap
page read and write
17F37946000
heap
page read and write
9260000
unkown
page read and write
2A8C000
heap
page read and write
23F0C0A4000
heap
page read and write
F50000
unkown
page read and write
17485740000
heap
page read and write
20015FCF000
heap
page read and write
F50000
unkown
page read and write
C23D000
unkown
page read and write
1748574B000
heap
page read and write
7FF5DF57F000
unkown
page readonly
233C6D40000
heap
page read and write
1A51DB19000
heap
page read and write
18EC3EDA000
heap
page read and write
999447F000
stack
page read and write
7FF5DF126000
unkown
page readonly
17F37890000
trusted library allocation
page read and write
2001668A000
heap
page read and write
1195000
heap
page read and write
23F0C050000
heap
page read and write
6C0000
heap
page read and write
233C7009000
heap
page read and write
9F78000
unkown
page read and write
24131108000
heap
page read and write
12B4842E000
heap
page read and write
2001672F000
heap
page read and write
233C6D59000
heap
page read and write
1FB29B15000
heap
page read and write
18EC4639000
heap
page read and write
7FF5DEFAF000
unkown
page readonly
2A69000
heap
page read and write
2B2D3318000
heap
page read and write
233C6D79000
heap
page read and write
5840000
heap
page read and write
22029715000
heap
page read and write
73BC000
unkown
page read and write
7FF5DF443000
unkown
page readonly
17F3794F000
heap
page read and write
880000
trusted library allocation
page read and write
5160000
unkown
page read and write
EE4737F000
stack
page read and write
880000
trusted library allocation
page read and write
22028FF9000
heap
page read and write
2404C7B9000
heap
page read and write
51A0000
unkown
page read and write
1748574A000
heap
page read and write
7FF5DE9CB000
unkown
page readonly
2F0F000
stack
page read and write
2A90000
heap
page read and write
22028FD0000
heap
page read and write
24131385000
heap
page read and write
16DDB4B3000
heap
page read and write
1748574A000
heap
page read and write
D60000
heap
page read and write
4983AFE000
stack
page read and write
233C7008000
heap
page read and write
2B2D5540000
heap
page read and write
2C40000
unkown
page read and write
23F0C6E8000
heap
page read and write
5170000
unkown
page read and write
2B2D5350000
heap
page read and write
12B47E92000
heap
page read and write
23F0C0B4000
heap
page read and write
23F0C077000
heap
page read and write
233C7020000
heap
page read and write
29F2F87000
stack
page read and write
20015FCC000
heap
page read and write
18EC40B0000
heap
page read and write
AA8000
system
page execute and read and write
7FF5DF5AE000
unkown
page readonly
7FF5DF4C6000
unkown
page readonly
24131310000
trusted library allocation
page read and write
18EC3EB8000
heap
page read and write
233C6FE0000
heap
page read and write
17F3802A000
heap
page read and write
880000
trusted library allocation
page read and write
5160000
unkown
page read and write
29254C1F000
heap
page read and write
BA76000
stack
page read and write
5D0000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
1A51DAFE000
heap
page read and write
4B60000
trusted library allocation
page read and write
BFB3000
unkown
page read and write
7DF4E6760000
unkown
page readonly
1A51E154000
heap
page read and write
1E22CEDE000
heap
page read and write
1E22C9D5000
heap
page read and write
74D6000
unkown
page read and write
2C60000
unkown
page read and write
22029760000
heap
page read and write
2E20000
trusted library allocation
page read and write
12B49F00000
heap
page read and write
9C9E000
stack
page read and write
ADAC000
stack
page read and write
1FB29AE7000
heap
page read and write
5D0000
trusted library allocation
page read and write
233C6FE4000
heap
page read and write
20015FCF000
heap
page read and write
2360000
trusted library allocation
page read and write
BD9000
heap
page read and write
5421000
heap
page read and write
880000
trusted library allocation
page read and write
5170000
unkown
page read and write
5160000
unkown
page read and write
710000
heap
page read and write
5160000
unkown
page read and write
22029717000
heap
page read and write
241313A3000
heap
page read and write
12B4840B000
heap
page read and write
1E22C8F7000
heap
page read and write
1E22CEDC000
heap
page read and write
233C6D7D000
heap
page read and write
2413134A000
heap
page read and write
F48000
stack
page read and write
9F63000
unkown
page read and write
1A51DB27000
heap
page read and write
FF1000
unkown
page readonly
1E22C8CA000
heap
page read and write
880000
trusted library allocation
page read and write
1A51E158000
heap
page read and write
2FE0000
unkown
page read and write
C4E2000
unkown
page read and write
2C50000
unkown
page read and write
7DD000
heap
page execute and read and write
2B2D32F8000
heap
page read and write
3004000
heap
page read and write
23F0C05A000
heap
page read and write
233C6FFC000
heap
page read and write
12B48433000
heap
page read and write
5160000
unkown
page read and write
BE80000
unkown
page read and write
2A6C000
heap
page read and write
17F37F0C000
heap
page read and write
7FF5DEFDD000
unkown
page readonly
1FB2A1E2000
heap
page read and write
7FF5DF284000
unkown
page readonly
7FF5DF310000
unkown
page readonly
7FF7CBCA1000
unkown
page execute read
AC0D000
stack
page read and write
17485739000
heap
page read and write
18EC3EDA000
heap
page read and write
1E22C9DA000
heap
page read and write
200166B2000
heap
page read and write
2001672F000
heap
page read and write
2001667C000
heap
page read and write
1E22CEED000
heap
page read and write
2EE38DA0000
heap
page read and write
1E22CEE5000
heap
page read and write
20015F98000
heap
page read and write
16DDBBE4000
heap
page read and write
2491000
heap
page read and write
1E22C8CA000
heap
page read and write
7FF5DF06F000
unkown
page readonly
2360000
trusted library allocation
page read and write
7CE000
heap
page read and write
5180000
unkown
page read and write
22029750000
heap
page read and write
880000
trusted library allocation
page read and write
233C6D99000
heap
page read and write
18EC3EC5000
heap
page read and write
83F0000
unkown
page read and write
1FB2A1DB000
heap
page read and write
2F60000
trusted library allocation
page read and write
73E5000
unkown
page read and write
1A51DB64000
heap
page read and write
2001600B000
heap
page read and write
9260000
unkown
page read and write
1E22CEF8000
heap
page read and write
3010000
unkown
page read and write
2001673D000
heap
page read and write
2C40000
unkown
page read and write
2B2D3945000
heap
page read and write
2B2D3A6A000
heap
page read and write
73B6000
unkown
page read and write
5D0000
trusted library allocation
page read and write
9718000
unkown
page read and write
2E50000
unkown
page readonly
2C20000
unkown
page read and write
87DCBFE000
stack
page read and write
583C000
heap
page read and write
7FF5DF195000
unkown
page readonly
4B60000
trusted library allocation
page read and write
8BF000
stack
page read and write
23F0C0B9000
heap
page read and write
200166BA000
heap
page read and write
2C90000
unkown
page read and write
22029240000
heap
page read and write
E50000
heap
page read and write
2404C814000
heap
page read and write
C24C000
unkown
page read and write
2360000
trusted library allocation
page read and write
1A51E16C000
heap
page read and write
7FF5DF095000
unkown
page readonly
12B47ED8000
heap
page read and write
2C90000
unkown
page read and write
2C70000
unkown
page read and write
2001600B000
heap
page read and write
8C2A000
stack
page read and write
2360000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
17485750000
heap
page read and write
C34E000
unkown
page read and write
BFA5000
unkown
page read and write
18EC4653000
heap
page read and write
2870000
unkown
page read and write
2C40000
unkown
page read and write
7FF5DEE56000
unkown
page readonly
7870000
unkown
page read and write
20015FE4000
heap
page read and write
12B47E97000
heap
page read and write
10084000
unkown
page read and write
5A0000
heap
page read and write
2A75000
heap
page read and write
2C90000
unkown
page read and write
12B4840D000
heap
page read and write
17F3802B000
heap
page read and write
18EC3EE6000
heap
page read and write
17485715000
heap
page read and write
5160000
unkown
page read and write
1E22C9E0000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
2C80000
unkown
page read and write
2B2D394D000
heap
page read and write
7FF5DF2DA000
unkown
page readonly
20016021000
heap
page read and write
2FE0000
unkown
page read and write
962B000
unkown
page read and write
2C50000
unkown
page read and write
5819000
heap
page read and write
99941B7000
stack
page read and write
3AA147E000
stack
page read and write
20015FE4000
heap
page read and write
880000
trusted library allocation
page read and write
7FF5DF4BD000
unkown
page readonly
17484FC7000
heap
page read and write
F50000
unkown
page read and write
233C6F90000
heap
page read and write
7FF5DEE5A000
unkown
page readonly
5160000
unkown
page read and write
E39000
system
page execute and read and write
18EC3EDA000
heap
page read and write
2B2D394D000
heap
page read and write
7FF5DF4A6000
unkown
page readonly
22029720000
heap
page read and write
23F0C6DB000
heap
page read and write
971C000
unkown
page read and write
73C3000
unkown
page read and write
48A0000
unkown
page read and write
1E22CED0000
heap
page read and write
87DCB7F000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
12B48432000
heap
page read and write
23F0C6D5000
heap
page read and write
9260000
unkown
page read and write
83F0000
unkown
page read and write
3AA10C7000
stack
page read and write
241312F0000
heap
page read and write
7FF5DEFCB000
unkown
page readonly
5160000
unkown
page read and write
5160000
unkown
page read and write
5170000
unkown
page read and write
7FF5DF5E9000
unkown
page readonly
B1C0000
unkown
page readonly
88DE000
stack
page read and write
233C8D90000
heap
page read and write
1A51E168000
heap
page read and write
41A000
unkown
page readonly
EB0000
heap
page read and write
2C20000
unkown
page read and write
9714000
unkown
page read and write
1FB29B22000
heap
page read and write
16DDBBE4000
heap
page read and write
5D0000
trusted library allocation
page read and write
3E1CEB7000
stack
page read and write
73A7000
unkown
page read and write
BE80000
unkown
page read and write
22D0000
heap
page read and write
2C20000
unkown
page read and write
DDB807E000
stack
page read and write
5819000
heap
page read and write
3004000
heap
page read and write
2C40000
unkown
page read and write
2C80000
unkown
page read and write
23F0C6E8000
heap
page read and write
17485713000
heap
page read and write
880000
trusted library allocation
page read and write
2D00000
heap
page read and write
4B60000
trusted library allocation
page read and write
23F0C0C6000
heap
page read and write
2C20000
unkown
page read and write
F50000
unkown
page read and write
24131156000
heap
page read and write
23F0C060000
heap
page read and write
BE80000
unkown
page read and write
EC6000
heap
page read and write
51A0000
unkown
page read and write
20016019000
heap
page read and write
18EC463E000
heap
page read and write
5160000
unkown
page read and write
1FB2A1C4000
heap
page read and write
F50000
unkown
page read and write
1A51DAF4000
heap
page read and write
7FF5DF398000
unkown
page readonly
233C711A000
heap
page read and write
12B4840D000
heap
page read and write
23F0C09F000
heap
page read and write
7FF5DE4F2000
unkown
page readonly
24131139000
heap
page read and write
233C6D99000
heap
page read and write
2360000
trusted library allocation
page read and write
2B2D394D000
heap
page read and write
4B60000
trusted library allocation
page read and write
20015FCF000
heap
page read and write
17F37F1E000
heap
page read and write
16DDD560000
heap
page read and write
16DDB469000
heap
page read and write
7FF5DEFF5000
unkown
page readonly
880000
trusted library allocation
page read and write
2C60000
unkown
page read and write
2F60000
trusted library allocation
page read and write
22029023000
heap
page read and write
2360000
trusted library allocation
page read and write
2FE0000
unkown
page read and write
2F60000
trusted library allocation
page read and write
1A51DB22000
heap
page read and write
7FF5DF24E000
unkown
page readonly
B45A000
stack
page read and write
17485760000
heap
page read and write
12B47E97000
heap
page read and write
18EC4639000
heap
page read and write
16DDB460000
heap
page read and write
12B4842A000
heap
page read and write
1E22C8F7000
heap
page read and write
18EC412A000
heap
page read and write
AABCAFE000
stack
page read and write
2413137F000
heap
page read and write
2F60000
trusted library allocation
page read and write
2A78000
heap
page read and write
4750000
remote allocation
page read and write
2360000
trusted library allocation
page read and write
18EC3E92000
heap
page read and write
2202971A000
heap
page read and write
2C50000
unkown
page read and write
3004000
heap
page read and write
7CA000
heap
page read and write
7909000
stack
page read and write
17F37BA5000
heap
page read and write
5160000
unkown
page read and write
2C60000
unkown
page read and write
B4DB000
stack
page read and write
22029752000
heap
page read and write
1E22C9E0000
trusted library allocation
page read and write
18EC412A000
heap
page read and write
73E000
heap
page read and write
9260000
unkown
page read and write
1748501C000
heap
page read and write
17484FF2000
heap
page read and write
5D0000
trusted library allocation
page read and write
2A65000
heap
page read and write
2360000
trusted library allocation
page read and write
1E22CEE8000
heap
page read and write
16DDB735000
heap
page read and write
2C60000
unkown
page read and write
2001672F000
heap
page read and write
24131387000
heap
page read and write
2A60000
heap
page read and write
400000
unkown
page execute and read and write
5160000
unkown
page read and write
9B99000
stack
page read and write
2360000
trusted library allocation
page read and write
7FF5DEF06000
unkown
page readonly
24131164000
heap
page read and write
9729000
unkown
page read and write
C1A9000
unkown
page read and write
51A0000
unkown
page read and write
2C60000
unkown
page read and write
12B483F0000
heap
page read and write
225F000
stack
page read and write
18EC3EDD000
heap
page read and write
2B2D34D0000
heap
page read and write
2C90000
unkown
page read and write
63A000
heap
page read and write
17485005000
heap
page read and write
5F0000
heap
page read and write
1E22C8E3000
heap
page read and write
BE80000
unkown
page read and write
2001600B000
heap
page read and write
1FB29C3A000
heap
page read and write
16DDBBEF000
heap
page read and write
2C60000
unkown
page read and write
880000
trusted library allocation
page read and write
5190000
unkown
page read and write
7FF5DEF90000
unkown
page readonly
22028FE7000
heap
page read and write
233C6FEA000
heap
page read and write
23F0C057000
heap
page read and write
3E1CFBF000
stack
page read and write
1748573A000
heap
page read and write
2FE0000
unkown
page read and write
200166EE000
heap
page read and write
2360000
trusted library allocation
page read and write
5160000
unkown
page read and write
22029750000
heap
page read and write
2F60000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
40B000
unkown
page execute read
880000
trusted library allocation
page read and write
2360000
trusted library allocation
page read and write
5160000
unkown
page read and write
5160000
unkown
page read and write
880000
trusted library allocation
page read and write
EB0000
heap
page read and write
2001600B000
heap
page read and write
16DDB44A000
heap
page read and write
4B60000
trusted library allocation
page read and write
5160000
unkown
page read and write
B25A000
stack
page read and write
2B2D395A000
heap
page read and write
2001600B000
heap
page read and write
1748575B000
heap
page read and write
B60A000
stack
page read and write
A690000
unkown
page read and write
2A78000
heap
page read and write
880000
trusted library allocation
page read and write
230814B1000
heap
page read and write
7FF5DF122000
unkown
page readonly
C1EC2FF000
stack
page read and write
2C60000
unkown
page read and write
233C701A000
heap
page read and write
2FE0000
unkown
page read and write
F50000
unkown
page read and write
E70000
unkown
page readonly
2A7F000
heap
page read and write
20015FEC000
heap
page read and write
16DDB4B6000
heap
page read and write
29254DC0000
heap
page read and write
1FB29D2B000
heap
page read and write
2C80000
unkown
page read and write
4B60000
trusted library allocation
page read and write
12B48522000
heap
page read and write
18EC463E000
heap
page read and write
22029738000
heap
page read and write
8EA9000
stack
page read and write
5160000
unkown
page read and write
12B483FC000
heap
page read and write
1A51DB48000
heap
page read and write
24131381000
heap
page read and write
BE80000
unkown
page read and write
22029743000
heap
page read and write
64E000
stack
page read and write
9CF000
stack
page read and write
7FF5DEFAC000
unkown
page readonly
4B60000
trusted library allocation
page read and write
400000
unkown
page readonly
7FF5DF0A5000
unkown
page readonly
3004000
heap
page read and write
2404C82E000
heap
page read and write
880000
trusted library allocation
page read and write
29254BF2000
heap
page read and write
1E22C9B0000
heap
page read and write
2B2D32D2000
heap
page read and write
24131162000
heap
page read and write
5160000
unkown
page read and write
2360000
trusted library allocation
page read and write
2404C790000
heap
page read and write
2001652E000
heap
page read and write
1A51DAFA000
heap
page read and write
5160000
unkown
page read and write
24131377000
heap
page read and write
7FF5DF25B000
unkown
page readonly
AABC5F9000
stack
page read and write
12B47EB7000
heap
page read and write
76F0000
unkown
page read and write
83F0000
unkown
page read and write
174851EB000
heap
page read and write
1E22CEA2000
heap
page read and write
7395000
unkown
page read and write
401000
unkown
page execute read
233C6FE5000
heap
page read and write
C18A000
unkown
page read and write
1E22C8F1000
heap
page read and write
2C90000
unkown
page read and write
BE80000
unkown
page read and write
1FB29AE7000
heap
page read and write
41D000
unkown
page write copy
2A75000
heap
page read and write
5160000
unkown
page read and write
9260000
unkown
page read and write
2202973F000
heap
page read and write
17F37927000
heap
page read and write
2404E41E000
heap
page read and write
24B1000
heap
page read and write
5160000
unkown
page read and write
4B60000
trusted library allocation
page read and write
2B2D3314000
heap
page read and write
2C80000
unkown
page read and write
880000
trusted library allocation
page read and write
540000
heap
page read and write
20015FCF000
heap
page read and write
233C701A000
heap
page read and write
F50000
unkown
page read and write
52D9000
unkown
page read and write
A08D000
unkown
page read and write
9260000
unkown
page read and write
BF9D000
unkown
page read and write
2B2D3A60000
heap
page read and write
12B48404000
heap
page read and write
233C6FEB000
heap
page read and write
5160000
unkown
page read and write
BE80000
unkown
page read and write
2A78000
heap
page read and write
233C6FEE000
heap
page read and write
1748574A000
heap
page read and write
17F37EFE000
heap
page read and write
2B2D3322000
heap
page read and write
2001668E000
heap
page read and write
12B47FC0000
trusted library allocation
page read and write
41D000
unkown
page read and write
1A51DAFA000
heap
page read and write
2C80000
unkown
page read and write
2A8B000
heap
page read and write
DDB817F000
stack
page read and write
F50000
unkown
page read and write
97F3000
unkown
page read and write
12B47EB8000
heap
page read and write
C36B000
unkown
page read and write
F50000
unkown
page read and write
18EC3EC4000
heap
page read and write
4B60000
trusted library allocation
page read and write
1E22C8F7000
heap
page read and write
5160000
unkown
page read and write
18EC3EB8000
heap
page read and write
29254BFE000
heap
page read and write
2360000
trusted library allocation
page read and write
7FF5DF567000
unkown
page readonly
16DDB4BD000
heap
page read and write
EE71000
unkown
page read and write
12B47DA0000
heap
page read and write
2001668E000
heap
page read and write
5160000
unkown
page read and write
41A000
unkown
page readonly
7FF5DF62C000
unkown
page readonly
470E000
stack
page read and write
2A70000
heap
page read and write
2C20000
unkown
page read and write
5160000
unkown
page read and write
20016696000
heap
page read and write
17F38023000
heap
page read and write
7FF5DF4F7000
unkown
page readonly
1FB29B33000
heap
page read and write
17484FE4000
heap
page read and write
17F3794B000
heap
page read and write
18EC4050000
heap
page read and write
540000
direct allocation
page read and write
233C6F60000
trusted library allocation
page read and write
9260000
unkown
page read and write
2360000
trusted library allocation
page read and write
2EC0000
unkown
page readonly
22029046000
heap
page read and write
2FE0000
unkown
page read and write
5160000
unkown
page read and write
1A51E16E000
heap
page read and write
BE80000
unkown
page read and write
1A51DB62000
heap
page read and write
401000
unkown
page execute read
12B48426000
heap
page read and write
17485740000
heap
page read and write
9260000
unkown
page read and write
1E22CED7000
heap
page read and write
29254C26000
heap
page read and write
1A51DB74000
heap
page read and write
BE80000
unkown
page read and write
23F0C37A000
heap
page read and write
1E22C8A7000
heap
page read and write
B35000
heap
page read and write
23F0C6F0000
heap
page read and write
17485752000
heap
page read and write
2C80000
unkown
page read and write
2202902D000
heap
page read and write
970000
unkown
page readonly
23081370000
heap
page read and write
233C7008000
heap
page read and write
22028FE2000
heap
page read and write
5160000
unkown
page read and write
4B60000
trusted library allocation
page read and write
F50000
unkown
page read and write
28D0000
heap
page read and write
12B47ED8000
heap
page read and write
12B47FC0000
trusted library allocation
page read and write
5160000
unkown
page read and write
20016520000
heap
page read and write
7FF5DEFB7000
unkown
page readonly
5160000
unkown
page read and write
174851A0000
trusted library allocation
page read and write
9260000
unkown
page read and write
5160000
unkown
page read and write
EE8C000
unkown
page read and write
29254BFE000
heap
page read and write
2413137C000
heap
page read and write
2C90000
unkown
page read and write
7FF5DF3F5000
unkown
page readonly
2001667F000
heap
page read and write
401000
unkown
page execute read
5160000
unkown
page read and write
16DDD460000
heap
page read and write
2B2D3948000
heap
page read and write
73A3000
unkown
page read and write
20016190000
trusted library allocation
page read and write
200181C0000
heap
page read and write
20015FB3000
heap
page read and write
29254DE0000
heap
page read and write
2360000
trusted library allocation
page read and write
20016527000
heap
page read and write
5160000
unkown
page read and write
ADC0000
unkown
page readonly
2C90000
unkown
page read and write
83F0000
unkown
page read and write
2B2D3948000
heap
page read and write
23F0C09F000
heap
page read and write
12B47ED2000
heap
page read and write
BE80000
unkown
page read and write
D50000
unkown
page read and write
7FF5DF591000
unkown
page readonly
24131117000
heap
page read and write
880000
trusted library allocation
page read and write
2FE0000
unkown
page read and write
17484FEB000
heap
page read and write
34B0000
unkown
page readonly
2C20000
unkown
page read and write
C034000
unkown
page read and write
17485734000
heap
page read and write
200181D1000
heap
page read and write
7FF5DF5F0000
unkown
page readonly
113C277000
stack
page read and write
2FE0000
unkown
page read and write
2404C858000
heap
page read and write
16DDBBEF000
heap
page read and write
1A51DAD0000
trusted library allocation
page read and write
17F37840000
heap
page read and write
20018045000
heap
page read and write
113C47E000
stack
page read and write
880000
trusted library allocation
page read and write
20018018000
heap
page read and write
83F0000
unkown
page read and write
1FB29BD0000
heap
page read and write
F50000
unkown
page read and write
11E0000
heap
page read and write
584B000
heap
page read and write
2B2D3A67000
heap
page read and write
2C60000
unkown
page read and write
4AC0000
trusted library allocation
page read and write
BE80000
unkown
page read and write
16DDB4BD000
heap
page read and write
12B4840D000
heap
page read and write
BEF0000
heap
page read and write
1E22CEFC000
heap
page read and write
2360000
trusted library allocation
page read and write
7FF5DE5CC000
unkown
page readonly
2AA5000
heap
page read and write
23F0C0B2000
heap
page read and write
1FB29C37000
heap
page read and write
EB5000
heap
page read and write
F50000
unkown
page read and write
23F0C05E000
heap
page read and write
7FF5DF364000
unkown
page readonly
233C6F60000
trusted library allocation
page read and write
2C90000
unkown
page read and write
9260000
unkown
page read and write
7FF5DF49C000
unkown
page readonly
7FF5DF1F4000
unkown
page readonly
880000
trusted library allocation
page read and write
BE80000
unkown
page read and write
2360000
trusted library allocation
page read and write
4C0000
heap
page read and write
20015FA5000
heap
page read and write
F50000
unkown
page read and write
7FF5DEFA6000
unkown
page readonly
D99000
heap
page read and write
9380000
unkown
page readonly
200180C0000
heap
page read and write
1F0000
heap
page read and write
200164E0000
heap
page read and write
2404C80E000
heap
page read and write
4B60000
trusted library allocation
page read and write
418000
unkown
page read and write
51A0000
unkown
page read and write
7FF5DF2E5000
unkown
page readonly
5836000
heap
page read and write
17484FC2000
heap
page read and write
5160000
unkown
page read and write
19D000
stack
page read and write
44B847E000
stack
page read and write
ACAE000
stack
page read and write
29254C05000
heap
page read and write
7FF5DF191000
unkown
page readonly
7FF5DF0C9000
unkown
page readonly
1FB29B25000
heap
page read and write
5160000
unkown
page read and write
DDB7D6F000
stack
page read and write
7FF5DF4FB000
unkown
page readonly
17F37907000
heap
page read and write
17F37BAA000
heap
page read and write
3010000
unkown
page read and write
2001672F000
heap
page read and write
2B80000
heap
page read and write
20016746000
heap
page read and write
12B47EF4000
heap
page read and write
241313A4000
heap
page read and write
9704000
unkown
page read and write
12B47EB7000
heap
page read and write
7FF5DEF57000
unkown
page readonly
16DDBBF3000
heap
page read and write
16DDBBCF000
heap
page read and write
BF9B000
unkown
page read and write
113C37F000
stack
page read and write
12B4840B000
heap
page read and write
7FF5DF18E000
unkown
page readonly
2413115F000
heap
page read and write
233C701B000
heap
page read and write
AC16DFE000
stack
page read and write
4AC0000
trusted library allocation
page read and write
9260000
unkown
page read and write
4B60000
trusted library allocation
page read and write
233C6FE2000
heap
page read and write
2360000
trusted library allocation
page read and write
12B480A5000
heap
page read and write
20015F77000
heap
page read and write
5160000
unkown
page read and write
9260000
unkown
page read and write
5819000
heap
page read and write
3AA157F000
stack
page read and write
20016723000
heap
page read and write
17484FE5000
heap
page read and write
2360000
trusted library allocation
page read and write
2C50000
unkown
page read and write
3AA14FF000
stack
page read and write
2EE38DC5000
heap
page read and write
1FB29C3A000
heap
page read and write
7B4C000
stack
page read and write
1E22CEAA000
heap
page read and write
5160000
unkown
page read and write
7FF5DF3AA000
unkown
page readonly
4788000
unkown
page read and write
973C000
unkown
page read and write
6D0000
direct allocation
page read and write
5160000
unkown
page read and write
1748571B000
heap
page read and write
2B2D3A64000
heap
page read and write
880000
trusted library allocation
page read and write
2404C807000
heap
page read and write
4B60000
trusted library allocation
page read and write
17485737000
heap
page read and write
5D0000
trusted library allocation
page read and write
20016682000
heap
page read and write
9260000
unkown
page read and write
9260000
unkown
page read and write
18EC3E70000
trusted library allocation
page read and write
BE80000
unkown
page read and write
23F0C072000
heap
page read and write
1FB2A1D8000
heap
page read and write
BE80000
unkown
page read and write
9605000
unkown
page read and write
5160000
unkown
page read and write
5160000
unkown
page read and write
880000
trusted library allocation
page read and write
16DDBBF7000
heap
page read and write
B30000
heap
page read and write
5160000
unkown
page read and write
3010000
unkown
page read and write
16DDB4D1000
heap
page read and write
22029031000
heap
page read and write
16DDB4BB000
heap
page read and write
24131340000
heap
page read and write
51A0000
unkown
page read and write
5160000
unkown
page read and write
5110000
unkown
page write copy
880000
trusted library allocation
page read and write
2B2D35E0000
heap
page read and write
16DDB4B3000
heap
page read and write
12B4852A000
heap
page read and write
F50000
unkown
page read and write
20015FEC000
heap
page read and write
7FF5DF425000
unkown
page readonly
BE80000
unkown
page read and write
87C000
stack
page read and write
2404C795000
heap
page read and write
1FB2A1CB000
heap
page read and write
610000
direct allocation
page read and write
880000
trusted library allocation
page read and write
5160000
unkown
page read and write
5840000
heap
page read and write
2B2D3937000
heap
page read and write
11A0000
unkown
page readonly
24131159000
heap
page read and write
2B2D3A6E000
heap
page read and write
233C6D91000
heap
page read and write
1A51DB6A000
heap
page read and write
17F38024000
heap
page read and write
BE80000
unkown
page read and write
200166DD000
heap
page read and write
2001600B000
heap
page read and write
24131100000
heap
page read and write
582C000
heap
page read and write
9BF000
stack
page read and write
220290E0000
heap
page read and write
2EE38E59000
heap
page read and write
7FF5DE9C3000
unkown
page readonly
18EC463E000
heap
page read and write
29254BF2000
heap
page read and write
1A51DCB5000
heap
page read and write
1E22C9E0000
trusted library allocation
page read and write
4F6000
unkown
page readonly
7FF5DF36A000
unkown
page readonly
12B47EE8000
heap
page read and write
12B4840F000
heap
page read and write
479B000
unkown
page read and write
1FB29B0A000
heap
page read and write
1FB29B2B000
heap
page read and write
12B47F0A000
heap
page read and write
C187000
unkown
page read and write
16DDD463000
heap
page read and write
23F0C6C8000
heap
page read and write
2B2D395A000
heap
page read and write
2308152A000
heap
page read and write
2B2D32C0000
heap
page read and write
17F37850000
heap
page read and write
7EC000
heap
page read and write
12B47EE0000
heap
page read and write
22029023000
heap
page read and write
880000
trusted library allocation
page read and write
24131470000
heap
page read and write
2BEE000
stack
page read and write
4B60000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
F80000
unkown
page read and write
220291E0000
heap
page read and write
20017FC1000
heap
page read and write
C8B7F7F000
stack
page read and write
2C40000
unkown
page read and write
29254BD8000
heap
page read and write
4B60000
trusted library allocation
page read and write
4983B7F000
stack
page read and write
20015FCF000
heap
page read and write
1E22CEED000
heap
page read and write
17485729000
heap
page read and write
1FB29B0C000
heap
page read and write
18EC4637000
heap
page read and write
C1C4000
unkown
page read and write
2001672F000
heap
page read and write
17F37955000
heap
page read and write
9330000
unkown
page read and write
1748572F000
heap
page read and write
233C6D91000
heap
page read and write
1E22CEAA000
heap
page read and write
EAE000
heap
page read and write
2FE0000
unkown
page read and write
2A8B000
heap
page read and write
92F000
stack
page read and write
2AAC000
heap
page read and write
2C90000
unkown
page read and write
20016692000
heap
page read and write
2F60000
trusted library allocation
page read and write
20015FCF000
heap
page read and write
17485710000
heap
page read and write
4B3D000
stack
page read and write
7860000
unkown
page read and write
2404C82D000
heap
page read and write
5160000
unkown
page read and write
2FE0000
unkown
page read and write
1FB2A1D8000
heap
page read and write
17485017000
heap
page read and write
22029750000
heap
page read and write
7FF5DF59E000
unkown
page readonly
74A9000
unkown
page read and write
2C80000
unkown
page read and write
5819000
heap
page read and write
83F0000
unkown
page read and write
2413115D000
heap
page read and write
16DDB445000
heap
page read and write
2C90000
unkown
page read and write
113C2FF000
stack
page read and write
2890000
unkown
page readonly
18EC3E89000
heap
page read and write
5160000
unkown
page read and write
2360000
trusted library allocation
page read and write
2A94000
heap
page read and write
17F37F19000
heap
page read and write
2A69000
heap
page read and write
18EC412E000
heap
page read and write
2C80000
unkown
page read and write
2360000
trusted library allocation
page read and write
9260000
unkown
page read and write
9260000
unkown
page read and write
17F37F21000
heap
page read and write
18EC3EE4000
heap
page read and write
2404C817000
heap
page read and write
EAE000
heap
page read and write
23F0C097000
heap
page read and write
1FB29AE2000
heap
page read and write
18EC463E000
heap
page read and write
16DDBBEF000
heap
page read and write
200166B0000
heap
page read and write
2360000
trusted library allocation
page read and write
F50000
unkown
page read and write
2C60000
unkown
page read and write
F36137F000
stack
page read and write
F50000
unkown
page read and write
5160000
unkown
page read and write
2F60000
trusted library allocation
page read and write
29F327F000
stack
page read and write
41D000
unkown
page read and write
E06000
heap
page read and write
AC16D7F000
stack
page read and write
2202902D000
heap
page read and write
2C60000
unkown
page read and write
1E22C7B0000
heap
page read and write
7FF5DF221000
unkown
page readonly
5160000
unkown
page read and write
880000
trusted library allocation
page read and write
EB2000
heap
page read and write
233C6D79000
heap
page read and write
1A51DB10000
heap
page read and write
880000
trusted library allocation
page read and write
BE80000
unkown
page read and write
A104000
unkown
page read and write
23F0C6CF000
heap
page read and write
96F1000
unkown
page read and write
5D0000
trusted library allocation
page read and write
1004B000
unkown
page read and write
96DF000
unkown
page read and write
7FF5DF029000
unkown
page readonly
584C000
heap
page read and write
83F0000
unkown
page read and write
23F0C0B9000
heap
page read and write
7FF5DF549000
unkown
page readonly
16DDB49A000
heap
page read and write
17485012000
heap
page read and write
2A6C000
heap
page read and write
5160000
unkown
page read and write
233C8D80000
heap
page read and write
7FF5C0B65000
unkown
page readonly
4B60000
trusted library allocation
page read and write
2170000
direct allocation
page read and write
12B4843C000
heap
page read and write
F50000
unkown
page read and write
7FF5DF20A000
unkown
page readonly
200166A7000
heap
page read and write
12B4840E000
heap
page read and write
22029712000
heap
page read and write
B2DB000
stack
page read and write
20016038000
heap
page read and write
20015FFD000
heap
page read and write
24131153000
heap
page read and write
23F0BFE0000
heap
page read and write
28A0000
unkown
page readonly
2C90000
unkown
page read and write
7FF5DEFE8000
unkown
page readonly
2B65000
heap
page read and write
20018018000
heap
page read and write
EE7D000
unkown
page read and write
1A51E15A000
heap
page read and write
5D0000
trusted library allocation
page read and write
B5B9597000
stack
page read and write
BE80000
unkown
page read and write
BE80000
unkown
page read and write
226F000
stack
page read and write
1A51DAF2000
heap
page read and write
24131112000
heap
page read and write
3190000
unkown
page read and write
BE80000
unkown
page read and write
18EC4127000
heap
page read and write
17F37870000
heap
page read and write
7FF5DF091000
unkown
page readonly
2FE0000
unkown
page read and write
2C80000
unkown
page read and write
2B2D32C8000
heap
page read and write
F50000
unkown
page read and write
1A51DC10000
heap
page read and write
1190000
heap
page read and write
1FB29B24000
heap
page read and write
1A51E155000
heap
page read and write
4B60000
trusted library allocation
page read and write
20016687000
heap
page read and write
4824000
unkown
page read and write
1A51DB62000
heap
page read and write
F3612FF000
stack
page read and write
9260000
unkown
page read and write
B09E000
stack
page read and write
16DDB477000
heap
page read and write
23F0C030000
heap
page read and write
2FE0000
unkown
page read and write
2360000
trusted library allocation
page read and write
2C60000
unkown
page read and write
4B60000
trusted library allocation
page read and write
949000
heap
page read and write
4983A7F000
stack
page read and write
F50000
unkown
page read and write
7FF5DEE4E000
unkown
page readonly
2A38000
heap
page read and write
7FF5DF429000
unkown
page readonly
241313A1000
heap
page read and write
16DDB4C1000
heap
page read and write
16DDB477000
heap
page read and write
51A0000
unkown
page read and write
880000
trusted library allocation
page read and write
5160000
unkown
page read and write
C508000
unkown
page read and write
22029714000
heap
page read and write
7FF5DF366000
unkown
page readonly
5D0000
trusted library allocation
page read and write
2C80000
unkown
page read and write
9260000
unkown
page read and write
E00000
heap
page read and write
2B2D394D000
heap
page read and write
1E22E860000
heap
page read and write
22029750000
heap
page read and write
2FE0000
unkown
page read and write
2C20000
unkown
page read and write
2413134E000
heap
page read and write
2A84000
heap
page read and write
EE472FF000
stack
page read and write
5160000
unkown
page read and write
47F1000
unkown
page read and write
2C90000
unkown
page read and write
16DDB44A000
heap
page read and write
F50000
unkown
page read and write
2C20000
unkown
page read and write
2A60000
heap
page read and write
22029750000
heap
page read and write
2404C843000
heap
page read and write
2FE0000
unkown
page read and write
23F0C6EE000
heap
page read and write
12B48408000
heap
page read and write
C1EC47F000
stack
page read and write
24131310000
trusted library allocation
page read and write
F50000
unkown
page read and write
24131157000
heap
page read and write
F50000
unkown
page read and write
18EC4654000
heap
page read and write
2B2D32F8000
heap
page read and write
200181F0000
heap
page read and write
18EC462C000
heap
page read and write
5160000
unkown
page read and write
3010000
unkown
page read and write
83B0000
unkown
page readonly
60E000
heap
page read and write
22029743000
heap
page read and write
9D9F000
stack
page read and write
3010000
unkown
page read and write
2B2D34B0000
trusted library allocation
page read and write
5160000
unkown
page read and write
22029245000
heap
page read and write
1FB29AA0000
trusted library allocation
page read and write
7FF5DF486000
unkown
page readonly
2202971B000
heap
page read and write
BE80000
unkown
page read and write
2F60000
trusted library allocation
page read and write
2B2D395B000
heap
page read and write
3010000
unkown
page read and write
18EC3E60000
heap
page read and write
F50000
unkown
page read and write
583C000
heap
page read and write
40B000
unkown
page execute read
2AA3000
heap
page read and write
2202972C000
heap
page read and write
1E22CEA4000
heap
page read and write
880000
trusted library allocation
page read and write
7A30000
unkown
page read and write
18EC4125000
heap
page read and write
5819000
heap
page read and write
2AA1000
heap
page read and write
22029710000
heap
page read and write
24133100000
heap
page read and write
18EC4630000
heap
page read and write
2F10000
unkown
page read and write
7FF5DF3F1000
unkown
page readonly
5819000
heap
page read and write
880000
trusted library allocation
page read and write
2B2D35EA000
heap
page read and write
17484FB0000
heap
page read and write
1F0000
heap
page read and write
29F32FF000
stack
page read and write
10100000
unkown
page read and write
1A51E140000
heap
page read and write
2360000
trusted library allocation
page read and write
1FB29B35000
heap
page read and write
7FF5DF0C1000
unkown
page readonly
7800000
unkown
page read and write
2C80000
unkown
page read and write
2FE0000
unkown
page read and write
A0A7000
unkown
page read and write
2B90000
heap
page read and write
16DDB630000
heap
page read and write
1A51E158000
heap
page read and write
B359000
stack
page read and write
22029739000
heap
page read and write
2360000
trusted library allocation
page read and write
16DDB46E000
heap
page read and write
2C40000
unkown
page read and write
17F38027000
heap
page read and write
1E22C8E3000
heap
page read and write
4B60000
trusted library allocation
page read and write
2B2D3490000
heap
page read and write
29F347E000
stack
page read and write
7FF5DF488000
unkown
page readonly
2C80000
unkown
page read and write
1A51E14E000
heap
page read and write
17F3802E000
heap
page read and write
471000
system
page execute and read and write
2A30000
heap
page read and write
16DDBBF9000
heap
page read and write
1E22C8F7000
heap
page read and write
2360000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
1748501F000
heap
page read and write
1748571E000
heap
page read and write
7FF5DEFE2000
unkown
page readonly
1A51E158000
heap
page read and write
16DDB473000
heap
page read and write
1E22CEE2000
heap
page read and write
9330000
unkown
page read and write
2C80000
unkown
page read and write
2FE0000
unkown
page read and write
2C90000
unkown
page read and write
1A51DAF7000
heap
page read and write
F50000
unkown
page read and write
880000
trusted library allocation
page read and write
10046000
unkown
page read and write
2ABB000
heap
page read and write
B5B997F000
stack
page read and write
880000
trusted library allocation
page read and write
5160000
unkown
page read and write
2C60000
unkown
page read and write
2360000
trusted library allocation
page read and write
9330000
unkown
page read and write
EE40000
unkown
page read and write
18EC5EC0000
heap
page read and write
17485712000
heap
page read and write
2B2D3A6A000
heap
page read and write
2B2D35E5000
heap
page read and write
1FB29B22000
heap
page read and write
4B60000
trusted library allocation
page read and write
BE80000
unkown
page read and write
7FF5DF5FF000
unkown
page readonly
9330000
unkown
page read and write
5D0000
trusted library allocation
page read and write
17F37F1C000
heap
page read and write
24131164000
heap
page read and write
20015FCF000
heap
page read and write
400000
unkown
page execute and read and write
233C6D91000
heap
page read and write
F50000
unkown
page read and write
12B48417000
heap
page read and write
5170000
unkown
page read and write
1A51DAD0000
trusted library allocation
page read and write
1E22C8E3000
heap
page read and write
1E22CEB0000
heap
page read and write
17F37AD0000
heap
page read and write
738E000
unkown
page read and write
62D000
heap
page read and write
7FF7CBCB5000
unkown
page readonly
17484FF1000
heap
page read and write
7DF5E896A000
unkown
page readonly
9F51000
unkown
page read and write
EE4727C000
stack
page read and write
2001600B000
heap
page read and write
5D0000
trusted library allocation
page read and write
20015FC5000
heap
page read and write
7FF5DF42F000
unkown
page readonly
2EE38DF0000
heap
page read and write
7FF5DF2FE000
unkown
page readonly
17484F80000
heap
page read and write
44B8167000
stack
page read and write
2C60000
unkown
page read and write
23F0C6CC000
heap
page read and write
233C6D84000
heap
page read and write
7FF5DEFC2000
unkown
page readonly
7FF5DF58A000
unkown
page readonly
1E22CEA7000
heap
page read and write
83F0000
unkown
page read and write
8CF000
stack
page read and write
7FF5DF388000
unkown
page readonly
5819000
heap
page read and write
23F0C098000
heap
page read and write
2340000
heap
page read and write
AD2B000
stack
page read and write
E80000
unkown
page read and write
2C70000
unkown
page read and write
2C90000
unkown
page read and write
A6D2000
unkown
page read and write
2C90000
unkown
page read and write
151BCFE000
stack
page read and write
16DDBBD5000
heap
page read and write
22029047000
heap
page read and write
18EC4649000
heap
page read and write
2F60000
trusted library allocation
page read and write
1FB2A1BD000
heap
page read and write
1E22C8F5000
heap
page read and write
9F2A000
unkown
page read and write
BFAF000
unkown
page read and write
7FF5DF169000
unkown
page readonly
59E000
stack
page read and write
17F37EF7000
heap
page read and write
3000000
heap
page read and write
A758000
unkown
page read and write
F50000
unkown
page read and write
2FE0000
unkown
page read and write
23F0C077000
heap
page read and write
23F0C05A000
heap
page read and write
20015F60000
heap
page read and write
2E20000
trusted library allocation
page read and write
2360000
trusted library allocation
page read and write
16DDB73A000
heap
page read and write
3190000
unkown
page read and write
51DC000
stack
page read and write
18EC4634000
heap
page read and write
C048000
unkown
page read and write
2FE0000
unkown
page read and write
2C90000
unkown
page read and write
1FB2A1CB000
heap
page read and write
20015FB3000
heap
page read and write
1E22C890000
heap
page read and write
4BF0000
heap
page read and write
4F6000
unkown
page readonly
20016670000
heap
page read and write
2A8B000
heap
page read and write
2413139A000
heap
page read and write
5160000
unkown
page read and write
23F0C000000
trusted library allocation
page read and write
24131153000
heap
page read and write
2413138A000
heap
page read and write
18EC4649000
heap
page read and write
1FB2A1C3000
heap
page read and write
2404C7E8000
heap
page read and write
20016734000
heap
page read and write
17F37952000
heap
page read and write
2A8B000
heap
page read and write
583C000
heap
page read and write
5160000
unkown
page read and write
200166A9000
heap
page read and write
9260000
unkown
page read and write
51A0000
unkown
page read and write
2B2D3305000
heap
page read and write
151BBFE000
stack
page read and write
5160000
unkown
page read and write
880000
trusted library allocation
page read and write
5160000
unkown
page read and write
20016691000
heap
page read and write
2E20000
trusted library allocation
page read and write
5160000
unkown
page read and write
BD0000
heap
page read and write
4B60000
trusted library allocation
page read and write
5170000
unkown
page read and write
3010000
unkown
page read and write
2001652B000
heap
page read and write
17F37EFC000
heap
page read and write
17F37944000
heap
page read and write
233C701A000
heap
page read and write
BE80000
unkown
page read and write
5160000
unkown
page read and write
1E22C8F7000
heap
page read and write
2C90000
unkown
page read and write
2360000
trusted library allocation
page read and write
1A51E152000
heap
page read and write
BE80000
unkown
page read and write
7B60000
unkown
page readonly
C75000
stack
page read and write
BE80000
unkown
page read and write
There are 3643 hidden memdumps, click here to show them.