IOC Report
wait.dll.exe

loading gif

Files

File Path
Type
Category
Malicious
wait.dll.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Ajhu3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Alakow3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Iyufla1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\boiz3.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\boiz3.tmp-shm
data
dropped
C:\Users\user\AppData\Local\Temp\ruikcu.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\uxax32.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wait.dll.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\wait.dll.dll,Jump
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\wait.dll.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\wait.dll.dll",Jump
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\System32\cmd.exe
/c ipconfig /all
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /all
malicious
C:\Windows\System32\cmd.exe
/c systeminfo
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\cmd.exe
/c nltest /domain_trusts
malicious
C:\Windows\System32\cmd.exe
/c nltest /domain_trusts /all_trusts
malicious
C:\Windows\System32\cmd.exe
/c net view /all /domain
malicious
C:\Windows\System32\net.exe
net view /all /domain
malicious
C:\Windows\System32\cmd.exe
/c net view /all
malicious
C:\Windows\System32\net.exe
net view /all
malicious
C:\Windows\System32\cmd.exe
/c net group "Domain Admins" /domain
malicious
C:\Windows\System32\net.exe
net group "Domain Admins" /domain
malicious
C:\Windows\System32\cmd.exe
/c net config workstation
malicious
C:\Windows\System32\net.exe
net config workstation
malicious
C:\Windows\System32\cmd.exe
/c wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName | findstr /V /B /C:displayName || echo No Antivirus installed
malicious
C:\Windows\System32\cmd.exe
/c whoami /groups
malicious
C:\Windows\System32\whoami.exe
whoami /groups
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\wait.dll.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\nltest.exe
nltest /domain_trusts
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\nltest.exe
nltest /domain_trusts /all_trusts
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 group "Domain Admins" /domain
C:\Windows\System32\wbem\WMIC.exe
/Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get * /Format:List
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 config workstation
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName
C:\Windows\System32\findstr.exe
findstr /V /B /C:displayName
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://reateberam.com/test/
172.67.217.190
malicious
https://reateberam.com/
unknown
malicious
https://dogirafer.com/test/
104.21.68.89
malicious
https://dogirafer.com/
unknown
malicious
https://reateberam.com/files/stkm.bin
172.67.217.190
malicious
https://word.office.comon
unknown
https://reateberam.com/test/1303063_94378682313560_2056837URLS1https://dogirafer.com/test/4190877_54
unknown
http://r11.o.lencr.org0
unknown
https://powerpoint.office.comcember
unknown
https://reateberam.com/test/9362058_57969102112118_633157URLS1https://dogirafer.com/test/8477611_767
unknown
https://dogirafer.com/test/a
unknown
https://reateberam.com/test/4560D
unknown
https://huanvn.com:6542/gop.php6)
unknown
https://huanvn.com/
unknown
https://reateberam.com/test/t60G
unknown
https://excel.office.com
unknown
https://huanvn.com:6542/gop.phpK
unknown
http://schemas.micro
unknown
https://reateberam.com/test/X
unknown
https://vutarf.com/
unknown
http://x1.i.lew
unknown
https://dogirafer.com/m
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
https://huanvn.com:6542/stop.php
unknown
https://reateberam.com/test/w
unknown
https://huanvn.com:6542/gop.php5
unknown
https://vutarf.com/%
unknown
https://wns.windows.com/)s
unknown
https://dogirafer.com/Z#q
unknown
https://dogirafer.com/test/N#e
unknown
https://huanvn.com/~C
unknown
https://reateberam.com/files/stkm.bino
unknown
http://r11.o.lencr.org0#
unknown
https://reateberam.com/q
unknown
https://huanvn.com:6542/gop.php
unknown
https://dogirafer.com/3405117-2476756634-1003
unknown
https://huanvn.com:6542/gop.phpn)?
unknown
http://r10.o.lencr.org0#
unknown
https://reateberam.com/test/4560
unknown
https://vutarf.com:6542/stop.php
unknown
https://dogirafer.com/test/ys
unknown
https://reateberam.com/test/4439042_94940942440575_5318539URLS1https://dogirafer.com/test/3185439_50
unknown
https://outlook.com
unknown
https://reateberam.com/files/stkm.binSL
unknown
http://r11.i.lencr.org/0
unknown
https://dogirafer.com/.5
unknown
http://r10.o.lencr.o
unknown
https://vutarf.com:6542/stop.phpo
unknown
https://dogirafer.com/test/E
unknown
https://reateberam.com/test/3630449_22862766669148_5703346URLS1https://dogirafer.com/test/6092916_19
unknown
https://android.notify.windows.com/iOS
unknown
https://dogirafer.com/uo
unknown
https://vutarf.com/W
unknown
https://vutarf.com:6542/stop.phpu
unknown
https://api.msn.com/
unknown
https://reateberam.com/p
unknown
https://vutarf.com:6542/gop.php
unknown
https://huanvn.com/P
unknown
http://crl.v
unknown
https://huanvn.com/Q
unknown
https://dogirafer.com/eo
unknown
http://r10.i.lencr.org/0
unknown
There are 54 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
vutarf.com
94.232.43.224
malicious
reateberam.com
172.67.217.190
malicious
huanvn.com
103.57.249.207
malicious
dogirafer.com
104.21.68.89
malicious
bg.microsoft.map.fastly.net
199.232.214.172

IPs

IP
Domain
Country
Malicious
104.21.68.89
dogirafer.com
United States
malicious
172.67.217.190
reateberam.com
United States
malicious
103.57.249.207
huanvn.com
India
malicious
94.232.43.224
vutarf.com
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
There are 211 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1CEB022C000
heap
page read and write
malicious
1CEB01FE000
heap
page read and write
malicious
233A000C000
heap
page read and write
malicious
27619ADC000
heap
page read and write
malicious
27619B0B000
heap
page read and write
malicious
977A000
stack
page read and write
malicious
27619B0B000
heap
page read and write
malicious
233A003B000
heap
page read and write
malicious
233A003B000
heap
page read and write
malicious
1CEB022C000
heap
page read and write
malicious
18EA8511000
heap
page read and write
C90B000
unkown
page read and write
8920000
unkown
page execute and read and write
2BC16FE000
stack
page read and write
1CEAE48C000
heap
page read and write
27976DC0000
heap
page read and write
27619621000
direct allocation
page execute read
7FF5D720A000
unkown
page readonly
1390ACE4000
heap
page read and write
1CEAFCA8000
direct allocation
page readonly
3626000
unkown
page read and write
7FF5D765F000
unkown
page readonly
1CEAE3A8000
heap
page read and write
7FF5D7752000
unkown
page readonly
35CD000
unkown
page read and write
7654000
unkown
page read and write
4B6387E000
stack
page read and write
22477AA7000
heap
page read and write
7686000
unkown
page read and write
7AF1000
unkown
page read and write
9A84000
unkown
page read and write
18EA9E94000
heap
page read and write
C1A6EAB000
stack
page read and write
C5F0000
unkown
page read and write
A40E000
unkown
page read and write
9A90000
unkown
page read and write
3540000
unkown
page read and write
362D000
unkown
page read and write
35C9000
unkown
page read and write
276196E0000
trusted library allocation
page read and write
7FF5D7230000
unkown
page readonly
276196D0000
remote allocation
page read and write
35DC000
unkown
page read and write
B7DC000
stack
page read and write
7DF4F2480000
unkown
page readonly
76F8000
unkown
page read and write
7FF5D770A000
unkown
page readonly
18EA7FB9000
heap
page read and write
7FF5D7792000
unkown
page readonly
C24E000
stack
page read and write
6070B2E000
stack
page read and write
4A12000
unkown
page read and write
99B5000
unkown
page read and write
1180000
unkown
page execute and read and write
AA25000
unkown
page read and write
7693000
unkown
page read and write
2339FBC0000
direct allocation
page read and write
26178B65000
heap
page read and write
1CC34810000
heap
page read and write
24DA3FE000
stack
page read and write
7FF5D6A4B000
unkown
page readonly
15666F8B000
heap
page read and write
3532000
unkown
page read and write
15666983000
heap
page read and write
18EA7F9B000
heap
page read and write
7FF5D748C000
unkown
page readonly
88B0000
unkown
page execute and read and write
9B0B000
unkown
page read and write
C653000
unkown
page read and write
C47F000
unkown
page read and write
7FF5D75BF000
unkown
page readonly
EA00000
unkown
page read and write
1E410B15000
heap
page read and write
4A90000
unkown
page read and write
7FF5D72BD000
unkown
page readonly
2339E1B4000
heap
page read and write
4B6397F000
stack
page read and write
16269B1D000
heap
page read and write
1383000
heap
page read and write
88C0000
unkown
page execute and read and write
C5F4000
unkown
page read and write
1E7BAE70000
heap
page read and write
7FF5D7669000
unkown
page readonly
7FF5D6BDB000
unkown
page readonly
7FF5D6BDB000
unkown
page readonly
7FF5D7593000
unkown
page readonly
7FF5D7820000
unkown
page readonly
7FF8A8EE3000
unkown
page read and write
C4BD000
unkown
page read and write
AA25000
unkown
page read and write
27619663000
direct allocation
page read and write
18EA7FB2000
heap
page read and write
53E1000
unkown
page read and write
2E90000
unkown
page execute and read and write
BE55BDD000
stack
page read and write
7FF5D6A4B000
unkown
page readonly
7FF5D7407000
unkown
page readonly
15666FA4000
heap
page read and write
B980000
unkown
page readonly
1CB10F60000
heap
page read and write
15666BF7000
heap
page read and write
C981000
unkown
page read and write
362D000
unkown
page read and write
233A0027000
heap
page read and write
1CEAE448000
heap
page read and write
7FF5D7309000
unkown
page readonly
15666FA4000
heap
page read and write
1CEAE422000
heap
page read and write
35B3000
unkown
page read and write
1EA666F0000
heap
page read and write
21380B80000
heap
page read and write
7FF5D7745000
unkown
page readonly
12402E50000
heap
page read and write
1CEAE44B000
heap
page read and write
6AD1F4B000
stack
page read and write
7DF4F2480000
unkown
page readonly
A9E9000
unkown
page read and write
18EA7F20000
heap
page read and write
233A02F0000
trusted library allocation
page read and write
B559000
stack
page read and write
B330000
unkown
page read and write
7FF5D7267000
unkown
page readonly
8B80000
unkown
page execute and read and write
C4C6000
unkown
page read and write
2339E18D000
heap
page read and write
86E0000
unkown
page readonly
1360000
unkown
page readonly
9EF0000
unkown
page execute and read and write
7DF4F2481000
unkown
page execute read
C95B000
unkown
page read and write
7FF8A8EAF000
unkown
page read and write
45EF57F000
stack
page read and write
1CEAE320000
heap
page read and write
8B90000
unkown
page execute and read and write
15666C25000
heap
page read and write
99C0000
unkown
page read and write
3290000
unkown
page execute and read and write
33F0000
unkown
page read and write
7FF5D7760000
unkown
page readonly
15666920000
heap
page read and write
7FF5D76DA000
unkown
page readonly
13A0000
unkown
page readonly
7FF5D7394000
unkown
page readonly
9AA0000
unkown
page read and write
1DFDD250000
heap
page read and write
156669C7000
heap
page read and write
B0BD000
stack
page read and write
7FF5D75EE000
unkown
page readonly
A9A0000
unkown
page read and write
761E000
unkown
page read and write
2EB0000
unkown
page execute and read and write
2339E193000
heap
page read and write
2FF0000
unkown
page execute and read and write
7FF5D7792000
unkown
page readonly
7FF5D7700000
unkown
page readonly
27617D1F000
heap
page read and write
F72EEFC000
stack
page read and write
7FF5D7396000
unkown
page readonly
C971000
unkown
page read and write
2617896D000
heap
page read and write
7C70000
unkown
page readonly
156669D1000
heap
page read and write
ED26FFF000
stack
page read and write
9AB2000
unkown
page read and write
7FF5D7075000
unkown
page readonly
27619B10000
heap
page read and write
1000000
heap
page read and write
35D3000
unkown
page read and write
760D000
unkown
page read and write
C625000
unkown
page read and write
1CEAFCB5000
direct allocation
page read and write
7FF5D7669000
unkown
page readonly
F254000
unkown
page read and write
166F2587000
heap
page read and write
7FF5D7799000
unkown
page readonly
15666F86000
heap
page read and write
1270000
unkown
page read and write
C61B000
unkown
page read and write
1CEAE340000
heap
page read and write
BE90000
unkown
page read and write
7FF5D71C4000
unkown
page readonly
C0AE6FF000
stack
page read and write
35CF000
unkown
page read and write
C92E000
unkown
page read and write
7FF5D771A000
unkown
page readonly
11B0000
unkown
page execute and read and write
7FF5D741F000
unkown
page readonly
7FF5D7462000
unkown
page readonly
7FF5D7691000
unkown
page readonly
7FF5D7558000
unkown
page readonly
1CB10F65000
heap
page read and write
26268530000
heap
page read and write
7FF5D74A9000
unkown
page readonly
C483000
unkown
page read and write
C930000
unkown
page read and write
AA20000
unkown
page read and write
7FF8A8EAF000
unkown
page read and write
7FF5D7482000
unkown
page readonly
7FF5D770A000
unkown
page readonly
7460000
unkown
page read and write
9D67000
unkown
page read and write
9A90000
unkown
page read and write
7FF5D7394000
unkown
page readonly
11A0C7E000
stack
page read and write
7FF5D77B6000
unkown
page readonly
30B0000
unkown
page execute and read and write
A2D7000
unkown
page read and write
9C93000
unkown
page read and write
3370000
unkown
page execute and read and write
F256000
unkown
page read and write
7FF5D7244000
unkown
page readonly
9ABD000
unkown
page read and write
C615000
unkown
page read and write
C979000
unkown
page read and write
7FF5D777A000
unkown
page readonly
C94D000
unkown
page read and write
2339FBD0000
heap
page readonly
9A96000
unkown
page read and write
7FF5D77C7000
unkown
page readonly
1CEAE240000
heap
page read and write
3100000
unkown
page read and write
18EA7FAD000
heap
page read and write
9AF9000
unkown
page read and write
C8DC000
unkown
page read and write
7FF5D778A000
unkown
page readonly
C5F8000
unkown
page read and write
BE70000
unkown
page execute and read and write
4B00000
unkown
page read and write
1CEAFCC0000
heap
page readonly
26268230000
heap
page read and write
7B00000
unkown
page readonly
7FF5D7797000
unkown
page readonly
A2D7000
unkown
page read and write
1EA66908000
heap
page read and write
16269B20000
heap
page read and write
2339E090000
heap
page read and write
30D0000
unkown
page execute and read and write
7B80000
unkown
page readonly
8A44000
unkown
page read and write
C78A000
unkown
page read and write
99B0000
unkown
page read and write
7FF5D71EA000
unkown
page readonly
1EA66B90000
heap
page read and write
BFB8000
stack
page read and write
86D0000
unkown
page readonly
27617CDD000
heap
page read and write
1EA66908000
heap
page read and write
18EA8511000
heap
page read and write
35B3000
unkown
page read and write
7FF5D768B000
unkown
page readonly
7FF5D76AF000
unkown
page readonly
18EA7ED0000
trusted library allocation
page read and write
3100000
unkown
page read and write
49A8000
unkown
page read and write
C3CE000
stack
page read and write
15666BF0000
heap
page read and write
15666F70000
heap
page read and write
27617D47000
heap
page read and write
E4CD000
stack
page read and write
7FF5D7391000
unkown
page readonly
156669C5000
heap
page read and write
4980000
unkown
page read and write
7C80000
unkown
page read and write
2339E1F5000
heap
page read and write
10469000
unkown
page read and write
9AA8000
unkown
page read and write
8C39000
stack
page read and write
26178890000
heap
page read and write
1DFDD340000
heap
page read and write
7DF4452D0000
direct allocation
page readonly
7FF5D774C000
unkown
page readonly
8920000
unkown
page execute and read and write
8DCB000
stack
page read and write
7FF5D751F000
unkown
page readonly
7FF5D77F7000
unkown
page readonly
18EA7F9A000
heap
page read and write
7FF5D77E3000
unkown
page readonly
9AA0000
unkown
page read and write
7FF5D74FA000
unkown
page readonly
27617CE6000
heap
page read and write
84BB000
stack
page read and write
AA01000
unkown
page read and write
C96F000
unkown
page read and write
8A00000
unkown
page read and write
17C301C5000
heap
page read and write
8B70000
unkown
page execute and read and write
1260000
unkown
page execute and read and write
35E4000
unkown
page read and write
9A84000
unkown
page read and write
15666BF3000
heap
page read and write
C90B000
unkown
page read and write
3140000
unkown
page read and write
27619BAB000
heap
page read and write
C9A7000
unkown
page read and write
18EA850E000
heap
page read and write
1CEAE448000
heap
page read and write
7FF5D77EB000
unkown
page readonly
18EA9E8D000
heap
page read and write
C9F6000
unkown
page read and write
1390ACCD000
heap
page read and write
3520000
unkown
page readonly
35BD000
unkown
page read and write
18EA84F6000
heap
page read and write
A9E9000
unkown
page read and write
7FF5D72BF000
unkown
page readonly
7609000
unkown
page read and write
7FF5D723C000
unkown
page readonly
15666FA9000
heap
page read and write
1CEB0240000
heap
page read and write
F252000
unkown
page read and write
7FF5D75FF000
unkown
page readonly
F252000
unkown
page read and write
7FF5D72E9000
unkown
page readonly
7CB0000
unkown
page readonly
BDC0000
unkown
page read and write
9E2E000
stack
page read and write
53E1000
unkown
page read and write
C5FA000
unkown
page read and write
7FF5D779E000
unkown
page readonly
B960000
unkown
page execute and read and write
27617E75000
heap
page read and write
12B0000
unkown
page read and write
BE49000
stack
page read and write
1CEB0404000
heap
page read and write
3170000
unkown
page read and write
C78A000
unkown
page read and write
7FF5D7396000
unkown
page readonly
3160000
unkown
page read and write
200A8836000
heap
page read and write
8BB0000
unkown
page execute and read and write
1DFDD120000
heap
page read and write
233A00F0000
heap
page read and write
15666F83000
heap
page read and write
7FF5D7740000
unkown
page readonly
7FF5D745B000
unkown
page readonly
8C39000
stack
page read and write
7DF4F2460000
unkown
page readonly
4A44000
unkown
page read and write
276196D0000
remote allocation
page read and write
7FF5D7458000
unkown
page readonly
200A8849000
heap
page read and write
8864000
remote allocation
page execute and read and write
4ADA000
unkown
page read and write
7FF5D76D7000
unkown
page readonly
C81C000
unkown
page read and write
AA1B000
unkown
page read and write
99B1000
unkown
page read and write
7DF405170000
direct allocation
page readonly
22477A8D000
heap
page read and write
156668F0000
trusted library allocation
page read and write
1CB10C80000
heap
page read and write
35FA000
unkown
page read and write
7FF5D7215000
unkown
page readonly
18EA84F6000
heap
page read and write
7FF5D7391000
unkown
page readonly
F21C000
unkown
page read and write
156669CC000
heap
page read and write
C47F000
unkown
page read and write
18EA8512000
heap
page read and write
7DF4F2471000
unkown
page execute read
7FF5D71CC000
unkown
page readonly
2BC177E000
stack
page read and write
30A0000
unkown
page execute and read and write
1DFDD235000
heap
page read and write
9A98000
unkown
page read and write
C472000
unkown
page read and write
4AEA000
unkown
page read and write
7FF5D717C000
unkown
page readonly
7FF5D71CC000
unkown
page readonly
C9CB000
unkown
page read and write
7FF5D71F9000
unkown
page readonly
30C0000
unkown
page execute and read and write
7611000
unkown
page read and write
27619AF4000
heap
page read and write
1CEB0216000
heap
page read and write
A0A6000
stack
page read and write
233A0224000
heap
page read and write
7FF5D7267000
unkown
page readonly
7FF5D749B000
unkown
page readonly
7FF5D7705000
unkown
page readonly
22477CD0000
heap
page read and write
77DB000
unkown
page read and write
15666988000
heap
page read and write
C609000
unkown
page read and write
1CEB04D0000
trusted library allocation
page read and write
1E7BAF77000
heap
page read and write
7FF5D7442000
unkown
page readonly
EB5000
stack
page read and write
9A94000
unkown
page read and write
A408000
unkown
page read and write
F25A000
unkown
page read and write
7FF5D710B000
unkown
page readonly
7FF5D7385000
unkown
page readonly
156669CD000
heap
page read and write
7FF5D77E0000
unkown
page readonly
9A92000
unkown
page read and write
1281000
unkown
page readonly
7FF5D7289000
unkown
page readonly
C4BD000
unkown
page read and write
7FF5D76CD000
unkown
page readonly
4A16000
unkown
page read and write
7FF5D77E3000
unkown
page readonly
8B80000
unkown
page read and write
2761965E000
direct allocation
page read and write
2339E1FA000
heap
page read and write
1CEAE3EE000
heap
page read and write
9A92000
unkown
page read and write
1E7BAF70000
heap
page read and write
7DF4F24A1000
unkown
page execute read
1E7BB1D5000
heap
page read and write
8980000
unkown
page execute and read and write
F24D000
unkown
page read and write
75EBEFF000
stack
page read and write
7DF4A9FB4000
direct allocation
page read and write
1D497955000
heap
page read and write
A264000
unkown
page read and write
BDC0000
unkown
page read and write
35F4000
unkown
page read and write
1CEB02CD000
heap
page read and write
22477CC0000
heap
page read and write
1390ACCB000
heap
page read and write
8920000
unkown
page execute and read and write
35CF000
unkown
page read and write
7FF5D7398000
unkown
page readonly
C908000
unkown
page read and write
B220000
unkown
page read and write
18EA84E0000
heap
page read and write
11B0000
unkown
page execute and read and write
7FF5D774A000
unkown
page readonly
3530000
unkown
page read and write
8394000
remote allocation
page execute and read and write
C483000
unkown
page read and write
27619656000
direct allocation
page read and write
7FF5D729E000
unkown
page readonly
27617D0E000
heap
page read and write
1CEB0404000
heap
page read and write
7686000
unkown
page read and write
C5F4000
unkown
page read and write
7FF5D72D3000
unkown
page readonly
7DF4F2460000
unkown
page readonly
A23A000
unkown
page read and write
35B3000
unkown
page read and write
156669A7000
heap
page read and write
200A8831000
heap
page read and write
156669C5000
heap
page read and write
8360000
unkown
page read and write
3044000
unkown
page execute and read and write
1CEAFCBA000
direct allocation
page read and write
7FF5D71E6000
unkown
page readonly
156669CB000
heap
page read and write
C44F000
stack
page read and write
C8CD000
unkown
page read and write
10354000
unkown
page read and write
1160000
unkown
page read and write
1260000
unkown
page execute and read and write
1CEB0400000
heap
page read and write
A220000
unkown
page read and write
1EA668E9000
heap
page read and write
7FF5D77F0000
unkown
page readonly
30F0000
unkown
page execute and read and write
9A72000
unkown
page read and write
16269AF0000
heap
page read and write
14FFD070000
heap
page read and write
AFBE000
stack
page read and write
35DC000
unkown
page read and write
7B60000
unkown
page readonly
843F000
stack
page read and write
2339E20E000
heap
page read and write
7FF5D77FD000
unkown
page readonly
7FF5D717C000
unkown
page readonly
19ECD910000
heap
page read and write
7FF5D7230000
unkown
page readonly
35E4000
unkown
page read and write
7FF5D75F2000
unkown
page readonly
9A8E000
unkown
page read and write
354C000
unkown
page read and write
7FF5D769E000
unkown
page readonly
30C0000
unkown
page execute and read and write
7631000
unkown
page read and write
27617D52000
heap
page read and write
F252000
unkown
page read and write
8910000
unkown
page execute and read and write
8920000
unkown
page execute and read and write
C035000
stack
page read and write
4A71000
unkown
page read and write
19ECD740000
heap
page read and write
1390ACC0000
heap
page read and write
AA20000
unkown
page read and write
10494000
unkown
page read and write
156669C3000
heap
page read and write
7C31000
unkown
page read and write
9D67000
unkown
page read and write
14FFCEAB000
heap
page read and write
7DF4452B0000
direct allocation
page read and write
C8F0000
unkown
page read and write
C48B000
unkown
page read and write
9FAF000
stack
page read and write
1CEB03E9000
heap
page read and write
1231000
unkown
page read and write
BB0D000
stack
page read and write
1CEAE49D000
heap
page read and write
1DFDD230000
heap
page read and write
7FF5D7458000
unkown
page readonly
15666F80000
heap
page read and write
27619CF4000
heap
page read and write
7FF5D7507000
unkown
page readonly
F245000
unkown
page read and write
7FF5D72BD000
unkown
page readonly
C9DD000
unkown
page read and write
3090000
unkown
page execute and read and write
9D8F000
unkown
page read and write
1D497950000
heap
page read and write
7AB0000
unkown
page read and write
16269B09000
heap
page read and write
E5A3CFF000
stack
page read and write
7FF5D6BE4000
unkown
page readonly
C605000
unkown
page read and write
7FF5D7376000
unkown
page readonly
BE90000
unkown
page read and write
35D1000
unkown
page read and write
760D000
unkown
page read and write
18EA7F1B000
heap
page read and write
7FF5D76D5000
unkown
page readonly
27619B18000
heap
page read and write
7FF5D772C000
unkown
page readonly
1350000
unkown
page readonly
3041000
unkown
page execute and read and write
1CEAE3A0000
heap
page read and write
3110000
unkown
page readonly
1041B000
unkown
page read and write
7FF5D76AF000
unkown
page readonly
7FF5D72E9000
unkown
page readonly
1EA668E9000
heap
page read and write
233A0056000
heap
page read and write
C975000
unkown
page read and write
26268520000
heap
page read and write
7FF5D7053000
unkown
page readonly
ADD8CFC000
stack
page read and write
FF0000
unkown
page readonly
2339E1CA000
heap
page read and write
9A8C000
unkown
page read and write
F242000
unkown
page read and write
7FF5D75DF000
unkown
page readonly
27617C60000
heap
page read and write
1380000
heap
page read and write
7FF5D752F000
unkown
page readonly
C669000
unkown
page read and write
FF0000
unkown
page readonly
7FF5D7546000
unkown
page readonly
1CEB01C0000
remote allocation
page read and write
24DA2FE000
unkown
page read and write
18EA9E83000
heap
page read and write
C9A7000
unkown
page read and write
7FF5D7450000
unkown
page readonly
18EA8508000
heap
page read and write
9870000
unkown
page execute and read and write
2339E1F5000
heap
page read and write
A3B9000
unkown
page read and write
18EA850C000
heap
page read and write
7FF8A8EAF000
unkown
page read and write
C0AE67B000
stack
page read and write
3400000
unkown
page read and write
15666F7C000
heap
page read and write
233A0220000
heap
page read and write
A40E000
unkown
page read and write
8F4C000
stack
page read and write
7FF5D728E000
unkown
page readonly
7FF5D770F000
unkown
page readonly
7FF5D69BB000
unkown
page readonly
769A000
unkown
page read and write
27619B97000
heap
page read and write
C975000
unkown
page read and write
7FF5D7694000
unkown
page readonly
1390AC00000
heap
page read and write
C1A747F000
stack
page read and write
3489000
stack
page read and write
9A72000
unkown
page read and write
C605000
unkown
page read and write
2339E15D000
heap
page read and write
18EA7FBC000
heap
page read and write
CB12000
unkown
page read and write
1CEB0404000
heap
page read and write
4D02FF000
unkown
page read and write
2339E155000
heap
page read and write
7FF5D769E000
unkown
page readonly
1260000
unkown
page execute and read and write
1CEAE446000
heap
page read and write
18EA7FBB000
heap
page read and write
7FF5D74A1000
unkown
page readonly
7FF5D7703000
unkown
page readonly
7DF445320000
direct allocation
page execute read
262682C0000
heap
page read and write
4986000
unkown
page read and write
26268220000
heap
page read and write
94F4000
unkown
page read and write
262682C6000
heap
page read and write
262682C9000
heap
page read and write
3030000
unkown
page execute and read and write
2BC167E000
stack
page read and write
9ADB000
unkown
page read and write
7DF4A9FA0000
direct allocation
page read and write
A264000
unkown
page read and write
11E0000
unkown
page execute and read and write
7FF5D706E000
unkown
page readonly
1260000
unkown
page execute and read and write
C1A6FAF000
stack
page read and write
233A0220000
heap
page read and write
9ABD000
unkown
page read and write
AA19000
unkown
page read and write
7C90000
unkown
page read and write
7605000
unkown
page read and write
14FFCE60000
heap
page read and write
9A6A000
unkown
page read and write
7FF5D75B8000
unkown
page readonly
1CEB03E9000
heap
page read and write
362A000
unkown
page read and write
15666BF7000
heap
page read and write
BE50000
unkown
page execute and read and write
7FF5D7360000
unkown
page readonly
AA2C000
unkown
page read and write
18EA84F1000
heap
page read and write
18EA7F57000
heap
page read and write
9AA8000
unkown
page read and write
AA26000
unkown
page read and write
22477A8B000
heap
page read and write
C975000
unkown
page read and write
1E7BB1D0000
heap
page read and write
7637000
unkown
page read and write
27617BA0000
heap
page read and write
7FF5D720F000
unkown
page readonly
18EA84F0000
heap
page read and write
86E0000
unkown
page readonly
1CEAE499000
heap
page read and write
C4C6000
unkown
page read and write
760F000
unkown
page read and write
7FF5D752F000
unkown
page readonly
7FF5D748A000
unkown
page readonly
15666BFA000
heap
page read and write
7FF5D6BEF000
unkown
page readonly
7FF5D7722000
unkown
page readonly
22477A80000
heap
page read and write
35FA000
unkown
page read and write
15666F89000
heap
page read and write
F25A000
unkown
page read and write
262682E6000
heap
page read and write
F241000
unkown
page read and write
1CC349C0000
heap
page read and write
49FD000
unkown
page read and write
27619CD9000
heap
page read and write
3626000
unkown
page read and write
C981000
unkown
page read and write
AA2F000
unkown
page read and write
16269B32000
heap
page read and write
C975000
unkown
page read and write
9F00000
unkown
page execute and read and write
233A0224000
heap
page read and write
1E410970000
heap
page read and write
8930000
unkown
page execute and read and write
7FF5D719C000
unkown
page readonly
7FF5D72DF000
unkown
page readonly
9AB4000
unkown
page read and write
C621000
unkown
page read and write
27619CF0000
heap
page read and write
CA6A000
unkown
page read and write
35D5000
unkown
page read and write
C975000
unkown
page read and write
200A8800000
heap
page read and write
2339FB80000
direct allocation
page read and write
7FF5D7795000
unkown
page readonly
94AB000
stack
page read and write
C46F000
unkown
page read and write
A3C3000
unkown
page read and write
9D42000
unkown
page read and write
7FF5D7639000
unkown
page readonly
11E0000
unkown
page execute and read and write
BEA0000
unkown
page readonly
7FF5D7257000
unkown
page readonly
1CEAFC70000
direct allocation
page read and write
7FF5D77B6000
unkown
page readonly
96FE000
stack
page read and write
18EA7FBE000
heap
page read and write
27619770000
heap
page read and write
9A76000
unkown
page read and write
7FF5D766E000
unkown
page readonly
9B41000
unkown
page read and write
18EA7FBF000
heap
page read and write
2E90000
unkown
page execute and read and write
7FF5D75F6000
unkown
page readonly
12402F28000
heap
page read and write
BE55EFF000
stack
page read and write
1D497847000
heap
page read and write
156669B6000
heap
page read and write
9AC3000
unkown
page read and write
18EA7EB0000
heap
page read and write
B67BEFF000
stack
page read and write
7FF5D760E000
unkown
page readonly
7FF5D6ABD000
unkown
page readonly
7FF5D76CD000
unkown
page readonly
9AB4000
unkown
page read and write
9A84000
unkown
page read and write
16269BF0000
heap
page read and write
7DF4F2481000
unkown
page execute read
27619665000
direct allocation
page read and write
AA1B000
unkown
page read and write
8B80000
unkown
page execute and read and write
15666970000
heap
page read and write
C971000
unkown
page read and write
C7BE000
unkown
page read and write
33F0000
unkown
page read and write
7FF5D71F9000
unkown
page readonly
7FF5D764F000
unkown
page readonly
7FF5D751F000
unkown
page readonly
27619B22000
heap
page read and write
18EA7FA7000
heap
page read and write
1CEB01E0000
heap
page read and write
89D2000
heap
page read and write
760B000
unkown
page read and write
F0C000
heap
page read and write
7FF8A8CF0000
unkown
page readonly
C65E000
unkown
page read and write
15668870000
heap
page read and write
9A80000
unkown
page read and write
7FF5D719C000
unkown
page readonly
16269B19000
heap
page read and write
2FA0000
unkown
page execute and read and write
1EA66922000
heap
page read and write
27619780000
direct allocation
page execute and read and write
A28D000
unkown
page read and write
4AC0000
unkown
page read and write
15666F99000
heap
page read and write
7FF5D7643000
unkown
page readonly
261788B0000
heap
page read and write
B67C1FF000
stack
page read and write
A9DF000
unkown
page read and write
2339FBB6000
direct allocation
page read and write
768C000
unkown
page read and write
7FF5D72D0000
unkown
page readonly
A3AA000
unkown
page read and write
7FF5D776D000
unkown
page readonly
A273000
unkown
page read and write
7FF5D71BF000
unkown
page readonly
51CDFFB000
stack
page read and write
F241000
unkown
page read and write
3090000
unkown
page execute and read and write
7FF5D781A000
unkown
page readonly
F274000
unkown
page read and write
15666F9F000
heap
page read and write
200A8620000
heap
page read and write
7FF5D75F6000
unkown
page readonly
1EA66917000
heap
page read and write
4B6359F000
stack
page read and write
C908000
unkown
page read and write
A391000
unkown
page read and write
35D1000
unkown
page read and write
9280000
unkown
page execute and read and write
9BB0000
unkown
page read and write
1CEB03E9000
heap
page read and write
5479000
unkown
page read and write
7FF5D71DA000
unkown
page readonly
19ECD74B000
heap
page read and write
7FF5D76C8000
unkown
page readonly
9A76000
unkown
page read and write
19ECDA20000
heap
page read and write
156668B0000
heap
page read and write
9ADB000
unkown
page read and write
C981000
unkown
page read and write
27619620000
direct allocation
page read and write
7FF5D75D9000
unkown
page readonly
35D1000
unkown
page read and write
BE49000
stack
page read and write
7FF8A8CF0000
unkown
page readonly
1045B000
unkown
page read and write
1EA668E2000
heap
page read and write
C92E000
unkown
page read and write
8920000
unkown
page execute and read and write
156669D0000
heap
page read and write
7FF5D75F2000
unkown
page readonly
2339E11E000
heap
page read and write
768C000
unkown
page read and write
1380000
heap
page read and write
35C1000
unkown
page read and write
49A8000
unkown
page read and write
9AF9000
unkown
page read and write
18EA7FC4000
heap
page read and write
7FF5D7488000
unkown
page readonly
C9D3000
unkown
page read and write
7FF5D744C000
unkown
page readonly
9AA0000
unkown
page read and write
51CE3FF000
stack
page read and write
2339FBC8000
direct allocation
page read and write
7FF5D7764000
unkown
page readonly
27617D4E000
heap
page read and write
E6CD000
stack
page read and write
15666F77000
heap
page read and write
35DC000
unkown
page read and write
35B5000
unkown
page read and write
9AB2000
unkown
page read and write
C61B000
unkown
page read and write
8380000
remote allocation
page execute and read and write
B0C0000
unkown
page execute and read and write
11B0000
unkown
page execute and read and write
9AAA000
unkown
page read and write
7FF5D76F5000
unkown
page readonly
2E90000
unkown
page execute and read and write
35BD000
unkown
page read and write
18EA7FA8000
heap
page read and write
75F8000
unkown
page read and write
C7CB000
unkown
page read and write
200A883C000
heap
page read and write
3090000
unkown
page execute and read and write
15666FA1000
heap
page read and write
3534000
unkown
page read and write
9A8E000
unkown
page read and write
A384000
unkown
page read and write
1EA66908000
heap
page read and write
11E0000
unkown
page execute and read and write
1CEAE49D000
heap
page read and write
9ABD000
unkown
page read and write
A3AC000
unkown
page read and write
E5A3D7E000
stack
page read and write
7FF5D760E000
unkown
page readonly
166F2510000
heap
page read and write
27619B22000
heap
page read and write
C8DC000
unkown
page read and write
7605000
unkown
page read and write
9A94000
unkown
page read and write
8900000
unkown
page execute and read and write
1D497960000
heap
page read and write
7FF5D7404000
unkown
page readonly
12402E30000
heap
page read and write
7FF5D7455000
unkown
page readonly
4A16000
unkown
page read and write
18EA7FB7000
heap
page read and write
8980000
unkown
page execute and read and write
7C90000
unkown
page read and write
9B41000
unkown
page read and write
7AB0000
unkown
page read and write
18EA7F94000
heap
page read and write
CA51000
unkown
page read and write
7FF5D72FB000
unkown
page readonly
C669000
unkown
page read and write
8920000
unkown
page execute and read and write
1CEAE48B000
heap
page read and write
7DBD000
stack
page read and write
18EA7F1A000
heap
page read and write
C621000
unkown
page read and write
27619660000
direct allocation
page read and write
2EA0000
unkown
page execute and read and write
C8EF000
unkown
page read and write
49D6000
unkown
page read and write
E10000
unkown
page readonly
17C301C0000
heap
page read and write
7FF8A8E21000
unkown
page readonly
7FF5D7236000
unkown
page readonly
F244000
unkown
page read and write
12402F30000
heap
page read and write
2339E0C0000
heap
page read and write
7D3E000
stack
page read and write
3630000
unkown
page readonly
7609000
unkown
page read and write
353D000
unkown
page read and write
7FF5D758D000
unkown
page readonly
80776FE000
stack
page read and write
7FF5D7820000
unkown
page readonly
16269B30000
heap
page read and write
7FF5D732D000
unkown
page readonly
7FF5D747F000
unkown
page readonly
7FF5CE343000
unkown
page readonly
7FF5D76D5000
unkown
page readonly
7FF5D7604000
unkown
page readonly
2339E060000
heap
page read and write
1260000
unkown
page execute and read and write
7FF5D7215000
unkown
page readonly
7FF5D71C4000
unkown
page readonly
7FF5D7722000
unkown
page readonly
F230000
unkown
page read and write
7FF5D7077000
unkown
page readonly
362D000
unkown
page read and write
CB1A000
unkown
page read and write
7FF5D7425000
unkown
page readonly
156669C5000
heap
page read and write
7FF5D7482000
unkown
page readonly
19ECD766000
heap
page read and write
1EA668F0000
heap
page read and write
1CEAFC71000
direct allocation
page execute read
35D3000
unkown
page read and write
7FF5D77DA000
unkown
page readonly
21380B70000
heap
page read and write
9D67000
unkown
page read and write
E54D000
stack
page read and write
35BD000
unkown
page read and write
7FF5D75DF000
unkown
page readonly
7FF5D7206000
unkown
page readonly
7FF5D7546000
unkown
page readonly
7FF5D74A6000
unkown
page readonly
7FF5D7558000
unkown
page readonly
7B80000
unkown
page readonly
35D3000
unkown
page read and write
C899000
unkown
page read and write
C90F000
unkown
page read and write
7FF5D7452000
unkown
page readonly
15666979000
heap
page read and write
7FF5D7065000
unkown
page readonly
C663000
unkown
page read and write
7FF5D75E9000
unkown
page readonly
8850000
remote allocation
page execute and read and write
7FF5D775C000
unkown
page readonly
7DD0000
heap
page read and write
18EA7FB9000
heap
page read and write
27619668000
direct allocation
page read and write
1CEAFCAE000
direct allocation
page read and write
4A12000
unkown
page read and write
7FF5D75A6000
unkown
page readonly
18EA7F1A000
heap
page read and write
26268250000
heap
page read and write
30B0000
unkown
page execute and read and write
C642000
unkown
page read and write
1EA667D0000
heap
page read and write
1CEAFCF0000
heap
page read and write
1D497840000
heap
page read and write
7FF5D72D7000
unkown
page readonly
3310000
unkown
page read and write
C806000
unkown
page read and write
1E410A80000
heap
page read and write
3488000
stack
page read and write
7FF5D7202000
unkown
page readonly
18EA9E82000
heap
page read and write
C615000
unkown
page read and write
7FF5D7799000
unkown
page readonly
8CB8000
stack
page read and write
7FF5D772C000
unkown
page readonly
18EA84C0000
heap
page read and write
AA2B000
unkown
page read and write
2339FFE0000
remote allocation
page read and write
7FF5D76D7000
unkown
page readonly
12402ED0000
heap
page read and write
1CEB02B9000
heap
page read and write
314638E000
stack
page read and write
C7C6000
unkown
page read and write
A02E000
stack
page read and write
8FD9000
stack
page read and write
75FD000
unkown
page read and write
99B0000
unkown
page read and write
779E000
unkown
page read and write
200A8700000
heap
page read and write
9D67000
unkown
page read and write
7FF5D7442000
unkown
page readonly
2339E1FD000
heap
page read and write
7FF5D75D9000
unkown
page readonly
A233000
unkown
page read and write
9B2C000
unkown
page read and write
75FD000
unkown
page read and write
C472000
unkown
page read and write
2EC0000
unkown
page readonly
8920000
unkown
page execute and read and write
F242000
unkown
page read and write
1CEB0404000
heap
page read and write
7FF8A8CF1000
unkown
page execute read
A408000
unkown
page read and write
F274000
unkown
page read and write
B330000
unkown
page read and write
AA01000
unkown
page read and write
7FF5D7694000
unkown
page readonly
103D3000
unkown
page read and write
10394000
unkown
page read and write
2AA91FE000
unkown
page read and write
C979000
unkown
page read and write
1EA668E4000
heap
page read and write
C975000
unkown
page read and write
21380BE0000
heap
page read and write
1CEAE459000
heap
page read and write
15666F99000
heap
page read and write
760F000
unkown
page read and write
7FF5D77F7000
unkown
page readonly
7FF5CE33D000
unkown
page readonly
15666FA4000
heap
page read and write
200A883E000
heap
page read and write
3542000
unkown
page read and write
997C000
stack
page read and write
7FF5D6ABD000
unkown
page readonly
15666F99000
heap
page read and write
7FF5D72BF000
unkown
page readonly
7FF5D7280000
unkown
page readonly
8BA0000
unkown
page execute and read and write
7FF5D7523000
unkown
page readonly
7FF5D723C000
unkown
page readonly
354C000
unkown
page read and write
7DF4F2470000
unkown
page readonly
7FF5D74A9000
unkown
page readonly
7FF5CE33D000
unkown
page readonly
35D3000
unkown
page read and write
35C3000
unkown
page read and write
7654000
unkown
page read and write
BB9D000
stack
page read and write
8B80000
unkown
page execute and read and write
E00000
unkown
page readonly
103D3000
unkown
page read and write
7FF5D7534000
unkown
page readonly
7FF5D71AF000
unkown
page readonly
9ADB000
unkown
page read and write
1CB10C60000
heap
page read and write
15666BF5000
heap
page read and write
7FF5D720A000
unkown
page readonly
35B5000
unkown
page read and write
1160000
unkown
page read and write
1390000
heap
page read and write
1B2EE970000
heap
page read and write
10452000
unkown
page read and write
A33F000
unkown
page read and write
30E0000
unkown
page execute and read and write
8900000
unkown
page execute and read and write
7FF5D7262000
unkown
page readonly
27619CF0000
heap
page read and write
C96F000
unkown
page read and write
A237000
unkown
page read and write
18EA9E94000
heap
page read and write
7FF5D76DA000
unkown
page readonly
233A00C7000
heap
page read and write
7FF8A8E9E000
unkown
page read and write
7FF5D749B000
unkown
page readonly
11B0000
unkown
page execute and read and write
15666F87000
heap
page read and write
26178960000
heap
page read and write
18EA7F76000
heap
page read and write
7FF5D7360000
unkown
page readonly
B67BE7E000
stack
page read and write
7FF5D7073000
unkown
page readonly
A237000
unkown
page read and write
15666F9C000
heap
page read and write
C0BA000
stack
page read and write
5F507E000
stack
page read and write
C981000
unkown
page read and write
7810000
unkown
page read and write
9A80000
unkown
page read and write
7DF4F2461000
unkown
page execute read
31467FE000
stack
page read and write
27619AF3000
heap
page read and write
27619B16000
heap
page read and write
15666F99000
heap
page read and write
7FF5D7292000
unkown
page readonly
27617D0E000
heap
page read and write
156669C8000
heap
page read and write
7FF8A8EFD000
unkown
page readonly
4B639FF000
stack
page read and write
F72F0FF000
stack
page read and write
7FF5D7425000
unkown
page readonly
F0C000
heap
page read and write
1041B000
unkown
page read and write
A02E000
stack
page read and write
E74C000
stack
page read and write
7FF5D7202000
unkown
page readonly
C7C6000
unkown
page read and write
AA25000
unkown
page read and write
8900000
unkown
page execute and read and write
15666F99000
heap
page read and write
1390AC90000
heap
page read and write
7FF5D75F9000
unkown
page readonly
1CEAE3E7000
heap
page read and write
27617CAE000
heap
page read and write
3044000
unkown
page execute and read and write
8A44000
unkown
page read and write
7FF5D71BF000
unkown
page readonly
7FF5D7589000
unkown
page readonly
18EA84F1000
heap
page read and write
9AAC000
unkown
page read and write
AA40000
unkown
page read and write
233A00C7000
heap
page read and write
166F2500000
heap
page read and write
27619B26000
heap
page read and write
233A0209000
heap
page read and write
7E60000
unkown
page read and write
1CEAFCBB000
direct allocation
page readonly
18EA7F1E000
heap
page read and write
7FF5D7705000
unkown
page readonly
A12F000
stack
page read and write
1EA668D5000
heap
page read and write
9F20000
unkown
page execute and read and write
12D0000
unkown
page readonly
35C9000
unkown
page read and write
2339E110000
heap
page read and write
7FF5D75D6000
unkown
page readonly
2339FC30000
heap
page read and write
18EA8513000
heap
page read and write
F256000
unkown
page read and write
F254000
unkown
page read and write
156669B5000
heap
page read and write
7FF5D738E000
unkown
page readonly
7FF5D74B8000
unkown
page readonly
7FF5D7438000
unkown
page readonly
2E90000
unkown
page execute and read and write
C8D8000
unkown
page read and write
18EA7FAC000
heap
page read and write
1250000
unkown
page read and write
233A0044000
heap
page read and write
C8B9000
unkown
page read and write
1CEB0219000
heap
page read and write
8F49000
stack
page read and write
2AA92FF000
stack
page read and write
233A0056000
heap
page read and write
E24597F000
stack
page read and write
A1C6FC000
stack
page read and write
9A90000
unkown
page read and write
7FF5D77A4000
unkown
page readonly
27976DB0000
heap
page read and write
1CEB01C0000
remote allocation
page read and write
7FF5D7837000
unkown
page readonly
7FF8A8EFD000
unkown
page readonly
18EA7F15000
heap
page read and write
7FF5D705D000
unkown
page readonly
AFBE000
stack
page read and write
233A0024000
heap
page read and write
4A7A97F000
stack
page read and write
15666BF4000
heap
page read and write
1CB10B80000
heap
page read and write
7FF5D7648000
unkown
page readonly
18EA84E8000
heap
page read and write
1EA66908000
heap
page read and write
C46F000
unkown
page read and write
7B20000
unkown
page read and write
7FF5D728E000
unkown
page readonly
3060000
unkown
page execute and read and write
7FF5D66E8000
unkown
page readonly
95FB000
stack
page read and write
7FF5D748C000
unkown
page readonly
14FFCE40000
heap
page read and write
9AC3000
unkown
page read and write
8DC5000
stack
page read and write
1CEB023A000
heap
page read and write
F256000
unkown
page read and write
8890000
unkown
page readonly
C94D000
unkown
page read and write
1CEAE493000
heap
page read and write
7FF8A8CF1000
unkown
page execute read
7FF5D765F000
unkown
page readonly
31466FE000
stack
page read and write
7FF5D7407000
unkown
page readonly
1EA6690C000
heap
page read and write
11A0CFE000
stack
page read and write
9ABD000
unkown
page read and write
7FF5D7641000
unkown
page readonly
362A000
unkown
page read and write
4B00000
unkown
page read and write
7FF5D75CB000
unkown
page readonly
1CEAE650000
heap
page read and write
15666FA4000
heap
page read and write
7FF8A8EA2000
unkown
page write copy
1731000
unkown
page readonly
1CEB0248000
heap
page read and write
760B000
unkown
page read and write
7FF5D71E6000
unkown
page readonly
30C0000
unkown
page execute and read and write
27619CF0000
heap
page read and write
35CD000
unkown
page read and write
22477C70000
heap
page read and write
18EA7F17000
heap
page read and write
3280000
unkown
page read and write
7FF5D7740000
unkown
page readonly
C862000
unkown
page read and write
7FF5D75EE000
unkown
page readonly
5F4F7F000
stack
page read and write
15666FA4000
heap
page read and write
15666BFE000
heap
page read and write
15666FA6000
heap
page read and write
B4D0000
unkown
page readonly
7FF5D6BE4000
unkown
page readonly
C96F000
unkown
page read and write
7FF5D75AF000
unkown
page readonly
C450000
unkown
page read and write
10354000
unkown
page read and write
A313000
unkown
page read and write
1CEAE474000
heap
page read and write
7D3E000
stack
page read and write
AA14000
unkown
page read and write
18EA8519000
heap
page read and write
2339E070000
heap
page read and write
C1A727F000
stack
page read and write
9A98000
unkown
page read and write
2339E192000
heap
page read and write
6070BAE000
stack
page read and write
200A883B000
heap
page read and write
C96F000
unkown
page read and write
B8DB000
stack
page read and write
9A9E000
unkown
page read and write
35C1000
unkown
page read and write
5330000
unkown
page write copy
1B2EE770000
heap
page read and write
C0BA000
stack
page read and write
18EA7FB9000
heap
page read and write
EF0000
heap
page read and write
233A0224000
heap
page read and write
1CEB0248000
heap
page read and write
18EA7F92000
heap
page read and write
27617CA7000
heap
page read and write
7FF5D7604000
unkown
page readonly
7FF5D768B000
unkown
page readonly
1340000
unkown
page read and write
7DF4051A0000
direct allocation
page read and write
7FF5D71EF000
unkown
page readonly
A416000
unkown
page read and write
C7CB000
unkown
page read and write
15666C2B000
heap
page read and write
843F000
stack
page read and write
8920000
unkown
page execute and read and write
7FF5D7336000
unkown
page readonly
7FF5D723F000
unkown
page readonly
4986000
unkown
page read and write
AA20000
unkown
page read and write
7FF5D7455000
unkown
page readonly
C625000
unkown
page read and write
1260000
unkown
page execute and read and write
18EA7FC4000
heap
page read and write
35D5000
unkown
page read and write
FFC02FF000
stack
page read and write
C806000
unkown
page read and write
9A8C000
unkown
page read and write
7FF5D7077000
unkown
page readonly
9AAC000
unkown
page read and write
1CEAE48B000
heap
page read and write
51CE2FF000
unkown
page read and write
F72EFFE000
unkown
page read and write
E24587B000
stack
page read and write
162699F0000
heap
page read and write
35B3000
unkown
page read and write
1CEB0213000
heap
page read and write
C975000
unkown
page read and write
7FF5D77B9000
unkown
page readonly
27617D58000
heap
page read and write
7FF5D7462000
unkown
page readonly
C1CC000
stack
page read and write
18EA8509000
heap
page read and write
8FD9000
stack
page read and write
7FF8A8E21000
unkown
page readonly
27617CA7000
heap
page read and write
15666F8B000
heap
page read and write
A9DF000
unkown
page read and write
3030000
unkown
page execute and read and write
7FF5D7485000
unkown
page readonly
35D1000
unkown
page read and write
1CEB03E9000
heap
page read and write
18EA84EC000
heap
page read and write
3520000
unkown
page readonly
156669D7000
heap
page read and write
18EA84EF000
heap
page read and write
12402D50000
heap
page read and write
49C2000
unkown
page read and write
15666F7F000
heap
page read and write
7B20000
unkown
page read and write
7FF5D7272000
unkown
page readonly
27976E20000
heap
page read and write
19ECD680000
heap
page read and write
15666F9D000
heap
page read and write
7AA0000
unkown
page read and write
1383000
heap
page read and write
2FF9000
stack
page read and write
F210000
unkown
page read and write
233A0209000
heap
page read and write
1CEAE459000
heap
page read and write
779E000
unkown
page read and write
8990000
unkown
page execute and read and write
7FF5D7438000
unkown
page readonly
8B80000
unkown
page execute and read and write
4AA0000
unkown
page read and write
7FF5D72C8000
unkown
page readonly
27619AF2000
heap
page read and write
77A2000
unkown
page read and write
C975000
unkown
page read and write
AA2B000
unkown
page read and write
27617D1F000
heap
page read and write
7FF5D74A6000
unkown
page readonly
22477C50000
heap
page read and write
1250000
unkown
page read and write
C617000
unkown
page read and write
F254000
unkown
page read and write
27619CF4000
heap
page read and write
1E410B17000
heap
page read and write
C5F0000
unkown
page read and write
7FF5D7452000
unkown
page readonly
C912000
unkown
page read and write
21380BEB000
heap
page read and write
7FF5D75B3000
unkown
page readonly
21380BA0000
heap
page read and write
18EA7FB2000
heap
page read and write
C5FD000
unkown
page read and write
C908000
unkown
page read and write
27976D80000
heap
page read and write
7FF5D72CE000
unkown
page readonly
30FB000
stack
page read and write
AA20000
unkown
page read and write
7DF4F2471000
unkown
page execute read
2339E1F5000
heap
page read and write
3110000
unkown
page readonly
2339E117000
heap
page read and write
C496000
unkown
page read and write
CA51000
unkown
page read and write
7FF5D72CE000
unkown
page readonly
166F256D000
heap
page read and write
C9F6000
unkown
page read and write
9679000
stack
page read and write
7AF1000
unkown
page read and write
7FF5CE343000
unkown
page readonly
7DD0000
heap
page read and write
9B2C000
unkown
page read and write
18EA8508000
heap
page read and write
1EA66908000
heap
page read and write
77A2000
unkown
page read and write
C62D000
unkown
page read and write
7FF5D777A000
unkown
page readonly
AE1D000
stack
page read and write
7FF5D7700000
unkown
page readonly
9A92000
unkown
page read and write
9AAC000
unkown
page read and write
8BA0000
unkown
page execute and read and write
7FF5D7429000
unkown
page readonly
27619CD9000
heap
page read and write
233A00DB000
heap
page read and write
7DF4A9F70000
direct allocation
page readonly
18EA7FB3000
heap
page read and write
233A0220000
heap
page read and write
233A0209000
heap
page read and write
ADD8DFF000
unkown
page read and write
7FF8A8EFD000
unkown
page readonly
A28D000
unkown
page read and write
18EA8508000
heap
page read and write
16269A20000
heap
page read and write
7FF5D776F000
unkown
page readonly
200A8720000
heap
page read and write
7FF5D7284000
unkown
page readonly
1B2EEAE5000
heap
page read and write
C61D000
unkown
page read and write
1CEAFCB8000
direct allocation
page read and write
7DF4051B1000
direct allocation
page read and write
7FF5D77A8000
unkown
page readonly
27619658000
direct allocation
page readonly
C8DC000
unkown
page read and write
C971000
unkown
page read and write
7FF5D7073000
unkown
page readonly
7FF5D75E9000
unkown
page readonly
27617CCA000
heap
page read and write
9A6A000
unkown
page read and write
1B2EE950000
heap
page read and write
1CEAE41C000
heap
page read and write
89D0000
heap
page read and write
CA2A000
unkown
page read and write
A220000
unkown
page read and write
98FD000
stack
page read and write
E7CD000
stack
page read and write
27976E27000
heap
page read and write
A2B5000
unkown
page read and write
89B0000
unkown
page execute and read and write
12402ED5000
heap
page read and write
86D0000
unkown
page readonly
7810000
unkown
page read and write
8B80000
unkown
page execute and read and write
7FF5D7065000
unkown
page readonly
B8DB000
stack
page read and write
2E90000
unkown
page execute and read and write
4CFF2C000
stack
page read and write
C85F000
unkown
page read and write
8990000
unkown
page execute and read and write
1E7BAD90000
heap
page read and write
233A0022000
heap
page read and write
F245000
unkown
page read and write
7DF445300000
direct allocation
page read and write
A384000
unkown
page read and write
9830000
unkown
page execute and read and write
1260000
unkown
page execute and read and write
C931000
unkown
page read and write
27619BAB000
heap
page read and write
7FF5D7488000
unkown
page readonly
A286000
unkown
page read and write
1E410BF0000
heap
page read and write
9840000
unkown
page execute and read and write
C61D000
unkown
page read and write
156669A7000
heap
page read and write
233A0209000
heap
page read and write
27619CF4000
heap
page read and write
8360000
unkown
page read and write
7FF5D74B8000
unkown
page readonly
7FF5D72FB000
unkown
page readonly
166F2560000
heap
page read and write
7FF5D72D7000
unkown
page readonly
8A70000
unkown
page read and write
AA15000
unkown
page read and write
9B0B000
unkown
page read and write
C979000
unkown
page read and write
7FF5D77C7000
unkown
page readonly
8B80000
unkown
page execute and read and write
1D497730000
heap
page read and write
C8DC000
unkown
page read and write
9A96000
unkown
page read and write
15668860000
heap
page read and write
7FF5D77DD000
unkown
page readonly
26178B60000
heap
page read and write
4A40000
unkown
page read and write
7FF5D7376000
unkown
page readonly
18EA7E90000
heap
page read and write
C0AEA7F000
stack
page read and write
156667D0000
heap
page read and write
C44F000
stack
page read and write
27619CF4000
heap
page read and write
BE55E7E000
stack
page read and write
2339FBCA000
direct allocation
page read and write
9EE0000
unkown
page execute and read and write
3626000
unkown
page read and write
7DF445311000
direct allocation
page read and write
233A0209000
heap
page read and write
7FF5D776D000
unkown
page readonly
3626000
unkown
page read and write
27619CF4000
heap
page read and write
B67BBFE000
stack
page read and write
7FF5D74F2000
unkown
page readonly
362D000
unkown
page read and write
233A02F0000
trusted library allocation
page read and write
AA0B000
unkown
page read and write
7FF5D7289000
unkown
page readonly
7FF5D758D000
unkown
page readonly
C8C5000
unkown
page read and write
C617000
unkown
page read and write
9C92000
unkown
page read and write
A3C3000
unkown
page read and write
8880000
unkown
page readonly
C955000
unkown
page read and write
1340000
unkown
page read and write
1CEAE49B000
heap
page read and write
3020000
unkown
page execute and read and write
200A8809000
heap
page read and write
5463000
unkown
page read and write
ED26EFF000
stack
page read and write
15666BFB000
heap
page read and write
9A76000
unkown
page read and write
1CEB02B9000
heap
page read and write
7435000
stack
page read and write
7E60000
unkown
page read and write
35B0000
unkown
page read and write
1CEAE48B000
heap
page read and write
7FF5D783B000
unkown
page readonly
18EA84EC000
heap
page read and write
4980000
unkown
page read and write
7988000
stack
page read and write
2339E1B4000
heap
page read and write
9F10000
unkown
page execute and read and write
7FF5D77F0000
unkown
page readonly
1CEB0238000
heap
page read and write
BB0F000
stack
page read and write
88C0000
unkown
page execute and read and write
1CC349D0000
heap
page read and write
200A883B000
heap
page read and write
AE1D000
stack
page read and write
22477A70000
heap
page read and write
1CEAE446000
heap
page read and write
C955000
unkown
page read and write
17C2FE10000
heap
page read and write
C5FD000
unkown
page read and write
9AF9000
unkown
page read and write
94F4000
unkown
page read and write
1B2EE850000
heap
page read and write
2761966B000
direct allocation
page readonly
1EA668C0000
heap
page read and write
7FF8A8EE3000
unkown
page read and write
7FF5D729E000
unkown
page readonly
27619CF0000
heap
page read and write
35F4000
unkown
page read and write
1B2EE858000
heap
page read and write
8870000
unkown
page readonly
15666F8B000
heap
page read and write
18EA84E7000
heap
page read and write
1CEAE44B000
heap
page read and write
89B0000
unkown
page execute and read and write
8CB8000
stack
page read and write
233A0046000
heap
page read and write
9A6A000
unkown
page read and write
18EA7F12000
heap
page read and write
2339E1EC000
heap
page read and write
89A0000
unkown
page execute and read and write
7FF5D7507000
unkown
page readonly
1E410B17000
heap
page read and write
F25A000
unkown
page read and write
A210000
unkown
page execute and read and write
A9FD000
unkown
page read and write
B03B000
stack
page read and write
18EA9E8E000
heap
page read and write
807767D000
stack
page read and write
7FF5D7589000
unkown
page readonly
84BB000
stack
page read and write
15666C2D000
heap
page read and write
C73E000
unkown
page read and write
7FF5D7591000
unkown
page readonly
AA40000
unkown
page read and write
1CEB0400000
heap
page read and write
E8CE000
stack
page read and write
85BE000
stack
page read and write
E700000
unkown
page read and write
18EA84F4000
heap
page read and write
18EA8511000
heap
page read and write
233A0048000
heap
page read and write
18EA7F52000
heap
page read and write
9A8C000
unkown
page read and write
9B0B000
unkown
page read and write
27617C68000
heap
page read and write
C5F8000
unkown
page read and write
7FF5D77DA000
unkown
page readonly
200A8837000
heap
page read and write
99C0000
unkown
page read and write
7FF5D71DA000
unkown
page readonly
1EA667F0000
heap
page read and write
7AA0000
unkown
page read and write
35CF000
unkown
page read and write
B5DE000
stack
page read and write
2EB0000
unkown
page execute and read and write
27619B97000
heap
page read and write
5F4E7B000
stack
page read and write
314677F000
stack
page read and write
7FF8A8EE8000
unkown
page read and write
1045B000
unkown
page read and write
2F7F000
stack
page read and write
8ECC000
stack
page read and write
7FF5D75D6000
unkown
page readonly
7FF5D7282000
unkown
page readonly
27619CF4000
heap
page read and write
8BB0000
unkown
page execute and read and write
A23A000
unkown
page read and write
9C21000
unkown
page read and write
7FF5D774C000
unkown
page readonly
BFB8000
stack
page read and write
1E410AF0000
heap
page read and write
7FF5D7284000
unkown
page readonly
7FF5D77DD000
unkown
page readonly
24D9FFB000
stack
page read and write
353D000
unkown
page read and write
35D5000
unkown
page read and write
7FF8A8EE8000
unkown
page read and write
997C000
stack
page read and write
7FF5D74C3000
unkown
page readonly
7FF5D7760000
unkown
page readonly
9AAC000
unkown
page read and write
9A8C000
unkown
page read and write
7FF5D775C000
unkown
page readonly
9B2C000
unkown
page read and write
1CEB0232000
heap
page read and write
C496000
unkown
page read and write
A2A2000
unkown
page read and write
7FF5D77D2000
unkown
page readonly
3280000
unkown
page read and write
21380C07000
heap
page read and write
18EA84F0000
heap
page read and write
156669AA000
heap
page read and write
18EA7F13000
heap
page read and write
7FF8A8EED000
unkown
page readonly
4AFA000
unkown
page read and write
89B0000
unkown
page execute and read and write
7FF5D75C1000
unkown
page readonly
1CEAE3E7000
heap
page read and write
7FF5D74C3000
unkown
page readonly
C73E000
unkown
page read and write
9AB2000
unkown
page read and write
7FF5D760B000
unkown
page readonly
7FF5D72D0000
unkown
page readonly
AA14000
unkown
page read and write
1CEAFCB3000
direct allocation
page read and write
89D2000
heap
page read and write
4A90000
unkown
page read and write
9AAA000
unkown
page read and write
7AC0000
unkown
page read and write
156669D5000
heap
page read and write
C653000
unkown
page read and write
C4DC000
unkown
page read and write
3120000
unkown
page read and write
C7BE000
unkown
page read and write
9578000
stack
page read and write
807777E000
stack
page read and write
9A84000
unkown
page read and write
9AA0000
unkown
page read and write
C65E000
unkown
page read and write
1CEAFDF0000
direct allocation
page execute and read and write
2339FC40000
direct allocation
page execute and read and write
C8C5000
unkown
page read and write
C8D9000
unkown
page read and write
A3B6000
unkown
page read and write
7FF5D72D3000
unkown
page readonly
2339FBCB000
direct allocation
page readonly
B85A000
stack
page read and write
7FF5D6AB6000
unkown
page readonly
E00000
unkown
page readonly
7FF5D7682000
unkown
page readonly
7FF5D7703000
unkown
page readonly
9D67000
unkown
page read and write
35D5000
unkown
page read and write
A273000
unkown
page read and write
200A8833000
heap
page read and write
27976D70000
heap
page read and write
7FF5D7523000
unkown
page readonly
2EC0000
unkown
page readonly
27617CE8000
heap
page read and write
7FF5D7336000
unkown
page readonly
BB10000
heap
page read and write
7FF5D71EA000
unkown
page readonly
10494000
unkown
page read and write
21380C07000
heap
page read and write
3532000
unkown
page read and write
1395000
heap
page read and write
8D3B000
stack
page read and write
BEA0000
unkown
page readonly
1DFDD200000
heap
page read and write
35B0000
unkown
page read and write
9A8E000
unkown
page read and write
1CEAE459000
heap
page read and write
7FF5D71E0000
unkown
page readonly
C460000
unkown
page read and write
1CEB0244000
heap
page read and write
1EA66915000
heap
page read and write
15666FA0000
heap
page read and write
7FF5D71C8000
unkown
page readonly
19ECD670000
heap
page read and write
3530000
unkown
page read and write
12402F20000
heap
page read and write
7FF5D7309000
unkown
page readonly
75E0000
unkown
page read and write
9D67000
unkown
page read and write
18EA7F2E000
heap
page read and write
7E58000
stack
page read and write
C1CC000
stack
page read and write
7FF5D71D7000
unkown
page readonly
11A09FD000
stack
page read and write
7FF5D7784000
unkown
page readonly
18EA7FB9000
heap
page read and write
7DF4F2461000
unkown
page execute read
17C2FF10000
heap
page read and write
5F4EFF000
stack
page read and write
7FF5D7643000
unkown
page readonly
88C0000
unkown
page execute and read and write
7E58000
stack
page read and write
18EA7F79000
heap
page read and write
35E4000
unkown
page read and write
7460000
unkown
page read and write
7FF5D7236000
unkown
page readonly
9D67000
unkown
page read and write
7FF5D77D2000
unkown
page readonly
27617B80000
heap
page read and write
22477AA5000
heap
page read and write
7FF5D7837000
unkown
page readonly
C609000
unkown
page read and write
3531000
unkown
page read and write
13A0000
unkown
page readonly
7FF5D7764000
unkown
page readonly
AA20000
unkown
page read and write
7FF5D75CB000
unkown
page readonly
A3AC000
unkown
page read and write
4A71000
unkown
page read and write
1CEB0400000
heap
page read and write
27617D4F000
heap
page read and write
35C3000
unkown
page read and write
166F256B000
heap
page read and write
156668F0000
trusted library allocation
page read and write
EF8000
heap
page read and write
7DF4F2491000
unkown
page execute read
2EB0000
unkown
page execute and read and write
17C2FF87000
heap
page read and write
15666FA5000
heap
page read and write
9A96000
unkown
page read and write
18EA8519000
heap
page read and write
7FF8A8EED000
unkown
page readonly
35FA000
unkown
page read and write
18EA7F92000
heap
page read and write
7FF5D66E8000
unkown
page readonly
B950000
unkown
page readonly
18EA9E70000
heap
page read and write
7FF5D776F000
unkown
page readonly
3050000
unkown
page execute and read and write
10416000
unkown
page read and write
B67BB7B000
stack
page read and write
14FFCEA0000
heap
page read and write
7FF5D7745000
unkown
page readonly
45EF47D000
stack
page read and write
362A000
unkown
page read and write
1CB10D38000
heap
page read and write
1CEAE484000
heap
page read and write
7637000
unkown
page read and write
7FF5D720F000
unkown
page readonly
C1A6F2F000
stack
page read and write
156668F0000
trusted library allocation
page read and write
B85A000
stack
page read and write
27617D4E000
heap
page read and write
C663000
unkown
page read and write
7FF5D75B3000
unkown
page readonly
88C0000
unkown
page execute and read and write
35C9000
unkown
page read and write
A233000
unkown
page read and write
7FF5D7639000
unkown
page readonly
3140000
unkown
page read and write
1390ADC0000
heap
page read and write
7FF5D732D000
unkown
page readonly
3534000
unkown
page read and write
49C2000
unkown
page read and write
99C0000
unkown
page read and write
1D497810000
heap
page read and write
C8EB000
unkown
page read and write
30C0000
unkown
page execute and read and write
7611000
unkown
page read and write
35C9000
unkown
page read and write
35C3000
unkown
page read and write
C0AE77F000
stack
page read and write
1231000
unkown
page read and write
9A9E000
unkown
page read and write
1281000
unkown
page readonly
7FF5D748A000
unkown
page readonly
E2458FE000
stack
page read and write
C1A7267000
stack
page read and write
18EA9E8E000
heap
page read and write
C5FA000
unkown
page read and write
894C000
unkown
page read and write
A9FD000
unkown
page read and write
49FA000
unkown
page read and write
8980000
unkown
page execute and read and write
18EA7DB0000
heap
page read and write
7FF5D7591000
unkown
page readonly
4A0E000
unkown
page read and write
9EB0000
unkown
page readonly
7DF4F2491000
unkown
page execute read
7FF5D66E3000
unkown
page readonly
A313000
unkown
page read and write
7FF5D7404000
unkown
page readonly
B980000
unkown
page readonly
7FF5D7752000
unkown
page readonly
A1C7FF000
unkown
page read and write
18EA9E8E000
heap
page read and write
3545000
unkown
page read and write
7FF5D779E000
unkown
page readonly
15666F84000
heap
page read and write
BB10000
heap
page read and write
7FF5D716B000
unkown
page readonly
F13000
heap
page read and write
10394000
unkown
page read and write
27619CD9000
heap
page read and write
7C80000
unkown
page read and write
89DA000
heap
page read and write
200A8720000
heap
page read and write
7FF5D764F000
unkown
page readonly
1CC349F7000
heap
page read and write
1390000
heap
page read and write
14FFCE30000
heap
page read and write
2BC138C000
stack
page read and write
7FF5D7257000
unkown
page readonly
B0E0000
unkown
page readonly
8880000
unkown
page readonly
7FF5D77A8000
unkown
page readonly
2339FFE0000
remote allocation
page read and write
1EA668F2000
heap
page read and write
1CEB022D000
heap
page read and write
31FE000
unkown
page read and write
2339E1F5000
heap
page read and write
2F90000
unkown
page execute and read and write
18EA7F92000
heap
page read and write
A3AA000
unkown
page read and write
1260000
unkown
page execute and read and write
7FF5D77C2000
unkown
page readonly
15666F8B000
heap
page read and write
F270000
unkown
page read and write
200A8841000
heap
page read and write
9A72000
unkown
page read and write
CA85000
unkown
page read and write
1260000
unkown
page execute and read and write
16269910000
heap
page read and write
8980000
unkown
page execute and read and write
AA25000
unkown
page read and write
2F7F000
stack
page read and write
7FF5D7534000
unkown
page readonly
7FF5D72C8000
unkown
page readonly
1CEB0236000
heap
page read and write
7FF5D75BF000
unkown
page readonly
A39F000
unkown
page read and write
1E7BAE90000
heap
page read and write
9EB0000
unkown
page readonly
1CEB03E9000
heap
page read and write
1EA66918000
heap
page read and write
7FF5D76E8000
unkown
page readonly
19ECD6A0000
heap
page read and write
FFC00FC000
stack
page read and write
9A94000
unkown
page read and write
7618000
unkown
page read and write
E5A3C7D000
stack
page read and write
8B80000
unkown
page execute and read and write
1390ACE6000
heap
page read and write
45EF4FE000
stack
page read and write
27619CD9000
heap
page read and write
7DF4A9FC0000
direct allocation
page execute read
18EA7F95000
heap
page read and write
1350000
unkown
page readonly
4AA0000
unkown
page read and write
ADD8EFF000
stack
page read and write
18EA8508000
heap
page read and write
1E410A60000
heap
page read and write
7FF5D75AF000
unkown
page readonly
18EA7ED0000
trusted library allocation
page read and write
C96F000
unkown
page read and write
9B41000
unkown
page read and write
166F2730000
heap
page read and write
276196D0000
remote allocation
page read and write
1390AB20000
heap
page read and write
1CB10D30000
heap
page read and write
9A9E000
unkown
page read and write
89DA000
heap
page read and write
AA29000
unkown
page read and write
18EA7F77000
heap
page read and write
1DFDD240000
heap
page read and write
3500000
stack
page read and write
C899000
unkown
page read and write
7FF5D781A000
unkown
page readonly
9AAA000
unkown
page read and write
3549000
unkown
page read and write
7FF8A8EA2000
unkown
page write copy
7DF4051B4000
direct allocation
page read and write
B4D0000
unkown
page readonly
1CEAE655000
heap
page read and write
A251000
unkown
page read and write
1EA66917000
heap
page read and write
2339FBB8000
direct allocation
page readonly
15666F8B000
heap
page read and write
35B0000
unkown
page read and write
F13000
heap
page read and write
1EA6690E000
heap
page read and write
3542000
unkown
page read and write
15666F8B000
heap
page read and write
7DF405150000
direct allocation
page read and write
A1AF000
stack
page read and write
27619CD9000
heap
page read and write
75EBCFC000
stack
page read and write
18EA7F40000
heap
page read and write
11E0000
unkown
page execute and read and write
AA04000
unkown
page read and write
7FF8A8EE8000
unkown
page read and write
A12F000
stack
page read and write
9FAF000
stack
page read and write
7FF5D716B000
unkown
page readonly
49FD000
unkown
page read and write
CA46000
unkown
page read and write
1CEB01D0000
heap
page read and write
1E410AFB000
heap
page read and write
16269A00000
heap
page read and write
156669C3000
heap
page read and write
276196E0000
trusted library allocation
page read and write
27617D0B000
heap
page read and write
2761966A000
direct allocation
page read and write
C800000
unkown
page read and write
9A6A000
unkown
page read and write
27619B14000
heap
page read and write
7FF8A8CF0000
unkown
page readonly
C969000
unkown
page read and write
A2B5000
unkown
page read and write
49BB000
unkown
page read and write
C0AEB7E000
stack
page read and write
C95B000
unkown
page read and write
8870000
unkown
page readonly
18EA84EE000
heap
page read and write
9860000
unkown
page execute and read and write
18EA9E84000
heap
page read and write
A33F000
unkown
page read and write
156669C3000
heap
page read and write
1731000
unkown
page readonly
233A0224000
heap
page read and write
E450000
unkown
page execute and read and write
49BB000
unkown
page read and write
75EBDFF000
unkown
page read and write
18EA8508000
heap
page read and write
C9E9000
unkown
page read and write
4ADA000
unkown
page read and write
7FF5D7272000
unkown
page readonly
894C000
unkown
page read and write
98FD000
stack
page read and write
B220000
unkown
page read and write
1CEB0215000
heap
page read and write
3160000
unkown
page read and write
5330000
unkown
page write copy
C642000
unkown
page read and write
156669A7000
heap
page read and write
F24E000
unkown
page read and write
6AD22FE000
unkown
page read and write
7FF5D77C2000
unkown
page readonly
7FF5D7075000
unkown
page readonly
7FF5D774A000
unkown
page readonly
1CEB02D0000
heap
page read and write
9820000
unkown
page execute and read and write
E5AE000
stack
page read and write
9EC0000
unkown
page execute and read and write
14FFD190000
heap
page read and write
9C95000
unkown
page read and write
F24D000
unkown
page read and write
18EA84F3000
heap
page read and write
4AB0000
unkown
page read and write
233A0224000
heap
page read and write
7440000
unkown
page read and write
C450000
unkown
page read and write
4AC0000
unkown
page read and write
E64C000
stack
page read and write
7FF5D77CD000
unkown
page readonly
262682E7000
heap
page read and write
7FF5D77E9000
unkown
page readonly
2339E1B9000
heap
page read and write
3500000
stack
page read and write
35BD000
unkown
page read and write
18EA7FB0000
heap
page read and write
18EA9E86000
heap
page read and write
7FF5D75FF000
unkown
page readonly
233A0023000
heap
page read and write
7FF5D7795000
unkown
page readonly
1360000
unkown
page readonly
CA42000
unkown
page read and write
C460000
unkown
page read and write
C0AE87E000
stack
page read and write
7FF5D778A000
unkown
page readonly
A0A6000
stack
page read and write
768E000
unkown
page read and write
33B0000
unkown
page readonly
1B2EEAE0000
heap
page read and write
7FF5D783B000
unkown
page readonly
7CB0000
unkown
page readonly
7FF5D771A000
unkown
page readonly
AA0B000
unkown
page read and write
7DF4A9FB1000
direct allocation
page read and write
9A94000
unkown
page read and write
15666F89000
heap
page read and write
7FF5D7797000
unkown
page readonly
7FF5D7398000
unkown
page readonly
4A7A87C000
stack
page read and write
4D03FF000
stack
page read and write
1DFDD248000
heap
page read and write
2FE0000
unkown
page execute and read and write
1CEAE499000
heap
page read and write
E84E000
stack
page read and write
261787B0000
heap
page read and write
C8F0000
unkown
page read and write
7DF4A9F50000
direct allocation
page read and write
21380C05000
heap
page read and write
7FF5D7648000
unkown
page readonly
2339E1CA000
heap
page read and write
C8DC000
unkown
page read and write
15666BFE000
heap
page read and write
7FF5D66E3000
unkown
page readonly
7FF5D7682000
unkown
page readonly
21380F20000
heap
page read and write
5F4FFE000
stack
page read and write
314667E000
stack
page read and write
156669C5000
heap
page read and write
15666F87000
heap
page read and write
1CC349F4000
heap
page read and write
5479000
unkown
page read and write
9B0B000
unkown
page read and write
233A0052000
heap
page read and write
1390AC20000
heap
page read and write
7AE0000
unkown
page read and write
18EA7F2D000
heap
page read and write
A39C000
unkown
page read and write
9B8F000
unkown
page read and write
7FF5D71E0000
unkown
page readonly
3170000
unkown
page read and write
7FF5D6AB6000
unkown
page readonly
3380000
unkown
page execute and read and write
9AB2000
unkown
page read and write
9A8E000
unkown
page read and write
8980000
unkown
page read and write
35B5000
unkown
page read and write
7FF8A8EA2000
unkown
page write copy
89F0000
unkown
page execute and read and write
10469000
unkown
page read and write
12D0000
unkown
page readonly
7FF5D7808000
unkown
page readonly
35E4000
unkown
page read and write
7FF5D7292000
unkown
page readonly
7B60000
unkown
page readonly
8920000
unkown
page execute and read and write
7C70000
unkown
page readonly
A416000
unkown
page read and write
B03B000
stack
page read and write
7C31000
unkown
page read and write
27619AF7000
heap
page read and write
27617CDD000
heap
page read and write
853B000
stack
page read and write
18EA7F7A000
heap
page read and write
1CEB0244000
heap
page read and write
1EA668C8000
heap
page read and write
1170000
unkown
page execute and read and write
ED26BEB000
stack
page read and write
18EA7F17000
heap
page read and write
B67BEE7000
stack
page read and write
9A72000
unkown
page read and write
1EA66908000
heap
page read and write
1EA66B95000
heap
page read and write
AA47000
unkown
page read and write
1260000
unkown
page execute and read and write
18EA7F25000
heap
page read and write
3630000
unkown
page readonly
AA40000
unkown
page read and write
8BA0000
unkown
page execute and read and write
1EA668F2000
heap
page read and write
B67C0FF000
stack
page read and write
200A884B000
heap
page read and write
1CEAE484000
heap
page read and write
C035000
stack
page read and write
18EA7F57000
heap
page read and write
9E2D000
stack
page read and write
35FA000
unkown
page read and write
7FF5D762F000
unkown
page readonly
1E410A50000
heap
page read and write
9A80000
unkown
page read and write
A286000
unkown
page read and write
7FF5D7641000
unkown
page readonly
156668D0000
heap
page read and write
8A70000
unkown
page read and write
7631000
unkown
page read and write
18EA7F1E000
heap
page read and write
CA6A000
unkown
page read and write
E10000
unkown
page readonly
15666BF2000
heap
page read and write
C8DC000
unkown
page read and write
22477AA7000
heap
page read and write
1CEAE484000
heap
page read and write
C62D000
unkown
page read and write
35C3000
unkown
page read and write
7DF4F24A1000
unkown
page execute read
C81C000
unkown
page read and write
33C0000
unkown
page read and write
15666BFA000
heap
page read and write
7DF4F2470000
unkown
page readonly
7B10000
unkown
page read and write
7FF5D705D000
unkown
page readonly
7FF5D71EF000
unkown
page readonly
156669C5000
heap
page read and write
7FF5D7244000
unkown
page readonly
18EA7F2A000
heap
page read and write
30C0000
unkown
page execute and read and write
9ADB000
unkown
page read and write
1260000
unkown
page execute and read and write
1CC348F0000
heap
page read and write
BF3E000
stack
page read and write
C908000
unkown
page read and write
7B00000
unkown
page readonly
7DC0000
unkown
page readonly
7FF5D7280000
unkown
page readonly
3310000
unkown
page read and write
3400000
unkown
page read and write
200A880D000
heap
page read and write
85BE000
stack
page read and write
7FF5D706F000
unkown
page readonly
4AB0000
unkown
page read and write
B0BD000
stack
page read and write
2339FFE0000
remote allocation
page read and write
18EA7ED0000
trusted library allocation
page read and write
7FF5D738E000
unkown
page readonly
3331000
unkown
page read and write
1EA6691D000
heap
page read and write
8D3B000
stack
page read and write
FFC01FF000
unkown
page read and write
27619CD9000
heap
page read and write
5F50FF000
stack
page read and write
AA04000
unkown
page read and write
9A80000
unkown
page read and write
B4BF000
stack
page read and write
26178967000
heap
page read and write
89D0000
heap
page read and write
1CEAFCB0000
direct allocation
page read and write
1000000
heap
page read and write
27617D52000
heap
page read and write
7FF5D766E000
unkown
page readonly
4A40000
unkown
page read and write
A3B9000
unkown
page read and write
7FF5D723F000
unkown
page readonly
7FF5D77CD000
unkown
page readonly
9850000
unkown
page execute and read and write
7AC0000
unkown
page read and write
7FF5D76E8000
unkown
page readonly
9B41000
unkown
page read and write
7FF5D7262000
unkown
page readonly
6070AAC000
stack
page read and write
7FF8A8EE3000
unkown
page read and write
2339FBC5000
direct allocation
page read and write
1CEAFCA6000
direct allocation
page read and write
A3B6000
unkown
page read and write
233A0209000
heap
page read and write
1CEB01C0000
remote allocation
page read and write
233A0052000
heap
page read and write
8990000
unkown
page execute and read and write
27617E70000
heap
page read and write
2339E1CA000
heap
page read and write
A39C000
unkown
page read and write
A1AF000
stack
page read and write
14FFCEC5000
heap
page read and write
9AB4000
unkown
page read and write
156669A8000
heap
page read and write
3331000
unkown
page read and write
7FF5D74F2000
unkown
page readonly
9A90000
unkown
page read and write
9AC3000
unkown
page read and write
A39F000
unkown
page read and write
B950000
unkown
page readonly
18EA9E94000
heap
page read and write
7FF5D77EB000
unkown
page readonly
7FF5D75C1000
unkown
page readonly
C800000
unkown
page read and write
C979000
unkown
page read and write
27976DB5000
heap
page read and write
AA20000
unkown
page read and write
BE70000
unkown
page readonly
7FF5D710B000
unkown
page readonly
4B63517000
stack
page read and write
17C2FF90000
heap
page read and write
18EA7F10000
heap
page read and write
9AB4000
unkown
page read and write
15666F81000
heap
page read and write
75F8000
unkown
page read and write
4B638FF000
stack
page read and write
1CC349D7000
heap
page read and write
9A98000
unkown
page read and write
233A0220000
heap
page read and write
7FF5D7691000
unkown
page readonly
7FF8A8EED000
unkown
page readonly
18EA7F92000
heap
page read and write
49D6000
unkown
page read and write
9AC3000
unkown
page read and write
C8B1000
unkown
page read and write
27617CCA000
heap
page read and write
35CD000
unkown
page read and write
2339E0C5000
heap
page read and write
9A96000
unkown
page read and write
7DBD000
stack
page read and write
7FF5D743F000
unkown
page readonly
15666F79000
heap
page read and write
7FF8A8CF1000
unkown
page execute read
7FF5D73F5000
unkown
page readonly
1CEAE44B000
heap
page read and write
9C93000
unkown
page read and write
15666FAC000
heap
page read and write
1CC34910000
heap
page read and write
7FF5D71A6000
unkown
page readonly
96FE000
stack
page read and write
7FF5D71A6000
unkown
page readonly
12B0000
unkown
page read and write
AA20000
unkown
page read and write
7435000
stack
page read and write
10452000
unkown
page read and write
B970000
unkown
page execute and read and write
200A8AB0000
heap
page read and write
9A98000
unkown
page read and write
15666F84000
heap
page read and write
9AAA000
unkown
page read and write
35B5000
unkown
page read and write
7FF5D747F000
unkown
page readonly
A1C8FF000
stack
page read and write
4A0E000
unkown
page read and write
7DC0000
unkown
page readonly
233A00DB000
heap
page read and write
91F0000
unkown
page readonly
156669C3000
heap
page read and write
1CC34AD0000
heap
page read and write
27619BC0000
heap
page read and write
C971000
unkown
page read and write
E5CD000
stack
page read and write
21380DB0000
heap
page read and write
27617D52000
heap
page read and write
18EA7F14000
heap
page read and write
7FF5D71D7000
unkown
page readonly
9AF9000
unkown
page read and write
16269AFB000
heap
page read and write
7FF5D7385000
unkown
page readonly
AA40000
unkown
page read and write
233A0220000
heap
page read and write
F270000
unkown
page read and write
91F0000
unkown
page readonly
49FA000
unkown
page read and write
4AFA000
unkown
page read and write
35F4000
unkown
page read and write
27619CF0000
heap
page read and write
C975000
unkown
page read and write
C4DC000
unkown
page read and write
7FF5D6BEF000
unkown
page readonly
1CEAE494000
heap
page read and write
9679000
stack
page read and write
C8DC000
unkown
page read and write
A391000
unkown
page read and write
35DC000
unkown
page read and write
7FF5D744C000
unkown
page readonly
7FF8A8E9E000
unkown
page read and write
AA26000
unkown
page read and write
7FF5D745B000
unkown
page readonly
30E0000
unkown
page execute and read and write
C5EC000
unkown
page read and write
8F50000
unkown
page execute and read and write
2339E20E000
heap
page read and write
7FF5D75B8000
unkown
page readonly
AA22000
unkown
page read and write
35F4000
unkown
page read and write
C85F000
unkown
page read and write
7DF4051C0000
direct allocation
page execute read
BF3E000
stack
page read and write
C8FA000
unkown
page read and write
35C1000
unkown
page read and write
AA14000
unkown
page read and write
89B0000
unkown
page execute and read and write
2EA1000
unkown
page read and write
2339FB81000
direct allocation
page execute read
C8BD000
unkown
page read and write
18EA7F1A000
heap
page read and write
A2A2000
unkown
page read and write
1EA668E2000
heap
page read and write
7FF5D75A6000
unkown
page readonly
14FFCEC4000
heap
page read and write
75E0000
unkown
page read and write
162699F5000
heap
page read and write
18EA7F48000
heap
page read and write
27617C20000
heap
page readonly
A9A0000
unkown
page read and write
7FF8A8E21000
unkown
page readonly
C8CD000
unkown
page read and write
C979000
unkown
page read and write
354D000
unkown
page read and write
4AEA000
unkown
page read and write
7FF5D77E9000
unkown
page readonly
200A8818000
heap
page read and write
A251000
unkown
page read and write
C0AE867000
stack
page read and write
B0E0000
unkown
page readonly
9A9E000
unkown
page read and write
27617D0B000
heap
page read and write
2AA90FC000
stack
page read and write
7FF5D7808000
unkown
page readonly
C975000
unkown
page read and write
2339FBC3000
direct allocation
page read and write
7AE0000
unkown
page read and write
1CEAE493000
heap
page read and write
30C0000
unkown
page execute and read and write
362A000
unkown
page read and write
798A000
stack
page read and write
7FF5D77B9000
unkown
page readonly
1395000
heap
page read and write
7FF5D73F5000
unkown
page readonly
8A00000
unkown
page read and write
1CC349F7000
heap
page read and write
166F2585000
heap
page read and write
AA2B000
unkown
page read and write
7FF5D770F000
unkown
page readonly
9578000
stack
page read and write
6AD23FE000
stack
page read and write
1CEB04D0000
trusted library allocation
page read and write
17C2FF80000
heap
page read and write
7FF5D7593000
unkown
page readonly
C971000
unkown
page read and write
233A0220000
heap
page read and write
1CEB0240000
heap
page read and write
77DB000
unkown
page read and write
18EA8508000
heap
page read and write
7FF8A8E9E000
unkown
page read and write
C9F9000
unkown
page read and write
15666C20000
heap
page read and write
17C2FEF0000
heap
page read and write
7FF5D77E0000
unkown
page readonly
C9F9000
unkown
page read and write
27619CF0000
heap
page read and write
2339FBBE000
direct allocation
page read and write
7440000
unkown
page read and write
7FF5D762F000
unkown
page readonly
2339E1B9000
heap
page read and write
18EA9E81000
heap
page read and write
C8DC000
unkown
page read and write
35C1000
unkown
page read and write
1CEAE446000
heap
page read and write
156668F0000
trusted library allocation
page read and write
233A0040000
heap
page read and write
F210000
unkown
page read and write
2FD0000
unkown
page execute and read and write
C981000
unkown
page read and write
30C0000
unkown
page execute and read and write
EB5000
stack
page read and write
C9D7000
unkown
page read and write
1CEB0404000
heap
page read and write
18EA7ED0000
trusted library allocation
page read and write
C1A75FF000
stack
page read and write
7FF5D72DF000
unkown
page readonly
15666BFA000
heap
page read and write
AA22000
unkown
page read and write
35CD000
unkown
page read and write
1CEAE448000
heap
page read and write
761E000
unkown
page read and write
9AA8000
unkown
page read and write
7FF5D71AF000
unkown
page readonly
4A7A8FE000
stack
page read and write
C900000
unkown
page read and write
7693000
unkown
page read and write
7FF5D71C8000
unkown
page readonly
7618000
unkown
page read and write
AA22000
unkown
page read and write
C24E000
stack
page read and write
7FF5D76F5000
unkown
page readonly
7FF5D7485000
unkown
page readonly
15666F7C000
heap
page read and write
2339E155000
heap
page read and write
15666F99000
heap
page read and write
7FF5D76C8000
unkown
page readonly
200AA230000
heap
page read and write
C5EC000
unkown
page read and write
76F8000
unkown
page read and write
7FF5D743F000
unkown
page readonly
AA14000
unkown
page read and write
233A0224000
heap
page read and write
EF0000
heap
page read and write
33B0000
unkown
page readonly
9A76000
unkown
page read and write
1CEB0400000
heap
page read and write
1CEB0400000
heap
page read and write
33C0000
unkown
page read and write
27619B26000
heap
page read and write
10416000
unkown
page read and write
1CEB02CD000
heap
page read and write
35CF000
unkown
page read and write
27617D1F000
heap
page read and write
18EA850B000
heap
page read and write
166F28D0000
heap
page read and write
1CEAE422000
heap
page read and write
C8D8000
unkown
page read and write
1270000
unkown
page read and write
5463000
unkown
page read and write
3120000
unkown
page read and write
B4BF000
stack
page read and write
C48B000
unkown
page read and write
4A44000
unkown
page read and write
27617D55000
heap
page read and write
88B0000
unkown
page execute and read and write
AA15000
unkown
page read and write
7DF445314000
direct allocation
page read and write
8890000
unkown
page readonly
18EA9E80000
heap
page read and write
1CEAE421000
heap
page read and write
9B2C000
unkown
page read and write
7B10000
unkown
page read and write
200A8823000
heap
page read and write
3146307000
stack
page read and write
CA22000
unkown
page read and write
7FF5D7784000
unkown
page readonly
9AA8000
unkown
page read and write
9A92000
unkown
page read and write
7691000
unkown
page read and write
19ECD765000
heap
page read and write
7FF5D77A4000
unkown
page readonly
27617AA0000
heap
page read and write
7FF5D75F9000
unkown
page readonly
7FF5D77FD000
unkown
page readonly
C96F000
unkown
page read and write
18EA8508000
heap
page read and write
7FF5D74FA000
unkown
page readonly
35B0000
unkown
page read and write
91E0000
unkown
page execute and read and write
166F2530000
heap
page read and write
2E90000
unkown
page execute and read and write
There are 2340 hidden memdumps, click here to show them.