IOC Report
PURCHASED ORDER OF ENG091.exe

loading gif

Files

File Path
Type
Category
Malicious
PURCHASED ORDER OF ENG091.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PURCHASED ORDER OF ENG091.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.pif
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.pif:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PURCHASED ORDER OF ENG091.pif.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PURCHASED ORDER OF ENG091.pif.pif.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PURCHASED ORDER OF ENG091.pif.pif.pif.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.log
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PURCHASED ORDER OF ENG091.exe
"C:\Users\user\Desktop\PURCHASED ORDER OF ENG091.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Desktop\PURCHASED ORDER OF ENG091.exe" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\cmstp.exe
"C:\Windows\SysWOW64\cmstp.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\msdt.exe
"C:\Windows\SysWOW64\msdt.exe"
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\msdt.exe
"C:\Windows\SysWOW64\msdt.exe"
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\SysWOW64\rundll32.exe"
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\wlanext.exe
"C:\Windows\SysWOW64\wlanext.exe"
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\msdt.exe
"C:\Windows\SysWOW64\msdt.exe"
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.pif"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\chkdsk.exe
"C:\Windows\SysWOW64\chkdsk.exe"
malicious
C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif
"C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASED ORDER OF ENG091.pif.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif" "C:\Users\user\Documents\PURCHASED ORDER OF ENG091.pif.pif.pif.pif.pif"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
"C:\Windows\SysWOW64\netsh.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmmon32.exe
"C:\Windows\SysWOW64\cmmon32.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 69 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.emeraldsurrogatefabric.com
unknown
malicious
http://www.emeraldsurrogatefabric.com/btrd/www.pure1027.com
unknown
malicious
www.cnoszirzbkaqz.com/btrd/
malicious
http://www.emeraldsurrogatefabric.com/btrd/?8pn=ChvLWF0pZdjL9&orD=G5lr6//zQ7aMiplq1GdUNb9GEJVmzQOhD2w3hHYWxcuiBbLjkdh8uX+W8X62ffIzaE+7zSgsRw==
192.243.59.20
malicious
http://www.emeraldsurrogatefabric.com/btrd/
unknown
malicious
http://www.anangtoto.com/btrd/?orD=sqRP0a8aV68K6FqJqAk+hHqxgWstkLnSX2TzjpZXqgEq2vKFORbsNIdmsOuhVtdKxSDXL4nXjg==&8pn=ChvLWF0pZdjL9
91.195.240.19
malicious
http://www.emeraldsurrogatefabric.comReferer:
unknown
malicious
http://www.thecolourgrey.com/btrd/?8pn=ChvLWF0pZdjL9&orD=1hanRQkKsw2EpQWVKCl4LROlWZtcCFpSARtuzqwGSwLi36Og4ncRpLu12qyBMcT+6ho6oQQ/oA==
104.21.93.17
malicious
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
unknown
http://www.thebestanglephotography.online
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://word.office.comM
unknown
http://youngonven.com/1485#Re
unknown
http://www.texanboxes.com/btrd/
unknown
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
unknown
https://www.hugedomains.com/domain_profile.cfm?d=pure1027.com
unknown
https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
unknown
http://www.martline.website/btrd/
unknown
http://www.xmentorgroup.com
unknown
http://www.outletivo.com/btrd/
unknown
http://www.rd8.online
unknown
http://www.rd8.online/btrd/
unknown
http://www.0757hunyin.net/btrd/www.texanboxes.com
unknown
https://wns.windows.com/e
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.outletivo.com
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
http://www.pure1027.comReferer:
unknown
http://www.outletivo.comReferer:
unknown
http://www.anangtoto.comReferer:
unknown
http://www.xmentorgroup.com/btrd/www.outletivo.com
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.outletivo.com/btrd/www.martline.website
unknown
https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
unknown
http://www.naddafornadda.comReferer:
unknown
http://www.thecolourgrey.com/btrd/www.anangtoto.com
unknown
http://www.researchforhighschool.comReferer:
unknown
http://www.researchforhighschool.com/btrd/www.invest247on.com
unknown
http://www.martline.websiteReferer:
unknown
http://www.invest247on.com/btrd/
unknown
https://android.notify.windows.com/iOS
unknown
http://www.watch2movie.xyz/btrd/
unknown
https://outlook.come
unknown
http://www.thecolourgrey.com/btrd/
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
http://www.pure1027.com/btrd/
unknown
http://www.thecolourgrey.comReferer:
unknown
http://www.cnoszirzbkaqz.com/btrd/www.thebestanglephotography.online
unknown
http://www.xmentorgroup.comReferer:
unknown
http://www.anangtoto.com/btrd/
unknown
http://www.invest247on.comReferer:
unknown
https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
unknown
http://www.cnoszirzbkaqz.com
unknown
https://api.msn.com/v1/news/Feed/Windows?
unknown
https://api.msn.com/I
unknown
http://www.texanboxes.com/btrd/www.watch2movie.xyz
unknown
http://www.xmentorgroup.com/btrd/
unknown
http://www.cnoszirzbkaqz.com/btrd/
unknown
http://www.martline.website/btrd/www.naddafornadda.com
unknown
http://www.cnoszirzbkaqz.comReferer:
unknown
http://schemas.micro
unknown
http://www.0757hunyin.net/btrd/
unknown
http://www.watch2movie.xyz
unknown
http://www.0757hunyin.netReferer:
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.texanboxes.com
unknown
http://www.invest247on.com
unknown
http://www.rd8.onlineReferer:
unknown
http://www.pure1027.com/btrd/www.thecolourgrey.com
unknown
https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h
unknown
http://www.researchforhighschool.com/btrd/
unknown
https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
unknown
http://www.rd8.online/btrd/www.researchforhighschool.com
unknown
http://www.naddafornadda.com
unknown
http://www.martline.website
unknown
http://www.pure1027.com
unknown
http://www.0757hunyin.net
unknown
http://www.thecolourgrey.com
unknown
http://www.watch2movie.xyz/btrd/www.cnoszirzbkaqz.com
unknown
http://www.anangtoto.com/btrd/www.0757hunyin.net
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
unknown
https://excel.office.com-
unknown
http://youngonven.com
unknown
http://youngonven.com/1485
63.250.38.167
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
unknown
http://www.naddafornadda.com/btrd/
unknown
https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
unknown
http://www.anangtoto.com
unknown
http://www.invest247on.com/btrd/www.xmentorgroup.com
unknown
https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
unknown
https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
unknown
http://www.thebestanglephotography.onlineReferer:
unknown
https://powerpoint.office.comEMd
unknown
http://www.texanboxes.comReferer:
unknown
http://www.thebestanglephotography.online/btrd/
unknown
https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.thecolourgrey.com
104.21.93.17
malicious
parkingpage.namecheap.com
91.195.240.19
malicious
texanboxes.com
3.33.130.190
malicious
www.emeraldsurrogatefabric.com
192.243.59.20
malicious
hdr-nlb7-aebd5d615260636b.elb.us-east-1.amazonaws.com
34.205.242.146
malicious
www.pure1027.com
unknown
malicious
www.0757hunyin.net
unknown
malicious
www.anangtoto.com
unknown
malicious
www.texanboxes.com
unknown
malicious
youngonven.com
63.250.38.167

IPs

IP
Domain
Country
Malicious
34.205.242.146
hdr-nlb7-aebd5d615260636b.elb.us-east-1.amazonaws.com
United States
malicious
192.243.59.20
www.emeraldsurrogatefabric.com
Dominica
malicious
104.21.93.17
www.thecolourgrey.com
United States
malicious
91.195.240.19
parkingpage.namecheap.com
Germany
malicious
63.250.38.167
youngonven.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
PURCHASED ORDER OF ENG091
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
PURCHASED ORDER OF ENG091.pif
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
PURCHASED ORDER OF ENG091.pif.pif
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
PURCHASED ORDER OF ENG091.pif.pif.pif
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
PURCHASED ORDER OF ENG091.pif.pif.pif.pif
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PURCHASED ORDER OF ENG091_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001046C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000002046C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
b
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030494
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000060486
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
c
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000005048C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000006046C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
d
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000070470
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080488
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
e
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000B0486
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000C0490
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
f
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000160026
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000C0494
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.M2V\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\ratvarre\Qbphzragf\CHEPUNFRQ BEQRE BS RAT091.cvs.cvs.cvs.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
There are 225 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C00000
system
page execute and read and write
malicious
EB42000
unkown
page execute and read and write
malicious
3F49000
trusted library allocation
page read and write
malicious
389A000
trusted library allocation
page read and write
malicious
4028000
trusted library allocation
page read and write
malicious
600000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3A5B000
trusted library allocation
page read and write
malicious
35F9000
trusted library allocation
page read and write
malicious
2ED0000
system
page execute and read and write
malicious
28B0000
system
page execute and read and write
malicious
39AB000
trusted library allocation
page read and write
malicious
39CC000
trusted library allocation
page read and write
malicious
352B000
trusted library allocation
page read and write
malicious
4520000
trusted library allocation
page read and write
malicious
4534000
trusted library allocation
page read and write
malicious
5070000
system
page execute and read and write
malicious
6E0000
system
page execute and read and write
malicious
3190000
system
page execute and read and write
malicious
960000
system
page execute and read and write
malicious
3BB4000
trusted library allocation
page read and write
malicious
45B3000
trusted library allocation
page read and write
malicious
B30000
system
page execute and read and write
malicious
44F0000
unclassified section
page execute and read and write
malicious
32AA000
trusted library allocation
page read and write
D60000
heap
page read and write
7FF5DF3D4000
unkown
page readonly
11AE0000
system
page execute and read and write
552D000
stack
page read and write
7FF5DF45A000
unkown
page readonly
F48000
stack
page read and write
A749000
unkown
page read and write
820000
heap
page read and write
3410000
heap
page read and write
9C1D000
stack
page read and write
D0E000
stack
page read and write
2720000
heap
page read and write
AC9000
stack
page read and write
55EE000
stack
page read and write
9D0000
heap
page read and write
46C1000
heap
page read and write
5710000
trusted library allocation
page read and write
4E7C000
stack
page read and write
7FF5DF207000
unkown
page readonly
6380000
trusted library allocation
page execute and read and write
56D8000
trusted library allocation
page read and write
7FF5DF07D000
unkown
page readonly
4CD0000
trusted library allocation
page read and write
3EEA000
trusted library allocation
page read and write
32BA000
trusted library allocation
page read and write
B369000
unkown
page read and write
127D000
trusted library allocation
page execute and read and write
5F0000
heap
page read and write
48E0000
unkown
page read and write
3073000
heap
page read and write
2904000
heap
page read and write
13CB000
unclassified section
page execute and read and write
3086000
heap
page read and write
EE88000
unkown
page read and write
C474000
unkown
page read and write
7DF4E67A1000
unkown
page execute read
1147000
trusted library allocation
page execute and read and write
3210000
direct allocation
page read and write
2E90000
heap
page read and write
5890000
trusted library allocation
page read and write
7E4000
trusted library allocation
page read and write
5A10000
heap
page read and write
C2E4000
unkown
page read and write
2AB3000
heap
page read and write
2FD4000
heap
page read and write
4760000
unkown
page read and write
7FF5DF28E000
unkown
page readonly
2E3D000
stack
page read and write
34EF000
stack
page read and write
32AE000
stack
page read and write
6357000
trusted library allocation
page read and write
F8E000
stack
page read and write
50F2000
heap
page read and write
35D0000
heap
page read and write
7FF5DF43C000
unkown
page readonly
9F63000
unkown
page read and write
A6E000
stack
page read and write
7FF5DF045000
unkown
page readonly
73A3000
unkown
page read and write
3080000
heap
page read and write
B9000
stack
page read and write
3590000
heap
page read and write
5B30000
trusted library allocation
page execute and read and write
5640000
trusted library allocation
page execute and read and write
33EE000
stack
page read and write
50F2000
heap
page read and write
7A40000
unkown
page readonly
7FF5DF5B0000
unkown
page readonly
231B000
stack
page read and write
3CA1000
trusted library allocation
page read and write
7FF5DF50F000
unkown
page readonly
7991000
unkown
page read and write
900000
heap
page read and write
C4C9000
unkown
page read and write
AF3000
trusted library allocation
page read and write
620D000
stack
page read and write
A7C000
system
page execute and read and write
2CDF000
stack
page read and write
7FF5DF5A3000
unkown
page readonly
7B4C000
stack
page read and write
2D13000
direct allocation
page execute and read and write
97F3000
unkown
page read and write
2800000
direct allocation
page execute and read and write
8910000
unkown
page read and write
28C4000
trusted library allocation
page read and write
E4A000
heap
page read and write
50F4000
heap
page read and write
314B000
heap
page read and write
326D000
stack
page read and write
2E72000
unclassified section
page execute and read and write
3074000
heap
page read and write
9AF000
stack
page read and write
A0FC000
unkown
page read and write
33BE000
unkown
page read and write
3E72000
direct allocation
page execute and read and write
321E000
stack
page read and write
2C54000
heap
page read and write
2870000
unkown
page read and write
47A2000
unkown
page read and write
2ABF000
stack
page read and write
4C22000
trusted library allocation
page read and write
3FCA000
trusted library allocation
page read and write
790A000
stack
page read and write
74F1000
unkown
page read and write
5960000
trusted library allocation
page read and write
7FF5DF23B000
unkown
page readonly
2F50000
trusted library allocation
page read and write
7FF5DF584000
unkown
page readonly
5C52000
heap
page read and write
F90000
heap
page read and write
7FF5DF507000
unkown
page readonly
4BA000
heap
page read and write
DE7000
heap
page read and write
C159000
unkown
page read and write
2B40000
heap
page read and write
31FB000
unclassified section
page execute and read and write
5760000
trusted library allocation
page read and write
7FF5DEFF0000
unkown
page readonly
56A1000
trusted library allocation
page read and write
56AE000
trusted library allocation
page read and write
4890000
unkown
page read and write
9E1E000
stack
page read and write
343A000
trusted library allocation
page read and write
9A6C000
stack
page read and write
312E000
unkown
page read and write
4870000
unkown
page read and write
97F3000
unkown
page read and write
8A36000
unkown
page read and write
6D6000
trusted library allocation
page execute and read and write
3050000
trusted library allocation
page read and write
7FF5DF067000
unkown
page readonly
7FF5DF62C000
unkown
page readonly
59F4000
heap
page read and write
63CE000
stack
page read and write
5800000
trusted library allocation
page read and write
359A000
trusted library allocation
page read and write
7FF5DF3BE000
unkown
page readonly
100C4000
unkown
page read and write
790A000
stack
page read and write
1330000
heap
page read and write
C524000
unkown
page read and write
10600000
unkown
page execute and read and write
4C8F000
unclassified section
page read and write
1280000
heap
page read and write
6FD0000
heap
page read and write
2BED000
stack
page read and write
513C000
heap
page read and write
51DC000
stack
page read and write
577D000
stack
page read and write
C1CC000
unkown
page read and write
7AB000
heap
page read and write
2686000
trusted library allocation
page read and write
337E000
stack
page read and write
2FDD000
heap
page read and write
76F0000
unkown
page read and write
5810000
trusted library allocation
page read and write
7FF5DF0CC000
unkown
page readonly
2AE0000
heap
page read and write
7FF5DF3FC000
unkown
page readonly
7FF5DEFAC000
unkown
page readonly
5240000
trusted library allocation
page read and write
4FBD000
direct allocation
page execute and read and write
28ED000
trusted library allocation
page read and write
7FF5DEF57000
unkown
page readonly
307D000
stack
page read and write
BF9B000
unkown
page read and write
7FF5DF5B3000
unkown
page readonly
97B8000
unkown
page read and write
2948000
heap
page read and write
7DF4E6770000
unkown
page readonly
73A7000
unkown
page read and write
52C0000
trusted library allocation
page execute and read and write
3B30000
direct allocation
page execute and read and write
4890000
heap
page execute and read and write
48B0000
trusted library allocation
page read and write
5320000
heap
page read and write
C1C4000
unkown
page read and write
51B2000
direct allocation
page execute and read and write
5260000
trusted library allocation
page execute and read and write
52A0000
heap
page read and write
1030A000
system
page execute and read and write
314B000
heap
page read and write
B11C000
stack
page read and write
47D9000
unkown
page read and write
30FB000
stack
page read and write
32F0000
heap
page read and write
7830000
unkown
page read and write
7FF5DF04D000
unkown
page readonly
2F30000
heap
page read and write
A08A000
unkown
page read and write
7C4000
heap
page read and write
A0A7000
unkown
page read and write
4AE0000
trusted library allocation
page read and write
7FF5DF549000
unkown
page readonly
4860000
trusted library allocation
page read and write
503D000
stack
page read and write
7FF5DEE43000
unkown
page readonly
1730000
heap
page read and write
7A30000
unkown
page read and write
7FF5DEE5A000
unkown
page readonly
4AE1000
heap
page read and write
7FF5DF5A3000
unkown
page readonly
32D0000
heap
page read and write
50ED000
trusted library allocation
page read and write
3ACC000
trusted library allocation
page read and write
7810000
unkown
page read and write
644E000
stack
page read and write
258E000
stack
page read and write
342E000
unkown
page read and write
10084000
unkown
page read and write
9F92000
unkown
page read and write
38D0000
heap
page read and write
60F1000
heap
page read and write
627C000
stack
page read and write
3050000
heap
page read and write
5DF0000
heap
page read and write
50F8000
heap
page read and write
7FF5DF25B000
unkown
page readonly
9714000
unkown
page read and write
437A000
trusted library allocation
page read and write
2F95000
trusted library allocation
page read and write
143E000
stack
page read and write
7C4000
heap
page read and write
4E92000
trusted library allocation
page read and write
BC7000
stack
page read and write
4C63000
heap
page read and write
7FF5DF5B0000
unkown
page readonly
C183000
unkown
page read and write
987C000
unkown
page read and write
CF0000
trusted library allocation
page read and write
7FF5DF4E3000
unkown
page readonly
D14000
heap
page read and write
A40000
unclassified section
page execute and read and write
479B000
unkown
page read and write
2E60000
unkown
page read and write
5390000
heap
page read and write
A60000
system
page execute and read and write
FF7000
heap
page read and write
5B4D000
direct allocation
page execute and read and write
3151000
heap
page read and write
178B000
trusted library allocation
page execute and read and write
6CD000
trusted library allocation
page execute and read and write
971C000
unkown
page read and write
7FF5DE9C3000
unkown
page readonly
7DF4E6771000
unkown
page execute read
B12000
trusted library allocation
page read and write
7DF4E6771000
unkown
page execute read
6D50000
trusted library allocation
page read and write
1145000
trusted library allocation
page execute and read and write
69CE000
stack
page read and write
2CB2000
direct allocation
page execute and read and write
E530000
system
page execute and read and write
376A000
trusted library allocation
page read and write
7FF5DEE52000
unkown
page readonly
4BF0000
trusted library allocation
page read and write
EE75000
unkown
page read and write
332E000
unkown
page read and write
2880000
unclassified section
page execute and read and write
37B1000
trusted library allocation
page read and write
7860000
unkown
page read and write
614A000
heap
page read and write
7C4000
heap
page read and write
2FED000
direct allocation
page execute and read and write
9718000
unkown
page read and write
7DF4E6781000
unkown
page execute read
4CC0000
heap
page read and write
41F000
remote allocation
page execute and read and write
2B30000
trusted library allocation
page read and write
73A7000
unkown
page read and write
A5B000
unclassified section
page execute and read and write
7FF5DF478000
unkown
page readonly
9D1F000
stack
page read and write
71CC000
stack
page read and write
C425000
unkown
page read and write
7860000
unkown
page read and write
31BF000
stack
page read and write
15D0000
heap
page read and write
2C54000
heap
page read and write
569B000
trusted library allocation
page read and write
7FF5DF0D2000
unkown
page readonly
6220000
trusted library section
page read and write
7FF5DF486000
unkown
page readonly
430000
heap
page read and write
309F000
stack
page read and write
98A1000
unkown
page read and write
6B20000
heap
page read and write
685000
heap
page read and write
2EBD000
direct allocation
page execute and read and write
5360000
heap
page read and write
C00000
heap
page read and write
BF6D000
unkown
page read and write
43F1000
heap
page read and write
2FDD000
heap
page read and write
1081F000
stack
page read and write
2D6D000
trusted library allocation
page read and write
32DC000
heap
page read and write
10FE000
stack
page read and write
2B79000
direct allocation
page execute and read and write
970000
unkown
page readonly
C1CC000
unkown
page read and write
3374000
heap
page read and write
9C5000
heap
page read and write
7FF5DF549000
unkown
page readonly
4B9E000
direct allocation
page execute and read and write
9AE000
stack
page read and write
651E000
stack
page read and write
7FF5DF21C000
unkown
page readonly
5B0000
heap
page read and write
5E0000
heap
page read and write
707000
heap
page read and write
3460000
heap
page read and write
266B000
trusted library allocation
page read and write
23C0000
heap
page read and write
5161000
direct allocation
page execute and read and write
7FF5DEFF8000
unkown
page readonly
5790000
trusted library allocation
page read and write
FE7000
heap
page read and write
4FA0000
heap
page read and write
1A0000
heap
page read and write
5A0C000
heap
page read and write
98AD000
unkown
page read and write
FEB000
unclassified section
page execute and read and write
7FF5DF21B000
unkown
page readonly
4C00000
heap
page read and write
9F60000
unkown
page read and write
51FD000
trusted library allocation
page read and write
7FF5DEFB7000
unkown
page readonly
6FC000
stack
page read and write
2AF0000
unclassified section
page execute and read and write
4E31000
trusted library allocation
page read and write
11F0000
heap
page read and write
7FF5DF5F6000
unkown
page readonly
C034000
unkown
page read and write
4C45000
trusted library allocation
page read and write
502D000
stack
page read and write
7ED000
trusted library allocation
page execute and read and write
1470000
unclassified section
page execute and read and write
7FF5DF0A5000
unkown
page readonly
3C59000
direct allocation
page execute and read and write
7FF5DF52D000
unkown
page readonly
6EE0000
trusted library allocation
page read and write
978C000
unkown
page read and write
7FF5DF606000
unkown
page readonly
7B0000
heap
page read and write
7FF5DF2FE000
unkown
page readonly
2AD0000
heap
page read and write
7FF5DEF4B000
unkown
page readonly
73B2000
unkown
page read and write
74A9000
unkown
page read and write
1772000
trusted library allocation
page read and write
1AD000
stack
page read and write
34C7000
trusted library allocation
page read and write
73BC000
unkown
page read and write
3362000
unkown
page read and write
D1A000
trusted library allocation
page execute and read and write
33C0000
unkown
page readonly
845000
heap
page read and write
5778000
trusted library allocation
page read and write
2351000
trusted library allocation
page read and write
2A90000
unclassified section
page execute and read and write
C01A000
unkown
page read and write
B90000
heap
page read and write
108A6000
system
page read and write
621E000
stack
page read and write
101E000
stack
page read and write
661E000
stack
page read and write
1785000
trusted library allocation
page execute and read and write
A701000
unkown
page read and write
E19000
heap
page read and write
301F000
stack
page read and write
AEEE000
stack
page read and write
4E80000
heap
page read and write
FD0000
unclassified section
page execute and read and write
CD0000
heap
page read and write
3281000
stack
page read and write
320C000
stack
page read and write
44AC000
trusted library allocation
page read and write
97F3000
unkown
page read and write
546E000
stack
page read and write
2B5F000
heap
page read and write
481B000
trusted library allocation
page read and write
3020000
direct allocation
page execute and read and write
EEA3000
unkown
page read and write
C0A000
heap
page read and write
62FE000
stack
page read and write
55E000
stack
page read and write
2F9B000
trusted library allocation
page execute and read and write
279D000
stack
page read and write
60D0000
heap
page read and write
7399000
unkown
page read and write
3AAA000
heap
page read and write
7FF5DF280000
unkown
page readonly
2B31000
heap
page read and write
C4A3000
unkown
page read and write
C00000
heap
page read and write
2940000
unclassified section
page execute and read and write
A0F7000
unkown
page read and write
4A80000
heap
page read and write
4CC0000
trusted library allocation
page execute and read and write
96F1000
unkown
page read and write
A60000
heap
page read and write
BA76000
stack
page read and write
BFA5000
unkown
page read and write
291E000
stack
page read and write
2BF4000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
352F000
stack
page read and write
5611000
trusted library allocation
page read and write
7FF5DF5F0000
unkown
page readonly
5120000
trusted library allocation
page execute and read and write
3DEA000
trusted library allocation
page read and write
B9E000
stack
page read and write
B120000
unkown
page readonly
B359000
stack
page read and write
58A0000
trusted library allocation
page read and write
C159000
unkown
page read and write
317E000
stack
page read and write
9E0000
unkown
page readonly
980000
unkown
page readonly
8DD000
stack
page read and write
7FF5DEF06000
unkown
page readonly
848E000
stack
page read and write
7FF5DF4F7000
unkown
page readonly
66B8000
heap
page read and write
2B60000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
337D000
direct allocation
page execute and read and write
3374000
heap
page read and write
971A000
unkown
page read and write
4880000
unkown
page read and write
660F000
stack
page read and write
2FB4000
unclassified section
page execute and read and write
4990000
heap
page read and write
4B21000
trusted library allocation
page read and write
4C16000
trusted library allocation
page read and write
7FF5DF211000
unkown
page readonly
35E0000
heap
page read and write
3374000
heap
page read and write
8661000
unkown
page read and write
7FF5DF4E7000
unkown
page readonly
8D0000
trusted library allocation
page read and write
7FF5DEFC2000
unkown
page readonly
2EC0000
unkown
page readonly
1040000
heap
page read and write
A6EA000
unkown
page read and write
1763000
trusted library allocation
page read and write
BF9F000
unkown
page read and write
5B0F000
stack
page read and write
670E000
stack
page read and write
7FF5DF045000
unkown
page readonly
11374000
system
page execute and read and write
7FF5DF038000
unkown
page readonly
10464000
system
page execute and read and write
6DDE000
stack
page read and write
5204000
heap
page read and write
5A00000
trusted library allocation
page execute and read and write
C39F000
unkown
page read and write
5250000
trusted library allocation
page read and write
7FF5DF3E4000
unkown
page readonly
540000
heap
page read and write
C516000
unkown
page read and write
5481000
trusted library allocation
page read and write
4D42000
direct allocation
page execute and read and write
9F51000
unkown
page read and write
343C000
trusted library allocation
page read and write
7F0000
heap
page read and write
28E6000
direct allocation
page execute and read and write
7DF4E6760000
unkown
page readonly
7FF5DEFBD000
unkown
page readonly
357E000
unkown
page read and write
A104000
unkown
page read and write
7FF5DF366000
unkown
page readonly
2FA6000
heap
page read and write
4CE0000
heap
page execute and read and write
33E0000
heap
page read and write
85E000
stack
page read and write
2D5D000
stack
page read and write
2C3E000
stack
page read and write
2C17000
trusted library allocation
page read and write
6E2000
trusted library allocation
page read and write
5960000
heap
page execute and read and write
3A7000
stack
page read and write
33C0000
heap
page read and write
E60000
heap
page read and write
2AC8000
trusted library allocation
page read and write
48C0000
trusted library allocation
page execute and read and write
6E70000
trusted library allocation
page read and write
53DF000
stack
page read and write
7FF5DE9CB000
unkown
page readonly
7FF5DF3DF000
unkown
page readonly
2FD4000
heap
page read and write
A6EE000
unkown
page read and write
D12000
trusted library allocation
page read and write
73BA000
unkown
page read and write
73C3000
unkown
page read and write
9F0000
trusted library allocation
page read and write
4FB9000
direct allocation
page execute and read and write
7FF5DF5E9000
unkown
page readonly
1370000
heap
page read and write
7A7000
stack
page read and write
C013000
unkown
page read and write
4C60000
heap
page read and write
2FD0000
heap
page read and write
2C8F000
stack
page read and write
32AE000
unkown
page read and write
4BF4000
trusted library allocation
page read and write
C34E000
unkown
page read and write
33F7000
trusted library allocation
page read and write
5D0E000
stack
page read and write
450000
heap
page read and write
171E000
stack
page read and write
7FF5DEE5A000
unkown
page readonly
7FF5DEFCB000
unkown
page readonly
5ECE000
stack
page read and write
54B0000
trusted library allocation
page execute and read and write
EE84000
unkown
page read and write
3135000
heap
page read and write
2F7F000
stack
page read and write
2AB1000
heap
page read and write
2281000
trusted library allocation
page read and write
A759000
unkown
page read and write
7FF5DF2CB000
unkown
page readonly
33AE000
unkown
page read and write
4800000
trusted library allocation
page read and write
35DF000
stack
page read and write
DE8000
trusted library allocation
page read and write
7FF5DF398000
unkown
page readonly
50CB000
heap
page read and write
AF0000
heap
page read and write
7D90000
unkown
page read and write
2A90000
heap
page read and write
4830000
trusted library allocation
page read and write
50C7000
heap
page read and write
B45A000
stack
page read and write
2D81000
trusted library allocation
page read and write
31F0000
heap
page read and write
1770000
trusted library allocation
page read and write
C183000
unkown
page read and write
7C4000
heap
page read and write
6AE0000
heap
page read and write
39FA000
trusted library allocation
page read and write
326E000
stack
page read and write
84A000
heap
page read and write
2B0C000
unclassified section
page execute and read and write
3270000
heap
page read and write
A690000
unkown
page read and write
28EC000
heap
page read and write
885E000
stack
page read and write
C516000
unkown
page read and write
2E0D000
direct allocation
page execute and read and write
2940000
heap
page read and write
46FE000
stack
page read and write
3050000
heap
page read and write
2981000
heap
page read and write
66CE000
stack
page read and write
1300000
heap
page read and write
10228000
system
page execute and read and write
6115000
heap
page read and write
5940000
trusted library allocation
page read and write
5B4E000
stack
page read and write
8400000
heap
page read and write
2F80000
trusted library allocation
page read and write
ED0000
heap
page execute and read and write
4E40000
trusted library allocation
page read and write
3166000
trusted library allocation
page read and write
B2DC000
stack
page read and write
B1C0000
unkown
page readonly
28C7000
direct allocation
page execute and read and write
328F000
heap
page read and write
8E0000
trusted library allocation
page read and write
7FF5DF567000
unkown
page readonly
52C3000
unkown
page read and write
128D000
trusted library allocation
page execute and read and write
7FF5DF2CB000
unkown
page readonly
4E15000
trusted library allocation
page read and write
7870000
unkown
page read and write
8A36000
unkown
page read and write
5694000
trusted library allocation
page read and write
2B35000
heap
page read and write
6D1C000
stack
page read and write
8390000
unkown
page read and write
7B0000
heap
page read and write
231C000
stack
page read and write
325F000
stack
page read and write
124E000
stack
page read and write
91E000
stack
page read and write
284F000
unkown
page read and write
297C000
stack
page read and write
315D000
stack
page read and write
294E000
unkown
page read and write
C24C000
unkown
page read and write
5D0D000
stack
page read and write
A2D000
stack
page read and write
346E000
stack
page read and write
6910000
heap
page read and write
BF98000
unkown
page read and write
60CE000
stack
page read and write
13E0000
heap
page read and write
B7C000
stack
page read and write
4737000
heap
page read and write
6B4000
trusted library allocation
page read and write
D27000
trusted library allocation
page execute and read and write
5FCE000
stack
page read and write
812000
trusted library allocation
page read and write
7F0D0000
trusted library allocation
page execute and read and write
2F86000
trusted library allocation
page execute and read and write
4A17000
heap
page read and write
7FF5DF58A000
unkown
page readonly
78E000
stack
page read and write
A74C000
unkown
page read and write
3100000
heap
page read and write
1113000
trusted library allocation
page execute and read and write
739E000
stack
page read and write
140C000
heap
page read and write
47C0000
trusted library allocation
page read and write
2A50000
heap
page read and write
48A0000
heap
page read and write
74F1000
unkown
page read and write
13C5000
heap
page read and write
7DF4E6781000
unkown
page execute read
97B8000
unkown
page read and write
7F280000
trusted library allocation
page execute and read and write
3005000
unclassified section
page execute and read and write
21B8000
trusted library allocation
page read and write
53E1000
heap
page read and write
A6CF000
unkown
page read and write
987C000
unkown
page read and write
220000
system
page execute and read and write
74F1000
unkown
page read and write
148B000
unclassified section
page execute and read and write
7FF5DF571000
unkown
page readonly
EE7E000
unkown
page read and write
BE0000
heap
page read and write
DA0000
heap
page read and write
B09E000
stack
page read and write
4508000
heap
page read and write
738E000
unkown
page read and write
4AB0000
trusted library allocation
page read and write
4690000
trusted library allocation
page read and write
9C0000
heap
page read and write
2BA0000
heap
page read and write
7FF5DE5CC000
unkown
page readonly
6020000
trusted library allocation
page read and write
7B60000
unkown
page readonly
12B7000
heap
page read and write
A6F1000
unkown
page read and write
2FCD000
stack
page read and write
5E8E000
stack
page read and write
A758000
unkown
page read and write
C2E4000
unkown
page read and write
11BB2000
system
page execute and read and write
2BB0000
heap
page read and write
5230000
trusted library allocation
page read and write
30F1000
direct allocation
page execute and read and write
2C50000
heap
page read and write
8A0000
heap
page read and write
3351000
trusted library allocation
page read and write
118D000
trusted library allocation
page execute and read and write
103C000
stack
page read and write
C3EA000
unkown
page read and write
6C0000
heap
page read and write
7FF5DEF84000
unkown
page readonly
4A90000
trusted library allocation
page read and write
3374000
heap
page read and write
26BB000
trusted library allocation
page read and write
2340000
heap
page execute and read and write
4E00000
trusted library allocation
page read and write
973C000
unkown
page read and write
A0A7000
unkown
page read and write
C18A000
unkown
page read and write
7FF5DF3B5000
unkown
page readonly
4DD0000
trusted library allocation
page read and write
4BE000
heap
page read and write
C34E000
unkown
page read and write
2779000
trusted library allocation
page read and write
346E000
stack
page read and write
50D0000
heap
page read and write
2DA6000
direct allocation
page execute and read and write
7DF4E6761000
unkown
page execute read
37CF000
unkown
page read and write
4836000
trusted library allocation
page read and write
64CD000
stack
page read and write
3022000
direct allocation
page execute and read and write
7FF5DF4BD000
unkown
page readonly
620E000
stack
page read and write
7C0000
heap
page read and write
9F10000
unkown
page read and write
B09E000
stack
page read and write
349C000
trusted library allocation
page read and write
7AF000
stack
page read and write
7FF5DF0C3000
unkown
page readonly
3375000
unkown
page read and write
60CE000
stack
page read and write
C1CC000
unkown
page read and write
63EE000
stack
page read and write
59E0000
trusted library allocation
page execute and read and write
5408000
heap
page read and write
AFD000
trusted library allocation
page execute and read and write
2EA1000
direct allocation
page execute and read and write
1337000
stack
page read and write
5204000
heap
page read and write
275D000
stack
page read and write
326E000
unkown
page read and write
50FD000
heap
page read and write
55AD000
stack
page read and write
4C80000
trusted library allocation
page read and write
27F0000
heap
page read and write
4E30000
heap
page read and write
2DE2000
direct allocation
page execute and read and write
BFC3000
unkown
page read and write
C80000
heap
page read and write
B589000
stack
page read and write
7FF5DF47E000
unkown
page readonly
12F7000
stack
page read and write
47B6000
unkown
page read and write
C087000
unkown
page read and write
35D0000
heap
page read and write
A6EA000
unkown
page read and write
58EE000
stack
page read and write
3118000
trusted library allocation
page read and write
6C3000
trusted library allocation
page read and write
7FF5DF5B5000
unkown
page readonly
BF6D000
unkown
page read and write
7FF5DF392000
unkown
page readonly
2CCF000
heap
page read and write
2B00000
trusted library allocation
page read and write
32E5000
heap
page read and write
2905000
heap
page read and write
3830000
heap
page read and write
2A54000
heap
page read and write
4E7C000
stack
page read and write
74D6000
unkown
page read and write
7FF5DF5FC000
unkown
page readonly
49A2000
heap
page read and write
C4EB000
unkown
page read and write
3140000
heap
page read and write
50E0000
heap
page read and write
AC0D000
stack
page read and write
7D89000
stack
page read and write
1273000
trusted library allocation
page execute and read and write
2DA0000
heap
page read and write
30A4000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
5167000
heap
page read and write
7FF5DEE52000
unkown
page readonly
647E000
stack
page read and write
BF0000
heap
page read and write
500000
heap
page read and write
5F8F000
stack
page read and write
5D57000
trusted library allocation
page read and write
2E90000
heap
page read and write
1B7000
stack
page read and write
13B8000
heap
page read and write
7FF5DF2DA000
unkown
page readonly
51EE000
trusted library allocation
page read and write
83D0000
unkown
page read and write
3190000
heap
page read and write
2FAD000
direct allocation
page execute and read and write
7FF5DF095000
unkown
page readonly
C159000
unkown
page read and write
2B5F000
heap
page read and write
C013000
unkown
page read and write
6930000
trusted library allocation
page read and write
7FF5DF443000
unkown
page readonly
3394000
unkown
page read and write
7FF5DF122000
unkown
page readonly
3631000
heap
page read and write
848E000
stack
page read and write
4311000
trusted library allocation
page read and write
7930000
unkown
page readonly
3D0A000
trusted library allocation
page read and write
3560000
direct allocation
page read and write
31C0000
heap
page read and write
341A000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page execute and read and write
C183000
unkown
page read and write
65A000
heap
page read and write
2D0C000
trusted library allocation
page read and write
3120000
heap
page read and write
A08D000
unkown
page read and write
7FF5DEF84000
unkown
page readonly
AC0D000
stack
page read and write
E80000
system
page execute and read and write
2C11000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
9489000
stack
page read and write
2BD4000
heap
page read and write
7FF5DF0C9000
unkown
page readonly
E3E000
stack
page read and write
2F4F000
stack
page read and write
C35F000
unkown
page read and write
BF10000
unkown
page readonly
3403000
heap
page read and write
5783000
heap
page read and write
380F000
unkown
page read and write
B4DB000
stack
page read and write
C354000
unkown
page read and write
B60A000
stack
page read and write
51F7000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
548D000
trusted library allocation
page read and write
7FF5DF3C6000
unkown
page readonly
268F000
stack
page read and write
6920000
trusted library allocation
page execute and read and write
8F8000
trusted library allocation
page read and write
86C2000
heap
page read and write
95EE000
stack
page read and write
63EE000
stack
page read and write
396A000
trusted library allocation
page read and write
E00000
heap
page read and write
356C000
trusted library allocation
page read and write
4815000
trusted library allocation
page read and write
7FF5DF2E2000
unkown
page readonly
7FF5DF59E000
unkown
page readonly
98A1000
unkown
page read and write
5B00000
trusted library allocation
page execute and read and write
47F1000
unkown
page read and write
47EC000
unkown
page read and write
1073B000
unkown
page execute and read and write
5204000
heap
page read and write
327E000
heap
page read and write
2FD4000
heap
page read and write
58F5000
trusted library allocation
page read and write
3691000
heap
page read and write
7FF5DF396000
unkown
page readonly
2F34000
heap
page read and write
2E66000
direct allocation
page execute and read and write
7FF5DEFC2000
unkown
page readonly
313C000
stack
page read and write
2E7F000
unkown
page read and write
68CE000
stack
page read and write
556E000
stack
page read and write
3760000
heap
page read and write
27F0000
unkown
page readonly
2F6C000
stack
page read and write
10046000
unkown
page read and write
AA000
stack
page read and write
6EDC000
stack
page read and write
748000
heap
page read and write
5709000
trusted library allocation
page read and write
350C000
trusted library allocation
page read and write
DA6000
heap
page read and write
389A000
trusted library allocation
page read and write
8FB000
trusted library allocation
page read and write
2CAC000
trusted library allocation
page read and write
64D0000
trusted library allocation
page read and write
6B0000
trusted library allocation
page read and write
9C0000
heap
page read and write
7FF5DF091000
unkown
page readonly
268D000
stack
page read and write
30C0000
unclassified section
page execute and read and write
237D000
stack
page read and write
5ED0000
heap
page read and write
51EB000
trusted library allocation
page read and write
9D1F000
stack
page read and write
7FF5DF5D6000
unkown
page readonly
4E09000
heap
page read and write
7FF5DF3A1000
unkown
page readonly
3910000
heap
page read and write
4D10000
trusted library allocation
page execute and read and write
7FF5DF3F5000
unkown
page readonly
7FF5DF3AA000
unkown
page readonly
2370000
heap
page read and write
7FF5DF0A2000
unkown
page readonly
56B2000
trusted library allocation
page read and write
35ED000
direct allocation
page execute and read and write
ADF000
stack
page read and write
34EA000
trusted library allocation
page read and write
C298000
unkown
page read and write
2B3E000
unkown
page read and write
971C000
unkown
page read and write
5F3F000
stack
page read and write
6758000
heap
page read and write
7FF5DF5F0000
unkown
page readonly
4BCD000
direct allocation
page execute and read and write
5A0E000
stack
page read and write
3720000
heap
page read and write
2F60000
heap
page read and write
7399000
unkown
page read and write
7FF5DF1FC000
unkown
page readonly
7FF5DF591000
unkown
page readonly
5A2F000
stack
page read and write
7502000
unkown
page read and write
50E1000
trusted library allocation
page read and write
3877000
trusted library allocation
page read and write
E5A000
heap
page read and write
FCC000
stack
page read and write
23F0000
heap
page read and write
7FF5DF41B000
unkown
page readonly
1440000
heap
page read and write
4E60000
trusted library allocation
page execute and read and write
7FF5DF398000
unkown
page readonly
336C000
unkown
page read and write
2B20000
heap
page execute and read and write
4690000
trusted library allocation
page read and write
83D0000
unkown
page read and write
7FF5DF519000
unkown
page readonly
26F0000
heap
page read and write
4B90000
trusted library allocation
page read and write
117C000
stack
page read and write
B00000
trusted library allocation
page read and write
30D0000
heap
page read and write
7499000
unkown
page read and write
7FF5DF341000
unkown
page readonly
107C000
stack
page read and write
6C8E000
stack
page read and write
AC6000
heap
page read and write
C19D000
unkown
page read and write
970C000
unkown
page read and write
7FF5DF3F5000
unkown
page readonly
C298000
unkown
page read and write
5AB0000
heap
page read and write
23F0000
heap
page read and write
32A0000
heap
page read and write
BFA1000
unkown
page read and write
7FF5DF126000
unkown
page readonly
5214000
trusted library allocation
page read and write
46C1000
heap
page read and write
3210000
direct allocation
page read and write
C13D000
unkown
page read and write
B81B000
stack
page read and write
3370000
heap
page read and write
3374000
heap
page read and write
479B000
unkown
page read and write
2E49000
direct allocation
page execute and read and write
83B0000
unkown
page readonly
3289000
heap
page read and write
58C000
stack
page read and write
104B000
unclassified section
page execute and read and write
7FF5DF0CC000
unkown
page readonly
9E9E000
stack
page read and write
2C60000
trusted library allocation
page read and write
7F5000
heap
page read and write
7FF5DF53F000
unkown
page readonly
2955000
heap
page read and write
7FF5DE539000
unkown
page readonly
619D000
heap
page read and write
BFA7000
unkown
page read and write
A707000
unkown
page read and write
7FF5DF5FC000
unkown
page readonly
58E000
stack
page read and write
118A000
heap
page read and write
5E8000
heap
page read and write
2DD0000
heap
page read and write
165E000
stack
page read and write
7FF5DF551000
unkown
page readonly
2A20000
heap
page read and write
5235000
trusted library allocation
page read and write
2C54000
heap
page read and write
2AE0000
heap
page read and write
7FF5DF284000
unkown
page readonly
2648000
trusted library allocation
page read and write
3410000
heap
page read and write
442A000
trusted library allocation
page read and write
4AD0000
heap
page read and write
7FF5DF2DA000
unkown
page readonly
6E7000
trusted library allocation
page execute and read and write
EE74000
unkown
page read and write
980000
unkown
page readonly
279D000
stack
page read and write
5CF7000
heap
page read and write
2C5E000
heap
page read and write
73AF000
unkown
page read and write
4DF4000
trusted library allocation
page read and write
C319000
unkown
page read and write
7FF5DF2ED000
unkown
page readonly
7C4000
heap
page read and write
28E6000
trusted library allocation
page read and write
2EEF000
stack
page read and write
7FF5DF1CD000
unkown
page readonly
2F34000
heap
page read and write
668E000
stack
page read and write
4810000
trusted library allocation
page read and write
B4DB000
stack
page read and write
8A0000
heap
page read and write
6D8C000
stack
page read and write
2F40000
unclassified section
page execute and read and write
442000
unkown
page readonly
B9BF000
stack
page read and write
2A54000
heap
page read and write
DB0000
heap
page read and write
B830000
unkown
page readonly
4810000
trusted library allocation
page read and write
2942000
heap
page read and write
15C0000
trusted library allocation
page read and write
5263000
heap
page read and write
7FF5DF4E3000
unkown
page readonly
30A6000
direct allocation
page execute and read and write
D72000
heap
page read and write
88E0000
unkown
page read and write
7FF5DF57F000
unkown
page readonly
7FF5DEFF0000
unkown
page readonly
5BAE000
stack
page read and write
5CFE000
stack
page read and write
11FA000
heap
page read and write
2B71000
direct allocation
page execute and read and write
4F50000
trusted library allocation
page read and write
4C6C000
heap
page read and write
2DE0000
direct allocation
page read and write
5DEE000
stack
page read and write
38DC000
trusted library allocation
page read and write
41F000
remote allocation
page execute and read and write
1460000
heap
page read and write
3046000
direct allocation
page execute and read and write
315E000
trusted library allocation
page read and write
314B000
heap
page read and write
2A50000
direct allocation
page execute and read and write
D50000
unkown
page read and write
4B80000
trusted library allocation
page read and write
2FC0000
heap
page read and write
4CD1000
direct allocation
page execute and read and write
28E0000
heap
page read and write
2D80000
heap
page read and write
1292000
trusted library allocation
page read and write
11389000
system
page execute and read and write
8920000
unkown
page read and write
129A000
trusted library allocation
page execute and read and write
7DF5E896A000
unkown
page readonly
AF7E000
stack
page read and write
7FF5C0B6B000
unkown
page readonly
7F050000
trusted library allocation
page execute and read and write
D14000
heap
page read and write
C19D000
unkown
page read and write
BF84000
unkown
page read and write
7D0000
trusted library allocation
page read and write
4C0B000
trusted library allocation
page read and write
7FF5DF3EA000
unkown
page readonly
6AD000
stack
page read and write
5468000
heap
page read and write
12AB000
trusted library allocation
page execute and read and write
D2B000
trusted library allocation
page execute and read and write
12EE000
stack
page read and write
4820000
heap
page read and write
4BC0000
trusted library allocation
page execute and read and write
2C54000
heap
page read and write
E798000
system
page execute and read and write
7FF5DF591000
unkown
page readonly
5650000
heap
page read and write
6A94000
heap
page read and write
35B0000
heap
page read and write
1240000
heap
page read and write
7FF5DF3F1000
unkown
page readonly
308D000
stack
page read and write
6A6E000
stack
page read and write
3080000
heap
page read and write
2A54000
heap
page read and write
169E000
stack
page read and write
D14000
heap
page read and write
27BD000
stack
page read and write
2E4F000
stack
page read and write
5C8F000
stack
page read and write
7FF5DF095000
unkown
page readonly
2D9A000
heap
page read and write
4599000
heap
page read and write
69EE000
stack
page read and write
50F8000
heap
page read and write
2C70000
direct allocation
page execute and read and write
C13D000
unkown
page read and write
100C4000
unkown
page read and write
12A2000
trusted library allocation
page read and write
6A0E000
stack
page read and write
7FF5DE4F2000
unkown
page readonly
5CAE000
stack
page read and write
31AD000
unkown
page read and write
1191000
heap
page read and write
B830000
unkown
page readonly
EE88000
unkown
page read and write
2A8F000
stack
page read and write
2A70000
trusted library allocation
page read and write
7FF5DF081000
unkown
page readonly
5110000
trusted library allocation
page execute and read and write
60E5000
heap
page read and write
6D60000
trusted library allocation
page read and write
354F000
unkown
page read and write
6187000
heap
page read and write
33CF000
stack
page read and write
694E000
stack
page read and write
5687000
trusted library allocation
page read and write
4788000
unkown
page read and write
E800000
system
page execute and read and write
C140000
unkown
page read and write
179E000
stack
page read and write
86C0000
heap
page read and write
4F9D000
direct allocation
page execute and read and write
26C5000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
E00000
heap
page read and write
26A6000
trusted library allocation
page read and write
7940000
unkown
page readonly
88E0000
unkown
page read and write
7FF5DF36A000
unkown
page readonly
7FF5DF349000
unkown
page readonly
323E000
unkown
page read and write
7CE000
stack
page read and write
5FA2000
heap
page read and write
9380000
unkown
page readonly
3144000
trusted library allocation
page read and write
C3A8000
unkown
page read and write
3EBC000
trusted library allocation
page read and write
A0D000
trusted library allocation
page execute and read and write
27B1000
trusted library allocation
page read and write
7FF5DF12A000
unkown
page readonly
6B46000
heap
page read and write
7FF5DF425000
unkown
page readonly
5110000
unkown
page write copy
62CE000
stack
page read and write
B0A000
trusted library allocation
page execute and read and write
72E0000
trusted library allocation
page execute and read and write
57CF000
stack
page read and write
3371000
unkown
page read and write
4B00000
heap
page read and write
7FF5DF443000
unkown
page readonly
2928000
heap
page read and write
2AC6000
direct allocation
page execute and read and write
7D90000
unkown
page read and write
5C5A000
heap
page read and write
502E000
direct allocation
page execute and read and write
44EC000
trusted library allocation
page read and write
7FF5DF18E000
unkown
page readonly
112D000
trusted library allocation
page execute and read and write
65CE000
stack
page read and write
323D000
stack
page read and write
5850000
trusted library allocation
page read and write
7FF5DF26F000
unkown
page readonly
56D5000
heap
page read and write
542C000
stack
page read and write
577000
heap
page read and write
AB7000
heap
page read and write
A09A000
unkown
page read and write
270000
system
page execute and read and write
99AB000
unkown
page read and write
4B2D000
trusted library allocation
page read and write
DBB000
heap
page read and write
A1D000
trusted library allocation
page execute and read and write
2A03000
heap
page read and write
4C30000
trusted library allocation
page read and write
2A00000
heap
page read and write
3290000
unkown
page readonly
901B000
stack
page read and write
73B2000
unkown
page read and write
684E000
stack
page read and write
8661000
unkown
page read and write
728000
heap
page read and write
372A000
trusted library allocation
page read and write
2FD2000
heap
page read and write
7A30000
unkown
page read and write
2FED000
stack
page read and write
44CC000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
AB8D000
stack
page read and write
16EB000
unclassified section
page execute and read and write
329E000
stack
page read and write
840000
heap
page read and write
987C000
unkown
page read and write
297E000
stack
page read and write
7FF5DF156000
unkown
page readonly
C516000
unkown
page read and write
763E000
stack
page read and write
B57000
heap
page read and write
C319000
unkown
page read and write
C1C4000
unkown
page read and write
2EB0000
unclassified section
page execute and read and write
7FF5DF5AE000
unkown
page readonly
7F5E0000
trusted library allocation
page execute and read and write
91D000
stack
page read and write
2DC0000
heap
page read and write
5CA3000
heap
page read and write
34E0000
heap
page read and write
7FF5DF284000
unkown
page readonly
5A6E000
stack
page read and write
725C000
stack
page read and write
9F3E000
unkown
page read and write
32EA000
trusted library allocation
page read and write
5210000
heap
page execute and read and write
7FF5DEFE8000
unkown
page readonly
5AFD000
stack
page read and write
1190000
heap
page read and write
2EC6000
direct allocation
page execute and read and write
482B000
trusted library allocation
page read and write
5951000
trusted library allocation
page read and write
7FF5DE5CC000
unkown
page readonly
327D000
stack
page read and write
577D000
stack
page read and write
7FF5DF380000
unkown
page readonly
33DE000
stack
page read and write
4981000
heap
page read and write
A03000
trusted library allocation
page execute and read and write
AB8D000
stack
page read and write
16D0000
unclassified section
page execute and read and write
A0A5000
unkown
page read and write
293E000
unkown
page read and write
2D5D000
stack
page read and write
3270000
heap
page read and write
6B4E000
stack
page read and write
2E50000
unkown
page readonly
DBE000
heap
page read and write
23BE000
unkown
page read and write
2885000
unclassified section
page execute and read and write
114B000
trusted library allocation
page execute and read and write
7FF5DF452000
unkown
page readonly
521E000
stack
page read and write
C40C000
unkown
page read and write
446C000
trusted library allocation
page read and write
973000
system
page readonly
6CBE000
stack
page read and write
57BE000
stack
page read and write
58D0000
trusted library allocation
page read and write
361F000
heap
page read and write
DBA000
heap
page read and write
4E0B000
trusted library allocation
page read and write
12A5000
trusted library allocation
page execute and read and write
438B000
stack
page read and write
7FF5C0B6B000
unkown
page readonly
7FF5DF2E5000
unkown
page readonly
2B86000
direct allocation
page execute and read and write
1720000
unclassified section
page execute and read and write
FB0000
heap
page read and write
4B43000
heap
page read and write
58DF000
stack
page read and write
2298000
trusted library allocation
page read and write
2ADF000
stack
page read and write
2DC0000
unkown
page read and write
7DF5E895F000
unkown
page readonly
8FC000
stack
page read and write
7FF5DF280000
unkown
page readonly
96F5000
unkown
page read and write
66D000
stack
page read and write
9F74000
unkown
page read and write
293D000
heap
page read and write
4750000
unkown
page read and write
2E5C000
stack
page read and write
3140000
heap
page read and write
3507000
unclassified section
page execute and read and write
6C4F000
stack
page read and write
5130000
trusted library allocation
page read and write
FF0000
heap
page read and write
4E17000
trusted library allocation
page read and write
1114000
trusted library allocation
page read and write
7991000
unkown
page read and write
7930000
unkown
page readonly
B9E0000
unkown
page read and write
940C000
stack
page read and write
28E1000
trusted library allocation
page read and write
FE0000
heap
page read and write
142E000
heap
page read and write
320D000
unkown
page read and write
28F2000
trusted library allocation
page read and write
4690000
trusted library allocation
page read and write
7FF5DF01B000
unkown
page readonly
7FF5DF169000
unkown
page readonly
1195000
heap
page read and write
9FA0000
unkown
page read and write
702E000
stack
page read and write
EE40000
unkown
page read and write
4750000
unkown
page read and write
688E000
stack
page read and write
62B0000
trusted library allocation
page read and write
7BC000
stack
page read and write
29E0000
heap
page read and write
A106000
unkown
page read and write
3668000
direct allocation
page execute and read and write
3364000
unkown
page read and write
2AFD000
stack
page read and write
338E000
stack
page read and write
C3BD000
unkown
page read and write
2D46000
direct allocation
page execute and read and write
2C60000
heap
page read and write
47D0000
trusted library allocation
page read and write
2A54000
heap
page read and write
66D9000
heap
page read and write
7E0000
trusted library allocation
page read and write
EE72000
unkown
page read and write
63CE000
stack
page read and write
83B0000
unkown
page readonly
9095000
stack
page read and write
78D000
stack
page read and write
620000
heap
page read and write
C3BE000
unkown
page read and write
28AB000
stack
page read and write
2A54000
heap
page read and write
7C4000
heap
page read and write
3373000
unkown
page read and write
54EE000
stack
page read and write
4802000
trusted library allocation
page read and write
748000
heap
page read and write
5F8E000
stack
page read and write
1340000
heap
page read and write
7FF5DEFE2000
unkown
page readonly
C13A000
unkown
page read and write
2B80000
heap
page read and write
940000
heap
page read and write
336F000
unkown
page read and write
4F70000
trusted library allocation
page read and write
4487000
trusted library allocation
page read and write
7FF5DF366000
unkown
page readonly
5910000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
2946000
direct allocation
page execute and read and write
BF9D000
unkown
page read and write
7FF5DF53F000
unkown
page readonly
4E19000
direct allocation
page execute and read and write
F07000
heap
page read and write
850000
heap
page read and write
B15000
trusted library allocation
page execute and read and write
4A40000
trusted library allocation
page read and write
48A0000
heap
page read and write
5762000
trusted library allocation
page read and write
C474000
unkown
page read and write
15C3000
trusted library allocation
page execute and read and write
4828000
unkown
page read and write
329C000
trusted library allocation
page read and write
B259000
stack
page read and write
845000
heap
page read and write
345F000
stack
page read and write
7FF5DE531000
unkown
page readonly
3E5C000
trusted library allocation
page read and write
150000
heap
page read and write
2F90000
heap
page read and write
99AB000
unkown
page read and write
393F000
heap
page read and write
4D0E000
stack
page read and write
7FF5DEFDD000
unkown
page readonly
A09A000
unkown
page read and write
2D1E000
stack
page read and write
455A000
trusted library allocation
page read and write
7FF5DF195000
unkown
page readonly
9F74000
unkown
page read and write
43FA000
trusted library allocation
page read and write
33EF000
stack
page read and write
B3E000
stack
page read and write
1195000
heap
page read and write
D0D000
trusted library allocation
page execute and read and write
C298000
unkown
page read and write
2680000
heap
page read and write
2D65000
trusted library allocation
page read and write
EE7D000
unkown
page read and write
4D60000
trusted library allocation
page read and write
2B1E000
unkown
page read and write
56C4000
trusted library allocation
page read and write
7FF5DF310000
unkown
page readonly
5CFB000
heap
page read and write
7C4000
heap
page read and write
739B000
unkown
page read and write
3376000
direct allocation
page execute and read and write
7380000
unkown
page read and write
96E000
stack
page read and write
59EC000
heap
page read and write
8F0000
trusted library allocation
page read and write
2C55000
trusted library allocation
page read and write
7FF5DF2ED000
unkown
page readonly
4690000
trusted library allocation
page read and write
7FF5DF08F000
unkown
page readonly
3E7C000
trusted library allocation
page read and write
3F3C000
trusted library allocation
page read and write
113A000
trusted library allocation
page execute and read and write
7FF5DF421000
unkown
page readonly
C192000
unkown
page read and write
C39F000
unkown
page read and write
2A54000
heap
page read and write
901B000
stack
page read and write
2C90000
heap
page read and write
80E000
stack
page read and write
84A000
heap
page read and write
140E000
heap
page read and write
7FF5DF067000
unkown
page readonly
30BF000
stack
page read and write
2948000
heap
page read and write
C1C4000
unkown
page read and write
228C000
trusted library allocation
page read and write
7FF5DF452000
unkown
page readonly
8EA9000
stack
page read and write
AEF000
stack
page read and write
2701000
trusted library allocation
page read and write
7FF5DF5A8000
unkown
page readonly
568B000
trusted library allocation
page read and write
FE0000
unkown
page read and write
6BF000
heap
page read and write
EFC000
stack
page read and write
9489000
stack
page read and write
7FF5DF5BE000
unkown
page readonly
6C7000
heap
page read and write
314B000
heap
page read and write
4D60000
trusted library allocation
page execute and read and write
9729000
unkown
page read and write
1398000
heap
page read and write
35DC000
heap
page read and write
63CE000
stack
page read and write
11CB000
heap
page read and write
97F3000
unkown
page read and write
2E6F000
unkown
page read and write
7FF5DF0F1000
unkown
page readonly
4AAB000
stack
page read and write
3130000
heap
page read and write
A10000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
624C000
stack
page read and write
5E3E000
stack
page read and write
56B0000
heap
page read and write
2FD4000
heap
page read and write
7FF5DF310000
unkown
page readonly
2FE3000
heap
page read and write
72F0000
trusted library allocation
page read and write
98AD000
unkown
page read and write
73B6000
unkown
page read and write
7FF5DEF4B000
unkown
page readonly
B010000
unkown
page read and write
BA0000
heap
page read and write
6AE000
stack
page read and write
2ACE000
trusted library allocation
page read and write
7FF5DF435000
unkown
page readonly
29E3000
direct allocation
page execute and read and write
2AFD000
stack
page read and write
7FF5DF396000
unkown
page readonly
3280000
heap
page read and write
2EFF000
unkown
page read and write
259A000
trusted library allocation
page read and write
A04000
trusted library allocation
page read and write
A37000
trusted library allocation
page execute and read and write
ADC0000
unkown
page readonly
32AE000
stack
page read and write
86CA000
heap
page read and write
2BDF000
unkown
page read and write
48AC000
stack
page read and write
8E6000
trusted library allocation
page read and write
3120000
heap
page read and write
2690000
unclassified section
page execute and read and write
5960000
trusted library allocation
page read and write
CF4000
trusted library allocation
page read and write
12F0000
heap
page read and write
2911000
trusted library allocation
page read and write
5823000
heap
page read and write
53E0000
heap
page read and write
4840000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
52D9000
unkown
page read and write
161E000
stack
page read and write
EA30000
unkown
page execute and read and write
3F9C000
trusted library allocation
page read and write
9704000
unkown
page read and write
CB1000
heap
page read and write
C4D8000
unkown
page read and write
5660000
trusted library allocation
page execute and read and write
2F63000
direct allocation
page execute and read and write
DC0000
heap
page read and write
2F34000
heap
page read and write
6C8C000
stack
page read and write
7FF5DF211000
unkown
page readonly
710000
trusted library allocation
page execute and read and write
E6F000
heap
page read and write
7FF5DF0C1000
unkown
page readonly
9F78000
unkown
page read and write
52B0000
trusted library allocation
page read and write
5150000
heap
page execute and read and write
3291000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page execute and read and write
D3E000
heap
page read and write
B589000
stack
page read and write
98A7000
unkown
page read and write
4855000
unkown
page read and write
2327000
trusted library allocation
page read and write
3143000
direct allocation
page execute and read and write
E70000
unkown
page readonly
5260000
heap
page read and write
C1A9000
unkown
page read and write
7FC000
stack
page read and write
22C2000
trusted library allocation
page read and write
279000
system
page execute and read and write
2B3F000
heap
page read and write
81C000
heap
page read and write
907000
heap
page read and write
68F000
stack
page read and write
95F0000
unkown
page read and write
7FF5DF3E4000
unkown
page readonly
1290000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
AB0D000
stack
page read and write
444C000
trusted library allocation
page read and write
7FF5DEFA6000
unkown
page readonly
5363000
heap
page read and write
E8C2000
system
page execute and read and write
4C20000
trusted library allocation
page execute and read and write
1380000
unclassified section
page execute and read and write
4E00000
trusted library allocation
page read and write
1004B000
unkown
page read and write
E40000
heap
page read and write
6690000
heap
page read and write
754000
heap
page read and write
278D000
stack
page read and write
5AF000
stack
page read and write
D30000
heap
page read and write
58DF000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
4DAD000
stack
page read and write
437C000
stack
page read and write
3610000
heap
page read and write
35A0000
heap
page read and write
5F0E000
stack
page read and write
C24C000
unkown
page read and write
5204000
heap
page read and write
7FF5DF06F000
unkown
page readonly
11A0000
heap
page read and write
86C0000
heap
page read and write
700000
trusted library allocation
page read and write
22EC000
trusted library allocation
page read and write
8590000
unkown
page readonly
7FF5DEFAF000
unkown
page readonly
BFAF000
unkown
page read and write
508E000
stack
page read and write
4E5A000
heap
page read and write
C003000
unkown
page read and write
5210000
trusted library allocation
page execute and read and write
2DBD000
stack
page read and write
5C3E000
stack
page read and write
9700000
unkown
page read and write
B9F0000
unkown
page read and write
4A95000
trusted library allocation
page read and write
2920000
heap
page read and write
10F8F000
system
page read and write
F10000
heap
page read and write
2C9A000
stack
page read and write
2CDF000
stack
page read and write
2C40000
heap
page read and write
590D000
stack
page read and write
7DF4E67A1000
unkown
page execute read
4788000
unkown
page read and write
4E8E000
direct allocation
page execute and read and write
1004B000
unkown
page read and write
28D3000
heap
page read and write
5A0E000
stack
page read and write
A2A000
trusted library allocation
page execute and read and write
A0FC000
unkown
page read and write
31F0000
heap
page read and write
3B2C000
trusted library allocation
page read and write
2BF0000
direct allocation
page execute and read and write
9716000
unkown
page read and write
578A000
heap
page read and write
2AE0000
heap
page read and write
50FD000
heap
page read and write
425000
heap
page read and write
497D000
heap
page read and write
7FF5DEFF8000
unkown
page readonly
5228000
trusted library allocation
page read and write
2DF9000
trusted library allocation
page read and write
2DF0000
heap
page read and write
268D000
trusted library allocation
page read and write
6D0000
trusted library allocation
page read and write
658F000
stack
page read and write
59F0000
trusted library allocation
page execute and read and write
31D9000
direct allocation
page execute and read and write
83F000
heap
page read and write
FE0000
unkown
page read and write
5F0F000
heap
page read and write
6E5000
trusted library allocation
page execute and read and write
3284000
heap
page read and write
50FD000
heap
page read and write
52F0000
trusted library allocation
page read and write
41F000
remote allocation
page execute and read and write
AC9000
heap
page read and write
32EC000
stack
page read and write
850000
heap
page read and write
35CF000
stack
page read and write
7FF5DF341000
unkown
page readonly
C35C000
unkown
page read and write
BF8C000
unkown
page read and write
7E3000
trusted library allocation
page execute and read and write
9B99000
stack
page read and write
2E40000
direct allocation
page execute and read and write
48A0000
unkown
page read and write
2937000
heap
page read and write
2942000
heap
page read and write
9F27000
unkown
page read and write
BFA5000
unkown
page read and write
6D5E000
stack
page read and write
114F7000
system
page execute and read and write
48B0000
unkown
page read and write
7C89000
stack
page read and write
A6FE000
unkown
page read and write
47EB000
heap
page read and write
AE0000
heap
page read and write
4B90000
trusted library allocation
page read and write
96ED000
unkown
page read and write
4900000
heap
page read and write
E80000
system
page execute and read and write
2EAF000
stack
page read and write
515D000
direct allocation
page execute and read and write
1142000
trusted library allocation
page read and write
4D6D000
direct allocation
page execute and read and write
ADAB000
stack
page read and write
2AA8000
heap
page read and write
2FAE000
stack
page read and write
E63000
heap
page read and write
C23D000
unkown
page read and write
5416000
heap
page read and write
17A0000
trusted library allocation
page read and write
874C000
stack
page read and write
32B0000
heap
page read and write
3F0A000
trusted library allocation
page read and write
914B000
stack
page read and write
2982000
direct allocation
page execute and read and write
4ABC000
heap
page read and write
1320000
heap
page read and write
5B6E000
stack
page read and write
7230000
unkown
page read and write
5204000
heap
page read and write
7DF5E896A000
unkown
page readonly
30B0000
heap
page read and write
340E000
stack
page read and write
42FA000
trusted library allocation
page read and write
E5D000
heap
page read and write
363F000
heap
page read and write
33BA000
trusted library allocation
page read and write
7FF5DF425000
unkown
page readonly
48B0000
unkown
page read and write
828000
heap
page read and write
E40000
heap
page read and write
7FF5DEF90000
unkown
page readonly
2A9C000
heap
page read and write
2900000
heap
page execute and read and write
7FF5DF62C000
unkown
page readonly
301F000
stack
page read and write
134E000
stack
page read and write
C523000
unkown
page read and write
48D0000
trusted library allocation
page read and write
B90000
heap
page read and write
9F7C000
unkown
page read and write
2BB0000
heap
page read and write
C354000
unkown
page read and write
2EDF000
stack
page read and write
19D000
stack
page read and write
7FF5DF0A5000
unkown
page readonly
7FF5DF169000
unkown
page readonly
7FF5DF3C6000
unkown
page readonly
9C1D000
stack
page read and write
D99000
heap
page read and write
A35000
trusted library allocation
page execute and read and write
23E0000
heap
page read and write
B1B000
trusted library allocation
page execute and read and write
2664000
trusted library allocation
page read and write
2260000
trusted library allocation
page read and write
BF7E000
unkown
page read and write
4E40000
trusted library allocation
page execute and read and write
2C54000
heap
page read and write
4E50000
trusted library allocation
page execute and read and write
7EF20000
trusted library allocation
page execute and read and write
8910000
unkown
page read and write
9F23000
unkown
page read and write
29E0000
heap
page read and write
56FA000
heap
page read and write
6350000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
C149000
unkown
page read and write
1136000
trusted library allocation
page execute and read and write
7FF5DF08B000
unkown
page readonly
7FF5DF361000
unkown
page readonly
4CE0000
trusted library allocation
page execute and read and write
13C0000
heap
page read and write
7FF5DF20A000
unkown
page readonly
7D0D000
stack
page read and write
336D000
stack
page read and write
7FF5DF519000
unkown
page readonly
6DF7000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
7FF5DF429000
unkown
page readonly
BF8C000
unkown
page read and write
17B0000
trusted library allocation
page execute and read and write
E0E000
stack
page read and write
711B000
stack
page read and write
4803000
heap
page read and write
37EA000
trusted library allocation
page read and write
3374000
heap
page read and write
293B000
heap
page read and write
4AF0000
heap
page read and write
56E0000
trusted library allocation
page read and write
28C2000
direct allocation
page execute and read and write
36F0000
heap
page read and write
517F000
unclassified section
page read and write
47B6000
unkown
page read and write
44DA000
trusted library allocation
page read and write
5A8E000
stack
page read and write
C23D000
unkown
page read and write
5960000
trusted library allocation
page read and write
4A82000
direct allocation
page execute and read and write
A072000
unkown
page read and write
28A0000
unkown
page readonly
358E000
stack
page read and write
7FF5DF09B000
unkown
page readonly
2F34000
heap
page read and write
815000
trusted library allocation
page execute and read and write
2FD4000
heap
page read and write
FE0000
heap
page read and write
28DF000
stack
page read and write
98A1000
unkown
page read and write
2681000
trusted library allocation
page read and write
283D000
stack
page read and write
355F000
heap
page read and write
99AB000
unkown
page read and write
5BC2000
direct allocation
page execute and read and write
C24C000
unkown
page read and write
2A54000
heap
page read and write
5684000
trusted library allocation
page read and write
C18A000
unkown
page read and write
43F1000
heap
page read and write
7FF5DF488000
unkown
page readonly
30A6000
trusted library allocation
page read and write
2C20000
heap
page read and write
391C000
trusted library allocation
page read and write
5A0F000
heap
page read and write
4A9F000
stack
page read and write
C192000
unkown
page read and write
800000
heap
page read and write
5230000
trusted library allocation
page read and write
2C9A000
stack
page read and write
352C000
trusted library allocation
page read and write
77F0000
unkown
page read and write
7FF5DF4A6000
unkown
page readonly
7FF5DF3DF000
unkown
page readonly
610000
heap
page read and write
2B80000
heap
page read and write
2D90000
heap
page read and write
3400000
unclassified section
page execute and read and write
3172000
direct allocation
page execute and read and write
2540000
trusted library allocation
page read and write
4D10000
trusted library allocation
page execute and read and write
5650000
trusted library allocation
page execute and read and write
BFA3000
unkown
page read and write
6DA000
trusted library allocation
page execute and read and write
A3B000
trusted library allocation
page execute and read and write
4850000
trusted library allocation
page read and write
5204000
heap
page read and write
ED000
stack
page read and write
806000
trusted library allocation
page execute and read and write
9D9F000
stack
page read and write
7C4000
heap
page read and write
AE4000
trusted library allocation
page read and write
1A7000
stack
page read and write
A9A000
heap
page read and write
5DCF000
stack
page read and write
34C0000
heap
page read and write
7FF5DE535000
unkown
page readonly
BC0000
heap
page read and write
4880000
unkown
page read and write
CCE000
stack
page read and write
68FC000
stack
page read and write
3690000
heap
page read and write
9F51000
unkown
page read and write
9700000
unkown
page read and write
281D000
trusted library allocation
page execute and read and write
630F000
stack
page read and write
C192000
unkown
page read and write
5577000
trusted library allocation
page read and write
2D63000
unkown
page read and write
BFAF000
unkown
page read and write
2A21000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
6E97000
trusted library allocation
page read and write
27D0000
heap
page read and write
2980000
heap
page read and write
7FF5DF08B000
unkown
page readonly
3770000
heap
page read and write
9A6C000
stack
page read and write
5CCE000
stack
page read and write
7FF5DF16B000
unkown
page readonly
8400000
heap
page read and write
7FF5DF089000
unkown
page readonly
259F000
stack
page read and write
4AA0000
heap
page execute and read and write
56D8000
heap
page read and write
2F10000
unkown
page read and write
23D0000
direct allocation
page read and write
696E000
stack
page read and write
BE0000
heap
page read and write
667C000
stack
page read and write
4E7A000
heap
page read and write
73E5000
unkown
page read and write
7FF5DF537000
unkown
page readonly
3374000
heap
page read and write
314B000
heap
page read and write
6B3000
trusted library allocation
page execute and read and write
C187000
unkown
page read and write
2F73000
trusted library allocation
page read and write
72CC000
stack
page read and write
4550000
trusted library allocation
page execute and read and write
4AA0000
trusted library allocation
page execute and read and write
2870000
unkown
page read and write
2648000
unclassified section
page execute and read and write
5770000
trusted library allocation
page execute and read and write
307F000
stack
page read and write
2981000
heap
page read and write
1780000
trusted library allocation
page read and write
7FF5DF5F6000
unkown
page readonly
D03000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
5529000
heap
page read and write
607E000
stack
page read and write
81B000
trusted library allocation
page execute and read and write
4E40000
heap
page read and write
2E6D000
stack
page read and write
BDE000
stack
page read and write
2FB0000
heap
page read and write
44FA000
trusted library allocation
page read and write
4E70000
heap
page execute and read and write
AE6F000
stack
page read and write
1234000
heap
page read and write
30FE000
stack
page read and write
2B30000
trusted library allocation
page read and write
6AC000
stack
page read and write
45F0000
trusted library allocation
page execute and read and write
2EFC000
stack
page read and write
31EB000
stack
page read and write
3289000
heap
page read and write
2FD1000
direct allocation
page execute and read and write
5CBD000
stack
page read and write
BFCE000
unkown
page read and write
5110000
unkown
page write copy
324F000
stack
page read and write
307F000
stack
page read and write
457A000
trusted library allocation
page read and write
A0B1000
unkown
page read and write
420000
heap
page read and write
638E000
stack
page read and write
BA76000
stack
page read and write
4AB0000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
7300000
heap
page read and write
50F4000
heap
page read and write
3050000
direct allocation
page read and write
46C6000
heap
page read and write
3E17000
trusted library allocation
page read and write
3B7A000
trusted library allocation
page read and write
7FF5DF584000
unkown
page readonly
3375000
unkown
page read and write
2BA0000
heap
page execute and read and write
4DF0000
trusted library allocation
page read and write
2D8D000
stack
page read and write
5103000
heap
page read and write
BC5000
heap
page read and write
5802000
trusted library allocation
page read and write
2A54000
heap
page read and write
84A000
heap
page read and write
2C30000
trusted library allocation
page read and write
4FED000
stack
page read and write
6C0000
heap
page read and write
3D8A000
trusted library allocation
page read and write
5204000
heap
page read and write
4C91000
trusted library allocation
page read and write
7DF4E6770000
unkown
page readonly
3598000
heap
page read and write
77F0000
unkown
page read and write
D50000
unkown
page read and write
594E000
stack
page read and write
292D000
trusted library allocation
page execute and read and write
7FF5DF478000
unkown
page readonly
7FF5DF50F000
unkown
page readonly
B8E0000
system
page execute and read and write
17D0000
heap
page read and write
7FF5DF48B000
unkown
page readonly
C53B000
unkown
page read and write
BEF0000
heap
page read and write
30A0000
trusted library allocation
page read and write
611E000
stack
page read and write
9B99000
stack
page read and write
6A0000
trusted library allocation
page read and write
3B1F000
heap
page read and write
7D89000
stack
page read and write
C35C000
unkown
page read and write
5B8E000
stack
page read and write
7FF5DF388000
unkown
page readonly
4A0D000
direct allocation
page execute and read and write
4BC9000
direct allocation
page execute and read and write
4CF0000
direct allocation
page execute and read and write
2E47000
direct allocation
page execute and read and write
7F8000
heap
page read and write
5820000
heap
page read and write
2942000
heap
page read and write
A0A5000
unkown
page read and write
B30000
trusted library allocation
page read and write
41F000
remote allocation
page execute and read and write
29BC000
stack
page read and write
EEA3000
unkown
page read and write
2CE2000
trusted library allocation
page read and write
7FF5DF361000
unkown
page readonly
96F1000
unkown
page read and write
5220000
trusted library allocation
page read and write
2F9F000
heap
page read and write
AF7E000
stack
page read and write
7FF5DF343000
unkown
page readonly
10046000
unkown
page read and write
1283000
trusted library allocation
page read and write
2B00000
heap
page read and write
2D19000
direct allocation
page execute and read and write
2CCA000
trusted library allocation
page read and write
2FD4000
heap
page read and write
8E4000
trusted library allocation
page read and write
51DB000
trusted library allocation
page read and write
6747000
heap
page read and write
99AB000
unkown
page read and write
34B0000
unkown
page readonly
2BF7000
direct allocation
page execute and read and write
BF90000
unkown
page read and write
7FF5DF24E000
unkown
page readonly
BA7000
heap
page read and write
64CB000
stack
page read and write
B840000
system
page execute and read and write
482E000
trusted library allocation
page read and write
4860000
unkown
page read and write
4AE0000
heap
page read and write
2270000
heap
page execute and read and write
7FF5DEF57000
unkown
page readonly
7FF5DF4FB000
unkown
page readonly
98A7000
unkown
page read and write
C50000
heap
page read and write
3A1A000
trusted library allocation
page read and write
EA0000
heap
page read and write
2FC0000
heap
page read and write
3300000
heap
page execute and read and write
7B60000
unkown
page readonly
5260000
trusted library allocation
page read and write
5D5E000
stack
page read and write
3290000
heap
page read and write
C149000
unkown
page read and write
4B0F000
heap
page read and write
98AD000
unkown
page read and write
5E3E000
stack
page read and write
BF9B000
unkown
page read and write
47FF000
stack
page read and write
43F0000
heap
page read and write
894000
trusted library allocation
page read and write
7870000
unkown
page read and write
170D000
trusted library allocation
page execute and read and write
2C54000
heap
page read and write
5E0E000
stack
page read and write
B9BF000
stack
page read and write
BEF0000
heap
page read and write
2DB0000
heap
page read and write
5810000
trusted library allocation
page execute and read and write
513D000
direct allocation
page execute and read and write
987C000
unkown
page read and write
51C0000
trusted library allocation
page read and write
5146000
heap
page read and write
7FF5DF3FC000
unkown
page readonly
5B51000
direct allocation
page execute and read and write
A3E000
stack
page read and write
4C40000
trusted library allocation
page read and write
452C000
trusted library allocation
page read and write
C57000
heap
page read and write
715E000
stack
page read and write
7FF5DF48B000
unkown
page readonly
FF1000
unkown
page readonly
2B7F000
heap
page read and write
BF84000
unkown
page read and write
2255000
trusted library allocation
page read and write
7FF5DF1F9000
unkown
page readonly
2F70000
heap
page read and write
28CE000
unkown
page read and write
FDE000
stack
page read and write
111D000
trusted library allocation
page execute and read and write
C1A9000
unkown
page read and write
2F97000
trusted library allocation
page execute and read and write
3CD000
stack
page read and write
72D0000
heap
page read and write
4814000
trusted library allocation
page read and write
14A0000
unclassified section
page execute and read and write
9F63000
unkown
page read and write
27D0000
unkown
page read and write
7FF5DF25E000
unkown
page readonly
7D0D000
stack
page read and write
269D000
stack
page read and write
66C000
stack
page read and write
7FF5DF3B9000
unkown
page readonly
35D0000
heap
page read and write
4F99000
direct allocation
page execute and read and write
CD0000
heap
page read and write
35C0000
heap
page read and write
3FEA000
trusted library allocation
page read and write
EE84000
unkown
page read and write
BF40000
unkown
page read and write
50D4000
heap
page read and write
7840000
unkown
page read and write
2DCD000
stack
page read and write
545000
heap
page read and write
47D4000
trusted library allocation
page read and write
31F0000
heap
page read and write
648E000
stack
page read and write
4831000
trusted library allocation
page read and write
9F78000
unkown
page read and write
6AB5000
heap
page read and write
580E000
stack
page read and write
5F56000
heap
page read and write
2980000
heap
page read and write
344D000
direct allocation
page execute and read and write
2F40000
heap
page read and write
ACAE000
stack
page read and write
34EE000
unkown
page read and write
7FF5DF2F3000
unkown
page readonly
7C89000
stack
page read and write
2B30000
trusted library allocation
page read and write
C187000
unkown
page read and write
EB5000
heap
page read and write
C39F000
unkown
page read and write
5210000
trusted library allocation
page read and write
3185000
stack
page read and write
2AD6000
direct allocation
page execute and read and write
7B4C000
stack
page read and write
59A0000
heap
page read and write
5CCE000
stack
page read and write
6027000
trusted library allocation
page read and write
3CCE000
direct allocation
page execute and read and write
CB0000
heap
page read and write
FE0000
heap
page read and write
5D7000
stack
page read and write
19E000
unkown
page read and write
3185000
stack
page read and write
1482000
heap
page read and write
2C50000
trusted library allocation
page read and write
28DE000
trusted library allocation
page read and write
535F000
stack
page read and write
2FFF000
stack
page read and write
7FF5DF39C000
unkown
page readonly
2820000
heap
page read and write
A02D000
unkown
page read and write
A690000
unkown
page read and write
30E8000
heap
page read and write
28D0000
heap
page read and write
C359000
unkown
page read and write
7FF5DEFFC000
unkown
page readonly
67EE000
stack
page read and write
73B8000
unkown
page read and write
7FF5DF18E000
unkown
page readonly
63D0000
trusted library allocation
page read and write
32D0000
heap
page read and write
98A1000
unkown
page read and write
7FF5DF380000
unkown
page readonly
4A00000
direct allocation
page execute and read and write
EE7D000
unkown
page read and write
2B5E000
trusted library allocation
page read and write
4D59000
trusted library allocation
page read and write
64CC000
stack
page read and write
3352000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
7FF5DF3C2000
unkown
page readonly
51E0000
trusted library allocation
page read and write
345C000
trusted library allocation
page read and write
30A0000
direct allocation
page execute and read and write
5BCE000
stack
page read and write
7FF5DF435000
unkown
page readonly
92C000
stack
page read and write
4740000
direct allocation
page execute and read and write
2989000
trusted library allocation
page read and write
2789000
unclassified section
page execute and read and write
2FA5000
heap
page read and write
C1C4000
unkown
page read and write
333A000
trusted library allocation
page read and write
12A7000
trusted library allocation
page execute and read and write
5202000
trusted library allocation
page read and write
7FF5DF551000
unkown
page readonly
7DF4E6761000
unkown
page execute read
2AFD000
stack
page read and write
7DF4E6760000
unkown
page readonly
59A9000
direct allocation
page execute and read and write
2B31000
heap
page read and write
C1A9000
unkown
page read and write
4B60000
trusted library allocation
page read and write
7BE000
stack
page read and write
7FF5DF539000
unkown
page readonly
36A0000
heap
page read and write
55A0000
trusted library allocation
page execute and read and write
590E000
stack
page read and write
B02000
trusted library allocation
page read and write
390F000
stack
page read and write
2CA1000
trusted library allocation
page read and write
1459000
heap
page read and write
4F90000
trusted library allocation
page read and write
2F63000
trusted library allocation
page execute and read and write
4970000
heap
page read and write
4DE2000
direct allocation
page execute and read and write
C42C000
unkown
page read and write
5C97000
heap
page read and write
559E000
stack
page read and write
5AA0000
trusted library allocation
page execute and read and write
703000
heap
page read and write
C18A000
unkown
page read and write
4CD1000
trusted library allocation
page read and write
7FF5DF5CC000
unkown
page readonly
38D000
stack
page read and write
2D13000
heap
page read and write
34BE000
direct allocation
page execute and read and write
7FF5DF25E000
unkown
page readonly
4E50000
trusted library allocation
page execute and read and write
177A000
trusted library allocation
page execute and read and write
7FF5DF4F3000
unkown
page readonly
6F2D000
stack
page read and write
305C000
heap
page read and write
470E000
stack
page read and write
4BC0000
trusted library allocation
page read and write
6F20000
heap
page read and write
96DF000
unkown
page read and write
51F1000
trusted library allocation
page read and write
539E000
stack
page read and write
5CFE000
heap
page read and write
4D71000
direct allocation
page execute and read and write
394A000
trusted library allocation
page read and write
9F27000
unkown
page read and write
2660000
trusted library allocation
page read and write
B359000
stack
page read and write
2A54000
heap
page read and write
370000
system
page execute and read and write
7FF5DF488000
unkown
page readonly
4B80000
trusted library allocation
page read and write
120A000
heap
page read and write
2C37000
heap
page read and write
22AA000
trusted library allocation
page read and write
50EE000
stack
page read and write
7FF5DF0F1000
unkown
page readonly
7FF5DF081000
unkown
page readonly
2AC0000
heap
page read and write
1DD000
stack
page read and write
8DF000
stack
page read and write
2ABE000
stack
page read and write
F7E000
stack
page read and write
2CE0000
direct allocation
page execute and read and write
8EC000
stack
page read and write
9D0000
heap
page read and write
7F0000
heap
page read and write
7FF5DF0A2000
unkown
page readonly
7FF5DF017000
unkown
page readonly
7FF5DF4C6000
unkown
page readonly
2A4F000
unkown
page read and write
63F0000
heap
page read and write
3020000
heap
page read and write
3140000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
29EC000
heap
page read and write
57F0000
heap
page read and write
2E9E000
stack
page read and write
B368000
unkown
page read and write
2250000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
9E9E000
stack
page read and write
DFB000
unclassified section
page execute and read and write
BA0000
heap
page read and write
3220000
heap
page read and write
7FF5DEE4E000
unkown
page readonly
B7E000
stack
page read and write
1123000
trusted library allocation
page read and write
C192000
unkown
page read and write
5880000
direct allocation
page execute and read and write
5410000
heap
page read and write
6F2E000
stack
page read and write
5785000
trusted library allocation
page read and write
6BBE000
stack
page read and write
2D14000
heap
page read and write
1782000
trusted library allocation
page read and write
7FF5DF4BD000
unkown
page readonly
EE84000
unkown
page read and write
7FF5DF0F6000
unkown
page readonly
328F000
heap
page read and write
C354000
unkown
page read and write
5430000
trusted library allocation
page read and write
CFD000
trusted library allocation
page execute and read and write
27C000
system
page execute and read and write
2B50000
heap
page read and write
A70C000
unkown
page read and write
6400000
trusted library allocation
page execute and read and write
29F0000
heap
page read and write
2C40000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7499000
unkown
page read and write
3DAA000
trusted library allocation
page read and write
B1C000
stack
page read and write
2942000
heap
page read and write
971A000
unkown
page read and write
E30000
heap
page read and write
2C30000
heap
page read and write
5415000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
790000
heap
page read and write
2AD0000
direct allocation
page execute and read and write
7FF5DEFAF000
unkown
page readonly
2F8E000
stack
page read and write
5C0F000
stack
page read and write
2A05000
heap
page read and write
7230000
unkown
page read and write
7FF5DF09B000
unkown
page readonly
5232000
trusted library allocation
page read and write
32B0000
unkown
page read and write
2FAA000
heap
page read and write
B85000
heap
page read and write
73CD000
unkown
page read and write
10290000
system
page execute and read and write
5917000
trusted library allocation
page read and write
273E000
stack
page read and write
2B8E000
stack
page read and write
4B0000
heap
page read and write
2FDD000
heap
page read and write
51D0000
trusted library allocation
page read and write
2923000
direct allocation
page execute and read and write
2ACC000
trusted library allocation
page read and write
54AE000
stack
page read and write
11F0000
unclassified section
page execute and read and write
66B0000
heap
page read and write
2ADC000
heap
page read and write
47DB000
trusted library allocation
page read and write
556F000
stack
page read and write
FF1000
unkown
page readonly
2740000
heap
page read and write
5C8C000
heap
page read and write
337A000
trusted library allocation
page read and write
2B00000
heap
page read and write
3580000
heap
page read and write
48B2000
trusted library allocation
page read and write
76F0000
unkown
page read and write
4999000
heap
page read and write
BFA1000
unkown
page read and write
7FF5DF221000
unkown
page readonly
327B000
heap
page read and write
440000
unkown
page readonly
5B29000
trusted library allocation
page read and write
1178000
heap
page read and write
2C54000
heap
page read and write
83E0000
unkown
page read and write
4BA3000
heap
page read and write
7FF5DF5BE000
unkown
page readonly
30FD000
stack
page read and write
268C000
heap
page read and write
68B7000
trusted library allocation
page read and write
13C6000
heap
page read and write
2937000
heap
page read and write
305D000
stack
page read and write
1729000
unclassified section
page execute and read and write
640E000
stack
page read and write
2DB6000
heap
page read and write
692000
heap
page read and write
88DE000
stack
page read and write
35D1000
direct allocation
page execute and read and write
96F5000
unkown
page read and write
729E000
stack
page read and write
2B30000
trusted library allocation
page read and write
545B000
heap
page read and write
7FF5DF388000
unkown
page readonly
34CF000
stack
page read and write
7FF5DF5A8000
unkown
page readonly
33E0000
heap
page read and write
A744000
unkown
page read and write
5FCF000
stack
page read and write
2B60000
heap
page read and write
A705000
unkown
page read and write
B20000
heap
page read and write
51E0000
heap
page read and write
5204000
heap
page read and write
320E000
stack
page read and write
335B000
unkown
page read and write
278D000
stack
page read and write
2942000
heap
page read and write
2D1A000
trusted library allocation
page read and write
7FF5DF364000
unkown
page readonly
591E000
stack
page read and write
3356000
unkown
page read and write
6A70000
heap
page read and write
606C000
stack
page read and write
7F340000
trusted library allocation
page execute and read and write
7FF5DF12A000
unkown
page readonly
B17000
trusted library allocation
page execute and read and write
32B8000
heap
page read and write
BF82000
unkown
page read and write
26FF000
unkown
page read and write
2DAB000
heap
page read and write
2FFE000
stack
page read and write
7FF5DF59E000
unkown
page readonly
14A9000
unclassified section
page execute and read and write
3120000
heap
page read and write
4D5E000
stack
page read and write
7FF5DF26F000
unkown
page readonly
136E000
stack
page read and write
973C000
unkown
page read and write
2A54000
heap
page read and write
2930000
heap
page read and write
890000
trusted library allocation
page read and write
7C4000
heap
page read and write
7FF5DE9C3000
unkown
page readonly
1590000
heap
page read and write
1500000
heap
page read and write
7FF5DEFE8000
unkown
page readonly
79E0000
unkown
page readonly
584D000
stack
page read and write
3AAA000
trusted library allocation
page read and write
A6EE000
unkown
page read and write
817000
heap
page read and write
619B000
heap
page read and write
DDE000
stack
page read and write
C187000
unkown
page read and write
66EE000
stack
page read and write
3289000
heap
page read and write
9563000
unkown
page read and write
2829000
trusted library allocation
page read and write
B010000
unkown
page read and write
4E00000
trusted library allocation
page execute and read and write
C048000
unkown
page read and write
253C000
stack
page read and write
A08A000
unkown
page read and write
175E000
stack
page read and write
1432000
heap
page read and write
7FF5DF42F000
unkown
page readonly
EE40000
unkown
page read and write
2598000
trusted library allocation
page read and write
326E000
unkown
page read and write
1190000
heap
page read and write
2F60000
trusted library allocation
page read and write
47F3000
unkown
page read and write
BFAD000
unkown
page read and write
4DF0000
trusted library allocation
page read and write
B60000
heap
page read and write
37A0000
heap
page read and write
7FF5DF0C3000
unkown
page readonly
2FB0000
heap
page read and write
30D6000
direct allocation
page execute and read and write
3281000
trusted library allocation
page read and write
4690000
heap
page read and write
3F5C000
trusted library allocation
page read and write
CE0000
heap
page read and write
5200000
trusted library allocation
page read and write
3210000
heap
page read and write
7FF5DEFAC000
unkown
page readonly
2F90000
trusted library allocation
page read and write
47EB000
trusted library allocation
page read and write
47FD000
trusted library allocation
page read and write
7FF5DF43C000
unkown
page readonly
7810000
unkown
page read and write
840000
heap
page read and write
4991000
heap
page read and write
128A000
heap
page read and write
14AC000
unclassified section
page execute and read and write
4DC9000
trusted library allocation
page read and write
CCF000
stack
page read and write
E5B000
heap
page read and write
A6CF000
unkown
page read and write
3027000
direct allocation
page execute and read and write
7F0000
trusted library allocation
page read and write
3304000
unkown
page read and write
5438000
heap
page read and write
1300000
heap
page read and write
7FF5DEF94000
unkown
page readonly
650000
heap
page read and write
3040000
heap
page read and write
AEF0000
unkown
page read and write
35E4000
heap
page read and write
2DB6000
heap
page read and write
3161000
trusted library allocation
page read and write
4DE5000
heap
page read and write
2D63000
unkown
page read and write
FCD000
trusted library allocation
page execute and read and write
592E000
stack
page read and write
176D000
trusted library allocation
page execute and read and write
A6D2000
unkown
page read and write
32C0000
heap
page read and write
3389000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
A098000
unkown
page read and write
2AE6000
heap
page read and write
12B0000
heap
page read and write
962B000
unkown
page read and write
8DB9000
system
page execute and read and write
7FF5DF36A000
unkown
page readonly
A098000
unkown
page read and write
9FC3000
unkown
page read and write
5670000
trusted library allocation
page read and write
2FB1000
direct allocation
page execute and read and write
2BE0000
trusted library allocation
page read and write
2FE6000
direct allocation
page execute and read and write
648E000
stack
page read and write
2710000
trusted library allocation
page execute and read and write
2B9C000
stack
page read and write
95EE000
stack
page read and write
5698000
trusted library allocation
page read and write
52F5000
trusted library allocation
page read and write
C048000
unkown
page read and write
3382000
unkown
page read and write
2A54000
heap
page read and write
7FF5DF229000
unkown
page readonly
830F000
stack
page read and write
3260000
heap
page read and write
4DA000
stack
page read and write
65E000
heap
page read and write
962B000
unkown
page read and write
7FF5DF25B000
unkown
page readonly
379000
system
page execute and read and write
336F000
unkown
page read and write
52C3000
unkown
page read and write
58CE000
stack
page read and write
27F0000
unkown
page readonly
64EF000
stack
page read and write
50EE000
heap
page read and write
47F1000
unkown
page read and write
14B0000
heap
page read and write
891C000
unkown
page read and write
7FF5DF2FE000
unkown
page readonly
2942000
heap
page read and write
28C0000
trusted library allocation
page read and write
33EE000
stack
page read and write
4DB0000
trusted library allocation
page read and write
7C4000
heap
page read and write
9714000
unkown
page read and write
7FF5DEE4E000
unkown
page readonly
BDC000
stack
page read and write
1070000
heap
page read and write
7FF5DF3F7000
unkown
page readonly
368E000
stack
page read and write
12A0000
trusted library allocation
page read and write
4291000
trusted library allocation
page read and write
2F34000
heap
page read and write
5A5000
heap
page read and write
7FF5DF08F000
unkown
page readonly
2FAA000
heap
page read and write
B120000
unkown
page readonly
FBE000
stack
page read and write
73BC000
unkown
page read and write
68B0000
trusted library allocation
page read and write
AAE000
stack
page read and write
A90000
heap
page read and write
6698000
heap
page read and write
2DFD000
stack
page read and write
47E0000
trusted library allocation
page read and write
4BA0000
heap
page read and write
4E90000
direct allocation
page execute and read and write
2AF0000
heap
page read and write
2890000
unkown
page readonly
263E000
stack
page read and write
2695000
heap
page read and write
37BF000
heap
page read and write
71E000
stack
page read and write
32FC000
trusted library allocation
page read and write
2E43000
direct allocation
page execute and read and write
314B000
heap
page read and write
AED000
trusted library allocation
page execute and read and write
2FAA000
heap
page read and write
227D000
stack
page read and write
7FF5DF582000
unkown
page readonly
7FF5DEFE2000
unkown
page readonly
2D80000
heap
page read and write
15CD000
trusted library allocation
page execute and read and write
2D01000
direct allocation
page execute and read and write
35E6000
direct allocation
page execute and read and write
4AEF000
heap
page read and write
7FF5DF1D1000
unkown
page readonly
2DAB000
heap
page read and write
63C0000
trusted library allocation
page execute and read and write
47F7000
trusted library allocation
page read and write
D69000
heap
page read and write
1500000
trusted library allocation
page execute and read and write
13D0000
heap
page read and write
7FF5DF0C1000
unkown
page readonly
2CF0000
heap
page read and write
C048000
unkown
page read and write
BE84000
system
page execute and read and write
49E000
stack
page read and write
56AE000
stack
page read and write
68FE000
stack
page read and write
2B5E000
stack
page read and write
7E0000
trusted library allocation
page read and write
288E000
stack
page read and write
7FF5DF3BE000
unkown
page readonly
2F93000
trusted library allocation
page read and write
123A000
stack
page read and write
C523000
unkown
page read and write
6E3C000
stack
page read and write
3285000
heap
page read and write
33BF000
stack
page read and write
2C90000
heap
page read and write
33C0000
unkown
page readonly
C3A0000
unkown
page read and write
3054000
trusted library allocation
page read and write
7FF5DE531000
unkown
page readonly
989F000
unkown
page read and write
35AF000
stack
page read and write
7FF5DF539000
unkown
page readonly
5805000
heap
page read and write
989F000
unkown
page read and write
73B8000
unkown
page read and write
7B50000
unkown
page readonly
22F9000
trusted library allocation
page read and write
7ACE000
stack
page read and write
9F10000
unkown
page read and write
265C000
stack
page read and write
4855000
unkown
page read and write
7395000
unkown
page read and write
9D0000
heap
page read and write
30FF000
stack
page read and write
2692000
trusted library allocation
page read and write
7FF5DF4D5000
unkown
page readonly
316D000
trusted library allocation
page read and write
7FF5DF567000
unkown
page readonly
95F0000
unkown
page read and write
2C4B000
trusted library allocation
page read and write
9FA0000
unkown
page read and write
AF0000
heap
page read and write
3F1A000
trusted library allocation
page read and write
2FD4000
heap
page read and write
7FF5DEFB7000
unkown
page readonly
7FF5DEEEB000
unkown
page readonly
7FF5DF429000
unkown
page readonly
3200000
heap
page read and write
7FF5DF5B5000
unkown
page readonly
410000
heap
page read and write
7FF5DF58A000
unkown
page readonly
61CF000
stack
page read and write
13A1000
unkown
page readonly
7FD000
trusted library allocation
page execute and read and write
2D0E000
stack
page read and write
4FD0000
heap
page read and write
65CC000
stack
page read and write
561D000
trusted library allocation
page read and write
26B8000
trusted library allocation
page read and write
4A5E000
stack
page read and write
7FF5DF191000
unkown
page readonly
57B0000
trusted library allocation
page read and write
74D6000
unkown
page read and write
5830000
trusted library allocation
page read and write
D60000
heap
page read and write
50E8000
heap
page read and write
7FF5DF54D000
unkown
page readonly
E4F000
stack
page read and write
7FF5DF421000
unkown
page readonly
A9E000
heap
page read and write
692E000
stack
page read and write
B500000
unkown
page readonly
4DE9000
heap
page read and write
324E000
stack
page read and write
935B000
stack
page read and write
7FF5DF52D000
unkown
page readonly
880000
trusted library allocation
page read and write
802000
trusted library allocation
page read and write
C01A000
unkown
page read and write
BF40000
unkown
page read and write
558000
heap
page read and write
7840000
unkown
page read and write
7C4000
heap
page read and write
657F000
stack
page read and write
AD5000
heap
page read and write
2F34000
heap
page read and write
BFEF000
unkown
page read and write
55F0000
trusted library allocation
page execute and read and write
5216000
trusted library allocation
page read and write
61A6000
heap
page read and write
144A000
heap
page read and write
152D000
trusted library allocation
page execute and read and write
BFAB000
unkown
page read and write
9605000
unkown
page read and write
BFA3000
unkown
page read and write
2C1D000
trusted library allocation
page read and write
2C36000
trusted library allocation
page read and write
330A000
trusted library allocation
page read and write
3364000
unkown
page read and write
9F7C000
unkown
page read and write
3D81000
trusted library allocation
page read and write
7FF5DF4EC000
unkown
page readonly
26DD000
trusted library allocation
page execute and read and write
7FF5DE9CB000
unkown
page readonly
C159000
unkown
page read and write
6ADE000
stack
page read and write
6480000
heap
page read and write
C75000
stack
page read and write
4AF0000
trusted library allocation
page read and write
5032000
direct allocation
page execute and read and write
CBA000
heap
page read and write
C319000
unkown
page read and write
2A54000
heap
page read and write
7FF5DF486000
unkown
page readonly
5420000
trusted library allocation
page read and write
84A000
heap
page read and write
6B5000
heap
page read and write
2CFC000
heap
page read and write
7FF5DF1FC000
unkown
page readonly
11E0000
heap
page read and write
48C0000
trusted library allocation
page execute and read and write
25A0000
unclassified section
page execute and read and write
3E6A000
trusted library allocation
page read and write
654E000
stack
page read and write
3374000
heap
page read and write
3394000
unkown
page read and write
43E5000
heap
page read and write
A759000
unkown
page read and write
3691000
heap
page read and write
32B0000
unkown
page read and write
808000
heap
page read and write
4828000
unkown
page read and write
2CFD000
stack
page read and write
2E7E000
direct allocation
page execute and read and write
914B000
stack
page read and write
D14000
heap
page read and write
7FF5DF5AE000
unkown
page readonly
63AC000
stack
page read and write
32C4000
heap
page read and write
4F75000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
3337000
trusted library allocation
page read and write
148D000
trusted library allocation
page execute and read and write
C034000
unkown
page read and write
A13000
trusted library allocation
page read and write
3128000
heap
page read and write
6B43000
heap
page read and write
38CE000
stack
page read and write
BFCE000
unkown
page read and write
9E0000
unkown
page readonly
98AD000
unkown
page read and write
A08D000
unkown
page read and write
48E0000
unkown
page read and write
3290000
unkown
page readonly
10100000
unkown
page read and write
5240000
trusted library allocation
page execute and read and write
30B7000
direct allocation
page execute and read and write
2A54000
heap
page read and write
A50000
trusted library allocation
page read and write
8A7000
heap
page read and write
47F1000
trusted library allocation
page read and write
7C0000
heap
page read and write
58F0000
trusted library allocation
page read and write
2EFF000
heap
page read and write
9FC3000
unkown
page read and write
3070000
heap
page read and write
2F9D000
trusted library allocation
page execute and read and write
41F000
remote allocation
page execute and read and write
7FF5DEF06000
unkown
page readonly
1B0000
direct allocation
page read and write
C8F000
stack
page read and write
32B0000
heap
page read and write
448000
unkown
page readonly
7C4000
heap
page read and write
7FF5DEFF5000
unkown
page readonly
E06000
heap
page read and write
4CBC000
heap
page read and write
7FF5DF4A6000
unkown
page readonly
C034000
unkown
page read and write
C354000
unkown
page read and write
7FF5DF41B000
unkown
page readonly
59AD000
direct allocation
page execute and read and write
5B8E000
stack
page read and write
32BC000
heap
page read and write
2807000
direct allocation
page execute and read and write
3449000
direct allocation
page execute and read and write
C40000
trusted library allocation
page execute and read and write
7FF5DF39C000
unkown
page readonly
67FD000
stack
page read and write
830000
trusted library allocation
page read and write
41F000
remote allocation
page execute and read and write
2D1D000
direct allocation
page execute and read and write
13B0000
unclassified section
page execute and read and write
4E6000
heap
page read and write
11A0000
unkown
page readonly
500E000
direct allocation
page execute and read and write
118C000
heap
page read and write
4DC0000
trusted library allocation
page read and write
7502000
unkown
page read and write
668F000
stack
page read and write
73B4000
unkown
page read and write
4E10000
trusted library allocation
page read and write
7FF5DF16B000
unkown
page readonly
753E000
stack
page read and write
30E0000
heap
page read and write
C40C000
unkown
page read and write
62C0000
trusted library allocation
page read and write
7FF5DF392000
unkown
page readonly
32B0000
heap
page read and write
397A000
trusted library allocation
page read and write
52B2000
trusted library allocation
page read and write
265D000
stack
page read and write
C523000
unkown
page read and write
49F2000
heap
page read and write
5E0E000
stack
page read and write
7FF5DF0D2000
unkown
page readonly
4D7B000
stack
page read and write
57FE000
stack
page read and write
8390000
unkown
page read and write
4C6E000
stack
page read and write
5440000
heap
page read and write
2C00000
trusted library allocation
page read and write
6AEC000
stack
page read and write
DE3000
heap
page read and write
2BCE000
stack
page read and write
838B000
stack
page read and write
51D0000
trusted library allocation
page read and write
47D9000
unkown
page read and write
989F000
unkown
page read and write
5801000
heap
page read and write
2A57000
direct allocation
page execute and read and write
4D30000
trusted library allocation
page execute and read and write
CF3000
trusted library allocation
page execute and read and write
13D8000
heap
page read and write
BFE000
stack
page read and write
5DDE000
stack
page read and write
92DC000
stack
page read and write
B90000
heap
page read and write
7FF5DF45A000
unkown
page readonly
7FF5DF349000
unkown
page readonly
2FDD000
heap
page read and write
4824000
unkown
page read and write
46C8000
heap
page read and write
84A000
heap
page read and write
323D000
stack
page read and write
7FF5DF2F3000
unkown
page readonly
3480000
heap
page read and write
ACAE000
stack
page read and write
C319000
unkown
page read and write
327E000
heap
page read and write
C75000
stack
page read and write
4B29000
direct allocation
page execute and read and write
D3A000
heap
page read and write
5220000
heap
page read and write
2D40000
heap
page read and write
3410000
heap
page read and write
BFEF000
unkown
page read and write
303D000
stack
page read and write
1158000
heap
page read and write
2F9F000
heap
page read and write
ADC0000
unkown
page readonly
3E3A000
trusted library allocation
page read and write
2800000
heap
page read and write
2A4F000
stack
page read and write
7F0A0000
trusted library allocation
page execute and read and write
2FB0000
heap
page read and write
10180000
system
page execute and read and write
2FD0000
heap
page read and write
C39F000
unkown
page read and write
950F000
stack
page read and write
4C12000
heap
page read and write
34B0000
unkown
page readonly
3362000
unkown
page read and write
5550000
trusted library allocation
page execute and read and write
5030000
trusted library allocation
page execute and read and write
354F000
stack
page read and write
37C0000
heap
page read and write
C298000
unkown
page read and write
7FF5DF582000
unkown
page readonly
5E4E000
stack
page read and write
32E6000
direct allocation
page execute and read and write
4FBD000
direct allocation
page execute and read and write
3356000
unkown
page read and write
15B0000
trusted library allocation
page read and write
680E000
stack
page read and write
9716000
unkown
page read and write
26D0000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
3180000
heap
page execute and read and write
2C00000
heap
page read and write
7FF5C0B65000
unkown
page readonly
3151000
heap
page read and write
2F80000
heap
page read and write
ADC000
stack
page read and write
339D000
unkown
page read and write
4E70000
direct allocation
page execute and read and write
7FF5DF458000
unkown
page readonly
4800000
heap
page read and write
26F0000
unclassified section
page execute and read and write
56F0000
trusted library allocation
page read and write
31AE000
unkown
page read and write
5780000
trusted library allocation
page execute and read and write
113C000
stack
page read and write
8C28000
stack
page read and write
7FF5DF28E000
unkown
page readonly
830F000
stack
page read and write
6AA000
stack
page read and write
50F9000
heap
page read and write
7FF5DEF90000
unkown
page readonly
6B29000
heap
page read and write
9F2A000
unkown
page read and write
2B6E000
stack
page read and write
2D47000
trusted library allocation
page read and write
124A000
heap
page read and write
9718000
unkown
page read and write
3160000
heap
page read and write
531E000
stack
page read and write
885A000
stack
page read and write
7FF5DEFFC000
unkown
page readonly
972000
system
page execute and read and write
2D27000
direct allocation
page execute and read and write
2FAA000
heap
page read and write
C02F000
unkown
page read and write
2B30000
trusted library allocation
page read and write
9729000
unkown
page read and write
6E90000
trusted library allocation
page read and write
BD80000
system
page execute and read and write
5AE0000
trusted library allocation
page execute and read and write
7FF5DF364000
unkown
page readonly
48B2000
trusted library allocation
page read and write
2E09000
direct allocation
page execute and read and write
32D1000
direct allocation
page execute and read and write
AE0000
trusted library allocation
page read and write
4CCD000
direct allocation
page execute and read and write
2EC0000
unkown
page readonly
C24C000
unkown
page read and write
2550000
heap
page read and write
B9F0000
unkown
page read and write
C19D000
unkown
page read and write
3EF7000
trusted library allocation
page read and write
92DB000
stack
page read and write
C4EB000
unkown
page read and write
2C70000
heap
page read and write
2FAA000
heap
page read and write
2D16000
direct allocation
page execute and read and write
96ED000
unkown
page read and write
46CE000
stack
page read and write
3128000
heap
page read and write
2F34000
heap
page read and write
3551000
trusted library allocation
page read and write
7A40000
unkown
page readonly
2DB6000
heap
page read and write
7FF5DF5D6000
unkown
page readonly
7FF5DF248000
unkown
page readonly
3289000
heap
page read and write
46BF000
stack
page read and write
2890000
unkown
page readonly
7FF5DF3F1000
unkown
page readonly
978C000
unkown
page read and write
6F0000
heap
page read and write
7C0000
heap
page read and write
60BE000
stack
page read and write
29A0000
heap
page read and write
2952000
unclassified section
page execute and read and write
658E000
stack
page read and write
C20000
heap
page read and write
31B0000
heap
page read and write
4C1D000
trusted library allocation
page read and write
5855000
trusted library allocation
page read and write
6EDD000
stack
page read and write
6DF0000
trusted library allocation
page read and write
336C000
unkown
page read and write
27D0000
unkown
page read and write
31CF000
stack
page read and write
28A0000
unkown
page readonly
9F2A000
unkown
page read and write
A26000
trusted library allocation
page execute and read and write
5E4F000
stack
page read and write
2C22000
trusted library allocation
page read and write
34F0000
heap
page read and write
5510000
heap
page read and write
77F000
stack
page read and write
10003000
unkown
page read and write
1270000
trusted library allocation
page read and write
6EB000
trusted library allocation
page execute and read and write
5FD0000
trusted library allocation
page read and write
7FF5DF382000
unkown
page readonly
1280000
heap
page read and write
73E5000
unkown
page read and write
2FD4000
heap
page read and write
7FF5DF04D000
unkown
page readonly
4760000
unkown
page read and write
2D10000
direct allocation
page read and write
60CE000
stack
page read and write
7F8E0000
trusted library allocation
page execute and read and write
270E000
unkown
page read and write
4FC1000
direct allocation
page execute and read and write
1081F000
stack
page read and write
BF98000
unkown
page read and write
639C000
stack
page read and write
51F0000
trusted library allocation
page read and write
637C000
stack
page read and write
7FF5DF126000
unkown
page readonly
4FD3000
heap
page read and write
C6E000
stack
page read and write
2F69000
direct allocation
page execute and read and write
7FF5DF3EA000
unkown
page readonly
28C0000
direct allocation
page execute and read and write
C3A000
stack
page read and write
7FF5DF4D5000
unkown
page readonly
4918000
trusted library allocation
page read and write
7FF5DF089000
unkown
page readonly
87CA000
unkown
page read and write
C34E000
unkown
page read and write
32EE000
stack
page read and write
7FF5DF5B3000
unkown
page readonly
13AE000
stack
page read and write
BFB3000
unkown
page read and write
7FF5DF60D000
unkown
page readonly
739B000
unkown
page read and write
2C34000
trusted library allocation
page read and write
2F6D000
stack
page read and write
4766000
unkown
page read and write
7FF5DF191000
unkown
page readonly
E06000
heap
page read and write
4980000
heap
page read and write
C410000
unkown
page read and write
7FF5DF5E9000
unkown
page readonly
C4CB000
unkown
page read and write
4A92000
trusted library allocation
page read and write
3635000
heap
page read and write
5B30000
trusted library allocation
page read and write
4A11000
direct allocation
page execute and read and write
54C0000
trusted library allocation
page execute and read and write
A20000
trusted library allocation
page read and write
33D0000
heap
page read and write
7FF5DF275000
unkown
page readonly
2890000
heap
page read and write
C438000
unkown
page read and write
AE6F000
stack
page read and write
76E000
stack
page read and write
318B000
stack
page read and write
FF0000
heap
page read and write
48A0000
unkown
page read and write
2D6E000
unkown
page read and write
2FE3000
heap
page read and write
A758000
unkown
page read and write
A80000
heap
page read and write
35B0000
heap
page read and write
2E30000
unkown
page read and write
BF90000
unkown
page read and write
3C5D000
direct allocation
page execute and read and write
C183000
unkown
page read and write
2FD4000
heap
page read and write
124A000
heap
page read and write
A22000
trusted library allocation
page read and write
7FF5DF4FB000
unkown
page readonly
634E000
stack
page read and write
1386000
unclassified section
page execute and read and write
522B000
trusted library allocation
page read and write
E0F000
heap
page read and write
2929000
direct allocation
page execute and read and write
2EC0000
direct allocation
page execute and read and write
41F000
remote allocation
page execute and read and write
7FF5DEFCB000
unkown
page readonly
BFB3000
unkown
page read and write
E70000
unkown
page readonly
26B0000
trusted library allocation
page read and write
2F34000
heap
page read and write
4E20000
trusted library allocation
page read and write
1690000
heap
page read and write
EE4C000
unkown
page read and write
7FF5DF458000
unkown
page readonly
4879000
heap
page read and write
2B4E000
unkown
page read and write
47EC000
unkown
page read and write
7FF5DF3AA000
unkown
page readonly
113F0000
system
page execute and read and write
E0F000
heap
page read and write
29E9000
direct allocation
page execute and read and write
1132000
trusted library allocation
page read and write
6080000
heap
page read and write
7C4000
heap
page read and write
C35F000
unkown
page read and write
1380000
heap
page read and write
BD7F000
stack
page read and write
A6F1000
unkown
page read and write
3911000
trusted library allocation
page read and write
1810000
heap
page read and write
2AAB000
unclassified section
page execute and read and write
5D50000
trusted library allocation
page read and write
7C4000
heap
page read and write
50FD000
heap
page read and write
860000
trusted library allocation
page execute and read and write
3020000
heap
page read and write
6D2000
trusted library allocation
page read and write
EB0000
heap
page read and write
2A76000
direct allocation
page execute and read and write
44AA000
trusted library allocation
page read and write
C19D000
unkown
page read and write
2A54000
heap
page read and write
4C32000
heap
page read and write
5777000
heap
page read and write
56C6000
trusted library allocation
page read and write
66BE000
stack
page read and write
5470000
trusted library allocation
page read and write
320B000
stack
page read and write
7B50000
unkown
page readonly
7FF5DF45C000
unkown
page readonly
7FF5DF42F000
unkown
page readonly
2E9D000
stack
page read and write
4E1D000
direct allocation
page execute and read and write
B11C000
stack
page read and write
595F000
stack
page read and write
6E60000
trusted library allocation
page execute and read and write
80A000
trusted library allocation
page execute and read and write
2C5A000
heap
page read and write
9F92000
unkown
page read and write
2F88000
heap
page read and write
7FF5DF537000
unkown
page readonly
4B85000
trusted library allocation
page read and write
4CA8000
trusted library allocation
page read and write
7FF5DF3B5000
unkown
page readonly
7FF5DF2BA000
unkown
page readonly
974000
system
page execute and read and write
53E1000
heap
page read and write
2F95000
trusted library allocation
page execute and read and write
2C70000
heap
page read and write
2940000
direct allocation
page execute and read and write
7FF5DF382000
unkown
page readonly
A60000
heap
page read and write
56E5000
trusted library allocation
page read and write
37DF000
heap
page read and write
75F000
stack
page read and write
1375000
heap
page read and write
E80000
unkown
page read and write
3320000
direct allocation
page execute and read and write
86CA000
heap
page read and write
73CD000
unkown
page read and write
5200000
heap
page read and write
3077000
heap
page read and write
2BD0000
trusted library allocation
page execute and read and write
5ADD000
stack
page read and write
1150000
heap
page read and write
7FF5DF229000
unkown
page readonly
112EC000
stack
page read and write
7FF5DF54D000
unkown
page readonly
7FF5DF091000
unkown
page readonly
7FF5DF2E2000
unkown
page readonly
4D20000
trusted library allocation
page execute and read and write
5979000
heap
page read and write
43F1000
heap
page read and write
30FB000
stack
page read and write
628E000
stack
page read and write
2F82000
trusted library allocation
page read and write
146B000
heap
page read and write
37DF000
heap
page read and write
4B2D000
direct allocation
page execute and read and write
53D5000
heap
page read and write
3120000
heap
page read and write
7FF5DEF87000
unkown
page readonly
7FF5DF532000
unkown
page readonly
46A4000
heap
page read and write
AD2B000
stack
page read and write
A32000
trusted library allocation
page read and write
28D3000
heap
page read and write
7C4000
heap
page read and write
7DF5E895F000
unkown
page readonly
322E000
unkown
page read and write
15C4000
trusted library allocation
page read and write
7FF5DF3D4000
unkown
page readonly
8EA9000
stack
page read and write
8D30000
system
page execute and read and write
4C38000
trusted library allocation
page read and write
1180000
heap
page read and write
B45A000
stack
page read and write
2C30000
heap
page read and write
4860000
unkown
page read and write
1260000
trusted library allocation
page read and write
2FD0000
heap
page read and write
26A0000
trusted library allocation
page read and write
2C48000
trusted library allocation
page read and write
11A0000
unkown
page readonly
C1CC000
unkown
page read and write
7FF5DF2BA000
unkown
page readonly
47A2000
unkown
page read and write
3540000
heap
page read and write
B40000
heap
page read and write
328A000
heap
page read and write
3418000
heap
page read and write
7FF5DF4AB000
unkown
page readonly
4E60000
trusted library allocation
page execute and read and write
2DA0000
direct allocation
page execute and read and write
874C000
stack
page read and write
4BD0000
trusted library allocation
page execute and read and write
589E000
stack
page read and write
7FF5DF20A000
unkown
page readonly
28B0000
trusted library allocation
page read and write
7C4000
heap
page read and write
7FF5DF122000
unkown
page readonly
4E90000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
E80000
unkown
page read and write
334F000
stack
page read and write
2C54000
heap
page read and write
1100000
trusted library allocation
page read and write
17C0000
trusted library allocation
page read and write
2C76000
direct allocation
page execute and read and write
C4EB000
unkown
page read and write
E1B000
heap
page read and write
28D0000
heap
page read and write
9380000
unkown
page readonly
7F3000
trusted library allocation
page read and write
30C0000
direct allocation
page read and write
EC0000
trusted library allocation
page read and write
E660000
system
page execute and read and write
5520000
trusted library allocation
page read and write
3149000
direct allocation
page execute and read and write
A02D000
unkown
page read and write
2CB0000
heap
page read and write
5298000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
5090000
trusted library allocation
page execute and read and write
CE0000
trusted library allocation
page read and write
7FF5DF017000
unkown
page readonly
6090000
trusted library allocation
page execute and read and write
5768000
trusted library allocation
page read and write
3361000
direct allocation
page execute and read and write
9B1D000
stack
page read and write
D5F000
stack
page read and write
4890000
unkown
page read and write
6C1E000
stack
page read and write
9704000
unkown
page read and write
30B0000
heap
page read and write
2B30000
trusted library allocation
page read and write
4869000
direct allocation
page execute and read and write
112F0000
system
page execute and read and write
BFAB000
unkown
page read and write
5F78000
heap
page read and write
660000
heap
page read and write
A74C000
unkown
page read and write
7FF5DF60D000
unkown
page readonly
7FF5DEEEB000
unkown
page readonly
3382000
unkown
page read and write
102E000
stack
page read and write
7C4000
heap
page read and write
2B10000
heap
page read and write
2B90000
heap
page read and write
7FF5DF5FF000
unkown
page readonly
D99000
heap
page read and write
7FF5DEF87000
unkown
page readonly
4CF0000
trusted library allocation
page read and write
7830000
unkown
page read and write
4823000
heap
page read and write
2BD3000
heap
page read and write
1390000
heap
page read and write
24FF000
stack
page read and write
2DBC000
heap
page read and write
5350000
heap
page execute and read and write
D14000
heap
page read and write
C23D000
unkown
page read and write
27DF000
stack
page read and write
EF0000
trusted library allocation
page read and write
FFC4000
unkown
page read and write
48DE000
direct allocation
page execute and read and write
2C16000
direct allocation
page execute and read and write
4842000
trusted library allocation
page read and write
A0B1000
unkown
page read and write
486D000
direct allocation
page execute and read and write
328E000
stack
page read and write
8C0000
heap
page read and write
7FF5DF1CD000
unkown
page readonly
5750000
heap
page read and write
9563000
unkown
page read and write
48B0000
trusted library allocation
page read and write
2FD2000
heap
page read and write
960000
system
page execute and read and write
C39F000
unkown
page read and write
337B000
stack
page read and write
3070000
unclassified section
page execute and read and write
1550000
heap
page read and write
2F92000
trusted library allocation
page read and write
114E000
stack
page read and write
BD7F000
stack
page read and write
440000
heap
page read and write
C149000
unkown
page read and write
DE0000
unclassified section
page execute and read and write
4A80000
heap
page read and write
3DFD000
direct allocation
page execute and read and write
BFAD000
unkown
page read and write
AFC000
stack
page read and write
34EA000
trusted library allocation
page read and write
6B2D000
stack
page read and write
2880000
direct allocation
page execute and read and write
11F5000
unclassified section
page execute and read and write
7FF5DF49C000
unkown
page readonly
7FF5C0B65000
unkown
page readonly
6B17000
heap
page read and write
E91000
unkown
page read and write
33D0000
heap
page read and write
4A96000
unclassified section
page read and write
2A54000
heap
page read and write
28CB000
trusted library allocation
page read and write
5762000
heap
page read and write
3200000
heap
page read and write
D10000
trusted library allocation
page read and write
FF5000
heap
page read and write
3304000
unkown
page read and write
7FF5DF45C000
unkown
page readonly
4CD2000
trusted library allocation
page read and write
10084000
unkown
page read and write
276E000
stack
page read and write
B88000
trusted library allocation
page read and write
6740000
heap
page read and write
26CF000
stack
page read and write
393A000
trusted library allocation
page read and write
69AE000
stack
page read and write
2B10000
trusted library allocation
page execute and read and write
27AE000
stack
page read and write
35BA000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
2EB0000
unkown
page readonly
7DF4E6791000
unkown
page execute read
73BA000
unkown
page read and write
5950000
heap
page read and write
335B000
unkown
page read and write
56CF000
stack
page read and write
6E5F000
stack
page read and write
342F000
unkown
page read and write
8C26000
stack
page read and write
4C70000
heap
page read and write
336A000
trusted library allocation
page read and write
564C000
heap
page read and write
32ED000
direct allocation
page execute and read and write
4C0E000
trusted library allocation
page read and write
C23D000
unkown
page read and write
47EE000
trusted library allocation
page read and write
6C0000
trusted library allocation
page read and write
3AAE000
heap
page read and write
2B30000
trusted library allocation
page read and write
1760000
trusted library allocation
page read and write
51DC000
stack
page read and write
9605000
unkown
page read and write
483D000
trusted library allocation
page read and write
4C70000
trusted library allocation
page execute and read and write
2EB0000
unkown
page readonly
3240000
heap
page read and write
DF3000
heap
page read and write
A0F7000
unkown
page read and write
7800000
unkown
page read and write
3349000
unkown
page read and write
A744000
unkown
page read and write
970C000
unkown
page read and write
2DB6000
heap
page read and write
B81B000
stack
page read and write
D14000
heap
page read and write
27B0000
heap
page read and write
4407000
trusted library allocation
page read and write
1390000
heap
page read and write
7FF5DEE56000
unkown
page readonly
A6D2000
unkown
page read and write
7FF5DF5FF000
unkown
page readonly
DE0000
trusted library allocation
page read and write
2F02000
direct allocation
page execute and read and write
BFA7000
unkown
page read and write
5CE5000
heap
page read and write
3902000
heap
page read and write
13A0000
unkown
page readonly
28DF000
stack
page read and write
ADAB000
stack
page read and write
7FF5DF55A000
unkown
page readonly
C2E4000
unkown
page read and write
2B30000
trusted library allocation
page read and write
9D9F000
stack
page read and write
3311000
trusted library allocation
page read and write
2FD8000
heap
page read and write
7FF5DF55A000
unkown
page readonly
2BF0000
trusted library allocation
page read and write
68AC000
stack
page read and write
A10000
heap
page read and write
A6FF000
unkown
page read and write
30E0000
heap
page read and write
A104000
unkown
page read and write
2C50000
heap
page read and write
FFC4000
unkown
page read and write
3130000
direct allocation
page execute and read and write
7FF5DF57F000
unkown
page readonly
7FF5DEFA6000
unkown
page readonly
32D2000
trusted library allocation
page read and write
4C1D000
stack
page read and write
838B000
stack
page read and write
6E50000
heap
page read and write
AFC000
stack
page read and write
870000
heap
page read and write
6410000
trusted library allocation
page read and write
940C000
stack
page read and write
D14000
heap
page read and write
2DC0000
heap
page read and write
7DF4E6791000
unkown
page execute read
4CE1000
heap
page read and write
7FF5DF49C000
unkown
page readonly
2EB6000
direct allocation
page execute and read and write
228E000
stack
page read and write
34CF000
unkown
page read and write
2903000
heap
page read and write
67BC000
stack
page read and write
D64000
heap
page read and write
BF82000
unkown
page read and write
314B000
trusted library allocation
page read and write
98A7000
unkown
page read and write
2DC0000
unkown
page read and write
EE0000
heap
page read and write
2C54000
heap
page read and write
BFDF000
unkown
page read and write
B9E0000
unkown
page read and write
A79000
system
page execute and read and write
356E000
stack
page read and write
2ABE000
unkown
page read and write
4D50000
trusted library allocation
page read and write
F30000
heap
page read and write
27F0000
heap
page read and write
26A4000
trusted library allocation
page read and write
2B10000
heap
page read and write
2D28000
heap
page read and write
47C7000
heap
page read and write
3107000
stack
page read and write
35EF000
heap
page read and write
C149000
unkown
page read and write
2F34000
heap
page read and write
52D9000
unkown
page read and write
9F3E000
unkown
page read and write
7FF5DF029000
unkown
page readonly
5710000
trusted library allocation
page read and write
B60A000
stack
page read and write
1540000
unclassified section
page execute and read and write
3460000
heap
page read and write
5141000
direct allocation
page execute and read and write
6A86000
heap
page read and write
98A7000
unkown
page read and write
4E05000
heap
page read and write
A106000
unkown
page read and write
2DA0000
unclassified section
page execute and read and write
4F4000
heap
page read and write
73B6000
unkown
page read and write
3701000
trusted library allocation
page read and write
C39F000
unkown
page read and write
3371000
unkown
page read and write
56D0000
trusted library allocation
page read and write
7395000
unkown
page read and write
597F000
heap
page read and write
7FF5DF221000
unkown
page readonly
7FF5DF1D1000
unkown
page readonly
83F0000
unkown
page read and write
7FF5DE535000
unkown
page readonly
9CE000
stack
page read and write
2E60000
unkown
page read and write
7FF5DF21F000
unkown
page readonly
56B0000
trusted library allocation
page read and write
1776000
trusted library allocation
page execute and read and write
92E000
stack
page read and write
293B000
stack
page read and write
5780000
trusted library allocation
page read and write
57EE000
stack
page read and write
2F6D000
trusted library allocation
page execute and read and write
2910000
heap
page read and write
32DC000
heap
page read and write
31D3000
direct allocation
page execute and read and write
159A000
heap
page read and write
2B30000
trusted library allocation
page read and write
7FF5DEE56000
unkown
page readonly
AF0000
trusted library allocation
page read and write
7FF5DEE43000
unkown
page readonly
7FF5DF606000
unkown
page readonly
7FF5DF532000
unkown
page readonly
B80000
heap
page read and write
74A9000
unkown
page read and write
5103000
heap
page read and write
5F7E000
stack
page read and write
2BED000
stack
page read and write
73D000
heap
page read and write
51E9000
trusted library allocation
page read and write
62D0000
heap
page read and write
9095000
stack
page read and write
7FF5DF3B9000
unkown
page readonly
A072000
unkown
page read and write
2FD8000
heap
page read and write
4BFB000
trusted library allocation
page read and write
5D9D000
stack
page read and write
6B0E000
stack
page read and write
A74C000
unkown
page read and write
433A000
trusted library allocation
page read and write
2700000
unclassified section
page execute and read and write
7FF5DF571000
unkown
page readonly
BF9D000
unkown
page read and write
3A87000
trusted library allocation
page read and write
2E8F000
stack
page read and write
1120000
trusted library allocation
page read and write
12FC000
stack
page read and write
2FC7000
heap
page read and write
2C8F000
unkown
page read and write
2985000
heap
page read and write
4854000
heap
page read and write
B259000
stack
page read and write
50DA000
heap
page read and write
11364000
system
page execute and read and write
7FF5DEFBD000
unkown
page readonly
7FF5DF577000
unkown
page readonly
5C40000
heap
page read and write
3981000
heap
page read and write
69E0000
heap
page read and write
3633000
heap
page read and write
7FF5DF623000
unkown
page readonly
14ED000
trusted library allocation
page execute and read and write
38BC000
trusted library allocation
page read and write
2B12000
direct allocation
page execute and read and write
331C000
trusted library allocation
page read and write
B500000
unkown
page readonly
6BD000
trusted library allocation
page execute and read and write
678F000
stack
page read and write
7FF5DF156000
unkown
page readonly
13FA000
heap
page read and write
EB7F000
unkown
page execute and read and write
7FF5DF343000
unkown
page readonly
51E0000
trusted library allocation
page read and write
23C9000
trusted library allocation
page read and write
4C3E000
direct allocation
page execute and read and write
C003000
unkown
page read and write
74E5000
unkown
page read and write
7FF5DF207000
unkown
page readonly
34C0000
unkown
page read and write
2DD0000
heap
page read and write
6820000
trusted library allocation
page read and write
9F0000
heap
page read and write
7FF5DEFDD000
unkown
page readonly
26F0000
heap
page execute and read and write
C140000
unkown
page read and write
4870000
unkown
page read and write
6D90000
trusted library allocation
page execute and read and write
6BA000
heap
page read and write
325E000
stack
page read and write
7380000
unkown
page read and write
28D0000
heap
page read and write
C3A0000
unkown
page read and write
50A9000
heap
page read and write
7FF5DF4AB000
unkown
page readonly
2BFB000
trusted library allocation
page read and write
5040000
heap
page read and write
CA0000
heap
page read and write
4991000
heap
page read and write
50D0000
trusted library allocation
page read and write
61FE000
stack
page read and write
F00000
heap
page read and write
6B0000
heap
page read and write
7FF5DE539000
unkown
page readonly
7FF5DF4F7000
unkown
page readonly
32A0000
heap
page read and write
7FF5DF4E7000
unkown
page readonly
5241000
unkown
page read and write
2DBC000
heap
page read and write
D14000
heap
page read and write
5860000
trusted library allocation
page read and write
B2DC000
stack
page read and write
7FF5DF3F7000
unkown
page readonly
33E8000
heap
page read and write
4AE1000
heap
page read and write
26AB000
unclassified section
page execute and read and write
5A90000
trusted library allocation
page execute and read and write
2BBC000
heap
page read and write
13CF000
unclassified section
page execute and read and write
1140000
trusted library allocation
page read and write
293D000
heap
page read and write
1170000
heap
page read and write
7800000
unkown
page read and write
7FF5DF01B000
unkown
page readonly
32F0000
trusted library allocation
page execute and read and write
4E08000
trusted library allocation
page read and write
3136000
direct allocation
page execute and read and write
2D20000
heap
page read and write
4AD0000
trusted library allocation
page read and write
AEF0000
unkown
page read and write
30E2000
direct allocation
page execute and read and write
A700000
unkown
page read and write
660E000
stack
page read and write
5130000
trusted library allocation
page execute and read and write
5B2E000
stack
page read and write
2F8A000
trusted library allocation
page execute and read and write
7FF5DF1EC000
unkown
page readonly
2AB1000
direct allocation
page execute and read and write
3142000
heap
page read and write
EE88000
unkown
page read and write
E7E000
stack
page read and write
720000
heap
page read and write
47F3000
unkown
page read and write
305E000
stack
page read and write
73D000
heap
page read and write
96F000
stack
page read and write
8590000
unkown
page readonly
5F3E000
stack
page read and write
2B09000
unclassified section
page execute and read and write
920000
heap
page read and write
9B1E000
stack
page read and write
448C000
stack
page read and write
7C4000
heap
page read and write
970000
unkown
page readonly
4CC0000
heap
page read and write
2B8D000
direct allocation
page execute and read and write
50A0000
heap
page read and write
7FF5DF4C6000
unkown
page readonly
7940000
unkown
page readonly
2C54000
heap
page read and write
17D7000
heap
page read and write
2E50000
unkown
page readonly
3107000
stack
page read and write
4DB5000
trusted library allocation
page read and write
7FF5DF06F000
unkown
page readonly
6696000
heap
page read and write
7FF5DF626000
unkown
page readonly
6A8C000
stack
page read and write
7ACE000
stack
page read and write
2FD4000
heap
page read and write
3404000
heap
page read and write
525D000
stack
page read and write
330E000
stack
page read and write
286F000
stack
page read and write
6B8000
heap
page read and write
4B01000
heap
page read and write
15B1000
heap
page read and write
2330000
trusted library allocation
page read and write
7FF5DF24E000
unkown
page readonly
664E000
stack
page read and write
5EDF000
heap
page read and write
312C000
heap
page read and write
1380000
heap
page read and write
3374000
heap
page read and write
26E0000
trusted library allocation
page read and write
28FC000
heap
page read and write
7FF5DF248000
unkown
page readonly
BFD0000
unkown
page read and write
5204000
heap
page read and write
7FF5DF623000
unkown
page readonly
28F0000
heap
page read and write
5780000
heap
page read and write
5A1E000
direct allocation
page execute and read and write
2FA1000
heap
page read and write
AB0D000
stack
page read and write
4BD0000
trusted library allocation
page read and write
567000
heap
page read and write
CB1000
heap
page read and write
4F80000
trusted library allocation
page read and write
5D4E000
stack
page read and write
356E000
stack
page read and write
2F64000
trusted library allocation
page read and write
C2E4000
unkown
page read and write
EBC000
stack
page read and write
650F000
stack
page read and write
2FAA000
heap
page read and write
7FF5DF0F6000
unkown
page readonly
2B1B000
heap
page read and write
7FF5DF038000
unkown
page readonly
56C0000
trusted library allocation
page read and write
21AF000
stack
page read and write
58D1000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page execute and read and write
5241000
unkown
page read and write
7FF5DF07D000
unkown
page readonly
C431000
unkown
page read and write
41F000
remote allocation
page execute and read and write
595D000
trusted library allocation
page read and write
9C99000
stack
page read and write
D25000
trusted library allocation
page execute and read and write
800000
trusted library allocation
page read and write
AFFC000
stack
page read and write
61BE000
stack
page read and write
5A80000
trusted library allocation
page execute and read and write
520000
heap
page read and write
650D000
stack
page read and write
3373000
unkown
page read and write
896000
trusted library allocation
page read and write
44F0000
trusted library allocation
page read and write
467E000
stack
page read and write
51D4000
trusted library allocation
page read and write
3B5A000
trusted library allocation
page read and write
84A000
heap
page read and write
720000
heap
page read and write
2E30000
unkown
page read and write
CB0000
heap
page read and write
6C2F000
stack
page read and write
C13A000
unkown
page read and write
3CCA000
trusted library allocation
page read and write
58E0000
heap
page execute and read and write
560000
heap
page read and write
C34E000
unkown
page read and write
2D7F000
stack
page read and write
32E4000
heap
page read and write
42BA000
trusted library allocation
page read and write
2FD0000
heap
page read and write
D14000
heap
page read and write
5876000
heap
page read and write
F20000
heap
page read and write
10A9F000
system
page read and write
46C0000
heap
page read and write
C1A9000
unkown
page read and write
89C000
stack
page read and write
50FD000
heap
page read and write
34F0000
heap
page read and write
2B73000
direct allocation
page execute and read and write
F7A000
stack
page read and write
AE3000
trusted library allocation
page execute and read and write
46C2000
heap
page read and write
2886000
direct allocation
page execute and read and write
2F40000
heap
page read and write
2C6F000
stack
page read and write
391F000
heap
page read and write
569E000
trusted library allocation
page read and write
D14000
heap
page read and write
E5F5000
system
page execute and read and write
3220000
heap
page read and write
2FAD000
stack
page read and write
B06000
trusted library allocation
page execute and read and write
7FF5DF47E000
unkown
page readonly
361C000
heap
page read and write
2FDD000
heap
page read and write
3289000
heap
page read and write
73A3000
unkown
page read and write
5310000
trusted library allocation
page read and write
56A7000
trusted library allocation
page read and write
7FF5DF577000
unkown
page readonly
EFC000
stack
page read and write
136000
system
page execute and read and write
283C000
stack
page read and write
5960000
trusted library allocation
page read and write
2AA000
stack
page read and write
5730000
trusted library allocation
page execute and read and write
9E1E000
stack
page read and write
DD0000
heap
page read and write
2E5F000
stack
page read and write
7FF5DF195000
unkown
page readonly
F48000
stack
page read and write
AD2B000
stack
page read and write
7DF4E6780000
unkown
page readonly
2D20000
direct allocation
page execute and read and write
34F0000
heap
page read and write
4824000
unkown
page read and write
4766000
unkown
page read and write
5300000
trusted library allocation
page read and write
1030000
unclassified section
page execute and read and write
1296000
trusted library allocation
page execute and read and write
608E000
stack
page read and write
73B4000
unkown
page read and write
4AA0000
direct allocation
page execute and read and write
2826000
direct allocation
page execute and read and write
617F000
heap
page read and write
5570000
trusted library allocation
page read and write
137E000
stack
page read and write
6D8E000
stack
page read and write
4690000
trusted library allocation
page read and write
96DF000
unkown
page read and write
7DF4E6780000
unkown
page readonly
10003000
unkown
page read and write
6D59000
trusted library allocation
page read and write
3AEC000
trusted library allocation
page read and write
935C000
stack
page read and write
7FF5DF0C9000
unkown
page readonly
218E000
stack
page read and write
3106000
direct allocation
page execute and read and write
1390000
heap
page read and write
360F000
heap
page read and write
E80000
system
page execute and read and write
2FB0000
trusted library allocation
page read and write
740000
heap
page read and write
6BDC000
stack
page read and write
86C2000
heap
page read and write
D16000
trusted library allocation
page execute and read and write
83F000
heap
page read and write
670E000
stack
page read and write
420000
heap
page read and write
5691000
trusted library allocation
page read and write
989F000
unkown
page read and write
6B1E000
heap
page read and write
512D000
stack
page read and write
353E000
stack
page read and write
3470000
heap
page read and write
3281000
stack
page read and write
73C3000
unkown
page read and write
2F7D000
trusted library allocation
page execute and read and write
73AF000
unkown
page read and write
2C6E000
stack
page read and write
3E01000
direct allocation
page execute and read and write
7910000
unkown
page readonly
10D0000
heap
page read and write
267E000
trusted library allocation
page read and write
7FF5DF507000
unkown
page readonly
49A6000
heap
page read and write
7C4000
heap
page read and write
3404000
heap
page read and write
61CC000
stack
page read and write
367F000
stack
page read and write
287C000
stack
page read and write
10FA000
unclassified section
page execute and read and write
1274000
trusted library allocation
page read and write
1787000
trusted library allocation
page execute and read and write
EE71000
unkown
page read and write
2CCF000
unkown
page read and write
4EA0000
trusted library allocation
page execute and read and write
5448000
heap
page read and write
337C000
trusted library allocation
page read and write
A80000
trusted library allocation
page execute and read and write
CCE000
stack
page read and write
7B0000
heap
page read and write
5770000
trusted library allocation
page read and write
1240000
heap
page read and write
C359000
unkown
page read and write
BFDF000
unkown
page read and write
7FF5DEFF5000
unkown
page readonly
A744000
unkown
page read and write
A758000
unkown
page read and write
3028000
heap
page read and write
7DE000
heap
page read and write
51D2000
direct allocation
page execute and read and write
10370000
system
page execute and read and write
2F80000
heap
page read and write
3000000
heap
page read and write
4DF6000
trusted library allocation
page read and write
6080000
heap
page read and write
C18A000
unkown
page read and write
2FA5000
heap
page read and write
D22000
trusted library allocation
page read and write
682E000
stack
page read and write
437A000
trusted library allocation
page read and write
2F10000
unkown
page read and write
2FDD000
heap
page read and write
7910000
unkown
page readonly
B1C0000
unkown
page readonly
4DFD000
stack
page read and write
4AD5000
trusted library allocation
page read and write
AEEE000
stack
page read and write
310D000
direct allocation
page execute and read and write
63B0000
heap
page read and write
B40000
heap
page read and write
2A01000
heap
page read and write
31D0000
heap
page read and write
7FF5DE4F2000
unkown
page readonly
2AB5000
heap
page read and write
4B01000
heap
page read and write
BF9F000
unkown
page read and write
A00000
trusted library allocation
page read and write
4CDC000
heap
page read and write
BF7E000
unkown
page read and write
51DE000
stack
page read and write
EE71000
unkown
page read and write
34CA000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
7FF5DF3A1000
unkown
page readonly
7FF5DF626000
unkown
page readonly
7FBE0000
trusted library allocation
page execute and read and write
3147000
heap
page read and write
5D9C000
stack
page read and write
BFC3000
unkown
page read and write
2D1E000
stack
page read and write
BF10000
unkown
page readonly
83E0000
unkown
page read and write
6BF000
heap
page read and write
7FF5DEF94000
unkown
page readonly
7FF5DF4EC000
unkown
page readonly
1080000
unclassified section
page execute and read and write
9F0000
heap
page read and write
65EF000
stack
page read and write
9F23000
unkown
page read and write
5A4E000
stack
page read and write
7FF5DF4F3000
unkown
page readonly
7FF5DF2E5000
unkown
page readonly
9F60000
unkown
page read and write
7FF5DF5CC000
unkown
page readonly
2EAE000
stack
page read and write
7FF5DF029000
unkown
page readonly
7FF5DF3C2000
unkown
page readonly
3590000
heap
page read and write
130000
system
page execute and read and write
34E0000
trusted library allocation
page read and write
2ACD000
direct allocation
page execute and read and write
D10000
heap
page read and write
2F34000
heap
page read and write
AFFC000
stack
page read and write
C187000
unkown
page read and write
30B0000
direct allocation
page execute and read and write
3164000
unclassified section
page execute and read and write
34C0000
unkown
page read and write
D37000
stack
page read and write
ABC000
stack
page read and write
5D3E000
stack
page read and write
50FD000
heap
page read and write
5F4E000
stack
page read and write
817000
trusted library allocation
page execute and read and write
37D0000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page execute and read and write
There are 3764 hidden memdumps, click here to show them.