IOC Report
faktura proforma pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
faktura proforma pdf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\faktura proforma pdf.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp69A7.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\xmAdkuQjxrS.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\xmAdkuQjxrS.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xmAdkuQjxrS.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ffchl01w.ke3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k33xudv0.ntn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_latqaomn.zgx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pblrq2yk.y5a.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp77D0.tmp
XML 1.0 document, ASCII text
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\faktura proforma pdf.exe
"C:\Users\user\Desktop\faktura proforma pdf.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xmAdkuQjxrS.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xmAdkuQjxrS" /XML "C:\Users\user\AppData\Local\Temp\tmp69A7.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\xmAdkuQjxrS.exe
C:\Users\user\AppData\Roaming\xmAdkuQjxrS.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xmAdkuQjxrS" /XML "C:\Users\user\AppData\Local\Temp\tmp77D0.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\SysWOW64\mstsc.exe
"C:\Windows\SysWOW64\mstsc.exe"
malicious
C:\Windows\SysWOW64\raserver.exe
"C:\Windows\SysWOW64\raserver.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
www.asposted.online/gy15/
malicious
http://www.oftware-download-44761.bond
unknown
https://aka.ms/odirmr
unknown
http://www.hetinkerfoundation.net/gy15/
unknown
http://www.nline-shopping-56055.bondReferer:
unknown
http://www.nline-shopping-56055.bond
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
http://www.hetinkerfoundation.net/gy15/www.nline-shopping-56055.bond
unknown
http://www.omaininformaniacion.fun/gy15/www.hetinkerfoundation.net
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
http://www.nline-shopping-56055.bond/gy15/www.rrivalgetaways.info
unknown
http://www.ixaahx.shop/gy15/
unknown
http://www.fontbureau.com/designers
unknown
https://excel.office.com
unknown
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
http://www.hetinkerfoundation.net
unknown
http://www.sajatypeworks.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.hopbestdeals.online/gy15/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.orthfitness.net
unknown
http://www.omaininformaniacion.funReferer:
unknown
http://www.hopbestdeals.online/gy15/www.hqaiop.xyz
unknown
http://www.omaininformaniacion.fun/gy15/
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://wns.windows.com/L
unknown
https://word.office.com
unknown
http://www.haad.xyz/gy15/
unknown
http://www.rrivalgetaways.info/gy15/
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
http://www.indow-replacement-46487.bondReferer:
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.hilohcreekpemf.online/gy15/www.indow-replacement-46487.bond
unknown
http://www.asposted.online/gy15/www.ixaahx.shop
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
http://www.carterandcone.coml
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://android.notify.windows.com/iOS
unknown
http://www.ixaahx.shopReferer:
unknown
http://www.hilohcreekpemf.onlineReferer:
unknown
http://www.indow-replacement-46487.bond
unknown
https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
unknown
http://www.hilohcreekpemf.online/gy15/
unknown
http://www.0372.photoReferer:
unknown
https://outlook.com_
unknown
http://www.rogramdokpirdarmowy.today/gy15/
unknown
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
http://www.isax.xyz
unknown
http://www.fontbureau.com/designersG
unknown
http://www.ixaahx.shop
unknown
http://www.rrivalgetaways.infoReferer:
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.hqaiop.xyz/gy15/
unknown
http://www.oftware-download-44761.bond/gy15/
unknown
http://www.ixaahx.shop/gy15/www.haad.xyz
unknown
http://www.omaininformaniacion.fun
unknown
http://www.fontbureau.com/designers?
unknown
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
https://powerpoint.office.comcember
unknown
http://www.isax.xyz/gy15/
unknown
http://www.tiro.com
unknown
https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
unknown
http://www.indow-replacement-46487.bond/gy15/www.isax.xyz
unknown
http://www.rogramdokpirdarmowy.today
unknown
http://www.goodfont.co.kr
unknown
http://schemas.micro
unknown
http://www.rogramdokpirdarmowy.todayReferer:
unknown
http://www.hopbestdeals.online
unknown
http://www.orthfitness.net/gy15/
unknown
http://www.asposted.onlineReferer:
unknown
http://www.typography.netD
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.haad.xyzReferer:
unknown
http://www.hqaiop.xyz
unknown
http://www.hetinkerfoundation.netReferer:
unknown
http://www.0372.photo/gy15/
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
https://api.msn.com/q
unknown
http://www.haad.xyz
unknown
http://www.orthfitness.netReferer:
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
unknown
http://www.oftware-download-44761.bond/gy15/www.0372.photo
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.haad.xyz
13.248.252.114
malicious
www.isax.xyz
unknown
malicious
www.nline-shopping-56055.bond
unknown
malicious
www.omaininformaniacion.fun
unknown
malicious
www.rrivalgetaways.info
unknown
malicious
www.asposted.online
unknown
malicious
www.hopbestdeals.online
unknown
malicious
www.hilohcreekpemf.online
unknown
malicious
www.indow-replacement-46487.bond
unknown
malicious
www.hetinkerfoundation.net
unknown
malicious
www.ixaahx.shop
unknown
malicious
There are 1 hidden domains, click here to show them.

Registry

Path
Value
Malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
@explorerframe.dll,-13137
malicious
unknown
@explorerframe.dll,-13138
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Unpacker
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
SlowContextMenuEntries
malicious
unknown
CheckSetting
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
TaskbarStateLastRun
malicious
unknown
Implementing
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
WMP11.AssocFile.3G2
malicious
unknown
WMP11.AssocFile.3GP
malicious
unknown
WMP11.AssocFile.3G2
malicious
unknown
WMP11.AssocFile.3GP
malicious
unknown
WMP11.AssocFile.ADTS
malicious
unknown
WMP11.AssocFile.AIFF
malicious
unknown
WMP11.AssocFile.AIFF
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.AU
malicious
unknown
AutoIt3Script
malicious
unknown
WMP11.AssocFile.AVI
malicious
unknown
Paint.Picture
malicious
unknown
CABFolder
malicious
unknown
Microsoft.PowerShellCmdletDefinitionXML.1
malicious
unknown
CSSfile
malicious
unknown
Excel.CSV
malicious
unknown
ddsfile
malicious
unknown
Paint.Picture
malicious
unknown
dllfile
malicious
unknown
Word.Document.8
malicious
unknown
Word.DocumentMacroEnabled.12
malicious
unknown
Word.Document.12
malicious
unknown
Word.Template.8
malicious
unknown
Word.TemplateMacroEnabled.12
malicious
unknown
Word.Template.12
malicious
unknown
emffile
malicious
unknown
exefile
malicious
unknown
WMP11.AssocFile.FLAC
malicious
unknown
fonfile
malicious
unknown
giffile
malicious
unknown
htmlfile
malicious
unknown
htmlfile
malicious
unknown
icofile
malicious
unknown
inffile
malicious
unknown
inifile
malicious
unknown
pjpegfile
malicious
unknown
jpegfile
malicious
unknown
jpegfile
malicious
unknown
wdpfile
malicious
unknown
lnkfile
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.m3u
malicious
unknown
WMP11.AssocFile.M4A
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
mhtmlfile
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
WMP11.AssocFile.MK3D
malicious
unknown
WMP11.AssocFile.MKA
malicious
unknown
WMP11.AssocFile.MKV
malicious
unknown
WMP11.AssocFile.MOV
malicious
unknown
WMP11.AssocFile.MP3
malicious
unknown
Outlook.File.msg.15
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
ocxfile
malicious
unknown
PowerPoint.OpenDocumentPresentation.12
malicious
unknown
Excel.OpenDocumentSpreadsheet.12
malicious
unknown
Word.OpenDocumentText.12
malicious
unknown
otffile
malicious
unknown
pngfile
malicious
unknown
PowerPoint.Template.8
malicious
unknown
PowerPoint.TemplateMacroEnabled.12
malicious
unknown
PowerPoint.Template.12
malicious
unknown
PowerPoint.Addin.12
malicious
unknown
PowerPoint.SlideShowMacroEnabled.12
malicious
unknown
PowerPoint.SlideShow.12
malicious
unknown
PowerPoint.Show.8
malicious
unknown
PowerPoint.ShowMacroEnabled.12
malicious
unknown
PowerPoint.Show.12
malicious
unknown
Microsoft.PowerShellScript.1
malicious
unknown
Microsoft.PowerShellXMLData.1
malicious
unknown
Microsoft.PowerShellData.1
malicious
unknown
Microsoft.PowerShellModule.1
malicious
unknown
Microsoft.PowerShellSessionConfiguration.1
malicious
unknown
rlefile
malicious
unknown
Word.RTF.8
malicious
unknown
SHCmdFile
malicious
unknown
SearchFolder
malicious
unknown
shtmlfile
malicious
unknown
PowerPoint.SlideMacroEnabled.12
malicious
unknown
PowerPoint.Slide.12
malicious
unknown
sysfile
malicious
unknown
TIFImage.Document
malicious
unknown
TIFImage.Document
malicious
unknown
WMP11.AssocFile.TTS
malicious
unknown
ttcfile
malicious
unknown
ttffile
malicious
unknown
WMP11.AssocFile.TTS
malicious
unknown
txtfile
malicious
unknown
bootstrap.vsto.1
malicious
unknown
WMP11.AssocFile.WAV
malicious
unknown
WMP11.AssocFile.WAX
malicious
unknown
wdpfile
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.WMA
malicious
unknown
wmffile
malicious
unknown
WMP11.AssocFile.WMV
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.WPL
malicious
unknown
WMP11.AssocFile.WVX
malicious
unknown
Excel.AddInMacroEnabled
malicious
unknown
Excel.Sheet.8
malicious
unknown
Excel.SheetBinaryMacroEnabled.12
malicious
unknown
Excel.SheetMacroEnabled.12
malicious
unknown
Excel.Sheet.12
malicious
unknown
Excel.Template.8
malicious
unknown
Excel.TemplateMacroEnabled
malicious
unknown
Excel.Template
malicious
unknown
xmlfile
malicious
unknown
xslfile
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
TaskbarStateLastRun
malicious
unknown
Implementing
malicious
unknown
LastUpdate
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
There are 199 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
45C8000
trusted library allocation
page read and write
malicious
4028000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3000000
system
page execute and read and write
malicious
36A0000
trusted library allocation
page read and write
malicious
32C0000
system
page execute and read and write
malicious
3670000
unclassified section
page execute and read and write
malicious
982D000
unkown
page read and write
5590000
unkown
page write copy
3330000
trusted library allocation
page read and write
BAF9000
stack
page read and write
7FF5ED864000
unkown
page readonly
CB3D000
unkown
page read and write
7F40000
unkown
page readonly
180D000
trusted library allocation
page execute and read and write
14B0000
unkown
page readonly
A37B000
unkown
page read and write
2B02000
trusted library allocation
page read and write
7FF5ED33F000
unkown
page readonly
B08D000
stack
page read and write
7CC0000
unkown
page readonly
B560000
trusted library section
page read and write
7FF5ED9CA000
unkown
page readonly
286E000
stack
page read and write
7FF5ED9BE000
unkown
page readonly
9A5B000
unkown
page read and write
132C000
heap
page read and write
7FF5ED9A6000
unkown
page readonly
7FF5ED9ED000
unkown
page readonly
A391000
unkown
page read and write
37AE000
unkown
page read and write
C503000
unkown
page read and write
7FF5ED4B0000
unkown
page readonly
B5AE000
stack
page read and write
C5A0000
unkown
page read and write
8BE9000
stack
page read and write
CAC0000
unkown
page read and write
332E000
stack
page read and write
7FF5ED77C000
unkown
page readonly
7FF5ED3D0000
unkown
page readonly
CBC7000
unkown
page read and write
7DF4F3050000
unkown
page readonly
A3BE000
unkown
page read and write
7FF5ED602000
unkown
page readonly
7FFE000
stack
page read and write
C6CF000
unkown
page read and write
7FF5ED3D6000
unkown
page readonly
7FF5ED692000
unkown
page readonly
7FF5ED412000
unkown
page readonly
8CA000
heap
page read and write
7FF5ED625000
unkown
page readonly
7FF5ED8C6000
unkown
page readonly
C6D8000
unkown
page read and write
997A000
unkown
page read and write
7CD0000
unkown
page read and write
C5F000
heap
page read and write
331E000
stack
page read and write
8F5000
heap
page read and write
3791000
unkown
page read and write
33F8000
heap
page read and write
7FF5ED3EA000
unkown
page readonly
97AD000
unkown
page read and write
4C50000
unkown
page read and write
3700000
unkown
page read and write
C9D8000
unkown
page read and write
1010A000
heap
page read and write
C964000
unkown
page read and write
FB16000
unkown
page read and write
786B000
unkown
page read and write
35D0000
trusted library allocation
page read and write
121E000
stack
page read and write
C14000
trusted library allocation
page read and write
CB04000
unkown
page read and write
7FF5ED534000
unkown
page readonly
B8C0000
unkown
page readonly
11DF000
stack
page read and write
6A0F000
stack
page read and write
379E000
unkown
page read and write
F6D0000
system
page execute and read and write
33E5000
heap
page read and write
7867000
unkown
page read and write
9792000
unkown
page read and write
7FF5ED8C1000
unkown
page readonly
4C18000
unkown
page read and write
37AC000
unkown
page read and write
C16000
trusted library allocation
page read and write
5210000
trusted library allocation
page execute and read and write
BC9B000
stack
page read and write
7900000
unkown
page read and write
4B56000
unkown
page read and write
7FF5ED68F000
unkown
page readonly
4C4B000
unkown
page read and write
51F0000
trusted library allocation
page read and write
3209000
heap
page read and write
A4AB000
unkown
page read and write
56D9000
unkown
page read and write
8B60000
unkown
page readonly
BC9B000
stack
page read and write
7FF5ED942000
unkown
page readonly
143B000
stack
page read and write
DCFF000
stack
page read and write
7FF5ED9A1000
unkown
page readonly
5C24000
heap
page read and write
C6C9000
unkown
page read and write
7FF5ED3EA000
unkown
page readonly
896B000
stack
page read and write
E35E000
stack
page read and write
C54A000
unkown
page read and write
943000
heap
page read and write
7FF5ED7E0000
unkown
page readonly
7FF5ED449000
unkown
page readonly
5060000
heap
page read and write
9A10000
unkown
page read and write
979C000
unkown
page read and write
35D0000
trusted library allocation
page read and write
379E000
unkown
page read and write
7FF5ED990000
unkown
page readonly
F3E000
stack
page read and write
7FF5ED445000
unkown
page readonly
7FF5ED7F1000
unkown
page readonly
7FF5ED750000
unkown
page readonly
7FF5ED4A1000
unkown
page readonly
4B78000
unkown
page read and write
3060000
heap
page read and write
50CE000
direct allocation
page execute and read and write
AA90000
unkown
page read and write
843000
trusted library allocation
page execute and read and write
97B5000
unkown
page read and write
2CCC000
stack
page read and write
52A0000
trusted library allocation
page read and write
E51C000
stack
page read and write
7FF5ED445000
unkown
page readonly
7FF5ED980000
unkown
page readonly
787C000
unkown
page read and write
7FF5ED80C000
unkown
page readonly
7FF5ED48A000
unkown
page readonly
35D0000
unkown
page read and write
E9AE000
stack
page read and write
4CAB000
stack
page read and write
4B50000
unkown
page read and write
877000
trusted library allocation
page execute and read and write
3756000
unkown
page read and write
F89C000
stack
page read and write
9F9D000
stack
page read and write
7FF5ED9FF000
unkown
page readonly
7FF5ED6DB000
unkown
page readonly
80D3000
heap
page read and write
7FF5ED295000
unkown
page readonly
2AD0000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
1023000
trusted library allocation
page read and write
A310000
unkown
page read and write
3290000
unkown
page read and write
52D0000
heap
page read and write
7FF5ED933000
unkown
page readonly
7FF5ED996000
unkown
page readonly
37A8000
unkown
page read and write
A39B000
unkown
page read and write
F733000
system
page execute and read and write
37F6000
unkown
page read and write
9881000
unkown
page read and write
7FF5ED713000
unkown
page readonly
B82A000
stack
page read and write
7FF5ED50A000
unkown
page readonly
7FF5ED65C000
unkown
page readonly
10100000
heap
page read and write
7DF4F3031000
unkown
page execute read
7FF5ED821000
unkown
page readonly
A3BE000
unkown
page read and write
7884000
unkown
page read and write
DFBD000
stack
page read and write
C700000
unkown
page read and write
55A6000
unclassified section
page read and write
7FF5ED8B4000
unkown
page readonly
492C000
stack
page read and write
3700000
unkown
page read and write
B2ED000
stack
page read and write
7FF5ED295000
unkown
page readonly
7FF5ED265000
unkown
page readonly
339F000
stack
page read and write
FB94000
unkown
page read and write
CB4A000
unkown
page read and write
C557000
unkown
page read and write
1157000
trusted library allocation
page execute and read and write
3330000
trusted library allocation
page read and write
CB70000
unkown
page read and write
7FF5ED286000
unkown
page readonly
4B90000
unkown
page read and write
CA7C000
unkown
page read and write
7FF5ED735000
unkown
page readonly
7FF5EDA0D000
unkown
page readonly
7FF5ED7D6000
unkown
page readonly
7FF5ED409000
unkown
page readonly
10D0000
heap
page read and write
97A9000
unkown
page read and write
2B8E000
unkown
page read and write
7FF5ED519000
unkown
page readonly
3439000
stack
page read and write
7FF5ED471000
unkown
page readonly
9869000
unkown
page read and write
7FF5ED3CE000
unkown
page readonly
7FF5ED4B4000
unkown
page readonly
8116000
heap
page read and write
4C7A000
unkown
page read and write
7FF5ED9E1000
unkown
page readonly
C6F4000
unkown
page read and write
3738000
unkown
page read and write
8DA0000
unkown
page read and write
79B1000
unkown
page read and write
9869000
unkown
page read and write
2AFD000
trusted library allocation
page read and write
1230000
unkown
page read and write
26D0000
trusted library allocation
page read and write
36D5000
stack
page read and write
DF7E000
stack
page read and write
C503000
unkown
page read and write
18A1000
unkown
page readonly
35D0000
trusted library allocation
page read and write
7FF5EDA14000
unkown
page readonly
3FE7000
trusted library allocation
page read and write
37BD000
unkown
page read and write
7FF5ED33F000
unkown
page readonly
33B4000
heap
page read and write
A491000
unkown
page read and write
98E0000
unkown
page read and write
1601000
direct allocation
page execute and read and write
C6C9000
unkown
page read and write
1010000
trusted library allocation
page read and write
7FF5ED4C2000
unkown
page readonly
4CC0000
unkown
page read and write
AB4C000
unkown
page read and write
7FF5ED43A000
unkown
page readonly
7CC0000
unkown
page readonly
7FF5EDA38000
unkown
page readonly
9702000
unkown
page read and write
6DAD000
stack
page read and write
5200000
trusted library allocation
page read and write
CBDC000
unkown
page read and write
7D20000
unkown
page readonly
33EA000
heap
page read and write
7857000
unkown
page read and write
FF7D000
unkown
page read and write
2720000
trusted library allocation
page read and write
89E0000
unkown
page read and write
5600000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
1490000
unkown
page read and write
B7AC000
stack
page read and write
7CA0000
unkown
page read and write
C40000
heap
page read and write
5001000
trusted library allocation
page execute and read and write
1490000
unkown
page read and write
C89C000
unkown
page read and write
9139000
stack
page read and write
C41F000
stack
page read and write
8000000
unkown
page read and write
F2BE000
stack
page read and write
1490000
direct allocation
page execute and read and write
906E000
stack
page read and write
7865000
unkown
page read and write
175D000
direct allocation
page execute and read and write
4CB0000
heap
page read and write
7340000
trusted library allocation
page read and write
7FF5ED449000
unkown
page readonly
3590000
unkown
page read and write
731E000
stack
page read and write
33B4000
heap
page read and write
7FF5ED4B4000
unkown
page readonly
1150000
trusted library allocation
page read and write
C89A000
unkown
page read and write
51F0000
trusted library allocation
page read and write
7FF5ED265000
unkown
page readonly
5641000
unkown
page read and write
CA42000
unkown
page read and write
860000
trusted library allocation
page read and write
4BA6000
unkown
page read and write
9A5B000
unkown
page read and write
CB42000
unkown
page read and write
3370000
trusted library allocation
page read and write
9893000
unkown
page read and write
3330000
trusted library allocation
page read and write
9701000
unkown
page read and write
7FF5ED40D000
unkown
page readonly
17BD000
trusted library allocation
page execute and read and write
7FF5ED404000
unkown
page readonly
DB1000
trusted library allocation
page read and write
AB5F000
unkown
page read and write
965C000
stack
page read and write
CB3D000
unkown
page read and write
8A89000
heap
page read and write
3670000
trusted library allocation
page read and write
E7C0000
unkown
page execute and read and write
50A1000
trusted library allocation
page execute and read and write
3240000
unkown
page read and write
7D40000
unkown
page read and write
7FF5ED337000
unkown
page readonly
7FF5ED885000
unkown
page readonly
7FF5ED62F000
unkown
page readonly
17E0000
trusted library allocation
page execute and read and write
37AE000
unkown
page read and write
7979000
unkown
page read and write
3130000
unclassified section
page execute and read and write
7FF5ED87D000
unkown
page readonly
2DF4000
heap
page read and write
CB9D000
unkown
page read and write
143F000
unclassified section
page execute and read and write
36D0000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
7FF5ED6B8000
unkown
page readonly
331F000
unkown
page read and write
10C0000
unkown
page readonly
78AD000
unkown
page read and write
7FF5ED867000
unkown
page readonly
7FF5ED516000
unkown
page readonly
7FF5ED505000
unkown
page readonly
AAF6000
unkown
page read and write
986000
heap
page read and write
D26000
heap
page read and write
9977000
unkown
page read and write
7FF5ED803000
unkown
page readonly
F1BD000
stack
page read and write
CB4A000
unkown
page read and write
C846000
unkown
page read and write
A19F000
stack
page read and write
A12000
system
page execute and read and write
977A000
unkown
page read and write
9881000
unkown
page read and write
7FF5ED76D000
unkown
page readonly
7FF5ED26E000
unkown
page readonly
7DF4F3031000
unkown
page execute read
7FF5ED872000
unkown
page readonly
16E0000
unclassified section
page execute and read and write
785F000
unkown
page read and write
97B5000
unkown
page read and write
B0AD000
stack
page read and write
4CE0000
unkown
page read and write
7D40000
unkown
page read and write
B8B0000
unkown
page read and write
7FF5ED46E000
unkown
page readonly
7FF5ED52F000
unkown
page readonly
7FF5ED5C1000
unkown
page readonly
4BCB000
heap
page read and write
37BD000
unkown
page read and write
7FF5ED1CF000
unkown
page readonly
A01B000
stack
page read and write
9795000
unkown
page read and write
8720000
unkown
page readonly
370C000
unkown
page read and write
7FF5EDA53000
unkown
page readonly
7FF5ED961000
unkown
page readonly
C10000
trusted library allocation
page read and write
CB6E000
unkown
page read and write
5370000
trusted library allocation
page read and write
7D00000
unkown
page readonly
CA7C000
unkown
page read and write
FF72000
unkown
page read and write
CA64000
unkown
page read and write
7FF5ED74A000
unkown
page readonly
516E000
stack
page read and write
7FF5ED956000
unkown
page readonly
7FF5ED495000
unkown
page readonly
1440000
unkown
page read and write
7FF5ED87D000
unkown
page readonly
B10D000
stack
page read and write
37F2000
unkown
page read and write
785B000
unkown
page read and write
7FF5ED76D000
unkown
page readonly
7FF5ED4E8000
unkown
page readonly
4F50000
heap
page execute and read and write
67DE000
heap
page read and write
3290000
unkown
page read and write
56D9000
unkown
page read and write
2A5B000
heap
page read and write
7FF5ED4C2000
unkown
page readonly
3791000
unkown
page read and write
8208000
stack
page read and write
3220000
unkown
page readonly
C857000
unkown
page read and write
D50000
heap
page read and write
923E000
stack
page read and write
AF70000
heap
page read and write
A479000
unkown
page read and write
7FF5ED586000
unkown
page readonly
7FF5ED8F9000
unkown
page readonly
A379000
unkown
page read and write
FF74000
unkown
page read and write
7FF5ED7C4000
unkown
page readonly
10ED6000
system
page read and write
D4E000
stack
page read and write
7FF5ED495000
unkown
page readonly
C857000
unkown
page read and write
987D000
unkown
page read and write
5379000
direct allocation
page execute and read and write
E76E000
stack
page read and write
5070000
heap
page read and write
7FF5ED849000
unkown
page readonly
3220000
unkown
page readonly
298E000
stack
page read and write
13D0000
direct allocation
page execute and read and write
E59D000
stack
page read and write
D50000
heap
page read and write
797D000
unkown
page read and write
5340000
heap
page read and write
7FF5ED5F7000
unkown
page readonly
C8E1000
unkown
page read and write
7C80000
unkown
page read and write
3FA000
stack
page read and write
97C3000
unkown
page read and write
7FF5ED97E000
unkown
page readonly
97AD000
unkown
page read and write
906E000
stack
page read and write
CBA7000
unkown
page read and write
3748000
unkown
page read and write
862000
trusted library allocation
page read and write
CA64000
unkown
page read and write
7FF5ED8A4000
unkown
page readonly
A479000
unkown
page read and write
CADB000
unkown
page read and write
1170000
trusted library allocation
page read and write
7E11000
unkown
page read and write
2F1A000
stack
page read and write
7FF5ED695000
unkown
page readonly
1190000
trusted library allocation
page read and write
3203000
heap
page read and write
7FF5D1CCD000
unkown
page readonly
FF88000
unkown
page read and write
CB63000
unkown
page read and write
7FF5ED850000
unkown
page readonly
CB18000
unkown
page read and write
CABD000
unkown
page read and write
7847000
unkown
page read and write
7FF5ED2A9000
unkown
page readonly
37F2000
unkown
page read and write
4B93000
unkown
page read and write
7FF5ED92C000
unkown
page readonly
7DF4F3051000
unkown
page execute read
7FF5ED1CB000
unkown
page readonly
986B000
unkown
page read and write
DE0000
heap
page read and write
51F0000
trusted library allocation
page read and write
B629000
stack
page read and write
FA9B000
unkown
page read and write
7FF5EDA11000
unkown
page readonly
A570000
heap
page read and write
7863000
unkown
page read and write
3791000
unkown
page read and write
7FF5ED556000
unkown
page readonly
4587000
trusted library allocation
page read and write
7FF5ED71B000
unkown
page readonly
27A9000
trusted library allocation
page read and write
36F0000
unkown
page readonly
7FF5ED9C6000
unkown
page readonly
AAD1000
unkown
page read and write
37F6000
unkown
page read and write
3758000
unkown
page read and write
7F1B0000
trusted library allocation
page execute and read and write
7FF5ED5A8000
unkown
page readonly
C563000
unkown
page read and write
907000
heap
page read and write
7FF5ED942000
unkown
page readonly
7978000
unkown
page read and write
8DF000
heap
page read and write
BCE000
stack
page read and write
8710000
unkown
page readonly
9815000
unkown
page read and write
C507000
unkown
page read and write
7FF5ED8AC000
unkown
page readonly
7FF5ED503000
unkown
page readonly
5BE9000
heap
page read and write
4C9A000
unkown
page read and write
866000
trusted library allocation
page execute and read and write
CB4A000
unkown
page read and write
3330000
trusted library allocation
page read and write
3209000
stack
page read and write
17E0000
unclassified section
page execute and read and write
7DF4F3040000
unkown
page readonly
B650000
unkown
page read and write
C4A0000
unkown
page read and write
AB56000
unkown
page read and write
37AC000
unkown
page read and write
33E6000
heap
page read and write
51FD000
direct allocation
page execute and read and write
35D0000
trusted library allocation
page read and write
A433000
unkown
page read and write
DBFE000
stack
page read and write
C9E0000
unkown
page read and write
4EA9000
heap
page read and write
80A0000
heap
page read and write
79D3000
unkown
page read and write
CB4F000
unkown
page read and write
7E50000
unkown
page readonly
7FF5ED55F000
unkown
page readonly
35D0000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
B8E000
stack
page read and write
8BF0000
unkown
page readonly
BF0000
heap
page read and write
102D000
trusted library allocation
page execute and read and write
3330000
trusted library allocation
page read and write
8BF0000
unkown
page readonly
1350000
unkown
page readonly
7FF5ED853000
unkown
page readonly
E8AE000
stack
page read and write
7FF5ED534000
unkown
page readonly
7FF5ED697000
unkown
page readonly
FB16000
unkown
page read and write
FFA4000
unkown
page read and write
37D2000
unkown
page read and write
7FF5ED915000
unkown
page readonly
7CE0000
unkown
page read and write
C89A000
unkown
page read and write
7FF5ED750000
unkown
page readonly
36D3000
stack
page read and write
7AE000
stack
page read and write
23D0000
heap
page read and write
7867000
unkown
page read and write
141F000
stack
page read and write
E844000
unkown
page execute and read and write
1095000
stack
page read and write
3D31000
trusted library allocation
page read and write
7FF5ED507000
unkown
page readonly
C08A000
stack
page read and write
AB4C000
unkown
page read and write
1510000
unkown
page readonly
37F9000
unkown
page read and write
986B000
unkown
page read and write
1142000
trusted library allocation
page read and write
A4FC000
unkown
page read and write
3797000
unkown
page read and write
CABD000
unkown
page read and write
7E11000
unkown
page read and write
DD0000
unkown
page readonly
9875000
unkown
page read and write
7FF5ED818000
unkown
page readonly
FFA4000
unkown
page read and write
9B0000
heap
page read and write
4C7A000
unkown
page read and write
78A0000
unkown
page read and write
C700000
unkown
page read and write
3799000
trusted library allocation
page read and write
DB6000
trusted library allocation
page read and write
7FF5ED743000
unkown
page readonly
B629000
stack
page read and write
7FF5ED4FD000
unkown
page readonly
DE7E000
stack
page read and write
CB3D000
unkown
page read and write
7FF5ED814000
unkown
page readonly
B640000
unkown
page read and write
EDDE000
stack
page read and write
CAC0000
unkown
page read and write
79B1000
unkown
page read and write
C9CA000
unkown
page read and write
FE0000
heap
page read and write
C6F2000
unkown
page read and write
33F0000
heap
page read and write
50D0000
trusted library allocation
page read and write
9871000
unkown
page read and write
FF7D000
unkown
page read and write
BD98000
stack
page read and write
7FF5ED939000
unkown
page readonly
7FF5ED433000
unkown
page readonly
840000
trusted library allocation
page read and write
8AFE000
heap
page read and write
A50B000
unkown
page read and write
797D000
unkown
page read and write
9875000
unkown
page read and write
505D000
direct allocation
page execute and read and write
268F000
stack
page read and write
76C0000
unkown
page read and write
BA0000
heap
page read and write
9883000
unkown
page read and write
8EC6000
unkown
page read and write
3203000
heap
page read and write
E11E000
stack
page read and write
CF5000
heap
page read and write
EE8000
heap
page read and write
B08D000
stack
page read and write
3758000
unkown
page read and write
8A6E000
stack
page read and write
1180000
trusted library allocation
page execute and read and write
3795000
unkown
page read and write
FA92000
unkown
page read and write
3570000
heap
page read and write
C6F2000
unkown
page read and write
A32A000
unkown
page read and write
7FF5ED337000
unkown
page readonly
1120000
heap
page read and write
CB9A000
unkown
page read and write
AB62000
unkown
page read and write
371D000
unkown
page read and write
33F0000
heap
page read and write
A580000
heap
page read and write
371C000
unkown
page read and write
33EA000
heap
page read and write
C544000
unkown
page read and write
C51E000
unkown
page read and write
2D3F000
stack
page read and write
FF88000
unkown
page read and write
7DF4F3030000
unkown
page readonly
BAF9000
stack
page read and write
34E9000
stack
page read and write
7FF5ED507000
unkown
page readonly
CB70000
unkown
page read and write
7FF5ED9A1000
unkown
page readonly
7FF5ED6B8000
unkown
page readonly
7FF5ED5EB000
unkown
page readonly
33B4000
heap
page read and write
33B4000
heap
page read and write
C49E000
stack
page read and write
7FF5EDA2A000
unkown
page readonly
2ADB000
trusted library allocation
page read and write
7FF5ED28F000
unkown
page readonly
4CB0000
unkown
page read and write
7FF5ED52F000
unkown
page readonly
AA90000
unkown
page read and write
51F0000
trusted library allocation
page read and write
7FF5ED39B000
unkown
page readonly
CBA0000
unkown
page read and write
13A0000
unkown
page read and write
7FF5ED5C5000
unkown
page readonly
B22B000
stack
page read and write
41F000
remote allocation
page execute and read and write
3738000
unkown
page read and write
7FF5EDA69000
unkown
page readonly
CB18000
unkown
page read and write
7FF5ED806000
unkown
page readonly
7FF5ED928000
unkown
page readonly
A491000
unkown
page read and write
8860000
unkown
page read and write
7FF5ED8C1000
unkown
page readonly
37A0000
unkown
page read and write
5557000
stack
page read and write
2A40000
heap
page read and write
531B000
stack
page read and write
C10A000
stack
page read and write
4BE1000
unkown
page read and write
33C8000
heap
page read and write
7FF5ED85F000
unkown
page readonly
785D000
unkown
page read and write
CA83000
unkown
page read and write
1505000
heap
page read and write
32D0000
heap
page read and write
7FF5ED46E000
unkown
page readonly
3740000
heap
page read and write
B82A000
stack
page read and write
7FF5ED48A000
unkown
page readonly
FAA9000
unkown
page read and write
35D0000
trusted library allocation
page read and write
50C0000
trusted library allocation
page execute and read and write
310E000
stack
page read and write
E7AE000
stack
page read and write
7FF5ED7CF000
unkown
page readonly
BEE000
stack
page read and write
78A0000
unkown
page read and write
1860000
unclassified section
page execute and read and write
7DF4F3071000
unkown
page execute read
7FF5ED7CF000
unkown
page readonly
36D0000
trusted library allocation
page read and write
7FF5ED9B8000
unkown
page readonly
CA41000
unkown
page read and write
7FF5ED8A4000
unkown
page readonly
7FF5ED8F9000
unkown
page readonly
1412000
direct allocation
page execute and read and write
7FF5EDA08000
unkown
page readonly
7FF5ED43D000
unkown
page readonly
7FF5ED91A000
unkown
page readonly
37F6000
unkown
page read and write
7FF5ED9D6000
unkown
page readonly
9815000
unkown
page read and write
2DF4000
heap
page read and write
AAF6000
unkown
page read and write
31F8000
heap
page read and write
C6F8000
unkown
page read and write
FCD9000
system
page execute and read and write
7FF5ED5C5000
unkown
page readonly
7FF5ED885000
unkown
page readonly
C20000
trusted library allocation
page read and write
C52C000
unkown
page read and write
7FF5ED3F3000
unkown
page readonly
1451000
unkown
page readonly
A323000
unkown
page read and write
289000
system
page execute and read and write
7D2000
unkown
page readonly
A49E000
unkown
page read and write
986F000
unkown
page read and write
B8AB000
stack
page read and write
3795000
unkown
page read and write
982D000
unkown
page read and write
4798000
trusted library allocation
page read and write
9875000
unkown
page read and write
B650000
unkown
page read and write
A4A1000
unkown
page read and write
7FF5ED20D000
unkown
page readonly
7FF5ED8E2000
unkown
page readonly
DAE000
stack
page read and write
B00A000
stack
page read and write
C9B1000
unkown
page read and write
33B4000
heap
page read and write
CB6E000
unkown
page read and write
9795000
unkown
page read and write
26C0000
trusted library allocation
page execute and read and write
B8C0000
unkown
page readonly
3738000
unkown
page read and write
4CB0000
unkown
page read and write
7CA0000
unkown
page read and write
7FF5ED821000
unkown
page readonly
7F2E000
stack
page read and write
979C000
unkown
page read and write
5090000
trusted library allocation
page execute and read and write
8A0000
trusted library allocation
page execute and read and write
1850000
heap
page read and write
7FF5ED9CA000
unkown
page readonly
4C9A000
unkown
page read and write
7FF5ED803000
unkown
page readonly
FCB2000
system
page execute and read and write
8720000
unkown
page readonly
5100000
trusted library allocation
page execute and read and write
7FF5ED9F2000
unkown
page readonly
10D0000
heap
page read and write
CB3F000
unkown
page read and write
7859000
unkown
page read and write
2D20000
heap
page execute and read and write
4F1A000
heap
page read and write
7FF5ED937000
unkown
page readonly
CB4A000
unkown
page read and write
7FF5ED9CC000
unkown
page readonly
FF75000
unkown
page read and write
37B0000
unkown
page read and write
554D000
stack
page read and write
FFE000
stack
page read and write
6F7000
stack
page read and write
7FF5ED990000
unkown
page readonly
33B9000
stack
page read and write
2B7F000
stack
page read and write
8E7000
heap
page read and write
853000
trusted library allocation
page read and write
33B4000
heap
page read and write
C88B000
unkown
page read and write
97B5000
unkown
page read and write
A494000
unkown
page read and write
37A0000
unkown
page read and write
986F000
unkown
page read and write
4B93000
unkown
page read and write
7FF5ED961000
unkown
page readonly
7FF5ED433000
unkown
page readonly
7FF5ED864000
unkown
page readonly
7FF5ED7FD000
unkown
page readonly
26B0000
heap
page read and write
7FF5ED781000
unkown
page readonly
2B38000
trusted library allocation
page read and write
7FF5ED4F3000
unkown
page readonly
7859000
unkown
page read and write
9F9D000
stack
page read and write
7FF5ED73D000
unkown
page readonly
35D0000
trusted library allocation
page read and write
BD98000
stack
page read and write
C84D000
unkown
page read and write
BD1D000
stack
page read and write
95DD000
stack
page read and write
CAFA000
unkown
page read and write
33C0000
heap
page read and write
C6CF000
unkown
page read and write
7FF5ED77C000
unkown
page readonly
31E8000
heap
page read and write
C512000
unkown
page read and write
537D000
direct allocation
page execute and read and write
4CC0000
unkown
page read and write
7865000
unkown
page read and write
37F6000
unkown
page read and write
3330000
trusted library allocation
page read and write
C0C000
stack
page read and write
C9DB000
unkown
page read and write
7FF5ED9C8000
unkown
page readonly
C8E1000
unkown
page read and write
87D1000
unkown
page read and write
1420000
unclassified section
page execute and read and write
C6C1000
unkown
page read and write
EB3D000
stack
page read and write
8108000
stack
page read and write
2DF4000
heap
page read and write
17F1000
trusted library allocation
page execute and read and write
3756000
unkown
page read and write
CB4A000
unkown
page read and write
101D000
trusted library allocation
page execute and read and write
133C000
heap
page read and write
2770000
heap
page read and write
AADB000
unkown
page read and write
FF71000
unkown
page read and write
7FF5ED68F000
unkown
page readonly
96DF000
unkown
page read and write
DBD000
trusted library allocation
page read and write
7FF5ED5C9000
unkown
page readonly
982D000
unkown
page read and write
1473000
direct allocation
page execute and read and write
37A0000
unkown
page read and write
26FD000
stack
page read and write
7FF5ED850000
unkown
page readonly
E360000
heap
page read and write
2ACB000
stack
page read and write
C6E3000
unkown
page read and write
3797000
unkown
page read and write
13D6000
direct allocation
page execute and read and write
89C0000
unkown
page read and write
7FF5ED4FD000
unkown
page readonly
4C8A000
unkown
page read and write
7950000
unkown
page read and write
A37B000
unkown
page read and write
33B4000
heap
page read and write
BD1D000
stack
page read and write
93BE000
stack
page read and write
7FF5ED4EF000
unkown
page readonly
5320000
trusted library section
page readonly
2F80000
heap
page read and write
6DC3000
trusted library allocation
page read and write
37C7000
trusted library allocation
page read and write
4B90000
unkown
page read and write
1010A000
heap
page read and write
3795000
unkown
page read and write
AB02000
unkown
page read and write
33B4000
heap
page read and write
1030000
heap
page read and write
2CBF000
unkown
page read and write
7FF5ED806000
unkown
page readonly
7FF5ED28E000
unkown
page readonly
3330000
trusted library allocation
page read and write
9660000
unkown
page read and write
1480000
heap
page read and write
B190000
unkown
page read and write
37A8000
unkown
page read and write
87E6000
unkown
page read and write
A361000
unkown
page read and write
CB76000
unkown
page read and write
978E000
unkown
page read and write
CB27000
unkown
page read and write
97AD000
unkown
page read and write
9883000
unkown
page read and write
ED9E000
stack
page read and write
37F9000
unkown
page read and write
1230000
unkown
page read and write
2A8E000
stack
page read and write
814B000
heap
page read and write
7FF5ED39E000
unkown
page readonly
7FF5ED713000
unkown
page readonly
E8AE000
stack
page read and write
7FF5ED800000
unkown
page readonly
7FF5ED5C1000
unkown
page readonly
370C000
unkown
page read and write
C74000
heap
page read and write
52B0000
trusted library allocation
page read and write
3580000
unkown
page readonly
7FF5ED426000
unkown
page readonly
A21E000
stack
page read and write
7FF5ED9F2000
unkown
page readonly
1339000
heap
page read and write
7FF5ED71B000
unkown
page readonly
FBF000
stack
page read and write
33B4000
heap
page read and write
4F30000
direct allocation
page execute and read and write
4C18000
unkown
page read and write
F17C000
stack
page read and write
A327000
unkown
page read and write
7FF5ED2A9000
unkown
page readonly
C6F8000
unkown
page read and write
36D5000
stack
page read and write
987F000
unkown
page read and write
10102000
heap
page read and write
3210000
unkown
page read and write
1020000
trusted library allocation
page read and write
EC3E000
stack
page read and write
18A0000
unkown
page readonly
FF88000
unkown
page read and write
785B000
unkown
page read and write
9871000
unkown
page read and write
162E000
direct allocation
page execute and read and write
4BE1000
unkown
page read and write
7FF5ED9C8000
unkown
page readonly
787C000
unkown
page read and write
8A80000
heap
page read and write
17D8000
direct allocation
page execute and read and write
4CE0000
unkown
page read and write
EC9D000
stack
page read and write
23CE000
unkown
page read and write
7FF5EDA0B000
unkown
page readonly
CA63000
unkown
page read and write
98A000
heap
page read and write
DE0000
unkown
page readonly
7FF5ED3CE000
unkown
page readonly
B2C000
stack
page read and write
C3C000
stack
page read and write
AB62000
unkown
page read and write
4BC9000
unkown
page read and write
33B4000
heap
page read and write
7FF5ED676000
unkown
page readonly
9550000
unkown
page readonly
B640000
unkown
page read and write
3330000
trusted library allocation
page read and write
9792000
unkown
page read and write
7FF5ED65C000
unkown
page readonly
C4A0000
unkown
page read and write
A37D000
unkown
page read and write
C507000
unkown
page read and write
CCD000
heap
page read and write
7FF5ED9CC000
unkown
page readonly
33EA000
heap
page read and write
3330000
trusted library allocation
page read and write
50B0000
heap
page read and write
7FF5ED210000
unkown
page readonly
7FF5ED39B000
unkown
page readonly
C811000
unkown
page read and write
9DED000
stack
page read and write
3748000
unkown
page read and write
9873000
unkown
page read and write
35D0000
trusted library allocation
page read and write
B22B000
stack
page read and write
987D000
unkown
page read and write
9885000
unkown
page read and write
2380000
heap
page read and write
3797000
unkown
page read and write
4EF1000
heap
page read and write
A39B000
unkown
page read and write
7FF5ED9D9000
unkown
page readonly
7FF5ED9B8000
unkown
page readonly
7FF5ED975000
unkown
page readonly
2AF1000
trusted library allocation
page read and write
9879000
unkown
page read and write
C48000
heap
page read and write
BDD0000
unkown
page readonly
CF1000
heap
page read and write
7FF5ED986000
unkown
page readonly
37D2000
unkown
page read and write
11B0000
unkown
page readonly
37BD000
unkown
page read and write
7FF5ED77E000
unkown
page readonly
7FF5ED426000
unkown
page readonly
114A000
trusted library allocation
page execute and read and write
7FF5ED1CF000
unkown
page readonly
987F000
unkown
page read and write
7320000
trusted library section
page read and write
6CD0000
trusted library allocation
page read and write
76A0000
unkown
page read and write
5C20000
heap
page read and write
7DF4F3051000
unkown
page execute read
2DF4000
heap
page read and write
7FF5ED471000
unkown
page readonly
7FF5ED42B000
unkown
page readonly
E9ED000
stack
page read and write
7FF5ED5EB000
unkown
page readonly
7FF5ED743000
unkown
page readonly
7FF5ED7F1000
unkown
page readonly
A33E000
unkown
page read and write
16A0000
unclassified section
page execute and read and write
EAED000
stack
page read and write
A502000
unkown
page read and write
7FF5ED2A4000
unkown
page readonly
C6BF000
unkown
page read and write
33E1000
heap
page read and write
2A50000
heap
page read and write
B1ED000
stack
page read and write
50E0000
trusted library allocation
page read and write
7FFD000
stack
page read and write
7DF4F3041000
unkown
page execute read
7FF5ED818000
unkown
page readonly
C544000
unkown
page read and write
3203000
heap
page read and write
89C0000
unkown
page read and write
C30000
trusted library allocation
page read and write
7FF5ED915000
unkown
page readonly
C846000
unkown
page read and write
7FF5ED349000
unkown
page readonly
7FF5ED9A6000
unkown
page readonly
E25D000
stack
page read and write
A361000
unkown
page read and write
AF0B000
stack
page read and write
FCB4000
system
page execute and read and write
4BC1000
heap
page read and write
2730000
heap
page read and write
9E6C000
stack
page read and write
A4AE000
unkown
page read and write
7FF5ED975000
unkown
page readonly
C6F4000
unkown
page read and write
33C0000
heap
page read and write
1200000
unkown
page readonly
EAE000
stack
page read and write
7FF5ED93E000
unkown
page readonly
1480000
heap
page read and write
7FF5EDA70000
unkown
page readonly
AB49000
unkown
page read and write
9885000
unkown
page read and write
9815000
unkown
page read and write
8104000
heap
page read and write
7FF5ED692000
unkown
page readonly
91B9000
stack
page read and write
31E0000
heap
page read and write
7FF5ED97A000
unkown
page readonly
830000
trusted library allocation
page read and write
B6A0000
heap
page read and write
7FF5ED9FF000
unkown
page readonly
A29E000
stack
page read and write
7FF5ED505000
unkown
page readonly
97A000
heap
page read and write
1240000
heap
page read and write
7FF5EDA0D000
unkown
page readonly
1505000
heap
page read and write
4D7C000
heap
page read and write
C561000
unkown
page read and write
7FF5ED6A5000
unkown
page readonly
E620000
trusted library allocation
page execute and read and write
5272000
direct allocation
page execute and read and write
7FF5ED6DB000
unkown
page readonly
7FF5ED670000
unkown
page readonly
4CEE000
heap
page read and write
2D90000
heap
page read and write
978E000
unkown
page read and write
2CF5000
trusted library allocation
page read and write
4C34000
unkown
page read and write
7FF5ED8C6000
unkown
page readonly
9B5B000
stack
page read and write
50A3000
heap
page read and write
A76D000
stack
page read and write
7FF5ED986000
unkown
page readonly
A19F000
stack
page read and write
51AF000
stack
page read and write
33E5000
heap
page read and write
7FF5ED86B000
unkown
page readonly
37A8000
unkown
page read and write
8A6E000
stack
page read and write
35D0000
trusted library allocation
page read and write
CB4A000
unkown
page read and write
7FF5EDA38000
unkown
page readonly
33B4000
heap
page read and write
26F0000
heap
page execute and read and write
7FF5ED849000
unkown
page readonly
7CD0000
unkown
page read and write
231D000
stack
page read and write
7FF5ED20D000
unkown
page readonly
C563000
unkown
page read and write
2A16000
trusted library allocation
page read and write
9F7000
stack
page read and write
7FF5D1CCD000
unkown
page readonly
760000
heap
page read and write
3800000
unkown
page readonly
CBDC000
unkown
page read and write
7FF5ED7FD000
unkown
page readonly
1320000
unclassified section
page execute and read and write
1332000
heap
page read and write
9893000
unkown
page read and write
C893000
unkown
page read and write
BDD0000
unkown
page readonly
37D2000
unkown
page read and write
33B4000
heap
page read and write
EB0000
heap
page read and write
B8AB000
stack
page read and write
4C1E000
unkown
page read and write
A494000
unkown
page read and write
8000000
unkown
page read and write
FAA9000
unkown
page read and write
2AEE000
trusted library allocation
page read and write
7FF5ED779000
unkown
page readonly
9873000
unkown
page read and write
7857000
unkown
page read and write
890000
trusted library allocation
page read and write
37AE000
unkown
page read and write
4CC5000
heap
page read and write
CBA7000
unkown
page read and write
1479000
direct allocation
page execute and read and write
37F9000
unkown
page read and write
C6C1000
unkown
page read and write
87E6000
unkown
page read and write
F26000
heap
page read and write
143B000
unclassified section
page execute and read and write
2802000
trusted library allocation
page read and write
C35000
trusted library allocation
page read and write
9881000
unkown
page read and write
7FF5ED800000
unkown
page readonly
A433000
unkown
page read and write
987B000
unkown
page read and write
15B9000
direct allocation
page execute and read and write
85D000
trusted library allocation
page execute and read and write
C5A3000
unkown
page read and write
2737000
heap
page read and write
C5AA000
unkown
page read and write
9883000
unkown
page read and write
4B8B000
unkown
page read and write
A11F000
stack
page read and write
7FF5ED586000
unkown
page readonly
7FF5ED755000
unkown
page readonly
335E000
stack
page read and write
37F2000
unkown
page read and write
A4AE000
unkown
page read and write
14B0000
unkown
page readonly
C81000
heap
page read and write
37AC000
unkown
page read and write
7FF5ED7E0000
unkown
page readonly
A4B8000
unkown
page read and write
7FF5ED41C000
unkown
page readonly
37BD000
unkown
page read and write
9977000
unkown
page read and write
37A0000
unkown
page read and write
685E000
heap
page read and write
A364000
unkown
page read and write
7900000
unkown
page read and write
7FF5ED50A000
unkown
page readonly
2AF6000
trusted library allocation
page read and write
5059000
direct allocation
page execute and read and write
80AA000
heap
page read and write
1616000
direct allocation
page execute and read and write
11A0000
heap
page read and write
33DF000
heap
page read and write
7FF5ED9AE000
unkown
page readonly
35A0000
unkown
page readonly
1741000
direct allocation
page execute and read and write
844000
trusted library allocation
page read and write
7F9D0000
trusted library allocation
page execute and read and write
4B8B000
unkown
page read and write
DD3E000
stack
page read and write
748F000
stack
page read and write
2DF0000
heap
page read and write
B5AE000
stack
page read and write
78AD000
unkown
page read and write
35A0000
unkown
page readonly
8F0000
system
page execute and read and write
7D00000
unkown
page readonly
7FF5ED5C9000
unkown
page readonly
D90000
trusted library allocation
page read and write
FAD3000
unkown
page read and write
2F5A000
trusted library allocation
page read and write
379E000
unkown
page read and write
7FF5ED755000
unkown
page readonly
31F8000
heap
page read and write
317E000
stack
page read and write
37B0000
unkown
page read and write
7FF5ED62F000
unkown
page readonly
5C0E000
heap
page read and write
7FF5ED503000
unkown
page readonly
AAF9000
unkown
page read and write
9877000
unkown
page read and write
70D0000
heap
page read and write
3252000
unclassified section
page execute and read and write
17F9000
unclassified section
page execute and read and write
C6BF000
unkown
page read and write
B170000
unkown
page readonly
9E6C000
stack
page read and write
5641000
unkown
page read and write
EAF0000
trusted library allocation
page execute and read and write
1500000
heap
page read and write
7FF5ED349000
unkown
page readonly
A09C000
stack
page read and write
1240000
heap
page read and write
7FF5D1CD4000
unkown
page readonly
7FF5ED8B4000
unkown
page readonly
3330000
trusted library allocation
page read and write
1510000
unkown
page readonly
7FF5EDA53000
unkown
page readonly
FF4C000
unkown
page read and write
4C8A000
unkown
page read and write
C9AE000
unkown
page read and write
1152000
trusted library allocation
page read and write
379E000
unkown
page read and write
7FF5ED7DB000
unkown
page readonly
7FF5ED9D2000
unkown
page readonly
3173000
unkown
page read and write
3580000
unkown
page readonly
B728000
stack
page read and write
5592000
direct allocation
page execute and read and write
7D20000
unkown
page readonly
B10D000
stack
page read and write
FB54000
unkown
page read and write
FF40000
unkown
page read and write
1830000
heap
page read and write
31BF000
stack
page read and write
9CC0000
heap
page read and write
943B000
stack
page read and write
133B000
unclassified section
page execute and read and write
7FF5EDA47000
unkown
page readonly
C9CF000
unkown
page read and write
9871000
unkown
page read and write
B150000
unkown
page read and write
7863000
unkown
page read and write
7FF5ED74A000
unkown
page readonly
9D64000
unkown
page read and write
89A0000
unkown
page read and write
5250000
direct allocation
page execute and read and write
4CC0000
heap
page read and write
7FF5ED4C6000
unkown
page readonly
B6A0000
heap
page read and write
CED000
heap
page read and write
7FF5ED3DA000
unkown
page readonly
D70000
trusted library allocation
page read and write
7FF5ED68C000
unkown
page readonly
97D4000
unkown
page read and write
2DA2000
trusted library allocation
page read and write
161D000
direct allocation
page execute and read and write
E72E000
stack
page read and write
1200000
unkown
page readonly
2D00000
trusted library allocation
page read and write
7FF5ED8E2000
unkown
page readonly
7FF5ED8AC000
unkown
page readonly
7FF5ED81B000
unkown
page readonly
A323000
unkown
page read and write
C9C7000
unkown
page read and write
4FF0000
trusted library allocation
page execute and read and write
7FF5ED996000
unkown
page readonly
76A0000
unkown
page read and write
7FF5ED853000
unkown
page readonly
C9B1000
unkown
page read and write
1334000
heap
page read and write
35D0000
trusted library allocation
page read and write
7FF5ED418000
unkown
page readonly
7FF5ED939000
unkown
page readonly
4BC9000
unkown
page read and write
7FF5ED4F3000
unkown
page readonly
7FF5ED1E8000
unkown
page readonly
31C0000
heap
page read and write
7FF5EDA76000
unkown
page readonly
2B13000
heap
page read and write
7FF5ED40D000
unkown
page readonly
7FF5ED1CB000
unkown
page readonly
785F000
unkown
page read and write
7FF5ED93E000
unkown
page readonly
35D0000
unkown
page read and write
C57F000
unkown
page read and write
7FF5ED41C000
unkown
page readonly
6DC0000
trusted library allocation
page read and write
7FF5EDA76000
unkown
page readonly
7FF5ED779000
unkown
page readonly
F58000
heap
page read and write
CA1E000
unkown
page read and write
7D53000
unkown
page read and write
E86E000
stack
page read and write
56C3000
unkown
page read and write
A8AD000
stack
page read and write
3330000
trusted library allocation
page read and write
7C90000
unkown
page read and write
4B56000
unkown
page read and write
7FF5ED43A000
unkown
page readonly
7FF5ED97E000
unkown
page readonly
7FF5ED669000
unkown
page readonly
7FF5ED5CE000
unkown
page readonly
7FF5ED409000
unkown
page readonly
C89C000
unkown
page read and write
3320000
heap
page read and write
35D0000
trusted library allocation
page read and write
9A5B000
unkown
page read and write
36D0000
trusted library allocation
page read and write
7DF4F3040000
unkown
page readonly
7E60000
unkown
page read and write
6D60000
trusted library allocation
page execute and read and write
C41F000
stack
page read and write
A327000
unkown
page read and write
1376000
direct allocation
page execute and read and write
7FF5EDA08000
unkown
page readonly
A29E000
stack
page read and write
7FF5ED64F000
unkown
page readonly
37D2000
unkown
page read and write
AAF2000
unkown
page read and write
7C90000
unkown
page read and write
7FF5ED937000
unkown
page readonly
5380000
trusted library allocation
page execute and read and write
31FA000
heap
page read and write
E883000
unkown
page execute and read and write
2780000
heap
page read and write
4EF1000
heap
page read and write
FF40000
unkown
page read and write
AB56000
unkown
page read and write
B5E0000
trusted library allocation
page read and write
7FF5ED1E2000
unkown
page readonly
7FF5ED94A000
unkown
page readonly
987F000
unkown
page read and write
784A000
unkown
page read and write
7FF5ED3A7000
unkown
page readonly
88EE000
stack
page read and write
D50000
trusted library allocation
page read and write
7F40000
unkown
page readonly
7FF5ED80C000
unkown
page readonly
7E50000
unkown
page readonly
E21E000
stack
page read and write
CA75000
unkown
page read and write
9F1E000
stack
page read and write
2DF4000
heap
page read and write
C962000
unkown
page read and write
C811000
unkown
page read and write
7FF5ED933000
unkown
page readonly
2DF4000
heap
page read and write
270000
system
page execute and read and write
4BE3000
unkown
page read and write
7CE0000
unkown
page read and write
7FF5ED735000
unkown
page readonly
8730000
unkown
page read and write
4BC0000
heap
page read and write
C92D000
unkown
page read and write
BDA0000
unkown
page readonly
7FF5ED97A000
unkown
page readonly
4B78000
unkown
page read and write
5550000
heap
page read and write
721E000
stack
page read and write
7FF5ED4E8000
unkown
page readonly
1350000
direct allocation
page execute and read and write
CADC000
unkown
page read and write
3203000
heap
page read and write
7FF5ED476000
unkown
page readonly
2CF0000
trusted library allocation
page read and write
DE3E000
stack
page read and write
7A34000
unkown
page read and write
C84D000
unkown
page read and write
C10A000
stack
page read and write
E66D000
stack
page read and write
7FF5ED1E8000
unkown
page readonly
C52C000
unkown
page read and write
34E9000
stack
page read and write
AB56000
unkown
page read and write
E76E000
stack
page read and write
CB7B000
unkown
page read and write
3791000
trusted library allocation
page read and write
336F000
stack
page read and write
2FCE000
unkown
page read and write
CA7C000
unkown
page read and write
9877000
unkown
page read and write
7FF5ED660000
unkown
page readonly
AAFE000
unkown
page read and write
2710000
trusted library allocation
page execute and read and write
88EE000
stack
page read and write
7FF5ED85F000
unkown
page readonly
CE9000
heap
page read and write
2D7C000
stack
page read and write
28A0000
heap
page read and write
3203000
heap
page read and write
A0D000
system
page execute and read and write
7FF5ED46A000
unkown
page readonly
79FB000
unkown
page read and write
26E0000
trusted library allocation
page read and write
9DED000
stack
page read and write
15BD000
direct allocation
page execute and read and write
7FF5ED9D6000
unkown
page readonly
7FF5ED5F7000
unkown
page readonly
C57F000
unkown
page read and write
C893000
unkown
page read and write
C08A000
stack
page read and write
8DA0000
unkown
page read and write
750000
heap
page read and write
4EF8000
heap
page read and write
FB1B000
unkown
page read and write
8EDA000
unkown
page read and write
E0BD000
stack
page read and write
33EA000
heap
page read and write
DAE000
trusted library allocation
page read and write
7884000
unkown
page read and write
98A8000
unkown
page read and write
1440000
unkown
page read and write
C6E3000
unkown
page read and write
7FF5ED93B000
unkown
page readonly
A310000
unkown
page read and write
89A0000
unkown
page read and write
324D000
unclassified section
page execute and read and write
76C0000
unkown
page read and write
4BC1000
heap
page read and write
113E000
stack
page read and write
CA86000
unkown
page read and write
2F53000
trusted library allocation
page read and write
D3B000
stack
page read and write
8CE000
heap
page read and write
7FF5ED847000
unkown
page readonly
4C1E000
unkown
page read and write
C516000
unkown
page read and write
37B0000
trusted library allocation
page read and write
FF7E000
unkown
page read and write
DE5000
heap
page read and write
AF0C000
stack
page read and write
A21E000
stack
page read and write
10C0000
unkown
page readonly
7C80000
unkown
page read and write
7FF5ED8E7000
unkown
page readonly
7FF5ED3DA000
unkown
page readonly
3330000
trusted library allocation
page read and write
9795000
unkown
page read and write
33B4000
heap
page read and write
97E000
heap
page read and write
C4D0000
unkown
page read and write
A4FC000
unkown
page read and write
4EA5000
heap
page read and write
7F2E000
stack
page read and write
7695000
stack
page read and write
3330000
trusted library allocation
page read and write
FBD0000
system
page execute and read and write
8210000
unkown
page read and write
C9C7000
unkown
page read and write
C962000
unkown
page read and write
CB58000
unkown
page read and write
310E000
stack
page read and write
5330000
heap
page read and write
AF8D000
stack
page read and write
7FF5ED2A4000
unkown
page readonly
A4B8000
unkown
page read and write
978E000
unkown
page read and write
36D0000
trusted library allocation
page read and write
A37D000
unkown
page read and write
11A7000
heap
page read and write
8EC6000
unkown
page read and write
7FF5ED3F3000
unkown
page readonly
4EF1000
heap
page read and write
6B7E000
stack
page read and write
872000
trusted library allocation
page read and write
87D1000
unkown
page read and write
10102000
heap
page read and write
6A30000
trusted library allocation
page read and write
7FF5ED39E000
unkown
page readonly
7861000
unkown
page read and write
A391000
unkown
page read and write
7FF5EDA11000
unkown
page readonly
738E000
stack
page read and write
9869000
unkown
page read and write
5070000
trusted library allocation
page read and write
1357000
direct allocation
page execute and read and write
7FF5ED81B000
unkown
page readonly
F07B000
stack
page read and write
7FF5ED451000
unkown
page readonly
51D0000
heap
page read and write
7FF5ED956000
unkown
page readonly
D83000
heap
page read and write
3797000
unkown
page read and write
CA1A000
unkown
page read and write
C9AE000
unkown
page read and write
7FF5ED7E9000
unkown
page readonly
7FF5ED7E9000
unkown
page readonly
7FF5ED46A000
unkown
page readonly
FF60000
unkown
page read and write
50D2000
trusted library allocation
page read and write
8AA5000
heap
page read and write
3330000
trusted library allocation
page read and write
9798000
unkown
page read and write
896B000
stack
page read and write
1756000
direct allocation
page execute and read and write
7FF5ED814000
unkown
page readonly
7FF5ED342000
unkown
page readonly
31FF000
heap
page read and write
7FF5EDA47000
unkown
page readonly
80FD000
heap
page read and write
7FF5ED519000
unkown
page readonly
AB01000
unkown
page read and write
7FF5ED602000
unkown
page readonly
B728000
stack
page read and write
87BE000
stack
page read and write
7DF4F3071000
unkown
page execute read
7FF5ED4BB000
unkown
page readonly
C7C5000
unkown
page read and write
7FF5ED9AE000
unkown
page readonly
7FF5ED674000
unkown
page readonly
C50A000
unkown
page read and write
95DD000
stack
page read and write
A375000
unkown
page read and write
AAD1000
unkown
page read and write
3791000
unkown
page read and write
2730000
trusted library allocation
page read and write
79FB000
unkown
page read and write
51CC000
heap
page read and write
8B60000
unkown
page readonly
3590000
unkown
page read and write
7FF5ED670000
unkown
page readonly
27D9000
stack
page read and write
96DF000
unkown
page read and write
8210000
unkown
page read and write
7FF5ED94A000
unkown
page readonly
FB54000
unkown
page read and write
8710000
unkown
page readonly
BDA0000
unkown
page readonly
5BE0000
heap
page read and write
7FF5ED91A000
unkown
page readonly
1743000
unclassified section
page execute and read and write
800000
heap
page read and write
7FF5ED793000
unkown
page readonly
AB5F000
unkown
page read and write
3330000
trusted library allocation
page read and write
9879000
unkown
page read and write
33DF000
heap
page read and write
C9DB000
unkown
page read and write
F50000
heap
page read and write
3330000
trusted library allocation
page read and write
7FF5ED9ED000
unkown
page readonly
AB01000
unkown
page read and write
7869000
unkown
page read and write
84D000
trusted library allocation
page execute and read and write
5390000
trusted library allocation
page read and write
98A8000
unkown
page read and write
7950000
unkown
page read and write
56C3000
unkown
page read and write
7FF5ED418000
unkown
page readonly
35D0000
trusted library allocation
page read and write
7FF5ED625000
unkown
page readonly
9D64000
unkown
page read and write
3000000
trusted library allocation
page read and write
C92D000
unkown
page read and write
6CF2000
trusted library allocation
page read and write
8730000
unkown
page read and write
8108000
stack
page read and write
2BB0000
heap
page read and write
3756000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
7FF5ED42B000
unkown
page readonly
7FF5ED3A7000
unkown
page readonly
6DB0000
trusted library allocation
page read and write
2760000
heap
page read and write
7FF5ED1D6000
unkown
page readonly
C9D8000
unkown
page read and write
7FF5EDA70000
unkown
page readonly
2A6A000
trusted library allocation
page read and write
7FF5ED342000
unkown
page readonly
5555000
heap
page read and write
10100000
heap
page read and write
CB4B000
unkown
page read and write
CB24000
unkown
page read and write
7FF5ED71E000
unkown
page readonly
FA92000
unkown
page read and write
7869000
unkown
page read and write
BDC0000
unkown
page readonly
7FF5ED210000
unkown
page readonly
8208000
stack
page read and write
325C000
stack
page read and write
7FF5ED9C6000
unkown
page readonly
3758000
unkown
page read and write
7FF5ED4EF000
unkown
page readonly
33EA000
heap
page read and write
9A10000
unkown
page read and write
C9E3000
unkown
page read and write
3795000
unkown
page read and write
7FF5ED3D0000
unkown
page readonly
7FF5ED844000
unkown
page readonly
4D00000
trusted library allocation
page execute and read and write
AAF2000
unkown
page read and write
9550000
unkown
page readonly
1483000
heap
page read and write
B190000
unkown
page read and write
1014000
trusted library allocation
page read and write
7FF5ED9D9000
unkown
page readonly
9B60000
unkown
page readonly
3756000
unkown
page read and write
7FF5ED644000
unkown
page readonly
7FF5ED8E7000
unkown
page readonly
1140000
trusted library allocation
page read and write
37F9000
unkown
page read and write
7FF5ED928000
unkown
page readonly
818E000
stack
page read and write
9798000
unkown
page read and write
3590000
heap
page read and write
C5AA000
unkown
page read and write
7FF5ED697000
unkown
page readonly
CA1E000
unkown
page read and write
7DF4F3061000
unkown
page execute read
29C0000
trusted library allocation
page read and write
97A9000
unkown
page read and write
C7C5000
unkown
page read and write
EFB000
stack
page read and write
7861000
unkown
page read and write
7FF5ED73D000
unkown
page readonly
D80000
heap
page read and write
EEDE000
stack
page read and write
5590000
unkown
page write copy
35D0000
trusted library allocation
page read and write
98E3000
unkown
page read and write
7FF5ED4C6000
unkown
page readonly
3330000
trusted library allocation
page read and write
A49E000
unkown
page read and write
5241000
heap
page read and write
C54A000
unkown
page read and write
FF71000
unkown
page read and write
97D4000
unkown
page read and write
CB3D000
unkown
page read and write
4CD0000
unkown
page read and write
2CE0000
trusted library allocation
page read and write
7FF5ED660000
unkown
page readonly
97A9000
unkown
page read and write
86A000
trusted library allocation
page execute and read and write
131F000
stack
page read and write
C512000
unkown
page read and write
8EDA000
unkown
page read and write
7FF5ED451000
unkown
page readonly
7FF5ED810000
unkown
page readonly
3210000
unkown
page read and write
4EF0000
heap
page read and write
7953000
unkown
page read and write
97C3000
unkown
page read and write
786B000
unkown
page read and write
279D000
stack
page read and write
9660000
unkown
page read and write
C4E000
heap
page read and write
7E60000
unkown
page read and write
7FF5ED279000
unkown
page readonly
1013000
trusted library allocation
page execute and read and write
B150000
unkown
page read and write
CFD000
heap
page read and write
B70000
heap
page read and write
7F30000
unkown
page read and write
9798000
unkown
page read and write
579F000
unclassified section
page read and write
7FF5ED6A5000
unkown
page readonly
1923000
unclassified section
page execute and read and write
7FF5ED6BB000
unkown
page readonly
2754000
trusted library section
page readonly
A33E000
unkown
page read and write
C5A0000
unkown
page read and write
4BDC000
unkown
page read and write
7FF5ED26E000
unkown
page readonly
7FF5ED867000
unkown
page readonly
AB49000
unkown
page read and write
987B000
unkown
page read and write
33E4000
heap
page read and write
5201000
direct allocation
page execute and read and write
7FF5ED93B000
unkown
page readonly
7FF5ED68C000
unkown
page readonly
9792000
unkown
page read and write
D90000
heap
page read and write
70DE000
heap
page read and write
C4D0000
unkown
page read and write
308A000
stack
page read and write
C5A3000
unkown
page read and write
AF8D000
stack
page read and write
7FF5ED4DF000
unkown
page readonly
36D0000
trusted library allocation
page read and write
A4AB000
unkown
page read and write
9877000
unkown
page read and write
1095000
stack
page read and write
AB5F000
unkown
page read and write
3173000
unkown
page read and write
F6F4000
system
page execute and read and write
7852000
unkown
page read and write
7DF4F3030000
unkown
page readonly
5521000
direct allocation
page execute and read and write
4F27000
heap
page read and write
36D3000
stack
page read and write
33AF000
stack
page read and write
D9B000
trusted library allocation
page read and write
818E000
stack
page read and write
7FF5ED4DF000
unkown
page readonly
7FF5ED64F000
unkown
page readonly
7FF5ED92C000
unkown
page readonly
1390000
unkown
page read and write
AADB000
unkown
page read and write
9893000
unkown
page read and write
97C3000
unkown
page read and write
7FF5EDA0B000
unkown
page readonly
7F30000
unkown
page read and write
7DF4F3041000
unkown
page execute read
4CF0000
trusted library allocation
page read and write
690E000
stack
page read and write
DE7000
heap
page read and write
4BA6000
unkown
page read and write
8AF6000
heap
page read and write
2BA0000
heap
page read and write
37B0000
unkown
page read and write
C67000
heap
page read and write
7FF5ED679000
unkown
page readonly
7FF5EDA31000
unkown
page readonly
C88B000
unkown
page read and write
A364000
unkown
page read and write
9A10000
unkown
page read and write
4B50000
unkown
page read and write
97D4000
unkown
page read and write
A375000
unkown
page read and write
37A8000
unkown
page read and write
7FF5ED476000
unkown
page readonly
7FF5ED872000
unkown
page readonly
987D000
unkown
page read and write
5BD0000
heap
page read and write
7FF5ED55F000
unkown
page readonly
C6D8000
unkown
page read and write
33CA000
heap
page read and write
7FF5EDA14000
unkown
page readonly
7FF5ED847000
unkown
page readonly
A7AD000
stack
page read and write
2B20000
heap
page read and write
FCC4000
system
page execute and read and write
C9D3000
unkown
page read and write
7FF5ED71E000
unkown
page readonly
7FF5ED980000
unkown
page readonly
814E000
heap
page read and write
2EDD000
stack
page read and write
9B2000
heap
page read and write
7FF5ED9E1000
unkown
page readonly
7DDE000
stack
page read and write
C50A000
unkown
page read and write
3758000
unkown
page read and write
329C000
stack
page read and write
A11F000
stack
page read and write
DD0000
unkown
page readonly
501B000
heap
page read and write
7FF5ED4A1000
unkown
page readonly
8BE9000
stack
page read and write
7FF5ED7D6000
unkown
page readonly
7FF5ED781000
unkown
page readonly
CB7B000
unkown
page read and write
8C0000
heap
page read and write
8B12000
heap
page read and write
AB49000
unkown
page read and write
7FF5ED8FF000
unkown
page readonly
B140000
unkown
page readonly
110CF000
system
page read and write
7FF5ED286000
unkown
page readonly
1380000
unkown
page read and write
7695000
stack
page read and write
CA1A000
unkown
page read and write
7FF5EDA2A000
unkown
page readonly
EE0000
heap
page read and write
4CD0000
unkown
page read and write
133C000
heap
page read and write
C964000
unkown
page read and write
7FF5ED404000
unkown
page readonly
CA63000
unkown
page read and write
B140000
unkown
page readonly
785D000
unkown
page read and write
3330000
trusted library allocation
page read and write
7D53000
unkown
page read and write
2750000
trusted library section
page readonly
37B0000
unkown
page read and write
A50B000
unkown
page read and write
53EE000
direct allocation
page execute and read and write
7FF5ED4B0000
unkown
page readonly
2791000
trusted library allocation
page read and write
3209000
heap
page read and write
4BE3000
unkown
page read and write
1000000
trusted library allocation
page read and write
7FF5ED412000
unkown
page readonly
A379000
unkown
page read and write
CBC7000
unkown
page read and write
784A000
unkown
page read and write
336D000
stack
page read and write
7FF5ED669000
unkown
page readonly
3203000
heap
page read and write
7FF5ED7C4000
unkown
page readonly
7FF5ED516000
unkown
page readonly
965C000
stack
page read and write
2A7E000
unkown
page read and write
7FF5ED8FF000
unkown
page readonly
4C4B000
unkown
page read and write
8860000
unkown
page read and write
4C50000
unkown
page read and write
3240000
unkown
page read and write
986F000
unkown
page read and write
B5D0000
trusted library allocation
page read and write
7953000
unkown
page read and write
67D0000
heap
page read and write
7FF5EDA31000
unkown
page readonly
3330000
trusted library allocation
page read and write
FB94000
unkown
page read and write
9F1E000
stack
page read and write
7B80000
unkown
page read and write
2BC0000
heap
page read and write
7690000
trusted library allocation
page execute and read and write
A32A000
unkown
page read and write
7FF5ED7DB000
unkown
page readonly
2DF4000
heap
page read and write
7FF5ED1D6000
unkown
page readonly
79D3000
unkown
page read and write
36F0000
unkown
page readonly
C557000
unkown
page read and write
8ABF000
heap
page read and write
3D39000
trusted library allocation
page read and write
977A000
unkown
page read and write
DE0000
heap
page read and write
9873000
unkown
page read and write
37F2000
unkown
page read and write
4C34000
unkown
page read and write
1146000
trusted library allocation
page execute and read and write
7847000
unkown
page read and write
33B4000
heap
page read and write
7FF5D1CD4000
unkown
page readonly
10ED0000
unkown
page read and write
9B60000
unkown
page readonly
3748000
unkown
page read and write
6A7E000
stack
page read and write
A502000
unkown
page read and write
7FF5ED9D2000
unkown
page readonly
7DF4F3061000
unkown
page execute read
7B80000
unkown
page read and write
E61C000
stack
page read and write
33EA000
heap
page read and write
115B000
trusted library allocation
page execute and read and write
C51E000
unkown
page read and write
8FB5000
stack
page read and write
9885000
unkown
page read and write
7FF5ED556000
unkown
page readonly
7DF4F3050000
unkown
page readonly
2CFE000
stack
page read and write
C49E000
stack
page read and write
7A34000
unkown
page read and write
2DF4000
heap
page read and write
1380000
unkown
page read and write
37AE000
unkown
page read and write
3748000
unkown
page read and write
33B4000
heap
page read and write
977A000
unkown
page read and write
7FF5ED77E000
unkown
page readonly
1210000
unkown
page readonly
2DF4000
heap
page read and write
26D2000
trusted library allocation
page read and write
2B10000
heap
page read and write
987B000
unkown
page read and write
A4A1000
unkown
page read and write
505E000
stack
page read and write
DE0000
unkown
page readonly
35D0000
trusted library allocation
page read and write
4C60000
unkown
page read and write
2CD0000
trusted library allocation
page read and write
80FF000
heap
page read and write
E62E000
stack
page read and write
7FF5ED695000
unkown
page readonly
2DF4000
heap
page read and write
7EE000
stack
page read and write
8B0000
trusted library allocation
page read and write
2FD0000
heap
page read and write
11B0000
unkown
page readonly
D60000
heap
page read and write
37AC000
unkown
page read and write
3410000
heap
page read and write
3659000
stack
page read and write
7FF5ED59E000
unkown
page readonly
7FF5ED5A8000
unkown
page readonly
9CC0000
heap
page read and write
7852000
unkown
page read and write
E51C000
stack
page read and write
7FF5EDA69000
unkown
page readonly
FAD3000
unkown
page read and write
CB07000
unkown
page read and write
3800000
unkown
page readonly
4BDC000
unkown
page read and write
7FF5ED9BE000
unkown
page readonly
FA9B000
unkown
page read and write
FB1B000
unkown
page read and write
2D31000
trusted library allocation
page read and write
8F9000
stack
page read and write
C516000
unkown
page read and write
7FF5ED59E000
unkown
page readonly
1451000
unkown
page readonly
4C60000
unkown
page read and write
9879000
unkown
page read and write
131F000
stack
page read and write
B1AD000
stack
page read and write
1210000
unkown
page readonly
C561000
unkown
page read and write
7FF5ED4BB000
unkown
page readonly
1483000
heap
page read and write
551D000
direct allocation
page execute and read and write
89E0000
unkown
page read and write
979C000
unkown
page read and write
5610000
trusted library allocation
page execute and read and write
8FB5000
stack
page read and write
BDC0000
unkown
page readonly
943B000
stack
page read and write
2DBC000
stack
page read and write
C40000
heap
page read and write
7FF5ED86B000
unkown
page readonly
7FF5ED3D6000
unkown
page readonly
87B000
trusted library allocation
page execute and read and write
B8B0000
unkown
page read and write
C9CA000
unkown
page read and write
CB3D000
unkown
page read and write
9ADB000
stack
page read and write
53A0000
heap
page execute and read and write
7FF5ED793000
unkown
page readonly
7FF5ED844000
unkown
page readonly
2B90000
heap
page read and write
33B0000
heap
page read and write
4F40000
trusted library allocation
page read and write
7D0000
unkown
page readonly
986B000
unkown
page read and write
7FF5ED810000
unkown
page readonly
1500000
heap
page read and write
AAF9000
unkown
page read and write
There are 1855 hidden memdumps, click here to show them.