IOC Report
3.exe

loading gif

Files

File Path
Type
Category
Malicious
3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\DGHIECGCBKFH\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\DGHIECGCBKFH\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\DGHIECGCBKFH\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\DGHIECGCBKFH\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\sqls[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\5358.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\A247.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\kat2225.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\rcjjrra
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\rcjjrra:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\DGHIECGCBKFH\BFBGHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\DGHIECGCBKFH\BKFBAK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DGHIECGCBKFH\DAKFID
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DGHIECGCBKFH\DAKFID-shm
data
dropped
C:\ProgramData\DGHIECGCBKFH\ECAEGH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DGHIECGCBKFH\FCFBGI
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DGHIECGCBKFH\GDHIII
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DGHIECGCBKFH\GDHIII-shm
data
dropped
C:\ProgramData\DGHIECGCBKFH\GIEHID
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\DGHIECGCBKFH\GIIDBG
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\DGHIECGCBKFH\HIDAFH
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DGHIECGCBKFH\HIDBFC
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\DGHIECGCBKFH\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\DGHIECGCBKFH\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_A247.exe_913f69c4d42465caa03af44e502f728cdcf74344_7f64f70c_c718d536-0932-499a-b4fd-057bd6fe0023\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER380E.tmp.dmp
Mini DuMP crash report, 15 streams, Sun May 26 08:31:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER38CB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER38EB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\76561199689717899[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3063), with CRLF, LF line terminators
dropped
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\3.exe
"C:\Users\user\Desktop\3.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\rcjjrra
C:\Users\user\AppData\Roaming\rcjjrra
malicious
C:\Users\user\AppData\Local\Temp\A247.exe
C:\Users\user\AppData\Local\Temp\A247.exe
malicious
C:\Users\user\AppData\Local\Temp\5358.exe
C:\Users\user\AppData\Local\Temp\5358.exe
malicious
C:\Users\user\AppData\Local\Temp\kat2225.tmp
C:\Users\user\AppData\Local\Temp\kat2225.tmp
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6204 -s 1548
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\user\AppData\Local\Temp\kat2225.tmp" & rd /s /q "C:\ProgramData\DGHIECGCBKFH" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10

URLs

Name
IP
Malicious
whispedwoodmoodsksl.shop
malicious
http://guteyr.cc/tmp/index.php
malicious
http://45.129.96.86/file/update.exe
45.129.96.86
malicious
https://steamcommunity.com/profiles/76561199689717899
23.67.133.187
malicious
holicisticscrarws.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://65.109.242.59/y
unknown
https://duckduckgo.com/ac/?q=
unknown
https://65.109.242.59/vcruntime140.dllv
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://65.109.242.59CGII
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://65.109.242.59/vcruntime140.dllT
unknown
https://whispedwoodmoodsksl.shop/(
unknown
https://65.109.242.59/nss3.dll
65.109.242.59
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://65.109.242.59/p
unknown
https://s.ytimg.com;
unknown
https://t.me/copterwin
unknown
https://65.109.242.59/t
unknown
https://65.109.242.59/s
unknown
https://65.109.242.59/r
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://65.109.242.59/?
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://65.109.242.59/B
unknown
https://t.me/copterwinr0isMozilla/5.0
unknown
https://65.109.242.59/vcruntime140.dll?
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://65.109.242.59/F
unknown
https://65.109.242.59/L
unknown
https://65.109.242.59/vcruntime140.dllD
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js
unknown
https://65.109.242.59/K
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://65.109.242.59/vcruntime140.dllB
unknown
https://65.109.242.59/P
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://65.109.242.59/O
unknown
https://www.ecosia.org/newtab/
unknown
https://65.109.242.59/freebl3.dll
65.109.242.59
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://65.109.242.59/vcruntime140.dllO
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://65.109.242.59/l3.dll
unknown
https://whispedwoodmoodsksl.shop/_o5e
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://whispedwoodmoodsksl.shop/r
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://whispedwoodmoodsksl.shop/%%
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://65.109.242.59/~;
unknown
https://word.office.comon
unknown
https://65.109.242.59/mozglue.dll
65.109.242.59
https://65.109.242.59/vcruntime140.dll
65.109.242.59
https://help.steampowered.com/en/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://65.109.242.59/mo
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
http://schemas.micro
unknown
https://recaptcha.net/recaptcha/;
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://65.109.242.59/softokn3.dllel
unknown
https://65.109.242.59/vcruntime140.dllSessionKeyBackward
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://65.109.242.59/sqls.dll)
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://steamcommunity.com/profiles/76561199689717899/badges
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://store.steampowered.com/legal/
unknown
https://65.109.242.59
unknown
https://65.109.242.59/msvcp140.dlld
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://65.109.242.59/nss3.dllAppData
unknown
http://rpi.net.au/~ajohnson/resourcehacker
unknown
https://store.steampowered.com/
unknown
http://127.0.0.1:27060
unknown
https://65.109.242.59/42.59ine
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=X93cgZRtuH6z&l=engli
unknown
https://api.steampowered.com/
unknown
https://store.steampowered.com/mobile
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
whispedwoodmoodsksl.shop
188.114.96.3
malicious
steamcommunity.com
23.67.133.187
malicious
dbfhns.in
190.187.52.42
malicious

IPs

IP
Domain
Country
Malicious
23.145.40.124
unknown
Reserved
malicious
190.187.52.42
dbfhns.in
Peru
malicious
23.67.133.187
steamcommunity.com
United States
malicious
88.225.215.104
unknown
Turkey
malicious
188.114.96.3
whispedwoodmoodsksl.shop
European Union
malicious
91.202.233.231
unknown
Russian Federation
malicious
45.129.96.86
unknown
Estonia
malicious
185.235.137.54
unknown
Iran (ISLAMIC Republic Of)
65.109.242.59
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
There are 175 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
610000
direct allocation
page execute and read and write
malicious
2590000
direct allocation
page execute and read and write
malicious
2E71000
unclassified section
page read and write
malicious
2E30000
direct allocation
page read and write
malicious
2E50000
direct allocation
page read and write
malicious
42B0000
direct allocation
page execute and read and write
malicious
2E51000
unclassified section
page read and write
malicious
45B0000
direct allocation
page read and write
malicious
43B9000
direct allocation
page execute and read and write
malicious
979000
heap
page read and write
7DF4F2471000
unkown
page execute read
9700000
unkown
page read and write
873000
heap
page read and write
869000
heap
page read and write
7D6000
heap
page read and write
C669000
unkown
page read and write
3220000
unkown
page read and write
10E0000
unkown
page read and write
7FF5D72BF000
unkown
page readonly
9700000
unkown
page read and write
1140000
unkown
page read and write
4A60000
heap
page read and write
98E000
heap
page read and write
30D0000
unkown
page read and write
2EA0000
unkown
page read and write
2EE9000
trusted library allocation
page read and write
7FF5D7455000
unkown
page readonly
B03B000
stack
page read and write
1140000
unkown
page read and write
A251000
unkown
page read and write
1240000
unkown
page read and write
400000
unkown
page readonly
815000
heap
page read and write
7FF5D765F000
unkown
page readonly
89E000
heap
page read and write
7FF5D764F000
unkown
page readonly
974000
heap
page read and write
7618000
unkown
page read and write
9200000
unkown
page read and write
7FF5D72E9000
unkown
page readonly
2E4A000
trusted library allocation
page read and write
3220000
unkown
page read and write
9B4000
heap
page read and write
35C3000
unkown
page read and write
7FF5D7641000
unkown
page readonly
30D0000
unkown
page read and write
640000
heap
page read and write
10E3A000
unkown
page read and write
7FB000
heap
page read and write
10E0000
unkown
page read and write
7FF5D66E8000
unkown
page readonly
10E0000
unkown
page read and write
986000
heap
page read and write
10634000
unkown
page read and write
7FF5D7795000
unkown
page readonly
84F000
heap
page read and write
87A000
heap
page read and write
2E55000
trusted library allocation
page read and write
2DEF000
trusted library allocation
page read and write
49D6000
unkown
page read and write
C800000
unkown
page read and write
85E000
stack
page read and write
C861000
unkown
page read and write
1B63E000
stack
page read and write
986000
heap
page read and write
496000
unkown
page write copy
82B000
heap
page read and write
980000
heap
page read and write
2DEB000
trusted library allocation
page read and write
98FD000
stack
page read and write
9A6A000
unkown
page read and write
2E85000
trusted library allocation
page read and write
7FF5D771A000
unkown
page readonly
3220000
unkown
page read and write
7FF5D7808000
unkown
page readonly
83C000
heap
page read and write
1C2AC000
stack
page read and write
3220000
unkown
page read and write
9700000
unkown
page read and write
9200000
unkown
page read and write
7DBC000
stack
page read and write
1281000
unkown
page readonly
2E60000
unclassified section
page read and write
3220000
unkown
page read and write
980000
heap
page read and write
2EA0000
unkown
page read and write
675000
heap
page read and write
3220000
unkown
page read and write
49FD000
unkown
page read and write
2E9A000
heap
page read and write
1240000
unkown
page read and write
3220000
unkown
page read and write
7FF5D72D3000
unkown
page readonly
7FF5D744E000
unkown
page readonly
52B000
remote allocation
page execute and read and write
C615000
unkown
page read and write
16B70000
remote allocation
page read and write
10E0000
unkown
page read and write
4A44000
unkown
page read and write
76F8000
unkown
page read and write
1150000
unkown
page read and write
7E0000
heap
page read and write
2E76000
trusted library allocation
page read and write
853B000
stack
page read and write
146CC000
stack
page read and write
7D3E000
stack
page read and write
2EA0000
unkown
page read and write
30E0000
unkown
page read and write
2EC9000
trusted library allocation
page read and write
3220000
unkown
page read and write
1B650000
heap
page read and write
19C000
stack
page read and write
872000
heap
page read and write
2EA0000
unkown
page read and write
7FF5D7591000
unkown
page readonly
760F000
unkown
page read and write
30F0000
unkown
page read and write
7FF5D7558000
unkown
page readonly
84D000
heap
page read and write
9200000
unkown
page read and write
1150000
unkown
page read and write
1140000
unkown
page read and write
7C2000
heap
page read and write
7CD000
heap
page read and write
945000
heap
page read and write
2E40000
direct allocation
page execute and read and write
9700000
unkown
page read and write
7FF5D7065000
unkown
page readonly
30D0000
unkown
page read and write
9820000
unkown
page read and write
2E65000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
3220000
unkown
page read and write
980000
heap
page read and write
1150000
unkown
page read and write
7FB000
heap
page read and write
3220000
unkown
page read and write
400000
unkown
page readonly
2D30000
heap
page read and write
1240000
unkown
page read and write
2EA0000
unkown
page read and write
986000
heap
page read and write
2DD5000
trusted library allocation
page read and write
9B000
stack
page read and write
7FF5D6BE4000
unkown
page readonly
2DE8000
trusted library allocation
page read and write
83A000
heap
page read and write
63F000
remote allocation
page execute and read and write
9700000
unkown
page read and write
30D0000
unkown
page read and write
10E3A000
unkown
page read and write
83C000
heap
page read and write
2B6E000
stack
page read and write
862000
heap
page read and write
1150000
unkown
page read and write
9820000
unkown
page read and write
3080000
unkown
page read and write
980000
heap
page read and write
3220000
unkown
page read and write
7E3000
heap
page read and write
A384000
unkown
page read and write
3220000
unkown
page read and write
2EA0000
unkown
page read and write
7D1000
heap
page read and write
10534000
unkown
page read and write
7FF5D758D000
unkown
page readonly
2EC0000
unkown
page readonly
7FF5D7722000
unkown
page readonly
660000
heap
page read and write
4C20000
heap
page read and write
9200000
unkown
page read and write
8C6000
heap
page read and write
A9E9000
unkown
page read and write
2DC1000
trusted library allocation
page read and write
7FF000
heap
page read and write
1240000
unkown
page read and write
3220000
unkown
page read and write
10E0000
unkown
page read and write
86E000
heap
page read and write
2EA0000
unkown
page read and write
9ADB000
unkown
page read and write
1B9BA000
direct allocation
page readonly
7FF5D7257000
unkown
page readonly
30D0000
unkown
page read and write
980000
heap
page read and write
1F0000
heap
page read and write
3220000
unkown
page read and write
3080000
unkown
page read and write
4A40000
unkown
page read and write
30D0000
unkown
page read and write
1B671000
heap
page read and write
10E3A000
unkown
page read and write
7FF5D75AF000
unkown
page readonly
2DF9000
trusted library allocation
page read and write
410000
unkown
page readonly
7FD000
heap
page read and write
9700000
unkown
page read and write
874000
heap
page read and write
316F000
stack
page read and write
982000
heap
page read and write
9700000
unkown
page read and write
83C000
heap
page read and write
9820000
unkown
page read and write
7FF5D75FF000
unkown
page readonly
7686000
unkown
page read and write
30F0000
unkown
page read and write
3220000
unkown
page read and write
2F84000
trusted library allocation
page read and write
3220000
unkown
page read and write
7FF5D7404000
unkown
page readonly
3220000
unkown
page read and write
8B7C000
unkown
page read and write
2E55000
trusted library allocation
page read and write
7FF5D7745000
unkown
page readonly
7FF5D72D0000
unkown
page readonly
401000
unkown
page execute read
C73E000
unkown
page read and write
10E0000
unkown
page read and write
A273000
unkown
page read and write
B8DB000
stack
page read and write
C653000
unkown
page read and write
AA40000
unkown
page read and write
3220000
unkown
page read and write
1140000
unkown
page read and write
869000
heap
page read and write
2DCE000
stack
page read and write
7FF5D71A6000
unkown
page readonly
9820000
unkown
page read and write
9820000
unkown
page read and write
73E000
heap
page read and write
979000
heap
page read and write
83C000
heap
page read and write
9200000
unkown
page read and write
3F5E000
stack
page read and write
A264000
unkown
page read and write
7FF5D7507000
unkown
page readonly
87A000
heap
page read and write
83C000
heap
page read and write
3280000
unkown
page read and write
8360000
unkown
page read and write
3220000
unkown
page read and write
8D50000
unkown
page read and write
3080000
unkown
page read and write
84C0000
stack
page read and write
1240000
unkown
page read and write
977000
heap
page read and write
3530000
unkown
page read and write
3220000
unkown
page read and write
B980000
unkown
page readonly
836000
heap
page read and write
7FF5D777A000
unkown
page readonly
1150000
unkown
page read and write
2DD2000
trusted library allocation
page read and write
821000
heap
page read and write
534000
remote allocation
page execute and read and write
1F0000
heap
page read and write
3500000
stack
page read and write
1240000
unkown
page read and write
2E4D000
trusted library allocation
page read and write
7FF5D7784000
unkown
page readonly
7E9000
heap
page read and write
7DE000
heap
page read and write
82F000
heap
page read and write
C47F000
unkown
page read and write
7FF5D779E000
unkown
page readonly
1B5C0000
trusted library allocation
page read and write
7EC000
heap
page read and write
9A76000
unkown
page read and write
1240000
unkown
page read and write
30D0000
unkown
page read and write
986000
heap
page read and write
2CAE000
stack
page read and write
C496000
unkown
page read and write
30F0000
unkown
page read and write
30D0000
unkown
page read and write
A416000
unkown
page read and write
7FF5D7442000
unkown
page readonly
3220000
unkown
page read and write
9EE0000
unkown
page read and write
2EA0000
unkown
page read and write
7F8000
heap
page read and write
3220000
unkown
page read and write
2E65000
trusted library allocation
page read and write
C460000
unkown
page read and write
7605000
unkown
page read and write
9200000
unkown
page read and write
7E7000
heap
page read and write
2EA0000
unkown
page read and write
850000
heap
page read and write
7FF5D7799000
unkown
page readonly
1B671000
heap
page read and write
2F0C000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
986000
heap
page read and write
84BB000
stack
page read and write
3070000
unkown
page read and write
EF0000
heap
page read and write
8880000
unkown
page readonly
7FF5D7236000
unkown
page readonly
30F0000
unkown
page read and write
7FF5D748C000
unkown
page readonly
2DB6000
trusted library allocation
page read and write
5FE000
stack
page read and write
30D0000
unkown
page read and write
2EA0000
unkown
page read and write
30D0000
unkown
page read and write
3220000
unkown
page read and write
CA53000
unkown
page read and write
3220000
unkown
page read and write
3220000
unkown
page read and write
7EB000
heap
page read and write
2E76000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page read and write
C9D7000
unkown
page read and write
869000
heap
page read and write
C3CB000
stack
page read and write
2E65000
trusted library allocation
page read and write
43C000
stack
page read and write
984000
heap
page read and write
795000
heap
page read and write
7FF5D7284000
unkown
page readonly
2EA0000
unkown
page read and write
7D2000
heap
page read and write
1150000
unkown
page read and write
9820000
unkown
page read and write
7B20000
unkown
page read and write
7637000
unkown
page read and write
4A90000
unkown
page read and write
7FF5D74F2000
unkown
page readonly
2DD4000
trusted library allocation
page read and write
6F881000
unkown
page execute read
7DF4F2480000
unkown
page readonly
979000
heap
page read and write
1240000
unkown
page read and write
7F1000
heap
page read and write
30D0000
unkown
page read and write
7FF5D75BF000
unkown
page readonly
30D0000
unkown
page read and write
246E000
stack
page read and write
862000
heap
page read and write
3220000
unkown
page read and write
2660000
heap
page read and write
30D0000
unkown
page read and write
7FF5D7534000
unkown
page readonly
30D0000
unkown
page read and write
3220000
unkown
page read and write
1240000
unkown
page read and write
430F000
stack
page read and write
7FF5D71C8000
unkown
page readonly
809000
heap
page read and write
3220000
unkown
page read and write
1150000
unkown
page read and write
814000
heap
page read and write
6CE05000
unkown
page readonly
3220000
unkown
page read and write
1140000
unkown
page read and write
96F000
heap
page read and write
C7CB000
unkown
page read and write
82F000
heap
page read and write
1BFC1000
heap
page read and write
3220000
unkown
page read and write
750000
heap
page read and write
7FF5D7523000
unkown
page readonly
1DDCB000
heap
page read and write
971000
heap
page read and write
2EA0000
unkown
page read and write
3220000
unkown
page read and write
451000
unkown
page execute and read and write
4C21000
heap
page read and write
10E0000
unkown
page read and write
869000
heap
page read and write
8EB000
heap
page read and write
1150000
unkown
page read and write
9A84000
unkown
page read and write
97C000
heap
page read and write
2DC7000
trusted library allocation
page read and write
980000
heap
page read and write
7FF5D75A6000
unkown
page readonly
7FF5D7336000
unkown
page readonly
1B9D7000
heap
page read and write
980000
heap
page read and write
E54C000
stack
page read and write
2F8C000
trusted library allocation
page read and write
30D0000
unkown
page read and write
7B00000
unkown
page readonly
2C8C000
unkown
page readonly
7B0000
remote allocation
page read and write
982000
heap
page read and write
1150000
unkown
page read and write
2EA0000
unkown
page read and write
8DCB000
stack
page read and write
A237000
unkown
page read and write
7435000
stack
page read and write
9700000
unkown
page read and write
7E1000
heap
page read and write
907000
heap
page read and write
1150000
unkown
page read and write
986000
heap
page read and write
4970000
heap
page read and write
8D50000
unkown
page read and write
9C000
stack
page read and write
B4D0000
unkown
page readonly
30D0000
unkown
page read and write
986000
heap
page read and write
986000
heap
page read and write
7FF5D770F000
unkown
page readonly
3220000
unkown
page read and write
3220000
unkown
page read and write
2E07000
trusted library allocation
page read and write
96F000
heap
page read and write
2EA0000
unkown
page read and write
986000
heap
page read and write
2EA0000
unkown
page read and write
C8CD000
unkown
page read and write
97B0000
unkown
page read and write
970000
heap
page read and write
2EA0000
unkown
page read and write
7FF5D7450000
unkown
page readonly
3070000
unkown
page read and write
2E4A000
trusted library allocation
page read and write
3220000
unkown
page read and write
30D0000
unkown
page read and write
10E3A000
unkown
page read and write
9780000
unkown
page read and write
3290000
unkown
page read and write
979000
heap
page read and write
33FB000
trusted library allocation
page read and write
C806000
unkown
page read and write
401000
unkown
page execute read
30F0000
unkown
page read and write
A3C3000
unkown
page read and write
3170000
unkown
page read and write
2E65000
trusted library allocation
page read and write
979000
heap
page read and write
30D0000
unkown
page read and write
3100000
unkown
page read and write
6F912000
unkown
page readonly
927D000
stack
page read and write
91F0000
unkown
page readonly
2DC6000
trusted library allocation
page read and write
1BFC5000
heap
page read and write
3220000
unkown
page read and write
11E0000
unkown
page read and write
97C000
heap
page read and write
809000
heap
page read and write
9820000
unkown
page read and write
F46F000
stack
page read and write
3080000
unkown
page read and write
7FF5D766E000
unkown
page readonly
8C0000
heap
page read and write
98D000
heap
page read and write
C5F0000
unkown
page read and write
7FF5D71EA000
unkown
page readonly
30D0000
unkown
page read and write
AA48000
unkown
page read and write
2DC0000
trusted library allocation
page read and write
3370000
unkown
page read and write
846000
heap
page read and write
105F6000
unkown
page read and write
7AA0000
unkown
page read and write
9820000
unkown
page read and write
2EA0000
unkown
page read and write
3220000
unkown
page read and write
7FF5D7244000
unkown
page readonly
980000
heap
page read and write
7FF5D7604000
unkown
page readonly
2EA0000
unkown
page read and write
9820000
unkown
page read and write
7FF5D749B000
unkown
page readonly
984000
heap
page read and write
30E0000
unkown
page read and write
1150000
unkown
page read and write
7FF5D7267000
unkown
page readonly
84D000
heap
page read and write
887000
heap
page read and write
84E000
heap
page read and write
97C000
heap
page read and write
2DD8000
trusted library allocation
page read and write
3220000
unkown
page read and write
30D0000
unkown
page read and write
7FF5D75E9000
unkown
page readonly
3220000
unkown
page read and write
3220000
unkown
page read and write
83C000
heap
page read and write
2EA0000
unkown
page read and write
B4CE000
stack
page read and write
306F000
stack
page read and write
3220000
unkown
page read and write
2DD3000
trusted library allocation
page read and write
1220F000
stack
page read and write
10E0000
unkown
page read and write
889000
heap
page read and write
7FF5D7360000
unkown
page readonly
7FF5D769E000
unkown
page readonly
7ED000
heap
page read and write
9A98000
unkown
page read and write
30D0000
unkown
page read and write
2DE9000
trusted library allocation
page read and write
400000
unkown
page readonly
977000
heap
page read and write
7FF5D77B9000
unkown
page readonly
9820000
unkown
page read and write
7FF5D77A8000
unkown
page readonly
7FF5D74FA000
unkown
page readonly
30F0000
unkown
page read and write
96F000
heap
page read and write
2E4B000
trusted library allocation
page read and write
1240000
unkown
page read and write
3290000
unkown
page read and write
7FF5D732D000
unkown
page readonly
3486000
stack
page read and write
1240000
unkown
page read and write
2DB9000
trusted library allocation
page read and write
989000
heap
page read and write
115E000
stack
page read and write
49A8000
unkown
page read and write
1240000
unkown
page read and write
1270000
unkown
page read and write
106B0000
unkown
page read and write
3220000
unkown
page read and write
9700000
unkown
page read and write
BFB8000
stack
page read and write
400000
unkown
page readonly
9200000
unkown
page read and write
2E85000
trusted library allocation
page read and write
2E54000
trusted library allocation
page read and write
7FF5D778A000
unkown
page readonly
3220000
unkown
page read and write
30D0000
unkown
page read and write
9700000
unkown
page read and write
2A30000
heap
page read and write
890000
heap
page read and write
2E4D000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
974000
heap
page read and write
1150000
unkown
page read and write
9200000
stack
page read and write
2EA0000
unkown
page read and write
7FF5D77F7000
unkown
page readonly
3220000
unkown
page read and write
2E50000
trusted library allocation
page read and write
53E1000
unkown
page read and write
7FF5D69BB000
unkown
page readonly
847000
heap
page read and write
2EA0000
unkown
page read and write
A02E000
stack
page read and write
3220000
unkown
page read and write
49B000
unkown
page readonly
97A000
heap
page read and write
1240000
unkown
page read and write
982000
heap
page read and write
972000
heap
page read and write
814000
heap
page read and write
8A70000
unkown
page read and write
7FF5D7385000
unkown
page readonly
3220000
unkown
page read and write
9700000
unkown
page read and write
890000
heap
page read and write
3220000
unkown
page read and write
7FF5D7309000
unkown
page readonly
30D0000
unkown
page read and write
3220000
unkown
page read and write
7DC000
heap
page read and write
86E000
stack
page read and write
88F000
heap
page read and write
2DC7000
trusted library allocation
page read and write
35CD000
unkown
page read and write
7DE000
heap
page read and write
8A46000
unkown
page read and write
11E0000
unkown
page read and write
77DB000
unkown
page read and write
7FF5D71EF000
unkown
page readonly
2E50000
direct allocation
page read and write
3220000
unkown
page read and write
12B0000
unkown
page read and write
1E4000
heap
page read and write
2E55000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
9C000
stack
page read and write
3220000
unkown
page read and write
1BFB9000
heap
page read and write
8A0000
heap
page read and write
C7C6000
unkown
page read and write
9200000
unkown
page read and write
10E0000
unkown
page read and write
66B000
heap
page read and write
96F000
heap
page read and write
7D0000
heap
page read and write
10E3A000
unkown
page read and write
7DF4F24A1000
unkown
page execute read
873000
heap
page read and write
2E83000
trusted library allocation
page read and write
7C70000
unkown
page readonly
7989000
stack
page read and write
3220000
unkown
page read and write
30D0000
unkown
page read and write
2E7E000
trusted library allocation
page read and write
84F000
heap
page read and write
3220000
unkown
page read and write
2EA0000
unkown
page read and write
E10000
unkown
page readonly
30D0000
unkown
page read and write
2EA0000
unkown
page read and write
30D0000
unkown
page read and write
2EA0000
unkown
page read and write
3370000
unkown
page read and write
7FB000
heap
page read and write
7FF5D75CB000
unkown
page readonly
8948000
unkown
page read and write
4A71000
unkown
page read and write
2360000
heap
page read and write
2E47000
trusted library allocation
page read and write
1DD22000
heap
page read and write
C617000
unkown
page read and write
873000
heap
page read and write
7FF5D75F9000
unkown
page readonly
F580000
heap
page read and write
892000
heap
page read and write
3220000
unkown
page read and write
83C000
heap
page read and write
97C000
heap
page read and write
2EEC000
trusted library allocation
page read and write
977000
heap
page read and write
10E3A000
unkown
page read and write
362D000
unkown
page read and write
7FD000
heap
page read and write
7FF5D7705000
unkown
page readonly
11E0000
unkown
page read and write
410000
unkown
page readonly
7FF5D706E000
unkown
page readonly
2DD9000
trusted library allocation
page read and write
2DE8000
trusted library allocation
page read and write
1C7000
heap
page read and write
2DFE000
trusted library allocation
page read and write
97B0000
unkown
page read and write
B85A000
stack
page read and write
7E3000
heap
page read and write
2EA0000
unkown
page read and write
3220000
unkown
page read and write
9EB0000
unkown
page readonly
3140000
unkown
page read and write
8EA000
heap
page read and write
30E0000
unkown
page read and write
84D000
heap
page read and write
1150000
unkown
page read and write
3220000
unkown
page read and write
7FF5D717C000
unkown
page readonly
1390000
heap
page read and write
898000
heap
page read and write
7FF5D7488000
unkown
page readonly
2EA0000
unkown
page read and write
87B000
heap
page read and write
1150000
unkown
page read and write
872000
heap
page read and write
3220000
unkown
page read and write
EB5000
stack
page read and write
872000
heap
page read and write
3220000
unkown
page read and write
2E4D000
trusted library allocation
page read and write
9A94000
unkown
page read and write
1340000
unkown
page read and write
843F000
stack
page read and write
2EA0000
unkown
page read and write
779E000
unkown
page read and write
30D0000
unkown
page read and write
3220000
unkown
page read and write
98E000
heap
page read and write
2E4D000
trusted library allocation
page read and write
1395000
heap
page read and write
C1CC000
stack
page read and write
236D000
stack
page read and write
2E47000
trusted library allocation
page read and write
A33F000
unkown
page read and write
3220000
unkown
page read and write
2EB1000
trusted library allocation
page read and write
7FF5D7593000
unkown
page readonly
8890000
unkown
page readonly
4A10000
heap
page read and write
42D000
unkown
page read and write
9700000
unkown
page read and write
3160000
unkown
page read and write
FF0000
unkown
page readonly
3341000
unkown
page read and write
2E30000
trusted library allocation
page read and write
192000
stack
page read and write
89A000
heap
page read and write
7D2000
heap
page read and write
2D3E000
heap
page read and write
2E85000
trusted library allocation
page read and write
1150000
unkown
page read and write
8A8000
heap
page read and write
98E000
heap
page read and write
9820000
unkown
page read and write
2470000
direct allocation
page execute and read and write
97B0000
unkown
page read and write
7FF5D723F000
unkown
page readonly
82E000
heap
page read and write
96FE000
stack
page read and write
886000
heap
page read and write
10E3A000
unkown
page read and write
881F000
stack
page read and write
8D50000
unkown
page read and write
2EB0000
trusted library allocation
page read and write
833000
heap
page read and write
98E000
heap
page read and write
3220000
unkown
page read and write
98E000
heap
page read and write
1B660000
heap
page read and write
963000
heap
page read and write
7D9000
heap
page read and write
7CC000
heap
page read and write
8D50000
unkown
page read and write
1150000
unkown
page read and write
30F0000
unkown
page read and write
1140000
unkown
page read and write
2E85000
trusted library allocation
page read and write
972000
heap
page read and write
7F1000
heap
page read and write
3080000
unkown
page read and write
1150000
unkown
page read and write
49C2000
unkown
page read and write
865000
heap
page read and write
7FF5D7073000
unkown
page readonly
2DF3000
trusted library allocation
page read and write
C8DD000
unkown
page read and write
2DD6000
trusted library allocation
page read and write
2E76000
trusted library allocation
page read and write
8D50000
unkown
page read and write
9AA8000
unkown
page read and write
7FF5D66E3000
unkown
page readonly
9780000
unkown
page read and write
2EA0000
unkown
page read and write
3220000
unkown
page read and write
3220000
unkown
page read and write
986000
heap
page read and write
1150000
unkown
page read and write
2E82000
trusted library allocation
page read and write
2E4B000
trusted library allocation
page read and write
3220000
unkown
page read and write
9AB2000
unkown
page read and write
8E4E000
stack
page read and write
986000
heap
page read and write
10E0000
unkown
page read and write
2E90000
heap
page read and write
9700000
unkown
page read and write
8D50000
unkown
page read and write
7FD000
heap
page read and write
7F8000
heap
page read and write
9700000
unkown
page read and write
2E2E000
trusted library allocation
page read and write
7FF5D71DA000
unkown
page readonly
89E000
heap
page read and write
834000
heap
page read and write
2EDD000
trusted library allocation
page read and write
A313000
unkown
page read and write
3220000
unkown
page read and write
87E000
heap
page read and write
9AB4000
unkown
page read and write
9820000
unkown
page read and write
7CB000
heap
page read and write
891000
heap
page read and write
C609000
unkown
page read and write
F582000
heap
page read and write
83E000
heap
page read and write
2E79000
trusted library allocation
page read and write
83C000
heap
page read and write
99C0000
unkown
page read and write
7FF5D7458000
unkown
page readonly
8D50000
unkown
page read and write
7E9000
heap
page read and write
809000
heap
page read and write
2EA0000
unkown
page read and write
3220000
unkown
page read and write
30E0000
unkown
page read and write
3220000
unkown
page read and write
867000
heap
page read and write
87A0000
stack
page read and write
2EA0000
unkown
page read and write
3220000
unkown
page read and write
2CEE000
stack
page read and write
913000
heap
page read and write
97C000
heap
page read and write
2DDD000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
875000
heap
page read and write
3220000
unkown
page read and write
2DB3000
trusted library allocation
page read and write
982000
heap
page read and write
10E0000
unkown
page read and write
97C000
heap
page read and write
840000
heap
page read and write
492000
unkown
page write copy
7FF5D75D6000
unkown
page readonly
672000
heap
page read and write
980000
heap
page read and write
7FF5D75DF000
unkown
page readonly
1240000
unkown
page read and write
974000
heap
page read and write
3220000
unkown
page read and write
422000
remote allocation
page execute and read and write
861000
heap
page read and write
1150000
unkown
page read and write
10E0000
unkown
page read and write
7FF5D7396000
unkown
page readonly
3220000
unkown
page read and write
198000
stack
page read and write
3370000
unkown
page read and write
9B41000
unkown
page read and write
2EA0000
unkown
page read and write
7FF5D7230000
unkown
page readonly
7F1000
heap
page read and write
97A000
heap
page read and write
3220000
unkown
page read and write
7DC000
heap
page read and write
30D0000
unkown
page read and write
82E000
heap
page read and write
1383000
heap
page read and write
AA04000
unkown
page read and write
2E30C000
stack
page read and write
7FF000
heap
page read and write
9700000
unkown
page read and write
35E4000
unkown
page read and write
2EBA000
trusted library allocation
page read and write
10E0000
unkown
page read and write
8D50000
unkown
page read and write
9820000
unkown
page read and write
982000
heap
page read and write
49BB000
unkown
page read and write
9700000
unkown
page read and write
3220000
unkown
page read and write
7FF5D72CE000
unkown
page readonly
9700000
unkown
page read and write
2D3A000
heap
page read and write
1150000
unkown
page read and write
9C000
stack
page read and write
3220000
unkown
page read and write
3220000
unkown
page read and write
2EA0000
unkown
page read and write
1240000
unkown
page read and write
3220000
unkown
page read and write
977000
heap
page read and write
889000
heap
page read and write
30D0000
unkown
page read and write
1150000
unkown
page read and write
7FF5D762F000
unkown
page readonly
1350000
unkown
page readonly
2E4A000
trusted library allocation
page read and write
7D3000
heap
page read and write
974000
heap
page read and write
842000
heap
page read and write
3220000
unkown
page read and write
982000
heap
page read and write
9700000
unkown
page read and write
7FF5D7262000
unkown
page readonly
1150000
unkown
page read and write
3220000
unkown
page read and write
2DF0000
trusted library allocation
page read and write
861000
heap
page read and write
7FF5D723C000
unkown
page readonly
9ABD000
unkown
page read and write
2EDA000
trusted library allocation
page read and write
C96F000
unkown
page read and write
7FF5D77E3000
unkown
page readonly
30E0000
unkown
page read and write
35FA000
unkown
page read and write
2DB8000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
873000
heap
page read and write
7FF5D72D7000
unkown
page readonly
3220000
unkown
page read and write
2DC7000
trusted library allocation
page read and write
8A7000
heap
page read and write
697000
heap
page read and write
977000
heap
page read and write
2EA0000
unkown
page read and write
965000
heap
page read and write
C5F4000
unkown
page read and write
43C000
remote allocation
page execute and read and write
AE1D000
stack
page read and write
3220000
unkown
page read and write
3220000
unkown
page read and write
3070000
unkown
page read and write
9820000
unkown
page read and write
E7CC000
stack
page read and write
2DE9000
trusted library allocation
page read and write
FD8F000
stack
page read and write
1240000
unkown
page read and write
96F000
heap
page read and write
9820000
unkown
page read and write
C44F000
stack
page read and write
83C000
heap
page read and write
2EBF000
trusted library allocation
page read and write
4980000
unkown
page read and write
97C000
heap
page read and write
1150000
unkown
page read and write
7FF5D7648000
unkown
page readonly
9700000
unkown
page read and write
7FF5D72C8000
unkown
page readonly
7FF5D7429000
unkown
page readonly
8D50000
unkown
page read and write
7FF5D776F000
unkown
page readonly
2E81000
trusted library allocation
page read and write
10E0000
unkown
page read and write
7FF5D76F5000
unkown
page readonly
9820000
unkown
page read and write
4AB0000
unkown
page read and write
77A2000
unkown
page read and write
3220000
unkown
page read and write
10572000
unkown
page read and write
2ED4000
trusted library allocation
page read and write
30D0000
unkown
page read and write
1150000
unkown
page read and write
7FF5D71E6000
unkown
page readonly
E74D000
stack
page read and write
10E0000
unkown
page read and write
9780000
unkown
page read and write
3220000
unkown
page read and write
97C000
heap
page read and write
2E76000
trusted library allocation
page read and write
3220000
unkown
page read and write
979000
heap
page read and write
2E55000
trusted library allocation
page read and write
3220000
unkown
page read and write
3220000
unkown
page read and write
49FA000
unkown
page read and write
986000
heap
page read and write
30F0000
unkown
page read and write
982000
heap
page read and write
2D61000
heap
page read and write
8AC000
heap
page read and write
3220000
unkown
page read and write
18FEF000
stack
page read and write
9A8C000
unkown
page read and write
7FF5D75B3000
unkown
page readonly
410000
unkown
page readonly
3220000
unkown
page read and write
7FF5D716B000
unkown
page readonly
2EA0000
unkown
page read and write
9820000
unkown
page read and write
2E65000
trusted library allocation
page read and write
7FF5D77EB000
unkown
page readonly
33C0000
unkown
page read and write
10E3A000
unkown
page read and write
977000
heap
page read and write
5010000
heap
page read and write
AFBE000
stack
page read and write
30D0000
unkown
page read and write
8ECB000
stack
page read and write
4AC0000
unkown
page read and write
3220000
unkown
page read and write
610000
heap
page read and write
3220000
unkown
page read and write
3400000
unkown
page read and write
3220000
unkown
page read and write
7FF5D77C7000
unkown
page readonly
495000
unkown
page read and write
96F000
heap
page read and write
30FB000
stack
page read and write
3220000
unkown
page read and write
86E000
heap
page read and write
9820000
unkown
page read and write
6F880000
unkown
page readonly
2EB1000
trusted library allocation
page read and write
97B0000
unkown
page read and write
3220000
unkown
page read and write
3220000
unkown
page read and write
11E0000
unkown
page read and write
7FF5D7700000
unkown
page readonly
A2A2000
unkown
page read and write
26EF000
stack
page read and write
10E0000
unkown
page read and write
35BD000
unkown
page read and write
3070000
unkown
page read and write
35F4000
unkown
page read and write
25AF000
stack
page read and write
7DF4F2481000
unkown
page execute read
861000
heap
page read and write
2E83000
trusted library allocation
page read and write
86D0000
unkown
page readonly
97A000
heap
page read and write
35B0000
unkown
page read and write
7E3000
heap
page read and write
12D0000
unkown
page readonly
3220000
unkown
page read and write
3220000
unkown
page read and write
7D0000
heap
page read and write
10589000
unkown
page read and write
9200000
unkown
page read and write
2EA0000
unkown
page read and write
9820000
unkown
page read and write
1140000
unkown
page read and write
2DC7000
trusted library allocation
page read and write
7FF5D7482000
unkown
page readonly
2E18000
trusted library allocation
page read and write
1C034000
heap
page read and write
7E9000
heap
page read and write
7DF4F2491000
unkown
page execute read
3220000
unkown
page read and write
979000
heap
page read and write
7FF5D77DD000
unkown
page readonly
2C8C000
unkown
page readonly
9700000
unkown
page read and write
9700000
unkown
page read and write
3220000
unkown
page read and write
89A000
heap
page read and write
2EA0000
unkown
page read and write
2EB5000
trusted library allocation
page read and write
9700000
stack
page read and write
19004000
heap
page read and write
9700000
unkown
page read and write
841000
heap
page read and write
7FD000
heap
page read and write
2DD1000
trusted library allocation
page read and write
847000
heap
page read and write
7FF5D7691000
unkown
page readonly
980000
heap
page read and write
7FF5D7797000
unkown
page readonly
3220000
unkown
page read and write
1C5000
heap
page read and write
974000
heap
page read and write
7E1000
heap
page read and write
BDC0000
unkown
page read and write
7FF5D7215000
unkown
page readonly
9820000
unkown
page read and write
3220000
unkown
page read and write
972000
heap
page read and write
3220000
unkown
page read and write
9200000
unkown
page read and write
BE49000
stack
page read and write
C4C6000
unkown
page read and write
9A96000
unkown
page read and write
2EA0000
unkown
page read and write
9200000
unkown
page read and write
9820000
unkown
page read and write
977000
heap
page read and write
26B3000
heap
page read and write
3220000
unkown
page read and write
9820000
unkown
page read and write
107B1000
unkown
page read and write
7FF5D77E0000
unkown
page readonly
11E0000
unkown
page read and write
3220000
unkown
page read and write
890000
heap
page read and write
C625000
unkown
page read and write
3220000
unkown
page read and write
3370000
unkown
page read and write
2DEA000
trusted library allocation
page read and write
761E000
unkown
page read and write
8ED000
heap
page read and write
8A7000
heap
page read and write
2EA0000
unkown
page read and write
987000
heap
page read and write
10E0000
unkown
page read and write
2C89000
unkown
page read and write
862000
heap
page read and write
87C000
heap
page read and write
1B778000
direct allocation
page execute read
3220000
unkown
page read and write
9200000
unkown
page read and write
35B5000
unkown
page read and write
834000
heap
page read and write
9700000
unkown
page read and write
2E47000
trusted library allocation
page read and write
3080000
unkown
page read and write
105FB000
unkown
page read and write
1B97F000
direct allocation
page readonly
3220000
unkown
page read and write
30D0000
unkown
page read and write
972000
heap
page read and write
97000
stack
page read and write
3220000
unkown
page read and write
7FF5D729E000
unkown
page readonly
7FF5D7694000
unkown
page readonly
7EB000
heap
page read and write
7FF5D781A000
unkown
page readonly
48C000
unkown
page read and write
7FF5D7760000
unkown
page readonly
869000
heap
page read and write
1150000
unkown
page read and write
973000
heap
page read and write
1B771000
direct allocation
page execute read
10E0000
unkown
page read and write
30D0000
unkown
page read and write
768E000
unkown
page read and write
1140000
unkown
page read and write
1914C000
stack
page read and write
50EE000
stack
page read and write
8931000
unkown
page read and write
2D80000
heap
page read and write
C8CB000
unkown
page read and write
1150000
unkown
page read and write
7FF5D7639000
unkown
page readonly
2EA0000
unkown
page read and write
2E85000
trusted library allocation
page read and write
C9F9000
unkown
page read and write
3220000
unkown
page read and write
3110000
unkown
page readonly
2C89000
unkown
page read and write
2E0E000
stack
page read and write
3626000
unkown
page read and write
2EA0000
unkown
page read and write
2E76000
trusted library allocation
page read and write
8E3000
heap
page read and write
7C31000
unkown
page read and write
9700000
unkown
page read and write
7FF5D774A000
unkown
page readonly
9700000
unkown
page read and write
10E0000
unkown
page read and write
942C000
stack
page read and write
2EA0000
unkown
page read and write
1150000
unkown
page read and write
2EA0000
unkown
page read and write
809000
heap
page read and write
986000
heap
page read and write
7FF5D7280000
unkown
page readonly
30D0000
unkown
page read and write
A9FD000
unkown
page read and write
3220000
unkown
page read and write
A3AC000
unkown
page read and write
97FF000
stack
page read and write
3220000
unkown
page read and write
982000
heap
page read and write
3220000
unkown
page read and write
9200000
unkown
page read and write
2EAB000
heap
page execute and read and write
2DC0000
trusted library allocation
page read and write
9AAC000
unkown
page read and write
C621000
unkown
page read and write
3220000
unkown
page read and write
25F5F000
stack
page read and write
30D0000
unkown
page read and write
7AB0000
unkown
page read and write
9700000
unkown
page read and write
7FF5D719C000
unkown
page readonly
6CDFF000
unkown
page write copy
C78A000
unkown
page read and write
79F000
stack
page read and write
980000
heap
page read and write
2E77000
trusted library allocation
page read and write
982000
heap
page read and write
9200000
unkown
page read and write
9700000
unkown
page read and write
7FF5D71C4000
unkown
page readonly
AA01000
unkown
page read and write
873000
heap
page read and write
977000
heap
page read and write
97C000
heap
page read and write
2E55000
trusted library allocation
page read and write
30D0000
unkown
page read and write
7A0000
direct allocation
page read and write
3220000
unkown
page read and write
1BA7D000
heap
page read and write
2C8C000
unkown
page readonly
980000
heap
page read and write
C4BD000
unkown
page read and write
815000
heap
page read and write
9820000
unkown
page read and write
10E33000
unkown
page read and write
10E3A000
unkown
page read and write
9700000
unkown
page read and write
9200000
unkown
page read and write
25EE000
stack
page read and write
33B0000
unkown
page readonly
6CC21000
unkown
page execute read
3220000
unkown
page read and write
35B3000
unkown
page read and write
980000
heap
page read and write
9200000
unkown
page read and write
30F0000
unkown
page read and write
3220000
unkown
page read and write
3220000
unkown
page read and write
C5FD000
unkown
page read and write
98E000
heap
page read and write
7B80000
unkown
page readonly
3220000
unkown
page read and write
2DB3000
trusted library allocation
page read and write
3220000
unkown
page read and write
3080000
unkown
page read and write
7FF5D77F0000
unkown
page readonly
7FF5D71E0000
unkown
page readonly
8B4000
heap
page read and write
88C000
heap
page read and write
A3AA000
unkown
page read and write
7FF5D71F9000
unkown
page readonly
7E3000
heap
page read and write
98E000
heap
page read and write
9820000
unkown
page read and write
7FF5D748A000
unkown
page readonly
C24E000
stack
page read and write
5BE000
stack
page read and write
4B4000
unkown
page readonly
9AE000
stack
page read and write
13A0000
unkown
page readonly
9820000
unkown
page read and write
1C26C000
stack
page read and write
3C63000
trusted library allocation
page read and write
2E54000
trusted library allocation
page read and write
8870000
unkown
page readonly
30D0000
unkown
page read and write
30E0000
unkown
page read and write
2EBB000
trusted library allocation
page read and write
836000
heap
page read and write
87A000
heap
page read and write
890000
heap
page read and write
4BD1000
heap
page read and write
1140000
unkown
page read and write
7F6000
heap
page read and write
30F0000
unkown
page read and write
2EA0000
unkown
page read and write
817000
heap
page read and write
3220000
unkown
page read and write
7E0000
heap
page read and write
9820000
unkown
page read and write
9700000
unkown
page read and write
1240000
unkown
page read and write
C5FA000
unkown
page read and write
9A90000
unkown
page read and write
2E40000
unclassified section
page read and write
964000
heap
page read and write
9AF9000
unkown
page read and write
3F80000
heap
page read and write
830000
heap
page read and write
7FF5D738E000
unkown
page readonly
30D0000
unkown
page read and write
2E4A000
trusted library allocation
page read and write
979000
heap
page read and write
865000
heap
page read and write
809000
heap
page read and write
4FFF000
stack
page read and write
A8F000
stack
page read and write
A28D000
unkown
page read and write
2E45000
trusted library allocation
page read and write
418000
unkown
page write copy
A39C000
unkown
page read and write
19000000
heap
page read and write
9820000
unkown
page read and write
3220000
unkown
page read and write
2DD6000
trusted library allocation
page read and write
890000
heap
page read and write
16B70000
remote allocation
page read and write
30D0000
unkown
page read and write
E4CC000
stack
page read and write
7E7000
heap
page read and write
1C7000
heap
page read and write
2EA0000
unkown
page read and write
1150000
unkown
page read and write
9A8E000
unkown
page read and write
2EB8000
trusted library allocation
page read and write
7D6000
heap
page read and write
974000
heap
page read and write
7D9000
heap
page read and write
1C549000
heap
page read and write
4BD0000
heap
page read and write
1150000
unkown
page read and write
7FF5D73F5000
unkown
page readonly
553000
remote allocation
page execute and read and write
815000
heap
page read and write
30D0000
unkown
page read and write
974000
heap
page read and write
1F0000
heap
page read and write
10E0000
unkown
page read and write
2E09000
trusted library allocation
page read and write
986000
heap
page read and write
7654000
unkown
page read and write
262E000
stack
page read and write
1360000
unkown
page readonly
3220000
unkown
page read and write
809000
heap
page read and write
C0BA000
stack
page read and write
4160000
direct allocation
page execute and read and write
2E09000
trusted library allocation
page read and write
7F1000
heap
page read and write
2DE8000
trusted library allocation
page read and write
30D0000
unkown
page read and write
30F0000
unkown
page read and write
2EA0000
unkown
page read and write
30E0000
unkown
page read and write
35DC000
unkown
page read and write
BEA0000
unkown
page readonly
84D000
heap
page read and write
816000
heap
page read and write
C483000
unkown
page read and write
9820000
unkown
page read and write
1150000
unkown
page read and write
10E0000
unkown
page read and write
2DBC000
trusted library allocation
page read and write
7FD000
heap
page read and write
19071000
heap
page read and write
30F0000
unkown
page read and write
7FF5D7394000
unkown
page readonly
3220000
unkown
page read and write
3220000
unkown
page read and write
C908000
unkown
page read and write
875000
heap
page read and write
907000
heap
page read and write
10E0000
unkown
page read and write
401000
unkown
page execute read
3220000
unkown
page read and write
7E60000
unkown
page read and write
10E0000
unkown
page read and write
2DC9000
trusted library allocation
page read and write
A391000
unkown
page read and write
2E4B000
trusted library allocation
page read and write
7693000
unkown
page read and write
30E0000
unkown
page read and write
7FF5D76C8000
unkown
page readonly
1468D000
stack
page read and write
8E9000
heap
page read and write
7FF5D7485000
unkown
page readonly
10E0000
unkown
page read and write
2DE7000
trusted library allocation
page read and write
10802000
unkown
page read and write
8D50000
unkown
page read and write
30D0000
unkown
page read and write
8D50000
unkown
page read and write
7B0000
remote allocation
page read and write
1150000
unkown
page read and write
3230000
unkown
page read and write
887000
heap
page read and write
8A0000
heap
page read and write
B0BD000
stack
page read and write
7FF5D72FB000
unkown
page readonly
7C4000
heap
page read and write
1240000
unkown
page read and write
9820000
unkown
page read and write
9780000
unkown
page read and write
97C000
heap
page read and write
5463000
unkown
page read and write
11E0000
unkown
page read and write
7FF5D7752000
unkown
page readonly
30D0000
unkown
page read and write
3320000
unkown
page read and write
8A8000
heap
page read and write
7FF5D7075000
unkown
page readonly
7D5000
heap
page read and write
834000
heap
page read and write
C46F000
unkown
page read and write
9200000
unkown
page read and write
2EA0000
unkown
page read and write
730000
heap
page read and write
7E9000
heap
page read and write
E5CE000
stack
page read and write
7FB000
heap
page read and write
C62D000
unkown
page read and write
2DC1000
trusted library allocation
page read and write
7FF5D720F000
unkown
page readonly
7CC000
heap
page read and write
2DC3000
trusted library allocation
page read and write
2FFE000
trusted library allocation
page read and write
BE70000
unkown
page readonly
2EA0000
unkown
page read and write
816000
heap
page read and write
8A00000
unkown
page read and write
980000
heap
page read and write
1150000
unkown
page read and write
3220000
unkown
page read and write
7FF5D7202000
unkown
page readonly
30D0000
unkown
page read and write
9820000
unkown
page read and write
2EA0000
unkown
page read and write
7C90000
unkown
page read and write
851000
heap
page read and write
3220000
unkown
page read and write
B4BF000
stack
page read and write
977000
heap
page read and write
1240000
unkown
page read and write
97B0000
unkown
page read and write
3080000
unkown
page read and write
7C2000
heap
page read and write
3220000
unkown
page read and write
4AC000
unkown
page write copy
893D000
unkown
page read and write
8AE000
heap
page read and write
84F000
heap
page read and write
3220000
unkown
page read and write
1140000
unkown
page read and write
2E90000
heap
page read and write
1240000
unkown
page read and write
8F2000
heap
page read and write
87E000
heap
page read and write
A40E000
unkown
page read and write
2DDC000
trusted library allocation
page read and write
7FF5D7438000
unkown
page readonly
1B9BD000
direct allocation
page readonly
35C9000
unkown
page read and write
1150000
unkown
page read and write
865000
heap
page read and write
7FF5D77E9000
unkown
page readonly
7FF5D7792000
unkown
page readonly
7FF5D75F2000
unkown
page readonly
82F000
heap
page read and write
10E32000
unkown
page read and write
8D9000
heap
page read and write
10E3A000
unkown
page read and write
7FF5D7682000
unkown
page readonly
7FF5D77FD000
unkown
page readonly
10E0000
unkown
page read and write
982000
heap
page read and write
7D2000
heap
page read and write
2CA0000
heap
page read and write
98E000
heap
page read and write
96F000
heap
page read and write
83C000
heap
page read and write
3290000
unkown
page read and write
979000
heap
page read and write
3220000
unkown
page read and write
49E0000
heap
page read and write
B0E0000
unkown
page readonly
1B770000
direct allocation
page execute and read and write
7E0000
heap
page read and write
1150000
unkown
page read and write
7F1000
heap
page read and write
7FF5D747F000
unkown
page readonly
858000
heap
page read and write
96F000
stack
page read and write
9579000
stack
page read and write
1150000
unkown
page read and write
9AAA000
unkown
page read and write
7FF5D77CD000
unkown
page readonly
89A000
heap
page read and write
75E0000
unkown
page read and write
1224E000
stack
page read and write
7E7000
heap
page read and write
96F000
heap
page read and write
1140000
unkown
page read and write
83C000
heap
page read and write
889000
heap
page read and write
2E45000
trusted library allocation
page read and write
8940000
unkown
page read and write
24D0000
heap
page read and write
2250000
direct allocation
page read and write
7FF5D7077000
unkown
page readonly
7FF5D74C3000
unkown
page readonly
A408000
unkown
page read and write
232D000
stack
page read and write
7FF5D752F000
unkown
page readonly
863000
heap
page read and write
1150000
unkown
page read and write
95FB000
stack
page read and write
2E54000
trusted library allocation
page read and write
9B0B000
unkown
page read and write
1B58A000
stack
page read and write
3220000
unkown
page read and write
30D0000
unkown
page read and write
7FF5D6ABD000
unkown
page readonly
3370000
unkown
page read and write
7FF5D720A000
unkown
page readonly
982000
heap
page read and write
1140000
unkown
page read and write
7D6000
heap
page read and write
986000
heap
page read and write
1140000
unkown
page read and write
4986000
unkown
page read and write
2DC7000
trusted library allocation
page read and write
AA4D000
unkown
page read and write
5125000
heap
page read and write
5070000
heap
page read and write
EF8000
heap
page read and write
30D0000
unkown
page read and write
869000
heap
page read and write
96F000
heap
page read and write
30EE000
stack
page read and write
24D7000
heap
page read and write
3220000
unkown
page read and write
3120000
unkown
page read and write
2EA0000
unkown
page read and write
2E54000
trusted library allocation
page read and write
9A80000
unkown
page read and write
84E000
heap
page read and write
3220000
unkown
page read and write
A3B9000
unkown
page read and write
30F0000
unkown
page read and write
8D50000
unkown
page read and write
3220000
unkown
page read and write
977000
heap
page read and write
2EA0000
unkown
page read and write
1240000
unkown
page read and write
861000
heap
page read and write
837000
heap
page read and write
7FF5D6AB6000
unkown
page readonly
C663000
unkown
page read and write
1150000
unkown
page read and write
3220000
unkown
page read and write
1BB29000
heap
page read and write
3220000
unkown
page read and write
9820000
unkown
page read and write
30E0000
unkown
page read and write
984000
heap
page read and write
1140000
unkown
page read and write
AA96000
unkown
page read and write
7FF5D7272000
unkown
page readonly
30D0000
unkown
page read and write
16BAE000
stack
page read and write
3230000
unkown
page read and write
3220000
unkown
page read and write
E8CD000
stack
page read and write
2DB0000
trusted library allocation
page read and write
82F000
heap
page read and write
9700000
unkown
page read and write
9E2E000
stack
page read and write
9820000
unkown
page read and write
7FF5D7289000
unkown
page readonly
7FF5D7462000
unkown
page readonly
C9A7000
unkown
page read and write
E94D000
stack
page read and write
98E000
heap
page read and write
8F2000
heap
page read and write
986000
heap
page read and write
7FF5D751F000
unkown
page readonly
7DC000
heap
page read and write
30D0000
unkown
page read and write
2DC1000
trusted library allocation
page read and write
760D000
unkown
page read and write
2460000
heap
page read and write
2EC0000
heap
page read and write
83C000
heap
page read and write
7FF5D74B8000
unkown
page readonly
690000
heap
page read and write
401000
unkown
page execute read
9780000
unkown
page read and write
98E000
heap
page read and write
2E83000
trusted library allocation
page read and write
7CC000
heap
page read and write
1BFC7000
heap
page read and write
7FF5D745B000
unkown
page readonly
838000
heap
page read and write
1150000
unkown
page read and write
2EC5000
heap
page read and write
1150000
unkown
page read and write
83C000
heap
page read and write
3220000
unkown
page read and write
2630000
heap
page read and write
1140000
unkown
page read and write
7FF5D728E000
unkown
page readonly
2E55000
trusted library allocation
page read and write
C5F8000
unkown
page read and write
9820000
unkown
page read and write
2DB3000
trusted library allocation
page read and write
8D50000
unkown
page read and write
C61D000
unkown
page read and write
31EF000
stack
page read and write
C035000
stack
page read and write
7E3000
heap
page read and write
3220000
unkown
page read and write
3220000
unkown
page read and write
1140000
unkown
page read and write
9820000
unkown
page read and write
F13000
heap
page read and write
9AA0000
unkown
page read and write
833000
heap
page read and write
7F1000
heap
page read and write
96F000
heap
page read and write
2E83000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
9200000
unkown
page read and write
7DD0000
heap
page read and write
8D50000
unkown
page read and write
8D50000
unkown
page read and write
7D6000
heap
page read and write
3070000
unkown
page read and write
890000
heap
page read and write
896000
heap
page read and write
2E51000
trusted library allocation
page read and write
976000
heap
page read and write
30E0000
unkown
page read and write
986000
heap
page read and write
1140000
unkown
page read and write
AAA9000
unkown
page read and write
3220000
unkown
page read and write
7B0000
remote allocation
page read and write
2EA0000
unkown
page read and write
277F000
stack
page read and write
7FF5D6BDB000
unkown
page readonly
3290000
unkown
page read and write
9780000
unkown
page read and write
7FF5D77DA000
unkown
page readonly
438000
remote allocation
page execute and read and write
B330000
unkown
page read and write
1140000
unkown
page read and write
1150000
unkown
page read and write
401000
unkown
page execute read
982000
heap
page read and write
3220000
unkown
page read and write
C8C1000
unkown
page read and write
7FF5D72BD000
unkown
page readonly
2DE8000
trusted library allocation
page read and write
30D0000
unkown
page read and write
3220000
unkown
page read and write
9820000
unkown
page read and write
961000
heap
page read and write
86E000
heap
page read and write
A233000
unkown
page read and write
980000
heap
page read and write
2DBA000
trusted library allocation
page read and write
418000
unkown
page write copy
3220000
unkown
page read and write
9820000
unkown
page read and write
52E000
remote allocation
page execute and read and write
1DDC9000
heap
page read and write
7FF5D7546000
unkown
page readonly
1240000
unkown
page read and write
AAF000
stack
page read and write
7FF5D7643000
unkown
page readonly
7FF5D7589000
unkown
page readonly
7FF5D760B000
unkown
page readonly
2E47000
trusted library allocation
page read and write
3220000
unkown
page read and write
872000
heap
page read and write
18E000
stack
page read and write
2DE8000
trusted library allocation
page read and write
1140000
unkown
page read and write
7FF5D7837000
unkown
page readonly
9FAF000
stack
page read and write
97C000
heap
page read and write
7FF5D75F6000
unkown
page readonly
30D0000
unkown
page read and write
3220000
unkown
page read and write
1C047000
heap
page read and write
7FF5D7398000
unkown
page readonly
10E0000
unkown
page read and write
26B0000
heap
page read and write
10E0000
unkown
page read and write
A9A0000
unkown
page read and write
1240000
unkown
page read and write
1140000
unkown
page read and write
97C000
heap
page read and write
2DC7000
trusted library allocation
page read and write
9820000
unkown
page read and write
10E3A000
unkown
page read and write
7FF5D75D9000
unkown
page readonly
831000
heap
page read and write
989000
heap
page read and write
7DF4F2461000
unkown
page execute read
7E0000
heap
page read and write
1240000
unkown
page read and write
190000
stack
page read and write
1B9B2000
direct allocation
page read and write
3220000
unkown
page read and write
418000
unkown
page write copy
2EA0000
unkown
page read and write
980000
heap
page read and write
8CB8000
stack
page read and write
2EB8000
trusted library allocation
page read and write
2DBA000
trusted library allocation
page read and write
2DBB000
trusted library allocation
page read and write
3220000
unkown
page read and write
8F2000
heap
page read and write
400000
unkown
page execute and read and write
1250000
unkown
page read and write
10E0000
unkown
page read and write
984000
heap
page read and write
64E000
heap
page read and write
97C000
heap
page read and write
2EA1000
unkown
page read and write
768C000
unkown
page read and write
87B000
heap
page read and write
2DC1000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
7FF5D768B000
unkown
page readonly
2FF9000
stack
page read and write
30D0000
unkown
page read and write
2E85000
trusted library allocation
page read and write
9700000
unkown
page read and write
C7BE000
unkown
page read and write
2B70000
heap
page read and write
A2D7000
unkown
page read and write
3220000
unkown
page read and write
400000
unkown
page execute and read and write
6CDBF000
unkown
page readonly
F0C000
heap
page read and write
7C9000
heap
page read and write
7FF5D6BEF000
unkown
page readonly
2DFE000
trusted library allocation
page read and write
10E0000
unkown
page read and write
2EA0000
unkown
page read and write
7FF5D776D000
unkown
page readonly
30D0000
unkown
page read and write
3220000
unkown
page read and write
3220000
unkown
page read and write
7FF5D75B8000
unkown
page readonly
2E65000
trusted library allocation
page read and write
1240000
unkown
page read and write
2EA0000
unkown
page read and write
1150000
unkown
page read and write
873000
heap
page read and write
2E4D000
trusted library allocation
page read and write
30F0000
unkown
page read and write
2E7C000
trusted library allocation
page read and write
9B2C000
unkown
page read and write
D90F000
stack
page read and write
98E000
heap
page read and write
60B000
remote allocation
page execute and read and write
30F0000
unkown
page read and write
3220000
unkown
page read and write
895F000
unkown
page read and write
1DBBD000
heap
page read and write
7FF000
heap
page read and write
2EA0000
unkown
page read and write
9700000
unkown
page read and write
3024000
trusted library allocation
page read and write
3220000
unkown
page read and write
7F8000
heap
page read and write
2A39000
heap
page read and write
10E0000
unkown
page read and write
10E0000
unkown
page read and write
2DD3000
trusted library allocation
page read and write
874000
heap
page read and write
30D0000
unkown
page read and write
42E000
remote allocation
page execute and read and write
A3B6000
unkown
page read and write
97A000
heap
page read and write
94AB000
stack
page read and write
8A9000
heap
page read and write
4AA0000
unkown
page read and write
1000000
heap
page read and write
878000
heap
page read and write
3220000
unkown
page read and write
1140000
unkown
page read and write
2EA0000
unkown
page read and write
7FF5D775C000
unkown
page readonly
2EE9000
trusted library allocation
page read and write
BB95000
stack
page read and write
8D50000
unkown
page read and write
64A000
heap
page read and write
8FD9000
stack
page read and write
A23A000
unkown
page read and write
42D000
unkown
page read and write
93E000
heap
page read and write
7B10000
unkown
page read and write
8C39000
stack
page read and write
7FF5D7669000
unkown
page readonly
1DD04000
heap
page read and write
986000
heap
page read and write
19079000
heap
page read and write
872000
heap
page read and write
7F1000
heap
page read and write
2DB3000
trusted library allocation
page read and write
1240000
unkown
page read and write
1240000
unkown
page read and write
889000
heap
page read and write
986000
heap
page read and write
97C000
heap
page read and write
1150000
unkown
page read and write
3290000
unkown
page read and write
AA9B000
unkown
page read and write
8D50000
stack
page read and write
8F2000
heap
page read and write
B48F000
stack
page read and write
3220000
unkown
page read and write
7631000
unkown
page read and write
9700000
unkown
page read and write
9A9E000
unkown
page read and write
10E3A000
unkown
page read and write
9820000
unkown
page read and write
2DB3000
trusted library allocation
page read and write
7FF5D770A000
unkown
page readonly
2EA0000
unkown
page read and write
7FF5D7703000
unkown
page readonly
2DD9000
trusted library allocation
page read and write
B950000
unkown
page readonly
48E000
unkown
page readonly
2E18000
trusted library allocation
page read and write
86E000
heap
page read and write
7FF5D71AF000
unkown
page readonly
3220000
unkown
page read and write
2DE3000
trusted library allocation
page read and write
C642000
unkown
page read and write
10E0000
stack
page read and write
2E85000
trusted library allocation
page read and write
2C8C000
unkown
page readonly
987000
heap
page read and write
877000
heap
page read and write
3220000
unkown
page read and write
3220000
unkown
page read and write
2E4D000
trusted library allocation
page read and write
810000
heap
page read and write
10E0000
unkown
page read and write
87F000
heap
page read and write
2F94000
trusted library allocation
page read and write
7FF5D71D7000
unkown
page readonly
FDCE000
stack
page read and write
3290000
unkown
page read and write
7FF5D71BF000
unkown
page readonly
99E000
heap
page read and write
2DDA000
trusted library allocation
page read and write
30D0000
unkown
page read and write
16B0C000
stack
page read and write
1C030000
heap
page read and write
8F49000
stack
page read and write
3220000
unkown
page read and write
8D39000
stack
page read and write
3220000
unkown
page read and write
2E50000
trusted library allocation
page read and write
35D5000
unkown
page read and write
7FF5D76D7000
unkown
page readonly
9820000
unkown
page read and write
A220000
unkown
page read and write
7FF000
heap
page read and write
2DE3000
trusted library allocation
page read and write
7FF5D7407000
unkown
page readonly
412000
unkown
page readonly
7FF000
heap
page read and write
16B70000
remote allocation
page read and write
7FB000
heap
page read and write
10E0000
unkown
page read and write
5479000
unkown
page read and write
C450000
unkown
page read and write
362A000
unkown
page read and write
1057B000
unkown
page read and write
2DB3000
trusted library allocation
page read and write
2DD3000
trusted library allocation
page read and write
9A92000
unkown
page read and write
833000
heap
page read and write
986000
heap
page read and write
BB10000
heap
page read and write
7CB0000
unkown
page readonly
1B670000
heap
page read and write
3220000
unkown
page read and write
7FF5D774C000
unkown
page readonly
835000
heap
page read and write
3074B000
stack
page read and write
3220000
unkown
page read and write
1150000
unkown
page read and write
9700000
unkown
page read and write
987000
heap
page read and write
7FF5D75C1000
unkown
page readonly
B220000
unkown
page read and write
889000
heap
page read and write
1B9BF000
direct allocation
page readonly
30D0000
unkown
page read and write
9AC3000
unkown
page read and write
7FF5D76E8000
unkown
page readonly
8EC000
heap
page read and write
BF3E000
stack
page read and write
97C000
heap
page read and write
7FF5D7764000
unkown
page readonly
2DBA000
trusted library allocation
page read and write
BE90000
unkown
page read and write
8EC000
heap
page read and write
88A000
heap
page read and write
7FF5D77D2000
unkown
page readonly
1240000
unkown
page read and write
7FF5D783B000
unkown
page readonly
1140000
unkown
page read and write
1C0000
heap
page read and write
1240000
unkown
page read and write
7FF5D75EE000
unkown
page readonly
82F000
heap
page read and write
862000
heap
page read and write
7FF5CE343000
unkown
page readonly
3220000
unkown
page read and write
7FF5D7820000
unkown
page readonly
8AA000
heap
page read and write
1150000
unkown
page read and write
10E33000
unkown
page read and write
9820000
unkown
page read and write
2BBE000
stack
page read and write
974000
heap
page read and write
7FF5D710B000
unkown
page readonly
35D1000
unkown
page read and write
9700000
unkown
page read and write
1150000
unkown
page read and write
3220000
unkown
page read and write
572000
remote allocation
page execute and read and write
30D0000
unkown
page read and write
2EA0000
unkown
page read and write
82F000
heap
page read and write
874000
heap
page read and write
7FF5D77A4000
unkown
page readonly
2CA0000
heap
page read and write
4A0E000
unkown
page read and write
1150000
unkown
page read and write
C5EC000
unkown
page read and write
6CDFE000
unkown
page read and write
73A000
heap
page read and write
3220000
unkown
page read and write
1240000
unkown
page read and write
7FF5D7740000
unkown
page readonly
1150000
unkown
page read and write
1C040000
heap
page read and write
2DC7000
trusted library allocation
page read and write
5330000
unkown
page write copy
3220000
unkown
page read and write
10E0000
unkown
page read and write
7E58000
stack
page read and write
2EA0000
unkown
page read and write
7AF1000
unkown
page read and write
7AE0000
unkown
page read and write
A9DF000
unkown
page read and write
2F5C000
trusted library allocation
page read and write
C4DC000
unkown
page read and write
3220000
unkown
page read and write
7FF000
heap
page read and write
9679000
stack
page read and write
25E0000
heap
page read and write
97C000
heap
page read and write
86E0000
unkown
page readonly
7FF5D76AF000
unkown
page readonly
877000
heap
page read and write
9820000
unkown
page read and write
2DAE000
stack
page read and write
974000
heap
page read and write
2EA0000
unkown
page read and write
7DC0000
unkown
page readonly
A286000
unkown
page read and write
3220000
unkown
page read and write
869000
heap
page read and write
9820000
unkown
page read and write
400000
unkown
page execute and read and write
769A000
unkown
page read and write
7FF5D743F000
unkown
page readonly
7F8000
heap
page read and write
4A16000
unkown
page read and write
96F000
heap
page read and write
7DF4F2470000
unkown
page readonly
10E0000
unkown
page read and write
C65E000
unkown
page read and write
7DF4F2460000
unkown
page readonly
2E20000
direct allocation
page execute and read and write
30D0000
unkown
page read and write
30D0000
unkown
page read and write
861000
heap
page read and write
7BA000
heap
page read and write
3220000
unkown
page read and write
75FD000
unkown
page read and write
30E0000
unkown
page read and write
2DF2000
trusted library allocation
page read and write
97C000
heap
page read and write
8A9000
heap
page read and write
19C000
stack
page read and write
2E03000
trusted library allocation
page read and write
9700000
unkown
page read and write
98E000
heap
page read and write
5120000
heap
page read and write
2EDF000
trusted library allocation
page read and write
7FF5D705D000
unkown
page readonly
D94E000
stack
page read and write
982000
heap
page read and write
24AE000
stack
page read and write
3220000
unkown
page read and write
7FF5D76CD000
unkown
page readonly
1BFCD000
heap
page read and write
6CC20000
unkown
page readonly
C605000
unkown
page read and write
84F000
heap
page read and write
2EA0000
unkown
page read and write
97C000
heap
page read and write
7FF5D77C2000
unkown
page readonly
974000
heap
page read and write
3070000
unkown
page read and write
3220000
unkown
page read and write
308F000
stack
page read and write
9700000
unkown
page read and write
35C1000
unkown
page read and write
9700000
unkown
page read and write
1140000
unkown
page read and write
85BE000
stack
page read and write
3220000
unkown
page read and write
907000
heap
page read and write
3220000
unkown
page read and write
1BF20000
trusted library allocation
page read and write
3220000
unkown
page read and write
8BD000
heap
page read and write
7AC0000
unkown
page read and write
419000
unkown
page write copy
1380000
heap
page read and write
30D0000
unkown
page read and write
30D0000
unkown
page read and write
9700000
unkown
page read and write
7440000
unkown
page read and write
2500000
heap
page read and write
7D6000
heap
page read and write
1150000
unkown
page read and write
3220000
unkown
page read and write
980000
heap
page read and write
96F000
heap
page read and write
986000
heap
page read and write
30E0000
unkown
page read and write
7FF5D772C000
unkown
page readonly
2E07000
trusted library allocation
page read and write
2E94000
heap
page read and write
98E000
heap
page read and write
2DCA000
trusted library allocation
page read and write
6F90E000
unkown
page read and write
1140000
unkown
page read and write
7FF5D76DA000
unkown
page readonly
1160000
unkown
page read and write
9200000
unkown
page read and write
3220000
unkown
page read and write
1240000
unkown
page read and write
9200000
unkown
page read and write
7E0000
heap
page read and write
3220000
unkown
page read and write
862000
heap
page read and write
2DC7000
trusted library allocation
page read and write
977000
heap
page read and write
B559000
stack
page read and write
7FF5D7376000
unkown
page readonly
838000
heap
page read and write
9820000
unkown
page read and write
2DD6000
trusted library allocation
page read and write
96F000
heap
page read and write
9780000
unkown
page read and write
7FD000
heap
page read and write
7E7000
heap
page read and write
CA5F000
unkown
page read and write
C81C000
unkown
page read and write
30D0000
unkown
page read and write
9700000
unkown
page read and write
105B3000
unkown
page read and write
35CF000
unkown
page read and write
400000
unkown
page readonly
C892000
unkown
page read and write
97C000
heap
page read and write
1731000
unkown
page readonly
887000
heap
page read and write
2E83000
trusted library allocation
page read and write
2F7E000
stack
page read and write
862000
heap
page read and write
984000
heap
page read and write
3220000
unkown
page read and write
75F8000
unkown
page read and write
2EB1000
trusted library allocation
page read and write
1140000
unkown
page read and write
40B000
unkown
page execute read
2E45000
trusted library allocation
page read and write
11BF000
unkown
page read and write
3220000
unkown
page read and write
909000
heap
page read and write
2EA0000
unkown
page read and write
A0A9000
stack
page read and write
1B988000
direct allocation
page readonly
2D4B000
heap
page execute and read and write
B7DC000
stack
page read and write
11E0000
unkown
page read and write
977000
heap
page read and write
1150000
unkown
page read and write
7CB000
heap
page read and write
2DB4000
trusted library allocation
page read and write
3370000
unkown
page read and write
3290000
unkown
page read and write
9700000
unkown
page read and write
760B000
unkown
page read and write
9700000
unkown
page read and write
30D0000
unkown
page read and write
325B000
trusted library allocation
page read and write
570000
heap
page read and write
1140000
unkown
page read and write
10674000
unkown
page read and write
9700000
unkown
page read and write
1150000
unkown
page read and write
7FF5D71CC000
unkown
page readonly
2DCF000
trusted library allocation
page read and write
248C000
stack
page read and write
7609000
unkown
page read and write
3220000
unkown
page read and write
2DC4000
trusted library allocation
page read and write
434000
remote allocation
page execute and read and write
3370000
unkown
page read and write
9A72000
unkown
page read and write
1240000
unkown
page read and write
410000
unkown
page readonly
7B60000
unkown
page readonly
2EA0000
unkown
page read and write
2EA0000
unkown
page read and write
1907B000
heap
page read and write
3220000
unkown
page read and write
4AF000
unkown
page write copy
862000
heap
page read and write
8EA000
heap
page read and write
2E54000
trusted library allocation
page read and write
7D3000
heap
page read and write
32E5000
trusted library allocation
page read and write
97C000
heap
page read and write
809000
heap
page read and write
3070000
unkown
page read and write
3220000
unkown
page read and write
7460000
unkown
page read and write
2EA0000
unkown
page read and write
33F0000
unkown
page read and write
C48B000
unkown
page read and write
2DDC000
trusted library allocation
page read and write
3220000
unkown
page read and write
7FF000
heap
page read and write
865000
heap
page read and write
1150000
unkown
page read and write
7D6000
heap
page read and write
30D0000
unkown
page read and write
A39F000
unkown
page read and write
2EA0000
unkown
page read and write
844000
heap
page read and write
1150000
unkown
page read and write
2DD3000
trusted library allocation
page read and write
3070000
unkown
page read and write
318F000
stack
page read and write
30D0000
unkown
page read and write
3220000
unkown
page read and write
1DBC4000
heap
page read and write
8900000
unkown
page read and write
A2B5000
unkown
page read and write
9200000
unkown
page read and write
2F5D000
trusted library allocation
page read and write
3520000
unkown
page readonly
83A000
heap
page read and write
7FB000
heap
page read and write
7810000
unkown
page read and write
7FF5D7391000
unkown
page readonly
1E0000
heap
page read and write
3220000
unkown
page read and write
48E000
unkown
page readonly
977000
heap
page read and write
3220000
unkown
page read and write
3220000
unkown
page read and write
825000
heap
page read and write
2DD2000
trusted library allocation
page read and write
96F000
heap
page read and write
492000
unkown
page read and write
815000
heap
page read and write
3220000
unkown
page read and write
7FF5D6A4B000
unkown
page readonly
2EA0000
unkown
page read and write
2EE1000
trusted library allocation
page read and write
97C000
heap
page read and write
977000
heap
page read and write
40B000
unkown
page execute read
997C000
stack
page read and write
8A8000
heap
page read and write
8D50000
unkown
page read and write
1150000
unkown
page read and write
911000
heap
page read and write
19D000
stack
page read and write
650000
heap
page read and write
30D0000
unkown
page read and write
695000
heap
page read and write
1B97D000
direct allocation
page execute read
2E9E000
heap
page read and write
907000
heap
page read and write
7611000
unkown
page read and write
83E000
heap
page read and write
9EE0000
unkown
page read and write
2DE8000
trusted library allocation
page read and write
4B00000
unkown
page read and write
2EA0000
unkown
page read and write
3220000
unkown
page read and write
C472000
unkown
page read and write
7FF5D7292000
unkown
page readonly
3220000
unkown
page read and write
2E10000
trusted library allocation
page read and write
2DE8000
trusted library allocation
page read and write
7FF5D76D5000
unkown
page readonly
2E65000
trusted library allocation
page read and write
3220000
unkown
page read and write
99B0000
unkown
page read and write
C9C7000
unkown
page read and write
1240000
unkown
page read and write
1150000
unkown
page read and write
C61B000
unkown
page read and write
2E30000
direct allocation
page read and write
2E45000
trusted library allocation
page read and write
84D000
heap
page read and write
7FF5D72DF000
unkown
page readonly
83F000
heap
page read and write
987000
heap
page read and write
2EA0000
unkown
page read and write
2EA0000
unkown
page read and write
1908A000
heap
page read and write
2DE8000
trusted library allocation
page read and write
6F8FD000
unkown
page readonly
979000
heap
page read and write
7FF5D7425000
unkown
page readonly
1240000
unkown
page read and write
7FB000
heap
page read and write
7FF5D7452000
unkown
page readonly
A12F000
stack
page read and write
2C6F000
stack
page read and write
E00000
unkown
page readonly
3220000
unkown
page read and write
2EA0000
unkown
page read and write
3220000
unkown
page read and write
F58A000
heap
page read and write
3220000
unkown
page read and write
3240000
heap
page read and write
2DD2000
trusted library allocation
page read and write
864000
heap
page read and write
30D0000
unkown
page read and write
4A12000
unkown
page read and write
30D0000
unkown
page read and write
3220000
unkown
page read and write
9D67000
unkown
page read and write
505E000
stack
page read and write
8AD000
heap
page execute and read and write
1150000
unkown
page read and write
9700000
unkown
page read and write
3630000
unkown
page readonly
9200000
unkown
page read and write
1B8D6000
direct allocation
page execute read
9200000
unkown
page read and write
8D0F000
stack
page read and write
97C000
heap
page read and write
30D0000
unkown
page read and write
7FF5D77B6000
unkown
page readonly
7C80000
unkown
page read and write
10E0000
unkown
page read and write
979000
heap
page read and write
A1AF000
stack
page read and write
10E0000
unkown
page read and write
35D3000
unkown
page read and write
7FF5CE33D000
unkown
page readonly
2E18000
trusted library allocation
page read and write
974000
heap
page read and write
6CE00000
unkown
page read and write
3755000
trusted library allocation
page read and write
3220000
unkown
page read and write
2EA0000
unkown
page read and write
872000
heap
page read and write
9700000
unkown
page read and write
418000
unkown
page write copy
94F4000
unkown
page read and write
834000
heap
page read and write
977E000
stack
page read and write
7FF5D74A6000
unkown
page readonly
2D2E000
stack
page read and write
980000
heap
page read and write
3220000
unkown
page read and write
E84C000
stack
page read and write
19C000
stack
page read and write
3220000
unkown
page read and write
30D0000
unkown
page read and write
2DE2000
trusted library allocation
page read and write
2E52000
trusted library allocation
page read and write
There are 2221 hidden memdumps, click here to show them.