IOC Report

loading gif

Files

File Path
Type
Category
Malicious
H4vBtZsi8xAKaMm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\H4vBtZsi8xAKaMm.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\H4vBtZsi8xAKaMm.exe
"C:\Users\user\Desktop\H4vBtZsi8xAKaMm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
{path}
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.freeclothesonline.com/u1p5/
unknown
malicious
http://www.freeclothesonline.com/u1p5/www.apeutah.com
unknown
malicious
http://www.pbcgotv.com/u1p5/
unknown
malicious
http://www.apeutah.com/u1p5/www.jovam.xyz
unknown
malicious
http://www.pbcgotv.com/u1p5/www.kailibianminwang.com
unknown
malicious
http://www.hokabrazil.com/u1p5/www.hornnbach.com
unknown
malicious
http://www.marymarinho.com/u1p5/?y4Mp=jmW97e0DcxHZsiDt+DmiFhziWrO1jPfkTbEIn6OHXnuLtYKLIrDwNEu/EQYt2xDuBHghXZP9DQ==&D0GHx=5jNT
192.0.78.24
malicious
http://www.jovam.xyz/u1p5/www.hokabrazil.com
unknown
malicious
http://www.vinewineltd.com/u1p5/www.pbcgotv.com
unknown
malicious
http://www.agengrosirfashion.com/u1p5/
unknown
malicious
http://www.hokabrazil.comReferer:
unknown
malicious
http://www.jovam.xyz/u1p5/
unknown
malicious
http://www.kailibianminwang.com/u1p5/
unknown
malicious
http://www.agengrosirfashion.com/u1p5/www.dasmonica.com
unknown
malicious
http://www.apeutah.com/u1p5/
unknown
malicious
http://www.hokabrazil.com/u1p5/
unknown
malicious
http://www.hokabrazil.com
unknown
malicious
http://www.vinewineltd.com/u1p5/
unknown
malicious
http://www.bettingweb365.com/u1p5/?y4Mp=UXBCCV9Hg7LlUlEhFgBZZuvhtrkgDnenbWAOO9JvD+HvWaQ2ttROIxFaz7G4unDmw6qRWL3K2g==&D0GHx=5jNT
92.222.235.170
malicious
http://www.kailibianminwang.com/u1p5/.
unknown
malicious
http://www.shitcoin.team/u1p5/?y4Mp=vL5j7Eq3si3+pqkwq9GVQc9zWaxA/P/bTusMaerk9f3EW+lc0CCc1NhXRSl0Kt4KYFMx8zSAYw==&D0GHx=5jNT
107.180.34.104
malicious
http://www.vinewineltd.com
unknown
http://www.hornnbach.comReferer:
unknown
http://www.verifyaxcx.com/u1p5/www.agengrosirfashion.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.piertrafesa.com/u1p5/www.vinewineltd.com
unknown
http://www.sajatypeworks.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.rhoads-music.comReferer:
unknown
http://www.kailibianminwang.comReferer:
unknown
http://www.piertrafesa.com
unknown
http://www.yannickrast.com/u1p5/www.rhoads-music.com
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.rhoads-music.com
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://bettingweb365.com/u1p5/?y4Mp=UXBCCV9Hg7LlUlEhFgBZZuvhtrkgDnenbWAOO9JvD
unknown
http://www.yannickrast.com/u1p5/
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.verifyaxcx.comReferer:
unknown
http://www.apeutah.com
unknown
http://www.dasmonica.comReferer:
unknown
http://www.hornnbach.com/u1p5/www.piertrafesa.com
unknown
http://www.dasmonica.com/u1p5/www.freeclothesonline.com
unknown
http://www.carterandcone.coml
unknown
http://www.piertrafesa.com/u1p5/
unknown
http://www.jovam.xyz
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
http://www.apeutah.comReferer:
unknown
http://www.pbcgotv.comReferer:
unknown
http://www.kailibianminwang.com
unknown
http://www.vzn2aai2qj.icuReferer:
unknown
http://www.dasmonica.com/u1p5/
unknown
http://www.vzn2aai2qj.icu/u1p5/www.deutscheno1.com
unknown
http://www.freeclothesonline.comReferer:
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.jovam.xyzReferer:
unknown
http://www.verifyaxcx.com
unknown
http://www.deutscheno1.com/u1p5/
unknown
http://www.fontbureau.com/designers?
unknown
http://www.pbcgotv.com
unknown
http://www.piertrafesa.comReferer:
unknown
http://www.yannickrast.comReferer:
unknown
http://www.tiro.com
unknown
http://www.dasmonica.com
unknown
http://www.goodfont.co.kr
unknown
http://www.typography.netD
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fontfabrik.com
unknown
http://www.agengrosirfashion.comReferer:
unknown
http://www.freeclothesonline.com
unknown
http://www.vinewineltd.comReferer:
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.rhoads-music.com/u1p5/www.verifyaxcx.com
unknown
http://www.sakkal.com
unknown
http://www.yannickrast.com
unknown
http://www.agengrosirfashion.com
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.comF
unknown
http://www.verifyaxcx.com/u1p5/
unknown
http://www.vzn2aai2qj.icu
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.hornnbach.com/u1p5/
unknown
http://www.deutscheno1.com/u1p5/www.yannickrast.com
unknown
http://www.fontbureau.comm
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.hornnbach.com
unknown
http://www.fontbureau.com/designers8
unknown
http://www.vzn2aai2qj.icu/u1p5/
unknown
http://www.deutscheno1.com
unknown
http://www.rhoads-music.com/u1p5/
unknown
http://crl.v
unknown
http://www.deutscheno1.comReferer:
unknown
There are 89 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bettingweb365.com
92.222.235.170
www.deutscheno1.com
34.149.59.90
marymarinho.com
192.0.78.24
shitcoin.team
107.180.34.104
www.shitcoin.team
unknown
www.bettingweb365.com
unknown
www.vzn2aai2qj.icu
unknown
www.marymarinho.com
unknown

IPs

IP
Domain
Country
Malicious
192.0.78.24
marymarinho.com
United States
92.222.235.170
bettingweb365.com
France
107.180.34.104
shitcoin.team
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}
DriveNumber
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ef47ea26-ec76-4a6e-8680-9e53b539546d}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{4b110390-e32a-400c-bf41-7fe93773464a}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{b8455d9b-4916-480e-8b44-905b33ca001e}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010346
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001033E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010336
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001032E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001031E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010320
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000090228
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001030C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001030A
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000102EE
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000102E2
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000102E4
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\CloudStore\Store\Cache\DefaultAccount\$$windows.data.signals.registrations\Current
Data
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.contact\OpenWithProgids
contact_wab_auto_file
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
IconStreams
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MK3D\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance
MessageTime
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}
DriveNumber
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@explorerframe.dll,-13138
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ef47ea26-ec76-4a6e-8680-9e53b539546d}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{4b110390-e32a-400c-bf41-7fe93773464a}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{b8455d9b-4916-480e-8b44-905b33ca001e}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010346
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001033E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010336
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001032E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001031E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010320
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000090228
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001030C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001030A
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000102EE
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000102E2
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000102E4
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\CloudStore\Store\Cache\DefaultAccount\$$windows.data.signals.registrations\Current
Data
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance
MessageTime
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance
MessageTime
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.contact\OpenWithProgids
contact_wab_auto_file
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
IconStreams
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MK3D\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
There are 282 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
E90000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
EBE6000
unkown
page execute and read and write
malicious
42D9000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
363B000
trusted library allocation
page read and write
malicious
10C0000
unclassified section
page execute and read and write
malicious
1200000
unclassified section
page execute and read and write
malicious
46D0000
trusted library allocation
page read and write
malicious
EBE6000
unkown
page execute and read and write
malicious
AA0000
system
page execute and read and write
malicious
DDF4000
heap
page read and write
A9B6000
heap
page read and write
5764000
heap
page read and write
8C7A000
heap
page read and write
F625000
heap
page read and write
DEAE000
heap
page read and write
5D05000
trusted library allocation
page read and write
7DB3000
heap
page readonly
7FF566DC8000
unkown
page readonly
DA680FE000
stack
page read and write
F14F000
heap
page read and write
5D30000
trusted library allocation
page read and write
EF9000
heap
page read and write
8BFF000
unkown
page read and write
B56B000
stack
page read and write
5D30000
trusted library allocation
page read and write
F8B5000
trusted library allocation
page read and write
DA98000
heap
page read and write
E60D000
heap
page read and write
69CE000
unkown
page read and write
8A54000
heap
page read and write
F462000
heap
page read and write
57D0000
trusted library allocation
page read and write
AAF0000
heap
page read and write
2EAA000
unkown
page read and write
AEF0000
unkown
page read and write
DD36000
heap
page read and write
498E000
unkown
page read and write
5D30000
trusted library allocation
page read and write
4700000
trusted library allocation
page execute and read and write
A8A2000
heap
page read and write
8D80000
heap
page read and write
1065000
heap
page read and write
F326000
heap
page read and write
8D6B000
heap
page read and write
5D07000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
8D5D000
heap
page read and write
F455000
heap
page read and write
23E1CF7B000
unkown
page read and write
D22000
heap
page read and write
25424302000
unkown
page read and write
1474000
heap
page read and write
E5D7000
heap
page read and write
1020000
unkown
page read and write
7FF566C06000
unkown
page readonly
7DF47E2B1000
trusted library allocation
page execute read
7515000
heap
page read and write
F265000
heap
page read and write
DF6A000
heap
page read and write
7DF466381000
unkown
page execute read
DC28000
heap
page read and write
1BD13970000
heap
page read and write
A980000
heap
page read and write
F258000
heap
page read and write
F464000
heap
page read and write
ABDF000
heap
page read and write
286A000
unkown
page read and write
56D37FB000
stack
page read and write
1F17DE89000
unkown
page read and write
25424264000
unkown
page read and write
DC06000
heap
page read and write
7FF566EB0000
unkown
page readonly
8D61000
heap
page read and write
53D7000
heap
page read and write
875E000
stack
page read and write
5D14000
trusted library allocation
page read and write
53E9000
heap
page read and write
8BC3000
heap
page read and write
3AA8000
stack
page read and write
5CFB000
trusted library allocation
page read and write
F480000
heap
page read and write
5CFB000
trusted library allocation
page read and write
F47A000
heap
page read and write
51A6000
heap
page read and write
BC7E000
unkown
page readonly
F466000
heap
page read and write
AABE000
heap
page read and write
F020000
heap
page read and write
5F40000
unkown
page read and write
10C73000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
10098000
heap
page read and write
52E0000
trusted library allocation
page read and write
F6B5000
heap
page read and write
7FF566D36000
unkown
page readonly
FAB000
heap
page read and write
8D87000
heap
page read and write
7FF566B3D000
unkown
page readonly
382B000
heap
page read and write
7DF47E321000
trusted library allocation
page execute read
BCA9000
unkown
page readonly
5D07000
trusted library allocation
page read and write
8A8C000
heap
page read and write
8C45000
unkown
page read and write
8C7B000
heap
page read and write
1005B000
heap
page read and write
8D95000
heap
page read and write
8DB8000
heap
page read and write
BB8C000
heap
page read and write
AA52000
heap
page read and write
74A0000
heap
page read and write
BB20000
trusted library allocation
page read and write
ABB0000
heap
page read and write
F486000
heap
page read and write
F459000
heap
page read and write
10070000
heap
page read and write
F30C000
heap
page read and write
F3E0000
heap
page read and write
8D87000
heap
page read and write
DC28000
heap
page read and write
5B00000
trusted library allocation
page read and write
3A7F000
heap
page read and write
F197000
heap
page read and write
86DD000
stack
page read and write
1710000
trusted library allocation
page read and write
C80000
heap
page read and write
ACDF000
stack
page read and write
5D30000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
AEE7000
stack
page read and write
A983000
heap
page read and write
10113000
heap
page read and write
8D44000
heap
page read and write
2D69000
stack
page read and write
DC20000
heap
page read and write
7FF566C23000
unkown
page readonly
5AF0000
trusted library allocation
page read and write
7D50000
trusted library allocation
page read and write
5CE3000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
EF94000
heap
page read and write
7FF566E61000
unkown
page readonly
7B5D000
stack
page read and write
7FF566C14000
unkown
page readonly
EFA6000
heap
page read and write
5B00000
trusted library allocation
page read and write
1790000
heap
page read and write
3DF9000
stack
page read and write
774E000
unkown
page readonly
8BCE000
heap
page read and write
3A2E000
stack
page read and write
AA58000
heap
page read and write
1AC6B713000
unkown
page read and write
F266000
heap
page read and write
53E4000
heap
page read and write
1BD13B00000
unkown
page read and write
76C0000
trusted library allocation
page read and write
3A5D000
heap
page read and write
7630000
trusted library allocation
page read and write
6C36000
stack
page read and write
57D8000
heap
page read and write
23E1D402000
unkown
page read and write
31FE000
stack
page read and write
DD40000
heap
page read and write
3330000
unkown
page readonly
5B00000
trusted library allocation
page read and write
3A5D000
heap
page read and write
53E4000
heap
page read and write
3808000
heap
page read and write
7FF566E0E000
unkown
page readonly
23E1C570000
unkown
page read and write
B50000
trusted library allocation
page read and write
F8A0000
trusted library allocation
page read and write
3B30000
trusted library allocation
page read and write
4C30000
unkown
page readonly
7547000
heap
page read and write
A868000
heap
page read and write
E30000
unkown
page readonly
5830000
trusted library allocation
page read and write
3D28000
stack
page read and write
FD7E000
heap
page read and write
3249000
stack
page read and write
2990000
unkown
page readonly
7515000
heap
page read and write
8CE0000
heap
page read and write
8BB1000
heap
page read and write
F496000
heap
page read and write
1E388C4E000
unkown
page read and write
B76B000
stack
page read and write
8D2F000
heap
page read and write
286A000
unkown
page read and write
5D1F000
trusted library allocation
page read and write
10EE000
stack
page read and write
3B23000
heap
page read and write
5D1C000
trusted library allocation
page read and write
8D95000
heap
page read and write
A20000
unkown
page read and write
8A52000
heap
page read and write
A9E7000
heap
page read and write
1020000
unkown
page read and write
8CF3000
heap
page read and write
204EA450000
trusted library allocation
page read and write
A864000
heap
page read and write
75D3000
trusted library allocation
page read and write
573B000
heap
page read and write
DC18000
heap
page read and write
3CD0000
heap
page read and write
204E5713000
unkown
page read and write
2F40000
unkown
page readonly
DE71000
heap
page read and write
F10F000
heap
page read and write
FD70000
heap
page read and write
5344000
heap
page read and write
AA65000
heap
page read and write
1AC6B66D000
unkown
page read and write
AA02000
heap
page read and write
BB89000
heap
page read and write
DC2A000
heap
page read and write
DC3A000
heap
page read and write
FD4C000
heap
page read and write
382B000
heap
page read and write
A9E5000
heap
page read and write
8A12000
unkown
page read and write
F01C000
heap
page read and write
46B3000
unkown
page read and write
CAF0000
trusted library allocation
page read and write
8BA8000
heap
page read and write
AC5000
stack
page read and write
5D30000
trusted library allocation
page read and write
10070000
heap
page read and write
DC06000
heap
page read and write
F478000
heap
page read and write
76B3000
trusted library allocation
page read and write
7A65000
unkown
page read and write
74D8000
unkown
page readonly
4830000
unkown
page read and write
7D60000
trusted library allocation
page read and write
204E4E56000
unkown
page read and write
7FF566CF4000
unkown
page readonly
8A72000
heap
page read and write
5A70000
trusted library allocation
page read and write
E65D000
heap
page read and write
7CDA000
stack
page read and write
7763000
unkown
page readonly
FF44000
heap
page read and write
7508000
heap
page read and write
8BFE000
heap
page read and write
FD50000
heap
page read and write
7FF566B70000
unkown
page readonly
5D30000
trusted library allocation
page read and write
DC3C000
heap
page read and write
DC1C000
heap
page read and write
E5F4000
heap
page read and write
CA40000
trusted library allocation
page read and write
533D000
stack
page read and write
F008000
heap
page read and write
F464000
heap
page read and write
53CC000
heap
page read and write
7FF566E05000
unkown
page readonly
5CFB000
trusted library allocation
page read and write
A8C8000
heap
page read and write
8C7B000
heap
page read and write
512A000
stack
page read and write
7FF567065000
unkown
page readonly
F486000
heap
page read and write
CE7B000
stack
page read and write
BBC5000
heap
page read and write
8CC6000
unkown
page read and write
FD7E000
heap
page read and write
B9BF000
unkown
page readonly
2E8D000
unkown
page read and write
E69D000
heap
page read and write
5D30000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
DC4A000
heap
page read and write
1750000
trusted library allocation
page read and write
AA58000
heap
page read and write
FF41000
heap
page read and write
5B30000
heap
page execute and read and write
387F000
heap
page read and write
F258000
heap
page read and write
F54F000
heap
page read and write
EFF7000
heap
page read and write
A9C9000
heap
page read and write
46D0000
unkown
page read and write
EF8E000
heap
page read and write
7FF566A8A000
unkown
page readonly
8A12000
unkown
page read and write
2F4B000
unkown
page read and write
BBAB000
heap
page read and write
FD74000
heap
page read and write
DEA6000
heap
page read and write
BC7D000
heap
page read and write
32D0000
unkown
page readonly
5D11000
trusted library allocation
page read and write
7FF566C23000
unkown
page readonly
8C3B000
unkown
page read and write
A9F8000
heap
page read and write
F415000
heap
page read and write
EFFE000
heap
page read and write
8A69000
heap
page read and write
BD0000
unkown
page readonly
AF18000
unkown
page read and write
DEAB000
heap
page read and write
3628000
stack
page read and write
2EE9000
unkown
page read and write
7DF42C5E0000
trusted library allocation
page readonly
101C9000
heap
page read and write
F49C000
heap
page read and write
AA59000
heap
page read and write
FD64000
heap
page read and write
28B0000
unkown
page readonly
10C70000
trusted library allocation
page read and write
588B000
stack
page read and write
7465000
heap
page read and write
8AC5000
heap
page read and write
8A63000
heap
page read and write
38A2000
heap
page read and write
5CFB000
trusted library allocation
page read and write
A9CD000
heap
page read and write
EA0000
heap
page read and write
1F17DE3C000
unkown
page read and write
7D50000
trusted library allocation
page read and write
CADA1FF000
stack
page read and write
B4E7000
stack
page read and write
23E1CF6D000
unkown
page read and write
F494000
heap
page read and write
8C2F000
heap
page read and write
5AF0000
trusted library allocation
page read and write
5787000
heap
page read and write
10DB4000
heap
page read and write
1E528A50000
trusted library allocation
page read and write
1BD13E13000
unkown
page read and write
5D04000
trusted library allocation
page read and write
25A9AE02000
unkown
page read and write
E606000
heap
page read and write
BC1E000
heap
page read and write
7FF566FE2000
unkown
page readonly
D88B000
heap
page read and write
A909000
heap
page read and write
5B00000
trusted library allocation
page read and write
F466000
heap
page read and write
8A72000
heap
page read and write
88E8000
stack
page read and write
204E4F14000
unkown
page read and write
F480000
heap
page read and write
8130000
heap
page read and write
BBAB000
heap
page read and write
10113000
heap
page read and write
D61000
heap
page read and write
1492000
heap
page read and write
F337000
heap
page read and write
8B34000
unkown
page read and write
23E1CFC0000
unkown
page read and write
AB7A17E000
stack
page read and write
3C2E000
stack
page read and write
DEB4000
heap
page read and write
23E1CF6D000
unkown
page read and write
F415000
heap
page read and write
F625000
heap
page read and write
AB8C000
heap
page read and write
23E1CF5A000
unkown
page read and write
EE0C000
unkown
page read and write
BE0000
unkown
page read and write
5940000
unkown
page read and write
8A2C000
heap
page read and write
5D04000
trusted library allocation
page read and write
7FF566F94000
unkown
page readonly
7FF566C11000
unkown
page readonly
46D0000
unkown
page read and write
5D07000
trusted library allocation
page read and write
3B40000
trusted library allocation
page read and write
DD00000
heap
page read and write
25A9AE29000
unkown
page read and write
5CFB000
trusted library allocation
page read and write
2EAE000
unkown
page read and write
7FF566AE9000
unkown
page readonly
737F000
heap
page read and write
1AC6BE02000
unkown
page read and write
3C9F000
stack
page read and write
DE33000
heap
page read and write
B50000
trusted library allocation
page read and write
7FF566ED2000
unkown
page readonly
77B5000
unkown
page readonly
ABB2000
heap
page read and write
BB6A000
heap
page read and write
A866000
heap
page read and write
863C000
stack
page read and write
DB7B000
heap
page read and write
FD52000
heap
page read and write
101CE000
heap
page read and write
7FF566C1E000
unkown
page readonly
23E1C653000
unkown
page read and write
F47000
heap
page read and write
23E1CFA3000
unkown
page read and write
57E9000
heap
page read and write
8D97000
heap
page read and write
5D30000
trusted library allocation
page read and write
E10000
unkown
page read and write
DB8C000
heap
page read and write
CFE5E7B000
stack
page read and write
32D1000
trusted library allocation
page read and write
BC7D000
heap
page read and write
5D30000
trusted library allocation
page read and write
51F0000
trusted library section
page read and write
5800000
trusted library allocation
page read and write
C8E3000
trusted library allocation
page read and write
8C48000
heap
page read and write
E6EE000
stack
page read and write
5D15000
trusted library allocation
page read and write
7FF566E97000
unkown
page readonly
5787000
heap
page read and write
8C1D000
heap
page read and write
C6A5000
unkown
page readonly
3CD0000
heap
page read and write
5CE4000
trusted library allocation
page read and write
E32000
unkown
page readonly
F004000
heap
page read and write
37D1000
heap
page read and write
AA02000
heap
page read and write
73E6000
heap
page read and write
754C000
heap
page read and write
C49B000
stack
page read and write
F4DF000
heap
page read and write
5CF3000
trusted library allocation
page read and write
7512000
heap
page read and write
5D30000
trusted library allocation
page read and write
DC26000
heap
page read and write
5AF0000
trusted library allocation
page read and write
23E1CFB6000
unkown
page read and write
F32B000
heap
page read and write
E615000
heap
page read and write
A9B1000
heap
page read and write
FF30000
heap
page read and write
5B00000
trusted library allocation
page read and write
D5B5000
heap
page read and write
FF0000
unkown
page readonly
FECB000
heap
page read and write
A910000
heap
page read and write
F057000
heap
page read and write
10C90000
trusted library allocation
page read and write
F49C000
heap
page read and write
F014000
heap
page read and write
A99D000
heap
page read and write
DFA1000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF566874000
unkown
page readonly
5D19000
trusted library allocation
page read and write
5710000
heap
page read and write
5B00000
trusted library allocation
page read and write
4507BDB000
stack
page read and write
5D30000
trusted library allocation
page read and write
1007C000
heap
page read and write
10C0000
trusted library allocation
page read and write
3A83000
heap
page read and write
6ABE000
stack
page read and write
5440000
unkown
page read and write
ABB0000
heap
page read and write
D855000
heap
page read and write
DB10000
heap
page read and write
8C31000
heap
page read and write
8DAD000
heap
page read and write
FED3000
heap
page read and write
7FF566F36000
unkown
page readonly
5D30000
trusted library allocation
page read and write
6240000
trusted library allocation
page read and write
F776000
heap
page read and write
AB41000
heap
page read and write
855E000
stack
page read and write
8D1E000
heap
page read and write
C6CE000
unkown
page readonly
73D2000
heap
page read and write
8C1D000
heap
page read and write
5D30000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
E62F000
heap
page read and write
101ED000
heap
page read and write
1980000
heap
page read and write
106C000
stack
page read and write
57D0000
trusted library allocation
page read and write
8BCD000
heap
page read and write
512A000
stack
page read and write
5D30000
trusted library allocation
page read and write
ABD1000
heap
page read and write
4C40000
unkown
page write copy
7360000
heap
page read and write
86DD000
stack
page read and write
6968000
stack
page read and write
172D000
trusted library allocation
page execute and read and write
5D07000
trusted library allocation
page read and write
7FF566EB0000
unkown
page readonly
8D2C000
heap
page read and write
FEE2000
heap
page read and write
23E1C64C000
unkown
page read and write
E592000
heap
page read and write
7C4E000
stack
page read and write
1E388C27000
unkown
page read and write
5D30000
trusted library allocation
page read and write
89FD000
unkown
page read and write
914000
heap
page read and write
1478000
heap
page read and write
E30000
unkown
page readonly
36AF000
stack
page read and write
204EA6DD000
unkown
page read and write
F498000
heap
page read and write
1E527BDD000
heap
page read and write
5070000
unkown
page readonly
D28000
heap
page read and write
5EB7000
stack
page read and write
5CFB000
trusted library allocation
page read and write
BC2000
heap
page read and write
53CE000
heap
page read and write
1200000
trusted library allocation
page read and write
DF6D000
heap
page read and write
5800000
trusted library allocation
page read and write
A902000
heap
page read and write
5D07000
trusted library allocation
page read and write
CA80000
trusted library allocation
page read and write
1AC6B629000
unkown
page read and write
46D0000
unkown
page read and write
2B79000
unclassified section
page execute and read and write
D7F9000
heap
page read and write
865F000
stack
page read and write
A4E0000
trusted library allocation
page read and write
B8731FE000
stack
page read and write
8C45000
unkown
page read and write
8B9B000
heap
page read and write
5908000
stack
page read and write
3AE1000
heap
page read and write
5B00000
trusted library allocation
page read and write
8C64000
heap
page read and write
7FF5668B9000
unkown
page readonly
5D1F000
trusted library allocation
page read and write
DB59000
heap
page read and write
74A0000
heap
page read and write
F241000
heap
page read and write
DEA6000
heap
page read and write
BBD5000
heap
page read and write
52C0000
heap
page read and write
E56F000
stack
page read and write
1E527BD3000
heap
page read and write
89EB000
stack
page read and write
8C61000
heap
page read and write
1E527D60000
heap
page read and write
5CF3000
trusted library allocation
page read and write
8C59000
heap
page read and write
B16B000
stack
page read and write
1F17DE02000
unkown
page read and write
F480000
heap
page read and write
5830000
trusted library allocation
page read and write
577E000
heap
page read and write
F3A7000
heap
page read and write
372B000
stack
page read and write
6A39000
unkown
page read and write
7FDD000
stack
page read and write
7FF566C99000
unkown
page readonly
DB92000
heap
page read and write
23E1CFB4000
unkown
page read and write
7FD0000
trusted library allocation
page read and write
8BDA000
unkown
page read and write
5800000
trusted library allocation
page read and write
7EDD000
stack
page read and write
2990000
unkown
page readonly
BA34000
unkown
page readonly
20A181F0000
remote allocation
page read and write
5227000
stack
page read and write
A9B6000
heap
page read and write
45083FD000
stack
page read and write
7FF5667FF000
unkown
page readonly
5800000
trusted library allocation
page read and write
E611000
heap
page read and write
BE0000
unkown
page read and write
A92C000
heap
page read and write
5D30000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
69CE000
unkown
page read and write
37AE000
stack
page read and write
3A73000
heap
page read and write
8130000
heap
page read and write
204EA418000
trusted library allocation
page read and write
20A18A02000
unkown
page read and write
FD56000
heap
page read and write
5212000
heap
page read and write
23E1CF5C000
unkown
page read and write
830000
heap
page read and write
32A0000
trusted library allocation
page read and write
AF7F000
unkown
page read and write
EF0000
heap
page read and write
2542426B000
unkown
page read and write
8A5C000
heap
page read and write
DEB9000
heap
page read and write
8C83000
heap
page read and write
F605000
heap
page read and write
3230000
trusted library allocation
page read and write
5990000
unkown
page readonly
23E1CF6A000
unkown
page read and write
FD7A000
heap
page read and write
5B00000
trusted library allocation
page read and write
FD62000
heap
page read and write
F974000
unkown
page read and write
8A2C000
heap
page read and write
5CEAA7E000
stack
page read and write
8CBA000
heap
page read and write
7C10000
trusted library allocation
page read and write
AA61000
heap
page read and write
F49A000
heap
page read and write
7FF566FDB000
unkown
page readonly
7585000
trusted library allocation
page read and write
E551000
heap
page read and write
AC3C000
heap
page read and write
FD4A000
heap
page read and write
BBAB000
heap
page read and write
F05C000
heap
page read and write
68B8000
unkown
page read and write
DDEA000
heap
page read and write
773C000
stack
page read and write
7FF566E8A000
unkown
page readonly
FA36000
unkown
page read and write
F55F000
heap
page read and write
F54F000
heap
page read and write
8CF8000
heap
page read and write
5D07000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
38A2000
heap
page read and write
1496000
heap
page read and write
B9C0000
trusted library allocation
page read and write
8D80000
heap
page read and write
D9F4000
heap
page read and write
5940000
unkown
page read and write
8D41000
heap
page read and write
A10000
heap
page read and write
5190000
trusted library section
page read and write
7FF566D36000
unkown
page readonly
A91B000
heap
page read and write
3AFB000
heap
page read and write
DDFA000
heap
page read and write
A8A2000
heap
page read and write
8A32000
unkown
page read and write
8C71000
heap
page read and write
5D29000
trusted library allocation
page read and write
DA70000
unkown
page read and write
8C80000
heap
page read and write
5CFB000
trusted library allocation
page read and write
7FF566DA5000
unkown
page readonly
4BE0000
unkown
page read and write
526C000
heap
page read and write
A9FA000
heap
page read and write
31C5000
stack
page read and write
26635BC0000
heap
page read and write
7FF566F03000
unkown
page readonly
7640000
trusted library allocation
page read and write
E80000
heap
page read and write
AA85000
heap
page read and write
1E527F15000
heap
page read and write
8C26000
heap
page read and write
1BD13CE0000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
DC8F000
heap
page read and write
8C61000
heap
page read and write
AF18000
unkown
page read and write
8AC5000
heap
page read and write
A9F8000
heap
page read and write
5A0000
remote allocation
page read and write
7FF566B66000
unkown
page readonly
8CF4000
heap
page read and write
E734000
unkown
page read and write
86DD000
stack
page read and write
8C1D000
heap
page read and write
76B5000
trusted library allocation
page read and write
4860000
unkown
page read and write
7FFF97E3F000
unkown
page readonly
F608000
heap
page read and write
EE64000
unkown
page read and write
146A000
heap
page read and write
19A0000
heap
page read and write
702B000
unkown
page readonly
2E8D000
unkown
page read and write
F48A000
heap
page read and write
A9FA000
heap
page read and write
383A000
heap
page read and write
5D07000
trusted library allocation
page read and write
558C000
stack
page read and write
7FF566FFE000
unkown
page readonly
7FF566F7B000
unkown
page readonly
B8734FF000
stack
page read and write
8CA1000
heap
page read and write
2F47000
unkown
page read and write
101D9000
heap
page read and write
C7B2000
unkown
page readonly
C890000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
2D40000
unkown
page read and write
7FF566ADE000
unkown
page readonly
8C49000
heap
page read and write
FD0000
unkown
page readonly
BD50000
trusted library allocation
page read and write
EB0000
heap
page read and write
5D30000
trusted library allocation
page read and write
F47C000
heap
page read and write
8C5F000
heap
page read and write
7547000
heap
page read and write
B995000
unkown
page readonly
5360000
trusted library allocation
page read and write
737F000
heap
page read and write
8D19000
heap
page read and write
548D000
stack
page read and write
2DDD000
stack
page read and write
DF6A000
heap
page read and write
FD0000
unkown
page readonly
7FF566C51000
unkown
page readonly
495E000
stack
page read and write
7C0000
heap
page read and write
8D97000
heap
page read and write
7FF566F6B000
unkown
page readonly
8DB8000
heap
page read and write
A9D4000
heap
page read and write
EFFB000
heap
page read and write
7FF566B3D000
unkown
page readonly
7FF566C7F000
unkown
page readonly
F930000
trusted library allocation
page read and write
10CF6000
heap
page read and write
5D07000
trusted library allocation
page read and write
8FB000
stack
page read and write
7547000
heap
page read and write
5D1D000
trusted library allocation
page read and write
BB8B000
heap
page read and write
F014000
heap
page read and write
A868000
heap
page read and write
5CE2000
trusted library allocation
page read and write
E67A000
heap
page read and write
F6F3000
heap
page read and write
7FF566F90000
unkown
page readonly
F05F000
heap
page read and write
6A3D000
unkown
page read and write
5D30000
trusted library allocation
page read and write
8BC4000
heap
page read and write
FD70000
heap
page read and write
23E1CF68000
unkown
page read and write
3270000
trusted library allocation
page read and write
8C9F000
heap
page read and write
845D000
stack
page read and write
BC02000
heap
page read and write
E611000
heap
page read and write
5B10000
trusted library allocation
page read and write
8D2F000
heap
page read and write
C89000
heap
page read and write
1011A000
heap
page read and write
2F5A000
stack
page read and write
3249000
stack
page read and write
F474000
heap
page read and write
7FF566B73000
unkown
page readonly
D85D000
heap
page read and write
D84C000
heap
page read and write
7FF566E45000
unkown
page readonly
7FF566BE9000
unkown
page readonly
781C000
unkown
page readonly
1730000
trusted library allocation
page read and write
EFBE000
heap
page read and write
5D30000
trusted library allocation
page read and write
8C9B000
heap
page read and write
7FF566FC5000
unkown
page readonly
F464000
heap
page read and write
875E000
stack
page read and write
1BD13A64000
unkown
page read and write
3AE6000
heap
page read and write
10065000
heap
page read and write
F54F000
heap
page read and write
23E1CF92000
unkown
page read and write
7FF566F06000
unkown
page readonly
73E6000
heap
page read and write
101DF000
heap
page read and write
5D07000
trusted library allocation
page read and write
74A1000
heap
page read and write
5D30000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
2F40000
unkown
page readonly
3350000
unkown
page readonly
FC83000
heap
page read and write
29A3000
heap
page read and write
FD3B000
heap
page read and write
7FF566E45000
unkown
page readonly
7FF566DC8000
unkown
page readonly
EF80000
heap
page read and write
AC45000
heap
page read and write
5CE6000
trusted library allocation
page read and write
8ADA000
heap
page read and write
2DEE000
stack
page read and write
5D07000
trusted library allocation
page read and write
F93000
heap
page read and write
10184000
heap
page read and write
53E4000
heap
page read and write
2F55000
unkown
page read and write
F12A000
heap
page read and write
10E8E000
heap
page read and write
57E3000
trusted library allocation
page read and write
DE33000
heap
page read and write
5D30000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
F767000
heap
page read and write
78F0000
trusted library allocation
page read and write
8C7A000
heap
page read and write
E80000
heap
page read and write
5CFB000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
DC52000
heap
page read and write
5D30000
trusted library allocation
page read and write
A866000
heap
page read and write
F311000
heap
page read and write
DD75000
heap
page read and write
8D69000
heap
page read and write
54A0000
trusted library section
page read and write
AF8F000
unkown
page read and write
A9B1000
heap
page read and write
53D7000
heap
page read and write
5CFB000
trusted library allocation
page read and write
8CA1000
heap
page read and write
7C5B000
stack
page read and write
BA19000
heap
page read and write
CFE687F000
stack
page read and write
7FF566B6D000
unkown
page readonly
4F40000
unkown
page readonly
5D04000
trusted library allocation
page read and write
8A05000
unkown
page read and write
F14F000
heap
page read and write
F8F0000
trusted library allocation
page read and write
8BF5000
heap
page read and write
AAF9000
heap
page read and write
7DF47E300000
trusted library allocation
page readonly
5CFB000
trusted library allocation
page read and write
1E3889D0000
heap
page read and write
DC09000
heap
page read and write
5D07000
trusted library allocation
page read and write
7FF566908000
unkown
page readonly
23E1CF92000
unkown
page read and write
AAEE000
heap
page read and write
7FF566B76000
unkown
page readonly
5CB0000
unkown
page read and write
5D30000
trusted library allocation
page read and write
4840000
unkown
page read and write
FFB8000
heap
page read and write
76D3000
unkown
page readonly
74F7000
heap
page read and write
FAFB000
stack
page read and write
DC22000
heap
page read and write
DD58000
heap
page read and write
7FF566F90000
unkown
page readonly
53E4000
heap
page read and write
BFB000
heap
page read and write
13E5000
heap
page read and write
3141000
unkown
page read and write
23E1CF73000
unkown
page read and write
69CE000
unkown
page read and write
781C000
unkown
page readonly
DA68B7F000
stack
page read and write
F769000
heap
page read and write
5D30000
trusted library allocation
page read and write
23E1CF6B000
unkown
page read and write
FD58000
heap
page read and write
DB63000
heap
page read and write
D86F000
heap
page read and write
87DB000
stack
page read and write
AAF9000
heap
page read and write
5190000
trusted library section
page read and write
5D30000
trusted library allocation
page read and write
BB10000
trusted library allocation
page read and write
5780000
heap
page read and write
750A000
heap
page read and write
75C0000
trusted library section
page readonly
A860000
heap
page read and write
8C37000
heap
page read and write
EF9000
heap
page read and write
5CFB000
trusted library allocation
page read and write
DC46000
heap
page read and write
CFE657A000
stack
page read and write
51F0000
trusted library section
page read and write
AB8D000
heap
page read and write
F60000
heap
page read and write
F05C000
heap
page read and write
5D07000
trusted library allocation
page read and write
A9FB000
heap
page read and write
7FF566B70000
unkown
page readonly
10E24000
heap
page read and write
EF0000
heap
page read and write
F494000
heap
page read and write
CA90000
trusted library allocation
page read and write
BB60000
heap
page read and write
5D30000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
E5F2000
heap
page read and write
DB45000
heap
page read and write
4FA0000
unkown
page read and write
7DF47E1F1000
trusted library allocation
page execute read
5B10000
trusted library allocation
page read and write
F613000
heap
page read and write
1E527F20000
trusted library allocation
page read and write
7FF56691F000
unkown
page readonly
D80C000
heap
page read and write
8CA3000
heap
page read and write
D45000
heap
page read and write
73E9000
heap
page read and write
1E388C48000
unkown
page read and write
BB30000
trusted library allocation
page read and write
7FFF97709000
unkown
page readonly
3A85000
heap
page read and write
74A0000
heap
page read and write
BB60000
heap
page read and write
8D80000
heap
page read and write
7FF566FDB000
unkown
page readonly
1F4EB04B000
unkown
page read and write
2EE6000
unkown
page read and write
F160000
heap
page read and write
BB70000
heap
page read and write
FF30000
heap
page read and write
BB13000
trusted library allocation
page read and write
11A0000
unkown
page readonly
D846000
heap
page read and write
778C000
unkown
page readonly
23E1C600000
unkown
page read and write
8D2F000
heap
page read and write
BBD6000
heap
page read and write
E5F1000
heap
page read and write
A8D5000
heap
page read and write
10DE1000
heap
page read and write
8DB8000
unkown
page read and write
F769000
heap
page read and write
42D1000
trusted library allocation
page read and write
3234000
trusted library allocation
page read and write
26635D70000
heap
page read and write
3805000
heap
page read and write
5D30000
trusted library allocation
page read and write
8C5D000
heap
page read and write
7815000
unkown
page readonly
7FF566E0A000
unkown
page readonly
75D5000
trusted library allocation
page read and write
4F90000
unkown
page readonly
FD6A000
heap
page read and write
F464000
heap
page read and write
F10F000
heap
page read and write
7180000
heap
page read and write
5D30000
trusted library allocation
page read and write
D8A7000
heap
page read and write
FC87000
heap
page read and write
74F7000
heap
page read and write
A86A000
heap
page read and write
325C000
trusted library allocation
page read and write
10DEF000
heap
page read and write
57A0000
heap
page read and write
F476000
heap
page read and write
23E1CF92000
unkown
page read and write
46E0000
unkown
page read and write
23E1CF5B000
unkown
page read and write
29A3000
heap
page read and write
5D30000
trusted library allocation
page read and write
F55F000
heap
page read and write
7FF566D39000
unkown
page readonly
3320000
unkown
page read and write
D9F9000
heap
page read and write
8BF0000
heap
page read and write
5B10000
trusted library allocation
page read and write
F3E0000
heap
page read and write
C5EC000
unkown
page readonly
AF6000
stack
page read and write
DB84000
heap
page read and write
F492000
heap
page read and write
4880000
unkown
page read and write
3CD0000
heap
page read and write
5D09000
trusted library allocation
page read and write
A9B5000
heap
page read and write
8E01000
unkown
page read and write
7547000
heap
page read and write
BCE8000
stack
page read and write
450817F000
stack
page read and write
8D6D000
heap
page read and write
8D6B000
heap
page read and write
5D07000
trusted library allocation
page read and write
8D63000
heap
page read and write
DC32000
heap
page read and write
5D30000
trusted library allocation
page read and write
7000000
unkown
page readonly
F47C000
heap
page read and write
BC52000
heap
page read and write
B50000
trusted library allocation
page read and write
EB8000
heap
page read and write
5D07000
trusted library allocation
page read and write
3340000
unkown
page read and write
5D1F000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
23E1CF93000
unkown
page read and write
4FA0000
unkown
page read and write
E6F0000
unkown
page read and write
7FF566D5C000
unkown
page readonly
F02C000
heap
page read and write
DEA6000
heap
page read and write
CB7A000
stack
page read and write
4B1C000
stack
page read and write
89FE000
heap
page read and write
8B5F000
heap
page read and write
3929000
stack
page read and write
8B3B000
heap
page read and write
FAB4000
unkown
page read and write
5CE2000
trusted library allocation
page read and write
4670000
unkown
page read and write
7547000
heap
page read and write
3A7F000
heap
page read and write
5D30000
trusted library allocation
page read and write
46C0000
unkown
page read and write
143D000
heap
page read and write
E5B4000
heap
page read and write
7BDD000
stack
page read and write
5CFB000
trusted library allocation
page read and write
FF19000
heap
page read and write
3311000
trusted library allocation
page read and write
25A9AF13000
unkown
page read and write
F322000
heap
page read and write
F10F000
heap
page read and write
7FF566C5A000
unkown
page readonly
EE05000
unkown
page read and write
74F2000
heap
page read and write
5B00000
trusted library allocation
page read and write
FF6A000
stack
page read and write
1F4EB802000
unkown
page read and write
C893000
trusted library allocation
page read and write
8C49000
heap
page read and write
7FFF97DE0000
unkown
page read and write
550C000
stack
page read and write
382B000
heap
page read and write
7807000
unkown
page readonly
8D16000
heap
page read and write
8C1B000
unkown
page read and write
51A0000
trusted library section
page read and write
5B00000
trusted library allocation
page read and write
6A32000
unkown
page read and write
82DD000
stack
page read and write
7FFF97827000
unkown
page readonly
7360000
heap
page read and write
F476000
heap
page read and write
7FF566FA1000
unkown
page readonly
AB7A37D000
stack
page read and write
5CFB000
trusted library allocation
page read and write
1F17DE70000
unkown
page read and write
3889000
heap
page read and write
CAC0000
trusted library allocation
page read and write
7DF42C610000
trusted library allocation
page readonly
36AF000
stack
page read and write
5AA0000
trusted library section
page readonly
A40000
unkown
page read and write
5D30000
trusted library allocation
page read and write
8C6D000
heap
page read and write
F478000
heap
page read and write
C89000
heap
page read and write
3B28000
stack
page read and write
C8C0000
trusted library allocation
page read and write
75A2000
unkown
page readonly
4DF0000
unkown
page read and write
8D89000
heap
page read and write
8C53000
heap
page read and write
ABD7000
heap
page read and write
8A65000
heap
page read and write
FD43000
heap
page read and write
F8B0000
trusted library allocation
page read and write
53E6000
heap
page read and write
5D30000
trusted library allocation
page read and write
23E1CF75000
unkown
page read and write
4A9B000
stack
page read and write
5CFB000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
8A61000
heap
page read and write
534D000
heap
page read and write
5D30000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
8BC6000
heap
page read and write
362A000
stack
page read and write
DF93000
heap
page read and write
4C40000
unkown
page write copy
57E0000
trusted library allocation
page read and write
2F5A000
unkown
page read and write
74EF000
heap
page read and write
7FF566F17000
unkown
page readonly
1180000
heap
page read and write
8C36000
heap
page read and write
AC3C000
heap
page read and write
7FF566C79000
unkown
page readonly
B3EE000
stack
page read and write
A9B2000
heap
page read and write
5D07000
trusted library allocation
page read and write
8D37000
heap
page read and write
F160000
heap
page read and write
F60D000
heap
page read and write
5D30000
trusted library allocation
page read and write
204EA6FE000
unkown
page read and write
5AF0000
trusted library allocation
page read and write
FDAB000
heap
page read and write
7FF566EEC000
unkown
page readonly
DC50000
heap
page read and write
DC46000
heap
page read and write
8D3F000
heap
page read and write
32B0000
trusted library allocation
page read and write
10072000
heap
page read and write
7FF566E0A000
unkown
page readonly
DF79000
heap
page read and write
A983000
heap
page read and write
8C5F000
heap
page read and write
23E1CF67000
unkown
page read and write
8D65000
heap
page read and write
1BD13B02000
unkown
page read and write
F498000
heap
page read and write
F48C000
heap
page read and write
8C7A000
heap
page read and write
F126000
heap
page read and write
7FF566EFE000
unkown
page readonly
8D19000
heap
page read and write
7382000
heap
page read and write
7FF5668C1000
unkown
page readonly
FC1000
heap
page read and write
23E1C650000
unkown
page read and write
AC17000
heap
page read and write
4840000
trusted library allocation
page read and write
8CD5000
unkown
page read and write
8ACF000
unkown
page read and write
3249000
stack
page read and write
74A0000
heap
page read and write
7740000
trusted library allocation
page read and write
533D000
stack
page read and write
7DF47E250000
trusted library allocation
page readonly
F268000
heap
page read and write
75D0000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
A20000
unkown
page read and write
19A5000
heap
page read and write
32A0000
trusted library allocation
page read and write
5323000
heap
page read and write
198D000
heap
page read and write
7FF566AAA000
unkown
page readonly
AF79000
unkown
page read and write
9CF000
heap
page read and write
5D07000
trusted library allocation
page read and write
7FF566CFA000
unkown
page readonly
23E1CF99000
unkown
page read and write
7547000
heap
page read and write
A9F8000
heap
page read and write
4A18000
stack
page read and write
8CD3000
heap
page read and write
5310000
heap
page read and write
7FF566866000
unkown
page readonly
23E1CF92000
unkown
page read and write
5D07000
trusted library allocation
page read and write
7FF566C3A000
unkown
page readonly
5A0000
remote allocation
page read and write
76F0000
trusted library allocation
page read and write
E68E000
heap
page read and write
5D17000
trusted library allocation
page read and write
A898000
heap
page read and write
8BFC000
unkown
page read and write
8C46000
heap
page read and write
5D30000
trusted library allocation
page read and write
535E000
stack
page read and write
F940000
trusted library allocation
page read and write
5ABF000
stack
page read and write
DEB4000
heap
page read and write
DC06000
heap
page read and write
F337000
heap
page read and write
AB29000
heap
page read and write
F55A000
heap
page read and write
A8FF000
heap
page read and write
8BCD000
heap
page read and write
D834000
heap
page read and write
88E8000
stack
page read and write
F73000
heap
page read and write
5800000
trusted library allocation
page read and write
BBAB000
heap
page read and write
AF79000
unkown
page read and write
26635BB7000
heap
page read and write
FC7000
heap
page read and write
23E1CFB6000
unkown
page read and write
EB40000
heap
page read and write
2F50000
unkown
page read and write
B50000
trusted library allocation
page read and write
A8A8000
heap
page read and write
AA61000
heap
page read and write
4680000
unkown
page read and write
B91000
heap
page read and write
5B00000
trusted library allocation
page read and write
7FF566F69000
unkown
page readonly
5720000
heap
page read and write
5D07000
trusted library allocation
page read and write
EF0000
heap
page read and write
537A000
heap
page read and write
7DF47E300000
trusted library allocation
page readonly
5B00000
trusted library allocation
page read and write
537A000
heap
page read and write
8BFC000
unkown
page read and write
5830000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
7512000
heap
page read and write
7C04000
trusted library allocation
page read and write
1499000
heap
page read and write
F197000
heap
page read and write
8D57000
heap
page read and write
5B00000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
F494000
heap
page read and write
574C000
heap
page read and write
940000
trusted library allocation
page read and write
7725000
unkown
page readonly
A8A7000
heap
page read and write
10D21000
heap
page read and write
77DE000
unkown
page readonly
7800000
unkown
page readonly
C787000
unkown
page readonly
5B00000
trusted library allocation
page read and write
E8F000
stack
page read and write
5AF0000
trusted library allocation
page read and write
8D1B000
heap
page read and write
77B5000
unkown
page readonly
3CAA000
stack
page read and write
7519000
heap
page read and write
7FFF977DA000
unkown
page readonly
23E1C671000
unkown
page read and write
AAD2000
heap
page read and write
F468000
heap
page read and write
9C4000
heap
page read and write
53EE000
heap
page read and write
CAD99FC000
stack
page read and write
A86A000
heap
page read and write
EEA3000
unkown
page read and write
8C25000
heap
page read and write
DE71000
heap
page read and write
AB27000
heap
page read and write
78F5000
stack
page read and write
23E1CF92000
unkown
page read and write
204EA410000
trusted library allocation
page read and write
53E4000
heap
page read and write
54A0000
trusted library section
page read and write
FD66000
heap
page read and write
6A32000
unkown
page read and write
7FF566E3D000
unkown
page readonly
48EE000
stack
page read and write
2959000
stack
page read and write
F258000
heap
page read and write
F494000
heap
page read and write
781C000
unkown
page readonly
3EE0000
heap
page read and write
D41000
heap
page read and write
A866000
heap
page read and write
F4D3000
heap
page read and write
F160000
heap
page read and write
7FF566F61000
unkown
page readonly
53D7000
heap
page read and write
7FFF97DDC000
unkown
page read and write
26635CB0000
heap
page read and write
D4D0000
trusted library allocation
page read and write
8C37000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF566C99000
unkown
page readonly
5D06000
trusted library allocation
page read and write
749474F000
stack
page read and write
7FF566ABB000
unkown
page readonly
8A52000
heap
page read and write
DB6D000
heap
page read and write
5CE2000
trusted library allocation
page read and write
BB5E000
unkown
page readonly
23E1CF6D000
unkown
page read and write
5D30000
trusted library allocation
page read and write
DB59000
heap
page read and write
8C9B000
heap
page read and write
8C73000
heap
page read and write
7C10000
trusted library allocation
page read and write
2F02000
unkown
page read and write
8CAA000
heap
page read and write
AAD5000
heap
page read and write
10DE3000
heap
page read and write
8C3B000
unkown
page read and write
23E1C6F8000
unkown
page read and write
CFE6679000
stack
page read and write
7FF566B90000
unkown
page readonly
1026A000
heap
page read and write
A8A2000
heap
page read and write
7FF566E70000
unkown
page readonly
DDEA000
heap
page read and write
BE0000
unkown
page read and write
74FC000
heap
page read and write
7547000
heap
page read and write
3263000
heap
page read and write
7FF566F7B000
unkown
page readonly
53E6000
heap
page read and write
8CFF000
heap
page read and write
3AC1000
heap
page read and write
57A0000
heap
page read and write
53D7000
heap
page read and write
7FF56705C000
unkown
page readonly
F12C000
heap
page read and write
D859000
heap
page read and write
5CEA7AE000
stack
page read and write
F48E000
heap
page read and write
8A63000
heap
page read and write
F9F3000
unkown
page read and write
7FFF97DD5000
unkown
page read and write
7FF566BCE000
unkown
page readonly
5B20000
trusted library allocation
page read and write
10DD5000
heap
page read and write
7590000
trusted library allocation
page read and write
10063000
heap
page read and write
86E7000
stack
page read and write
18DE000
stack
page read and write
23E1CF5B000
unkown
page read and write
DC34000
heap
page read and write
5D07000
trusted library allocation
page read and write
7494A79000
stack
page read and write
5810000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
7FF566F17000
unkown
page readonly
1005A000
heap
page read and write
DB7B000
heap
page read and write
34C6000
heap
page read and write
32A0000
trusted library allocation
page read and write
D61000
heap
page read and write
32CA000
stack
page read and write
1F4EB04D000
unkown
page read and write
7FF566DF7000
unkown
page readonly
7FF566FEC000
unkown
page readonly
5D30000
trusted library allocation
page read and write
F551000
heap
page read and write
5CF3000
trusted library allocation
page read and write
7FFF977BA000
unkown
page read and write
23E1CF93000
unkown
page read and write
EDF0000
unkown
page read and write
89F9000
unkown
page read and write
3260000
heap
page read and write
5CEA000
trusted library allocation
page read and write
BBE8000
heap
page read and write
CA90000
trusted library allocation
page read and write
B4E3000
unkown
page readonly
2E8D000
unkown
page read and write
3B30000
trusted library allocation
page read and write
F48A000
heap
page read and write
885B000
stack
page read and write
BB9C000
heap
page read and write
8C0D000
unkown
page read and write
5D30000
trusted library allocation
page read and write
A983000
heap
page read and write
5B00000
trusted library allocation
page read and write
2F16000
unkown
page read and write
7FF5668FA000
unkown
page readonly
BBC000
heap
page read and write
7FFF97DDE000
unkown
page read and write
2EE9000
unkown
page read and write
D990000
heap
page read and write
5AF0000
trusted library allocation
page read and write
2970000
unkown
page readonly
7494BFA000
stack
page read and write
F49C000
heap
page read and write
7FF566A8F000
unkown
page readonly
3100000
unkown
page read and write
5C9E000
stack
page read and write
86E7000
stack
page read and write
8D0A000
heap
page read and write
F318000
heap
page read and write
830000
unkown
page read and write
46B3000
unkown
page read and write
8D8F000
heap
page read and write
3A9F000
heap
page read and write
8D8F000
heap
page read and write
5D30000
trusted library allocation
page read and write
E631000
heap
page read and write
7FF566E20000
unkown
page readonly
5D07000
trusted library allocation
page read and write
ABCB000
heap
page read and write
26635BC0000
heap
page read and write
5CFB000
trusted library allocation
page read and write
A8A9000
heap
page read and write
204EA600000
unkown
page read and write
B90000
heap
page read and write
8CFF000
heap
page read and write
8C5A000
heap
page read and write
ABFE000
heap
page read and write
F10F000
heap
page read and write
2880000
unkown
page readonly
F240000
heap
page read and write
6BD8000
stack
page read and write
CA00000
trusted library allocation
page read and write
A868000
heap
page read and write
A983000
heap
page read and write
5CFB000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
B34000
heap
page read and write
4880000
unkown
page read and write
E6FC000
unkown
page read and write
8DB8000
unkown
page read and write
5CC5000
heap
page read and write
A921000
heap
page read and write
3DF9000
stack
page read and write
5D30000
trusted library allocation
page read and write
8C17000
unkown
page read and write
5D12000
trusted library allocation
page read and write
5D1E000
trusted library allocation
page read and write
CB9C000
stack
page read and write
5CFB000
trusted library allocation
page read and write
F492000
heap
page read and write
D17D000
stack
page read and write
DF98000
heap
page read and write
DDFA000
heap
page read and write
5CB0000
unkown
page read and write
1E527B80000
heap
page read and write
2542424E000
unkown
page read and write
5D30000
trusted library allocation
page read and write
8CA9000
heap
page read and write
3330000
unkown
page readonly
7FF566C4B000
unkown
page readonly
8A65000
heap
page read and write
5D30000
trusted library allocation
page read and write
51AF000
heap
page read and write
8C15000
unkown
page read and write
7512000
heap
page read and write
53D7000
heap
page read and write
8D97000
heap
page read and write
5D30000
trusted library allocation
page read and write
BF0000
unkown
page readonly
10086000
heap
page read and write
5CEA000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
14AD000
heap
page read and write
5D30000
trusted library allocation
page read and write
101ED000
heap
page read and write
DF77000
heap
page read and write
AB22000
heap
page read and write
8C17000
unkown
page read and write
10DD5000
heap
page read and write
77B3000
trusted library allocation
page read and write
F462000
heap
page read and write
8D39000
heap
page read and write
3300000
trusted library allocation
page read and write
382B000
heap
page read and write
537A000
heap
page read and write
AEE3BFE000
stack
page read and write
BD70000
trusted library allocation
page read and write
4A9B000
stack
page read and write
F4D9000
heap
page read and write
8B92000
heap
page read and write
DC4A000
heap
page read and write
A86A000
heap
page read and write
1183000
heap
page read and write
8A69000
heap
page read and write
8C5A000
heap
page read and write
DD4E000
heap
page read and write
AADB000
heap
page read and write
23E1D463000
unkown
page read and write
204EA860000
trusted library allocation
page read and write
E8EE000
stack
page read and write
DADC000
heap
page read and write
8D99000
heap
page read and write
8BB1000
heap
page read and write
4890000
unkown
page readonly
170E000
stack
page read and write
B2E8000
stack
page read and write
7FF566F13000
unkown
page readonly
8C98000
heap
page read and write
DC1E000
heap
page read and write
7FF566DBD000
unkown
page readonly
1400000
heap
page read and write
E5B4000
heap
page read and write
3A85000
heap
page read and write
25424245000
unkown
page read and write
A9D4000
heap
page read and write
F47A000
heap
page read and write
A9C5000
heap
page read and write
F4C4000
heap
page read and write
5D30000
trusted library allocation
page read and write
38A5000
heap
page read and write
8D87000
heap
page read and write
189E000
stack
page read and write
3A4C000
heap
page read and write
BB9C000
unkown
page readonly
D7F9000
heap
page read and write
8C86000
heap
page read and write
DA8D000
heap
page read and write
8B5F000
heap
page read and write
46C3000
unkown
page read and write
A9FA000
heap
page read and write
B682000
heap
page read and write
5CB0000
trusted library allocation
page read and write
F8B3000
trusted library allocation
page read and write
2DDD000
stack
page read and write
F030000
heap
page read and write
3A2E000
stack
page read and write
30E0000
unkown
page readonly
EE27000
unkown
page read and write
5CFB000
trusted library allocation
page read and write
F460000
heap
page read and write
5D07000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
7FF566ACD000
unkown
page readonly
2FA0000
trusted library allocation
page read and write
5D13000
trusted library allocation
page read and write
FD56000
heap
page read and write
B9EB000
stack
page read and write
5D30000
trusted library allocation
page read and write
4FD0000
unkown
page readonly
5353000
heap
page read and write
1E388C13000
unkown
page read and write
186E000
stack
page read and write
B34000
heap
page read and write
EA0000
unkown
page read and write
204EA520000
trusted library allocation
page read and write
FF41000
heap
page read and write
1BD13CF0000
trusted library allocation
page read and write
46E0000
unkown
page read and write
F488000
heap
page read and write
5720000
heap
page read and write
5D30000
trusted library allocation
page read and write
F258000
heap
page read and write
5A0000
remote allocation
page read and write
8BA8000
heap
page read and write
10C20000
trusted library allocation
page read and write
A9B5000
heap
page read and write
538B000
heap
page read and write
5D30000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
F3A9000
heap
page read and write
8A0C000
heap
page read and write
8A61000
heap
page read and write
2F50000
unkown
page read and write
5D07000
trusted library allocation
page read and write
A8A2000
heap
page read and write
1E528A70000
trusted library allocation
page read and write
3B08000
heap
page read and write
5D15000
trusted library allocation
page read and write
8C36000
heap
page read and write
F75E000
heap
page read and write
1110000
system
page execute and read and write
FD5E000
heap
page read and write
D84E000
heap
page read and write
2542425A000
unkown
page read and write
DB6D000
heap
page read and write
D887000
heap
page read and write
8D2C000
heap
page read and write
7832000
unkown
page readonly
11A0000
unkown
page readonly
DA8D000
heap
page read and write
17D0000
heap
page read and write
DC32000
heap
page read and write
1036E000
stack
page read and write
DC1E000
heap
page read and write
5CEA000
trusted library allocation
page read and write
306C000
stack
page read and write
10C20000
trusted library allocation
page read and write
541F000
unclassified section
page read and write
1BD13E0A000
unkown
page read and write
5D1F000
trusted library allocation
page read and write
B36B000
stack
page read and write
DB65000
heap
page read and write
53E6000
heap
page read and write
FD7E000
heap
page read and write
FF24000
heap
page read and write
1E388C4B000
unkown
page read and write
865F000
stack
page read and write
E551000
heap
page read and write
7DF47E301000
trusted library allocation
page execute read
8A52000
heap
page read and write
EB50000
unkown
page execute and read and write
760A000
unkown
page readonly
83DB000
stack
page read and write
52AE000
stack
page read and write
8C7B000
heap
page read and write
5360000
trusted library allocation
page read and write
7FF567065000
unkown
page readonly
5D30000
trusted library allocation
page read and write
67C0000
heap
page read and write
7FF566B31000
unkown
page readonly
7032000
unkown
page readonly
204E4E90000
unkown
page read and write
E615000
heap
page read and write
5718000
heap
page read and write
E5D7000
heap
page read and write
7FF566C5A000
unkown
page readonly
B0DB000
stack
page read and write
F46E000
heap
page read and write
76BE000
unkown
page readonly
1BD13A28000
unkown
page read and write
5D30000
trusted library allocation
page read and write
5D0F000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
7FF566BCE000
unkown
page readonly
DD75000
heap
page read and write
1183000
heap
page read and write
BB6F000
heap
page read and write
51F0000
trusted library section
page read and write
FD78000
heap
page read and write
CAD9FFE000
stack
page read and write
7547000
heap
page read and write
2880000
unkown
page readonly
5B00000
trusted library allocation
page read and write
F030000
heap
page read and write
DEB4000
heap
page read and write
B87327C000
stack
page read and write
B50000
trusted library allocation
page read and write
147A000
heap
page read and write
3AFC000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF567065000
unkown
page readonly
FD0000
unkown
page readonly
7E10000
trusted library allocation
page read and write
F04C000
heap
page read and write
DB95000
heap
page read and write
8BFF000
unkown
page read and write
5D02000
trusted library allocation
page read and write
8CAA000
heap
page read and write
BCA0000
unkown
page readonly
5CE3000
trusted library allocation
page read and write
87DB000
stack
page read and write
BE67000
stack
page read and write
D920000
heap
page read and write
2542427B000
unkown
page read and write
8D80000
heap
page read and write
F60000
heap
page read and write
3929000
stack
page read and write
2F02000
unkown
page read and write
6968000
stack
page read and write
36AF000
stack
page read and write
7FF566B7C000
unkown
page readonly
5B00000
trusted library allocation
page read and write
204EA61A000
unkown
page read and write
AF6000
stack
page read and write
7465000
heap
page read and write
8D5B000
heap
page read and write
7F59000
stack
page read and write
74FC000
heap
page read and write
3857000
heap
page read and write
3D2A000
stack
page read and write
5CFB000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
74FC000
heap
page read and write
10B0000
unkown
page read and write
7515000
heap
page read and write
EFAE000
heap
page read and write
FFB8000
heap
page read and write
ABD7000
heap
page read and write
7705000
trusted library allocation
page read and write
3B28000
stack
page read and write
1BD13E02000
unkown
page read and write
2E58000
stack
page read and write
AB41000
heap
page read and write
5190000
trusted library section
page read and write
29A3000
heap
page read and write
8D87000
heap
page read and write
53D7000
heap
page read and write
52E0000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
10088000
heap
page read and write
EA0000
unkown
page read and write
10D0F000
heap
page read and write
5CE3000
trusted library allocation
page read and write
8C98000
heap
page read and write
7FF567073000
unkown
page readonly
5D30000
trusted library allocation
page read and write
5348000
heap
page read and write
3950000
trusted library allocation
page read and write
7FF566C44000
unkown
page readonly
BB6F000
heap
page read and write
749A000
heap
page read and write
885B000
stack
page read and write
74F5000
unkown
page readonly
49DE000
stack
page read and write
5B00000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
EFBC000
heap
page read and write
53E4000
heap
page read and write
DDE9000
heap
page read and write
7FF566C7F000
unkown
page readonly
A9FB000
heap
page read and write
7FF566E80000
unkown
page readonly
5D07000
trusted library allocation
page read and write
7FF566E45000
unkown
page readonly
204E5700000
unkown
page read and write
2F5A000
stack
page read and write
5D12000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
B1EE000
stack
page read and write
7A00000
unkown
page readonly
8A03000
unkown
page read and write
23E1CF7D000
unkown
page read and write
F47C000
heap
page read and write
D477000
stack
page read and write
1723000
trusted library allocation
page execute and read and write
8C1F000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF566E85000
unkown
page readonly
1F17E470000
unkown
page read and write
FD5C000
heap
page read and write
74F7000
heap
page read and write
AB51000
heap
page read and write
FF0000
unkown
page readonly
CA70000
trusted library allocation
page read and write
4810000
unkown
page read and write
5323000
heap
page read and write
7610000
trusted library allocation
page read and write
3249000
stack
page read and write
749A000
heap
page read and write
D86000
system
page read and write
F05F000
heap
page read and write
5CF3000
trusted library allocation
page read and write
8A65000
heap
page read and write
7DF47E1E1000
trusted library allocation
page execute read
5D11000
trusted library allocation
page read and write
19A5000
heap
page read and write
AA55000
heap
page read and write
7DF47E190000
trusted library allocation
page readonly
3A7D000
heap
page read and write
3D2A000
stack
page read and write
8A06000
heap
page read and write
F46A000
heap
page read and write
AACA000
heap
page read and write
2F40000
unkown
page readonly
7FFF97DD5000
unkown
page read and write
EDF0000
unkown
page read and write
5CE2000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
8D8E000
heap
page read and write
8D5D000
heap
page read and write
2EDF000
stack
page read and write
AC2E000
heap
page read and write
AA7B000
heap
page read and write
AADB000
heap
page read and write
FD50000
heap
page read and write
DC06000
heap
page read and write
7D917E000
stack
page read and write
805D000
stack
page read and write
AF6000
stack
page read and write
D37E000
stack
page read and write
53EE000
heap
page read and write
F47A000
heap
page read and write
1AC6BF00000
unkown
page read and write
FE0000
heap
page read and write
DFEB000
stack
page read and write
53E4000
heap
page read and write
37B0000
heap
page read and write
E5D5000
heap
page read and write
F322000
heap
page read and write
F004000
heap
page read and write
5D1F000
trusted library allocation
page read and write
7FF566F17000
unkown
page readonly
F01C000
heap
page read and write
CAB0000
trusted library allocation
page read and write
3AA6000
stack
page read and write
AB31000
heap
page read and write
DC2C000
heap
page read and write
9C9000
heap
page read and write
23E1CF7B000
unkown
page read and write
B46C000
stack
page read and write
23E1C64E000
unkown
page read and write
25A9ADD0000
unkown
page read and write
A9FA000
heap
page read and write
7DF47E301000
trusted library allocation
page execute read
74F5000
unkown
page readonly
5D30000
trusted library allocation
page read and write
8C2E000
unkown
page read and write
5B00000
trusted library allocation
page read and write
7547000
heap
page read and write
8D5A000
heap
page read and write
BC38000
heap
page read and write
5D09000
trusted library allocation
page read and write
20A180C0000
heap
page read and write
5D0E000
trusted library allocation
page read and write
5310000
heap
page read and write
1006A000
heap
page read and write
7809000
unkown
page readonly
5B00000
trusted library allocation
page read and write
7FF541D9F000
unkown
page readonly
74946CA000
stack
page read and write
25424269000
unkown
page read and write
F62B000
heap
page read and write
DA99000
heap
page read and write
5D30000
trusted library allocation
page read and write
AC00000
heap
page read and write
7FF566D89000
unkown
page readonly
BDFD000
stack
page read and write
EF9E000
heap
page read and write
AEE7000
stack
page read and write
E70000
unkown
page readonly
A40000
unkown
page read and write
8D97000
heap
page read and write
A9B1000
heap
page read and write
51A0000
trusted library section
page read and write
5800000
trusted library allocation
page read and write
3D2D000
stack
page read and write
BB8E000
heap
page read and write
F476000
heap
page read and write
7FF5668C9000
unkown
page readonly
7C00000
trusted library allocation
page read and write
8CD5000
unkown
page read and write
5440000
unkown
page read and write
8BB4000
heap
page read and write
52E0000
trusted library allocation
page read and write
F486000
heap
page read and write
2970000
unkown
page readonly
7FFF97DDD000
unkown
page write copy
80DD000
stack
page read and write
10358000
heap
page read and write
F12A000
heap
page read and write
57E0000
trusted library allocation
page read and write
26635BD2000
heap
page read and write
CFE607E000
stack
page read and write
1F4EB052000
unkown
page read and write
23E1C655000
unkown
page read and write
7FF566B7C000
unkown
page readonly
10C00000
trusted library allocation
page read and write
EE54000
unkown
page read and write
53E6000
heap
page read and write
D832000
heap
page read and write
8BB6000
heap
page read and write
6A2E000
unkown
page read and write
F008000
heap
page read and write
DDF4000
heap
page read and write
3855000
heap
page read and write
74EF000
heap
page read and write
5D30000
trusted library allocation
page read and write
3B14000
heap
page read and write
766C000
unkown
page readonly
D22000
heap
page read and write
4A9B000
stack
page read and write
DC26000
heap
page read and write
DC20000
heap
page read and write
85EF000
stack
page read and write
CAF3000
trusted library allocation
page read and write
C880000
trusted library allocation
page read and write
3AC1000
heap
page read and write
EC23000
unkown
page execute and read and write
23E1CFA4000
unkown
page read and write
38A7000
heap
page read and write
AAD7000
heap
page read and write
D85D000
heap
page read and write
25A9AC00000
heap
page read and write
1183000
heap
page read and write
111C000
system
page execute and read and write
7FDC000
stack
page read and write
74FA000
heap
page read and write
17D0000
heap
page read and write
5B00000
trusted library allocation
page read and write
3261000
trusted library allocation
page read and write
CBFE000
stack
page read and write
5D07000
trusted library allocation
page read and write
F8B3000
trusted library allocation
page read and write
8D0A000
heap
page read and write
5CE2000
trusted library allocation
page read and write
830000
unkown
page read and write
F6AA000
heap
page read and write
204EA4E0000
trusted library allocation
page read and write
3628000
stack
page read and write
BB6F000
heap
page read and write
C87A000
stack
page read and write
DB50000
heap
page read and write
7515000
heap
page read and write
A862000
heap
page read and write
7DF47E211000
trusted library allocation
page execute read
7FF566F1D000
unkown
page readonly
735E000
stack
page read and write
3320000
unkown
page read and write
DB5D000
heap
page read and write
7FF566F06000
unkown
page readonly
5719000
heap
page read and write
FC9000
heap
page read and write
56D32BC000
stack
page read and write
4B9C000
stack
page read and write
8D33000
heap
page read and write
F2D3000
heap
page read and write
8C60000
heap
page read and write
7FF566D39000
unkown
page readonly
BC2C000
unkown
page readonly
EF9000
heap
page read and write
D7EF000
heap
page read and write
BBC000
heap
page read and write
AA65000
heap
page read and write
7645000
trusted library allocation
page read and write
D81E000
stack
page read and write
8C48000
heap
page read and write
DADC000
heap
page read and write
5D30000
trusted library allocation
page read and write
DC4A000
heap
page read and write
CA00000
heap
page read and write
7FF566F44000
unkown
page readonly
204EA4E0000
trusted library allocation
page read and write
BB8000
heap
page read and write
F6BF000
heap
page read and write
8DB2000
unkown
page read and write
D846000
heap
page read and write
100A2000
heap
page read and write
1496000
heap
page read and write
5AF0000
trusted library allocation
page read and write
8A5C000
heap
page read and write
AACA000
heap
page read and write
A921000
heap
page read and write
1E527BD2000
heap
page read and write
8BFF000
unkown
page read and write
BFB2000
unkown
page readonly
F45F000
heap
page read and write
5D07000
trusted library allocation
page read and write
A8C1000
heap
page read and write
DEF5000
heap
page read and write
4FD0000
unkown
page readonly
5CF3000
trusted library allocation
page read and write
E72A000
unkown
page read and write
A8C1000
heap
page read and write
6949000
unkown
page read and write
D7BC000
heap
page read and write
54A0000
trusted library section
page read and write
23E1CF92000
unkown
page read and write
EFFC000
heap
page read and write
23E1CF78000
unkown
page read and write
23E1C6E2000
unkown
page read and write
B34000
heap
page read and write
2959000
stack
page read and write
5A60000
trusted library allocation
page read and write
FECF000
heap
page read and write
7FF566B23000
unkown
page readonly
2959000
stack
page read and write
ED0000
trusted library allocation
page execute and read and write
BC52000
heap
page read and write
52E0000
trusted library allocation
page read and write
DC20000
heap
page read and write
588D000
stack
page read and write
BD0000
unkown
page readonly
7FF566CFD000
unkown
page readonly
AB99000
heap
page read and write
EDF0000
unkown
page read and write
E67A000
heap
page read and write
D5B6000
heap
page read and write
B951000
unkown
page readonly
8CF4000
heap
page read and write
7829000
unkown
page readonly
3817000
heap
page read and write
3B2C000
stack
page read and write
5D07000
trusted library allocation
page read and write
AA61000
heap
page read and write
23E1C713000
unkown
page read and write
BC8C000
heap
page read and write
B50000
unkown
page read and write
F14F000
heap
page read and write
8CA9000
heap
page read and write
FFBC000
heap
page read and write
5D30000
trusted library allocation
page read and write
A9B2000
heap
page read and write
DD3C000
heap
page read and write
1BD13A39000
unkown
page read and write
7FF566B14000
unkown
page readonly
AC33000
heap
page read and write
F462000
heap
page read and write
7770000
trusted library allocation
page read and write
53E9000
heap
page read and write
8C80000
heap
page read and write
5CFB000
trusted library allocation
page read and write
1491000
heap
page read and write
286A000
unkown
page read and write
7FAA0000
trusted library allocation
page execute and read and write
F49A000
heap
page read and write
53E4000
heap
page read and write
10C30000
trusted library allocation
page read and write
5EB7000
stack
page read and write
53E6000
heap
page read and write
3855000
heap
page read and write
519E000
heap
page read and write
8D9B000
heap
page read and write
8CF8000
heap
page read and write
5CFB000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
1230000
trusted library allocation
page execute and read and write
8C1B000
unkown
page read and write
48A0000
unkown
page read and write
4690000
unkown
page read and write
10280000
heap
page read and write
5D30000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
25A9AE13000
unkown
page read and write
BB6A000
heap
page read and write
8D5A000
heap
page read and write
23E1CFBE000
unkown
page read and write
7B6E000
stack
page read and write
1005F000
heap
page read and write
DC24000
heap
page read and write
F057000
heap
page read and write
7D60000
trusted library allocation
page read and write
7032000
unkown
page readonly
F008000
heap
page read and write
8BB1000
heap
page read and write
5B00000
trusted library allocation
page read and write
7FF566B31000
unkown
page readonly
5CFB000
trusted library allocation
page read and write
F46A000
heap
page read and write
4700000
unkown
page read and write
8D87000
heap
page read and write
5D30000
trusted library allocation
page read and write
575F000
heap
page read and write
DA70000
unkown
page read and write
8D36000
heap
page read and write
57EB000
heap
page read and write
57C0000
trusted library allocation
page read and write
F61B000
heap
page read and write
10323000
heap
page read and write
DF85000
heap
page read and write
5B00000
trusted library allocation
page read and write
E6FC000
unkown
page read and write
ABB0000
heap
page read and write
EFAA000
heap
page read and write
4FA0000
unkown
page read and write
5D30000
trusted library allocation
page read and write
CA50000
trusted library allocation
page read and write
1AC6B510000
heap
page read and write
3311000
trusted library allocation
page read and write
8A5E000
heap
page read and write
4680000
unkown
page read and write
1AC6B6C1000
unkown
page read and write
F136000
heap
page read and write
1940000
unkown
page read and write
F057000
heap
page read and write
5CF3000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
51DA000
heap
page read and write
3803000
heap
page read and write
20A181F0000
remote allocation
page read and write
5D20000
trusted library allocation
page read and write
DF93000
heap
page read and write
A8CB000
heap
page read and write
8C5A000
heap
page read and write
F480000
heap
page read and write
7DF47E310000
trusted library allocation
page readonly
23E1C6B2000
unkown
page read and write
FFF0000
heap
page read and write
1960000
unkown
page readonly
2F5A000
unkown
page read and write
DB8C000
heap
page read and write
FD48000
heap
page read and write
DDE4000
heap
page read and write
7FF56692C000
unkown
page readonly
8C3D000
heap
page read and write
74FA000
heap
page read and write
51AB000
stack
page read and write
204E4F02000
unkown
page read and write
53EF000
heap
page read and write
146A000
heap
page read and write
F7F000
heap
page read and write
750A000
heap
page read and write
F466000
heap
page read and write
7FF566D64000
unkown
page readonly
5D07000
trusted library allocation
page read and write
3A7F000
heap
page read and write
5D30000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
6C36000
stack
page read and write
5B00000
trusted library allocation
page read and write
AC3C000
heap
page read and write
B9F0000
heap
page read and write
5800000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
6C5D000
stack
page read and write
7FF566916000
unkown
page readonly
51AB000
heap
page read and write
F12A000
heap
page read and write
F160000
heap
page read and write
7FF566F69000
unkown
page readonly
BB8B000
heap
page read and write
51A0000
trusted library section
page read and write
7DF47E291000
trusted library allocation
page execute read
B50000
trusted library allocation
page read and write
23E1CF92000
unkown
page read and write
F55A000
heap
page read and write
37AC000
stack
page read and write
5CEB000
trusted library allocation
page read and write
67EB000
stack
page read and write
5B00000
trusted library allocation
page read and write
AEE7000
stack
page read and write
AA02000
heap
page read and write
5CFB000
trusted library allocation
page read and write
B34000
heap
page read and write
5B00000
trusted library allocation
page read and write
74FC000
heap
page read and write
5B00000
trusted library allocation
page read and write
6A39000
unkown
page read and write
A917000
heap
page read and write
7FFF97D29000
unkown
page readonly
BBD5000
heap
page read and write
5D11000
trusted library allocation
page read and write
8C59000
heap
page read and write
7FF566804000
unkown
page readonly
4C20000
unkown
page readonly
AC25000
heap
page read and write
52E0000
trusted library allocation
page read and write
A889000
heap
page read and write
E5F1000
heap
page read and write
5D30000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
7E23000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
BC69000
stack
page read and write
ABCB000
heap
page read and write
8C15000
unkown
page read and write
7763000
unkown
page readonly
5B10000
trusted library allocation
page read and write
F615000
heap
page read and write
DB50000
heap
page read and write
5D30000
trusted library allocation
page read and write
FEB000
trusted library allocation
page execute and read and write
751F000
unkown
page readonly
5AF5000
trusted library allocation
page read and write
E5F1000
heap
page read and write
5B00000
trusted library allocation
page read and write
7465000
heap
page read and write
7FF566E05000
unkown
page readonly
F1CC000
heap
page read and write
A89C000
heap
page read and write
8569000
stack
page read and write
E8EE000
stack
page read and write
75A2000
unkown
page readonly
F4DC000
heap
page read and write
AAEE000
heap
page read and write
1492000
heap
page read and write
1040000
unkown
page readonly
AE6F000
stack
page read and write
8C48000
heap
page read and write
1060000
heap
page read and write
EF7B000
stack
page read and write
7FF566C63000
unkown
page readonly
F008000
heap
page read and write
7C00000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
D86000
system
page read and write
A7B000
stack
page read and write
1E527BD8000
heap
page read and write
7FF566925000
unkown
page readonly
2EE9000
unkown
page read and write
B9A000
heap
page read and write
F258000
heap
page read and write
F118000
heap
page read and write
7FF566E9E000
unkown
page readonly
385B000
heap
page read and write
26635C90000
heap
page read and write
3A30000
heap
page read and write
AB7A47F000
stack
page read and write
E5F6000
heap
page read and write
736D000
unkown
page readonly
383A000
heap
page read and write
676C000
stack
page read and write
5B00000
trusted library allocation
page read and write
56D33BF000
stack
page read and write
7C5C000
stack
page read and write
F47E000
heap
page read and write
1E527F10000
heap
page read and write
25424213000
unkown
page read and write
7FF566B66000
unkown
page readonly
5D30000
trusted library allocation
page read and write
7FF56690D000
unkown
page readonly
BB65000
heap
page read and write
7FF566E70000
unkown
page readonly
8C81000
heap
page read and write
F551000
heap
page read and write
ABB2000
heap
page read and write
5D06000
trusted library allocation
page read and write
B3EE000
stack
page read and write
DDEF000
heap
page read and write
5AF0000
trusted library allocation
page read and write
52FC000
heap
page read and write
8DAD000
heap
page read and write
7FF566C14000
unkown
page readonly
6C00000
unkown
page readonly
DA15000
heap
page read and write
E30000
unkown
page readonly
A9CF000
heap
page read and write
5840000
trusted library allocation
page execute and read and write
7B6E000
stack
page read and write
F464000
heap
page read and write
1BD13F02000
unkown
page read and write
10BE3000
trusted library allocation
page read and write
38A5000
heap
page read and write
8C18000
heap
page read and write
14AD000
heap
page read and write
F492000
heap
page read and write
F4D9000
heap
page read and write
F23E000
heap
page read and write
B9D0000
trusted library allocation
page read and write
74FC000
heap
page read and write
F4B5000
heap
page read and write
74E3000
heap
page read and write
8CCE000
heap
page read and write
8D33000
heap
page read and write
7FF566E20000
unkown
page readonly
5D13000
trusted library allocation
page read and write
75F0000
heap
page read and write
E4F000
trusted library allocation
page read and write
7FFF97DFA000
unkown
page readonly
5CFB000
trusted library allocation
page read and write
8D22000
heap
page read and write
8D80000
heap
page read and write
10063000
heap
page read and write
23E1CF52000
unkown
page read and write
51AB000
stack
page read and write
23E1C629000
unkown
page read and write
2F3D000
stack
page read and write
F11D000
heap
page read and write
8CA3000
heap
page read and write
59BB000
stack
page read and write
BB8E000
heap
page read and write
385A000
heap
page read and write
54B0000
trusted library section
page read and write
D834000
heap
page read and write
F036000
heap
page read and write
DC09000
heap
page read and write
7FF566CD8000
unkown
page readonly
5B00000
trusted library allocation
page read and write
A94D000
heap
page read and write
7DF42C5E1000
trusted library allocation
page execute read
204EA702000
unkown
page read and write
1430000
heap
page read and write
7E25000
trusted library allocation
page read and write
8C02000
unkown
page read and write
2EDF000
stack
page read and write
FD60000
heap
page read and write
52E0000
trusted library allocation
page read and write
EB0000
heap
page read and write
8CFC000
heap
page read and write
F48E000
heap
page read and write
739F000
heap
page read and write
7FFF97DE0000
unkown
page read and write
5CEA000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
A40000
heap
page read and write
CAD9DFD000
stack
page read and write
74F7000
heap
page read and write
5D07000
trusted library allocation
page read and write
1733000
trusted library allocation
page read and write
893E000
stack
page read and write
204EA41E000
trusted library allocation
page read and write
1970000
trusted library allocation
page read and write
8AF0000
heap
page read and write
F93000
heap
page read and write
575F000
heap
page read and write
74D8000
unkown
page readonly
7FF566B59000
unkown
page readonly
4800000
unkown
page read and write
37DD000
heap
page read and write
1F4EB07D000
unkown
page read and write
F051000
heap
page read and write
D4F5000
trusted library allocation
page read and write
148C000
heap
page read and write
5D07000
trusted library allocation
page read and write
3100000
unkown
page read and write
1780000
trusted library allocation
page read and write
8D86000
heap
page read and write
CEFA000
stack
page read and write
3AB2000
heap
page read and write
8C36000
heap
page read and write
100A2000
heap
page read and write
DD31000
heap
page read and write
1492000
heap
page read and write
7580000
trusted library allocation
page read and write
AAC7000
heap
page read and write
4F10000
unkown
page readonly
3DF9000
stack
page read and write
CA20000
trusted library allocation
page read and write
30D0000
unkown
page read and write
10BF3000
trusted library allocation
page read and write
57D8000
heap
page read and write
F470000
heap
page read and write
5D30000
trusted library allocation
page read and write
8C47000
heap
page read and write
A1AE000
trusted library allocation
page read and write
23E1C5E0000
remote allocation
page read and write
7000000
unkown
page readonly
F476000
heap
page read and write
F6B6000
heap
page read and write
AA2E000
heap
page read and write
B50000
trusted library allocation
page read and write
7D8FFE000
stack
page read and write
8B23000
heap
page read and write
5D07000
trusted library allocation
page read and write
FD66000
heap
page read and write
FE0000
heap
page read and write
8C27000
heap
page read and write
5302000
heap
page read and write
BBEE000
unkown
page readonly
5D30000
trusted library allocation
page read and write
186E000
stack
page read and write
5B01000
trusted library allocation
page read and write
914000
heap
page read and write
CA73000
trusted library allocation
page read and write
5310000
heap
page read and write
7FF566C7F000
unkown
page readonly
BCE8000
stack
page read and write
7508000
heap
page read and write
7FF541D9F000
unkown
page readonly
750A000
heap
page read and write
8DA8000
heap
page read and write
315F000
system
page read and write
5D07000
trusted library allocation
page read and write
AB15000
heap
page read and write
5CFB000
trusted library allocation
page read and write
204EA434000
trusted library allocation
page read and write
117F000
trusted library allocation
page execute and read and write
7FF566A7D000
unkown
page readonly
1E527EA0000
trusted library allocation
page read and write
BBAB000
heap
page read and write
38A7000
heap
page read and write
8BCA000
heap
page read and write
F121000
heap
page read and write
5D11000
trusted library allocation
page read and write
23E1C6E7000
unkown
page read and write
BB0C000
unkown
page readonly
5AE0000
trusted library allocation
page read and write
1E527BC0000
heap
page read and write
C780000
unkown
page readonly
AB41000
heap
page read and write
FFF0000
heap
page read and write
E631000
heap
page read and write
AA2A000
heap
page read and write
538B000
heap
page read and write
B34000
heap
page read and write
C319000
stack
page read and write
7DF47E231000
trusted library allocation
page execute read
7FF567056000
unkown
page readonly
8C73000
heap
page read and write
5B00000
trusted library allocation
page read and write
5D11000
trusted library allocation
page read and write
3B2A000
stack
page read and write
F160000
heap
page read and write
5720000
heap
page read and write
10B0000
unkown
page read and write
DADC000
heap
page read and write
23E1CF6E000
unkown
page read and write
DB65000
heap
page read and write
FD7C000
heap
page read and write
5CE2000
trusted library allocation
page read and write
8C1D000
heap
page read and write
38A7000
heap
page read and write
6A39000
unkown
page read and write
F23F000
heap
page read and write
8B1E000
heap
page read and write
1016E000
stack
page read and write
BC8C000
heap
page read and write
73F5000
heap
page read and write
7EDD000
stack
page read and write
23E1CF69000
unkown
page read and write
1770000
trusted library allocation
page read and write
E63F000
heap
page read and write
B8E9000
stack
page read and write
53E6000
heap
page read and write
5D30000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
37AE000
stack
page read and write
AF2A000
unkown
page read and write
538B000
heap
page read and write
F63E000
heap
page read and write
19A0000
heap
page read and write
C89000
heap
page read and write
7DF42C601000
trusted library allocation
page execute read
7FF566887000
unkown
page readonly
5323000
heap
page read and write
53E6000
heap
page read and write
5D07000
trusted library allocation
page read and write
3B50000
trusted library allocation
page read and write
3DFD000
stack
page read and write
3CA5000
stack
page read and write
13E0000
heap
page read and write
D881000
heap
page read and write
385E000
heap
page read and write
5CE0000
trusted library allocation
page read and write
AB15000
heap
page read and write
8DE7000
unkown
page read and write
FC05000
heap
page read and write
DFEB000
stack
page read and write
204E5759000
unkown
page read and write
5AF0000
trusted library allocation
page read and write
5F3C000
stack
page read and write
B80D000
unkown
page readonly
7DDA000
stack
page read and write
A913000
heap
page read and write
5D29000
trusted library allocation
page read and write
F60000
heap
page read and write
C431000
unkown
page readonly
4800000
unkown
page read and write
10025000
heap
page read and write
8D27000
heap
page read and write
7809000
unkown
page readonly
51A6000
heap
page read and write
7FFF97DD5000
unkown
page read and write
DFAC000
heap
page read and write
FD6A000
heap
page read and write
D815000
heap
page read and write
8B4B000
heap
page read and write
5810000
trusted library allocation
page read and write
3863000
heap
page read and write
DB5D000
heap
page read and write
8D3F000
heap
page read and write
204EA6AC000
unkown
page read and write
DEAB000
heap
page read and write
7FF566EF0000
unkown
page readonly
C795000
unkown
page readonly
8C80000
heap
page read and write
5D29000
trusted library allocation
page read and write
3855000
heap
page read and write
5150000
heap
page read and write
D853000
heap
page read and write
29A0000
heap
page read and write
8C18000
heap
page read and write
A94D000
heap
page read and write
8CBA000
heap
page read and write
1478000
heap
page read and write
2E70000
unkown
page read and write
38A7000
heap
page read and write
148A000
heap
page read and write
3100000
unkown
page read and write
7FF566B8C000
unkown
page readonly
D889000
heap
page read and write
F488000
heap
page read and write
D01B000
stack
page read and write
8D6B000
heap
page read and write
5AF0000
trusted library allocation
page read and write
4DF0000
unkown
page read and write
5D04000
trusted library allocation
page read and write
23E1C64A000
unkown
page read and write
23E1CF70000
unkown
page read and write
C978000
stack
page read and write
6B5E000
stack
page read and write
73E6000
heap
page read and write
C58A000
unkown
page readonly
FD4A000
heap
page read and write
7E5D000
stack
page read and write
D4E0000
trusted library allocation
page read and write
F76E000
heap
page read and write
5D30000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
8CFF000
heap
page read and write
499F000
stack
page read and write
7465000
heap
page read and write
7FF5667FF000
unkown
page readonly
1E527B70000
heap
page read and write
10117000
heap
page read and write
A9AF000
heap
page read and write
AC5000
stack
page read and write
7FF566C79000
unkown
page readonly
D9EE000
heap
page read and write
5D30000
trusted library allocation
page read and write
BB6A000
heap
page read and write
8355000
stack
page read and write
34C2000
heap
page read and write
77EC000
unkown
page readonly
5353000
heap
page read and write
3AF3000
heap
page read and write
F05F000
heap
page read and write
D820000
heap
page read and write
6BD7000
stack
page read and write
FD70000
heap
page read and write
B87347D000
stack
page read and write
BB6A000
heap
page read and write
7CDA000
stack
page read and write
F73000
heap
page read and write
B00000
trusted library allocation
page read and write
7FF566DA5000
unkown
page readonly
DD40000
heap
page read and write
4D36000
unclassified section
page read and write
75D0000
trusted library allocation
page read and write
F008000
heap
page read and write
F472000
heap
page read and write
EEA3000
unkown
page read and write
4B1F000
trusted library allocation
page execute and read and write
7FF566DDC000
unkown
page readonly
7FF566D64000
unkown
page readonly
8A54000
heap
page read and write
5D30000
trusted library allocation
page read and write
102AC000
heap
page read and write
3930000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
32FF000
stack
page read and write
1060000
heap
page read and write
5CF3000
trusted library allocation
page read and write
8355000
stack
page read and write
DA684F8000
stack
page read and write
46A0000
unkown
page read and write
11F0000
heap
page read and write
46A0000
unkown
page read and write
F3E0000
heap
page read and write
E5EB000
stack
page read and write
BB6A000
heap
page read and write
3B50000
trusted library allocation
page read and write
7437000
unkown
page readonly
8D61000
heap
page read and write
1495000
heap
page read and write
DD66000
heap
page read and write
F10F000
heap
page read and write
BBE8000
heap
page read and write
10CA0000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
7FF566B19000
unkown
page readonly
F311000
heap
page read and write
5AF2000
trusted library allocation
page read and write
EFFA000
heap
page read and write
23E1CF92000
unkown
page read and write
7D927E000
stack
page read and write
204E5615000
unkown
page read and write
8D89000
heap
page read and write
F4C4000
heap
page read and write
A8A2000
heap
page read and write
8D36000
heap
page read and write
875E000
stack
page read and write
CA20000
trusted library allocation
page read and write
A92C000
heap
page read and write
5D30000
trusted library allocation
page read and write
A9AF000
heap
page read and write
52F8000
heap
page read and write
5CA0000
trusted library allocation
page execute and read and write
4DF0000
unkown
page read and write
DEA6000
heap
page read and write
5780000
heap
page read and write
5D30000
trusted library allocation
page read and write
2E70000
unkown
page read and write
AC35000
heap
page read and write
7BDD000
stack
page read and write
5853000
heap
page read and write
8DB8000
heap
page read and write
571C000
heap
page read and write
5CFB000
trusted library allocation
page read and write
4700000
unkown
page read and write
8D11000
heap
page read and write
CAD0000
trusted library allocation
page read and write
14A6000
heap
page read and write
9C6000
heap
page read and write
8D53000
heap
page read and write
7FF566F06000
unkown
page readonly
362A000
stack
page read and write
74FC000
heap
page read and write
53B6000
stack
page read and write
5B00000
trusted library allocation
page read and write
74A0000
heap
page read and write
5B00000
trusted library allocation
page read and write
8BED000
heap
page read and write
23E1CF68000
unkown
page read and write
F47E000
heap
page read and write
1070000
unkown
page readonly
5D30000
trusted library allocation
page read and write
7FF566AD0000
unkown
page readonly
14C6000
heap
page read and write
23E1C5E0000
remote allocation
page read and write
F46E000
heap
page read and write
F466000
heap
page read and write
F136000
heap
page read and write
1BD13A63000
unkown
page read and write
6A3D000
unkown
page read and write
BC38000
heap
page read and write
E5D7000
heap
page read and write
BBA5000
heap
page read and write
1496000
heap
page read and write
5CFB000
trusted library allocation
page read and write
F126000
heap
page read and write
7DF42C5D0000
trusted library allocation
page readonly
DB8C000
heap
page read and write
7508000
heap
page read and write
E5D7000
heap
page read and write
DCFC000
heap
page read and write
BC1E000
heap
page read and write
EEA3000
unkown
page read and write
3D2A000
stack
page read and write
E80000
heap
page read and write
148F000
heap
page read and write
BB5E000
heap
page read and write
DF6D000
heap
page read and write
BB9C000
heap
page read and write
1065000
heap
page read and write
8C57000
unkown
page read and write
7FF56691F000
unkown
page readonly
F8F0000
trusted library allocation
page read and write
8D99000
heap
page read and write
E611000
heap
page read and write
8C73000
unkown
page read and write
1010000
unkown
page readonly
85DD000
stack
page read and write
521A000
heap
page read and write
7FF566840000
unkown
page readonly
DADA000
heap
page read and write
5180000
trusted library section
page read and write
7FF566A8F000
unkown
page readonly
7FF566AAA000
unkown
page readonly
FC9000
heap
page read and write
7F59000
stack
page read and write
1F4EAFA0000
heap
page read and write
4860000
unkown
page read and write
3BF9000
stack
page read and write
7FF566E25000
unkown
page readonly
DC3C000
heap
page read and write
FD56000
heap
page read and write
DA17000
heap
page read and write
D7F2000
heap
page read and write
FD4E000
heap
page read and write
FD68000
heap
page read and write
1474000
heap
page read and write
910000
heap
page read and write
4F40000
unkown
page readonly
8D61000
heap
page read and write
5D07000
trusted library allocation
page read and write
BFAE000
unkown
page readonly
BB8B000
heap
page read and write
8D87000
heap
page read and write
8D94000
heap
page read and write
101B9000
heap
page read and write
5227000
stack
page read and write
2F29000
unkown
page read and write
5D30000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
BBC5000
unkown
page readonly
7FFF97D29000
unkown
page readonly
8BE5000
unkown
page read and write
F326000
heap
page read and write
DEDA000
heap
page read and write
8CD1000
heap
page read and write
B4A0000
unkown
page readonly
7FF566F55000
unkown
page readonly
D7B0000
heap
page read and write
D9F5000
heap
page read and write
204EA570000
remote allocation
page read and write
C8F3000
trusted library allocation
page read and write
F008000
heap
page read and write
10C45000
trusted library allocation
page read and write
7FF566ED2000
unkown
page readonly
7FF566EDE000
unkown
page readonly
7FF566B50000
unkown
page readonly
4C30000
unkown
page readonly
F55F000
heap
page read and write
CAE0000
trusted library allocation
page read and write
AB8D000
heap
page read and write
324C000
stack
page read and write
DB7D000
heap
page read and write
7FFF97C41000
unkown
page execute read
1940000
trusted library allocation
page execute and read and write
DC3E000
heap
page read and write
D95B000
heap
page read and write
DB95000
heap
page read and write
5D00000
trusted library allocation
page read and write
53CC000
heap
page read and write
10C80000
trusted library allocation
page read and write
512A000
stack
page read and write
5B00000
trusted library allocation
page read and write
8C31000
heap
page read and write
FD7A000
heap
page read and write
8C0D000
unkown
page read and write
8010000
trusted library allocation
page read and write
324D000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
8C97000
heap
page read and write
766C000
unkown
page readonly
623B000
stack
page read and write
E74C000
unkown
page read and write
BC02000
heap
page read and write
A3D000
stack
page read and write
7594000
unkown
page readonly
1AC6B600000
unkown
page read and write
8030000
trusted library allocation
page read and write
7DF466381000
unkown
page execute read
7FF566840000
unkown
page readonly
7673000
trusted library allocation
page read and write
83DB000
stack
page read and write
5C90000
unkown
page readonly
1E389190000
unkown
page read and write
204E5E10000
trusted library allocation
page read and write
8A01000
unkown
page read and write
F466000
heap
page read and write
1746000
trusted library allocation
page execute and read and write
BC93000
unkown
page readonly
2890000
unkown
page readonly
8D63000
heap
page read and write
AAD7000
heap
page read and write
A92C000
heap
page read and write
7FF566B19000
unkown
page readonly
5B3F000
stack
page read and write
DB4E000
heap
page read and write
20A1822A000
unkown
page read and write
82E9000
stack
page read and write
23E1CF93000
unkown
page read and write
B50000
trusted library allocation
page read and write
F5FE000
heap
page read and write
54B0000
trusted library section
page read and write
E60E000
heap
page read and write
8B4E000
unkown
page read and write
1BD13A00000
unkown
page read and write
7FF566EE5000
unkown
page readonly
571A000
heap
page read and write
D4E0000
trusted library allocation
page read and write
74FA000
heap
page read and write
5D05000
trusted library allocation
page read and write
F46A000
heap
page read and write
8D1B000
heap
page read and write
7600000
trusted library allocation
page read and write
1464000
heap
page read and write
DC20000
heap
page read and write
3260000
heap
page read and write
7DF47E281000
trusted library allocation
page execute read
F488000
heap
page read and write
1BD13CF0000
trusted library allocation
page read and write
DB63000
heap
page read and write
5D30000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
10D45000
heap
page read and write
1400000
unkown
page readonly
8D39000
heap
page read and write
3A9D000
heap
page read and write
DF90000
heap
page read and write
7FF5668FA000
unkown
page readonly
2EE6000
unkown
page read and write
8BB9000
heap
page read and write
D869000
heap
page read and write
5D19000
trusted library allocation
page read and write
53CE000
heap
page read and write
F4DC000
heap
page read and write
5D15000
trusted library allocation
page read and write
AAD5000
heap
page read and write
8D41000
heap
page read and write
2F35000
unkown
page read and write
100A2000
heap
page read and write
8C19000
unkown
page read and write
B50000
trusted library allocation
page read and write
23E1CFBE000
unkown
page read and write
F08F000
heap
page read and write
5850000
heap
page read and write
29A0000
heap
page read and write
755D000
heap
page read and write
53E4000
heap
page read and write
1005F000
heap
page read and write
7594000
unkown
page readonly
F48C000
heap
page read and write
DB6D000
heap
page read and write
10EFE000
stack
page read and write
5D30000
trusted library allocation
page read and write
FC83000
heap
page read and write
F4AF000
heap
page read and write
7FF566EFE000
unkown
page readonly
DA98000
heap
page read and write
ACDB000
stack
page read and write
38A4000
heap
page read and write
8C57000
unkown
page read and write
FD70000
heap
page read and write
DC4E000
heap
page read and write
8D07000
heap
page read and write
5B00000
trusted library allocation
page read and write
4A18000
stack
page read and write
F55F000
heap
page read and write
3AC1000
heap
page read and write
2F29000
unkown
page read and write
BC02000
heap
page read and write
8AD2000
heap
page read and write
ABDF000
heap
page read and write
E5CF000
heap
page read and write
19A0000
heap
page read and write
3350000
unkown
page readonly
F136000
heap
page read and write
8C18000
heap
page read and write
20A18050000
heap
page read and write
7BE8000
stack
page read and write
7FF566AAD000
unkown
page readonly
8C5A000
heap
page read and write
CAD9AFF000
stack
page read and write
7FF566804000
unkown
page readonly
19A5000
heap
page read and write
914000
heap
page read and write
4850000
unkown
page read and write
5B00000
trusted library allocation
page read and write
7FF566B66000
unkown
page readonly
FD4E000
heap
page read and write
5D04000
trusted library allocation
page read and write
912B87E000
stack
page read and write
E5F6000
heap
page read and write
DB0000
heap
page read and write
89FF000
unkown
page read and write
7FF566D5C000
unkown
page readonly
E74C000
unkown
page read and write
5D30000
trusted library allocation
page read and write
2F4B000
unkown
page read and write
BB6A000
heap
page read and write
A889000
heap
page read and write
C880000
trusted library allocation
page read and write
DD66000
heap
page read and write
19A5000
heap
page read and write
FC87000
heap
page read and write
4C20000
unkown
page readonly
C653000
unkown
page readonly
DA15000
heap
page read and write
F466000
heap
page read and write
7E30000
trusted library allocation
page read and write
DC4C000
heap
page read and write
3855000
heap
page read and write
5B00000
trusted library allocation
page read and write
2F47000
unkown
page read and write
7FF566B1F000
unkown
page readonly
26635BA2000
heap
page read and write
754C000
heap
page read and write
FD74000
heap
page read and write
DC58000
heap
page read and write
7FF566C44000
unkown
page readonly
A9AF000
heap
page read and write
4810000
unkown
page read and write
8B5F000
heap
page read and write
2EE9000
unkown
page read and write
914000
heap
page read and write
DA6807B000
stack
page read and write
7EBD000
stack
page read and write
23E1CF1A000
unkown
page read and write
ABCB000
heap
page read and write
1F4EB100000
unkown
page read and write
CE92000
unkown
page read and write
1960000
heap
page read and write
23E1CF93000
unkown
page read and write
FD66000
heap
page read and write
87B5000
stack
page read and write
F476000
heap
page read and write
5D07000
trusted library allocation
page read and write
BBC5000
heap
page read and write
8B5F000
heap
page read and write
F48E000
heap
page read and write
AB2C000
heap
page read and write
7D5D000
stack
page read and write
5AF0000
trusted library allocation
page read and write
8A82000
heap
page read and write
4F40000
unkown
page readonly
2F66000
system
page read and write
5D30000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
57D8000
heap
page read and write
5353000
heap
page read and write
A860000
heap
page read and write
F020000
heap
page read and write
46B0000
unkown
page read and write
7FF566B90000
unkown
page readonly
AA08000
heap
page read and write
8CA0000
heap
page read and write
7FF566880000
unkown
page readonly
5B00000
trusted library allocation
page read and write
D877000
heap
page read and write
FC9000
heap
page read and write
8D3F000
heap
page read and write
FA74000
unkown
page read and write
8C02000
unkown
page read and write
6CD9000
stack
page read and write
51A0000
trusted library section
page read and write
E80000
heap
page read and write
25424A02000
unkown
page read and write
F4D9000
heap
page read and write
AADB000
heap
page read and write
204E4F02000
unkown
page read and write
8D49000
heap
page read and write
8D61000
heap
page read and write
FF0000
unkown
page readonly
8C67000
heap
page read and write
23E1CFA3000
unkown
page read and write
F4D3000
heap
page read and write
5D30000
trusted library allocation
page read and write
8D36000
heap
page read and write
5AF0000
trusted library allocation
page read and write
4C40000
unkown
page write copy
FD4C000
heap
page read and write
5AF0000
trusted library allocation
page read and write
DB65000
heap
page read and write
D861000
heap
page read and write
1F17DF08000
unkown
page read and write
896E000
stack
page read and write
AEF0000
unkown
page read and write
F1CC000
heap
page read and write
7529000
heap
page read and write
F468000
heap
page read and write
1070000
unkown
page readonly
F5FE000
heap
page read and write
8D5B000
heap
page read and write
7FF566B14000
unkown
page readonly
7FF566C99000
unkown
page readonly
DA6887F000
stack
page read and write
52D8000
trusted library allocation
page read and write
7FF56684C000
unkown
page readonly
5D30000
trusted library allocation
page read and write
D21B000
stack
page read and write
8D1B000
heap
page read and write
204EA570000
remote allocation
page read and write
558C000
stack
page read and write
B5EE000
stack
page read and write
F04C000
heap
page read and write
7FF566F85000
unkown
page readonly
F470000
heap
page read and write
BCC9000
unkown
page readonly
73F5000
heap
page read and write
8C1D000
unkown
page read and write
7FF5668C9000
unkown
page readonly
A935000
heap
page read and write
8B33000
heap
page read and write
204EA63D000
unkown
page read and write
EB0000
heap
page read and write
23E1CF76000
unkown
page read and write
4B9C000
stack
page read and write
F329000
heap
page read and write
F197000
heap
page read and write
7FFF97DDD000
unkown
page write copy
FCD000
heap
page read and write
6A5C000
stack
page read and write
57D8000
heap
page read and write
8BFC000
unkown
page read and write
52A6000
heap
page read and write
4FC0000
unkown
page readonly
46B3000
unkown
page read and write
5CFB000
trusted library allocation
page read and write
6BD8000
stack
page read and write
F492000
heap
page read and write
148B000
heap
page read and write
8CAA000
heap
page read and write
DC16000
heap
page read and write
5180000
trusted library section
page read and write
1BD13B23000
heap
page read and write
7DF47E180000
trusted library allocation
page readonly
5D30000
trusted library allocation
page read and write
754C000
heap
page read and write
5CFB000
trusted library allocation
page read and write
CAE0000
trusted library allocation
page read and write
B76B000
stack
page read and write
C8F5000
trusted library allocation
page read and write
101EC000
stack
page read and write
1E527BB8000
heap
page read and write
10BE5000
trusted library allocation
page read and write
23E1CF6D000
unkown
page read and write
5CFB000
trusted library allocation
page read and write
7FF566B50000
unkown
page readonly
3A7F000
heap
page read and write
FCBF000
heap
page read and write
BB68000
heap
page read and write
14D6000
heap
page read and write
77F3000
unkown
page readonly
5D10000
trusted library allocation
page read and write
48E0000
unkown
page read and write
7FF566D4A000
unkown
page readonly
3263000
heap
page read and write
5440000
unkown
page read and write
1BD13CF0000
trusted library allocation
page read and write
B36B000
stack
page read and write
315F000
system
page read and write
F77C000
heap
page read and write
6A34000
unkown
page read and write
F8B0000
trusted library allocation
page read and write
7FF566895000
unkown
page readonly
E69D000
heap
page read and write
23E1C64D000
unkown
page read and write
17CE000
stack
page read and write
7FF566FFE000
unkown
page readonly
1E388C53000
unkown
page read and write
D885000
heap
page read and write
8D39000
heap
page read and write
53D7000
heap
page read and write
7DF47E240000
trusted library allocation
page readonly
7725000
unkown
page readonly
4690000
unkown
page read and write
5D30000
trusted library allocation
page read and write
7FF566C75000
unkown
page readonly
23E1CF9E000
unkown
page read and write
8A12000
unkown
page read and write
F265000
heap
page read and write
AE5A000
stack
page read and write
7B70000
trusted library allocation
page read and write
25424284000
unkown
page read and write
F462000
heap
page read and write
A983000
heap
page read and write
BD60000
trusted library allocation
page read and write
7FF566C06000
unkown
page readonly
DB5D000
heap
page read and write
5D29000
trusted library allocation
page read and write
53E6000
heap
page read and write
7FF566FA1000
unkown
page readonly
A913000
heap
page read and write
5CFB000
trusted library allocation
page read and write
ABC3000
heap
page read and write
F486000
heap
page read and write
5CFB000
trusted library allocation
page read and write
48A0000
unkown
page read and write
5D10000
trusted library allocation
page read and write
23E1CFB6000
unkown
page read and write
53E4000
heap
page read and write
7FF566F61000
unkown
page readonly
C475000
unkown
page readonly
DB76000
heap
page read and write
DF85000
heap
page read and write
FD48000
heap
page read and write
1F17DCA0000
heap
page read and write
4F10000
unkown
page readonly
8CA1000
heap
page read and write
F268000
heap
page read and write
7FF566AA6000
unkown
page readonly
F470000
heap
page read and write
5D29000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
C8E5000
trusted library allocation
page read and write
5D1F000
trusted library allocation
page read and write
B34000
heap
page read and write
51A0000
trusted library section
page read and write
5820000
trusted library allocation
page execute and read and write
46C3000
unkown
page read and write
FD43000
heap
page read and write
5D07000
trusted library allocation
page read and write
8D19000
heap
page read and write
5D07000
trusted library allocation
page read and write
F594000
heap
page read and write
8C57000
heap
page read and write
76F0000
trusted library allocation
page read and write
AA60000
heap
page read and write
DB8C000
heap
page read and write
EFDF000
heap
page read and write
CA20000
trusted library allocation
page read and write
2EAE000
unkown
page read and write
EE54000
unkown
page read and write
2F02000
unkown
page read and write
25424266000
unkown
page read and write
7FF566F6B000
unkown
page readonly
8D63000
heap
page read and write
F05C000
heap
page read and write
AB26000
heap
page read and write
8C91000
heap
page read and write
5B00000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
28C0000
unkown
page readonly
6D70000
trusted library allocation
page read and write
8D76000
heap
page read and write
7FF566887000
unkown
page readonly
845D000
stack
page read and write
3883000
heap
page read and write
1F4EAFD0000
unkown
page read and write
AB41000
heap
page read and write
F54F000
heap
page read and write
7FFF97DDA000
unkown
page read and write
5CE2000
trusted library allocation
page read and write
F01C000
heap
page read and write
5D30000
trusted library allocation
page read and write
5D0C000
trusted library allocation
page read and write
8A69000
heap
page read and write
5D30000
trusted library allocation
page read and write
5780000
heap
page read and write
F478000
heap
page read and write
F488000
heap
page read and write
7FF566AAA000
unkown
page readonly
DC1C000
heap
page read and write
7FF566DBD000
unkown
page readonly
5D30000
trusted library allocation
page read and write
87DB000
stack
page read and write
7FF56684C000
unkown
page readonly
1AC6B613000
unkown
page read and write
89DE000
heap
page read and write
23E1C6D5000
unkown
page read and write
8D1D000
heap
page read and write
8CD1000
heap
page read and write
4BE0000
unkown
page read and write
8C3D000
heap
page read and write
3A4C000
heap
page read and write
7DF47E311000
trusted library allocation
page execute read
7FF566E2E000
unkown
page readonly
BC1E000
heap
page read and write
A903000
heap
page read and write
5070000
unkown
page readonly
7832000
unkown
page readonly
7FF566CF4000
unkown
page readonly
F4D3000
heap
page read and write
DDEA000
heap
page read and write
37ED000
heap
page read and write
101CE000
heap
page read and write
754C000
heap
page read and write
8D2F000
heap
page read and write
B87377C000
stack
page read and write
8C19000
unkown
page read and write
3B50000
trusted library allocation
page read and write
8C59000
heap
page read and write
FDB3000
heap
page read and write
5CEA000
trusted library allocation
page read and write
7397000
heap
page read and write
E68E000
heap
page read and write
577E000
heap
page read and write
D7F2000
heap
page read and write
74B1000
unkown
page readonly
5D07000
trusted library allocation
page read and write
E72A000
unkown
page read and write
DB4E000
heap
page read and write
DEB8000
heap
page read and write
FD58000
heap
page read and write
F77C000
heap
page read and write
3B2A000
stack
page read and write
8D2C000
heap
page read and write
5CFB000
trusted library allocation
page read and write
7815000
unkown
page readonly
F05C000
heap
page read and write
3A30000
heap
page read and write
5D21000
trusted library allocation
page read and write
7FF566C75000
unkown
page readonly
1026A000
heap
page read and write
DF9A000
heap
page read and write
10065000
heap
page read and write
7FF566AD6000
unkown
page readonly
5CF3000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
7FF566D64000
unkown
page readonly
E5CE000
heap
page read and write
84DF000
stack
page read and write
5800000
trusted library allocation
page read and write
7FF566F50000
unkown
page readonly
BB60000
heap
page read and write
A94D000
heap
page read and write
8C31000
heap
page read and write
914000
heap
page read and write
57D0000
trusted library allocation
page read and write
3A72000
heap
page read and write
A8C1000
heap
page read and write
23E1CF69000
unkown
page read and write
7FF566916000
unkown
page readonly
EB8000
heap
page read and write
89F3000
unkown
page read and write
2F35000
unkown
page read and write
2F66000
system
page read and write
8ACE000
heap
page read and write
5D30000
trusted library allocation
page read and write
EB42000
heap
page read and write
A8BC000
heap
page read and write
5CF3000
trusted library allocation
page read and write
23E1C702000
unkown
page read and write
2DEE000
stack
page read and write
73C2000
heap
page read and write
8A63000
heap
page read and write
5B00000
trusted library allocation
page read and write
1014F000
heap
page read and write
EB0000
heap
page read and write
FD50000
heap
page read and write
F197000
heap
page read and write
5711000
heap
page read and write
74A0000
heap
page read and write
FE0000
heap
page read and write
FC3000
heap
page read and write
44C4000
trusted library allocation
page read and write
DB59000
heap
page read and write
7695000
unkown
page readonly
FD66000
heap
page read and write
578F000
heap
page read and write
7FF566AFB000
unkown
page readonly
E70000
unkown
page readonly
8CD3000
heap
page read and write
7FF566E25000
unkown
page readonly
10113000
heap
page read and write
23E1C63C000
unkown
page read and write
4890000
unkown
page readonly
AC35000
heap
page read and write
F24C000
heap
page read and write
7FF566908000
unkown
page readonly
5D07000
trusted library allocation
page read and write
1005F000
heap
page read and write
F004000
heap
page read and write
5360000
trusted library allocation
page read and write
46A0000
unkown
page read and write
583A000
trusted library allocation
page read and write
6A32000
unkown
page read and write
191C000
stack
page read and write
8D6D000
heap
page read and write
7FF566FE9000
unkown
page readonly
E72E000
unkown
page read and write
1E527BF3000
heap
page read and write
3C2D000
stack
page read and write
DEEF000
heap
page read and write
8D76000
heap
page read and write
7FFF977BC000
unkown
page read and write
3AEB000
heap
page read and write
53D7000
heap
page read and write
7FF566C14000
unkown
page readonly
3263000
heap
page read and write
53CC000
heap
page read and write
7DF47E2C1000
trusted library allocation
page execute read
DADA000
heap
page read and write
7FF566C51000
unkown
page readonly
F48A000
heap
page read and write
7DF47E261000
trusted library allocation
page execute read
7FF566E68000
unkown
page readonly
FD4E000
heap
page read and write
D6E1000
heap
page read and write
DC2C000
heap
page read and write
F4DF000
heap
page read and write
FD86000
heap
page read and write
8A32000
unkown
page read and write
8130000
heap
page read and write
578F000
heap
page read and write
FD68000
heap
page read and write
2F50000
unkown
page readonly
7829000
unkown
page readonly
F75E000
heap
page read and write
5D30000
trusted library allocation
page read and write
ABD7000
heap
page read and write
558C000
stack
page read and write
FD50000
heap
page read and write
C63E000
unkown
page readonly
5D30000
trusted library allocation
page read and write
EFF4000
heap
page read and write
5D30000
trusted library allocation
page read and write
3B03000
heap
page read and write
2970000
unkown
page readonly
F160000
heap
page read and write
324C000
stack
page read and write
1F17DE4C000
unkown
page read and write
E746000
unkown
page read and write
7380000
trusted library allocation
page read and write
F615000
heap
page read and write
23E1CF66000
unkown
page read and write
F05A000
heap
page read and write
DDF4000
heap
page read and write
E30000
unkown
page readonly
865F000
stack
page read and write
BBE8000
heap
page read and write
AB6D000
heap
page read and write
5CF3000
trusted library allocation
page read and write
8A01000
heap
page read and write
7FF566F21000
unkown
page readonly
F76E000
heap
page read and write
3A7F000
heap
page read and write
101DF000
heap
page read and write
CC78000
stack
page read and write
8D65000
heap
page read and write
825C000
stack
page read and write
51F0000
trusted library section
page read and write
CCFB000
stack
page read and write
815E000
stack
page read and write
F44A000
heap
page read and write
CFE5D77000
stack
page read and write
5D07000
trusted library allocation
page read and write
F5C9000
heap
page read and write
D5A0000
heap
page read and write
735C000
stack
page read and write
23E1CF65000
unkown
page read and write
3928000
stack
page read and write
B4E7000
stack
page read and write
2F66000
system
page read and write
8D41000
heap
page read and write
1E388D00000
unkown
page read and write
73F5000
heap
page read and write
7373000
heap
page read and write
F023000
heap
page read and write
E606000
heap
page read and write
23E1CF5C000
unkown
page read and write
8D36000
heap
page read and write
8C5F000
heap
page read and write
5D07000
trusted library allocation
page read and write
B9D0000
trusted library allocation
page read and write
A9E8000
heap
page read and write
BB5F000
heap
page read and write
8BBE000
heap
page read and write
17CE000
stack
page read and write
7DF47E220000
trusted library allocation
page readonly
AEFE000
unkown
page read and write
AABA000
heap
page read and write
5CFB000
trusted library allocation
page read and write
7FF566BDB000
unkown
page readonly
1E527BC0000
heap
page read and write
23E1CF79000
unkown
page read and write
25A9B402000
unkown
page read and write
1F4EB050000
unkown
page read and write
DF90000
heap
page read and write
5830000
trusted library allocation
page read and write
EF88000
heap
page read and write
676C000
stack
page read and write
A9FA000
heap
page read and write
23E1CF65000
unkown
page read and write
5B00000
trusted library allocation
page read and write
7D50000
trusted library allocation
page read and write
3340000
unkown
page read and write
548D000
stack
page read and write
8CF8000
heap
page read and write
7FF566E3D000
unkown
page readonly
8D61000
heap
page read and write
7FF566E85000
unkown
page readonly
F4AF000
heap
page read and write
DC28000
heap
page read and write
5D08000
trusted library allocation
page read and write
AC05000
heap
page read and write
56D38F7000
stack
page read and write
1370000
trusted library allocation
page read and write
C735000
unkown
page readonly
F472000
heap
page read and write
8BC6000
heap
page read and write
5A3C000
stack
page read and write
10C10000
trusted library allocation
page read and write
3A97000
heap
page read and write
8C73000
heap
page read and write
DB85000
heap
page read and write
5D07000
trusted library allocation
page read and write
E5CF000
heap
page read and write
5D30000
trusted library allocation
page read and write
FA3B000
unkown
page read and write
F160000
heap
page read and write
AED6000
stack
page read and write
1016E000
stack
page read and write
26635BD3000
heap
page read and write
3A41000
heap
page read and write
7FF5668C1000
unkown
page readonly
5D1F000
trusted library allocation
page read and write
DC18000
heap
page read and write
7FF566FE9000
unkown
page readonly
5CE2000
trusted library allocation
page read and write
8D5D000
heap
page read and write
7FF566C1E000
unkown
page readonly
8C31000
heap
page read and write
DC16000
heap
page read and write
80DD000
stack
page read and write
28B0000
unkown
page readonly
52D0000
trusted library allocation
page execute and read and write
8BFD000
heap
page read and write
5B00000
trusted library allocation
page read and write
F470000
heap
page read and write
10113000
heap
page read and write
DEAD000
heap
page read and write
DF93000
heap
page read and write
147E000
heap
page read and write
7FFF97620000
unkown
page readonly
7FF566F1D000
unkown
page readonly
EFB8000
heap
page read and write
7FF566B19000
unkown
page readonly
8D9B000
heap
page read and write
89FF000
unkown
page read and write
A8F4000
heap
page read and write
3A2E000
stack
page read and write
EF92000
heap
page read and write
8A0C000
heap
page read and write
F036000
heap
page read and write
5CB0000
unkown
page read and write
AC33000
heap
page read and write
8BBE000
heap
page read and write
BB60000
heap
page read and write
3A2B000
stack
page read and write
7FF56692C000
unkown
page readonly
8D76000
heap
page read and write
FC1000
heap
page read and write
8B3F000
heap
page read and write
5B00000
trusted library allocation
page read and write
A94D000
heap
page read and write
2E58000
stack
page read and write
1F17DF02000
unkown
page read and write
8D8F000
heap
page read and write
1BD13A37000
unkown
page read and write
D86B000
heap
page read and write
DD48000
heap
page read and write
1005F000
heap
page read and write
76D3000
unkown
page readonly
528A000
heap
page read and write
20A1825E000
unkown
page read and write
8A61000
heap
page read and write
EF81000
heap
page read and write
DD58000
heap
page read and write
8A82000
heap
page read and write
D61000
heap
page read and write
FD62000
heap
page read and write
7465000
heap
page read and write
8D11000
heap
page read and write
DD61000
heap
page read and write
8D03000
heap
page read and write
7490000
heap
page read and write
8D16000
heap
page read and write
DD46000
heap
page read and write
7FF566EEC000
unkown
page readonly
7FFF97C41000
unkown
page execute read
F326000
heap
page read and write
4B1C000
stack
page read and write
7B70000
trusted library section
page read and write
5B00000
trusted library allocation
page read and write
7FF566B93000
unkown
page readonly
F553000
heap
page read and write
8CB7000
heap
page read and write
ACDF000
stack
page read and write
F265000
heap
page read and write
FD60000
heap
page read and write
8C48000
heap
page read and write
C70C000
unkown
page readonly
F55F000
heap
page read and write
5317000
heap
page read and write
7FF566FA1000
unkown
page readonly
7FF566EE5000
unkown
page readonly
7FF566B99000
unkown
page readonly
C67C000
unkown
page readonly
5B00000
trusted library allocation
page read and write
7FF566BD9000
unkown
page readonly
7FF566C5A000
unkown
page readonly
B90000
heap
page read and write
DDFD000
heap
page read and write
1870000
heap
page read and write
7FF566B8C000
unkown
page readonly
DD66000
heap
page read and write
4E90000
unkown
page readonly
7FF566BCB000
unkown
page readonly
7790000
trusted library allocation
page read and write
FD5E000
heap
page read and write
C80000
heap
page read and write
F46A000
heap
page read and write
F260000
heap
page read and write
5D12000
trusted library allocation
page read and write
F49A000
heap
page read and write
912BAFB000
stack
page read and write
A862000
heap
page read and write
7C00000
trusted library allocation
page read and write
CD9E000
stack
page read and write
F478000
heap
page read and write
5910000
system
page execute and read and write
14CD000
heap
page read and write
676B000
stack
page read and write
F468000
heap
page read and write
5D30000
trusted library allocation
page read and write
51E0000
trusted library section
page read and write
8B34000
unkown
page read and write
DA17000
heap
page read and write
46B0000
unkown
page read and write
F63E000
heap
page read and write
F0C3000
heap
page read and write
FA36000
unkown
page read and write
BA6E000
stack
page read and write
BC69000
stack
page read and write
5F3C000
stack
page read and write
548D000
stack
page read and write
34C6000
heap
page read and write
8C93000
heap
page read and write
3940000
trusted library allocation
page read and write
7FF566CFD000
unkown
page readonly
7FF566D39000
unkown
page readonly
5D07000
trusted library allocation
page read and write
74EE000
unkown
page readonly
4E90000
unkown
page readonly
F01C000
heap
page read and write
51E0000
trusted library section
page read and write
5D07000
trusted library allocation
page read and write
B34000
heap
page read and write
38A5000
heap
page read and write
B46C000
stack
page read and write
23E1CF93000
unkown
page read and write
3B11000
heap
page read and write
CAD987A000
stack
page read and write
7FF566B73000
unkown
page readonly
7FF566E25000
unkown
page readonly
5AF0000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
A8C1000
heap
page read and write
F268000
heap
page read and write
1E388C81000
unkown
page read and write
2542423D000
unkown
page read and write
C615000
unkown
page readonly
1F4EAF30000
heap
page read and write
FD7A000
heap
page read and write
8767000
stack
page read and write
3AFD000
heap
page read and write
5D30000
trusted library allocation
page read and write
AA60000
heap
page read and write
5CFB000
trusted library allocation
page read and write
23E1C5E0000
remote allocation
page read and write
7FD0000
trusted library allocation
page read and write
80DD000
stack
page read and write
DB4A000
heap
page read and write
EE54000
unkown
page read and write
52F0000
trusted library allocation
page read and write
101E1000
heap
page read and write
7FFF977BE000
unkown
page read and write
7512000
heap
page read and write
5B00000
trusted library allocation
page read and write
EFF4000
heap
page read and write
5070000
unkown
page readonly
3AE1000
heap
page read and write
FC3000
heap
page read and write
5D30000
trusted library allocation
page read and write
23E1CF5E000
unkown
page read and write
7507000
unkown
page readonly
5D30000
trusted library allocation
page read and write
10063000
heap
page read and write
7660000
trusted library allocation
page read and write
7DF47E151000
trusted library allocation
page execute read
E5D2000
heap
page read and write
8CF8000
heap
page read and write
14AD000
heap
page read and write
14CA000
heap
page read and write
DADA000
heap
page read and write
A905000
heap
page read and write
F48A000
heap
page read and write
A8EE000
heap
page read and write
CAD0000
trusted library allocation
page read and write
5D17000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
10086000
heap
page read and write
1940000
unkown
page read and write
4A18000
stack
page read and write
ABD4000
heap
page read and write
FD60000
heap
page read and write
F3A9000
heap
page read and write
8CA0000
heap
page read and write
5D07000
trusted library allocation
page read and write
76FC000
unkown
page readonly
30D0000
unkown
page read and write
E5CF000
heap
page read and write
8C02000
unkown
page read and write
4860000
unkown
page read and write
83DB000
stack
page read and write
8D76000
heap
page read and write
5AB9000
stack
page read and write
E6F0000
unkown
page read and write
7FF566B99000
unkown
page readonly
B4D2000
unkown
page readonly
E5F6000
heap
page read and write
EE0C000
unkown
page read and write
5184000
heap
page read and write
74FA000
heap
page read and write
10DBB000
heap
page read and write
B4CB000
unkown
page readonly
204E4E3D000
unkown
page read and write
5D30000
trusted library allocation
page read and write
F036000
heap
page read and write
8C1F000
unkown
page read and write
7FF566DF7000
unkown
page readonly
89EB000
stack
page read and write
7FF566F7F000
unkown
page readonly
3A4C000
heap
page read and write
EFDF000
heap
page read and write
E611000
heap
page read and write
8BDA000
unkown
page read and write
5D07000
trusted library allocation
page read and write
7F59000
stack
page read and write
8DAD000
heap
page read and write
FE0000
heap
page read and write
7FF5668FA000
unkown
page readonly
DC20000
heap
page read and write
101D5000
heap
page read and write
3950000
trusted library allocation
page read and write
38A5000
heap
page read and write
EE01000
unkown
page read and write
D7BE000
heap
page read and write
FD74000
heap
page read and write
E758000
unkown
page read and write
5360000
trusted library allocation
page read and write
F551000
heap
page read and write
7FF566AD6000
unkown
page readonly
7FF566FB1000
unkown
page readonly
7FF566FFE000
unkown
page readonly
BB60000
heap
page read and write
4CAB000
trusted library allocation
page execute and read and write
1060000
heap
page read and write
F478000
heap
page read and write
9C0000
heap
page read and write
B2E8000
stack
page read and write
2F5A000
unkown
page read and write
FD78000
heap
page read and write
23E1CF69000
unkown
page read and write
D815000
heap
page read and write
3882000
heap
page read and write
843B000
stack
page read and write
3CA8000
stack
page read and write
DD31000
heap
page read and write
F49A000
heap
page read and write
11F0000
heap
page read and write
4A00000
trusted library allocation
page execute and read and write
F29E000
heap
page read and write
502F000
unkown
page read and write
5AF0000
trusted library allocation
page read and write
53CC000
heap
page read and write
F136000
heap
page read and write
77B5000
unkown
page readonly
BFC3000
unkown
page readonly
7FF566AF8000
unkown
page readonly
7DF47E300000
trusted library allocation
page readonly
76B0000
trusted library allocation
page read and write
8C31000
heap
page read and write
37AE000
stack
page read and write
FD7C000
heap
page read and write
7FF566B59000
unkown
page readonly
D2FA000
stack
page read and write
CA80000
trusted library allocation
page read and write
BD6A000
stack
page read and write
7FF566FEC000
unkown
page readonly
F478000
heap
page read and write
F5FE000
heap
page read and write
BC04000
heap
page read and write
D61000
heap
page read and write
5D07000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
CA60000
trusted library allocation
page read and write
7FF566F1D000
unkown
page readonly
7FF566895000
unkown
page readonly
53EF000
heap
page read and write
AC35000
heap
page read and write
5800000
trusted library allocation
page read and write
F4DC000
heap
page read and write
69DA000
unkown
page read and write
26635A50000
heap
page read and write
7FF566921000
unkown
page readonly
5D30000
trusted library allocation
page read and write
E659000
heap
page read and write
8D6F000
heap
page read and write
4DD0000
unkown
page read and write
A8BE000
heap
page read and write
F9F3000
unkown
page read and write
D57A000
stack
page read and write
5CEA72B000
stack
page read and write
DC3C000
heap
page read and write
7DF47E2D0000
trusted library allocation
page readonly
F48C000
heap
page read and write
AB79E7E000
stack
page read and write
D895000
heap
page read and write
8A54000
heap
page read and write
74EE000
unkown
page readonly
7FF566ADE000
unkown
page readonly
8DB8000
heap
page read and write
F48C000
heap
page read and write
B2FE000
stack
page read and write
F61B000
heap
page read and write
5D26000
trusted library allocation
page read and write
DC1A000
heap
page read and write
DEA6000
heap
page read and write
571A000
heap
page read and write
76D0000
trusted library allocation
page read and write
F46E000
heap
page read and write
7FF566876000
unkown
page readonly
1F4EB07B000
unkown
page read and write
7FF566CEC000
unkown
page readonly
E6EE000
stack
page read and write
10072000
heap
page read and write
D6DF000
stack
page read and write
5D30000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
8CBA000
heap
page read and write
F48A000
heap
page read and write
5D30000
trusted library allocation
page read and write
1463000
heap
page read and write
3141000
unkown
page read and write
3A70000
heap
page read and write
8D1B000
heap
page read and write
8DB2000
unkown
page read and write
E5CF000
heap
page read and write
6AD8000
stack
page read and write
23E1CF73000
unkown
page read and write
CEA0000
heap
page read and write
C8F3000
trusted library allocation
page read and write
53E4000
heap
page read and write
9E8000
heap
page read and write
10C20000
trusted library allocation
page read and write
D87B000
heap
page read and write
10280000
heap
page read and write
5D30000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
ACDF000
stack
page read and write
C0C0000
heap
page read and write
526C000
heap
page read and write
3350000
unkown
page readonly
D91E000
stack
page read and write
F014000
heap
page read and write
450877C000
stack
page read and write
25A9AB90000
heap
page read and write
D883000
heap
page read and write
8CA3000
heap
page read and write
3806000
heap
page read and write
A877000
heap
page read and write
2D69000
stack
page read and write
7FF566FF6000
unkown
page readonly
A8C8000
heap
page read and write
B872D5B000
stack
page read and write
5CFB000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
23E1D402000
unkown
page read and write
F197000
heap
page read and write
F494000
heap
page read and write
BB89000
heap
page read and write
8ACF000
unkown
page read and write
5D30000
trusted library allocation
page read and write
AAD7000
heap
page read and write
382B000
heap
page read and write
7DF47E280000
trusted library allocation
page readonly
B50000
trusted library allocation
page read and write
4E90000
unkown
page readonly
F308000
heap
page read and write
5D07000
trusted library allocation
page read and write
AA8A000
heap
page read and write
F05E000
heap
page read and write
FEF0000
heap
page read and write
AF7F000
unkown
page read and write
F551000
heap
page read and write
DC16000
heap
page read and write
896E000
stack
page read and write
8F7D000
stack
page read and write
DD2A000
heap
page read and write
7FF566E6C000
unkown
page readonly
4890000
unkown
page readonly
DC52000
heap
page read and write
5D07000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
FE0000
heap
page read and write
BBAB000
heap
page read and write
F49C000
heap
page read and write
F594000
heap
page read and write
BB64000
heap
page read and write
7373000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF566EA3000
unkown
page readonly
3628000
stack
page read and write
4DD0000
unkown
page read and write
BCE8000
stack
page read and write
1035D000
heap
page read and write
FD60000
heap
page read and write
5D30000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
57D8000
heap
page read and write
F498000
heap
page read and write
DE33000
heap
page read and write
579F000
heap
page read and write
B9B0000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
754C000
heap
page read and write
A864000
heap
page read and write
7FF566F88000
unkown
page readonly
5CF3000
trusted library allocation
page read and write
7FF566D36000
unkown
page readonly
204E4E8E000
unkown
page read and write
DF6D000
heap
page read and write
5B00000
trusted library allocation
page read and write
E70000
unkown
page readonly
FD4C000
heap
page read and write
1478000
heap
page read and write
AF94000
unkown
page read and write
8C9B000
heap
page read and write
F014000
heap
page read and write
85DD000
stack
page read and write
8C48000
heap
page read and write
7783000
trusted library allocation
page read and write
1F4EB04C000
unkown
page read and write
10DEF000
heap
page read and write
1F17DF13000
unkown
page read and write
5B10000
trusted library allocation
page read and write
E68E000
heap
page read and write
7DF42C5D1000
trusted library allocation
page execute read
EFB6000
heap
page read and write
5D02000
trusted library allocation
page read and write
3855000
heap
page read and write
A9E5000
heap
page read and write
10025000
heap
page read and write
7FF56690D000
unkown
page readonly
1496000
heap
page read and write
8BCE000
heap
page read and write
23E1CF9A000
unkown
page read and write
DD0D000
heap
page read and write
25A9AE00000
unkown
page read and write
46B0000
unkown
page read and write
E5F6000
heap
page read and write
A860000
heap
page read and write
25424247000
unkown
page read and write
FE28000
heap
page read and write
DC1A000
heap
page read and write
754C000
heap
page read and write
557E000
system
page execute and read and write
75D0000
trusted library allocation
page read and write
8D9B000
heap
page read and write
39A8000
stack
page read and write
2890000
unkown
page readonly
1F4EAF40000
heap
page read and write
F5C9000
heap
page read and write
7FF566CD8000
unkown
page readonly
DFA1000
heap
page read and write
A983000
heap
page read and write
1119000
system
page execute and read and write
EB50000
unkown
page execute and read and write
5D07000
trusted library allocation
page read and write
7FF566D05000
unkown
page readonly
7B5D000
stack
page read and write
739F000
heap
page read and write
8BC2000
heap
page read and write
20A18200000
unkown
page read and write
FC6000
heap
page read and write
10184000
heap
page read and write
2DDD000
stack
page read and write
F160000
heap
page read and write
F2D3000
heap
page read and write
DB85000
heap
page read and write
E60D000
heap
page read and write
AF01000
unkown
page read and write
315F000
system
page read and write
5763000
heap
page read and write
7FF566BD9000
unkown
page readonly
A8A5000
heap
page read and write
7FF566A8A000
unkown
page readonly
F73000
heap
page read and write
7FF566FEC000
unkown
page readonly
AF8F000
unkown
page read and write
7FF566B14000
unkown
page readonly
7FF566AAD000
unkown
page readonly
5910000
system
page execute and read and write
34C6000
heap
page read and write
B91000
heap
page read and write
760A000
unkown
page readonly
7FF566E6C000
unkown
page readonly
5D13000
trusted library allocation
page read and write
FD48000
heap
page read and write
8CA7000
heap
page read and write
DD75000
heap
page read and write
F057000
heap
page read and write
8BA8000
heap
page read and write
14C1000
heap
page read and write
1870000
heap
page read and write
5338000
heap
page read and write
FAB000
heap
page read and write
52AE000
stack
page read and write
7594000
unkown
page readonly
5AC0000
trusted library allocation
page read and write
FF41000
heap
page read and write
8D6A000
heap
page read and write
F008000
heap
page read and write
BB70000
heap
page read and write
3A83000
heap
page read and write
204E4EAC000
unkown
page read and write
11F5000
heap
page read and write
DC1C000
heap
page read and write
1E528AD0000
trusted library allocation
page read and write
A99D000
heap
page read and write
7FF566FA9000
unkown
page readonly
FD58000
heap
page read and write
23E1CF93000
unkown
page read and write
FD64000
heap
page read and write
8C9B000
heap
page read and write
BC02000
heap
page read and write
DEB4000
heap
page read and write
30E0000
unkown
page readonly
8D11000
heap
page read and write
5710000
heap
page read and write
5D07000
trusted library allocation
page read and write
8BCF000
heap
page read and write
7FF566874000
unkown
page readonly
23E1CF6D000
unkown
page read and write
6AD8000
stack
page read and write
2F4B000
unkown
page read and write
5D07000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
10D3D000
heap
page read and write
8BE5000
unkown
page read and write
BBE8000
heap
page read and write
52E0000
trusted library allocation
page read and write
8B41000
heap
page read and write
8C90000
heap
page read and write
A92C000
heap
page read and write
83EB000
stack
page read and write
8BBC000
heap
page read and write
750A000
heap
page read and write
ABDF000
heap
page read and write
5B00000
trusted library allocation
page read and write
E60D000
heap
page read and write
FEF0000
heap
page read and write
204EA2F0000
trusted library allocation
page read and write
A8D3000
heap
page read and write
E756000
unkown
page read and write
7710000
trusted library allocation
page read and write
123B000
stack
page read and write
8C98000
heap
page read and write
750A000
heap
page read and write
7650000
trusted library allocation
page read and write
F480000
heap
page read and write
8B4E000
unkown
page read and write
754C000
heap
page read and write
5D1F000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
590C000
stack
page read and write
5D30000
trusted library allocation
page read and write
53D7000
heap
page read and write
5CFB000
trusted library allocation
page read and write
7FF566EAA000
unkown
page readonly
7FF566ED2000
unkown
page readonly
E7D000
stack
page read and write
AC45000
heap
page read and write
4690000
unkown
page read and write
F472000
heap
page read and write
3806000
heap
page read and write
DF81000
heap
page read and write
8D36000
heap
page read and write
1343000
unclassified section
page execute and read and write
29A3000
heap
page read and write
739F000
heap
page read and write
BB1000
heap
page read and write
AF01000
unkown
page read and write
AA8A000
heap
page read and write
FD7A000
heap
page read and write
DB59000
heap
page read and write
74FA000
heap
page read and write
CA80000
trusted library allocation
page read and write
4507FFC000
stack
page read and write
20A18240000
unkown
page read and write
F554000
heap
page read and write
7690000
trusted library allocation
page read and write
25A9AE5B000
unkown
page read and write
ABD1000
heap
page read and write
E5CE000
heap
page read and write
F005000
heap
page read and write
47A0000
trusted library allocation
page execute and read and write
F462000
heap
page read and write
F25E000
heap
page read and write
57EB000
heap
page read and write
5D07000
trusted library allocation
page read and write
8DAD000
heap
page read and write
5D30000
trusted library allocation
page read and write
D7C0000
heap
page read and write
5800000
heap
page read and write
4670000
unkown
page read and write
5B00000
trusted library allocation
page read and write
B9D0000
trusted library allocation
page read and write
7FF566FF6000
unkown
page readonly
1870000
heap
page read and write
1960000
unkown
page readonly
E721000
unkown
page read and write
1F17DD10000
heap
page read and write
5318000
heap
page read and write
DC2C000
heap
page read and write
1BD13A02000
unkown
page read and write
5800000
trusted library allocation
page read and write
F11D000
heap
page read and write
7FF566866000
unkown
page readonly
5D30000
trusted library allocation
page read and write
2F60000
unkown
page read and write
E65D000
heap
page read and write
7695000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
204EA560000
trusted library allocation
page read and write
4FC0000
unkown
page readonly
F55A000
heap
page read and write
AABE000
heap
page read and write
3803000
heap
page read and write
46B3000
unkown
page read and write
89F9000
unkown
page read and write
10113000
heap
page read and write
10285000
heap
page read and write
F73000
heap
page read and write
FD68000
heap
page read and write
7FF566EDE000
unkown
page readonly
BBC5000
heap
page read and write
51E0000
trusted library section
page read and write
10070000
heap
page read and write
7FF541D9F000
unkown
page readonly
5D30000
trusted library allocation
page read and write
502F000
unkown
page read and write
EFB2000
heap
page read and write
53CC000
heap
page read and write
F492000
heap
page read and write
32CA000
stack
page read and write
89F0000
unkown
page read and write
6840000
unkown
page read and write
7FFF97DDE000
unkown
page read and write
7FF566CF4000
unkown
page readonly
BC02000
heap
page read and write
23E1C6A1000
unkown
page read and write
10025000
heap
page read and write
5D30000
trusted library allocation
page read and write
5CEAEFE000
stack
page read and write
5D07000
trusted library allocation
page read and write
8CFF000
heap
page read and write
A94D000
heap
page read and write
5D07000
trusted library allocation
page read and write
575E000
heap
page read and write
A4D0000
trusted library allocation
page read and write
F237000
heap
page read and write
4B1B000
trusted library allocation
page execute and read and write
204E5D03000
trusted library allocation
page read and write
AB41000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF566DD2000
unkown
page readonly
7FF566A8F000
unkown
page readonly
5D30000
trusted library allocation
page read and write
10C50000
trusted library allocation
page read and write
F480000
heap
page read and write
39AA000
stack
page read and write
8C2F000
heap
page read and write
1463000
heap
page read and write
4B1C000
stack
page read and write
54E0000
system
page execute and read and write
736D000
heap
page read and write
E678000
heap
page read and write
39AB000
stack
page read and write
A9B5000
heap
page read and write
26635BA7000
heap
page read and write
8C1B000
unkown
page read and write
6D5E000
stack
page read and write
5D0B000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
23E1CF92000
unkown
page read and write
3A83000
heap
page read and write
D4D0000
trusted library allocation
page read and write
8B39000
heap
page read and write
5D30000
trusted library allocation
page read and write
7547000
heap
page read and write
13B0000
trusted library allocation
page execute and read and write
F486000
heap
page read and write
F4D9000
heap
page read and write
EFB6000
heap
page read and write
8C1E000
heap
page read and write
1752000
trusted library allocation
page read and write
7FFF97C40000
unkown
page readonly
5D30000
trusted library allocation
page read and write
8BC6000
heap
page read and write
7FF566F78000
unkown
page readonly
E758000
unkown
page read and write
DDFD000
heap
page read and write
DC22000
heap
page read and write
8D8F000
heap
page read and write
6A3D000
unkown
page read and write
DC22000
heap
page read and write
E5D7000
heap
page read and write
7FF56705C000
unkown
page readonly
1E527B00000
heap
page read and write
8569000
stack
page read and write
7FF566B1F000
unkown
page readonly
BB60000
heap
page read and write
F462000
heap
page read and write
F058000
heap
page read and write
2DEE000
stack
page read and write
8BCF000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF566E74000
unkown
page readonly
5749000
heap
page read and write
80B9000
stack
page read and write
5D30000
trusted library allocation
page read and write
46C3000
unkown
page read and write
F126000
heap
page read and write
4880000
unkown
page read and write
4670000
unkown
page read and write
7512000
heap
page read and write
FC0000
heap
page read and write
1010000
unkown
page readonly
1742000
trusted library allocation
page read and write
F93000
heap
page read and write
5CFB000
trusted library allocation
page read and write
DC1E000
heap
page read and write
5718000
heap
page read and write
7494AFE000
stack
page read and write
5F40000
unkown
page read and write
AB2C000
heap
page read and write
7FF566C3A000
unkown
page readonly
A89C000
heap
page read and write
5080000
unkown
page readonly
BB8B000
heap
page read and write
DC4C000
heap
page read and write
79B0000
trusted library allocation
page read and write
83BD000
stack
page read and write
7FF566E8A000
unkown
page readonly
204EA628000
unkown
page read and write
BCD2000
unkown
page readonly
7593000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
25424231000
unkown
page read and write
3BF9000
stack
page read and write
F3A7000
heap
page read and write
845B000
stack
page read and write
DF71000
heap
page read and write
F1CC000
heap
page read and write
8C98000
heap
page read and write
FD4A000
heap
page read and write
750A000
heap
page read and write
14A5000
heap
page read and write
EFF7000
heap
page read and write
8D76000
heap
page read and write
D86000
system
page read and write
3AB2000
heap
page read and write
7FF566F78000
unkown
page readonly
57E0000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
8A5E000
heap
page read and write
FD62000
heap
page read and write
8A8C000
heap
page read and write
7FF566B50000
unkown
page readonly
FD5A000
heap
page read and write
5CFB000
trusted library allocation
page read and write
F008000
heap
page read and write
5810000
trusted library allocation
page read and write
5CEA000
trusted library allocation
page read and write
7FF566BCB000
unkown
page readonly
7437000
unkown
page readonly
B267000
stack
page read and write
5D19000
trusted library allocation
page read and write
5D1B000
trusted library allocation
page read and write
588D000
stack
page read and write
5D30000
trusted library allocation
page read and write
3320000
unkown
page read and write
AF2A000
unkown
page read and write
5D30000
trusted library allocation
page read and write
ABCB000
heap
page read and write
5D30000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
F02C000
heap
page read and write
5D07000
trusted library allocation
page read and write
F44A000
heap
page read and write
F49A000
heap
page read and write
73E9000
heap
page read and write
F970000
trusted library allocation
page read and write
5D11000
trusted library allocation
page read and write
DC24000
heap
page read and write
5D30000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
F468000
heap
page read and write
5D10000
trusted library allocation
page read and write
BC1E000
heap
page read and write
1724000
trusted library allocation
page read and write
7DF47E301000
trusted library allocation
page execute read
89FD000
unkown
page read and write
A99D000
heap
page read and write
FD38000
heap
page read and write
E6B7000
heap
page read and write
F47E000
heap
page read and write
5D02000
trusted library allocation
page read and write
EE05000
unkown
page read and write
AD5E000
stack
page read and write
8C6D000
heap
page read and write
F45000
heap
page read and write
8D0A000
heap
page read and write
52AE000
stack
page read and write
315F000
system
page read and write
57D0000
trusted library allocation
page read and write
550C000
stack
page read and write
DC4E000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF566866000
unkown
page readonly
A8A5000
heap
page read and write
DC24000
heap
page read and write
5D20000
trusted library allocation
page read and write
DA70000
unkown
page read and write
7FF566876000
unkown
page readonly
7FF566C75000
unkown
page readonly
23E1CF93000
unkown
page read and write
575E000
heap
page read and write
1006A000
heap
page read and write
6AD8000
stack
page read and write
573B000
heap
page read and write
8C90000
heap
page read and write
74B1000
unkown
page readonly
6BD8000
stack
page read and write
7FCE000
stack
page read and write
F93000
heap
page read and write
5D07000
trusted library allocation
page read and write
F47A000
heap
page read and write
7DF47E171000
trusted library allocation
page execute read
10DEF000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF566F55000
unkown
page readonly
546C000
stack
page read and write
AABA000
heap
page read and write
6C36000
stack
page read and write
10065000
heap
page read and write
F4D3000
heap
page read and write
CC1A000
stack
page read and write
8A8C000
heap
page read and write
5CF4000
trusted library allocation
page read and write
DF6A000
heap
page read and write
7FF566CEC000
unkown
page readonly
DB4E000
heap
page read and write
7D50000
trusted library allocation
page read and write
AA02000
heap
page read and write
7FF566E80000
unkown
page readonly
F8B0000
trusted library allocation
page read and write
BBC5000
heap
page read and write
BC1E000
heap
page read and write
28B0000
unkown
page readonly
7A60000
trusted library allocation
page read and write
3B08000
heap
page read and write
23E1CFA3000
unkown
page read and write
F8D3000
trusted library allocation
page read and write
5714000
heap
page read and write
5D30000
trusted library allocation
page read and write
D85B000
heap
page read and write
23E1CF69000
unkown
page read and write
8C73000
unkown
page read and write
5D0B000
trusted library allocation
page read and write
2F60000
unkown
page read and write
25424257000
unkown
page read and write
5D07000
trusted library allocation
page read and write
AD5E000
stack
page read and write
5830000
trusted library allocation
page read and write
7FF566B70000
unkown
page readonly
A8C8000
heap
page read and write
A9D4000
heap
page read and write
5B00000
trusted library allocation
page read and write
7FF566F50000
unkown
page readonly
E728000
unkown
page read and write
BC02000
heap
page read and write
101B9000
heap
page read and write
F10F000
heap
page read and write
23E1CFB5000
unkown
page read and write
FC3000
heap
page read and write
10DEF000
heap
page read and write
54B0000
trusted library section
page read and write
FD62000
heap
page read and write
10DB1000
heap
page read and write
1007C000
heap
page read and write
8D6F000
heap
page read and write
502F000
unkown
page read and write
EF9000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF566F44000
unkown
page readonly
10184000
heap
page read and write
DB6D000
heap
page read and write
8CA0000
heap
page read and write
82DD000
stack
page read and write
5D07000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
FCD000
heap
page read and write
A89C000
heap
page read and write
7FF566E85000
unkown
page readonly
7032000
unkown
page readonly
ABAE000
heap
page read and write
5CFB000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
8D87000
heap
page read and write
4FC0000
unkown
page readonly
7620000
trusted library allocation
page read and write
E631000
heap
page read and write
3B30000
trusted library allocation
page read and write
FD43000
heap
page read and write
2DD8000
stack
page read and write
DC1E000
heap
page read and write
F260000
heap
page read and write
8C19000
unkown
page read and write
4830000
unkown
page read and write
7FF566A98000
unkown
page readonly
AC2E000
heap
page read and write
5B00000
trusted library allocation
page read and write
FAB000
heap
page read and write
5D30000
trusted library allocation
page read and write
53D7000
heap
page read and write
5D30000
trusted library allocation
page read and write
204E5704000
unkown
page read and write
FD5C000
heap
page read and write
8D2C000
heap
page read and write
DC50000
heap
page read and write
F474000
heap
page read and write
BD0000
unkown
page readonly
10C70000
trusted library allocation
page read and write
5180000
trusted library section
page read and write
AF2A000
unkown
page read and write
A864000
heap
page read and write
7FF566FA9000
unkown
page readonly
7FF566F13000
unkown
page readonly
1110000
system
page execute and read and write
7FFF97C40000
unkown
page readonly
F460000
heap
page read and write
8B4E000
unkown
page read and write
5D30000
trusted library allocation
page read and write
8A03000
unkown
page read and write
101D9000
heap
page read and write
23E1D402000
unkown
page read and write
F311000
heap
page read and write
16CE000
stack
page read and write
DC1A000
heap
page read and write
146C000
heap
page read and write
8D88000
heap
page read and write
1140000
unkown
page read and write
BF79000
stack
page read and write
F4E0000
heap
page read and write
3898000
heap
page read and write
7A00000
unkown
page readonly
51AB000
stack
page read and write
7B5D000
stack
page read and write
F48C000
heap
page read and write
383A000
heap
page read and write
149F000
heap
page read and write
8A69000
heap
page read and write
8D07000
heap
page read and write
10088000
heap
page read and write
53B6000
stack
page read and write
B05A000
stack
page read and write
8ADA000
heap
page read and write
7DF47E311000
trusted library allocation
page execute read
F900000
heap
page read and write
7494B7F000
stack
page read and write
5CEADFE000
stack
page read and write
8D6F000
heap
page read and write
5720000
heap
page read and write
7FF566DC3000
unkown
page readonly
5D1A000
trusted library allocation
page read and write
4F90000
unkown
page readonly
86DD000
stack
page read and write
AA8A000
heap
page read and write
F25E000
heap
page read and write
3A97000
heap
page read and write
5D30000
trusted library allocation
page read and write
53E9000
heap
page read and write
3A41000
heap
page read and write
A9E7000
heap
page read and write
53C9000
heap
page read and write
DB92000
heap
page read and write
BBC5000
heap
page read and write
F8D0000
trusted library allocation
page read and write
7FF566EAA000
unkown
page readonly
10358000
heap
page read and write
7CDA000
stack
page read and write
AC1D000
heap
page read and write
FD78000
heap
page read and write
76BE000
unkown
page readonly
5227000
stack
page read and write
23E1C4D0000
heap
page read and write
8A09000
heap
page read and write
7FF566C8C000
unkown
page readonly
7FFF97DDA000
unkown
page read and write
7FF566B6D000
unkown
page readonly
8CEA000
unkown
page read and write
7FFF97DDE000
unkown
page read and write
7FF566DC3000
unkown
page readonly
F4D9000
heap
page read and write
53C9000
heap
page read and write
5D30000
trusted library allocation
page read and write
A862000
heap
page read and write
F14F000
heap
page read and write
DC06000
heap
page read and write
5CB0000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
7809000
unkown
page readonly
32A0000
trusted library allocation
page read and write
6D5E000
stack
page read and write
AAD9000
heap
page read and write
FF1C000
heap
page read and write
1E527F19000
heap
page read and write
F974000
unkown
page read and write
BA16000
heap
page read and write
74FA000
heap
page read and write
10C53000
trusted library allocation
page read and write
7DF47E311000
trusted library allocation
page execute read
8D11000
heap
page read and write
8E83000
unkown
page read and write
450887F000
stack
page read and write
7FF566E68000
unkown
page readonly
FE0000
heap
page read and write
5D07000
trusted library allocation
page read and write
FDAB000
heap
page read and write
FD76000
heap
page read and write
32C0000
heap
page execute and read and write
37D2000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
DF71000
heap
page read and write
4700000
unkown
page read and write
BB89000
heap
page read and write
7FF566E17000
unkown
page readonly
A94D000
heap
page read and write
A9FB000
heap
page read and write
7FF566F69000
unkown
page readonly
F266000
heap
page read and write
5CEB000
trusted library allocation
page read and write
5345000
heap
page read and write
3855000
heap
page read and write
A889000
heap
page read and write
F608000
heap
page read and write
537A000
heap
page read and write
F3A9000
heap
page read and write
1014F000
heap
page read and write
23E1CF65000
unkown
page read and write
D9EE000
heap
page read and write
BBE8000
heap
page read and write
5B10000
trusted library allocation
page read and write
76BE000
unkown
page readonly
FE0000
heap
page read and write
8BDA000
unkown
page read and write
10072000
heap
page read and write
5D30000
trusted library allocation
page read and write
BBC000
heap
page read and write
DC30000
heap
page read and write
4850000
unkown
page read and write
2980000
unkown
page read and write
7DF47E1A1000
trusted library allocation
page execute read
2F47000
unkown
page read and write
F337000
heap
page read and write
5CFB000
trusted library allocation
page read and write
7B5D000
stack
page read and write
5D30000
trusted library allocation
page read and write
3340000
unkown
page read and write
DC26000
heap
page read and write
7397000
heap
page read and write
DC52000
heap
page read and write
CE1B000
stack
page read and write
914000
heap
page read and write
AF7F000
unkown
page read and write
8D1A000
heap
page read and write
537A000
heap
page read and write
7FF566906000
unkown
page readonly
2DEE000
stack
page read and write
F020000
heap
page read and write
914000
heap
page read and write
7382000
heap
page read and write
FD7C000
heap
page read and write
5F3C000
stack
page read and write
53CC000
heap
page read and write
DF9A000
heap
page read and write
8355000
stack
page read and write
896E000
stack
page read and write
F0F8000
heap
page read and write
23E1CFBF000
unkown
page read and write
5D07000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
7FF566F44000
unkown
page readonly
575E000
heap
page read and write
EA0000
heap
page read and write
702E000
unkown
page readonly
3BF9000
stack
page read and write
1E527EB0000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
8C2E000
unkown
page read and write
5D30000
trusted library allocation
page read and write
204E4E8B000
unkown
page read and write
89C0000
heap
page read and write
8BB5000
heap
page read and write
7C00000
trusted library allocation
page read and write
5D11000
trusted library allocation
page read and write
19A0000
heap
page read and write
ABB2000
heap
page read and write
204E4D50000
heap
page read and write
F14F000
heap
page read and write
5D07000
trusted library allocation
page read and write
7FF566FA9000
unkown
page readonly
5810000
trusted library allocation
page read and write
17D0000
heap
page read and write
F474000
heap
page read and write
FD76000
heap
page read and write
BBA5000
heap
page read and write
1140000
unkown
page read and write
7FFF977BD000
unkown
page write copy
4700000
unkown
page read and write
8CE5000
heap
page read and write
7529000
heap
page read and write
5C80000
trusted library allocation
page read and write
E60D000
heap
page read and write
5D30000
trusted library allocation
page read and write
FE25000
heap
page read and write
5D11000
trusted library allocation
page read and write
B8D7000
unkown
page readonly
3330000
unkown
page readonly
BB89000
heap
page read and write
11F5000
heap
page read and write
D871000
heap
page read and write
BBE8000
heap
page read and write
7FF566EE5000
unkown
page readonly
F25E000
heap
page read and write
101ED000
heap
page read and write
149E000
heap
page read and write
EFF7000
heap
page read and write
5D30000
trusted library allocation
page read and write
5D0C000
trusted library allocation
page read and write
7DF47E2E0000
trusted library allocation
page readonly
3CA5000
stack
page read and write
CADA2FF000
stack
page read and write
74F7000
heap
page read and write
8CAA000
heap
page read and write
7A00000
unkown
page readonly
8B46000
heap
page read and write
10D45000
heap
page read and write
3814000
heap
page read and write
8C4B000
heap
page read and write
F014000
heap
page read and write
57C000
stack
page read and write
774E000
unkown
page readonly
8BB1000
heap
page read and write
5B00000
trusted library allocation
page read and write
AE6F000
stack
page read and write
EB40000
heap
page read and write
AAF9000
heap
page read and write
BC02000
heap
page read and write
5176000
heap
page read and write
5D04000
trusted library allocation
page read and write
7FF566F13000
unkown
page readonly
5D30000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
AB2E000
heap
page read and write
FC9000
heap
page read and write
8355000
stack
page read and write
AAD2000
heap
page read and write
A94D000
heap
page read and write
BBC5000
heap
page read and write
84DE000
stack
page read and write
5080000
unkown
page readonly
3DF9000
stack
page read and write
7FF566D3F000
unkown
page readonly
3BAC000
stack
page read and write
7580000
trusted library allocation
page read and write
7547000
heap
page read and write
DB7D000
heap
page read and write
E5F1000
heap
page read and write
E70000
unkown
page readonly
8D39000
heap
page read and write
54E0000
system
page execute and read and write
32A0000
trusted library allocation
page read and write
DB95000
heap
page read and write
5830000
trusted library allocation
page read and write
7FF566EF0000
unkown
page readonly
F01C000
heap
page read and write
7507000
unkown
page readonly
3330000
unkown
page readonly
59BB000
stack
page read and write
CA30000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
8A8C000
heap
page read and write
7FF567004000
unkown
page readonly
8D07000
heap
page read and write
8BC8000
heap
page read and write
F472000
heap
page read and write
F601000
heap
page read and write
7720000
trusted library allocation
page read and write
DC06000
heap
page read and write
7360000
heap
page read and write
5CFB000
trusted library allocation
page read and write
E63F000
heap
page read and write
5D1E000
trusted library allocation
page read and write
76B7000
stack
page read and write
F337000
heap
page read and write
BB6F000
heap
page read and write
F14F000
heap
page read and write
20A181C0000
unkown
page read and write
1E388D02000
unkown
page read and write
1E527BE3000
heap
page read and write
3CA5000
stack
page read and write
CADA0FF000
stack
page read and write
7FFF97D29000
unkown
page readonly
F468000
heap
page read and write
D998000
heap
page read and write
FF0000
unkown
page readonly
85DD000
stack
page read and write
8D8F000
heap
page read and write
BBAB000
heap
page read and write
4B9C000
stack
page read and write
F3E0000
heap
page read and write
7FF567073000
unkown
page readonly
5D30000
trusted library allocation
page read and write
F5C9000
heap
page read and write
CAD0000
trusted library allocation
page read and write
BBED000
stack
page read and write
149A000
heap
page read and write
2EAE000
unkown
page read and write
10DF0000
heap
page read and write
E5F6000
heap
page read and write
5353000
heap
page read and write
F04C000
heap
page read and write
F01F000
heap
page read and write
F474000
heap
page read and write
3141000
unkown
page read and write
74EE000
unkown
page readonly
AE6F000
stack
page read and write
D8F000
stack
page read and write
5CF4000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
CE92000
unkown
page read and write
5800000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
AB7A277000
stack
page read and write
5D07000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
BBC5000
heap
page read and write
521A000
heap
page read and write
5800000
trusted library allocation
page read and write
1F4EB000000
unkown
page read and write
1260000
heap
page read and write
914000
heap
page read and write
DF6A000
heap
page read and write
5CFB000
trusted library allocation
page read and write
10DD8000
heap
page read and write
DC09000
heap
page read and write
D813000
heap
page read and write
DC50000
heap
page read and write
8D22000
heap
page read and write
8BC2000
heap
page read and write
204E4DE0000
unkown
page read and write
383A000
heap
page read and write
14B3000
heap
page read and write
F268000
heap
page read and write
E20000
unkown
page read and write
7FF566D05000
unkown
page readonly
5830000
trusted library allocation
page read and write
7FF566D3F000
unkown
page readonly
7FF566E2E000
unkown
page readonly
B681000
heap
page read and write
DB45000
heap
page read and write
5B00000
trusted library allocation
page read and write
8C5D000
heap
page read and write
10DE3000
heap
page read and write
52AE000
stack
page read and write
5CE8000
trusted library allocation
page read and write
7FF566E70000
unkown
page readonly
F12A000
heap
page read and write
204EA550000
trusted library allocation
page read and write
20A181F0000
remote allocation
page read and write
ABB2000
heap
page read and write
25A9AE3D000
unkown
page read and write
DB76000
heap
page read and write
8C5A000
heap
page read and write
2B70000
unclassified section
page execute and read and write
3855000
heap
page read and write
4FD0000
unkown
page readonly
23E1CF92000
unkown
page read and write
F486000
heap
page read and write
5D07000
trusted library allocation
page read and write
8D69000
heap
page read and write
52E0000
trusted library allocation
page read and write
8DA8000
heap
page read and write
AAEA000
heap
page read and write
7FF567073000
unkown
page readonly
5D30000
trusted library allocation
page read and write
8CA0000
heap
page read and write
7FF566D05000
unkown
page readonly
7670000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
23E1CF5D000
unkown
page read and write
FD48000
heap
page read and write
5B10000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
204E55E1000
trusted library allocation
page read and write
4820000
unkown
page read and write
8A61000
heap
page read and write
5D12000
trusted library allocation
page read and write
E756000
unkown
page read and write
6840000
unkown
page read and write
F460000
heap
page read and write
5B00000
trusted library allocation
page read and write
5D11000
trusted library allocation
page read and write
FE0000
heap
page read and write
7D50000
trusted library allocation
page read and write
73F5000
heap
page read and write
747E000
heap
page read and write
5D30000
trusted library allocation
page read and write
EA0000
unkown
page read and write
204EA450000
trusted library allocation
page read and write
8CEA000
unkown
page read and write
F4B5000
heap
page read and write
DC4E000
heap
page read and write
7DF47E270000
trusted library allocation
page readonly
754C000
heap
page read and write
5CFB000
trusted library allocation
page read and write
BB6F000
heap
page read and write
F308000
heap
page read and write
7FF566AE9000
unkown
page readonly
23E1CF93000
unkown
page read and write
204EA64A000
unkown
page read and write
D827000
heap
page read and write
FE0000
heap
page read and write
5EB7000
stack
page read and write
873C000
stack
page read and write
DC3A000
heap
page read and write
3260000
heap
page read and write
7FF566CFA000
unkown
page readonly
AA57000
heap
page read and write
7FF566F55000
unkown
page readonly
89BF000
stack
page read and write
FC6000
heap
page read and write
7DF47E241000
trusted library allocation
page execute read
A9C9000
heap
page read and write
3A2E000
stack
page read and write
F030000
heap
page read and write
BBE8000
heap
page read and write
3EE0000
heap
page read and write
53CE000
heap
page read and write
1065000
heap
page read and write
E631000
heap
page read and write
FD43000
heap
page read and write
F051000
heap
page read and write
8C48000
heap
page read and write
DF95000
heap
page read and write
C7C000
stack
page read and write
1E388D13000
unkown
page read and write
7D70000
trusted library allocation
page read and write
EFDF000
heap
page read and write
DE33000
heap
page read and write
A9B6000
heap
page read and write
8D69000
heap
page read and write
67F0000
trusted library allocation
page read and write
8ED000
stack
page read and write
73D2000
heap
page read and write
1987000
heap
page read and write
1070000
unkown
page readonly
2F29000
unkown
page read and write
5D30000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
86B8000
stack
page read and write
7DF47E310000
trusted library allocation
page readonly
A868000
heap
page read and write
EFDD000
heap
page read and write
7A70000
heap
page readonly
23E1C6EA000
unkown
page read and write
8D8E000
heap
page read and write
B978000
unkown
page readonly
3A85000
heap
page read and write
CA90000
trusted library allocation
page read and write
8DE7000
unkown
page read and write
AB31000
heap
page read and write
FD5A000
heap
page read and write
10065000
heap
page read and write
4F10000
unkown
page readonly
D873000
heap
page read and write
204EA6E3000
unkown
page read and write
1005A000
heap
page read and write
F970000
trusted library allocation
page read and write
8D2C000
heap
page read and write
8ADA000
heap
page read and write
385E000
heap
page read and write
5D11000
trusted library allocation
page read and write
5716000
heap
page read and write
5B00000
trusted library allocation
page read and write
8D6B000
heap
page read and write
5D07000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
1040000
unkown
page readonly
7FF566F0C000
unkown
page readonly
1E528A80000
trusted library allocation
page read and write
FD58000
heap
page read and write
FC4000
heap
page read and write
102ED000
heap
page read and write
1F4EB03C000
unkown
page read and write
DDF4000
heap
page read and write
EFA4000
heap
page read and write
7DF47E181000
trusted library allocation
page execute read
B9D3000
trusted library allocation
page read and write
254241E0000
unkown
page read and write
23E1CF6E000
unkown
page read and write
D813000
heap
page read and write
FE0000
heap
page read and write
BB68000
heap
page read and write
512A000
stack
page read and write
D82F000
heap
page read and write
5754000
heap
page read and write
F197000
heap
page read and write
577E000
heap
page read and write
BB6F000
heap
page read and write
5B00000
trusted library allocation
page read and write
37B0000
heap
page read and write
778C000
unkown
page readonly
FD6A000
heap
page read and write
5D04000
trusted library allocation
page read and write
4F90000
unkown
page readonly
4890000
unkown
page readonly
7DF47E271000
trusted library allocation
page execute read
C6E3000
unkown
page readonly
5D11000
trusted library allocation
page read and write
38A2000
heap
page read and write
5CB0000
trusted library allocation
page execute and read and write
3885000
heap
page read and write
1408000
heap
page read and write
5D30000
trusted library allocation
page read and write
ABB2000
heap
page read and write
5D07000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
F4DC000
heap
page read and write
8A2C000
heap
page read and write
5B00000
trusted library allocation
page read and write
E32000
unkown
page readonly
7800000
unkown
page readonly
5B00000
trusted library allocation
page read and write
BB15000
trusted library allocation
page read and write
7FF566B76000
unkown
page readonly
F4DC000
heap
page read and write
7C00000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
1F17DCB0000
heap
page read and write
DE71000
heap
page read and write
A8C1000
heap
page read and write
67EB000
stack
page read and write
7FFF97C41000
unkown
page execute read
A89F000
heap
page read and write
FD6A000
heap
page read and write
AA1A000
heap
page read and write
6A34000
unkown
page read and write
1AC6B6B9000
unkown
page read and write
8D9B000
heap
page read and write
BB7E000
heap
page read and write
6A5B000
stack
page read and write
BEF9000
stack
page read and write
BA00000
heap
page read and write
5353000
heap
page read and write
F464000
heap
page read and write
DA6897D000
stack
page read and write
1E388C00000
unkown
page read and write
53E4000
heap
page read and write
1AC6B5B0000
unkown
page read and write
3A5D000
heap
page read and write
46D0000
unkown
page read and write
498E000
unkown
page read and write
AAEE000
heap
page read and write
8C1D000
unkown
page read and write
ABC3000
heap
page read and write
204E5D00000
trusted library allocation
page read and write
8C3B000
unkown
page read and write
F49A000
heap
page read and write
4820000
unkown
page read and write
914000
heap
page read and write
754C000
heap
page read and write
8D1A000
heap
page read and write
DB7D000
heap
page read and write
F004000
heap
page read and write
F472000
heap
page read and write
5D07000
trusted library allocation
page read and write
8D41000
heap
page read and write
8C2E000
unkown
page read and write
5D07000
trusted library allocation
page read and write
FC13000
heap
page read and write
7FF566F21000
unkown
page readonly
8D87000
heap
page read and write
5CFB000
trusted library allocation
page read and write
6A34000
unkown
page read and write
D91F000
heap
page read and write
1E388C29000
unkown
page read and write
5B00000
trusted library allocation
page read and write
A8B7000
heap
page read and write
76A0000
trusted library allocation
page read and write
ABDF000
heap
page read and write
BB6A000
heap
page read and write
F893000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
7FF566AFB000
unkown
page readonly
5D11000
trusted library allocation
page read and write
F46E000
heap
page read and write
DA68A7A000
stack
page read and write
676C000
stack
page read and write
7FF566AC7000
unkown
page readonly
8D80000
heap
page read and write
7D50000
trusted library allocation
page read and write
DC09000
heap
page read and write
F498000
heap
page read and write
A9FA000
heap
page read and write
5080000
unkown
page readonly
5D30000
trusted library allocation
page read and write
1498000
heap
page read and write
7DF47E2E1000
trusted library allocation
page execute read
AADD000
heap
page read and write
10098000
heap
page read and write
EB4A000
heap
page read and write
23E1CF77000
unkown
page read and write
D9F2000
heap
page read and write
E6B7000
heap
page read and write
81BC000
stack
page read and write
AB79BFB000
stack
page read and write
ABD7000
heap
page read and write
5323000
heap
page read and write
7FF566AC1000
unkown
page readonly
8D07000
heap
page read and write
7FF566CEC000
unkown
page readonly
2F5B000
stack
page read and write
5D30000
trusted library allocation
page read and write
1AC6BF32000
unkown
page read and write
7643000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
56D3AFF000
stack
page read and write
AF94000
unkown
page read and write
5D07000
trusted library allocation
page read and write
1005A000
heap
page read and write
74A2000
trusted library allocation
page read and write
54C0000
trusted library section
page read and write
7FF566BC8000
unkown
page readonly
8C25000
heap
page read and write
11F0000
heap
page read and write
7FF566B23000
unkown
page readonly
8D5A000
heap
page read and write
ABC3000
heap
page read and write
F04C000
heap
page read and write
DC4C000
heap
page read and write
74FC000
heap
page read and write
10E59000
heap
page read and write
38A2000
heap
page read and write
830000
heap
page read and write
FC86000
heap
page read and write
CC9D000
stack
page read and write
8C27000
heap
page read and write
F265000
heap
page read and write
23E1D402000
unkown
page read and write
7FFF97DD3000
unkown
page read and write
4F90000
unkown
page readonly
74D8000
unkown
page readonly
B16B000
stack
page read and write
8DB8000
heap
page read and write
F136000
heap
page read and write
5810000
trusted library allocation
page read and write
EB4A000
heap
page read and write
FED6000
heap
page read and write
C7C000
stack
page read and write
F61B000
heap
page read and write
7800000
unkown
page readonly
5B00000
trusted library allocation
page read and write
7FF566BDB000
unkown
page readonly
5B00000
trusted library allocation
page read and write
1070000
unkown
page readonly
51B3000
heap
page read and write
102B2000
heap
page read and write
E5F2000
heap
page read and write
1014F000
heap
page read and write
EFFA000
heap
page read and write
D72A000
stack
page read and write
5B00000
trusted library allocation
page read and write
F62B000
heap
page read and write
AA9C000
heap
page read and write
5D02000
trusted library allocation
page read and write
BB6F000
heap
page read and write
BB65000
heap
page read and write
5200000
trusted library section
page read and write
FD62000
heap
page read and write
87D8000
stack
page read and write
C2ED000
unkown
page readonly
7FF566BC8000
unkown
page readonly
DB4A000
heap
page read and write
AEE3C79000
stack
page read and write
3A7F000
heap
page read and write
25424229000
unkown
page read and write
FE61000
heap
page read and write
5D15000
trusted library allocation
page read and write
3AFB000
heap
page read and write
537A000
heap
page read and write
6BBA000
stack
page read and write
7FF566F36000
unkown
page readonly
7620000
heap
page read and write
82E9000
stack
page read and write
23E1C6C5000
unkown
page read and write
BBED000
stack
page read and write
AA97000
heap
page read and write
3260000
heap
page read and write
23E1CF92000
unkown
page read and write
23E1C613000
unkown
page read and write
B267000
stack
page read and write
A912000
heap
page read and write
7FFF97DDD000
unkown
page write copy
7FF566F50000
unkown
page readonly
8D94000
heap
page read and write
2F29000
unkown
page read and write
F260000
heap
page read and write
383A000
heap
page read and write
5D1A000
trusted library allocation
page read and write
C773000
unkown
page readonly
7FF566D4A000
unkown
page readonly
F1CC000
heap
page read and write
51AC000
heap
page read and write
4E64000
unkown
page read and write
F3E0000
heap
page read and write
5322000
heap
page read and write
8D41000
heap
page read and write
74F7000
heap
page read and write
EA0000
heap
page read and write
2959000
stack
page read and write
AF01000
unkown
page read and write
E5F1000
heap
page read and write
AA52000
heap
page read and write
EC23000
unkown
page execute and read and write
A983000
heap
page read and write
2F55000
unkown
page read and write
174A000
trusted library allocation
page execute and read and write
7515000
heap
page read and write
F68000
unkown
page readonly
D3FB000
stack
page read and write
DC38000
heap
page read and write
F9B2000
unkown
page read and write
AA2E000
heap
page read and write
7DF47E191000
trusted library allocation
page execute read
173D000
trusted library allocation
page execute and read and write
DEB4000
heap
page read and write
5CEA000
trusted library allocation
page read and write
8D5F000
heap
page read and write
D857000
heap
page read and write
AC33000
heap
page read and write
8DB8000
heap
page read and write
2EDF000
stack
page read and write
175B000
trusted library allocation
page execute and read and write
7DF47E2A1000
trusted library allocation
page execute read
8B34000
unkown
page read and write
46C3000
unkown
page read and write
7733000
trusted library allocation
page read and write
F46E000
heap
page read and write
B2E8000
stack
page read and write
28C0000
unkown
page readonly
F057000
heap
page read and write
8BB3000
heap
page read and write
5AFB000
trusted library allocation
page read and write
8C2F000
heap
page read and write
BB4000
heap
page read and write
2880000
unkown
page readonly
5D30000
trusted library allocation
page read and write
886C000
stack
page read and write
5D12000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
590C000
stack
page read and write
B91000
heap
page read and write
D857000
heap
page read and write
8CA5000
heap
page read and write
2542427E000
unkown
page read and write
F492000
heap
page read and write
E5D5000
heap
page read and write
ABDF000
heap
page read and write
38A7000
heap
page read and write
7DF47E221000
trusted library allocation
page execute read
F632000
heap
page read and write
23E1CF96000
unkown
page read and write
1920000
heap
page read and write
8C17000
unkown
page read and write
EE64000
unkown
page read and write
8A06000
heap
page read and write
39AA000
stack
page read and write
30D0000
unkown
page read and write
FE61000
heap
page read and write
F594000
heap
page read and write
5D30000
trusted library allocation
page read and write
8C9B000
heap
page read and write
7DF47E1B0000
trusted library allocation
page readonly
74F7000
heap
page read and write
E65E000
heap
page read and write
5CFB000
trusted library allocation
page read and write
7397000
heap
page read and write
6C10000
unkown
page readonly
5B00000
trusted library allocation
page read and write
8C2C000
heap
page read and write
7FF566F88000
unkown
page readonly
ABD7000
heap
page read and write
8D6D000
heap
page read and write
8BC8000
heap
page read and write
F494000
heap
page read and write
5CE8000
trusted library allocation
page read and write
EFFB000
heap
page read and write
7630000
trusted library allocation
page read and write
1E527B10000
trusted library allocation
page read and write
AF8F000
unkown
page read and write
7FF566CAB000
unkown
page readonly
5345000
heap
page read and write
573B000
heap
page read and write
5D30000
trusted library allocation
page read and write
FD7E000
heap
page read and write
7FE0000
trusted library allocation
page read and write
EFB4000
heap
page read and write
7FF566D4A000
unkown
page readonly
E5B4000
heap
page read and write
D7D4000
heap
page read and write
53E6000
heap
page read and write
5323000
heap
page read and write
8A54000
heap
page read and write
4680000
unkown
page read and write
74F5000
unkown
page readonly
F9B2000
unkown
page read and write
DEDD000
heap
page read and write
5D30000
trusted library allocation
page read and write
B6EB000
stack
page read and write
7E30000
trusted library allocation
page read and write
10DB4000
heap
page read and write
B34000
heap
page read and write
EF90000
heap
page read and write
F456000
heap
page read and write
23E1CF6E000
unkown
page read and write
3340000
unkown
page read and write
914000
heap
page read and write
8E6000
stack
page read and write
914000
heap
page read and write
5B00000
trusted library allocation
page read and write
5190000
trusted library section
page read and write
1E528AD0000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
F10F000
heap
page read and write
5D10000
trusted library allocation
page read and write
E69D000
heap
page read and write
8C46000
heap
page read and write
7DF47E301000
trusted library allocation
page execute read
A8C1000
heap
page read and write
7FF566E9E000
unkown
page readonly
5B00000
trusted library section
page read and write
BBC5000
heap
page read and write
3B50000
trusted library allocation
page read and write
3A7F000
heap
page read and write
F036000
heap
page read and write
6968000
stack
page read and write
67EB000
stack
page read and write
5CFB000
trusted library allocation
page read and write
A8A5000
heap
page read and write
57E0000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
F3A9000
heap
page read and write
87EC000
stack
page read and write
7FF5668C9000
unkown
page readonly
E6FC000
unkown
page read and write
8AF0000
heap
page read and write
7FF566EEC000
unkown
page readonly
DC34000
heap
page read and write
8A72000
heap
page read and write
23E1C6A8000
unkown
page read and write
DFA9000
heap
page read and write
AAD7000
heap
page read and write
7FF567056000
unkown
page readonly
5D07000
trusted library allocation
page read and write
F890000
trusted library allocation
page read and write
DEB9000
heap
page read and write
5D07000
trusted library allocation
page read and write
F776000
heap
page read and write
8C45000
unkown
page read and write
5D30000
trusted library allocation
page read and write
FEE2000
heap
page read and write
3A67000
heap
page read and write
450827F000
stack
page read and write
7FF566B99000
unkown
page readonly
7547000
heap
page read and write
7547000
heap
page read and write
DB4A000
heap
page read and write
BBAB000
heap
page read and write
DC46000
heap
page read and write
A9FA000
heap
page read and write
DEAD000
heap
page read and write
10C43000
trusted library allocation
page read and write
5D19000
trusted library allocation
page read and write
E5B4000
heap
page read and write
5D07000
trusted library allocation
page read and write
1040000
unkown
page readonly
FD35000
heap
page read and write
F551000
heap
page read and write
8C80000
heap
page read and write
8BB7000
heap
page read and write
5D29000
trusted library allocation
page read and write
1E527BF3000
heap
page read and write
F5FE000
heap
page read and write
B50000
trusted library allocation
page read and write
7FF566E20000
unkown
page readonly
D855000
heap
page read and write
7FF566C44000
unkown
page readonly
8C59000
heap
page read and write
7FF566E97000
unkown
page readonly
1F17DE4E000
unkown
page read and write
F8A0000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
7FF566A8A000
unkown
page readonly
BB89000
heap
page read and write
2D69000
stack
page read and write
F464000
heap
page read and write
A9FD000
heap
page read and write
3A30000
heap
page read and write
7FF566DDC000
unkown
page readonly
53B4000
heap
page read and write
52E0000
trusted library allocation
page read and write
FD52000
heap
page read and write
7043000
unkown
page readonly
2990000
unkown
page readonly
BBD7000
heap
page read and write
383A000
heap
page read and write
FC2000
heap
page read and write
7DF47E2A0000
trusted library allocation
page readonly
5ABF000
stack
page read and write
4FC0000
unkown
page readonly
86E7000
stack
page read and write
DD63000
heap
page read and write
2EAA000
unkown
page read and write
5720000
heap
page read and write
E615000
heap
page read and write
BB51000
heap
page read and write
FD4C000
heap
page read and write
204E5758000
unkown
page read and write
F455000
heap
page read and write
DB95000
heap
page read and write
7FF566AE9000
unkown
page readonly
2D40000
unkown
page read and write
F5FE000
heap
page read and write
C789000
unkown
page readonly
8BFD000
heap
page read and write
DC18000
heap
page read and write
7D5D000
stack
page read and write
FD4A000
heap
page read and write
3A41000
heap
page read and write
BE76000
stack
page read and write
8DB8000
heap
page read and write
DC1A000
heap
page read and write
23E1C708000
unkown
page read and write
57BD000
heap
page read and write
7FF566F03000
unkown
page readonly
7FF566AC7000
unkown
page readonly
F48E000
heap
page read and write
1E527EB0000
trusted library allocation
page read and write
FD5E000
heap
page read and write
F260000
heap
page read and write
10D3D000
heap
page read and write
68B8000
unkown
page read and write
5D11000
trusted library allocation
page read and write
D815000
heap
page read and write
8D44000
heap
page read and write
8B49000
heap
page read and write
7FBD000
stack
page read and write
7FF5668B9000
unkown
page readonly
7630000
trusted library allocation
page read and write
DB84000
heap
page read and write
DB92000
heap
page read and write
E30000
unkown
page readonly
E5D7000
heap
page read and write
46C0000
unkown
page read and write
736D000
unkown
page readonly
23E1CF93000
unkown
page read and write
7650000
trusted library allocation
page read and write
FE25000
heap
page read and write
531D000
stack
page read and write
204EA440000
trusted library allocation
page read and write
8C0D000
unkown
page read and write
D41000
heap
page read and write
F48E000
heap
page read and write
D927000
heap
page read and write
7DF47E161000
trusted library allocation
page execute read
5CFB000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
5080000
unkown
page readonly
5714000
heap
page read and write
7FD0000
trusted library allocation
page read and write
FD64000
heap
page read and write
AAD9000
heap
page read and write
6C5D000
stack
page read and write
7FF5668C1000
unkown
page readonly
5180000
trusted library section
page read and write
DA687F7000
stack
page read and write
7FF56684C000
unkown
page readonly
11A0000
unkown
page readonly
5B00000
trusted library allocation
page read and write
1007A000
heap
page read and write
8C59000
heap
page read and write
1E527D40000
heap
page read and write
7DF42C600000
trusted library allocation
page readonly
ABD4000
heap
page read and write
8E4000
stack
page read and write
F04C000
heap
page read and write
61BE000
stack
page read and write
5B00000
trusted library allocation
page read and write
53EF000
heap
page read and write
9C9000
heap
page read and write
53B4000
heap
page read and write
F470000
heap
page read and write
5990000
unkown
page readonly
8CB7000
heap
page read and write
F030000
heap
page read and write
7FF566925000
unkown
page readonly
4FD0000
unkown
page readonly
5180000
trusted library section
page read and write
5D12000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
AC45000
heap
page read and write
7FF5667FF000
unkown
page readonly
FC3000
heap
page read and write
DEFB000
heap
page read and write
5D30000
trusted library allocation
page read and write
A9CD000
heap
page read and write
5D1B000
trusted library allocation
page read and write
AB2E000
heap
page read and write
BD75000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
8D19000
heap
page read and write
D827000
heap
page read and write
5D07000
trusted library allocation
page read and write
DC09000
heap
page read and write
8DE7000
unkown
page read and write
F030000
heap
page read and write
8D44000
heap
page read and write
F02C000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF566916000
unkown
page readonly
CA20000
trusted library allocation
page read and write
DC40000
heap
page read and write
8B31000
heap
page read and write
F488000
heap
page read and write
DC26000
heap
page read and write
8C86000
heap
page read and write
F44A000
heap
page read and write
DE33000
heap
page read and write
1F17DE3A000
unkown
page read and write
31C5000
stack
page read and write
51F0000
trusted library section
page read and write
7FF566B59000
unkown
page readonly
23E1CFBA000
unkown
page read and write
5D1F000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
DE71000
heap
page read and write
E72E000
unkown
page read and write
EB8000
heap
page read and write
F01C000
heap
page read and write
4800000
unkown
page read and write
7560000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
DB50000
heap
page read and write
46C0000
unkown
page read and write
BF80000
unkown
page readonly
5D30000
trusted library allocation
page read and write
DB45000
heap
page read and write
77C0000
trusted library allocation
page read and write
F496000
heap
page read and write
F020000
heap
page read and write
39A8000
stack
page read and write
48AD000
stack
page read and write
F496000
heap
page read and write
204E4E6F000
unkown
page read and write
F54F000
heap
page read and write
E5D5000
heap
page read and write
5D12000
trusted library allocation
page read and write
914000
heap
page read and write
FA3B000
unkown
page read and write
B66B000
stack
page read and write
EB4A000
heap
page read and write
7FF566CAB000
unkown
page readonly
7FF566804000
unkown
page readonly
886C000
stack
page read and write
BB71000
heap
page read and write
8A80000
heap
page read and write
F057000
heap
page read and write
5D10000
trusted library allocation
page read and write
51C6000
heap
page read and write
8DB2000
unkown
page read and write
5D07000
trusted library allocation
page read and write
8A5E000
heap
page read and write
A9CF000
heap
page read and write
5310000
heap
page read and write
AEF0000
unkown
page read and write
F02C000
heap
page read and write
5CFB000
trusted library allocation
page read and write
7FF566FDB000
unkown
page readonly
BBC5000
heap
page read and write
EA0000
unkown
page read and write
F014000
heap
page read and write
23E1CF75000
unkown
page read and write
5B00000
trusted library allocation
page read and write
AA97000
heap
page read and write
DD35000
heap
page read and write
A20000
unkown
page read and write
DFAC000
heap
page read and write
3A2E000
stack
page read and write
EA0000
heap
page read and write
D813000
heap
page read and write
204EA6B4000
unkown
page read and write
7FF566F6B000
unkown
page readonly
7DF47E160000
trusted library allocation
page readonly
3A2E000
stack
page read and write
26635D75000
heap
page read and write
CA53000
trusted library allocation
page read and write
BD0000
unkown
page readonly
204E5600000
unkown
page read and write
5D07000
trusted library allocation
page read and write
A8F4000
heap
page read and write
28B0000
unkown
page readonly
8CEA000
unkown
page read and write
76D3000
unkown
page readonly
DD3C000
heap
page read and write
D8A4000
heap
page read and write
DB7D000
heap
page read and write
204EA616000
unkown
page read and write
813C000
stack
page read and write
F456000
heap
page read and write
8569000
stack
page read and write
D41000
heap
page read and write
5CFB000
trusted library allocation
page read and write
F7F000
system
page read and write
A9B5000
heap
page read and write
5D07000
trusted library allocation
page read and write
5760000
heap
page read and write
25424258000
unkown
page read and write
F3A9000
heap
page read and write
2BD0000
heap
page read and write
F11C000
heap
page read and write
F474000
heap
page read and write
F24C000
heap
page read and write
DC30000
heap
page read and write
102ED000
heap
page read and write
1E527BE3000
heap
page read and write
A9CD000
heap
page read and write
AABE000
heap
page read and write
23E1CF69000
unkown
page read and write
F25E000
heap
page read and write
2F02000
unkown
page read and write
7FF566DBD000
unkown
page readonly
FD5C000
heap
page read and write
10DE3000
heap
page read and write
5800000
trusted library allocation
page read and write
7FF566EF0000
unkown
page readonly
32A0000
trusted library allocation
page read and write
CAD9CFF000
stack
page read and write
F8F0000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
3930000
trusted library allocation
page read and write
7FF5668FC000
unkown
page readonly
B8E9000
stack
page read and write
5190000
trusted library section
page read and write
DC1A000
heap
page read and write
306C000
stack
page read and write
7FF566C8C000
unkown
page readonly
8D39000
heap
page read and write
5D30000
trusted library allocation
page read and write
AC3C000
heap
page read and write
5D07000
trusted library allocation
page read and write
3EE0000
heap
page read and write
A898000
heap
page read and write
AA08000
heap
page read and write
AD5E000
stack
page read and write
5D30000
trusted library allocation
page read and write
10323000
heap
page read and write
A983000
heap
page read and write
5D07000
trusted library allocation
page read and write
CFE5F7C000
stack
page read and write
F492000
heap
page read and write
EFFC000
heap
page read and write
1F17DE7F000
unkown
page read and write
F326000
heap
page read and write
DF88000
heap
page read and write
7730000
trusted library allocation
page read and write
FC9000
heap
page read and write
8CFC000
heap
page read and write
7FF566FB1000
unkown
page readonly
DA6817E000
stack
page read and write
FC9000
heap
page read and write
7DF47E150000
trusted library allocation
page readonly
2F55000
unkown
page read and write
C3B7000
unkown
page readonly
204E5718000
unkown
page read and write
B96A000
stack
page read and write
306C000
stack
page read and write
8CFF000
heap
page read and write
F322000
heap
page read and write
E615000
heap
page read and write
A864000
heap
page read and write
7EDD000
stack
page read and write
A94D000
heap
page read and write
5AF0000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
DE71000
heap
page read and write
BB6F000
heap
page read and write
F47E000
heap
page read and write
7FF566DA5000
unkown
page readonly
46D3000
unkown
page read and write
C49F000
unkown
page readonly
8BA8000
heap
page read and write
5D22000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
B98E000
unkown
page readonly
48A0000
unkown
page read and write
B4E7000
stack
page read and write
B9AF000
unkown
page readonly
F30C000
heap
page read and write
23E1CF85000
unkown
page read and write
25424261000
unkown
page read and write
51BA000
heap
page read and write
FC0000
heap
page read and write
31C5000
stack
page read and write
3B40000
trusted library allocation
page read and write
5910000
system
page execute and read and write
A9B6000
heap
page read and write
74FA000
heap
page read and write
3BF9000
stack
page read and write
D520000
trusted library allocation
page read and write
865F000
stack
page read and write
DE33000
heap
page read and write
E30000
unkown
page readonly
1AC6B580000
heap
page read and write
101C9000
heap
page read and write
10088000
heap
page read and write
F11D000
heap
page read and write
754C000
heap
page read and write
DEC7000
heap
page read and write
DB7D000
heap
page read and write
9BE000
stack
page read and write
204E5602000
unkown
page read and write
5D30000
trusted library allocation
page read and write
1F17DE7E000
unkown
page read and write
F329000
heap
page read and write
DEC4000
heap
page read and write
10F7E000
stack
page read and write
F7F000
system
page read and write
101DF000
heap
page read and write
E631000
heap
page read and write
37F1000
heap
page read and write
5D07000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
1337000
stack
page read and write
1F4EB013000
unkown
page read and write
D6C000
heap
page read and write
BB68000
heap
page read and write
2F35000
unkown
page read and write
F05D000
heap
page read and write
BBD5000
heap
page read and write
7703000
trusted library allocation
page read and write
23E1CF6C000
unkown
page read and write
76F0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
7FF566B1F000
unkown
page readonly
D9F9000
heap
page read and write
1950000
trusted library allocation
page read and write
7FF5668B9000
unkown
page readonly
20A18213000
unkown
page read and write
F31B000
heap
page read and write
10C80000
trusted library allocation
page read and write
DC1C000
heap
page read and write
BBD5000
heap
page read and write
805D000
stack
page read and write
7D70000
trusted library allocation
page read and write
4BE0000
unkown
page read and write
1465000
heap
page read and write
AEE3CFF000
stack
page read and write
5D04000
trusted library allocation
page read and write
F31A000
heap
page read and write
10288000
heap
page read and write
5D17000
trusted library allocation
page read and write
8C7A000
heap
page read and write
5D30000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
7FF566E0E000
unkown
page readonly
EE86000
unkown
page read and write
7693000
trusted library allocation
page read and write
BC8C000
heap
page read and write
3A84000
heap
page read and write
D922000
heap
page read and write
FD5A000
heap
page read and write
5D03000
trusted library allocation
page read and write
F25E000
heap
page read and write
7DF47E321000
trusted library allocation
page execute read
23E1CE02000
unkown
page read and write
1F17DF00000
unkown
page read and write
37C6000
heap
page read and write
8A5E000
heap
page read and write
3C2D000
stack
page read and write
D95B000
heap
page read and write
8E01000
unkown
page read and write
7C00000
trusted library allocation
page read and write
3AA8000
stack
page read and write
DC1E000
heap
page read and write
DEAB000
heap
page read and write
B96A000
stack
page read and write
2880000
unkown
page readonly
8D5F000
heap
page read and write
7FFF97DFA000
unkown
page readonly
8D76000
heap
page read and write
7FF566C11000
unkown
page readonly
C7A9000
unkown
page readonly
53D7000
heap
page read and write
AC5000
stack
page read and write
7FF566C4B000
unkown
page readonly
2FC0000
heap
page read and write
7FFF97DDC000
unkown
page read and write
FC83000
heap
page read and write
F46A000
heap
page read and write
AEE375C000
stack
page read and write
7FF566921000
unkown
page readonly
7FF566ABB000
unkown
page readonly
8D8F000
heap
page read and write
DF74000
heap
page read and write
5D30000
trusted library allocation
page read and write
E592000
heap
page read and write
D80B000
heap
page read and write
A8CB000
heap
page read and write
5D30000
trusted library allocation
page read and write
8D1B000
heap
page read and write
E62F000
heap
page read and write
F48E000
heap
page read and write
1040000
unkown
page readonly
DB76000
heap
page read and write
B8735FD000
stack
page read and write
8CA3000
heap
page read and write
B6EB000
stack
page read and write
5D30000
trusted library allocation
page read and write
25424262000
unkown
page read and write
25A9AE76000
unkown
page read and write
7FF566AAD000
unkown
page readonly
EFDD000
heap
page read and write
204EA440000
trusted library allocation
page read and write
23E1CF00000
unkown
page read and write
F160000
heap
page read and write
8C1F000
unkown
page read and write
750F000
unkown
page readonly
7FF566876000
unkown
page readonly
A8F7000
heap
page read and write
FA74000
unkown
page read and write
E631000
heap
page read and write
10086000
heap
page read and write
23E1CF26000
unkown
page read and write
8A61000
heap
page read and write
5D30000
trusted library allocation
page read and write
DE71000
heap
page read and write
AADB000
heap
page read and write
8C67000
heap
page read and write
3AB2000
heap
page read and write
204EA454000
trusted library allocation
page read and write
DC22000
heap
page read and write
ABB2000
heap
page read and write
F474000
heap
page read and write
2980000
unkown
page read and write
204E4E95000
unkown
page read and write
AB48000
heap
page read and write
DC3E000
heap
page read and write
F6BD000
heap
page read and write
DDE7000
heap
page read and write
5D07000
trusted library allocation
page read and write
DADC000
heap
page read and write
B9B3000
trusted library allocation
page read and write
3B40000
trusted library allocation
page read and write
7C5A000
stack
page read and write
3A9D000
heap
page read and write
FFB8000
heap
page read and write
8C93000
heap
page read and write
B50000
trusted library allocation
page read and write
D80B000
heap
page read and write
7FF566925000
unkown
page readonly
7FFF97C40000
unkown
page readonly
8D87000
heap
page read and write
914000
heap
page read and write
BF0000
unkown
page readonly
A8A5000
heap
page read and write
1025B000
heap
page read and write
7FF566DD2000
unkown
page readonly
F5C9000
heap
page read and write
5D07000
trusted library allocation
page read and write
517A000
heap
page read and write
17CE000
stack
page read and write
7FF566906000
unkown
page readonly
204EA540000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
BB5E000
heap
page read and write
B50000
trusted library allocation
page read and write
BA15000
heap
page read and write
E678000
heap
page read and write
DC1C000
heap
page read and write
D598000
stack
page read and write
DD16000
heap
page read and write
7FF566AA6000
unkown
page readonly
5B00000
trusted library allocation
page read and write
BB66000
heap
page read and write
4830000
unkown
page read and write
DF6D000
heap
page read and write
2EAE000
unkown
page read and write
DFA9000
heap
page read and write
E72A000
unkown
page read and write
4840000
unkown
page read and write
AAD2000
heap
page read and write
5D12000
trusted library allocation
page read and write
29A0000
heap
page read and write
5CEA000
trusted library allocation
page read and write
BC38000
heap
page read and write
DF79000
heap
page read and write
23E1C651000
unkown
page read and write
14C5000
heap
page read and write
A9B2000
heap
page read and write
25424200000
unkown
page read and write
DA8E000
heap
page read and write
5D30000
trusted library allocation
page read and write
8C95000
heap
page read and write
A9C9000
heap
page read and write
5B00000
trusted library allocation
page read and write
8C5A000
heap
page read and write
DB59000
heap
page read and write
5800000
trusted library allocation
page read and write
DC18000
heap
page read and write
3BD0000
trusted library allocation
page read and write
DF71000
heap
page read and write
5AD0000
trusted library allocation
page read and write
830000
unkown
page read and write
4880000
unkown
page read and write
8C5D000
heap
page read and write
10C60000
trusted library allocation
page read and write
F4DF000
heap
page read and write
F498000
heap
page read and write
F60D000
heap
page read and write
5D30000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
74FA000
heap
page read and write
7BDD000
stack
page read and write
7FF566880000
unkown
page readonly
5200000
trusted library section
page read and write
3AF0000
heap
page read and write
5A3C000
stack
page read and write
5B00000
trusted library allocation
page read and write
7FF566887000
unkown
page readonly
BBC5000
heap
page read and write
8BB0000
heap
page read and write
204E4DB0000
heap
page read and write
5D0C000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
25424070000
heap
page read and write
5CFB000
trusted library allocation
page read and write
DDE7000
heap
page read and write
7763000
unkown
page readonly
73E6000
heap
page read and write
590E000
stack
page read and write
8D2C000
heap
page read and write
F974000
unkown
page read and write
5D30000
trusted library allocation
page read and write
F258000
heap
page read and write
5940000
unkown
page read and write
2990000
unkown
page readonly
7FF566F0C000
unkown
page readonly
8D5F000
heap
page read and write
5A9C000
stack
page read and write
7C00000
trusted library allocation
page read and write
DB8C000
heap
page read and write
F258000
heap
page read and write
7FF566ACD000
unkown
page readonly
74FC000
heap
page read and write
8C3E000
heap
page read and write
D7B9000
heap
page read and write
F472000
heap
page read and write
2542423A000
unkown
page read and write
8C78000
heap
page read and write
FD98000
heap
page read and write
5AF0000
trusted library allocation
page read and write
8ACE000
heap
page read and write
D853000
heap
page read and write
8BBA000
heap
page read and write
5D05000
trusted library allocation
page read and write
1BD13CE0000
unkown
page read and write
DB8F000
heap
page read and write
53CC000
heap
page read and write
702B000
unkown
page readonly
F935000
trusted library allocation
page read and write
E746000
unkown
page read and write
5D19000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
BB80000
heap
page read and write
74A0000
heap
page read and write
5D30000
trusted library allocation
page read and write
32D0000
unkown
page readonly
DF83000
heap
page read and write
BB3000
heap
page read and write
8CFC000
heap
page read and write
7A73000
heap
page readonly
8DBC000
heap
page read and write
7FF566E74000
unkown
page readonly
8CA7000
heap
page read and write
A8C1000
heap
page read and write
23E1C4E0000
heap
page read and write
5971000
system
page execute and read and write
FD4C000
heap
page read and write
7512000
heap
page read and write
FD5E000
heap
page read and write
750A000
heap
page read and write
8D6D000
heap
page read and write
5D11000
trusted library allocation
page read and write
B5EE000
stack
page read and write
F47C000
heap
page read and write
1E388D08000
unkown
page read and write
FD4E000
heap
page read and write
825C000
stack
page read and write
F472000
heap
page read and write
7FF566AFB000
unkown
page readonly
D4E0000
trusted library allocation
page read and write
DC1C000
heap
page read and write
7FF566EA3000
unkown
page readonly
75E3000
trusted library allocation
page read and write
520E000
heap
page read and write
F8C0000
trusted library allocation
page read and write
5593000
system
page execute and read and write
BB6F000
heap
page read and write
8A67000
heap
page read and write
7FF567056000
unkown
page readonly
8C31000
heap
page read and write
1F17E602000
unkown
page read and write
E631000
heap
page read and write
BC8C000
heap
page read and write
5CE0000
trusted library allocation
page read and write
8A54000
heap
page read and write
7534000
heap
page read and write
A40000
unkown
page read and write
DA683FA000
stack
page read and write
7690000
trusted library allocation
page read and write
10C10000
trusted library allocation
page read and write
8C3D000
heap
page read and write
7FF566A7D000
unkown
page readonly
815E000
stack
page read and write
5A0000
remote allocation
page read and write
E5EB000
stack
page read and write
23E1CFA9000
unkown
page read and write
8CFF000
heap
page read and write
8C21000
unkown
page read and write
1020000
unkown
page read and write
372B000
stack
page read and write
8CC6000
unkown
page read and write
6840000
unkown
page read and write
56D39FF000
stack
page read and write
A896000
heap
page read and write
ABD1000
heap
page read and write
DB84000
heap
page read and write
3940000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
8D6F000
heap
page read and write
D9D5000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF566C63000
unkown
page readonly
F268000
heap
page read and write
FAB4000
unkown
page read and write
23E1C540000
heap
page read and write
DEB9000
heap
page read and write
3AEB000
heap
page read and write
B46C000
stack
page read and write
46D3000
unkown
page read and write
DCF8000
heap
page read and write
F415000
heap
page read and write
6BBA000
stack
page read and write
DA686FF000
stack
page read and write
7FF566D89000
unkown
page readonly
EB42000
heap
page read and write
F61B000
heap
page read and write
5CF3000
trusted library allocation
page read and write
7FF566B31000
unkown
page readonly
F12D000
heap
page read and write
7FF566DD2000
unkown
page readonly
F265000
heap
page read and write
D079000
stack
page read and write
7C00000
trusted library allocation
page read and write
4C30000
unkown
page readonly
204E4D40000
heap
page read and write
101D5000
heap
page read and write
38A5000
heap
page read and write
7D50000
trusted library section
page read and write
F136000
heap
page read and write
DC38000
heap
page read and write
7FF5668FC000
unkown
page readonly
8A80000
heap
page read and write
14B0000
heap
page read and write
5711000
heap
page read and write
8C80000
heap
page read and write
D9D5000
heap
page read and write
ABB0000
heap
page read and write
EFFE000
heap
page read and write
7490000
heap
page read and write
825C000
stack
page read and write
8C37000
heap
page read and write
5CFB000
trusted library allocation
page read and write
1E527BC5000
heap
page read and write
C718000
stack
page read and write
7FF566F88000
unkown
page readonly
1F17DE54000
unkown
page read and write
DF81000
heap
page read and write
F008000
heap
page read and write
DF85000
heap
page read and write
AAA4000
heap
page read and write
7043000
unkown
page readonly
5CFB000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
7FF566AD0000
unkown
page readonly
7360000
heap
page read and write
2ED8000
unkown
page read and write
8BB9000
heap
page read and write
7DF47E1E0000
trusted library allocation
page readonly
8CFC000
heap
page read and write
5810000
trusted library allocation
page read and write
A10000
heap
page read and write
C9F9000
stack
page read and write
B30000
heap
page read and write
4E64000
unkown
page read and write
886C000
stack
page read and write
204EA8A0000
trusted library allocation
page read and write
1F17DE13000
unkown
page read and write
1F4EB108000
unkown
page read and write
11F0000
heap
page read and write
5D07000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
AAF9000
heap
page read and write
517B000
heap
page read and write
8BC4000
heap
page read and write
8D0A000
heap
page read and write
B680000
heap
page read and write
68B8000
unkown
page read and write
6CD9000
stack
page read and write
7750000
heap
page read and write
537A000
heap
page read and write
AAEE000
heap
page read and write
52D4000
heap
page read and write
DA685F7000
stack
page read and write
5B00000
trusted library allocation
page read and write
7FF566F7B000
unkown
page readonly
AFD8000
stack
page read and write
1E528A60000
heap
page readonly
F46A000
heap
page read and write
736D000
unkown
page readonly
2F16000
unkown
page read and write
EF0000
heap
page read and write
7547000
heap
page read and write
BB89000
heap
page read and write
5B00000
trusted library allocation
page read and write
8A8C000
heap
page read and write
76B3000
trusted library allocation
page read and write
2F55000
unkown
page read and write
7FF567004000
unkown
page readonly
D84C000
heap
page read and write
E5D2000
heap
page read and write
8C25000
heap
page read and write
AB8D000
heap
page read and write
AA2E000
heap
page read and write
ABC8000
heap
page read and write
7FFF977B5000
unkown
page read and write
BBD5000
heap
page read and write
DB8F000
heap
page read and write
6CD9000
stack
page read and write
315F000
system
page read and write
A8BB000
heap
page read and write
5CFB000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
8D5F000
heap
page read and write
D84E000
heap
page read and write
48A0000
unkown
page read and write
7FF566FC5000
unkown
page readonly
DF77000
heap
page read and write
5840000
trusted library allocation
page read and write
E721000
unkown
page read and write
1BD13B15000
unkown
page read and write
AF1000
stack
page read and write
DA15000
heap
page read and write
7382000
heap
page read and write
5D0E000
trusted library allocation
page read and write
1F4EB070000
unkown
page read and write
F943000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
F47E000
heap
page read and write
7DF47E2B0000
trusted library allocation
page readonly
7FF566CAB000
unkown
page readonly
5D30000
trusted library allocation
page read and write
DEFA000
heap
page read and write
7FF566CFA000
unkown
page readonly
8DAD000
heap
page read and write
F05F000
heap
page read and write
7FFD000
trusted library allocation
page read and write
F49C000
heap
page read and write
BA6E000
stack
page read and write
F470000
heap
page read and write
74947CE000
stack
page read and write
B16B000
stack
page read and write
BCBC000
unkown
page readonly
3930000
trusted library allocation
page read and write
7FF566BCE000
unkown
page readonly
1AC6B6CA000
unkown
page read and write
7FF566B7C000
unkown
page readonly
4DF0000
unkown
page read and write
8AF0000
heap
page read and write
5D02000
trusted library allocation
page read and write
A8A2000
heap
page read and write
8CA0000
heap
page read and write
BB86000
heap
page read and write
F55F000
heap
page read and write
6BBA000
stack
page read and write
C7C000
stack
page read and write
2F50000
unkown
page read and write
5D29000
trusted library allocation
page read and write
25424246000
unkown
page read and write
1AC6B702000
unkown
page read and write
DADC000
heap
page read and write
E5CE000
heap
page read and write
8A67000
heap
page read and write
8D3F000
heap
page read and write
7E5D000
stack
page read and write
5D02000
trusted library allocation
page read and write
5D0E000
trusted library allocation
page read and write
AA02000
heap
page read and write
A877000
heap
page read and write
7512000
heap
page read and write
AAAA000
heap
page read and write
7FF566C3A000
unkown
page readonly
1180000
heap
page read and write
78F5000
stack
page read and write
7FFF97E47000
unkown
page readonly
B34000
heap
page read and write
5A0000
remote allocation
page read and write
AC33000
heap
page read and write
5D07000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
F44A000
heap
page read and write
8C57000
heap
page read and write
DADA000
heap
page read and write
F1CC000
heap
page read and write
5D30000
trusted library allocation
page read and write
E6B7000
heap
page read and write
5800000
trusted library allocation
page read and write
E615000
heap
page read and write
FA74000
unkown
page read and write
F31C000
heap
page read and write
73D2000
heap
page read and write
74A0000
heap
page read and write
ABD1000
heap
page read and write
5D11000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
A20000
unkown
page read and write
CF7B000
stack
page read and write
BBC5000
heap
page read and write
8B50000
heap
page read and write
AB29000
heap
page read and write
DFA9000
heap
page read and write
8D9B000
heap
page read and write
BB60000
heap
page read and write
8CE5000
heap
page read and write
23E1CF93000
unkown
page read and write
89F9000
unkown
page read and write
7437000
unkown
page readonly
F3A7000
heap
page read and write
7D70000
trusted library allocation
page read and write
85EF000
stack
page read and write
7FF566908000
unkown
page readonly
1183000
heap
page read and write
E74C000
unkown
page read and write
F774000
heap
page read and write
7FF566E97000
unkown
page readonly
5B10000
trusted library allocation
page read and write
F496000
heap
page read and write
8ACB000
heap
page read and write
5D07000
trusted library allocation
page read and write
7FF566A98000
unkown
page readonly
BB6F000
heap
page read and write
7BE8000
stack
page read and write
8BCD000
heap
page read and write
3940000
trusted library allocation
page read and write
53C9000
heap
page read and write
23E1C6E9000
unkown
page read and write
5AF0000
trusted library allocation
page read and write
F5FF000
heap
page read and write
3255000
trusted library allocation
page read and write
D842000
heap
page read and write
FFB8000
heap
page read and write
51CF000
heap
page read and write
6A5C000
stack
page read and write
F478000
heap
page read and write
7508000
heap
page read and write
7FFF97E47000
unkown
page readonly
7FF566F21000
unkown
page readonly
2EDF000
stack
page read and write
4F40000
unkown
page readonly
8CD1000
heap
page read and write
FE96000
heap
page read and write
8C78000
heap
page read and write
7FF566A7D000
unkown
page readonly
F02C000
heap
page read and write
8A5C000
heap
page read and write
885B000
stack
page read and write
5D07000
trusted library allocation
page read and write
DC20000
heap
page read and write
4810000
unkown
page read and write
BB62000
heap
page read and write
DC2A000
heap
page read and write
53CE000
heap
page read and write
48E0000
unkown
page read and write
BD50000
trusted library allocation
page read and write
F476000
heap
page read and write
7FF566E74000
unkown
page readonly
5D06000
trusted library allocation
page read and write
1E389202000
unkown
page read and write
3B40000
trusted library allocation
page read and write
A9FD000
heap
page read and write
37B0000
heap
page read and write
57A5000
heap
page read and write
23E1CFB5000
unkown
page read and write
DFA9000
heap
page read and write
AC0B000
heap
page read and write
53E6000
heap
page read and write
F468000
heap
page read and write
FD4A000
heap
page read and write
914000
heap
page read and write
6A2E000
unkown
page read and write
89F3000
unkown
page read and write
5830000
trusted library allocation
page read and write
F308000
heap
page read and write
3ADC000
heap
page read and write
F62B000
heap
page read and write
7590000
trusted library allocation
page read and write
1E527BE3000
heap
page read and write
AA60000
heap
page read and write
E5B4000
heap
page read and write
5F40000
unkown
page read and write
4CAF000
trusted library allocation
page execute and read and write
5D30000
trusted library allocation
page read and write
8CA3000
heap
page read and write
8C15000
unkown
page read and write
7FF566921000
unkown
page readonly
25424277000
unkown
page read and write
32CA000
stack
page read and write
1464000
heap
page read and write
7DF47E1F0000
trusted library allocation
page readonly
A8A4000
heap
page read and write
204EA530000
trusted library allocation
page read and write
EF8C000
heap
page read and write
8A82000
heap
page read and write
A9FA000
heap
page read and write
5D07000
trusted library allocation
page read and write
753C000
heap
page read and write
A9D4000
heap
page read and write
CAF0000
trusted library allocation
page read and write
7508000
heap
page read and write
588D000
stack
page read and write
E734000
unkown
page read and write
1270000
unclassified section
page execute and read and write
17D0000
heap
page read and write
DA18000
heap
page read and write
32B0000
trusted library allocation
page read and write
1E388C3C000
unkown
page read and write
7542000
heap
page read and write
5D17000
trusted library allocation
page read and write
F61B000
heap
page read and write
4690000
unkown
page read and write
7DF47E321000
trusted library allocation
page execute read
8CA1000
heap
page read and write
7DF47E2F1000
trusted library allocation
page execute read
8A63000
heap
page read and write
F474000
heap
page read and write
1AC6B666000
unkown
page read and write
D30000
trusted library allocation
page read and write
6D5E000
stack
page read and write
8A65000
heap
page read and write
BBED000
stack
page read and write
DF74000
heap
page read and write
5D1A000
trusted library allocation
page read and write
F764000
heap
page read and write
7FF566EDE000
unkown
page readonly
C458000
unkown
page readonly
A9B5000
heap
page read and write
23E1CF61000
unkown
page read and write
8D5D000
heap
page read and write
5B20000
trusted library allocation
page read and write
198D000
heap
page read and write
7FFF9781F000
unkown
page readonly
46C0000
unkown
page read and write
556E000
system
page execute and read and write
E728000
unkown
page read and write
7FF566F90000
unkown
page readonly
204E4EFD000
unkown
page read and write
5838000
trusted library allocation
page read and write
8C5A000
heap
page read and write
8C2B000
heap
page read and write
CFE617B000
stack
page read and write
5B00000
trusted library allocation
page read and write
A8C1000
heap
page read and write
8C7A000
heap
page read and write
2542427A000
unkown
page read and write
DC24000
heap
page read and write
88E8000
stack
page read and write
8D03000
heap
page read and write
AEE3AF9000
stack
page read and write
8BBE000
heap
page read and write
7FF566AF8000
unkown
page readonly
53DB000
heap
page read and write
7FF566AA6000
unkown
page readonly
3803000
heap
page read and write
D9EE000
heap
page read and write
8D8F000
heap
page read and write
8DB2000
heap
page read and write
DF77000
heap
page read and write
751F000
unkown
page readonly
DDEC000
heap
page read and write
10086000
heap
page read and write
FA36000
unkown
page read and write
E20000
unkown
page read and write
2D40000
unkown
page read and write
8BCF000
heap
page read and write
1464000
heap
page read and write
8BB3000
heap
page read and write
204EA570000
remote allocation
page read and write
32D0000
unkown
page readonly
7FF566FB1000
unkown
page readonly
C51E000
stack
page read and write
7FF566F3D000
unkown
page readonly
E56F000
stack
page read and write
7FF566863000
unkown
page readonly
5D30000
trusted library allocation
page read and write
702B000
unkown
page readonly
7C00000
trusted library allocation
page read and write
1E527BE3000
heap
page read and write
100A2000
heap
page read and write
7829000
unkown
page readonly
53E6000
heap
page read and write
A8C1000
heap
page read and write
5D30000
trusted library allocation
page read and write
A910000
heap
page read and write
FC9000
heap
page read and write
DA18000
heap
page read and write
DC09000
heap
page read and write
5F40000
unkown
page read and write
8A80000
heap
page read and write
1180000
heap
page read and write
FC1000
heap
page read and write
D851000
heap
page read and write
FFF0000
heap
page read and write
F02D000
heap
page read and write
AB15000
heap
page read and write
FEF000
trusted library allocation
page execute and read and write
DEFA000
heap
page read and write
533D000
stack
page read and write
5350000
heap
page read and write
F615000
heap
page read and write
DCC3000
heap
page read and write
149C000
heap
page read and write
204EA661000
unkown
page read and write
7695000
unkown
page readonly
8CD1000
heap
page read and write
2F66000
system
page read and write
8D61000
heap
page read and write
26635B9D000
heap
page read and write
88BF000
stack
page read and write
85EF000
stack
page read and write
EE64000
unkown
page read and write
23E1CF5A000
unkown
page read and write
DB92000
heap
page read and write
CAF5000
trusted library allocation
page read and write
A8C2000
heap
page read and write
A889000
heap
page read and write
5302000
heap
page read and write
AC45000
heap
page read and write
7C00000
trusted library allocation
page read and write
8C1D000
heap
page read and write
DC1A000
heap
page read and write
DB50000
heap
page read and write
2F16000
unkown
page read and write
5AB0000
heap
page read and write
A9B6000
heap
page read and write
ABD7000
heap
page read and write
B9A7000
unkown
page readonly
BBD5000
heap
page read and write
8D41000
heap
page read and write
5B00000
trusted library allocation
page read and write
8C3D000
heap
page read and write
1F17DE00000
unkown
page read and write
3AA8000
stack
page read and write
7508000
heap
page read and write
53D0000
heap
page read and write
BB6A000
heap
page read and write
7000000
unkown
page readonly
8B37000
heap
page read and write
DB63000
heap
page read and write
AA52000
heap
page read and write
DB50000
heap
page read and write
8C97000
heap
page read and write
8AF0000
heap
page read and write
7465000
heap
page read and write
AA52000
heap
page read and write
4E90000
unkown
page readonly
917B000
stack
page read and write
2F16000
unkown
page read and write
FD52000
heap
page read and write
101E1000
heap
page read and write
D31C000
stack
page read and write
77F3000
unkown
page readonly
DDE4000
heap
page read and write
5D30000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
53B6000
stack
page read and write
8BBA000
heap
page read and write
26635BC0000
heap
page read and write
5B20000
trusted library allocation
page read and write
32D0000
unkown
page readonly
5B00000
trusted library allocation
page read and write
A8FE000
heap
page read and write
C522000
unkown
page readonly
E5D7000
heap
page read and write
D832000
heap
page read and write
7FF566F61000
unkown
page readonly
F594000
heap
page read and write
FD5A000
heap
page read and write
F337000
heap
page read and write
204E5718000
unkown
page read and write
BBC5000
heap
page read and write
DD5B000
heap
page read and write
10063000
heap
page read and write
5CFB000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
6B5E000
stack
page read and write
3B11000
heap
page read and write
8C25000
heap
page read and write
2F5A000
stack
page read and write
204E4E74000
unkown
page read and write
3AEB000
heap
page read and write
3A5D000
heap
page read and write
EE05000
unkown
page read and write
7DF47E251000
trusted library allocation
page execute read
7815000
unkown
page readonly
46E0000
unkown
page read and write
FFBB000
heap
page read and write
EFA0000
heap
page read and write
8C8C000
heap
page read and write
5AF0000
trusted library allocation
page read and write
C80000
heap
page read and write
3807000
heap
page read and write
F554000
heap
page read and write
5D20000
trusted library allocation
page read and write
EE01000
unkown
page read and write
EFF8000
heap
page read and write
5D23000
trusted library allocation
page read and write
3A7F000
heap
page read and write
89FD000
unkown
page read and write
FC0000
heap
page read and write
5CFB000
trusted library allocation
page read and write
8CB7000
heap
page read and write
30E0000
unkown
page readonly
750F000
unkown
page readonly
5F3C000
stack
page read and write
B5EE000
stack
page read and write
FCA000
heap
page read and write
749A000
heap
page read and write
1900000
unkown
page read and write
AEE3B7A000
stack
page read and write
83EB000
stack
page read and write
362A000
stack
page read and write
306C000
stack
page read and write
5AF0000
trusted library allocation
page read and write
7397000
heap
page read and write
102B1000
heap
page read and write
53C9000
heap
page read and write
5D30000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
1BD13CE0000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
FE28000
heap
page read and write
7DF47E1C1000
trusted library allocation
page execute read
8A72000
heap
page read and write
C8F0000
trusted library allocation
page read and write
8A63000
heap
page read and write
23E1C6BE000
unkown
page read and write
57F2000
heap
page read and write
7FF566E0A000
unkown
page readonly
912BC77000
stack
page read and write
382B000
heap
page read and write
AC0F000
heap
page read and write
5D10000
trusted library allocation
page read and write
10086000
heap
page read and write
AAC7000
heap
page read and write
F49C000
heap
page read and write
7FF566F36000
unkown
page readonly
FF6A000
stack
page read and write
7FF566F7F000
unkown
page readonly
ABB0000
heap
page read and write
3ADC000
heap
page read and write
38A2000
heap
page read and write
5B00000
trusted library allocation
page read and write
ABCB000
heap
page read and write
BD6A000
stack
page read and write
4800000
unkown
page read and write
20A18060000
heap
page read and write
8A80000
heap
page read and write
5D30000
trusted library allocation
page read and write
7DF42C611000
trusted library allocation
page execute read
32B0000
trusted library allocation
page read and write
7FF566AD6000
unkown
page readonly
F729000
heap
page read and write
DC40000
heap
page read and write
FD78000
heap
page read and write
2F60000
unkown
page read and write
2980000
unkown
page read and write
7FF566F7F000
unkown
page readonly
A94D000
heap
page read and write
5990000
unkown
page readonly
7FFF97DD3000
unkown
page read and write
F60D000
heap
page read and write
AB8C000
heap
page read and write
52F5000
heap
page read and write
5B00000
trusted library allocation
page read and write
26635BA7000
heap
page read and write
E606000
heap
page read and write
EF86000
heap
page read and write
5D30000
trusted library allocation
page read and write
DDE9000
heap
page read and write
7FF566AF8000
unkown
page readonly
5D30000
trusted library allocation
page read and write
8C78000
heap
page read and write
F04C000
heap
page read and write
5D30000
trusted library allocation
page read and write
74B1000
unkown
page readonly
E615000
heap
page read and write
10E7D000
stack
page read and write
4BE0000
unkown
page read and write
39AA000
stack
page read and write
A9B1000
heap
page read and write
8D33000
heap
page read and write
8000000
trusted library allocation
page read and write
DC8D000
heap
page read and write
2542425E000
unkown
page read and write
53E6000
heap
page read and write
7FF566E68000
unkown
page readonly
5CFB000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
8D44000
heap
page read and write
FD8A000
heap
page read and write
5200000
trusted library section
page read and write
DB6D000
heap
page read and write
C75E000
unkown
page readonly
5B10000
trusted library allocation
page read and write
7583000
trusted library allocation
page read and write
DB65000
heap
page read and write
13BE000
stack
page read and write
F1CC000
heap
page read and write
84DF000
stack
page read and write
46D3000
unkown
page read and write
3A8E000
heap
page read and write
AEFE000
unkown
page read and write
DB5D000
heap
page read and write
CAE3000
trusted library allocation
page read and write
A8B1000
heap
page read and write
53E4000
heap
page read and write
7FF566B6D000
unkown
page readonly
23E1D400000
unkown
page read and write
3863000
heap
page read and write
8D86000
heap
page read and write
5D30000
trusted library allocation
page read and write
EF0000
heap
page read and write
1470000
heap
page read and write
5D30000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
10BD0000
trusted library allocation
page read and write
8D65000
heap
page read and write
5C80000
trusted library allocation
page read and write
23E1CF1C000
unkown
page read and write
54E0000
system
page execute and read and write
EF9A000
heap
page read and write
EFDD000
heap
page read and write
3A67000
heap
page read and write
F468000
heap
page read and write
5D11000
trusted library allocation
page read and write
F462000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FFF97621000
unkown
page execute read
23E1C68A000
unkown
page read and write
5D30000
trusted library allocation
page read and write
8E01000
unkown
page read and write
3263000
heap
page read and write
1006A000
heap
page read and write
2E58000
stack
page read and write
5D30000
trusted library allocation
page read and write
7FF566AC1000
unkown
page readonly
D4E0000
trusted library allocation
page read and write
8BB1000
heap
page read and write
3141000
unkown
page read and write
E67A000
heap
page read and write
5B00000
trusted library allocation
page read and write
7FF566F85000
unkown
page readonly
498E000
unkown
page read and write
8A82000
heap
page read and write
4830000
unkown
page read and write
7FF56691F000
unkown
page readonly
7FF566880000
unkown
page readonly
7FF567004000
unkown
page readonly
F260000
heap
page read and write
D990000
heap
page read and write
26635B90000
heap
page read and write
7FF566B93000
unkown
page readonly
FCF000
heap
page read and write
5B00000
trusted library allocation
page read and write
8D03000
heap
page read and write
C487000
unkown
page readonly
577E000
heap
page read and write
8CAA000
heap
page read and write
F551000
heap
page read and write
10DFE000
stack
page read and write
7C00000
trusted library allocation
page read and write
51AB000
stack
page read and write
FFAE000
heap
page read and write
1870000
heap
page read and write
571C000
heap
page read and write
8CC8000
heap
page read and write
FF36000
heap
page read and write
F415000
heap
page read and write
8ACE000
heap
page read and write
F47C000
heap
page read and write
F68000
unkown
page readonly
912BD7E000
stack
page read and write
DA682FE000
stack
page read and write
8A03000
unkown
page read and write
5D30000
trusted library allocation
page read and write
8BCA000
heap
page read and write
89F3000
unkown
page read and write
D19A000
stack
page read and write
5A60000
trusted library allocation
page read and write
537A000
heap
page read and write
D919000
heap
page read and write
AB8C000
heap
page read and write
BA42000
unkown
page readonly
CA23000
trusted library allocation
page read and write
BBC000
heap
page read and write
D865000
heap
page read and write
23E1CF7B000
unkown
page read and write
4A18000
stack
page read and write
7E30000
trusted library allocation
page read and write
8D5D000
heap
page read and write
1BD13CF0000
trusted library allocation
page read and write
E5DA000
heap
page read and write
B56B000
stack
page read and write
5D30000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
8C9B000
heap
page read and write
8D03000
heap
page read and write
750F000
unkown
page readonly
7FF566F09000
unkown
page readonly
5D07000
trusted library allocation
page read and write
7FF566C8C000
unkown
page readonly
73E9000
heap
page read and write
57D8000
heap
page read and write
C8F0000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
7FF566F94000
unkown
page readonly
6AD8000
stack
page read and write
5D30000
trusted library allocation
page read and write
8D39000
heap
page read and write
E5F2000
heap
page read and write
1E527B78000
heap
page read and write
F057000
heap
page read and write
7E5D000
stack
page read and write
C89000
heap
page read and write
FD64000
heap
page read and write
DEA6000
heap
page read and write
F47A000
heap
page read and write
53CC000
heap
page read and write
B50000
trusted library allocation
page read and write
BBD5000
heap
page read and write
A8C1000
heap
page read and write
7FF566FE2000
unkown
page readonly
7FFF97DE3000
unkown
page readonly
23E1C6AC000
unkown
page read and write
5830000
trusted library allocation
page read and write
845D000
stack
page read and write
7FF566ACD000
unkown
page readonly
F63E000
heap
page read and write
5D1F000
trusted library allocation
page read and write
53EE000
heap
page read and write
204EA697000
unkown
page read and write
BC02000
heap
page read and write
7FF566AD0000
unkown
page readonly
BB6F000
heap
page read and write
7CDA000
stack
page read and write
7560000
trusted library allocation
page read and write
10098000
heap
page read and write
DF8F000
heap
page read and write
FE0000
heap
page read and write
5D07000
trusted library allocation
page read and write
2E70000
unkown
page read and write
7480000
trusted library allocation
page read and write
8D11000
heap
page read and write
9CC000
heap
page read and write
BB73000
unkown
page readonly
101C9000
heap
page read and write
F553000
heap
page read and write
2E3D000
stack
page read and write
30E0000
unkown
page readonly
FAB4000
unkown
page read and write
5341000
heap
page read and write
FD76000
heap
page read and write
5318000
heap
page read and write
7725000
unkown
page readonly
1F4EB088000
unkown
page read and write
2ED8000
unkown
page read and write
100A2000
heap
page read and write
7542000
heap
page read and write
5CFB000
trusted library allocation
page read and write
F10F000
heap
page read and write
5710000
heap
page read and write
4E64000
unkown
page read and write
5D30000
trusted library allocation
page read and write
204EA6EB000
unkown
page read and write
AA1A000
heap
page read and write
8C95000
heap
page read and write
D9F2000
heap
page read and write
DC16000
heap
page read and write
BD6A000
stack
page read and write
4C40000
unkown
page write copy
7534000
heap
page read and write
6840000
unkown
page read and write
2F47000
unkown
page read and write
77EC000
unkown
page readonly
FD6A000
heap
page read and write
19A5000
heap
page read and write
204E5D20000
trusted library allocation
page read and write
D4F8000
stack
page read and write
23E1CF81000
unkown
page read and write
F55A000
heap
page read and write
8B92000
heap
page read and write
25424242000
unkown
page read and write
BBC5000
heap
page read and write
10BE0000
trusted library allocation
page read and write
8A72000
heap
page read and write
F498000
heap
page read and write
5B00000
trusted library allocation
page read and write
FD52000
heap
page read and write
3EE0000
heap
page read and write
FF6A000
stack
page read and write
5961000
system
page execute and read and write
AC1D000
heap
page read and write
8D6B000
heap
page read and write
BB63000
heap
page read and write
8D6F000
heap
page read and write
2E5B000
stack
page read and write
F496000
heap
page read and write
FD2C000
heap
page read and write
AABA000
heap
page read and write
87EC000
stack
page read and write
1400000
unkown
page readonly
FD7A000
heap
page read and write
5300000
trusted library allocation
page read and write
8D2C000
heap
page read and write
5D30000
trusted library allocation
page read and write
32A0000
trusted library allocation
page read and write
8C36000
heap
page read and write
7D50000
trusted library allocation
page read and write
BBE8000
heap
page read and write
DB95000
heap
page read and write
5D30000
trusted library allocation
page read and write
AA9C000
heap
page read and write
57B0000
trusted library allocation
page read and write
7FF566F3D000
unkown
page readonly
5D07000
trusted library allocation
page read and write
DEF5000
heap
page read and write
F8E0000
trusted library allocation
page read and write
DC30000
heap
page read and write
E630000
heap
page read and write
51CB000
heap
page read and write
D26000
heap
page read and write
A8B7000
heap
page read and write
74FC000
heap
page read and write
1E3889C0000
heap
page read and write
8C71000
heap
page read and write
8BCA000
heap
page read and write
FD5C000
heap
page read and write
F136000
heap
page read and write
5CFB000
trusted library allocation
page read and write
7FFF97DE3000
unkown
page readonly
F3A7000
heap
page read and write
DA14000
heap
page read and write
75A2000
unkown
page readonly
8C60000
heap
page read and write
3A2E000
stack
page read and write
A983000
heap
page read and write
E611000
heap
page read and write
7DF47E310000
trusted library allocation
page readonly
DEFB000
heap
page read and write
8D3F000
heap
page read and write
5CE4000
trusted library allocation
page read and write
7D8BFD000
stack
page read and write
4850000
unkown
page read and write
D7EC000
heap
page read and write
5AF0000
trusted library allocation
page read and write
F47E000
heap
page read and write
6C5D000
stack
page read and write
BB60000
heap
page read and write
5720000
heap
page read and write
BC03000
unkown
page readonly
204E5702000
unkown
page read and write
AABA000
heap
page read and write
6135000
stack
page read and write
37AE000
stack
page read and write
F246000
heap
page read and write
533D000
stack
page read and write
23E1CFBF000
unkown
page read and write
537A000
heap
page read and write
7FF566E6C000
unkown
page readonly
7570000
trusted library allocation
page read and write
7FF566B23000
unkown
page readonly
B66B000
stack
page read and write
B4CE000
unkown
page readonly
CD1E000
stack
page read and write
5CEACFF000
stack
page read and write
1BD13980000
unkown
page read and write
4840000
unkown
page read and write
517A000
heap
page read and write
5D20000
trusted library allocation
page read and write
5D11000
trusted library allocation
page read and write
2F50000
unkown
page readonly
DF71000
heap
page read and write
2D69000
stack
page read and write
1E528800000
trusted library allocation
page read and write
510000
trusted library allocation
page read and write
B34000
heap
page read and write
FD56000
heap
page read and write
EFEA000
heap
page read and write
5CEA000
trusted library allocation
page read and write
DB76000
heap
page read and write
4860000
unkown
page read and write
F48E000
heap
page read and write
5D30000
trusted library allocation
page read and write
EF84000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF566EB0000
unkown
page readonly
D5DD000
stack
page read and write
5D30000
trusted library allocation
page read and write
D6E0000
heap
page read and write
7FF566EA3000
unkown
page readonly
DF79000
heap
page read and write
204E4E13000
unkown
page read and write
E631000
heap
page read and write
10072000
heap
page read and write
1870000
heap
page read and write
8D49000
heap
page read and write
F48A000
heap
page read and write
10088000
heap
page read and write
8D9B000
heap
page read and write
DDEC000
heap
page read and write
A94D000
heap
page read and write
8C31000
heap
page read and write
8A65000
heap
page read and write
DFEB000
stack
page read and write
AAD2000
heap
page read and write
F920000
trusted library allocation
page read and write
FD50000
heap
page read and write
1490000
heap
page read and write
E72E000
unkown
page read and write
F48C000
heap
page read and write
AAD5000
heap
page read and write
AAF9000
heap
page read and write
4C20000
unkown
page readonly
FC0000
heap
page read and write
F136000
heap
page read and write
FD70000
heap
page read and write
4820000
unkown
page read and write
FCF4000
heap
page read and write
8C2C000
heap
page read and write
8A32000
unkown
page read and write
754C000
heap
page read and write
558C000
stack
page read and write
B378000
stack
page read and write
23E1CFA4000
unkown
page read and write
5302000
heap
page read and write
57A5000
heap
page read and write
5D09000
trusted library allocation
page read and write
8D07000
heap
page read and write
73C1000
heap
page read and write
F960000
trusted library allocation
page read and write
8D61000
heap
page read and write
8D57000
heap
page read and write
5722000
heap
page read and write
D86D000
heap
page read and write
5AF0000
trusted library allocation
page read and write
DADA000
heap
page read and write
389A000
heap
page read and write
912B59B000
stack
page read and write
25A9AF02000
unkown
page read and write
1E388C70000
unkown
page read and write
5CEA000
trusted library allocation
page read and write
186E000
stack
page read and write
A983000
heap
page read and write
7FF566C1E000
unkown
page readonly
23E1CF69000
unkown
page read and write
3248000
stack
page read and write
3A67000
heap
page read and write
E611000
heap
page read and write
30C0000
heap
page read and write
7DF47E310000
trusted library allocation
page readonly
7BDD000
stack
page read and write
BBAB000
heap
page read and write
8C31000
heap
page read and write
7FF566B73000
unkown
page readonly
56D333F000
stack
page read and write
FD60000
heap
page read and write
AB4C000
heap
page read and write
A918000
heap
page read and write
EB40000
heap
page read and write
D842000
heap
page read and write
DD03000
heap
page read and write
EE86000
unkown
page read and write
E4B000
trusted library allocation
page read and write
DB5D000
heap
page read and write
C80000
heap
page read and write
DF93000
heap
page read and write
D86D000
heap
page read and write
7C00000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
D7C7000
heap
page read and write
5D30000
trusted library allocation
page read and write
101D5000
heap
page read and write
7FF566BCB000
unkown
page readonly
8C78000
heap
page read and write
5D30000
trusted library allocation
page read and write
5710000
heap
page read and write
537A000
heap
page read and write
754C000
heap
page read and write
52E0000
trusted library allocation
page read and write
23E1CF75000
unkown
page read and write
286A000
unkown
page read and write
23E1CF73000
unkown
page read and write
5D30000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
DB8F000
heap
page read and write
8CFC000
heap
page read and write
7FF566B3D000
unkown
page readonly
D510000
trusted library allocation
page read and write
AABE000
heap
page read and write
EB8000
heap
page read and write
117B000
trusted library allocation
page execute and read and write
F14F000
heap
page read and write
32A0000
trusted library allocation
page read and write
1F4EB029000
unkown
page read and write
A9F8000
heap
page read and write
73D2000
heap
page read and write
23E1CF89000
unkown
page read and write
E5B4000
heap
page read and write
AAEB000
heap
page read and write
FD43000
heap
page read and write
204E4E2A000
unkown
page read and write
F322000
heap
page read and write
EA0000
heap
page read and write
5D07000
trusted library allocation
page read and write
7FF566F03000
unkown
page readonly
82E9000
stack
page read and write
204EA4E0000
trusted library allocation
page read and write
B36B000
stack
page read and write
BBA5000
heap
page read and write
7512000
heap
page read and write
8B9B000
heap
page read and write
2F66000
system
page read and write
7D60000
trusted library allocation
page read and write
BFAB000
unkown
page readonly
5B00000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
8D89000
heap
page read and write
8BE5000
unkown
page read and write
204E5D10000
trusted library allocation
page read and write
8C73000
unkown
page read and write
8C9B000
heap
page read and write
3260000
heap
page read and write
A980000
heap
page read and write
7FF566BE9000
unkown
page readonly
5810000
trusted library allocation
page read and write
D29C000
stack
page read and write
7FF566E3D000
unkown
page readonly
54C0000
trusted library section
page read and write
8A01000
unkown
page read and write
10DE5000
heap
page read and write
5360000
trusted library allocation
page read and write
53CC000
heap
page read and write
204E4EA0000
unkown
page read and write
E734000
unkown
page read and write
1E388C78000
unkown
page read and write
1F4EB113000
unkown
page read and write
74A0000
heap
page read and write
F318000
heap
page read and write
7FFF97DD3000
unkown
page read and write
ADDA000
stack
page read and write
53B6000
stack
page read and write
E5D5000
heap
page read and write
548A000
stack
page read and write
7FF566FF6000
unkown
page readonly
BB6A000
heap
page read and write
7FF566D3F000
unkown
page readonly
C48F000
unkown
page readonly
DC3A000
heap
page read and write
10C40000
trusted library allocation
page read and write
ABD7000
heap
page read and write
AC07000
heap
page read and write
8B4C000
heap
page read and write
4F2F000
unclassified section
page read and write
39A8000
stack
page read and write
7FF566FE2000
unkown
page readonly
F625000
heap
page read and write
7DF47E300000
trusted library allocation
page readonly
DC34000
heap
page read and write
BC38000
heap
page read and write
38A2000
heap
page read and write
F31A000
heap
page read and write
702E000
unkown
page readonly
5B00000
trusted library allocation
page read and write
53D7000
heap
page read and write
8C86000
heap
page read and write
5D30000
trusted library allocation
page read and write
7A6E000
stack
page read and write
6968000
stack
page read and write
E10000
unkown
page read and write
3A41000
heap
page read and write
5CFB000
trusted library allocation
page read and write
8B44000
heap
page read and write
4DD0000
unkown
page read and write
DC1E000
heap
page read and write
DD08000
heap
page read and write
CE92000
unkown
page read and write
DB63000
heap
page read and write
5CE2000
trusted library allocation
page read and write
47E6000
trusted library allocation
page read and write
3A4C000
heap
page read and write
37B0000
heap
page read and write
3B25000
heap
page read and write
D86000
system
page read and write
F241000
heap
page read and write
F880000
trusted library allocation
page read and write
68B8000
unkown
page read and write
8D19000
heap
page read and write
D7E8000
heap
page read and write
204EA431000
trusted library allocation
page read and write
23E1CF68000
unkown
page read and write
7DF47E2D1000
trusted library allocation
page execute read
F014000
heap
page read and write
550C000
stack
page read and write
52F0000
trusted library allocation
page read and write
4840000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
F615000
heap
page read and write
7DF47E210000
trusted library allocation
page readonly
F553000
heap
page read and write
E80000
heap
page read and write
8B92000
heap
page read and write
E728000
unkown
page read and write
BB35000
unkown
page readonly
5D30000
trusted library allocation
page read and write
F12D000
heap
page read and write
F496000
heap
page read and write
BB6A000
heap
page read and write
735C000
stack
page read and write
5CEABFE000
stack
page read and write
2970000
unkown
page readonly
A9FA000
heap
page read and write
8D41000
heap
page read and write
DE71000
heap
page read and write
5CFB000
trusted library allocation
page read and write
5EB7000
stack
page read and write
75E0000
trusted library allocation
page read and write
FD5A000
heap
page read and write
B267000
stack
page read and write
C7C000
stack
page read and write
F608000
heap
page read and write
34C0000
heap
page read and write
1BD13A13000
unkown
page read and write
F29C000
heap
page read and write
CA75000
trusted library allocation
page read and write
7FF566FE9000
unkown
page readonly
CD79000
stack
page read and write
23E1CF9C000
unkown
page read and write
A94D000
heap
page read and write
BB68000
heap
page read and write
9CE000
heap
page read and write
76FC000
unkown
page readonly
DC40000
heap
page read and write
5D30000
trusted library allocation
page read and write
CFE594B000
stack
page read and write
7C5B000
stack
page read and write
1007C000
heap
page read and write
3884000
heap
page read and write
AAD9000
heap
page read and write
E8EE000
stack
page read and write
2F35000
unkown
page read and write
AC2E000
heap
page read and write
774E000
unkown
page readonly
F322000
heap
page read and write
5AF0000
trusted library allocation
page read and write
8D63000
heap
page read and write
46D3000
unkown
page read and write
450867E000
stack
page read and write
AAEA000
heap
page read and write
F49A000
heap
page read and write
BBD5000
heap
page read and write
F950000
trusted library allocation
page read and write
ABB0000
heap
page read and write
FD7C000
heap
page read and write
8A67000
heap
page read and write
204EA6F5000
unkown
page read and write
8A5C000
heap
page read and write
5CEA000
trusted library allocation
page read and write
F10F000
heap
page read and write
69DA000
unkown
page read and write
6A5C000
stack
page read and write
DB76000
heap
page read and write
F260000
heap
page read and write
8D37000
heap
page read and write
3C2E000
stack
page read and write
F014000
heap
page read and write
1140000
unkown
page read and write
48E0000
unkown
page read and write
7BE8000
stack
page read and write
DC32000
heap
page read and write
3803000
heap
page read and write
AAD5000
heap
page read and write
5B00000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
5BBC000
stack
page read and write
5D30000
trusted library allocation
page read and write
D39E000
stack
page read and write
78F5000
stack
page read and write
F47A000
heap
page read and write
5D30000
trusted library allocation
page read and write
FD5E000
heap
page read and write
23E1C648000
unkown
page read and write
8ACD000
heap
page read and write
3AB2000
heap
page read and write
A94D000
heap
page read and write
5CFB000
trusted library allocation
page read and write
1AC6B642000
unkown
page read and write
5440000
unkown
page read and write
5D04000
trusted library allocation
page read and write
4A9B000
stack
page read and write
25424240000
unkown
page read and write
FD68000
heap
page read and write
CA30000
trusted library allocation
page read and write
4840000
unkown
page read and write
204E4F07000
unkown
page read and write
204E6290000
trusted library allocation
page read and write
DA96000
heap
page read and write
BBE8000
heap
page read and write
3A67000
heap
page read and write
5D07000
trusted library allocation
page read and write
F60000
heap
page read and write
BB62000
heap
page read and write
DD4E000
heap
page read and write
5CFB000
trusted library allocation
page read and write
1E527BE7000
heap
page read and write
7832000
unkown
page readonly
E5D2000
heap
page read and write
FA7C000
stack
page read and write
5B00000
trusted library allocation
page read and write
DC16000
heap
page read and write
3930000
trusted library allocation
page read and write
BBAB000
heap
page read and write
8D8E000
heap
page read and write
101B9000
heap
page read and write
5C90000
unkown
page readonly
E60D000
heap
page read and write
7DF47E1D1000
trusted library allocation
page execute read
5830000
trusted library allocation
page read and write
BC1E000
heap
page read and write
739F000
heap
page read and write
7FF566906000
unkown
page readonly
8ADA000
heap
page read and write
D91F000
heap
page read and write
F488000
heap
page read and write
FD74000
heap
page read and write
3A97000
heap
page read and write
F01C000
heap
page read and write
7FF566E17000
unkown
page readonly
5D30000
trusted library allocation
page read and write
7508000
heap
page read and write
F466000
heap
page read and write
8D11000
heap
page read and write
57EB000
heap
page read and write
8B35000
heap
page read and write
B50000
trusted library allocation
page read and write
BA19000
heap
page read and write
2980000
unkown
page read and write
5D30000
trusted library allocation
page read and write
573B000
heap
page read and write
5AF0000
trusted library allocation
page read and write
FED6000
heap
page read and write
5CFB000
trusted library allocation
page read and write
8C98000
heap
page read and write
1740000
trusted library allocation
page read and write
4C30000
unkown
page readonly
1E527BD3000
heap
page read and write
8D69000
heap
page read and write
FDB3000
heap
page read and write
7610000
trusted library allocation
page read and write
53E6000
heap
page read and write
7FF566E9E000
unkown
page readonly
DA95000
heap
page read and write
7481000
heap
page read and write
10088000
heap
page read and write
5D30000
trusted library allocation
page read and write
DB95000
heap
page read and write
73B5000
heap
page read and write
11F5000
heap
page read and write
5B00000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
FD68000
heap
page read and write
AA1F000
heap
page read and write
5D30000
trusted library allocation
page read and write
7542000
heap
page read and write
52D1000
heap
page read and write
7FF566F85000
unkown
page readonly
5800000
trusted library allocation
page read and write
BBA5000
heap
page read and write
5D07000
trusted library allocation
page read and write
77DE000
unkown
page readonly
F197000
heap
page read and write
BCA7000
unkown
page readonly
146F000
system
page read and write
F54F000
heap
page read and write
7FF566DDC000
unkown
page readonly
D9F4000
heap
page read and write
BC2000
heap
page read and write
EFFC000
heap
page read and write
10C70000
trusted library allocation
page read and write
E659000
heap
page read and write
7DDA000
stack
page read and write
5CFB000
trusted library allocation
page read and write
7508000
heap
page read and write
23E1CF69000
unkown
page read and write
AA8B000
heap
page read and write
5D1E000
trusted library allocation
page read and write
8B2B000
heap
page read and write
1F4EB102000
unkown
page read and write
3950000
trusted library allocation
page read and write
E5EB000
stack
page read and write
7FF566C23000
unkown
page readonly
FE5000
heap
page read and write
EE86000
unkown
page read and write
5D30000
trusted library allocation
page read and write
A86A000
heap
page read and write
10288000
heap
page read and write
778C000
unkown
page readonly
1757000
trusted library allocation
page execute and read and write
1065000
heap
page read and write
AF94000
unkown
page read and write
45082FC000
stack
page read and write
FD74000
heap
page read and write
8E6000
stack
page read and write
10D20000
heap
page read and write
BC55000
unkown
page readonly
7590000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
E593000
heap
page read and write
4B1C000
stack
page read and write
51E0000
trusted library section
page read and write
450847B000
stack
page read and write
BBAB000
heap
page read and write
E611000
heap
page read and write
8C60000
heap
page read and write
B3EE000
stack
page read and write
7695000
unkown
page readonly
F960000
trusted library allocation
page read and write
DB4A000
heap
page read and write
8C1F000
unkown
page read and write
754C000
heap
page read and write
E5D7000
heap
page read and write
5D30000
trusted library allocation
page read and write
7F3E000
stack
page read and write
A8C2000
heap
page read and write
4B9C000
stack
page read and write
8D5F000
heap
page read and write
5D30000
trusted library allocation
page read and write
FD35000
heap
page read and write
5D30000
trusted library allocation
page read and write
A877000
heap
page read and write
69DA000
unkown
page read and write
5310000
trusted library allocation
page read and write
ABDF000
heap
page read and write
7FFF97E3F000
unkown
page readonly
7E20000
trusted library allocation
page read and write
7FF566E8A000
unkown
page readonly
AB79EFE000
stack
page read and write
7FF566F0C000
unkown
page readonly
2EDF000
stack
page read and write
DEE9000
heap
page read and write
7515000
heap
page read and write
AB24000
heap
page read and write
BBD5000
heap
page read and write
2F50000
unkown
page readonly
A40000
heap
page read and write
5D07000
trusted library allocation
page read and write
B1EE000
stack
page read and write
10DBB000
heap
page read and write
2542425F000
unkown
page read and write
5D07000
trusted library allocation
page read and write
502F000
unkown
page read and write
3EE0000
heap
page read and write
A8C1000
heap
page read and write
5CFB000
trusted library allocation
page read and write
EFD3000
heap
page read and write
7FDC000
stack
page read and write
149C000
heap
page read and write
7780000
trusted library allocation
page read and write
F496000
heap
page read and write
10DDF000
heap
page read and write
8D65000
heap
page read and write
FE0000
heap
page read and write
F7F000
system
page read and write
EFCC000
heap
page read and write
751F000
unkown
page readonly
3A30000
heap
page read and write
F7F000
system
page read and write
FE0000
heap
page read and write
F4D3000
heap
page read and write
D61000
heap
page read and write
EE01000
unkown
page read and write
5830000
trusted library allocation
page read and write
204E4EA9000
unkown
page read and write
BB1000
heap
page read and write
E56F000
stack
page read and write
BF90000
heap
page read and write
F46E000
heap
page read and write
4820000
unkown
page read and write
F460000
heap
page read and write
A866000
heap
page read and write
1E527EB0000
trusted library allocation
page read and write
D4F0000
trusted library allocation
page read and write
3A83000
heap
page read and write
5D29000
trusted library allocation
page read and write
DEA6000
heap
page read and write
B9EB000
stack
page read and write
500000
heap
page read and write
8D6D000
heap
page read and write
D86000
system
page read and write
DC26000
heap
page read and write
5AF0000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
C890000
trusted library allocation
page read and write
AACA000
heap
page read and write
A9F8000
heap
page read and write
5D30000
trusted library allocation
page read and write
CAD9EFF000
stack
page read and write
3CD0000
heap
page read and write
DA87000
heap
page read and write
10098000
heap
page read and write
DB8C000
heap
page read and write
53E6000
heap
page read and write
204EA410000
trusted library allocation
page read and write
8E83000
unkown
page read and write
89FF000
unkown
page read and write
8A5E000
heap
page read and write
7DF47E1C0000
trusted library allocation
page readonly
C76C000
unkown
page readonly
B50000
trusted library allocation
page read and write
8DBB000
heap
page read and write
2DDD000
stack
page read and write
DF74000
heap
page read and write
5D30000
trusted library allocation
page read and write
5164000
heap
page read and write
97E000
stack
page read and write
E5F2000
heap
page read and write
10C75000
trusted library allocation
page read and write
BF0000
unkown
page readonly
B66B000
stack
page read and write
1016E000
stack
page read and write
BC03000
heap
page read and write
E678000
heap
page read and write
6B5E000
stack
page read and write
5C90000
unkown
page readonly
17D0000
heap
page read and write
B50000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
1E528810000
trusted library allocation
page read and write
23E1CFB4000
unkown
page read and write
F268000
heap
page read and write
E7D000
stack
page read and write
84DF000
stack
page read and write
1488000
heap
page read and write
38A7000
heap
page read and write
5D30000
trusted library allocation
page read and write
D0FF000
stack
page read and write
7FDC000
stack
page read and write
8BC8000
heap
page read and write
383A000
heap
page read and write
7FF566E05000
unkown
page readonly
5B00000
trusted library allocation
page read and write
89F0000
unkown
page read and write
DD46000
heap
page read and write
F933000
trusted library allocation
page read and write
BD73000
trusted library allocation
page read and write
FC86000
heap
page read and write
57B0000
trusted library allocation
page read and write
E631000
heap
page read and write
750A000
heap
page read and write
DA8D000
heap
page read and write
53B4000
heap
page read and write
7465000
heap
page read and write
AB41000
heap
page read and write
7FF566B8C000
unkown
page readonly
8CF4000
heap
page read and write
17CE000
stack
page read and write
7DF47E201000
trusted library allocation
page execute read
8D6F000
heap
page read and write
5D07000
trusted library allocation
page read and write
ABB0000
heap
page read and write
ABAF000
heap
page read and write
7515000
heap
page read and write
DFAC000
heap
page read and write
8D5B000
heap
page read and write
5B00000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
DB84000
heap
page read and write
5389000
heap
page read and write
4810000
unkown
page read and write
23E1D402000
unkown
page read and write
8C9B000
heap
page read and write
7FF566BE9000
unkown
page readonly
8C7A000
heap
page read and write
5B00000
trusted library allocation
page read and write
8020000
trusted library allocation
page read and write
8A05000
unkown
page read and write
D67A000
stack
page read and write
89F0000
unkown
page read and write
19A0000
heap
page read and write
F498000
heap
page read and write
3A7F000
heap
page read and write
F480000
heap
page read and write
F268000
heap
page read and write
5B00000
trusted library allocation
page read and write
B6EB000
stack
page read and write
8D1D000
heap
page read and write
7FF566EAA000
unkown
page readonly
E758000
unkown
page read and write
5D02000
trusted library allocation
page read and write
4670000
unkown
page read and write
F9B2000
unkown
page read and write
DEB9000
heap
page read and write
39A8000
stack
page read and write
1020000
unkown
page read and write
8A69000
heap
page read and write
23E1CF6E000
unkown
page read and write
DB65000
heap
page read and write
AC5000
stack
page read and write
F260000
heap
page read and write
E5CE000
heap
page read and write
7F59000
stack
page read and write
5B00000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
F494000
heap
page read and write
AACA000
heap
page read and write
DB10000
heap
page read and write
25A9AE6A000
unkown
page read and write
8FFE000
stack
page read and write
F55A000
heap
page read and write
8CD9000
heap
page read and write
5CEA000
trusted library allocation
page read and write
1F17DE48000
unkown
page read and write
7FF566E2E000
unkown
page readonly
68D0000
heap
page read and write
7FF566BC8000
unkown
page readonly
5D30000
trusted library allocation
page read and write
8B29000
heap
page read and write
DEB8000
heap
page read and write
EFB0000
heap
page read and write
7FF566EFE000
unkown
page readonly
2542425C000
unkown
page read and write
7FF566E0E000
unkown
page readonly
3A2E000
stack
page read and write
5D1F000
trusted library allocation
page read and write
74FA000
heap
page read and write
7547000
heap
page read and write
5353000
heap
page read and write
E558000
heap
page read and write
8767000
stack
page read and write
B278000
stack
page read and write
7FF0000
trusted library allocation
page read and write
8D0A000
heap
page read and write
F45F000
heap
page read and write
7FF566B76000
unkown
page readonly
186E000
stack
page read and write
A862000
heap
page read and write
A9FD000
heap
page read and write
F268000
heap
page read and write
8CC6000
unkown
page read and write
C8F0000
trusted library allocation
page read and write
BB40000
heap
page read and write
5B00000
trusted library allocation
page read and write
1060000
heap
page read and write
5D07000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
CA00000
trusted library allocation
page read and write
8D89000
heap
page read and write
D55000
heap
page read and write
5D0C000
trusted library allocation
page read and write
F488000
heap
page read and write
324C000
stack
page read and write
7DF47E1B1000
trusted library allocation
page execute read
D530000
trusted library allocation
page read and write
46E0000
unkown
page read and write
A8A6000
heap
page read and write
BE67000
stack
page read and write
5CFB000
trusted library allocation
page read and write
83EB000
stack
page read and write
7D8E7F000
stack
page read and write
5B00000
trusted library allocation
page read and write
DF83000
heap
page read and write
ABCB000
heap
page read and write
E5F1000
heap
page read and write
7D5D000
stack
page read and write
F329000
heap
page read and write
7FF5668FC000
unkown
page readonly
DB4E000
heap
page read and write
77DE000
unkown
page readonly
3940000
trusted library allocation
page read and write
AB31000
heap
page read and write
7A65000
unkown
page read and write
DF79000
heap
page read and write
5D07000
trusted library allocation
page read and write
E721000
unkown
page read and write
5200000
trusted library section
page read and write
89EB000
heap
page read and write
6D5E000
stack
page read and write
5227000
stack
page read and write
101CE000
heap
page read and write
914000
heap
page read and write
8CD5000
unkown
page read and write
53CE000
heap
page read and write
204EA300000
trusted library allocation
page read and write
8D5B000
heap
page read and write
5D05000
trusted library allocation
page read and write
F44A000
heap
page read and write
8D1E000
heap
page read and write
53E4000
heap
page read and write
7D4F000
stack
page read and write
AB7A0FB000
stack
page read and write
53D7000
heap
page read and write
8A52000
heap
page read and write
F46E000
heap
page read and write
F55A000
heap
page read and write
EF98000
heap
page read and write
A980000
heap
page read and write
7FFF97E47000
unkown
page readonly
DB45000
heap
page read and write
5D30000
trusted library allocation
page read and write
F12A000
heap
page read and write
6CD9000
stack
page read and write
DC24000
heap
page read and write
32B0000
trusted library allocation
page read and write
7FF566BDB000
unkown
page readonly
F4A2000
heap
page read and write
1BD13A0D000
unkown
page read and write
7515000
heap
page read and write
7FF566C06000
unkown
page readonly
5CEB000
trusted library allocation
page read and write
7FF566AC7000
unkown
page readonly
4850000
unkown
page read and write
DEEF000
heap
page read and write
D861000
heap
page read and write
1E388A30000
heap
page read and write
8B53000
heap
page read and write
C89000
heap
page read and write
102EE000
stack
page read and write
9CF000
heap
page read and write
AB41000
heap
page read and write
FD5C000
heap
page read and write
46B0000
unkown
page read and write
F594000
heap
page read and write
7FF566895000
unkown
page readonly
6B5E000
stack
page read and write
6B37000
stack
page read and write
7FF566C51000
unkown
page readonly
F05F000
heap
page read and write
E5CE000
heap
page read and write
7785000
trusted library allocation
page read and write
F9F3000
unkown
page read and write
FE2B000
heap
page read and write
BB68000
heap
page read and write
AA02000
heap
page read and write
5D07000
trusted library allocation
page read and write
FD66000
heap
page read and write
DC16000
heap
page read and write
A94D000
heap
page read and write
2890000
unkown
page readonly
D992000
heap
page read and write
1180000
heap
page read and write
148F000
heap
page read and write
28C0000
unkown
page readonly
F49C000
heap
page read and write
FD48000
heap
page read and write
BC02000
heap
page read and write
5D1D000
trusted library allocation
page read and write
7FF566FC5000
unkown
page readonly
7C00000
trusted library allocation
page read and write
F326000
heap
page read and write
D867000
heap
page read and write
5D30000
trusted library allocation
page read and write
8C57000
unkown
page read and write
5D30000
trusted library allocation
page read and write
11F0000
heap
page read and write
D500000
trusted library allocation
page read and write
B96A000
stack
page read and write
8BB3000
heap
page read and write
2E58000
stack
page read and write
E6F0000
unkown
page read and write
3100000
unkown
page read and write
F415000
heap
page read and write
5810000
trusted library allocation
page read and write
F265000
heap
page read and write
3AC1000
heap
page read and write
912B8FE000
stack
page read and write
8C73000
heap
page read and write
7515000
heap
page read and write
8D97000
heap
page read and write
1BD13A3B000
unkown
page read and write
EFDF000
heap
page read and write
5D04000
trusted library allocation
page read and write
1140000
unkown
page read and write
E756000
unkown
page read and write
323B000
trusted library allocation
page read and write
F5C9000
heap
page read and write
29A0000
heap
page read and write
F48C000
heap
page read and write
A983000
heap
page read and write
74F7000
heap
page read and write
DA15000
heap
page read and write
EFFA000
heap
page read and write
F31A000
heap
page read and write
4E64000
unkown
page read and write
750A000
heap
page read and write
F14F000
heap
page read and write
38AA000
heap
page read and write
2E8D000
unkown
page read and write
8D76000
heap
page read and write
5D07000
trusted library allocation
page read and write
2ED8000
unkown
page read and write
5D07000
trusted library allocation
page read and write
1006A000
heap
page read and write
ABDF000
heap
page read and write
28C0000
unkown
page readonly
8A67000
heap
page read and write
F265000
heap
page read and write
7FF566ADE000
unkown
page readonly
805D000
stack
page read and write
8C21000
unkown
page read and write
3A30000
heap
page read and write
DD48000
heap
page read and write
5D14000
trusted library allocation
page read and write
DB8F000
heap
page read and write
F970000
trusted library allocation
page read and write
2890000
unkown
page readonly
7FF566863000
unkown
page readonly
1180000
heap
page read and write
23E1CFC0000
unkown
page read and write
5B01000
trusted library allocation
page read and write
EE0C000
unkown
page read and write
7B6E000
stack
page read and write
1489000
heap
page read and write
5D07000
trusted library allocation
page read and write
F470000
heap
page read and write
8E83000
unkown
page read and write
8C47000
heap
page read and write
5B00000
trusted library allocation
page read and write
EF96000
heap
page read and write
BC69000
stack
page read and write
BBD5000
heap
page read and write
F318000
heap
page read and write
8767000
stack
page read and write
F036000
heap
page read and write
1F4EB04F000
unkown
page read and write
FD78000
heap
page read and write
CA43000
trusted library allocation
page read and write
74A1000
heap
page read and write
BE0000
unkown
page read and write
31C5000
stack
page read and write
7FF566C79000
unkown
page readonly
BC52000
heap
page read and write
8CF4000
heap
page read and write
5D30000
trusted library allocation
page read and write
2F4B000
unkown
page read and write
8D63000
heap
page read and write
DC22000
heap
page read and write
DEB4000
heap
page read and write
E631000
heap
page read and write
53C9000
heap
page read and write
8CA1000
heap
page read and write
7FF566C4B000
unkown
page readonly
8BB4000
heap
page read and write
25A9ABA0000
heap
page read and write
2F5A000
stack
page read and write
2ED8000
unkown
page read and write
7FF566F94000
unkown
page readonly
8D97000
heap
page read and write
A8A4000
heap
page read and write
FD58000
heap
page read and write
DA99000
heap
page read and write
8ACF000
unkown
page read and write
8C9B000
heap
page read and write
D22000
heap
page read and write
5830000
trusted library allocation
page read and write
DB7B000
heap
page read and write
73C2000
heap
page read and write
7B6E000
stack
page read and write
DDFA000
heap
page read and write
F008000
heap
page read and write
6949000
unkown
page read and write
11F5000
heap
page read and write
8D80000
heap
page read and write
7FFF97E3F000
unkown
page readonly
5B00000
trusted library allocation
page read and write
5509000
stack
page read and write
7D5D000
stack
page read and write
5C90000
unkown
page readonly
5CE2000
trusted library allocation
page read and write
3A85000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF566840000
unkown
page readonly
FA3B000
unkown
page read and write
875E000
stack
page read and write
3A7F000
heap
page read and write
BBC000
heap
page read and write
23E1C649000
unkown
page read and write
204EA430000
trusted library allocation
page read and write
8A82000
heap
page read and write
A8A9000
heap
page read and write
82DD000
stack
page read and write
D41000
heap
page read and write
7FF566AC1000
unkown
page readonly
F45F000
heap
page read and write
FE2D000
heap
page read and write
FD52000
heap
page read and write
4F10000
unkown
page readonly
DC38000
heap
page read and write
7FF566E17000
unkown
page readonly
A10000
heap
page read and write
D11E000
stack
page read and write
AEFE000
unkown
page read and write
FD64000
heap
page read and write
111B000
system
page readonly
7542000
heap
page read and write
ABB2000
heap
page read and write
1010000
unkown
page readonly
1F17DE29000
unkown
page read and write
7FF566D89000
unkown
page readonly
FD0000
unkown
page readonly
8E6000
stack
page read and write
25424080000
heap
page read and write
B50000
trusted library allocation
page read and write
8CA1000
heap
page read and write
102AC000
heap
page read and write
BB69000
heap
page read and write
52E0000
trusted library allocation
page read and write
7D937A000
stack
page read and write
A877000
heap
page read and write
FD29000
heap
page read and write
23E1C716000
unkown
page read and write
8D69000
heap
page read and write
53CC000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FF566B93000
unkown
page readonly
FEDE000
heap
page read and write
BBD5000
heap
page read and write
FAB000
heap
page read and write
77EC000
unkown
page readonly
5D07000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
89EB000
stack
page read and write
DC3E000
heap
page read and write
F004000
heap
page read and write
BCB5000
unkown
page readonly
FD76000
heap
page read and write
AC19000
heap
page read and write
4680000
unkown
page read and write
7DDA000
stack
page read and write
8CF8000
heap
page read and write
7FF566F78000
unkown
page readonly
254240E0000
heap
page read and write
74F7000
heap
page read and write
5D30000
trusted library allocation
page read and write
7DF47E321000
trusted library allocation
page execute read
3860000
heap
page read and write
3B30000
trusted library allocation
page read and write
1E527BE7000
heap
page read and write
815E000
stack
page read and write
7DB0000
heap
page readonly
5D17000
trusted library allocation
page read and write
DA99000
heap
page read and write
5330000
heap
page read and write
F30C000
heap
page read and write
1BD13CE0000
trusted library allocation
page read and write
754C000
heap
page read and write
5CC0000
heap
page read and write
5D10000
trusted library allocation
page read and write
5D23000
trusted library allocation
page read and write
7FF56692C000
unkown
page readonly
8D5C000
heap
page read and write
7FF566D5C000
unkown
page readonly
8D4A000
heap
page read and write
5CFB000
trusted library allocation
page read and write
E630000
heap
page read and write
5830000
trusted library allocation
page read and write
8D65000
heap
page read and write
DC2A000
heap
page read and write
7FF566DF7000
unkown
page readonly
855E000
stack
page read and write
D7AA000
stack
page read and write
AC35000
heap
page read and write
73C2000
heap
page read and write
F476000
heap
page read and write
10098000
heap
page read and write
FB7D000
stack
page read and write
7FF566C11000
unkown
page readonly
DE33000
heap
page read and write
AA60000
heap
page read and write
7FF566C63000
unkown
page readonly
855E000
stack
page read and write
5D0C000
trusted library allocation
page read and write
20A18302000
unkown
page read and write
BB6F000
heap
page read and write
4DD0000
unkown
page read and write
23E1CF77000
unkown
page read and write
F036000
heap
page read and write
8D39000
heap
page read and write
5D30000
trusted library allocation
page read and write
7508000
heap
page read and write
7FFF97DFA000
unkown
page readonly
382B000
heap
page read and write
BBC000
heap
page read and write
204EA6ED000
unkown
page read and write
914000
heap
page read and write
AA2A000
heap
page read and write
204EA705000
unkown
page read and write
CAD967B000
stack
page read and write
DEB9000
heap
page read and write
F6BD000
heap
page read and write
7FF566F3D000
unkown
page readonly
912BE7D000
stack
page read and write
EFB4000
heap
page read and write
2EAA000
unkown
page read and write
754C000
heap
page read and write
8D2F000
heap
page read and write
5D30000
trusted library allocation
page read and write
1474000
heap
page read and write
8A01000
unkown
page read and write
322E000
stack
page read and write
F6BD000
heap
page read and write
5D29000
trusted library allocation
page read and write
1900000
unkown
page read and write
8DB4000
heap
page read and write
5D30000
trusted library allocation
page read and write
7FFF977B3000
unkown
page read and write
7FF566874000
unkown
page readonly
575E000
heap
page read and write
D7B3000
heap
page read and write
83DB000
stack
page read and write
D419000
stack
page read and write
4C20000
unkown
page readonly
BC52000
heap
page read and write
5D07000
trusted library allocation
page read and write
8CB2000
heap
page read and write
1BD13CE0000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
CA10000
trusted library allocation
page read and write
DF74000
heap
page read and write
53ED000
heap
page read and write
D859000
heap
page read and write
FD56000
heap
page read and write
26635BB6000
heap
page read and write
76FC000
unkown
page readonly
5B00000
trusted library allocation
page read and write
F47A000
heap
page read and write
5D07000
trusted library allocation
page read and write
5D19000
trusted library allocation
page read and write
7FFF97DDA000
unkown
page read and write
3350000
unkown
page readonly
5D30000
trusted library allocation
page read and write
10288000
heap
page read and write
F47C000
heap
page read and write
8CFC000
heap
page read and write
52E0000
trusted library allocation
page read and write
7FF566DC8000
unkown
page readonly
5200000
trusted library section
page read and write
1E527BC0000
heap
page read and write
DB10000
heap
page read and write
FD76000
heap
page read and write
101E1000
heap
page read and write
BB8E000
heap
page read and write
DF8F000
heap
page read and write
DF77000
heap
page read and write
8D8E000
heap
page read and write
84BC000
stack
page read and write
BBAB000
heap
page read and write
8D1E000
heap
page read and write
F05F000
heap
page read and write
B76B000
stack
page read and write
ABCB000
heap
page read and write
7E20000
trusted library allocation
page read and write
7FF566BD9000
unkown
page readonly
DA8A000
heap
page read and write
204E4EFD000
unkown
page read and write
7C00000
trusted library allocation
page read and write
7529000
heap
page read and write
10DD8000
heap
page read and write
DB10000
heap
page read and write
BB00000
trusted library allocation
page read and write
A9B1000
heap
page read and write
805D000
stack
page read and write
7507000
unkown
page readonly
8D33000
heap
page read and write
AAC7000
heap
page read and write
5CEA000
trusted library allocation
page read and write
8C22000
heap
page read and write
204EA570000
trusted library allocation
page read and write
F3A7000
heap
page read and write
5B00000
trusted library allocation
page read and write
CE99000
stack
page read and write
23E1CFA9000
unkown
page read and write
8BC4000
heap
page read and write
204EA4F0000
trusted library allocation
page read and write
2F5A000
unkown
page read and write
B34000
heap
page read and write
204EA700000
unkown
page read and write
1AC6B520000
heap
page read and write
C8E0000
trusted library allocation
page read and write
E746000
unkown
page read and write
BB63000
heap
page read and write
3320000
unkown
page read and write
8D44000
heap
page read and write
73E9000
heap
page read and write
51E0000
trusted library section
page read and write
4FA0000
unkown
page read and write
BB8E000
heap
page read and write
44C5000
trusted library allocation
page read and write
7C10000
trusted library allocation
page read and write
7FF566CD8000
unkown
page readonly
A90A000
heap
page read and write
5D05000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
F553000
heap
page read and write
8D97000
heap
page read and write
1E528AD0000
trusted library allocation
page read and write
204E4E00000
unkown
page read and write
F14F000
heap
page read and write
AF18000
unkown
page read and write
BBD5000
heap
page read and write
FD2A000
heap
page read and write
CA45000
trusted library allocation
page read and write
8C21000
heap
page read and write
5D30000
trusted library allocation
page read and write
AD5E000
stack
page read and write
5990000
unkown
page readonly
5D30000
trusted library allocation
page read and write
760A000
unkown
page readonly
B34000
heap
page read and write
5D30000
trusted library allocation
page read and write
1487000
heap
page read and write
885B000
stack
page read and write
8D03000
heap
page read and write
DEB4000
heap
page read and write
8A05000
unkown
page read and write
23E1CFBF000
unkown
page read and write
B1EE000
stack
page read and write
7FFF977C3000
unkown
page readonly
7ECE000
stack
page read and write
46A0000
unkown
page read and write
8CCE000
heap
page read and write
1BD139E0000
heap
page read and write
6949000
unkown
page read and write
A8C1000
heap
page read and write
5D17000
trusted library allocation
page read and write
AAC7000
heap
page read and write
8D5A000
heap
page read and write
8C99000
heap
page read and write
2EE6000
unkown
page read and write
F640000
heap
page read and write
FE96000
heap
page read and write
5D30000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
7FF566E61000
unkown
page readonly
8C7B000
heap
page read and write
2F50000
unkown
page read and write
11A0000
unkown
page readonly
5D30000
trusted library allocation
page read and write
36AF000
stack
page read and write
7D60000
trusted library allocation
page read and write
BC8C000
unkown
page readonly
7465000
heap
page read and write
10070000
heap
page read and write
7373000
heap
page read and write
AA2A000
heap
page read and write
8D6A000
heap
page read and write
EFC2000
heap
page read and write
7FF56705C000
unkown
page readonly
8D9B000
heap
page read and write
5B00000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
26635B9B000
heap
page read and write
F486000
heap
page read and write
7FF56690D000
unkown
page readonly
F1CC000
heap
page read and write
1960000
unkown
page readonly
BF0000
unkown
page readonly
87EC000
stack
page read and write
A983000
heap
page read and write
8B78000
heap
page read and write
8D89000
heap
page read and write
5B00000
trusted library allocation
page read and write
A9F8000
heap
page read and write
C46E000
unkown
page readonly
30D0000
unkown
page read and write
3B0F000
heap
page read and write
7FFF97DDC000
unkown
page read and write
450857C000
stack
page read and write
32CA000
stack
page read and write
FEDE000
heap
page read and write
8D33000
heap
page read and write
FECB000
heap
page read and write
E6EE000
stack
page read and write
8A5C000
heap
page read and write
7FF566B90000
unkown
page readonly
7FF566F09000
unkown
page readonly
580B000
heap
page read and write
7FF566CFD000
unkown
page readonly
3ADC000
heap
page read and write
A860000
heap
page read and write
F241000
heap
page read and write
8A52000
heap
page read and write
7FFF97DE3000
unkown
page readonly
C80000
heap
page read and write
702E000
unkown
page readonly
54C0000
trusted library section
page read and write
F4DF000
heap
page read and write
DB7B000
heap
page read and write
AAD9000
heap
page read and write
E5D2000
heap
page read and write
8A80000
heap
page read and write
3950000
trusted library allocation
page read and write
1119000
system
page execute and read and write
23E1D402000
unkown
page read and write
7DF47E311000
trusted library allocation
page execute read
BB89000
heap
page read and write
DFAC000
heap
page read and write
372B000
stack
page read and write
5D30000
trusted library allocation
page read and write
DEAE000
heap
page read and write
7C00000
trusted library allocation
page read and write
7FF566DC3000
unkown
page readonly
11F5000
heap
page read and write
912BB7F000
stack
page read and write
BA6E000
stack
page read and write
EB42000
heap
page read and write
8CF4000
heap
page read and write
AF79000
unkown
page read and write
CDFC000
stack
page read and write
77F3000
unkown
page readonly
7FF566E61000
unkown
page readonly
23E1CF6B000
unkown
page read and write
E5B4000
heap
page read and write
1010000
unkown
page readonly
CA10000
trusted library allocation
page read and write
BBE8000
heap
page read and write
5800000
trusted library allocation
page read and write
F4DF000
heap
page read and write
7512000
heap
page read and write
5B3A000
stack
page read and write
BB30000
trusted library allocation
page read and write
855E000
stack
page read and write
AF6000
stack
page read and write
5D30000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
7A65000
unkown
page read and write
10BF0000
trusted library allocation
page read and write
7FF566ABB000
unkown
page readonly
5D30000
trusted library allocation
page read and write
EFFA000
heap
page read and write
F1CD000
heap
page read and write
A9FA000
heap
page read and write
5CFB000
trusted library allocation
page read and write
8C5F000
heap
page read and write
E5A5000
heap
page read and write
735C000
stack
page read and write
B9EB000
stack
page read and write
B682000
heap
page read and write
1400000
unkown
page readonly
498E000
unkown
page read and write
5D07000
trusted library allocation
page read and write
8BB1000
heap
page read and write
DDF4000
heap
page read and write
5CB0000
unkown
page read and write
8C49000
heap
page read and write
5D30000
trusted library allocation
page read and write
DD1A000
heap
page read and write
204E4E79000
unkown
page read and write
14A0000
heap
page read and write
EF9C000
heap
page read and write
7FF566E80000
unkown
page readonly
FD7C000
heap
page read and write
AA9C000
heap
page read and write
7700000
trusted library allocation
page read and write
B8E9000
stack
page read and write
5B10000
trusted library allocation
page read and write
6A2E000
unkown
page read and write
2EAA000
unkown
page read and write
5AF0000
trusted library allocation
page read and write
8D8F000
heap
page read and write
F6B5000
heap
page read and write
7FFF97DE0000
unkown
page read and write
2542426D000
unkown
page read and write
D9F2000
heap
page read and write
7807000
unkown
page readonly
5D12000
trusted library allocation
page read and write
B9C0000
trusted library allocation
page read and write
FD4E000
heap
page read and write
7D90000
heap
page read and write
8D5B000
heap
page read and write
8C61000
heap
page read and write
A8C1000
heap
page read and write
5D30000
trusted library allocation
page read and write
EFDD000
heap
page read and write
B9D0000
trusted library allocation
page read and write
DD11000
heap
page read and write
FAB000
heap
page read and write
7DF466381000
unkown
page execute read
5AF0000
trusted library allocation
page read and write
5318000
heap
page read and write
5D30000
trusted library allocation
page read and write
C79C000
unkown
page readonly
DD13000
heap
page read and write
FA0000
heap
page read and write
F48A000
heap
page read and write
7FF566F09000
unkown
page readonly
8BA8000
heap
page read and write
7043000
unkown
page readonly
8C21000
unkown
page read and write
7FF566863000
unkown
page readonly
7807000
unkown
page readonly
DD2A000
heap
page read and write
7FF566A98000
unkown
page readonly
5D06000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
FD7E000
heap
page read and write
2E70000
unkown
page read and write
7542000
heap
page read and write
3929000
stack
page read and write
3872000
heap
page read and write
BBD5000
heap
page read and write
F47E000
heap
page read and write
E5CE000
heap
page read and write
DB45000
heap
page read and write
5CEA000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
F46A000
heap
page read and write
B56B000
stack
page read and write
8C48000
heap
page read and write
FC0000
heap
page read and write
5A70000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
8D5C000
heap
page read and write
8A67000
heap
page read and write
A10000
heap
page read and write
B9F2000
heap
page read and write
53D7000
heap
page read and write
3250000
trusted library allocation
page read and write
5344000
heap
page read and write
A983000
heap
page read and write
BD9A000
stack
page read and write
57F0000
trusted library allocation
page read and write
5940000
unkown
page read and write
48E0000
unkown
page read and write
3B28000
stack
page read and write
F05C000
heap
page read and write
23E1C657000
unkown
page read and write
F10F000
heap
page read and write
EF9000
heap
page read and write
5A0000
remote allocation
page read and write
DB10000
heap
page read and write
101D9000
heap
page read and write
BE67000
stack
page read and write
F3A7000
heap
page read and write
5AF4000
trusted library allocation
page read and write
BBAB000
heap
page read and write
5D30000
trusted library allocation
page read and write
76C3000
trusted library allocation
page read and write
A8A8000
heap
page read and write
F47C000
heap
page read and write
CA0000
heap
page read and write
7FFF977C0000
unkown
page read and write
D85B000
heap
page read and write
1400000
unkown
page readonly
8C1D000
unkown
page read and write
20A18202000
unkown
page read and write
E5F6000
heap
page read and write
F7F000
system
page read and write
BAAA000
unkown
page readonly
749D000
heap
page read and write
1466000
heap
page read and write
5070000
unkown
page readonly
2EE6000
unkown
page read and write
53CC000
heap
page read and write
F268000
heap
page read and write
C514000
unkown
page readonly
766C000
unkown
page readonly
F459000
heap
page read and write
DB7B000
heap
page read and write
AA85000
heap
page read and write
5D07000
trusted library allocation
page read and write
8DB8000
unkown
page read and write
A94B000
heap
page read and write
B9FA000
heap
page read and write
5D07000
trusted library allocation
page read and write
BB6F000
heap
page read and write
There are 8027 hidden memdumps, click here to show them.