IOC Report
3312.PDF.scr

loading gif

Files

File Path
Type
Category
Malicious
3312.PDF.scr
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\djjergw
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\djjergw:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_fe8167436d6db6c6d2c4bed5d6f2d2c06e142845_f78a65ed_2a3bef5b-cedb-4c43-8137-0eaf458f5331\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAE2.tmp.dmp
Mini DuMP crash report, 17 streams, CheckSum 0x00000004, Tue Oct 1 07:36:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF96.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFC6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002d.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002e.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\Windows[4].json
JSON data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\3312.PDF.scr
"C:\Users\user\Desktop\3312.PDF.scr" /S
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\djjergw
C:\Users\user\AppData\Roaming\djjergw
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2580 -s 9020

URLs

Name
IP
Malicious
http://openclehardware.ru/index.php
malicious
http://ceoconstractionstore.pl/index.php
malicious
http://informcoopirationunicolceo.ru/index.php
malicious
https://api.msn.com/v1/news/Feed/Windows?
unknown
https://aka.ms/odirmr
unknown
http://schemas.mi
unknown
https://excel.office.comi
unknown
https://word.office.comCE
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
https://powerpoint.office.comcember
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
unknown
https://bing.c
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://excel.office.com
unknown
http://schemas.micro
unknown
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
https://aka.ms/odirm
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://outlook.comNES-PC
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
https://api.msn.com/q
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
https://aka.ms/Vh5j3kI
unknown
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
unknown
https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
unknown
https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fgwm
unknown
https://www.msn.com/en-ul
unknown
https://wns.windows.com/L
unknown
https://word.office.com
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fgwm-dark
unknown
http://schemas.micr
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
https://aka.ms/Vh5j3k
unknown
https://api.msn.com/BA
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
https://api.msn.com/v1/news/Feed/Windows?&
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://android.notify.windows.com/iOS
unknown
https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
unknown
https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
unknown
https://api.msn.com/
unknown
https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
unknown
https://outlook.com_
unknown
https://www.msn.com/en-us/lifestyle/home-and-garden/13-thx
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
unknown
https://www.msn.com:443/en-us/feed
unknown
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
unknown
There are 55 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
unicexpertmagazine.pw
45.143.201.14
malicious
openclehardware.ru
unknown
malicious
informcoopirationunicolceo.ru
unknown
malicious
ceoconstractionstore.pl
unknown
malicious
api.msn.com
unknown
malicious

IPs

IP
Domain
Country
Malicious
45.143.201.14
unicexpertmagazine.pw
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsStore_8wekyb3d8bbwe\ApplicationFrame\Microsoft.WindowsStore_8wekyb3d8bbwe!App
PreferredMinSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}
DriveNumber
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
TotalBytes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
FreeBytes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Blank Disc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Can Close
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Media Type
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Imapi Media State
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
IsImapiDataBurnSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
IsImapiEraseSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Live FS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Disc Label
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Set
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{a33c736e-61ca-11ee-8c18-806e6f6e6963}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010410
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020408
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000503EE
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203E4
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103E2
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103C4
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103AE
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000040054
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080216
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000D025A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
PastIconsStream
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
IconStreams
There are 188 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2160000
direct allocation
page read and write
malicious
6C0000
direct allocation
page read and write
malicious
2181000
unclassified section
page read and write
malicious
6E1000
unclassified section
page read and write
malicious
B4D0000
unkown
page read and write
8C70000
unkown
page read and write
B888000
heap
page read and write
B7B4000
heap
page read and write
7FF5ED26E000
unkown
page readonly
B7D9000
heap
page read and write
B94A000
heap
page read and write
A5FE000
heap
page read and write
F9B4000
unkown
page read and write
33C0000
unkown
page read and write
7F50000
unkown
page read and write
B7B3000
heap
page read and write
4912000
heap
page read and write
47F0000
heap
page read and write
B4D0000
unkown
page read and write
11F0000
unkown
page read and write
A5FE000
heap
page read and write
B765000
heap
page read and write
A4A8000
heap
page read and write
6D0000
unclassified section
page read and write
4AEC000
heap
page read and write
47E1000
heap
page read and write
B4D0000
unkown
page read and write
8BFE000
heap
page read and write
7D70000
unkown
page read and write
21B0000
heap
page read and write
7D70000
unkown
page read and write
A49F000
heap
page read and write
3010000
unkown
page read and write
7D90000
unkown
page read and write
4B7F000
heap
page read and write
8D4A000
heap
page read and write
A29E000
stack
page read and write
B809000
heap
page read and write
7D60000
unkown
page read and write
BAF9000
stack
page read and write
8D37000
heap
page read and write
A49F000
heap
page read and write
B4D0000
unkown
page read and write
7D90000
unkown
page read and write
B96E000
heap
page read and write
11F0000
unkown
page read and write
8C70000
unkown
page read and write
8D4C000
heap
page read and write
CFB7000
stack
page read and write
C557000
unkown
page read and write
C08A000
stack
page read and write
33C0000
unkown
page read and write
B7E9000
heap
page read and write
33C0000
unkown
page read and write
A5B0000
heap
page read and write
FDEC000
unkown
page read and write
9F6E000
stack
page read and write
6B0000
heap
page read and write
97C3000
unkown
page read and write
7FF5D1CCD000
unkown
page readonly
A597000
heap
page read and write
7FF5ED68C000
unkown
page readonly
795E000
stack
page read and write
4C4B000
unkown
page read and write
9883000
unkown
page read and write
87E0000
unkown
page read and write
8E6E000
heap
page read and write
7D70000
unkown
page read and write
7F50000
unkown
page read and write
CC3D000
stack
page read and write
A21E000
stack
page read and write
1210000
unkown
page read and write
B4D0000
unkown
page read and write
A3BE000
unkown
page read and write
7F50000
unkown
page read and write
B4D0000
unkown
page read and write
87E0000
unkown
page read and write
2FB4000
stack
page read and write
B4D0000
unkown
page read and write
F97B000
unkown
page read and write
33C0000
unkown
page read and write
3160000
unkown
page read and write
8E39000
heap
page read and write
8740000
unkown
page read and write
8D42000
heap
page read and write
37D2000
unkown
page read and write
87E0000
unkown
page read and write
7FF5ED39B000
unkown
page readonly
87E0000
unkown
page read and write
B4D0000
unkown
page read and write
A5A3000
heap
page read and write
FF9A000
heap
page read and write
76A0000
unkown
page read and write
8BB5000
heap
page read and write
3738000
unkown
page read and write
B4D0000
unkown
page read and write
11F0000
unkown
page read and write
87E0000
unkown
page read and write
C350000
unkown
page read and write
3150000
unkown
page read and write
3460000
unkown
page read and write
B888000
heap
page read and write
47A3000
heap
page read and write
A5BA000
heap
page read and write
1440000
unkown
page read and write
A379000
unkown
page read and write
7D70000
unkown
page read and write
C811000
unkown
page read and write
1210000
unkown
page read and write
815E000
stack
page read and write
4796000
heap
page read and write
B7D9000
heap
page read and write
8DD7000
heap
page read and write
3160000
unkown
page read and write
79B1000
unkown
page read and write
7F50000
unkown
page read and write
8C70000
unkown
page read and write
97A9000
unkown
page read and write
B947000
heap
page read and write
A57C000
heap
page read and write
8E6E000
heap
page read and write
A475000
heap
page read and write
A5BA000
heap
page read and write
8B9D000
heap
page read and write
3160000
unkown
page read and write
CF38000
stack
page read and write
47AC000
heap
page read and write
33C0000
unkown
page read and write
3460000
unkown
page read and write
A5A1000
heap
page read and write
B765000
heap
page read and write
8E16000
heap
page read and write
A537000
heap
page read and write
7D60000
unkown
page read and write
A5AE000
heap
page read and write
3460000
unkown
page read and write
7FF5ED4EF000
unkown
page readonly
87E0000
unkown
page read and write
8DFF000
heap
page read and write
C0ED000
stack
page read and write
B95E000
heap
page read and write
3460000
unkown
page read and write
A5B0000
heap
page read and write
7F50000
unkown
page read and write
7E70000
unkown
page read and write
7D70000
unkown
page read and write
3160000
unkown
page read and write
8C08000
heap
page read and write
A3FE000
stack
page read and write
8D4A000
heap
page read and write
4AF3000
heap
page read and write
3160000
unkown
page read and write
3209000
stack
page read and write
7F50000
unkown
page read and write
2500000
heap
page read and write
8BFE000
heap
page read and write
E86000
heap
page read and write
B84B000
heap
page read and write
8DD7000
heap
page read and write
A5A3000
heap
page read and write
B4D0000
unkown
page read and write
87E0000
unkown
page read and write
B4D0000
unkown
page read and write
7D90000
unkown
page read and write
B963000
heap
page read and write
BF90000
trusted library allocation
page read and write
3460000
unkown
page read and write
8DFF000
heap
page read and write
37A8000
unkown
page read and write
1483000
heap
page read and write
A428000
heap
page read and write
3460000
unkown
page read and write
7FF5ED445000
unkown
page readonly
9885000
unkown
page read and write
3010000
unkown
page read and write
7D70000
unkown
page read and write
8D56000
heap
page read and write
7F50000
unkown
page read and write
7950000
unkown
page read and write
C962000
unkown
page read and write
7FF5ED48A000
unkown
page readonly
8D7D000
heap
page read and write
8D50000
heap
page read and write
DE3000
heap
page read and write
4B56000
unkown
page read and write
A5A1000
heap
page read and write
3160000
unkown
page read and write
FB5000
heap
page read and write
33C0000
unkown
page read and write
7FF5ED7CF000
unkown
page readonly
143B000
stack
page read and write
3010000
unkown
page read and write
B899000
heap
page read and write
9A60000
heap
page read and write
A39B000
unkown
page read and write
87E0000
unkown
page read and write
C2EB000
stack
page read and write
8D68000
heap
page read and write
8DFF000
heap
page read and write
987B000
unkown
page read and write
9871000
unkown
page read and write
7D70000
unkown
page read and write
7D80000
unkown
page read and write
7D90000
unkown
page read and write
8C70000
unkown
page read and write
B947000
heap
page read and write
B4D0000
unkown
page read and write
87E0000
unkown
page read and write
7FF5ED996000
unkown
page readonly
8D4C000
heap
page read and write
9E6C000
stack
page read and write
B4D0000
unkown
page read and write
33C0000
unkown
page read and write
7E70000
unkown
page read and write
A5BA000
heap
page read and write
48F2000
heap
page read and write
1C0000
heap
page read and write
3160000
unkown
page read and write
A57C000
heap
page read and write
33C0000
unkown
page read and write
A5B0000
heap
page read and write
A4D6000
heap
page read and write
7FF5ED3F3000
unkown
page readonly
7FF5ED8C6000
unkown
page readonly
943F000
stack
page read and write
7FF5ED41C000
unkown
page readonly
8C6C000
heap
page read and write
81E000
heap
page read and write
8D54000
heap
page read and write
7D70000
unkown
page read and write
B84E000
heap
page read and write
A5B0000
heap
page read and write
7D70000
unkown
page read and write
CB3D000
stack
page read and write
33C0000
unkown
page read and write
4AD9000
heap
page read and write
8D4C000
heap
page read and write
7FF5ED81B000
unkown
page readonly
C47E000
stack
page read and write
7FF5ED9C8000
unkown
page readonly
7FF5ED674000
unkown
page readonly
DC8000
heap
page read and write
78AD000
unkown
page read and write
8ED1000
heap
page read and write
7FF5ED68F000
unkown
page readonly
7FF5EDA08000
unkown
page readonly
3160000
unkown
page read and write
AB80000
heap
page read and write
7D70000
unkown
page read and write
8D46000
heap
page read and write
7FF5ED750000
unkown
page readonly
A5BA000
heap
page read and write
87E0000
unkown
page read and write
7859000
unkown
page read and write
8C9D000
heap
page read and write
9C0000
heap
page read and write
C6D8000
unkown
page read and write
8E70000
heap
page read and write
8D46000
heap
page read and write
C561000
unkown
page read and write
7D00000
unkown
page readonly
7FF5ED74A000
unkown
page readonly
C89A000
unkown
page read and write
7FF5ED3EA000
unkown
page readonly
87E0000
unkown
page read and write
B899000
heap
page read and write
B7ED000
heap
page read and write
B95E000
heap
page read and write
8D48000
heap
page read and write
600000
heap
page read and write
B973000
heap
page read and write
A537000
heap
page read and write
7F50000
unkown
page read and write
8C9D000
heap
page read and write
47F0000
heap
page read and write
1240000
heap
page read and write
A597000
heap
page read and write
7FF5EDA70000
unkown
page readonly
B4D0000
unkown
page read and write
B4D0000
unkown
page read and write
37BD000
unkown
page read and write
A49C000
heap
page read and write
B4D0000
unkown
page read and write
7FF5ED8F9000
unkown
page readonly
8BB5000
heap
page read and write
B7D9000
heap
page read and write
8BF0000
unkown
page readonly
7FF5ED43A000
unkown
page readonly
285F000
stack
page read and write
8D93000
heap
page read and write
8D62000
heap
page read and write
8E70000
heap
page read and write
8BFE000
heap
page read and write
B4D0000
unkown
page read and write
4BAB000
heap
page read and write
8DF0000
heap
page read and write
1210000
unkown
page read and write
B4D0000
unkown
page read and write
A0FA000
stack
page read and write
B4D0000
unkown
page read and write
B593000
heap
page read and write
3160000
unkown
page read and write
A489000
heap
page read and write
C964000
unkown
page read and write
2160000
direct allocation
page read and write
7FF5ED94A000
unkown
page readonly
87E0000
unkown
page read and write
33C0000
unkown
page read and write
B7D9000
heap
page read and write
7D70000
unkown
page read and write
7FF5ED505000
unkown
page readonly
8E99000
heap
page read and write
7FF5EDA0B000
unkown
page readonly
8C70000
unkown
page read and write
3150000
unkown
page read and write
8D4C000
heap
page read and write
C5E6000
unkown
page read and write
A5AE000
heap
page read and write
8C70000
unkown
page read and write
64E000
stack
page read and write
87E0000
unkown
page read and write
33C0000
unkown
page read and write
AAD1000
unkown
page read and write
B4D0000
unkown
page read and write
7DF452D61000
trusted library allocation
page execute read
7D70000
unkown
page read and write
8D56000
heap
page read and write
3460000
unkown
page read and write
C563000
unkown
page read and write
5490000
heap
page read and write
47AE000
heap
page read and write
11F0000
unkown
page read and write
1230000
unkown
page read and write
B4D0000
unkown
page read and write
494F000
heap
page read and write
1210000
unkown
page read and write
A57C000
heap
page read and write
4B8B000
unkown
page read and write
4791000
heap
page read and write
33C0000
unkown
page read and write
8C08000
heap
page read and write
7FF5ED872000
unkown
page readonly
7F50000
unkown
page read and write
8D93000
heap
page read and write
7F50000
unkown
page read and write
B8E6000
heap
page read and write
7FF5ED77E000
unkown
page readonly
7D80000
unkown
page read and write
3220000
unkown
page readonly
7D70000
unkown
page read and write
3150000
unkown
page read and write
8D58000
heap
page read and write
8E39000
heap
page read and write
7FF5ED692000
unkown
page readonly
7D70000
unkown
page read and write
7D70000
unkown
page read and write
B7E7000
heap
page read and write
47B2000
heap
page read and write
4770000
heap
page read and write
8D48000
heap
page read and write
C16B000
stack
page read and write
7F50000
unkown
page read and write
87E0000
unkown
page read and write
494F000
heap
page read and write
400000
unkown
page readonly
7DF452D31000
trusted library allocation
page execute read
7FF5ED9BE000
unkown
page readonly
87E0000
unkown
page read and write
8DD7000
heap
page read and write
A19F000
stack
page read and write
8D48000
heap
page read and write
B83C000
heap
page read and write
9660000
unkown
page read and write
787C000
unkown
page read and write
8E32000
heap
page read and write
C310000
trusted library allocation
page read and write
8D4A000
heap
page read and write
B7E9000
heap
page read and write
7FF5ED91A000
unkown
page readonly
B4D0000
unkown
page read and write
8F0C000
heap
page read and write
3010000
unkown
page read and write
A4A1000
unkown
page read and write
8C70000
unkown
page read and write
7FF5ED975000
unkown
page readonly
C57F000
unkown
page read and write
A32A000
unkown
page read and write
7FF5ED77C000
unkown
page readonly
4B40000
heap
page read and write
7D70000
unkown
page read and write
7FF5ED516000
unkown
page readonly
33C0000
unkown
page read and write
87E0000
unkown
page read and write
11F0000
unkown
page read and write
7FF5ED6DB000
unkown
page readonly
BF40000
trusted library allocation
page read and write
8E70000
heap
page read and write
B84C000
heap
page read and write
A49F000
heap
page read and write
61B000
heap
page read and write
B230000
remote allocation
page read and write
8C6C000
heap
page read and write
87E0000
unkown
page read and write
3460000
unkown
page read and write
7FF5ED7FD000
unkown
page readonly
47AC000
heap
page read and write
4791000
heap
page read and write
5FE000
heap
page read and write
8DD7000
heap
page read and write
7FF5ED6A5000
unkown
page readonly
87E0000
unkown
page read and write
8E6E000
heap
page read and write
A597000
heap
page read and write
8D42000
heap
page read and write
7FF5ED9C6000
unkown
page readonly
BDD0000
unkown
page readonly
3150000
unkown
page read and write
3160000
unkown
page read and write
810000
heap
page read and write
4796000
heap
page read and write
A33E000
unkown
page read and write
8D7D000
heap
page read and write
B4D0000
unkown
page read and write
33C0000
unkown
page read and write
8C70000
unkown
page read and write
9875000
unkown
page read and write
B7E9000
heap
page read and write
7D53000
unkown
page read and write
B768000
heap
page read and write
8D50000
heap
page read and write
9B80000
unkown
page read and write
8D2A000
heap
page read and write
A323000
unkown
page read and write
7FF5ED404000
unkown
page readonly
2501000
heap
page read and write
BD98000
stack
page read and write
1210000
unkown
page read and write
33C0000
unkown
page read and write
A401000
heap
page read and write
B772000
heap
page read and write
7D70000
unkown
page read and write
87E0000
unkown
page read and write
8D48000
heap
page read and write
7D70000
unkown
page read and write
A5A1000
heap
page read and write
7FF5ED519000
unkown
page readonly
8BDA000
heap
page read and write
986F000
unkown
page read and write
B7BA000
heap
page read and write
4794000
heap
page read and write
4796000
heap
page read and write
A48E000
heap
page read and write
8C9D000
heap
page read and write
A502000
unkown
page read and write
B84E000
heap
page read and write
B6FF000
heap
page read and write
3659000
stack
page read and write
7D70000
unkown
page read and write
7D70000
unkown
page read and write
54CE000
heap
page read and write
54D0000
heap
page read and write
B7BB000
heap
page read and write
3800000
unkown
page readonly
7FF5ED8C1000
unkown
page readonly
33C0000
unkown
page read and write
7D70000
unkown
page read and write
8C6C000
heap
page read and write
48F5000
heap
page read and write
7FF5ED5EB000
unkown
page readonly
48EB000
heap
page read and write
2953000
heap
page read and write
8C9D000
heap
page read and write
7D90000
unkown
page read and write
7D60000
unkown
page read and write
C89C000
unkown
page read and write
93BE000
stack
page read and write
BFA3000
trusted library allocation
page read and write
A07C000
stack
page read and write
A4DA000
heap
page read and write
3460000
unkown
page read and write
3160000
unkown
page read and write
B66B000
heap
page read and write
87E0000
unkown
page read and write
3160000
unkown
page read and write
33C0000
unkown
page read and write
B8E6000
heap
page read and write
87E0000
unkown
page read and write
A5A1000
heap
page read and write
8D93000
heap
page read and write
C26A000
stack
page read and write
7FF5ED97A000
unkown
page readonly
48EE000
heap
page read and write
1210000
unkown
page read and write
C51E000
unkown
page read and write
7E60000
unkown
page read and write
B4D0000
unkown
page read and write
7D70000
unkown
page read and write
3150000
unkown
page read and write
8F12000
heap
page read and write
7F50000
unkown
page read and write
8EB1000
heap
page read and write
9877000
unkown
page read and write
33C0000
unkown
page read and write
B888000
heap
page read and write
A496000
heap
page read and write
A5AE000
heap
page read and write
FA7B000
unkown
page read and write
3460000
unkown
page read and write
7FF5ED5C5000
unkown
page readonly
B84E000
heap
page read and write
B4D0000
unkown
page read and write
C5AA000
unkown
page read and write
B4D0000
unkown
page read and write
9795000
unkown
page read and write
89C0000
unkown
page read and write
7FF5ED62F000
unkown
page readonly
B96E000
heap
page read and write
7FF5ED850000
unkown
page readonly
87E0000
unkown
page read and write
B7ED000
heap
page read and write
797D000
unkown
page read and write
8D5A000
heap
page read and write
7D70000
unkown
page read and write
A5A3000
heap
page read and write
7FF5ED42B000
unkown
page readonly
33C0000
unkown
page read and write
3460000
unkown
page read and write
33C0000
unkown
page read and write
7FF5EDA14000
unkown
page readonly
8D46000
heap
page read and write
7D70000
unkown
page read and write
B4D0000
unkown
page read and write
47AE000
heap
page read and write
7FF5ED886000
unkown
page readonly
B7BA000
heap
page read and write
87E0000
unkown
page read and write
3010000
unkown
page read and write
7FF5ED7E0000
unkown
page readonly
33C0000
unkown
page read and write
8C70000
unkown
page read and write
B59A000
heap
page read and write
7F50000
unkown
page read and write
33C0000
unkown
page read and write
A597000
heap
page read and write
8E70000
heap
page read and write
8BFC000
heap
page read and write
3460000
unkown
page read and write
7F50000
unkown
page read and write
A361000
unkown
page read and write
B772000
heap
page read and write
BDC0000
unkown
page readonly
8D37000
heap
page read and write
87E0000
unkown
page read and write
7D80000
unkown
page read and write
7D70000
unkown
page read and write
7DF4F3061000
unkown
page execute read
7FF5ED986000
unkown
page readonly
8E99000
heap
page read and write
B7D7000
heap
page read and write
7D80000
unkown
page read and write
B809000
heap
page read and write
2D19000
stack
page read and write
54E4000
heap
page read and write
33C0000
unkown
page read and write
B4D0000
unkown
page read and write
8D42000
heap
page read and write
47C3000
heap
page read and write
C350000
unkown
page read and write
7F50000
unkown
page read and write
7FF5ED9ED000
unkown
page readonly
33C0000
unkown
page read and write
7D70000
unkown
page read and write
4A88000
stack
page read and write
87E0000
unkown
page read and write
BF20000
trusted library allocation
page read and write
CCBE000
stack
page read and write
3010000
unkown
page read and write
1381000
unkown
page read and write
48C4000
heap
page read and write
A426000
heap
page read and write
3460000
unkown
page read and write
8D2A000
heap
page read and write
79FB000
unkown
page read and write
B8DD000
heap
page read and write
8D5C000
heap
page read and write
7D60000
unkown
page read and write
33C0000
unkown
page read and write
7D70000
unkown
page read and write
B5B1000
heap
page read and write
B4D0000
unkown
page read and write
A5A1000
heap
page read and write
B0FB000
stack
page read and write
47C3000
heap
page read and write
B4D0000
unkown
page read and write
A5A3000
heap
page read and write
B170000
unkown
page readonly
A179000
stack
page read and write
7D70000
unkown
page read and write
B4D0000
unkown
page read and write
7D70000
unkown
page read and write
7884000
unkown
page read and write
A37D000
unkown
page read and write
A537000
heap
page read and write
FDDD000
unkown
page read and write
B4D0000
unkown
page read and write
7D70000
unkown
page read and write
87E0000
unkown
page read and write
BF73000
trusted library allocation
page read and write
87E0000
unkown
page read and write
3010000
unkown
page read and write
7FF5ED743000
unkown
page readonly
B57C000
heap
page read and write
1210000
unkown
page read and write
B972000
heap
page read and write
54D2000
heap
page read and write
8D7D000
heap
page read and write
B84E000
heap
page read and write
B701000
heap
page read and write
87E0000
unkown
page read and write
7DF452D30000
trusted library allocation
page readonly
8C70000
unkown
page read and write
1210000
unkown
page read and write
A4DA000
heap
page read and write
F989000
unkown
page read and write
B4D0000
unkown
page read and write
B974000
heap
page read and write
7F50000
unkown
page read and write
7DF4F3030000
unkown
page readonly
7F50000
unkown
page read and write
FF90000
heap
page read and write
B4D0000
unkown
page read and write
B599000
heap
page read and write
C350000
unkown
page read and write
83B000
heap
page read and write
B4D0000
unkown
page read and write
8D54000
heap
page read and write
7FF5ED71B000
unkown
page readonly
7F50000
unkown
page read and write
496C000
heap
page read and write
8759000
stack
page read and write
8EA8000
heap
page read and write
47A9000
heap
page read and write
7F50000
unkown
page read and write
B703000
heap
page read and write
3160000
unkown
page read and write
7D70000
unkown
page read and write
ABD1000
heap
page read and write
C5A0000
unkown
page read and write
A5FE000
heap
page read and write
5557000
stack
page read and write
3010000
unkown
page read and write
8DD7000
heap
page read and write
7FF5ED85F000
unkown
page readonly
7FF5ED3CE000
unkown
page readonly
C503000
unkown
page read and write
7FF5ED9A1000
unkown
page readonly
BFA0000
trusted library allocation
page read and write
7FF5ED644000
unkown
page readonly
87E0000
unkown
page read and write
A5AE000
heap
page read and write
400000
unkown
page execute and read and write
8BD8000
heap
page read and write
9881000
unkown
page read and write
8F12000
heap
page read and write
7861000
unkown
page read and write
81B000
heap
page read and write
8E31000
heap
page read and write
7FF5ED4F3000
unkown
page readonly
87E0000
unkown
page read and write
1210000
unkown
page read and write
4930000
heap
page read and write
33C0000
unkown
page read and write
B570000
heap
page read and write
8B9A000
heap
page read and write
B6FC000
heap
page read and write
7FF5ED1CB000
unkown
page readonly
C8BB000
stack
page read and write
B4D0000
unkown
page read and write
7D70000
unkown
page read and write
3150000
unkown
page read and write
B4D0000
unkown
page read and write
4794000
heap
page read and write
8D4E000
heap
page read and write
87E0000
unkown
page read and write
A375000
unkown
page read and write
7D80000
unkown
page read and write
33C0000
unkown
page read and write
7D70000
unkown
page read and write
7FF5ED495000
unkown
page readonly
41C000
unkown
page read and write
3160000
unkown
page read and write
8A6E000
stack
page read and write
A5A1000
heap
page read and write
961A000
stack
page read and write
7F40000
unkown
page readonly
B966000
heap
page read and write
8D4A000
heap
page read and write
8DA7000
heap
page read and write
A327000
unkown
page read and write
B974000
heap
page read and write
3160000
unkown
page read and write
47AC000
heap
page read and write
7FF5ED660000
unkown
page readonly
818E000
stack
page read and write
7D60000
unkown
page read and write
CEBE000
stack
page read and write
B96E000
heap
page read and write
B4D0000
unkown
page read and write
33C0000
unkown
page read and write
7FF5EDA11000
unkown
page readonly
8108000
stack
page read and write
7FF5ED810000
unkown
page readonly
7FF5ED697000
unkown
page readonly
7FF5ED915000
unkown
page readonly
8ED1000
heap
page read and write
CB95000
unkown
page read and write
A5A3000
heap
page read and write
A37B000
unkown
page read and write
4930000
heap
page read and write
33C0000
unkown
page read and write
8C6C000
heap
page read and write
1490000
unkown
page read and write
B7F5000
heap
page read and write
7D70000
unkown
page read and write
87E0000
unkown
page read and write
3010000
unkown
page read and write
3160000
unkown
page read and write
A5BA000
heap
page read and write
19D000
stack
page read and write
8D93000
heap
page read and write
48BA000
heap
page read and write
8BD8000
heap
page read and write
8D5E000
heap
page read and write
2E16000
stack
page read and write
7FF5ED46A000
unkown
page readonly
8C70000
unkown
page read and write
B4D0000
unkown
page read and write
7FF5ED9F2000
unkown
page readonly
8BEE000
heap
page read and write
54D9000
heap
page read and write
7FF5ED956000
unkown
page readonly
5564000
heap
page read and write
33C0000
unkown
page read and write
8D37000
heap
page read and write
8D66000
heap
page read and write
7D70000
unkown
page read and write
3160000
unkown
page read and write
B7D9000
heap
page read and write
3010000
unkown
page read and write
8D4C000
heap
page read and write
7D70000
unkown
page read and write
36D5000
stack
page read and write
7FF5EDA31000
unkown
page readonly
48AE000
heap
page read and write
7FF5ED8A4000
unkown
page readonly
B82A000
stack
page read and write
A5A1000
heap
page read and write
A479000
unkown
page read and write
C84D000
unkown
page read and write
A481000
heap
page read and write
987D000
unkown
page read and write
33C0000
unkown
page read and write
3010000
unkown
page read and write
47E5000
heap
page read and write
FB0000
heap
page read and write
A48C000
heap
page read and write
33C0000
unkown
page read and write
A5FE000
heap
page read and write
7FF5ED853000
unkown
page readonly
7F50000
unkown
page read and write
7FF5ED847000
unkown
page readonly
33C0000
unkown
page read and write
1095000
stack
page read and write
3160000
unkown
page read and write
B7ED000
heap
page read and write
7E11000
unkown
page read and write
B809000
heap
page read and write
7FF5EDA47000
unkown
page readonly
7CC0000
unkown
page readonly
7D70000
unkown
page read and write
4BE3000
unkown
page read and write
8C50000
unkown
page readonly
C4D0000
unkown
page read and write
D38F000
stack
page read and write
3791000
unkown
page read and write
41C000
unkown
page write copy
9139000
stack
page read and write
47A3000
heap
page read and write
8D4C000
heap
page read and write
47B4000
heap
page read and write
1210000
unkown
page read and write
7D80000
unkown
page read and write
982D000
unkown
page read and write
87E0000
unkown
page read and write
7FF5D1CD4000
unkown
page readonly
8D2A000
heap
page read and write
7F50000
unkown
page read and write
3240000
unkown
page read and write
A5A3000
heap
page read and write
8D42000
heap
page read and write
704000
heap
page read and write
3160000
unkown
page read and write
8BD8000
heap
page read and write
87E0000
unkown
page read and write
7F50000
unkown
page read and write
7FF5ED4C6000
unkown
page readonly
9977000
unkown
page read and write
33C0000
unkown
page read and write
8D2A000
heap
page read and write
37B0000
unkown
page read and write
96DF000
unkown
page read and write
A485000
heap
page read and write
8D4A000
heap
page read and write
87E0000
unkown
page read and write
68E000
stack
page read and write
4930000
heap
page read and write
A5A1000
heap
page read and write
7D70000
unkown
page read and write
7FF5ED1BC000
unkown
page readonly
B4D0000
unkown
page read and write
47B4000
heap
page read and write
8CC7000
heap
page read and write
3460000
unkown
page read and write
3150000
unkown
page read and write
7D70000
unkown
page read and write
B6B7000
heap
page read and write
3460000
unkown
page read and write
3010000
unkown
page read and write
33C0000
unkown
page read and write
7FF5ED990000
unkown
page readonly
56C3000
unkown
page read and write
C6BF000
unkown
page read and write
B7D9000
heap
page read and write
1451000
unkown
page readonly
1210000
unkown
page read and write
7FF5ED864000
unkown
page readonly
1210000
unkown
page read and write
B888000
heap
page read and write
A494000
heap
page read and write
33C0000
unkown
page read and write
8C70000
unkown
page read and write
47AE000
heap
page read and write
4AB0000
heap
page read and write
1210000
unkown
page read and write
A485000
heap
page read and write
7D60000
unkown
page read and write
7D90000
unkown
page read and write
1210000
unkown
page read and write
3160000
unkown
page read and write
B7B9000
heap
page read and write
8D37000
heap
page read and write
8DF1000
heap
page read and write
33C0000
unkown
page read and write
8DFF000
heap
page read and write
7D70000
unkown
page read and write
7FF5ED670000
unkown
page readonly
400000
unkown
page execute and read and write
A4DA000
heap
page read and write
A5A1000
heap
page read and write
10C0000
unkown
page readonly
7852000
unkown
page read and write
B4D0000
unkown
page read and write
C350000
unkown
page read and write
7FF5ED800000
unkown
page readonly
B956000
heap
page read and write
7F50000
unkown
page read and write
8DFF000
heap
page read and write
A537000
heap
page read and write
8E70000
heap
page read and write
54BE000
heap
page read and write
2340000
heap
page read and write
A597000
heap
page read and write
37AC000
unkown
page read and write
C10A000
stack
page read and write
785D000
unkown
page read and write
7F50000
unkown
page read and write
4785000
heap
page read and write
7FF5ED33F000
unkown
page readonly
8208000
stack
page read and write
5DE000
stack
page read and write
33C0000
unkown
page read and write
7D70000
unkown
page read and write
3160000
unkown
page read and write
3010000
unkown
page read and write
8DFF000
heap
page read and write
7D70000
unkown
page read and write
B4B0000
unkown
page readonly
8D5A000
heap
page read and write
B5A9000
heap
page read and write
8D60000
heap
page read and write
7E50000
unkown
page readonly
7F50000
unkown
page read and write
B7D9000
heap
page read and write
8C70000
unkown
page read and write
9A60000
unkown
page read and write
3580000
unkown
page readonly
87E0000
unkown
page read and write
8B78000
unkown
page read and write
8E0F000
heap
page read and write
C6C9000
unkown
page read and write
34E9000
stack
page read and write
4930000
heap
page read and write
8D2A000
heap
page read and write
41C000
unkown
page read and write
B772000
heap
page read and write
A46D000
heap
page read and write
9A60000
unkown
page read and write
7F50000
unkown
page read and write
7F50000
unkown
page read and write
3160000
unkown
page read and write
7D70000
unkown
page read and write
A5FE000
heap
page read and write
7FF5ED3DA000
unkown
page readonly
B230000
remote allocation
page read and write
A5A3000
heap
page read and write
B888000
heap
page read and write
B4E0000
trusted library allocation
page read and write
C6F2000
unkown
page read and write
80F000
stack
page read and write
7FF5ED5C1000
unkown
page readonly
87E0000
unkown
page read and write
2E97000
stack
page read and write
BF50000
trusted library allocation
page read and write
B772000
heap
page read and write
47C3000
heap
page read and write
47B6000
heap
page read and write
81DE000
stack
page read and write
B7ED000
heap
page read and write
D4A000
stack
page read and write
8D54000
heap
page read and write
C49E000
stack
page read and write
40B000
unkown
page execute read
479E000
heap
page read and write
7863000
unkown
page read and write
9FED000
stack
page read and write
87E0000
unkown
page read and write
33C0000
unkown
page read and write
B73D000
heap
page read and write
19D000
stack
page read and write
B888000
heap
page read and write
6A0000
direct allocation
page execute and read and write
B7BA000
heap
page read and write
4875000
heap
page read and write
1210000
unkown
page read and write
7F50000
unkown
page read and write
8B42000
heap
page read and write
3280000
heap
page read and write
8D66000
heap
page read and write
7D90000
unkown
page read and write
B4D0000
unkown
page read and write
478A000
heap
page read and write
8D5A000
heap
page read and write
7D70000
unkown
page read and write
7FF5ED46E000
unkown
page readonly
7FF5ED409000
unkown
page readonly
785B000
unkown
page read and write
40B000
unkown
page execute read
B95E000
heap
page read and write
B4D0000
unkown
page read and write
47B4000
heap
page read and write
8B4B000
heap
page read and write
8D4E000
heap
page read and write
7FF5ED556000
unkown
page readonly
B92A000
heap
page read and write
AB5D000
unkown
page read and write
1210000
unkown
page read and write
8B20000
heap
page read and write
9B60000
unkown
page readonly
7FF5ED87D000
unkown
page readonly
11F0000
unkown
page read and write
4B50000
unkown
page read and write
9873000
unkown
page read and write
7FF5ED337000
unkown
page readonly
B7E7000
heap
page read and write
7D70000
unkown
page read and write
B7E9000
heap
page read and write
B4D0000
unkown
page read and write
33C0000
unkown
page read and write
FF92000
heap
page read and write
BF70000
trusted library allocation
page read and write
FE05000
unkown
page read and write
8D01000
heap
page read and write
B4D0000
unkown
page read and write
7D80000
unkown
page read and write
8E99000
heap
page read and write
B7D3000
heap
page read and write
401000
unkown
page execute read
7FF5ED40D000
unkown
page readonly
C41F000
stack
page read and write
A4FC000
unkown
page read and write
4774000
heap
page read and write
11F0000
unkown
page read and write
10D0000
heap
page read and write
33B9000
stack
page read and write
7FF5ED9AE000
unkown
page readonly
47B0000
heap
page read and write
4C50000
unkown
page read and write
7D70000
unkown
page read and write
B4D0000
unkown
page read and write
8D93000
heap
page read and write
87E0000
unkown
page read and write
7D20000
unkown
page readonly
B4D0000
unkown
page read and write
8D5E000
heap
page read and write
9B80000
unkown
page read and write
7DF452D51000
trusted library allocation
page execute read
7F50000
unkown
page read and write
FAF4000
unkown
page read and write
8E6E000
heap
page read and write
7FF5ED433000
unkown
page readonly
B780000
heap
page read and write
3010000
unkown
page read and write
7FF5ED980000
unkown
page readonly
8F12000
heap
page read and write
11F0000
unkown
page read and write
7FF5ED93B000
unkown
page readonly
8BE1000
heap
page read and write
3756000
unkown
page read and write
1210000
unkown
page read and write
33C0000
unkown
page read and write
B4D0000
unkown
page read and write
5563000
heap
page read and write
37F2000
unkown
page read and write
8D4C000
heap
page read and write
8E70000
heap
page read and write
3160000
unkown
page read and write
4BA2000
heap
page read and write
B4D0000
unkown
page read and write
490E000
heap
page read and write
3010000
unkown
page read and write
4930000
heap
page read and write
B2AC000
stack
page read and write
4CC0000
unkown
page read and write
8D42000
heap
page read and write
87E0000
unkown
page read and write
B7D9000
heap
page read and write
ABDB000
heap
page read and write
784A000
unkown
page read and write
419000
unkown
page readonly
7FF5ED9D6000
unkown
page readonly
1C4000
heap
page read and write
7FF5ED59E000
unkown
page readonly
7FF5EDA53000
unkown
page readonly
7869000
unkown
page read and write
B84E000
heap
page read and write
C92D000
unkown
page read and write
7D70000
unkown
page read and write
7FF5ED8E2000
unkown
page readonly
A310000
unkown
page read and write
7FF5ED8AC000
unkown
page readonly
7FF5EDA76000
unkown
page readonly
785F000
unkown
page read and write
7DA0000
unkown
page read and write
33C0000
unkown
page read and write
B4D0000
unkown
page read and write
B4D0000
unkown
page read and write
A5A1000
heap
page read and write
8A26000
heap
page read and write
7D70000
unkown
page read and write
B955000
heap
page read and write
7FF5ED4BB000
unkown
page readonly
A537000
heap
page read and write
C6F4000
unkown
page read and write
B4D0000
unkown
page read and write
B8E6000
heap
page read and write
7FF5ED882000
unkown
page readonly
7DC0000
unkown
page read and write
87E0000
unkown
page read and write
B8E6000
heap
page read and write
30BC000
stack
page read and write
A5A3000
heap
page read and write
C6C1000
unkown
page read and write
515000
unkown
page readonly
BF70000
trusted library allocation
page read and write
7FF5ED92C000
unkown
page readonly
7FF5ED7F1000
unkown
page readonly
479E000
heap
page read and write
7D70000
unkown
page read and write
7FF5ED806000
unkown
page readonly
B952000
heap
page read and write
7D70000
unkown
page read and write
35A0000
unkown
page readonly
4B72000
heap
page read and write
530000
heap
page read and write
8D4C000
heap
page read and write
B7BA000
heap
page read and write
37F6000
unkown
page read and write
A5BA000
heap
page read and write
47FE000
heap
page read and write
B4D0000
unkown
page read and write
9C000
stack
page read and write
7D60000
unkown
page read and write
8D60000
heap
page read and write
89E2000
stack
page read and write
8D54000
heap
page read and write
7D70000
unkown
page read and write
4875000
heap
page read and write
8E17000
heap
page read and write
A49E000
unkown
page read and write
7D70000
unkown
page read and write
7F50000
unkown
page read and write
87E0000
unkown
page read and write
8E97000
heap
page read and write
AAF6000
unkown
page read and write
9A5B000
unkown
page read and write
7F50000
unkown
page read and write
B97D000
heap
page read and write
1210000
unkown
page read and write
CA7C000
unkown
page read and write
8D2A000
heap
page read and write
7FF5ED9CA000
unkown
page readonly
7D70000
unkown
page read and write
B7E6000
heap
page read and write
7D70000
unkown
page read and write
3460000
unkown
page read and write
CABD000
stack
page read and write
C3FC000
stack
page read and write
47B4000
heap
page read and write
B84C000
heap
page read and write
8C9D000
heap
page read and write
7FF5ED8B4000
unkown
page readonly
A4DA000
heap
page read and write
33C0000
unkown
page read and write
8E39000
heap
page read and write
1210000
unkown
page read and write
7FF5ED8FF000
unkown
page readonly
3160000
unkown
page read and write
33C0000
unkown
page read and write
B07D000
stack
page read and write
B4D0000
unkown
page read and write
8D7D000
heap
page read and write
8BFE000
heap
page read and write
8E39000
heap
page read and write
4A00000
trusted library allocation
page read and write
7F30000
unkown
page read and write
7DF452D40000
trusted library allocation
page readonly
A5BA000
heap
page read and write
A5BA000
heap
page read and write
B7F6000
heap
page read and write
7695000
stack
page read and write
B84E000
heap
page read and write
9DED000
stack
page read and write
8D5A000
heap
page read and write
700000
heap
page read and write
87E0000
unkown
page read and write
8710000
unkown
page readonly
7D70000
unkown
page read and write
7FF5ED451000
unkown
page readonly
3460000
unkown
page read and write
8E99000
heap
page read and write
A47C000
heap
page read and write
11F0000
unkown
page read and write
C350000
unkown
page read and write
7D70000
unkown
page read and write
21B0000
heap
page read and write
7F50000
unkown
page read and write
3150000
unkown
page read and write
CBBD000
stack
page read and write
A537000
heap
page read and write
8ECC000
heap
page read and write
3160000
unkown
page read and write
7D70000
unkown
page read and write
8C08000
heap
page read and write
78A0000
unkown
page read and write
1510000
unkown
page readonly
3460000
unkown
page read and write
9929000
unkown
page read and write
33C0000
unkown
page read and write
B73D000
heap
page read and write
8D6E000
stack
page read and write
8C9D000
heap
page read and write
A57C000
heap
page read and write
4B90000
unkown
page read and write
4B4A000
heap
page read and write
8E31000
heap
page read and write
8BA0000
heap
page read and write
89A0000
unkown
page read and write
8D4A000
heap
page read and write
CDBD000
stack
page read and write
8E6E000
heap
page read and write
7FF5ED418000
unkown
page readonly
7DDD000
stack
page read and write
B7EA000
heap
page read and write
DC0000
heap
page read and write
8C70000
unkown
page read and write
B84C000
heap
page read and write
47F0000
heap
page read and write
7D70000
unkown
page read and write
4791000
heap
page read and write
35D0000
unkown
page read and write
C544000
unkown
page read and write
3460000
unkown
page read and write
8D54000
heap
page read and write
C4A0000
unkown
page read and write
7FF5EDA69000
unkown
page readonly
A4DA000
heap
page read and write
8740000
unkown
page read and write
A494000
heap
page read and write
7FF5ED3A7000
unkown
page readonly
8D4A000
heap
page read and write
B4D0000
unkown
page read and write
9BC0000
unkown
page read and write
A5FE000
heap
page read and write
7D90000
unkown
page read and write
7FF5ED449000
unkown
page readonly
8D54000
heap
page read and write
B8DB000
heap
page read and write
A4AB000
heap
page read and write
B7E9000
heap
page read and write
3140000
unkown
page read and write
A2FE000
stack
page read and write
BF80000
trusted library allocation
page read and write
CA04000
unkown
page read and write
A5BA000
heap
page read and write
B96E000
heap
page read and write
8D37000
heap
page read and write
A57C000
heap
page read and write
BA4E000
stack
page read and write
8D54000
heap
page read and write
4B98000
heap
page read and write
7FF5ED534000
unkown
page readonly
87E0000
unkown
page read and write
11F0000
unkown
page read and write
B899000
heap
page read and write
BD1D000
stack
page read and write
8B50000
heap
page read and write
7FF5ED4B4000
unkown
page readonly
AF0C000
stack
page read and write
B96E000
heap
page read and write
A5AE000
heap
page read and write
A57C000
heap
page read and write
B8E7000
heap
page read and write
B899000
heap
page read and write
8C9D000
heap
page read and write
87E0000
unkown
page read and write
B8E7000
heap
page read and write
3010000
unkown
page read and write
3160000
unkown
page read and write
8D50000
heap
page read and write
11F0000
unkown
page read and write
8D50000
heap
page read and write
7DF4F3071000
unkown
page execute read
B4D0000
unkown
page read and write
B8C6000
heap
page read and write
8740000
unkown
page read and write
B7E7000
heap
page read and write
82D000
heap
page execute and read and write
A391000
unkown
page read and write
A40E000
heap
page read and write
8B48000
heap
page read and write
8BDA000
heap
page read and write
B4D0000
unkown
page read and write
B83E000
heap
page read and write
7F50000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
7D70000
unkown
page read and write
7D70000
unkown
page read and write
B4D0000
unkown
page read and write
7FF5ED4FD000
unkown
page readonly
11F0000
unkown
page read and write
896B000
stack
page read and write
7F2E000
stack
page read and write
4C34000
unkown
page read and write
8DAC000
heap
page read and write
1210000
unkown
page read and write
7FF5ED286000
unkown
page readonly
A57C000
heap
page read and write
7D70000
unkown
page read and write
B7B7000
heap
page read and write
4BC9000
unkown
page read and write
8F14000
heap
page read and write
7F50000
unkown
page read and write
978E000
unkown
page read and write
7865000
unkown
page read and write
1210000
unkown
page read and write
A5AE000
heap
page read and write
B961000
heap
page read and write
A57C000
heap
page read and write
8C08000
heap
page read and write
8D42000
heap
page read and write
7D70000
unkown
page read and write
B7E7000
heap
page read and write
8E0F000
heap
page read and write
5590000
unkown
page write copy
7F50000
unkown
page read and write
7FF5ED602000
unkown
page readonly
3010000
unkown
page read and write
3460000
unkown
page read and write
B888000
heap
page read and write
BF73000
trusted library allocation
page read and write
7D70000
unkown
page read and write
7FF5ED4DF000
unkown
page readonly
3460000
unkown
page read and write
8860000
unkown
page read and write
7D70000
unkown
page read and write
979C000
unkown
page read and write
B7D9000
heap
page read and write
33C0000
unkown
page read and write
B957000
heap
page read and write
B4D0000
unkown
page read and write
EC90000
heap
page read and write
7FF5ED3D0000
unkown
page readonly
A490000
heap
page read and write
8D50000
heap
page read and write
11F0000
unkown
page read and write
8BF8000
heap
page read and write
4CE0000
unkown
page read and write
B970000
heap
page read and write
28D7000
stack
page read and write
8DD7000
heap
page read and write
8D4C000
heap
page read and write
8D37000
heap
page read and write
47B6000
heap
page read and write
B4D0000
unkown
page read and write
3319000
stack
page read and write
BC9B000
stack
page read and write
9869000
unkown
page read and write
FDEA000
unkown
page read and write
FDFF000
unkown
page read and write
7CA0000
unkown
page read and write
7D70000
unkown
page read and write
8210000
unkown
page read and write
C350000
unkown
page read and write
87E0000
unkown
page read and write
B4D0000
unkown
page read and write
A4A4000
heap
page read and write
87E0000
unkown
page read and write
36F0000
unkown
page readonly
B83E000
heap
page read and write
33C0000
unkown
page read and write
7FF5ED8E7000
unkown
page readonly
7FF5ED779000
unkown
page readonly
3150000
unkown
page read and write
8D7D000
heap
page read and write
B4D0000
unkown
page read and write
7F50000
unkown
page read and write
515000
unkown
page readonly
8D42000
heap
page read and write
B4D0000
unkown
page read and write
8D7D000
heap
page read and write
4BA4000
heap
page read and write
7F50000
unkown
page read and write
A5A1000
heap
page read and write
7D70000
unkown
page read and write
8BB5000
heap
page read and write
7FF5ED942000
unkown
page readonly
B6F7000
heap
page read and write
B4D0000
unkown
page read and write
8F30000
unkown
page readonly
21B1000
heap
page read and write
8740000
unkown
page read and write
7D60000
unkown
page read and write
CB1D000
unkown
page read and write
7F50000
unkown
page read and write
7DF4F3041000
unkown
page execute read
7FF5ED5F7000
unkown
page readonly
8D50000
heap
page read and write
7C90000
unkown
page read and write
33C0000
unkown
page read and write
87E0000
unkown
page read and write
7D70000
unkown
page read and write
FAB4000
unkown
page read and write
7FF5ED507000
unkown
page readonly
B974000
heap
page read and write
7FF5ED86B000
unkown
page readonly
3460000
unkown
page read and write
7FF5EDA2A000
unkown
page readonly
11E0000
unkown
page readonly
B35E000
stack
page read and write
B7E9000
heap
page read and write
8D01000
heap
page read and write
303E000
stack
page read and write
33C0000
unkown
page read and write
8DD7000
heap
page read and write
B589000
heap
page read and write
33C0000
unkown
page read and write
B4D0000
unkown
page read and write
8D60000
heap
page read and write
8BD8000
heap
page read and write
7F50000
unkown
page read and write
C6CF000
unkown
page read and write
3160000
unkown
page read and write
87E0000
unkown
page read and write
7FF5ED471000
unkown
page readonly
A597000
heap
page read and write
8D66000
heap
page read and write
4875000
heap
page read and write
B72B000
heap
page read and write
B7ED000
heap
page read and write
CD3D000
stack
page read and write
A5B0000
heap
page read and write
8C08000
heap
page read and write
7D90000
unkown
page read and write
7F50000
unkown
page read and write
87E0000
unkown
page read and write
B4D0000
unkown
page read and write
B8AB000
stack
page read and write
3150000
unkown
page read and write
7D70000
unkown
page read and write
87E0000
unkown
page read and write
9893000
unkown
page read and write
496C000
heap
page read and write
7FF5ED7C4000
unkown
page readonly
87E0000
unkown
page read and write
33C0000
unkown
page read and write
8D5C000
heap
page read and write
7F50000
unkown
page read and write
8C6C000
heap
page read and write
37A0000
unkown
page read and write
8D2A000
heap
page read and write
97B5000
unkown
page read and write
A537000
heap
page read and write
47AC000
heap
page read and write
7D70000
unkown
page read and write
1480000
heap
page read and write
8DFF000
heap
page read and write
B4D0000
unkown
page read and write
5641000
unkown
page read and write
7F50000
unkown
page read and write
33C0000
unkown
page read and write
478A000
heap
page read and write
8D4E000
heap
page read and write
8EC4000
heap
page read and write
8EC6000
unkown
page read and write
D039000
stack
page read and write
7F50000
unkown
page read and write
7D70000
unkown
page read and write
8C6C000
heap
page read and write
8D50000
heap
page read and write
7FF5ED3D6000
unkown
page readonly
A45A000
heap
page read and write
CA3D000
stack
page read and write
7D70000
unkown
page read and write
6C0000
direct allocation
page read and write
9198000
stack
page read and write
33C0000
unkown
page read and write
3460000
unkown
page read and write
4B9E000
heap
page read and write
A42C000
heap
page read and write
7F50000
unkown
page read and write
B8C0000
unkown
page readonly
A4AE000
unkown
page read and write
7F50000
unkown
page read and write
B8DA000
heap
page read and write
8E6E000
heap
page read and write
3460000
unkown
page read and write
B899000
heap
page read and write
3460000
unkown
page read and write
C700000
unkown
page read and write
7FF5ED803000
unkown
page readonly
B83C000
heap
page read and write
B7B7000
heap
page read and write
7D70000
unkown
page read and write
48FB000
heap
page read and write
3010000
unkown
page read and write
478A000
heap
page read and write
7D60000
unkown
page read and write
87E0000
unkown
page read and write
B947000
heap
page read and write
B85F000
heap
page read and write
B5A0000
heap
page read and write
A5AE000
heap
page read and write
7D70000
unkown
page read and write
B4D0000
unkown
page read and write
8000000
unkown
page read and write
DE0000
unkown
page readonly
C06C000
stack
page read and write
3010000
unkown
page read and write
8DF2000
heap
page read and write
7F50000
unkown
page read and write
3160000
unkown
page read and write
7FF5ED939000
unkown
page readonly
8E99000
heap
page read and write
923E000
stack
page read and write
A49F000
heap
page read and write
7FF5ED28E000
unkown
page readonly
3795000
unkown
page read and write
B888000
heap
page read and write
3010000
unkown
page read and write
7FF5ED9FF000
unkown
page readonly
BE6C000
stack
page read and write
5E0000
direct allocation
page execute and read and write
47B0000
heap
page read and write
A597000
heap
page read and write
5F0000
heap
page read and write
7FF5ED9A6000
unkown
page readonly
8C5F000
heap
page read and write
A490000
heap
page read and write
A5A3000
heap
page read and write
7867000
unkown
page read and write
87E0000
unkown
page read and write
9A0000
heap
page read and write
B961000
heap
page read and write
7D90000
unkown
page read and write
4796000
heap
page read and write
8D62000
heap
page read and write
3150000
unkown
page read and write
2F39000
stack
page read and write
A494000
heap
page read and write
B4D0000
unkown
page read and write
33C0000
unkown
page read and write
A57C000
heap
page read and write
B6EC000
heap
page read and write
A5AE000
heap
page read and write
8D54000
heap
page read and write
8D54000
heap
page read and write
3160000
unkown
page read and write
33C0000
unkown
page read and write
BDA0000
unkown
page readonly
C7C5000
unkown
page read and write
3460000
unkown
page read and write
7D70000
unkown
page read and write
7857000
unkown
page read and write
B72E000
heap
page read and write
B22B000
stack
page read and write
36D3000
stack
page read and write
8BB5000
heap
page read and write
3010000
unkown
page read and write
B6FC000
heap
page read and write
3590000
unkown
page read and write
7FF5ED55F000
unkown
page readonly
8ED1000
heap
page read and write
4C18000
unkown
page read and write
8EB1000
heap
page read and write
4B94000
heap
page read and write
B949000
heap
page read and write
3460000
unkown
page read and write
9F1E000
stack
page read and write
7D70000
unkown
page read and write
7F50000
unkown
page read and write
3460000
unkown
page read and write
4B48000
heap
page read and write
47FE000
heap
page read and write
9A60000
unkown
page read and write
7FF5ED2A4000
unkown
page readonly
87E0000
unkown
page read and write
AAF2000
unkown
page read and write
8DF2000
heap
page read and write
47E1000
heap
page read and write
B899000
heap
page read and write
7F50000
unkown
page read and write
A5FE000
heap
page read and write
B5AE000
stack
page read and write
33C0000
unkown
page read and write
7D70000
unkown
page read and write
3150000
unkown
page read and write
3150000
unkown
page read and write
8C70000
unkown
page read and write
87E0000
unkown
page read and write
7D60000
unkown
page read and write
8D5C000
heap
page read and write
DD0000
unkown
page readonly
B4D0000
unkown
page read and write
3150000
unkown
page read and write
B6EC000
heap
page read and write
7F50000
unkown
page read and write
B7BA000
heap
page read and write
A5B0000
heap
page read and write
7D70000
unkown
page read and write
C350000
unkown
page read and write
B7E7000
heap
page read and write
B4D0000
unkown
page read and write
A438000
heap
page read and write
48C4000
heap
page read and write
27DB000
stack
page read and write
3460000
unkown
page read and write
B7BA000
heap
page read and write
B4D0000
unkown
page read and write
7FF5ED64F000
unkown
page readonly
4BD0000
trusted library allocation
page read and write
419000
unkown
page readonly
47B2000
heap
page read and write
7D80000
unkown
page read and write
3160000
unkown
page read and write
906E000
stack
page read and write
C6F8000
unkown
page read and write
48F5000
heap
page read and write
BFB0000
trusted library allocation
page read and write
8740000
unkown
page read and write
33C0000
unkown
page read and write
7FF5ED695000
unkown
page readonly
AA90000
unkown
page read and write
7FF5EDA38000
unkown
page readonly
8D93000
heap
page read and write
7FF5ED4E8000
unkown
page readonly
8740000
unkown
page read and write
A537000
heap
page read and write
7FF5ED5A8000
unkown
page readonly
7F50000
unkown
page read and write
A485000
heap
page read and write
7DF4F3040000
unkown
page readonly
B4D0000
unkown
page read and write
7D70000
unkown
page read and write
8D90000
unkown
page readonly
8D2A000
heap
page read and write
308A000
stack
page read and write
B888000
heap
page read and write
7D70000
unkown
page read and write
48BA000
heap
page read and write
58E000
stack
page read and write
B7ED000
heap
page read and write
3160000
unkown
page read and write
B4D0000
unkown
page read and write
549A000
heap
page read and write
3150000
unkown
page read and write
3150000
unkown
page read and write
7FF5ED928000
unkown
page readonly
B5B1000
heap
page read and write
A57C000
heap
page read and write
3460000
unkown
page read and write
A5AE000
heap
page read and write
7FF5ED1D6000
unkown
page readonly
B4D0000
unkown
page read and write
F70000
trusted library allocation
page read and write
4BA6000
unkown
page read and write
87E0000
unkown
page read and write
11F0000
unkown
page read and write
C720000
heap
page read and write
7D70000
unkown
page read and write
8E6E000
heap
page read and write
3758000
unkown
page read and write
7F50000
unkown
page read and write
7FF5ED5C9000
unkown
page readonly
2170000
unclassified section
page read and write
8C70000
unkown
page read and write
3460000
unkown
page read and write
A1FB000
stack
page read and write
8E0C000
heap
page read and write
8BDA000
heap
page read and write
8D7D000
heap
page read and write
7D70000
unkown
page read and write
3460000
unkown
page read and write
B4D0000
unkown
page read and write
7FF5ED9D9000
unkown
page readonly
8C6C000
heap
page read and write
A49C000
heap
page read and write
B73D000
heap
page read and write
3460000
unkown
page read and write
B58B000
heap
page read and write
A5B0000
heap
page read and write
48C4000
heap
page read and write
A48C000
heap
page read and write
8B9A000
heap
page read and write
4BE1000
unkown
page read and write
9C000
stack
page read and write
47F0000
heap
page read and write
47A3000
heap
page read and write
8B5A000
heap
page read and write
B83C000
heap
page read and write
4930000
heap
page read and write
3160000
unkown
page read and write
F972000
unkown
page read and write
47B0000
heap
page read and write
8B60000
unkown
page readonly
B94E000
heap
page read and write
A5A3000
heap
page read and write
B95F000
heap
page read and write
B970000
heap
page read and write
8D42000
heap
page read and write
7D70000
unkown
page read and write
8F0C000
heap
page read and write
7FF5ED476000
unkown
page readonly
8D56000
heap
page read and write
A47E000
heap
page read and write
4AB5000
heap
page read and write
7E70000
unkown
page read and write
8BB5000
heap
page read and write
7D70000
unkown
page read and write
A5BA000
heap
page read and write
8F16000
heap
page read and write
7645000
stack
page read and write
33C0000
unkown
page read and write
A5B0000
heap
page read and write
7D70000
unkown
page read and write
A5A3000
heap
page read and write
87E0000
unkown
page read and write
B4D0000
unkown
page read and write
3010000
unkown
page read and write
A537000
heap
page read and write
B7ED000
heap
page read and write
786B000
unkown
page read and write
B701000
heap
page read and write
7FF5ED5CE000
unkown
page readonly
8ED1000
heap
page read and write
1210000
unkown
page read and write
B4D0000
unkown
page read and write
B4D0000
unkown
page read and write
8D4E000
heap
page read and write
E85000
heap
page read and write
7FF5ED1CF000
unkown
page readonly
7E70000
unkown
page read and write
7FF5ED937000
unkown
page readonly
2950000
heap
page read and write
56D9000
unkown
page read and write
7CE0000
unkown
page read and write
7FF5ECED2000
unkown
page readonly
8D4A000
heap
page read and write
7DF452D41000
trusted library allocation
page execute read
AFFD000
stack
page read and write
9879000
unkown
page read and write
8BDE000
heap
page read and write
47FE000
heap
page read and write
8BD8000
heap
page read and write
7D70000
unkown
page read and write
87E0000
unkown
page read and write
D4CC000
stack
page read and write
4C60000
unkown
page read and write
B7ED000
heap
page read and write
4927000
heap
page read and write
9922000
unkown
page read and write
2310000
heap
page read and write
4938000
heap
page read and write
98A8000
unkown
page read and write
A050000
heap
page read and write
490A000
heap
page read and write
A45A000
heap
page read and write
33C0000
unkown
page read and write
B948000
heap
page read and write
B6A0000
heap
page read and write
A5FE000
heap
page read and write
7FF5ED73D000
unkown
page readonly
540000
heap
page read and write
96AB000
stack
page read and write
3460000
unkown
page read and write
B7E7000
heap
page read and write
A537000
heap
page read and write
977A000
unkown
page read and write
8B9A000
heap
page read and write
B4D0000
unkown
page read and write
A57C000
heap
page read and write
9798000
unkown
page read and write
990000
heap
page read and write
3460000
unkown
page read and write
B83E000
heap
page read and write
B4D0000
unkown
page read and write
7847000
unkown
page read and write
8D93000
heap
page read and write
7D40000
unkown
page read and write
B4D0000
unkown
page read and write
419000
unkown
page readonly
8C70000
unkown
page read and write
C5A3000
unkown
page read and write
14B0000
unkown
page readonly
7FF5ED933000
unkown
page readonly
3010000
unkown
page read and write
7FF5ED4C2000
unkown
page readonly
A5BA000
heap
page read and write
3010000
unkown
page read and write
7FF5ED814000
unkown
page readonly
8DD7000
heap
page read and write
2330000
heap
page read and write
3160000
unkown
page read and write
7D70000
unkown
page read and write
4B7B000
heap
page read and write
7FF5ED7DB000
unkown
page readonly
7D70000
unkown
page read and write
4875000
heap
page read and write
1210000
unkown
page read and write
A5AE000
heap
page read and write
C8E1000
unkown
page read and write
60D000
heap
page execute and read and write
3160000
unkown
page read and write
4BAB000
heap
page read and write
B84B000
heap
page read and write
B7EC000
heap
page read and write
B96E000
heap
page read and write
54F6000
heap
page read and write
7D80000
unkown
page read and write
C893000
unkown
page read and write
B7E9000
heap
page read and write
47A9000
heap
page read and write
B4D0000
unkown
page read and write
B7ED000
heap
page read and write
A49F000
heap
page read and write
8D48000
heap
page read and write
8D5E000
heap
page read and write
1210000
unkown
page read and write
BBF000
stack
page read and write
8D4E000
heap
page read and write
7D70000
unkown
page read and write
B5A9000
heap
page read and write
7FF5ED71E000
unkown
page readonly
A4DA000
heap
page read and write
A597000
heap
page read and write
C846000
unkown
page read and write
33C0000
unkown
page read and write
8C70000
unkown
page read and write
B899000
heap
page read and write
B6B7000
heap
page read and write
7D70000
unkown
page read and write
B4D0000
unkown
page read and write
1210000
unkown
page read and write
7900000
unkown
page read and write
3460000
unkown
page read and write
3010000
unkown
page read and write
3439000
stack
page read and write
8DFF000
heap
page read and write
8740000
unkown
page read and write
87E0000
unkown
page read and write
8BFE000
heap
page read and write
A49F000
heap
page read and write
4B93000
unkown
page read and write
A5FE000
heap
page read and write
7F50000
unkown
page read and write
B1AF000
stack
page read and write
4619000
stack
page read and write
7FF5ED295000
unkown
page readonly
7FF5ED9CC000
unkown
page readonly
7F50000
unkown
page read and write
54A2000
heap
page read and write
C88B000
unkown
page read and write
9112000
stack
page read and write
3460000
unkown
page read and write
4CD0000
unkown
page read and write
A597000
heap
page read and write
FA33000
unkown
page read and write
8E39000
heap
page read and write
33C0000
unkown
page read and write
A49F000
heap
page read and write
A5B0000
heap
page read and write
8E17000
heap
page read and write
8D37000
heap
page read and write
9550000
unkown
page readonly
A4DA000
heap
page read and write
1505000
heap
page read and write
87E0000
unkown
page read and write
7FF5ED93E000
unkown
page readonly
7D70000
unkown
page read and write
47B2000
heap
page read and write
A5BA000
heap
page read and write
8BB1000
heap
page read and write
8BB5000
heap
page read and write
8A20000
heap
page read and write
4B6E000
heap
page read and write
C6E3000
unkown
page read and write
8D68000
heap
page read and write
3460000
unkown
page read and write
7FF5ED818000
unkown
page readonly
7D70000
unkown
page read and write
4B90000
heap
page read and write
8E99000
heap
page read and write
7E70000
unkown
page read and write
8E31000
heap
page read and write
7F50000
unkown
page read and write
A5A3000
heap
page read and write
A537000
heap
page read and write
7D70000
unkown
page read and write
7D70000
unkown
page read and write
2D9F000
stack
page read and write
8F0C000
heap
page read and write
A5A1000
heap
page read and write
3460000
unkown
page read and write
A597000
heap
page read and write
7FF5ED781000
unkown
page readonly
494F000
heap
page read and write
7FF5ED52F000
unkown
page readonly
945000
stack
page read and write
B7AE000
stack
page read and write
87E0000
unkown
page read and write
7D70000
unkown
page read and write
B84E000
heap
page read and write
515000
unkown
page readonly
ABC4000
heap
page read and write
87E0000
unkown
page read and write
3319000
stack
page read and write
FDE4000
unkown
page read and write
1210000
unkown
page read and write
B629000
stack
page read and write
B7D9000
heap
page read and write
478A000
heap
page read and write
A4DA000
heap
page read and write
87E0000
unkown
page read and write
7D70000
unkown
page read and write
7D70000
unkown
page read and write
7FF5ED844000
unkown
page readonly
87E0000
unkown
page read and write
8C63000
heap
page read and write
BDEB000
stack
page read and write
B899000
heap
page read and write
B66B000
heap
page read and write
A5AE000
heap
page read and write
B650000
unkown
page read and write
3010000
unkown
page read and write
B7E7000
heap
page read and write
3460000
unkown
page read and write
BF80000
trusted library allocation
page read and write
7D70000
unkown
page read and write
8D37000
heap
page read and write
7FF5EDA0D000
unkown
page readonly
B4D0000
unkown
page read and write
B888000
heap
page read and write
B4D0000
unkown
page read and write
BEE9000
stack
page read and write
8E0C000
heap
page read and write
87E0000
unkown
page read and write
8720000
unkown
page readonly
B4D0000
unkown
page read and write
987F000
unkown
page read and write
8D60000
heap
page read and write
A5B0000
heap
page read and write
47B2000
heap
page read and write
7D80000
unkown
page read and write
A4B8000
unkown
page read and write
C857000
unkown
page read and write
B4D0000
unkown
page read and write
7F50000
unkown
page read and write
8D4E000
heap
page read and write
8BFE000
heap
page read and write
7D70000
unkown
page read and write
97AD000
unkown
page read and write
A400000
heap
page read and write
C1ED000
stack
page read and write
3010000
unkown
page read and write
A4A4000
heap
page read and write
379E000
unkown
page read and write
8B9D000
heap
page read and write
C350000
unkown
page read and write
A5A3000
heap
page read and write
7FF5ED4B0000
unkown
page readonly
18A0000
unkown
page readonly
8730000
unkown
page read and write
48BA000
heap
page read and write
1210000
unkown
page read and write
7FF5ED735000
unkown
page readonly
8B9D000
heap
page read and write
7F50000
unkown
page read and write
B950000
heap
page read and write
47B6000
heap
page read and write
B10D000
stack
page read and write
9A10000
unkown
page read and write
7978000
unkown
page read and write
C9BB000
stack
page read and write
8D50000
heap
page read and write
7D70000
unkown
page read and write
A5AE000
heap
page read and write
8CED000
stack
page read and write
1210000
unkown
page read and write
B4D0000
unkown
page read and write
A422000
heap
page read and write
7D80000
unkown
page read and write
7D70000
unkown
page read and write
95DB000
stack
page read and write
91BA000
stack
page read and write
47A3000
heap
page read and write
8B9A000
heap
page read and write
A494000
unkown
page read and write
87E0000
unkown
page read and write
3160000
unkown
page read and write
B728000
stack
page read and write
A5FE000
heap
page read and write
47AE000
heap
page read and write
54CA000
heap
page read and write
7FF5ED65C000
unkown
page readonly
4B2D000
heap
page read and write
11F0000
unkown
page read and write
8D4E000
heap
page read and write
C52C000
unkown
page read and write
8D4E000
heap
page read and write
B4D0000
unkown
page read and write
8D58000
heap
page read and write
7FF5ED9D2000
unkown
page readonly
48BA000
heap
page read and write
A37E000
stack
page read and write
7D70000
unkown
page read and write
9D64000
unkown
page read and write
B8CB000
heap
page read and write
3210000
unkown
page read and write
FA76000
unkown
page read and write
33C0000
unkown
page read and write
7D70000
unkown
page read and write
7FF5ED625000
unkown
page readonly
A5BA000
heap
page read and write
47FE000
heap
page read and write
FDA0000
unkown
page read and write
CE3C000
stack
page read and write
BF60000
heap
page read and write
B84E000
heap
page read and write
3150000
unkown
page read and write
48D8000
heap
page read and write
7FF5ED412000
unkown
page readonly
8E0A000
heap
page read and write
1210000
unkown
page read and write
9A60000
unkown
page read and write
87E0000
unkown
page read and write
CB9D000
unkown
page read and write
1500000
heap
page read and write
7FF5ED669000
unkown
page readonly
7FF5ED6B8000
unkown
page readonly
A50B000
unkown
page read and write
3160000
unkown
page read and write
8C08000
heap
page read and write
3460000
unkown
page read and write
A597000
heap
page read and write
4BAD000
heap
page read and write
3010000
unkown
page read and write
B705000
heap
page read and write
B7D9000
heap
page read and write
A5B0000
heap
page read and write
3797000
unkown
page read and write
CB61000
unkown
page read and write
B972000
heap
page read and write
33C0000
unkown
page read and write
8DAC000
heap
page read and write
97D4000
unkown
page read and write
A490000
heap
page read and write
7FF5ED849000
unkown
page readonly
8C70000
unkown
page read and write
B140000
unkown
page readonly
3160000
unkown
page read and write
8D42000
heap
page read and write
B8E7000
heap
page read and write
B4D0000
unkown
page read and write
33C0000
unkown
page read and write
A48C000
heap
page read and write
B580000
heap
page read and write
79D3000
unkown
page read and write
7D70000
unkown
page read and write
8BB5000
heap
page read and write
7DF4F3031000
unkown
page execute read
B7E7000
heap
page read and write
87E0000
unkown
page read and write
7FF5ED7E9000
unkown
page readonly
33C0000
unkown
page read and write
B4D0000
unkown
page read and write
B7D9000
heap
page read and write
7D70000
unkown
page read and write
A489000
heap
page read and write
B8E2000
heap
page read and write
7D80000
unkown
page read and write
CA63000
unkown
page read and write
7953000
unkown
page read and write
47C3000
heap
page read and write
B640000
unkown
page read and write
7D80000
unkown
page read and write
7D70000
unkown
page read and write
A433000
unkown
page read and write
9B80000
unkown
page read and write
8DAC000
heap
page read and write
4B44000
heap
page read and write
89E0000
unkown
page read and write
7FF5ED961000
unkown
page readonly
7D60000
unkown
page read and write
8C08000
heap
page read and write
7D70000
unkown
page read and write
7FF5ED4A1000
unkown
page readonly
54CC000
heap
page read and write
8C63000
heap
page read and write
CA42000
unkown
page read and write
1210000
unkown
page read and write
7FF5ED755000
unkown
page readonly
48AE000
heap
page read and write
7A34000
unkown
page read and write
7FF5ED349000
unkown
page readonly
7D70000
unkown
page read and write
4875000
heap
page read and write
8E70000
heap
page read and write
AADB000
unkown
page read and write
87BB000
stack
page read and write
9792000
unkown
page read and write
B4D0000
unkown
page read and write
479E000
heap
page read and write
48C4000
heap
page read and write
A5AE000
heap
page read and write
7FF5ED2A9000
unkown
page readonly
8D7D000
heap
page read and write
8C08000
heap
page read and write
8FB9000
stack
page read and write
7D70000
unkown
page read and write
7FF5ED97E000
unkown
page readonly
8D5C000
heap
page read and write
B970000
heap
page read and write
A57C000
heap
page read and write
A364000
unkown
page read and write
7F50000
unkown
page read and write
A5FE000
heap
page read and write
5FA000
heap
page read and write
7FF5ED80C000
unkown
page readonly
8CAF000
heap
page read and write
8D37000
heap
page read and write
CA20000
unkown
page read and write
1210000
unkown
page read and write
7FF5ED821000
unkown
page readonly
7FF5ED1B6000
unkown
page readonly
B8B0000
unkown
page read and write
8C9D000
heap
page read and write
3160000
unkown
page read and write
A57C000
heap
page read and write
A4A4000
heap
page read and write
3181000
unkown
page read and write
C83D000
stack
page read and write
3010000
unkown
page read and write
315A000
stack
page read and write
B4D0000
unkown
page read and write
8E07000
heap
page read and write
B4D0000
unkown
page read and write
7F50000
unkown
page read and write
7D60000
unkown
page read and write
7D70000
unkown
page read and write
1210000
unkown
page read and write
7FF5ED426000
unkown
page readonly
B4D0000
unkown
page read and write
A5A1000
heap
page read and write
7D70000
unkown
page read and write
A5FE000
heap
page read and write
B7B9000
heap
page read and write
8EA8000
heap
page read and write
F9F4000
unkown
page read and write
AF8D000
stack
page read and write
7D70000
unkown
page read and write
883A000
stack
page read and write
B888000
heap
page read and write
B899000
heap
page read and write
47A9000
heap
page read and write
A494000
heap
page read and write
ABC6000
heap
page read and write
8D4A000
heap
page read and write
3460000
unkown
page read and write
7D70000
unkown
page read and write
8E17000
heap
page read and write
C50A000
unkown
page read and write
8D56000
heap
page read and write
B4D0000
unkown
page read and write
401000
unkown
page execute read
A49E000
heap
page read and write
E4D000
heap
page read and write
7D70000
unkown
page read and write
B4D0000
unkown
page read and write
B899000
heap
page read and write
B4D0000
unkown
page read and write
7D70000
unkown
page read and write
54FF000
heap
page read and write
3460000
unkown
page read and write
3460000
unkown
page read and write
3290000
unkown
page read and write
87E0000
unkown
page read and write
76C0000
unkown
page read and write
A490000
heap
page read and write
7DF4F3050000
unkown
page readonly
87E0000
unkown
page read and write
3010000
unkown
page read and write
8D68000
heap
page read and write
33C0000
unkown
page read and write
B4D0000
unkown
page read and write
8BFE000
heap
page read and write
33C0000
unkown
page read and write
8D58000
heap
page read and write
7FF5ED867000
unkown
page readonly
310E000
stack
page read and write
8DF2000
heap
page read and write
8740000
unkown
page read and write
2280000
heap
page read and write
7D70000
unkown
page read and write
7EF0000
trusted library section
page readonly
3460000
unkown
page read and write
B73D000
heap
page read and write
47E1000
heap
page read and write
B08D000
stack
page read and write
7D70000
unkown
page read and write
A4DA000
heap
page read and write
BFEE000
stack
page read and write
8E70000
heap
page read and write
87E0000
unkown
page read and write
9815000
unkown
page read and write
A537000
heap
page read and write
7D80000
unkown
page read and write
A597000
heap
page read and write
8DF2000
heap
page read and write
7FF5ED279000
unkown
page readonly
7F50000
unkown
page read and write
80D9000
stack
page read and write
7FF5ED503000
unkown
page readonly
33C0000
unkown
page read and write
8C6C000
heap
page read and write
B4D0000
unkown
page read and write
B7D9000
heap
page read and write
49E0000
trusted library allocation
page read and write
4794000
heap
page read and write
3010000
unkown
page read and write
ABD4000
heap
page read and write
7DC0000
unkown
page read and write
B888000
heap
page read and write
8E6E000
heap
page read and write
8DAC000
heap
page read and write
8D93000
heap
page read and write
C54A000
unkown
page read and write
4771000
heap
page read and write
8B56000
heap
page read and write
3010000
unkown
page read and write
4794000
heap
page read and write
A5B0000
heap
page read and write
7DD0000
unkown
page read and write
909A000
stack
page read and write
7F50000
unkown
page read and write
A537000
heap
page read and write
3460000
unkown
page read and write
33C0000
unkown
page read and write
7FF5ED7D6000
unkown
page readonly
AAF9000
unkown
page read and write
8D46000
heap
page read and write
7DF452D50000
trusted library allocation
page readonly
7F50000
unkown
page read and write
7F50000
unkown
page read and write
8D4E000
heap
page read and write
3460000
unkown
page read and write
7FF5ED793000
unkown
page readonly
B7E9000
heap
page read and write
7FF5ED9E1000
unkown
page readonly
986B000
unkown
page read and write
7FF5ED50A000
unkown
page readonly
B8E6000
heap
page read and write
8C9E000
heap
page read and write
7D70000
unkown
page read and write
B230000
remote allocation
page read and write
B4D0000
unkown
page read and write
3150000
unkown
page read and write
BF20000
trusted library allocation
page read and write
48BA000
heap
page read and write
C350000
unkown
page read and write
7B80000
unkown
page read and write
8D7D000
heap
page read and write
A4AB000
unkown
page read and write
7D70000
unkown
page read and write
7D70000
unkown
page read and write
7D70000
unkown
page read and write
B4D0000
unkown
page read and write
BF30000
heap
page readonly
47B0000
heap
page read and write
8DA0000
unkown
page read and write
419000
unkown
page readonly
CB70000
unkown
page read and write
B4D0000
unkown
page read and write
965C000
stack
page read and write
1F0000
heap
page read and write
3160000
unkown
page read and write
47A9000
heap
page read and write
5561000
heap
page read and write
8E1A000
heap
page read and write
515000
unkown
page readonly
B84D000
heap
page read and write
3460000
unkown
page read and write
8BE7000
heap
page read and write
494F000
heap
page read and write
41C000
unkown
page write copy
4B78000
unkown
page read and write
8C5F000
heap
page read and write
8C70000
unkown
page read and write
54C6000
heap
page read and write
8D58000
heap
page read and write
B772000
heap
page read and write
A491000
unkown
page read and write
87E0000
unkown
page read and write
7D70000
unkown
page read and write
7D70000
unkown
page read and write
7FF5ED9B8000
unkown
page readonly
7D70000
unkown
page read and write
4780000
heap
page read and write
7D70000
unkown
page read and write
3460000
unkown
page read and write
3700000
unkown
page read and write
7F50000
unkown
page read and write
87E0000
unkown
page read and write
8020000
unkown
page read and write
C512000
unkown
page read and write
D5CE000
stack
page read and write
8D50000
heap
page read and write
B4D0000
unkown
page read and write
88EE000
stack
page read and write
7D70000
unkown
page read and write
48C4000
heap
page read and write
47FE000
heap
page read and write
7F50000
unkown
page read and write
FDD1000
unkown
page read and write
47ED000
heap
page read and write
B150000
unkown
page read and write
D54C000
stack
page read and write
49F0000
trusted library allocation
page read and write
7FF5ED76D000
unkown
page readonly
C516000
unkown
page read and write
ABCF000
heap
page read and write
B73D000
heap
page read and write
7F50000
unkown
page read and write
C507000
unkown
page read and write
400000
unkown
page readonly
4774000
heap
page read and write
C350000
unkown
page read and write
7FF5ED265000
unkown
page readonly
7D80000
unkown
page read and write
B7B7000
heap
page read and write
B190000
unkown
page read and write
8DF2000
heap
page read and write
47B6000
heap
page read and write
B4D0000
unkown
page read and write
8E31000
heap
page read and write
4CB0000
unkown
page read and write
3460000
unkown
page read and write
B4D0000
unkown
page read and write
87E0000
unkown
page read and write
7FF5ED714000
unkown
page readonly
7DF4F3051000
unkown
page execute read
3748000
unkown
page read and write
7FF5ED342000
unkown
page readonly
A27F000
stack
page read and write
479E000
heap
page read and write
9F9B000
stack
page read and write
37F9000
unkown
page read and write
3460000
unkown
page read and write
4B07000
heap
page read and write
8BFE000
heap
page read and write
B3DB000
stack
page read and write
37AE000
unkown
page read and write
7D70000
unkown
page read and write
1210000
unkown
page read and write
B4D0000
unkown
page read and write
7976000
unkown
page read and write
B7BA000
heap
page read and write
B7B6000
heap
page read and write
B899000
heap
page read and write
3160000
unkown
page read and write
4C1E000
unkown
page read and write
7C80000
unkown
page read and write
490A000
heap
page read and write
7D70000
unkown
page read and write
8D2A000
heap
page read and write
AB51000
unkown
page read and write
B4D0000
unkown
page read and write
7CD0000
unkown
page read and write
8D5E000
heap
page read and write
B744000
heap
page read and write
A5FE000
heap
page read and write
33C0000
stack
page read and write
B899000
heap
page read and write
9BC0000
unkown
page read and write
C93A000
stack
page read and write
A5B0000
heap
page read and write
A597000
heap
page read and write
8BF000
stack
page read and write
33C0000
unkown
page read and write
4791000
heap
page read and write
8C70000
unkown
page read and write
7D80000
unkown
page read and write
3010000
unkown
page read and write
8D93000
heap
page read and write
3460000
unkown
page read and write
47E1000
heap
page read and write
8C70000
unkown
page read and write
4B60000
heap
page read and write
7D80000
unkown
page read and write
7DD0000
unkown
page read and write
7FFE000
stack
page read and write
4915000
heap
page read and write
7F50000
unkown
page read and write
4BDC000
unkown
page read and write
4929000
heap
page read and write
A11F000
stack
page read and write
B2DE000
stack
page read and write
7FF5ED586000
unkown
page readonly
8EBA000
heap
page read and write
8D62000
heap
page read and write
A0F000
stack
page read and write
There are 2349 hidden memdumps, click here to show them.