IOC Report
3sfCdeA1H2.exe

loading gif

Files

File Path
Type
Category
Malicious
3sfCdeA1H2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\tttcvva
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\tttcvva:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_fe8167436d6db6c6d2c4bed5d6f2d2c06e142845_f78a65ed_33b02981-0a51-457e-a865-9a43db5b7119\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9631.tmp.dmp
Mini DuMP crash report, 17 streams, CheckSum 0x00000004, Mon Oct 14 08:03:41 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9A87.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9AA8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002d.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002e.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\Windows[4].json
JSON data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\3sfCdeA1H2.exe
"C:\Users\user\Desktop\3sfCdeA1H2.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\tttcvva
C:\Users\user\AppData\Roaming\tttcvva
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2580 -s 4964

URLs

Name
IP
Malicious
http://unicea.ws/tmp/index.php
malicious
http://nwgrus.ru/tmp/index.php
malicious
http://tech-servers.in.net/tmp/index.php
malicious
https://api.msn.com/v1/news/Feed/Windows?
unknown
https://aka.ms/odirmr
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
https://powerpoint.office.comcember
unknown
https://aka.ms/odirmv
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
unknown
https://excel.office.com
unknown
http://schemas.micro
unknown
https://api.msn.com/D
unknown
https://powerpoint.office.comEM
unknown
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
https://api.msn.com/q
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
unknown
https://api.msn.com/X
unknown
https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
unknown
https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
https://wns.windows.com/L
unknown
https://word.office.com
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
https://excel.office.com30#
unknown
https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
https://aka.ms/Vh5j3k
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
https://api.msn.com/v1/news/Feed/Windows?&
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://api.msn.com:443/v1/news/Feed/Windows?V
unknown
https://android.notify.windows.com/iOS
unknown
https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
unknown
https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
unknown
https://api.msn.com/
unknown
https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
unknown
https://outlook.com_
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
unknown
https://www.msn.com:443/en-us/feed
unknown
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
unknown
There are 47 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
nwgrus.ru
109.175.29.39
malicious
api.msn.com
unknown
malicious

IPs

IP
Domain
Country
Malicious
109.175.29.39
nwgrus.ru
Bosnia and Herzegowina
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsStore_8wekyb3d8bbwe\ApplicationFrame\Microsoft.WindowsStore_8wekyb3d8bbwe!App
PreferredMinSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}
DriveNumber
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
TotalBytes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
FreeBytes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Blank Disc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Can Close
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Media Type
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Imapi Media State
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
IsImapiDataBurnSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
IsImapiEraseSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Live FS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Disc Label
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Set
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\BackupReminder
BackupReminderToastCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\DiskSpaceChecking
LastInstallTimeLowStorageNotify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\BackupReminder
LastTimeBackupReminderNotify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010418
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
PastIconsStream
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
IconStreams
There are 178 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
46A1000
unclassified section
page read and write
malicious
4780000
direct allocation
page read and write
malicious
47B1000
unclassified section
page read and write
malicious
2CA0000
direct allocation
page read and write
malicious
9580000
unkown
page read and write
9590000
unkown
page read and write
BAF0000
heap
page read and write
D410000
trusted library allocation
page read and write
B7F8000
heap
page read and write
B7EC000
heap
page read and write
9877000
unkown
page read and write
BAF0000
heap
page read and write
BA05000
heap
page read and write
786B000
unkown
page read and write
7DFB000
stack
page read and write
32A0000
unkown
page read and write
84C6000
heap
page read and write
BA3F000
heap
page read and write
9DED000
stack
page read and write
7FF5ED7F1000
unkown
page readonly
9CE0000
unkown
page read and write
8115000
heap
page read and write
A74E000
heap
page read and write
32A0000
unkown
page read and write
3150000
unkown
page read and write
2CDC000
heap
page execute and read and write
B843000
heap
page read and write
7FF5ED692000
unkown
page readonly
8479000
heap
page read and write
48F3000
heap
page read and write
B7B9000
heap
page read and write
B705000
heap
page read and write
CA42000
unkown
page read and write
B6DF000
heap
page read and write
BBC1000
heap
page read and write
F80000
trusted library allocation
page read and write
842C000
heap
page read and write
81EA000
heap
page read and write
1380000
unkown
page read and write
7FF5ED9ED000
unkown
page readonly
BC3A000
heap
page read and write
13B0000
unkown
page read and write
B885000
heap
page read and write
BAF0000
heap
page read and write
B7F8000
heap
page read and write
8352000
heap
page read and write
ADB8000
heap
page read and write
A72D000
heap
page read and write
9CE0000
unkown
page read and write
3440000
unkown
page read and write
7FF5ED2A4000
unkown
page readonly
B7F0000
heap
page read and write
3440000
unkown
page read and write
7FF5ED4B0000
unkown
page readonly
B60B000
heap
page read and write
C846000
unkown
page read and write
D220000
trusted library allocation
page read and write
B7C3000
heap
page read and write
7FF5ED503000
unkown
page readonly
A5D4000
heap
page read and write
B7F6000
heap
page read and write
9CE0000
unkown
page read and write
7FF5ED87D000
unkown
page readonly
9590000
unkown
page read and write
3120000
unkown
page read and write
7FF5ED205000
unkown
page readonly
9590000
unkown
page read and write
BAF6000
heap
page read and write
B6CB000
heap
page read and write
B800000
heap
page read and write
B300000
unkown
page read and write
1360000
unkown
page read and write
7FF5ED9BE000
unkown
page readonly
B8A4000
heap
page read and write
9590000
unkown
page read and write
B874000
heap
page read and write
BA47000
heap
page read and write
B8A0000
heap
page read and write
BAF6000
heap
page read and write
986B000
unkown
page read and write
91C0000
unkown
page read and write
7FF5ED39B000
unkown
page readonly
9CE0000
unkown
page read and write
A74C000
heap
page read and write
987B000
unkown
page read and write
4B93000
unkown
page read and write
1340000
unkown
page read and write
3797000
unkown
page read and write
3110000
unkown
page read and write
BAF6000
heap
page read and write
BA1F000
heap
page read and write
A74E000
heap
page read and write
9580000
unkown
page read and write
7DF4F3031000
unkown
page execute read
BAF0000
heap
page read and write
B88A000
heap
page read and write
13B0000
unkown
page read and write
B699000
heap
page read and write
3160000
unkown
page read and write
843E000
heap
page read and write
842C000
heap
page read and write
95A0000
unkown
page read and write
B8AE000
heap
page read and write
33C0000
unkown
page read and write
BAF8000
heap
page read and write
3110000
unkown
page read and write
95B0000
unkown
page read and write
B7FE000
heap
page read and write
BA34000
heap
page read and write
8350000
heap
page read and write
7FF5ED864000
unkown
page readonly
13B0000
unkown
page read and write
B9C4000
heap
page read and write
B5E3000
heap
page read and write
B890000
heap
page read and write
7FF5ED73D000
unkown
page readonly
7D60000
heap
page read and write
B6A0000
heap
page read and write
B7E4000
heap
page read and write
7FF5ED9C8000
unkown
page readonly
B802000
heap
page read and write
B710000
heap
page read and write
A664000
heap
page read and write
B84A000
heap
page read and write
91C0000
unkown
page read and write
A743000
heap
page read and write
7FF5ED9A1000
unkown
page readonly
4AE8000
heap
page read and write
BA05000
heap
page read and write
8317000
heap
page read and write
2CCE000
heap
page read and write
4851000
heap
page read and write
7DF47D591000
trusted library allocation
page execute read
47F9000
heap
page read and write
3110000
unkown
page read and write
7FF5ED5C5000
unkown
page readonly
820D000
heap
page read and write
A676000
heap
page read and write
A63B000
heap
page read and write
3440000
unkown
page read and write
13B0000
unkown
page read and write
8F10000
unkown
page read and write
B7BE000
heap
page read and write
1200000
unkown
page readonly
9CE0000
unkown
page read and write
3440000
unkown
page read and write
7DF47D590000
trusted library allocation
page readonly
9CE0000
unkown
page read and write
7E60000
unkown
page read and write
A74E000
heap
page read and write
A722000
heap
page read and write
B7FE000
heap
page read and write
C557000
unkown
page read and write
7FF5ED80C000
unkown
page readonly
95B0000
unkown
page read and write
87BE000
stack
page read and write
4AB9000
heap
page read and write
B89A000
heap
page read and write
482E000
heap
page read and write
9CE0000
unkown
page read and write
B8E9000
heap
page read and write
B5F4000
heap
page read and write
A628000
heap
page read and write
B8C6000
heap
page read and write
1360000
unkown
page read and write
2D7E000
stack
page read and write
1370000
unkown
page read and write
B7F0000
heap
page read and write
B8A4000
heap
page read and write
BAF6000
heap
page read and write
95B0000
unkown
page read and write
7FF5ED28E000
unkown
page readonly
95B0000
unkown
page read and write
485F000
stack
page read and write
B9E6000
heap
page read and write
B60B000
heap
page read and write
3440000
unkown
page read and write
84B6000
heap
page read and write
A3BE000
unkown
page read and write
BB35000
heap
page read and write
89A0000
unkown
page read and write
B8AE000
heap
page read and write
9CE0000
unkown
page read and write
3160000
unkown
page read and write
BAF8000
heap
page read and write
2BCE000
stack
page read and write
A6D2000
heap
page read and write
B8CE000
heap
page read and write
9580000
unkown
page read and write
A09E000
stack
page read and write
BA2B000
heap
page read and write
BB00000
heap
page read and write
B7E2000
heap
page read and write
B7C8000
heap
page read and write
BBC1000
heap
page read and write
1360000
unkown
page read and write
B741000
heap
page read and write
B8CE000
heap
page read and write
B8DF000
heap
page read and write
3440000
unkown
page read and write
8336000
heap
page read and write
8FB9000
stack
page read and write
CC7D000
stack
page read and write
95A0000
unkown
page read and write
A799000
heap
page read and write
A664000
heap
page read and write
B9E6000
heap
page read and write
BAFE000
heap
page read and write
9CE0000
unkown
page read and write
A32A000
unkown
page read and write
1380000
unkown
page read and write
B7E0000
heap
page read and write
9CE0000
unkown
page read and write
B8A6000
heap
page read and write
14B0000
unkown
page readonly
B741000
heap
page read and write
B65C000
heap
page read and write
3440000
unkown
page read and write
BA36000
heap
page read and write
3150000
unkown
page read and write
9B0000
heap
page read and write
9CE0000
unkown
page read and write
7DA0000
unkown
page read and write
BAE2000
heap
page read and write
8111000
heap
page read and write
1370000
unkown
page read and write
C47C000
stack
page read and write
3658000
stack
page read and write
9590000
unkown
page read and write
3130000
unkown
page read and write
3150000
unkown
page read and write
93C0000
unkown
page read and write
B9EA000
heap
page read and write
BA6B000
heap
page read and write
BA34000
heap
page read and write
83C2000
heap
page read and write
BA05000
heap
page read and write
B5F2000
heap
page read and write
8317000
heap
page read and write
BA36000
heap
page read and write
2CA0000
direct allocation
page read and write
836A000
heap
page read and write
C9FD000
stack
page read and write
B2A0000
trusted library allocation
page read and write
8342000
heap
page read and write
1380000
unkown
page read and write
3150000
unkown
page read and write
B5B5000
heap
page read and write
3440000
unkown
page read and write
A72D000
heap
page read and write
B7E6000
heap
page read and write
A736000
heap
page read and write
B68B000
heap
page read and write
B80D000
heap
page read and write
3440000
unkown
page read and write
3150000
unkown
page read and write
1505000
heap
page read and write
3440000
unkown
page read and write
A741000
heap
page read and write
3150000
unkown
page read and write
BAF4000
heap
page read and write
13B0000
unkown
page read and write
BAE3000
heap
page read and write
3110000
unkown
page read and write
B8E9000
heap
page read and write
3440000
unkown
page read and write
9540000
unkown
page read and write
D288000
heap
page read and write
C4A0000
unkown
page read and write
3150000
unkown
page read and write
8381000
heap
page read and write
A722000
heap
page read and write
3130000
unkown
page read and write
3110000
unkown
page read and write
83F0000
heap
page read and write
41B000
unkown
page write copy
A741000
heap
page read and write
BBA1000
heap
page read and write
9920000
heap
page read and write
B879000
heap
page read and write
8489000
heap
page read and write
3130000
unkown
page read and write
91C0000
unkown
page read and write
95B0000
unkown
page read and write
9580000
unkown
page read and write
8A1E000
stack
page read and write
A72D000
heap
page read and write
318B000
stack
page read and write
A5CF000
heap
page read and write
785B000
unkown
page read and write
B7F4000
heap
page read and write
BB06000
heap
page read and write
A736000
heap
page read and write
95B0000
unkown
page read and write
9580000
unkown
page read and write
B872000
heap
page read and write
B8C0000
unkown
page readonly
BAFE000
heap
page read and write
B84A000
heap
page read and write
3440000
unkown
page read and write
B695000
heap
page read and write
BA3F000
heap
page read and write
1390000
unkown
page read and write
83C2000
heap
page read and write
7FF5ED6DB000
unkown
page readonly
9CE0000
unkown
page read and write
8489000
heap
page read and write
B872000
heap
page read and write
3110000
unkown
page read and write
A74C000
heap
page read and write
BAE2000
heap
page read and write
1370000
unkown
page read and write
B9E6000
heap
page read and write
838F000
heap
page read and write
3440000
unkown
page read and write
83B2000
heap
page read and write
8334000
heap
page read and write
3110000
unkown
page read and write
1380000
unkown
page read and write
1360000
unkown
page read and write
7FF5ED409000
unkown
page readonly
8342000
heap
page read and write
7FF5ED5C1000
unkown
page readonly
871E000
stack
page read and write
BB06000
heap
page read and write
48F3000
heap
page read and write
91C0000
unkown
page read and write
7CD0000
unkown
page read and write
848B000
heap
page read and write
49C7000
heap
page read and write
2C30000
heap
page read and write
95A0000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
7FF5ED451000
unkown
page readonly
CB78000
stack
page read and write
AE0D000
heap
page read and write
13B0000
unkown
page read and write
B858000
heap
page read and write
B87D000
heap
page read and write
4818000
heap
page read and write
3110000
unkown
page read and write
9CE0000
unkown
page read and write
BC71000
heap
page read and write
91F0000
unkown
page read and write
4C1E000
unkown
page read and write
C88B000
unkown
page read and write
3110000
unkown
page read and write
56D9000
unkown
page read and write
B622000
heap
page read and write
B7FA000
heap
page read and write
4BC0000
heap
page read and write
BA47000
heap
page read and write
3110000
unkown
page read and write
B7F0000
heap
page read and write
7FF5ED349000
unkown
page readonly
19D000
stack
page read and write
B7CA000
heap
page read and write
4B78000
unkown
page read and write
9CE0000
unkown
page read and write
3110000
unkown
page read and write
BA4F000
heap
page read and write
A74C000
heap
page read and write
BA36000
heap
page read and write
B8AE000
heap
page read and write
1370000
unkown
page read and write
7FF5EDA08000
unkown
page readonly
9590000
unkown
page read and write
C6E3000
unkown
page read and write
3440000
unkown
page read and write
BAEA000
heap
page read and write
3440000
unkown
page read and write
A741000
heap
page read and write
3160000
unkown
page read and write
BCE8000
heap
page read and write
9580000
unkown
page read and write
9798000
unkown
page read and write
B7D8000
heap
page read and write
A796000
heap
page read and write
BAFC000
heap
page read and write
7FF5ED8A4000
unkown
page readonly
95B0000
unkown
page read and write
D28B000
heap
page read and write
B805000
heap
page read and write
1360000
unkown
page read and write
3440000
unkown
page read and write
A74C000
heap
page read and write
B89A000
heap
page read and write
3440000
unkown
page read and write
1E4000
heap
page read and write
842C000
heap
page read and write
B7FA000
heap
page read and write
BB06000
heap
page read and write
8370000
heap
page read and write
BAFE000
heap
page read and write
4BBE000
heap
page read and write
B802000
heap
page read and write
A5E9000
heap
page read and write
A722000
heap
page read and write
A72D000
heap
page read and write
7FF5ED602000
unkown
page readonly
BA4F000
heap
page read and write
BB7E000
heap
page read and write
7FF5ED46A000
unkown
page readonly
D410000
trusted library allocation
page read and write
7FF5D1CD4000
unkown
page readonly
A74E000
heap
page read and write
8F10000
unkown
page read and write
3160000
unkown
page read and write
A37B000
unkown
page read and write
8F10000
unkown
page read and write
95A0000
unkown
page read and write
B170000
unkown
page readonly
84DA000
heap
page read and write
A5E9000
heap
page read and write
869E000
stack
page read and write
81F1000
heap
page read and write
3110000
unkown
page read and write
84BF000
heap
page read and write
BB08000
heap
page read and write
7FF5ED26E000
unkown
page readonly
9CE0000
unkown
page read and write
A72D000
heap
page read and write
B7C8000
heap
page read and write
9C000
stack
page read and write
B8D5000
heap
page read and write
8414000
heap
page read and write
4A05000
heap
page read and write
7FF5ED516000
unkown
page readonly
BAFA000
heap
page read and write
418000
unkown
page readonly
8F10000
unkown
page read and write
B72F000
heap
page read and write
A6D2000
heap
page read and write
7FF5ED814000
unkown
page readonly
7DF47D570000
trusted library allocation
page readonly
B9E6000
heap
page read and write
B8CE000
heap
page read and write
B300000
unkown
page read and write
7FF5ED803000
unkown
page readonly
BA1F000
heap
page read and write
84B6000
heap
page read and write
4BC9000
unkown
page read and write
B7DC000
heap
page read and write
B800000
heap
page read and write
1380000
unkown
page read and write
4A01000
heap
page read and write
1380000
unkown
page read and write
A5F8000
heap
page read and write
D09A000
stack
page read and write
A796000
heap
page read and write
BA41000
heap
page read and write
FDE4000
unkown
page read and write
B7DE000
heap
page read and write
A664000
heap
page read and write
96DF000
unkown
page read and write
8364000
heap
page read and write
FC84000
unkown
page read and write
B9DE000
heap
page read and write
A64C000
heap
page read and write
4AA0000
heap
page read and write
91C0000
unkown
page read and write
B8D5000
heap
page read and write
B66E000
heap
page read and write
BDA0000
unkown
page readonly
B870000
heap
page read and write
A799000
heap
page read and write
ADBB000
heap
page read and write
A375000
unkown
page read and write
2F70000
trusted library allocation
page read and write
331E000
stack
page read and write
3110000
unkown
page read and write
B84D000
heap
page read and write
32A0000
unkown
page read and write
B7F4000
heap
page read and write
A361000
unkown
page read and write
BA3F000
heap
page read and write
8364000
heap
page read and write
7DA0000
unkown
page read and write
A799000
heap
page read and write
1360000
unkown
page read and write
A74E000
heap
page read and write
3053000
stack
page read and write
8479000
heap
page read and write
C6C9000
unkown
page read and write
A72D000
heap
page read and write
3110000
unkown
page read and write
3758000
unkown
page read and write
4525000
stack
page read and write
ADBC000
heap
page read and write
3150000
unkown
page read and write
C964000
unkown
page read and write
9580000
unkown
page read and write
B890000
heap
page read and write
B7B4000
heap
page read and write
3440000
unkown
page read and write
9CE0000
unkown
page read and write
48F6000
heap
page read and write
13B0000
unkown
page read and write
83B3000
heap
page read and write
1340000
unkown
page read and write
4CE0000
unkown
page read and write
A677000
heap
page read and write
BAF8000
heap
page read and write
A433000
unkown
page read and write
B7FA000
heap
page read and write
B9F2000
heap
page read and write
B8A6000
heap
page read and write
48F6000
heap
page read and write
B741000
heap
page read and write
9CE0000
unkown
page read and write
A799000
heap
page read and write
842A000
heap
page read and write
A5A1000
heap
page read and write
D600000
trusted library allocation
page read and write
1510000
unkown
page readonly
3440000
unkown
page read and write
D260000
heap
page read and write
7FF5ED9CA000
unkown
page readonly
1390000
unkown
page read and write
C5A3000
unkown
page read and write
A39B000
unkown
page read and write
8860000
unkown
page read and write
A63B000
heap
page read and write
4ABE000
heap
page read and write
A741000
heap
page read and write
4882000
heap
page read and write
40A000
unkown
page execute read
B7F8000
heap
page read and write
B872000
heap
page read and write
B879000
heap
page read and write
B695000
heap
page read and write
C3FC000
stack
page read and write
B95A000
heap
page read and write
AAF2000
unkown
page read and write
95A0000
unkown
page read and write
A72D000
heap
page read and write
A72D000
heap
page read and write
7FF5ED426000
unkown
page readonly
7950000
unkown
page read and write
B7DE000
heap
page read and write
7FF5ED50A000
unkown
page readonly
DE0000
unkown
page readonly
B98F000
heap
page read and write
A799000
heap
page read and write
3150000
unkown
page read and write
BD1D000
stack
page read and write
987F000
unkown
page read and write
3110000
unkown
page read and write
1370000
unkown
page read and write
91C0000
unkown
page read and write
B7D4000
heap
page read and write
3150000
unkown
page read and write
7FF5ED996000
unkown
page readonly
8330000
heap
page read and write
4A60000
heap
page read and write
3110000
unkown
page read and write
4AA8000
heap
page read and write
7FF5D1CCD000
unkown
page readonly
BA47000
heap
page read and write
B629000
stack
page read and write
A491000
unkown
page read and write
A673000
heap
page read and write
37AE000
unkown
page read and write
13B0000
unkown
page read and write
A16E000
stack
page read and write
1370000
unkown
page read and write
DD0000
unkown
page readonly
95A0000
unkown
page read and write
7FF5ED8E2000
unkown
page readonly
2C40000
heap
page read and write
BAEA000
heap
page read and write
B723000
heap
page read and write
BAFA000
heap
page read and write
9CE0000
unkown
page read and write
9CE0000
unkown
page read and write
7DF47D551000
trusted library allocation
page execute read
BAEA000
heap
page read and write
8A9E000
stack
page read and write
B65D000
heap
page read and write
7FF5ED937000
unkown
page readonly
8111000
heap
page read and write
BA05000
heap
page read and write
A654000
heap
page read and write
9580000
unkown
page read and write
BAF6000
heap
page read and write
32A0000
unkown
page read and write
2E7F000
stack
page read and write
A736000
heap
page read and write
B744000
heap
page read and write
9CE0000
unkown
page read and write
BC36000
heap
page read and write
BAE2000
heap
page read and write
83B3000
heap
page read and write
33C0000
unkown
page read and write
A741000
heap
page read and write
9CE0000
unkown
page read and write
A72D000
heap
page read and write
B63A000
heap
page read and write
B6F1000
heap
page read and write
7DF47D541000
trusted library allocation
page execute read
3110000
unkown
page read and write
B7C8000
heap
page read and write
7900000
unkown
page read and write
9A10000
unkown
page read and write
A49E000
unkown
page read and write
7FF5ED779000
unkown
page readonly
C08A000
stack
page read and write
B9F2000
heap
page read and write
3440000
unkown
page read and write
D613000
trusted library allocation
page read and write
7E50000
unkown
page readonly
B6C2000
heap
page read and write
A799000
heap
page read and write
8372000
heap
page read and write
7FF5ED519000
unkown
page readonly
BAFE000
heap
page read and write
7DF47D520000
trusted library allocation
page readonly
BA41000
heap
page read and write
401000
unkown
page execute read
3110000
unkown
page read and write
AE14000
heap
page read and write
BA71000
heap
page read and write
B7CA000
heap
page read and write
A722000
heap
page read and write
4BCE000
heap
page read and write
BA27000
heap
page read and write
B879000
heap
page read and write
1390000
unkown
page read and write
834E000
heap
page read and write
BAF4000
heap
page read and write
FE0000
heap
page read and write
9CE0000
unkown
page read and write
FB0000
heap
page read and write
B82A000
stack
page read and write
ADD0000
heap
page read and write
1360000
unkown
page read and write
BB00000
heap
page read and write
9CE0000
unkown
page read and write
95A0000
unkown
page read and write
3460000
unkown
page read and write
B870000
heap
page read and write
BA36000
heap
page read and write
95A0000
unkown
page read and write
B7F0000
heap
page read and write
97C3000
unkown
page read and write
BA05000
heap
page read and write
9580000
unkown
page read and write
BB35000
heap
page read and write
B7D6000
heap
page read and write
93C0000
unkown
page read and write
B71E000
heap
page read and write
7FF5ED849000
unkown
page readonly
834A000
heap
page read and write
7FF5ED412000
unkown
page readonly
AE09000
heap
page read and write
83F0000
heap
page read and write
3440000
unkown
page read and write
9540000
unkown
page read and write
BA36000
heap
page read and write
4750000
heap
page read and write
BAF2000
heap
page read and write
7FF5ED5EB000
unkown
page readonly
9F1B000
stack
page read and write
A63B000
heap
page read and write
A741000
heap
page read and write
95A0000
unkown
page read and write
7857000
unkown
page read and write
BAFE000
heap
page read and write
9CE0000
unkown
page read and write
A664000
heap
page read and write
9CE0000
unkown
page read and write
9CE0000
unkown
page read and write
7907000
stack
page read and write
13B0000
unkown
page read and write
A648000
heap
page read and write
BA36000
heap
page read and write
B6C2000
heap
page read and write
A743000
heap
page read and write
9540000
unkown
page read and write
1380000
unkown
page read and write
9550000
unkown
page readonly
A796000
heap
page read and write
8381000
heap
page read and write
B9F0000
heap
page read and write
1095000
stack
page read and write
47F6000
heap
page read and write
97D4000
unkown
page read and write
B885000
heap
page read and write
A675000
heap
page read and write
B7D4000
heap
page read and write
13A0000
unkown
page read and write
838F000
heap
page read and write
95A0000
unkown
page read and write
7FF5ED71E000
unkown
page readonly
A722000
heap
page read and write
BB00000
heap
page read and write
9CE0000
unkown
page read and write
A62F000
heap
page read and write
3440000
unkown
page read and write
BBB5000
heap
page read and write
2CCA000
heap
page read and write
84B4000
heap
page read and write
B7CA000
heap
page read and write
7FF5ED445000
unkown
page readonly
784A000
unkown
page read and write
A5E3000
heap
page read and write
7FF5ED1D7000
unkown
page readonly
1350000
unkown
page read and write
C6D9000
unkown
page read and write
ADB4000
heap
page read and write
BAFE000
heap
page read and write
A33E000
unkown
page read and write
7DF47D581000
trusted library allocation
page execute read
4BBA000
heap
page read and write
B6CD000
heap
page read and write
83F0000
heap
page read and write
95A0000
unkown
page read and write
4733000
heap
page read and write
91C0000
unkown
page read and write
B7CC000
heap
page read and write
B29B000
stack
page read and write
B87B000
heap
page read and write
93C0000
unkown
page read and write
86E0000
heap
page read and write
B882000
heap
page read and write
8F10000
unkown
page read and write
A479000
unkown
page read and write
BAF2000
heap
page read and write
B890000
heap
page read and write
A743000
heap
page read and write
4811000
heap
page read and write
B890000
heap
page read and write
B60B000
heap
page read and write
91F0000
unkown
page read and write
BB95000
heap
page read and write
B9DE000
heap
page read and write
BB00000
heap
page read and write
3150000
unkown
page read and write
BA71000
heap
page read and write
4A3C000
heap
page read and write
3150000
unkown
page read and write
7FF5ED9D6000
unkown
page readonly
A5EC000
heap
page read and write
B7CE000
heap
page read and write
A6D2000
heap
page read and write
B87B000
heap
page read and write
BA36000
heap
page read and write
7FF5ED990000
unkown
page readonly
D5BB000
stack
page read and write
B7CE000
heap
page read and write
B8AB000
stack
page read and write
3150000
unkown
page read and write
1340000
unkown
page read and write
B7C3000
heap
page read and write
B69F000
heap
page read and write
32A0000
unkown
page read and write
B9C4000
heap
page read and write
7FF5EDA31000
unkown
page readonly
9580000
unkown
page read and write
BAEE000
heap
page read and write
C563000
unkown
page read and write
9CE0000
unkown
page read and write
7D40000
unkown
page read and write
9CE0000
unkown
page read and write
CB0C000
unkown
page read and write
B7EA000
heap
page read and write
965C000
stack
page read and write
7DF4F3040000
unkown
page readonly
3150000
unkown
page read and write
B695000
heap
page read and write
A502000
unkown
page read and write
3110000
unkown
page read and write
8219000
heap
page read and write
3210000
heap
page read and write
9580000
unkown
page read and write
BC3A000
heap
page read and write
A741000
heap
page read and write
7DA0000
unkown
page read and write
AE0D000
heap
page read and write
7FF5ED9CC000
unkown
page readonly
7DF47D5A1000
trusted library allocation
page execute read
9580000
unkown
page read and write
7FF5ED4A1000
unkown
page readonly
B864000
heap
page read and write
9CE0000
unkown
page read and write
8330000
heap
page read and write
4B94000
heap
page read and write
3440000
unkown
page read and write
7B80000
unkown
page read and write
BA3F000
heap
page read and write
3160000
unkown
page read and write
A74C000
heap
page read and write
4900000
heap
page read and write
32A0000
unkown
page read and write
C811000
unkown
page read and write
BA4F000
heap
page read and write
BA3F000
heap
page read and write
C5F8000
stack
page read and write
B695000
heap
page read and write
91C0000
unkown
page read and write
1380000
unkown
page read and write
9CE0000
unkown
page read and write
B21E000
stack
page read and write
13A0000
unkown
page read and write
3440000
unkown
page read and write
7852000
unkown
page read and write
B877000
heap
page read and write
2C7E000
stack
page read and write
95A0000
unkown
page read and write
B877000
heap
page read and write
B8A0000
heap
page read and write
B724000
heap
page read and write
3150000
unkown
page read and write
3440000
unkown
page read and write
3150000
unkown
page read and write
AE11000
heap
page read and write
ADEA000
heap
page read and write
9439000
stack
page read and write
B7FA000
heap
page read and write
3110000
unkown
page read and write
3440000
unkown
page read and write
B8BB000
heap
page read and write
ADD7000
heap
page read and write
9881000
unkown
page read and write
3150000
unkown
page read and write
95A0000
unkown
page read and write
BA34000
heap
page read and write
A669000
heap
page read and write
8720000
unkown
page readonly
3209000
stack
page read and write
B87E000
heap
page read and write
BA27000
heap
page read and write
4830000
heap
page read and write
BBB5000
heap
page read and write
84E6000
heap
page read and write
A736000
heap
page read and write
B74F000
heap
page read and write
FC03000
unkown
page read and write
8336000
heap
page read and write
879C000
stack
page read and write
B7C6000
heap
page read and write
845F000
heap
page read and write
BA4F000
heap
page read and write
BAF0000
heap
page read and write
A799000
heap
page read and write
7DF4F3071000
unkown
page execute read
9CE0000
unkown
page read and write
BA2B000
heap
page read and write
B6C2000
heap
page read and write
7FF5EDA0D000
unkown
page readonly
A796000
heap
page read and write
13B0000
unkown
page read and write
BAF8000
heap
page read and write
4ABB000
heap
page read and write
B5EF000
heap
page read and write
7FF5ED7D6000
unkown
page readonly
A676000
heap
page read and write
BCF5000
heap
page read and write
143B000
stack
page read and write
A743000
heap
page read and write
7DF47D531000
trusted library allocation
page execute read
4700000
heap
page read and write
7FF5ED755000
unkown
page readonly
C5AA000
unkown
page read and write
C6FD000
stack
page read and write
BA27000
heap
page read and write
3150000
unkown
page read and write
1390000
unkown
page read and write
FDEA000
unkown
page read and write
9580000
unkown
page read and write
A6D2000
heap
page read and write
C51E000
unkown
page read and write
78AD000
unkown
page read and write
BB82000
heap
page read and write
8336000
heap
page read and write
9CE0000
unkown
page read and write
7FF5ED4B4000
unkown
page readonly
B7BC000
heap
page read and write
D420000
trusted library allocation
page read and write
7FF5ED4FD000
unkown
page readonly
ADD7000
heap
page read and write
3150000
unkown
page read and write
8140000
heap
page read and write
48F9000
heap
page read and write
B6C2000
heap
page read and write
BA47000
heap
page read and write
8121000
heap
page read and write
B9F0000
heap
page read and write
4880000
heap
page read and write
7FF5ED9C6000
unkown
page readonly
3110000
unkown
page read and write
8121000
heap
page read and write
A590000
trusted library allocation
page read and write
B802000
heap
page read and write
9CE0000
unkown
page read and write
1240000
heap
page read and write
B9EA000
heap
page read and write
B9D7000
heap
page read and write
B68B000
heap
page read and write
B744000
heap
page read and write
B7D8000
heap
page read and write
7FF5EDA70000
unkown
page readonly
7D53000
unkown
page read and write
91B9000
stack
page read and write
308A000
stack
page read and write
C278000
stack
page read and write
7FF5ED669000
unkown
page readonly
3150000
unkown
page read and write
BA47000
heap
page read and write
1390000
unkown
page read and write
B875000
heap
page read and write
9CE0000
unkown
page read and write
C962000
unkown
page read and write
B7C3000
heap
page read and write
47F6000
heap
page read and write
A743000
heap
page read and write
7FF5ED625000
unkown
page readonly
B87B000
heap
page read and write
9139000
stack
page read and write
804A000
stack
page read and write
9580000
unkown
page read and write
3700000
unkown
page read and write
1340000
unkown
page read and write
B8A4000
heap
page read and write
D08000
heap
page read and write
3440000
unkown
page read and write
C87D000
stack
page read and write
1390000
unkown
page read and write
4AB9000
heap
page read and write
B6CD000
heap
page read and write
4770000
direct allocation
page execute and read and write
B4D0000
unkown
page read and write
833E000
heap
page read and write
9CE0000
unkown
page read and write
B95A000
heap
page read and write
C43000
heap
page read and write
93C0000
unkown
page read and write
9875000
unkown
page read and write
B650000
unkown
page read and write
1440000
unkown
page read and write
98A8000
unkown
page read and write
4818000
heap
page read and write
B729000
stack
page read and write
BAFC000
heap
page read and write
95A0000
unkown
page read and write
8F10000
unkown
page read and write
7E11000
unkown
page read and write
4B50000
unkown
page read and write
B719000
heap
page read and write
2B50000
heap
page read and write
1360000
unkown
page read and write
A6D2000
heap
page read and write
3110000
unkown
page read and write
B9C9000
heap
page read and write
7FF5ED74A000
unkown
page readonly
4805000
heap
page read and write
3440000
unkown
page read and write
B71B000
heap
page read and write
B7EC000
heap
page read and write
B7BA000
heap
page read and write
8209000
heap
page read and write
3120000
unkown
page read and write
48CA000
heap
page read and write
7FF5ED915000
unkown
page readonly
3160000
unkown
page read and write
480F000
heap
page read and write
B7CA000
heap
page read and write
7FF5ED64F000
unkown
page readonly
B882000
heap
page read and write
AE11000
heap
page read and write
13B0000
unkown
page read and write
3440000
unkown
page read and write
A01D000
stack
page read and write
79B1000
unkown
page read and write
B9F0000
heap
page read and write
9A5B000
unkown
page read and write
1360000
unkown
page read and write
B85C000
heap
page read and write
95A0000
unkown
page read and write
7FF5EDA76000
unkown
page readonly
3440000
unkown
page read and write
ADBB000
heap
page read and write
B87D000
heap
page read and write
A648000
heap
page read and write
487E000
heap
page read and write
A722000
heap
page read and write
BAF2000
heap
page read and write
D5D0000
trusted library allocation
page read and write
B57F000
stack
page read and write
7FF5ED7E9000
unkown
page readonly
7FF5ED4C2000
unkown
page readonly
FDD1000
unkown
page read and write
FB82000
unkown
page read and write
B802000
heap
page read and write
78A0000
unkown
page read and write
A74C000
heap
page read and write
B85C000
heap
page read and write
3110000
unkown
page read and write
845C000
heap
page read and write
47A5000
heap
page read and write
3110000
unkown
page read and write
B855000
heap
page read and write
B7F6000
heap
page read and write
A676000
heap
page read and write
8317000
heap
page read and write
BA2D000
heap
page read and write
8219000
heap
page read and write
B7D2000
heap
page read and write
B84B000
heap
page read and write
91C0000
unkown
page read and write
8479000
heap
page read and write
4C60000
unkown
page read and write
7DA0000
unkown
page read and write
B705000
heap
page read and write
8235000
heap
page read and write
B9D7000
heap
page read and write
1370000
unkown
page read and write
8352000
heap
page read and write
1370000
unkown
page read and write
4B90000
unkown
page read and write
95B0000
unkown
page read and write
B885000
heap
page read and write
8354000
heap
page read and write
37A8000
unkown
page read and write
C507000
unkown
page read and write
BEBC000
stack
page read and write
7DF47D590000
trusted library allocation
page readonly
B885000
heap
page read and write
3150000
unkown
page read and write
48E4000
heap
page read and write
7FF5EDA53000
unkown
page readonly
B6EE000
heap
page read and write
7FF5ED342000
unkown
page readonly
B84D000
heap
page read and write
BA05000
heap
page read and write
3110000
unkown
page read and write
817A000
heap
page read and write
BAFA000
heap
page read and write
8246000
heap
page read and write
9540000
unkown
page read and write
8112000
heap
page read and write
838F000
heap
page read and write
BC72000
heap
page read and write
B8D5000
heap
page read and write
B6DF000
heap
page read and write
BA1F000
heap
page read and write
3440000
unkown
page read and write
B7FE000
heap
page read and write
BAFC000
heap
page read and write
4ABB000
heap
page read and write
BA71000
heap
page read and write
8381000
heap
page read and write
3150000
unkown
page read and write
37F9000
unkown
page read and write
B8D5000
heap
page read and write
9580000
unkown
page read and write
B7E2000
heap
page read and write
3170000
unkown
page read and write
7FF5EDA0B000
unkown
page readonly
B870000
heap
page read and write
834E000
heap
page read and write
8F10000
unkown
page read and write
9580000
unkown
page read and write
9CE0000
unkown
page read and write
A5EF000
heap
page read and write
B9DB000
heap
page read and write
1360000
unkown
page read and write
849B000
heap
page read and write
B89A000
heap
page read and write
BAFC000
heap
page read and write
7FF5ED556000
unkown
page readonly
7C80000
unkown
page read and write
4852000
heap
page read and write
B8AE000
heap
page read and write
2CEA000
heap
page read and write
4A4F000
heap
page read and write
B7EE000
heap
page read and write
B190000
unkown
page read and write
B87B000
heap
page read and write
843E000
heap
page read and write
B7CC000
heap
page read and write
1390000
unkown
page read and write
B8C6000
heap
page read and write
48AB000
heap
page read and write
9590000
unkown
page read and write
B7FC000
heap
page read and write
49E9000
heap
page read and write
9B70000
heap
page read and write
BB06000
heap
page read and write
BC71000
heap
page read and write
1360000
unkown
page read and write
BA71000
heap
page read and write
9540000
unkown
page read and write
FB99000
unkown
page read and write
BAEE000
heap
page read and write
BAEA000
heap
page read and write
B880000
heap
page read and write
B8AE000
heap
page read and write
7A78000
stack
page read and write
AAD1000
unkown
page read and write
7FF5ED46E000
unkown
page readonly
4A7A000
heap
page read and write
B8CE000
heap
page read and write
3150000
unkown
page read and write
9580000
unkown
page read and write
BA05000
heap
page read and write
9F9E000
stack
page read and write
B89A000
heap
page read and write
4BDC000
unkown
page read and write
2C49000
stack
page read and write
7FF5ED697000
unkown
page readonly
B7E4000
heap
page read and write
BA2B000
heap
page read and write
8FEC000
stack
page read and write
4B80000
heap
page read and write
A4E0000
trusted library allocation
page read and write
3110000
unkown
page read and write
7FF5ED92C000
unkown
page readonly
A4AB000
unkown
page read and write
9580000
unkown
page read and write
D5D0000
trusted library allocation
page read and write
3110000
unkown
page read and write
B8A0000
heap
page read and write
B7EC000
heap
page read and write
3440000
unkown
page read and write
9E98000
stack
page read and write
B7F4000
heap
page read and write
7FF5ED9F2000
unkown
page readonly
3738000
unkown
page read and write
BAF4000
heap
page read and write
3120000
unkown
page read and write
8317000
heap
page read and write
7FF5ED93E000
unkown
page readonly
84E0000
heap
page read and write
9580000
unkown
page read and write
A676000
heap
page read and write
B300000
unkown
page read and write
BAEE000
heap
page read and write
7F40000
unkown
page readonly
47F9000
heap
page read and write
A796000
heap
page read and write
3440000
unkown
page read and write
7847000
unkown
page read and write
9CE0000
unkown
page read and write
3180000
unkown
page read and write
BAF0000
heap
page read and write
2EBE000
stack
page read and write
7FF5ED449000
unkown
page readonly
B800000
heap
page read and write
B7D2000
heap
page read and write
8F01000
unkown
page read and write
A6D2000
heap
page read and write
B7EC000
heap
page read and write
A5F8000
heap
page read and write
7CE0000
unkown
page read and write
8470000
heap
page read and write
A74C000
heap
page read and write
A664000
heap
page read and write
97B5000
unkown
page read and write
4BDA000
heap
page read and write
C544000
unkown
page read and write
7FF5ED3CE000
unkown
page readonly
1451000
unkown
page readonly
9CE0000
unkown
page read and write
3110000
unkown
page read and write
2C90000
direct allocation
page execute and read and write
B7C6000
heap
page read and write
7DF47D511000
trusted library allocation
page execute read
B9D7000
heap
page read and write
7FF5ED942000
unkown
page readonly
A736000
heap
page read and write
BC36000
heap
page read and write
BDD0000
unkown
page readonly
B697000
heap
page read and write
4801000
heap
page read and write
3110000
unkown
page read and write
AE09000
heap
page read and write
C579000
stack
page read and write
B7E4000
heap
page read and write
13B0000
unkown
page read and write
7FF5ED476000
unkown
page readonly
56C3000
unkown
page read and write
A323000
unkown
page read and write
3440000
unkown
page read and write
BAEA000
heap
page read and write
B7EA000
heap
page read and write
5641000
unkown
page read and write
B7FA000
heap
page read and write
BAF8000
heap
page read and write
B6EE000
heap
page read and write
40A000
unkown
page execute read
B5F4000
heap
page read and write
A5F6000
heap
page read and write
9580000
unkown
page read and write
A628000
heap
page read and write
3150000
unkown
page read and write
9CE0000
unkown
page read and write
3150000
unkown
page read and write
B858000
heap
page read and write
95A0000
unkown
page read and write
BAF4000
heap
page read and write
4BB1000
heap
page read and write
33C0000
unkown
page read and write
B8B4000
heap
page read and write
9CE0000
unkown
page read and write
A676000
heap
page read and write
B809000
heap
page read and write
B7CC000
heap
page read and write
7DF4F3030000
unkown
page readonly
BAF2000
heap
page read and write
B300000
unkown
page read and write
95B0000
unkown
page read and write
3800000
unkown
page readonly
7FF5ED94A000
unkown
page readonly
B7FC000
heap
page read and write
B870000
heap
page read and write
32A0000
unkown
page read and write
83B3000
heap
page read and write
7FF5ED986000
unkown
page readonly
B8BB000
heap
page read and write
8317000
heap
page read and write
B87D000
heap
page read and write
979C000
unkown
page read and write
7FF5ED4F3000
unkown
page readonly
BBC1000
heap
page read and write
D28B000
heap
page read and write
AE13000
heap
page read and write
D433000
trusted library allocation
page read and write
1380000
unkown
page read and write
3160000
unkown
page read and write
84B3000
heap
page read and write
C77C000
stack
page read and write
8330000
heap
page read and write
A74C000
heap
page read and write
A62F000
heap
page read and write
B7DC000
heap
page read and write
7FF5ED7C4000
unkown
page readonly
7DA1000
unkown
page read and write
3130000
unkown
page read and write
48D9000
heap
page read and write
B846000
heap
page read and write
838F000
heap
page read and write
37B0000
unkown
page read and write
3120000
unkown
page read and write
C857000
unkown
page read and write
834A000
heap
page read and write
7FF5EDA2A000
unkown
page readonly
4A59000
heap
page read and write
838F000
heap
page read and write
B7F6000
heap
page read and write
9CD0000
heap
page read and write
BB69000
heap
page read and write
B7DA000
heap
page read and write
ADEA000
heap
page read and write
A743000
heap
page read and write
2B4A000
stack
page read and write
1380000
unkown
page read and write
B89A000
heap
page read and write
9580000
unkown
page read and write
820F000
heap
page read and write
A494000
unkown
page read and write
848B000
heap
page read and write
B69F000
heap
page read and write
9CE0000
unkown
page read and write
B6EE000
heap
page read and write
8336000
heap
page read and write
B6D6000
heap
page read and write
9580000
unkown
page read and write
BAEE000
heap
page read and write
B7D2000
heap
page read and write
3590000
unkown
page read and write
A743000
heap
page read and write
BAEE000
heap
page read and write
1360000
unkown
page read and write
2E47000
stack
page read and write
32A0000
unkown
page read and write
B9E6000
heap
page read and write
B95A000
heap
page read and write
9CE0000
unkown
page read and write
B8DF000
heap
page read and write
37AC000
unkown
page read and write
B8CE000
heap
page read and write
13A0000
unkown
page read and write
A74E000
heap
page read and write
4800000
heap
page read and write
BB34000
heap
page read and write
A799000
heap
page read and write
A79C000
heap
page read and write
B8C6000
heap
page read and write
797D000
unkown
page read and write
7DF47D571000
trusted library allocation
page execute read
9CE0000
unkown
page read and write
9CE0000
unkown
page read and write
3120000
unkown
page read and write
3440000
unkown
page read and write
91C0000
unkown
page read and write
9540000
unkown
page read and write
B9DB000
heap
page read and write
76A0000
unkown
page read and write
833E000
heap
page read and write
33C0000
unkown
page read and write
B6F1000
heap
page read and write
9CE0000
unkown
page read and write
1370000
unkown
page read and write
9ADB000
stack
page read and write
A675000
heap
page read and write
3110000
unkown
page read and write
9CE0000
unkown
page read and write
BAFC000
heap
page read and write
9CE0000
unkown
page read and write
B8A6000
heap
page read and write
BA36000
heap
page read and write
A6D2000
heap
page read and write
A74C000
heap
page read and write
A722000
heap
page read and write
9CE0000
unkown
page read and write
3290000
unkown
page read and write
9CE0000
unkown
page read and write
A796000
heap
page read and write
47A5000
heap
page read and write
1370000
unkown
page read and write
ADF6000
heap
page read and write
9869000
unkown
page read and write
B5F2000
heap
page read and write
8364000
heap
page read and write
3130000
unkown
page read and write
A799000
heap
page read and write
3440000
unkown
page read and write
91C0000
unkown
page read and write
91C0000
unkown
page read and write
A743000
heap
page read and write
9580000
unkown
page read and write
B8A0000
heap
page read and write
B7EA000
heap
page read and write
9CE0000
unkown
page read and write
BAFE000
heap
page read and write
95A0000
unkown
page read and write
A2F0000
heap
page read and write
AE09000
heap
page read and write
D5F0000
trusted library allocation
page read and write
D0F000
heap
page read and write
3440000
unkown
page read and write
B744000
heap
page read and write
BAF6000
heap
page read and write
9CE0000
unkown
page read and write
BAF6000
heap
page read and write
B850000
heap
page read and write
8352000
heap
page read and write
9660000
unkown
page read and write
A673000
heap
page read and write
8D6C000
stack
page read and write
93C0000
unkown
page read and write
8440000
heap
page read and write
D262000
heap
page read and write
379E000
unkown
page read and write
B5EF000
heap
page read and write
2CF8000
heap
page read and write
A796000
heap
page read and write
7DF47D5A1000
trusted library allocation
page execute read
1340000
stack
page read and write
10D0000
heap
page read and write
1380000
unkown
page read and write
A642000
heap
page read and write
95B0000
unkown
page read and write
B9C4000
heap
page read and write
47F2000
heap
page read and write
8F10000
unkown
page read and write
4BD6000
heap
page read and write
A722000
heap
page read and write
8352000
heap
page read and write
B9DB000
heap
page read and write
9CE0000
unkown
page read and write
7FF5ED9E1000
unkown
page readonly
8362000
heap
page read and write
BAE2000
heap
page read and write
3240000
unkown
page read and write
83F0000
heap
page read and write
A6D2000
heap
page read and write
3110000
unkown
page read and write
843E000
heap
page read and write
B9F3000
heap
page read and write
32A0000
unkown
page read and write
B7CA000
heap
page read and write
BAE2000
heap
page read and write
A64C000
heap
page read and write
AD68000
heap
page read and write
7FF5ED1BC000
unkown
page readonly
B9F0000
heap
page read and write
8479000
heap
page read and write
7FF5ED8E7000
unkown
page readonly
9CE0000
unkown
page read and write
36D3000
stack
page read and write
B711000
heap
page read and write
ADB4000
heap
page read and write
BB00000
heap
page read and write
5590000
unkown
page write copy
BB69000
heap
page read and write
13B0000
unkown
page read and write
32A0000
unkown
page read and write
3220000
unkown
page readonly
B7CE000
heap
page read and write
4A18000
heap
page read and write
B9F2000
heap
page read and write
9CE0000
unkown
page read and write
A676000
heap
page read and write
93BE000
stack
page read and write
896B000
stack
page read and write
C52C000
unkown
page read and write
7867000
unkown
page read and write
A741000
heap
page read and write
B802000
heap
page read and write
BA47000
heap
page read and write
95A0000
unkown
page read and write
8225000
heap
page read and write
B841000
heap
page read and write
9CE0000
unkown
page read and write
BA34000
heap
page read and write
3160000
unkown
page read and write
B7E6000
heap
page read and write
C503000
unkown
page read and write
B7D4000
heap
page read and write
AA90000
unkown
page read and write
834E000
heap
page read and write
BAF2000
heap
page read and write
9D64000
unkown
page read and write
7FF5ED286000
unkown
page readonly
D284000
heap
page read and write
91C0000
unkown
page read and write
B882000
heap
page read and write
817A000
heap
page read and write
3150000
unkown
page read and write
9580000
unkown
page read and write
2FA0000
trusted library allocation
page read and write
BAEA000
heap
page read and write
B8B0000
unkown
page read and write
AE0D000
heap
page read and write
9580000
unkown
page read and write
BBC1000
heap
page read and write
3150000
unkown
page read and write
B7E0000
heap
page read and write
BCE8000
heap
page read and write
7D62000
heap
page read and write
B695000
heap
page read and write
4704000
heap
page read and write
B74A000
heap
page read and write
4BDC000
heap
page read and write
C512000
unkown
page read and write
C2FB000
stack
page read and write
A654000
heap
page read and write
2FBF000
stack
page read and write
A722000
heap
page read and write
A5FA000
heap
page read and write
9CE0000
unkown
page read and write
8F10000
unkown
page read and write
95A0000
unkown
page read and write
7FF5ED85F000
unkown
page readonly
7FF5ED97E000
unkown
page readonly
2B23000
unkown
page readonly
B6F1000
heap
page read and write
7FF5ED695000
unkown
page readonly
B697000
heap
page read and write
3130000
unkown
page read and write
418000
unkown
page readonly
BAFA000
heap
page read and write
BAF8000
heap
page read and write
9CE0000
unkown
page read and write
9CE0000
unkown
page read and write
B858000
heap
page read and write
7FF5ED1CC000
unkown
page readonly
3110000
unkown
page read and write
47A0000
unclassified section
page read and write
B874000
heap
page read and write
35A0000
unkown
page readonly
B9D7000
heap
page read and write
B8DF000
heap
page read and write
B8A4000
heap
page read and write
4BA6000
unkown
page read and write
4AB9000
heap
page read and write
4C50000
unkown
page read and write
7FF5ED939000
unkown
page readonly
7DA0000
unkown
page read and write
A675000
heap
page read and write
B7C3000
heap
page read and write
BCF5000
heap
page read and write
37F2000
unkown
page read and write
BAFC000
heap
page read and write
7DF4F3061000
unkown
page execute read
B688000
heap
page read and write
B7C6000
heap
page read and write
7C90000
unkown
page read and write
83C2000
heap
page read and write
3440000
unkown
page read and write
4ABB000
heap
page read and write
8208000
stack
page read and write
8334000
heap
page read and write
B864000
heap
page read and write
84B6000
heap
page read and write
8364000
heap
page read and write
B705000
heap
page read and write
8278000
heap
page read and write
B7DC000
heap
page read and write
9CE0000
unkown
page read and write
BA4F000
heap
page read and write
C20000
heap
page read and write
4B65000
heap
page read and write
A63B000
heap
page read and write
BA38000
heap
page read and write
7DF4F3041000
unkown
page execute read
A2A0000
trusted library allocation
page read and write
BA1F000
heap
page read and write
B850000
heap
page read and write
CBFC000
stack
page read and write
842A000
heap
page read and write
9CE0000
unkown
page read and write
B3DE000
stack
page read and write
3580000
unkown
page readonly
B7DC000
heap
page read and write
95A0000
unkown
page read and write
B7EE000
heap
page read and write
1380000
unkown
page read and write
B7D8000
heap
page read and write
A74E000
heap
page read and write
3110000
unkown
page read and write
8414000
heap
page read and write
B877000
heap
page read and write
A4AE000
unkown
page read and write
1390000
unkown
page read and write
95A0000
unkown
page read and write
4CB0000
unkown
page read and write
3130000
unkown
page read and write
B872000
heap
page read and write
B8A6000
heap
page read and write
A74C000
heap
page read and write
9CE0000
unkown
page read and write
7FF5ED65C000
unkown
page readonly
B8D5000
heap
page read and write
7CA0000
unkown
page read and write
B8AE000
heap
page read and write
B7C6000
heap
page read and write
A19F000
stack
page read and write
7FF5ED3DA000
unkown
page readonly
8EC6000
unkown
page read and write
3110000
unkown
page read and write
BA5B000
heap
page read and write
A640000
heap
page read and write
B9E6000
heap
page read and write
CB38000
unkown
page read and write
A796000
heap
page read and write
8342000
heap
page read and write
91C0000
unkown
page read and write
BAFC000
heap
page read and write
C4D0000
unkown
page read and write
B7C6000
heap
page read and write
9580000
unkown
page read and write
3440000
unkown
page read and write
7FF5ED7FD000
unkown
page readonly
9580000
unkown
page read and write
B9EA000
heap
page read and write
48F3000
heap
page read and write
CA63000
unkown
page read and write
B847000
heap
page read and write
4807000
heap
page read and write
A50B000
unkown
page read and write
8468000
heap
page read and write
95A0000
unkown
page read and write
FE00000
unkown
page read and write
95B0000
unkown
page read and write
A796000
heap
page read and write
2C6C000
heap
page read and write
7FFE000
stack
page read and write
ADB8000
heap
page read and write
83C2000
heap
page read and write
95A0000
unkown
page read and write
4A70000
heap
page read and write
88EE000
stack
page read and write
B8A4000
heap
page read and write
3110000
unkown
page read and write
B150000
unkown
page read and write
834E000
heap
page read and write
BA72000
heap
page read and write
1380000
unkown
page read and write
95A0000
unkown
page read and write
9CE0000
unkown
page read and write
1370000
unkown
page read and write
9540000
unkown
page read and write
3150000
unkown
page read and write
A640000
heap
page read and write
BBC6000
heap
page read and write
2C6B000
heap
page read and write
8F10000
unkown
page read and write
D210000
trusted library allocation
page read and write
81BC000
heap
page read and write
400000
unkown
page execute and read and write
9580000
unkown
page read and write
B84A000
heap
page read and write
BAF6000
heap
page read and write
4A7C000
heap
page read and write
B9DE000
heap
page read and write
91C0000
unkown
page read and write
9580000
unkown
page read and write
95A0000
unkown
page read and write
8210000
unkown
page read and write
BB00000
heap
page read and write
B890000
heap
page read and write
BB00000
heap
page read and write
7FF5ED735000
unkown
page readonly
8146000
heap
page read and write
401000
unkown
page execute read
7DF47D510000
trusted library allocation
page readonly
9540000
unkown
page read and write
ADC4000
heap
page read and write
BAF0000
heap
page read and write
ADA1000
heap
page read and write
B7EC000
heap
page read and write
C6CF000
unkown
page read and write
BA6B000
heap
page read and write
1C0000
heap
page read and write
9CE0000
unkown
page read and write
9CE0000
unkown
page read and write
B95A000
heap
page read and write
4842000
heap
page read and write
B88A000
heap
page read and write
40B000
unkown
page execute read
3791000
unkown
page read and write
A379000
unkown
page read and write
B7E0000
heap
page read and write
C54A000
unkown
page read and write
7DF47D561000
trusted library allocation
page execute read
8121000
heap
page read and write
4810000
heap
page read and write
81F1000
heap
page read and write
B8C6000
heap
page read and write
9A0000
heap
page read and write
A74C000
heap
page read and write
4810000
heap
page read and write
B855000
heap
page read and write
AE10000
heap
page read and write
48F6000
heap
page read and write
923E000
stack
page read and write
9580000
unkown
page read and write
3440000
unkown
page read and write
B87B000
heap
page read and write
C89A000
unkown
page read and write
C37B000
stack
page read and write
BA3F000
heap
page read and write
9590000
unkown
page read and write
D26A000
heap
page read and write
95B0000
unkown
page read and write
400000
unkown
page readonly
4AB1000
heap
page read and write
BAF8000
heap
page read and write
9580000
unkown
page read and write
BA05000
heap
page read and write
A5E9000
heap
page read and write
A675000
heap
page read and write
834A000
heap
page read and write
A736000
heap
page read and write
7FF5ED7E0000
unkown
page readonly
A722000
heap
page read and write
BAF8000
heap
page read and write
BAF2000
heap
page read and write
C6C1000
unkown
page read and write
95A0000
unkown
page read and write
B9DE000
heap
page read and write
3130000
unkown
page read and write
785F000
unkown
page read and write
95B0000
unkown
page read and write
A72D000
heap
page read and write
79FB000
unkown
page read and write
B690000
heap
page read and write
9580000
unkown
page read and write
B95A000
heap
page read and write
482E000
heap
page read and write
3440000
unkown
page read and write
889F000
stack
page read and write
3150000
unkown
page read and write
9CE0000
unkown
page read and write
80F1000
heap
page read and write
7FF5ED8F9000
unkown
page readonly
32A0000
unkown
page read and write
8428000
heap
page read and write
36F0000
unkown
page readonly
8342000
heap
page read and write
B5A0000
heap
page read and write
C49E000
stack
page read and write
B6EE000
heap
page read and write
1370000
unkown
page read and write
81ED000
heap
page read and write
A72D000
heap
page read and write
7FF5ED885000
unkown
page readonly
3150000
unkown
page read and write
1380000
unkown
page read and write
9883000
unkown
page read and write
1360000
unkown
page read and write
3110000
unkown
page read and write
BB69000
heap
page read and write
91C0000
unkown
page read and write
C6BF000
unkown
page read and write
A669000
heap
page read and write
B872000
heap
page read and write
9CE0000
unkown
page read and write
B65A000
heap
page read and write
A74E000
heap
page read and write
95A0000
unkown
page read and write
BA27000
heap
page read and write
7FF5ED5F7000
unkown
page readonly
32A0000
unkown
page read and write
7FF5ED4DF000
unkown
page readonly
BAFE000
heap
page read and write
CCF8000
stack
page read and write
880F000
unkown
page read and write
B8D5000
heap
page read and write
3055000
stack
page read and write
B9DE000
heap
page read and write
9893000
unkown
page read and write
A4A1000
unkown
page read and write
7FF5ED40D000
unkown
page readonly
B7DE000
heap
page read and write
13A0000
unkown
page read and write
A796000
heap
page read and write
BCE8000
heap
page read and write
9CE0000
unkown
page read and write
B7C3000
heap
page read and write
3440000
unkown
page read and write
EEA000
stack
page read and write
32A0000
unkown
page read and write
B4C0000
trusted library allocation
page read and write
B10D000
stack
page read and write
8330000
heap
page read and write
41B000
unkown
page read and write
9CE0000
unkown
page read and write
7DF47D590000
trusted library allocation
page readonly
AD20000
heap
page read and write
8334000
heap
page read and write
7FF5ED3EA000
unkown
page readonly
9CE0000
unkown
page read and write
B6F1000
heap
page read and write
8381000
heap
page read and write
BA34000
heap
page read and write
7F30000
unkown
page read and write
48A9000
heap
page read and write
BA6B000
heap
page read and write
B699000
heap
page read and write
3110000
unkown
page read and write
B7B9000
heap
page read and write
91C0000
unkown
page read and write
A72D000
heap
page read and write
A6D2000
heap
page read and write
7D00000
unkown
page readonly
B7E2000
heap
page read and write
1370000
unkown
page read and write
8108000
stack
page read and write
B8B4000
heap
page read and write
B745000
heap
page read and write
BCF1000
heap
page read and write
7E72000
stack
page read and write
9873000
unkown
page read and write
B8C6000
heap
page read and write
B689000
heap
page read and write
3440000
unkown
page read and write
3110000
unkown
page read and write
9792000
unkown
page read and write
B9D7000
heap
page read and write
BA1F000
heap
page read and write
BA71000
heap
page read and write
7FF5ED9D9000
unkown
page readonly
D14000
heap
page read and write
1360000
unkown
page read and write
9580000
unkown
page read and write
84BF000
heap
page read and write
7DF47D591000
trusted library allocation
page execute read
4A96000
heap
page read and write
B688000
heap
page read and write
13B0000
unkown
page read and write
1360000
unkown
page read and write
A722000
heap
page read and write
3440000
unkown
page read and write
33C0000
unkown
page read and write
A74E000
heap
page read and write
1390000
unkown
page read and write
1390000
unkown
page read and write
BAF0000
heap
page read and write
BC9B000
stack
page read and write
C516000
unkown
page read and write
D213000
trusted library allocation
page read and write
7FF5ED33F000
unkown
page readonly
7FF5ED41C000
unkown
page readonly
95A0000
unkown
page read and write
8334000
heap
page read and write
B870000
heap
page read and write
AE10000
heap
page read and write
BAEE000
heap
page read and write
B7D4000
heap
page read and write
8342000
heap
page read and write
4A79000
heap
page read and write
AF0C000
stack
page read and write
B870000
heap
page read and write
3440000
unkown
page read and write
977A000
unkown
page read and write
A743000
heap
page read and write
B7D6000
heap
page read and write
B858000
heap
page read and write
8401000
heap
page read and write
B8BB000
heap
page read and write
7DF47D550000
trusted library allocation
page readonly
B7DA000
heap
page read and write
8354000
heap
page read and write
B9DB000
heap
page read and write
8F10000
unkown
page read and write
7FF5ED3D0000
unkown
page readonly
B7E8000
heap
page read and write
4AE0000
heap
page read and write
3110000
unkown
page read and write
3150000
unkown
page read and write
7FC8000
stack
page read and write
3440000
unkown
page read and write
8354000
heap
page read and write
ADD7000
heap
page read and write
A4B8000
unkown
page read and write
9CE0000
unkown
page read and write
A741000
heap
page read and write
BB06000
heap
page read and write
32A0000
unkown
page read and write
B741000
heap
page read and write
A391000
unkown
page read and write
CBB8000
unkown
page read and write
3110000
unkown
page read and write
7FF5ED2A9000
unkown
page readonly
3110000
unkown
page read and write
2F58000
stack
page read and write
B7E6000
heap
page read and write
B87E000
heap
page read and write
A74C000
heap
page read and write
A280000
trusted library allocation
page read and write
7FF5ED433000
unkown
page readonly
C4FD000
stack
page read and write
7FF5ED800000
unkown
page readonly
3150000
unkown
page read and write
B880000
heap
page read and write
8360000
heap
page read and write
B845000
heap
page read and write
37A0000
unkown
page read and write
4790000
heap
page read and write
91C0000
stack
page read and write
7FF5ED77C000
unkown
page readonly
955000
stack
page read and write
B72F000
heap
page read and write
B741000
heap
page read and write
BAF2000
heap
page read and write
3150000
unkown
page read and write
A743000
heap
page read and write
A722000
heap
page read and write
AD6A000
heap
page read and write
4C4B000
unkown
page read and write
D5F3000
trusted library allocation
page read and write
836E000
heap
page read and write
4851000
heap
page read and write
B7CA000
heap
page read and write
BAEA000
heap
page read and write
7FF5ED7DB000
unkown
page readonly
BB99000
heap
page read and write
FDA0000
unkown
page read and write
B7C6000
heap
page read and write
C6F4000
unkown
page read and write
91F0000
unkown
page read and write
3160000
unkown
page read and write
BAEE000
heap
page read and write
C89C000
unkown
page read and write
D69F000
stack
page read and write
B80D000
heap
page read and write
B72F000
heap
page read and write
7FF5ED295000
unkown
page readonly
B87B000
heap
page read and write
9580000
unkown
page read and write
7FF5ED4C6000
unkown
page readonly
1370000
unkown
page read and write
9CE0000
unkown
page read and write
7FF5ED9FF000
unkown
page readonly
A280000
trusted library allocation
page read and write
7FF5ED59E000
unkown
page readonly
7DA0000
unkown
page read and write
8710000
unkown
page readonly
9CE0000
unkown
page read and write
A799000
heap
page read and write
B7E2000
heap
page read and write
BB00000
heap
page read and write
9580000
unkown
page read and write
AE09000
heap
page read and write
8428000
heap
page read and write
1210000
unkown
page readonly
A741000
heap
page read and write
13B0000
unkown
page read and write
B7F0000
heap
page read and write
8140000
heap
page read and write
3110000
unkown
page read and write
B69D000
heap
page read and write
13B0000
unkown
page read and write
BA71000
heap
page read and write
9CE0000
unkown
page read and write
B8CE000
heap
page read and write
7FF5ED4EF000
unkown
page readonly
AD74000
heap
page read and write
845C000
heap
page read and write
9CE0000
unkown
page read and write
BB00000
heap
page read and write
89C0000
unkown
page read and write
30D9000
stack
page read and write
37BD000
unkown
page read and write
7FF5ED76D000
unkown
page readonly
95A0000
unkown
page read and write
BAFA000
heap
page read and write
B8B3000
heap
page read and write
ADA1000
heap
page read and write
3150000
unkown
page read and write
A5EC000
heap
page read and write
BBA1000
heap
page read and write
3120000
unkown
page read and write
13A0000
unkown
page read and write
8350000
heap
page read and write
9CE0000
unkown
page read and write
B7C6000
heap
page read and write
B872000
heap
page read and write
33C0000
unkown
page read and write
BA71000
heap
page read and write
A62F000
heap
page read and write
3440000
unkown
page read and write
B7F6000
heap
page read and write
91C0000
unkown
page read and write
7FF5ED6B9000
unkown
page readonly
4818000
heap
page read and write
95A0000
unkown
page read and write
BAF4000
heap
page read and write
9CE0000
unkown
page read and write
A669000
heap
page read and write
BAE4000
heap
page read and write
7FF5ED961000
unkown
page readonly
8350000
heap
page read and write
BAFA000
heap
page read and write
A736000
heap
page read and write
3150000
unkown
page read and write
1E0000
heap
page read and write
981B000
stack
page read and write
B9F2000
heap
page read and write
7884000
unkown
page read and write
A72D000
heap
page read and write
A799000
heap
page read and write
B697000
heap
page read and write
13B0000
unkown
page read and write
8350000
heap
page read and write
BAF4000
heap
page read and write
B7D2000
heap
page read and write
B7DA000
heap
page read and write
7FF5ED781000
unkown
page readonly
3110000
unkown
page read and write
ADD8000
heap
page read and write
4BCA000
heap
page read and write
9C000
stack
page read and write
848B000
heap
page read and write
B7D2000
heap
page read and write
343C000
stack
page read and write
834E000
heap
page read and write
838F000
heap
page read and write
1340000
unkown
page read and write
B9C4000
heap
page read and write
B7CA000
heap
page read and write
A74C000
heap
page read and write
B7E6000
heap
page read and write
AD77000
heap
page read and write
A280000
trusted library allocation
page read and write
83D5000
heap
page read and write
9CE0000
unkown
page read and write
C9CD000
unkown
page read and write
32A0000
unkown
page read and write
1380000
unkown
page read and write
C28000
heap
page read and write
AD5F000
heap
page read and write
BAF4000
heap
page read and write
C10A000
stack
page read and write
3110000
unkown
page read and write
B7EE000
heap
page read and write
A675000
heap
page read and write
B8D5000
heap
page read and write
899E000
stack
page read and write
3440000
unkown
page read and write
81F1000
heap
page read and write
ADF6000
heap
page read and write
7FF5ED404000
unkown
page readonly
480D000
heap
page read and write
B95A000
heap
page read and write
A6D2000
heap
page read and write
4851000
heap
page read and write
BA71000
heap
page read and write
A736000
heap
page read and write
BAE2000
heap
page read and write
BA41000
heap
page read and write
D610000
trusted library allocation
page read and write
33C0000
unkown
page read and write
8211000
heap
page read and write
3756000
unkown
page read and write
A72D000
heap
page read and write
B612000
heap
page read and write
81EA000
heap
page read and write
3440000
unkown
page read and write
9CE0000
unkown
page read and write
9CE0000
unkown
page read and write
3150000
unkown
page read and write
BAF2000
heap
page read and write
B7F4000
heap
page read and write
A743000
heap
page read and write
8730000
unkown
page read and write
9590000
unkown
page read and write
B89A000
heap
page read and write
95A0000
unkown
page read and write
7DF47D591000
trusted library allocation
page execute read
AE10000
heap
page read and write
7FF5ED818000
unkown
page readonly
1380000
unkown
page read and write
A62F000
heap
page read and write
A74C000
heap
page read and write
BAFE000
heap
page read and write
8381000
heap
page read and write
B7FC000
heap
page read and write
3440000
unkown
page read and write
7FF5ED844000
unkown
page readonly
7A80000
heap
page read and write
9580000
unkown
page read and write
8364000
heap
page read and write
A310000
unkown
page read and write
7FF5ED750000
unkown
page readonly
8440000
heap
page read and write
A11F000
stack
page read and write
7FF5ED810000
unkown
page readonly
89E0000
unkown
page read and write
8F10000
unkown
page read and write
BA1F000
heap
page read and write
834A000
heap
page read and write
8352000
heap
page read and write
13B0000
unkown
page read and write
B841000
heap
page read and write
CA20000
unkown
page read and write
B7E6000
heap
page read and write
93C0000
unkown
page read and write
D4BD000
stack
page read and write
8342000
heap
page read and write
487E000
heap
page read and write
BA19000
heap
page read and write
BA6B000
heap
page read and write
A6D2000
heap
page read and write
4A53000
heap
page read and write
834A000
heap
page read and write
95A0000
unkown
page read and write
9200000
unkown
page read and write
B98F000
heap
page read and write
91C0000
unkown
page read and write
33C0000
unkown
page read and write
3440000
unkown
page read and write
37D2000
unkown
page read and write
B9C4000
heap
page read and write
B7DA000
heap
page read and write
7FF5ED9A6000
unkown
page readonly
B690000
heap
page read and write
32A0000
unkown
page read and write
4879000
heap
page read and write
7FF5ED975000
unkown
page readonly
BA71000
heap
page read and write
2D4F000
stack
page read and write
A741000
heap
page read and write
A796000
heap
page read and write
B7CE000
heap
page read and write
A796000
heap
page read and write
469E000
stack
page read and write
9CE0000
unkown
page read and write
B85C000
heap
page read and write
B9EA000
heap
page read and write
B8D5000
heap
page read and write
3440000
unkown
page read and write
3150000
unkown
page read and write
B697000
heap
page read and write
7FF5ED8C6000
unkown
page readonly
8425000
heap
page read and write
BAF6000
heap
page read and write
B8DF000
heap
page read and write
BB06000
heap
page read and write
3110000
unkown
page read and write
9CE0000
unkown
page read and write
BA34000
heap
page read and write
19D000
stack
page read and write
3150000
unkown
page read and write
8F10000
unkown
page read and write
833E000
heap
page read and write
3150000
unkown
page read and write
9580000
unkown
page read and write
1360000
unkown
page read and write
1370000
unkown
page read and write
987D000
unkown
page read and write
906E000
stack
page read and write
2B23000
unkown
page readonly
BAF8000
heap
page read and write
95B0000
unkown
page read and write
B870000
heap
page read and write
BA27000
heap
page read and write
A736000
heap
page read and write
1380000
unkown
page read and write
91C0000
unkown
page read and write
13B0000
unkown
page read and write
788E000
stack
page read and write
47F9000
heap
page read and write
10C0000
unkown
page readonly
9580000
unkown
page read and write
B6C2000
heap
page read and write
91C0000
unkown
page read and write
A736000
heap
page read and write
B8D5000
heap
page read and write
BAFA000
heap
page read and write
B705000
heap
page read and write
BAF6000
heap
page read and write
B890000
heap
page read and write
BA6B000
heap
page read and write
B6CB000
heap
page read and write
ADD0000
heap
page read and write
3130000
unkown
page read and write
7FF5ED86B000
unkown
page readonly
C67D000
stack
page read and write
A741000
heap
page read and write
7FF5ED670000
unkown
page readonly
B7D8000
heap
page read and write
9580000
unkown
page read and write
32A0000
unkown
page read and write
33C0000
unkown
page read and write
9977000
unkown
page read and write
7FF5ED8C1000
unkown
page readonly
B673000
heap
page read and write
48C8000
heap
page read and write
7FF5ED867000
unkown
page readonly
84B6000
heap
page read and write
4C18000
unkown
page read and write
83F0000
heap
page read and write
A669000
heap
page read and write
B9D7000
heap
page read and write
3110000
unkown
page read and write
83C2000
heap
page read and write
FBC4000
unkown
page read and write
A796000
heap
page read and write
B7CE000
heap
page read and write
BCE8000
heap
page read and write
A652000
heap
page read and write
487F000
heap
page read and write
B7C8000
heap
page read and write
7DA0000
unkown
page read and write
B6D6000
heap
page read and write
B22B000
stack
page read and write
A6D2000
heap
page read and write
A74E000
heap
page read and write
3440000
unkown
page read and write
9CE0000
unkown
page read and write
B71C000
heap
page read and write
84B6000
heap
page read and write
B8E9000
heap
page read and write
8F10000
unkown
page read and write
1380000
unkown
page read and write
B6C2000
heap
page read and write
A796000
heap
page read and write
7FF5ED68B000
unkown
page readonly
A74E000
heap
page read and write
B9F0000
heap
page read and write
A2A3000
trusted library allocation
page read and write
8100000
heap
page read and write
3110000
unkown
page read and write
47F4000
heap
page read and write
A675000
heap
page read and write
9CE0000
unkown
page read and write
B885000
heap
page read and write
7FF5ED77E000
unkown
page readonly
9815000
unkown
page read and write
3160000
unkown
page read and write
978E000
unkown
page read and write
A5B8000
heap
page read and write
5557000
stack
page read and write
8350000
heap
page read and write
843E000
heap
page read and write
482E000
heap
page read and write
9CE0000
unkown
page read and write
84B4000
heap
page read and write
A736000
heap
page read and write
1370000
unkown
page read and write
B7D4000
heap
page read and write
3150000
unkown
page read and write
C8E1000
unkown
page read and write
9CE0000
unkown
page read and write
1370000
unkown
page read and write
B9F2000
heap
page read and write
BA1F000
heap
page read and write
ADD8000
heap
page read and write
833E000
heap
page read and write
93C0000
unkown
page read and write
4809000
heap
page read and write
B8EA000
heap
page read and write
3440000
unkown
page read and write
4801000
heap
page read and write
84E1000
heap
page read and write
80F0000
heap
page read and write
95A0000
unkown
page read and write
BAF0000
heap
page read and write
A5EE000
heap
page read and write
48B9000
heap
page read and write
B98F000
heap
page read and write
3120000
unkown
page read and write
B890000
heap
page read and write
7FF5ED9B8000
unkown
page readonly
B9F2000
heap
page read and write
3110000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
C700000
unkown
page read and write
7FF5ED821000
unkown
page readonly
7FF5ED1D0000
unkown
page readonly
47A5000
heap
page read and write
7FF5ED933000
unkown
page readonly
3440000
unkown
page read and write
9580000
unkown
page read and write
91C0000
unkown
page read and write
3160000
unkown
page read and write
9580000
unkown
page read and write
B8A6000
heap
page read and write
7FF5ED93B000
unkown
page readonly
BAFA000
heap
page read and write
A5E9000
heap
page read and write
7FF5ED97A000
unkown
page readonly
3440000
unkown
page read and write
8F10000
unkown
page read and write
3150000
unkown
page read and write
B7D6000
heap
page read and write
B6CD000
heap
page read and write
B88A000
heap
page read and write
AD6A000
heap
page read and write
33C0000
unkown
page read and write
3160000
unkown
page read and write
8354000
heap
page read and write
A799000
heap
page read and write
A5F8000
heap
page read and write
D600000
trusted library allocation
page read and write
3150000
unkown
page read and write
B7F4000
heap
page read and write
13B0000
unkown
page read and write
3130000
unkown
page read and write
3110000
unkown
page read and write
B3E0000
unkown
page readonly
49C0000
heap
page read and write
81EA000
heap
page read and write
BC36000
heap
page read and write
7869000
unkown
page read and write
A580000
heap
page readonly
B660000
heap
page read and write
3440000
unkown
page read and write
9CE0000
unkown
page read and write
3130000
unkown
page read and write
2DC7000
stack
page read and write
9580000
unkown
page read and write
B65D000
heap
page read and write
3795000
unkown
page read and write
83F0000
heap
page read and write
9CE0000
unkown
page read and write
B8DF000
heap
page read and write
A72D000
heap
page read and write
BA6B000
heap
page read and write
BC37000
heap
page read and write
3440000
unkown
page read and write
2B23000
unkown
page readonly
9CE0000
unkown
page read and write
AB4D000
unkown
page read and write
9CE0000
unkown
page read and write
84E6000
heap
page read and write
3150000
unkown
page read and write
8330000
heap
page read and write
7FF5ED980000
unkown
page readonly
81ED000
heap
page read and write
C0D8000
stack
page read and write
BB06000
heap
page read and write
B7C8000
heap
page read and write
BA34000
heap
page read and write
BA1F000
heap
page read and write
A722000
heap
page read and write
A560000
trusted library allocation
page read and write
A29E000
stack
page read and write
9E6C000
stack
page read and write
A64C000
heap
page read and write
B7F6000
heap
page read and write
3150000
unkown
page read and write
BA1F000
heap
page read and write
3440000
unkown
page read and write
BB95000
heap
page read and write
486F000
heap
page read and write
3110000
unkown
page read and write
40B000
unkown
page execute read
BB99000
heap
page read and write
A21E000
stack
page read and write
FB8B000
unkown
page read and write
9580000
unkown
page read and write
9590000
unkown
page read and write
7FF5EDA11000
unkown
page readonly
1360000
unkown
page read and write
7A34000
unkown
page read and write
7FF5ED337000
unkown
page readonly
1370000
unkown
page read and write
B4D0000
unkown
page read and write
A736000
heap
page read and write
8F10000
unkown
page read and write
A676000
heap
page read and write
33C0000
unkown
page read and write
9F1E000
stack
page read and write
7FF5ED586000
unkown
page readonly
B7CE000
heap
page read and write
A74E000
heap
page read and write
4CC0000
unkown
page read and write
B872000
heap
page read and write
A648000
heap
page read and write
95DC000
stack
page read and write
33C0000
unkown
page read and write
A593000
trusted library allocation
page read and write
7FF5ED6A5000
unkown
page readonly
95B0000
unkown
page read and write
A722000
heap
page read and write
A642000
heap
page read and write
BAF4000
heap
page read and write
9580000
unkown
page read and write
BE39000
stack
page read and write
BAEE000
heap
page read and write
472C000
heap
page read and write
B8DF000
heap
page read and write
3110000
unkown
page read and write
7FF5EDA38000
unkown
page readonly
7FF5ED9D2000
unkown
page readonly
3440000
unkown
page read and write
A5DE000
heap
page read and write
7FF5ED265000
unkown
page readonly
3130000
unkown
page read and write
9580000
unkown
page read and write
7FF5ED43A000
unkown
page readonly
8440000
heap
page read and write
845D000
heap
page read and write
B6BE000
heap
page read and write
BA2D000
heap
page read and write
ADF6000
heap
page read and write
ADBB000
heap
page read and write
B69D000
heap
page read and write
A74E000
heap
page read and write
84DE000
heap
page read and write
4AAF000
heap
page read and write
2C5D000
heap
page execute and read and write
13A0000
unkown
page read and write
B842000
heap
page read and write
3110000
unkown
page read and write
9580000
unkown
page read and write
843E000
heap
page read and write
9CE0000
unkown
page read and write
A5CD000
heap
page read and write
A743000
heap
page read and write
834E000
heap
page read and write
95A0000
unkown
page read and write
B84E000
heap
page read and write
C561000
unkown
page read and write
A736000
heap
page read and write
D430000
trusted library allocation
page read and write
BB2A000
heap
page read and write
2CC0000
heap
page read and write
3150000
unkown
page read and write
833E000
heap
page read and write
B7FE000
heap
page read and write
3150000
unkown
page read and write
1380000
unkown
page read and write
A5EC000
heap
page read and write
9795000
unkown
page read and write
ADEA000
heap
page read and write
8F6A000
stack
page read and write
835C000
heap
page read and write
3160000
unkown
page read and write
9CE0000
unkown
page read and write
8BF0000
unkown
page readonly
7FF5ED81B000
unkown
page readonly
ADF6000
heap
page read and write
2C4A000
heap
page read and write
33C0000
unkown
page read and write
3150000
unkown
page read and write
BAF9000
stack
page read and write
8364000
heap
page read and write
2C30000
heap
page read and write
7D70000
unkown
page readonly
1380000
unkown
page read and write
A799000
heap
page read and write
FB3000
heap
page read and write
A74E000
heap
page read and write
7FF5EDA47000
unkown
page readonly
34E9000
stack
page read and write
3440000
unkown
page read and write
FCC4000
unkown
page read and write
7FF5ED68F000
unkown
page readonly
849B000
heap
page read and write
7865000
unkown
page read and write
BAEA000
heap
page read and write
2CC9000
stack
page read and write
7FF5ED660000
unkown
page readonly
9D0000
heap
page read and write
9540000
unkown
page read and write
4BD8000
heap
page read and write
A741000
heap
page read and write
9CE0000
unkown
page read and write
A736000
heap
page read and write
B800000
heap
page read and write
7FF5ED674000
unkown
page readonly
B7CC000
heap
page read and write
7FF5ED71B000
unkown
page readonly
BAFE000
heap
page read and write
3150000
unkown
page read and write
3110000
unkown
page read and write
8330000
heap
page read and write
3150000
unkown
page read and write
B89A000
heap
page read and write
9CE0000
unkown
page read and write
CA7C000
stack
page read and write
32A0000
unkown
page read and write
B9D5000
heap
page read and write
8127000
heap
page read and write
FDDD000
unkown
page read and write
3440000
unkown
page read and write
7FF5ED5C9000
unkown
page readonly
1360000
unkown
page read and write
1390000
unkown
page read and write
3110000
unkown
page read and write
FC46000
unkown
page read and write
B724000
heap
page read and write
A6D2000
heap
page read and write
D283000
heap
page read and write
9580000
unkown
page read and write
8125000
heap
page read and write
9590000
unkown
page read and write
8F10000
unkown
page read and write
BAFA000
heap
page read and write
9CE0000
unkown
page read and write
BA05000
heap
page read and write
BAF2000
heap
page read and write
D270000
heap
page read and write
7DF4F3050000
unkown
page readonly
A741000
heap
page read and write
7F2E000
stack
page read and write
1360000
unkown
page read and write
7FF5ED847000
unkown
page readonly
8000000
unkown
page read and write
9CE0000
unkown
page read and write
B140000
unkown
page readonly
AD6F000
heap
page read and write
BBB5000
heap
page read and write
AE0D000
heap
page read and write
1380000
unkown
page read and write
9CE0000
unkown
page read and write
A743000
heap
page read and write
4B8C000
heap
page read and write
93C0000
unkown
page read and write
B800000
heap
page read and write
B7EA000
heap
page read and write
B7D8000
heap
page read and write
3150000
unkown
page read and write
9CE0000
unkown
page read and write
4B50000
heap
page read and write
4C34000
unkown
page read and write
1380000
unkown
page read and write
A5E7000
heap
page read and write
986F000
unkown
page read and write
3130000
unkown
page read and write
3150000
unkown
page read and write
7FF5ED5A8000
unkown
page readonly
84B4000
heap
page read and write
2C4E000
heap
page read and write
B66C000
heap
page read and write
48F3000
heap
page read and write
C6F2000
unkown
page read and write
BA4F000
heap
page read and write
13BB000
stack
page read and write
A741000
heap
page read and write
ADF6000
heap
page read and write
A625000
heap
page read and write
9B5B000
stack
page read and write
B675000
heap
page read and write
3440000
unkown
page read and write
8F10000
unkown
page read and write
4BE1000
unkown
page read and write
3110000
unkown
page read and write
3440000
unkown
page read and write
B72F000
heap
page read and write
8354000
heap
page read and write
4A71000
heap
page read and write
B850000
heap
page read and write
13B0000
unkown
page read and write
BBA1000
heap
page read and write
BDC0000
unkown
page readonly
BA1F000
heap
page read and write
A570000
trusted library allocation
page read and write
1370000
unkown
page read and write
A743000
heap
page read and write
A603000
heap
page read and write
AE0D000
heap
page read and write
48CD000
heap
page read and write
B8AE000
heap
page read and write
BB06000
heap
page read and write
B809000
heap
page read and write
823B000
heap
page read and write
A628000
heap
page read and write
C50A000
unkown
page read and write
41B000
unkown
page read and write
BAF4000
heap
page read and write
891F000
stack
page read and write
3120000
unkown
page read and write
7FF5ED806000
unkown
page readonly
D5D0000
trusted library allocation
page read and write
A4FC000
unkown
page read and write
8489000
heap
page read and write
7DF4F3051000
unkown
page execute read
A74E000
heap
page read and write
B72A000
heap
page read and write
BAF0000
heap
page read and write
1370000
unkown
page read and write
B8CE000
heap
page read and write
A669000
heap
page read and write
A640000
heap
page read and write
B885000
heap
page read and write
A743000
heap
page read and write
B9DB000
heap
page read and write
A280000
trusted library allocation
page read and write
B7E8000
heap
page read and write
2EBF000
stack
page read and write
B6EE000
heap
page read and write
A37D000
unkown
page read and write
7DA0000
unkown
page read and write
7CC0000
unkown
page readonly
1380000
unkown
page read and write
BA36000
heap
page read and write
9580000
unkown
page read and write
B7CC000
heap
page read and write
3130000
unkown
page read and write
3440000
unkown
page read and write
3110000
unkown
page read and write
A5F8000
heap
page read and write
B8A6000
heap
page read and write
FC4B000
unkown
page read and write
9340000
unkown
page read and write
B8E9000
heap
page read and write
1380000
unkown
page read and write
9CE0000
unkown
page read and write
95A0000
unkown
page read and write
4702000
heap
page read and write
7FF5ED7CF000
unkown
page readonly
47F2000
heap
page read and write
7D20000
unkown
page readonly
7861000
unkown
page read and write
8368000
heap
page read and write
8317000
heap
page read and write
BDA0000
trusted library allocation
page read and write
3210000
unkown
page read and write
7FF5ED850000
unkown
page readonly
8336000
heap
page read and write
3110000
unkown
page read and write
B7CE000
heap
page read and write
3130000
unkown
page read and write
B84B000
heap
page read and write
B705000
heap
page read and write
BA4F000
heap
page read and write
BB85000
heap
page read and write
FE5000
heap
page read and write
9CE0000
unkown
page read and write
9CE0000
unkown
page read and write
7863000
unkown
page read and write
BB06000
heap
page read and write
9920000
remote allocation
page read and write
B7D2000
heap
page read and write
B9DB000
heap
page read and write
3440000
unkown
page read and write
47F6000
heap
page read and write
A2A3000
trusted library allocation
page read and write
4AC1000
heap
page read and write
B841000
heap
page read and write
3440000
unkown
page read and write
97A9000
unkown
page read and write
7FF5ED55F000
unkown
page readonly
AE14000
heap
page read and write
8187000
heap
page read and write
B7D2000
heap
page read and write
BA6B000
heap
page read and write
7FF5ED1D9000
unkown
page readonly
9CE0000
unkown
page read and write
7E70000
unkown
page read and write
8114000
heap
page read and write
BD98000
stack
page read and write
9200000
unkown
page read and write
B841000
heap
page read and write
AF8D000
stack
page read and write
B95B000
heap
page read and write
7FF5ED48A000
unkown
page readonly
8DA0000
unkown
page read and write
9CE0000
unkown
page read and write
91C0000
unkown
page read and write
3150000
unkown
page read and write
BAEE000
heap
page read and write
A796000
heap
page read and write
3748000
unkown
page read and write
3150000
unkown
page read and write
A5E7000
heap
page read and write
B741000
heap
page read and write
8A6E000
stack
page read and write
BA34000
heap
page read and write
8118000
heap
page read and write
B7CC000
heap
page read and write
A6D2000
heap
page read and write
7FF5ED534000
unkown
page readonly
BAEA000
heap
page read and write
8350000
heap
page read and write
BAEE000
heap
page read and write
B47B000
stack
page read and write
18A0000
unkown
page readonly
8114000
heap
page read and write
3440000
unkown
page read and write
B7E0000
heap
page read and write
A74C000
heap
page read and write
33C0000
unkown
page read and write
785D000
unkown
page read and write
4AC0000
heap
page read and write
91C0000
unkown
page read and write
7FF5ED956000
unkown
page readonly
400000
unkown
page execute and read and write
B8D5000
heap
page read and write
B9EB000
heap
page read and write
A648000
heap
page read and write
B35A000
stack
page read and write
BA2B000
heap
page read and write
BA47000
heap
page read and write
1380000
unkown
page read and write
7FF5ED91A000
unkown
page readonly
95A0000
unkown
page read and write
93C0000
stack
page read and write
9920000
remote allocation
page read and write
A5B5000
heap
page read and write
B640000
unkown
page read and write
8352000
heap
page read and write
B7DC000
heap
page read and write
4ABE000
heap
page read and write
B725000
heap
page read and write
B80D000
heap
page read and write
787C000
unkown
page read and write
BA41000
heap
page read and write
B7EA000
heap
page read and write
BAFC000
heap
page read and write
7FF5ED743000
unkown
page readonly
7FF5ED3D6000
unkown
page readonly
A540000
heap
page read and write
A72D000
heap
page read and write
3150000
unkown
page read and write
BA1F000
heap
page read and write
A741000
heap
page read and write
3440000
unkown
page read and write
8440000
heap
page read and write
2B50000
heap
page read and write
4ABE000
heap
page read and write
B7C3000
heap
page read and write
9580000
unkown
page read and write
B9F2000
heap
page read and write
A6D2000
heap
page read and write
CAFA000
stack
page read and write
13B0000
unkown
page read and write
A6D2000
heap
page read and write
9580000
unkown
page read and write
B8CE000
heap
page read and write
9540000
unkown
page read and write
7FF5ED4E8000
unkown
page readonly
BA34000
heap
page read and write
C893000
unkown
page read and write
32A0000
unkown
page read and write
33B9000
stack
page read and write
97AD000
unkown
page read and write
310E000
stack
page read and write
A628000
heap
page read and write
3160000
unkown
page read and write
A5EC000
heap
page read and write
1230000
unkown
page read and write
B5A1000
heap
page read and write
B8C6000
heap
page read and write
8317000
heap
page read and write
B8A0000
heap
page read and write
BA05000
heap
page read and write
9CE0000
unkown
page read and write
BAFA000
heap
page read and write
3110000
unkown
page read and write
B7E8000
heap
page read and write
ADA1000
heap
page read and write
834A000
heap
page read and write
AAF6000
unkown
page read and write
36D5000
stack
page read and write
9590000
unkown
page read and write
BAF8000
heap
page read and write
4B8B000
unkown
page read and write
982D000
unkown
page read and write
33C0000
unkown
page read and write
1380000
unkown
page read and write
B6C2000
heap
page read and write
BAEA000
heap
page read and write
9CE0000
unkown
page read and write
BAE2000
heap
page read and write
ADD8000
heap
page read and write
B6E3000
heap
page read and write
A5C9000
heap
page read and write
8B60000
unkown
page readonly
BA1F000
heap
page read and write
A799000
heap
page read and write
BA6B000
heap
page read and write
848B000
heap
page read and write
483C000
heap
page read and write
49FD000
heap
page read and write
818D000
stack
page read and write
81ED000
heap
page read and write
A722000
heap
page read and write
ADD0000
heap
page read and write
BA27000
heap
page read and write
8F10000
unkown
page read and write
B872000
heap
page read and write
B654000
heap
page read and write
B9C4000
heap
page read and write
BAF4000
heap
page read and write
ADD0000
heap
page read and write
B7DA000
heap
page read and write
3150000
unkown
page read and write
84E6000
heap
page read and write
1390000
unkown
page read and write
7FF5ED418000
unkown
page readonly
B7FC000
heap
page read and write
AADB000
unkown
page read and write
B9DE000
heap
page read and write
AE10000
heap
page read and write
BB00000
heap
page read and write
B890000
heap
page read and write
FDEC000
unkown
page read and write
B870000
heap
page read and write
CD7E000
stack
page read and write
95B0000
unkown
page read and write
BA2B000
heap
page read and write
CDF5000
stack
page read and write
9CE0000
unkown
page read and write
9CE0000
unkown
page read and write
84E1000
heap
page read and write
7770000
trusted library section
page readonly
7FF5ED8AC000
unkown
page readonly
1360000
unkown
page read and write
9590000
unkown
page read and write
7978000
unkown
page read and write
B7E4000
heap
page read and write
81F6000
heap
page read and write
13A0000
unkown
page read and write
8146000
heap
page read and write
7FF5ED8B4000
unkown
page readonly
B95A000
heap
page read and write
BB85000
heap
page read and write
3440000
unkown
page read and write
C7FC000
stack
page read and write
A799000
heap
page read and write
3130000
unkown
page read and write
9CE0000
unkown
page read and write
4851000
heap
page read and write
BC3D000
heap
page read and write
7D6A000
heap
page read and write
B98F000
heap
page read and write
3440000
unkown
page read and write
BA3F000
heap
page read and write
B7C8000
heap
page read and write
1360000
unkown
page read and write
7FF5EDA14000
unkown
page readonly
8BE9000
stack
page read and write
A570000
trusted library allocation
page read and write
4B56000
unkown
page read and write
A5F8000
heap
page read and write
9C87000
unkown
page read and write
A327000
unkown
page read and write
812A000
heap
page read and write
BBB5000
heap
page read and write
C978000
stack
page read and write
BB08000
heap
page read and write
3120000
unkown
page read and write
A736000
heap
page read and write
BDA0000
trusted library allocation
page read and write
B7E4000
heap
page read and write
4775000
heap
page read and write
3440000
unkown
page read and write
BB08000
heap
page read and write
1360000
unkown
page read and write
842A000
heap
page read and write
B870000
heap
page read and write
1360000
unkown
page read and write
7FF5ED471000
unkown
page readonly
A743000
heap
page read and write
1340000
unkown
page read and write
B8CE000
heap
page read and write
7FF5ED52F000
unkown
page readonly
3160000
unkown
page read and write
B880000
heap
page read and write
7FF5ED1FF000
unkown
page readonly
BA16000
heap
page read and write
B7EE000
heap
page read and write
9CE0000
unkown
page read and write
BB06000
heap
page read and write
3440000
unkown
page read and write
BA71000
heap
page read and write
BBB5000
heap
page read and write
7FF5ED9AE000
unkown
page readonly
B9E6000
heap
page read and write
3440000
unkown
page read and write
8CEB000
stack
page read and write
91C0000
unkown
page read and write
81B6000
heap
page read and write
79DE000
stack
page read and write
4777000
heap
page read and write
B7E2000
heap
page read and write
3110000
unkown
page read and write
95A0000
unkown
page read and write
FE03000
unkown
page read and write
B8A6000
heap
page read and write
ADBE000
heap
page read and write
47F6000
heap
page read and write
820F000
heap
page read and write
3440000
unkown
page read and write
B7FC000
heap
page read and write
B8E9000
heap
page read and write
BA36000
heap
page read and write
4B60000
heap
page read and write
8414000
heap
page read and write
B5AE000
stack
page read and write
ADBB000
heap
page read and write
BB08000
heap
page read and write
1350000
unkown
page read and write
9CE0000
unkown
page read and write
79D3000
unkown
page read and write
3150000
unkown
page read and write
7FF5ED505000
unkown
page readonly
A644000
heap
page read and write
9580000
unkown
page read and write
1360000
unkown
page read and write
A74C000
heap
page read and write
3440000
unkown
page read and write
A722000
heap
page read and write
AAF9000
unkown
page read and write
3440000
unkown
page read and write
7FF5EDA69000
unkown
page readonly
95A0000
unkown
page read and write
B74A000
heap
page read and write
9879000
unkown
page read and write
7FF5ED853000
unkown
page readonly
8F10000
unkown
page read and write
9CE0000
unkown
page read and write
A364000
unkown
page read and write
9540000
unkown
page read and write
BAF2000
heap
page read and write
4BE3000
unkown
page read and write
11B0000
unkown
page readonly
B874000
heap
page read and write
4882000
heap
page read and write
B8AE000
heap
page read and write
9CE0000
unkown
page read and write
9CE0000
unkown
page read and write
9CE0000
unkown
page read and write
7FF5ED3F3000
unkown
page readonly
7FF5ED4BB000
unkown
page readonly
C8FC000
stack
page read and write
B9F0000
heap
page read and write
B7E0000
heap
page read and write
BB86000
heap
page read and write
BAFC000
heap
page read and write
9920000
remote allocation
page read and write
C92D000
unkown
page read and write
32A0000
stack
page read and write
BA6B000
heap
page read and write
7859000
unkown
page read and write
845C000
heap
page read and write
8F10000
unkown
page read and write
1490000
unkown
page read and write
8334000
heap
page read and write
4A8E000
heap
page read and write
B9C4000
heap
page read and write
833E000
heap
page read and write
7FF5ECED2000
unkown
page readonly
3440000
unkown
page read and write
B7D6000
heap
page read and write
B858000
heap
page read and write
400000
unkown
page readonly
BA6B000
heap
page read and write
B7D6000
heap
page read and write
4775000
heap
page read and write
2F60000
trusted library allocation
page read and write
BA34000
heap
page read and write
AE14000
heap
page read and write
ADB4000
heap
page read and write
83C2000
heap
page read and write
BBA1000
heap
page read and write
4A57000
heap
page read and write
4711000
heap
page read and write
483C000
heap
page read and write
8F10000
unkown
page read and write
7FF5ED495000
unkown
page readonly
48F6000
heap
page read and write
8121000
heap
page read and write
8440000
heap
page read and write
7DF47D521000
trusted library allocation
page execute read
AD79000
heap
page read and write
418000
unkown
page readonly
ADB8000
heap
page read and write
BA2B000
heap
page read and write
2B23000
unkown
page readonly
B864000
heap
page read and write
B7CC000
heap
page read and write
B6D2000
heap
page read and write
7FF5ED62F000
unkown
page readonly
9540000
unkown
page read and write
4A73000
heap
page read and write
881B000
stack
page read and write
3120000
unkown
page read and write
C84D000
unkown
page read and write
A74E000
heap
page read and write
9B60000
unkown
page readonly
37F6000
unkown
page read and write
A5E9000
heap
page read and write
A736000
heap
page read and write
BA36000
heap
page read and write
8334000
heap
page read and write
7FF5ED3A7000
unkown
page readonly
8336000
heap
page read and write
3150000
unkown
page read and write
4CD0000
unkown
page read and write
B808000
heap
page read and write
B7FE000
heap
page read and write
1C4000
heap
page read and write
B8C6000
heap
page read and write
B7C8000
heap
page read and write
33C0000
stack
page read and write
A796000
heap
page read and write
76C0000
unkown
page read and write
8428000
heap
page read and write
13B0000
unkown
page read and write
13A0000
unkown
page read and write
3150000
unkown
page read and write
9580000
unkown
page read and write
9CE0000
unkown
page read and write
B19F000
stack
page read and write
7FF5ED42B000
unkown
page readonly
8F10000
unkown
page read and write
B87E000
heap
page read and write
BA34000
heap
page read and write
7FF5ED928000
unkown
page readonly
BB95000
heap
page read and write
B6F1000
heap
page read and write
BA71000
heap
page read and write
7FF5ED793000
unkown
page readonly
AE09000
heap
page read and write
BAFC000
heap
page read and write
95A0000
unkown
page read and write
1360000
unkown
page read and write
B7E8000
heap
page read and write
B9EA000
heap
page read and write
BB99000
heap
page read and write
47A5000
heap
page read and write
8381000
heap
page read and write
3440000
unkown
page read and write
2C79000
heap
page read and write
3400000
stack
page read and write
C57F000
unkown
page read and write
B9DE000
heap
page read and write
AE11000
heap
page read and write
C5A0000
unkown
page read and write
8330000
heap
page read and write
35D0000
unkown
page read and write
32A0000
unkown
page read and write
9CE0000
unkown
page read and write
497B000
stack
page read and write
4780000
direct allocation
page read and write
41B000
unkown
page write copy
7FF5ED507000
unkown
page readonly
8489000
heap
page read and write
7FF5ED8FF000
unkown
page readonly
B8E9000
heap
page read and write
ADD0000
heap
page read and write
47F2000
heap
page read and write
B9EA000
heap
page read and write
9871000
unkown
page read and write
3110000
unkown
page read and write
A799000
heap
page read and write
B850000
heap
page read and write
1340000
unkown
page read and write
32A0000
unkown
page read and write
BDB0000
trusted library allocation
page read and write
7FF5ED714000
unkown
page readonly
9CE0000
unkown
page read and write
B7DE000
heap
page read and write
B7C3000
heap
page read and write
83F0000
heap
page read and write
9885000
unkown
page read and write
B6CD000
heap
page read and write
B7F8000
heap
page read and write
C6F8000
unkown
page read and write
93C0000
unkown
page read and write
2CEB000
heap
page read and write
418000
unkown
page readonly
B7EE000
heap
page read and write
B697000
heap
page read and write
3120000
unkown
page read and write
B98F000
heap
page read and write
84E1000
heap
page read and write
F220000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
1480000
heap
page read and write
8440000
heap
page read and write
91C0000
unkown
page read and write
8236000
heap
page read and write
9580000
unkown
page read and write
B8AE000
heap
page read and write
A640000
heap
page read and write
3440000
unkown
page read and write
9580000
unkown
page read and write
4801000
heap
page read and write
7695000
stack
page read and write
BBC1000
heap
page read and write
843E000
heap
page read and write
3150000
unkown
page read and write
3110000
unkown
page read and write
B8B4000
heap
page read and write
9CE0000
unkown
page read and write
2CB0000
unclassified section
page read and write
C41F000
stack
page read and write
95A0000
unkown
page read and write
1500000
heap
page read and write
B7F8000
heap
page read and write
B7E8000
heap
page read and write
B98F000
heap
page read and write
1483000
heap
page read and write
A2A0000
trusted library allocation
page read and write
4B6D000
heap
page read and write
3440000
unkown
page read and write
1360000
unkown
page read and write
93C0000
unkown
page read and write
8112000
heap
page read and write
E6E000
stack
page read and write
B08D000
stack
page read and write
BA1F000
heap
page read and write
C7C5000
unkown
page read and write
8354000
heap
page read and write
3150000
unkown
page read and write
7FF5ED279000
unkown
page readonly
1370000
unkown
page read and write
7DF47D5A1000
trusted library allocation
page execute read
93C0000
unkown
page read and write
B8E9000
heap
page read and write
9CE0000
unkown
page read and write
BAE2000
heap
page read and write
91C0000
unkown
page read and write
3440000
unkown
page read and write
B7DE000
heap
page read and write
7FF5ED872000
unkown
page readonly
D53E000
stack
page read and write
There are 3048 hidden memdumps, click here to show them.