IOC Report
New PO 127429.exe

loading gif

Files

File Path
Type
Category
Malicious
New PO 127429.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\subpredicate.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
JSON data
dropped
C:\Users\user\AppData\Local\Temp\wherefore
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\New PO 127429.exe
"C:\Users\user\Desktop\New PO 127429.exe"
malicious
C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe
"C:\Users\user\Desktop\New PO 127429.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\New PO 127429.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\WWAHost.exe
"C:\Windows\SysWOW64\WWAHost.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\subpredicate.vbs"
malicious
C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe
"C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe"
malicious
C:\Windows\SysWOW64\control.exe
"C:\Windows\SysWOW64\control.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\SysWOW64\svchost.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
www.f6b-crxy.top/cu29/
malicious
http://www.olandopaintingllc.online/cu29/
unknown
http://www.siabgc4d.online/cu29/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
http://www.qidr.shop/cu29/www.azino-forum-pro.online
unknown
https://word.office.comM
unknown
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
unknown
https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
unknown
http://www.f6b-crxy.top/cu29/www.siabgc4d.online
unknown
https://wns.windows.com/e
unknown
http://www.inn-paaaa.buzz/cu29/
unknown
http://www.irex.info
unknown
http://www.nlineschools-2507-001-sap.click/cu29/www.irex.info
unknown
http://www.olandopaintingllc.online
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
http://www.48372305.top
unknown
http://www.qidr.shop/cu29/
unknown
http://www.48372305.top/cu29/www.ajakgoid.online
unknown
http://www.400725iimfyuj120.topReferer:
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
unknown
http://www.inn-paaaa.buzzReferer:
unknown
http://www.oursmile.vip/cu29/
unknown
http://www.olandopaintingllc.onlineReferer:
unknown
http://www.oursmile.vip
unknown
https://android.notify.windows.com/iOS
unknown
http://www.azino-forum-pro.online/cu29/
unknown
http://www.azino-forum-pro.onlineReferer:
unknown
https://outlook.come
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
http://www.ajakgoid.online/cu29/
unknown
http://www.f6b-crxy.top/cu29/
unknown
http://www.400725iimfyuj120.top/cu29/
unknown
https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
unknown
http://www.itusbandar126.info/cu29/
unknown
https://api.msn.com/v1/news/Feed/Windows?
unknown
http://www.itusbandar126.info/cu29/www.48372305.top
unknown
http://www.srtio.xyz
unknown
http://www.siabgc4d.online/cu29/www.itusbandar126.info
unknown
https://api.msn.com/I
unknown
http://www.olandopaintingllc.online/cu29/www.srtio.xyz
unknown
http://www.oursmile.vip/cu29/www.ainan.company
unknown
http://www.ainan.company/cu29/
unknown
http://www.ajakgoid.online/cu29/www.400725iimfyuj120.top
unknown
http://www.ainan.company
unknown
http://www.f6b-crxy.top
unknown
http://www.400725iimfyuj120.top/cu29/www.5mwhs.top
unknown
http://www.itusbandar126.info
unknown
http://schemas.micro
unknown
http://www.5mwhs.top/cu29/www.qidr.shop
unknown
http://www.oursmile.vipReferer:
unknown
http://www.ajakgoid.online
unknown
http://www.nlineschools-2507-001-sap.click/cu29/
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.azino-forum-pro.online
unknown
http://www.siabgc4d.onlineReferer:
unknown
http://www.nlineschools-2507-001-sap.clickReferer:
unknown
http://www.siabgc4d.online
unknown
http://www.5mwhs.top
unknown
http://www.irex.infoReferer:
unknown
https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h
unknown
https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
unknown
http://www.qidr.shopReferer:
unknown
http://www.irex.info/cu29/
unknown
http://www.48372305.top/cu29/
unknown
http://www.ainan.company/cu29/www.inn-paaaa.buzz
unknown
http://www.f6b-crxy.topReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
unknown
https://excel.office.com-
unknown
http://www.nlineschools-2507-001-sap.click
unknown
http://www.inn-paaaa.buzz/cu29/www.nlineschools-2507-001-sap.click
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
unknown
https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
unknown
http://www.5mwhs.top/cu29/
unknown
http://www.srtio.xyzReferer:
unknown
http://www.inn-paaaa.buzz
unknown
https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
unknown
http://www.itusbandar126.infoReferer:
unknown
https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
unknown
http://www.ajakgoid.onlineReferer:
unknown
https://powerpoint.office.comEMd
unknown
http://www.5mwhs.topReferer:
unknown
http://www.48372305.topReferer:
unknown
https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
unknown
http://www.srtio.xyz/cu29/www.f6b-crxy.top
unknown
http://www.irex.info/cu29/www.olandopaintingllc.online
unknown
https://api.msn.com/
unknown
http://www.ainan.companyReferer:
unknown
http://www.qidr.shop
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
unknown
https://www.msn.com:443/en-us/feed
unknown
http://www.400725iimfyuj120.top
unknown
http://www.srtio.xyz/cu29/
unknown
https://www.msn.com/en-us/news/world/us-supplies-ukraine-with-a-million-rounds-of-ammunition-seized-
unknown
https://www.msn.com/en-us/money/personalfinance/10-things-rich-people-never-buy-and-you-shouldn-t-ei
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.irex.info
85.13.166.18
malicious
www.nlineschools-2507-001-sap.click
unknown
malicious
www.olandopaintingllc.online
unknown
malicious
www.f6b-crxy.top
unknown
malicious
www.inn-paaaa.buzz
unknown
malicious
www.ainan.company
unknown
malicious
www.itusbandar126.info
unknown
malicious
www.siabgc4d.online
unknown
malicious
www.48372305.top
unknown
malicious
www.oursmile.vip
unknown
malicious
www.ajakgoid.online
unknown
malicious
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
85.13.166.18
www.irex.info
Germany
malicious

Registry

Path
Value
Malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Unpacker
malicious
unknown
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
@explorerframe.dll,-13137
malicious
unknown
@explorerframe.dll,-13138
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
WMP11.AssocFile.3G2
malicious
unknown
WMP11.AssocFile.3GP
malicious
unknown
WMP11.AssocFile.3G2
malicious
unknown
WMP11.AssocFile.3GP
malicious
unknown
WMP11.AssocFile.ADTS
malicious
unknown
WMP11.AssocFile.ADTS
malicious
unknown
WMP11.AssocFile.AIFF
malicious
unknown
WMP11.AssocFile.AIFF
malicious
unknown
WMP11.AssocFile.AIFF
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.AU
malicious
unknown
AutoIt3Script
malicious
unknown
WMP11.AssocFile.AVI
malicious
unknown
Paint.Picture
malicious
unknown
CABFolder
malicious
unknown
Microsoft.PowerShellCmdletDefinitionXML.1
malicious
unknown
CSSfile
malicious
unknown
Excel.CSV
malicious
unknown
ddsfile
malicious
unknown
Paint.Picture
malicious
unknown
dllfile
malicious
unknown
Word.Document.8
malicious
unknown
Word.DocumentMacroEnabled.12
malicious
unknown
Word.Document.12
malicious
unknown
Word.Template.8
malicious
unknown
Word.TemplateMacroEnabled.12
malicious
unknown
Word.Template.12
malicious
unknown
emffile
malicious
unknown
exefile
malicious
unknown
WMP11.AssocFile.FLAC
malicious
unknown
fonfile
malicious
unknown
giffile
malicious
unknown
htmlfile
malicious
unknown
htmlfile
malicious
unknown
icofile
malicious
unknown
inffile
malicious
unknown
inifile
malicious
unknown
pjpegfile
malicious
unknown
jpegfile
malicious
unknown
jpegfile
malicious
unknown
wdpfile
malicious
unknown
lnkfile
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.m3u
malicious
unknown
WMP11.AssocFile.M4A
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
mhtmlfile
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
WMP11.AssocFile.MK3D
malicious
unknown
WMP11.AssocFile.MKA
malicious
unknown
WMP11.AssocFile.MKV
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.MOV
malicious
unknown
WMP11.AssocFile.MP3
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
Outlook.File.msg.15
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
ocxfile
malicious
unknown
PowerPoint.OpenDocumentPresentation.12
malicious
unknown
Excel.OpenDocumentSpreadsheet.12
malicious
unknown
Word.OpenDocumentText.12
malicious
unknown
otffile
malicious
unknown
pngfile
malicious
unknown
PowerPoint.Template.8
malicious
unknown
PowerPoint.TemplateMacroEnabled.12
malicious
unknown
PowerPoint.Template.12
malicious
unknown
PowerPoint.Addin.12
malicious
unknown
PowerPoint.SlideShowMacroEnabled.12
malicious
unknown
PowerPoint.SlideShow.12
malicious
unknown
PowerPoint.Show.8
malicious
unknown
PowerPoint.ShowMacroEnabled.12
malicious
unknown
PowerPoint.Show.12
malicious
unknown
Microsoft.PowerShellScript.1
malicious
unknown
Microsoft.PowerShellXMLData.1
malicious
unknown
Microsoft.PowerShellData.1
malicious
unknown
Microsoft.PowerShellModule.1
malicious
unknown
Microsoft.PowerShellSessionConfiguration.1
malicious
unknown
rlefile
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
Word.RTF.8
malicious
unknown
SHCmdFile
malicious
unknown
SearchFolder
malicious
unknown
shtmlfile
malicious
unknown
PowerPoint.SlideMacroEnabled.12
malicious
unknown
PowerPoint.Slide.12
malicious
unknown
WMP11.AssocFile.AU
malicious
unknown
sysfile
malicious
unknown
TIFImage.Document
malicious
unknown
TIFImage.Document
malicious
unknown
WMP11.AssocFile.TTS
malicious
unknown
ttcfile
malicious
unknown
ttffile
malicious
unknown
WMP11.AssocFile.TTS
malicious
unknown
txtfile
malicious
unknown
bootstrap.vsto.1
malicious
unknown
WMP11.AssocFile.WAV
malicious
unknown
WMP11.AssocFile.WAX
malicious
unknown
wdpfile
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.WMA
malicious
unknown
wmffile
malicious
unknown
WMP11.AssocFile.WMV
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.WPL
malicious
unknown
WMP11.AssocFile.WVX
malicious
unknown
Excel.AddInMacroEnabled
malicious
unknown
Excel.Sheet.8
malicious
unknown
Excel.SheetBinaryMacroEnabled.12
malicious
unknown
Excel.SheetMacroEnabled.12
malicious
unknown
Excel.Sheet.12
malicious
unknown
Excel.Template.8
malicious
unknown
Excel.TemplateMacroEnabled
malicious
unknown
Excel.Template
malicious
unknown
xmlfile
malicious
unknown
xslfile
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
TaskbarStateLastRun
malicious
unknown
Implementing
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
TaskbarStateLastRun
malicious
unknown
Implementing
malicious
unknown
SlowContextMenuEntries
malicious
unknown
TaskbarStateLastRun
malicious
unknown
Implementing
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000303F2
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
VBSFile
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Windows\System32\wshext.dll,-4511
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\JFpevcg.rkr
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithList
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithList
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\QuietHours
QuietHoursServiceState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\QuietHours
QuietHoursServiceState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
There are 197 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
310000
system
page execute and read and write
malicious
620000
system
page execute and read and write
malicious
3B1000
system
page execute read
malicious
2CE0000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
9B0000
unclassified section
page execute and read and write
malicious
F40000
unclassified section
page execute and read and write
malicious
9D0000
unclassified section
page execute and read and write
malicious
3020000
direct allocation
page read and write
malicious
F50000
unclassified section
page execute and read and write
malicious
2D10000
trusted library allocation
page read and write
malicious
B30000
direct allocation
page read and write
malicious
2D1E000
stack
page read and write
33C0000
unkown
page readonly
7FF5DF443000
unkown
page readonly
7FF5DF3F1000
unkown
page readonly
34C0000
trusted library allocation
page read and write
7C89000
stack
page read and write
830000
heap
page read and write
7FF5DF04D000
unkown
page readonly
2780000
trusted library allocation
page read and write
9409000
stack
page read and write
2754000
heap
page read and write
BFAF000
unkown
page read and write
7FF5DEFDD000
unkown
page readonly
48B0000
unkown
page read and write
A02000
heap
page read and write
7FF5DF4D5000
unkown
page readonly
2780000
trusted library allocation
page read and write
2DA7000
heap
page read and write
2DA1000
heap
page read and write
95F0000
unkown
page read and write
2754000
heap
page read and write
C086000
unkown
page read and write
B3DA000
unkown
page read and write
7FF5DF169000
unkown
page readonly
3382000
unkown
page read and write
4824000
unkown
page read and write
7FF5DE9C3000
unkown
page readonly
2754000
heap
page read and write
3290000
unkown
page readonly
7FF5DEFE2000
unkown
page readonly
482000
unkown
page readonly
A072000
unkown
page read and write
3CF000
system
page execute and read and write
7FF5DF0F6000
unkown
page readonly
1E0000
heap
page read and write
A749000
unkown
page read and write
7B60000
unkown
page readonly
A02D000
unkown
page read and write
2DA1000
heap
page read and write
7FF5DF4F7000
unkown
page readonly
9FA0000
unkown
page read and write
7FF5DF3B9000
unkown
page readonly
B1C0000
unkown
page readonly
2754000
heap
page read and write
971C000
unkown
page read and write
9E1E000
stack
page read and write
E5D000
heap
page read and write
2EB0000
unkown
page readonly
7FF5DF577000
unkown
page readonly
3DE0000
heap
page read and write
7FF5DF551000
unkown
page readonly
3DB1000
heap
page read and write
294E000
heap
page read and write
2F10000
unkown
page read and write
BBB000
heap
page read and write
C159000
unkown
page read and write
BF9F000
unkown
page read and write
4824000
unkown
page read and write
891B000
unkown
page read and write
C013000
unkown
page read and write
973C000
unkown
page read and write
7FF5DF507000
unkown
page readonly
3D2F000
stack
page read and write
41D3000
direct allocation
page read and write
73B6000
unkown
page read and write
64A0000
trusted library allocation
page read and write
3060000
heap
page read and write
7FF5DEF94000
unkown
page readonly
7FF5DEE52000
unkown
page readonly
2CD0000
heap
page read and write
7FF5DF3F5000
unkown
page readonly
7909000
stack
page read and write
3D6C000
heap
page read and write
9489000
stack
page read and write
437D000
direct allocation
page read and write
C05000
heap
page read and write
EF43000
unkown
page read and write
7FF5DF3EA000
unkown
page readonly
7FF5DF5BE000
unkown
page readonly
89F000
stack
page read and write
30F1000
heap
page read and write
2DA7000
heap
page read and write
64A0000
trusted library allocation
page read and write
7FF5DF452000
unkown
page readonly
7991000
unkown
page read and write
3264000
heap
page read and write
3000000
heap
page read and write
901B000
stack
page read and write
613000
heap
page read and write
40B0000
direct allocation
page read and write
7FF5DF3C2000
unkown
page readonly
9F3E000
unkown
page read and write
22FEB34C000
heap
page read and write
7FF5DF5FC000
unkown
page readonly
7FF5DF3A1000
unkown
page readonly
10800000
unkown
page read and write
22FEB358000
heap
page read and write
7FF5DF3C6000
unkown
page readonly
7FF5DF1CD000
unkown
page readonly
3304000
unkown
page read and write
C3A8000
unkown
page read and write
2780000
trusted library allocation
page read and write
2DA1000
heap
page read and write
99AB000
unkown
page read and write
9AE000
stack
page read and write
2754000
heap
page read and write
7FF5DF122000
unkown
page readonly
7FF5DF539000
unkown
page readonly
E70000
unkown
page readonly
3150000
heap
page read and write
14A0000
direct allocation
page read and write
489A000
unkown
page read and write
7FF5DF5A3000
unkown
page readonly
8590000
unkown
page readonly
47B6000
unkown
page read and write
30FF000
stack
page read and write
AB85000
stack
page read and write
7FF5DF380000
unkown
page readonly
339E000
heap
page read and write
9A000
stack
page read and write
EFC4000
unkown
page read and write
3E12000
heap
page read and write
3E0000
heap
page read and write
22FEB34A000
heap
page read and write
7FF5DF21C000
unkown
page readonly
7FF5DEFDD000
unkown
page readonly
C187000
unkown
page read and write
7FF5DF091000
unkown
page readonly
BEF0000
heap
page read and write
901B000
stack
page read and write
7FF5DF0CC000
unkown
page readonly
414000
heap
page read and write
26ED000
stack
page read and write
10986000
system
page read and write
8B6B000
unkown
page read and write
3349000
unkown
page read and write
4860000
unkown
page read and write
92DB000
stack
page read and write
2BB0000
heap
page read and write
73CD000
unkown
page read and write
B9F0000
unkown
page read and write
7B4C000
stack
page read and write
BFDF000
unkown
page read and write
B120000
unkown
page readonly
F7B6F2A000
stack
page read and write
9F27000
unkown
page read and write
9605000
unkown
page read and write
7FF5DF169000
unkown
page readonly
A0FC000
unkown
page read and write
C159000
unkown
page read and write
7909000
stack
page read and write
C319000
unkown
page read and write
BFEF000
unkown
page read and write
8EA9000
stack
page read and write
A6EE000
unkown
page read and write
9716000
unkown
page read and write
F7B73FF000
stack
page read and write
1661000
heap
page read and write
7FF5DF038000
unkown
page readonly
4040000
direct allocation
page read and write
A95000
heap
page read and write
7FF5DEE56000
unkown
page readonly
2780000
trusted library allocation
page read and write
28D0000
heap
page read and write
C3C8000
unkown
page read and write
1040C000
system
page execute and read and write
7B60000
unkown
page readonly
F7B7BFF000
stack
page read and write
7FF5DF47E000
unkown
page readonly
7DF4E6770000
unkown
page readonly
7FF5DF4F3000
unkown
page readonly
A6EA000
unkown
page read and write
2930000
heap
page read and write
2754000
heap
page read and write
7FF5DF126000
unkown
page readonly
7910000
unkown
page readonly
3D7C000
heap
page read and write
95EE000
stack
page read and write
7FF5DF5AE000
unkown
page readonly
7FF5DF567000
unkown
page readonly
B4B000
heap
page read and write
A6EA000
unkown
page read and write
1085E000
unkown
page read and write
D60000
heap
page read and write
3922000
direct allocation
page execute and read and write
2AF0000
heap
page read and write
7FF5DF48B000
unkown
page readonly
2E21000
unkown
page read and write
930000
trusted library allocation
page read and write
A690000
unkown
page read and write
47EC000
unkown
page read and write
4144000
direct allocation
page read and write
27BE000
stack
page read and write
2754000
heap
page read and write
4828000
unkown
page read and write
4F0000
system
page execute and read and write
2EC0000
unkown
page readonly
B358000
stack
page read and write
7D89000
stack
page read and write
2754000
heap
page read and write
7FF5DF50F000
unkown
page readonly
D50000
unkown
page read and write
7FF5DF277000
unkown
page readonly
BA76000
stack
page read and write
479B000
unkown
page read and write
2D9C000
heap
page read and write
388C000
heap
page read and write
B9BF000
stack
page read and write
C298000
unkown
page read and write
7810000
unkown
page read and write
738E000
unkown
page read and write
3D19000
heap
page read and write
7FF5DF4E3000
unkown
page readonly
9AE000
stack
page read and write
2952000
heap
page read and write
3FB4000
heap
page read and write
7FF5DF5F6000
unkown
page readonly
7FF5DF26F000
unkown
page readonly
3D80000
heap
page read and write
7FF5DF0C9000
unkown
page readonly
B010000
unkown
page read and write
7800000
unkown
page read and write
7FF5DF58A000
unkown
page readonly
2754000
heap
page read and write
51DB000
stack
page read and write
C40000
heap
page read and write
7FF5DF25E000
unkown
page readonly
2D30000
unkown
page read and write
4540000
direct allocation
page execute and read and write
BFA3000
unkown
page read and write
E91000
unkown
page read and write
33C0000
unkown
page readonly
3364000
unkown
page read and write
7FF5DF126000
unkown
page readonly
7FF5DEFA6000
unkown
page readonly
27F0000
unkown
page readonly
970C000
unkown
page read and write
A17000
heap
page read and write
7FF5DF3DF000
unkown
page readonly
7FF5DF54D000
unkown
page readonly
A08D000
unkown
page read and write
52C3000
unkown
page read and write
7DF4E6760000
unkown
page readonly
490000
unkown
page read and write
9F92000
unkown
page read and write
7FF5DF095000
unkown
page readonly
359E000
direct allocation
page execute and read and write
7DF5E895F000
unkown
page readonly
7FF5DF382000
unkown
page readonly
3065000
heap
page read and write
7FF5DF0D2000
unkown
page readonly
7FF5DEF90000
unkown
page readonly
AB0D000
stack
page read and write
7FF5DF26F000
unkown
page readonly
3431000
trusted library allocation
page execute and read and write
2754000
heap
page read and write
7FF5DF23B000
unkown
page readonly
1190000
heap
page read and write
9FA0000
unkown
page read and write
4766000
unkown
page read and write
7FF5DEFE8000
unkown
page readonly
414000
heap
page read and write
4A7000
unkown
page read and write
73B8000
unkown
page read and write
B9F0000
unkown
page read and write
43EE000
direct allocation
page read and write
8C28000
stack
page read and write
2BFC000
stack
page read and write
41D3000
direct allocation
page read and write
414000
heap
page read and write
3100000
unclassified section
page execute and read and write
B11B000
stack
page read and write
BFAF000
unkown
page read and write
C3A9000
unkown
page read and write
3000000
heap
page read and write
8390000
unkown
page read and write
3DFE000
heap
page read and write
C34E000
unkown
page read and write
2780000
trusted library allocation
page read and write
3400000
direct allocation
page execute and read and write
22FEB349000
heap
page read and write
414000
heap
page read and write
7FF5DF388000
unkown
page readonly
A098000
unkown
page read and write
C428000
unkown
page read and write
437D000
direct allocation
page read and write
A758000
unkown
page read and write
370000
heap
page read and write
A6F1000
unkown
page read and write
7FF5DF089000
unkown
page readonly
D23000
heap
page read and write
10864000
unkown
page read and write
3380000
trusted library allocation
page execute and read and write
7FF5DF195000
unkown
page readonly
8EA9000
stack
page read and write
98AD000
unkown
page read and write
2952000
heap
page read and write
B830000
unkown
page readonly
2ADE000
stack
page read and write
22FEB320000
heap
page read and write
7DF4E6791000
unkown
page execute read
7FF5DF4E3000
unkown
page readonly
C1C4000
unkown
page read and write
7FF5DF519000
unkown
page readonly
FEB8000
system
page execute and read and write
9E9E000
stack
page read and write
4860000
unkown
page read and write
7930000
unkown
page readonly
950B000
stack
page read and write
A758000
unkown
page read and write
7FF5DF08F000
unkown
page readonly
7DF4E67A1000
unkown
page execute read
47A2000
unkown
page read and write
3E60000
heap
page read and write
7FF5DF626000
unkown
page readonly
2780000
trusted library allocation
page read and write
A10000
heap
page read and write
3373000
unkown
page read and write
7395000
unkown
page read and write
3E04000
heap
page execute and read and write
7FF5DF36A000
unkown
page readonly
3DE0000
heap
page read and write
F40000
trusted library allocation
page read and write
86CC000
stack
page read and write
A6F5000
unkown
page read and write
41D3000
direct allocation
page read and write
A6CF000
unkown
page read and write
9F63000
unkown
page read and write
4309000
direct allocation
page read and write
C4D000
heap
page read and write
F7B72FF000
stack
page read and write
3391000
trusted library allocation
page execute and read and write
1084C000
unkown
page read and write
10831000
unkown
page read and write
28D0000
heap
page read and write
7FF5DF388000
unkown
page readonly
97CE000
unkown
page read and write
2AE0000
heap
page read and write
97F3000
unkown
page read and write
4309000
direct allocation
page read and write
3E34000
heap
page read and write
7FF5DE539000
unkown
page readonly
77F0000
unkown
page read and write
10864000
unkown
page read and write
B830000
unkown
page readonly
7FF5DF626000
unkown
page readonly
C319000
unkown
page read and write
2E21000
unkown
page read and write
7FF5DF551000
unkown
page readonly
A0F7000
unkown
page read and write
96F1000
unkown
page read and write
AD2B000
stack
page read and write
BF82000
unkown
page read and write
C048000
unkown
page read and write
34C0000
unkown
page read and write
7FF5DF422000
unkown
page readonly
7FF5DF2CB000
unkown
page readonly
7FF5DEFCB000
unkown
page readonly
7FF5DF366000
unkown
page readonly
7FF5DF207000
unkown
page readonly
8910000
unkown
page read and write
3329000
heap
page read and write
5EC000
stack
page read and write
7D0D000
stack
page read and write
9718000
unkown
page read and write
A0A7000
unkown
page read and write
8A36000
unkown
page read and write
7FF5DEE5A000
unkown
page readonly
437E000
direct allocation
page read and write
7FF5DF4E7000
unkown
page readonly
32B0000
unkown
page read and write
30FF000
stack
page read and write
95EE000
stack
page read and write
7FF5DF2ED000
unkown
page readonly
27D0000
unkown
page read and write
7FF5DEE43000
unkown
page readonly
43EE000
direct allocation
page read and write
ADAB000
stack
page read and write
2780000
trusted library allocation
page read and write
A15000
heap
page read and write
A08D000
unkown
page read and write
7FF5DF2E5000
unkown
page readonly
F80000
trusted library allocation
page execute and read and write
AC0D000
stack
page read and write
BF8C000
unkown
page read and write
C35F000
unkown
page read and write
8A36000
unkown
page read and write
10834000
unkown
page read and write
7FF5DF310000
unkown
page readonly
B9E0000
unkown
page read and write
7FF5DF24E000
unkown
page readonly
73A7000
unkown
page read and write
C35C000
unkown
page read and write
BF84000
unkown
page read and write
A0F7000
unkown
page read and write
C1A9000
unkown
page read and write
77F0000
unkown
page read and write
7FF5DF36A000
unkown
page readonly
466D000
direct allocation
page execute and read and write
3260000
heap
page read and write
2780000
trusted library allocation
page read and write
940000
heap
page read and write
713000
system
page readonly
A93000
heap
page read and write
437E000
direct allocation
page read and write
2754000
heap
page read and write
1083D000
unkown
page read and write
2754000
heap
page read and write
125E000
stack
page read and write
C525000
unkown
page read and write
7FF5DEE5A000
unkown
page readonly
9F78000
unkown
page read and write
7FF5DF2DA000
unkown
page readonly
EF43000
unkown
page read and write
973C000
unkown
page read and write
7D89000
stack
page read and write
9563000
unkown
page read and write
BFA3000
unkown
page read and write
7FF5DF2F3000
unkown
page readonly
22FEB250000
heap
page read and write
73B2000
unkown
page read and write
7FF5DE9CB000
unkown
page readonly
7FF5DF443000
unkown
page readonly
385C000
unclassified section
page execute and read and write
891B000
unkown
page read and write
7FF5DF2BA000
unkown
page readonly
2952000
heap
page read and write
7FF5DF49C000
unkown
page readonly
935B000
stack
page read and write
2801000
heap
page read and write
3800000
heap
page read and write
27EC000
stack
page read and write
3E60000
heap
page read and write
73BA000
unkown
page read and write
73B4000
unkown
page read and write
16CD000
heap
page read and write
C1C4000
unkown
page read and write
C319000
unkown
page read and write
3060000
heap
page read and write
7FF5DEFB7000
unkown
page readonly
7FF5DF425000
unkown
page readonly
7FF5DF1CD000
unkown
page readonly
3EB2000
heap
page execute and read and write
A1E000
stack
page read and write
7FF5DF3D4000
unkown
page readonly
2754000
heap
page read and write
2958000
heap
page read and write
987C000
unkown
page read and write
2EC0000
unkown
page readonly
4CC0000
unclassified section
page execute and read and write
7FF5DF25E000
unkown
page readonly
A25000
heap
page read and write
C18A000
unkown
page read and write
B1E000
heap
page read and write
2754000
heap
page read and write
C1B000
heap
page read and write
7FF5DF156000
unkown
page readonly
F90000
trusted library allocation
page execute and read and write
87B1000
unkown
page read and write
C4D000
heap
page read and write
4040000
direct allocation
page read and write
C354000
unkown
page read and write
7FF5DF16B000
unkown
page readonly
E0F000
heap
page read and write
7FF5DF380000
unkown
page readonly
3364000
unkown
page read and write
950000
heap
page read and write
73B2000
unkown
page read and write
490000
unkown
page read and write
3302000
unkown
page read and write
7FF5C0B6B000
unkown
page readonly
970000
heap
page readonly
3E0B000
heap
page read and write
2780000
trusted library allocation
page read and write
AF7E000
stack
page read and write
BF90000
unkown
page read and write
7FF5DF045000
unkown
page readonly
22FEB3DB000
heap
page read and write
C45C000
unkown
page read and write
410000
heap
page read and write
B60A000
stack
page read and write
3EB7000
heap
page read and write
5241000
unkown
page read and write
3DA4000
heap
page read and write
96ED000
unkown
page read and write
613000
heap
page read and write
47EC000
unkown
page read and write
B10000
heap
page read and write
7860000
unkown
page read and write
7FF5DF396000
unkown
page readonly
3742000
direct allocation
page execute and read and write
31FF000
stack
page read and write
4750000
unkown
page read and write
848E000
stack
page read and write
3D00000
heap
page read and write
C34E000
unkown
page read and write
7FF5DF60D000
unkown
page readonly
2947000
heap
page read and write
7FF5DF2ED000
unkown
page readonly
2780000
trusted library allocation
page read and write
256E000
stack
page read and write
BFA7000
unkown
page read and write
2754000
heap
page read and write
7FF5DF4D5000
unkown
page readonly
8590000
unkown
page readonly
7FF5DF3F1000
unkown
page readonly
C474000
unkown
page read and write
7FF5DF2F3000
unkown
page readonly
B01000
heap
page read and write
7FF5DF191000
unkown
page readonly
4250000
direct allocation
page read and write
7FF5DF5D6000
unkown
page readonly
BF82000
unkown
page read and write
310D000
unclassified section
page execute and read and write
BFA5000
unkown
page read and write
4040000
direct allocation
page read and write
C516000
unkown
page read and write
9F74000
unkown
page read and write
8AF000
stack
page read and write
137E000
stack
page read and write
A0A5000
unkown
page read and write
9F60000
unkown
page read and write
7FF5DF029000
unkown
page readonly
7FF5DF59E000
unkown
page readonly
22FEB372000
heap
page read and write
7FF5DF458000
unkown
page readonly
7FF5DEE3C000
unkown
page readonly
2780000
trusted library allocation
page read and write
EF86000
unkown
page read and write
7FF5DEFAF000
unkown
page readonly
7FF5DF3F7000
unkown
page readonly
9F2A000
unkown
page read and write
7FF5DF5CC000
unkown
page readonly
C149000
unkown
page read and write
2E30000
unkown
page read and write
2F7F000
stack
page read and write
83B0000
unkown
page readonly
A690000
unkown
page read and write
7FF5DF567000
unkown
page readonly
7FF5DF248000
unkown
page readonly
C192000
unkown
page read and write
7FF5DF122000
unkown
page readonly
7FF5DF571000
unkown
page readonly
7FF5DF53F000
unkown
page readonly
7FF5DF349000
unkown
page readonly
9E0000
unkown
page readonly
7FF5DF08B000
unkown
page readonly
100000
heap
page read and write
7FF5DEE43000
unkown
page readonly
A05000
heap
page read and write
3CFF000
stack
page read and write
3375000
unkown
page read and write
9A000
stack
page read and write
430D000
direct allocation
page read and write
9D9F000
stack
page read and write
355A000
heap
page read and write
3D91000
heap
page read and write
7FF5DEF94000
unkown
page readonly
B259000
stack
page read and write
D60000
heap
page read and write
3EB3000
heap
page read and write
C187000
unkown
page read and write
7FF5DF5B5000
unkown
page readonly
C149000
unkown
page read and write
7FF5DEFC2000
unkown
page readonly
2949000
heap
page read and write
7FF5DF3A1000
unkown
page readonly
88E0000
unkown
page read and write
7D90000
unkown
page read and write
7FF5DF591000
unkown
page readonly
7FF5DF207000
unkown
page readonly
3E09000
heap
page read and write
22FEB358000
heap
page read and write
7FF5DF549000
unkown
page readonly
C34E000
unkown
page read and write
C192000
unkown
page read and write
7DF4E6770000
unkown
page readonly
4250000
direct allocation
page read and write
3FF000
stack
page read and write
A748000
unkown
page read and write
2780000
trusted library allocation
page read and write
7FF5DF3E4000
unkown
page readonly
613000
heap
page read and write
4AB000
unkown
page readonly
613000
heap
page read and write
7399000
unkown
page read and write
7FF5DEEEB000
unkown
page readonly
2780000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
7FF5DF067000
unkown
page readonly
4AB000
unkown
page readonly
430D000
direct allocation
page read and write
46DE000
direct allocation
page execute and read and write
13A0000
unkown
page readonly
3D58000
heap
page read and write
98A7000
unkown
page read and write
B4DB000
stack
page read and write
A744000
unkown
page read and write
28D3000
heap
page read and write
970C000
unkown
page read and write
7830000
unkown
page read and write
A098000
unkown
page read and write
B8E000
heap
page read and write
16EC000
heap
page read and write
28D3000
heap
page read and write
2800000
heap
page read and write
8AF000
stack
page read and write
36CD000
direct allocation
page execute and read and write
874C000
stack
page read and write
EF86000
unkown
page read and write
22FEB36E000
heap
page read and write
1097A000
heap
page read and write
B8A000
heap
page read and write
A08A000
unkown
page read and write
336F000
unkown
page read and write
F004000
unkown
page read and write
C187000
unkown
page read and write
AA0000
heap
page read and write
47F3000
unkown
page read and write
A0A5000
unkown
page read and write
9CE000
stack
page read and write
C4DB000
unkown
page read and write
2754000
heap
page read and write
AC0D000
stack
page read and write
7FF5DF2FE000
unkown
page readonly
381D000
unclassified section
page execute and read and write
7FF5DEFBD000
unkown
page readonly
437D000
direct allocation
page read and write
3D30000
heap
page read and write
A5E000
stack
page read and write
9B1D000
stack
page read and write
A13000
heap
page read and write
437E000
direct allocation
page read and write
B45A000
stack
page read and write
AE6F000
stack
page read and write
7FF5DF519000
unkown
page readonly
FE0000
unkown
page read and write
A75C000
unkown
page read and write
13A1000
unkown
page readonly
BFC3000
unkown
page read and write
B500000
unkown
page readonly
30FC000
heap
page read and write
73E5000
unkown
page read and write
7FF5DF4F3000
unkown
page readonly
A75F000
unkown
page read and write
3362000
unkown
page read and write
73A7000
unkown
page read and write
40B0000
direct allocation
page read and write
2952000
heap
page read and write
7FF5DE9C3000
unkown
page readonly
7FF5DF5AE000
unkown
page readonly
970000
unkown
page readonly
7FF5DF0C3000
unkown
page readonly
A17000
heap
page read and write
1195000
heap
page read and write
7FF5DF0A5000
unkown
page readonly
40B0000
direct allocation
page read and write
7FF5DF52D000
unkown
page readonly
848E000
stack
page read and write
E1A7000
unkown
page execute and read and write
7FF5DF5FF000
unkown
page readonly
7FF5DF0C3000
unkown
page readonly
7FF5DF57F000
unkown
page readonly
10970000
heap
page read and write
2780000
trusted library allocation
page read and write
47A2000
unkown
page read and write
41D3000
direct allocation
page read and write
E00000
heap
page read and write
2780000
trusted library allocation
page read and write
4669000
direct allocation
page execute and read and write
BFBA000
unkown
page read and write
3EAF000
heap
page read and write
7FF5DF4C6000
unkown
page readonly
47D9000
unkown
page read and write
A104000
unkown
page read and write
7FF5DF43C000
unkown
page readonly
7FF5DF0A2000
unkown
page readonly
BFA1000
unkown
page read and write
C19D000
unkown
page read and write
7FF5DF5A8000
unkown
page readonly
910000
heap
page readonly
3200000
heap
page read and write
7FF5DF398000
unkown
page readonly
FA1000
trusted library allocation
page execute and read and write
2A50000
heap
page read and write
C385000
unkown
page read and write
7FF5DF211000
unkown
page readonly
A734000
unkown
page read and write
3185000
stack
page read and write
8400000
heap
page read and write
34B0000
unkown
page readonly
739B000
unkown
page read and write
C183000
unkown
page read and write
B010000
unkown
page read and write
7FF5DF429000
unkown
page readonly
C298000
unkown
page read and write
7FF5DF18E000
unkown
page readonly
2D30000
unkown
page read and write
A13000
heap
page read and write
22FEB350000
heap
page read and write
602000
heap
page read and write
FA0000
trusted library allocation
page execute and read and write
C13A000
unkown
page read and write
7FF5DF2E5000
unkown
page readonly
7ACE000
stack
page read and write
7FF5DF3B9000
unkown
page readonly
BA76000
stack
page read and write
7DF4E6780000
unkown
page readonly
C013000
unkown
page read and write
7B4C000
stack
page read and write
377E000
direct allocation
page execute and read and write
B09E000
stack
page read and write
22FEB329000
heap
page read and write
7FF5DF488000
unkown
page readonly
C00000
heap
page read and write
414000
heap
page read and write
9F51000
unkown
page read and write
C75000
stack
page read and write
A0B1000
unkown
page read and write
40B0000
direct allocation
page read and write
F91000
trusted library allocation
page execute and read and write
3E14000
heap
page read and write
7FF5DEF57000
unkown
page readonly
BF7E000
unkown
page read and write
7FF5DF582000
unkown
page readonly
3394000
unkown
page read and write
9D1F000
stack
page read and write
7FF5DF5E9000
unkown
page readonly
7FF5DF486000
unkown
page readonly
F7B79FE000
stack
page read and write
7FF5DF07D000
unkown
page readonly
7FF5DEE4E000
unkown
page readonly
437E000
direct allocation
page read and write
970000
heap
page read and write
990000
trusted library allocation
page read and write
43EE000
direct allocation
page read and write
1E0000
heap
page read and write
E0F000
heap
page read and write
C01A000
unkown
page read and write
41E0000
direct allocation
page read and write
3010000
heap
page read and write
2947000
heap
page read and write
7FF5DF3C2000
unkown
page readonly
4040000
direct allocation
page read and write
C12000
heap
page read and write
74D6000
unkown
page read and write
A0B1000
unkown
page read and write
3B2F000
unclassified section
page read and write
1083D000
unkown
page read and write
73AF000
unkown
page read and write
A6EE000
unkown
page read and write
35E0000
direct allocation
page execute and read and write
7FF5DF4BD000
unkown
page readonly
35CF000
heap
page read and write
C2E4000
unkown
page read and write
88DE000
stack
page read and write
A0A7000
unkown
page read and write
A13000
heap
page read and write
3F05000
heap
page read and write
987C000
unkown
page read and write
E5E000
heap
page read and write
F7B7AFE000
stack
page read and write
9A000
stack
page read and write
B1C0000
unkown
page readonly
3185000
stack
page read and write
891C000
unkown
page read and write
7FF5DF5B3000
unkown
page readonly
C298000
unkown
page read and write
4811000
direct allocation
page execute and read and write
7FF5DEF84000
unkown
page readonly
7A30000
unkown
page read and write
F004000
unkown
page read and write
7FF5DE531000
unkown
page readonly
73CD000
unkown
page read and write
7FF5DF60D000
unkown
page readonly
613000
heap
page read and write
9380000
unkown
page readonly
7FF5DF4AB000
unkown
page readonly
2780000
trusted library allocation
page read and write
7FF5DF392000
unkown
page readonly
A88000
heap
page read and write
7FF5DE535000
unkown
page readonly
14D0000
heap
page read and write
B589000
stack
page read and write
2DDD000
stack
page read and write
C23D000
unkown
page read and write
3DD6000
heap
page read and write
76F0000
unkown
page read and write
C24C000
unkown
page read and write
7FF5DF57F000
unkown
page readonly
4A7000
unkown
page read and write
4760000
unkown
page read and write
7499000
unkown
page read and write
4AB000
unkown
page readonly
7FF5DF5A8000
unkown
page readonly
A758000
unkown
page read and write
5110000
unkown
page write copy
7380000
unkown
page read and write
7940000
unkown
page readonly
355E000
heap
page read and write
7FF5DEEEB000
unkown
page readonly
2D60000
heap
page read and write
4766000
unkown
page read and write
83B0000
unkown
page readonly
A072000
unkown
page read and write
3123000
heap
page read and write
7FF5DF349000
unkown
page readonly
7FF5DF3BE000
unkown
page readonly
5CC000
stack
page read and write
EFE000
stack
page read and write
22FEB386000
heap
page read and write
7FF5DF41B000
unkown
page readonly
7FF5DF4EC000
unkown
page readonly
7FF5DF3B5000
unkown
page readonly
10848000
unkown
page read and write
A13000
heap
page read and write
BFDF000
unkown
page read and write
C4CF000
unkown
page read and write
ACAE000
stack
page read and write
7FF5DF532000
unkown
page readonly
2754000
heap
page read and write
7FF5DF3B5000
unkown
page readonly
7FF5DEFF0000
unkown
page readonly
BFA5000
unkown
page read and write
4E00000
heap
page read and write
C192000
unkown
page read and write
3EC0000
heap
page read and write
7FF5DF211000
unkown
page readonly
48A0000
unkown
page read and write
10972000
heap
page read and write
7DF4E6761000
unkown
page execute read
7FF5DEE56000
unkown
page readonly
7FF5DF343000
unkown
page readonly
490000
unkown
page write copy
7FF5DF532000
unkown
page readonly
2780000
trusted library allocation
page read and write
7FF5DF45C000
unkown
page readonly
7FF5DF41B000
unkown
page readonly
10848000
unkown
page read and write
971C000
unkown
page read and write
2D96000
heap
page read and write
7FF5DF584000
unkown
page readonly
490000
unkown
page read and write
ECD000
direct allocation
page execute and read and write
1083E000
unkown
page read and write
487A000
unkown
page read and write
74A9000
unkown
page read and write
9F7C000
unkown
page read and write
74F1000
unkown
page read and write
2754000
heap
page read and write
2780000
trusted library allocation
page read and write
840000
heap
page read and write
C01A000
unkown
page read and write
93E000
stack
page read and write
2780000
trusted library allocation
page read and write
98A1000
unkown
page read and write
7FF5DF08F000
unkown
page readonly
7499000
unkown
page read and write
7A40000
unkown
page readonly
79E0000
unkown
page readonly
3DB2000
heap
page read and write
BF8C000
unkown
page read and write
7FF5DE5CC000
unkown
page readonly
7FF5DF5F0000
unkown
page readonly
414000
heap
page read and write
7FF5DF364000
unkown
page readonly
488A000
unkown
page read and write
7FF5DF07D000
unkown
page readonly
3E33000
heap
page execute and read and write
7FF5DF20A000
unkown
page readonly
83B000
stack
page read and write
7FF5DF343000
unkown
page readonly
9F3E000
unkown
page read and write
7FF5DF54D000
unkown
page readonly
2754000
heap
page read and write
2F9C000
stack
page read and write
2D8B000
heap
page read and write
34B6000
unclassified section
page execute and read and write
42F3000
heap
page read and write
A00000
heap
page read and write
EFC4000
unkown
page read and write
3201000
heap
page read and write
C1CC000
unkown
page read and write
4788000
unkown
page read and write
482000
unkown
page readonly
7FF5DE5CC000
unkown
page readonly
7FF5DF486000
unkown
page readonly
7FF5DF4FB000
unkown
page readonly
3EC0000
heap
page read and write
7FF5DF21B000
unkown
page readonly
99AB000
unkown
page read and write
4309000
direct allocation
page read and write
7FF5DF55A000
unkown
page readonly
22FEB63E000
heap
page read and write
C24C000
unkown
page read and write
7FF5DEFC2000
unkown
page readonly
3D56000
heap
page read and write
22FEB260000
heap
page read and write
479B000
unkown
page read and write
4750000
unkown
page read and write
7D0D000
stack
page read and write
22FEB386000
heap
page read and write
2938000
heap
page read and write
64A0000
trusted library allocation
page read and write
3129000
heap
page read and write
F3E000
stack
page read and write
9A6C000
stack
page read and write
7FF5DF5B0000
unkown
page readonly
414000
heap
page read and write
7FF5DF48B000
unkown
page readonly
336F000
unkown
page read and write
7FF5DF25B000
unkown
page readonly
7FF5DEF57000
unkown
page readonly
7A30000
unkown
page read and write
7230000
unkown
page read and write
7FF5DF5E9000
unkown
page readonly
BD7F000
stack
page read and write
7FF5DEFF5000
unkown
page readonly
22FEB630000
heap
page read and write
27F0000
unkown
page readonly
7FF5DF0CC000
unkown
page readonly
C183000
unkown
page read and write
AA5000
heap
page read and write
B9BF000
stack
page read and write
1085F000
unkown
page read and write
3DF4000
heap
page read and write
28A0000
unkown
page readonly
10300000
system
page execute and read and write
2D1E000
stack
page read and write
2780000
trusted library allocation
page read and write
7FF5DF398000
unkown
page readonly
73BA000
unkown
page read and write
7FF5DF4EC000
unkown
page readonly
2DAF000
heap
page read and write
C23D000
unkown
page read and write
E06000
heap
page read and write
C383000
unkown
page read and write
9704000
unkown
page read and write
48E0000
unkown
page read and write
2DA1000
heap
page read and write
1085E000
unkown
page read and write
47D9000
unkown
page read and write
3371000
unkown
page read and write
2952000
heap
page read and write
B4DB000
stack
page read and write
9F10000
unkown
page read and write
7FF5DF5FF000
unkown
page readonly
4EC0000
heap
page read and write
9A6C000
stack
page read and write
971A000
unkown
page read and write
437D000
direct allocation
page read and write
9F78000
unkown
page read and write
830F000
stack
page read and write
7FF5DF396000
unkown
page readonly
2590000
heap
page read and write
7FF5DF0F6000
unkown
page readonly
650000
system
page execute and read and write
A758000
unkown
page read and write
2754000
heap
page read and write
C1CC000
unkown
page read and write
2801000
heap
page read and write
B11E000
stack
page read and write
7A40000
unkown
page readonly
452D000
heap
page read and write
83E0000
unkown
page read and write
73E5000
unkown
page read and write
BF40000
unkown
page read and write
3420000
trusted library allocation
page execute and read and write
4379000
direct allocation
page read and write
7FF5DF2DA000
unkown
page readonly
88E0000
unkown
page read and write
BFA1000
unkown
page read and write
3E05000
heap
page read and write
EF8B000
unkown
page read and write
3F3E000
heap
page read and write
3356000
unkown
page read and write
C3F4000
unkown
page read and write
7FF5DF429000
unkown
page readonly
B2DC000
stack
page read and write
414000
heap
page read and write
C003000
unkown
page read and write
BFA7000
unkown
page read and write
AD2B000
stack
page read and write
D69000
heap
page read and write
41D0000
heap
page read and write
437D000
direct allocation
page read and write
1195000
heap
page read and write
C048000
unkown
page read and write
714000
system
page execute and read and write
3070000
heap
page read and write
7FF5DEFFC000
unkown
page readonly
B589000
stack
page read and write
3201000
heap
page read and write
7FF5DF4FB000
unkown
page readonly
9B1E000
stack
page read and write
C354000
unkown
page read and write
64A0000
trusted library allocation
page read and write
7FF5DF3D4000
unkown
page readonly
482000
unkown
page readonly
30B4000
heap
page read and write
430D000
direct allocation
page read and write
7FF5DF623000
unkown
page readonly
98A1000
unkown
page read and write
A1E000
stack
page read and write
A90000
direct allocation
page read and write
4163000
direct allocation
page read and write
7FF5DEF87000
unkown
page readonly
7FF5DEFE8000
unkown
page readonly
7930000
unkown
page readonly
7FF5DF2FE000
unkown
page readonly
7FF5DF25B000
unkown
page readonly
7FF5DF21F000
unkown
page readonly
7FF5DF341000
unkown
page readonly
3E31000
heap
page read and write
3D3E000
heap
page read and write
4379000
direct allocation
page read and write
41E0000
direct allocation
page read and write
7FF5C0B65000
unkown
page readonly
10820000
unkown
page read and write
A09A000
unkown
page read and write
C381000
unkown
page read and write
D99000
heap
page read and write
4250000
direct allocation
page read and write
890000
heap
page read and write
2958000
heap
page read and write
9FC3000
unkown
page read and write
83E0000
unkown
page read and write
AEF0000
unkown
page read and write
C18A000
unkown
page read and write
7FF5DF156000
unkown
page readonly
7B50000
unkown
page readonly
73B4000
unkown
page read and write
10832000
unkown
page read and write
52C3000
unkown
page read and write
8400000
heap
page read and write
401000
unkown
page execute read
48E0000
unkown
page read and write
7FF5DF5BE000
unkown
page readonly
2754000
heap
page read and write
2DC000
stack
page read and write
3107000
stack
page read and write
BF10000
unkown
page readonly
A80000
heap
page read and write
2780000
trusted library allocation
page read and write
7FF5DF39C000
unkown
page readonly
7DF4E6771000
unkown
page execute read
3E32000
heap
page read and write
989F000
unkown
page read and write
C354000
unkown
page read and write
9FC3000
unkown
page read and write
AE6F000
stack
page read and write
2754000
heap
page read and write
7FF5DF478000
unkown
page readonly
3D0000
system
page execute read
A13000
heap
page read and write
41D0000
trusted library allocation
page read and write
41D3000
direct allocation
page read and write
BFB3000
unkown
page read and write
4163000
direct allocation
page read and write
3750000
unclassified section
page execute and read and write
2F2E000
heap
page read and write
47F3000
unkown
page read and write
96DF000
unkown
page read and write
3E40000
heap
page read and write
401000
unkown
page execute read
9714000
unkown
page read and write
7800000
unkown
page read and write
BF6D000
unkown
page read and write
3375000
unkown
page read and write
710000
system
page execute and read and write
4163000
direct allocation
page read and write
7FF5DF478000
unkown
page readonly
C18A000
unkown
page read and write
40B0000
direct allocation
page read and write
BF9D000
unkown
page read and write
3431000
heap
page read and write
9D0000
heap
page read and write
FECA000
system
page execute and read and write
33C000
stack
page read and write
B500000
unkown
page readonly
7940000
unkown
page readonly
613000
heap
page read and write
C23D000
unkown
page read and write
7FF5DF47E000
unkown
page readonly
7FF5DF1EB000
unkown
page readonly
34C0000
trusted library allocation
page read and write
BF7E000
unkown
page read and write
87B1000
unkown
page read and write
7FF5DEF4B000
unkown
page readonly
2DA1000
heap
page read and write
3DB0000
heap
page read and write
4379000
direct allocation
page read and write
4250000
direct allocation
page read and write
7FF5DEF90000
unkown
page readonly
9700000
unkown
page read and write
860000
heap
page read and write
3D62000
heap
page read and write
FE0000
unkown
page read and write
3400000
unclassified section
page execute and read and write
73C3000
unkown
page read and write
7FF5DF382000
unkown
page readonly
38AD000
direct allocation
page execute and read and write
335B000
unkown
page read and write
400000
unkown
page readonly
7FF5DF584000
unkown
page readonly
C1A9000
unkown
page read and write
C2E4000
unkown
page read and write
D29000
direct allocation
page execute and read and write
437E000
direct allocation
page read and write
7ACE000
stack
page read and write
9F60000
unkown
page read and write
7FF5DF571000
unkown
page readonly
9D1F000
stack
page read and write
2770000
heap
page read and write
2780000
trusted library allocation
page read and write
83D0000
unkown
page read and write
9C1D000
stack
page read and write
A13000
heap
page read and write
7FF5DEE52000
unkown
page readonly
96DF000
unkown
page read and write
7FF5DF5CC000
unkown
page readonly
8918000
unkown
page read and write
34B0000
unkown
page readonly
7FF5DF4BD000
unkown
page readonly
C461000
unkown
page read and write
7FF5DF3BE000
unkown
page readonly
2E30000
unkown
page read and write
7FF5DF361000
unkown
page readonly
7FF5DF4AB000
unkown
page readonly
3D77000
heap
page read and write
3281000
stack
page read and write
64A0000
trusted library allocation
page read and write
C034000
unkown
page read and write
7FF5DF089000
unkown
page readonly
A08A000
unkown
page read and write
9E0000
trusted library allocation
page execute and read and write
7FF5DF0A5000
unkown
page readonly
7910000
unkown
page readonly
4379000
direct allocation
page read and write
BF9B000
unkown
page read and write
7FF5DF435000
unkown
page readonly
401000
unkown
page execute read
43EE000
direct allocation
page read and write
3E2F000
heap
page read and write
7FF5DF284000
unkown
page readonly
885E000
stack
page read and write
7FF5DF203000
unkown
page readonly
3FB7000
heap
page read and write
30DD000
heap
page read and write
7FF5DF1D1000
unkown
page readonly
BF9D000
unkown
page read and write
7FF5DE531000
unkown
page readonly
4040000
direct allocation
page read and write
7FF5DEFB7000
unkown
page readonly
7FF5DF5FC000
unkown
page readonly
E06000
heap
page read and write
73A3000
unkown
page read and write
352D000
direct allocation
page execute and read and write
7FF5DF3E4000
unkown
page readonly
9563000
unkown
page read and write
336C000
unkown
page read and write
7FF5DF09F000
unkown
page readonly
978C000
unkown
page read and write
7FF5DF507000
unkown
page readonly
437D000
direct allocation
page read and write
7870000
unkown
page read and write
7FF5DF191000
unkown
page readonly
C4C8000
unkown
page read and write
BF10000
unkown
page readonly
AEF0000
unkown
page read and write
7FF5DF361000
unkown
page readonly
3281000
stack
page read and write
7FF5DF3C6000
unkown
page readonly
93E000
stack
page read and write
2D96000
heap
page read and write
AF0000
heap
page read and write
7FF5DF58A000
unkown
page readonly
7FF5DF04D000
unkown
page readonly
4163000
direct allocation
page read and write
22FEB635000
heap
page read and write
2780000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
41D3000
direct allocation
page read and write
7FF5DF5F0000
unkown
page readonly
74D6000
unkown
page read and write
400000
unkown
page readonly
48FE000
stack
page read and write
C13C000
unkown
page read and write
4250000
direct allocation
page read and write
C527000
unkown
page read and write
7FF5DF18E000
unkown
page readonly
4163000
direct allocation
page read and write
4163000
direct allocation
page read and write
BF98000
unkown
page read and write
28A0000
unkown
page readonly
2754000
heap
page read and write
9700000
unkown
page read and write
1084C000
unkown
page read and write
7FF5DF42F000
unkown
page readonly
7810000
unkown
page read and write
4309000
direct allocation
page read and write
482000
unkown
page readonly
7FF5DF458000
unkown
page readonly
7FF5DF195000
unkown
page readonly
89F000
stack
page read and write
437E000
direct allocation
page read and write
430D000
direct allocation
page read and write
9F10000
unkown
page read and write
22FEB5A0000
heap
page read and write
8FE000
stack
page read and write
7FF5DF284000
unkown
page readonly
9B99000
stack
page read and write
B09E000
stack
page read and write
2EF2000
heap
page read and write
C45F000
unkown
page read and write
600000
heap
page read and write
47F1000
unkown
page read and write
A8B000
heap
page read and write
7FF5DF3FC000
unkown
page readonly
73B8000
unkown
page read and write
7FF5DF20A000
unkown
page readonly
7FF5DF549000
unkown
page readonly
3280000
heap
page read and write
96F5000
unkown
page read and write
3E37000
heap
page read and write
7FF5DF52D000
unkown
page readonly
874C000
stack
page read and write
FF1000
unkown
page readonly
7D90000
unkown
page read and write
2780000
trusted library allocation
page read and write
F7B7CFB000
stack
page read and write
7DF4E6781000
unkown
page execute read
3DB2000
heap
page read and write
2D80000
heap
page read and write
C003000
unkown
page read and write
7FF5DEFF8000
unkown
page readonly
7FF5DF5B0000
unkown
page readonly
2890000
unkown
page readonly
C149000
unkown
page read and write
C1CC000
unkown
page read and write
7FF5DF366000
unkown
page readonly
44B8000
heap
page read and write
40B0000
direct allocation
page read and write
3E41000
heap
page read and write
7FF5DF5B3000
unkown
page readonly
613000
heap
page read and write
2780000
trusted library allocation
page read and write
11A0000
unkown
page readonly
7FF5DF4A6000
unkown
page readonly
7FF5DF029000
unkown
page readonly
10835000
unkown
page read and write
7FF5DF1D1000
unkown
page readonly
392E000
stack
page read and write
7FF5DEF06000
unkown
page readonly
3362000
unkown
page read and write
43EE000
direct allocation
page read and write
4379000
direct allocation
page read and write
22FEB34B000
heap
page read and write
2952000
heap
page read and write
7FF5DE539000
unkown
page readonly
7FF5DF24E000
unkown
page readonly
43EE000
direct allocation
page read and write
430D000
direct allocation
page read and write
400000
unkown
page readonly
7FF5DF038000
unkown
page readonly
3D66000
heap
page read and write
7FF5DF229000
unkown
page readonly
7FF5DF01B000
unkown
page readonly
C1A9000
unkown
page read and write
EF8B000
unkown
page read and write
7FF5DF537000
unkown
page readonly
7FF5DF45A000
unkown
page readonly
C19D000
unkown
page read and write
A68000
heap
page read and write
7FF5DF364000
unkown
page readonly
7FF5DF0F1000
unkown
page readonly
2754000
heap
page read and write
BF9B000
unkown
page read and write
8B6B000
unkown
page read and write
B9E0000
unkown
page read and write
4882000
direct allocation
page execute and read and write
B45A000
stack
page read and write
C425000
unkown
page read and write
C3A0000
unkown
page read and write
27D0000
unkown
page read and write
7FF5DF55A000
unkown
page readonly
103CD000
system
page execute and read and write
7DF4E6780000
unkown
page readonly
2CE0000
trusted library allocation
page read and write
7FF5DF591000
unkown
page readonly
BF90000
unkown
page read and write
7FF5DF582000
unkown
page readonly
73A3000
unkown
page read and write
A60000
heap
page read and write
96F5000
unkown
page read and write
37B000
stack
page read and write
AB0D000
stack
page read and write
FF1000
unkown
page readonly
7FF5DEF84000
unkown
page readonly
F7B76FF000
stack
page read and write
9729000
unkown
page read and write
7FF5DF222000
unkown
page readonly
A6D2000
unkown
page read and write
40B0000
direct allocation
page read and write
7FF5DF452000
unkown
page readonly
BF6D000
unkown
page read and write
353E000
stack
page read and write
AEEE000
stack
page read and write
47F1000
unkown
page read and write
914B000
stack
page read and write
73BC000
unkown
page read and write
3281000
heap
page read and write
8390000
unkown
page read and write
8AF000
stack
page read and write
5241000
unkown
page read and write
C183000
unkown
page read and write
BFAD000
unkown
page read and write
7FF5DF221000
unkown
page readonly
3287000
heap
page read and write
3E12000
heap
page read and write
2780000
trusted library allocation
page read and write
482000
unkown
page readonly
7FF5DF50F000
unkown
page readonly
34C0000
trusted library allocation
page read and write
8910000
unkown
page read and write
31E4000
heap
page read and write
4760000
unkown
page read and write
7FF5DF425000
unkown
page readonly
7DF4E6781000
unkown
page execute read
22FEB280000
heap
page read and write
4855000
unkown
page read and write
9C1D000
stack
page read and write
10972000
heap
page read and write
7FF5DF45A000
unkown
page readonly
7FF5DF0C1000
unkown
page readonly
7FF5DE4F2000
unkown
page readonly
29C000
stack
page read and write
A743000
unkown
page read and write
41E0000
direct allocation
page read and write
7FF5DF4C6000
unkown
page readonly
7FF5DF5B5000
unkown
page readonly
7FF5DF43C000
unkown
page readonly
BEF0000
heap
page read and write
7FF5DF3F7000
unkown
page readonly
4AB000
unkown
page readonly
914B000
stack
page read and write
9F23000
unkown
page read and write
3D52000
heap
page read and write
2750000
heap
page read and write
490000
unkown
page write copy
FE00000
unkown
page read and write
9605000
unkown
page read and write
A13000
heap
page read and write
7FF5DF0D2000
unkown
page readonly
335B000
unkown
page read and write
98AD000
unkown
page read and write
C45F000
unkown
page read and write
B2DC000
stack
page read and write
C474000
unkown
page read and write
7FF5DF0C9000
unkown
page readonly
480D000
direct allocation
page execute and read and write
BFAD000
unkown
page read and write
978C000
unkown
page read and write
8FE000
stack
page read and write
3E60000
heap
page read and write
D50000
unkown
page read and write
7FF5DF4E7000
unkown
page readonly
BF84000
unkown
page read and write
800000
heap
page read and write
7FF5DEF4B000
unkown
page readonly
BF9F000
unkown
page read and write
C05000
heap
page read and write
73C3000
unkown
page read and write
165F000
stack
page read and write
3171000
heap
page read and write
7FF5DF09B000
unkown
page readonly
2F10000
unkown
page read and write
400000
unkown
page readonly
C17000
heap
page read and write
7FF5DF01B000
unkown
page readonly
C1C4000
unkown
page read and write
414000
heap
page read and write
7FF5DF39C000
unkown
page readonly
7840000
unkown
page read and write
7FF5DF2CB000
unkown
page readonly
2754000
heap
page read and write
7399000
unkown
page read and write
7FF5DF59E000
unkown
page readonly
332D000
heap
page read and write
7FF5DF06F000
unkown
page readonly
7FF5DF16B000
unkown
page readonly
93E000
stack
page read and write
7FF5DEF87000
unkown
page readonly
3DAF000
stack
page read and write
1190000
heap
page read and write
950B000
stack
page read and write
A00000
heap
page read and write
7FF5DEFCB000
unkown
page readonly
7FF5DF0A2000
unkown
page readonly
7FF5DEFF0000
unkown
page readonly
4828000
unkown
page read and write
4379000
direct allocation
page read and write
52D9000
unkown
page read and write
4A7000
unkown
page read and write
7FF5DF09B000
unkown
page readonly
4309000
direct allocation
page read and write
962B000
unkown
page read and write
F7B78FE000
stack
page read and write
2E50000
unkown
page readonly
3071000
heap
page read and write
A703000
unkown
page read and write
B1A000
heap
page read and write
400000
heap
page read and write
A758000
unkown
page read and write
C034000
unkown
page read and write
2E50000
unkown
page readonly
4788000
unkown
page read and write
C4EC000
unkown
page read and write
9F2A000
unkown
page read and write
C159000
unkown
page read and write
7FF5DF606000
unkown
page readonly
C14E000
unkown
page read and write
830F000
stack
page read and write
3B0000
system
page execute and read and write
3DE0000
heap
page read and write
7FF5DF2BA000
unkown
page readonly
980000
unkown
page readonly
7FF5DEFBD000
unkown
page readonly
2754000
heap
page read and write
ADC0000
unkown
page readonly
FE00000
system
page execute and read and write
F48000
stack
page read and write
64A0000
trusted library allocation
page read and write
3304000
unkown
page read and write
2754000
heap
page read and write
48B0000
unkown
page read and write
7380000
unkown
page read and write
7FF5DF08B000
unkown
page readonly
9F27000
unkown
page read and write
22FEB373000
heap
page read and write
2EB0000
unkown
page readonly
BCFD000
stack
page read and write
7FF5DF1EE000
unkown
page readonly
10848000
unkown
page read and write
2780000
trusted library allocation
page read and write
7FF5DF017000
unkown
page readonly
7FF5DF2E2000
unkown
page readonly
E00000
heap
page read and write
7FF5DF081000
unkown
page readonly
2754000
heap
page read and write
C00000
heap
page read and write
7FF5DF0C1000
unkown
page readonly
A13000
heap
page read and write
D9E000
direct allocation
page execute and read and write
9F63000
unkown
page read and write
9380000
unkown
page readonly
838B000
stack
page read and write
C3C7000
unkown
page read and write
2754000
heap
page read and write
41E0000
direct allocation
page read and write
100000
heap
page read and write
B358000
stack
page read and write
3477000
unclassified section
page execute and read and write
3E12000
heap
page read and write
7830000
unkown
page read and write
E70000
unkown
page readonly
400000
unkown
page readonly
7395000
unkown
page read and write
2780000
trusted library allocation
page read and write
7FF5DF081000
unkown
page readonly
BFB3000
unkown
page read and write
9F23000
unkown
page read and write
D01000
heap
page read and write
1084C000
unkown
page read and write
73AF000
unkown
page read and write
2780000
trusted library allocation
page read and write
7FF5DF4A6000
unkown
page readonly
2754000
heap
page read and write
B120000
unkown
page readonly
3801000
heap
page read and write
83D0000
unkown
page read and write
31E0000
heap
page read and write
9F1000
trusted library allocation
page execute and read and write
2A9E000
unkown
page read and write
C3BB000
unkown
page read and write
96ED000
unkown
page read and write
F42000
direct allocation
page execute and read and write
25DF000
stack
page read and write
7991000
unkown
page read and write
9718000
unkown
page read and write
370D000
direct allocation
page execute and read and write
22FEB386000
heap
page read and write
4040000
direct allocation
page read and write
FEBA000
system
page execute and read and write
9F0000
heap
page read and write
E1E6000
unkown
page execute and read and write
130F000
stack
page read and write
4AB000
unkown
page readonly
7FF5DF392000
unkown
page readonly
3281000
heap
page read and write
2754000
heap
page read and write
22FEB350000
heap
page read and write
3300000
heap
page read and write
7FF5DF606000
unkown
page readonly
980000
heap
page read and write
9F74000
unkown
page read and write
9F0000
heap
page read and write
482000
unkown
page readonly
1770000
heap
page read and write
9716000
unkown
page read and write
4D80000
unclassified section
page execute and read and write
B60A000
stack
page read and write
7FF5DF488000
unkown
page readonly
312D000
heap
page read and write
386D000
heap
page read and write
2780000
trusted library allocation
page read and write
7FF5DF017000
unkown
page readonly
9B0000
heap
page read and write
7FF5DF623000
unkown
page readonly
7FF5C0B65000
unkown
page readonly
2F27000
heap
page read and write
7FF5DEFAC000
unkown
page readonly
7FF5DF5F6000
unkown
page readonly
74A9000
unkown
page read and write
3290000
unkown
page readonly
437D000
direct allocation
page read and write
100000
heap
page read and write
8FE000
stack
page read and write
8C28000
stack
page read and write
A12000
heap
page read and write
39AE000
stack
page read and write
7FF5DF248000
unkown
page readonly
A09A000
unkown
page read and write
307F000
stack
page read and write
2754000
heap
page read and write
7FF5DF45C000
unkown
page readonly
9704000
unkown
page read and write
38B1000
direct allocation
page execute and read and write
401000
unkown
page execute read
A78000
heap
page read and write
BD7F000
stack
page read and write
7FF5DF067000
unkown
page readonly
7FF5DF12A000
unkown
page readonly
C3AF000
unkown
page read and write
C19D000
unkown
page read and write
7FF5DEFFC000
unkown
page readonly
E80000
unkown
page read and write
A0FC000
unkown
page read and write
7FF5DF62C000
unkown
page readonly
7FF5DF045000
unkown
page readonly
11A0000
unkown
page readonly
C75000
stack
page read and write
3382000
unkown
page read and write
ED1000
direct allocation
page execute and read and write
A6D2000
unkown
page read and write
2754000
heap
page read and write
7FF5DF310000
unkown
page readonly
F7B75FF000
stack
page read and write
7230000
unkown
page read and write
3E01000
heap
page read and write
430D000
direct allocation
page read and write
5110000
unkown
page write copy
41D3000
direct allocation
page read and write
414000
heap
page read and write
B80000
heap
page read and write
33AA000
heap
page read and write
2890000
unkown
page readonly
A734000
unkown
page read and write
1660000
heap
page read and write
320C000
stack
page read and write
C4C9000
unkown
page read and write
A104000
unkown
page read and write
7DF5E896A000
unkown
page readonly
97F3000
unkown
page read and write
73BC000
unkown
page read and write
22FEB375000
heap
page read and write
7FF5DF42F000
unkown
page readonly
3065000
heap
page read and write
7DF4E6791000
unkown
page execute read
7FF5DE9CB000
unkown
page readonly
A02D000
unkown
page read and write
7FF5DEE4E000
unkown
page readonly
A05000
heap
page read and write
7FF5DF095000
unkown
page readonly
10970000
heap
page read and write
A738000
unkown
page read and write
7FF5DF3AA000
unkown
page readonly
7B50000
unkown
page readonly
A6CF000
unkown
page read and write
7DF5E895F000
unkown
page readonly
7FF5DEFAC000
unkown
page readonly
A744000
unkown
page read and write
7FF5DF229000
unkown
page readonly
ADC0000
unkown
page readonly
9E1E000
stack
page read and write
2780000
trusted library allocation
page read and write
9D9F000
stack
page read and write
7FF5DEFF5000
unkown
page readonly
7FF5DF3AA000
unkown
page readonly
B259000
stack
page read and write
A6F1000
unkown
page read and write
BFEF000
unkown
page read and write
95F0000
unkown
page read and write
7FF5DF49C000
unkown
page readonly
336C000
unkown
page read and write
7FF5DF53F000
unkown
page readonly
FB1000
trusted library allocation
page execute and read and write
7FF5DF4F7000
unkown
page readonly
7FF5DE535000
unkown
page readonly
47B6000
unkown
page read and write
7C89000
stack
page read and write
4309000
direct allocation
page read and write
9E0000
unkown
page readonly
7840000
unkown
page read and write
980000
unkown
page readonly
838B000
stack
page read and write
7FF5DF091000
unkown
page readonly
A106000
unkown
page read and write
18DF000
stack
page read and write
3DE9000
heap
page read and write
7FF5DEFE2000
unkown
page readonly
9729000
unkown
page read and write
E130000
unkown
page execute and read and write
3E27000
heap
page read and write
4855000
unkown
page read and write
36D1000
direct allocation
page execute and read and write
401000
unkown
page execute read
AFFD000
stack
page read and write
970000
unkown
page readonly
9489000
stack
page read and write
7FF5DF341000
unkown
page readonly
980000
heap
page read and write
7FF5DF06F000
unkown
page readonly
3394000
unkown
page read and write
10800000
unkown
page read and write
7FF5DF62C000
unkown
page readonly
3709000
direct allocation
page execute and read and write
C17000
heap
page read and write
2870000
unkown
page read and write
BF98000
unkown
page read and write
7FF5DEF06000
unkown
page readonly
2870000
unkown
page read and write
41E0000
direct allocation
page read and write
30B0000
heap
page read and write
1097A000
heap
page read and write
43EE000
direct allocation
page read and write
BFAB000
unkown
page read and write
96F1000
unkown
page read and write
7FF5DEFAF000
unkown
page readonly
9D5000
heap
page read and write
A93000
heap
page read and write
7FF5DF12A000
unkown
page readonly
7DF5E896A000
unkown
page readonly
7FF5DF3EA000
unkown
page readonly
613000
heap
page read and write
400000
unkown
page readonly
3529000
direct allocation
page execute and read and write
76F0000
unkown
page read and write
ACAE000
stack
page read and write
3373000
unkown
page read and write
4AB000
unkown
page readonly
7DF4E6761000
unkown
page execute read
3936000
unclassified section
page read and write
A0E000
stack
page read and write
7FF5DEFA6000
unkown
page readonly
C45B000
unkown
page read and write
7FF5DF2E2000
unkown
page readonly
920000
heap
page read and write
4379000
direct allocation
page read and write
401000
unkown
page execute read
7FF5C0B6B000
unkown
page readonly
E80000
unkown
page read and write
34C0000
trusted library allocation
page read and write
52D9000
unkown
page read and write
41E0000
direct allocation
page read and write
7DF4E6760000
unkown
page readonly
2BBC000
heap
page read and write
2780000
trusted library allocation
page read and write
A742000
unkown
page read and write
3DB2000
heap
page read and write
10B7F000
system
page read and write
7FF5DF5A3000
unkown
page readonly
3DA7000
heap
page read and write
2754000
heap
page read and write
1085E000
unkown
page read and write
7FF5DF1EB000
unkown
page readonly
7FF5DF3F5000
unkown
page readonly
962B000
unkown
page read and write
40B0000
direct allocation
page read and write
C2E4000
unkown
page read and write
32B0000
unkown
page read and write
9F92000
unkown
page read and write
2C9A000
stack
page read and write
34C0000
unkown
page read and write
C3EF000
unkown
page read and write
989F000
unkown
page read and write
739B000
unkown
page read and write
BFAB000
unkown
page read and write
FEDF000
system
page execute and read and write
3D99000
heap
page read and write
3371000
unkown
page read and write
2754000
heap
page read and write
9CE000
stack
page read and write
10831000
unkown
page read and write
98A7000
unkown
page read and write
2754000
heap
page read and write
7FF5DF422000
unkown
page readonly
2DA1000
heap
page read and write
7FF5DF577000
unkown
page readonly
34C0000
trusted library allocation
page read and write
7FF5DF0F1000
unkown
page readonly
74F1000
unkown
page read and write
7870000
unkown
page read and write
BB1000
heap
page read and write
971A000
unkown
page read and write
909F000
stack
page read and write
7FF5DEFF8000
unkown
page readonly
3E1E000
heap
page read and write
319E000
heap
page read and write
73B6000
unkown
page read and write
D99000
heap
page read and write
490000
unkown
page write copy
7FF5DF3DF000
unkown
page readonly
A106000
unkown
page read and write
7FF5DF435000
unkown
page readonly
37FE000
stack
page read and write
7FF5DF3FC000
unkown
page readonly
9E9E000
stack
page read and write
3BE000
stack
page read and write
7DF4E67A1000
unkown
page execute read
4FD000
system
page execute and read and write
44BC000
heap
page read and write
BF40000
unkown
page read and write
9F7C000
unkown
page read and write
C24C000
unkown
page read and write
89F000
stack
page read and write
2754000
heap
page read and write
96E000
stack
page read and write
438F000
heap
page read and write
7FF5DF5D6000
unkown
page readonly
3356000
unkown
page read and write
1E0000
heap
page read and write
7DF4E6771000
unkown
page execute read
C00000
direct allocation
page execute and read and write
4250000
direct allocation
page read and write
4250000
direct allocation
page read and write
940000
heap
page read and write
940000
heap
page read and write
A20000
heap
page read and write
3281000
heap
page read and write
9714000
unkown
page read and write
9F51000
unkown
page read and write
2E7F000
unkown
page read and write
7FF5DF537000
unkown
page readonly
BFC3000
unkown
page read and write
D69000
heap
page read and write
7860000
unkown
page read and write
177F000
stack
page read and write
D2D000
direct allocation
page execute and read and write
48A0000
unkown
page read and write
7FF5DF539000
unkown
page readonly
There are 1763 hidden memdumps, click here to show them.