IOC Report
VFylJFPzqX.exe

loading gif

Files

File Path
Type
Category
Malicious
VFylJFPzqX.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VFylJFPzqX.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_fe8167436d6db6c6d2c4bed5d6f2d2c06e142845_f78a65ed_9dc28938-91ad-4d68-8a9f-87867cc31365\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4EB8.tmp.dmp
Mini DuMP crash report, 17 streams, Wed Oct 2 16:59:23 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5A23.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5A53.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000012.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000013.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\Windows[2].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\VFylJFPzqX.exe
"C:\Users\user\Desktop\VFylJFPzqX.exe"
malicious
C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
"C:\Users\user\AppData\Local\Temp\AddInProcess32.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\cmmon32.exe
"C:\Windows\SysWOW64\cmmon32.exe"
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\user\AppData\Local\Temp\AddInProcess32.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4084 -s 3228

URLs

Name
IP
Malicious
http://www.mlharquitectura.com/igbn/?kDKH=K36gPXxmOtT7ZhgLXiyek6cbIzcBFal5uRZotzE1UqqTN+uoUurMQ0X06uvOZOdqSzHy&Rl=YTFLi4d0T2
34.149.87.45
malicious
https://powerpoint.office.comer
unknown
http://www.mckinleyint.com/igbn/www.livewey.net
unknown
http://www.123-tecnicos.com/igbn/www.s5agents.com
unknown
http://www.bangunrumahkreasi.comReferer:
unknown
http://www.prolongdogslife.comReferer:
unknown
https://android.notify.windows.com/iOSA4
unknown
http://www.s5agents.com/igbn/www.getrightspt.com
unknown
http://www.webinarcerdaskanindonesia.com/igbn/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
http://www.nftcopyrights.xyzReferer:
unknown
https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
unknown
http://www.itk.world/igbn/www.betmonde396.com
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
http://www.creatingsobriety.comReferer:
unknown
http://www.creatingsobriety.com/igbn/www.rusticramble.online
unknown
http://www.itk.world/igbn/
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://www.freakyressop.xyzReferer:
unknown
https://excel.office.com
unknown
https://www.msn.com/en-us/money/personalfinance/the-big-3-mistakes-financial-advisors-say-that-the-1
unknown
http://www.gbraises.com/igbn/
unknown
http://www.rumblerain.com
unknown
http://www.bangunrumahkreasi.com/igbn/www.freakyressop.xyz
unknown
http://www.livewey.net/igbn/www.freakyressop.xyz
unknown
http://www.noticeupluy.comReferer:
unknown
http://www.azure1224.xyz
unknown
http://www.brasilbikeshopsc.comReferer:
unknown
https://api.msn.com/RV9cu
unknown
http://www.brasilbikeshopsc.com/igbn/
unknown
http://www.mckinleyint.com/igbn/
unknown
http://www.gbraises.com
unknown
https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zeal
unknown
http://www.prolongdogslife.com/igbn/www.enet-insaat.com
unknown
http://www.cargizmos.net/igbn/
unknown
http://www.microsoft.c
unknown
http://www.bangunrumahkreasi.com
unknown
http://www.s5agents.com/igbn/
unknown
http://www.fliptrade.cfd/igbn/
unknown
https://android.notify.windows.com/iOSd
unknown
http://www.history-poker.site
unknown
http://www.monicadenis.com
unknown
https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
unknown
https://www.msn.com/en-us/money/careersandeducation/the-no-1-question-to-ask-in-a-job-interview-acco
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.monicadenis.com/igbn/www.mckinleyint.com
unknown
https://word.office.com
unknown
http://www.creatievecontentpeople.com
unknown
http://www.gbraises.com/igbn/www.bangunrumahkreasi.com
unknown
http://www.rumblerain.com/igbn/
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
http://www.azure1224.xyzReferer:
unknown
https://outlook.comE
unknown
http://www.freakyressop.xyz/igbn/www.rusticramble.online
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
unknown
http://www.creatingsobriety.com
unknown
http://www.history-poker.siteReferer:
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.creatievecontentpeople.com/igbn/www.itk.world
unknown
http://www.history-poker.site/igbn/www.brasilbikeshopsc.com
unknown
https://outlook.com
unknown
http://www.prolongdogslife.com
unknown
http://www.noticeupluy.com
unknown
http://www.enet-insaat.com
unknown
http://www.betmonde396.comReferer:
unknown
http://www.monicadenis.com/igbn/
unknown
http://www.creatievecontentpeople.com/igbn/
unknown
https://android.notify.windows.com/iOS
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
http://www.cargizmos.netReferer:
unknown
http://www.nftcopyrights.xyz/igbn/
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
unknown
http://www.mlharquitectura.com
unknown
http://www.mlharquitectura.com/igbn/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA
unknown
http://www.freakyressop.xyz/igbn/
unknown
https://www.msn.com/en-us/sports/other/washington-state-ad-asks-ncaa-for-compassion-and-understandin
unknown
http://www.freakyressop.xyz/igbn/www.nftcopyrights.xyz
unknown
http://www.azure1224.xyz/igbn/www.musiclessonsandmore.com
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k-dark
unknown
http://www.getrightspt.comReferer:
unknown
https://api.msn.com/v1/news/Feed/Windows?
unknown
http://www.betmonde396.com
unknown
https://api.msn.com/v1/news/Feed/Windows?6i
unknown
http://www.webinarcerdaskanindonesia.com
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
unknown
http://www.livewey.net
unknown
http://www.brasilbikeshopsc.com
unknown
http://www.getrightspt.com
unknown
http://www.musiclessonsandmore.com
unknown
http://www.prolongdogslife.com/igbn/
unknown
http://www.creatievecontentpeople.comReferer:
unknown
https://www.msn.com/en-us/weather/topstories/first-map-of-earth-s-lost-continent-has-been-published/
unknown
http://www.rusticramble.online
unknown
http://www.enet-insaat.comReferer:
unknown
https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
unknown
http://www.livewey.netReferer:
unknown
http://www.webinarcerdaskanindonesia.comReferer:
unknown
https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
brasilbikeshopsc.com
191.252.4.20
malicious
td-ccm-neg-87-45.wixdns.net
34.149.87.45
malicious
www.mlharquitectura.com
unknown
malicious
www.creatievecontentpeople.com
unknown
malicious
www.history-poker.site
unknown
malicious
www.cargizmos.net
unknown
malicious
api.msn.com
unknown
malicious
www.brasilbikeshopsc.com
unknown
malicious

IPs

IP
Domain
Country
Malicious
34.149.87.45
td-ccm-neg-87-45.wixdns.net
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR
KGLToGCSUpdatedRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsStore_8wekyb3d8bbwe\ApplicationFrame\Microsoft.WindowsStore_8wekyb3d8bbwe!App
PreferredMinSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}
DriveNumber
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
TotalBytes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
FreeBytes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Blank Disc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Can Close
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Media Type
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Imapi Media State
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
IsImapiDataBurnSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
IsImapiEraseSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Live FS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Disc Label
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Set
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{a33c736e-61ca-11ee-8c18-806e6f6e6963}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010456
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020450
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000003044A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010438
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010432
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001042E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001042C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010424
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010416
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001040C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000003040A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000002040E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030268
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
PastIconsStream
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
IconStreams
There are 182 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
2571000
trusted library allocation
page read and write
malicious
55F0000
trusted library section
page read and write
malicious
4120000
trusted library allocation
page read and write
malicious
3683000
trusted library allocation
page read and write
malicious
376A000
trusted library allocation
page read and write
malicious
3571000
trusted library allocation
page read and write
malicious
362E000
trusted library allocation
page read and write
malicious
2490000
system
page execute and read and write
malicious
40F0000
unclassified section
page execute and read and write
malicious
267D000
heap
page read and write
4E9C000
heap
page read and write
28AC000
trusted library allocation
page read and write
90BD000
unkown
page read and write
938F000
heap
page read and write
BDCD000
unkown
page read and write
B448000
heap
page read and write
9463000
heap
page read and write
810000
unkown
page readonly
C23F000
stack
page read and write
158000
unkown
page readonly
4CBC000
heap
page read and write
4290000
trusted library allocation
page read and write
43C7000
unkown
page read and write
E80000
heap
page read and write
9577000
heap
page read and write
4F01000
heap
page read and write
7FF503368000
unkown
page readonly
6FE3000
unkown
page read and write
938F000
heap
page read and write
9B83000
unkown
page read and write
C0DE000
unkown
page read and write
701D000
unkown
page read and write
2736000
trusted library allocation
page read and write
9CF4000
unkown
page read and write
9510000
heap
page read and write
2A59000
stack
page read and write
286E000
trusted library allocation
page read and write
7042000
heap
page read and write
7FF503051000
unkown
page readonly
956B000
heap
page read and write
7FF5032DB000
unkown
page readonly
B53E000
heap
page read and write
9318000
unkown
page read and write
9284000
heap
page read and write
295E000
stack
page read and write
C710000
trusted library allocation
page read and write
4DB1000
unkown
page read and write
4378000
unkown
page read and write
4C8F000
heap
page read and write
7DF411ED1000
unkown
page execute read
3088000
unkown
page read and write
B4C7000
heap
page read and write
7FF502EE3000
unkown
page readonly
EB50000
heap
page read and write
7FF502F7A000
unkown
page readonly
B4C7000
heap
page read and write
936E000
unkown
page read and write
943A000
heap
page read and write
C831000
heap
page read and write
75E000
heap
page read and write
9D54000
unkown
page read and write
7710000
unkown
page readonly
7FF503326000
unkown
page readonly
94BF000
heap
page read and write
536000
stack
page read and write
7FF503360000
unkown
page readonly
957F000
heap
page read and write
B475000
heap
page read and write
159A000
stack
page read and write
4A83000
heap
page read and write
29B3000
trusted library allocation
page read and write
3088000
unkown
page read and write
5195000
heap
page read and write
7FF503326000
unkown
page readonly
7FF50303F000
unkown
page readonly
B369000
heap
page read and write
93E0000
heap
page read and write
8EEB000
stack
page read and write
A3B7000
unkown
page read and write
4EC4000
heap
page read and write
26B3000
trusted library allocation
page read and write
BEAF000
unkown
page read and write
12F6000
heap
page read and write
9315000
unkown
page read and write
9459000
heap
page read and write
7FF502E06000
unkown
page readonly
C60000
unkown
page readonly
BE14000
unkown
page read and write
7FF502B9A000
unkown
page readonly
2DC0000
unkown
page read and write
18B9000
direct allocation
page execute and read and write
A32F000
unkown
page read and write
CA91000
heap
page read and write
28D0000
trusted library allocation
page read and write
702D000
unkown
page read and write
26AC000
trusted library allocation
page read and write
4EC4000
heap
page read and write
76E0000
unkown
page readonly
7FF502C9D000
unkown
page readonly
C0CD000
unkown
page read and write
24FD000
trusted library allocation
page read and write
9255000
unkown
page read and write
B4E0000
heap
page read and write
162F000
stack
page read and write
7FF50312D000
unkown
page readonly
7540000
trusted library allocation
page read and write
B53E000
heap
page read and write
954C000
heap
page read and write
CA82000
heap
page read and write
4FA9000
heap
page read and write
938D000
heap
page read and write
7550000
unkown
page read and write
9C8A000
unkown
page read and write
BB8E000
heap
page read and write
3FF1000
heap
page read and write
27AA000
trusted library allocation
page read and write
7FF502D25000
unkown
page readonly
4E65000
heap
page read and write
A346000
unkown
page read and write
333C000
heap
page read and write
7FF5032A5000
unkown
page readonly
4D00000
unkown
page write copy
B362000
heap
page read and write
C17D000
unkown
page read and write
297F000
trusted library allocation
page read and write
A346000
unkown
page read and write
B549000
stack
page read and write
4FA9000
heap
page read and write
BC15000
unkown
page read and write
26E0000
trusted library allocation
page read and write
93F6000
unkown
page read and write
367E000
stack
page read and write
93AB000
heap
page read and write
9A7F000
stack
page read and write
2530000
trusted library allocation
page read and write
C039000
unkown
page read and write
BC21000
unkown
page read and write
C9AA000
heap
page read and write
2814000
trusted library allocation
page read and write
DC0000
heap
page read and write
7FF503223000
unkown
page readonly
9463000
heap
page read and write
2689000
heap
page read and write
2774000
trusted library allocation
page read and write
BFB4000
unkown
page read and write
7FF50334D000
unkown
page readonly
BB0E000
stack
page read and write
B4E3000
heap
page read and write
C0E9000
unkown
page read and write
CA0C000
heap
page read and write
7FF502F96000
unkown
page readonly
377F000
stack
page read and write
9C8A000
unkown
page read and write
BC21000
unkown
page read and write
16C0000
heap
page read and write
9465000
heap
page read and write
29D0000
trusted library allocation
page read and write
4621000
direct allocation
page execute and read and write
B4EF000
heap
page read and write
7FF5030CE000
unkown
page readonly
7043000
unkown
page read and write
954C000
heap
page read and write
7FF503087000
unkown
page readonly
5E50000
trusted library allocation
page execute and read and write
B39A000
heap
page read and write
7FF503277000
unkown
page readonly
243C000
stack
page read and write
7FF502D29000
unkown
page readonly
3091000
unkown
page read and write
9527000
heap
page read and write
91FB000
unkown
page read and write
958D000
heap
page read and write
C8E6000
heap
page read and write
7FF502E43000
unkown
page readonly
9A2000
trusted library allocation
page read and write
27EC000
trusted library allocation
page read and write
37B2000
stack
page read and write
4C87000
heap
page read and write
B4D3000
heap
page read and write
9393000
heap
page read and write
2DA0000
unkown
page readonly
7FF50326B000
unkown
page readonly
BBFA000
unkown
page read and write
6CE000
stack
page read and write
4ECB000
heap
page read and write
A98F000
stack
page read and write
957F000
heap
page read and write
7FF502E8F000
unkown
page readonly
B4D6000
heap
page read and write
7FF502E43000
unkown
page readonly
7FF502C9D000
unkown
page readonly
333F000
heap
page read and write
7FF5030C4000
unkown
page readonly
2904000
trusted library allocation
page read and write
28C7000
trusted library allocation
page read and write
7FF5031C3000
unkown
page readonly
C040000
unkown
page read and write
9379000
heap
page read and write
701F000
unkown
page read and write
9364000
unkown
page read and write
8460000
unkown
page read and write
5ED6000
heap
page read and write
2C80000
unkown
page readonly
7FF502F9F000
unkown
page readonly
939B000
heap
page read and write
C58B000
stack
page read and write
5039000
heap
page read and write
4CFA000
heap
page read and write
9050000
unkown
page read and write
7630000
unkown
page readonly
5AA0000
trusted library section
page readonly
9577000
heap
page read and write
2610000
trusted library allocation
page read and write
9391000
heap
page read and write
B4FA000
heap
page read and write
9237000
unkown
page read and write
7FF5032EE000
unkown
page readonly
B4E0000
heap
page read and write
43B0000
unkown
page read and write
7FF50308A000
unkown
page readonly
5018000
heap
page read and write
2DC0000
unkown
page read and write
3091000
unkown
page read and write
503E000
stack
page read and write
7FF503227000
unkown
page readonly
9454000
heap
page read and write
7FF502FAF000
unkown
page readonly
B4E3000
heap
page read and write
333E000
heap
page read and write
FC14000
unkown
page read and write
D5C000
stack
page read and write
B417000
heap
page read and write
B448000
heap
page read and write
BF7A000
unkown
page read and write
7FF503110000
unkown
page readonly
7FF502CF5000
unkown
page readonly
785000
heap
page read and write
919F000
unkown
page read and write
4EA0000
heap
page read and write
7FF50318B000
unkown
page readonly
7FF50334D000
unkown
page readonly
919F000
unkown
page read and write
4ED3000
heap
page read and write
2683000
heap
page read and write
C50D000
stack
page read and write
7FF502FB4000
unkown
page readonly
C063000
unkown
page read and write
A7ED000
stack
page read and write
B3DE000
heap
page read and write
819F000
stack
page read and write
94A0000
heap
page read and write
12C9000
unclassified section
page execute and read and write
7FF502DD1000
unkown
page readonly
7FF502DCF000
unkown
page readonly
2929000
trusted library allocation
page read and write
2951000
trusted library allocation
page read and write
AF7F000
stack
page read and write
CA1A000
heap
page read and write
CF63000
trusted library allocation
page read and write
8889000
stack
page read and write
2534000
heap
page read and write
4EC2000
heap
page read and write
B4D3000
heap
page read and write
7FF50331B000
unkown
page readonly
9586000
heap
page read and write
B3C9000
heap
page read and write
4EB0000
heap
page read and write
7FF502D10000
unkown
page readonly
9CF4000
unkown
page read and write
B4C7000
heap
page read and write
7DF411EF1000
unkown
page execute read
7630000
unkown
page readonly
4EAD000
heap
page read and write
280E000
trusted library allocation
page read and write
CF50000
trusted library allocation
page read and write
7FF5032F2000
unkown
page readonly
D88A000
stack
page read and write
9D0000
unkown
page read and write
4A80000
heap
page read and write
9CEA000
unkown
page read and write
6FE3000
unkown
page read and write
7FF502D3E000
unkown
page readonly
B417000
heap
page read and write
7FF503347000
unkown
page readonly
7FF5032AF000
unkown
page readonly
C730000
heap
page read and write
192E000
direct allocation
page execute and read and write
7FF502D84000
unkown
page readonly
7FF5031E8000
unkown
page readonly
956B000
heap
page read and write
7FF502D20000
unkown
page readonly
8889000
stack
page read and write
B09B000
stack
page read and write
6E15000
stack
page read and write
4F29000
heap
page read and write
4C84000
heap
page read and write
B4E0000
heap
page read and write
A3B7000
unkown
page read and write
74C2000
unkown
page read and write
7FF503108000
unkown
page readonly
2755000
trusted library allocation
page read and write
7FF5032DF000
unkown
page readonly
5560000
trusted library allocation
page read and write
4E97000
heap
page read and write
2674000
heap
page read and write
795D000
stack
page read and write
D98D000
stack
page read and write
9AFF000
stack
page read and write
2966000
trusted library allocation
page read and write
EB95000
unkown
page read and write
2C70000
unkown
page readonly
279C000
trusted library allocation
page read and write
8A48000
stack
page read and write
93EA000
heap
page read and write
2F20000
unkown
page readonly
9465000
heap
page read and write
B475000
heap
page read and write
8C09000
stack
page read and write
4EB0000
heap
page read and write
957F000
heap
page read and write
BEE6000
unkown
page read and write
274F000
trusted library allocation
page read and write
26B9000
trusted library allocation
page read and write
32FE000
stack
page read and write
2996000
trusted library allocation
page read and write
AB4E000
stack
page read and write
7FF502F86000
unkown
page readonly
7FF503195000
unkown
page readonly
C9C9000
heap
page read and write
2500000
heap
page read and write
B3DB000
heap
page read and write
FD14000
unkown
page read and write
9277000
heap
page read and write
96CC000
stack
page read and write
4EB0000
heap
page read and write
7DF44E650000
trusted library allocation
page readonly
282B000
trusted library allocation
page read and write
172F000
stack
page read and write
9330000
unkown
page read and write
9416000
unkown
page read and write
C9AD000
heap
page read and write
9465000
heap
page read and write
7FF502D15000
unkown
page readonly
B448000
heap
page read and write
749E000
stack
page read and write
4E9C000
heap
page read and write
BBB0000
unkown
page read and write
7470000
unkown
page read and write
9514000
heap
page read and write
2679000
heap
page read and write
936E000
unkown
page read and write
7160000
heap
page read and write
948C000
heap
page read and write
198000
unkown
page readonly
71A3000
heap
page read and write
7FF502D45000
unkown
page readonly
CA76000
heap
page read and write
2893000
trusted library allocation
page read and write
7FF502B88000
unkown
page readonly
9364000
unkown
page read and write
BE14000
unkown
page read and write
30A1000
unkown
page read and write
4431000
unkown
page read and write
93A1000
heap
page read and write
B475000
heap
page read and write
B4E0000
heap
page read and write
947F000
heap
page read and write
2AA0000
unkown
page read and write
94B7000
heap
page read and write
936E000
unkown
page read and write
7FF502FB4000
unkown
page readonly
582D000
heap
page read and write
CA0C000
heap
page read and write
5BB0000
heap
page read and write
93EA000
heap
page read and write
2724000
trusted library allocation
page read and write
7FF503185000
unkown
page readonly
8C8E000
stack
page read and write
9290000
unkown
page read and write
7FF502DAD000
unkown
page readonly
7FF5032FE000
unkown
page readonly
758E000
stack
page read and write
9387000
heap
page read and write
9586000
heap
page read and write
9510000
heap
page read and write
2535000
trusted library allocation
page read and write
43FD000
unkown
page read and write
30B4000
unkown
page read and write
7FF50324D000
unkown
page readonly
4EC4000
heap
page read and write
7FF502CCE000
unkown
page readonly
B3DE000
heap
page read and write
9BCB000
unkown
page read and write
958D000
heap
page read and write
2901000
trusted library allocation
page read and write
96CC000
stack
page read and write
76A0000
unkown
page readonly
7FF503161000
unkown
page readonly
B366000
heap
page read and write
7085000
unkown
page read and write
7FF502B80000
unkown
page readonly
9553000
heap
page read and write
7FF502B93000
unkown
page readonly
C1AB000
unkown
page read and write
2672000
heap
page read and write
2747000
trusted library allocation
page read and write
7FF5026FF000
unkown
page readonly
28E4000
trusted library allocation
page read and write
B4C7000
heap
page read and write
9D01000
unkown
page read and write
7DF411ED0000
unkown
page readonly
9330000
unkown
page read and write
B4E0000
heap
page read and write
9318000
unkown
page read and write
BC19000
unkown
page read and write
BC80000
unkown
page read and write
7FF4ECBF5000
unkown
page readonly
5142000
heap
page read and write
BC0C000
unkown
page read and write
B448000
heap
page read and write
93F6000
unkown
page read and write
7FF502DBC000
unkown
page readonly
4EB3000
heap
page read and write
27BD000
trusted library allocation
page read and write
BDA9000
unkown
page read and write
267D000
heap
page read and write
7FF502EB7000
unkown
page readonly
5A00000
heap
page read and write
4ED3000
heap
page read and write
7FF502D48000
unkown
page readonly
7FF502F94000
unkown
page readonly
9BAA000
unkown
page read and write
931B000
unkown
page read and write
7FF502F22000
unkown
page readonly
4C8B000
heap
page read and write
7CD0000
trusted library allocation
page read and write
7FF503129000
unkown
page readonly
9D6B000
unkown
page read and write
954C000
heap
page read and write
27C7000
trusted library allocation
page read and write
5801000
heap
page read and write
7DF411EF0000
unkown
page readonly
A210000
trusted library allocation
page execute and read and write
6FFC000
heap
page read and write
957F000
heap
page read and write
BDC7000
unkown
page read and write
7DF44E651000
trusted library allocation
page execute read
309D000
unkown
page read and write
2970000
trusted library allocation
page read and write
92FC000
heap
page read and write
B4E3000
heap
page read and write
9D0000
unkown
page read and write
94D4000
heap
page read and write
7FF502CF5000
unkown
page readonly
BEE8000
unkown
page read and write
2590000
heap
page read and write
7FF503185000
unkown
page readonly
94A0000
heap
page read and write
4463000
unkown
page read and write
B4ED000
heap
page read and write
DC6A000
unkown
page read and write
BFF4000
unkown
page read and write
7FF502F66000
unkown
page readonly
2610000
trusted library allocation
page read and write
4350000
direct allocation
page execute and read and write
4405000
unkown
page read and write
C9C6000
heap
page read and write
7FF50303F000
unkown
page readonly
EBAC000
unkown
page read and write
6E15000
stack
page read and write
37B0000
stack
page read and write
3082000
unkown
page read and write
9504000
heap
page read and write
5170000
heap
page read and write
2B58000
stack
page read and write
930000
heap
page read and write
98FC000
stack
page read and write
4CA9000
heap
page read and write
2797000
trusted library allocation
page read and write
5E80000
heap
page read and write
7FF502D6B000
unkown
page readonly
9C09000
unkown
page read and write
CAEA000
heap
page read and write
161000
unkown
page readonly
7FF50335D000
unkown
page readonly
4479000
direct allocation
page execute and read and write
CF53000
trusted library allocation
page read and write
30AC000
unkown
page read and write
4C66000
heap
page read and write
30CD000
unkown
page read and write
1518000
stack
page read and write
94B7000
heap
page read and write
7DF411EE1000
unkown
page execute read
2C80000
unkown
page readonly
7FF502B76000
unkown
page readonly
5860000
heap
page read and write
9577000
heap
page read and write
28A0000
trusted library allocation
page read and write
2A59000
stack
page read and write
9318000
unkown
page read and write
8490000
unkown
page readonly
8596000
unkown
page read and write
2660000
heap
page read and write
3FF1000
heap
page read and write
2610000
trusted library allocation
page read and write
9366000
unkown
page read and write
7FF502E53000
unkown
page readonly
2534000
heap
page read and write
4FC1000
heap
page read and write
7FF502CCE000
unkown
page readonly
7FF5030DE000
unkown
page readonly
7FF5030A5000
unkown
page readonly
7FF502CD4000
unkown
page readonly
4F05000
heap
page read and write
30B4000
unkown
page read and write
9CF2000
unkown
page read and write
9553000
heap
page read and write
94FC000
heap
page read and write
7E7000
heap
page read and write
BFAE000
unkown
page read and write
B5D0000
unkown
page readonly
9399000
heap
page read and write
1F0000
system
page execute and read and write
9454000
heap
page read and write
B237000
stack
page read and write
6F09000
unkown
page read and write
B4BA000
heap
page read and write
7FF502EC2000
unkown
page readonly
7490000
unkown
page read and write
B416000
heap
page read and write
954C000
heap
page read and write
A506000
system
page read and write
4EAD000
heap
page read and write
2983000
trusted library allocation
page read and write
7FF502DC8000
unkown
page readonly
B3EB000
heap
page read and write
CF60000
trusted library allocation
page read and write
2593000
heap
page read and write
59D0000
trusted library allocation
page read and write
954C000
heap
page read and write
7FF503158000
unkown
page readonly
4CD5000
heap
page read and write
91DE000
unkown
page read and write
9253000
heap
page read and write
76E0000
unkown
page readonly
4C87000
heap
page read and write
16B0000
heap
page read and write
704E000
unkown
page read and write
FC96000
unkown
page read and write
2931000
trusted library allocation
page read and write
29CE000
trusted library allocation
page read and write
B368000
heap
page read and write
8E0000
unkown
page readonly
9366000
unkown
page read and write
26E9000
trusted library allocation
page read and write
795D000
stack
page read and write
7FF502CDD000
unkown
page readonly
7FF502D00000
unkown
page readonly
7FF502FB7000
unkown
page readonly
9D58000
unkown
page read and write
26CC000
trusted library allocation
page read and write
9064000
unkown
page read and write
7FF502EBB000
unkown
page readonly
2DF0000
unkown
page read and write
8970000
remote allocation
page read and write
B2BA000
stack
page read and write
BEE6000
unkown
page read and write
29A0000
trusted library allocation
page read and write
43B0000
unkown
page read and write
C9AA000
heap
page read and write
9D58000
unkown
page read and write
93F6000
unkown
page read and write
9C2C000
unkown
page read and write
B4FA000
heap
page read and write
11B0000
heap
page read and write
26E5000
trusted library allocation
page read and write
BEAF000
unkown
page read and write
7470000
unkown
page read and write
A35A000
unkown
page read and write
7FF503055000
unkown
page readonly
7FF50302D000
unkown
page readonly
7FF502E02000
unkown
page readonly
29B9000
trusted library allocation
page read and write
1AE0000
unclassified section
page execute and read and write
7FF502CF2000
unkown
page readonly
307E000
unkown
page read and write
8A48000
stack
page read and write
BE1C000
unkown
page read and write
C9AA000
heap
page read and write
4463000
unkown
page read and write
EB5A000
heap
page read and write
30A3000
unkown
page read and write
9416000
unkown
page read and write
7FF5031DA000
unkown
page readonly
7FF503129000
unkown
page readonly
4A6E000
stack
page read and write
299E000
trusted library allocation
page read and write
B09B000
stack
page read and write
C978000
heap
page read and write
9577000
heap
page read and write
8BC9000
stack
page read and write
CA91000
heap
page read and write
CF90000
trusted library allocation
page read and write
6FE3000
unkown
page read and write
E90000
unkown
page readonly
1091000
unkown
page readonly
7FF502DC8000
unkown
page readonly
B3C5000
heap
page read and write
9BF7000
unkown
page read and write
2550000
trusted library allocation
page read and write
EB9E000
unkown
page read and write
EB50000
heap
page read and write
29D6000
stack
page read and write
B4C7000
heap
page read and write
4EC4000
heap
page read and write
B448000
heap
page read and write
7FF503130000
unkown
page readonly
BC80000
unkown
page read and write
7FF4ECBEF000
unkown
page readonly
B4C7000
heap
page read and write
9BCB000
unkown
page read and write
296E000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page read and write
9451000
heap
page read and write
B4C7000
heap
page read and write
27E8000
trusted library allocation
page read and write
BDA9000
unkown
page read and write
7FF5032DB000
unkown
page readonly
956B000
heap
page read and write
6FDA000
unkown
page read and write
9318000
unkown
page read and write
4ECF000
stack
page read and write
9379000
heap
page read and write
4E83000
heap
page read and write
7FF502F88000
unkown
page readonly
9050000
unkown
page read and write
BBFA000
unkown
page read and write
C866000
heap
page read and write
9514000
heap
page read and write
A28000
heap
page read and write
A20000
heap
page read and write
680000
heap
page read and write
7FF503245000
unkown
page readonly
4ECB000
heap
page read and write
2766000
trusted library allocation
page read and write
941A000
heap
page read and write
7088000
unkown
page read and write
BEA9000
unkown
page read and write
4290000
trusted library allocation
page read and write
43B4000
unkown
page read and write
C9B4000
heap
page read and write
CABB000
heap
page read and write
1F9000
system
page execute and read and write
DE0000
trusted library allocation
page execute and read and write
9BCB000
unkown
page read and write
93CA000
heap
page read and write
24EE000
trusted library allocation
page read and write
7FF502D15000
unkown
page readonly
27DA000
trusted library allocation
page read and write
C019000
unkown
page read and write
A86E000
stack
page read and write
B3DE000
heap
page read and write
9C0000
heap
page read and write
7610000
unkown
page readonly
938B000
heap
page read and write
7FF502D65000
unkown
page readonly
4CCF000
stack
page read and write
CF70000
heap
page read and write
BBE8000
unkown
page read and write
4121000
heap
page read and write
8E40000
unkown
page readonly
4F0E000
heap
page read and write
9290000
heap
page read and write
2AC0000
unkown
page readonly
44EE000
direct allocation
page execute and read and write
B4C7000
heap
page read and write
2887000
trusted library allocation
page read and write
94CC000
heap
page read and write
439000
stack
page read and write
E05A000
stack
page read and write
7DF411F01000
unkown
page execute read
B341000
heap
page read and write
4F87000
heap
page read and write
EB5A000
heap
page read and write
FC9B000
unkown
page read and write
94D2000
heap
page read and write
7FF502F66000
unkown
page readonly
7FF503189000
unkown
page readonly
91FB000
unkown
page read and write
5EAB000
heap
page read and write
B4FA000
heap
page read and write
8070000
unkown
page readonly
2709000
trusted library allocation
page read and write
9A5000
trusted library allocation
page execute and read and write
BC0C000
unkown
page read and write
92D2000
heap
page read and write
24CB000
stack
page read and write
B4ED000
heap
page read and write
276C000
trusted library allocation
page read and write
292F000
trusted library allocation
page read and write
BDF0000
unkown
page read and write
43EA000
unkown
page read and write
990000
trusted library allocation
page read and write
BFEE000
unkown
page read and write
4FE0000
heap
page read and write
90BD000
unkown
page read and write
7DF411EF1000
unkown
page execute read
2BDA000
stack
page read and write
7FF503158000
unkown
page readonly
BEF6000
unkown
page read and write
851E000
stack
page read and write
9330000
unkown
page read and write
7FF502E0D000
unkown
page readonly
B2E000
stack
page read and write
7FF503020000
unkown
page readonly
702D000
unkown
page read and write
5010000
heap
page read and write
518A000
heap
page read and write
8100000
unkown
page readonly
7FF50331F000
unkown
page readonly
9395000
heap
page read and write
2560000
heap
page execute and read and write
1321000
heap
page read and write
C00A000
unkown
page read and write
8AFF000
stack
page read and write
9BE3000
unkown
page read and write
B1CD000
stack
page read and write
2678000
heap
page read and write
566E000
stack
page read and write
7FF50310B000
unkown
page readonly
4FC1000
heap
page read and write
2870000
trusted library allocation
page read and write
2534000
heap
page read and write
B4D3000
heap
page read and write
292B000
trusted library allocation
page read and write
D25E000
stack
page read and write
9FA0000
unkown
page read and write
CA91000
heap
page read and write
7370000
unkown
page read and write
281A000
trusted library allocation
page read and write
3FF1000
heap
page read and write
921E000
heap
page read and write
B78F000
stack
page read and write
8B5000
stack
page read and write
27CE000
trusted library allocation
page read and write
9AFF000
stack
page read and write
8EE000
stack
page read and write
4EB3000
heap
page read and write
7FF502D70000
unkown
page readonly
D59E000
stack
page read and write
B4D6000
heap
page read and write
1A5D000
direct allocation
page execute and read and write
3010000
unkown
page read and write
576D000
stack
page read and write
D78C000
stack
page read and write
7FF502E62000
unkown
page readonly
27AE000
trusted library allocation
page read and write
B5BE000
stack
page read and write
2F9D000
stack
page read and write
27FF000
trusted library allocation
page read and write
2610000
trusted library allocation
page read and write
94CF000
heap
page read and write
7FF502D61000
unkown
page readonly
94FD000
heap
page read and write
7FF5030C9000
unkown
page readonly
104D6000
system
page read and write
2AC0000
unkown
page readonly
9538000
heap
page read and write
CA0C000
heap
page read and write
299A000
trusted library allocation
page read and write
9586000
heap
page read and write
9D58000
unkown
page read and write
BDE0000
unkown
page read and write
B3E0000
heap
page read and write
9553000
heap
page read and write
7FF5032BD000
unkown
page readonly
9237000
unkown
page read and write
B4ED000
heap
page read and write
3088000
unkown
page read and write
5DAD000
stack
page read and write
D80B000
stack
page read and write
7FF502D41000
unkown
page readonly
9586000
heap
page read and write
4F29000
heap
page read and write
7FF503335000
unkown
page readonly
7FF5032DF000
unkown
page readonly
BEAF000
unkown
page read and write
308F000
unkown
page read and write
94C5000
heap
page read and write
7560000
unkown
page readonly
BB9E000
heap
page read and write
2610000
trusted library allocation
page read and write
BC15000
unkown
page read and write
5E85000
heap
page read and write
7FF502F49000
unkown
page readonly
4CB8000
heap
page read and write
5E40000
heap
page read and write
B4ED000
heap
page read and write
4F9E000
heap
page read and write
7FF502B67000
unkown
page readonly
50F2000
heap
page read and write
904F000
stack
page read and write
B4ED000
heap
page read and write
7FF50328B000
unkown
page readonly
7FF50301B000
unkown
page readonly
7FF503167000
unkown
page readonly
7FF5032D7000
unkown
page readonly
9586000
heap
page read and write
9D0D000
unkown
page read and write
4EBE000
heap
page read and write
430E000
stack
page read and write
80FB000
stack
page read and write
50B0000
heap
page read and write
938B000
heap
page read and write
4CA9000
heap
page read and write
271B000
trusted library allocation
page read and write
29CC000
trusted library allocation
page read and write
2610000
trusted library allocation
page read and write
2711000
trusted library allocation
page read and write
9BAA000
unkown
page read and write
30CD000
unkown
page read and write
7FF503257000
unkown
page readonly
2704000
trusted library allocation
page read and write
7FF502B76000
unkown
page readonly
5560000
trusted library allocation
page read and write
273A000
trusted library allocation
page read and write
BBE8000
unkown
page read and write
8600000
heap
page read and write
7A60000
unkown
page read and write
B4D6000
heap
page read and write
BB0E000
stack
page read and write
7FF503126000
unkown
page readonly
B4C7000
heap
page read and write
3310000
heap
page read and write
B5F0000
unkown
page readonly
BDE0000
unkown
page read and write
BC21000
unkown
page read and write
7FF50317C000
unkown
page readonly
281E000
trusted library allocation
page read and write
28D2000
trusted library allocation
page read and write
CA8A000
heap
page read and write
938F000
heap
page read and write
27F9000
trusted library allocation
page read and write
4378000
unkown
page read and write
958D000
heap
page read and write
7FF50323B000
unkown
page readonly
9586000
heap
page read and write
29A4000
trusted library allocation
page read and write
3067000
unkown
page read and write
8600000
heap
page read and write
58BE000
stack
page read and write
29B5000
trusted library allocation
page read and write
7FF503087000
unkown
page readonly
BC27000
unkown
page read and write
44B0000
unkown
page read and write
28FD000
trusted library allocation
page read and write
7FF502B8B000
unkown
page readonly
9191000
unkown
page read and write
7FF502D3E000
unkown
page readonly
4E71000
heap
page read and write
54DF000
stack
page read and write
283E000
trusted library allocation
page read and write
4370000
unkown
page read and write
9538000
heap
page read and write
7FF502F6A000
unkown
page readonly
BEA3000
unkown
page read and write
7FF50317C000
unkown
page readonly
B4D3000
heap
page read and write
7549000
stack
page read and write
B4ED000
heap
page read and write
4F29000
heap
page read and write
B448000
heap
page read and write
7720000
unkown
page readonly
24D4000
trusted library allocation
page read and write
27C1000
trusted library allocation
page read and write
7FF502F47000
unkown
page readonly
B33A000
stack
page read and write
7FF502D10000
unkown
page readonly
7FF50335D000
unkown
page readonly
997F000
stack
page read and write
9538000
heap
page read and write
B417000
heap
page read and write
BC27000
unkown
page read and write
DD8C000
stack
page read and write
EB9D000
unkown
page read and write
6FBF000
unkown
page read and write
A35A000
unkown
page read and write
2A60000
unkown
page readonly
2520000
trusted library allocation
page read and write
7FF503335000
unkown
page readonly
C8D7000
heap
page read and write
9364000
unkown
page read and write
B4D3000
heap
page read and write
4EBE000
heap
page read and write
7FF502E53000
unkown
page readonly
B53E000
heap
page read and write
7FF502D70000
unkown
page readonly
26FE000
trusted library allocation
page read and write
B010000
unkown
page read and write
918D000
unkown
page read and write
595000
heap
page read and write
2DA0000
unkown
page readonly
B4BA000
heap
page read and write
B448000
heap
page read and write
6FD7000
heap
page read and write
9510000
heap
page read and write
2EF2000
stack
page read and write
7FF503216000
unkown
page readonly
AE0000
heap
page read and write
7FF5031FF000
unkown
page readonly
7FF502F49000
unkown
page readonly
94A7000
heap
page read and write
283A000
trusted library allocation
page read and write
7FF502FA2000
unkown
page readonly
964E000
stack
page read and write
7FF503167000
unkown
page readonly
942C000
heap
page read and write
7FF502EC2000
unkown
page readonly
BC19000
unkown
page read and write
CB1B000
heap
page read and write
7FF502CFA000
unkown
page readonly
954C000
heap
page read and write
43FD000
unkown
page read and write
AA0B000
stack
page read and write
7FF502F5E000
unkown
page readonly
7FF5032EB000
unkown
page readonly
9429000
heap
page read and write
7046000
unkown
page read and write
2678000
heap
page read and write
DD0E000
stack
page read and write
7DF44E640000
trusted library allocation
page readonly
4EB8000
heap
page read and write
7FF502B7D000
unkown
page readonly
7FF502C2E000
unkown
page readonly
9391000
heap
page read and write
136000
unkown
page readonly
7FF502E0A000
unkown
page readonly
C03D000
stack
page read and write
C8DD000
heap
page read and write
7FF503245000
unkown
page readonly
9209000
heap
page read and write
8100000
unkown
page readonly
B4ED000
heap
page read and write
974000
trusted library allocation
page read and write
4EC0000
heap
page read and write
10350000
unkown
page execute and read and write
957F000
heap
page read and write
C9EF000
heap
page read and write
BF2E000
unkown
page read and write
9352000
heap
page read and write
27B0000
trusted library allocation
page read and write
7DF411EE0000
unkown
page readonly
8F0000
heap
page read and write
27EA000
trusted library allocation
page read and write
CADD000
heap
page read and write
7FF502B93000
unkown
page readonly
35CE000
stack
page read and write
9416000
unkown
page read and write
800000
unkown
page readonly
94B3000
heap
page read and write
8B5000
stack
page read and write
BDF5000
unkown
page read and write
BC5C000
unkown
page read and write
A34F000
unkown
page read and write
4EBE000
heap
page read and write
D1AC000
stack
page read and write
91DA000
heap
page read and write
C0B5000
unkown
page read and write
B4E3000
heap
page read and write
92000
unkown
page readonly
30AC000
unkown
page read and write
91A7000
unkown
page read and write
106CF000
system
page read and write
4E9C000
heap
page read and write
B4FA000
heap
page read and write
7FF5030FF000
unkown
page readonly
7480000
unkown
page read and write
E30000
unkown
page read and write
D90C000
stack
page read and write
A34A000
unkown
page read and write
7FF5032BD000
unkown
page readonly
7FF5030A3000
unkown
page readonly
98FB000
stack
page read and write
4692000
direct allocation
page execute and read and write
98D000
trusted library allocation
page execute and read and write
7FF502DAD000
unkown
page readonly
7FF503006000
unkown
page readonly
9BF7000
unkown
page read and write
7DF411F11000
unkown
page execute read
2534000
heap
page read and write
7FF502DB3000
unkown
page readonly
9486000
heap
page read and write
9416000
unkown
page read and write
30A5000
unkown
page read and write
6ED0000
unkown
page read and write
7FF502F8A000
unkown
page readonly
B4E3000
heap
page read and write
4F29000
heap
page read and write
C8FC000
heap
page read and write
7FF502C4B000
unkown
page readonly
9A7F000
stack
page read and write
BDCB000
unkown
page read and write
B4D6000
heap
page read and write
956B000
heap
page read and write
7FF502D18000
unkown
page readonly
B417000
heap
page read and write
B4D6000
heap
page read and write
7FF50331B000
unkown
page readonly
8BC9000
stack
page read and write
7FF503118000
unkown
page readonly
9CF6000
unkown
page read and write
9B9F000
unkown
page read and write
309F000
unkown
page read and write
7FF502D8F000
unkown
page readonly
59BD000
stack
page read and write
3FFE000
heap
page read and write
5620000
trusted library allocation
page execute and read and write
7120000
trusted library allocation
page read and write
ABCB000
stack
page read and write
997F000
stack
page read and write
76A0000
unkown
page readonly
28F5000
trusted library allocation
page read and write
9B8A000
unkown
page read and write
D0AD000
stack
page read and write
4E66000
heap
page read and write
BC19000
unkown
page read and write
E50000
unkown
page readonly
2960000
trusted library allocation
page read and write
803F000
unkown
page read and write
876B000
stack
page read and write
294F000
trusted library allocation
page read and write
13BC000
heap
page read and write
B4EF000
heap
page read and write
5105000
heap
page read and write
B560000
unkown
page read and write
4C8B000
heap
page read and write
9BE6000
unkown
page read and write
363F000
unkown
page read and write
EB60000
unkown
page read and write
7FF502B7F000
unkown
page readonly
C9B6000
heap
page read and write
7FF502D1B000
unkown
page readonly
B53E000
heap
page read and write
7FF502D8F000
unkown
page readonly
9454000
heap
page read and write
7FF502E02000
unkown
page readonly
4431000
unkown
page read and write
B580000
unkown
page read and write
BDF0000
unkown
page read and write
9387000
heap
page read and write
B448000
heap
page read and write
551E000
stack
page read and write
957F000
heap
page read and write
7FF503360000
unkown
page readonly
9D6B000
unkown
page read and write
4CC3000
heap
page read and write
7FF502E9C000
unkown
page readonly
4F3F000
heap
page read and write
7FF502D68000
unkown
page readonly
4CFA000
heap
page read and write
9B87000
unkown
page read and write
9577000
heap
page read and write
7FF502B48000
unkown
page readonly
7FF5032C0000
unkown
page readonly
DE5C000
stack
page read and write
7FF502F7A000
unkown
page readonly
7FF502E1A000
unkown
page readonly
2715000
trusted library allocation
page read and write
CAB5000
heap
page read and write
6F90000
heap
page read and write
B417000
heap
page read and write
C0BC000
stack
page read and write
49EE000
stack
page read and write
9190000
heap
page read and write
7FF5030A5000
unkown
page readonly
C937000
heap
page read and write
919C000
unkown
page read and write
C9C6000
heap
page read and write
9508000
heap
page read and write
4D09000
heap
page read and write
BC30000
unkown
page read and write
3FE0000
heap
page read and write
117E000
stack
page read and write
7FF503223000
unkown
page readonly
267D000
heap
page read and write
1A41000
direct allocation
page execute and read and write
7FF502F47000
unkown
page readonly
93BE000
heap
page read and write
9BF7000
unkown
page read and write
4290000
trusted library allocation
page read and write
9F1000
unkown
page readonly
7FF502B88000
unkown
page readonly
9557000
heap
page read and write
50D8000
heap
page read and write
4EB3000
heap
page read and write
9381000
heap
page read and write
4CAF000
heap
page read and write
7A58000
stack
page read and write
B3DB000
heap
page read and write
1290000
heap
page read and write
7FF502E1A000
unkown
page readonly
7FF502C8C000
unkown
page readonly
CA75000
heap
page read and write
99FF000
stack
page read and write
BFB9000
unkown
page read and write
C92D000
heap
page read and write
90000
unkown
page readonly
7FF503189000
unkown
page readonly
B4FA000
heap
page read and write
43EA000
unkown
page read and write
461D000
direct allocation
page execute and read and write
800000
unkown
page readonly
7FF502EF3000
unkown
page readonly
16B3000
heap
page read and write
4F9C000
heap
page read and write
943A000
heap
page read and write
6EE6000
unkown
page read and write
B4FA000
heap
page read and write
9501000
heap
page read and write
284C000
trusted library allocation
page read and write
4F06000
heap
page read and write
83E0000
trusted library section
page readonly
8610000
unkown
page read and write
5018000
heap
page read and write
BBFA000
unkown
page read and write
7710000
unkown
page readonly
7090000
trusted library allocation
page read and write
BDCD000
unkown
page read and write
466D000
stack
page read and write
B4EF000
heap
page read and write
7FF502C4B000
unkown
page readonly
7543000
trusted library allocation
page read and write
2534000
heap
page read and write
6ECE000
unkown
page read and write
A1F2000
trusted library allocation
page read and write
1275000
stack
page read and write
C8ED000
heap
page read and write
307E000
unkown
page read and write
AF80000
unkown
page read and write
555F000
stack
page read and write
433E000
heap
page read and write
AA8D000
stack
page read and write
2A90000
unkown
page readonly
9D60000
unkown
page read and write
8970000
remote allocation
page read and write
3099000
unkown
page read and write
BE99000
unkown
page read and write
9B87000
unkown
page read and write
6EB0000
unkown
page read and write
8B7E000
stack
page read and write
7FF5032AF000
unkown
page readonly
7FF5032F7000
unkown
page readonly
28CD000
trusted library allocation
page read and write
B4E0000
heap
page read and write
2885000
trusted library allocation
page read and write
50EF000
heap
page read and write
4E92000
heap
page read and write
BC08000
unkown
page read and write
B475000
heap
page read and write
5039000
heap
page read and write
938D000
heap
page read and write
7FF5030FF000
unkown
page readonly
4E47000
stack
page read and write
7FF502C30000
unkown
page readonly
272E000
trusted library allocation
page read and write
7FF5030E6000
unkown
page readonly
7FF50328F000
unkown
page readonly
7FF50327C000
unkown
page readonly
BDC7000
unkown
page read and write
4CC6000
heap
page read and write
7FF503298000
unkown
page readonly
7FF502EB7000
unkown
page readonly
AD0000
trusted library allocation
page read and write
7FF502B48000
unkown
page readonly
7FF5031C3000
unkown
page readonly
4EC0000
heap
page read and write
9C2C000
unkown
page read and write
C1D1000
unkown
page read and write
94C5000
heap
page read and write
7FF502D20000
unkown
page readonly
958D000
heap
page read and write
2981000
trusted library allocation
page read and write
BD6C000
unkown
page read and write
91FB000
unkown
page read and write
7FF5030C4000
unkown
page readonly
2EF2000
stack
page read and write
93F6000
unkown
page read and write
7FF502D91000
unkown
page readonly
2741000
trusted library allocation
page read and write
79DE000
stack
page read and write
57B0000
heap
page read and write
9B83000
unkown
page read and write
7FF502D29000
unkown
page readonly
9CEA000
unkown
page read and write
796000
heap
page read and write
7FF502FA2000
unkown
page readonly
E3CF000
stack
page read and write
2590000
heap
page read and write
B4BA000
heap
page read and write
BFB9000
unkown
page read and write
7FF502DC3000
unkown
page readonly
956B000
heap
page read and write
BBE8000
unkown
page read and write
C39C000
system
page execute and read and write
BB83000
heap
page read and write
AA0B000
stack
page read and write
9508000
heap
page read and write
9219000
heap
page read and write
93BE000
heap
page read and write
B4E0000
heap
page read and write
4ECB000
heap
page read and write
902D000
stack
page read and write
264D000
trusted library allocation
page read and write
7FF502D65000
unkown
page readonly
AFD5000
heap
page read and write
D49D000
stack
page read and write
3023000
unkown
page read and write
B4EF000
heap
page read and write
5560000
trusted library allocation
page read and write
27E2000
trusted library allocation
page read and write
7FF5026F7000
unkown
page readonly
7FF502FA9000
unkown
page readonly
B1BF000
stack
page read and write
94D4000
heap
page read and write
C0CD000
unkown
page read and write
7FF503231000
unkown
page readonly
C60000
unkown
page readonly
7FF503032000
unkown
page readonly
7FF50324D000
unkown
page readonly
33A9000
stack
page read and write
7FF50323B000
unkown
page readonly
7FF503298000
unkown
page readonly
C8C4000
heap
page read and write
7FF502D33000
unkown
page readonly
B53E000
heap
page read and write
941B000
heap
page read and write
26DD000
trusted library allocation
page read and write
CABE000
heap
page read and write
81B8000
stack
page read and write
DFD5000
stack
page read and write
1338000
heap
page read and write
B4D6000
heap
page read and write
2801000
trusted library allocation
page read and write
9E73000
trusted library allocation
page read and write
CF30000
trusted library allocation
page read and write
3086000
unkown
page read and write
6EF3000
unkown
page read and write
7FF502EF7000
unkown
page readonly
7FF503114000
unkown
page readonly
7FF502EE3000
unkown
page readonly
6ED0000
unkown
page read and write
B560000
unkown
page read and write
C6D0000
trusted library allocation
page read and write
9D03000
unkown
page read and write
27C3000
trusted library allocation
page read and write
C1BE000
stack
page read and write
9191000
unkown
page read and write
C60D000
stack
page read and write
7580000
unkown
page read and write
28E2000
trusted library allocation
page read and write
7FF502B67000
unkown
page readonly
247C000
stack
page read and write
7FF503287000
unkown
page readonly
3099000
unkown
page read and write
C720000
heap
page readonly
EBA6000
unkown
page read and write
2EF0000
stack
page read and write
9511000
heap
page read and write
5A10000
trusted library allocation
page read and write
4EBE000
heap
page read and write
7FF5030E4000
unkown
page readonly
BEE8000
unkown
page read and write
7FF5032EE000
unkown
page readonly
B4BA000
heap
page read and write
9BE3000
unkown
page read and write
E30000
unkown
page read and write
9CF2000
unkown
page read and write
C699000
stack
page read and write
3529000
stack
page read and write
2953000
trusted library allocation
page read and write
7FF503118000
unkown
page readonly
2821000
trusted library allocation
page read and write
B2BA000
stack
page read and write
4FC1000
heap
page read and write
B4D3000
heap
page read and write
4D00000
unkown
page write copy
2936000
trusted library allocation
page read and write
B1BF000
stack
page read and write
6EE4000
unkown
page read and write
2683000
heap
page read and write
5A50000
trusted library allocation
page read and write
7FF4ECBF5000
unkown
page readonly
710000
heap
page read and write
94CD000
heap
page read and write
9CF2000
unkown
page read and write
936E000
unkown
page read and write
2540000
trusted library allocation
page read and write
B4EF000
heap
page read and write
4EB8000
heap
page read and write
7FF502B8B000
unkown
page readonly
B4ED000
heap
page read and write
BFEE000
unkown
page read and write
2749000
trusted library allocation
page read and write
7FF502FA9000
unkown
page readonly
24F1000
trusted library allocation
page read and write
3010000
unkown
page read and write
50F5000
heap
page read and write
4370000
unkown
page read and write
2C70000
unkown
page readonly
7FF503270000
unkown
page readonly
5A20000
trusted library allocation
page execute and read and write
7FF502E62000
unkown
page readonly
7DF411ED1000
unkown
page execute read
5146000
heap
page read and write
CA05000
heap
page read and write
929C000
heap
page read and write
4435000
unkown
page read and write
A364000
unkown
page read and write
7FF50302D000
unkown
page readonly
5EC1000
heap
page read and write
93A5000
heap
page read and write
EBC2000
unkown
page read and write
2F10000
unkown
page readonly
7FF503055000
unkown
page readonly
2AA0000
unkown
page read and write
9366000
unkown
page read and write
9577000
heap
page read and write
CA7E000
heap
page read and write
B570000
unkown
page read and write
4A70000
trusted library allocation
page read and write
819F000
stack
page read and write
954C000
heap
page read and write
1BF8000
unclassified section
page execute and read and write
725000
heap
page read and write
B009000
stack
page read and write
9330000
unkown
page read and write
29C2000
trusted library allocation
page read and write
2534000
heap
page read and write
10EA0000
system
page execute and read and write
2FF0000
heap
page read and write
5A0000
heap
page read and write
2B58000
stack
page read and write
51A2000
heap
page read and write
27E6000
trusted library allocation
page read and write
BEA3000
unkown
page read and write
A367000
unkown
page read and write
9352000
heap
page read and write
B24E000
stack
page read and write
953E000
heap
page read and write
4EA0000
heap
page read and write
299C000
trusted library allocation
page read and write
29BB000
trusted library allocation
page read and write
7C6E000
stack
page read and write
C172000
unkown
page read and write
6E99000
stack
page read and write
6F30000
unkown
page read and write
94E5000
heap
page read and write
28DE000
trusted library allocation
page read and write
97D000
trusted library allocation
page execute and read and write
29E6000
trusted library allocation
page read and write
6F0000
heap
page read and write
4EBC000
heap
page read and write
26F0000
trusted library allocation
page read and write
941B000
heap
page read and write
242E000
stack
page read and write
BE14000
unkown
page read and write
AEB000
heap
page read and write
12D9000
heap
page read and write
B4D3000
heap
page read and write
4FE0000
heap
page read and write
C8B7000
heap
page read and write
6EE1000
unkown
page read and write
7FF502D48000
unkown
page readonly
9D03000
unkown
page read and write
4398000
unkown
page read and write
29D6000
stack
page read and write
BDCD000
unkown
page read and write
B590000
heap
page read and write
7FF5030AA000
unkown
page readonly
CA79000
heap
page read and write
702D000
unkown
page read and write
91DE000
unkown
page read and write
2534000
heap
page read and write
BC80000
unkown
page read and write
C0FD000
unkown
page read and write
7FF50328B000
unkown
page readonly
4EBC000
heap
page read and write
C16F000
unkown
page read and write
B3A5000
heap
page read and write
DE0E000
stack
page read and write
77FE000
stack
page read and write
BDF5000
unkown
page read and write
704B000
unkown
page read and write
BDD5000
unkown
page read and write
7840000
unkown
page read and write
CA89000
heap
page read and write
931B000
unkown
page read and write
B4EF000
heap
page read and write
2593000
heap
page read and write
B3D9000
heap
page read and write
7FF502B7D000
unkown
page readonly
BDCB000
unkown
page read and write
9463000
heap
page read and write
28E8000
trusted library allocation
page read and write
A32F000
unkown
page read and write
B4E3000
heap
page read and write
30AC000
unkown
page read and write
7FF502DB3000
unkown
page readonly
27DC000
trusted library allocation
page read and write
7FF5032CF000
unkown
page readonly
6ED9000
unkown
page read and write
7FF5032A5000
unkown
page readonly
7609000
stack
page read and write
BDA9000
unkown
page read and write
7FFB000
stack
page read and write
C7E5000
heap
page read and write
7FF502B4C000
unkown
page readonly
EBAC000
unkown
page read and write
7FF503151000
unkown
page readonly
7FF502F94000
unkown
page readonly
4398000
unkown
page read and write
9366000
unkown
page read and write
9508000
heap
page read and write
BCA0000
unkown
page read and write
953E000
heap
page read and write
8D48000
stack
page read and write
4EFB000
heap
page read and write
947F000
heap
page read and write
BFAE000
unkown
page read and write
10468000
unkown
page execute and read and write
7FF5032F2000
unkown
page readonly
4F30000
heap
page execute and read and write
9364000
unkown
page read and write
BC5C000
unkown
page read and write
CF40000
trusted library allocation
page read and write
4EF3000
heap
page read and write
2734000
trusted library allocation
page read and write
70A0000
heap
page read and write
9381000
heap
page read and write
EBC2000
unkown
page read and write
7FF5031DE000
unkown
page readonly
7FF5030DE000
unkown
page readonly
7FF502C30000
unkown
page readonly
9553000
heap
page read and write
B475000
heap
page read and write
9577000
heap
page read and write
2DB0000
unkown
page read and write
B53E000
heap
page read and write
41A0000
heap
page read and write
4C68000
heap
page read and write
B4D3000
heap
page read and write
9BA2000
unkown
page read and write
7FF502DB8000
unkown
page readonly
A34D000
unkown
page read and write
9330000
unkown
page read and write
284A000
trusted library allocation
page read and write
7FF503155000
unkown
page readonly
7FF502F8A000
unkown
page readonly
8460000
unkown
page read and write
7FF50308A000
unkown
page readonly
C056000
unkown
page read and write
7FF5030E6000
unkown
page readonly
953E000
heap
page read and write
7FF503354000
unkown
page readonly
7FF503239000
unkown
page readonly
6ECB000
unkown
page read and write
7FF502DD3000
unkown
page readonly
B475000
heap
page read and write
D32D000
stack
page read and write
AFD0000
heap
page read and write
2678000
heap
page read and write
CC2000
unkown
page readonly
9237000
unkown
page read and write
B475000
heap
page read and write
B1B000
heap
page read and write
954C000
heap
page read and write
9277000
heap
page read and write
C2BE000
stack
page read and write
957F000
heap
page read and write
745E000
stack
page read and write
30A1000
unkown
page read and write
DB8D000
stack
page read and write
7FF503082000
unkown
page readonly
AAA0000
unkown
page readonly
28F1000
trusted library allocation
page read and write
322A000
stack
page read and write
7FF502F86000
unkown
page readonly
3099000
unkown
page read and write
3082000
unkown
page read and write
9510000
heap
page read and write
5A5D000
trusted library allocation
page read and write
83BA000
stack
page read and write
A2F0000
unkown
page read and write
B4D6000
heap
page read and write
353E000
unkown
page read and write
CA09000
heap
page read and write
2534000
heap
page read and write
9463000
heap
page read and write
9BE3000
unkown
page read and write
4E92000
heap
page read and write
267D000
heap
page read and write
7FF5031AD000
unkown
page readonly
9586000
heap
page read and write
51AD000
heap
page read and write
42CD000
heap
page read and write
4EB0000
heap
page read and write
8FAF000
stack
page read and write
C10000
unkown
page readonly
7FF50327C000
unkown
page readonly
4CAF000
heap
page read and write
7FF5030D9000
unkown
page readonly
7FF502E60000
unkown
page readonly
27A8000
trusted library allocation
page read and write
B14D000
stack
page read and write
B4EF000
heap
page read and write
30A1000
unkown
page read and write
7DF44E671000
trusted library allocation
page execute read
9CEA000
unkown
page read and write
6FBF000
unkown
page read and write
7FF502E9C000
unkown
page readonly
BB40000
heap
page read and write
3330000
heap
page read and write
4405000
unkown
page read and write
309F000
unkown
page read and write
939D000
heap
page read and write
5780000
heap
page read and write
C2E000
stack
page read and write
6EC0000
unkown
page read and write
4C10000
heap
page read and write
50B6000
heap
page read and write
94CF000
heap
page read and write
2560000
unkown
page read and write
9B70000
unkown
page read and write
2534000
heap
page read and write
7FF502D68000
unkown
page readonly
7FF5030B4000
unkown
page readonly
4EA4000
heap
page read and write
44D0000
unkown
page read and write
9AB000
trusted library allocation
page execute and read and write
C0BD000
unkown
page read and write
9C09000
unkown
page read and write
94C0000
heap
page read and write
BC30000
unkown
page read and write
7FF502E3F000
unkown
page readonly
12EE000
heap
page read and write
73C0000
trusted library allocation
page execute and read and write
94C5000
heap
page read and write
92E000
stack
page read and write
B3B4000
heap
page read and write
10FA2000
system
page execute and read and write
3091000
unkown
page read and write
7FF502CD4000
unkown
page readonly
6EE1000
unkown
page read and write
373A000
stack
page read and write
7FF502FAF000
unkown
page readonly
9577000
heap
page read and write
2BDA000
stack
page read and write
2846000
trusted library allocation
page read and write
A8EA000
stack
page read and write
28B8000
trusted library allocation
page read and write
B4BA000
heap
page read and write
E90000
unkown
page readonly
3900000
heap
page read and write
B4BA000
heap
page read and write
CA85000
heap
page read and write
C8A0000
heap
page read and write
110000
unkown
page readonly
C9AA000
heap
page read and write
5039000
heap
page read and write
7FF502DB8000
unkown
page readonly
B4BA000
heap
page read and write
4C84000
heap
page read and write
B4FA000
heap
page read and write
4E88000
heap
page read and write
94B3000
heap
page read and write
EBAC000
unkown
page read and write
B3C5000
heap
page read and write
5E70000
trusted library allocation
page execute and read and write
C959000
heap
page read and write
7FF503235000
unkown
page readonly
2510000
trusted library allocation
page read and write
7FF50322D000
unkown
page readonly
9191000
unkown
page read and write
7DF411EF0000
unkown
page readonly
4EBC000
heap
page read and write
90DA000
unkown
page read and write
4E97000
heap
page read and write
26D0000
trusted library allocation
page read and write
4435000
unkown
page read and write
A2F0000
unkown
page read and write
9235000
heap
page read and write
992000
trusted library allocation
page read and write
9504000
heap
page read and write
E85000
heap
page read and write
A35A000
unkown
page read and write
931B000
unkown
page read and write
26EB000
trusted library allocation
page read and write
1690000
trusted library allocation
page read and write
CA1A000
heap
page read and write
7FF503347000
unkown
page readonly
4CB6000
heap
page read and write
9BE6000
unkown
page read and write
9BAA000
unkown
page read and write
79D000
heap
page read and write
7FF5031E8000
unkown
page readonly
C48000
heap
page read and write
9488000
heap
page read and write
B3B7000
heap
page read and write
C90D000
heap
page read and write
439B000
unkown
page read and write
BC15000
unkown
page read and write
CC0000
unkown
page readonly
9538000
heap
page read and write
342F000
stack
page read and write
B475000
heap
page read and write
9CF6000
unkown
page read and write
4F1F000
heap
page read and write
2560000
unkown
page read and write
272A000
trusted library allocation
page read and write
90DA000
unkown
page read and write
7FF502D9D000
unkown
page readonly
7FF502D25000
unkown
page readonly
B340000
heap
page read and write
294D000
trusted library allocation
page read and write
5163000
heap
page read and write
4EC2000
heap
page read and write
BCA0000
unkown
page read and write
2A90000
unkown
page readonly
9194000
heap
page read and write
4DCF000
stack
page read and write
7FF5031BC000
unkown
page readonly
2761000
trusted library allocation
page read and write
7FF5030C9000
unkown
page readonly
7FF5026FF000
unkown
page readonly
EBAA000
unkown
page read and write
4CC3000
heap
page read and write
C13B000
stack
page read and write
268B000
heap
page read and write
4EAD000
heap
page read and write
6FE000
heap
page read and write
4EE3000
heap
page read and write
2889000
trusted library allocation
page read and write
4F05000
heap
page read and write
282D000
trusted library allocation
page read and write
B237000
stack
page read and write
7FF502E0A000
unkown
page readonly
4EB8000
heap
page read and write
9D54000
unkown
page read and write
B709000
stack
page read and write
9B70000
unkown
page read and write
2534000
heap
page read and write
4EC2000
heap
page read and write
9366000
unkown
page read and write
7FF5031B7000
unkown
page readonly
E85000
heap
page read and write
2702000
trusted library allocation
page read and write
6EE6000
unkown
page read and write
9379000
heap
page read and write
4EC2000
heap
page read and write
B4BA000
heap
page read and write
1AD8000
direct allocation
page execute and read and write
CF50000
trusted library allocation
page read and write
C90D000
heap
page read and write
E1EE000
stack
page read and write
7FF5030B4000
unkown
page readonly
DA8D000
stack
page read and write
292D000
trusted library allocation
page read and write
C15C000
unkown
page read and write
C8F3000
heap
page read and write
7FF502CDD000
unkown
page readonly
C1C9000
unkown
page read and write
290E000
trusted library allocation
page read and write
BC55000
unkown
page read and write
26B1000
trusted library allocation
page read and write
5ED9000
heap
page read and write
4402000
unkown
page read and write
4ED0000
trusted library allocation
page read and write
4F86000
heap
page read and write
309F000
unkown
page read and write
C155000
unkown
page read and write
7FF502F6A000
unkown
page readonly
512A000
heap
page read and write
7FF5032C0000
unkown
page readonly
5AB0000
heap
page read and write
7490000
unkown
page read and write
B53E000
heap
page read and write
B4BA000
heap
page read and write
2895000
trusted library allocation
page read and write
7FF502D9D000
unkown
page readonly
40F0000
trusted library allocation
page read and write
7DF411EE1000
unkown
page execute read
CA82000
heap
page read and write
43AC000
unkown
page read and write
3880000
heap
page read and write
E50000
unkown
page readonly
90BD000
unkown
page read and write
7FF503206000
unkown
page readonly
2534000
heap
page read and write
9092000
unkown
page read and write
CFA0000
trusted library allocation
page read and write
7FF5032FE000
unkown
page readonly
A20000
heap
page read and write
7FF502DD3000
unkown
page readonly
4ED3000
heap
page read and write
5018000
heap
page read and write
9CF6000
unkown
page read and write
7FF502E06000
unkown
page readonly
7FF5026F7000
unkown
page readonly
851C000
stack
page read and write
28A6000
trusted library allocation
page read and write
B4BA000
heap
page read and write
BC0C000
unkown
page read and write
B448000
heap
page read and write
9553000
heap
page read and write
A34A000
unkown
page read and write
CA91000
heap
page read and write
B5F0000
unkown
page readonly
C0FD000
unkown
page read and write
94A4000
heap
page read and write
8E0000
unkown
page readonly
4E92000
heap
page read and write
7FF50270A000
unkown
page readonly
6FBF000
unkown
page read and write
7560000
unkown
page readonly
2795000
trusted library allocation
page read and write
BD6C000
unkown
page read and write
4E33000
unkown
page read and write
B4D6000
heap
page read and write
B590000
heap
page read and write
94FC000
heap
page read and write
10F7D000
system
page execute and read and write
7FF502F5E000
unkown
page readonly
3FF0000
heap
page read and write
8440000
unkown
page read and write
267D000
heap
page read and write
113E000
stack
page read and write
30A5000
unkown
page read and write
79DE000
stack
page read and write
B4D6000
heap
page read and write
24F6000
trusted library allocation
page read and write
93CA000
heap
page read and write
7FF502F4B000
unkown
page readonly
2DB0000
unkown
page read and write
BA8B000
stack
page read and write
7CC0000
trusted library allocation
page read and write
518F000
heap
page read and write
EB91000
unkown
page read and write
7FF5031AD000
unkown
page readonly
2812000
trusted library allocation
page read and write
7FF50270A000
unkown
page readonly
274D000
trusted library allocation
page read and write
C9C6000
heap
page read and write
9C09000
unkown
page read and write
CA80000
heap
page read and write
A34D000
unkown
page read and write
3329000
stack
page read and write
89FB000
stack
page read and write
7FF502F2C000
unkown
page readonly
A8EA000
stack
page read and write
BFBD000
stack
page read and write
7FF502D61000
unkown
page readonly
C8E6000
heap
page read and write
7FF502D33000
unkown
page readonly
2881000
trusted library allocation
page read and write
8070000
unkown
page readonly
EB60000
unkown
page read and write
7720000
unkown
page readonly
DEDB000
stack
page read and write
EBA6000
unkown
page read and write
8F0000
heap
page read and write
936E000
unkown
page read and write
4EE9000
heap
page read and write
7FF502E8F000
unkown
page readonly
2955000
trusted library allocation
page read and write
B53E000
heap
page read and write
C056000
unkown
page read and write
94A4000
heap
page read and write
6ED7000
unkown
page read and write
7FF502DF9000
unkown
page readonly
30A3000
unkown
page read and write
7FF502F9F000
unkown
page readonly
5039000
heap
page read and write
2833000
trusted library allocation
page read and write
94DE000
stack
page read and write
B78F000
stack
page read and write
289C000
trusted library allocation
page read and write
2998000
trusted library allocation
page read and write
9289000
unkown
page read and write
7620000
unkown
page readonly
43B4000
unkown
page read and write
4F2E000
stack
page read and write
9BDE000
unkown
page read and write
7FF503175000
unkown
page readonly
26FC000
trusted library allocation
page read and write
7FF503275000
unkown
page readonly
4EE9000
heap
page read and write
9586000
heap
page read and write
B4D3000
heap
page read and write
BDF0000
unkown
page read and write
7FF5031B0000
unkown
page readonly
7FF5032EB000
unkown
page readonly
CABB000
heap
page read and write
27F5000
trusted library allocation
page read and write
1330000
heap
page read and write
7FF503020000
unkown
page readonly
9397000
heap
page read and write
489F000
unclassified section
page read and write
7FF503287000
unkown
page readonly
9255000
unkown
page read and write
7FF503227000
unkown
page readonly
918D000
unkown
page read and write
3320000
heap
page read and write
2759000
trusted library allocation
page read and write
7FF502EC9000
unkown
page readonly
2E79000
stack
page read and write
7DF411ED0000
unkown
page readonly
7FF503239000
unkown
page readonly
7FF502D91000
unkown
page readonly
7FF502D04000
unkown
page readonly
7FF503126000
unkown
page readonly
6FD3000
heap
page read and write
288D000
trusted library allocation
page read and write
7FF502F96000
unkown
page readonly
119B000
unclassified section
page execute and read and write
2F10000
unkown
page readonly
10F8D000
system
page execute and read and write
AF80000
unkown
page read and write
ACF000
stack
page read and write
2530000
heap
page read and write
8D48000
stack
page read and write
DB0B000
stack
page read and write
28C9000
trusted library allocation
page read and write
938D000
heap
page read and write
931B000
unkown
page read and write
2818000
trusted library allocation
page read and write
298B000
trusted library allocation
page read and write
2EF0000
stack
page read and write
28D8000
trusted library allocation
page read and write
36BB000
stack
page read and write
7FF503277000
unkown
page readonly
BAB000
stack
page read and write
BE96000
unkown
page read and write
BDF5000
unkown
page read and write
954C000
heap
page read and write
4EA4000
heap
page read and write
9CCF000
unkown
page read and write
BC08000
unkown
page read and write
C0BC000
unkown
page read and write
28EA000
trusted library allocation
page read and write
7FF5030E4000
unkown
page readonly
B3B4000
heap
page read and write
7FF502DDC000
unkown
page readonly
931B000
unkown
page read and write
2768000
trusted library allocation
page read and write
B4E0000
heap
page read and write
2E79000
stack
page read and write
BDC7000
unkown
page read and write
77FE000
stack
page read and write
953E000
heap
page read and write
16C5000
heap
page read and write
B580000
unkown
page read and write
7FF502D6B000
unkown
page readonly
26CA000
trusted library allocation
page read and write
9E0000
unkown
page read and write
B009000
stack
page read and write
9553000
heap
page read and write
958D000
heap
page read and write
B36E000
heap
page read and write
FCDB000
unkown
page read and write
9CCF000
unkown
page read and write
CF53000
trusted library allocation
page read and write
7DF44E641000
trusted library allocation
page execute read
2994000
trusted library allocation
page read and write
27EF000
trusted library allocation
page read and write
32AE000
stack
page read and write
4CB8000
heap
page read and write
46A6000
unclassified section
page read and write
B5E0000
unkown
page read and write
9D01000
unkown
page read and write
7FF502F88000
unkown
page readonly
EB52000
heap
page read and write
4FE0000
heap
page read and write
9391000
heap
page read and write
B4EF000
heap
page read and write
6F33000
unkown
page read and write
7FF503187000
unkown
page readonly
7651000
unkown
page read and write
5018000
heap
page read and write
C17F000
unkown
page read and write
93EA000
heap
page read and write
9BDE000
unkown
page read and write
2883000
trusted library allocation
page read and write
7FF503032000
unkown
page readonly
980000
trusted library allocation
page read and write
9BDE000
unkown
page read and write
B4D6000
heap
page read and write
AF7F000
stack
page read and write
91A7000
unkown
page read and write
C0B2000
unkown
page read and write
30A5000
unkown
page read and write
7FF50316E000
unkown
page readonly
859B000
stack
page read and write
B4E0000
heap
page read and write
2852000
trusted library allocation
page read and write
6EE4000
unkown
page read and write
7FF502D1B000
unkown
page readonly
BEA9000
unkown
page read and write
1356000
heap
page read and write
7FF502DC0000
unkown
page readonly
1180000
unclassified section
page execute and read and write
7FF5031DA000
unkown
page readonly
4CFA000
heap
page read and write
7FF503231000
unkown
page readonly
7FF5031FF000
unkown
page readonly
4F87000
heap
page read and write
9BE6000
unkown
page read and write
296A000
trusted library allocation
page read and write
D12B000
stack
page read and write
956B000
heap
page read and write
7E3000
heap
page read and write
B4ED000
heap
page read and write
2DE0000
unkown
page read and write
26F6000
trusted library allocation
page read and write
26D7000
trusted library allocation
page read and write
9D60000
unkown
page read and write
6ECB000
unkown
page read and write
9465000
heap
page read and write
7FF503206000
unkown
page readonly
BE1C000
unkown
page read and write
CF60000
trusted library allocation
page read and write
7FF5032C2000
unkown
page readonly
309D000
unkown
page read and write
4EE3000
heap
page read and write
7FF50316E000
unkown
page readonly
9C2C000
unkown
page read and write
7FF503333000
unkown
page readonly
2753000
trusted library allocation
page read and write
4EB8000
heap
page read and write
C056000
unkown
page read and write
B4D6000
heap
page read and write
2989000
trusted library allocation
page read and write
9450000
unkown
page readonly
9538000
heap
page read and write
2987000
trusted library allocation
page read and write
956B000
heap
page read and write
99A000
trusted library allocation
page execute and read and write
C10000
unkown
page readonly
939F000
heap
page read and write
9E0000
unkown
page read and write
BB9E000
heap
page read and write
7FF502E3F000
unkown
page readonly
28D6000
trusted library allocation
page read and write
74B0000
unkown
page read and write
2610000
trusted library allocation
page read and write
7FF502EBB000
unkown
page readonly
4EE3000
heap
page read and write
91C0000
heap
page read and write
275B000
trusted library allocation
page read and write
7FF502E5E000
unkown
page readonly
27A2000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
7FF503114000
unkown
page readonly
B3EB000
heap
page read and write
27C9000
trusted library allocation
page read and write
9D60000
unkown
page read and write
27A4000
trusted library allocation
page read and write
7DF411F11000
unkown
page execute read
C9C9000
heap
page read and write
FC53000
unkown
page read and write
9251000
heap
page read and write
C8E8000
heap
page read and write
C17C000
unkown
page read and write
2899000
trusted library allocation
page read and write
942C000
heap
page read and write
447D000
direct allocation
page execute and read and write
EBAA000
unkown
page read and write
B4FA000
heap
page read and write
BC55000
unkown
page read and write
9F1000
unkown
page readonly
7FF502DC0000
unkown
page readonly
CA8D000
heap
page read and write
955C000
heap
page read and write
4EE9000
heap
page read and write
4150000
trusted library allocation
page execute and read and write
94C9000
heap
page read and write
C018000
unkown
page read and write
9193000
unkown
page read and write
7FF502DF9000
unkown
page readonly
EBA6000
unkown
page read and write
7FF502D84000
unkown
page readonly
44A0000
unkown
page read and write
91DE000
unkown
page read and write
18BD000
direct allocation
page execute and read and write
7FF503155000
unkown
page readonly
7FF502DBC000
unkown
page readonly
CAB5000
heap
page read and write
4E97000
heap
page read and write
E16E000
stack
page read and write
960000
trusted library allocation
page read and write
ABE0000
unkown
page read and write
7370000
unkown
page read and write
1A56000
direct allocation
page execute and read and write
953E000
heap
page read and write
8490000
unkown
page readonly
7FF503187000
unkown
page readonly
B4FA000
heap
page read and write
A6FF000
system
page read and write
2933000
trusted library allocation
page read and write
99FF000
stack
page read and write
9510000
heap
page read and write
D029000
stack
page read and write
15A0000
heap
page read and write
7FF5031B7000
unkown
page readonly
3067000
unkown
page read and write
7610000
unkown
page readonly
958D000
heap
page read and write
4EA4000
heap
page read and write
7FF50318B000
unkown
page readonly
7FF503108000
unkown
page readonly
BA8B000
stack
page read and write
2610000
trusted library allocation
page read and write
2968000
trusted library allocation
page read and write
44D0000
unkown
page read and write
EB6C000
unkown
page read and write
B475000
heap
page read and write
4402000
unkown
page read and write
4EA4000
heap
page read and write
C9EF000
heap
page read and write
2534000
heap
page read and write
A7ED000
stack
page read and write
7FF50312D000
unkown
page readonly
7FF502DC3000
unkown
page readonly
2667000
heap
page read and write
28FB000
trusted library allocation
page read and write
C38C000
system
page execute and read and write
308F000
unkown
page read and write
7FF503365000
unkown
page readonly
94BF000
heap
page read and write
29C4000
trusted library allocation
page read and write
9092000
unkown
page read and write
4290000
trusted library allocation
page read and write
7FF5032D7000
unkown
page readonly
973000
trusted library allocation
page execute and read and write
9538000
heap
page read and write
8D0C000
stack
page read and write
977E000
stack
page read and write
A3B7000
unkown
page read and write
12DD000
trusted library allocation
page execute and read and write
BD6C000
unkown
page read and write
7FF5030EF000
unkown
page readonly
B4E0000
heap
page read and write
7FF503354000
unkown
page readonly
309D000
unkown
page read and write
733000
heap
page read and write
B570000
unkown
page read and write
94A7000
heap
page read and write
8440000
unkown
page read and write
821B000
stack
page read and write
4C8F000
heap
page read and write
4F1D000
heap
page read and write
7840000
unkown
page read and write
B4C7000
heap
page read and write
DC8D000
stack
page read and write
7FF502B4C000
unkown
page readonly
4C96000
heap
page read and write
59C0000
trusted library allocation
page read and write
9502000
heap
page read and write
918D000
unkown
page read and write
4EE3000
heap
page read and write
9A7000
trusted library allocation
page execute and read and write
810000
unkown
page readonly
3067000
unkown
page read and write
7DF411F01000
unkown
page execute read
831E000
stack
page read and write
50EB000
heap
page read and write
93CA000
heap
page read and write
9381000
heap
page read and write
EB94000
unkown
page read and write
7B6E000
stack
page read and write
B1B000
heap
page read and write
7480000
unkown
page read and write
2722000
trusted library allocation
page read and write
4CBA000
heap
page read and write
4F05000
heap
page read and write
B4EF000
heap
page read and write
7FF502F2C000
unkown
page readonly
10FB000
stack
page read and write
6ED9000
unkown
page read and write
DD0000
heap
page read and write
27B4000
trusted library allocation
page read and write
7FF503161000
unkown
page readonly
CABD000
heap
page read and write
7FF5032C8000
unkown
page readonly
7FF502E60000
unkown
page readonly
7FF503235000
unkown
page readonly
C2C0000
system
page execute and read and write
2837000
trusted library allocation
page read and write
7FF503151000
unkown
page readonly
8610000
unkown
page read and write
94D4000
heap
page read and write
7FF50328F000
unkown
page readonly
4E97000
heap
page read and write
295E000
stack
page read and write
B33A000
stack
page read and write
7FF502F4B000
unkown
page readonly
9510000
heap
page read and write
1430000
heap
page read and write
7A58000
stack
page read and write
26E3000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
B3EB000
heap
page read and write
86EE000
stack
page read and write
9193000
unkown
page read and write
958D000
heap
page read and write
7FF5032B5000
unkown
page readonly
BDD5000
unkown
page read and write
ABCB000
stack
page read and write
C9C6000
heap
page read and write
9B8A000
unkown
page read and write
FCD2000
unkown
page read and write
970000
trusted library allocation
page read and write
B417000
heap
page read and write
919C000
unkown
page read and write
BAB000
stack
page read and write
7FF50322D000
unkown
page readonly
4C96000
heap
page read and write
2534000
heap
page read and write
B3EC000
heap
page read and write
C0B4000
unkown
page read and write
7FF5032F7000
unkown
page readonly
6EF3000
unkown
page read and write
DA0D000
stack
page read and write
5A9B000
stack
page read and write
7FF502EF3000
unkown
page readonly
BDD5000
unkown
page read and write
BF2E000
unkown
page read and write
B4E3000
heap
page read and write
8A7A000
stack
page read and write
B417000
heap
page read and write
2534000
heap
page read and write
7FF502D41000
unkown
page readonly
B475000
heap
page read and write
119F000
unclassified section
page execute and read and write
275F000
trusted library allocation
page read and write
439B000
unkown
page read and write
BC27000
unkown
page read and write
BE99000
unkown
page read and write
6ED7000
unkown
page read and write
CA76000
heap
page read and write
5560000
trusted library allocation
page read and write
9553000
heap
page read and write
4ECB000
heap
page read and write
4CBC000
heap
page read and write
B53E000
heap
page read and write
9553000
heap
page read and write
BEF6000
unkown
page read and write
B4D3000
heap
page read and write
24F0000
heap
page read and write
4ED3000
heap
page read and write
A362000
unkown
page read and write
7FF502D04000
unkown
page readonly
7FF503270000
unkown
page readonly
BDE0000
unkown
page read and write
9459000
heap
page read and write
7FF502C2E000
unkown
page readonly
7FF503275000
unkown
page readonly
7FF5032C8000
unkown
page readonly
270B000
trusted library allocation
page read and write
9D03000
unkown
page read and write
C86B000
heap
page read and write
9193000
unkown
page read and write
7FF502CFA000
unkown
page readonly
7A25000
stack
page read and write
1CC0000
heap
page read and write
26B5000
trusted library allocation
page read and write
7FF5032C2000
unkown
page readonly
B4EF000
heap
page read and write
26C6000
trusted library allocation
page read and write
7FF503130000
unkown
page readonly
6E99000
stack
page read and write
7DF44E661000
trusted library allocation
page execute read
7FF503195000
unkown
page readonly
7FF5031BD000
unkown
page readonly
B53E000
heap
page read and write
7FF5031B0000
unkown
page readonly
C17C000
unkown
page read and write
B448000
heap
page read and write
6FDA000
unkown
page read and write
9CCF000
unkown
page read and write
9D0D000
unkown
page read and write
9255000
heap
page read and write
2806000
trusted library allocation
page read and write
7FF502EF7000
unkown
page readonly
7FF50331F000
unkown
page readonly
9C8A000
unkown
page read and write
BBE3000
unkown
page read and write
BC30000
unkown
page read and write
BF7A000
unkown
page read and write
3086000
unkown
page read and write
9CF4000
unkown
page read and write
3086000
unkown
page read and write
DFCC000
stack
page read and write
5E90000
heap
page read and write
BFF4000
unkown
page read and write
B4BA000
heap
page read and write
7046000
heap
page read and write
267D000
heap
page read and write
CAC2000
heap
page read and write
AF48000
stack
page read and write
BBB0000
unkown
page read and write
3870000
heap
page read and write
831E000
stack
page read and write
9586000
heap
page read and write
1670000
trusted library allocation
page read and write
4CB6000
heap
page read and write
2717000
trusted library allocation
page read and write
271D000
trusted library allocation
page read and write
DC0C000
stack
page read and write
958D000
heap
page read and write
307E000
unkown
page read and write
A98F000
stack
page read and write
9459000
heap
page read and write
42CE000
stack
page read and write
7FF502C8C000
unkown
page readonly
B3A9000
heap
page read and write
B4E0000
heap
page read and write
8110000
unkown
page read and write
EB92000
unkown
page read and write
7FF5030EF000
unkown
page readonly
2672000
heap
page read and write
7FF5032B5000
unkown
page readonly
B4C7000
heap
page read and write
958D000
heap
page read and write
9D0D000
unkown
page read and write
9D01000
unkown
page read and write
942C000
heap
page read and write
AAA0000
unkown
page readonly
C30000
trusted library allocation
page execute and read and write
51B0000
trusted library allocation
page read and write
7549000
stack
page read and write
28DC000
trusted library allocation
page read and write
7FF50332C000
unkown
page readonly
BDCB000
unkown
page read and write
4EA0000
heap
page read and write
41F0000
trusted library allocation
page execute and read and write
FBD4000
unkown
page read and write
7FF502F22000
unkown
page readonly
14A000
unkown
page readonly
BEA9000
unkown
page read and write
C9EF000
heap
page read and write
EB52000
heap
page read and write
FCE9000
unkown
page read and write
34A6000
stack
page read and write
255A000
stack
page read and write
590000
heap
page read and write
E3B0000
heap
page read and write
7FF503110000
unkown
page readonly
8659000
stack
page read and write
938B000
heap
page read and write
EB91000
unkown
page read and write
9364000
unkown
page read and write
CA7F000
heap
page read and write
26D3000
trusted library allocation
page read and write
B5E0000
unkown
page read and write
12A0000
heap
page read and write
4EAD000
heap
page read and write
5E30000
heap
page read and write
BB95000
heap
page read and write
B5A1000
unkown
page read and write
7FF5030AA000
unkown
page readonly
2844000
trusted library allocation
page read and write
C9BA000
heap
page read and write
B4ED000
heap
page read and write
73BD000
stack
page read and write
AFD2000
heap
page read and write
4290000
trusted library allocation
page read and write
EB9D000
unkown
page read and write
27FB000
trusted library allocation
page read and write
6ECE000
unkown
page read and write
1790000
direct allocation
page execute and read and write
B392000
heap
page read and write
4EBC000
heap
page read and write
4E9C000
heap
page read and write
2791000
trusted library allocation
page read and write
C00A000
unkown
page read and write
CF80000
trusted library allocation
page read and write
7520000
trusted library section
page read and write
957F000
heap
page read and write
9092000
unkown
page read and write
BB86000
heap
page read and write
6FD6000
unkown
page read and write
C48D000
stack
page read and write
BC55000
unkown
page read and write
24D0000
trusted library allocation
page read and write
B549000
stack
page read and write
B3EB000
heap
page read and write
7FF502D00000
unkown
page readonly
4EA0000
heap
page read and write
BE1C000
unkown
page read and write
B4E3000
heap
page read and write
51AA000
heap
page read and write
D35D000
stack
page read and write
C17C000
unkown
page read and write
7692000
trusted library allocation
page read and write
7609000
stack
page read and write
C90D000
heap
page read and write
919C000
unkown
page read and write
7FF503333000
unkown
page readonly
288F000
trusted library allocation
page read and write
84EB000
stack
page read and write
7FF50326B000
unkown
page readonly
9352000
heap
page read and write
2534000
heap
page read and write
957F000
heap
page read and write
B4FA000
heap
page read and write
B3CA000
heap
page read and write
7FF502B9A000
unkown
page readonly
513E000
heap
page read and write
7FF502D18000
unkown
page readonly
A1E0000
trusted library section
page read and write
7FF503175000
unkown
page readonly
AA8D000
stack
page read and write
E3CF000
stack
page read and write
829C000
stack
page read and write
987C000
stack
page read and write
42C9000
heap
page read and write
5829000
heap
page read and write
EBAA000
unkown
page read and write
296C000
trusted library allocation
page read and write
BE96000
unkown
page read and write
C0DE000
unkown
page read and write
D39E000
stack
page read and write
93A1000
heap
page read and write
90DA000
unkown
page read and write
7DF44E660000
trusted library allocation
page readonly
5560000
trusted library allocation
page read and write
B34E000
heap
page read and write
7FF502DCF000
unkown
page readonly
8450000
unkown
page read and write
3082000
unkown
page read and write
7FF503006000
unkown
page readonly
BE99000
unkown
page read and write
6F0F000
unkown
page read and write
4FA7000
heap
page read and write
4D09000
heap
page read and write
43C7000
unkown
page read and write
BE96000
unkown
page read and write
7FF50310B000
unkown
page readonly
26AA000
trusted library allocation
page read and write
26C4000
trusted library allocation
page read and write
B475000
heap
page read and write
7FF503051000
unkown
page readonly
4F01000
heap
page read and write
B4E3000
heap
page read and write
9437000
heap
page read and write
4EC0000
heap
page read and write
8970000
remote allocation
page read and write
91FB000
heap
page read and write
94FC000
heap
page read and write
BB90000
heap
page read and write
4A2E000
stack
page read and write
7FF503365000
unkown
page readonly
9D54000
unkown
page read and write
7FF502FB7000
unkown
page readonly
B4D3000
heap
page read and write
C17C000
unkown
page read and write
2831000
trusted library allocation
page read and write
C9AA000
heap
page read and write
88DE000
stack
page read and write
B448000
heap
page read and write
94D2000
heap
page read and write
4EB3000
heap
page read and write
7FF503368000
unkown
page readonly
7FF5032CF000
unkown
page readonly
7FF502EC9000
unkown
page readonly
2F20000
unkown
page readonly
7FF503010000
unkown
page readonly
28EC000
trusted library allocation
page read and write
7FF5030A3000
unkown
page readonly
434E000
stack
page read and write
7FF50332C000
unkown
page readonly
9D6B000
unkown
page read and write
A1F0000
trusted library allocation
page read and write
93BE000
heap
page read and write
4E86000
heap
page read and write
C8E2000
heap
page read and write
CA85000
heap
page read and write
4CBA000
heap
page read and write
93F6000
unkown
page read and write
B4E3000
heap
page read and write
4D09000
heap
page read and write
308F000
unkown
page read and write
2610000
trusted library allocation
page read and write
4E49000
unkown
page read and write
CA87000
heap
page read and write
996000
trusted library allocation
page execute and read and write
919F000
unkown
page read and write
A350000
unkown
page read and write
C8A6000
heap
page read and write
7FF502D45000
unkown
page readonly
12D0000
heap
page read and write
2962000
trusted library allocation
page read and write
9318000
unkown
page read and write
5560000
trusted library allocation
page read and write
7FF4ECBEF000
unkown
page readonly
833C000
stack
page read and write
4EE9000
heap
page read and write
7DF411EE0000
unkown
page readonly
27E0000
trusted library allocation
page read and write
12C0000
unclassified section
page execute and read and write
6EC0000
unkown
page read and write
35EC000
trusted library allocation
page read and write
7FF5030D9000
unkown
page readonly
29BD000
trusted library allocation
page read and write
5EA0000
heap
page read and write
B3AD000
heap
page read and write
30A3000
unkown
page read and write
519A000
heap
page read and write
7FF50301B000
unkown
page readonly
ABD0000
unkown
page read and write
2730000
trusted library allocation
page read and write
7FF502DDC000
unkown
page readonly
28B2000
trusted library allocation
page read and write
C40000
heap
page read and write
BC08000
unkown
page read and write
BEA3000
unkown
page read and write
964E000
stack
page read and write
977E000
stack
page read and write
6FA000
heap
page read and write
6FDA000
unkown
page read and write
3024000
unkown
page read and write
B2CF000
stack
page read and write
9538000
heap
page read and write
AFD2000
heap
page read and write
9416000
unkown
page read and write
6F09000
unkown
page read and write
9577000
heap
page read and write
7FF503257000
unkown
page readonly
CA1A000
heap
page read and write
2A60000
unkown
page readonly
4EC0000
heap
page read and write
2964000
trusted library allocation
page read and write
7FF502CF2000
unkown
page readonly
2CB1000
unkown
page read and write
7FF5030CE000
unkown
page readonly
2DF0000
unkown
page read and write
9437000
heap
page read and write
701F000
unkown
page read and write
94D2000
heap
page read and write
821B000
stack
page read and write
7FF503082000
unkown
page readonly
E80000
heap
page read and write
C710000
trusted library allocation
page read and write
7FF503010000
unkown
page readonly
BC5C000
unkown
page read and write
7FF502E0D000
unkown
page readonly
DF57000
stack
page read and write
BFB4000
unkown
page read and write
7620000
unkown
page readonly
9502000
heap
page read and write
B417000
heap
page read and write
30B4000
unkown
page read and write
43AC000
unkown
page read and write
9450000
unkown
page readonly
91A7000
unkown
page read and write
27D4000
trusted library allocation
page read and write
93A1000
heap
page read and write
B4E3000
heap
page read and write
7FF503216000
unkown
page readonly
30CD000
unkown
page read and write
9529000
heap
page read and write
7EDB000
stack
page read and write
7FF502E5E000
unkown
page readonly
CA1A000
heap
page read and write
9255000
unkown
page read and write
95C4000
unkown
page read and write
There are 2467 hidden memdumps, click here to show them.