IOC Report
Export Shipment Documents 72335.exe

loading gif

Files

File Path
Type
Category
Malicious
Export Shipment Documents 72335.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_fe8167436d6db6c6d2c4bed5d6f2d2c06e142845_f78a65ed_688ef81c-3112-4aa5-919d-bbcba7e35c47\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE45D.tmp.dmp
Mini DuMP crash report, 17 streams, Mon Oct 28 13:13:34 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREA4A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREA8A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000012.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000013.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\Windows[2].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\parters
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Export Shipment Documents 72335.exe
"C:\Users\user\Desktop\Export Shipment Documents 72335.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Export Shipment Documents 72335.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\help.exe
"C:\Windows\SysWOW64\help.exe"
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\SysWOW64\svchost.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4084 -s 7096

URLs

Name
IP
Malicious
http://www.yzwj-she.xyzReferer:
unknown
http://www.ixiaopu.top
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13glsK-dark
unknown
https://powerpoint.office.comer
unknown
https://android.notify.windows.com/iOSA4
unknown
http://www.rilseguloseheating.shop
unknown
http://www.uiejosdarksumdauts.shop/ms84/
unknown
http://www.mployee-jkmmz.xyz/ms84/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
http://www.erform-tgap.xyzReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2C0-dark
unknown
https://www.msn.com/en-us/health/other/say-goodbye-to-the-covid-19-vaccination-card/ar-AA1hHYLu
unknown
https://www.msn.com/en-us/news/politics/judge-erupts-at-trump-s-lawyers-for-wasting-time-with-ridicu
unknown
https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
unknown
http://www.taff-ltpugj.xyzReferer:
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13D4or-dark
unknown
http://www.rilseguloseheating.shop/ms84/
unknown
http://www.unwaleheathyhibbing.cfd/ms84/
unknown
http://www.764.xyz/ms84/
unknown
http://www.elieve-nrrv.xyzReferer:
unknown
https://excel.office.com
unknown
https://www.msn.com/en-us/money/personalfinance/the-big-3-mistakes-financial-advisors-say-that-the-1
unknown
http://www.aby-qwjqlg.xyzReferer:
unknown
http://www.oco188rtp.xyz/ms84/
unknown
http://www.duxrib.xyzReferer:
unknown
http://www.oco188rtp.xyz/ms84/www.uiejosdarksumdauts.shop
unknown
http://www.outh-kejj.xyzReferer:
unknown
http://www.ikigorakos.net/ms84/
unknown
http://www.taff-ltpugj.xyz/ms84/
unknown
http://www.ridging-solutions-llc.net/ms84/
unknown
http://www.unwaleheathyhibbing.cfdReferer:
unknown
http://www.ecurity-ukgaxq.xyz/ms84/
unknown
http://www.unwaleheathyhibbing.cfd
unknown
http://www.764.xyzReferer:
unknown
http://www.elieve-nrrv.xyz
unknown
http://www.yzwj-she.xyz
unknown
http://www.vqq-national.xyz
unknown
http://www.unwaleheathyhibbing.cfd/ms84/www.oco188rtp.xyz
unknown
http://www.rilseguloseheating.shop/ms84/www.erform-tgap.xyz
unknown
https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zeal
unknown
http://www.764.xyz
unknown
http://www.uhy-key.xyz/ms84/www.ecurity-ukgaxq.xyz
unknown
http://www.5syp.xyzReferer:
unknown
http://www.microsoft.c
unknown
http://www.ixiaopu.top/ms84/www.vqq-national.xyz
unknown
https://word.office.comT;=
unknown
https://android.notify.windows.com/iOSd
unknown
http://www.duxrib.xyz/ms84/www.hlut-government.xyz
unknown
http://www.emesiartwork.netReferer:
unknown
http://www.xfetchbesnowsblacher.shop
unknown
http://www.vqq-national.xyz/ms84/
unknown
https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.erform-tgap.xyz
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13glsK
unknown
http://www.erform-tgap.xyz/ms84/
unknown
http://www.ridging-solutions-llc.net/ms84/www.uhy-key.xyz
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gAVf-dark
unknown
http://ns.adobe.c
unknown
http://www.xfetchbesnowsblacher.shop/ms84/www.5syp.xyz
unknown
http://www.taff-ltpugj.xyz/ms84/www.yzwj-she.xyz
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2C0
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
unknown
http://www.emesiartwork.net/ms84/www.risiddivinayaka.net
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.emesiartwork.net
unknown
http://www.rilseguloseheating.shopReferer:
unknown
http://www.outh-kejj.xyz
unknown
https://outlook.com
unknown
https://outlook.comng
unknown
http://www.uhy-key.xyzReferer:
unknown
http://www.aby-qwjqlg.xyz
unknown
http://www.kn510v1.top
unknown
http://www.agieworld.xyz
unknown
http://www.elieve-nrrv.xyz/ms84/
unknown
https://android.notify.windows.com/iOS
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
http://www.xcoy-product.xyz/ms84/
unknown
http://www.xfetchbesnowsblacher.shop/ms84/
unknown
http://www.oco188rtp.xyzReferer:
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA
unknown
http://www.mployee-jkmmz.xyz
unknown
https://www.msn.com/en-us/money/news/11-things-you-should-not-do-in-retirement/vi-AA1hH9Jz
unknown
http://www.risiddivinayaka.net/ms84/www.uhy-key.xyz
unknown
https://www.msn.com/en-us/sports/other/washington-state-ad-asks-ncaa-for-compassion-and-understandin
unknown
http://www.ridging-solutions-llc.netReferer:
unknown
http://www.elieve-nrrv.xyz/ms84/www.outh-kejj.xyz
unknown
http://www.duxrib.xyz/ms84/
unknown
http://www.vqq-national.xyzReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gAVf
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k-dark
unknown
http://www.5syp.xyz/ms84/
unknown
https://api.msn.com/v1/news/Feed/Windows?
unknown
http://www.vqq-national.xyz/ms84/www.xfetchbesnowsblacher.shop
unknown
https://cdn.query.prod.cms.
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.764.xyz
13.248.252.114
malicious
www.unwaleheathyhibbing.cfd
unknown
malicious
www.ikigorakos.net
unknown
malicious
www.oco188rtp.xyz
unknown
malicious
api.msn.com
unknown
malicious

IPs

IP
Domain
Country
Malicious
13.248.252.114
www.764.xyz
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR
KGLToGCSUpdatedRevision
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsStore_8wekyb3d8bbwe\ApplicationFrame\Microsoft.WindowsStore_8wekyb3d8bbwe!App
PreferredMinSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}
DriveNumber
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
TotalBytes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
FreeBytes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Blank Disc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Can Close
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Media Type
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Imapi Media State
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
IsImapiDataBurnSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
IsImapiEraseSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Live FS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Disc Label
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Set
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\BackupReminder
BackupReminderToastCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\DiskSpaceChecking
LastInstallTimeLowStorageNotify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\BackupReminder
LastTimeBackupReminderNotify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{a33c736e-61ca-11ee-8c18-806e6f6e6963}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010420
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020416
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001040C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010400
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103F8
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000303EA
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103AC
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000302AC
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
PastIconsStream
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
IconStreams
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
There are 186 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2B20000
unclassified section
page execute and read and write
malicious
3670000
unclassified section
page execute and read and write
malicious
1680000
direct allocation
page read and write
malicious
2490000
system
page execute and read and write
malicious
2B50000
trusted library allocation
page read and write
malicious
3640000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
BCF7000
heap
page read and write
7FF50331B000
unkown
page readonly
3AD1000
direct allocation
page execute and read and write
7FF5030AA000
unkown
page readonly
D189000
heap
page read and write
D2E4000
heap
page read and write
CDB0000
heap
page read and write
D642000
system
page execute and read and write
7FF5032F2000
unkown
page readonly
B67E000
heap
page read and write
980000
heap
page read and write
3F5F000
heap
page read and write
7FF502D8F000
unkown
page readonly
8BD6000
heap
page read and write
D372000
heap
page read and write
9330000
unkown
page read and write
D343000
heap
page read and write
9CF6000
unkown
page read and write
7FF502F6A000
unkown
page readonly
D300000
heap
page read and write
6ECB000
unkown
page read and write
10D75000
system
page execute and read and write
E30000
unkown
page read and write
45B0000
direct allocation
page read and write
396F000
heap
page read and write
D476000
heap
page read and write
2F54000
heap
page read and write
D0A8000
heap
page read and write
7D2C000
heap
page read and write
7D02000
heap
page read and write
C640000
trusted library allocation
page read and write
BD15000
heap
page read and write
B505000
heap
page read and write
10655000
heap
page read and write
7FF5030A3000
unkown
page readonly
D176000
heap
page read and write
7FF502E03000
unkown
page readonly
3971000
heap
page read and write
BD4C000
heap
page read and write
7B78000
heap
page read and write
7FF503055000
unkown
page readonly
7CE5000
heap
page read and write
32AF000
unclassified section
page read and write
D159000
heap
page read and write
3088000
unkown
page read and write
BC80000
unkown
page read and write
7CE5000
heap
page read and write
D232000
heap
page read and write
BE1C000
unkown
page read and write
51FF000
heap
page read and write
CF43000
heap
page read and write
7FF50316E000
unkown
page readonly
24E4000
heap
page read and write
7FF502B55000
unkown
page readonly
BDF0000
unkown
page read and write
D364000
heap
page read and write
24E4000
heap
page read and write
D4C7000
heap
page read and write
D38A000
heap
page read and write
7FF502FB4000
unkown
page readonly
D101000
heap
page read and write
D37C000
heap
page read and write
24E4000
heap
page read and write
2C50000
trusted library allocation
page execute and read and write
7D4A000
heap
page read and write
7FF502DBC000
unkown
page readonly
321F000
heap
page read and write
10729000
heap
page read and write
8BC1000
heap
page read and write
D378000
heap
page read and write
D055000
heap
page read and write
10701000
heap
page read and write
7FF502F96000
unkown
page readonly
10320000
heap
page read and write
8AF6000
heap
page read and write
D189000
heap
page read and write
E8FC000
stack
page read and write
D368000
heap
page read and write
D11C000
heap
page read and write
4C8E000
stack
page read and write
11603000
trusted library allocation
page read and write
CDD9000
heap
page read and write
7FF502D6B000
unkown
page readonly
CF0E000
heap
page read and write
964E000
stack
page read and write
115F3000
trusted library allocation
page read and write
831E000
stack
page read and write
BC78000
heap
page read and write
4431000
unkown
page read and write
6EF3000
unkown
page read and write
D0AB000
heap
page read and write
10455000
heap
page read and write
D374000
heap
page read and write
B624000
heap
page read and write
2F50000
heap
page read and write
10714000
heap
page read and write
29E1000
heap
page read and write
B613000
heap
page read and write
3FE0000
heap
page read and write
7FF502E3F000
unkown
page readonly
24E4000
heap
page read and write
7C0E000
heap
page read and write
7FF5030DE000
unkown
page readonly
D1B3000
heap
page read and write
7D3B000
heap
page read and write
BCC8000
heap
page read and write
8B5000
stack
page read and write
8B5000
stack
page read and write
C5B0000
trusted library allocation
page read and write
D06F000
heap
page read and write
7FF502C4B000
unkown
page readonly
353E000
stack
page read and write
B617000
heap
page read and write
C0FD000
stack
page read and write
105C0000
heap
page read and write
1068A000
heap
page read and write
7FF502CF5000
unkown
page readonly
103A2000
heap
page read and write
7CAB000
heap
page read and write
80C0000
unkown
page readonly
8CE1000
heap
page read and write
D4C7000
heap
page read and write
2FA0000
trusted library allocation
page read and write
D4EA000
heap
page read and write
36B0000
unclassified section
page execute and read and write
7FF5030A3000
unkown
page readonly
7FF502D04000
unkown
page readonly
10598000
heap
page read and write
D2D8000
heap
page read and write
105BF000
heap
page read and write
BEAF000
unkown
page read and write
1054E000
heap
page read and write
989E000
stack
page read and write
3935000
heap
page read and write
10392000
heap
page read and write
48EE000
direct allocation
page read and write
B617000
heap
page read and write
7FF502F9F000
unkown
page readonly
1044D000
heap
page read and write
4D00000
unkown
page write copy
7FF503051000
unkown
page readonly
7FF502F88000
unkown
page readonly
3965000
heap
page read and write
10449000
heap
page read and write
C600000
trusted library allocation
page read and write
9D58000
unkown
page read and write
FD53000
unkown
page read and write
C72A000
stack
page read and write
D180000
heap
page read and write
D2E9000
heap
page read and write
7DF411EF1000
unkown
page execute read
B62E000
heap
page read and write
B63B000
heap
page read and write
B589000
heap
page read and write
3013000
heap
page read and write
105C2000
heap
page read and write
1045F000
heap
page read and write
9BDE000
unkown
page read and write
3E29000
heap
page read and write
1070C000
heap
page read and write
7B91000
heap
page read and write
1045B000
heap
page read and write
2D0B000
stack
page read and write
D169000
heap
page read and write
B63B000
heap
page read and write
7BA0000
heap
page read and write
2CF0000
trusted library allocation
page read and write
D560000
heap
page read and write
2E89000
direct allocation
page execute and read and write
9FD0000
trusted library allocation
page read and write
B5B5000
heap
page read and write
8E4F000
stack
page read and write
E248000
stack
page read and write
B607000
heap
page read and write
8D3F000
heap
page read and write
7720000
unkown
page readonly
2800000
trusted library allocation
page read and write
7710000
unkown
page readonly
10701000
heap
page read and write
7FF502DAD000
unkown
page readonly
10587000
heap
page read and write
8D95000
heap
page read and write
D4B3000
heap
page read and write
6FDA000
unkown
page read and write
D126000
heap
page read and write
7FF502DD1000
unkown
page readonly
10729000
heap
page read and write
D0AC000
heap
page read and write
8C08000
heap
page read and write
3523000
heap
page read and write
B560000
unkown
page read and write
2D55000
heap
page read and write
D343000
heap
page read and write
10455000
heap
page read and write
8A37000
heap
page read and write
B20F000
stack
page read and write
D327000
heap
page read and write
B498000
heap
page read and write
7FF503167000
unkown
page readonly
871B000
stack
page read and write
7FF502E43000
unkown
page readonly
7FF502E53000
unkown
page readonly
B613000
heap
page read and write
C7E0000
trusted library allocation
page read and write
7BE0000
heap
page read and write
9B70000
unkown
page read and write
D36E000
heap
page read and write
89FB000
heap
page read and write
A346000
unkown
page read and write
8AF6000
heap
page read and write
10453000
heap
page read and write
1044F000
heap
page read and write
1042E000
heap
page read and write
BC9C000
heap
page read and write
C7AB000
stack
page read and write
D15E000
heap
page read and write
7FF5030A5000
unkown
page readonly
BD6C000
unkown
page read and write
7BCE000
heap
page read and write
B630000
heap
page read and write
D36A000
heap
page read and write
E4B3000
trusted library allocation
page read and write
7DF4C3511000
trusted library allocation
page execute read
7FF503161000
unkown
page readonly
7FF502B7F000
unkown
page readonly
106CC000
heap
page read and write
D1F1000
heap
page read and write
7FF503129000
unkown
page readonly
A86C000
stack
page read and write
91A7000
unkown
page read and write
7FF502F9F000
unkown
page readonly
10383000
heap
page read and write
B630000
heap
page read and write
D374000
heap
page read and write
8889000
stack
page read and write
8C7E000
heap
page read and write
4879000
direct allocation
page read and write
105B1000
heap
page read and write
24E4000
heap
page read and write
D477000
heap
page read and write
8BB3000
heap
page read and write
D3F4000
heap
page read and write
B28E000
stack
page read and write
D382000
heap
page read and write
D011000
heap
page read and write
7FF503347000
unkown
page readonly
D392000
heap
page read and write
7BF1000
heap
page read and write
B495000
heap
page read and write
AE0D000
stack
page read and write
CFC5000
heap
page read and write
3D6C000
heap
page read and write
D362000
heap
page read and write
CDF4000
heap
page read and write
CF0E000
heap
page read and write
7FF502EB7000
unkown
page readonly
8BD6000
heap
page read and write
D370000
heap
page read and write
8AF6000
heap
page read and write
D2F5000
heap
page read and write
B51E000
heap
page read and write
7FF50326B000
unkown
page readonly
B63B000
heap
page read and write
8BD6000
heap
page read and write
8BC1000
heap
page read and write
D57C000
heap
page read and write
7BD9000
heap
page read and write
8D6E000
heap
page read and write
D34F000
heap
page read and write
4AB000
unkown
page readonly
8B2B000
heap
page read and write
CF7D000
heap
page read and write
439B000
unkown
page read and write
8BEE000
heap
page read and write
7FF502F8A000
unkown
page readonly
10440000
heap
page read and write
10377000
heap
page read and write
CBAC000
stack
page read and write
BD1A000
heap
page read and write
91DE000
unkown
page read and write
7C22000
heap
page read and write
7C96000
heap
page read and write
B607000
heap
page read and write
7FF503206000
unkown
page readonly
10592000
heap
page read and write
E990000
heap
page read and write
BBE8000
unkown
page read and write
B589000
heap
page read and write
3339000
stack
page read and write
8A09000
heap
page read and write
D4BC000
heap
page read and write
2AC0000
unkown
page readonly
30CD000
unkown
page read and write
3FF1000
heap
page read and write
D2E1000
heap
page read and write
8D1A000
heap
page read and write
C01000
unkown
page read and write
C6AD000
stack
page read and write
D2F5000
heap
page read and write
7FF503126000
unkown
page readonly
D189000
heap
page read and write
1058B000
heap
page read and write
7DF4C35B1000
trusted library allocation
page execute read
29E8000
heap
page read and write
400000
unkown
page readonly
7FF50332C000
unkown
page readonly
9BE6000
unkown
page read and write
8BF0000
heap
page read and write
D35C000
heap
page read and write
8ADC000
heap
page read and write
7FF503114000
unkown
page readonly
7FF503020000
unkown
page readonly
120000
heap
page read and write
1044F000
heap
page read and write
10451000
heap
page read and write
7FF5030C9000
unkown
page readonly
7FF502CF2000
unkown
page readonly
7DF411F01000
unkown
page execute read
8B2B000
heap
page read and write
7FF503110000
unkown
page readonly
8BD0000
heap
page read and write
1045F000
heap
page read and write
D2EE000
heap
page read and write
EC90000
unkown
page execute and read and write
D04C000
heap
page read and write
C1B3000
unkown
page read and write
1059B000
heap
page read and write
C178000
unkown
page read and write
8BC9000
heap
page read and write
7FF5032A5000
unkown
page readonly
987C000
stack
page read and write
8BB3000
heap
page read and write
8100000
trusted library allocation
page read and write
8B4F000
stack
page read and write
8BDE000
heap
page read and write
D16D000
heap
page read and write
BDE0000
unkown
page read and write
D35E000
heap
page read and write
6EE6000
unkown
page read and write
4378000
unkown
page read and write
A36B000
unkown
page read and write
74C2000
unkown
page read and write
7FF502D91000
unkown
page readonly
1043D000
heap
page read and write
10372000
heap
page read and write
9DE000
stack
page read and write
6FDA000
unkown
page read and write
B607000
heap
page read and write
7A60000
unkown
page read and write
9366000
unkown
page read and write
7BD7000
heap
page read and write
BCFB000
heap
page read and write
D360000
heap
page read and write
6E99000
stack
page read and write
1059B000
heap
page read and write
B5FA000
heap
page read and write
BC19000
unkown
page read and write
9191000
unkown
page read and write
45B0000
direct allocation
page read and write
C31B000
stack
page read and write
1070C000
heap
page read and write
A3B8000
stack
page read and write
B5F0000
unkown
page readonly
7FF502F94000
unkown
page readonly
D372000
heap
page read and write
2B58000
stack
page read and write
4879000
direct allocation
page read and write
B44F000
stack
page read and write
7FF503175000
unkown
page readonly
2DE0000
unkown
page read and write
8C04000
heap
page read and write
7CE5000
heap
page read and write
7560000
unkown
page readonly
10390000
heap
page read and write
B607000
heap
page read and write
E980000
trusted library allocation
page read and write
37F0000
heap
page read and write
8A0C000
heap
page read and write
10383000
heap
page read and write
BC58000
heap
page read and write
9D0000
unkown
page read and write
C5F0000
trusted library allocation
page read and write
7FF5030C9000
unkown
page readonly
24E4000
heap
page read and write
1044D000
heap
page read and write
3002000
heap
page read and write
B33A000
stack
page read and write
C00A000
unkown
page read and write
B537000
heap
page read and write
B4EB000
heap
page read and write
7FF502D84000
unkown
page readonly
105C6000
heap
page read and write
8BC9000
heap
page read and write
2C10000
heap
page read and write
7FF502E0D000
unkown
page readonly
7FF5026FF000
unkown
page readonly
4750000
direct allocation
page read and write
51AE000
heap
page read and write
7FF502D10000
unkown
page readonly
9364000
unkown
page read and write
D2F5000
heap
page read and write
BC55000
unkown
page read and write
125000
heap
page read and write
702D000
unkown
page read and write
9B8A000
unkown
page read and write
6EE6000
unkown
page read and write
D120000
heap
page read and write
B53E000
heap
page read and write
80B0000
unkown
page read and write
52C0000
trusted library section
page read and write
B5B5000
heap
page read and write
8A37000
heap
page read and write
D376000
heap
page read and write
ECD5000
unkown
page execute and read and write
BBE8000
unkown
page read and write
D1EF000
heap
page read and write
105B1000
heap
page read and write
977E000
stack
page read and write
B555000
heap
page read and write
3973000
heap
page read and write
9BE3000
unkown
page read and write
D3DC000
heap
page read and write
8B2D000
heap
page read and write
44D0000
unkown
page read and write
D57C000
heap
page read and write
7FF4ECBF5000
unkown
page readonly
BC7F000
heap
page read and write
D3B1000
heap
page read and write
10585000
heap
page read and write
7FF503368000
unkown
page readonly
7BE0000
heap
page read and write
2880000
trusted library allocation
page read and write
2EF2000
stack
page read and write
D357000
heap
page read and write
A34D000
unkown
page read and write
D4E3000
heap
page read and write
D388000
heap
page read and write
7FF502EF7000
unkown
page readonly
B62E000
heap
page read and write
8440000
unkown
page read and write
7FF503270000
unkown
page readonly
7DF4C3581000
trusted library allocation
page execute read
11DE000
stack
page read and write
7FF5032AF000
unkown
page readonly
D2EE000
heap
page read and write
B630000
heap
page read and write
2C80000
unkown
page readonly
10451000
heap
page read and write
24E4000
heap
page read and write
8D8E000
heap
page read and write
8D4B000
heap
page read and write
800000
unkown
page readonly
8D1A000
heap
page read and write
8BC9000
heap
page read and write
2EA0000
heap
page read and write
8100000
unkown
page readonly
9A000
stack
page read and write
D362000
heap
page read and write
E4C0000
trusted library allocation
page read and write
7720000
unkown
page readonly
D32A000
heap
page read and write
D366000
heap
page read and write
B5D0000
unkown
page readonly
D13D000
heap
page read and write
7CAB000
heap
page read and write
D3D1000
heap
page read and write
9B8A000
unkown
page read and write
8BC9000
stack
page read and write
3F2B000
heap
page read and write
30A2000
direct allocation
page execute and read and write
A2B0000
trusted library allocation
page read and write
7FF502D1B000
unkown
page readonly
D05A000
heap
page read and write
B621000
heap
page read and write
7FF503365000
unkown
page readonly
B67E000
heap
page read and write
B5B5000
heap
page read and write
24E4000
heap
page read and write
7FF5032C0000
unkown
page readonly
7FF502E5E000
unkown
page readonly
10422000
heap
page read and write
30A5000
unkown
page read and write
E34E000
stack
page read and write
D38E000
heap
page read and write
DF4C000
stack
page read and write
B63B000
heap
page read and write
B51E000
heap
page read and write
9191000
unkown
page read and write
7D4C000
heap
page read and write
7FF4ECBEF000
unkown
page readonly
B617000
heap
page read and write
29D9000
stack
page read and write
D34F000
heap
page read and write
8F3D000
stack
page read and write
D32A000
heap
page read and write
7FF502FAC000
unkown
page readonly
D474000
heap
page read and write
D098000
heap
page read and write
BCFD000
heap
page read and write
45B0000
direct allocation
page read and write
10585000
heap
page read and write
BBB0000
unkown
page read and write
98FC000
stack
page read and write
D4B1000
heap
page read and write
100000
heap
page read and write
7FF502E60000
unkown
page readonly
B09B000
stack
page read and write
520F000
heap
page read and write
309D000
unkown
page read and write
10598000
heap
page read and write
7D3B000
heap
page read and write
B552000
heap
page read and write
30B6000
unclassified section
page read and write
10701000
heap
page read and write
1090000
unkown
page readonly
D308000
heap
page read and write
BFB4000
unkown
page read and write
8BD6000
heap
page read and write
8DBD000
heap
page read and write
A17000
heap
page read and write
8EBE000
stack
page read and write
7FF50335D000
unkown
page readonly
8BD2000
heap
page read and write
88AB000
stack
page read and write
28F0000
heap
page read and write
D2D8000
heap
page read and write
7FF50326B000
unkown
page readonly
8C06000
heap
page read and write
7FF5030E6000
unkown
page readonly
6ED7000
unkown
page read and write
D3BA000
heap
page read and write
104AE000
heap
page read and write
D58D000
heap
page read and write
10457000
heap
page read and write
3013000
heap
page read and write
7FF502E0A000
unkown
page readonly
D36A000
heap
page read and write
7FF50301B000
unkown
page readonly
B62E000
heap
page read and write
E980000
trusted library allocation
page read and write
B53E000
heap
page read and write
10453000
heap
page read and write
8DA9000
heap
page read and write
7FF502F22000
unkown
page readonly
D16A000
heap
page read and write
10587000
heap
page read and write
BDC7000
unkown
page read and write
2DF3000
heap
page read and write
B709000
stack
page read and write
30A5000
unkown
page read and write
10453000
heap
page read and write
A32F000
unkown
page read and write
D57E000
heap
page read and write
B549000
stack
page read and write
44D0000
unkown
page read and write
CF43000
heap
page read and write
D376000
heap
page read and write
BD4F000
heap
page read and write
1041C000
heap
page read and write
D357000
heap
page read and write
7620000
unkown
page readonly
B617000
heap
page read and write
CEC2000
heap
page read and write
D1CA000
heap
page read and write
295E000
stack
page read and write
4435000
unkown
page read and write
8BB3000
heap
page read and write
6E99000
stack
page read and write
A1F0000
heap
page read and write
1041C000
heap
page read and write
B624000
heap
page read and write
1230000
heap
page read and write
A020000
trusted library allocation
page read and write
4750000
direct allocation
page read and write
7CA4000
heap
page read and write
24E4000
heap
page read and write
8BF0000
heap
page read and write
BEA3000
unkown
page read and write
BD6C000
unkown
page read and write
8C1D000
heap
page read and write
8D46000
heap
page read and write
8B2D000
heap
page read and write
363F000
stack
page read and write
7FF503275000
unkown
page readonly
C610000
trusted library allocation
page read and write
BD48000
heap
page read and write
10440000
heap
page read and write
B50F000
heap
page read and write
7FF502EB7000
unkown
page readonly
D327000
heap
page read and write
9B83000
unkown
page read and write
105C2000
heap
page read and write
8D6E000
heap
page read and write
7550000
unkown
page read and write
D0FC000
heap
page read and write
1059B000
heap
page read and write
7FF5031BC000
unkown
page readonly
D4BC000
heap
page read and write
2F10000
unkown
page readonly
B624000
heap
page read and write
D47D000
heap
page read and write
CDD6000
heap
page read and write
7D27000
heap
page read and write
8DBD000
heap
page read and write
C1D0000
remote allocation
page read and write
BC30000
unkown
page read and write
2F20000
unkown
page readonly
C60000
unkown
page readonly
6FBF000
unkown
page read and write
BFB9000
unkown
page read and write
2D2F000
stack
page read and write
D107000
heap
page read and write
BF2E000
unkown
page read and write
BD17000
heap
page read and write
D14A000
heap
page read and write
9BF7000
unkown
page read and write
7630000
unkown
page readonly
105BF000
heap
page read and write
255A000
stack
page read and write
7FF502E8F000
unkown
page readonly
300F000
stack
page read and write
7370000
unkown
page read and write
7FF5030C4000
unkown
page readonly
8FE000
stack
page read and write
819F000
stack
page read and write
8D3E000
heap
page read and write
1037F000
heap
page read and write
FD9B000
unkown
page read and write
7FF503347000
unkown
page readonly
7BFD000
heap
page read and write
7FF502F96000
unkown
page readonly
D3D8000
heap
page read and write
9D01000
unkown
page read and write
EB9C000
unkown
page read and write
B4AF000
heap
page read and write
45B0000
direct allocation
page read and write
8A28000
heap
page read and write
E7FF000
stack
page read and write
EBF3000
unkown
page read and write
B5FA000
heap
page read and write
4402000
unkown
page read and write
7651000
unkown
page read and write
521A000
heap
page read and write
10443000
heap
page read and write
BBFA000
unkown
page read and write
D180000
heap
page read and write
BC60000
heap
page read and write
7BA0000
heap
page read and write
8C0C000
heap
page read and write
BD17000
heap
page read and write
D25F000
heap
page read and write
3205000
heap
page read and write
D378000
heap
page read and write
6EE4000
unkown
page read and write
308F000
unkown
page read and write
8AF000
stack
page read and write
482000
unkown
page readonly
8BD0000
heap
page read and write
2EF2000
stack
page read and write
7FF502DD3000
unkown
page readonly
2800000
trusted library allocation
page read and write
8D6E000
heap
page read and write
AAA0000
unkown
page readonly
3EFA000
heap
page read and write
8BF0000
heap
page read and write
D357000
heap
page read and write
B5B5000
heap
page read and write
D17F000
heap
page read and write
7FF502DC0000
unkown
page readonly
8BEC000
heap
page read and write
9B70000
unkown
page read and write
B62E000
heap
page read and write
BC08000
unkown
page read and write
936E000
unkown
page read and write
7FF5032DF000
unkown
page readonly
9C2C000
unkown
page read and write
D394000
heap
page read and write
7FF503126000
unkown
page readonly
90DA000
unkown
page read and write
7FF502E60000
unkown
page readonly
7FF5032D7000
unkown
page readonly
24E4000
heap
page read and write
D386000
heap
page read and write
7FF502D68000
unkown
page readonly
B5FA000
heap
page read and write
D31A000
heap
page read and write
BCDC000
heap
page read and write
7C89000
heap
page read and write
7FF502C8C000
unkown
page readonly
D4D4000
heap
page read and write
8C08000
heap
page read and write
2C80000
unkown
page readonly
BFB9000
unkown
page read and write
B624000
heap
page read and write
9237000
unkown
page read and write
7FF502D29000
unkown
page readonly
6ED9000
unkown
page read and write
D18C000
heap
page read and write
B556000
heap
page read and write
B519000
heap
page read and write
D654000
system
page execute and read and write
7490000
unkown
page read and write
1044D000
heap
page read and write
10466000
heap
page read and write
1044F000
heap
page read and write
CDAC000
heap
page read and write
3091000
unkown
page read and write
7FF503270000
unkown
page readonly
7BCE000
heap
page read and write
7FF502D25000
unkown
page readonly
D2F5000
heap
page read and write
D161000
heap
page read and write
7FF502B93000
unkown
page readonly
C90C000
stack
page read and write
2E50000
heap
page read and write
74B0000
unkown
page read and write
7D4A000
heap
page read and write
B555000
heap
page read and write
105A9000
heap
page read and write
D097000
heap
page read and write
7BD9000
heap
page read and write
2C04000
unkown
page read and write
B515000
heap
page read and write
105B1000
heap
page read and write
3088000
unkown
page read and write
D151000
heap
page read and write
D357000
heap
page read and write
B630000
heap
page read and write
A05B000
heap
page read and write
8BD2000
heap
page read and write
7FF5030B4000
unkown
page readonly
7FF503114000
unkown
page readonly
1042E000
heap
page read and write
3099000
unkown
page read and write
3800000
direct allocation
page execute and read and write
8D1C000
heap
page read and write
8AF6000
heap
page read and write
B607000
heap
page read and write
BC30000
unkown
page read and write
D362000
heap
page read and write
7C0E000
heap
page read and write
B54E000
heap
page read and write
D560000
heap
page read and write
7FF503326000
unkown
page readonly
D370000
heap
page read and write
7BD9000
heap
page read and write
8A91000
heap
page read and write
6F09000
unkown
page read and write
7FF502B7F000
unkown
page readonly
D1C3000
heap
page read and write
D0FC000
heap
page read and write
7FF503185000
unkown
page readonly
7FF502B6F000
unkown
page readonly
7620000
unkown
page readonly
7DF4C3590000
trusted library allocation
page readonly
D58D000
heap
page read and write
7BEA000
heap
page read and write
A16A000
heap
page read and write
D4B3000
heap
page read and write
D0E1000
heap
page read and write
8D1A000
heap
page read and write
7FF502D70000
unkown
page readonly
7FF5030AA000
unkown
page readonly
8CEB000
heap
page read and write
D4E2000
heap
page read and write
D04C000
heap
page read and write
B5B5000
heap
page read and write
80C0000
unkown
page readonly
D11C000
heap
page read and write
7FF50328F000
unkown
page readonly
105C6000
heap
page read and write
7BD9000
heap
page read and write
D37C000
heap
page read and write
1075000
stack
page read and write
7FF502C30000
unkown
page readonly
D1F1000
heap
page read and write
7FF502CDD000
unkown
page readonly
24E4000
heap
page read and write
7FF503195000
unkown
page readonly
D3BA000
heap
page read and write
B624000
heap
page read and write
9BE3000
unkown
page read and write
35A0000
stack
page read and write
D58D000
heap
page read and write
D13D000
heap
page read and write
24E4000
heap
page read and write
8C0C000
heap
page read and write
105C6000
heap
page read and write
3400000
heap
page read and write
D126000
heap
page read and write
8CDE000
heap
page read and write
7FF502E9C000
unkown
page readonly
BD58000
heap
page read and write
BDCB000
unkown
page read and write
10592000
heap
page read and write
A346000
unkown
page read and write
9050000
unkown
page read and write
29E0000
heap
page read and write
B5FA000
heap
page read and write
401000
unkown
page execute read
9D0D000
unkown
page read and write
FD14000
unkown
page read and write
7FF502F86000
unkown
page readonly
ED14000
unkown
page execute and read and write
8C02000
heap
page read and write
D05A000
heap
page read and write
8C00000
heap
page read and write
8BD8000
heap
page read and write
7DF4C3500000
trusted library allocation
page readonly
40C000
stack
page read and write
2F90000
heap
page read and write
D3AC000
heap
page read and write
7DF4C35A1000
trusted library allocation
page execute read
D57C000
heap
page read and write
B4B1000
heap
page read and write
7FF5031B7000
unkown
page readonly
7BFD000
heap
page read and write
7BD7000
heap
page read and write
D474000
heap
page read and write
E14D000
stack
page read and write
D259000
heap
page read and write
6ED9000
unkown
page read and write
819F000
stack
page read and write
D34B000
heap
page read and write
B590000
heap
page read and write
D062000
heap
page read and write
3217000
heap
page read and write
D390000
heap
page read and write
D1E2000
heap
page read and write
2F60000
heap
page read and write
8C06000
heap
page read and write
10466000
heap
page read and write
D4B1000
heap
page read and write
8A09000
heap
page read and write
2D0B000
stack
page read and write
7FF502CCE000
unkown
page readonly
2BF4000
unkown
page read and write
10587000
heap
page read and write
7FF502CD4000
unkown
page readonly
CDEC000
heap
page read and write
10451000
heap
page read and write
7630000
unkown
page readonly
105C2000
heap
page read and write
379E000
heap
page read and write
6EE1000
unkown
page read and write
D388000
heap
page read and write
D360000
heap
page read and write
7DF4C3581000
trusted library allocation
page execute read
7FF502B88000
unkown
page readonly
8A49000
stack
page read and write
B237000
stack
page read and write
7C8F000
heap
page read and write
7FF503335000
unkown
page readonly
7FF502DC8000
unkown
page readonly
D31C000
heap
page read and write
10457000
heap
page read and write
8BD8000
heap
page read and write
2800000
trusted library allocation
page read and write
8BD6000
heap
page read and write
BC21000
unkown
page read and write
B5FA000
heap
page read and write
BEE6000
unkown
page read and write
8250000
trusted library section
page readonly
7FF502FA2000
unkown
page readonly
24E4000
heap
page read and write
C1D0000
remote allocation
page read and write
7DF4C3571000
trusted library allocation
page execute read
11610000
trusted library allocation
page read and write
7F70000
unkown
page readonly
8BEE000
heap
page read and write
3929000
direct allocation
page execute and read and write
D15E000
heap
page read and write
3000000
heap
page read and write
7DF4C34E1000
trusted library allocation
page execute read
1045D000
heap
page read and write
D590000
system
page execute and read and write
10455000
heap
page read and write
B580000
unkown
page read and write
2B58000
stack
page read and write
D2E9000
heap
page read and write
7D32000
heap
page read and write
B62E000
heap
page read and write
3205000
heap
page read and write
8BDC000
heap
page read and write
10443000
heap
page read and write
B481000
heap
page read and write
7DE8000
stack
page read and write
7FF5032FE000
unkown
page readonly
BCC9000
heap
page read and write
D18E000
heap
page read and write
B2BA000
stack
page read and write
BD34000
heap
page read and write
2BC1000
trusted library allocation
page execute and read and write
7FF502F4B000
unkown
page readonly
BD00000
heap
page read and write
7FF502D25000
unkown
page readonly
44A0000
unkown
page read and write
D1BE000
heap
page read and write
1058B000
heap
page read and write
7FF50316E000
unkown
page readonly
8AF6000
heap
page read and write
E80000
heap
page read and write
3734000
unclassified section
page execute and read and write
D562000
heap
page read and write
3EFA000
heap
page read and write
96CC000
stack
page read and write
E80000
heap
page read and write
D306000
heap
page read and write
323D000
stack
page read and write
10598000
heap
page read and write
C0DE000
unkown
page read and write
A020000
trusted library allocation
page read and write
7DF411F01000
unkown
page execute read
D1F1000
heap
page read and write
BBB0000
unkown
page read and write
D35E000
heap
page read and write
D16D000
heap
page read and write
8BFC000
heap
page read and write
C04E000
unkown
page read and write
104C4000
heap
page read and write
9255000
unkown
page read and write
2EFE000
direct allocation
page execute and read and write
7D4A000
heap
page read and write
D1E6000
heap
page read and write
5760000
trusted library allocation
page read and write
BEA9000
unkown
page read and write
7FF503185000
unkown
page readonly
89D7000
heap
page read and write
1045B000
heap
page read and write
10714000
heap
page read and write
D1E4000
heap
page read and write
6EC0000
unkown
page read and write
38CF000
heap
page read and write
7FF503360000
unkown
page readonly
D364000
heap
page read and write
7FF503051000
unkown
page readonly
7C8D000
heap
page read and write
7FF502D33000
unkown
page readonly
2AA0000
unkown
page read and write
B67E000
heap
page read and write
7FF503354000
unkown
page readonly
4463000
unkown
page read and write
7FF503130000
unkown
page readonly
C633000
trusted library allocation
page read and write
8A16000
heap
page read and write
4879000
direct allocation
page read and write
BD4F000
heap
page read and write
B624000
heap
page read and write
9330000
unkown
page read and write
D1BE000
heap
page read and write
8B4000
stack
page read and write
BE99000
unkown
page read and write
BCC8000
heap
page read and write
D1C5000
heap
page read and write
D376000
heap
page read and write
10714000
heap
page read and write
BC0C000
unkown
page read and write
7FF502EBB000
unkown
page readonly
105BF000
heap
page read and write
1044F000
heap
page read and write
3200000
heap
page read and write
104C9000
heap
page read and write
10358000
heap
page read and write
BCE0000
heap
page read and write
8BC9000
heap
page read and write
46D3000
direct allocation
page read and write
BC9E000
heap
page read and write
D07F000
heap
page read and write
A34D000
unkown
page read and write
3CE1000
heap
page read and write
7FF5032BD000
unkown
page readonly
7FF502CCE000
unkown
page readonly
D055000
heap
page read and write
D468000
heap
page read and write
B617000
heap
page read and write
7FF502E03000
unkown
page readonly
BCFB000
heap
page read and write
AA8D000
stack
page read and write
BDCB000
unkown
page read and write
7DF4C3591000
trusted library allocation
page execute read
7FF5030EF000
unkown
page readonly
9D03000
unkown
page read and write
7DF4C3540000
trusted library allocation
page readonly
D259000
heap
page read and write
D3D8000
heap
page read and write
8BB9000
heap
page read and write
D180000
heap
page read and write
A7ED000
stack
page read and write
BD34000
heap
page read and write
7DF4C34E0000
trusted library allocation
page readonly
4879000
direct allocation
page read and write
1041C000
heap
page read and write
7FF502D41000
unkown
page readonly
7C93000
heap
page read and write
9C8A000
unkown
page read and write
BEF6000
unkown
page read and write
1044F000
heap
page read and write
8BDC000
heap
page read and write
1040F000
heap
page read and write
D2EE000
heap
page read and write
307E000
unkown
page read and write
8AF6000
heap
page read and write
7490000
unkown
page read and write
DD5C000
stack
page read and write
8D6E000
heap
page read and write
D468000
heap
page read and write
1004F000
system
page read and write
7FF502E5E000
unkown
page readonly
2BCE000
unkown
page read and write
1044F000
heap
page read and write
7580000
unkown
page read and write
7FF503231000
unkown
page readonly
7FF502CF2000
unkown
page readonly
5164000
heap
page read and write
7F70000
unkown
page readonly
24E4000
heap
page read and write
BC60000
heap
page read and write
8BD0000
heap
page read and write
7BE0000
heap
page read and write
10447000
heap
page read and write
7FF5032C2000
unkown
page readonly
7FF502EBB000
unkown
page readonly
8BD4000
heap
page read and write
10587000
heap
page read and write
B590000
heap
page read and write
EB90000
unkown
page read and write
C178000
stack
page read and write
8AF6000
heap
page read and write
10464000
heap
page read and write
10443000
heap
page read and write
A020000
trusted library allocation
page read and write
A388000
unkown
page read and write
7FF503110000
unkown
page readonly
B5FA000
heap
page read and write
C5E3000
trusted library allocation
page read and write
104C4000
heap
page read and write
124D000
heap
page read and write
BD48000
heap
page read and write
10729000
heap
page read and write
8ADC000
heap
page read and write
EBD2000
unkown
page read and write
11600000
trusted library allocation
page read and write
1054D000
heap
page read and write
3013000
heap
page read and write
D468000
heap
page read and write
D374000
heap
page read and write
105BF000
heap
page read and write
2D50000
heap
page read and write
BD4C000
heap
page read and write
7DF4C3591000
trusted library allocation
page execute read
2DA7000
stack
page read and write
D1C4000
heap
page read and write
B630000
heap
page read and write
7CE7000
heap
page read and write
3E44000
heap
page read and write
B1B000
heap
page read and write
7FF502291000
unkown
page readonly
7DF4C3551000
trusted library allocation
page execute read
D3DC000
heap
page read and write
1045B000
heap
page read and write
D364000
heap
page read and write
8BFA000
heap
page read and write
B505000
heap
page read and write
1045D000
heap
page read and write
7FF5030EF000
unkown
page readonly
7B73000
heap
page read and write
DD4E000
stack
page read and write
BC7B000
heap
page read and write
B67E000
heap
page read and write
BD15000
heap
page read and write
D3F4000
heap
page read and write
D06F000
heap
page read and write
A8EA000
stack
page read and write
105C6000
heap
page read and write
2A90000
unkown
page readonly
B5B5000
heap
page read and write
6ECE000
unkown
page read and write
6ECE000
unkown
page read and write
977E000
stack
page read and write
7370000
unkown
page read and write
400000
unkown
page readonly
5218000
heap
page read and write
5177000
heap
page read and write
8D3F000
heap
page read and write
1070C000
heap
page read and write
7FF503287000
unkown
page readonly
1036C000
heap
page read and write
7CAB000
heap
page read and write
10455000
heap
page read and write
D327000
heap
page read and write
7FF502FB7000
unkown
page readonly
2BA0000
heap
page read and write
24E4000
heap
page read and write
C86F000
stack
page read and write
105BF000
heap
page read and write
8AF6000
heap
page read and write
2C0E000
stack
page read and write
8C00000
heap
page read and write
7FF502D1B000
unkown
page readonly
B546000
heap
page read and write
851E000
stack
page read and write
43EA000
unkown
page read and write
24E4000
heap
page read and write
8D1C000
heap
page read and write
474000
system
page execute and read and write
105A9000
heap
page read and write
7FF503227000
unkown
page readonly
DA4D000
stack
page read and write
EBD2000
unkown
page read and write
8BEE000
heap
page read and write
7FF5030E4000
unkown
page readonly
3ACD000
direct allocation
page execute and read and write
7FF50324D000
unkown
page readonly
10356000
heap
page read and write
308F000
unkown
page read and write
8A37000
heap
page read and write
D4B3000
heap
page read and write
99FF000
stack
page read and write
3FE1000
heap
page read and write
3EFE000
stack
page read and write
B5FA000
heap
page read and write
D468000
heap
page read and write
7FF50327C000
unkown
page readonly
8C97000
heap
page read and write
8B2D000
heap
page read and write
7FF50335D000
unkown
page readonly
D0FC000
heap
page read and write
7609000
stack
page read and write
7FF503216000
unkown
page readonly
D4C7000
heap
page read and write
104C4000
heap
page read and write
E353000
trusted library allocation
page read and write
D58D000
heap
page read and write
D34F000
heap
page read and write
1045B000
heap
page read and write
3217000
heap
page read and write
1460000
trusted library allocation
page read and write
10430000
heap
page read and write
9B87000
unkown
page read and write
BB0E000
stack
page read and write
A20000
heap
page read and write
28EA000
heap
page read and write
E3B0000
trusted library allocation
page read and write
D4DB000
heap
page read and write
7FF503298000
unkown
page readonly
9193000
unkown
page read and write
D4EA000
heap
page read and write
10585000
heap
page read and write
B621000
heap
page read and write
24E4000
heap
page read and write
9D03000
unkown
page read and write
9EE000
heap
page read and write
10392000
heap
page read and write
7FF503130000
unkown
page readonly
3F5F000
heap
page read and write
7FF503235000
unkown
page readonly
1044D000
heap
page read and write
7DF411F11000
unkown
page execute read
1043D000
heap
page read and write
842A000
stack
page read and write
8BC1000
heap
page read and write
A32F000
unkown
page read and write
B515000
heap
page read and write
919C000
unkown
page read and write
BC15000
unkown
page read and write
D3AB000
heap
page read and write
7FF50302D000
unkown
page readonly
B607000
heap
page read and write
11600000
trusted library allocation
page read and write
56DF000
stack
page read and write
7BF1000
heap
page read and write
B589000
heap
page read and write
D1C5000
heap
page read and write
1029E000
stack
page read and write
B5FA000
heap
page read and write
7FF50323B000
unkown
page readonly
B580000
unkown
page read and write
D380000
heap
page read and write
7D4A000
heap
page read and write
D4BC000
heap
page read and write
7FF502D33000
unkown
page readonly
2903000
heap
page read and write
BD48000
heap
page read and write
BC52000
heap
page read and write
24E4000
heap
page read and write
105C6000
heap
page read and write
B009000
stack
page read and write
A2F0000
unkown
page read and write
10440000
heap
page read and write
A98F000
stack
page read and write
8BC1000
heap
page read and write
10587000
heap
page read and write
D300000
heap
page read and write
8C45000
heap
page read and write
11640000
trusted library allocation
page read and write
1068C000
heap
page read and write
8A69000
heap
page read and write
D4CF000
heap
page read and write
7FF502FAF000
unkown
page readonly
7FF503032000
unkown
page readonly
106CC000
heap
page read and write
24E4000
heap
page read and write
1070C000
heap
page read and write
7FF502EE3000
unkown
page readonly
7FF502FAC000
unkown
page readonly
395B000
heap
page read and write
B009000
stack
page read and write
D94D000
stack
page read and write
7FF502DC3000
unkown
page readonly
9D58000
unkown
page read and write
D166000
heap
page read and write
D13D000
heap
page read and write
2FDE000
stack
page read and write
D392000
heap
page read and write
7FF503161000
unkown
page readonly
7D3B000
heap
page read and write
8BC9000
heap
page read and write
9F1000
unkown
page readonly
A000000
trusted library allocation
page read and write
7CE5000
heap
page read and write
7FF503129000
unkown
page readonly
7FF503151000
unkown
page readonly
1044D000
heap
page read and write
AF80000
unkown
page read and write
997F000
stack
page read and write
104A3000
heap
page read and write
D2EE000
heap
page read and write
BC8B000
heap
page read and write
2800000
trusted library allocation
page read and write
B617000
heap
page read and write
D180000
heap
page read and write
1043D000
heap
page read and write
3D4D000
heap
page read and write
B613000
heap
page read and write
BA8B000
stack
page read and write
10449000
heap
page read and write
43C7000
unkown
page read and write
7FF502D91000
unkown
page readonly
8610000
unkown
page read and write
7CA4000
heap
page read and write
104D8000
heap
page read and write
7FF503257000
unkown
page readonly
D3D8000
heap
page read and write
10583000
heap
page read and write
7FF502D84000
unkown
page readonly
6EB0000
unkown
page read and write
7FF502F2C000
unkown
page readonly
7FF503189000
unkown
page readonly
6ED0000
unkown
page read and write
D392000
heap
page read and write
7FF503223000
unkown
page readonly
10583000
heap
page read and write
32B6000
stack
page read and write
1064F000
heap
page read and write
8D1A000
heap
page read and write
D191000
heap
page read and write
D189000
heap
page read and write
7FF5026F7000
unkown
page readonly
7FF502DCF000
unkown
page readonly
D560000
heap
page read and write
D14A000
heap
page read and write
4E33000
unkown
page read and write
487D000
direct allocation
page read and write
C04E000
unkown
page read and write
7FF5032CF000
unkown
page readonly
309F000
unkown
page read and write
10430000
heap
page read and write
515C000
heap
page read and write
B62E000
heap
page read and write
7FF502D61000
unkown
page readonly
2CF0000
trusted library allocation
page read and write
7FF502D9D000
unkown
page readonly
B5FA000
heap
page read and write
6FD7000
unkown
page read and write
104AE000
heap
page read and write
8922000
stack
page read and write
105A9000
heap
page read and write
7FF502DF9000
unkown
page readonly
7FF5031B7000
unkown
page readonly
BD56000
heap
page read and write
B5B5000
heap
page read and write
1040E000
heap
page read and write
91FB000
unkown
page read and write
B607000
heap
page read and write
8BEE000
heap
page read and write
1080000
heap
page read and write
7FF5030E4000
unkown
page readonly
B5B5000
heap
page read and write
BD11000
heap
page read and write
105A5000
heap
page read and write
2E1C000
heap
page read and write
10583000
heap
page read and write
30CD000
unkown
page read and write
8BB3000
heap
page read and write
575F000
stack
page read and write
D562000
heap
page read and write
7FF502D00000
unkown
page readonly
2F80000
heap
page readonly
1045D000
heap
page read and write
BCC0000
heap
page read and write
B607000
heap
page read and write
D35A000
heap
page read and write
7FF503108000
unkown
page readonly
302D000
direct allocation
page execute and read and write
7FF503277000
unkown
page readonly
309D000
unkown
page read and write
B5D0000
unkown
page readonly
7DF4C3501000
trusted library allocation
page execute read
7B70000
heap
page read and write
7FF5030E6000
unkown
page readonly
8D9C000
heap
page read and write
7D4A000
heap
page read and write
BDCD000
unkown
page read and write
10453000
heap
page read and write
3FE7000
heap
page read and write
BC08000
unkown
page read and write
CD90000
heap
page read and write
10358000
heap
page read and write
7FF502D45000
unkown
page readonly
395D000
heap
page read and write
3429000
stack
page read and write
7FF50310B000
unkown
page readonly
2E8D000
direct allocation
page execute and read and write
5760000
trusted library allocation
page read and write
B630000
heap
page read and write
7FF503187000
unkown
page readonly
A5BF000
system
page read and write
D16C000
heap
page read and write
A030000
trusted library allocation
page read and write
D32A000
heap
page read and write
2C31000
unkown
page read and write
C5B0000
trusted library allocation
page read and write
104AE000
heap
page read and write
B624000
heap
page read and write
D3A4000
heap
page read and write
10449000
heap
page read and write
7FF502F47000
unkown
page readonly
8C2F000
heap
page read and write
8460000
unkown
page readonly
7FF5032A5000
unkown
page readonly
3FE3000
heap
page execute and read and write
3E4F000
heap
page read and write
EBD4000
unkown
page read and write
A388000
unkown
page read and write
8BDC000
heap
page read and write
EBD4000
unkown
page read and write
BC5C000
unkown
page read and write
7710000
unkown
page readonly
964E000
stack
page read and write
BDF0000
unkown
page read and write
9AFF000
stack
page read and write
B549000
stack
page read and write
8D45000
stack
page read and write
7FF5032B5000
unkown
page readonly
7FF50303F000
unkown
page readonly
D2D8000
heap
page read and write
8BD6000
heap
page read and write
DE4A000
stack
page read and write
AE8E000
stack
page read and write
7FF503006000
unkown
page readonly
105BF000
heap
page read and write
B539000
heap
page read and write
4D00000
unkown
page write copy
8B2B000
heap
page read and write
CF48000
heap
page read and write
8110000
unkown
page read and write
29D9000
stack
page read and write
8A37000
heap
page read and write
D58D000
heap
page read and write
4405000
unkown
page read and write
D38C000
heap
page read and write
BC19000
unkown
page read and write
8460000
unkown
page readonly
8BB3000
heap
page read and write
7FF502D20000
unkown
page readonly
D388000
heap
page read and write
1037F000
heap
page read and write
B63B000
heap
page read and write
BB0E000
stack
page read and write
A2B0000
trusted library allocation
page read and write
7FF502D6B000
unkown
page readonly
10420000
heap
page read and write
2BDA000
stack
page read and write
8AF6000
heap
page read and write
7DF411EF0000
unkown
page readonly
3099000
unkown
page read and write
28EF000
heap
page read and write
8D1A000
heap
page read and write
8A8B000
heap
page read and write
10457000
heap
page read and write
7FF50312D000
unkown
page readonly
D36E000
heap
page read and write
BDF5000
unkown
page read and write
D4B3000
heap
page read and write
400D000
heap
page read and write
D35E000
heap
page read and write
10592000
heap
page read and write
9E0000
heap
page read and write
B5E0000
unkown
page read and write
8A8B000
heap
page read and write
3060000
heap
page read and write
7FF5031E8000
unkown
page readonly
CEC2000
heap
page read and write
B5FA000
heap
page read and write
7BFD000
heap
page read and write
9416000
unkown
page read and write
D366000
heap
page read and write
10655000
heap
page read and write
E360000
trusted library allocation
page read and write
B617000
heap
page read and write
388B000
stack
page read and write
B630000
heap
page read and write
B556000
heap
page read and write
E6EE000
stack
page read and write
93F6000
unkown
page read and write
3013000
heap
page read and write
104D8000
heap
page read and write
A34A000
unkown
page read and write
D560000
heap
page read and write
7FF502F66000
unkown
page readonly
E04F000
stack
page read and write
7FF502F22000
unkown
page readonly
3CE0000
heap
page read and write
5760000
trusted library allocation
page read and write
7FF502FAF000
unkown
page readonly
7FF50318B000
unkown
page readonly
7FF50317C000
unkown
page readonly
D3C7000
heap
page read and write
A38F000
unkown
page read and write
24E4000
heap
page read and write
B63B000
heap
page read and write
8F0000
heap
page read and write
7DF411EE1000
unkown
page execute read
BCF7000
heap
page read and write
10390000
heap
page read and write
D2FD000
heap
page read and write
28E0000
heap
page read and write
D4CF000
heap
page read and write
8600000
heap
page read and write
9BAA000
unkown
page read and write
B624000
heap
page read and write
10449000
heap
page read and write
5127000
heap
page read and write
DFCD000
stack
page read and write
BCAD000
heap
page read and write
B624000
heap
page read and write
A160000
heap
page read and write
8BC1000
heap
page read and write
A33B000
stack
page read and write
3BB8000
heap
page read and write
4AB000
unkown
page readonly
104C4000
heap
page read and write
BFAE000
unkown
page read and write
7FF50331B000
unkown
page readonly
9CEA000
unkown
page read and write
D567000
heap
page read and write
C3A0000
unkown
page readonly
7FF502D15000
unkown
page readonly
2CAA000
stack
page read and write
1045B000
heap
page read and write
51FB000
heap
page read and write
7DF4C3560000
trusted library allocation
page readonly
7CE5000
heap
page read and write
7FF502DB8000
unkown
page readonly
7610000
unkown
page readonly
30B4000
unkown
page read and write
BD4C000
heap
page read and write
6F09000
unkown
page read and write
D9CA000
stack
page read and write
7FF502E3F000
unkown
page readonly
D2F8000
heap
page read and write
9237000
unkown
page read and write
10583000
heap
page read and write
34FE000
stack
page read and write
7FF5031AD000
unkown
page readonly
490000
unkown
page write copy
B570000
unkown
page read and write
105C2000
heap
page read and write
7FF502F5F000
unkown
page readonly
3E41000
heap
page read and write
D0F8000
heap
page read and write
C600000
trusted library allocation
page read and write
B613000
heap
page read and write
D4D3000
heap
page read and write
1042E000
heap
page read and write
10598000
heap
page read and write
D4DB000
heap
page read and write
7BD4000
heap
page read and write
E85000
heap
page read and write
83AC000
stack
page read and write
105B1000
heap
page read and write
8600000
heap
page read and write
D31C000
heap
page read and write
439B000
unkown
page read and write
D13D000
heap
page read and write
7FF502C4B000
unkown
page readonly
7FF5032BD000
unkown
page readonly
1054D000
heap
page read and write
8D1A000
heap
page read and write
7C22000
heap
page read and write
7FF503231000
unkown
page readonly
10457000
heap
page read and write
940A000
stack
page read and write
7FF502CDD000
unkown
page readonly
8D0F000
heap
page read and write
7FF503187000
unkown
page readonly
D253000
heap
page read and write
9EA000
heap
page read and write
487D000
direct allocation
page read and write
7FF502FB7000
unkown
page readonly
997F000
stack
page read and write
3C01000
heap
page read and write
28E8000
heap
page read and write
9D01000
unkown
page read and write
D045000
heap
page read and write
45B0000
direct allocation
page read and write
7CA4000
heap
page read and write
7548000
stack
page read and write
D34B000
heap
page read and write
8BC9000
heap
page read and write
B621000
heap
page read and write
4370000
unkown
page read and write
2800000
trusted library allocation
page read and write
D37C000
heap
page read and write
D4EA000
heap
page read and write
7DF4C3580000
trusted library allocation
page readonly
7FF503082000
unkown
page readonly
B621000
heap
page read and write
7FF503216000
unkown
page readonly
24E4000
heap
page read and write
B621000
heap
page read and write
7B87000
heap
page read and write
E85000
heap
page read and write
10398000
heap
page read and write
7FF5031AD000
unkown
page readonly
7BEA000
heap
page read and write
8C86000
heap
page read and write
7FF502D3E000
unkown
page readonly
10729000
heap
page read and write
4435000
unkown
page read and write
7FF503010000
unkown
page readonly
52E0000
trusted library allocation
page read and write
7FF5030CE000
unkown
page readonly
9CF4000
unkown
page read and write
7FF50328F000
unkown
page readonly
2FE0000
trusted library allocation
page execute and read and write
D34B000
heap
page read and write
A040000
heap
page read and write
D38E000
heap
page read and write
10585000
heap
page read and write
7470000
unkown
page read and write
C630000
trusted library allocation
page read and write
46D3000
direct allocation
page read and write
9C09000
unkown
page read and write
80D0000
heap
page read and write
76A0000
unkown
page readonly
24E4000
heap
page read and write
8100000
unkown
page readonly
7FF502B9A000
unkown
page readonly
8BD0000
heap
page read and write
3FEF000
heap
page read and write
A21000
heap
page read and write
10440000
heap
page read and write
1054E000
heap
page read and write
7FF503239000
unkown
page readonly
D308000
heap
page read and write
10457000
heap
page read and write
B5B5000
heap
page read and write
9CEA000
unkown
page read and write
3EBB000
heap
page read and write
9366000
unkown
page read and write
391F000
heap
page read and write
43B0000
unkown
page read and write
7FF50327C000
unkown
page readonly
3BAF000
stack
page read and write
C5E0000
trusted library allocation
page read and write
90BD000
unkown
page read and write
10587000
heap
page read and write
D25F000
heap
page read and write
3010000
unkown
page read and write
4002000
heap
page read and write
D386000
heap
page read and write
1058B000
heap
page read and write
1045B000
heap
page read and write
2AA0000
unkown
page read and write
BBFA000
unkown
page read and write
3EEC000
heap
page read and write
10729000
heap
page read and write
7FF502F4B000
unkown
page readonly
D1E6000
heap
page read and write
7C92000
heap
page read and write
7FF502DB3000
unkown
page readonly
8CAD000
heap
page read and write
51E6000
heap
page read and write
1041C000
heap
page read and write
8BDE000
heap
page read and write
BE14000
unkown
page read and write
1043D000
heap
page read and write
29E1000
heap
page read and write
7FF503227000
unkown
page readonly
7FF50328B000
unkown
page readonly
7FF503167000
unkown
page readonly
2EF0000
stack
page read and write
A1EF000
stack
page read and write
ABCB000
stack
page read and write
7FF502B9A000
unkown
page readonly
B613000
heap
page read and write
D562000
heap
page read and write
36C8000
stack
page read and write
BD34000
heap
page read and write
D343000
heap
page read and write
490000
unkown
page read and write
D4E2000
heap
page read and write
39AB000
heap
page read and write
104C4000
heap
page read and write
9050000
unkown
page read and write
D308000
heap
page read and write
D1BE000
heap
page read and write
B621000
heap
page read and write
104AE000
heap
page read and write
24E4000
heap
page read and write
6EF3000
unkown
page read and write
10453000
heap
page read and write
24E4000
heap
page read and write
7FF5032EB000
unkown
page readonly
7FF502D65000
unkown
page readonly
7FF502D20000
unkown
page readonly
9D60000
unkown
page read and write
9B87000
unkown
page read and write
104C4000
heap
page read and write
E4B0000
trusted library allocation
page read and write
7D6A000
heap
page read and write
8450000
unkown
page read and write
A2F0000
unkown
page read and write
E3A0000
trusted library allocation
page read and write
B522000
heap
page read and write
4405000
unkown
page read and write
BEE6000
unkown
page read and write
C0DE000
unkown
page read and write
D15E000
heap
page read and write
C5E0000
trusted library allocation
page read and write
D3F4000
heap
page read and write
E390000
trusted library allocation
page read and write
104A8000
heap
page read and write
EBC1000
unkown
page read and write
80D0000
trusted library allocation
page read and write
3067000
unkown
page read and write
7D3B000
heap
page read and write
D4D3000
heap
page read and write
B50F000
heap
page read and write
8C04000
heap
page read and write
7FF503287000
unkown
page readonly
104AB000
heap
page read and write
795D000
stack
page read and write
D306000
heap
page read and write
1045F000
heap
page read and write
D308000
heap
page read and write
919F000
unkown
page read and write
B589000
heap
page read and write
7FF50308A000
unkown
page readonly
2C20000
heap
page read and write
7DF4C3591000
trusted library allocation
page execute read
29E1000
heap
page read and write
B617000
heap
page read and write
7FF502DC8000
unkown
page readonly
44B0000
unkown
page read and write
BD31000
heap
page read and write
7FF503206000
unkown
page readonly
D36C000
heap
page read and write
7FF5031FF000
unkown
page readonly
7FF502D70000
unkown
page readonly
8A37000
heap
page read and write
D38C000
heap
page read and write
7FF503118000
unkown
page readonly
D107000
heap
page read and write
D2E9000
heap
page read and write
8BD8000
heap
page read and write
10587000
heap
page read and write
B78F000
stack
page read and write
CE70000
heap
page read and write
8BEE000
heap
page read and write
7FF502FCD000
unkown
page readonly
D25F000
heap
page read and write
B67E000
heap
page read and write
8BDA000
heap
page read and write
7FF4ECBEF000
unkown
page readonly
2DC0000
unkown
page read and write
7FF5031DA000
unkown
page readonly
10455000
heap
page read and write
8BFA000
heap
page read and write
8BB3000
heap
page read and write
3E1A000
heap
page read and write
7DF4C3581000
trusted library allocation
page execute read
E47A000
stack
page read and write
C5E3000
trusted library allocation
page read and write
105A5000
heap
page read and write
7DF4C3580000
trusted library allocation
page readonly
7FF502DD3000
unkown
page readonly
10701000
heap
page read and write
1045D000
heap
page read and write
D378000
heap
page read and write
24E4000
heap
page read and write
BD4F000
heap
page read and write
B570000
unkown
page read and write
C07D000
stack
page read and write
7FF502DAD000
unkown
page readonly
8C10000
heap
page read and write
BEF6000
unkown
page read and write
BFEE000
unkown
page read and write
D0FC000
heap
page read and write
10714000
heap
page read and write
7FF503151000
unkown
page readonly
487D000
direct allocation
page read and write
3969000
heap
page read and write
7FF503108000
unkown
page readonly
93E000
stack
page read and write
702D000
unkown
page read and write
5161000
heap
page read and write
52B0000
trusted library section
page read and write
7FF50322D000
unkown
page readonly
B62E000
heap
page read and write
FDD4000
unkown
page read and write
2E10000
heap
page read and write
E668000
stack
page read and write
8D1A000
heap
page read and write
C0FD000
unkown
page read and write
10354000
heap
page read and write
7FF503235000
unkown
page readonly
D36C000
heap
page read and write
8B2D000
heap
page read and write
7FF503239000
unkown
page readonly
7FF5032C8000
unkown
page readonly
BD34000
heap
page read and write
7FF502D10000
unkown
page readonly
9CCF000
unkown
page read and write
7D4A000
heap
page read and write
9416000
unkown
page read and write
2DA0000
unkown
page readonly
36F5000
unclassified section
page execute and read and write
7FF4ECBF5000
unkown
page readonly
D1C5000
heap
page read and write
9C09000
unkown
page read and write
10714000
heap
page read and write
10729000
heap
page read and write
D4CF000
heap
page read and write
89F4000
heap
page read and write
8BD4000
heap
page read and write
D33F000
heap
page read and write
D332000
heap
page read and write
8BFC000
heap
page read and write
8A89000
heap
page read and write
B624000
heap
page read and write
7FF50308A000
unkown
page readonly
BC74000
heap
page read and write
950000
heap
page read and write
C43E000
stack
page read and write
7BD7000
heap
page read and write
B560000
unkown
page read and write
D30E000
heap
page read and write
2593000
heap
page read and write
7C93000
heap
page read and write
B67E000
heap
page read and write
8CEB000
heap
page read and write
9A7F000
stack
page read and write
8BF8000
heap
page read and write
8C0A000
heap
page read and write
9F1000
unkown
page readonly
10356000
heap
page read and write
105C6000
heap
page read and write
CCAA000
stack
page read and write
7FF502EE3000
unkown
page readonly
B51E000
heap
page read and write
7FF502C9D000
unkown
page readonly
8C7E000
heap
page read and write
487D000
direct allocation
page read and write
7FF502B8B000
unkown
page readonly
D38C000
heap
page read and write
6EE4000
unkown
page read and write
8DBD000
heap
page read and write
D08C000
heap
page read and write
105A5000
heap
page read and write
7FF5026FF000
unkown
page readonly
28F0000
heap
page read and write
24E4000
heap
page read and write
7FF502B88000
unkown
page readonly
396D000
heap
page read and write
EBCD000
unkown
page read and write
D370000
heap
page read and write
B09B000
stack
page read and write
7FF503006000
unkown
page readonly
BFF4000
unkown
page read and write
8602000
heap
page read and write
D16D000
heap
page read and write
CDC2000
heap
page read and write
2CE4000
heap
page read and write
8D73000
heap
page read and write
8BB3000
heap
page read and write
7FF502EC2000
unkown
page readonly
BC21000
unkown
page read and write
10372000
heap
page read and write
BD31000
heap
page read and write
B589000
heap
page read and write
4398000
unkown
page read and write
7B87000
heap
page read and write
44B000
stack
page read and write
7FF502B50000
unkown
page readonly
D1A5000
heap
page read and write
D4E2000
heap
page read and write
D380000
heap
page read and write
D3D1000
heap
page read and write
35A2000
stack
page read and write
4750000
direct allocation
page read and write
2DA0000
unkown
page readonly
A030000
trusted library allocation
page read and write
10592000
heap
page read and write
10455000
heap
page read and write
D332000
heap
page read and write
7FF5032DB000
unkown
page readonly
51B6000
heap
page read and write
B78F000
stack
page read and write
7BE0000
heap
page read and write
BC27000
unkown
page read and write
8D78000
heap
page read and write
CDA0000
heap
page read and write
9AFF000
stack
page read and write
8610000
unkown
page read and write
7C93000
heap
page read and write
2CF0000
trusted library allocation
page read and write
7D61000
heap
page read and write
8CE1000
heap
page read and write
D38E000
heap
page read and write
7FF5030FF000
unkown
page readonly
8D46000
heap
page read and write
D4CF000
heap
page read and write
AF7F000
stack
page read and write
AA0B000
stack
page read and write
8CD2000
heap
page read and write
77FE000
stack
page read and write
B613000
heap
page read and write
8D1C000
heap
page read and write
2C61000
trusted library allocation
page execute and read and write
8BF0000
heap
page read and write
7FF503087000
unkown
page readonly
3013000
heap
page read and write
7FF502EC2000
unkown
page readonly
BC9C000
heap
page read and write
B630000
heap
page read and write
8596000
unkown
page read and write
7DF4C3580000
trusted library allocation
page readonly
B5E0000
unkown
page read and write
7FF503223000
unkown
page readonly
10D87000
system
page execute and read and write
10655000
heap
page read and write
8BDE000
heap
page read and write
1045F000
heap
page read and write
D259000
heap
page read and write
1037F000
heap
page read and write
89F000
stack
page read and write
D394000
heap
page read and write
2593000
heap
page read and write
4402000
unkown
page read and write
BE96000
unkown
page read and write
8CDD000
heap
page read and write
D30E000
heap
page read and write
BD56000
heap
page read and write
24E4000
heap
page read and write
1044D000
heap
page read and write
B5FA000
heap
page read and write
A7ED000
stack
page read and write
7FF502C9D000
unkown
page readonly
E5ED000
stack
page read and write
1670000
heap
page read and write
D3A4000
heap
page read and write
7FF502E43000
unkown
page readonly
B30E000
stack
page read and write
8BF0000
heap
page read and write
10714000
heap
page read and write
B63B000
heap
page read and write
7DF411ED0000
unkown
page readonly
46D3000
direct allocation
page read and write
A14000
heap
page read and write
1045B000
heap
page read and write
BD2B000
heap
page read and write
D36C000
heap
page read and write
2800000
trusted library allocation
page read and write
1040F000
heap
page read and write
6ED000
stack
page read and write
10701000
heap
page read and write
B621000
heap
page read and write
D562000
heap
page read and write
1044D000
heap
page read and write
36A4000
unclassified section
page execute and read and write
7FF502E07000
unkown
page readonly
30AC000
unkown
page read and write
C399000
stack
page read and write
7FF502D00000
unkown
page readonly
8B2D000
heap
page read and write
D3F4000
heap
page read and write
10451000
heap
page read and write
7FF502F86000
unkown
page readonly
392D000
direct allocation
page execute and read and write
7FF50317C000
unkown
page readonly
6E15000
stack
page read and write
8C41000
heap
page read and write
309F000
unkown
page read and write
8D1C000
heap
page read and write
D35C000
heap
page read and write
EBF3000
unkown
page read and write
7FF503082000
unkown
page readonly
B4D3000
heap
page read and write
D151000
heap
page read and write
2E70000
heap
page read and write
D0AB000
heap
page read and write
104B2000
heap
page read and write
CF7D000
heap
page read and write
7BD7000
heap
page read and write
7DF411ED1000
unkown
page execute read
D644000
system
page execute and read and write
AE90000
heap
page read and write
77FE000
stack
page read and write
D2CE000
heap
page read and write
B237000
stack
page read and write
D08A000
heap
page read and write
7FF5030A5000
unkown
page readonly
6E15000
stack
page read and write
7FF502EF3000
unkown
page readonly
10440000
heap
page read and write
8A38000
heap
page read and write
B5B5000
heap
page read and write
8D7D000
heap
page read and write
B613000
heap
page read and write
B5FA000
heap
page read and write
105D7000
heap
page read and write
10443000
heap
page read and write
D13D000
heap
page read and write
BDE0000
unkown
page read and write
89F4000
heap
page read and write
D366000
heap
page read and write
43B4000
unkown
page read and write
25E0000
heap
page read and write
6ECB000
unkown
page read and write
24E4000
heap
page read and write
BDCD000
unkown
page read and write
AF80000
unkown
page read and write
106C1000
heap
page read and write
B556000
heap
page read and write
7FF502F8A000
unkown
page readonly
7CAB000
heap
page read and write
30A3000
unkown
page read and write
6FD7000
unkown
page read and write
30A3000
unkown
page read and write
B589000
heap
page read and write
D05B000
heap
page read and write
7FF502F7A000
unkown
page readonly
E87E000
stack
page read and write
7FF503368000
unkown
page readonly
10449000
heap
page read and write
919F000
unkown
page read and write
D57E000
heap
page read and write
BD11000
heap
page read and write
2D2E000
unkown
page read and write
C538000
stack
page read and write
8BC1000
heap
page read and write
9092000
unkown
page read and write
ABD0000
unkown
page read and write
7FF503333000
unkown
page readonly
1045D000
heap
page read and write
7BD4000
heap
page read and write
8D48000
stack
page read and write
105C2000
heap
page read and write
8BFE000
heap
page read and write
2A60000
unkown
page readonly
43FD000
unkown
page read and write
E30000
unkown
page read and write
7BD4000
heap
page read and write
10449000
heap
page read and write
7FF502EF7000
unkown
page readonly
BDC7000
unkown
page read and write
104D8000
heap
page read and write
E350000
trusted library allocation
page read and write
B613000
heap
page read and write
B630000
heap
page read and write
5760000
trusted library allocation
page read and write
28E5000
heap
page read and write
E0CB000
stack
page read and write
701D000
unkown
page read and write
2560000
unkown
page read and write
832A000
stack
page read and write
BCE3000
heap
page read and write
7FF502B8B000
unkown
page readonly
105A5000
heap
page read and write
D364000
heap
page read and write
8D1C000
heap
page read and write
30B4000
unkown
page read and write
4879000
direct allocation
page read and write
E50000
unkown
page readonly
2E79000
stack
page read and write
FE56000
system
page read and write
D74D000
stack
page read and write
7D4A000
heap
page read and write
9BAA000
unkown
page read and write
BEA9000
unkown
page read and write
CDCA000
heap
page read and write
B617000
heap
page read and write
BC27000
unkown
page read and write
DDCC000
stack
page read and write
D4BC000
heap
page read and write
5149000
heap
page read and write
810000
unkown
page readonly
10655000
heap
page read and write
C1D0000
remote allocation
page read and write
BDF5000
unkown
page read and write
D4B1000
heap
page read and write
10583000
heap
page read and write
E3A3000
trusted library allocation
page read and write
D18A000
heap
page read and write
3940000
heap
page read and write
C0CB000
unkown
page read and write
1041C000
heap
page read and write
BA6000
stack
page read and write
795D000
stack
page read and write
B67E000
heap
page read and write
D189000
heap
page read and write
7FF5030C4000
unkown
page readonly
8D1C000
heap
page read and write
52D0000
trusted library section
page read and write
B550000
heap
page read and write
9255000
unkown
page read and write
1037F000
heap
page read and write
4E49000
unkown
page read and write
7FF502F7A000
unkown
page readonly
B62E000
heap
page read and write
28F0000
heap
page read and write
8D73000
heap
page read and write
C1D3000
trusted library allocation
page read and write
24E4000
heap
page read and write
D4DB000
heap
page read and write
D3D8000
heap
page read and write
D0EC000
heap
page read and write
30AC000
unkown
page read and write
8BD6000
heap
page read and write
104A3000
heap
page read and write
9C2C000
unkown
page read and write
2590000
heap
page read and write
B624000
heap
page read and write
D374000
heap
page read and write
7FF503245000
unkown
page readonly
9E0000
unkown
page read and write
BEE8000
unkown
page read and write
B613000
heap
page read and write
D4B1000
heap
page read and write
D36A000
heap
page read and write
89E3000
heap
page read and write
7D3B000
heap
page read and write
A38F000
unkown
page read and write
45B0000
direct allocation
page read and write
3977000
heap
page read and write
1064C000
heap
page read and write
D264000
heap
page read and write
7D02000
heap
page read and write
104C4000
heap
page read and write
8D38000
heap
page read and write
D57C000
heap
page read and write
4DB1000
unkown
page read and write
95C4000
unkown
page read and write
7FF502C2E000
unkown
page readonly
8D1C000
heap
page read and write
9BCB000
unkown
page read and write
3525000
stack
page read and write
B63B000
heap
page read and write
8BD2000
heap
page read and write
7FF502E1A000
unkown
page readonly
7FF502F47000
unkown
page readonly
7FF503010000
unkown
page readonly
2800000
trusted library allocation
page read and write
48EE000
direct allocation
page read and write
24E4000
heap
page read and write
10583000
heap
page read and write
D3AB000
heap
page read and write
D380000
heap
page read and write
2F10000
unkown
page readonly
8AD6000
heap
page read and write
2560000
unkown
page read and write
D36E000
heap
page read and write
4398000
unkown
page read and write
7FF502D04000
unkown
page readonly
D1F1000
heap
page read and write
7FF502D15000
unkown
page readonly
D257000
heap
page read and write
A3C6000
system
page read and write
7FF502E0D000
unkown
page readonly
B617000
heap
page read and write
37AE000
stack
page read and write
1200000
heap
page read and write
918D000
unkown
page read and write
7FF5031E8000
unkown
page readonly
1485000
heap
page read and write
D3C9000
heap
page read and write
B5F0000
unkown
page readonly
8BB3000
heap
page read and write
11E0000
heap
page read and write
7FF502FA9000
unkown
page readonly
BCE4000
heap
page read and write
7FF503326000
unkown
page readonly
7DF4C3531000
trusted library allocation
page execute read
48EE000
direct allocation
page read and write
8BDA000
heap
page read and write
831E000
stack
page read and write
2D60000
direct allocation
page execute and read and write
7FF503275000
unkown
page readonly
2DF0000
unkown
page read and write
B51E000
heap
page read and write
1068A000
heap
page read and write
D05D000
heap
page read and write
7FF502C30000
unkown
page readonly
8A16000
heap
page read and write
B51E000
heap
page read and write
7FF50334D000
unkown
page readonly
8F0000
heap
page read and write
7DF4C3561000
trusted library allocation
page execute read
4431000
unkown
page read and write
7FF5030FF000
unkown
page readonly
4750000
direct allocation
page read and write
7DF4C3591000
trusted library allocation
page execute read
D386000
heap
page read and write
D17F000
heap
page read and write
7FF502D41000
unkown
page readonly
D2E9000
heap
page read and write
7FF5032F7000
unkown
page readonly
C00A000
unkown
page read and write
7CA4000
heap
page read and write
7480000
unkown
page read and write
D1F1000
heap
page read and write
2DF0000
unkown
page read and write
7FF502E62000
unkown
page readonly
7C93000
heap
page read and write
860A000
heap
page read and write
2BB0000
trusted library allocation
page execute and read and write
7DF411EE0000
unkown
page readonly
15DF000
stack
page read and write
10D77000
system
page execute and read and write
3975000
heap
page read and write
10378000
heap
page read and write
105B1000
heap
page read and write
7FF503157000
unkown
page readonly
B10E000
stack
page read and write
3086000
unkown
page read and write
D313000
heap
page read and write
7FF503195000
unkown
page readonly
ABCB000
stack
page read and write
A030000
trusted library allocation
page read and write
D13D000
heap
page read and write
B00F000
stack
page read and write
BCFD000
heap
page read and write
7DF4C3591000
trusted library allocation
page execute read
D16D000
heap
page read and write
10585000
heap
page read and write
10656000
heap
page read and write
1045F000
heap
page read and write
D1AC000
heap
page read and write
D35A000
heap
page read and write
104BC000
heap
page read and write
B607000
heap
page read and write
24E0000
heap
page read and write
9193000
unkown
page read and write
1070C000
heap
page read and write
105C6000
heap
page read and write
37B1000
trusted library allocation
page execute and read and write
7FF502B50000
unkown
page readonly
7FF5032C2000
unkown
page readonly
2CF0000
trusted library allocation
page read and write
6EC0000
unkown
page read and write
D468000
heap
page read and write
7FF502E07000
unkown
page readonly
89AA000
stack
page read and write
7FF5031FF000
unkown
page readonly
800000
unkown
page readonly
B010000
unkown
page read and write
24E4000
heap
page read and write
8BD8000
heap
page read and write
B630000
heap
page read and write
BD48000
heap
page read and write
7D1B000
heap
page read and write
7610000
unkown
page readonly
C0CB000
unkown
page read and write
E4A0000
trusted library allocation
page read and write
3670000
trusted library allocation
page read and write
B3AB000
stack
page read and write
1064C000
heap
page read and write
D264000
heap
page read and write
7840000
unkown
page read and write
D472000
heap
page read and write
7DF411EF1000
unkown
page execute read
7BF1000
heap
page read and write
D257000
heap
page read and write
A38A000
unkown
page read and write
D011000
heap
page read and write
38B0000
heap
page read and write
D071000
heap
page read and write
9450000
unkown
page readonly
10451000
heap
page read and write
99FF000
stack
page read and write
51DA000
heap
page read and write
1043D000
heap
page read and write
10D20000
system
page execute and read and write
D58D000
heap
page read and write
D38A000
heap
page read and write
B621000
heap
page read and write
7FF502D48000
unkown
page readonly
2800000
trusted library allocation
page read and write
2590000
heap
page read and write
B62E000
heap
page read and write
1045F000
heap
page read and write
8A16000
heap
page read and write
D189000
heap
page read and write
B63B000
heap
page read and write
7FF502DC0000
unkown
page readonly
BC48000
heap
page read and write
B62E000
heap
page read and write
7BCE000
heap
page read and write
105C6000
heap
page read and write
3600000
heap
page read and write
105AA000
heap
page read and write
7FF5032B5000
unkown
page readonly
1042E000
heap
page read and write
D3F9000
heap
page read and write
7FF503157000
unkown
page readonly
30A1000
unkown
page read and write
3013000
heap
page read and write
7FF502FA9000
unkown
page readonly
BC8E000
heap
page read and write
D330000
heap
page read and write
7FF502DB8000
unkown
page readonly
E90000
unkown
page readonly
7FF5032AF000
unkown
page readonly
E3CF000
stack
page read and write
7FF5031C3000
unkown
page readonly
7FF502DCF000
unkown
page readonly
91FB000
unkown
page read and write
10585000
heap
page read and write
10451000
heap
page read and write
2DB0000
unkown
page read and write
7470000
unkown
page read and write
97F9000
stack
page read and write
BD31000
heap
page read and write
1058B000
heap
page read and write
7D3E000
heap
page read and write
7FF503087000
unkown
page readonly
C7E0000
trusted library allocation
page read and write
104B2000
heap
page read and write
89D7000
heap
page read and write
7FF503257000
unkown
page readonly
6F0F000
unkown
page read and write
D366000
heap
page read and write
1054D000
heap
page read and write
2D2E000
stack
page read and write
D0E0000
heap
page read and write
89C2000
heap
page read and write
D3BC000
heap
page read and write
D0B2000
heap
page read and write
D392000
heap
page read and write
BF2E000
unkown
page read and write
9A7F000
stack
page read and write
103A3000
heap
page read and write
BF7A000
unkown
page read and write
7DF411ED0000
unkown
page readonly
7FF5031DA000
unkown
page readonly
43B4000
unkown
page read and write
B67E000
heap
page read and write
D313000
heap
page read and write
B63B000
heap
page read and write
8BDC000
heap
page read and write
6FE3000
unkown
page read and write
7DF4C35A0000
trusted library allocation
page readonly
D84D000
stack
page read and write
7FF50302D000
unkown
page readonly
D2F5000
heap
page read and write
7FF502B53000
unkown
page readonly
105D1000
heap
page read and write
C090000
unkown
page read and write
B1B000
heap
page read and write
A36B000
unkown
page read and write
A21000
heap
page read and write
7FF5030B4000
unkown
page readonly
7DF4C35C1000
trusted library allocation
page execute read
2E79000
stack
page read and write
A8EA000
stack
page read and write
D189000
heap
page read and write
104A8000
heap
page read and write
10449000
heap
page read and write
7FF502E0A000
unkown
page readonly
7FF503189000
unkown
page readonly
9BCB000
unkown
page read and write
EBC1000
unkown
page read and write
10440000
heap
page read and write
43C7000
unkown
page read and write
BC92000
heap
page read and write
7FF502E8F000
unkown
page readonly
7FF50312D000
unkown
page readonly
9C8A000
unkown
page read and write
7BFD000
heap
page read and write
D560000
heap
page read and write
295E000
stack
page read and write
BFB4000
unkown
page read and write
24E4000
heap
page read and write
3EBD000
stack
page read and write
7FF503298000
unkown
page readonly
D2EE000
heap
page read and write
D23B000
heap
page read and write
B63B000
heap
page read and write
3082000
unkown
page read and write
E97B000
stack
page read and write
9D54000
unkown
page read and write
A033000
trusted library allocation
page read and write
7CAB000
heap
page read and write
7FF502EC9000
unkown
page readonly
D669000
system
page execute and read and write
D1B5000
heap
page read and write
821B000
stack
page read and write
105BB000
heap
page read and write
8CEB000
heap
page read and write
B607000
heap
page read and write
A020000
trusted library allocation
page read and write
79DD000
stack
page read and write
D2E9000
heap
page read and write
D17F000
heap
page read and write
10457000
heap
page read and write
9FE0000
heap
page read and write
D15E000
heap
page read and write
7FF502D65000
unkown
page readonly
B589000
heap
page read and write
9CCF000
unkown
page read and write
D2F8000
heap
page read and write
3EDF000
heap
page read and write
D240000
heap
page read and write
7BEA000
heap
page read and write
46D3000
direct allocation
page read and write
7DF411EF0000
unkown
page readonly
8CD2000
heap
page read and write
D4C7000
heap
page read and write
7840000
unkown
page read and write
7FF502D45000
unkown
page readonly
10585000
heap
page read and write
7FF5032EE000
unkown
page readonly
D13D000
heap
page read and write
D33F000
heap
page read and write
6ED0000
unkown
page read and write
9BE6000
unkown
page read and write
105C2000
heap
page read and write
8BC9000
heap
page read and write
BC0C000
unkown
page read and write
8AF6000
heap
page read and write
D159000
heap
page read and write
D1C5000
heap
page read and write
7FF503333000
unkown
page readonly
D11C000
heap
page read and write
307E000
unkown
page read and write
D390000
heap
page read and write
8A98000
heap
page read and write
1059B000
heap
page read and write
93F6000
unkown
page read and write
A38A000
unkown
page read and write
B556000
heap
page read and write
D0E6000
heap
page read and write
B630000
heap
page read and write
7EC000
stack
page read and write
B4AD000
heap
page read and write
8A16000
heap
page read and write
4A7000
unkown
page read and write
7CAB000
heap
page read and write
7DF4C34D1000
trusted library allocation
page execute read
7FF50331F000
unkown
page readonly
1058B000
heap
page read and write
9D0000
unkown
page read and write
7FF503245000
unkown
page readonly
7FF502DC3000
unkown
page readonly
8BD4000
heap
page read and write
BDD5000
unkown
page read and write
482000
unkown
page readonly
BC57000
heap
page read and write
7FF50301B000
unkown
page readonly
6ED7000
unkown
page read and write
7609000
stack
page read and write
7BEA000
heap
page read and write
BC5C000
unkown
page read and write
3065000
heap
page read and write
7FF502F94000
unkown
page readonly
DECD000
stack
page read and write
918D000
unkown
page read and write
8D6E000
heap
page read and write
5204000
heap
page read and write
A20000
heap
page read and write
7DF4C3520000
trusted library allocation
page readonly
7DF4C35D1000
trusted library allocation
page execute read
D35C000
heap
page read and write
7FF503365000
unkown
page readonly
9FD3000
trusted library allocation
page read and write
7FF5030D9000
unkown
page readonly
EBDC000
unkown
page read and write
9D54000
unkown
page read and write
C1E0000
trusted library allocation
page read and write
CC2E000
stack
page read and write
8BD6000
heap
page read and write
8D7F000
heap
page read and write
7FF503354000
unkown
page readonly
7FF50334D000
unkown
page readonly
D372000
heap
page read and write
4463000
unkown
page read and write
8D1A000
heap
page read and write
10443000
heap
page read and write
24E4000
heap
page read and write
91DE000
unkown
page read and write
7FF502D9D000
unkown
page readonly
B67E000
heap
page read and write
8A37000
heap
page read and write
A140000
trusted library allocation
page read and write
D32A000
heap
page read and write
7DF411ED1000
unkown
page execute read
7CA4000
heap
page read and write
C60000
unkown
page readonly
7FF5032CF000
unkown
page readonly
B613000
heap
page read and write
96CC000
stack
page read and write
B607000
heap
page read and write
8DA9000
heap
page read and write
106C0000
heap
page read and write
C1D0000
trusted library allocation
page read and write
862B000
stack
page read and write
BD2F000
heap
page read and write
B589000
heap
page read and write
B613000
heap
page read and write
BD56000
heap
page read and write
D368000
heap
page read and write
7FF5030DE000
unkown
page readonly
105B1000
heap
page read and write
8BC1000
heap
page read and write
8D3F000
heap
page read and write
8A16000
heap
page read and write
E2CB000
stack
page read and write
8BFE000
heap
page read and write
106C0000
heap
page read and write
8E0000
unkown
page readonly
10701000
heap
page read and write
BF7A000
unkown
page read and write
8D46000
heap
page read and write
7FF502D18000
unkown
page readonly
2BDA000
stack
page read and write
B33A000
stack
page read and write
BFAE000
unkown
page read and write
7B87000
heap
page read and write
BDA9000
unkown
page read and write
8A24000
heap
page read and write
7FF502D8F000
unkown
page readonly
8BD0000
heap
page read and write
10360000
heap
page read and write
AAA0000
unkown
page readonly
D13E000
heap
page read and write
B621000
heap
page read and write
D382000
heap
page read and write
76A0000
unkown
page readonly
BDA9000
unkown
page read and write
A033000
trusted library allocation
page read and write
B617000
heap
page read and write
7FF5032F2000
unkown
page readonly
CD6D000
stack
page read and write
2C0C000
unkown
page read and write
7FF502FA2000
unkown
page readonly
24E4000
heap
page read and write
7FF502CD4000
unkown
page readonly
D36E000
heap
page read and write
B62E000
heap
page read and write
8BDA000
heap
page read and write
D394000
heap
page read and write
7FF502B93000
unkown
page readonly
B589000
heap
page read and write
10457000
heap
page read and write
7FF503360000
unkown
page readonly
3948000
heap
page read and write
10372000
heap
page read and write
3DE0000
heap
page read and write
B589000
heap
page read and write
A140000
trusted library allocation
page read and write
7FF502D61000
unkown
page readonly
24E4000
heap
page read and write
9BDE000
unkown
page read and write
3E2D000
heap
page read and write
D4D3000
heap
page read and write
24E4000
heap
page read and write
C5C0000
heap
page readonly
7FF502D3E000
unkown
page readonly
5760000
trusted library allocation
page read and write
8A11000
heap
page read and write
7FF502E1A000
unkown
page readonly
1059D000
heap
page read and write
CDBF000
heap
page read and write
7D0B000
heap
page read and write
8A35000
heap
page read and write
A38D000
unkown
page read and write
9CF2000
unkown
page read and write
D573000
heap
page read and write
D372000
heap
page read and write
3301000
heap
page read and write
46D3000
direct allocation
page read and write
4750000
direct allocation
page read and write
7FF502E62000
unkown
page readonly
EB90000
unkown
page read and write
2A60000
unkown
page readonly
8BB3000
heap
page read and write
7FF5031B0000
unkown
page readonly
7C0E000
heap
page read and write
8CA2000
heap
page read and write
BD56000
heap
page read and write
396B000
heap
page read and write
9CF2000
unkown
page read and write
372D000
heap
page read and write
B4EF000
heap
page read and write
7FF503335000
unkown
page readonly
8889000
stack
page read and write
701D000
unkown
page read and write
11D9000
stack
page read and write
106CC000
heap
page read and write
7FF50310B000
unkown
page readonly
D1F1000
heap
page read and write
43AC000
unkown
page read and write
1058B000
heap
page read and write
CFC5000
heap
page read and write
D2D8000
heap
page read and write
7FF5032DB000
unkown
page readonly
C620000
heap
page read and write
9312000
unkown
page read and write
2B0B000
heap
page read and write
E390000
trusted library allocation
page read and write
9D6B000
unkown
page read and write
10587000
heap
page read and write
2CE0000
heap
page read and write
D18A000
heap
page read and write
7C93000
heap
page read and write
919C000
unkown
page read and write
D360000
heap
page read and write
30A1000
unkown
page read and write
3FE1000
heap
page read and write
D4DB000
heap
page read and write
8BC1000
heap
page read and write
D13D000
heap
page read and write
2DC0000
unkown
page read and write
7FF503032000
unkown
page readonly
7D3E000
heap
page read and write
110000
heap
page read and write
2A90000
unkown
page readonly
CF80000
heap
page read and write
7FF50303F000
unkown
page readonly
8C97000
heap
page read and write
8B13000
heap
page read and write
7FF50270A000
unkown
page readonly
105C3000
heap
page read and write
821B000
stack
page read and write
48EE000
direct allocation
page read and write
9D6B000
unkown
page read and write
7FF502CFA000
unkown
page readonly
4370000
unkown
page read and write
D223000
heap
page read and write
8A98000
heap
page read and write
D180000
heap
page read and write
9D0D000
unkown
page read and write
A98F000
stack
page read and write
3086000
unkown
page read and write
C0FD000
unkown
page read and write
104B2000
heap
page read and write
470000
system
page execute and read and write
1041C000
heap
page read and write
8BD2000
heap
page read and write
CE75000
heap
page read and write
D327000
heap
page read and write
7FF5032C8000
unkown
page readonly
2AB0000
heap
page read and write
B515000
heap
page read and write
D16D000
heap
page read and write
487D000
direct allocation
page read and write
D394000
heap
page read and write
520B000
heap
page read and write
B5B5000
heap
page read and write
CF80000
heap
page read and write
D8CD000
stack
page read and write
24E4000
heap
page read and write
7B93000
heap
page read and write
5215000
heap
page read and write
105D1000
heap
page read and write
D378000
heap
page read and write
7D3E000
heap
page read and write
BA6000
stack
page read and write
1070C000
heap
page read and write
8BC9000
stack
page read and write
C4BB000
stack
page read and write
D35A000
heap
page read and write
B5A1000
unkown
page read and write
E3CF000
stack
page read and write
24E4000
heap
page read and write
2DB0000
unkown
page read and write
1045D000
heap
page read and write
8BDA000
heap
page read and write
7FF50331F000
unkown
page readonly
7BC5000
heap
page read and write
BCAE000
heap
page read and write
D065000
heap
page read and write
B62E000
heap
page read and write
D38A000
heap
page read and write
7B78000
heap
page read and write
7FF502F6A000
unkown
page readonly
B4DA000
heap
page read and write
7DF411EE0000
unkown
page readonly
10383000
heap
page read and write
7FF502FCD000
unkown
page readonly
48EE000
direct allocation
page read and write
B08E000
stack
page read and write
C570000
trusted library allocation
page read and write
105C6000
heap
page read and write
2EF0000
stack
page read and write
2CF0000
trusted library allocation
page read and write
B550000
heap
page read and write
104B9000
heap
page read and write
D13D000
heap
page read and write
A020000
trusted library allocation
page read and write
B617000
heap
page read and write
80E0000
trusted library allocation
page read and write
8D38000
heap
page read and write
C600000
trusted library allocation
page read and write
7A58000
stack
page read and write
BD37000
heap
page read and write
8C5A000
heap
page read and write
D35E000
heap
page read and write
AB4E000
stack
page read and write
1064F000
heap
page read and write
7FF5030D9000
unkown
page readonly
1058B000
heap
page read and write
D189000
heap
page read and write
3010000
unkown
page read and write
2C70000
unkown
page readonly
1043D000
heap
page read and write
34A8000
stack
page read and write
7FFB000
stack
page read and write
8A49000
stack
page read and write
3082000
unkown
page read and write
10642000
heap
page read and write
8BD6000
heap
page read and write
D382000
heap
page read and write
9BF7000
unkown
page read and write
7548000
stack
page read and write
7FF5031C3000
unkown
page readonly
D05E000
heap
page read and write
7FF5032FE000
unkown
page readonly
10585000
heap
page read and write
7FF503175000
unkown
page readonly
2500000
heap
page read and write
43B0000
unkown
page read and write
7BC0000
heap
page read and write
7FF50323B000
unkown
page readonly
B67E000
heap
page read and write
76E0000
unkown
page readonly
BE96000
unkown
page read and write
FE50000
unkown
page read and write
B1BF000
stack
page read and write
7BD4000
heap
page read and write
7FF5032EB000
unkown
page readonly
76E0000
unkown
page readonly
7FF502D18000
unkown
page readonly
8BC9000
heap
page read and write
B621000
heap
page read and write
7FF50270A000
unkown
page readonly
D58E000
heap
page read and write
3729000
heap
page read and write
D368000
heap
page read and write
24E4000
heap
page read and write
BEAF000
unkown
page read and write
D4DB000
heap
page read and write
3967000
heap
page read and write
A162000
heap
page read and write
37A0000
trusted library allocation
page execute and read and write
7FF502EF3000
unkown
page readonly
D562000
heap
page read and write
3067000
unkown
page read and write
9450000
unkown
page readonly
2800000
trusted library allocation
page read and write
8A38000
heap
page read and write
A34A000
unkown
page read and write
115F0000
trusted library allocation
page read and write
24E4000
heap
page read and write
D370000
heap
page read and write
98FB000
stack
page read and write
B556000
heap
page read and write
7FF502B53000
unkown
page readonly
1043D000
heap
page read and write
7DF411F11000
unkown
page execute read
9364000
unkown
page read and write
7FF5032DF000
unkown
page readonly
BDD5000
unkown
page read and write
C1AB000
unkown
page read and write
3FE4000
heap
page read and write
BC54000
heap
page read and write
8E39000
stack
page read and write
BCAD000
heap
page read and write
B621000
heap
page read and write
5120000
heap
page read and write
AE92000
heap
page read and write
B630000
heap
page read and write
D3DC000
heap
page read and write
7BE2000
heap
page read and write
8A16000
heap
page read and write
829B000
stack
page read and write
D2F5000
heap
page read and write
B607000
heap
page read and write
87AA000
stack
page read and write
B556000
heap
page read and write
BD4C000
heap
page read and write
936E000
unkown
page read and write
BEA3000
unkown
page read and write
7FF502E9C000
unkown
page readonly
8CD3000
heap
page read and write
8BD2000
heap
page read and write
2AC0000
unkown
page readonly
E90000
unkown
page readonly
AA0B000
stack
page read and write
860A000
heap
page read and write
A020000
trusted library allocation
page read and write
3212000
heap
page read and write
D300000
heap
page read and write
D376000
heap
page read and write
10443000
heap
page read and write
D36C000
heap
page read and write
D330000
heap
page read and write
105B1000
heap
page read and write
D16D000
heap
page read and write
7FF502E53000
unkown
page readonly
2800000
trusted library allocation
page read and write
105BF000
heap
page read and write
BE99000
unkown
page read and write
BE1C000
unkown
page read and write
7FF503020000
unkown
page readonly
FE14000
unkown
page read and write
1068C000
heap
page read and write
104B2000
heap
page read and write
7DF411EE1000
unkown
page execute read
7FF503055000
unkown
page readonly
D386000
heap
page read and write
7D3E000
heap
page read and write
10729000
heap
page read and write
395F000
heap
page read and write
51E6000
heap
page read and write
7FF502C8C000
unkown
page readonly
7BE2000
heap
page read and write
8C97000
heap
page read and write
487D000
direct allocation
page read and write
D368000
heap
page read and write
B63B000
heap
page read and write
7FF50322D000
unkown
page readonly
399E000
direct allocation
page execute and read and write
89F4000
heap
page read and write
BFEE000
unkown
page read and write
7FF5032D7000
unkown
page readonly
7FF502B6F000
unkown
page readonly
3963000
heap
page read and write
7FF502EC9000
unkown
page readonly
8A91000
heap
page read and write
E56B000
stack
page read and write
2E3B000
stack
page read and write
D38E000
heap
page read and write
43ED000
heap
page read and write
7FF502DF9000
unkown
page readonly
BA8B000
stack
page read and write
A86E000
stack
page read and write
6FE3000
unkown
page read and write
97F9000
stack
page read and write
8D40000
heap
page read and write
24E4000
heap
page read and write
7C22000
heap
page read and write
B555000
heap
page read and write
7FF502DBC000
unkown
page readonly
3031000
direct allocation
page execute and read and write
E1C8000
stack
page read and write
10451000
heap
page read and write
BC55000
unkown
page read and write
362A000
stack
page read and write
D4B3000
heap
page read and write
7FF502D68000
unkown
page readonly
91A7000
unkown
page read and write
3091000
unkown
page read and write
D388000
heap
page read and write
8A38000
heap
page read and write
48EE000
direct allocation
page read and write
571E000
stack
page read and write
3013000
heap
page read and write
105A9000
heap
page read and write
D7CD000
stack
page read and write
31B9000
stack
page read and write
10383000
heap
page read and write
D362000
heap
page read and write
7DF4C3541000
trusted library allocation
page execute read
7FF50318B000
unkown
page readonly
BCE6000
heap
page read and write
D06A000
heap
page read and write
8BD4000
heap
page read and write
7FF5031BC000
unkown
page readonly
A020000
trusted library allocation
page read and write
4378000
unkown
page read and write
D107000
heap
page read and write
8D38000
heap
page read and write
B63B000
heap
page read and write
36A0000
unclassified section
page execute and read and write
7B93000
heap
page read and write
B613000
heap
page read and write
24E4000
heap
page read and write
9092000
unkown
page read and write
D35C000
heap
page read and write
D332000
heap
page read and write
6F0F000
unkown
page read and write
B621000
heap
page read and write
D045000
heap
page read and write
B4E7000
heap
page read and write
8B2B000
heap
page read and write
BFF4000
unkown
page read and write
1038A000
heap
page read and write
B67E000
heap
page read and write
2A59000
stack
page read and write
3B42000
direct allocation
page execute and read and write
105C2000
heap
page read and write
4879000
direct allocation
page read and write
2BB7000
heap
page read and write
6EE1000
unkown
page read and write
B67E000
heap
page read and write
90BD000
unkown
page read and write
D57C000
heap
page read and write
7FF5032F7000
unkown
page readonly
D253000
heap
page read and write
BCC0000
heap
page read and write
8BC9000
heap
page read and write
8CD6000
heap
page read and write
7A58000
stack
page read and write
B62E000
heap
page read and write
D390000
heap
page read and write
E4A0000
trusted library allocation
page read and write
9CF4000
unkown
page read and write
8BD6000
heap
page read and write
D2E9000
heap
page read and write
8BDE000
heap
page read and write
EBDC000
unkown
page read and write
7FF50332C000
unkown
page readonly
8BDC000
heap
page read and write
10443000
heap
page read and write
CAB8000
stack
page read and write
BE14000
unkown
page read and write
B621000
heap
page read and write
85CB000
unkown
page read and write
43EA000
unkown
page read and write
B630000
heap
page read and write
D180000
heap
page read and write
13AA000
stack
page read and write
D390000
heap
page read and write
8BDA000
heap
page read and write
7C0E000
heap
page read and write
24E4000
heap
page read and write
D3AB000
heap
page read and write
D37C000
heap
page read and write
7FF502DB3000
unkown
page readonly
5206000
heap
page read and write
8D46000
heap
page read and write
7FF502B55000
unkown
page readonly
8AD6000
heap
page read and write
1480000
heap
page read and write
8BD8000
heap
page read and write
B617000
heap
page read and write
B589000
heap
page read and write
3E60000
heap
page read and write
7FF502DDC000
unkown
page readonly
2DF0000
heap
page read and write
7FF502B61000
unkown
page readonly
105A5000
heap
page read and write
8C0A000
heap
page read and write
8DBD000
heap
page read and write
B67E000
heap
page read and write
8CF4000
heap
page read and write
90DA000
unkown
page read and write
10453000
heap
page read and write
829B000
stack
page read and write
B607000
heap
page read and write
D38A000
heap
page read and write
BCE3000
heap
page read and write
B546000
heap
page read and write
9B83000
unkown
page read and write
8C02000
heap
page read and write
D0F0000
heap
page read and write
D4E2000
heap
page read and write
5219000
heap
page read and write
10372000
heap
page read and write
7D61000
heap
page read and write
46D3000
direct allocation
page read and write
C5D0000
trusted library allocation
page read and write
8E0000
unkown
page readonly
B613000
heap
page read and write
3961000
heap
page read and write
7FF5032EE000
unkown
page readonly
8BC9000
heap
page read and write
B4A9000
heap
page read and write
B541000
heap
page read and write
7480000
unkown
page read and write
B1BF000
stack
page read and write
1254000
heap
page read and write
DACD000
stack
page read and write
80D0000
heap
page read and write
7FF502DDC000
unkown
page readonly
D58D000
heap
page read and write
3950000
heap
page read and write
3013000
heap
page read and write
1054D000
heap
page read and write
5760000
trusted library allocation
page read and write
D2EE000
heap
page read and write
D382000
heap
page read and write
BD4F000
heap
page read and write
3980000
heap
page read and write
519B000
heap
page read and write
BC00000
heap
page read and write
8DBD000
heap
page read and write
D360000
heap
page read and write
1038A000
heap
page read and write
B5B5000
heap
page read and write
10583000
heap
page read and write
8529000
stack
page read and write
9E0000
unkown
page read and write
2A59000
stack
page read and write
44AC000
heap
page read and write
7FF502CF5000
unkown
page readonly
EBCD000
unkown
page read and write
4750000
direct allocation
page read and write
7FF5026F7000
unkown
page readonly
D3CB000
heap
page read and write
7FF503277000
unkown
page readonly
401000
unkown
page execute read
810000
unkown
page readonly
D38C000
heap
page read and write
10462000
heap
page read and write
2F20000
unkown
page readonly
B624000
heap
page read and write
84AA000
stack
page read and write
7BA0000
heap
page read and write
2BDC000
stack
page read and write
7FF50328B000
unkown
page readonly
D12A000
heap
page read and write
3E54000
heap
page read and write
CF48000
heap
page read and write
8DB0000
heap
page read and write
B589000
heap
page read and write
24E4000
heap
page read and write
7CE5000
heap
page read and write
D16D000
heap
page read and write
BD18000
heap
page read and write
1045D000
heap
page read and write
7FF502D29000
unkown
page readonly
BCE6000
heap
page read and write
D33A000
heap
page read and write
8BD4000
heap
page read and write
7FF5032C0000
unkown
page readonly
132B000
heap
page read and write
8DA9000
heap
page read and write
7FF502FB4000
unkown
page readonly
6FBF000
unkown
page read and write
D562000
heap
page read and write
10455000
heap
page read and write
BCC8000
heap
page read and write
398D000
heap
page read and write
D259000
heap
page read and write
B550000
heap
page read and write
10440000
heap
page read and write
BC7C000
heap
page read and write
9D60000
unkown
page read and write
AF7F000
stack
page read and write
7FF502F66000
unkown
page readonly
7DF4C34F1000
trusted library allocation
page execute read
D3F4000
heap
page read and write
10468000
heap
page read and write
E50000
unkown
page readonly
16C0000
heap
page read and write
43FD000
unkown
page read and write
7FF502D48000
unkown
page readonly
B2BA000
stack
page read and write
B5B5000
heap
page read and write
8D3F000
heap
page read and write
10592000
heap
page read and write
D1AF000
heap
page read and write
BD00000
heap
page read and write
7BF1000
heap
page read and write
8D1C000
heap
page read and write
43AC000
unkown
page read and write
D07D000
heap
page read and write
104C4000
heap
page read and write
1045F000
heap
page read and write
D57C000
heap
page read and write
D180000
heap
page read and write
7FF502C2E000
unkown
page readonly
1058B000
heap
page read and write
D332000
heap
page read and write
B589000
heap
page read and write
8BC1000
heap
page read and write
D31C000
heap
page read and write
BC43000
heap
page read and write
D35A000
heap
page read and write
10430000
heap
page read and write
1044F000
heap
page read and write
7560000
unkown
page readonly
D25F000
heap
page read and write
8602000
heap
page read and write
10453000
heap
page read and write
D380000
heap
page read and write
B51E000
heap
page read and write
B5FA000
heap
page read and write
2BE4000
unkown
page read and write
7FF50324D000
unkown
page readonly
BEE8000
unkown
page read and write
80B0000
unkown
page read and write
D3BF000
heap
page read and write
8CE2000
heap
page read and write
D0B0000
heap
page read and write
10377000
heap
page read and write
8BDE000
heap
page read and write
2C70000
unkown
page readonly
D1B3000
heap
page read and write
7FF5031B0000
unkown
page readonly
8BC1000
heap
page read and write
D16D000
heap
page read and write
B556000
heap
page read and write
AA8D000
stack
page read and write
1064C000
heap
page read and write
1036C000
heap
page read and write
10398000
heap
page read and write
FD96000
unkown
page read and write
BC15000
unkown
page read and write
9CF6000
unkown
page read and write
7FF502F88000
unkown
page readonly
8B2B000
heap
page read and write
7FF502F2C000
unkown
page readonly
D36A000
heap
page read and write
161E000
stack
page read and write
7DF4C35C0000
trusted library allocation
page readonly
ABE0000
unkown
page read and write
2FF1000
trusted library allocation
page execute and read and write
10360000
heap
page read and write
7DF4C35B0000
trusted library allocation
page readonly
7BE2000
heap
page read and write
7FF503118000
unkown
page readonly
7FF502CFA000
unkown
page readonly
B624000
heap
page read and write
7D35000
heap
page read and write
BC80000
unkown
page read and write
D1B3000
heap
page read and write
BC50000
heap
page read and write
B51E000
heap
page read and write
7BE2000
heap
page read and write
104C4000
heap
page read and write
10708000
heap
page read and write
8CEB000
heap
page read and write
79DD000
stack
page read and write
8D61000
heap
page read and write
105C2000
heap
page read and write
89F2000
heap
page read and write
7DF4C3521000
trusted library allocation
page execute read
8440000
unkown
page read and write
7FF5030CE000
unkown
page readonly
There are 3061 hidden memdumps, click here to show them.