IOC Report
101 2043 5770 pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
101 2043 5770 pdf.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\101 2043 5770 pdf.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\DB1
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
malicious
C:\Users\user\AppData\Roaming\J8AR3449\J8Alogri.ini
data
dropped
malicious
C:\Users\user\AppData\Roaming\J8AR3449\J8Alogrv.ini
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3t2u5h2o.oqr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5lxxqwri.2qj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a10rzeiw.wi0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_avprntir.zqq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gg1v4u5h.mmf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j4bjxsig.dqv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mnjuhh3v.2it.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sdivv3yg.yzh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_teqsfm3t.doy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xvp1tds4.2eq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y45rg5ob.cc2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zv3ua2zx.fex.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\J8AR3449\J8Alogim.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Users\user\AppData\Roaming\J8AR3449\J8Alogrg.ini
Targa image data - RGB - RLE 109 x 101 x 32 +114 +111 "R"
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\101 2043 5770 pdf.exe
"C:\Users\user\Desktop\101 2043 5770 pdf.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files (x86)\Windows Media Player\wmplayer.exe
"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\ipconfig.exe
"C:\Windows\SysWOW64\ipconfig.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
/c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user\AppData\Local\Temp\DB1" /V
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\101 2043 5770 pdf.exe
"C:\Users\user\101 2043 5770 pdf.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\calc.exe
"C:\Windows\System32\calc.exe"
malicious
C:\Windows\regedit.exe
"C:\Windows\regedit.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe"
malicious
C:\Windows\System32\svchost.exe
"C:\Windows\System32\svchost.exe"
malicious
C:\Program Files (x86)\Internet Explorer\iexplore.exe
"C:\Program Files (x86)\Internet Explorer\iexplore.exe"
malicious
C:\Users\user\101 2043 5770 pdf.exe
"C:\Users\user\101 2043 5770 pdf.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
malicious
C:\Program Files (x86)\Windows Media Player\wmplayer.exe
"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
malicious
C:\Windows\SysWOW64\raserver.exe
"C:\Windows\SysWOW64\raserver.exe"
malicious
C:\Windows\SysWOW64\cmmon32.exe
"C:\Windows\SysWOW64\cmmon32.exe"
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.sacksmantenimiento.storeReferer:
unknown
malicious
www.a2zglobalimports.com/kmge/
malicious
http://www.mrawkward.xyz/kmge/
unknown
malicious
http://www.hhe-crv220.com/kmge/www.sacksmantenimiento.store
unknown
malicious
http://www.n5l780.comReferer:
unknown
malicious
http://www.mrawkward.xyz
unknown
malicious
http://www.cq0jt.sbs
unknown
malicious
http://www.kickssoccercamp.com
unknown
malicious
http://www.hhe-crv220.com/kmge/
unknown
malicious
http://www.n5l780.com/kmge/www.szexvideokingyen.sbs
unknown
malicious
http://www.n5l780.com/kmge/
unknown
malicious
http://www.n5l780.com
unknown
malicious
http://www.icvp5o.xyz
unknown
malicious
http://www.sacksmantenimiento.store/kmge/
unknown
malicious
http://www.mrawkward.xyzReferer:
unknown
malicious
http://www.cq0jt.sbsReferer:
unknown
malicious
http://www.bedbillionaire.com/kmge/www.mrawkward.xyz
unknown
malicious
http://www.landfillequip.com/kmge/
204.11.56.48
malicious
http://www.a2zglobalimports.com/kmge/www.shearwaterpembrokeshire.com
unknown
malicious
http://www.bedbillionaire.comReferer:
unknown
malicious
http://www.sacksmantenimiento.store/kmge/www.a2zglobalimports.com
unknown
malicious
http://www.cq0jt.sbs/kmge/www.hhe-crv220.com
unknown
malicious
http://www.mrawkward.xyz/kmge/www.landfillequip.com
unknown
malicious
http://www.hhe-crv220.com
unknown
malicious
http://www.sacksmantenimiento.store
unknown
malicious
http://www.kickssoccercamp.com/kmge/
unknown
malicious
http://www.bedbillionaire.com/kmge/
unknown
malicious
http://www.kickssoccercamp.comReferer:
unknown
malicious
http://www.icvp5o.xyz/kmge/
unknown
malicious
http://www.bedbillionaire.com
unknown
malicious
http://www.icvp5o.xyzReferer:
unknown
malicious
http://www.icvp5o.xyz/kmge/www.bedbillionaire.com
unknown
malicious
http://www.hhe-crv220.comReferer:
unknown
malicious
http://www.kickssoccercamp.com/kmge/www.cq0jt.sbs
unknown
malicious
http://www.a2zglobalimports.com/kmge/
unknown
malicious
http://www.sejasuapropriachefe.com
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed881
unknown
https://word.office.comM
unknown
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
unknown
https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
unknown
http://www.blucretebistro.comReferer:
unknown
https://aka.ms/nativeaot-compatibility
unknown
https://wns.windows.com/e
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
http://www.gsolartech.comReferer:
unknown
http://www.szexvideokingyen.sbs
unknown
http://www.shearwaterpembrokeshire.com/kmge/www.sejasuapropriachefe.com
unknown
https://mozilla.org0/
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://aka.ms/nativeaot-compatibilityy
unknown
http://www.sejasuapropriachefe.com/kmge/
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
unknown
http://www.agritamaperkasaindonesia.com
unknown
http://www.landfillequip.com
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
https://android.notify.windows.com/iOS
unknown
https://outlook.come
unknown
https://aka.ms/nativeaot-compatibilityY
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
http://www.blucretebistro.com/kmge/
unknown
https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
unknown
http://www.a2zglobalimports.comReferer:
unknown
https://api.msn.com/v1/news/Feed/Windows?
unknown
https://api.msn.com/I
unknown
http://ocsp.sectigo.com0
unknown
http://www.landfillequip.comReferer:
unknown
https://aka.ms/nativeaot-c
unknown
http://schemas.micro
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
unknown
http://www.szexvideokingyen.sbs/kmge/www.agritamaperkasaindonesia.com
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.sejasuapropriachefe.comReferer:
unknown
https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h
unknown
http://www.gsolartech.com/kmge/
unknown
https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
unknown
http://www.blucretebistro.com
unknown
https://sectigo.com/CPS0
unknown
https://crash-reports.mozilla.com/submit?id=
unknown
http://www.shearwaterpembrokeshire.com
unknown
http://www.blucretebistro.com/kmge/www.gsolartech.com
unknown
http://www.a2zglobalimports.com
unknown
http://www.szexvideokingyen.sbsReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
unknown
https://excel.office.com-
unknown
http://www.shearwaterpembrokeshire.comReferer:
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
http://www.gsolartech.com
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
unknown
https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
unknown
https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
unknown
https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
unknown
https://powerpoint.office.comEMd
unknown
https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.landfillequip.com
204.11.56.48
malicious
shearwaterpembrokeshire.com
3.33.130.190
malicious
www.mrawkward.xyz
unknown
malicious
www.n5l780.com
unknown
malicious
www.cq0jt.sbs
unknown
malicious
www.hhe-crv220.com
unknown
malicious
www.kickssoccercamp.com
unknown
malicious
www.a2zglobalimports.com
unknown
malicious
www.shearwaterpembrokeshire.com
unknown
malicious
www.sejasuapropriachefe.com
unknown
malicious
www.icvp5o.xyz
unknown
malicious
www.bedbillionaire.com
unknown
malicious
www.sacksmantenimiento.store
unknown
malicious
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
204.11.56.48
www.landfillequip.com
Virgin Islands (BRITISH)
malicious

Registry

Path
Value
Malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Unpacker
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
@explorerframe.dll,-13137
malicious
unknown
@explorerframe.dll,-13138
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
WMP11.AssocFile.3G2
malicious
unknown
WMP11.AssocFile.3GP
malicious
unknown
WMP11.AssocFile.3G2
malicious
unknown
WMP11.AssocFile.ADTS
malicious
unknown
WMP11.AssocFile.AIFF
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.AU
malicious
unknown
AutoIt3Script
malicious
unknown
WMP11.AssocFile.AVI
malicious
unknown
Paint.Picture
malicious
unknown
CABFolder
malicious
unknown
Microsoft.PowerShellCmdletDefinitionXML.1
malicious
unknown
CSSfile
malicious
unknown
Excel.CSV
malicious
unknown
ddsfile
malicious
unknown
Paint.Picture
malicious
unknown
dllfile
malicious
unknown
Word.Document.8
malicious
unknown
Word.DocumentMacroEnabled.12
malicious
unknown
Word.Document.12
malicious
unknown
Word.Template.8
malicious
unknown
Word.TemplateMacroEnabled.12
malicious
unknown
Word.Template.12
malicious
unknown
emffile
malicious
unknown
exefile
malicious
unknown
WMP11.AssocFile.FLAC
malicious
unknown
fonfile
malicious
unknown
giffile
malicious
unknown
htmlfile
malicious
unknown
icofile
malicious
unknown
inffile
malicious
unknown
inifile
malicious
unknown
pjpegfile
malicious
unknown
jpegfile
malicious
unknown
jpegfile
malicious
unknown
wdpfile
malicious
unknown
lnkfile
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
WMP11.AssocFile.m3u
malicious
unknown
WMP11.AssocFile.M4A
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
mhtmlfile
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
WMP11.AssocFile.MK3D
malicious
unknown
WMP11.AssocFile.MKA
malicious
unknown
WMP11.AssocFile.MKV
malicious
unknown
WMP11.AssocFile.MOV
malicious
unknown
WMP11.AssocFile.MP3
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
Outlook.File.msg.15
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
ocxfile
malicious
unknown
PowerPoint.OpenDocumentPresentation.12
malicious
unknown
Excel.OpenDocumentSpreadsheet.12
malicious
unknown
Word.OpenDocumentText.12
malicious
unknown
otffile
malicious
unknown
pngfile
malicious
unknown
PowerPoint.Template.8
malicious
unknown
PowerPoint.TemplateMacroEnabled.12
malicious
unknown
PowerPoint.Template.12
malicious
unknown
PowerPoint.Addin.12
malicious
unknown
PowerPoint.SlideShowMacroEnabled.12
malicious
unknown
PowerPoint.SlideShow.12
malicious
unknown
PowerPoint.Show.8
malicious
unknown
PowerPoint.ShowMacroEnabled.12
malicious
unknown
PowerPoint.Show.12
malicious
unknown
Microsoft.PowerShellScript.1
malicious
unknown
Microsoft.PowerShellXMLData.1
malicious
unknown
Microsoft.PowerShellData.1
malicious
unknown
Microsoft.PowerShellModule.1
malicious
unknown
Microsoft.PowerShellSessionConfiguration.1
malicious
unknown
rlefile
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
Word.RTF.8
malicious
unknown
SHCmdFile
malicious
unknown
SearchFolder
malicious
unknown
shtmlfile
malicious
unknown
PowerPoint.SlideMacroEnabled.12
malicious
unknown
PowerPoint.Slide.12
malicious
unknown
sysfile
malicious
unknown
TIFImage.Document
malicious
unknown
WMP11.AssocFile.TTS
malicious
unknown
ttcfile
malicious
unknown
ttffile
malicious
unknown
WMP11.AssocFile.TTS
malicious
unknown
txtfile
malicious
unknown
bootstrap.vsto.1
malicious
unknown
WMP11.AssocFile.WAV
malicious
unknown
WMP11.AssocFile.WAX
malicious
unknown
wdpfile
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.WMA
malicious
unknown
wmffile
malicious
unknown
WMP11.AssocFile.WMV
malicious
unknown
WMP11.AssocFile.WPL
malicious
unknown
WMP11.AssocFile.WVX
malicious
unknown
Excel.AddInMacroEnabled
malicious
unknown
Excel.Sheet.8
malicious
unknown
Excel.SheetBinaryMacroEnabled.12
malicious
unknown
Excel.SheetMacroEnabled.12
malicious
unknown
Excel.Sheet.12
malicious
unknown
Excel.Template.8
malicious
unknown
Excel.TemplateMacroEnabled
malicious
unknown
Excel.Template
malicious
unknown
xmlfile
malicious
unknown
xslfile
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
TaskbarStateLastRun
malicious
unknown
Implementing
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
TaskbarStateLastRun
malicious
unknown
Implementing
malicious
unknown
TaskbarStateLastRun
malicious
unknown
Implementing
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
101 2043 5770 pdf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000004040C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010446
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\101 2043 5770 cqs.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000002042C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000002045E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\101 2043 5770 cqs.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
There are 195 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
31D0000
unclassified section
page execute and read and write
malicious
3130000
unclassified section
page execute and read and write
malicious
3540000
trusted library allocation
page read and write
malicious
39E0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
C00000
system
page execute and read and write
malicious
5800000
unclassified section
page execute and read and write
malicious
C40000
system
page execute and read and write
malicious
1EC02230000
direct allocation
page read and write
malicious
29D3B800000
direct allocation
page read and write
malicious
57D0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
26544400000
direct allocation
page read and write
malicious
2CC0000
system
page execute and read and write
malicious
2653FB30000
heap
page read and write
C456000
unkown
page read and write
259000
system
page execute and read and write
AB8B000
stack
page read and write
3382000
unkown
page read and write
3107000
stack
page read and write
B4DB000
stack
page read and write
30B4000
heap
page read and write
3221000
heap
page read and write
1190000
heap
page read and write
1EBFD579000
heap
page read and write
95EE000
stack
page read and write
3610000
heap
page read and write
C1C4000
unkown
page read and write
9F92000
unkown
page read and write
3221000
heap
page read and write
1190000
heap
page read and write
2653FC3F000
heap
page read and write
980000
unkown
page readonly
B1C0000
unkown
page readonly
D0F000
heap
page read and write
BFB3000
unkown
page read and write
30D0000
trusted library allocation
page read and write
7FF5DF09B000
unkown
page readonly
C94000
heap
page read and write
96F5000
unkown
page read and write
7FF5DF06F000
unkown
page readonly
2D58000
heap
page read and write
336F000
unkown
page read and write
7FF5DF310000
unkown
page readonly
7FF5DF549000
unkown
page readonly
C94000
heap
page read and write
7FF5DEFC2000
unkown
page readonly
7FF5DF58A000
unkown
page readonly
BFA1000
unkown
page read and write
98A7000
unkown
page read and write
A759000
unkown
page read and write
11A0000
unkown
page readonly
A6F1000
unkown
page read and write
C1C4000
unkown
page read and write
2A549563000
direct allocation
page read and write
7FF5DF59E000
unkown
page readonly
51DC000
stack
page read and write
2E84000
heap
page read and write
73B8000
unkown
page read and write
978C000
unkown
page read and write
2EC0000
unkown
page readonly
7FF5DF08F000
unkown
page readonly
CEF000
heap
page read and write
7910000
unkown
page readonly
30C0000
trusted library allocation
page read and write
A6CF000
unkown
page read and write
7FF5DF42F000
unkown
page readonly
D50000
unkown
page read and write
2F31000
unkown
page read and write
C94000
heap
page read and write
3221000
heap
page read and write
EE98000
unkown
page read and write
9FA0000
unkown
page read and write
7A30000
unkown
page read and write
29D3728A000
heap
page read and write
1141C000
stack
page read and write
7FF5DF507000
unkown
page readonly
1EBFD571000
heap
page read and write
C94000
heap
page read and write
29D3721A000
heap
page read and write
B6A89FE000
stack
page read and write
2B3F000
heap
page read and write
29D37170000
heap
page read and write
7FF5DF3C2000
unkown
page readonly
C36F000
unkown
page read and write
7FF5DE5CC000
unkown
page readonly
C94000
heap
page read and write
F28000
stack
page read and write
29D3728A000
heap
page read and write
2D1E000
stack
page read and write
3221000
heap
page read and write
BF40000
unkown
page read and write
2A5D7C15000
heap
page read and write
8EA6000
stack
page read and write
30D0000
trusted library allocation
page read and write
7FF5DF49C000
unkown
page readonly
7FF5DF4F3000
unkown
page readonly
C94000
heap
page read and write
7FF5DF4EC000
unkown
page readonly
11333000
system
page execute and read and write
7380000
unkown
page read and write
3352000
heap
page read and write
C24C000
unkown
page read and write
BFC3000
unkown
page read and write
3165000
heap
page read and write
C94000
heap
page read and write
4C30000
direct allocation
page execute and read and write
10013000
unkown
page read and write
EE96000
unkown
page read and write
4DDC000
stack
page read and write
7FF5DEFE2000
unkown
page readonly
2653FC72000
heap
page read and write
C94000
heap
page read and write
29D372B5000
heap
page read and write
BFA7000
unkown
page read and write
C94000
heap
page read and write
2A5D7BF2000
heap
page read and write
2DD4CB9F000
direct allocation
page read and write
16686000
system
page read and write
2E84000
heap
page read and write
7FF5DEFB7000
unkown
page readonly
9FC3000
unkown
page read and write
3221000
heap
page read and write
2E84000
heap
page read and write
1EBFD4FB000
heap
page read and write
7FF680396000
unkown
page read and write
8EA8000
stack
page read and write
7FF5DF3EA000
unkown
page readonly
2D63000
heap
page read and write
2E1F000
unkown
page read and write
4ADB000
heap
page read and write
3A20000
unclassified section
page execute and read and write
A704000
unkown
page read and write
2D4D000
heap
page read and write
7499000
unkown
page read and write
2653FCC8000
heap
page read and write
9E1E000
stack
page read and write
30B4000
heap
page read and write
7FF5DF0F6000
unkown
page readonly
29D372D8000
heap
page read and write
7FF5DF2F3000
unkown
page readonly
22C93939000
heap
page read and write
7FF5DF5F6000
unkown
page readonly
4781000
heap
page read and write
C3E9000
unkown
page read and write
C13A000
unkown
page read and write
2D5E000
heap
page read and write
7FF5C0B65000
unkown
page readonly
38D2000
direct allocation
page execute and read and write
B9E0000
unkown
page read and write
EE70000
unkown
page read and write
3371000
unkown
page read and write
98E0000
unkown
page read and write
9D9F000
stack
page read and write
5374000
heap
page read and write
D60000
heap
page read and write
4855000
unkown
page read and write
C192000
unkown
page read and write
C94000
heap
page read and write
C048000
unkown
page read and write
47F3000
unkown
page read and write
7FF5DF364000
unkown
page readonly
C94000
heap
page read and write
C1CC000
unkown
page read and write
2653FCBB000
heap
page read and write
4C23000
heap
page read and write
33C0000
unkown
page readonly
4750000
unkown
page read and write
C95000
heap
page read and write
7FF5DF5FC000
unkown
page readonly
29D37285000
heap
page read and write
7FF5DF380000
unkown
page readonly
3A20000
trusted library allocation
page read and write
8590000
unkown
page readonly
7FF5DEF94000
unkown
page readonly
7FF5DF0F1000
unkown
page readonly
9718000
unkown
page read and write
C183000
unkown
page read and write
54F2000
heap
page read and write
2D48000
heap
page read and write
7FF680180000
unkown
page readonly
3170000
heap
page read and write
7FF7D7850000
unkown
page readonly
A02D000
unkown
page read and write
7FF5DF24E000
unkown
page readonly
C94000
heap
page read and write
7FF5DF5BE000
unkown
page readonly
2A5D7BAF000
heap
page read and write
C94000
heap
page read and write
684F000
stack
page read and write
1EBFD51B000
heap
page read and write
7FF5DF126000
unkown
page readonly
1EBFD57D000
heap
page read and write
73B8000
unkown
page read and write
493D000
heap
page read and write
3961000
direct allocation
page execute and read and write
28A0000
unkown
page readonly
3356000
unkown
page read and write
30D0000
heap
page readonly
1EBFD582000
heap
page read and write
C94000
heap
page read and write
7499000
unkown
page read and write
7D0E000
stack
page read and write
30D0000
trusted library allocation
page read and write
3221000
heap
page read and write
7FF5DEFE8000
unkown
page readonly
7FF5DF2DA000
unkown
page readonly
2DDCF262000
heap
page read and write
7FF5DEFF5000
unkown
page readonly
C42D000
unkown
page read and write
5374000
heap
page read and write
7FF5DEFBD000
unkown
page readonly
3331000
heap
page read and write
112E0000
system
page execute and read and write
C013000
unkown
page read and write
336C000
unkown
page read and write
2DDCF232000
heap
page read and write
7FF5DF191000
unkown
page readonly
2D20000
heap
page read and write
29D38C00000
direct allocation
page read and write
B9E0000
unkown
page read and write
C420000
unkown
page read and write
C94000
heap
page read and write
7FF5DEE5A000
unkown
page readonly
7FF7D7A6E000
unkown
page read and write
1EBFD56A000
heap
page read and write
54DA000
heap
page read and write
4855000
unkown
page read and write
2653FCB7000
heap
page read and write
3A20000
trusted library allocation
page read and write
C45B000
unkown
page read and write
B6A8557000
stack
page read and write
7FF5DF45C000
unkown
page readonly
FFD4000
unkown
page read and write
7FF5DEFAF000
unkown
page readonly
7FF5DF21F000
unkown
page readonly
C94000
heap
page read and write
C75000
stack
page read and write
30D0000
trusted library allocation
page read and write
98A1000
unkown
page read and write
9F63000
unkown
page read and write
5770000
unclassified section
page execute and read and write
3221000
heap
page read and write
7860000
unkown
page read and write
BF10000
unkown
page readonly
EE50000
unkown
page read and write
C94000
heap
page read and write
3221000
heap
page read and write
C94000
heap
page read and write
7FF5DF571000
unkown
page readonly
31A8000
heap
page read and write
2D69000
heap
page read and write
10C03000
system
page read and write
3362000
unkown
page read and write
7FF5DF017000
unkown
page readonly
3670000
trusted library allocation
page execute and read and write
C94000
heap
page read and write
A09A000
unkown
page read and write
7FF5DF443000
unkown
page readonly
22C95400000
heap
page read and write
C3BB000
unkown
page read and write
7FF5DF3AA000
unkown
page readonly
26541800000
direct allocation
page read and write
C94000
heap
page read and write
C070000
unkown
page read and write
6D66000
heap
page read and write
272C000
heap
page read and write
2E50000
unkown
page readonly
7FF5DF0A2000
unkown
page readonly
7FF5DF623000
unkown
page readonly
7FF5DF169000
unkown
page readonly
267E000
stack
page read and write
5374000
heap
page read and write
479B000
unkown
page read and write
3221000
heap
page read and write
7FF5DF5E9000
unkown
page readonly
30D0000
trusted library allocation
page read and write
C3E9000
unkown
page read and write
3221000
heap
page read and write
C034000
unkown
page read and write
7D0E000
stack
page read and write
86B2000
heap
page read and write
74A9000
unkown
page read and write
7FF5DF5D6000
unkown
page readonly
74D6000
unkown
page read and write
2680000
heap
page read and write
3221000
heap
page read and write
B09E000
stack
page read and write
5374000
heap
page read and write
7FF5DEFAF000
unkown
page readonly
3221000
heap
page read and write
E00000
heap
page read and write
987C000
unkown
page read and write
311E000
stack
page read and write
30D0000
trusted library allocation
page read and write
C1A9000
unkown
page read and write
356E000
stack
page read and write
54D5000
heap
page read and write
30D0000
trusted library allocation
page read and write
7FF5DF396000
unkown
page readonly
4A6A000
heap
page read and write
2653FC5E000
heap
page read and write
73CD000
unkown
page read and write
265479A1000
direct allocation
page read and write
30D0000
trusted library allocation
page read and write
86B2000
heap
page read and write
1EBFD562000
heap
page read and write
29D37293000
heap
page read and write
7395000
unkown
page read and write
30B4000
heap
page read and write
7FF5DF3F5000
unkown
page readonly
30D0000
trusted library allocation
page read and write
C94000
heap
page read and write
3330000
heap
page read and write
2690000
heap
page read and write
7FF5DF537000
unkown
page readonly
3221000
heap
page read and write
3221000
heap
page read and write
7FF5DF3B5000
unkown
page readonly
7FF5DEFCB000
unkown
page readonly
C94000
heap
page read and write
A6FB000
unkown
page read and write
B6A8DFF000
stack
page read and write
22C953A3000
heap
page read and write
BFAF000
unkown
page read and write
30D0000
trusted library allocation
page read and write
7FF5DF248000
unkown
page readonly
B589000
stack
page read and write
7DF5E895F000
unkown
page readonly
3221000
heap
page read and write
3221000
heap
page read and write
BF40000
unkown
page read and write
C424000
unkown
page read and write
C14E000
unkown
page read and write
C377000
unkown
page read and write
5BFD000
direct allocation
page execute and read and write
7FF5DF4AB000
unkown
page readonly
A6FB000
unkown
page read and write
48B0000
unkown
page read and write
3290000
unkown
page readonly
8910000
unkown
page read and write
7FF5C0B6B000
unkown
page readonly
26546FA1000
direct allocation
page read and write
7DF4E6760000
unkown
page readonly
22C06D44000
direct allocation
page read and write
BFDF000
unkown
page read and write
73CD000
unkown
page read and write
C94000
heap
page read and write
C24C000
unkown
page read and write
7415000
unkown
page read and write
7FF5DF458000
unkown
page readonly
7FF5DF435000
unkown
page readonly
3221000
heap
page read and write
E0AC000
stack
page read and write
C94000
heap
page read and write
C187000
unkown
page read and write
30D0000
trusted library allocation
page read and write
2653FCBB000
heap
page read and write
7FF5DF25B000
unkown
page readonly
7ACE000
stack
page read and write
2DDCF230000
heap
page read and write
3A20000
trusted library allocation
page read and write
DE0000
system
page execute and read and write
C192000
unkown
page read and write
3A20000
trusted library allocation
page read and write
29D37293000
heap
page read and write
7FF5DF5A3000
unkown
page readonly
30B4000
heap
page read and write
7FF6803A6000
unkown
page readonly
3185000
stack
page read and write
31D0000
trusted library allocation
page read and write
29D3727F000
heap
page read and write
7502000
unkown
page read and write
2A5D6090000
heap
page read and write
C24C000
unkown
page read and write
738E000
unkown
page read and write
7DF4E6761000
unkown
page execute read
9F10000
unkown
page read and write
C1C4000
unkown
page read and write
7DF4E6780000
unkown
page readonly
C1A9000
unkown
page read and write
B830000
unkown
page readonly
7FF5DF519000
unkown
page readonly
4828000
unkown
page read and write
7800000
unkown
page read and write
2E94000
heap
page read and write
BF6D000
unkown
page read and write
7FF5DF435000
unkown
page readonly
7FF6803A6000
unkown
page readonly
9FC3000
unkown
page read and write
97F3000
unkown
page read and write
2653FBE0000
heap
page read and write
2A5D7BA5000
heap
page read and write
4760000
unkown
page read and write
1EBFD490000
heap
page read and write
2E94000
heap
page read and write
7FF5DF55A000
unkown
page readonly
7FF5DF169000
unkown
page readonly
1EBFD56B000
heap
page read and write
C94000
heap
page read and write
9F78000
unkown
page read and write
9563000
unkown
page read and write
7FF5DF349000
unkown
page readonly
2E84000
heap
page read and write
2F98000
unkown
page read and write
7FF5DE4F2000
unkown
page readonly
7FF5DF0D2000
unkown
page readonly
27D0000
unkown
page read and write
3331000
heap
page read and write
C35C000
unkown
page read and write
AEF0000
unkown
page read and write
73BA000
unkown
page read and write
3304000
unkown
page read and write
29D3728C000
heap
page read and write
9A6C000
stack
page read and write
C94000
heap
page read and write
BF98000
unkown
page read and write
C034000
unkown
page read and write
CB2000
heap
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
30B4000
heap
page read and write
A752000
unkown
page read and write
3160000
heap
page read and write
3349000
unkown
page read and write
3221000
heap
page read and write
7FF5DF388000
unkown
page readonly
BF7E000
unkown
page read and write
7FF5DEFF0000
unkown
page readonly
7FF5DF5A8000
unkown
page readonly
30AF000
stack
page read and write
5928000
heap
page read and write
22C95400000
heap
page read and write
BF9B000
unkown
page read and write
C36F000
unkown
page read and write
2DD40B73000
direct allocation
page read and write
7FF5DF532000
unkown
page readonly
4D5D000
direct allocation
page execute and read and write
962B000
unkown
page read and write
CA7000
heap
page read and write
7FF5DF5F0000
unkown
page readonly
7FF5DF577000
unkown
page readonly
C94000
heap
page read and write
FFD4000
unkown
page read and write
3221000
heap
page read and write
C374000
unkown
page read and write
7FF5DF58A000
unkown
page readonly
3221000
heap
page read and write
345E000
heap
page read and write
52C3000
unkown
page read and write
3221000
heap
page read and write
2D30000
heap
page read and write
A74E000
unkown
page read and write
29D371A5000
heap
page read and write
7B50000
unkown
page readonly
5374000
heap
page read and write
2653FC77000
heap
page read and write
5880000
trusted library allocation
page execute and read and write
7FF5DF1CD000
unkown
page readonly
1EC01403000
direct allocation
page read and write
C013000
unkown
page read and write
30B4000
heap
page read and write
96C000
stack
page read and write
7DF4E6771000
unkown
page execute read
6120000
heap
page read and write
C94000
heap
page read and write
D8B3EFE000
stack
page read and write
3371000
unkown
page read and write
7FF5DF47E000
unkown
page readonly
C94000
heap
page read and write
7FF5DF349000
unkown
page readonly
891C000
unkown
page read and write
A0F7000
unkown
page read and write
A08A000
unkown
page read and write
2C9A000
stack
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
47F3000
unkown
page read and write
7DF4E6791000
unkown
page execute read
AEF0000
unkown
page read and write
2E94000
heap
page read and write
97F3000
unkown
page read and write
2A549569000
direct allocation
page read and write
3221000
heap
page read and write
2E30000
unkown
page read and write
2653FBE6000
heap
page read and write
C192000
unkown
page read and write
30D0000
trusted library allocation
page read and write
7FF5DF343000
unkown
page readonly
BFA7000
unkown
page read and write
96F1000
unkown
page read and write
3221000
heap
page read and write
9E9E000
stack
page read and write
30D0000
trusted library allocation
page read and write
9F2A000
unkown
page read and write
30D0000
trusted library allocation
page read and write
FE0000
unkown
page read and write
739B000
unkown
page read and write
100D4000
unkown
page read and write
A072000
unkown
page read and write
98AD000
unkown
page read and write
7FF5DF126000
unkown
page readonly
9F23000
unkown
page read and write
37BD000
direct allocation
page execute and read and write
7FF5DF2E2000
unkown
page readonly
2653FB50000
heap
page read and write
7FF5DF567000
unkown
page readonly
1EBFD4A0000
heap
page read and write
C94000
heap
page read and write
30D0000
trusted library allocation
page read and write
5110000
unkown
page write copy
3221000
heap
page read and write
2736000
heap
page read and write
FF1000
unkown
page readonly
3165000
heap
page read and write
7FF5DE539000
unkown
page readonly
E22C000
stack
page read and write
2D5E000
heap
page read and write
7DF4E6761000
unkown
page execute read
BFEF000
unkown
page read and write
680E000
stack
page read and write
6090000
trusted library allocation
page read and write
7FF5DF4FB000
unkown
page readonly
A744000
unkown
page read and write
3290000
unkown
page readonly
3331000
heap
page read and write
2DDCF1C9000
heap
page read and write
3364000
unkown
page read and write
479B000
unkown
page read and write
C94000
heap
page read and write
7FF5DEE43000
unkown
page readonly
7FF5DF1FD000
unkown
page readonly
5374000
heap
page read and write
7FF5DF091000
unkown
page readonly
A6D2000
unkown
page read and write
9C1D000
stack
page read and write
2A5D7C20000
heap
page read and write
7FF7D7A76000
unkown
page readonly
C95000
heap
page read and write
9F60000
unkown
page read and write
2DDCF236000
heap
page read and write
B09E000
stack
page read and write
C187000
unkown
page read and write
7FF5DF211000
unkown
page readonly
2DDCF286000
heap
page read and write
7FF5DE9C3000
unkown
page readonly
BF82000
unkown
page read and write
4750000
unkown
page read and write
26543804000
direct allocation
page read and write
C94000
heap
page read and write
B500000
unkown
page readonly
2D63000
heap
page read and write
6919000
heap
page read and write
7DF4E6771000
unkown
page execute read
7FF6803A6000
unkown
page readonly
2FAE000
stack
page read and write
C94000
heap
page read and write
7FF5DF2E5000
unkown
page readonly
C94000
heap
page read and write
30B4000
heap
page read and write
336F000
unkown
page read and write
86BA000
heap
page read and write
7FF5DF3F7000
unkown
page readonly
C94000
heap
page read and write
C06D000
unkown
page read and write
7FF5DF21C000
unkown
page readonly
7FF5DF5A3000
unkown
page readonly
5241000
unkown
page read and write
1EBFD51A000
heap
page read and write
10056000
unkown
page read and write
A0F7000
unkown
page read and write
58B7000
heap
page read and write
30D0000
trusted library allocation
page read and write
29D371A0000
heap
page read and write
9718000
unkown
page read and write
7FF5DF4F7000
unkown
page readonly
909F000
stack
page read and write
73B2000
unkown
page read and write
2D58000
heap
page read and write
30B4000
heap
page read and write
29D371C0000
direct allocation
page read and write
7FF5DF0A5000
unkown
page readonly
D8B3DFE000
stack
page read and write
5370000
heap
page read and write
48A0000
unkown
page read and write
7FF5DF488000
unkown
page readonly
307B000
stack
page read and write
1EBFD320000
heap
page read and write
306E000
stack
page read and write
7414000
unkown
page read and write
7FF5DF422000
unkown
page readonly
C94000
heap
page read and write
D1C000
heap
page read and write
7991000
unkown
page read and write
A769000
unkown
page read and write
3861000
direct allocation
page execute and read and write
3980000
trusted library allocation
page execute and read and write
B830000
unkown
page readonly
55DD000
heap
page read and write
7C89000
stack
page read and write
970000
unkown
page readonly
7FF5DF5A8000
unkown
page readonly
7FF5DF60D000
unkown
page readonly
3281000
stack
page read and write
7FF5DF18E000
unkown
page readonly
7FF5DF01B000
unkown
page readonly
7FF5DF3DF000
unkown
page readonly
C13C000
unkown
page read and write
2890000
unkown
page readonly
7FF5DF59E000
unkown
page readonly
C94000
heap
page read and write
1EBFD528000
heap
page read and write
AA36BFE000
stack
page read and write
9489000
stack
page read and write
A0A7000
unkown
page read and write
28D3000
heap
page read and write
C354000
unkown
page read and write
AA370FB000
stack
page read and write
7FF5DF5B0000
unkown
page readonly
7870000
unkown
page read and write
D99000
heap
page read and write
2653FC72000
heap
page read and write
987C000
unkown
page read and write
C94000
heap
page read and write
EE85000
unkown
page read and write
CB8000
heap
page read and write
10013000
unkown
page read and write
3221000
heap
page read and write
9E9E000
stack
page read and write
29D37293000
heap
page read and write
28D0000
heap
page read and write
29D3DC00000
direct allocation
page read and write
98A1000
unkown
page read and write
4710000
trusted library allocation
page read and write
77F0000
unkown
page read and write
4DBD000
direct allocation
page execute and read and write
7FF5DEFF8000
unkown
page readonly
E32D000
stack
page read and write
3221000
heap
page read and write
5707000
unclassified section
page execute and read and write
350A000
heap
page read and write
3394000
unkown
page read and write
7230000
unkown
page read and write
7FF5DF045000
unkown
page readonly
3221000
heap
page read and write
7FF5DF21B000
unkown
page readonly
C94000
heap
page read and write
83E0000
unkown
page read and write
2C5C000
stack
page read and write
C477000
unkown
page read and write
BFA5000
unkown
page read and write
30B4000
heap
page read and write
2D48000
heap
page read and write
47F1000
unkown
page read and write
7FF5DF2F3000
unkown
page readonly
2653FC74000
heap
page read and write
30D0000
trusted library allocation
page read and write
11420000
system
page execute and read and write
D1C000
heap
page read and write
3221000
heap
page read and write
BFAD000
unkown
page read and write
3394000
unkown
page read and write
A0A5000
unkown
page read and write
B010000
unkown
page read and write
4C19000
direct allocation
page execute and read and write
7FF5DF0A5000
unkown
page readonly
3221000
heap
page read and write
2DDCF1B1000
heap
page read and write
30B4000
heap
page read and write
BEF0000
heap
page read and write
C94000
heap
page read and write
C94000
heap
page read and write
B9F0000
unkown
page read and write
7FF5DF4FB000
unkown
page readonly
30B4000
heap
page read and write
4C8E000
direct allocation
page execute and read and write
7FF5DF571000
unkown
page readonly
C94000
heap
page read and write
1009B000
unkown
page read and write
973C000
unkown
page read and write
10056000
unkown
page read and write
74F1000
unkown
page read and write
874C000
stack
page read and write
2D1E000
stack
page read and write
BF7E000
unkown
page read and write
10B09000
system
page read and write
10610000
unkown
page execute and read and write
C1C4000
unkown
page read and write
9B1E000
stack
page read and write
29D37298000
heap
page read and write
1EBFD420000
heap
page read and write
76F0000
unkown
page read and write
9605000
unkown
page read and write
838B000
stack
page read and write
86B0000
heap
page read and write
99AB000
unkown
page read and write
9E0000
unkown
page readonly
7DF4E6791000
unkown
page execute read
7A40000
unkown
page readonly
987C000
unkown
page read and write
C94000
heap
page read and write
2DDCF262000
heap
page read and write
C94000
heap
page read and write
7FF7D7851000
unkown
page execute read
2D63000
heap
page read and write
3120000
heap
page read and write
7FF5DF0A2000
unkown
page readonly
385D000
direct allocation
page execute and read and write
C01A000
unkown
page read and write
C95000
heap
page read and write
4E32000
direct allocation
page execute and read and write
7FF5DF39C000
unkown
page readonly
3371000
unkown
page read and write
C94000
heap
page read and write
9F92000
unkown
page read and write
C94000
heap
page read and write
7DF4E6760000
unkown
page readonly
7909000
stack
page read and write
C94000
heap
page read and write
1EBFD51E000
heap
page read and write
EE8D000
unkown
page read and write
DE7000
system
page execute and read and write
23F0000
heap
page read and write
26544003000
direct allocation
page read and write
7FF5DEFF5000
unkown
page readonly
B81D000
stack
page read and write
3373000
unkown
page read and write
7FF5DF4A6000
unkown
page readonly
7FF5DF4EC000
unkown
page readonly
3221000
heap
page read and write
8919000
unkown
page read and write
2DDCD6A0000
heap
page read and write
1195000
heap
page read and write
2E84000
heap
page read and write
C94000
heap
page read and write
30B4000
heap
page read and write
13A0000
unkown
page readonly
7DF5E896A000
unkown
page readonly
3221000
heap
page read and write
C3F1000
unkown
page read and write
30D0000
trusted library allocation
page read and write
C94000
heap
page read and write
2870000
unkown
page read and write
980000
unkown
page readonly
7DF4E6780000
unkown
page readonly
22C95395000
heap
page read and write
AD2B000
stack
page read and write
6240000
heap
page read and write
29D3E600000
direct allocation
page read and write
7FF5DF549000
unkown
page readonly
34B0000
unkown
page readonly
A08D000
unkown
page read and write
48A0000
unkown
page read and write
7FF5DF26F000
unkown
page readonly
C24C000
unkown
page read and write
7FF5DF221000
unkown
page readonly
B6A91FB000
stack
page read and write
7FF5DF017000
unkown
page readonly
C94000
heap
page read and write
3221000
heap
page read and write
C40C000
unkown
page read and write
73B4000
unkown
page read and write
C94000
heap
page read and write
7B60000
unkown
page readonly
1EBFD578000
heap
page read and write
2D4D000
heap
page read and write
A744000
unkown
page read and write
26A0000
direct allocation
page read and write
EE96000
unkown
page read and write
7FF5DF0EE000
unkown
page readonly
8A36000
unkown
page read and write
7FF6802F4000
unkown
page readonly
73A7000
unkown
page read and write
7D90000
unkown
page read and write
3221000
heap
page read and write
7FF5DF0EE000
unkown
page readonly
7FF5DF5E9000
unkown
page readonly
7FF5DEF06000
unkown
page readonly
101B7000
system
page execute and read and write
7FF5DF2CB000
unkown
page readonly
B6A90FE000
stack
page read and write
5241000
unkown
page read and write
3221000
heap
page read and write
7FF5DF5AE000
unkown
page readonly
EE9C000
unkown
page read and write
2E94000
heap
page read and write
2653FCBB000
heap
page read and write
30D0000
trusted library allocation
page read and write
C94000
heap
page read and write
9716000
unkown
page read and write
7840000
unkown
page read and write
7FF5DF532000
unkown
page readonly
7DF5E895F000
unkown
page readonly
7FF5DF5BE000
unkown
page readonly
3221000
heap
page read and write
7FF5DF195000
unkown
page readonly
2653FC50000
heap
page read and write
C23D000
unkown
page read and write
9F51000
unkown
page read and write
2870000
unkown
page read and write
838B000
stack
page read and write
C474000
unkown
page read and write
AA36CFE000
stack
page read and write
11A0000
unkown
page readonly
88E0000
unkown
page read and write
ACAE000
stack
page read and write
3221000
heap
page read and write
9716000
unkown
page read and write
3A66000
unclassified section
page read and write
885E000
stack
page read and write
D8B43FD000
stack
page read and write
CB0000
heap
page read and write
3331000
heap
page read and write
ADC0000
unkown
page readonly
E91000
unkown
page read and write
971C000
unkown
page read and write
9F3E000
unkown
page read and write
BD7F000
stack
page read and write
C94000
heap
page read and write
874C000
stack
page read and write
3506000
heap
page read and write
2D48000
heap
page read and write
7FF5DF36A000
unkown
page readonly
7FF5DEFBD000
unkown
page readonly
5374000
heap
page read and write
54E0000
heap
page read and write
30B4000
heap
page read and write
29D3720C000
heap
page read and write
3221000
heap
page read and write
238B000
stack
page read and write
A690000
unkown
page read and write
7FF7D7851000
unkown
page execute read
3221000
heap
page read and write
22C95381000
heap
page read and write
382E000
direct allocation
page execute and read and write
C94000
heap
page read and write
A0A7000
unkown
page read and write
9FA0000
unkown
page read and write
7FF5DF08B000
unkown
page readonly
2A5D7BB5000
heap
page read and write
1EBFD562000
heap
page read and write
3221000
heap
page read and write
11264000
system
page execute and read and write
7FF5DF07D000
unkown
page readonly
970C000
unkown
page read and write
2DDCD769000
heap
page read and write
7FF5DF422000
unkown
page readonly
3210000
heap
page read and write
96ED000
unkown
page read and write
29D37285000
heap
page read and write
2653FC50000
heap
page read and write
9B99000
stack
page read and write
30B4000
heap
page read and write
30D0000
trusted library allocation
page read and write
BCFD000
stack
page read and write
3221000
heap
page read and write
B11B000
stack
page read and write
52D9000
unkown
page read and write
7FF5DF16B000
unkown
page readonly
7FF5DF4E3000
unkown
page readonly
2EB0000
unkown
page readonly
A0B1000
unkown
page read and write
7FF5DF57F000
unkown
page readonly
54DE000
heap
page read and write
7FF68039E000
unkown
page read and write
4860000
unkown
page read and write
C140000
unkown
page read and write
D06000
heap
page read and write
6090000
trusted library allocation
page read and write
C94000
heap
page read and write
3304000
unkown
page read and write
C94000
heap
page read and write
7940000
unkown
page readonly
7FF5DF207000
unkown
page readonly
273B000
heap
page read and write
1EBFD495000
heap
page read and write
C354000
unkown
page read and write
C18A000
unkown
page read and write
7FF5DF49C000
unkown
page readonly
C94000
heap
page read and write
7FF5DEE5A000
unkown
page readonly
2653FCB9000
heap
page read and write
366F000
stack
page read and write
CF0000
heap
page read and write
6090000
trusted library allocation
page read and write
7FF5DF57F000
unkown
page readonly
989F000
unkown
page read and write
C94000
heap
page read and write
7FF5DF52D000
unkown
page readonly
C94000
heap
page read and write
C36F000
unkown
page read and write
77F0000
unkown
page read and write
C003000
unkown
page read and write
9380000
unkown
page readonly
8400000
heap
page read and write
7FF5DF2DA000
unkown
page readonly
7FF680396000
unkown
page read and write
9D9F000
stack
page read and write
7FF680181000
unkown
page execute read
C187000
unkown
page read and write
49F7000
heap
page read and write
7FF5DF5F6000
unkown
page readonly
989F000
unkown
page read and write
4EFD000
direct allocation
page execute and read and write
C526000
unkown
page read and write
3221000
heap
page read and write
3590000
direct allocation
page execute and read and write
30B4000
heap
page read and write
28A0000
unkown
page readonly
7FF5DF2E5000
unkown
page readonly
7FF5DEF90000
unkown
page readonly
96ED000
unkown
page read and write
7A30000
unkown
page read and write
7FF5DF42F000
unkown
page readonly
32B1000
unkown
page read and write
98AD000
unkown
page read and write
9F63000
unkown
page read and write
4DCE000
direct allocation
page execute and read and write
5A59000
direct allocation
page execute and read and write
5374000
heap
page read and write
E80000
unkown
page read and write
2DDCF241000
heap
page read and write
C95000
heap
page read and write
1195000
heap
page read and write
30C0000
heap
page read and write
7FF5DEFF0000
unkown
page readonly
B589000
stack
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
D69000
heap
page read and write
95EE000
stack
page read and write
7FF5DF60D000
unkown
page readonly
7FF5DF4D5000
unkown
page readonly
C36F000
unkown
page read and write
29EE000
unkown
page read and write
7FF68039E000
unkown
page read and write
B60A000
stack
page read and write
30D0000
trusted library allocation
page read and write
74A9000
unkown
page read and write
3A93000
unclassified section
page execute and read and write
4770000
heap
page read and write
C149000
unkown
page read and write
30B4000
heap
page read and write
7FF5DF3E4000
unkown
page readonly
AB8D000
stack
page read and write
10731000
unkown
page execute and read and write
CB2000
heap
page read and write
3221000
heap
page read and write
3375000
unkown
page read and write
3221000
heap
page read and write
D8B3FFE000
stack
page read and write
7B4B000
stack
page read and write
3221000
heap
page read and write
99AB000
unkown
page read and write
322F000
heap
page read and write
7FF5DF4E7000
unkown
page readonly
7FF5DE9C3000
unkown
page readonly
96DF000
unkown
page read and write
7FF5DF0F1000
unkown
page readonly
CA0000
heap
page read and write
C94000
heap
page read and write
C94000
heap
page read and write
AA369FF000
stack
page read and write
FF1000
unkown
page readonly
1EBFD56A000
heap
page read and write
8590000
unkown
page readonly
2653FC5D000
heap
page read and write
D60000
heap
page read and write
29D3726F000
heap
page read and write
22C95405000
heap
page read and write
7FF5DF275000
unkown
page readonly
33DD000
heap
page read and write
3221000
heap
page read and write
C23D000
unkown
page read and write
971A000
unkown
page read and write
6121000
heap
page read and write
C94000
heap
page read and write
30B4000
heap
page read and write
10092000
unkown
page read and write
7FF5DF229000
unkown
page readonly
30B0000
heap
page read and write
2DDCF241000
heap
page read and write
4F01000
direct allocation
page execute and read and write
320B000
stack
page read and write
7FF5DF41B000
unkown
page readonly
A769000
unkown
page read and write
3221000
heap
page read and write
7FF680180000
unkown
page readonly
7FF5DF5AE000
unkown
page readonly
2E84000
heap
page read and write
29D37293000
heap
page read and write
C94000
heap
page read and write
7FF5DEFCB000
unkown
page readonly
E2AD000
stack
page read and write
7FF5DF3C2000
unkown
page readonly
7FF5DF452000
unkown
page readonly
111E0000
system
page execute and read and write
7DF4E6781000
unkown
page execute read
7FF5DF3C6000
unkown
page readonly
7FF5DF626000
unkown
page readonly
7FF5DF04D000
unkown
page readonly
9F10000
unkown
page read and write
6130000
heap
page read and write
BF82000
unkown
page read and write
3356000
unkown
page read and write
9F0000
heap
page read and write
A6EA000
unkown
page read and write
7FF5DF07D000
unkown
page readonly
7D89000
stack
page read and write
48E0000
unkown
page read and write
30D0000
trusted library allocation
page read and write
7FF5DF55A000
unkown
page readonly
29D3729D000
heap
page read and write
970000
unkown
page readonly
26B0000
direct allocation
page read and write
BF84000
unkown
page read and write
7FF5DF606000
unkown
page readonly
7FF5DF0C1000
unkown
page readonly
7FF5DF4AB000
unkown
page readonly
7FF5DF537000
unkown
page readonly
7FF7D7850000
unkown
page readonly
9D1F000
stack
page read and write
A6EE000
unkown
page read and write
2DDCF1B2000
heap
page read and write
47F1000
unkown
page read and write
7FF5DF25B000
unkown
page readonly
2D4D000
heap
page read and write
C298000
unkown
page read and write
A0B1000
unkown
page read and write
9F2A000
unkown
page read and write
7FF5DF2E2000
unkown
page readonly
C159000
unkown
page read and write
7FF5DF478000
unkown
page readonly
C52D000
unkown
page read and write
7FF5DF091000
unkown
page readonly
7FF5DEEEB000
unkown
page readonly
4788000
unkown
page read and write
B9BF000
stack
page read and write
4780000
heap
page read and write
30D0000
trusted library allocation
page read and write
8660000
unkown
page read and write
B9F0000
unkown
page read and write
7FF680181000
unkown
page execute read
B11B000
stack
page read and write
7FF5DF582000
unkown
page readonly
22C93870000
heap
page read and write
1EC01830000
direct allocation
page read and write
7FF5DF029000
unkown
page readonly
7FF5DF626000
unkown
page readonly
7FF5DEF87000
unkown
page readonly
5A5D000
direct allocation
page execute and read and write
C476000
unkown
page read and write
D28000
heap
page read and write
C39F000
unkown
page read and write
A690000
unkown
page read and write
9F3E000
unkown
page read and write
7B4B000
stack
page read and write
7FF5DEFDD000
unkown
page readonly
7FF5DF5F0000
unkown
page readonly
3221000
heap
page read and write
C3C3000
unkown
page read and write
233D66F0000
system
page execute and read and write
5381000
heap
page read and write
333B000
heap
page read and write
73AF000
unkown
page read and write
C94000
heap
page read and write
7FF5DF3FC000
unkown
page readonly
FE0000
unkown
page read and write
27F0000
unkown
page readonly
7FF5DF380000
unkown
page readonly
5374000
heap
page read and write
7930000
unkown
page readonly
BF8C000
unkown
page read and write
973C000
unkown
page read and write
7991000
unkown
page read and write
2E80000
heap
page read and write
C080000
unkown
page read and write
1005B000
unkown
page read and write
30B4000
heap
page read and write
30B4000
heap
page read and write
7FF5DF211000
unkown
page readonly
578A000
heap
page read and write
8660000
unkown
page read and write
3217000
heap
page read and write
7FF5DF582000
unkown
page readonly
C39F000
unkown
page read and write
9704000
unkown
page read and write
5700000
heap
page read and write
FF94000
unkown
page read and write
7FF5DF5B3000
unkown
page readonly
A6D2000
unkown
page read and write
3221000
heap
page read and write
7FF5DF486000
unkown
page readonly
2D53000
heap
page read and write
3221000
heap
page read and write
7FF5C0B6B000
unkown
page readonly
2EB0000
unkown
page readonly
5374000
heap
page read and write
7FF5DF12A000
unkown
page readonly
7FF5DF5FF000
unkown
page readonly
54D8000
heap
page read and write
7FF5DEF4B000
unkown
page readonly
3690000
direct allocation
page execute and read and write
22C95405000
heap
page read and write
30B4000
heap
page read and write
29D37284000
heap
page read and write
2653FCB9000
heap
page read and write
2CE0000
heap
page read and write
2D63000
heap
page read and write
3375000
unkown
page read and write
2D53000
heap
page read and write
74A9000
unkown
page read and write
C3EC000
unkown
page read and write
B120000
unkown
page readonly
7FF5DF5B5000
unkown
page readonly
C34E000
unkown
page read and write
83B0000
unkown
page readonly
48D4000
heap
page read and write
D8B42FE000
stack
page read and write
A769000
unkown
page read and write
3221000
heap
page read and write
2E94000
heap
page read and write
88DE000
stack
page read and write
7FF5DE5CC000
unkown
page readonly
98A1000
unkown
page read and write
2DDCF284000
heap
page read and write
3364000
unkown
page read and write
BFA3000
unkown
page read and write
A09A000
unkown
page read and write
92DB000
stack
page read and write
320B000
stack
page read and write
34B0000
unkown
page readonly
7FF5DF081000
unkown
page readonly
9729000
unkown
page read and write
7FF5DF5FC000
unkown
page readonly
2653FCB7000
heap
page read and write
BFAB000
unkown
page read and write
7FF5DF3D4000
unkown
page readonly
C01A000
unkown
page read and write
C94000
heap
page read and write
BD7F000
stack
page read and write
C19D000
unkown
page read and write
7FF5DF343000
unkown
page readonly
C45E000
unkown
page read and write
7FF5DF48B000
unkown
page readonly
3221000
heap
page read and write
BFA3000
unkown
page read and write
7FF5DF0D2000
unkown
page readonly
D99000
heap
page read and write
5C01000
direct allocation
page execute and read and write
83B0000
unkown
page readonly
2F10000
unkown
page read and write
7DF5E896A000
unkown
page readonly
2AEF000
stack
page read and write
7FF6802A2000
unkown
page read and write
4BAE000
heap
page read and write
3362000
unkown
page read and write
7FF5DF3BE000
unkown
page readonly
7DF4E67A1000
unkown
page execute read
7FF5DE9CB000
unkown
page readonly
47EC000
unkown
page read and write
C94000
heap
page read and write
2DDCF1B1000
heap
page read and write
CA7000
heap
page read and write
7DF4E6770000
unkown
page readonly
1EC05175000
direct allocation
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
9F23000
unkown
page read and write
3221000
heap
page read and write
7FF5DF519000
unkown
page readonly
A6F2000
unkown
page read and write
9714000
unkown
page read and write
30D0000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
1EBFD50C000
heap
page read and write
3221000
heap
page read and write
C34E000
unkown
page read and write
C94000
heap
page read and write
C95000
heap
page read and write
C94000
heap
page read and write
22C95405000
heap
page read and write
C42D000
unkown
page read and write
4788000
unkown
page read and write
ADAD000
stack
page read and write
22C95399000
heap
page read and write
39D2000
direct allocation
page execute and read and write
7FF5DF25E000
unkown
page readonly
29D37282000
heap
page read and write
3221000
heap
page read and write
5860000
trusted library allocation
page execute and read and write
C424000
unkown
page read and write
3221000
heap
page read and write
3304000
unkown
page read and write
7FF5DF52D000
unkown
page readonly
7FF5DEFF8000
unkown
page readonly
2A5D7BB9000
heap
page read and write
310E000
stack
page read and write
7FF5DF591000
unkown
page readonly
3221000
heap
page read and write
3221000
heap
page read and write
1EC01400000
direct allocation
page read and write
8910000
unkown
page read and write
28D3000
heap
page read and write
7FF5DF551000
unkown
page readonly
C94000
heap
page read and write
C95000
heap
page read and write
22C95382000
heap
page read and write
7FF5DF429000
unkown
page readonly
AA368FE000
stack
page read and write
1EBFD581000
heap
page read and write
C94000
heap
page read and write
A6F3000
unkown
page read and write
73BC000
unkown
page read and write
C94000
heap
page read and write
7FF5DF361000
unkown
page readonly
7FF5DF62C000
unkown
page readonly
9F27000
unkown
page read and write
2DDCF1B5000
heap
page read and write
BF90000
unkown
page read and write
56CF000
stack
page read and write
6090000
trusted library allocation
page read and write
7B50000
unkown
page readonly
EE82000
unkown
page read and write
7FF5DF095000
unkown
page readonly
C94000
heap
page read and write
96F5000
unkown
page read and write
2CDF000
stack
page read and write
B3DD000
stack
page read and write
240000
system
page execute and read and write
C39F000
unkown
page read and write
7ACE000
stack
page read and write
2D69000
heap
page read and write
ADAB000
stack
page read and write
C94000
heap
page read and write
A08A000
unkown
page read and write
C94000
heap
page read and write
5374000
heap
page read and write
7FF5DF3B9000
unkown
page readonly
4760000
unkown
page read and write
BFDF000
unkown
page read and write
30B4000
heap
page read and write
C40000
heap
page read and write
7FF5DF5D6000
unkown
page readonly
5830000
unclassified section
page execute and read and write
7FF5DE535000
unkown
page readonly
3221000
heap
page read and write
54DF000
heap
page read and write
3221000
heap
page read and write
7FF5DF1EE000
unkown
page readonly
AFFC000
stack
page read and write
5374000
heap
page read and write
1EC03C00000
direct allocation
page read and write
7FF5DF3BE000
unkown
page readonly
99AB000
unkown
page read and write
7FF5DF081000
unkown
page readonly
7FF5DEEEB000
unkown
page readonly
AA36AFF000
stack
page read and write
73A3000
unkown
page read and write
C94000
heap
page read and write
7FF5DF2BA000
unkown
page readonly
C14E000
unkown
page read and write
3259000
heap
page read and write
100A9000
unkown
page read and write
9F60000
unkown
page read and write
739B000
unkown
page read and write
7FF5DF398000
unkown
page readonly
A02D000
unkown
page read and write
27D0000
unkown
page read and write
7FF5DF45C000
unkown
page readonly
3221000
heap
page read and write
7FF5DF584000
unkown
page readonly
BF84000
unkown
page read and write
C430000
unkown
page read and write
7FF5DEFAC000
unkown
page readonly
3B30000
trusted library allocation
page execute and read and write
52D9000
unkown
page read and write
1EBFF000000
direct allocation
page read and write
2E1F000
unkown
page read and write
BFAF000
unkown
page read and write
2D4D000
heap
page read and write
1EC04775000
direct allocation
page read and write
11279000
system
page execute and read and write
2DDCF23F000
heap
page read and write
7FF5DF3B5000
unkown
page readonly
ADC0000
unkown
page readonly
7FF5DF3A1000
unkown
page readonly
3B70000
heap
page read and write
2653FC6C000
heap
page read and write
335B000
unkown
page read and write
7FF5DF229000
unkown
page readonly
13A0000
unkown
page readonly
336C000
unkown
page read and write
5381000
heap
page read and write
C94000
heap
page read and write
A0FC000
unkown
page read and write
9564000
unkown
page read and write
1EBFD57D000
heap
page read and write
3221000
heap
page read and write
D8B3CFE000
stack
page read and write
AA36EFD000
stack
page read and write
962B000
unkown
page read and write
98A7000
unkown
page read and write
3362000
unkown
page read and write
7FF5DEE43000
unkown
page readonly
7860000
unkown
page read and write
7FF5DEE56000
unkown
page readonly
7FF5DF0F6000
unkown
page readonly
7FF5DEE52000
unkown
page readonly
29D3B403000
direct allocation
page read and write
73B6000
unkown
page read and write
EE98000
unkown
page read and write
2653FC55000
heap
page read and write
7FF5DF18E000
unkown
page readonly
7FF5DF53F000
unkown
page readonly
C94000
heap
page read and write
C34E000
unkown
page read and write
B9BF000
stack
page read and write
7FF5DF478000
unkown
page readonly
360C000
heap
page read and write
7FF5DF551000
unkown
page readonly
9F27000
unkown
page read and write
B6A8AFE000
stack
page read and write
2DDCF1C5000
heap
page read and write
32B1000
unkown
page read and write
7FF5DF2FE000
unkown
page readonly
4824000
unkown
page read and write
3D59000
unclassified section
page read and write
303C000
stack
page read and write
30B4000
heap
page read and write
7FF5DF398000
unkown
page readonly
C94000
heap
page read and write
7FF5DEF90000
unkown
page readonly
9C9C000
stack
page read and write
2DDCF262000
heap
page read and write
7FF5DF0C9000
unkown
page readonly
978C000
unkown
page read and write
2653FC66000
heap
page read and write
11254000
system
page execute and read and write
5DA1000
unclassified section
page execute and read and write
7FF5DF591000
unkown
page readonly
7FF5DF01B000
unkown
page readonly
AA366F7000
stack
page read and write
2653FCBB000
heap
page read and write
7FF5DF20A000
unkown
page readonly
7FF5DF5FF000
unkown
page readonly
73E5000
unkown
page read and write
29D37270000
heap
page read and write
7FF5DF382000
unkown
page readonly
7FF5DF45A000
unkown
page readonly
96DF000
unkown
page read and write
30B4000
heap
page read and write
D8B40FF000
stack
page read and write
7FF5DE531000
unkown
page readonly
3221000
heap
page read and write
9F0000
heap
page read and write
7FF5DE531000
unkown
page readonly
30D0000
trusted library allocation
page read and write
7380000
unkown
page read and write
D09000
heap
page read and write
C94000
heap
page read and write
8390000
unkown
page read and write
C95000
heap
page read and write
D8B45FB000
stack
page read and write
C99000
system
page execute and read and write
7FF5DF08B000
unkown
page readonly
3362000
unkown
page read and write
7FF680396000
unkown
page write copy
7FF5DF567000
unkown
page readonly
987C000
unkown
page read and write
2D4D000
heap
page read and write
7FF5DF584000
unkown
page readonly
7FF5DF207000
unkown
page readonly
314F000
stack
page read and write
C2E4000
unkown
page read and write
9380000
unkown
page readonly
10110000
system
page execute and read and write
29D372AF000
heap
page read and write
98AD000
unkown
page read and write
2653FC77000
heap
page read and write
7FF5DEFFC000
unkown
page readonly
D06000
heap
page read and write
AE6F000
stack
page read and write
3221000
heap
page read and write
A744000
unkown
page read and write
7FF5DF2CB000
unkown
page readonly
BF9B000
unkown
page read and write
47B6000
unkown
page read and write
28D0000
heap
page read and write
302E000
stack
page read and write
C94000
heap
page read and write
54E0000
heap
page read and write
7FF5DF3F1000
unkown
page readonly
C94000
heap
page read and write
7FF680181000
unkown
page execute read
486E000
stack
page read and write
3221000
heap
page read and write
1EBFD4A8000
heap
page read and write
5660000
unclassified section
page execute and read and write
7FF5DF382000
unkown
page readonly
BA76000
stack
page read and write
10110000
unkown
page read and write
5374000
heap
page read and write
30B4000
heap
page read and write
2DDCF230000
heap
page read and write
7FF5DF5B3000
unkown
page readonly
2FEE000
stack
page read and write
3221000
heap
page read and write
C94000
heap
page read and write
4481FFD000
stack
page read and write
B45A000
stack
page read and write
22C06D49000
direct allocation
page read and write
1EC01800000
direct allocation
page read and write
C94000
heap
page read and write
73AF000
unkown
page read and write
30B4000
heap
page read and write
3221000
heap
page read and write
29D37150000
heap
page read and write
7B60000
unkown
page readonly
D50000
unkown
page read and write
2653FC72000
heap
page read and write
5380000
heap
page read and write
7FF5DF5B5000
unkown
page readonly
3364000
unkown
page read and write
3221000
heap
page read and write
3373000
unkown
page read and write
7FF5DF341000
unkown
page readonly
22C95380000
heap
page read and write
BA76000
stack
page read and write
3221000
heap
page read and write
7FF5DF20A000
unkown
page readonly
7FF5DF43C000
unkown
page readonly
914B000
stack
page read and write
B81E000
stack
page read and write
30B4000
heap
page read and write
47EC000
unkown
page read and write
ACAE000
stack
page read and write
C149000
unkown
page read and write
7FF5DE535000
unkown
page readonly
C94000
heap
page read and write
30D0000
trusted library allocation
page read and write
228D000
stack
page read and write
30D0000
trusted library allocation
page read and write
7FF5DEFDD000
unkown
page readonly
A106000
unkown
page read and write
8390000
unkown
page read and write
C94000
heap
page read and write
9C1D000
stack
page read and write
3B50000
trusted library allocation
page execute and read and write
C23D000
unkown
page read and write
95F0000
unkown
page read and write
C94000
heap
page read and write
7FF5DF429000
unkown
page readonly
BFC3000
unkown
page read and write
7FF5DF3E4000
unkown
page readonly
6867000
heap
page read and write
2720000
heap
page read and write
C319000
unkown
page read and write
7FF5DEFA6000
unkown
page readonly
3221000
heap
page read and write
3221000
heap
page read and write
C94000
heap
page read and write
7FF5DF3C6000
unkown
page readonly
7FF5DF038000
unkown
page readonly
7FF5DF539000
unkown
page readonly
7FF5DF195000
unkown
page readonly
C2E4000
unkown
page read and write
7FF5DF3EA000
unkown
page readonly
26A5000
direct allocation
page read and write
C94000
heap
page read and write
34C0000
unkown
page read and write
C18A000
unkown
page read and write
9F74000
unkown
page read and write
830F000
stack
page read and write
9D1F000
stack
page read and write
C048000
unkown
page read and write
7FF7D7A66000
unkown
page write copy
E12B000
stack
page read and write
7FF6802A2000
unkown
page read and write
33C0000
unkown
page readonly
C1CC000
unkown
page read and write
7FF5DF4BD000
unkown
page readonly
3382000
unkown
page read and write
3221000
heap
page read and write
C94000
heap
page read and write
7FF5DEF84000
unkown
page readonly
C39F000
unkown
page read and write
EE81000
unkown
page read and write
29D37293000
heap
page read and write
2E30000
unkown
page read and write
C94000
heap
page read and write
7FF5DF0C3000
unkown
page readonly
2EC0000
unkown
page readonly
1EBFD51E000
heap
page read and write
A106000
unkown
page read and write
2D42000
heap
page read and write
62B0000
heap
page read and write
10E7F000
system
page read and write
848E000
stack
page read and write
8917000
unkown
page read and write
C94000
heap
page read and write
5374000
heap
page read and write
A75B000
unkown
page read and write
C95000
heap
page read and write
C94000
heap
page read and write
83E0000
unkown
page read and write
6244000
heap
page read and write
7FF5DF39C000
unkown
page readonly
D21000
heap
page read and write
3221000
heap
page read and write
3382000
unkown
page read and write
AF7E000
stack
page read and write
9605000
unkown
page read and write
A6F1000
unkown
page read and write
C18A000
unkown
page read and write
3220000
heap
page read and write
7FF5DEFE2000
unkown
page readonly
2DD40B79000
direct allocation
page read and write
AE6F000
stack
page read and write
73E5000
unkown
page read and write
3375000
unkown
page read and write
9700000
unkown
page read and write
7FF680396000
unkown
page write copy
2D42000
heap
page read and write
2E84000
heap
page read and write
D8B39E7000
stack
page read and write
2A5D7BA1000
heap
page read and write
2653FF45000
heap
page read and write
7FF5DF038000
unkown
page readonly
3221000
heap
page read and write
27F0000
unkown
page readonly
30B4000
heap
page read and write
30B4000
heap
page read and write
98C4000
unkown
page read and write
29D37293000
heap
page read and write
B6A8FFD000
stack
page read and write
3221000
heap
page read and write
73BC000
unkown
page read and write
B6A88FF000
stack
page read and write
73A7000
unkown
page read and write
A762000
unkown
page read and write
3304000
unkown
page read and write
B6A8EFE000
stack
page read and write
7D90000
unkown
page read and write
CB2000
heap
page read and write
4DC1000
direct allocation
page execute and read and write
C547000
unkown
page read and write
7FF5DF36A000
unkown
page readonly
9A6C000
stack
page read and write
1009B000
unkown
page read and write
7FF5DF4F3000
unkown
page readonly
C159000
unkown
page read and write
EE8E000
unkown
page read and write
3364000
unkown
page read and write
A759000
unkown
page read and write
9AD000
stack
page read and write
C003000
unkown
page read and write
7FF5DF3F1000
unkown
page readonly
3221000
heap
page read and write
A08D000
unkown
page read and write
29D37140000
heap
page read and write
7FF5DF095000
unkown
page readonly
7FF5DF366000
unkown
page readonly
3221000
heap
page read and write
3221000
heap
page read and write
E80000
unkown
page read and write
BF98000
unkown
page read and write
A744000
unkown
page read and write
A0A5000
unkown
page read and write
BF6D000
unkown
page read and write
2E94000
heap
page read and write
29D37206000
heap
page read and write
29D37285000
heap
page read and write
A104000
unkown
page read and write
83D0000
unkown
page read and write
5374000
heap
page read and write
352F000
stack
page read and write
EE9C000
unkown
page read and write
3221000
heap
page read and write
C53D000
unkown
page read and write
CB2000
heap
page read and write
C75000
stack
page read and write
BF90000
unkown
page read and write
7FF5DF5CC000
unkown
page readonly
7FF5DF425000
unkown
page readonly
C438000
unkown
page read and write
C183000
unkown
page read and write
7FF5DF1D1000
unkown
page readonly
8C28000
stack
page read and write
26D0000
heap
page read and write
30B4000
heap
page read and write
A0FC000
unkown
page read and write
7FF7D7A76000
unkown
page readonly
30D0000
trusted library allocation
page read and write
7FF7D79C4000
unkown
page readonly
CB7000
heap
page read and write
C23D000
unkown
page read and write
1EBFD56F000
heap
page read and write
88E0000
unkown
page read and write
3373000
unkown
page read and write
7FF5DEE4E000
unkown
page readonly
A104000
unkown
page read and write
7FF5DF3FC000
unkown
page readonly
C94000
heap
page read and write
395D000
direct allocation
page execute and read and write
7FF5DF48B000
unkown
page readonly
7FF5DF156000
unkown
page readonly
914B000
stack
page read and write
7FF5DF5CC000
unkown
page readonly
336C000
unkown
page read and write
2DDCF230000
heap
page read and write
3221000
heap
page read and write
6860000
heap
page read and write
C536000
unkown
page read and write
29D3728A000
heap
page read and write
C087000
unkown
page read and write
2653FBFA000
heap
page read and write
57CF000
stack
page read and write
AB0D000
stack
page read and write
FF94000
unkown
page read and write
99AB000
unkown
page read and write
3221000
heap
page read and write
3221000
heap
page read and write
74D6000
unkown
page read and write
3221000
heap
page read and write
7FF5DF606000
unkown
page readonly
B4DB000
stack
page read and write
C8E000
stack
page read and write
29D37200000
heap
page read and write
3221000
heap
page read and write
2653FB90000
direct allocation
page read and write
C94000
heap
page read and write
9714000
unkown
page read and write
32B0000
unkown
page read and write
E0AB000
stack
page read and write
7FF5DEFC2000
unkown
page readonly
73A3000
unkown
page read and write
7FF5DF577000
unkown
page readonly
3B00000
trusted library allocation
page execute and read and write
7FF5DF425000
unkown
page readonly
2DDCF230000
heap
page read and write
316F000
heap
page read and write
C94000
heap
page read and write
4C1D000
direct allocation
page execute and read and write
5374000
heap
page read and write
C34E000
unkown
page read and write
C94000
heap
page read and write
7FF6803A6000
unkown
page readonly
7FF5DF310000
unkown
page readonly
7FF5DEF87000
unkown
page readonly
2653FC6C000
heap
page read and write
1EBFD50B000
heap
page read and write
3A20000
trusted library allocation
page read and write
7FF5DF2ED000
unkown
page readonly
C192000
unkown
page read and write
7FF5DF4F7000
unkown
page readonly
3681000
heap
page read and write
7FF5DF0CC000
unkown
page readonly
3221000
heap
page read and write
7FF5DF53F000
unkown
page readonly
B010000
unkown
page read and write
4766000
unkown
page read and write
26543800000
direct allocation
page read and write
7FF5DF284000
unkown
page readonly
51FB000
stack
page read and write
BFAD000
unkown
page read and write
2E94000
heap
page read and write
47A2000
unkown
page read and write
7FF680180000
unkown
page readonly
73B4000
unkown
page read and write
7FF5DEFAC000
unkown
page readonly
EE84000
unkown
page read and write
DB0000
heap
page read and write
2F31000
unkown
page read and write
3DD9000
unclassified section
page read and write
9E0000
unkown
page readonly
9F51000
unkown
page read and write
30B4000
heap
page read and write
8750000
unkown
page read and write
3221000
heap
page read and write
7FF5DF156000
unkown
page readonly
2A55558F000
direct allocation
page read and write
22C9395D000
heap
page read and write
7FF5DF2FE000
unkown
page readonly
848E000
stack
page read and write
7FF6802F4000
unkown
page readonly
3221000
heap
page read and write
7FF5DF122000
unkown
page readonly
7FF5DEF4B000
unkown
page readonly
5240000
heap
page read and write
48B0000
unkown
page read and write
BEF0000
heap
page read and write
8DAD000
stack
page read and write
C94000
heap
page read and write
3120000
heap
page read and write
7FF5DF122000
unkown
page readonly
2E84000
heap
page read and write
3221000
heap
page read and write
971C000
unkown
page read and write
C3F1000
unkown
page read and write
2653FC6C000
heap
page read and write
C381000
unkown
page read and write
AFFA000
stack
page read and write
2DDCF284000
heap
page read and write
2E84000
heap
page read and write
29D3725E000
heap
page read and write
C1CC000
unkown
page read and write
C18A000
unkown
page read and write
C94000
heap
page read and write
3221000
heap
page read and write
7FF5DF284000
unkown
page readonly
3356000
unkown
page read and write
29D372AB000
heap
page read and write
AC0D000
stack
page read and write
7FF5DF2ED000
unkown
page readonly
5850000
heap
page read and write
A74E000
unkown
page read and write
E00000
heap
page read and write
7FF5DF3A1000
unkown
page readonly
E0F000
heap
page read and write
D8B46FF000
stack
page read and write
BFEF000
unkown
page read and write
3371000
unkown
page read and write
BFA5000
unkown
page read and write
263E000
unkown
page read and write
74F1000
unkown
page read and write
C35C000
unkown
page read and write
48D1000
heap
page read and write
4824000
unkown
page read and write
335B000
unkown
page read and write
C94000
heap
page read and write
32B0000
unkown
page read and write
C94000
heap
page read and write
9E1E000
stack
page read and write
39E0000
trusted library allocation
page read and write
1EBFD56A000
heap
page read and write
30B4000
heap
page read and write
7395000
unkown
page read and write
C94000
heap
page read and write
2653FC77000
heap
page read and write
1EBFD450000
direct allocation
page read and write
D8B41FE000
stack
page read and write
7FF5DF50F000
unkown
page readonly
7DF4E6781000
unkown
page execute read
2890000
unkown
page readonly
DC0000
heap
page read and write
9F74000
unkown
page read and write
C08000
stack
page read and write
414F000
unclassified section
page read and write
A6EA000
unkown
page read and write
22C95385000
heap
page read and write
10796000
system
page read and write
C1A9000
unkown
page read and write
2D63000
heap
page read and write
7FF5DF392000
unkown
page readonly
C383000
unkown
page read and write
29D371B0000
direct allocation
page read and write
1EBFD528000
heap
page read and write
86BA000
heap
page read and write
98A1000
unkown
page read and write
4AF0000
direct allocation
page execute and read and write
7FF5DF443000
unkown
page readonly
2653FB20000
heap
page read and write
901B000
stack
page read and write
B45A000
stack
page read and write
3221000
heap
page read and write
336C000
unkown
page read and write
C94000
heap
page read and write
C94000
heap
page read and write
B60A000
stack
page read and write
B1C0000
unkown
page readonly
30B4000
heap
page read and write
335B000
unkown
page read and write
29D372D8000
heap
page read and write
C94000
heap
page read and write
7DF4E67A1000
unkown
page execute read
96F1000
unkown
page read and write
58B3000
heap
page read and write
C94000
heap
page read and write
2E6F000
stack
page read and write
48E0000
unkown
page read and write
30B4000
heap
page read and write
C2E4000
unkown
page read and write
2A5D7BF2000
heap
page read and write
7FF5DF3B9000
unkown
page readonly
30D0000
trusted library allocation
page read and write
7FF5DF089000
unkown
page readonly
C41D000
unkown
page read and write
5789000
unclassified section
page execute and read and write
C94000
heap
page read and write
22C93962000
heap
page read and write
3221000
heap
page read and write
30B4000
heap
page read and write
7FF5DF045000
unkown
page readonly
47A2000
unkown
page read and write
3221000
heap
page read and write
2A5D6180000
heap
page read and write
30B4000
heap
page read and write
C19D000
unkown
page read and write
3221000
heap
page read and write
5C80000
unclassified section
page execute and read and write
48D0000
heap
page read and write
C94000
heap
page read and write
7FF5DF08F000
unkown
page readonly
5330000
trusted library allocation
page read and write
2653FB80000
direct allocation
page read and write
7DF4E6770000
unkown
page readonly
E70000
unkown
page readonly
C94000
heap
page read and write
1EBFD572000
heap
page read and write
C94000
heap
page read and write
E12D000
stack
page read and write
73BA000
unkown
page read and write
C94000
heap
page read and write
901B000
stack
page read and write
2653FCB7000
heap
page read and write
30D0000
trusted library allocation
page read and write
316F000
heap
page read and write
7830000
unkown
page read and write
30B4000
heap
page read and write
6600000
heap
page read and write
34C0000
unkown
page read and write
C187000
unkown
page read and write
335B000
unkown
page read and write
2D30000
heap
page read and write
36B9000
direct allocation
page execute and read and write
39E0000
trusted library allocation
page read and write
2C9C000
stack
page read and write
C298000
unkown
page read and write
A6F3000
unkown
page read and write
2F10000
unkown
page read and write
30D0000
trusted library allocation
page read and write
7940000
unkown
page readonly
AB0D000
stack
page read and write
9F78000
unkown
page read and write
7FF5DF54D000
unkown
page readonly
7800000
unkown
page read and write
536E000
stack
page read and write
7FF5DF43C000
unkown
page readonly
3221000
heap
page read and write
3221000
heap
page read and write
9704000
unkown
page read and write
1EBFD51A000
heap
page read and write
22C95400000
heap
page read and write
7FF5DE9CB000
unkown
page readonly
C94000
heap
page read and write
7930000
unkown
page readonly
C159000
unkown
page read and write
7830000
unkown
page read and write
7FF5DEE34000
unkown
page readonly
30B4000
heap
page read and write
7FF5DF0C1000
unkown
page readonly
2DDCF230000
heap
page read and write
1EBFD568000
heap
page read and write
C183000
unkown
page read and write
97F3000
unkown
page read and write
3394000
unkown
page read and write
BCB000
stack
page read and write
1EBFD563000
heap
page read and write
3221000
heap
page read and write
E5B000
heap
page read and write
C183000
unkown
page read and write
7D89000
stack
page read and write
7FF5DF25E000
unkown
page readonly
3167000
heap
page read and write
7810000
unkown
page read and write
7FF5DEFB7000
unkown
page readonly
4781000
heap
page read and write
7FF5DEE56000
unkown
page readonly
C90000
heap
page read and write
47D9000
unkown
page read and write
4828000
unkown
page read and write
336F000
unkown
page read and write
7FF5DE539000
unkown
page readonly
100A9000
unkown
page read and write
EE8D000
unkown
page read and write
98AD000
unkown
page read and write
EE50000
unkown
page read and write
1EC04600000
direct allocation
page read and write
1EBFD578000
heap
page read and write
AC0D000
stack
page read and write
7FF5DEF94000
unkown
page readonly
6090000
trusted library allocation
page read and write
29D3727E000
heap
page read and write
2653FC63000
heap
page read and write
7910000
unkown
page readonly
3373000
unkown
page read and write
9700000
unkown
page read and write
C94000
heap
page read and write
BF9F000
unkown
page read and write
7FF5DF4D5000
unkown
page readonly
C94000
heap
page read and write
971A000
unkown
page read and write
48B0000
heap
page read and write
A704000
unkown
page read and write
4766000
unkown
page read and write
47B6000
unkown
page read and write
7FF5DF09B000
unkown
page readonly
1EBFD56B000
heap
page read and write
6088000
heap
page read and write
48AE000
stack
page read and write
C94000
heap
page read and write
1EBFD511000
heap
page read and write
BF10000
unkown
page readonly
37B9000
direct allocation
page execute and read and write
7FF5DF029000
unkown
page readonly
7FF5DF486000
unkown
page readonly
73C3000
unkown
page read and write
2653FC7C000
heap
page read and write
C475000
unkown
page read and write
A098000
unkown
page read and write
10092000
unkown
page read and write
97F3000
unkown
page read and write
7FF5DF507000
unkown
page readonly
73C3000
unkown
page read and write
2D63000
heap
page read and write
7FF6802F4000
unkown
page readonly
22C12D6F000
direct allocation
page read and write
7FF680181000
unkown
page execute read
2DDCF286000
heap
page read and write
7FF5DEF57000
unkown
page readonly
7FF5DEF62000
unkown
page readonly
233D69F0000
heap
page read and write
8750000
unkown
page read and write
CB1000
heap
page read and write
EE98000
unkown
page read and write
7FF5C0B65000
unkown
page readonly
5374000
heap
page read and write
4F72000
direct allocation
page execute and read and write
10A89000
system
page read and write
30B4000
heap
page read and write
C354000
unkown
page read and write
3221000
heap
page read and write
C354000
unkown
page read and write
2E7E000
stack
page read and write
E5A000
heap
page read and write
7542000
unkown
page read and write
CB8000
heap
page read and write
1005B000
unkown
page read and write
74D6000
unkown
page read and write
1EBFD4FD000
heap
page read and write
7FF5DF392000
unkown
page readonly
C159000
unkown
page read and write
7FF5DF396000
unkown
page readonly
5374000
heap
page read and write
7FF5DF4A6000
unkown
page readonly
6220000
heap
page read and write
7499000
unkown
page read and write
3221000
heap
page read and write
3375000
unkown
page read and write
3281000
stack
page read and write
7FF5DF364000
unkown
page readonly
372E000
direct allocation
page execute and read and write
7FF5DF23A000
unkown
page readonly
C95000
heap
page read and write
5800000
trusted library allocation
page read and write
9729000
unkown
page read and write
7FF5DF62C000
unkown
page readonly
7FF5DF26F000
unkown
page readonly
1EBFD400000
heap
page read and write
7FF5DF539000
unkown
page readonly
48D1000
heap
page read and write
7FF5DF388000
unkown
page readonly
30B4000
heap
page read and write
C94000
heap
page read and write
EEB3000
unkown
page read and write
2DDCF236000
heap
page read and write
C149000
unkown
page read and write
22C95401000
heap
page read and write
A072000
unkown
page read and write
7399000
unkown
page read and write
5837000
unclassified section
page execute and read and write
54D0000
heap
page read and write
7FF5DEF06000
unkown
page readonly
7FF5DF1EC000
unkown
page readonly
3221000
heap
page read and write
7FF5DF0C3000
unkown
page readonly
9F7C000
unkown
page read and write
52C3000
unkown
page read and write
6869000
heap
page read and write
7FF5DF4C6000
unkown
page readonly
EE81000
unkown
page read and write
2653FC7C000
heap
page read and write
AD2B000
stack
page read and write
C453000
unkown
page read and write
7FF680180000
unkown
page readonly
2D40000
heap
page read and write
7FF5DF47E000
unkown
page readonly
EEB3000
unkown
page read and write
C94000
heap
page read and write
BFA1000
unkown
page read and write
C36E000
unkown
page read and write
3221000
heap
page read and write
2653FBEC000
heap
page read and write
C319000
unkown
page read and write
29D3727E000
heap
page read and write
A769000
unkown
page read and write
5374000
heap
page read and write
2DDCD78F000
heap
page read and write
2D4D000
heap
page read and write
2D37000
heap
page read and write
7FF5DF4BD000
unkown
page readonly
2653FCB7000
heap
page read and write
5374000
heap
page read and write
3ED3000
unclassified section
page read and write
AEEE000
stack
page read and write
5930000
direct allocation
page execute and read and write
7FF5DF067000
unkown
page readonly
7FF5DEE4E000
unkown
page readonly
7FF5DEFE8000
unkown
page readonly
989F000
unkown
page read and write
76F0000
unkown
page read and write
2653FC65000
heap
page read and write
7FF5DF5B0000
unkown
page readonly
7FF5DF222000
unkown
page readonly
2E84000
heap
page read and write
47D9000
unkown
page read and write
7FF5DF12A000
unkown
page readonly
1EBFD56E000
heap
page read and write
3221000
heap
page read and write
7FF5DF1CD000
unkown
page readonly
30B4000
heap
page read and write
7FF5DF361000
unkown
page readonly
357B000
heap
page read and write
7FF5DEE52000
unkown
page readonly
D0F000
heap
page read and write
EE9C000
unkown
page read and write
316A000
heap
page read and write
C94000
heap
page read and write
C94000
heap
page read and write
7FF5DF09F000
unkown
page readonly
9F7C000
unkown
page read and write
1EBFD460000
direct allocation
page read and write
7FF6802F4000
unkown
page readonly
2E90000
heap
page read and write
30B4000
heap
page read and write
7FF5DF3F7000
unkown
page readonly
7FF5DF4C6000
unkown
page readonly
30B4000
heap
page read and write
2E94000
heap
page read and write
3394000
unkown
page read and write
C94000
heap
page read and write
336F000
unkown
page read and write
11493000
system
page execute and read and write
7FF5DEF5F000
unkown
page readonly
7FF5DF3AA000
unkown
page readonly
73B2000
unkown
page read and write
7810000
unkown
page read and write
3221000
heap
page read and write
989F000
unkown
page read and write
B120000
unkown
page readonly
2E94000
heap
page read and write
891C000
unkown
page read and write
4BB2000
heap
page read and write
7FF5DEF57000
unkown
page readonly
BF9F000
unkown
page read and write
2E94000
heap
page read and write
7FF5DF191000
unkown
page readonly
79E0000
unkown
page readonly
98A7000
unkown
page read and write
C94000
heap
page read and write
1EBFD51F000
heap
page read and write
3356000
unkown
page read and write
36BD000
direct allocation
page execute and read and write
7FF5DF1D1000
unkown
page readonly
C1CC000
unkown
page read and write
34E3000
heap
page read and write
95F0000
unkown
page read and write
3221000
heap
page read and write
C3BB000
unkown
page read and write
C476000
unkown
page read and write
7FF7D7972000
unkown
page read and write
98A7000
unkown
page read and write
3221000
heap
page read and write
C94000
heap
page read and write
2A5D7C20000
heap
page read and write
A762000
unkown
page read and write
7FF5DF089000
unkown
page readonly
C2E4000
unkown
page read and write
C94000
heap
page read and write
7FF5DF16B000
unkown
page readonly
5C72000
direct allocation
page execute and read and write
D8B44FE000
stack
page read and write
B259000
stack
page read and write
5320000
heap
page readonly
7FF5DF3D4000
unkown
page readonly
73B6000
unkown
page read and write
A098000
unkown
page read and write
C94000
heap
page read and write
3221000
heap
page read and write
7FF5DF2BA000
unkown
page readonly
3170000
heap
page read and write
86B0000
heap
page read and write
7FF5DEF84000
unkown
page readonly
7FF5DF248000
unkown
page readonly
3221000
heap
page read and write
C435000
unkown
page read and write
2D2E000
stack
page read and write
C94000
heap
page read and write
830F000
stack
page read and write
BF9D000
unkown
page read and write
7FF5DF3DF000
unkown
page readonly
C477000
unkown
page read and write
4860000
unkown
page read and write
7FF5DF50F000
unkown
page readonly
3221000
heap
page read and write
7FF5DF452000
unkown
page readonly
6110000
heap
page read and write
7FF5DEFA6000
unkown
page readonly
100D4000
unkown
page read and write
A6CF000
unkown
page read and write
9409000
stack
page read and write
C319000
unkown
page read and write
29D3AC00000
direct allocation
page read and write
C3C6000
unkown
page read and write
30B4000
heap
page read and write
74F1000
unkown
page read and write
4D59000
direct allocation
page execute and read and write
4A85000
heap
page read and write
C19D000
unkown
page read and write
EE96000
unkown
page read and write
7FF5DF54D000
unkown
page readonly
7FF5DF06F000
unkown
page readonly
7FF5DF458000
unkown
page readonly
C19D000
unkown
page read and write
C94000
heap
page read and write
C13A000
unkown
page read and write
2E50000
unkown
page readonly
7FF5DF0CC000
unkown
page readonly
30B4000
heap
page read and write
2DDCF1B0000
heap
page read and write
BF8C000
unkown
page read and write
7870000
unkown
page read and write
7FF5DF45A000
unkown
page readonly
98E3000
unkown
page read and write
54BE000
stack
page read and write
7FF5DF3F5000
unkown
page readonly
B6A8CFF000
stack
page read and write
C94000
heap
page read and write
3221000
heap
page read and write
4A66000
heap
page read and write
2653FC5D000
heap
page read and write
5110000
unkown
page write copy
BF9D000
unkown
page read and write
38E0000
trusted library allocation
page execute and read and write
30B4000
heap
page read and write
7FF5DF41B000
unkown
page readonly
C94000
heap
page read and write
30B4000
heap
page read and write
3221000
heap
page read and write
2DDCF236000
heap
page read and write
C94000
heap
page read and write
C298000
unkown
page read and write
7840000
unkown
page read and write
7FF5DF488000
unkown
page readonly
2A5D6159000
heap
page read and write
1EBFD581000
heap
page read and write
AA36FFF000
stack
page read and write
9B1D000
stack
page read and write
3221000
heap
page read and write
7399000
unkown
page read and write
A6EE000
unkown
page read and write
7FF5DF04D000
unkown
page readonly
C94000
heap
page read and write
C319000
unkown
page read and write
99AB000
unkown
page read and write
2653FC72000
heap
page read and write
8400000
heap
page read and write
7FF5DF623000
unkown
page readonly
54C0000
heap
page read and write
7FF5DF4E7000
unkown
page readonly
7FF5DF341000
unkown
page readonly
7FF7D79C4000
unkown
page readonly
C474000
unkown
page read and write
29D37295000
heap
page read and write
7FF5DF24E000
unkown
page readonly
83D0000
unkown
page read and write
C298000
unkown
page read and write
C149000
unkown
page read and write
C90000
system
page execute and read and write
C1A9000
unkown
page read and write
7230000
unkown
page read and write
30D0000
trusted library allocation
page read and write
7FF5DEFFC000
unkown
page readonly
D09000
heap
page read and write
C423000
unkown
page read and write
AA367FE000
stack
page read and write
3221000
heap
page read and write
99AB000
unkown
page read and write
3221000
heap
page read and write
30B4000
heap
page read and write
2653FC63000
heap
page read and write
7FF5DF4E3000
unkown
page readonly
C94000
heap
page read and write
30D0000
trusted library allocation
page read and write
B6A8BFE000
stack
page read and write
CA9000
heap
page read and write
1EBFD563000
heap
page read and write
2DDCF262000
heap
page read and write
5381000
heap
page read and write
7FF5DF203000
unkown
page readonly
2653FC72000
heap
page read and write
9489000
stack
page read and write
478D000
heap
page read and write
29D3AC08000
direct allocation
page read and write
3382000
unkown
page read and write
3221000
heap
page read and write
2653FF40000
heap
page read and write
26B5000
direct allocation
page read and write
B500000
unkown
page readonly
2653FC7C000
heap
page read and write
30E0000
trusted library allocation
page read and write
3325000
heap
page read and write
3185000
stack
page read and write
29D3F000000
direct allocation
page read and write
E2AD000
stack
page read and write
C94000
heap
page read and write
22C95400000
heap
page read and write
C39F000
unkown
page read and write
3221000
heap
page read and write
7FF5DF067000
unkown
page readonly
B358000
stack
page read and write
E70000
unkown
page readonly
8A36000
unkown
page read and write
C94000
heap
page read and write
5ACE000
direct allocation
page execute and read and write
970C000
unkown
page read and write
54D5000
heap
page read and write
3221000
heap
page read and write
E0F000
heap
page read and write
7FF5DF366000
unkown
page readonly
2A5D7BA0000
heap
page read and write
7A40000
unkown
page readonly
7FF5DF0C9000
unkown
page readonly
935B000
stack
page read and write
7FF7D7A66000
unkown
page read and write
C94000
heap
page read and write
753F000
unkown
page read and write
AA36DFF000
stack
page read and write
26546800000
direct allocation
page read and write
BFAB000
unkown
page read and write
There are 2233 hidden memdumps, click here to show them.